毕业论文英语翻译及原文
毕业论文(设计)外文文献翻译及原文
![毕业论文(设计)外文文献翻译及原文](https://img.taocdn.com/s3/m/06e2cc314028915f814dc2c9.png)
金融体制、融资约束与投资——来自OECD的实证分析R.SemenovDepartment of Economics,University of Nijmegen,Nijmegen(荷兰内梅亨大学,经济学院)这篇论文考查了OECD的11个国家中现金流量对企业投资的影响.我们发现不同国家之间投资对企业内部可获取资金的敏感性具有显著差异,并且银企之间具有明显的紧密关系的国家的敏感性比银企之间具有公平关系的国家的低.同时,我们发现融资约束与整体金融发展指标不存在关系.我们的结论与资本市场信息和激励问题对企业投资具有重要作用这种观点一致,并且紧密的银企关系会减少这些问题从而增加企业获取外部融资的渠道。
一、引言各个国家的企业在显著不同的金融体制下运行。
金融发展水平的差别(例如,相对GDP的信用额度和相对GDP的相应股票市场的资本化程度),在所有者和管理者关系、企业和债权人的模式中,企业控制的市场活动水平可以很好地被记录.在完美资本市场,对于具有正的净现值投资机会的企业将一直获得资金。
然而,经济理论表明市场摩擦,诸如信息不对称和激励问题会使获得外部资本更加昂贵,并且具有盈利投资机会的企业不一定能够获取所需资本.这表明融资要素,例如内部产生资金数量、新债务和权益的可得性,共同决定了企业的投资决策.现今已经有大量考查外部资金可得性对投资决策的影响的实证资料(可参考,例如Fazzari(1998)、 Hoshi(1991)、 Chapman(1996)、Samuel(1998)).大多数研究结果表明金融变量例如现金流量有助于解释企业的投资水平。
这项研究结果解释表明企业投资受限于外部资金的可得性。
很多模型强调运行正常的金融中介和金融市场有助于改善信息不对称和交易成本,减缓不对称问题,从而促使储蓄资金投着长期和高回报的项目,并且提高资源的有效配置(参看Levine(1997)的评论文章)。
因而我们预期用于更加发达的金融体制的国家的企业将更容易获得外部融资.几位学者已经指出建立企业和金融中介机构可进一步缓解金融市场摩擦。
OPINIONS-ON-INTERNAL-CONTROL关于内部控制的意见大学毕业论文外文文献翻译及原文
![OPINIONS-ON-INTERNAL-CONTROL关于内部控制的意见大学毕业论文外文文献翻译及原文](https://img.taocdn.com/s3/m/7773e0df5fbfc77da269b1b0.png)
毕业设计(论文)外文文献翻译文献、资料中文题目:关于内部控制的意见文献、资料英文题目:OPINIONS ON INTERNAL CONTROL 文献、资料来源:文献、资料发表(出版)日期:院(部):专业:班级:姓名:学号:指导教师:翻译日期: 2017.02.14LNTU---Acc附录A关于内部控制的意见如果要证明功能扩展到包含内部控制的有效性,那么报告准则则必须制定,若干基本问题必须被解决。
随着日益频繁增长,审计员听取了他们应该发表的一个效力于客户的内部控制制度建议的意见。
这一证明功能扩展的主张者迅速指出,目前已经有了实例如独立审计师的报告公开他们的客户的内部控制制度和一些政府机构的成效,包括一些空置中的美国证券和交易委员会,都需要一个报告。
这些证实类型的反对者公布了任何关于内部控制的有效性,他们认为,目前有显着性差异监管机构的报告要求和提出意见的内部控制将会误导公众。
本文综述了目前报告的做法,考虑到理想状态相关的危害的特点,并最后提出了一些在任何给与最后判决之前必要的予以回答的问题。
现状报告虽然审计员的报告中的一些情况提及了内部控制的性质,但作出的本质陈述还有很大不同的效应。
大型银行。
关于对内部控制的观点事实上出现在一些大型银行和看法发行的年度报告中。
有时这些意见是被董事会要求的。
例如,下面的主张出现在1969年年度报告的一个大型纽约银行中,作为第3款的独立会计师的标准短形式的报告:我们的审核工作包括评价有效性,大块的内部会计控制,其中还包括内部审计。
我们认为,在于程序的影响下,再加上银行内部审计工作人员所进行的审核,这些构成一个有效的系统的内部会计控制。
意见被提供给几个其他银行,但它们基本上引用的意见是一样的。
美国证券交易委员会的规定。
美国证券交易委员会表格X-17A-5,要求独立审计师作出某些有关的内部控制陈述,并必须在每年的大多数成员国家与每一个证券经纪或注册的交易商根据1934年证券交易法第15条进行交流时。
Working-of-a-Blast-Furnace高炉炼铁大学毕业论文外文文献翻译及原文
![Working-of-a-Blast-Furnace高炉炼铁大学毕业论文外文文献翻译及原文](https://img.taocdn.com/s3/m/d3f9837e48d7c1c708a145b0.png)
毕业设计(论文)外文文献翻译文献、资料中文题目:高炉炼铁文献、资料英文题目:Working-of-a-Blast-Furnace 文献、资料来源:文献、资料发表(出版)日期:院(部):专业:班级:姓名:学号:指导教师:翻译日期: 2017.02.14高炉炼铁Jan Terpar, Imrich KostialDepartment of Informatics and Process ControlFaculty of BERGTechnical University of KošiceB.Nemavej304200 KosiceSlovak Republic高炉是一个巨大的内部为耐火材料的刚炉,铁矿石,焦炭和石灰石倾入炉顶,预热空气在底部吹入。
经过物理化学反应后转换成的铁水,既一种液态铁的氧化物。
原材料在炉内经6至8小时降低到炉底部,得到的最终产品是液态渣铁,炎热的空气在炉底被吹上行在6至8秒到顶端后,将进行各种化学反应。
高炉一旦启动,最少将连续运行4到10年后,才将高炉熄火,进行维护。
1高炉炼铁反应过程在原料矿、球团、烧结矿在高炉内反应后得到铁矿石。
原矿石来自于地表,其块状的大小为0.5至1.5英寸。
一些矿石铁的含量的大约为50%到70%,这些矿石要么是赤铁矿(氧化铁)要么是磁铁矿(Fe3O4)。
这些矿石可以直接送入高炉而不需任何进一步的处理。
此外,一些矿石铁的含量较低必须进行处理使其铁含量增加。
球团矿是含有60%至65%铁,它是一些低铁含量的矿石,在被碾碎、磨成粉末,将所谓的废料煤矸石剔除后,其余富含铁的粉球和高炉内的燃煤产生强烈的反应形成的颗粒。
烧结矿是从原料矿,焦炭,石灰石和其他许多钢铁厂含有一些铁废料按一定的比例烧结后获得所需的产品化学,然后将其混合在一起。
这些混合的原料,然后放置在一起形成一种类似钢铁传送带烧结链,它是在燃气炉和原矿在经过焦炭热融合形成成面积较大,尺寸从0.5顷到2.0英寸的矿石。
软件工程毕业论文文献翻译中英文对照
![软件工程毕业论文文献翻译中英文对照](https://img.taocdn.com/s3/m/feefc51469eae009591bec32.png)
软件工程毕业论文文献翻译中英文对照学生毕业设计(论文)外文译文学生姓名: 学号专业名称:软件工程译文标题(中英文):Qt Creator白皮书(Qt Creator Whitepaper)译文出处:Qt network 指导教师审阅签名: 外文译文正文:Qt Creator白皮书Qt Creator是一个完整的集成开发环境(IDE),用于创建Qt应用程序框架的应用。
Qt是专为应用程序和用户界面,一次开发和部署跨多个桌面和移动操作系统。
本文提供了一个推出的Qt Creator和提供Qt开发人员在应用开发生命周期的特点。
Qt Creator的简介Qt Creator的主要优点之一是它允许一个开发团队共享一个项目不同的开发平台(微软Windows?的Mac OS X?和Linux?)共同为开发和调试工具。
Qt Creator的主要目标是满足Qt开发人员正在寻找简单,易用性,生产力,可扩展性和开放的发展需要,而旨在降低进入新来乍到Qt的屏障。
Qt Creator 的主要功能,让开发商完成以下任务: , 快速,轻松地开始使用Qt应用开发项目向导,快速访问最近的项目和会议。
, 设计Qt物件为基础的应用与集成的编辑器的用户界面,Qt Designer中。
, 开发与应用的先进的C + +代码编辑器,提供新的强大的功能完成的代码片段,重构代码,查看文件的轮廓(即,象征着一个文件层次)。
, 建立,运行和部署Qt项目,目标多个桌面和移动平台,如微软Windows,Mac OS X中,Linux的,诺基亚的MeeGo,和Maemo。
, GNU和CDB使用Qt类结构的认识,增加了图形用户界面的调试器的调试。
, 使用代码分析工具,以检查你的应用程序中的内存管理问题。
, 应用程序部署到移动设备的MeeGo,为Symbian和Maemo设备创建应用程序安装包,可以在Ovi商店和其他渠道发布的。
, 轻松地访问信息集成的上下文敏感的Qt帮助系统。
Subjective-well-being主观幸福感大学毕业论文外文文献翻译及原文
![Subjective-well-being主观幸福感大学毕业论文外文文献翻译及原文](https://img.taocdn.com/s3/m/6677e7177cd184254b35357c.png)
毕业设计(论文)外文文献翻译文献、资料中文题目:主观幸福感文献、资料英文题目:Subjective well-being文献、资料来源:文献、资料发表(出版)日期:院(部):专业:班级:姓名:学号:指导教师:翻译日期: 2017.02.14Subjective well-being1 Subjective well-being and well-being simpliciterIn this section, I explore the relationship between subjective well-being and well-being simpliciter in the writings on subjective measures. I will argue that proponents of subjective measures of well-being disagree about the relationship between subjective well-being and well-being simpliciter: about whether subjective well-being constitutes well-being simpliciter or merely is a component of it.As my starting point, I take the concept of well-being, that is, what I have so far called well-being simpliciter: ―what we have when our lives are going well for us, when we are living lives that are not necessarily morally good, but good for us‖ (Tiberius, 2006, p. 493,italics in original). Let us call this the ―core‖ concept of well-being. There are many other terms that are used in the same sense, including ―a person‘s good, benefit, advantage, interest, prudential value, welfare, happiness, flourishing, eudaimonia, and utility‖ (Moore &Crisp, 1996, p. 599). Because the concept of well-being is intended to capture what is ultimately –and not just instrumentally –good for the individual, it is also supposed to capture that which we have reason to promote – as an end and not just as a means – both in our own lives and in the lives of others. As Thomas Scanlon puts it: It is commonly supposed that there is a simple notion of individual well-being that plays the following three roles. First, it serves as an important basis for the decisions of a single rational individual, at least for those decisions in which he or she alone is concerned (that is to say, in which moral obligations and concerns for others can be left aside). Second, it is what a concerned benefactor, such as a friend or parent, has reason to promote. Third, it is the basis on which an individual‘s interests are taken into account in moral argument (Scanlon, 1998, p. 93).3In particular, it is frequently assumed that well-being is one consideration or as some people would argue, the only consideration that should serve as an end, and not just a means for public policy. Here I will take it for granted that when proponents of subjective measures talk about such measures as representing well-being, they use the term in the core sense (Angner, 2009a, in press). First, as indicated above, subjective measures are often presented as alternatives to other measures of welfare or well-being; this would make little sense if, in fact, subjective measures were not intended to represent that which the other measures were designed to represent viz. welfare or well-being. Second, the proponents‘ concept of well-being plays the very same role as that played by the core concept: those who defend the use of subjective measures of wellbeing often emphasize that they think of well-being as that which is ultimately good for the individual, as that which is worth promoting in the life of others, and as a central (sometimes the only) ultimate goal for public policy (cf. Diener & Seligman, 2004, quoted above).Third, a number of proponents explicitly cite classical philosophical literature in enthusiastic agreement while signaling that they use ―well-being‖ and/or ―happiness‖ in the same sense as philosophers do (Kahneman, Wakker,&Sarin, 1997; Layard, 2005; Watson, 1930).Over the years, philosophers have tried to shed light on the concept of well-being by developing and defending various accounts, or conceptions of well-being. Here, I follow Parfit (1984, pp.493–502) in dividing such accounts into three main classes: mental state accounts, preference-satisfaction or desire-fulfillment accounts, and objective-list accounts.4 According to mental-state accounts, well-being is a ―mental state‖ or a ―state of mind.‖ Because these accounts all see welfare ―as having to enter our experience,‖ they are said to satisfy the experience requirement (Griffin, 1986, p. 13). Scanlon writes: ―Experiential theories hold that the quality of life ‗for the person who lives it‘ is completely determined by its experiential quality,‖ where ―experiential quality‖ refers to ―what it would be like to live it‖ (Scanlon, 1998, pp. 97, 99). On this view, then, subjectively felt experience is both necessary and sufficient for a person‘s well-being. According to desire-fulfillment or preference-satisfaction accounts, by contrast, a person is well off to the extent that her desires are fulfilled and/or her preferences are satisfied. Scanlon puts it this way:Desire theories reject the experience requirement and allow that a person‘s life can be made better and worse not only by changes in that person‘s states of consciousness but also by changes elsewhere in the world which fulfill that person‘spreferences (Scanlon, 1993, p. 186).Such accounts do not require that a person who is well off experience any feelings of happiness or satisfaction. What they do require is that her desires are fulfilled (or that her preferences are satisfied), which does not come down to the same thing. The two kinds of account described so far are frequently referred to as subjective accounts, because they describe a person‘s well-being as (at least partly) a function of his or her feelings, experiences, desires, and so on. According to so-called objective accounts, by contrast, a person‘s well-being does not depend on such subjective factors. On such accounts, ―certain things are good or bad for beings, independently in at least some cases of whether they are desired or whether they give rise to pleasurable experiences‖ (Chappell & Crisp, 1998,p. 553). Identifying the list of things that are good for people regardless of what they want is notoriously difficult, but one provisional list of such things includes ―moral goodness, rational activity, the development of one‘s abilities, having children and being a good parent, knowledge, and the awareness of true beauty‖ (Parfit, 1984,p. 499). Obviously, there are many versions of accounts of each kind.The tri-partite division permits us to capture a major difference between subjective measures of well-being, traditional economic welfare measures, and welfare indicators inspired by the capability approach. It has been noted elsewhere that traditional economic welfare measures are based on preference-satisfaction accounts of well-being (Angner, 2009a,b, in press; Harsanyi, 1982; Hausman & McPherson, 2006). This is evident, among other things, from the fact that welfare economists traditionally have defended their measures by showing that they are utility functions, that is, that they are indices of preference satisfaction. It has also been noted that measures inspired by the capability approach are based on objective-list accounts of well-being (Nussbaum, 2008; Sen, 1987). This is clear, among other things, from the assumption that certain things – in particular, having a large capability set – are thought to be good for a person regardless of whether those things would make the person happier, and of whether the person desires them.5Meanwhile, it is fairly obvious that many proponents of subjective measures think of well-being as a mental state. There is abundant evidence, for one thing, that they adhere to the experience requirement. In the literature on subjective measures,well-being is oftendescribed as a matter exclusively of individual subjective, hedonic, or affective experience. For example, David G. Myers quotes Madame de la Fayet te as saying: ―If one thinks that one is happy, that is enough to be happy,‖ and adds that ―like Madame de La Fayette, social scientists view well-being as a state of mind. Well-being, sometimes called ‗subjective well-being‘ to emphasize the point, is a pervasive sense that life is good‖ (Myers,1992, pp. 23, 27). Myers evidently takes well-being to be something thoroughly subjective; note, in particular, the use of the term ―subjective well-being‖ as synonymous with ―well-being.‖ The explicit reference to states of mind strongly suggests that what he has in mind is some type of mental-state account.Similarly, Ed Diener writes: ―The area of subjective well-being is subjective. [It] resides within the experience of the individual‖ (Diener, 1984, p. 543). Die ner and Eunkook Suh reinforce the point: Subjective well-being research is concerned with individuals‘ subjective experiences of their lives. The underlying assumption is that well-being can be defined by people‘s conscious experiences—in terms of hedonic feelings or cognitive satisfactions. The field is built on the presumption that to understand the individuals‘ experiential quality of well-being, it is appropriate to directly examine how a person feels about life in the context of his or her own standards (Diener & Suh, 1997, p. 191).Diener and Suh, like Myers and the authors to whom he refers, apparently use the term ―well-being‖ interchangeably with ―subjective well-being.‖ The fact that Diener and Suh argue that well-being is not only concerned with t he individual‘s subjective experiences, but defined by them, strongly suggests that they adhere to the experience requirement.Several authors emphasize the subjective character of well-being, as they use the term, by contrasting subjective measures with ―objective‖ ones, including social and economic indicators. Diener makes this point in the following way: Notably absent from definitions of SWB [subjective well-being] are necessary objective conditions such as health, comfort, virtue, or wealth. Although such conditions are seen as potential influences on SWB, they are not seen as an inherent and necessary part of it (Diener, 1984, p. 543).6This quote confirms that, in Diener‘s work, an individual‘s well-being is defined not by the objective circumstances in which she finds herself, but by her subjective experiences,though he allows the former to be causally responsible for the latter. Daniel Kahneman, who identifies well-being with happiness, adds that happiness ―is not to be confused with good fortune, which is an assessment of the circumstances of someone‘s life‖ (Kahneman,1999, p. 5). In Kahneman‘s view, it is possible to enjoy good fortune–presumably income, health, and so on –without being happy.Angus Campbell (1976), quoted in Diener (1984, p. 543), expands on this point. Campbell maintains: ―The gross national product, important as it undoubtedly is, is clearly not the ultimate touchstone against which the quantum of happiness in this country can be assessed‖ (Campbell, 1976, p. 117). He continues: If we are primarily concerned with describing the quality of life experience of the population, we will need measures different from those that are used to describe the objective circumstances in which people live. We will have to develop measures that go directly to the experience itself. These subjective measures will surely not have the precision of indicators that are expressed in number of dollars, units of time, or numbers of square feet, but they will have the great advantage of dealing directly with what it is we want to know, the individual‘s sense of well-being(Campbell, 1976, p. 118, italics in original).6 Quality of life, on Campbell‘s view, is a function of individuals‘ sense of well-being. If we want to study the quality of life, then,we need to study the individuals‘ experience of their lives, not the objective characteristics of their existence.These writings clearly give pride of place to subjectively experienced mental states. Indeed, the evidence suggests that these authors adopt the experience requirement and think of well-being as constituted by some subjectively experienced mental state. They are best understood as using the term ―subjective well-being‖ to denote the subjectively experienced mental state, so that well-being can be said to be constituted by subjective well-being. The notion that well-being is constituted by subjective well-being, by the way, explains the identification of ―subjective measures of well-being‖ and ―measures of subjective well-being.‖Others, however, appear to resist the view that well-being is constituted by subjective well-being alone (cf. Angner, in press). Increasingly frequently, it is suggested that subjectively experienced mental states constitute but one component of well-being. For example, Kahneman writes: Objective happiness is not proposed as a comprehensive concept of human well-being, but only as a significant constituent of it. Maximizing the。
Training-and-development培训与开发大学毕业论文英文文献翻译及原文
![Training-and-development培训与开发大学毕业论文英文文献翻译及原文](https://img.taocdn.com/s3/m/0e8ae704fad6195f312ba690.png)
毕业设计(论文)外文文献翻译文献、资料中文题目:培训与开发文献、资料英文题目:Training and development 文献、资料来源:文献、资料发表(出版)日期:院(部):专业:人力资源管理班级:姓名:学号:指导教师:翻译日期: 2017.02.14本科毕业设计(论文)外文文献1.Literature ResearchTraining and developmentThe meaning of Training and developmentTraining and development is the means to carry out certain business organizations and the need for investing in human capital, using a variety of ways to carry out the purpose of staff in a planned training and training management activities, and its goal is to enable staff to update knowledge and develop skills, improve staff motives, attitudes and behavior to adapt to the new requirements of enterprises, their current win better work or higher levels of job responsibility, thus contributing to the improvement of organizational efficiency and organizational goals.The development of training and developmentWe all know that general education can only provide some basic low-level professional knowledge and skills. Face of large-scale enterprise development, the need for a number of skills training in order to enable staff to achieve continuous business development. Therefore, the organization in order to raise labor productivity and personal satisfaction for professional, direct and effective for the organization of production and management services, the Government has implemented a variety of methods, types of organizations to carry out investment activities in education and training.U.S. economist and Nobel Laureate in Economics, Schultz found that simply from thenatural resources, physical capital and labor's point of view, can not explain all the reasons for increase in productivity, capital and wealth as a form of conversion of people's knowledge and abilities are decisive reasons for social progress. But it was not the acquisition cost, it needs to be formed through investment, training is an important investment in such a form..The level of training and developmentThe main groups of the organization of training, corporate training is to organize all the staff, staff positions held as a result of different orientation training with a variety of characteristics. In general, the main is divided into three categories: First, the decision-making level, and the other is management is the operation of three layers. The main contents of training and developmentOrganization of training content and structure is inherent in the specific form of training, thus the development of the company Training content, and organization must be the cause of progress, development strategies and goals, but sometimes in order to adapt to organizational changes in the external environment, but also training in the use of some emergency measures. Therefore, as the contents of the structure of training should be long-term development of the organization of production with the current combination of common training content into the enterprise.Period of training and developmentDivided by time period, training can be divided into long-term training and short-term training, long-term training of more general scheme, there is a strong purpose; by training, job training and can be divided into two full-time training; by the training system, organizations can be divided into the training system and training system for the two organizations, with the training system, including basic training, the applicability of training, day-to-day training, individual training and training objectives; the training system organizations, educational institutions, if divided, can be divided into for three categories: full-time college and the recognition of higher education institutions, local governments and administrative departments of education and training institutions, the use of community resources to schools.Source of funding for training and developmentOrganization of training funds mainly come from two ways: First, the source of the organization, mainly referring to organizations and staff training costs assessed; second is the raising of funds, first of all by the Government through taxes levied training, and then by the state organizations, social enterprises to co-ordinate the funding sponsorship.The economic benefits of training and developmentAs the organization and implementation of staff training to improve skills and to mobilize the enthusiasm of the production, so under the same conditions of employees to create more effective. The increase in the efficiency, can be used in two ways: direct and indirect calculation method of calculation.In the course of training, trainees should pay attention to the learning curve and information feedback, trainees listen to timely information that can help organizations improve the effectiveness of future training, to reduce unnecessary expenditures.In the training market, there are different styles of lecturers, there are different types of courses, some courses are developed by their own lecturers, some courses are foreign agents, and some courses are designed by companies. Training curriculum design is the first step in the design of different ways to use the curriculum, lecturers say is different, the final results of the training are different. Determines the script as a drama, the curriculum design is the first step in training, but also determines the effectiveness of courses.The cost of trainingEducation and training primarily on the basis of the level of information as well as the size of, the higher the level of information and larger, then the lower cost.Effective cost control is in fierce competition in the market of the basic elements of success. However, the absolute cost control is not just the cost of compression, the need to establish a scientific and reasonable cost analysis and control system that allows business managers have a clear framework for the company's costs, profitability in the right direction and decision-making, internal decision-making enterprises key support to radically improve the situation of the cost of doing business and thus truly effective cost control.8 kinds of employee training forms1, the teaching method: the training of the traditional way to use up the advantage of convenient, easy to control the whole process of training. The disadvantage is that a one-way transmission of information, poor feedback effects. Some of these notions are often used for training knowledge.2, audio-visual technology law: adoption of modern audio-visual technology (such as projectors, DVD, VCR and other tools), training of staff. Advantage of the use of visual and auditory perception of the way of clear-cut intuitive. However, feedback from students and practice less, and the cost of production and the purchase of a high content of easily outdated. It is used for business profiles, to impart training skills, conceptual knowledge can also be used for training.3, to discuss the law: In accordance with the complexity and operation cost of the procedure can be divided into the general panel discussions and seminars in two ways. Lectures, seminars and more in the main, or after the half-way to allow students and lecturers communicate. Advantage of multi-directional transmission of information, compared with the teaching of good feedback effects, but higher cost. The panel discussion is characterized by law, when the exchange of information for multi-directional transmission, the participation of students with high, low-cost. Used for the consolidation of knowledge, analysis of the training of students, problem-solving skills and the ability of human interaction, but the training of teachers on the use of the higher.4, case study method: the training of clients, through to the relevant background information, to find a suitable solution. The use of low-cost, effective feedback can be an effective analysis of the training of students problem-solving abilities. In addition, training in recent years studies have shown that the case, discussion can also be used for the training of knowledge category, and better.5, role-playing method: training grant to train teachers in the work of the design of which play a role in the training of teachers and other students in the students after performing the appropriate comments. As a result of multi-directional transmission of information, feedback effects, and practical, and low-cost, and thus more capacity forhuman relations training.6, self-learning method: This approach is more suitable for the general concept of knowledge, with emphasis on adult learning as a result of experience and understanding of the properties, so that a certain learning ability and self-conscious students is both economical and practical approach, but this method There are also deficiencies in poor supervision.7, group interaction law: also known as sensitivity training. This method is mainly applicable to the management of interpersonal and communication training. Training to enable trainees to experience activities to enhance their ability to deal with interpersonal relationships. The advantage is improved interpersonal relationships and communication skills, but its effects depend on the level of teacher training.8, Network Training Act: is a new type of computer network information on training methods, greater input. However, due to the use of flexible and distributed learning in line with new trends, focus on training students to save time and costs. Large amount of information in this way, new knowledge and new delivery concepts have obvious advantages, it is more suitable for adult learning. Therefore, for the strength of the popular business, training and development is an inevitable trend.The classification of training methods1. Smile Training: to serve the people, through a variety of special events, a speech full of passion, as well as recognition of participants, so that participants feel that the training process very interesting.2. Hands-On Training: First of all new workers need to perform their work after the observation, and then, through long experience with those who mentor or work colleagues together, to digest, absorb and purpose of the skills.3. Instrument Training: Through a standardized, there is no organization or organizations for the work of the evaluation tools tailored to obtain the relevant skills and their knowledge and information.4. Objective--Based Instuction: including a structured, guiding the training design, the focus is to better the implementation of a work, the incumbent must learn the specific knowledge and skills.。
毕业论文英语翻译及原文
![毕业论文英语翻译及原文](https://img.taocdn.com/s3/m/f6492bd3482fb4daa48d4b06.png)
=H( - )(1)
respectively, the expression can be easily gained as follows
Then, the relation equation between the two baseline vectors is expressedas
There are two steps in the GPS observation data processing course. They are baseline calculationand network adjustment. The baseline vectors in WGS-84 can be firstly got using baseline calculation.Secondly, the baseline vector transformation from WGS-84 to the station orthogonal coordinatesystem can be done with (3). At last, the adjustment of GPS deformatihestation orthogonal coordinate system can be successfully finished.
If the position vector of the station orthogonal coordinate system originP0inWGS-84 isexpressed as = , according to thegeodetic latitude and longitude( , ), theposition vector
毕业设计(论文)外文资料翻译(学生用)
![毕业设计(论文)外文资料翻译(学生用)](https://img.taocdn.com/s3/m/809c04778e9951e79b8927f5.png)
毕业设计外文资料翻译学院:信息科学与工程学院专业:软件工程姓名: XXXXX学号: XXXXXXXXX外文出处: Think In Java (用外文写)附件: 1.外文资料翻译译文;2.外文原文。
附件1:外文资料翻译译文网络编程历史上的网络编程都倾向于困难、复杂,而且极易出错。
程序员必须掌握与网络有关的大量细节,有时甚至要对硬件有深刻的认识。
一般地,我们需要理解连网协议中不同的“层”(Layer)。
而且对于每个连网库,一般都包含了数量众多的函数,分别涉及信息块的连接、打包和拆包;这些块的来回运输;以及握手等等。
这是一项令人痛苦的工作。
但是,连网本身的概念并不是很难。
我们想获得位于其他地方某台机器上的信息,并把它们移到这儿;或者相反。
这与读写文件非常相似,只是文件存在于远程机器上,而且远程机器有权决定如何处理我们请求或者发送的数据。
Java最出色的一个地方就是它的“无痛苦连网”概念。
有关连网的基层细节已被尽可能地提取出去,并隐藏在JVM以及Java的本机安装系统里进行控制。
我们使用的编程模型是一个文件的模型;事实上,网络连接(一个“套接字”)已被封装到系统对象里,所以可象对其他数据流那样采用同样的方法调用。
除此以外,在我们处理另一个连网问题——同时控制多个网络连接——的时候,Java内建的多线程机制也是十分方便的。
本章将用一系列易懂的例子解释Java的连网支持。
15.1 机器的标识当然,为了分辨来自别处的一台机器,以及为了保证自己连接的是希望的那台机器,必须有一种机制能独一无二地标识出网络内的每台机器。
早期网络只解决了如何在本地网络环境中为机器提供唯一的名字。
但Java面向的是整个因特网,这要求用一种机制对来自世界各地的机器进行标识。
为达到这个目的,我们采用了IP(互联网地址)的概念。
IP以两种形式存在着:(1) 大家最熟悉的DNS(域名服务)形式。
我自己的域名是。
所以假定我在自己的域内有一台名为Opus的计算机,它的域名就可以是。
法学 毕业论文 文献 外文 英文 翻译
![法学 毕业论文 文献 外文 英文 翻译](https://img.taocdn.com/s3/m/4c0161d25727a5e9846a613f.png)
附件一:英文文献INTRODUCTIONOffences of strict liability are those crimes which do not require mens rea with regard to at least one or more elements of the actus reus. The defendant need not have intended or known about that circumstance or consequence. Liability is said to be strict with regard to that element. For a good example see:R v Prince[1875]:The defendant ran off with an under-age girl. He was charged with an offence of taking a girl under the age of 16 out of the possession of her parents contrary to s55 of the Offences Against the Person Act 1861. The defendant knew that the girl was in the custody her father but he believed on reasonable grounds that the girl was aged 18. It was held that knowledge that the girl was under the age of 16 was not required in order to establish the offence. It was sufficient to show that the defendant intended to take the girl out of the possession of her father.It is only in extreme and rare cases where no mens rea is required for liability, thereby making the particular offence "absolute".GENERAL PRINCIPLESThe vast majority of strict liability crimes are statutory offences. However, statutes do not state explicitly that a particular offence is one of strict liability. Where a statute uses terms such as "knowingly" or "recklessly" then the offence being created is one that requires mens rea. Alternatively, it may make it clear that an offence of strict liability is being created. In many cases it will be a matter for the courts to interpret the statute and decide whether mens rea is required or not. What factors are taken into account by the courts when assessing whether or not an offence falls into the category of strict liability offences?THE MODERN CRITERIAIn Gammon (Hong Kong) Ltd v Attorney-General for Hong Kong [1984], the Privy Council considered the scope and role of strict liability offences in the modern criminal law and their effect upon the "presumption of mens rea". Lord Scarman laid down the criteria upon which a court should decide whether or not it is appropriate to impose strict liability: "In their Lordships' opinion, the law … may be stated in the following propositions … : (1) there is a presumption of law that mens rea is required before a person can be held guilty of a criminal offence; (2) the presumption is particularly strong where the offence is "truly criminal" in character; (3) the presumption applies to statutory offences, and can be displaced only if this is clearly or by necessary implication the effect of the statute; (4) the only situation in which the presumption can be displaced is where the statute is concerned with an issue of social concern, and public safety is such an issue; (5) even where a statute is concerned with such an issue, the presumption of mens rea stands unless it can be shown that the creation of strict liability will be effective to promote the objects of the statute by encouraging greater vigilance to prevent the commission of the prohibited act."(1) PRESUMPTION OF MENS REACourts usually begin with the presumption in favor of mens rea, seeing the well-known statement by Wright J in Sherras v De Rutzen:There is a presumption that mens rea, or evil intention, or knowledge of the wrongfulness of the act, is an essential ingredient in every offence; but that presumption is liable to be displaced either by the words of the statute creating the offence or by the subject-matter with which it deals, and both must be considered(2) GRAVITY OF PUNISHMENTAs a general rule, the more serious the criminal offence created by statute, the less likely the courts is to view it as an offence of strict liability. See:Sweet v Parsley [1970]:The defendant was a landlady of a house let to tenants. She retained one room in the house for herself and visited occasionally to collect the rent and letters. While she was absent the police searched the house and found cannabis. The defendant was convicted under s5 of the Dangerous Drugs Act 1965, of "being concerned in the management of premises used for the smoking of cannabis". She appealed alleging that she had no knowledge of the circumstances and indeed could not expect reasonably to have had such knowledge.The House of Lords,quashing her conviction, held that it had to be proved that the defendant had intended the house to be used for drug-taking, since the statute in question created a serious, or "truly criminal" offence, conviction for which would have grave consequences for the defendant. Lord Reid stated that "a stigma still attaches to any person convicted of a truly criminal offence, and the more serious or more disgraceful the offence the greater the stigma". And equally important, "the press in this country are vigilant to expose injustice, and every manifestly unjust conviction made known to the public tends to injure the body politic [people of a nation] by undermining public confidence in the justice of the law and of its administration."Lord Reid went on to point out that in any event it was impractical to impose absolute liability for an offence of this nature, as those who were responsible for letting properties could not possibly be expected to know everything that their tenants were doing.(3) WORDING OF THE STATUTEIn determining whether the presumption in favor of mens rea is to be displaced, the courts are required to have reference to the whole statute in which the offence appears. See:Cundy v Le Cocq (1884) :The defendant was convicted of unlawfully selling alcohol to an intoxicated person, contrary to s13 of the Licensing Act 1872. On appeal, the defendant contended that he had been unaware of the customer's drunkenness and thus should be acquitted. The Divisional Court interpreted s13 as creating an offence of strict liability since it was itself silent as to mens rea, whereas other offences under the same Act expressly required proof of knowledge on the part of the defendant. It was held that it was not necessary to consider whether the defendant knew, or had means of knowing, or could with ordinary care have detected that the person served was drunk. If he served a drink to a person who was in fact drunk, he was guilty. Stephen J stated: Here, as I have already pointed out, the object of this part of the Act is to prevent the sale of intoxicating liquor to drunken persons, and it is perfectly natural to carry that out by throwing on the publican the responsibility of determining whether the person supplied comes within that category.(4) ISSUES OF SOCIAL CONCERNSee :R v Blake (1996) :Investigation officers heard an unlicensed radio station broadcast and traced it to a flat where the defendant was discovered alone standing in front of the record decks, still playing music and wearing a set of headphones. Though the defendant admitted that he knewhe was using the equipment, he claimed that he believed he was making demonstration tapes and did not know he was transmitting. The defendant was convicted of using wireless telegraphy equipment without a license, contrary to s1 (1) Wireless Telegraphy Act 1949 and appealed on the basis that the offence required mens rea.The Court of Appeal held that the offence was an absolute (actually a strict) liability offence. The Court applied Lord Scarman's principles in Gammon and found that, though the presumption in favor of mens rea was strong because the offence carried a sentence of imprisonment and was, therefore, "truly criminal", yet the offence dealt with issues of serious social concern in the interests of public safety (namely, frequent unlicensed broadcasts on frequencies used by emergency services) and the imposition of strict liability encouraged greater vigilance in setting up careful checks to avoid committing the offence.(5) IS THERE ANY PURPOSE IN IMPOSING STRICT LIABILITY?The courts will be reluctant to construe a statute as imposing strict liability upon a defendant, where there is evidence to suggest that despite his having taken all reasonable steps, he cannot avoid the commission of an offence. See:Sherras v De Rutzen [1895]: The defendant was convicted of selling alcohol to a police officer whilst on duty, contrary to s16(2) of the Licensing Act 1872. He had reasonably believed the constable to be off duty as he had removed his arm-band, which was the acknowledged method of signifying off duty. The Divisional Court held that the conviction should be quashed, despite the absence from s16 (2) of any words requiring proof of mens rea as an element of the offence. Wright J expressed the view that the presumption in favor of mens rea would only be displaced by the wording of the statute itself, or its subject matter. In this case the latter factor was significant, in that no amount of reasonable care by the defendant would have prevented the offence from being committed. Wright J stated: "It is plain that if guilty knowledge is not necessary, no care on the part of the publican could save him from a conviction under section 16, subsection (2), since it would be as easy for the constable to deny that he was on duty when asked, or to produce a forged permission from his superior officer, as to remove his armlet before entering the public house. I am, therefore, of opinion that this conviction ought to be quashed."MODERN EXAMPLESThe following case is a modern example of the imposition of strict liability: Alphacell v Woodward [1972] The defendants were charged with causing polluted matter to enter a river contrary to s2 of the Rivers (Prevention of Pollution) Act 1951. The river had in fact been polluted because a pipe connected to the defendant's factory had been blocked, and the defendants had not been negligent. The House of Lords nevertheless held that the defendants were liable. Lord Salmon stated: If this appeal succeeded and it were held to be the law that no conviction be obtained under the 1951 Act unless the prosecution could discharge the often impossible onus of proving that the pollution was caused intentionally or negligently, a great deal of pollution would go unpunished and undeterred to the relief of many riparian factory owners. As a result, many rivers which are now filthy would become filthier still and many rivers which are now clean would lose their cleanliness. The legislature no doubt recognized that as a matter of public policy this would be most unfortunate. Hence s2(1)(a) which encourages riparian factory owners not only to take reasonable steps to prevent pollution but to do everything possible to ensure that they do not cause it.ARGUMENTS FOR STRICT LIABILITY1. The primary function of the courts is the prevention of forbidden acts. What acts should be regarded as forbidden? Surely only such acts as we can assert ought not to have been done. Some of the judges who upheld the conviction of Prince did so on the ground that men should be deterred from taking girls out of the possession of their parents, whatever the girl's age. This reasoning can hardly be applied to many modern offences of strict liability. We do not wish to deter people from driving cars, being concerned in the management of premises, financing hire purchase transactions or canning peas. These acts, if done with all proper care, are not such acts as the law should seek to prevent.2. Another argument that is frequently advanced in favor of strict liability is that, without it, many guilty people would escape - that there is neither time nor personnel available to litigate the culpability of each particular infraction. T his argument assumes that it is possible to deal with these cases without deciding whether D had mens rea or not, whether he was negligent or not. Certainly D may be convicted without deciding these questions, but how can he be sentenced? Suppose that a butcher sells some meat which is unfit for human consumption. Clearly the court will deal differently with (i) the butcher who knew that the meat was tainted; (ii) the butcher who did not know, but ought to have known; and (iii) the butcher who did not know and had no means of finding out. Sentence can hardly be imposed without deciding into which category the convicted person falls.3. The argument which is probably most frequently advanced by the courts for imposing strict liability is that it is necessary to do so in the interests of the public. Now it may be conceded that in many of the instances where strict liability has been imposed, the public does need protection against negligence and, assuming that the threat of punishment can make the potential harm doer more careful, there may be a valid ground for imposing liability for negligence as well as where there is mens rea. This is a plausible argument in favor of strict liability if there were no middle way between mens rea and strict liability - that is liability for negligence - and the judges have generally proceeded on the basis that there is no such middle way. Liability for negligence has rarely been spelled out of a statute except where, as in driving without due care, it is explicitly required. Lord Devlin has said: "It is not easy to find a way of construing a statute apparently expressed in terms of absolute liability so as to produce the requirement of negligence."ARGUMENTS AGAINST STRICT LIABILITY1. The case against strict liability, then, is, first, that it is unnecessary. It results in the conviction of persons who have behaved impeccably and who should not be required to alter their conduct in any way.2. Secondly, that it is unjust. Even if an absolute discharge can be given D may feel rightly aggrieved at having been formally convicted of an offence for which he bore no responsibility. Moreover, a conviction may have far-reaching consequences outside the courts, so that it is no answer to say that only a nominal penalty is imposed.3. The imposition of liability for negligence would in fact meet the arguments of most of those who favor strict liability. Such statutes are not meant to punish the vicious will but to put pressure upon the thoughtless and inefficient to do their whole duty in the interest of public health or safety or morals." The "thoughtless and inefficient" are, of course, the negligent. The objection tooffences of strict liability is not that these persons are penalized, but that others who are completely innocent are also liable to conviction. Though Lord Devlin was skeptical about the possibility of introducing the criterion of negligence (above), in Reynolds v Austin (1951) he stated that strict liability should only apply when there is something that the defendant can do to promote the observance of the law - which comes close to requiring negligence. If there were something which D could do to prevent the commission of the crime and which he failed to do, he might generally be said to have failed to comply with a duty - perhaps a high duty - of care; and so have been negligent.4. In Alphacell v Woodward (1972) Lord Salmon thought the relevant statutory section, "encourages riparian factory owners not only to take reasonable steps to prevent pollution but to do everything possible to ensure that they do not cause it." This suggests that, however vast the expenditure involved, and however unreasonable it may be in relation to the risk, D is under a duty to take all possible steps. Yet it may be doubted whether factory owners will in fact do more than is reasonable; and it is questionable whether they ought to be required to do so, at the risk - even though it be unlikely - of imprisonment. The contrary argument is that the existence of strict liability does induce organizations to aim at higher and higher standards.POSSIBLE DEVELOPMENTSThere are several possible compromises between mens rea and strict liability in regulatory offences. A "halfway house" has developed in Australia. The effect of Australian cases is: D might be convicted without proof of any mens rea by the Crown; but acquitted if he proved on a balance of probabilities that he lacked mens rea and was not negligent; ie, that he had an honest and reasonable belief in a state of facts which, would have made his act innocent. The onus of proving reasonable mistake is on D.STATUTORY DEFENCESIt is common for the drastic effect of a statute imposing strict liability to be mitigated by the provision of a statutory defense. It is instructive to consider one example. Various offences relating to the treatment and sale of food are enacted by the first twenty sections of the Food Safety Act 1990. Many, if not all, of these are strict liability offences. Section 21(1), however, provides that it shall be a defense for the person charged with any of the offences to prove that he took all reasonable precautions and exercised all due diligence to avoid the commission of the offence by himself or by a person under his control. Statutory defenses usually impose on the defendant a burden of proving that he had no mens rea and that he took all reasonable precautions and exercised all due diligence to avoid the commission of an offence. The effect of such provisions is that the prosecution need do no more than prove that the accused did the prohibited act and it is then for him to establish, if he can, that he did it innocently. Such provisions are a distinct advance on unmitigated strict liability.附件二:英文文献翻译介绍严格责任犯罪是关于客观方面的一个或多个因素不要求犯罪意图的那些犯罪。
Financial-Risk-Management财务风险管理大学毕业论文外文文献翻译及原文
![Financial-Risk-Management财务风险管理大学毕业论文外文文献翻译及原文](https://img.taocdn.com/s3/m/b26c3bddbb4cf7ec4afed07c.png)
毕业设计(论文)外文文献翻译文献、资料中文题目:财务风险管理文献、资料英文题目:Financial Risk Management 文献、资料来源:文献、资料发表(出版)日期:院(部):专业:班级:姓名:学号:指导教师:翻译日期: 2017.02.14财务管理类本科毕业论文外文翻译译文:[美]卡伦·A·霍契.《什么是财务风险管理?》.《财务风险管理要点》.约翰.威立国际出版公司,2005:P1-22.财务风险管理尽管近年来金融风险大大增加,但风险和风险管理不是当代的主要问题。
全球市场越来越多的问题是,风险可能来自几千英里以外的与这些事件无关的国外市场。
意味着需要的信息可以在瞬间得到,而其后的市场反应,很快就发生了。
经济气候和市场可能会快速影响外汇汇率变化、利率及大宗商品价格,交易对手会迅速成为一个问题。
因此,重要的一点是要确保金融风险是可以被识别并且管理得当的。
准备是风险管理工作的一个关键组成部分。
什么是风险?风险给机会提供了基础。
风险和暴露的条款让它们在含义上有了细微的差别。
风险是指有损失的可能性,而暴露是可能的损失,尽管他们通常可以互换。
风险起因是由于暴露。
金融市场的暴露影响大多数机构,包括直接或间接的影响。
当一个组织的金融市场暴露,有损失的可能性,但也是一个获利或利润的机会。
金融市场的暴露可以提供战略性或竞争性的利益。
风险损失的可能性事件来自如市场价格的变化。
事件发生的可能性很小,但这可能导致损失率很高,特别麻烦,因为他们往往比预想的要严重得多。
换句话说,可能就是变异的风险回报。
由于它并不总是可能的,或者能满意地把风险消除,在决定如何管理它中了解它是很重要的一步。
识别暴露和风险形式的基础需要相应的财务风险管理策略。
财务风险是如何产生的呢?无数金融性质的交易包括销售和采购,投资和贷款,以及其他各种业务活动,产生了财务风险。
它可以出现在合法的交易中,新项目中,兼并和收购中,债务融资中,能源部分的成本中,或通过管理的活动,利益相关者,竞争者,外国政府,或天气出现。
Electronic-Scales电子秤大学毕业论文外文文献翻译及原文
![Electronic-Scales电子秤大学毕业论文外文文献翻译及原文](https://img.taocdn.com/s3/m/47533c5e69eae009581bec7c.png)
毕业设计(论文)外文文献翻译文献、资料中文题目:电子秤文献、资料英文题目:Electronic Scales文献、资料来源:文献、资料发表(出版)日期:院(部):专业:班级:姓名:学号:指导教师:翻译日期: 2017.02.14毕业设计(论文)外文资料翻译学院:专业:姓名:学号:附件: 1.外文资料翻译译文;2.外文原文。
注:请将该封面与附件装订成册。
附件1:外文资料翻译译文电子秤电子秤是称重技术中的一种新型仪表,广泛应用于各种场合。
电子秤与机械秤比较有体积小、重量轻、结构简单、价格低、实用价值强、维护方便等特点,可在各种环境工作,重量信号可远传,易于实现重量显示数字化,易于与计算机联网,实现生产过程自动化,提高劳动生产率。
标签秤在超市中的应用已经是耳闻目睹的了。
一张小小的标签包含着:品名、价格、重量等,一一列表在这小小的电子标签上。
标签机的使用大大加快了销售速度,也方便了顾客。
顶尖条码标签秤有着许多卓越的特点,以太网功能使管理更加方便。
电子秤的分类(衡器可以分为机械式和电子式)1.工作原理:电子式的工作原理以电子元件(称重传感器,AD转换电路,单片机电路,显示电路,键盘电路,通讯接口电路,稳压电源电路等电路组成。
2.使用功能:电子衡器采用现代传感器技术、电子技术和计算机技术一体化的电子称量装置,才能满足并解决现实生活中提出的"快速、准确、连续、自动"称量要求,同时有效地消除人为误差,使之更符合法制计量管理和工业生产过程控制的应用要求。
3.健康秤是衡器使用功能中的一个分类(分为机械式和电子式),物美价廉,它可以帮助人们有效的监视自己的体重变化,新产品还可以检测自己的脂肪含量,而且还有一些人性化的附属功能。
可能不属于计量器具。
4.电子衡器是国家强制检定的计量器具,他的合格产品是有检定分度值e和细分值D的标准,是受国家计量法保护的产品。
在电子衡器分类中有一种叫“人体秤”的产品,它可以在计量部门进行检定,称重很精确。
毕业设计论文翻译(译文+原文)
![毕业设计论文翻译(译文+原文)](https://img.taocdn.com/s3/m/879846d54128915f804d2b160b4e767f5acf80eb.png)
Hacking tricks toward security on network environments Tzer-Shyong Chen1, Fuh-Gwo Jeng 2, and Yu-Chia Liu 11 Department of Information Management, Tunghai University, Taiwan2 Department of Applied Mathematics, National Chiayi University, TaiwanE-Mail:****************.edu.twAbstractMounting popularity of the Internet has led to the birth of Instant Messaging, an up-and-coming form of Internet communication. Instant Messaging is very popular with businesses and individuals since it has instant communication ability. As a result, Internet security has become a pressing and important topic for discussion. Therefore, in recent years, a lot of attention has been drawn towards Internet security and the various attacks carried out by hackers over the Internet. People today often handle affairs via the Internet. For instance, instead of the conventional letter, they communicate with others by e-mails; they chat with friends through an instant messenger; find information by browsing websites instead of going to the library; perform e-commerce transactions through the Internet, etc. Although the convenience of the Internet makes our life easier, it is also a threat to Internet security. For instance, a business email intercepted during its transmission may let slip business confidentiality; file transfers via instant messengers may also be intercepted, and then implanted with backdoor malwares; conversations via instant messengers could be eavesdropped. Furthermore, ID and password theft may lose us money when using Internet bank service. Attackers on the Internet use hacking tricks to damage systems while users are connected to the Internet. These threats along with possible careless disclosure of business information make Instant Messaging a very unsafe method of communication for businesses. The paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing or fraud via e-mails. (3) Fake Websites. Keywords:Hacking tricks, Trojan programs, Phishing, Firewall, Intrusion detection system.1. IntroductionIncreasingly more people are using instant messengers such as MSN Messenger, Yahoo! Messenger, ICQ, etc as the media of communication. These instant messengers transmit alphanumeric message as well as permit file sharing. During transfer, a file may be intercepted by a hacker and implanted with backdoor malware. Moreover, the e-mails users receive every day may include Spam, advertisements, and fraudulent mail intended to trick uninformed users. Fake websites too are prevalent. Websites which we often visit could be counterfeited by imitating the interface and the URL of the original, tricking users. The paper classifies hacking tricks into three categories which are explained in the following sections.2. Hacking TricksThe paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing (3) Fake Websites.2.1 Trojan programs that share files via instant messengerInstant messaging allows file-sharing on a computer [9]. All present popular instant messengers have file sharing abilities, or allow users to have the above functionality by installing patches or plug-ins; this is also a major threat to present information security. These communication softwares also makeit difficult for existing hack prevention methods to prevent and control information security. Therefore, we shall discuss how to control the flow of instant messages and how to identify dangerous user behavior.Hackers use instant communication capability to plant Trojan program into an unsuspected program; the planted program is a kind of remotely controlled hacking tool that can conceal itself and is unauthorized. The Trojan program is unknowingly executed, controlling the infected computer; it can read, delete, move and execute any file on the computer. The advantages of a hacker replacing remotely installed backdoor Trojan programs [1] with instant messengers to access files are:When the victim gets online, the hacker will be informed. Thus, a hacker can track and access the infected computer, and incessantly steal user information.A hacker need not open a new port to perform transmissions; he can perform his operations through the already opened instant messenger port.Even if a computer uses dynamic IP addresses, its screen name doesn’t change.Certain Trojan programs are designed especially for instant messengers. These Trojans can change group settings and share all files on the hard disk of the infected computer. They can also destroy or modify data, causing data disarray. This kind of program allows a hacker access to all files on an infected computer, and thus poses a great threat to users. The Trojan program takes up a large amount of the resources of the computer causing it to become very slow and often crashes without a reason.Trojan programs that access a user computer through an instant messenger are probably harder to detect than classic Trojan horse programs. Although classic Trojan intrudes a computer by opening a listening or outgoing port which is used to connect toa remote computer, a desktop firewall can effectively block such Trojans. Alternatively, since it is very difficult for the server’s firewall to spot intrusion by controlling an instant messenger’s flow, it is extremely susceptible to intrusion.Present Trojan programs have already successfully implemented instant messengers. Some Trojan programs are Backdoor Trojan, AIMVision, and Backdoor. Sparta.C. Backdoor Trojans use ICQ pager to send messages to its writer. AIMVision steals AIM related information stored in the Windows registry, enabling a hacker to setup an AIM user id. Backdoor. Sparta.C uses ICQ to communicate with its writer and opens a port on an infected host and send its IP Address to the hacker, and at the same time attempts to terminate the antivirus program or firewall of the host.2.1.1 Hijacking and ImpersonationThere are various ways through which a hacker can impersonate other users [7]. The most commonly used method is eavesdropping on unsuspecting users to retrieve user accounts, passwords and other user related information.The theft of user account number and related information is a very serious problem in any instant messenger. For instance, a hacker after stealing a user’s information impersonate the user; the user’s contacts not knowing that the user’s account has been hacked believe that the person they’re talking to is the user, and are persuaded to execute certain programs or reveal confidential information. Hence, theft of user identity not only endangers a user but also surrounding users. Guarding against Internet security problems is presently the focus of future research; because without good protection, a computer can be easily attacked, causing major losses.Hackers wishing to obtain user accounts may do so with the help of Trojans designed to steal passwords. If an instant messenger client stores his/her password on his/her computer, then a hacker can send a Trojan program to the unsuspecting user. When the user executes the program, the program shall search for the user’s password and send it to the hacker. There are several ways through which a Trojan program can send messages back to the hacker. The methods include instant messenger, IRC, e-mails, etc.Current four most popular instant messengers are AIM, Yahoo! Messenger, ICQ, and MSN Messenger, none of which encrypts its flow. Therefore, a hackercan use a man-in-the-middle attack to hijack a connection, then impersonate the hijacked user and participate in a chat-session. Although difficult, a hacker can use the man-in-the-middle attack to hijack the connection entirely. For example, a user may receive an offline message that resembles that sent by the server, but this message could have been sent by the hacker. All at once, the user could also get disconnected to the server. Furthermore, hackers may also use a Denial of Service (DoS) tool or other unrelated exploits to break the user’s connection. However, the server keeps the connection open, and does not know that the user has been disconnected; thus allowing the hacker to impersonate the user. Moreover, since the data flow is unencrypted and unauthenticated, a hacker can use man-in-the-middle attacks that are similar to that of ARP fraud to achieve its purpose.2.1.2 Denial of Service (DoS)There are many ways through which a hacker can launch a denial of service (DoS) attack [2] on an instant messenger user. A Partial DoS attack will cause a user end to hang, or use up a large portion of CPU resources causing the system to become unstable.Another commonly seen attack is the flooding of messages to a particular user. Most instant messengers allow the blocking of a particular user to prevent flood attacks. However, a hacker can use tools that allow him to log in using several different identities at the same time, or automatically create a large number of new user ids, thus enabling a flood attack. Once a flood attack begins, even if the user realizes that his/her computer has been infected, the computer will not be able to respond. Thus, the problem cannot be solved by putting a hacker’s user id on the ignore list of your instant messenger.A DoS attack on an instant messenger client is only a common hacking tool. The difficulty of taking precautions against it could turn this hacking tool into dangerous DoS type attacks. Moreover, some hacking tools do not just cause an instant messenger client to hang, but also cause the user end to consume large amount of CPU time, causing the computer to crash.2.1.3 Information DisclosureRetrieving system information through instant messenger users is currently the most commonly used hacking tool [4]. It can effortlessly collect user network information like, current IP, port, etc. IP address retriever is an example. IP address retrievers can be used to many purposes; for instance, a Trojan when integrated with an IP address retriever allows a hacker to receive all information related to the infected computer’s IP address as soon as the infected computer connects to the internet. Therefore, even if the user uses a dynamic IP address, hackers can still retrieve the IP address.IP address retrievers and other similar tools can also be used by hackers to send data and Trojans to unsuspecting users. Hackers may also persuade unsuspecting users to execute files through social engineering or other unrelated exploits. These files when executed search for information on the user’s computer and sends them back to the hacker through the instant messenger network.Different Trojan programs were designed for different instant messaging clients. For example, with a user accounts and password stealing Trojans a hacker can have full control of the account once the user logs out. The hacker can thus perform various tasks like changing the password and sending the Trojan program to all of the user’s contacts.Moreover, Trojans is not the only way through which a hacker can cause information disclosure. Since data sent through instant messengers are unencrypted, hackers can sniff and monitor entire instant messaging transmissions. Suppose an employee of an enterprise sends confidential information of the enterprise through the instant messenger; a hacker monitoring the instant messaging session can retrieve the data sent by the enterprise employee. Thus, we must face up to the severity of the problem.2.2 PhishingThe word “Phishing” first appeared in 1996. It is a variant of ‘fishing’, and formed by replacing the ‘f’ in ‘fishing’ with ‘ph’ from phone. It means tricking users of their money through e-mails.Based on the statistics of the Internet Crime Complaint Center, loss due to internet scam was as high as $1.256 million USD in 2004. The Internet Crime Complaint Center has listed the above Nigerian internet scam as one of the ten major internet scams.Based on the latest report of Anti-Phishing Working Group (APWG) [8], there has been a 28% growth of Phishing scams in the past 4 months, mostly in the US and in Asia. Through social engineering and Trojans, it is very difficult for a common user to detect the infection.To avoid exploitation of your compassion, the following should be noted:(1)When you need to enter confidentialinformation, first make sure that theinformation is entered via an entirely secureand official webpage. There are two ways todetermine the security of the webpage:a.The address displayed on the browserbegins with https://, and not http://. Payattention to if the letter ‘s’ exists.b.There is a security lock sign on the lowerright corner of the webpage, and whenyour mouse points to the sign, a securitycertification sign shall appear.(2)Consider installing a browser security softwarelike SpoofStick which can detect fake websites.(3)If you suspect the received e-mail is a Phishinge-mail, do not open attachments attached to theemail. Opening an unknown attachment couldinstall malicious programs onto your computer.(4)Do not click on links attached to your emails. Itis always safer to visit the website through theofficial link or to first confirm the authenticityof the link. Never follow or click on suspiciouslinks in an e-mail. It is advisable to enter theURL at the address bar of the web browser,and not follow the given link.Generally speaking, Phishing [3] [5] is a method that exploits people’s sympathy in the form of aid-seeking e-mails; the e-mail act as bait. These e-mails usually request their readers to visit a link that seemingly links to some charitable organization’s website; but in truth links the readers to a website that will install a Trojan program into the reader’s computer. Therefore, users should not forward unauthenticated charity mails, or click on unfamiliar links in an e-mail. Sometimes, the link could be a very familiar link or an often frequented website, but still, it would be safer if you’d type in the address yourself so as to avoid being linked to a fraudulent website. Phisher deludes people by using similar e-mails mailed by well-known enterprises or banks; these e-mails often asks users to provide personal information, or result in losing their personal rights; they usually contain a counterfeit URL which links to a website where the users can fillin the required information. People are often trapped by phishing due to inattentionBesides, you must also be careful when using a search engine to search for donations and charitable organizations.2.3 Fake WebsitesFake bank websites stealing account numbers and passwords have become increasingly common with the growth of online financial transactions. Hence, when using online banking, we should take precautions like using a secure encrypted customer’s certificate, surf the net following the correct procedure, etc.There are countless kinds of phishing baits, for instance, messages that say data expired, data invalid, please update data, or identity verification intended to steal account ID and matching password. This typeof online scam is difficult for users to identify. As scam methods become finer, e-mails and forged websites created by the impostor resemble their original, and tremendous losses arise from the illegal transactions.The following are methods commonly used by fake websites. First, the scammers create a similar website homepage; then they send out e-mails withenticing messages to attract visitors. They may also use fake links to link internet surfers to their website. Next, the fake website tricks the visitors into entering their personal information, credit card information or online banking account number and passwords. After obtaining a user’s information, the scammers can use the information to drain the bank accounts, shop online or create fake credit cards and other similar crimes. Usually, there will be a quick search option on these fake websites, luring users to enter their account number and password. When a user enters their account number and password, the website will respond with a message stating that the server is under maintenance. Hence, we must observe the following when using online banking:(1)Observe the correct procedure for entering abanking website. Do not use links resultingfrom searches or links on other websites.(2)Online banking certifications are currently themost effective security safeguard measure. (3)Do not easily trust e-mails, phone calls, andshort messages, etc. that asks for your accountnumber and passwords.Phishers often impost a well-known enterprise while sending their e-mails, by changing the sender’s e-mail address to that of the well known enterprise, in order to gain people’s trust. The ‘From’ column of an e-mail is set by the mail software and can be easily changed by the web administrator. Then, the Phisher creates a fake information input website, and send out e-mails containing a link to this fake website to lure e-mail recipients into visiting his fake website.Most Phishers create imitations of well known enterprises websites to lure users into using their fake websites. Even so, a user can easily notice that the URL of the website they’re entering has no relation to the intended enterprise. Hence, Phishers may use different methods to impersonate enterprises and other people. A commonly used method is hiding the URL. This can easily be done with the help of JavaScript.Another way is to exploit the loopholes in an internet browser, for instance, displaying a fake URL in the browser’s address bar. The security loophole causing the address bar of a browser to display a fake URL is a commonly used trick and has often been used in the past. For example, an e-mail in HTML format may hold the URL of a website of a well-known enterprise, but in reality, the link connects to a fake website.The key to successfully use a URL similar to that of the intended website is to trick the visual senses. For example, the sender’s address could be disguised as that of Nikkei BP, and the link set to http://www.nikeibp.co.jp/ which has one k less than the correct URL which is http://www.nikkeibp.co.jp/. The two URLs look very similar, and the difference barely noticeable. Hence people are easily tricked into clicking the link.Besides the above, there are many more scams that exploit the trickery of visual senses. Therefore, you should not easily trust the given sender’s name and a website’s appearance. Never click on unfamiliar and suspicious URLs on a webpage. Also, never enter personal information into a website without careful scrutiny.3. ConclusionsBusiness strategy is the most effective form of defense and also the easiest to carry out. Therefore, they should be the first line of defense, and not last. First, determine if instant messaging is essential in the business; then weigh its pros and cons. Rules and norms must be set on user ends if it is decided that the business cannot do without instant messaging functionality. The end server should be able to support functions like centralized logging and encryption. If not, then strict rules must be drawn, and carried out by the users. Especially, business discussions must not be done over an instant messenger.The paper categorized hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing (3) Fake Websites. Hacking tricks when successfully carried out could cause considerable loss and damage to users. The first category of hacking tricks can be divided into three types: (1) Hijacking and Impersonation; (2) Denial of Service; (3) Information Disclosure.Acknowledgement:This work was supported by the National Science Council, Taiwan, under contract No. NSC 95-2221-E-029-024.References[1] B. Schneier, “The trojan horse race,”Communications of ACM, Vol. 42, 1999, pp.128.[2] C. L. Schuba, “Analysis of a denial of serviceattack on TCP,” IEEE Security and PrivacyConference, 1997, pp. 208-223.[3] E. Schultz, “Phishing is becoming moresophisticated,” Computer and Security, Vol.24(3), 2005, pp. 184-185.[4]G. Miklau, D. Suciu, “A formal analysis ofinformation disclosure in data exchange,”International Conference on Management ofData, 2004, pp. 575-586.[5]J. Hoyle, “'Phishing' for trouble,” Journal ofthe American Detal Association, Vol. 134(9),2003, pp. 1182-1182.[6]J. Scambray, S. McClure, G. Kurtz, Hackingexposed: network security secrets and solutions,McGraw-Hill, 2001.[7]T. Tsuji and A. Shimizu, “An impersonationattack on one-time password authenticationprotocol OSPA,” to appear in IEICE Trans.Commun, Vol. E86-B, No.7, 2003.[8]Anti-Phishing Working Group,.[9]/region/tw/enterprise/article/icq_threat.html.有关网络环境安全的黑客技术摘要:现在人们往往通过互联网处理事务。
毕业论文英文文献及翻译
![毕业论文英文文献及翻译](https://img.taocdn.com/s3/m/72d3e26ac77da26925c5b0ef.png)
英文原文 and the .NET Framework is part of Microsoft's overall .NET framework, which contains a vast set of programming classes designed to satisfy any conceivable programming need. In the following two sections, you learn how fits within the .NET framework, and you learn about the languages you can use in your pages.The .NET Framework Class LibraryImagine that you are Microsoft. Imagine that you have to support multiple programming languages—such as Visual Basic, JScript, and C++.A great deal of the functionality of these programming languages overlaps. For example, for each language, you would have to include methods for accessing the file system, working with databases, and manipulating strings.Furthermore, these languages contain similar programming constructs. Every language, for example, can represent loops and conditionals. Even though the syntax of a conditional written in Visual Basic differs from the syntax of a conditional written in C++, the programming function is the same.Finally, most programming languages have similar variable data types. In most languages, you have some means of representing strings and integers, for example. The maximum and minimum size of an integer might depend on the language, but the basic data type is the same.Maintaining all this functionality for multiple languages requires a lot of work. Why keep reinventing the wheel? Wouldn't it be easier to create all this functionality once and use it for every language?The .NET Framework Class Library does exactly that. It consists of a vast set of classes designed to satisfy any conceivable programming need. For example, the .NET framework contains classes for handling database access, working with the file system, manipulating text, and generating graphics. In addition, it contains more specialized classes for performing tasks such as working with regular expressions and handling network protocols.The .NET framework, furthermore, contains classes that represent all the basic variable data types such as strings, integers, bytes, characters, and arrays.Most importantly, for purposes of this book, the .NET Framework Class Library contains classes for building pages. You need to understand, however, that you can access any of the .NET framework classes when you are building your pages.Understanding NamespacesAs you might guess, the .NET framework is huge. It contains thousands of classes (over 3,400). Fortunately, the classes are not simply jumbled together. The classes of the .NET framework are organized into a hierarchy of namespaces.ASP Classic NoteIn previous versions of Active Server Pages, you had access to only five standard classes (the Response, Request, Session, Application, and Server objects). , in contrast, provides you with access to over 3,400 classes!A namespace is a logical grouping of classes. For example, all the classes that relate to working with the file system are gathered together into the System.IO namespace.The namespaces are organized into a hierarchy (a logical tree). At the root of the tree is the System namespace. This namespace contains all the classes for the base data types, such as strings and arrays. It also contains classes for working with random numbers and dates and times.You can uniquely identify any class in the .NET framework by using the full namespace of the class. For example, to uniquely refer to the class that represents a file system file (the File class), you would use the following:System.IO.FileSystem.IO refers to the namespace, and File refers to the particular class.NOTEYou can view all the namespaces of the standard classes in the .NET Framework Class Library by viewing the Reference Documentation for the .NET Framework.Standard NamespacesThe classes contained in a select number of namespaces are available in your pages by default. (You must explicitly import other namespaces.) These default namespaces contain classes that you use most often in your applications:System— Contains all the base data types and other useful classes such as those related to generating random numbers and working with dates and times.System.Collections— Contains classes for working with standard collection types such as hash tables, and array lists.System.Collections.Specialized— Contains classes that represent specialized collections such as linked lists and string collections.System.Configuration— Contains classes for working with configuration files (Web.config files).System.Text— Contains classes for encoding, decoding, and manipulating the contents of strings.System.Text.RegularExpressions— Contains classes for performing regular expression match and replace operations.System.Web— Contains the basic classes for working with the World Wide Web, including classes for representing browser requests and server responses.System.Web.Caching— Contains classes used for caching the content of pages and classes for performing custom caching operations.System.Web.Security— Contains classes for implementing authentication and authorization such as Forms and Passport authentication.System.Web.SessionState—Contains classes for implementing session state.System.Web.UI—Contains the basic classes used in building the user interface of pages.System.Web.UI.HTMLControls— Contains the classes for the HTML controls.System.Web.UI.WebControls— Contains the classes for the Web controls..NET Framework-Compatible LanguagesFor purposes of this book, you will write the application logic for your pages using Visual Basic as your programming language. It is the default language for pages (and the most popular programming language in the world). Although you stick to Visual Basic in this book, you also need to understand that you can create pages by using any language that supports the .NET Common Language Runtime. Out of the box, this includes C# (pronounced See Sharp), (the .NET version of JavaScript), and the Managed Extensions to C++.NOTEThe CD included with this book contains C# versions of all the code samples.Dozens of other languages created by companies other than Microsoft have been developed to work with the .NET framework. Some examples of these other languages include Python, SmallTalk, Eiffel, and COBOL. This means that you could, if you really wanted to, write pages using COBOL.Regardless of the language that you use to develop your pages, you need to understand that pages are compiled before they are executed. This means that pages can execute very quickly.The first time you request an page, the page is compiled into a .NET class, and the resulting class file is saved beneath a special directory on your server named Temporary Files. For each and every page, a corresponding class file appears in the Temporary Files directory. Whenever you request the same page in the future, the corresponding class file is executed.When an page is compiled, it is not compiled directly into machine code. Instead, it is compiled into an intermediate-level language called Microsoft Intermediate Language (MSIL). All .NET-compatible languages are compiled into this intermediate language.An page isn't compiled into native machine code until it is actually requested by a browser. At that point, the class file contained in the Temporary Files directory is compiled with the .NET framework Just in Time (JIT) compiler and executed.The magical aspect of this whole process is that it happens automatically in the background. All you have to do is create a text file with the source code for your page, and the .NET framework handles all the hard work of converting it into compiled code for you.ASP CLASSIC NOTEWhat about VBScript? Before , VBScript was the most popular language for developing Active Server Pages. does not support VBScript, and this is good news. Visual Basic is a superset of VBScript, which means that Visual Basic has all the functionality of VBScript and more. So, you have a richer set of functions and statements with Visual Basic.Furthermore, unlike VBScript, Visual Basic is a compiled language. This means that if you use Visual Basic to rewrite the same code that you wrote with VBScript, you can get better performance.If you have worked only with VBScript and not Visual Basic in the past, don't worry. Since VBScript is so closely related to Visual Basic, you'll find it easy to make the transition between the two languages.NOTE Microsoft includes an interesting tool named the IL Disassembler (ILDASM) with the .NET framework. You can use this tool to view the disassembled code for any of the classes in the Temporary Files directory. It lists all the methods and properties of the class and enables you to view the intermediate-level code.This tool also works with all the controls discussed in this chapter. For example, you can use the IL Disassembler to view the intermediate-level code for the TextBox control (located in a file named System.Web.dll).中文翻译 和 .NET Framework是微软.NET框架总体战略的一部分。
毕业设计论文外文文献翻译智能交通信号灯控制中英文对照
![毕业设计论文外文文献翻译智能交通信号灯控制中英文对照](https://img.taocdn.com/s3/m/b3eb90cfd05abe23482fb4daa58da0116c171fd3.png)
英语原文Intelligent Traffic Light Controlby Marco Wiering The topic I picked for our community project was traffic lights. In a community, people need stop signs and traffic lights to slow down drivers from going too fast. If there were no traffic lights or stop signs, people’s lives would be in danger from drivers going too fast.The urban traffic trends towards the saturation, the rate of increase of the road of big city far lags behind rate of increase of the car.The urban passenger traffic has already become the main part of city traffic day by day and it has used about 80% of the area of road of center district. With the increase of population and industry activity, people's traffic is more and more frequent, which is unavoidable. What means of transportation people adopt produces pressure completely different to city traffic. According to calculating, if it is 1 to adopt the area of road that the public transport needs, bike needs 5-7, car needs 15-25, even to walk is 3 times more than to take public transits. So only by building road can't solve the city traffic problem finally yet. Every large city of the world increases the traffic policy to the first place of the question.For example,according to calculating, when the automobile owning amount of Shanghai reaches 800,000 (outside cars count separately ), if it distributes still as now for example: center district accounts for great proportion, even when several loop-lines and arterial highways have been built up , the traffic cannot be improved more than before and the situation might be even worse. So the traffic policy Shanghai must adopt , or called traffic strategy is that have priority to develop public passenger traffic of city, narrow the scope of using of the bicycle progressively , control the scale of growth of the car traffic in the center district, limit the development of the motorcycle strictly.There are more municipals project under construction in big city. the influence on the traffic is greater.Municipal infrastructure construction is originally a good thing of alleviating the traffic, but in the course of constructing, it unavoidably influence the local traffic. Some road sections are blocked, some change into an one-way lane, thus the vehicle can only take a devious route . The construction makes the road very narrow, forming the bottleneck, which seriously influence the car flow.When having stop signs and traffic lights, people have a tendency to drive slower andlook out for people walking in the middle of streets. To put a traffic light or a stop sign in a community, it takes a lot of work and planning from the community and the city to put one in. It is not cheap to do it either. The community first needs to take a petition around to everyone in the community and have them sign so they can take it to the board when the next city council meeting is. A couple residents will present it to the board, and they will decide weather or not to put it in or not. If not put in a lot of residents might be mad and bad things could happened to that part of the city.When the planning of putting traffic lights and stop signs, you should look at the subdivision plan and figure out where all the buildings and schools are for the protection of students walking and riding home from school. In our plan that we have made, we will need traffic lights next to the school, so people will look out for the students going home. We will need a stop sign next to the park incase kids run out in the street. This will help the protection of the kids having fun. Will need a traffic light separating the mall and the store. This will be the busiest part of the town with people going to the mall and the store. And finally there will need to be a stop sign at the end of the streets so people don’t drive too fast and get in a big accident. If this is down everyone will be safe driving, walking, or riding their bikes.In putting in a traffic light, it takes a lot of planning and money to complete it. A traffic light cost around $40,000 to $125,000 and sometimes more depending on the location. If a business goes in and a traffic light needs to go in, the business or businesses will have to pay some money to pay for it to make sure everyone is safe going from and to that business. Also if there is too many accidents in one particular place in a city, a traffic light will go in to safe people from getting a severe accident and ending their life and maybe someone else’s.The reason I picked this part of our community development report was that traffic is a very important part of a city. If not for traffic lights and stop signs, people’s lives would be in danger every time they walked out their doors. People will be driving extremely fast and people will be hit just trying to have fun with their friends. So having traffic lights and stop signs this will prevent all this from happening.Traffic in a city is very much affected by traffic light controllers. When waiting for a traffic light, the driver looses time and the car uses fuel. Hence, reducing waiting times before traffic lights can save our European society billions of Euros annually. To make traffic light controllers more intelligent, we exploit the emergence of novel technologies such as communication networks and sensor networks, as well as the use of more sophisticated algorithms for setting traffic lights. Intelligent traffic light control does not only mean thattraffic lights are set in order to minimize waiting times of road users, but also that road users receive information about how to drive through a city in order to minimize their waiting times. This means that we are coping with a complex multi-agent system, where communication and coordination play essential roles. Our research has led to a novel system in which traffic light controllers and the behaviour of car drivers are optimized using machine-learning methods.Our idea of setting a traffic light is as follows. Suppose there are a number of cars with their destination address standing before a crossing. All cars communicate to the traffic light their specific place in the queue and their destination address. Now the traffic light has to decide which option (ie, which lanes are to be put on green) is optimal to minimize the long-term average waiting time until all cars have arrived at their destination address. The learning traffic light controllers solve this problem by estimating how long it would take for a car to arrive at its destination address (for which the car may need to pass many different traffic lights) when currently the light would be put on green, and how long it would take if the light would be put on red. The difference between the waiting time for red and the waiting time for green is the gain for the car. Now the traffic light controllers set the lights in such a way to maximize the average gain of all cars standing before the crossing. To estimate the waiting times, we use 'reinforcement learning' which keeps track of the waiting times of individual cars and uses a smart way to compute the long term average waiting times using dynamic programming algorithms. One nice feature is that the system is very fair; it never lets one car wait for a very long time, since then its gain of setting its own light to green becomes very large, and the optimal decision of the traffic light will set his light to green. Furthermore, since we estimate waiting times before traffic lights until the destination of the road user has been reached, the road user can use this information to choose to which next traffic light to go, thereby improving its driving behaviour through a city. Note that we solve the traffic light control problem by using a distributed multi-agent system, where cooperation and coordination are done by communication, learning, and voting mechanisms. To allow for green waves during extremely busy situations, we combine our algorithm with a special bucket algorithm which propagates gains from one traffic light to the next one, inducing stronger voting on the next traffic controller option.We have implemented the 'Green Light District', a traffic simulator in Java in which infrastructures can be edited easily by using the mouse, and different levels of road usage can be simulated. A large number of fixed and learning traffic light controllers have already been tested in the simulator and the resulting average waiting times of cars have been plotted and compared. The results indicate that the learning controllers can reduce average waiting timeswith at least 10% in semi-busy traffic situations, and even much more when high congestion of the traffic occurs.We are currently studying the behaviour of the learning traffic light controllers on many different infrastructures in our simulator. We are also planning to cooperate with other institutes and companies in the Netherlands to apply our system to real world traffic situations. For this, modern technologies such as communicating networks can be brought to use on a very large scale, making the necessary communication between road users and traffic lights possible.中文翻译:智能交通信号灯控制马克·威宁我所选择的社区项目主题是交通灯。
土木工程毕业论文外文翻译--盾构(外文原文+中文翻译)
![土木工程毕业论文外文翻译--盾构(外文原文+中文翻译)](https://img.taocdn.com/s3/m/c62847197cd184254b353553.png)
毕业设计(论文)外文文献翻译院系:土木工程与建筑系年级专业:姓名:学号:附件:盾构SHIELDSSHIELDS【Abstract】A tunnel shield is a structural system, used during the face excavation process. The paper mainly discusses the form and the structure of the shield. Propulsion for the shield is provided by a series of hydraulic jacks installed in the tail of the shield and the shield is widespread used in the underground environment where can not be in long time stable. The main enemy of the shield is ground pressure. Non-uniform ground pressure caused by the steering may act on the skin tends to force the shield off line and grade. And working decks inside the shield enable the miners to excavate the face, drill and load holes.【Keywords】shield hydraulic jacks ground pressure steering working decksA tunnel shield is a structural system, normally constructed of steel, used during the face excavation process. The shield has an outside configuration which matches the tunnel. The shield provides protection for the men and equipment and also furnished initial ground support until structural supports can be installed within the tail section of the shield. The shield also provides a reaction base for the breast-board system used to control face movement. The shield may have either an open or closed bottom. In a closed-bottom shield, the shield structure and skin provide 360-degree ground contact and the weight of the shield rests upon the invert section of the shield skin. The open shield has no bottom section and requires some additional provision is a pair of side drifts driven in advance of shield excavation. Rails or skid tracks are installed within these side drifts to provide bearing support for the shield.Shield length generally varies from1/2 to 3/4 of the tunnel diameter. The front of the shield is generally hooded to so that the top of the shield protrudes forward further than the invert portion which provides additional protection for the men working at the face and also ease pressure on the breast-boards. The steel skin of the shield may varyfrom 1.3 to 10 cm in thickness, depending on the expected ground pressures. The type of steel used in the shield is the subject of many arguments within the tunneling fraternity. Some prefer mild steel in the A36 category because of its ductility and case of welding in the underground environment where precision work is difficult. Others prefer a high-strength steel such as T-1 because of its higher strength/weight ratio. Shield weight may range from 5 to 500 tons. Most of the heaviest shields are found in the former Sovier Union because of their preference for cast-iron in both structural and skin elements.Propulsion for the shield is provided by a series of hydraulic jacks installed in the tail of the shield that thrust against the last steel set that has been installed. The total required thrust will vary with skin area and ground pressure. Several shields have been constructed with total thrust capabilities in excess of 10000 tons. Hydraulic systems are usually self-contained, air-motor powered, and mounted on the shield. Working pressures in the hydraulic system may range from 20-70 Mpa. To resist the thrust of the shield jacks, a horizontal structure member (collar brace) must be installed opposite each jack location and between the flanges of the steel set. In addition, some structural provision must be made for transferring this thrust load into the tunnel walls. Without this provision the thrust will extend through the collar braces to the tunnel portal.An Englishman, Marc Brunel, is credited with inventing the shield. Brunel supposedly got his idea by studying the action of the Teredo navalis, a highly destructive woodworm, when he was working at the Chatham dock yard. In 1818 Brunel obtained an English patent for his rectangular shield which was subsequently uses to construct the first tunnel under the River Thames in London. In 1869 the first circular shield was devised by Barlow and Great Head in London and is referred to as the Great Head-type shield. Later that same year, Beach in New York City produced similar shield. The first use of the circular shield came during 1869 when Barlow and Great Head employed their device in the construction of the 2.1 in diameter Tower Subway under the River Thames. Despite the name of the tunnel, it was used only for pedestrian traffic. Beach also put his circular shield to work in 1869 to construct a demonstration project for a proposed NewYork City subway system. The project consisted of a 2.4 m diameter tunnel, 90 m long, used to experiment with a subway car propelled by air pressure.Here are some tunnels which were built by shield principle.Soft-ground tunneling Some tunnels are driven wholly or mostly through soft material. In very soft ground, little or no blasting is necessary because the material is easily excavated.At first, forepoling was the only method for building tunnels through very soft ground. Forepoles are heavy planks about 1.5 m long and sharpened to a point. They were inserted over the top horizontal bar of the bracing at the face of the tunnel. The forepoles were driven into the ground of the face with an outward inclination. After all the roof poles were driven for about half of their length, a timber was laid across their exposed ends to counter any strain on the outer ends. The forepoles thus provided an extension of the tunnel support, and the face was extended under them. When the ends of the forepoles were reached, new timbering support was added, and the forepoles were driven into the ground for the next advance of the tunneling.The use of compressed air simplified working in soft ground. An airlock was built, though which men and equipment passed, and sufficient air pressure was maintained at the tunnel face to hold the ground firm during excavation until timbering or other support was erected.Another development was the use of hydraulically powered shields behind which cast-iron or steel plates were placed on the circumference of the tunnels. These plates provided sufficient support for the tunnel while the work proceeded, as well as full working space for men in the tunnel.Under water tunneling The most difficult tunneling is that undertaken at considerable depths below a river or other body of water. In such cases, water seeps through porous material or crevices, subjecting the work in progress to the pressure of the water above the tunneling path. When the tunnel is driven through stiff clay, the flow of water may be small enough to be removed by pumping. In more porous ground,compressed air must be used to exclude water. The amount of air pressure that is needed increases as the depth of the tunnel increases below the surface.A circular shield has proved to be most efficient in resisting the pressure of soft ground, so most shield-driven tunnels are circular. The shield once consisted of steel plates and angle supports, with a heavily braced diaphragm across its face. The diaphragm had a number of openings with doors so that workers could excavate material in front of the shield. In a further development, the shield was shoved forward into the silty material of a riverbed, thereby squeezing displaced material through the doors and into the tunnel, from which the muck was removed. The cylindrical shell of the shield may extend several feet in front of the diaphragm to provide a cutting edge. A rear section, called the tail, extends for several feet behind the body of the shield to protect workers. In large shields, an erector arm is used in the rear side of the shield to place the metal support segments along the circumference of the tunnel.The pressure against the forward motion of a shield may exceed 48.8 Mpa. Hydraulic jacks are used to overcome this pressure and advance the shield, producing a pressure of about 245 Mpa on the outside surface of the shield.Shields can be steered by varying the thrust of the jacks from left side to right side or from top to bottom, thus varying the tunnel direction left or right or up or down. The jacks shove against the tunnel lining for each forward shove. The cycle of operation is forward shove, line, muck, and then another forward shove. The shield used about 1955 on the third tube of the Lincoln Tunnel in New York City was 5.5 m long and 9.6 m in diameter. It was moved about 81.2 cm per shove, permitting the fabrication of a 81.2 cm support ring behind it.Cast-iron segments commonly are used in working behind such a shield. They are erected and bolted together in a short time to provide strength and water tightness. In the third tube of the Lincoln Tunnel each segment is 2 m long, 81.2 cm wide, and 35.5 cm thick, and weighs about 1.5 tons. These sections form a ring of 14 segments that are linked together by bolts. The bolts were tightened by hand and then by machine.Immediately after they were in place, the sections were sealed at the joints to ensure permanent water tightness.Shields are most commonly used in ground condition where adequate stand-up time does not exist. The advantage of the shield in this type of ground, in addition to the protection afforded men and equipment , is the time available to install steel ribs, liner plates, or precast concrete segments under the tail segment of the shield before ground pressure and movement become adverse factors.One of the principle problems associated with shield use is steering. Non-uniform ground pressure acting on the skin tends to force the shield off line and grade. This problem is particularly acute with closed bottom shield that do not ride on rails or skid tracks. Steering is accomplished by varying the hydraulic pressure in individual thrust jacks. If the shied is trying to dive, additional pressure on the invert jacks will resist this tendency. It is not unusual to find shield wandering several feet from the required. Although lasers are frequently used to provide continuous line and grade data to operator, once the shield wanders off its course, its sheer bulk resists efforts to bring it back. Heterogeneous ground conditions, such as clay with random boulders, also presents steering problems.One theoretical disadvantage of the shield is the annular space left between the support system and the ground surface. When the support system is installed within the tail section of the shield, the individual support members are separated from the ground surface by the thickness of the tail skin. When steel ribs are used, the annular space is filled with timber blocking as the forward motion of the shield exposes the individual ribs. A continuous support system presents a different problem. In this case, a filler material, such as pea gravel or grout, is pumped behind the support system to fill the void between it and the ground surface.The main enemy of the shield is ground pressure. As ground pressure begins to build, two things happen, more thrust is required for shield propulsion and stress increases in the structural members of the shield. Shields are designed and function undera preselected ground pressure. Designers will select this pressure as a percentage of the maximum ground pressure contemplated by the permanent tunnel design. In some cases, unfortunately, the shield just gets built without specific consideration of the ground pressures it might encounter. When ground pressure exceeds the design limit, the shield gets “stuck”. The friction component of the ground pressure on the skin becomes greater than the thrust capability of the jacks. Several methods, including pumping bentonite slurry into the skin, ground interface, pushing heavy equipment, and bumping with dynamite, have been applied to stuck shields with occasional success.Because ground pressure tends to increase with time, the cardinal rule of operation is “keeping moving”. This accounts for the fracture activity when a shield has suffered a temporary mechanical failure. As ground pressure continues to build on the nonmoving shield , the load finally exceeds its structural limit and bucking begins. An example of shield destruction occurred in California in 1968 when two shields being used to drive the CarlyV.Porter Tunnel were caught by excessive ground pressure and deformed beyond repair. One of the Porter Tunnel shields was brought to a halt in reasonably good ground by water bearing ground fault that required full breast-boards. While the contractor was trying to bring the face under control, skin pressure began to increase. While the face condition finally stabilized, the contractor prepared to resume operations and discovered the shield was stuck. No combination of methods was able to move it, and the increasing ground pressure destroyed the shield.To offset the ground pressure effect, a standard provision in design is a cutting edge radius several inches greater than the main body radius. This allows a certain degree of ground movement before pressure can come to bear on the shield skin. Another approach, considered in theory but not yet put into practice, is the “watermelon seed” design. The theory calls for a continuous taper in the shield configuration; maximum radius at the cutting edge and the minimum radius at the trailing edge of the tail. With this configuration, any amount of forward movement would create a drop in skin pressure.Working decks, spaced 2.4 to 3.0 m vertically, are provided inside the shield. These working decks enable the miners to excavate the face, drill and load holes, if necessary, and adjust the breast-board system. The hydraulic jacks for the breast-board are mounted on the underside of the work decks. Blast doors are sometimes installed as an integral part of the work decks if a substantial amount of blasting is expected.Some form of mechanical equipment is provided on the rear end of the working decks to assist the miners in handing and placing the element of the support system. In large tunnels, these individual support elements can weigh several tons and mechanical assistance becomes essential. Sufficient vertical clearance must be provided between the invert and the first working deck to permit access to the face by the loading equipment.盾构【摘要】隧道盾构是一结构系统,通常用于洞室开挖。
毕业论文外文翻译范例
![毕业论文外文翻译范例](https://img.taocdn.com/s3/m/b958ebc533d4b14e852468e2.png)
外文原文(一)Savigny and his Anglo-American Disciple s*M. H. HoeflichFriedrich Carl von Savigny, nobleman, law reformer, champion of the revived German professoriate, and founder of the Historical School of jurisprudence, not only helped to revolutionize the study of law and legal institutions in Germany and in other civil law countries, but also exercised a profound influence on many of the most creative jurists and legal scholars in England and the United States. Nevertheless, tracing the influence of an individual is always a difficult task. It is especially difficult as regards Savigny and the approach to law and legal sources propounded by the Historical School. This difficulty arises, in part, because Savigny was not alone in adopting this approach. Hugo, for instance, espoused quite similar ideas in Germany; George Long echoed many of these concepts in England during the 1850s, and, of course, Sir Henry Sumner Maine also espoused many of these same concepts central to historical jurisprudence in England in the 1860s and 1870s. Thus, when one looks at the doctrinal writings of British and American jurists and legal scholars in the period before 1875, it is often impossible to say with any certainty that a particular idea which sounds very much the sort of thing that might, indeed, have been derived from Savigny's works, was, in fact, so derived. It is possible, nevertheless, to trace much of the influence of Savigny and his legal writings in the United States and in Great Britain during this period with some certainty because so great was his fame and so great was the respect accorded to his published work that explicit references to him and to his work abound in the doctrinal writing of this period, as well as in actual law cases in the courts. Thus, Max Gutzwiller, in his classic study Der einfluss Savignys auf die Entwicklung des International privatrechts, was able to show how Savigny's ideas on conflict of laws influenced such English and American scholars as Story, Phillimore, Burge, and Dicey. Similarly, Andreas Schwarz, in his "Einflusse Deutscher Zivilistik im Auslande," briefly sketched Savigny's influence upon John Austin, Frederick Pollock, and James Bryce. In this article I wish to examine Savigny's influence over a broader spectrum and to draw a picture of his general fame and reputation both in Britain and in the United States as the leading Romanist, legal historian, and German legal academic of his day. The picture of this Anglo-American respect accorded to Savigny and the historical school of jurisprudence which emerges from these sources is fascinating. It sheds light not only upon Savigny’s trans-channel, trans-Atlantic fame, but also upon the extraordinarily*M.H.Hoeflich, Savigny and his Anglo-American Disciples, American Journal of Comparative Law, vol.37, No.1, 1989.cosmopolitan outlook of many of the leading American and English jurists of the time. Of course, when one sets out to trace the influence of a particular individual and his work, it is necessary to demonstrate, if possible, precisely how knowledge of the man and his work was transmitted. In the case of Savigny and his work on Roman law and ideas of historical jurisprudence, there were three principal modes of transmission. First, there was the direct influence he exercised through his contacts with American lawyers and scholars. Second, there was the influence he exercised through his books. Third, there was the influence he exerted indirectly through intermediate scholars and their works. Let us examine each mode separately.I.INFLUENCE OF THE TRANSLATED WORKSWhile American and British interest in German legal scholarship was high in the antebellum period, the number of American and English jurists who could read German fluently was relatively low. Even those who borrowed from the Germans, for instance, Joseph Story, most often had to depend upon translations. It is thus quite important that Savigny’s works were amongst the most frequently translated into English, both in the United States and in Great Britain. His most influential early work, the Vom Beruf unserer Zeitfur Rechtsgeschichte und Gestzgebung, was translated into English by Abraham Hayward and published in London in 1831. Two years earlier the first volume of his History of Roman Law in the Middle Ages was translated by Cathcart and published in Edinburgh. In 1830, as well, a French translation was published at Paris. Sir Erskine Perry's translation of Savigny's Treatise on Possession was published in London in 1848. This was followed by Archibald Brown's epitome of the treatise on possession in 1872 and Rattigan's translation of the second volume of the System as Jural Relations or the Law of Persons in 1884. Guthrie published a translation of the seventh volume of the System as Private International Law at Edinburgh in 1869. Indeed, two English translations were even published in the far flung corners of the British Raj. A translation of the first volume of the System was published by William Holloway at Madras in 1867 and the volume on possession was translated by Kelleher and published at Calcutta in 1888. Thus, the determined English-speaking scholar had ample access to Savigny's works throughout the nineteenth century.Equally important for the dissemination of Savigny's ideas were those books and articles published in English that explained and analyzed his works. A number of these must have played an important role in this process. One of the earliest of these is John Reddie's Historical Notices of the Roman law and of the Progress of its Study in Germany, published at Edinburgh in 1826. Reddie was a noted Scots jurist and held the Gottingen J.U.D. The book, significantly, is dedicated to Gustav Hugo. It is of that genre known as an external history of Roman law-not so much a history of substantive Roman legal doctrine but rather a historyof Roman legal institutions and of the study of Roman law from antiquity through the nineteenth century. It is very much a polemic for the study of Roman law and for the Historical School. It imparts to the reader the excitement of Savigny and his followers about the study of law historically and it is clear that no reader of the work could possibly be left unmoved. It is, in short, the first work of public relations in English on behalf of Savigny and his ideas.Having mentioned Reddie's promotion of Savigny and the Historical School, it is important to understand the level of excitement with which things Roman and especially Roman law were greeted during this period. Many of the finest American jurists were attracted-to use Peter Stein's term-to Roman and Civil law, but attracted in a way that, at times, seems to have been more enthusiastic than intellectual. Similarly, Roman and Civil law excited much interest in Great Britain, as illustrated by the distinctly Roman influence to be found in the work of John Austin. The attraction of Roman and Civil law can be illustrated and best understood, perhaps, in the context of the publicity and excitement in the English-speaking world surrounding the discovery of the only complete manuscript of the classical Roman jurist Gaius' Institutes in Italy in 1816 by the ancient historian and German consul at Rome, B.G. Niebuhr. Niebuhr, the greatest ancient historian of his time, turned to Savigny for help with the Gaius manuscript (indeed, it was Savigny who recognized the manuscript for what it was) and, almost immediately, the books and journals-not just law journals by any means-were filled with accounts of the discovery, its importance to legal historical studies, and, of course, what it said. For instance, the second volume of the American Jurist contains a long article on the civil law by the scholarly Boston lawyer and classicist, John Pickering. The first quarter of the article is a gushing account of the discovery and first publication of the Gaius manuscript and a paean to Niebuhr and Savigny for their role in this. Similarly, in an article published in the London Law Magazine in 1829 on the civil law, the author contemptuously refers to a certain professor who continued to tell his students that the text of Gaius' Institutes was lost for all time. What could better show his ignorance of all things legal and literary than to be unaware of Niebuhr's great discovery?Another example of this reaction to the discovery of the Gaius palimpsest is to be found in David Irving's Introduction to the Study of the Civil Law. This volume is also more a history of Roman legal scholarship and sources than a study of substantive Roman law. Its pages are filled with references to Savigny's Geschichte and its approach clearly reflects the influence of the Historical School. Indeed, Irving speaks of Savigny's work as "one of the most remarkable productions of the age." He must have been truly impressed with German scholarship and must also have been able to convince the Faculty of Advocates, forwhom he was librarian, of the worth of German scholarship, for in 1820 the Faculty sent him to Gottingen so that he might study their law libraries. Irving devotes several pages of his elementary textbook on Roman law to the praise of the "remarkable" discovery of the Gaius palimpsest. He traces the discovery of the text by Niebuhr and Savigny in language that would have befitted an adventure tale. He elaborates on the various labors required to produce a new edition of the text and was particularly impressed by the use of a then new chemical process to make the under text of the palimpsest visible. He speaks of the reception of the new text as being greeted with "ardor and exultation" strong words for those who spend their lives amidst the "musty tomes" of the Roman law.This excitement over the Verona Gaius is really rather strange. Much of the substance of the Gaius text was already known to legal historians and civil lawyers from its incorporation into Justinian's Institutes and so, from a substantive legal perspective, the find was not crucial. The Gaius did provide new information on Roman procedural rules and it did also provide additional information for those scholars attempting to reconstruct pre-Justinianic Roman law. Nevertheless, these contributions alone seem hardly able to justify the excitement the discovery caused. Instead, I think that the Verona Gaius discovery simply hit a chord in the literary and legal community much the same as did the discovery of the Rosetta Stone or of Schliemann’s Troy. Here was a monument of a great civilization brought newly to light and able to be read for the first time in millenia. And just as the Rosetta Stone helped to establish the modern discipline of Egyptology and Schliemann's discoveries assured the development of classical archaeology as a modern academic discipline, the discovery of the Verona Gaius added to the attraction Roman law held for scholars and for lawyers, even amongst those who were not Romanists by profession. Ancillary to this, the discovery and publication of the Gaius manuscript also added to the fame of the two principals involved in the discovery, Niebuhr and Savigny. What this meant in the English-speaking world is that even those who could not or did not wish to read Savigny's technical works knew of him as one of the discoverers of the Gaius text. This fame itself may well have helped in spreading Savigny's legal and philosophical ideas, for, I would suggest, the Gaius "connection" may well have disposed people to read other of Savigny's writings, unconnected to the Gaius, because they were already familiar with his name.Another example of an English-speaking promoter of Savigny is Luther Stearns Cushing, a noted Boston lawyer who lectured on Roman law at the Harvard Law School in 1848-49 and again in 1851- 1852.Cushing published his lectures at Boston in 1854 under the title An Introduction to the Study of Roman Law. He devoted a full chapter to a description of the historical school and to the controversy betweenSavigny and Thibaut over codification. While Cushing attempted to portray fairly the arguments of both sides, he left no doubt as to his preference for Savigny's approach:The labors of the historical school have established an entirely new and distinct era in the study of the Roman jurisprudence; and though these writers cannot be said to have thrown their predecessors into the shade, it seems to be generally admitted, that almost every branch of the Roman law has received some important modification at their hands, and that a knowledge of their writings, to some extent, at least, is essentially necessary to its acquisition.译文(一)萨维尼和他的英美信徒们*M·H·豪弗里奇弗雷德里奇·卡尔·冯·萨维尼出身贵族,是一位出色的法律改革家,也是一位倡导重建德国教授协会的拥护者,还是历史法学派的创建人之一。
风力发电机毕业论文英文文献翻译
![风力发电机毕业论文英文文献翻译](https://img.taocdn.com/s3/m/0e727cde29ea81c758f5f61fb7360b4c2f3f2a53.png)
附录一英文文献Wind Energy Introduction1.1 Historical DevelopmentWindmills have been used for at least 3000 years, mainly for grinding grain or pumping water, while in sailing ships the wind has been an essential source of power for even longer. From as early as the thirteenth century, horizontal-axis windmills were an integral part of the rural economy and only fell into disuse with the advent of cheap fossil-fuelled engines and then the spread of rural electrification.The use of windmills (or wind turbines) to generate electricity can be traced back to the late nineteenth century with the 12 kW DC windmill generator constructed by Brush in the USA and the research undertaken by LaCour in Denmark. However, for much of the twentieth century there was little interest in using wind energy other than for battery charging for remote dwellings and these low-power systems were quickly replaced once access to the electricity grid became available. One notable exception was the 1250 kW Smith–Putnam wind turbine constructed in the USA in 1941. This remarkable machine had a steel rotor 53 m in diameter, full-span pitch control and flapping blades to reduce loads. Although a blade spar failed catastrophically in 1945, it remained the largest wind turbine constructed for some 40 years (Putnam, 1948).Golding (1955) and Shepherd and Divone in Spera (1994) provide a fascinating history of early wind turbine development. They record the 100 kW 30 m diameter Balaclava wind turbine in the then USSR in 1931 and the Andrea Enfield 100 kW 24 m diameter pneumatic design constructed in the UK in the early 1950s. In this turbine hollow blades, open at the tip, were used to draw air up through the tower where another turbine drove the generator. In Denmark the 200 kW 24 m diameter Gedser machine was built in 1956 while Electricite´de France tested a 1.1 MW 35 m diameter turbine in 1963. In Germany, Professor Hutter constructed a number of innovative, lightweight turbines in the 1950s and 1960s. In spite of these technical advances and the enthusiasm, among others, of Golding at the Electrical Research Association in the UK there was little sustained interest in wind generation until the price of oil rose dramatically in 1973.The sudden increase in the price of oil stimulated a number of substantial Government-funded programmes of research, development and demonstration. In the USA this led to the construction of a series of prototype turbines starting with the 38 m diameter 100 kW Mod-0 in 1975 and culminating in the 97.5 m diameter 2.5 MW Mod-5B in 1987. Similar programmes were pursued in the UK, Germany and Sweden. There was considerable uncertainty as to which architecture might prove most cost-effective and several innovative concepts were investigated at full scale. In Canada, a 4 MW vertical-axis Darrieus wind turbine was constructed and this concept was also investigated in the 34 m diameter Sandia Vertical Axis Test Facility in the USA. In the UK, an alternative vertical-axis design using straight blades to give an ‘H’ type rotor was proposed by Dr Peter Musgrove and a 500 kW prototypeconstructed. In 1981 an innovative horizontal-axis 3 MW wind turbine was built and tested in the USA. This used hydraulic transmission and, as an alternative to a yaw drive, the entire structure was orientated into the wind. The best choice for the number of blades remained unclear for some while and large turbines were constructed with one, two or three blades.Much important scientific and engineering information was gained from these Government-funded research programmes and the prototypes generally worked as designed. However, it has to be recognized that the problems of operating very large Figure 1.1 1.5 MW, 64 m diameter Wind Turbine (Reproduced by permission of NEG MICON)wind turbines, unmanned and in difficult wind climates were often under-estimated and the reliability of the prototypes was not good. At the same time as the multi-megawatt prototypes were being constructed private companies, often with considerable state support, were constructing much smaller, often simpler,turbines for commercial sale. In particular the financial support mechanisms in California in the mid-1980s resulted in the installation of a very large number of quite small(<100 kW) wind turbines. A number of these designs also suffered from various problems but,being smaller, they were in general easier to repair and modify. The so-called 'Danish' wind turbine concept emerged of a three-bladed,stall-regulated rotor and a fixed-speed, induction machine drive train. This decep-tively simple architecture has proved to be remarkably successful and has now been implemented on turbines as large as 60 m in diameter and at ratings of 1.5 MW. The machines of Figures 1.1 and 1.2 are examples of this design. However, as the sizes of commercially available turbines now approach that of the large prototypes of the 1980s it is interesting to see that the concepts investigated then of variable-speed operation, full-span control of the blades, and advanced materials are being used increasingly by designers. Figure 1.3 shows a wind farm of direct-drive, variable-speed wind turbines. In this design, the synchronous generator is coupled directly to the aerodynamic rotor so eliminating the requirement for a gearbox. Figure 1.4 shows a more conventional, variable-speed wind turbine that uses a gearbox, while a small wind farm of pitch-regulated wind turbines, where full-span control of the blades is used to regulate power, is shown in Figure 1.5.Figure 1.2 750 kW, 48 m diameter Wind Turbine, Denmark (Reproduced by permission of NEG MICON)Figure 1.3 Wind Farm of Variable-Speed Wind Turbines in Complex Terrain (Reproduced by permission of Wind Prospect Ltd)Figure 1.4 1 MW Wind Turbine in Northern Ireland (Reproduced by permission of Renew-able Energy Systems Ltd)The stimulus for the development of wind energy in 1973 was the price of oil and concern over limited fossil-fuel resources. Now, of course, the main driver for use of wind turbines to generate electrical power is the very low C emissions (over the entire life cycle of manufacture, installation, operation and de-commissioning)Figure 1.5 Wind Farm of Six Pitch-regulated Wind Turbines in Flat Terrain (Reproduced by permission of Wind Prospect Ltd)and the potential of wind energy to help limit climate change. In 1997 the Commis-sion of the European Union published its White Paper (CEU, 1997) calling for 12 percent of the gross energy demand of the European Union to be contributed from renewables by 2010. Wind energy was identified as having a key role to play in the supply of renewable energy with an increase in installed wind turbine capacity from 2.5 GW in 1995 to 40 GW by 2010. This target is likely to be achievable since at the time of writing, January 2001, there was some 12 GW of installed wind-turbine capacity in Europe, 2.5 GW of which was constructed in 2000 compared with only 300 MW in 1993. The average annual growth rate of the installation of wind turbines in Europe from 1993-9 was approximately 40 percent (Zervos, 2000). The distribution of wind-turbine capacity is interesting with, in 2000, Germany account- ing for some 45 percent of the European total, and Denmark and Spain each having approximately18 percent. There is some 2.5 GW of capacity installed in the USA of which 65 percent is in California although with increasing interest in Texas and some states of the midwest. Many of the California wind farms were originallyconstructed in the 1980s and are now being re-equipped with larger modern wind turbines.Table 1.1 shows the installed wind-power capacity worldwide in January 2001 although it is obvious that with such a rapid growth in some countries data of this kind become out of date very quickly.The reasons development of wind energy in some countries is flourishing while in others it is not fulfilling the potential that might be anticipated from a simple consideration of the wind resource, are complex. Important factors include the financial-support mechanisms for wind-generated electricity, the process by which the local planning authorities give permission for the construction of wind farms,and the perception of the general population particularly with respect to visual impact. In order to overcome the concerns of the rural population over the environ-mental impact of wind farms there is now increasing interest in the development of sites offshore.1.2 Modern Wind TurbinesThe power output, P, from a wind turbine is liven by the well-known expression:P=where ρ is the density of air (1.225 kg/), is the power coefficient, A is the rotor swept area, and U is the wind speed.The density of air is rather low, 800 times less than that of water which powershydro plant, and this leads directly to the large size of a wind turbine. Depending on the design wind speed chosen, a 1.5 MW wind turbine may have a rotor that is more than 60 m in diameter. The power coefficient describes that fraction of the power in the wind that may be converted by the turbine into mechanical work. It has a theoretical maximum value of 0.593 (the Betz limit) and rather lower peak values are achieved in practice (see Chapter 3). The power coefficient of a rotor varies with the tip speed ratio (the ratio of rotor tip speed to free wind speed) and is only a maximum for a unique tip speed ratio. Incremental improvements in the power coefficient are continually being sought by detailed design changes of the rotor and, by operating at variable speed, it is possible to maintain the maximum power coefficient over a range of wind speeds. However, these measures will give only a modest increase in the power output. Major increases in the output power can only be achieved by increasing the swept area of the rotor or by locating the wind turbines on sites with higher wind speeds.Hence over the last 10 years there has been a continuous increase in the rotor diameter of commercially available wind turbines from around 30 m to more than 60 m. A doubling of the rotor diameter leads to a four-times increase in power output. The influence of the wind speed is, of course, more pronounced with a doubling of wind speed leading to an eight-fold increase in power. Thus there have been considerable efforts to ensure that wind farms are developed in areas of the highest wind speeds and the turbines optimally located within wind farms. In certain countries very high towers are being used (more than 60-80 m) to take advantage of the increase of wind speed with height.In the past a number of studies were undertaken to determine the 'optimum size of a wind turbine by balancing the complete costs of manufacture, installation and operation of various sizes of wind turbines against the revenue generated (Mollyet al. 1993). The results indicated a minimum cost of energy would be obtained with wind turbine diameters in the range of 35-60 m, depending on the assumptions made. However, these estimates would now appear to be rather low and there is no obvious point at which rotor diameters, and hence output power, will be limited particularly for offshore wind turbines.All modern electricity-generating wind turbines use the lift force derived from the blades to drive the rotor. A high rotational speed of the rotor is desirable in order to reduce the gearbox ratio required and this leads to low solidity rotors (the ratio of blade area/rotor swept area). The low solidity rotor acts as an effective energy concentrator and as a result the energy recovery period of a wind turbine, on a good site, is less than 1 year, i.e., the energy used to manufacture and install the wind turbine is recovered within its first year of operation (Musgrove in Freris, 1990).附录二英文翻译风能介绍1.1发展历史风车的使用至少已有三千年,主要用于磨粒或泵站水,而在帆船风已成为不可缺少的电力来源甚至更长的一段时间。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
A RESEARCH ON DATA PROCESSING MODEL OF GPS DAMDEFORMATION MONITORING NETWORKAbstract: Considering the particularity of the GPS dam deformation monitoring network, a data processing model based on the station orthogonal coordinate system for three-dimension GPS dam deformation monitoring network, was put forward. Also, a mathematical model of using the clustering analysis method in fuzzy mathematics to test the relative stability of quasi-stable points(or datum marks) was successfully brought forward. The adjustment method during the course of data processing was quasi-stable adjustment. At last, a software system of three-dimension GPS dam deformation monitoring network was designed and opened up with the help of Visual Basic Language. With three periods o'bservation data from the GPS deformation monitoring network of a dam, an adjustment calculation was done by the software.The calculation result shows that the mathematical models can be more suitable for the data processing in GPS dam deformation monitoring network.Key words: GPS, Dam deformation monitoring, Quasi-stable adjustment, Clustering analysis 1.IntroductionWGS-84 coordinate system is generally used in GPS. But local or independent coordinate systems are usually chosen in dam deformation monitoring networks for their small areas. During the course of past data processing, the adjustment under WGS-84 coordinate system forindependent networks or networks with several fixed points is often firstly made. Then, the transformation from WGS-84 coordinate system tolocal(or independent) coordinate systems is done. For GPS deformation monitoring networks with repetitive observation data, the obvious change of datum marks coordinates under the two different coordinate systems can be brought by the tiny deformation of datum marks among different periods of observation. And the greater error can be made during the coordinate transformation. If a local Gauss coordinate system is chosen, the projection distortions can also be produced by the transformation itself. For the reasons above, the station orthogonal coordinate system is chosen as the reference coordinate system for data processing of GPS dam deformation networks. And the mathematical model is put forward and deduced.2.Data processing model based on the station orthogonal coordinate system for three-dimension GPS deformation monitoring networks2.1 Coordinate systemThe station orthogonal coordinate system is a left-hand coordinate system. Its origin is set at one of the GPS monitoring points. The E(X) axis points at the meridian passing the origin. It is on the tangent plane of the origin. And the right north is taken as forward direction. The H(Z) axis is on thenormal line of WGS-84 ellipsoid at the point and takes outward as forward directi on . The E(Y) axis is also on the tangent pla ne of the origi n and uses east for forward directi on.If the positi on vector of the stati on orthogo nal coord in ate system origi nr TP o in WGS-84 is expressed as o 二X0 Y 0 Z o , according to the geodetic latitude and Iongitude ( B° , L。
) ' the position vector 门in the statio n orthogo nal coord in ate system origi n of a ran dom poi nt p i can be got through the translation and rotation of its WGS-84 positionTvector r i「i =H (「i-ro) ( 1)In the above equation, H can be written as-sin B o C os L o -sin B o sin L。
cos B oH= si n B o cos L o o (2)cos B o cos L o cos B o sin L。
sin B。
一If the baseli ne vectors of the two ran dom poi ntsp i an d p j in WGS-84 coord in ate system and the the stati on orthogo nal coord in ate system are writte n as" 1 1川' '1 1 1respectively, the expressi on can be easily gained as followsAr tf= r/-r i= H(r - r0)-H(r -r0) = H(r' -rjThe n, the relatio n equatio n betwee n the two baseli ne vectors is expressed Ar = HArasThere are two steps in the GPS observati on data process ing course. They are baseli ne calculati on and n etwork adjustme nt. The baseli ne vectors in WGS-84 can be firstly got using baseline calculation. Secondly, the baseline vector transformation from WGS-84 to the station orthogonal coordinate system can be done with (3). At last, the adjustment of GPS deformation monitoring networks in the station orthogonal coordinate system can be successfully finished.2.2 Adjustment method and mathematical modelDeformation monitoring networks usually require higher precision. And if several fixed points are adopted for datum, the observation precision can be greatly reduced, because the known dataprecision is o'fte s n lower than the required precision and the beginning points ' displacement ca make annexe effect to observation data especially during the course of repetitive observation. So the classical adjustment method, which has some given points, is generally not used. But it is important to choose the reference points with stable physical status as datum of deformation monitoring networks. Considering the above two cases, the quasi-stable adjustment can be employed to make the more stable unknown data( the coordinates of relatively stable points away from the dam) match their stable values. Then, there are no distortion of surveying result and relatively stable datum. And the goal to monitor the deformation can be reached well. The adjustment model of GPS rank-deficient networks can be written asV=AX-LT. , (4)S(L)二阮piWith the least square method, the normal equation is expressed asNX二W (5)T Twhere N equals A PA and W equals A PLAnd the equati on can be got as followsR(N)=R(A)=r where A denotes the rank-deficient matrix whose rank-deficient number d is (n-r)」f S is a set of radical of zero space N(A) and R(S) deno tes d, the equation is written asAS=0 (6)When the inner product space is defined as (X,Y)=X T RY and R(R) >d, under the constraint condition X RX=min, the following equation can be gotS T RX=0 (7)With (5) and (7), the solution equation of weighting rank-deficientn etworks can be expressed asQ 亠-Q H RSVRQ^I XXWhere Q R de notes"、R*% H.When R is a diagonal matrix and its value is 1 or 0, (8) canbecome the model of quasi-stable adjustme nt. The S matrix can be give naccording to the condition AS=0. And the S matrix of GPS 3-dimensional deformati on mon itori ng n etworks is writte n as10 0 loo 1 o o-s z = 0)0010 ……oio ⑼ooi ooi o o 12.3 Mathematical model of calculat ing quasistable poi nts ' relative stability with clusteri ng an alysis For GPS dam deformati on mon itori ng n etworks, the stability of datum marks must be firstly tested in the observati on data process ing. Though the relatively stable area is chose n for build ing datum marks whe n GPS dam deformati on mon itori ng n etworks are desig ned, the deformatio n of datum marks can come into being. Eve n if the quasi-stable adjustme nt method is used, the stability test n eeds to be made, too. The quasi-stable poin ts(quasi-stable points or datum marks in desig n scheme) with marked deformati on should be elim in ated. The mathematical model of calculati ng quasi-stable poin ts(or datum marks) relative stability with clustering analysis in fuzzy mathematics is put forward to en sure the stable quasi-stable points(or datum marks) in GPS observation data processing. One characteristic of quasi-stable adjustme nt is that the correcti on value V of observati on data after adjustme nt is in variable. So the adjusted value L of observati on data is also in variable. And it is show n that the n etwork shape after adjustme nt is un cha nged. The observati on data of GPS n etworks adjustme nt is baseli ne vectors(coord in ate differe nces in 3 coord in ate axis directi on s).Then, after the quasi-stable adjustme nt of two periods of observati on data,the differe nces of coord in ate differe nces of two ran dom quasi-stable poi nts in 3coord in ate axis directi ons betwee n the two periods areinvariable. So, these values can ' t be changed with differces .cAod work can be finished once for ado toavoid the trouble of some methods calculat ing step by step.匸 an df denote the coord in ate differe nces of two ran dom quasi-stable points (i and j)aftertwo periods ' seobati on1 data adjustme nt. is the differe nee of coord in ate differe nces betwee ntwo periods. And equati ons are as follows n叭+碍 Statistic is written as=— ⑴) %1 If the change of l ij between two periods is caused by the accidental error of GPS observati on, it is expressed as心 ~ MO,1)The fuzzy membership grade of the relative stability of the two ran domquasi-stable points (i and j) is defi ned as(12)That is to say, the fuzzy relation of the relative stability of quasi-stable points is theprobability densityvalue of standard normal distribution about^ .To 口,it can be defined asu =0 for supplement. It is also as follows(io )==口 =于(叫) (13)And the fuzzy relation of relative stability of quasi-stable points defined by (12) and (13) only satisfiesthe symmetry of equivale nee fuzzy relatio n. The reflexivity can besta ndardized. And 「「is re-defi ned as=/(0)The fuzzy relati on R has met the first two con diti ons of fuzzy equivale neerelation. Then R is a fuzzy similar matrix. To transitivity, the fuzzysimilar matrix can be cha nged to a fuzzy equivale nee matrix with the help of the tran sitive closed package t(R). And the fuzzy an alysis can be done.The sorted index parameter 入 of clustering analysis is computed with thestatistic hypothesis method .If the cha nge of betwee n two periods is caused by the accide ntal error of GPS observatio n, it is expressed asFor the given conspicuous level a , there is a c K ticaWfitHue 一,the corresponding valu. can be got from (14). And 「is the sortedstability. Tab.1 below shows the values ofa and 入Obviously should be changed in the practice. It is concluded that alarger a shouldhosen according to the operation rule in clustering analysis. And it canbe recommended that and 入 should use 5 %and 0 .1465respectively. 3.A computation example and result analysis The computation example was chosen from the GPS(14) in dex parameter 入 of clustering analysisepfasi-stable points relativedeformation monitoring network of some rock and soil gravity dam. There were 3 periods of observation data in total. The observation dates were Mar.4 to 7, Jun. 4 to 11, and Aug.31 to Sept.4 in 2001. There were 75 GPS monitoring points in this network. And 6 of the total were in the relatively stable area of the lower river of the dam. The other 69 points were at the dam body. All the monitoring points were built on observation piers and had compulsive centering equipment. And all the observation was finished by 6 Ashtech Z-Surveyor dual-frequency receivers. The periods of all the points were more than an hour. The baseline solution of GPS observation data was gained by the Ashtech associated software Solution 2.5. For every period, everyday observation data was processed singly. The periods of time with bad signals were first eliminated. If they were still not eligible, the observation data was deleted. Then, with everyday qualified baselines, the network adjustment was prepared. The baseline solution precision is listed in Tab.1.6 monitoring points in the relatively stable area of dam lower river banks were used as fixed in itial datum. And the adjustme nt with fixed poi nts was done. With the adjustme nt result being an alyzed, it was show n that the displacement among 6 initial points could reach about 2~3mm. And the monitoring points ' precision after the adjustment with 6 fixed points was 1~2 times larger tha n the precisi on using quasi-stable adjustme nt. The result also explained the displacement of initial points. Because fixed initial datum could react on observation data for compulsive fixing, the precisi on was bad. In order to test the stability of quasi-stable poin ts, the mathematical model of clusteri ng an alysis method was employed. It was found that the quasi-stable point KL3 in Y directi on was obviously differe nt from the other 5 points whe n the sec ond period of observatio n was compared with the first.And KL3 in Y and Z directions was distinctly differe nt from the others whe n the third was compared with the first.Then, KL3 was eliminated after integrating the clustering analysis result of the seco nd and the third periods. At last, KL1 KL2、KL7、KR1 and KR3 were take n as quasi-stable poin ts. Because there was no quasi-stable adjustme nt fun cti on in GPS associated software of GPS manu facturersdesig ned for GPS deformati on mon itori ng n etworks using VB programming Ianguage. It had the function of quasi-stable adjustment in the stati on orthog onal coord in ate system. With it, the three periods of observati on data were processed. Because there were too many points, on ly the adjusted 3-dime nsional coord in ate syn thetical precisi on in the stati on orthog onal coord in ate system was listed in Tab.2 below.It is show n in Tab.2 that the mea n square error(MSE) of pla ne coord in ates can reach 1 millimeter and the MSE of vertical coord in ates can reach 2 millimeters. And the precisi on can satisfy the comma nd of dam deformatio n mon itori ng en tirely.4. Con clusi onsThe stati on orthog onal coord in ate system is more suitable for the refere nee coord in ate system of GPS dam deformati on mon itori ng n etworks. The quasi-stable adjustme nt method is more suitable for the data process ing of GPS dam deformati on mon itori ng n etworks. The mathematical model of calculati ng quasistable poi nts ' relative stability with clustering analysis can be used for the stability analysis of fixed in itial datum marks in GPS deformati on mon itori ng n etworks and datum marks in n ormal deformatio n mon itori ng n etworks as settleme nt monitoringnetworks or survey triangulation andtrilateration networks. And the correctness and feasibility of the advanced model have been proved with a computation example.。