毕业论文设计外文资料翻译

合集下载

毕业论文(设计)外文文献翻译及原文

毕业论文(设计)外文文献翻译及原文

金融体制、融资约束与投资——来自OECD的实证分析R.SemenovDepartment of Economics,University of Nijmegen,Nijmegen(荷兰内梅亨大学,经济学院)这篇论文考查了OECD的11个国家中现金流量对企业投资的影响.我们发现不同国家之间投资对企业内部可获取资金的敏感性具有显著差异,并且银企之间具有明显的紧密关系的国家的敏感性比银企之间具有公平关系的国家的低.同时,我们发现融资约束与整体金融发展指标不存在关系.我们的结论与资本市场信息和激励问题对企业投资具有重要作用这种观点一致,并且紧密的银企关系会减少这些问题从而增加企业获取外部融资的渠道。

一、引言各个国家的企业在显著不同的金融体制下运行。

金融发展水平的差别(例如,相对GDP的信用额度和相对GDP的相应股票市场的资本化程度),在所有者和管理者关系、企业和债权人的模式中,企业控制的市场活动水平可以很好地被记录.在完美资本市场,对于具有正的净现值投资机会的企业将一直获得资金。

然而,经济理论表明市场摩擦,诸如信息不对称和激励问题会使获得外部资本更加昂贵,并且具有盈利投资机会的企业不一定能够获取所需资本.这表明融资要素,例如内部产生资金数量、新债务和权益的可得性,共同决定了企业的投资决策.现今已经有大量考查外部资金可得性对投资决策的影响的实证资料(可参考,例如Fazzari(1998)、 Hoshi(1991)、 Chapman(1996)、Samuel(1998)).大多数研究结果表明金融变量例如现金流量有助于解释企业的投资水平。

这项研究结果解释表明企业投资受限于外部资金的可得性。

很多模型强调运行正常的金融中介和金融市场有助于改善信息不对称和交易成本,减缓不对称问题,从而促使储蓄资金投着长期和高回报的项目,并且提高资源的有效配置(参看Levine(1997)的评论文章)。

因而我们预期用于更加发达的金融体制的国家的企业将更容易获得外部融资.几位学者已经指出建立企业和金融中介机构可进一步缓解金融市场摩擦。

毕业设计论文外文文献翻译

毕业设计论文外文文献翻译

毕业设计(论文)外文文献翻译院系:财务与会计学院年级专业:201*级财务管理姓名:学号:132148***附件: 财务风险管理【Abstract】Although financial risk has increased significantly in recent years risk and risk management are not contemporary issues。

The result of increasingly global markets is that risk may originate with events thousands of miles away that have nothing to do with the domestic market。

Information is available instantaneously which means that change and subsequent market reactions occur very quickly。

The economic climate and markets can be affected very quickly by changes in exchange rates interest rates and commodity prices。

Counterparties can rapidly become problematic。

As a result it is important to ensure financial risks are identified and managed appropriately. Preparation is a key component of risk management。

【Key Words】Financial risk,Risk management,YieldsI. Financial risks arising1.1What Is Risk1.1.1The concept of riskRisk provides the basis for opportunity. The terms risk and exposure have subtle differences in their meaning. Risk refers to the probability of loss while exposure is the possibility of loss although they are often used interchangeably。

南邮外文翻译一范例

南邮外文翻译一范例

南京邮电大学毕业设计(论文)外文资料翻译学院(系):经济与管理学院专业:学生姓名:班级学号:外文出处:Journal of Occupational Psychology,1977, Vol.50附件:1.外文资料翻译译文;2.外文原文附件:1.外文资料翻译译文重新评估工作满意度和工作生活质量——詹姆斯.C.泰勒有用的工作满意度的措施在评估工作的特点以及改善工作生活质量中是有问题的。

根据民意调查和组织调查显示,多年以来,虽然在高和稳定的工作满意度水平下,雇员的挫折感和异化迹象却一直在增加。

经过更密切的检查,这似是而非的调查导致的结论是:无论再严谨的工作满意度调查及测量,得到的只是修改工作和减少员工的挫折感方面的没必要的信息。

根据以往的经验以及对工作生活质量的研究表明,为了克服这个缺陷,在测量工作满意度的时候,雇员本身需要更多地参与测量。

工作满意度已经成为一个模糊不清的尴尬概念。

许多代表着工业人文主义利益的社会科学调查员都对工作满意度十分有兴趣,他们建议要去关注和改善人与职位的关系,提高工作满意度。

从20世纪30年代开始,这种关注已经从制造业扩展到服务和文职部门。

然而,我们可以断言,大部分对工作满意度的研究都无法仅通过对工作及工作本身的研究。

历史上曾经有过对工作满意度的研究,这或许可以支持或者攻击现状,这种趋势还将继续下去。

尴尬的是,在对美国雇员的工作满意度的继续调查研究中,用极高的百分比来衡量他们工作的满意程度,而在同一时间内降低对工人的承诺,雇员所表达的通过增加缺勤率(特别是部分周缺勤),罢工(因其他原因除了工资)而拒绝谈判达成的合同以及破坏产品的比率显然变得更大。

雇员异化的这些问题已经提起公众的注意,但是如果公众关注继续增长,为什么雇员安静的绝望与工作越来越被看作是与压力之间的和解,这些事实和精心准备将使对工作满意度的严格调查成为必然。

前言本文的目的是在不减少抽样误差和防范反应的情况下,使用更精密的统计测试,在不同的模式下对满意度数据进行界定和衡量。

毕业设计论文 电子秤 中英文 外文资料 文献 翻译

毕业设计论文 电子秤 中英文 外文资料 文献 翻译

外文参考资料二:Abstract: In order to solve the weight problem often encountered in measuring the low-mass objects in the trade and daily life of the modern business, the design of a new pocket-sized electronic scales. This pocket-sized electronic scales Force Sensor gravity signals into electrical signals to measure, and measuring the results of the digital display. The pocket-sized electronic scales with a small size, light weight, easy to carry, intuitive display, measurement and high precision; complex structure, the cost disadvantages. This article focuses on the load cell works, error compensation, the main parameters of selection. And the technical and economic analysis.Keywords: pocket-sized electronic scales; weighing; sensor; error compensationCLC number: TH715. 1] sign code: A Article ID: 100 522 895 (2007) 022*******1 A needs analysisIn modern commerce and trade and everyday life, often encounter the problem of measuring the weight of the low-mass objects. Although the traditional steelyard can solve this problem, but inconvenient to carry, the efficiency is not high, the display is not intuitive and low measurement accuracy; mechanical spring balance can solve this problem, but the inertia inherent low frequency, high sensitivity, measurement accuracy is not high. With the progress and update of the micro-computer technology, integrated circuit technology, sensor technology, electronic scales rapiddevelopment, it has a responsive, high accuracy, fully functional, the display is intuitive, compact, easy to use and so on.For these reasons, in order to solve the low-mass objects weighing problem, if a small size, light weight, portable, digital display electronic scales, will be popular. Discussed below, that is, the scope of a weighing 5 kg compact electronic scales.2 DesignThe principle of the structure of the pocket-sized electronic scales shown in Figure 1. The main task is to design compact electronic scales weighing the choice of the force sensors. Dynamometer sensor types to achieve the weighing and digital display, the key is to want to force (gravity) signals into electrical signals to measure method is mainly divided into two categories: one is the direct method, namely the use of pressure magnetic sensor, piezoelectric sensor, Piezoresistive sensors directly to the force signal converted into electrical signals; the other is the indirect method, the elastic element as the sensor will pull, pressure changes in strain, displacement, or frequency, and then strain sensors, displacement sensors, or frequency sensor strain, displacement or frequency changes for power. Comprehensive comparison of a variety of sensors, use the indirect method of strain gauge force transducer.Pocket-sized electronic scale structural principle:Sensor → amplifier → CPU→ display → AöD converter3 sensor device design3.1 worksThe working principle of the strain gauge force transducer strain gauge pasted into force, force-sensitive elasticelement, the corresponding strain when the elastic element force deformation, the strain gauge into a resistance change, which led to the voltage measuring circuit changes by measuring the output voltage value, and then through the conversion can be obtained by the measurement of body weight. Since the pocket-sized electronic scales require small size, weighing in scope, precision and angle even consistency, sensor and display integration, it is selected parallel to the two holes cantilever beam strain gauge load-bearing sensor. Its characteristics are: high precision, ease of processing, simple and compact structure, strong resistance to partial load, high natural frequency.Strain gauge choice of a metal palisade metal mooring paste on the insulating substrate parked strain gages, mechanical strain resistance strain gauge feelings generally 10 - 10 - 2mm, the resistance rate of change of the attendant about 10 - 6 10 - 2 orders of magnitude, such a small change in resistance measured using the general resistance of the instrument is hard to measure out, you must use some form of measurement.Circuit into small changes in resistance rates to changes in voltage or current, in order to secondary instrument display. Bridge measurement circuit to meet this requirement. In the load cell, R 1, R 2, R 3, R 44 strain gauge resistor bridge measurement circuit shown in Figure 3. R m is the temperature compensation resistor, e is the excitation voltage, V is the output voltage.外文参考资料三:The load cell is a quality signal into a measurable electrical signal outputdevice. Must consider the actual working environment of the sensor which sensor Yin, this is essential for the correct selection of the load cell, and it is related to the sensor can work as well as its safety and service life, and the whole weighing the reliability and safety sex. On the basic concepts and methods of evaluation of the major technical indicators of the load cell, the new and old GB qualitative differences.The traditional concept, the load sensor weighing sensors, force sensors, collectively referred to using a single parameter to evaluate its measurement properties. Old GB will be completely different application objects and the use of environmental conditions "weighing" and "measured force" two sensors into one to consider, not given to distinguish between the test and evaluation methods. Old GB total of 21 indicators, were tested at room temperature; and non-linearity, hysteresis error, repeatability error, creep, the additional error of the zero temperature and the maximum error in the six indicators of the rated output additional temperature error, to determine said The level of accuracy of the weight sensor, respectively 0.02,0.03,0.05 said.Proportion to convert the output signal can be measured. Taking into account the different place of use of the acceleration due to gravity and air buoyancy on the conversion, the main performance indicators of the load cell linearity error, hysteresis error, repeatability error, creep, zero-temperature characteristics and temperature sensitivity characteristics. In a variety of weighing and measuring the quality of the system, usually the integrated error accuracy of the integrated control sensors, and integrated error band or scale error band (Figure 1) linked so that selection corresponds to a certain accuracy weighing weighing sensors. International Organization of Legal Metrology(OIML) requirements, sensor error with total weighing instrument error δ with Δ of 70% of the load cell linearity error, hysteresis error within the specified temperature range due to the effect of temperature on the sensitivity of the error the sum can not exceed the error band of δ. This allows the manufacturer of the components that make up the total measurement error adjustment to obtain the desired accuracy.The load cell conversion method is divided into photoelectric, hydraulic, electromagnetic force type, capacitive, magnetic poles change the form of vibratory gyroscope ceremony, resistance strain type, to the most extensive use of resistance strain.Electromagnetic force sensorIt uses a load-bearing stage load and the principle of electromagnetic force Equilibrium (Figure 5). Put the loading stage, the measured object at one end of the lever upward tilt; photoelectric detect the tilt signal, amplified into the coil, the electromagnetic force, so that the lever to return to equilibrium. Currents produce electromagnetic counterweight digital converter, you can determine the quality of the measured object. The electromagnetic force sensor accuracy, up to 1/2000 ~ 1/60000, but the weighing range is only tens of mg to 10 kg.Capacitive sensorsItcapacitor oscillator circuit of the oscillation frequency f and the plate spacing d is directly proportional relationship between the work (Figure 6). There are two plates, one fixed and the other one can move. Bearing load measured object, the leaf spring deflection, the distance between the twoplates changes, the oscillation frequency of the circuit also changes. The measured frequency change can be calculated to the quality of the load-bearing stage, the measured object. Capacitive sensor power consumption, low cost, accuracy of 1/200 to 1/500.Pole change the form of sensorFerromagneticcomponents in the measured object gravity under mechanical deformation, internal stress and cause changes in permeability, and also changes so that the induced voltage of the secondary coil wound on both sides of the ferromagnetic component (pole). Measure the voltage variation can be calculated added to the force on the pole, and then determine the quality of the measured object. Pole to change the form of sensor accuracy is not high, usually 1/100, applicable to the large tonnage weighing, weighing ranging from tens to tens of thousands of kilograms.Vibration sensorThe force of the elastic element, the natural vibration frequency of the force is proportional to the square root of. Measure the natural frequency changes, you can find the measured object role in the elastic component of the force, and then calculate the quality. The vibration sensor vibrating wire and tuning fork.The elastic component of the vibrating wire sensor string wire. When the load-bearing stage, plus the measured object, the intersection of the V-shaped string wire is pulled down, and left strings of tension increases, the right string tension decreases. The natural frequency of the two strings of different changes. Calculate the frequency difference between the two strings, you can find the quality of the measured object. The higher the accuracy of the vibrating wire sensor, up to 1/1000 ~ 1/10000, weighing 100 g to hundreds of kilograms, but the structure is complex anddifficult process, and high cost.The elastic component of the tuning fork sensor is a tuning fork. Fixed tuning fork end of the piezoelectric element, the natural frequency of oscillation of a tuning fork, it can be measured oscillation frequency. When the load-bearing stage and the measured object, the tuning fork direction of tensile force while the increase in natural frequency, increasing levels of applied force is proportional to the square root. Measure the changes of natural frequency can be calculated heavy loads imposed on the tuning fork on the force, and then calculate the quality of heavy objects. The tuning fork sensor power consumption, measurement accuracy up to 1/10000 to 1/200 000, weighing range of 500g ~ 10kg.外文参考文献中文翻译参考资料二:摘要: 为解决现代商业贸易和日常生活中经常遇到的测量小质量物体的重量问题, 介绍了一种新型的袖珍式电子秤的设计。

毕业设计论文 外文文献翻译

毕业设计论文 外文文献翻译

毕业设计(论文)外文参考文献翻译计算机科学与信息工程系系(院)2008 届题目企业即时通Instant Messaging for Enterprises课题类型技术开发课题来源自选学生姓名许帅专业班级 04计算机科学与技术指导老师王占中职称工程师完成日期:2008年4 月 6 日目录I NSTANT M ESSAGING FOR E NTERPRISE (1)1. Tips (1)2. Introduction (1)3. First things first (2)4.The While-Accept loop (4)5. Per-Thread class (6)6. The Client class (7)企业即时通 (9)1.提示 (9)2.简介 (9)3.首先第一件事 (10)4.监听循环 (11)5.单线程类 (13)6.用户端类 (14)Instant Messaging for Enterprise1. TipsIf Java is, in fact, yet another computer programming language, you may question why it is so important and why it is being promoted as a revolutionary step in computer programming. The answer isn’t immediately obvious if you’re coming from a tr aditional programming perspective. Although Java is very useful for solving traditional standalone programming problems, it is also important because it will solve programming problems on the World Wide Web. What is the Web?The Web can seem a bit of a mys tery at first, with all this talk of “surfing,”“presence,” and “home pages.” It’s helpful to step back and see what it really is, but to do this you must understand client/server systems, another aspect of computing that is full of confusing issues. The primary idea of a client/server system is that you have a central repository of information,some kind of data, often in a database。

毕业设计(论文)外文资料翻译(学生用)

毕业设计(论文)外文资料翻译(学生用)

毕业设计外文资料翻译学院:信息科学与工程学院专业:软件工程姓名: XXXXX学号: XXXXXXXXX外文出处: Think In Java (用外文写)附件: 1.外文资料翻译译文;2.外文原文。

附件1:外文资料翻译译文网络编程历史上的网络编程都倾向于困难、复杂,而且极易出错。

程序员必须掌握与网络有关的大量细节,有时甚至要对硬件有深刻的认识。

一般地,我们需要理解连网协议中不同的“层”(Layer)。

而且对于每个连网库,一般都包含了数量众多的函数,分别涉及信息块的连接、打包和拆包;这些块的来回运输;以及握手等等。

这是一项令人痛苦的工作。

但是,连网本身的概念并不是很难。

我们想获得位于其他地方某台机器上的信息,并把它们移到这儿;或者相反。

这与读写文件非常相似,只是文件存在于远程机器上,而且远程机器有权决定如何处理我们请求或者发送的数据。

Java最出色的一个地方就是它的“无痛苦连网”概念。

有关连网的基层细节已被尽可能地提取出去,并隐藏在JVM以及Java的本机安装系统里进行控制。

我们使用的编程模型是一个文件的模型;事实上,网络连接(一个“套接字”)已被封装到系统对象里,所以可象对其他数据流那样采用同样的方法调用。

除此以外,在我们处理另一个连网问题——同时控制多个网络连接——的时候,Java内建的多线程机制也是十分方便的。

本章将用一系列易懂的例子解释Java的连网支持。

15.1 机器的标识当然,为了分辨来自别处的一台机器,以及为了保证自己连接的是希望的那台机器,必须有一种机制能独一无二地标识出网络内的每台机器。

早期网络只解决了如何在本地网络环境中为机器提供唯一的名字。

但Java面向的是整个因特网,这要求用一种机制对来自世界各地的机器进行标识。

为达到这个目的,我们采用了IP(互联网地址)的概念。

IP以两种形式存在着:(1) 大家最熟悉的DNS(域名服务)形式。

我自己的域名是。

所以假定我在自己的域内有一台名为Opus的计算机,它的域名就可以是。

本科毕业设计(论文)外文翻译

本科毕业设计(论文)外文翻译
1.引言
重金属污染存在于很多工业的废水中,如电镀,采矿,和制革。
2.实验
2.1化学药剂
本实验所使用的药剂均为分析纯,如无特别说明均购买自日本片山化工。铅离子储备液通过溶解Pb(NO3)2配制,使用时稀释到需要的浓度。HEPES缓冲液购买自Sigma–Aldrich。5 mol/L的HCl和NaOH用来调整pH。
附5
华南理工大学
本科毕业设计(论文)翻译
班级2011环境工程一班
姓名陈光耀
学号201130720022
指导教师韦朝海
填表日期
中文译名
(1)巯基改性纤维素对葡萄糖溶液中铅的吸附(2)黄原酸化橘子皮应用于吸附水中的铅离子
外文原文名
(1)Adsorption of Pb(II) from glucose solution on thiol-functionalized cellulosic biomass
2.5分析方法
铅离子的浓度用分光光度计在616 nm波长处用铅与偶氮氯膦-III络合物进行分析。葡萄糖含量采用苯酚—硫酸分光光度法测定。所有的实验均进行三次,已经考虑好误差。
3.结果和讨论
3.1FTIR分析和改性脱脂棉对铅(II)的吸附机制
图1是脱脂棉、改性脱脂棉在400-4000 cm-1(A)和2540-2560 cm-1(B)范围内的红外光谱图。可以看出,改性后改性脱脂棉的红外光谱图中在1735.71 cm-1处出现了一个新的吸收峰是酯基C=O的拉伸振动峰,可见改性脱脂棉中已经成功引入巯基官能团。同时,在2550.52 cm-1出现的一个新吸收峰代表的是S-H官能团的弱吸收峰,更深一层的证明了巯基已经嫁接到脱脂棉上。图1(b)是2540-2560 cm-1光谱范围的一个放大图像,可以清楚的观察到S-H官能团的弱吸收峰。进一步证明了酯化改性脱脂棉引入巯基是成功的。而从吸附后的曲线可以看到,2550.52cm-1处S-H的吸收峰消失,证明了硫原子和Pb(II)络合物的形成,同时1735.71cm-1处C=O的吸收峰强度看起来有轻微的减弱可能也是和Pb(II)的络合吸附有关。

毕业设计(论文)外文资料翻译【范本模板】

毕业设计(论文)外文资料翻译【范本模板】

南京理工大学紫金学院毕业设计(论文)外文资料翻译系:机械系专业:车辆工程专业姓名:宋磊春学号:070102234外文出处:EDU_E_CAT_VBA_FF_V5R9(用外文写)附件:1。

外文资料翻译译文;2.外文原文.附件1:外文资料翻译译文CATIA V5 的自动化CATIA V5的自动化和脚本:在NT 和Unix上:脚本允许你用宏指令以非常简单的方式计划CATIA。

CATIA 使用在MS –VBScript中(V5.x中在NT和UNIX3。

0 )的共用部分来使得在两个平台上运行相同的宏。

在NT 平台上:自动化允许CATIA像Word/Excel或者Visual Basic程序那样与其他外用分享目标。

ATIA 能使用Word/Excel对象就像Word/Excel能使用CATIA 对象。

在Unix 平台上:CATIA将来的版本将允许从Java分享它的对象。

这将提供在Unix 和NT 之间的一个完美兼容。

CATIA V5 自动化:介绍(仅限NT)自动化允许在几个进程之间的联系:CATIA V5 在NT 上:接口COM:Visual Basic 脚本(对宏来说),Visual Basic 为应用(适合前:Word/Excel ),Visual Basic。

COM(零部件目标模型)是“微软“标准于几个应用程序之间的共享对象。

Automation 是一种“微软“技术,它使用一种解释环境中的COM对象。

ActiveX 组成部分是“微软“标准于几个应用程序之间的共享对象,即使在解释环境里。

OLE(对象的链接与嵌入)意思是资料可以在一个其他应用OLE的资料里连结并且可以被编辑的方法(在适当的位置编辑).在VBScript,VBA和Visual Basic之间的差别:Visual Basic(VB)是全部的版本。

它能产生独立的计划,它也能建立ActiveX 和服务器。

它可以被编辑。

VB中提供了一个补充文件名为“在线丛书“(VB的5。

毕设外文文献+翻译1

毕设外文文献+翻译1

外文翻译外文原文CHANGING ROLES OF THE CLIENTS、ARCHITECTSAND CONTRACTORS THROUGH BIMAbstract:Purpose –This paper aims to present a general review of the practical implications of building information modelling (BIM) based on literature and case studies. It seeks to address the necessity for applying BIM and re-organising the processes and roles in hospital building projects. This type of project is complex due to complicated functional and technical requirements, decision making involving a large number of stakeholders, and long-term development processes.Design/methodology/approach–Through desk research and referring to the ongoing European research project InPro, the framework for integrated collaboration and the use of BIM are analysed.Findings –One of the main findings is the identification of the main factors for a successful collaboration using BIM, which can be recognised as “POWER”: product information sharing (P),organisational roles synergy (O), work processes coordination (W), environment for teamwork (E), and reference data consolidation (R).Originality/value –This paper contributes to the actual discussion in science and practice on the changing roles and processes that are required to develop and operate sustainable buildings with the support of integrated ICT frameworks and tools. It presents the state-of-the-art of European research projects and some of the first real cases of BIM application in hospital building projects.Keywords:Europe, Hospitals, The Netherlands, Construction works, Response flexibility, Project planningPaper type :General review1. IntroductionHospital building projects, are of key importance, and involve significant investment, and usually take a long-term development period. Hospital building projects are also very complex due to the complicated requirements regarding hygiene, safety, special equipments, and handling of a large amount of data. The building process is very dynamic and comprises iterative phases and intermediate changes. Many actors with shifting agendas, roles and responsibilities are actively involved, such as: the healthcare institutions, national and local governments, project developers, financial institutions, architects, contractors, advisors, facility managers, and equipment manufacturers and suppliers. Such building projects are very much influenced, by the healthcare policy, which changes rapidly in response to the medical, societal and technological developments, and varies greatly between countries (World Health Organization, 2000). In The Netherlands, for example, the way a building project in the healthcare sector is organised is undergoing a major reform due to a fundamental change in the Dutch health policy that was introduced in 2008.The rapidly changing context posts a need for a building with flexibility over its lifecycle. In order to incorporate life-cycle considerations in the building design, construction technique, and facility management strategy, a multidisciplinary collaboration is required. Despite the attempt for establishing integrated collaboration, healthcare building projects still faces serious problems in practice, such as: budget overrun, delay, and sub-optimal quality in terms of flexibility, end-user’s dissatisfaction, and energy inefficiency. It is evident that the lack of communication and coordination between the actors involved in the different phases of a building project is among the most important reasons behind these problems. The communication between different stakeholders becomes critical, as each stakeholder possesses different setof skills. As a result, the processes for extraction, interpretation, and communication of complex design information from drawings and documents are often time-consuming and difficult. Advanced visualisation technologies, like 4D planning have tremendous potential to increase the communication efficiency and interpretation ability of the project team members. However, their use as an effective communication tool is still limited and not fully explored. There are also other barriers in the information transfer and integration, for instance: many existing ICT systems do not support the openness of the data and structure that is prerequisite for an effective collaboration between different building actors or disciplines.Building information modelling (BIM) offers an integrated solution to the previously mentioned problems. Therefore, BIM is increasingly used as an ICT support in complex building projects. An effective multidisciplinary collaboration supported by an optimal use of BIM require changing roles of the clients, architects, and contractors; new contractual relationships; and re-organised collaborative processes. Unfortunately, there are still gaps in the practical knowledge on how to manage the building actors to collaborate effectively in their changing roles, and to develop and utilise BIM as an optimal ICT support of the collaboration.This paper presents a general review of the practical implications of building information modelling (BIM) based on literature review and case studies. In the next sections, based on literature and recent findings from European research project InPro, the framework for integrated collaboration and the use of BIM are analysed. Subsequently, through the observation of two ongoing pilot projects in The Netherlands, the changing roles of clients, architects, and contractors through BIM application are investigated. In conclusion, the critical success factors as well as the main barriers of a successful integrated collaboration using BIM are identified.2. Changing roles through integrated collaboration and life-cycle design approachesA hospital building project involves various actors, roles, and knowledge domains. In The Netherlands, the changing roles of clients, architects, and contractors in hospital building projects are inevitable due the new healthcare policy. Previously under the Healthcare Institutions Act (WTZi), healthcare institutions were required to obtain both a license and a building permit for new construction projects and major renovations. The permit was issued by the Dutch Ministry of Health. The healthcare institutions were then eligible to receive financial support from the government. Since 2008, new legislation on the management of hospital building projects and real estate has come into force. In this new legislation, a permit for hospital building project under the WTZi is no longer obligatory, nor obtainable (Dutch Ministry of Health, Welfare and Sport, 2008). This change allows more freedom from the state-directed policy, and respectively, allocates more responsibilities to the healthcare organisations to deal with the financing and management of their real estate. The new policy implies that the healthcare institutions are fully responsible to man age and finance their building projects and real estate. The government’s support for the costs of healthcare facilities will no longer be given separately, but will be included in the fee for healthcare services. This means that healthcare institutions must earn back their investment on real estate through their services. This new policy intends to stimulate sustainable innovations in the design, procurement and management of healthcare buildings, which will contribute to effective and efficient primary healthcare services.The new strategy for building projects and real estate management endorses an integrated collaboration approach. In order to assure the sustainability during construction, use, and maintenance, the end-users, facility managers, contractors and specialist contractors need to be involved in the planning and design processes. The implications of the new strategy are reflected in the changing roles of the building actors and in the new procurement method.In the traditional procurement method, the design, and its details, are developed by the architect, and design engineers. Then, the client (the healthcare institution) sends an application to the Ministry of Healthto obtain an approval on the building permit and the financial support from the government. Following this, a contractor is selected through a tender process that emphasises the search for the lowest-price bidder. During the construction period, changes often take place due to constructability problems of the design and new requirements from the client. Because of the high level of technical complexity, and moreover, decision-making complexities, the whole process from initiation until delivery of a hospital building project can take up to ten years time. After the delivery, the healthcare institution is fully in charge of the operation of the facilities. Redesigns and changes also take place in the use phase to cope with new functions and developments in the medical world.The integrated procurement pictures a new contractual relationship between the parties involved in a building project. Instead of a relationship between the client and architect for design, and the client and contractor for construction, in an integrated procurement the client only holds a contractual relationship with the main party that is responsible for both design and construction. The traditional borders between tasks and occupational groups become blurred since architects, consulting firms, contractors, subcontractors, and suppliers all stand on the supply side in the building process while the client on the demand side. Such configuration puts the architect, engineer and contractor in a very different position that influences not only their roles, but also their responsibilities, tasks and communication with the client, the users, the team and other stakeholders.The transition from traditional to integrated procurement method requires a shift of mindset of the parties on both the demand and supply sides. It is essential for the client and contractor to have a fair and open collaboration in which both can optimally use their competencies. The effectiveness of integrated collaboration is also determined by the client’s capacity and strategy to organize innovative tendering procedures.A new challenge emerges in case of positioning an architect in a partnership with the contractor instead of with the client. In case of the architect enters a partnership with the contractor, an important issues is how to ensure the realisation of the architectural values as well as innovative engineering through an efficient construction process. In another case, the architect can stand at the client’s side in a strategic advisory role instead of being the designer. In this case, the architect’s responsibility is translating client’s requirements and wishes into the architectural values to be included in the design specification, and evaluating the contractor’s proposal against this. In any of this new role, the architect holds the responsibilities as stakeholder interest facilitator, custodian of customer value and custodian of design models.The transition from traditional to integrated procurement method also brings consequences in the payment schemes. In the traditional building process, the honorarium for the architect is usually based on a percentage of the project costs; this may simply mean that the more expensive the building is, the higher the honorarium will be. The engineer receives the honorarium based on the complexity of the design and the intensity of the assignment. A highly complex building, which takes a number of redesigns, is usually favourable for the engineers in terms of honorarium. A traditional contractor usually receives the commission based on the tender to construct the building at the lowest price by meeting the minimum specifications given by the client. Extra work due to modifications is charged separately to the client. After the delivery, the contractor is no longer responsible for the long-term use of the building. In the traditional procurement method, all risks are placed with the client.In integrated procurement method, the payment is based on the achieved building performance; thus, the payment is non-adversarial. Since the architect, engineer and contractor have a wider responsibility on the quality of the design and the building, the payment is linked to a measurement system of the functional and technical performance of the building over a certain period of time. The honorarium becomes an incentive to achieve the optimal quality. If the building actors succeed to deliver a higher added-value thatexceed the minimum client’s requirements, they will receive a bonus in accordance to the client’s extra gain. The level of transparency is also improved. Open book accounting is an excellent instrument provided that the stakeholders agree on the information to be shared and to its level of detail (InPro, 2009).Next to the adoption of integrated procurement method, the new real estate strategy for hospital building projects addresses an innovative product development and life-cycle design approaches. A sustainable business case for the investment and exploitation of hospital buildings relies on dynamic life-cycle management that includes considerations and analysis of the market development over time next to the building life-cycle costs (investment/initial cost, operational cost, and logistic cost). Compared to the conventional life-cycle costing method, the dynamic life-cycle management encompasses a shift from focusing only on minimizing the costs to focusing on maximizing the total benefit that can be gained. One of the determining factors for a successful implementation of dynamic life-cycle management is the sustainable design of the building and building components, which means that the design carries sufficient flexibility to accommodate possible changes in the long term (Prins, 1992).Designing based on the principles of life-cycle management affects the role of the architect, as he needs to be well informed about the usage scenarios and related financial arrangements, the changing social and physical environments, and new technologies. Design needs to integrate people activities and business strategies over time. In this context, the architect is required to align the design strategies with the organisational, local and global policies on finance, business operations, health and safety, environment, etc.The combination of process and product innovation, and the changing roles of the building actors can be accommodated by integrated project delivery or IPD (AIA California Council, 2007). IPD is an approach that integrates people, systems, business structures and practices into a process that collaboratively harnesses the talents and insights of all participants to reduce waste and optimize efficiency through all phases of design, fabrication and construction. IPD principles can be applied to a variety of contractual arrangements. IPD teams will usually include members well beyond the basic triad of client, architect, and contractor. At a minimum, though, an Integrated Project should include a tight collaboration between the client, the architect, and the main contractor ultimately responsible for construction of the project, from the early design until the project handover. The key to a successful IPD is assembling a team that is committed to collaborative processes and is capable of working together effectively. IPD is built on collaboration. As a result, it can only be successful if the participants share and apply common values and goals.3. Changing roles through BIM applicationBuilding information model (BIM) comprises ICT frameworks and tools that can support the integrated collaboration based on life-cycle design approach. BIM is a digital representation of physical and functional characteristics of a facility. As such it serves as a shared knowledge resource for information about a facility forming a reliable basis for decisions during its lifecycle from inception onward (National Institute of Building Sciences NIBS, 2007). BIM facilitates time and place independent collaborative working. A basic premise of BIM is collaboration by different stakeholders at different phases of the life cycle of a facility to insert, extract, update or modify information in the BIM to support and reflect the roles of that stakeholder. BIM in its ultimate form, as a shared digital representation founded on open standards for interoperability, can become a virtual information model to be handed from the design team to the contractor and subcontractors and then to the client.BIM is not the same as the earlier known computer aided design (CAD). BIM goes further than an application to generate digital (2D or 3D) drawings. BIM is an integrated model in which all process and product information is combined, stored, elaborated, and interactively distributed to all relevant building actors. As a central model for all involved actors throughout the project lifecycle, BIM develops andevolves as the project progresses. Using BIM, the proposed design and engineering solutions can be measured against the client’s requirements and expected building performance. The functionalities of BIM to support the design process extend to multidimensional (nD), including: three-dimensional visualisation and detailing, clash detection, material schedule, planning, cost estimate, production and logistic information, and as-built documents. During the construction process, BIM can support the communication between the building site, the factory and the design office– which is crucial for an effective and efficient prefabrication and assembly processes as well as to prevent or solve problems related to unforeseen errors or modifications. When the building is in use, BIM can be used in combination with the intelligent building systems to provide and maintain up-to-date information of the building performance, including the life-cycle cost.To unleash the full potential of more efficient information exchange in the AEC/FM industry in collaborative working using BIM, both high quality open international standards and high quality implementations of these standards must be in place. The IFC open standard is generally agreed to be of high quality and is widely implemented in software. Unfortunately, the certification process allows poor quality implementations to be certified and essentially renders the certified software useless for any practical usage with IFC. IFC compliant BIM is actually used less than manual drafting for architects and contractors, and show about the same usage for engineers. A recent survey shows that CAD (as a closed-system) is still the major form of technique used in design work (over 60 per cent) while BIM is used in around 20 percent of projects for architects and in around 10 per cent of projects for engineers and contractors.The application of BIM to support an optimal cross-disciplinary and cross-phase collaboration opens a new dimension in the roles and relationships between the building actors. Several most relevant issues are: the new role of a model manager; the agreement on the access right and Intellectual Property Right (IPR); the liability and payment arrangement according to the type of contract and in relation to the integrated procurement; and the use of open international standards.Collaborative working using BIM demands a new expert role of a model manager who possesses ICT as well as construction process know-how (InPro, 2009). The model manager deals with the system as well as with the actors. He provides and maintains technological solutions required for BIM functionalities, manages the information flow, and improves the ICT skills of the stakeholders. The model manager does not take decisions on design and engineering solutions, nor the organisational processes, but his roles in the chain of decision making are focused on:the development of BIM, the definition of the structure and detail level of the model, and the deployment of relevant BIM tools, such as for models checking, merging, and clash detections;the contribution to collaboration methods, especially decision making and communication protocols, task planning, and risk management;and the management of information, in terms of data flow and storage, identification of communication errors, and decision or process (re-)tracking.Regarding the legal and organisational issues, one of the actual questions is: “In what way does the intellectual property right (IPR) in collaborative working using BIM differ from the IPR in a traditional teamwork?”. In terms of combined work, the IPR of each element is at tached to its creator. Although it seems to be a fully integrated design, BIM actually resulted from a combination of works/elements; for instance: the outline of the building design, is created by the architect, the design for the electrical system, is created by the electrical contractor, etc. Thus, in case of BIM as a combined work, the IPR is similar to traditional teamwork. Working with BIM with authorship registration functionalities may actually make it easier to keep track of the IPR.How does collaborative working, using BIM, effect the contractual relationship? On the one hand,collaborative working using BIM does not necessarily change the liability position in the contract nor does it obligate an alliance contract. The General Principles of BIM A ddendum confirms: ‘This does not effectuate or require a restructuring of contractual relationships or shifting of risks between or among the Project Participants other than as specifically required per the Protocol Addendum and its Attachments’ (ConsensusDOCS, 2008). On the other hand, changes in terms of payment schemes can be anticipated. Collaborative processes using BIM will lead to the shifting of activities from to the early design phase. Much, if not all, activities in the detailed engineering and specification phase will be done in the earlier phases. It means that significant payment for the engineering phase, which may count up to 40 per cent of the design cost, can no longer be expected. As engineering work is done concurrently with the design, a new proportion of the payment in the early design phase is necessary.4. Review of ongoing hospital building projects using BIMIn The Netherlands, the changing roles in hospital building projects are part of the strategy, which aims at achieving a sustainable real estate in response to the changing healthcare policy. Referring to literature and previous research, the main factors that influence the success of the changing roles can be concluded as: the implementation of an integrated procurement method and a life-cycle design approach for a sustainable collaborative process; the agreement on the BIM structure and the intellectual rights; and the integration of the role of a model manager. The preceding sections have discussed the conceptual thinking on how to deal with these factors effectively. This current section observes two actual projects and compares the actual practice with the conceptual view respectively.The main issues, which are observed in the case studies, are:the selected procurement method and the roles of the involved parties within this method;the implementation of the life-cycle design approach;the type, structure, and functionalities of BIM used in the project;the openness in data sharing and transfer of the model, and the intended use of BIM in the future; and the roles and tasks of the model manager.The pilot experience of hospital building projects using BIM in the Netherlands can be observed at University Medical Centre St Radboud (further referred as UMC) and Maxima Medical Centre (further referred as MMC). At UMC, the new building project for the Faculty of Dentistry in the city of Nijmegen has been dedicated as a BIM pilot project. At MMC, BIM is used in designing new buildings for Medical Simulation and Mother-and-Child Centre in the city of Veldhoven.The first case is a project at the University Medical Centre (UMC) St Radboud. UMC is more than just a hospital. UMC combines medical services, education and research. More than 8500 staff and 3000 students work at UMC. As a part of the innovative real estate strategy, UMC has considered to use BIM for its building projects. The new development of the Faculty of Dentistry and the surrounding buildings on the Kapittelweg in Nijmegen has been chosen as a pilot project to gather practical knowledge and experience on collaborative processes with BIM support.The main ambition to be achieved through the use of BIM in the building projects at UMC can be summarised as follows:using 3D visualisation to enhance the coordination and communication among the building actors, and the user participation in design;integrating the architectural design with structural analysis, energy analysis, cost estimation, and planning;interactively evaluating the design solutions against the programme of requirements and specifications;reducing redesign/remake costs through clash detection during the design process; andoptimising the management of the facility through the registration of medical installations andequipments, fixed and flexible furniture, product and output specifications, and operational data.The second case is a project at the Maxima Medical Centre (MMC). MMC is a large hospital resulted from a merger between the Diaconessenhuis in Eindhoven and St Joseph Hospital in Veldhoven. Annually the 3,400 staff of MMC provides medical services to more than 450,000 visitors and patients. A large-scaled extension project of the hospital in Veldhoven is a part of its real estate strategy. A medical simulation centre and a women-and-children medical centre are among the most important new facilities within this extension project. The design has been developed using 3D modelling with several functionalities of BIM.The findings from both cases and the analysis are as follows. Both UMC and MMC opted for a traditional procurement method in which the client directly contracted an architect, a structural engineer, and a mechanical, electrical and plumbing (MEP) consultant in the design team. Once the design and detailed specifications are finished, a tender procedure will follow to select a contractor. Despite the choice for this traditional method, many attempts have been made for a closer and more effective multidisciplinary collaboration. UMC dedicated a relatively long preparation phase with the architect, structural engineer and MEP consultant before the design commenced. This preparation phase was aimed at creating a common vision on the optimal way for collaboration using BIM as an ICT support. Some results of this preparation phase are: a document that defines the common ambition for the project and the collaborative working process and a semi-formal agreement that states the commitment of the building actors for collaboration. Other than UMC, MMC selected an architecture firm with an in-house engineering department. Thus, the collaboration between the architect and structural engineer can take place within the same firm using the same software application.Regarding the life-cycle design approach, the main attention is given on life-cycle costs, maintenance needs, and facility management. Using BIM, both hospitals intend to get a much better insight in these aspects over the life-cycle period. The life-cycle sustainability criteria are included in the assignments for the design teams. Multidisciplinary designers and engineers are asked to collaborate more closely and to interact with the end-users to address life-cycle requirements. However, ensuring the building actors to engage in an integrated collaboration to generate sustainable design solutions that meet the life-cycle performance expectations is still difficult. These actors are contracted through a traditional procurement method. Their tasks are specific, their involvement is rather short-term in a certain project phase, their responsibilities and liabilities are limited, and there is no tangible incentive for integrated collaboration.From the current progress of both projects, it can be observed that the type and structure of BIM relies heavily on the choice for BIM software applications. Revit Architecture and Revit Structure by Autodesk are selected based on the argument that it has been widely used internationally and it is compatible with AutoCAD, a widely known product of the same software manufacturer. The compatibility with AutoCAD is a key consideration at MMC since the drawings of the existing buildings were created with this application. These 2D drawings were then used as the basis to generate a 3D model with the BIM software application. The architectural model generated with Revit Architecture and the structural model generated by Revit Structure can be linked directly. In case of a change in the architectural model, a message will be sent to the structural engineer. He can then adjust the structural model, or propose a change in return to the architect, so that the structural model is always consistent with the architectural one.Despite the attempt of the design team to agree on using the same software application, the MEP consultant is still not capable to use Revit; and therefore, a conversion of the model from and to Revit is still required. Another weakness of this “closed approach”, which is dependent to the use of the same software applications, may appear in the near future when the project further progresses into the construction phase. If the contractor uses another software application, considerable extra work will be needed to make the model creted during the design phase to be compatible for use in the construction phase.。

毕业论文外文翻译

毕业论文外文翻译

毕业论文外文翻译Title: The Influence of Technological Advancements on Education Abstract:This paper explores the impact of technological advancements on education. With the rapid development of technology, its introduction into education has revolutionized the way knowledge is acquired and shared. The benefits of technology integration in education include improving learning outcomes, enhancing access to education, and fostering collaboration and communication. On the other hand, potential challenges such as inequality in access to technology and the risk of replacing traditional teaching methods with digital tools are also discussed. To address these challenges, the paper proposes recommendations and strategies for effectively using technology in education. It concludes that while technology has the potential to significantly enhance education, careful planning, teacher training, and continuous evaluation are crucial to ensure its successful integration.1. IntroductionEducation is the foundation of personal and societal development. Over the years, technological advancements have played a significant role in transforming various sectors, including education. The integration of technology in education has opened up new possibilities for teaching and learning.2. Benefits of Technological Integration in Education2.1 Improved Learning OutcomesTechnology has the potential to enhance learning outcomes by providing personalized and engaging learning experiences.Interactive multimedia resources, such as videos, simulations, and virtual reality, can make complex concepts more accessible and understandable for students. Additionally, learning management systems and online platforms enable students to access educational materials anytime and anywhere, facilitating self-paced learning. 2.2 Enhanced Access to EducationTechnology has greatly expanded access to education, especially in remote and underserved areas. Online courses, virtual classrooms, and open educational resources have democratized education, allowing individuals to overcome geographical barriers and access learning opportunities that were previously unavailable. Furthermore, technology has created opportunities for lifelong learning, making education more accessible to adults and professionals.2.3 Collaboration and CommunicationTechnology enables collaboration and communication among students, teachers, and experts from different locations. Online discussion forums, video conferencing, and collaborative tools promote active participation, peer learning, and knowledge sharing. These digital platforms also facilitate communication between teachers and students, providing instant feedback and support outside of the traditional classroom settings.3. Challenges and ConcernsDespite the numerous benefits, there are challenges and concerns associated with technology integration in education.3.1 Inequality in Access to TechnologyThe digital divide creates unequal access to technology, making it difficult for some students to fully benefit from technology in their educational journey. Limited access to devices, stable internet connection, and technology literacy are major barriers that need to be addressed to ensure equal opportunities for all learners.3.2 Potential Over-reliance on TechnologyThere is a risk of over-reliance on technology, leading to the exclusion of effective traditional teaching methods or neglecting essential skills, such as critical thinking and problem-solving. It is important to strike a balance between technology use and traditional teaching approaches, ensuring that technology complements and enhances, rather than replaces, the core aspects of education.4. Recommendations and StrategiesTo harness the potential of technology in education, it is important to consider the following recommendations and strategies:4.1 Infrastructure and AccessEfforts should be made to bridge the digital divide by providing infrastructure, such as devices and internet connectivity, to underserved communities. Schools and educational institutions should prioritize equal access to technology and ensure that students have the necessary skills to utilize it effectively.4.2 Teacher Training and Professional DevelopmentTeachers play a critical role in integrating technology into the curriculum. Adequate training and professional development programs are essential to equip teachers with the skills andknowledge to effectively use technology for teaching and learning purposes. Continuous support and opportunities for collaboration and sharing of best practices should be provided.4.3 Continuous Evaluation and AdaptationRegular evaluation and feedback mechanisms should be in place to assess the impact of technology integration on learning outcomes. This will help identify areas for improvement and adapt teaching practices accordingly. Continuous evaluation will also ensure that the integration of technology remains aligned with educational goals and objectives.5. ConclusionTechnology has the potential to reshape education in unprecedented ways. This paper has highlighted the benefits and challenges of technology integration in education. It is essential to recognize that technology is a tool, not a substitute for quality teaching and learning. Strategic planning, teacher training, and evaluation are necessary to ensure technology's effective integration into education, thus harnessing its full potential to improve learning outcomes, enhance access to education, and foster collaboration and communication.。

毕业设计论文翻译(译文+原文)

毕业设计论文翻译(译文+原文)

Hacking tricks toward security on network environments Tzer-Shyong Chen1, Fuh-Gwo Jeng 2, and Yu-Chia Liu 11 Department of Information Management, Tunghai University, Taiwan2 Department of Applied Mathematics, National Chiayi University, TaiwanE-Mail:****************.edu.twAbstractMounting popularity of the Internet has led to the birth of Instant Messaging, an up-and-coming form of Internet communication. Instant Messaging is very popular with businesses and individuals since it has instant communication ability. As a result, Internet security has become a pressing and important topic for discussion. Therefore, in recent years, a lot of attention has been drawn towards Internet security and the various attacks carried out by hackers over the Internet. People today often handle affairs via the Internet. For instance, instead of the conventional letter, they communicate with others by e-mails; they chat with friends through an instant messenger; find information by browsing websites instead of going to the library; perform e-commerce transactions through the Internet, etc. Although the convenience of the Internet makes our life easier, it is also a threat to Internet security. For instance, a business email intercepted during its transmission may let slip business confidentiality; file transfers via instant messengers may also be intercepted, and then implanted with backdoor malwares; conversations via instant messengers could be eavesdropped. Furthermore, ID and password theft may lose us money when using Internet bank service. Attackers on the Internet use hacking tricks to damage systems while users are connected to the Internet. These threats along with possible careless disclosure of business information make Instant Messaging a very unsafe method of communication for businesses. The paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing or fraud via e-mails. (3) Fake Websites. Keywords:Hacking tricks, Trojan programs, Phishing, Firewall, Intrusion detection system.1. IntroductionIncreasingly more people are using instant messengers such as MSN Messenger, Yahoo! Messenger, ICQ, etc as the media of communication. These instant messengers transmit alphanumeric message as well as permit file sharing. During transfer, a file may be intercepted by a hacker and implanted with backdoor malware. Moreover, the e-mails users receive every day may include Spam, advertisements, and fraudulent mail intended to trick uninformed users. Fake websites too are prevalent. Websites which we often visit could be counterfeited by imitating the interface and the URL of the original, tricking users. The paper classifies hacking tricks into three categories which are explained in the following sections.2. Hacking TricksThe paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing (3) Fake Websites.2.1 Trojan programs that share files via instant messengerInstant messaging allows file-sharing on a computer [9]. All present popular instant messengers have file sharing abilities, or allow users to have the above functionality by installing patches or plug-ins; this is also a major threat to present information security. These communication softwares also makeit difficult for existing hack prevention methods to prevent and control information security. Therefore, we shall discuss how to control the flow of instant messages and how to identify dangerous user behavior.Hackers use instant communication capability to plant Trojan program into an unsuspected program; the planted program is a kind of remotely controlled hacking tool that can conceal itself and is unauthorized. The Trojan program is unknowingly executed, controlling the infected computer; it can read, delete, move and execute any file on the computer. The advantages of a hacker replacing remotely installed backdoor Trojan programs [1] with instant messengers to access files are:When the victim gets online, the hacker will be informed. Thus, a hacker can track and access the infected computer, and incessantly steal user information.A hacker need not open a new port to perform transmissions; he can perform his operations through the already opened instant messenger port.Even if a computer uses dynamic IP addresses, its screen name doesn’t change.Certain Trojan programs are designed especially for instant messengers. These Trojans can change group settings and share all files on the hard disk of the infected computer. They can also destroy or modify data, causing data disarray. This kind of program allows a hacker access to all files on an infected computer, and thus poses a great threat to users. The Trojan program takes up a large amount of the resources of the computer causing it to become very slow and often crashes without a reason.Trojan programs that access a user computer through an instant messenger are probably harder to detect than classic Trojan horse programs. Although classic Trojan intrudes a computer by opening a listening or outgoing port which is used to connect toa remote computer, a desktop firewall can effectively block such Trojans. Alternatively, since it is very difficult for the server’s firewall to spot intrusion by controlling an instant messenger’s flow, it is extremely susceptible to intrusion.Present Trojan programs have already successfully implemented instant messengers. Some Trojan programs are Backdoor Trojan, AIMVision, and Backdoor. Sparta.C. Backdoor Trojans use ICQ pager to send messages to its writer. AIMVision steals AIM related information stored in the Windows registry, enabling a hacker to setup an AIM user id. Backdoor. Sparta.C uses ICQ to communicate with its writer and opens a port on an infected host and send its IP Address to the hacker, and at the same time attempts to terminate the antivirus program or firewall of the host.2.1.1 Hijacking and ImpersonationThere are various ways through which a hacker can impersonate other users [7]. The most commonly used method is eavesdropping on unsuspecting users to retrieve user accounts, passwords and other user related information.The theft of user account number and related information is a very serious problem in any instant messenger. For instance, a hacker after stealing a user’s information impersonate the user; the user’s contacts not knowing that the user’s account has been hacked believe that the person they’re talking to is the user, and are persuaded to execute certain programs or reveal confidential information. Hence, theft of user identity not only endangers a user but also surrounding users. Guarding against Internet security problems is presently the focus of future research; because without good protection, a computer can be easily attacked, causing major losses.Hackers wishing to obtain user accounts may do so with the help of Trojans designed to steal passwords. If an instant messenger client stores his/her password on his/her computer, then a hacker can send a Trojan program to the unsuspecting user. When the user executes the program, the program shall search for the user’s password and send it to the hacker. There are several ways through which a Trojan program can send messages back to the hacker. The methods include instant messenger, IRC, e-mails, etc.Current four most popular instant messengers are AIM, Yahoo! Messenger, ICQ, and MSN Messenger, none of which encrypts its flow. Therefore, a hackercan use a man-in-the-middle attack to hijack a connection, then impersonate the hijacked user and participate in a chat-session. Although difficult, a hacker can use the man-in-the-middle attack to hijack the connection entirely. For example, a user may receive an offline message that resembles that sent by the server, but this message could have been sent by the hacker. All at once, the user could also get disconnected to the server. Furthermore, hackers may also use a Denial of Service (DoS) tool or other unrelated exploits to break the user’s connection. However, the server keeps the connection open, and does not know that the user has been disconnected; thus allowing the hacker to impersonate the user. Moreover, since the data flow is unencrypted and unauthenticated, a hacker can use man-in-the-middle attacks that are similar to that of ARP fraud to achieve its purpose.2.1.2 Denial of Service (DoS)There are many ways through which a hacker can launch a denial of service (DoS) attack [2] on an instant messenger user. A Partial DoS attack will cause a user end to hang, or use up a large portion of CPU resources causing the system to become unstable.Another commonly seen attack is the flooding of messages to a particular user. Most instant messengers allow the blocking of a particular user to prevent flood attacks. However, a hacker can use tools that allow him to log in using several different identities at the same time, or automatically create a large number of new user ids, thus enabling a flood attack. Once a flood attack begins, even if the user realizes that his/her computer has been infected, the computer will not be able to respond. Thus, the problem cannot be solved by putting a hacker’s user id on the ignore list of your instant messenger.A DoS attack on an instant messenger client is only a common hacking tool. The difficulty of taking precautions against it could turn this hacking tool into dangerous DoS type attacks. Moreover, some hacking tools do not just cause an instant messenger client to hang, but also cause the user end to consume large amount of CPU time, causing the computer to crash.2.1.3 Information DisclosureRetrieving system information through instant messenger users is currently the most commonly used hacking tool [4]. It can effortlessly collect user network information like, current IP, port, etc. IP address retriever is an example. IP address retrievers can be used to many purposes; for instance, a Trojan when integrated with an IP address retriever allows a hacker to receive all information related to the infected computer’s IP address as soon as the infected computer connects to the internet. Therefore, even if the user uses a dynamic IP address, hackers can still retrieve the IP address.IP address retrievers and other similar tools can also be used by hackers to send data and Trojans to unsuspecting users. Hackers may also persuade unsuspecting users to execute files through social engineering or other unrelated exploits. These files when executed search for information on the user’s computer and sends them back to the hacker through the instant messenger network.Different Trojan programs were designed for different instant messaging clients. For example, with a user accounts and password stealing Trojans a hacker can have full control of the account once the user logs out. The hacker can thus perform various tasks like changing the password and sending the Trojan program to all of the user’s contacts.Moreover, Trojans is not the only way through which a hacker can cause information disclosure. Since data sent through instant messengers are unencrypted, hackers can sniff and monitor entire instant messaging transmissions. Suppose an employee of an enterprise sends confidential information of the enterprise through the instant messenger; a hacker monitoring the instant messaging session can retrieve the data sent by the enterprise employee. Thus, we must face up to the severity of the problem.2.2 PhishingThe word “Phishing” first appeared in 1996. It is a variant of ‘fishing’, and formed by replacing the ‘f’ in ‘fishing’ with ‘ph’ from phone. It means tricking users of their money through e-mails.Based on the statistics of the Internet Crime Complaint Center, loss due to internet scam was as high as $1.256 million USD in 2004. The Internet Crime Complaint Center has listed the above Nigerian internet scam as one of the ten major internet scams.Based on the latest report of Anti-Phishing Working Group (APWG) [8], there has been a 28% growth of Phishing scams in the past 4 months, mostly in the US and in Asia. Through social engineering and Trojans, it is very difficult for a common user to detect the infection.To avoid exploitation of your compassion, the following should be noted:(1)When you need to enter confidentialinformation, first make sure that theinformation is entered via an entirely secureand official webpage. There are two ways todetermine the security of the webpage:a.The address displayed on the browserbegins with https://, and not http://. Payattention to if the letter ‘s’ exists.b.There is a security lock sign on the lowerright corner of the webpage, and whenyour mouse points to the sign, a securitycertification sign shall appear.(2)Consider installing a browser security softwarelike SpoofStick which can detect fake websites.(3)If you suspect the received e-mail is a Phishinge-mail, do not open attachments attached to theemail. Opening an unknown attachment couldinstall malicious programs onto your computer.(4)Do not click on links attached to your emails. Itis always safer to visit the website through theofficial link or to first confirm the authenticityof the link. Never follow or click on suspiciouslinks in an e-mail. It is advisable to enter theURL at the address bar of the web browser,and not follow the given link.Generally speaking, Phishing [3] [5] is a method that exploits people’s sympathy in the form of aid-seeking e-mails; the e-mail act as bait. These e-mails usually request their readers to visit a link that seemingly links to some charitable organization’s website; but in truth links the readers to a website that will install a Trojan program into the reader’s computer. Therefore, users should not forward unauthenticated charity mails, or click on unfamiliar links in an e-mail. Sometimes, the link could be a very familiar link or an often frequented website, but still, it would be safer if you’d type in the address yourself so as to avoid being linked to a fraudulent website. Phisher deludes people by using similar e-mails mailed by well-known enterprises or banks; these e-mails often asks users to provide personal information, or result in losing their personal rights; they usually contain a counterfeit URL which links to a website where the users can fillin the required information. People are often trapped by phishing due to inattentionBesides, you must also be careful when using a search engine to search for donations and charitable organizations.2.3 Fake WebsitesFake bank websites stealing account numbers and passwords have become increasingly common with the growth of online financial transactions. Hence, when using online banking, we should take precautions like using a secure encrypted customer’s certificate, surf the net following the correct procedure, etc.There are countless kinds of phishing baits, for instance, messages that say data expired, data invalid, please update data, or identity verification intended to steal account ID and matching password. This typeof online scam is difficult for users to identify. As scam methods become finer, e-mails and forged websites created by the impostor resemble their original, and tremendous losses arise from the illegal transactions.The following are methods commonly used by fake websites. First, the scammers create a similar website homepage; then they send out e-mails withenticing messages to attract visitors. They may also use fake links to link internet surfers to their website. Next, the fake website tricks the visitors into entering their personal information, credit card information or online banking account number and passwords. After obtaining a user’s information, the scammers can use the information to drain the bank accounts, shop online or create fake credit cards and other similar crimes. Usually, there will be a quick search option on these fake websites, luring users to enter their account number and password. When a user enters their account number and password, the website will respond with a message stating that the server is under maintenance. Hence, we must observe the following when using online banking:(1)Observe the correct procedure for entering abanking website. Do not use links resultingfrom searches or links on other websites.(2)Online banking certifications are currently themost effective security safeguard measure. (3)Do not easily trust e-mails, phone calls, andshort messages, etc. that asks for your accountnumber and passwords.Phishers often impost a well-known enterprise while sending their e-mails, by changing the sender’s e-mail address to that of the well known enterprise, in order to gain people’s trust. The ‘From’ column of an e-mail is set by the mail software and can be easily changed by the web administrator. Then, the Phisher creates a fake information input website, and send out e-mails containing a link to this fake website to lure e-mail recipients into visiting his fake website.Most Phishers create imitations of well known enterprises websites to lure users into using their fake websites. Even so, a user can easily notice that the URL of the website they’re entering has no relation to the intended enterprise. Hence, Phishers may use different methods to impersonate enterprises and other people. A commonly used method is hiding the URL. This can easily be done with the help of JavaScript.Another way is to exploit the loopholes in an internet browser, for instance, displaying a fake URL in the browser’s address bar. The security loophole causing the address bar of a browser to display a fake URL is a commonly used trick and has often been used in the past. For example, an e-mail in HTML format may hold the URL of a website of a well-known enterprise, but in reality, the link connects to a fake website.The key to successfully use a URL similar to that of the intended website is to trick the visual senses. For example, the sender’s address could be disguised as that of Nikkei BP, and the link set to http://www.nikeibp.co.jp/ which has one k less than the correct URL which is http://www.nikkeibp.co.jp/. The two URLs look very similar, and the difference barely noticeable. Hence people are easily tricked into clicking the link.Besides the above, there are many more scams that exploit the trickery of visual senses. Therefore, you should not easily trust the given sender’s name and a website’s appearance. Never click on unfamiliar and suspicious URLs on a webpage. Also, never enter personal information into a website without careful scrutiny.3. ConclusionsBusiness strategy is the most effective form of defense and also the easiest to carry out. Therefore, they should be the first line of defense, and not last. First, determine if instant messaging is essential in the business; then weigh its pros and cons. Rules and norms must be set on user ends if it is decided that the business cannot do without instant messaging functionality. The end server should be able to support functions like centralized logging and encryption. If not, then strict rules must be drawn, and carried out by the users. Especially, business discussions must not be done over an instant messenger.The paper categorized hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing (3) Fake Websites. Hacking tricks when successfully carried out could cause considerable loss and damage to users. The first category of hacking tricks can be divided into three types: (1) Hijacking and Impersonation; (2) Denial of Service; (3) Information Disclosure.Acknowledgement:This work was supported by the National Science Council, Taiwan, under contract No. NSC 95-2221-E-029-024.References[1] B. Schneier, “The trojan horse race,”Communications of ACM, Vol. 42, 1999, pp.128.[2] C. L. Schuba, “Analysis of a denial of serviceattack on TCP,” IEEE Security and PrivacyConference, 1997, pp. 208-223.[3] E. Schultz, “Phishing is becoming moresophisticated,” Computer and Security, Vol.24(3), 2005, pp. 184-185.[4]G. Miklau, D. Suciu, “A formal analysis ofinformation disclosure in data exchange,”International Conference on Management ofData, 2004, pp. 575-586.[5]J. Hoyle, “'Phishing' for trouble,” Journal ofthe American Detal Association, Vol. 134(9),2003, pp. 1182-1182.[6]J. Scambray, S. McClure, G. Kurtz, Hackingexposed: network security secrets and solutions,McGraw-Hill, 2001.[7]T. Tsuji and A. Shimizu, “An impersonationattack on one-time password authenticationprotocol OSPA,” to appear in IEICE Trans.Commun, Vol. E86-B, No.7, 2003.[8]Anti-Phishing Working Group,.[9]/region/tw/enterprise/article/icq_threat.html.有关网络环境安全的黑客技术摘要:现在人们往往通过互联网处理事务。

毕业设计论文化学系毕业论文外文文献翻译中英文

毕业设计论文化学系毕业论文外文文献翻译中英文

毕业设计论文化学系毕业论文外文文献翻译中英文英文文献及翻译A chemical compound that is contained in the hands of the problemsfor exampleCatalytic asymmetric carbon-carbon bond formation is one of the most active research areas in organic synthesis In this field the application of chiral ligands in enantioselective addition of diethylzinc to aldehydes has attracted much attention lots of ligands such as chiral amino alcohols amino thiols piperazines quaternary ammonium salts 12-diols oxazaborolidines and transition metal complex with chiral ligands have been empolyed in the asymmetric addition of diethylzinc to aldehydes In this dissertation we report some new chiral ligands and their application in enantioselective addition of diethylzinc to aldehydes1 Synthesis and application of chiral ligands containing sulfur atomSeveral a-hydroxy acids were prepared using the literature method with modifications from the corresponding amino acids valine leucine and phenylalanine Improved yields were obtained by slowly simultaneous addition of three fold excess of sodium nitrite and 1 tnolL H2SO4 In the preparation of a-hydroxy acid methyl esters from a-hydroxy acids following the procedure described by Vigneron a low yield 45 was obtained It was found that much better results yield 82 couldbe obtained by esterifying a-hydroxy acids with methanol-thionyl chlorideThe first attempt to convert S -2-hydroxy-3-methylbutanoic acid methyl ester to the corresponding R-11-diphenyl-2-mercapto-3-methyl-l-butanol is as the following S-2-Hydroxy-3-methylbutanoic acid methyl ester was treated with excess of phenylmagnesium bromide to give S -11-diphenyl-3-methyl-12-butanediol which was then mesylated to obtain S -11-diphenyl-3-methyl-2-methanesulfonyloxy -l-butanol Unfortunately conversion of S-11-diphenyl-3-methyl-2- methanesulfonyloxy -l-butanol to the corresponding thioester by reacting with potassium thioacetate under Sn2 reaction conditions can be achieved neither in DMF at 20-60 nor in refluxing toluene in the presence of 18-crown-6 as catalyst When S -1ll-diphenyl-3-methyl-2- methane sulfonyloxy -l-butanol was refluxed with thioacetic acid in pyridine an optical active epoxide R-22-diphenyl -3-isopropyloxirane was obtained Then we tried to convert S -11-diphenyl-3-methyl-l2-butanediol to the thioester by reacting with PPh3 DEAD and thioacetic acid the Mitsunobu reaction but we failed either probably due to the steric hindrance around the reaction centerThe actually successful synthesis is as described below a-hydroxy acid methyl esters was mesylated and treated with KSCOCH3 in DMF to give thioester this was than treated with phenyl magnesium bromide to gave the target compound B-mercaptoalcohols The enantiomeric excesses ofp-mercaptoalcohols can be determined by 1H NMR as their S -mandeloyl derivatives S -2-amino-3-phenylpropane-l-thiol hydrochloride was synthesized from L-Phenylalanine L-Phenylalanine was reduced to the amino alcohol S -2-amino-3-phenylpropanol Protection of the amino group using tert-butyl pyrocarbonate gave S -2-tert-butoxycarbonylamino-3-phenylpropane-l-ol which was then O-mesylated to give S -2-tert-butoxycarbonylamino-3-phenylpropyl methanesulfonate The mesylate was treated with potassium thioacetate in DMF to give l-acetylthio-2-tert-butoxycarbonylamino-3-phenylpropane The acetyl group was then removed by treating with ammonia in alcohol to gave S -2-tert-butoxycarbonylamino-3-phenyl-propane-l-thiol which was then deprotected with hydrochloric acid to give the desired S-2-amino-3-phenylpropane-1-thiol hydrochlorideThe enantioselective addition of diethylzinc to aldehydes promoted by these sulfur containing chiral ligands produce secondary alcohols in 65-79 Synthesis and application of chiral aminophenolsThree substituted prolinols were prepared from the naturally-occurring L-proline using reported method with modifications And the chiral aminophenols were obtained by heating these prolinols with excess of salicylaldehyde in benzene at refluxThe results of enantioselective adBelow us an illustration forexampleN-Heterocyclic carbenes and L-Azetidine-2-carboxylicacidN-Heterocyclic carbenesN-Heterocyclic carbenes have becomeuniversal ligands in organometallic and inorganic coordination chemistry They not only bind to any transition metal with low or high oxidation states but also to main group elements such as beryllium sulfur and iodine Because of their specific coordination chemistry N-heterocyclic carbenes both stabilize and activate metal centers in quite different key catalytic steps of organic syntheses for example C-H activation C-C C-H C-O and C-N bond formation There is now ample evidence that in the new generation of organometallic catalysts the established ligand class of organophosphanes will be supplemented and in part replaced byN-heterocyclic carbenes Over the past few years this chemistry has become the field of vivid scientific competition and yielded previously unexpected successes in key areas of homogeneous catalysis From the work in numerous academic laboratories and in industry a revolutionary turningpoint in oraganometallic catalysis is emergingIn this thesis Palladium Ⅱ acetate and NN"-bis- 26-diisopropylphenyl dihydro- imidazolium chloride 1 2 mol were used to catalyze the carbonylative coupling of aryl diazonium tetrafluoroborate salts and aryl boronic acids to form aryl ketones Optimal conditions include carbon monoxide 1 atm in 14-dioxane at 100℃ for 5 h Yields for unsymmetrical aryl ketones ranged from 76 to 90 for isolated materials with only minor amounts of biaryl coupling product observed 2-12 THF as solvent gave mixtures of products 14-Dioxane proved to be the superior solvent giving higher yieldsof ketone product together with less biphenyl formation At room temperature and at 0℃ with 1 atm CO biphenyl became the major product Electron-rich diazonium ion substrates gave a reduced yield with increased production of biaryl product Electron-deficient diazonium ions were even better forming ketones in higher yields with less biaryl by-product formed 2-Naphthyldiazonium salt also proved to be an effective substrate givingketones in the excellent range Base on above palladium NHC catalysts aryl diazonium tetrafluoroborates have been coupled with arylboron compounds carbon monoxide and ammonia to give aryl amides in high yields A saturated yV-heterocyclic carbene NHC ligand H2lPr 1 was used with palladium II acetate to give the active catalyst The optimal conditions with 2mol palladium-NHC catalyst were applied with various organoboron compounds and three aryl diazonium tetrafluoroborates to give numerous aryl amides in high yield using pressurized CO in a THF solution saturated with ammonia Factors that affect the distribution of the reaction products have been identified and a mechanism is proposed for this novel four-component coupling reactionNHC-metal complexes are commonly formed from an imidazolium salt using strong base Deprotonation occurs at C2 to give a stable carbene that adds to form a a-complex with the metal Crystals were obtained from the reaction of imidazolium chloride with sodium t- butoxide Nal and palladium II acetate giving a dimeric palladium II iodide NHC complex The structure adopts a flat 4-memberedring u2 -bridged arrangement as seen in a related dehydro NHC complex formed with base We were pleased to find that chloride treated with palladium II acetate without adding base or halide in THF also produced suitable crystals for X-ray anaysis In contrast to the diiodide the palladium-carbenes are now twisted out of plane adopting a non-planar 4-ring core The borylation of aryldiazonium tetrafluoroborates with bis pinacolatoborane was optimized using various NHC ligand complexes formed in situ without adding base NN"-Bis 26-diisopropylphenyl-45-dihydroimidazolium 1 used with palladium acetate in THF proved optimal giving borylated product in 79 isolated yield without forming of bi-aryl side product With K2CO3 and ligand 1 a significant amount of biaryl product 24 was again seen The characterization of the palladium chloride complex by X-ray chrastallography deL-Azetidine-2-carboxylic acidL-Azetidine-2-carboxylic acid also named S -Azetidine-2-carboxylic acid commonly named L-Aze was first isolated in 1955 by Fowden from Convallaria majalis and was the first known example of naturally occurring azetidine As a constrained amino acid S -Azetidine-2-carboxylic acid has found many applications in the modification of peptides conformations and in the area of asymmetric synthesis which include its use in the asymmetric reduction of ketones Michael additions cyclopropanations and Diels-Alder reactions In this dissertation five ways for synthesize S-Azetidine-2-carboxylic acid were studied After comparing all methods theway using L-Aspartic acid as original material for synthesize S-Azetidine-2-carboxylic acid was considered more feasible All mechanisms of the way"s reaction have also been studied At last the application and foreground of S -Azetidine-2-carboxylic acid were viewed The structures of the synthetic products were characterized by ThermalGravity-Differential Thermal Analysis TG-DTA Infrared Spectroscopy IR Mass Spectra MS and 1H Nuclear Magnetic Resonance 1H-NMR Results showed that the structures and performances of the products conformed to the anticipation the yield of each reaction was more than 70 These can conclude that the way using L-Aspartie acid as original material for synthesize S -Azetidine-2-carboxylic acid is practical and effective杂环化合物生成中包含手性等问题如催化形成不对称碳碳键在有机合成中是一个非常活跃的领域在这个领域中利用手性配体诱导的二乙基锌和醛的不对称加成引起化学家的广泛关注许多手性配体如手性氨基醇手性氨基硫醇手性哌嗪手性四季铵盐手性二醇手性恶唑硼烷和过渡金属与手性配体的配合物等被应用于二乙基锌对醛的不对称加成中在本论文中我们报道了一些新型的手性配体的合成及它们应用于二乙基锌对醛的不对称加成的结果1含硫手性配体的合成和应用首先从氨基酸缬氨酸亮氨酸苯丙氨酸出发按照文献合成α-羟基酸并发现用三倍量的亚硝酸钠和稀硫酸同时滴加进行反应能适当提高反应的产率而根据Vigneron等人报道的的方法用浓盐酸催化从α-羟基酸合成α-羟基酸甲酯时只能获得较低的产率改用甲醇-二氯亚砜的酯化方法时能提高该步骤的产率从 S -3-甲基-2-羟基丁酸甲酯合成 R -3-甲基-11-二苯基-2-巯基-1-丁醇经过了以下的尝试 S -3-甲基-2-羟基丁酸甲酯和过量的格氏试剂反应得到 S -3-甲基-11-二苯基-12-丁二醇进行甲磺酰化时位阻较小的羟基被磺酰化生成 S -3-甲基-11-二苯基-2- 甲磺酰氧基 -1-丁醇但无论将 S -3-甲基-11-二苯基-2- 甲磺酰氧基 -1-丁醇和硫代乙酸钾在DMF中反应 20~60℃还是在甲苯中加入18-冠-6作为催化剂加热回流都不能得到目标产物当其与硫代乙酸在吡啶中回流时得到的不是目标产物而是手性环氧化合物 R -3-异丙基-22-二苯基氧杂环丙烷从化合物 S -3-甲基-11-二苯基-12-丁二醇通过Mitsunobu反应合成硫代酯也未获得成功这可能是由于在反应中心处的位阻较大造成的几奥斯塑手村犯体的合成裁其在不对称奋成中肠左用摘要成功合成疏基醇的合成路是将a-轻基酸甲酷甲磺酞化得到相应的磺酞化产物并进行与硫代乙酸钾的亲核取代反应得到硫酷进行格氏反应后得到目标分子p一疏基醇用p一疏基醇与 R 义一一甲氧基苯乙酞氯生成的非对映体经H侧NM吸测试其甲氧基峰面积的积分求得其ee值 3一苯基一氨基丙硫醇盐酸盐从苯丙氨酸合成斗3一苯基一氨基丙醇由L一苯丙氨酸还原制备氨基保护后得到习一3一苯基一2一叔丁氧拨基氨基一1一丙醇甲磺酞化后得到习一3一苯基一2一叔丁氧拨基氨基一1一丙醇甲磺酸酷用硫代乙酸钾取代后得匀一3-苯基一2一叔丁氧拨基氨基一1一丙硫醇乙酸酷氨解得习一3一苯基一2一叔丁氧拨基氨基一1一丙硫醇用盐酸脱保护后得到目标产物扔3一苯基屯一氨基丙硫醇盐酸盐手性含硫配体诱导下的二乙基锌与醛的加成所得产物的产率为65一79值为O井92手性氨基酚的合成和应用首先从天然的L一脯氨酸从文献报道的步骤合成了三种脯氨醇这些手性氨基醇与水杨醛在苯中回流反应得到手性氨基酚手性氨基酚配体诱导下的二乙基锌与醛的加成所得产物的产率为45一98值为0一90手性二茂铁甲基氨基醇的合成和应用首先从天然氨基酸绿氨酸亮氨酸苯丙氨酸和脯氨酸合成相应的氨基醇这些氨基醇与二茂铁甲醛反应生成的NO一缩醛经硼氢化钠还原得到手性二茂铁甲基氨基醇手性二茂铁甲基氨基醇配体诱导下的二乙基锌与醛的加成所得产物的产率为66一97下面我们举例说明一下例如含氮杂环卡宾和L-氮杂环丁烷-2-羧酸含氮杂环卡宾含氮杂环卡宾已广泛应用于有机金属化学和无机配合物化学领域中它们不仅可以很好地与任何氧化态的过渡金属络合还可以与主族元素铍硫等形成配合物由于含氮杂环卡宾不但使金属中心稳定而且还可以活化此金属中心使其在有机合成中例如C-H键的活化C-CC-HC-O和C-N键形成反应中有着十分重要的催化效能现有的证据充分表明在新一代有机金属催化剂中含氮杂环卡宾不但对有机膦类配体有良好的互补作用而且在有些方面取代有机膦配体成为主角近年来含氮杂环卡宾及其配合物已成为非常活跃的研究领域在均相催化这一重要学科中取得了难以想象的成功所以含氮杂环卡宾在均相有机金属催化领域的研究工作很有必要深入地进行下去本文研究了乙酸钯和NN双 26-二异丙基苯基 -45-二氢咪唑氯化物1作为催化剂催化芳基四氟硼酸重氮盐与芳基硼酸的羰基化反应合成了一系列二芳基酮并对反应条件进行了优化使反应在常温常压下进行一个大气压的一氧化碳14-二氧杂环己烷作溶剂100℃反应5h 不同芳基酮的收率达7690仅有微量的联芳烃付产物 212 反应选择性良好当采用四氢呋喃或甲苯作溶剂时得到含较多副产物的混合物由此可以证明14-二氧杂环己烷是该反应最适宜的溶剂在室温或0℃与一个大气压的一氧化碳反应联芳烃变成主产物含供电子取代基的芳基重氮盐常常给出较低收率的二芳基酮而含吸电子取代基的芳基重氮盐却给出更高收率的二芳基酮及较少量的联芳烃付产物实验证明2-萘基重氮盐具有很好的反应活性和选择性总是得到优异的反应结果在此基础上由不同的芳基四氟硼酸重氮盐与芳基硼酸一氧化碳和氨气协同作用以上述含氮杂环卡宾作配体与乙酸钯生成的高活性含氮杂环卡宾钯催化剂催化较高收率地得到了芳基酰胺优化的反应条件是使用2mol的钯-H_2IPr 1五个大气压的一氧化碳以氨气饱和的四氢呋喃作溶剂由不同的有机硼化合物与三种芳基重氮盐的四组份偶联反应同时不仅对生成的多种产物进行了定 L-氮杂环丁烷-2-羧酸L-氮杂环丁烷-2-羧酸又称 S -氮杂环丁烷-2-羧酸简称为L-Aze1955年由Fowden从植物铃兰 Convallaria majalis 中分离得到成为第一个被证实的植物中天然存在的氮杂环丁烷结构作为一种非典型的氨基酸已经发现 S -氮杂环丁烷-2-羧酸可广泛用于对多肽结构的修饰以及诸如不对称的羰基还原Michael 加成环丙烷化和Diels-Alder反应等不对称合成中的多个领域本文通过对 S -氮杂环丁烷-2-羧酸合成路线的研究综述了五种可行的合成路线及方法通过比较选用以L-天冬氨酸为初始原料合成 S -氮杂环丁烷-2-羧酸的路线即通过酯化反应活泼氢保护格氏反应内酰胺化反应还原反应氨基保护氧化反应脱保护等反应来合成 S -氮杂环丁烷-2-羧酸分析了每步反应的机理并对 S -氮杂环丁烷-2-羧酸的应用及前景给予展望通过热分析红外质谱核磁等分析手段对合成的化合物的结构进行表征结果表明所得的产物符合目标产物所合成的化合物的结构性能指标与设计的目标要求一致每步反应的收率都在70%以上可以判定以L-天冬氨酸为初始原料合成 S -氮杂环丁烷的路线方案切实可行。

毕业设计(论文)外文翻译

毕业设计(论文)外文翻译

华南理工大学广州学院本科生毕业设计(论文)翻译外文原文名Agency Cost under the Restriction of Free Cash Flow中文译名自由现金流量的限制下的代理成本学院管理学院专业班级会计学3班学生姓名陈洁玉学生学号200930191100指导教师余勍讲师填写日期2015年5月11日外文原文版出处:译文成绩:指导教师(导师组长)签名:译文:自由现金流量的限制下的代理成本摘要代理成本理论是资本结构理论的一个重要分支。

自由现金流代理成本有显着的影响。

在这两个领域相结合的研究,将有助于建立和扩大理论体系。

代理成本理论基础上,本研究首先分类自由现金流以及统计方法的特点。

此外,投资自由现金流代理成本的存在证明了模型。

自由现金流代理成本理论引入限制,分析表明,它会改变代理成本,进而将影响代理成本和资本结构之间的关系,最后,都会影响到最优资本结构点,以保持平衡。

具体地说,自由现金流增加,相应地,债务比例会降低。

关键词:资本结构,现金流,代理成本,非金钱利益1、介绍代理成本理论,金融契约理论,信号模型和新的啄食顺序理论,新的资本结构理论的主要分支。

财务con-道的理论侧重于限制股东的合同行为,解决股东和债权人之间的冲突。

信令模式和新的啄食顺序理论中心解决投资者和管理者之间的冲突。

这两种类型的冲突是在商业组织中的主要冲突。

代理成本理论认为,如何达到平衡这两种类型的冲突,资本结构是如何形成的,这是比前两次在一定程度上更多的理论更全面。

……Agency Cost under the Restriction of Free Cash FlowAbstractAgency cost theory is an important branch of capital structural theory. Free cash flow has significant impact on agency cost. The combination of research on these two fields would help to build and extend the theoretical system. Based on agency cost theory, the present study firstly categorized the characteristics of free cash flow as well as the statistical methodologies. Furthermore, the existence of investing free cash flow in agency cost was proved by a model. Then free cash flow was introduced into agency cost theory as restriction, the analysis shows that it will change agency cost, in turn, will have an impact on the relationship between agency cost and capital structure, finally, will influence the optimal capital structure point to maintain the equilibrium. Concretely, with the increasing free cash flow, correspondingly, debt proportion will decrease.Keywords:Capital Structure,Free Cash Flow,Agency Cost,Non-Pecuniary Benefit1. IntroductionAgency cost theory, financial contract theory, signaling model and new pecking order theory are the main branches of new capital structure theory. Financial con-tract theory focuses on restricting stockholders’ behavior by contract and solving the conflict between stockholders and creditors. Signaling model and new pecking order theory center on solving the conflict between investors and managers. These two types of conflict are the main conflict in business organizations. Agency cost theory considers how equilibrium is reached in both types of conflict and how capital structure is formed, which is more theory is more comprehensive than the previous two to some degree.……。

毕业设计论文外文文献翻译智能交通信号灯控制中英文对照

毕业设计论文外文文献翻译智能交通信号灯控制中英文对照

英语原文Intelligent Traffic Light Controlby Marco Wiering The topic I picked for our community project was traffic lights. In a community, people need stop signs and traffic lights to slow down drivers from going too fast. If there were no traffic lights or stop signs, people’s lives would be in danger from drivers going too fast.The urban traffic trends towards the saturation, the rate of increase of the road of big city far lags behind rate of increase of the car.The urban passenger traffic has already become the main part of city traffic day by day and it has used about 80% of the area of road of center district. With the increase of population and industry activity, people's traffic is more and more frequent, which is unavoidable. What means of transportation people adopt produces pressure completely different to city traffic. According to calculating, if it is 1 to adopt the area of road that the public transport needs, bike needs 5-7, car needs 15-25, even to walk is 3 times more than to take public transits. So only by building road can't solve the city traffic problem finally yet. Every large city of the world increases the traffic policy to the first place of the question.For example,according to calculating, when the automobile owning amount of Shanghai reaches 800,000 (outside cars count separately ), if it distributes still as now for example: center district accounts for great proportion, even when several loop-lines and arterial highways have been built up , the traffic cannot be improved more than before and the situation might be even worse. So the traffic policy Shanghai must adopt , or called traffic strategy is that have priority to develop public passenger traffic of city, narrow the scope of using of the bicycle progressively , control the scale of growth of the car traffic in the center district, limit the development of the motorcycle strictly.There are more municipals project under construction in big city. the influence on the traffic is greater.Municipal infrastructure construction is originally a good thing of alleviating the traffic, but in the course of constructing, it unavoidably influence the local traffic. Some road sections are blocked, some change into an one-way lane, thus the vehicle can only take a devious route . The construction makes the road very narrow, forming the bottleneck, which seriously influence the car flow.When having stop signs and traffic lights, people have a tendency to drive slower andlook out for people walking in the middle of streets. To put a traffic light or a stop sign in a community, it takes a lot of work and planning from the community and the city to put one in. It is not cheap to do it either. The community first needs to take a petition around to everyone in the community and have them sign so they can take it to the board when the next city council meeting is. A couple residents will present it to the board, and they will decide weather or not to put it in or not. If not put in a lot of residents might be mad and bad things could happened to that part of the city.When the planning of putting traffic lights and stop signs, you should look at the subdivision plan and figure out where all the buildings and schools are for the protection of students walking and riding home from school. In our plan that we have made, we will need traffic lights next to the school, so people will look out for the students going home. We will need a stop sign next to the park incase kids run out in the street. This will help the protection of the kids having fun. Will need a traffic light separating the mall and the store. This will be the busiest part of the town with people going to the mall and the store. And finally there will need to be a stop sign at the end of the streets so people don’t drive too fast and get in a big accident. If this is down everyone will be safe driving, walking, or riding their bikes.In putting in a traffic light, it takes a lot of planning and money to complete it. A traffic light cost around $40,000 to $125,000 and sometimes more depending on the location. If a business goes in and a traffic light needs to go in, the business or businesses will have to pay some money to pay for it to make sure everyone is safe going from and to that business. Also if there is too many accidents in one particular place in a city, a traffic light will go in to safe people from getting a severe accident and ending their life and maybe someone else’s.The reason I picked this part of our community development report was that traffic is a very important part of a city. If not for traffic lights and stop signs, people’s lives would be in danger every time they walked out their doors. People will be driving extremely fast and people will be hit just trying to have fun with their friends. So having traffic lights and stop signs this will prevent all this from happening.Traffic in a city is very much affected by traffic light controllers. When waiting for a traffic light, the driver looses time and the car uses fuel. Hence, reducing waiting times before traffic lights can save our European society billions of Euros annually. To make traffic light controllers more intelligent, we exploit the emergence of novel technologies such as communication networks and sensor networks, as well as the use of more sophisticated algorithms for setting traffic lights. Intelligent traffic light control does not only mean thattraffic lights are set in order to minimize waiting times of road users, but also that road users receive information about how to drive through a city in order to minimize their waiting times. This means that we are coping with a complex multi-agent system, where communication and coordination play essential roles. Our research has led to a novel system in which traffic light controllers and the behaviour of car drivers are optimized using machine-learning methods.Our idea of setting a traffic light is as follows. Suppose there are a number of cars with their destination address standing before a crossing. All cars communicate to the traffic light their specific place in the queue and their destination address. Now the traffic light has to decide which option (ie, which lanes are to be put on green) is optimal to minimize the long-term average waiting time until all cars have arrived at their destination address. The learning traffic light controllers solve this problem by estimating how long it would take for a car to arrive at its destination address (for which the car may need to pass many different traffic lights) when currently the light would be put on green, and how long it would take if the light would be put on red. The difference between the waiting time for red and the waiting time for green is the gain for the car. Now the traffic light controllers set the lights in such a way to maximize the average gain of all cars standing before the crossing. To estimate the waiting times, we use 'reinforcement learning' which keeps track of the waiting times of individual cars and uses a smart way to compute the long term average waiting times using dynamic programming algorithms. One nice feature is that the system is very fair; it never lets one car wait for a very long time, since then its gain of setting its own light to green becomes very large, and the optimal decision of the traffic light will set his light to green. Furthermore, since we estimate waiting times before traffic lights until the destination of the road user has been reached, the road user can use this information to choose to which next traffic light to go, thereby improving its driving behaviour through a city. Note that we solve the traffic light control problem by using a distributed multi-agent system, where cooperation and coordination are done by communication, learning, and voting mechanisms. To allow for green waves during extremely busy situations, we combine our algorithm with a special bucket algorithm which propagates gains from one traffic light to the next one, inducing stronger voting on the next traffic controller option.We have implemented the 'Green Light District', a traffic simulator in Java in which infrastructures can be edited easily by using the mouse, and different levels of road usage can be simulated. A large number of fixed and learning traffic light controllers have already been tested in the simulator and the resulting average waiting times of cars have been plotted and compared. The results indicate that the learning controllers can reduce average waiting timeswith at least 10% in semi-busy traffic situations, and even much more when high congestion of the traffic occurs.We are currently studying the behaviour of the learning traffic light controllers on many different infrastructures in our simulator. We are also planning to cooperate with other institutes and companies in the Netherlands to apply our system to real world traffic situations. For this, modern technologies such as communicating networks can be brought to use on a very large scale, making the necessary communication between road users and traffic lights possible.中文翻译:智能交通信号灯控制马克·威宁我所选择的社区项目主题是交通灯。

毕业设计论文外文文献翻译

毕业设计论文外文文献翻译

xxxx大学xxx学院毕业设计(论文)外文文献翻译系部xxxx专业xxxx学生姓名xxxx 学号xxxx指导教师xxxx 职称xxxx2013年3 月Introducing the Spring FrameworkThe Spring Framework: a popular open source application framework that addresses many of the issues outlined in this book. This chapter will introduce the basic ideas of Spring and dis-cuss the central “bean factory” lightweight Inversion-of-Control (IoC) container in detail.Spring makes it particularly easy to implement lightweight, yet extensible, J2EE archi-tectures. It provides an out-of-the-box implementation of the fundamental architectural building blocks we recommend. Spring provides a consistent way of structuring your applications, and provides numerous middle tier features that can make J2EE development significantly easier and more flexible than in traditional approaches.The basic motivations for Spring are:To address areas not well served by other frameworks. There are numerous good solutions to specific areas of J2EE infrastructure: web frameworks, persistence solutions, remoting tools, and so on. However, integrating these tools into a comprehensive architecture can involve significant effort, and can become a burden. Spring aims to provide an end-to-end solution, integrating spe-cialized frameworks into a coherent overall infrastructure. Spring also addresses some areas that other frameworks don’t. For example, few frameworks address generic transaction management, data access object implementation, and gluing all those things together into an application, while still allowing for best-of-breed choice in each area. Hence we term Spring an application framework, rather than a web framework, IoC or AOP framework, or even middle tier framework.To allow for easy adoption. A framework should be cleanly layered, allowing the use of indi-vidual features without imposing a whole worldview on the application. Many Spring features, such as the JDBC abstraction layer or Hibernate integration, can be used in a library style or as part of the Spring end-to-end solution.To deliver ease of use. As we’ve noted, J2EE out of the box is relatively hard to use to solve many common problems. A good infrastructure framework should make simple tasks simple to achieve, without forcing tradeoffs for future complex requirements (like distributed transactions) on the application developer. It should allow developers to leverage J2EE services such as JTA where appropriate, but to avoid dependence on them in cases when they are unnecessarily complex.To make it easier to apply best practices. Spring aims to reduce the cost of adhering to best practices such as programming to interfaces, rather than classes, almost to zero. However, it leaves the choice of architectural style to the developer.Non-invasiveness. Application objects should have minimal dependence on the framework. If leveraging a specific Spring feature, an object should depend only on that particular feature, whether by implementing a callback interface or using the framework as a class library. IoC and AOP are the key enabling technologies for avoiding framework dependence.Consistent configuration. A good infrastructure framework should keep application configuration flexible and consistent, avoiding the need for custom singletons and factories. A single style should be applicable to all configuration needs, from the middle tier to web controllers.Ease of testing. Testing either whole applications or individual application classes in unit tests should be as easy as possible. Replacing resources or application objects with mock objects should be straightforward.To allow for extensibility. Because Spring is itself based on interfaces, rather than classes, it is easy to extend or customize it. Many Spring components use strategy interfaces, allowing easy customization.A Layered Application FrameworkChapter 6 introduced the Spring Framework as a lightweight container, competing with IoC containers such as PicoContainer. While the Spring lightweight container for JavaBeans is a core concept, this is just the foundation for a solution for all middleware layers.Basic Building Blockspring is a full-featured application framework that can be leveraged at many levels. It consists of multi-ple sub-frameworks that are fairly independent but still integrate closely into a one-stop shop, if desired. The key areas are:Bean factory. The Spring lightweight IoC container, capable of configuring and wiring up Java-Beans and most plain Java objects, removing the need for custom singletons and ad hoc configura-tion. Various out-of-the-box implementations include an XML-based bean factory. The lightweight IoC container and its Dependency Injection capabilities will be the main focus of this chapter.Application context. A Spring application context extends the bean factory concept by adding support for message sources and resource loading, and providing hooks into existing environ-ments. Various out-of-the-box implementations include standalone application contexts and an XML-based web application context.AOP framework. The Spring AOP framework provides AOP support for method interception on any class managed by a Spring lightweight container.It supports easy proxying of beans in a bean factory, seamlessly weaving in interceptors and other advice at runtime. Chapter 8 dis-cusses the Spring AOP framework in detail. The main use of the Spring AOP framework is to provide declarative enterprise services for POJOs.Auto-proxying. Spring provides a higher level of abstraction over the AOP framework and low-level services, which offers similar ease-of-use to .NET within a J2EE context. In particular, the provision of declarative enterprise services can be driven by source-level metadata.Transaction management. Spring provides a generic transaction management infrastructure, with pluggable transaction strategies (such as JTA and JDBC) and various means for demarcat-ing transactions in applications. Chapter 9 discusses its rationale and the power and flexibility that it offers.DAO abstraction. Spring defines a set of generic data access exceptions that can be used for cre-ating generic DAO interfaces that throw meaningful exceptions independent of the underlying persistence mechanism. Chapter 10 illustrates the Spring support for DAOs in more detail, examining JDBC, JDO, and Hibernate as implementation strategies.JDBC support. Spring offers two levels of JDBC abstraction that significantly ease the effort of writing JDBC-based DAOs: the org.springframework.jdbc.core package (a template/callback approach) and the org.springframework.jdbc.object package (modeling RDBMS operations as reusable objects). Using the Spring JDBC packages can deliver much greater pro-ductivity and eliminate the potential for common errors such as leaked connections, compared with direct use of JDBC. The Spring JDBC abstraction integrates with the transaction and DAO abstractions.Integration with O/R mapping tools. Spring provides support classesfor O/R Mapping tools like Hibernate, JDO, and iBATIS Database Layer to simplify resource setup, acquisition, and release, and to integrate with the overall transaction and DAO abstractions. These integration packages allow applications to dispense with custom ThreadLocal sessions and native transac-tion handling, regardless of the underlying O/R mapping approach they work with.Web MVC framework. Spring provides a clean implementation of web MVC, consistent with the JavaBean configuration approach. The Spring web framework enables web controllers to be configured within an IoC container, eliminating the need to write any custom code to access business layer services. It provides a generic DispatcherServlet and out-of-the-box controller classes for command and form handling. Request-to-controller mapping, view resolution, locale resolution and other important services are all pluggable, making the framework highly extensi-ble. The web framework is designed to work not only with JSP, but with any view technology, such as Velocity—without the need for additional bridges. Chapter 13 discusses web tier design and the Spring web MVC framework in detail.Remoting support. Spring provides a thin abstraction layer for accessing remote services without hard-coded lookups, and for exposing Spring-managed application beans as remote services. Out-of-the-box support is inc luded for RMI, Caucho’s Hessian and Burlap web service protocols, and WSDL Web Services via JAX-RPC. Chapter 11 discusses lightweight remoting.While Spring addresses areas as diverse as transaction management and web MVC, it uses a consistent approach everywhere. Once you have learned the basic configuration style, you will be able to apply it in many areas. Resources, middle tier objects, and web components are all set up using the same bean configuration mechanism. You can combine your entireconfiguration in one single bean definition file or split it by application modules or layers; the choice is up to you as the application developer. There is no need for diverse configuration files in a variety of formats, spread out across the application.Spring on J2EEAlthough many parts of Spring can be used in any kind of Java environment, it is primarily a J2EE application framework. For example, there are convenience classes for linking JNDI resources into a bean factory, such as JDBC DataSources and EJBs, and integration with JTA for distributed transaction management. In most cases, application objects do not need to work with J2EE APIs directly, improving reusability and meaning that there is no need to write verbose, hard-to-test, JNDI lookups.Thus Spring allows application code to seamlessly integrate into a J2EE environment without being unnecessarily tied to it. You can build upon J2EE services where it makes sense for your application, and choose lighter-weight solutions if there are no complex requirements. For example, you need to use JTA as transaction strategy only if you face distributed transaction requirements. For a single database, there are alternative strategies that do not depend on a J2EE container. Switching between those transac-tion strategies is merely a matter of configuration; Spring’s consistent abstraction avoids any need to change application code.Spring offers support for accessing EJBs. This is an important feature (and relevant even in a book on “J2EE without EJB”) because the u se of dynamic proxies as codeless client-side business delegates means that Spring can make using a local stateless session EJB an implementation-level, rather than a fundamen-tal architectural, choice.Thus if you want to use EJB, you can within a consistent architecture; however, you do not need to make EJB the cornerstone of your architecture. This Spring feature can make devel-oping EJB applications significantly faster, because there is no need to write custom code in service loca-tors or business delegates. Testing EJB client code is also much easier, because it only depends on the EJB’s Business Methods interface (which is not EJB-specific), not on JNDI or the EJB API.Spring also provides support for implementing EJBs, in the form of convenience superclasses for EJB implementation classes, which load a Spring lightweight container based on an environment variable specified in the ejb-jar.xml deployment descriptor. This is a powerful and convenient way of imple-menting SLSBs or MDBs that are facades for fine-grained POJOs: a best practice if you do choose to implement an EJB application. Using this Spring feature does not conflict with EJB in any way—it merely simplifies following good practice.Introducing the Spring FrameworkThe main aim of Spring is to make J2EE easier to use and promote good programming practice. It does not reinvent the wheel; thus you’ll find no logging packages in Spring, no connection pools, no distributed transaction coordinator. All these features are provided by other open source projects—such as Jakarta Commons Logging (which Spring uses for all its log output), Jakarta Commons DBCP (which can be used as local DataSource), and ObjectWeb JOTM (which can be used as transaction manager)—or by your J2EE application server. For the same reason, Spring doesn’t provide an O/R mapping layer: There are good solutions for this problem area, such as Hibernate and JDO.Spring does aim to make existing technologies easier to use. For example, although Spring is not in the business of low-level transactioncoordination, it does provide an abstraction layer over JTA or any other transaction strategy. Spring is also popular as middle tier infrastructure for Hibernate, because it provides solutions to many common issues like SessionFactory setup, ThreadLocal sessions, and exception handling. With the Spring HibernateTemplate class, implementation methods of Hibernate DAOs can be reduced to one-liners while properly participating in transactions.The Spring Framework does not aim to replace J2EE middle tier services as a whole. It is an application framework that makes accessing low-level J2EE container ser-vices easier. Furthermore, it offers lightweight alternatives for certain J2EE services in some scenarios, such as a JDBC-based transaction strategy instead of JTA when just working with a single database. Essentially, Spring enables you to write appli-cations that scale down as well as up.Spring for Web ApplicationsA typical usage of Spring in a J2EE environment is to serve as backbone for the logical middle tier of a J2EE web application. Spring provides a web application context concept, a powerful lightweight IoC container that seamlessly adapts to a web environment: It can be accessed from any kind of web tier, whether Struts, WebWork, Tapestry, JSF, Spring web MVC, or a custom solution.The following code shows a typical example of such a web application context. In a typical Spring web app, an applicationContext.xml file will reside in the WEB-INF directory, containing bean defini-tions according to the “spring-beans” DTD. In such a bean definition XML file, business objects and resources are defined, for example, a “myDataSource” bean, a “myInventoryManager” bean, and a “myProductManager” bean. Spring takes care of their configuration, their wiring up, and their lifecycle.<beans><bean id=”myDataSource” class=”org.springframework.jdbc. datasource.DriverManagerDataSource”><property name=”driverClassName”> <value>com.mysql.jdbc.Driver</value></property> <property name=”url”><value>jdbc:mysql:myds</value></property></bean><bean id=”myInventoryManager” class=”ebusiness.DefaultInventoryManager”> <property name=”dataSource”><ref bean=”myDataSource”/> </property></bean><bean id=”myProductManager” class=”ebusiness.DefaultProductManage r”><property name=”inventoryManager”><ref bean=”myInventoryManager”/> </property><property name=”retrieveCurrentStock”> <value>true</value></property></bean></beans>By default, all such beans have “singleton” scope: one instance per context. The “myInventoryManager” bean will automatically be wired up with the defined DataSource, while “myProductManager” will in turn receive a reference to the “myInventoryManager” bean. Those objects (traditionally called “beans” in Spring terminology) need to expos e only the corresponding bean properties or constructor arguments (as you’ll see later in this chapter); they do not have to perform any custom lookups.A root web application context will be loaded by a ContextLoaderListener that is defined in web.xml as follows:<web-app><listener> <listener-class>org.springframework.web.context.ContextLoaderListener</listener-class></listener>...</web-app>After initialization of the web app, the root web application context will be available as a ServletContext attribute to the whole web application, in the usual manner. It can be retrieved from there easily via fetching the corresponding attribute, or via a convenience method in org.springframework.web. context.support.WebApplicationContextUtils. This means that the application context will be available in any web resource with access to the ServletContext, like a Servlet, Filter, JSP, or Struts Action, as follows:WebApplicationContext wac = WebApplicationContextUtils.getWebApplicationContext(servletContext);The Spring web MVC framework allows web controllers to be defined as JavaBeans in child application contexts, one per dispatcher servlet. Such controllers can express dependencies on beans in the root application context via simple bean references. Therefore, typical Spring web MVC applications never need to perform a manual lookup of an application context or bean factory, or do any other form of lookup.Neither do other client objects that are managed by an application context themselves: They can receive collaborating objects as bean references.The Core Bean FactoryIn the previous section, we have seen a typical usage of the Spring IoC container in a web environment: The provided convenience classes allow for seamless integration without having to worry about low-level container details. Nevertheless, it does help to look at the inner workings to understand how Spring manages the container. Therefore, we will now look at the Spring bean container in more detail, starting at the lowest building block: the bean factory. Later, we’ll continue with resource setup and details on the application context concept.One of the main incentives for a lightweight container is to dispense with the multitude of custom facto-ries and singletons often found in J2EE applications. The Spring bean factory provides one consistent way to set up any number of application objects, whether coarse-grained components or fine-grained busi-ness objects. Applying reflection and Dependency Injection, the bean factory can host components that do not need to be aware of Spring at all. Hence we call Spring a non-invasive application framework.Fundamental InterfacesThe fundamental lightweight container interface is org.springframework.beans.factory.Bean Factory. This is a simple interface, which is easy to implement directly in the unlikely case that none of the implementations provided with Spring suffices. The BeanFactory interface offers two getBean() methods for looking up bean instances by String name, with the option to check for a required type (and throw an exception if there is a type mismatch).public interface BeanFactory {Object getBean(String name) throws BeansException;Object getBean(String name, Class requiredType) throws BeansException;boolean containsBean(String name);boolean isSingleton(String name) throws NoSuchBeanDefinitionException;String[] getAliases(String name) throws NoSuchBeanDefinitionException;}The isSingleton() method allows calling code to check whether the specified name represents a sin-gleton or prototype bean definition. In the case of a singleton bean, all calls to the getBean() method will return the same object instance. In the case of a prototype bean, each call to getBean() returns an inde-pendent object instance, configured identically.The getAliases() method will return alias names defined for the given bean name, if any. This mecha-nism is used to provide more descriptive alternative names for beans than are permitted in certain bean factory storage representations, such as XML id attributes.The methods in most BeanFactory implementations are aware of a hierarchy that the implementation may be part of. If a bean is not foundin the current factory, the parent factory will be asked, up until the root factory. From the point of view of a caller, all factories in such a hierarchy will appear to be merged into one. Bean definitions in ancestor contexts are visible to descendant contexts, but not the reverse.All exceptions thrown by the BeanFactory interface and sub-interfaces extend org.springframework. beans.BeansException, and are unchecked. This reflects the fact that low-level configuration prob-lems are not usually recoverable: Hence, application developers can choose to write code to recover from such failures if they wish to, but should not be forced to write code in the majority of cases where config-uration failure is fatal.Most implementations of the BeanFactory interface do not merely provide a registry of objects by name; they provide rich support for configuring those objects using IoC. For example, they manage dependen-cies between managed objects, as well as simple properties. In the next section, we’ll look at how such configuration can be expressed in a simple and intuitive XML structure.The sub-interface org.springframework.beans.factory.ListableBeanFactory supports listing beans in a factory. It provides methods to retrieve the number of beans defined, the names of all beans, and the names of beans that are instances of a given type:public interface ListableBeanFactory extends BeanFactory {int getBeanDefinitionCount();String[] getBeanDefinitionNames();String[] getBeanDefinitionNames(Class type);boolean containsBeanDefinition(String name);Map getBeansOfType(Class type, boolean includePrototypes,boolean includeFactoryBeans) throws BeansException}The ability to obtain such information about the objects managed by a ListableBeanFactory can be used to implement objects that work with a set of other objects known only at runtime.In contrast to the BeanFactory interface, the methods in ListableBeanFactory apply to the current factory instance and do not take account of a hierarchy that the factory may be part of. The org.spring framework.beans.factory.BeanFactoryUtils class provides analogous methods that traverse an entire factory hierarchy.There are various ways to leverage a Spring bean factory, ranging from simple bean configuration to J2EE resource integration and AOP proxy generation. The bean factory is the central, consistent way of setting up any kind of application objects in Spring, whether DAOs, business objects, or web controllers. Note that application objects seldom need to work with the BeanFactory interface directly, but are usu-ally configured and wired by a factory without the need for any Spring-specific code.For standalone usage, the Spring distribution provides a tiny spring-core.jar file that can be embed-ded in any kind of application. Its only third-party dependency beyond J2SE 1.3 (plus JAXP for XML parsing) is the Jakarta Commons Logging API.The bean factory is the core of Spring and the foundation for many other services that the framework offers. Nevertheless, the bean factory can easily be used stan-dalone if no other Spring services are required.Derivative:networkSpring 框架简介Spring框架:这是一个流行的开源应用框架,它可以解决很多问题。

毕业论文外文翻译范例

毕业论文外文翻译范例

外文原文(一)Savigny and his Anglo-American Disciple s*M. H. HoeflichFriedrich Carl von Savigny, nobleman, law reformer, champion of the revived German professoriate, and founder of the Historical School of jurisprudence, not only helped to revolutionize the study of law and legal institutions in Germany and in other civil law countries, but also exercised a profound influence on many of the most creative jurists and legal scholars in England and the United States. Nevertheless, tracing the influence of an individual is always a difficult task. It is especially difficult as regards Savigny and the approach to law and legal sources propounded by the Historical School. This difficulty arises, in part, because Savigny was not alone in adopting this approach. Hugo, for instance, espoused quite similar ideas in Germany; George Long echoed many of these concepts in England during the 1850s, and, of course, Sir Henry Sumner Maine also espoused many of these same concepts central to historical jurisprudence in England in the 1860s and 1870s. Thus, when one looks at the doctrinal writings of British and American jurists and legal scholars in the period before 1875, it is often impossible to say with any certainty that a particular idea which sounds very much the sort of thing that might, indeed, have been derived from Savigny's works, was, in fact, so derived. It is possible, nevertheless, to trace much of the influence of Savigny and his legal writings in the United States and in Great Britain during this period with some certainty because so great was his fame and so great was the respect accorded to his published work that explicit references to him and to his work abound in the doctrinal writing of this period, as well as in actual law cases in the courts. Thus, Max Gutzwiller, in his classic study Der einfluss Savignys auf die Entwicklung des International privatrechts, was able to show how Savigny's ideas on conflict of laws influenced such English and American scholars as Story, Phillimore, Burge, and Dicey. Similarly, Andreas Schwarz, in his "Einflusse Deutscher Zivilistik im Auslande," briefly sketched Savigny's influence upon John Austin, Frederick Pollock, and James Bryce. In this article I wish to examine Savigny's influence over a broader spectrum and to draw a picture of his general fame and reputation both in Britain and in the United States as the leading Romanist, legal historian, and German legal academic of his day. The picture of this Anglo-American respect accorded to Savigny and the historical school of jurisprudence which emerges from these sources is fascinating. It sheds light not only upon Savigny’s trans-channel, trans-Atlantic fame, but also upon the extraordinarily*M.H.Hoeflich, Savigny and his Anglo-American Disciples, American Journal of Comparative Law, vol.37, No.1, 1989.cosmopolitan outlook of many of the leading American and English jurists of the time. Of course, when one sets out to trace the influence of a particular individual and his work, it is necessary to demonstrate, if possible, precisely how knowledge of the man and his work was transmitted. In the case of Savigny and his work on Roman law and ideas of historical jurisprudence, there were three principal modes of transmission. First, there was the direct influence he exercised through his contacts with American lawyers and scholars. Second, there was the influence he exercised through his books. Third, there was the influence he exerted indirectly through intermediate scholars and their works. Let us examine each mode separately.I.INFLUENCE OF THE TRANSLATED WORKSWhile American and British interest in German legal scholarship was high in the antebellum period, the number of American and English jurists who could read German fluently was relatively low. Even those who borrowed from the Germans, for instance, Joseph Story, most often had to depend upon translations. It is thus quite important that Savigny’s works were amongst the most frequently translated into English, both in the United States and in Great Britain. His most influential early work, the Vom Beruf unserer Zeitfur Rechtsgeschichte und Gestzgebung, was translated into English by Abraham Hayward and published in London in 1831. Two years earlier the first volume of his History of Roman Law in the Middle Ages was translated by Cathcart and published in Edinburgh. In 1830, as well, a French translation was published at Paris. Sir Erskine Perry's translation of Savigny's Treatise on Possession was published in London in 1848. This was followed by Archibald Brown's epitome of the treatise on possession in 1872 and Rattigan's translation of the second volume of the System as Jural Relations or the Law of Persons in 1884. Guthrie published a translation of the seventh volume of the System as Private International Law at Edinburgh in 1869. Indeed, two English translations were even published in the far flung corners of the British Raj. A translation of the first volume of the System was published by William Holloway at Madras in 1867 and the volume on possession was translated by Kelleher and published at Calcutta in 1888. Thus, the determined English-speaking scholar had ample access to Savigny's works throughout the nineteenth century.Equally important for the dissemination of Savigny's ideas were those books and articles published in English that explained and analyzed his works. A number of these must have played an important role in this process. One of the earliest of these is John Reddie's Historical Notices of the Roman law and of the Progress of its Study in Germany, published at Edinburgh in 1826. Reddie was a noted Scots jurist and held the Gottingen J.U.D. The book, significantly, is dedicated to Gustav Hugo. It is of that genre known as an external history of Roman law-not so much a history of substantive Roman legal doctrine but rather a historyof Roman legal institutions and of the study of Roman law from antiquity through the nineteenth century. It is very much a polemic for the study of Roman law and for the Historical School. It imparts to the reader the excitement of Savigny and his followers about the study of law historically and it is clear that no reader of the work could possibly be left unmoved. It is, in short, the first work of public relations in English on behalf of Savigny and his ideas.Having mentioned Reddie's promotion of Savigny and the Historical School, it is important to understand the level of excitement with which things Roman and especially Roman law were greeted during this period. Many of the finest American jurists were attracted-to use Peter Stein's term-to Roman and Civil law, but attracted in a way that, at times, seems to have been more enthusiastic than intellectual. Similarly, Roman and Civil law excited much interest in Great Britain, as illustrated by the distinctly Roman influence to be found in the work of John Austin. The attraction of Roman and Civil law can be illustrated and best understood, perhaps, in the context of the publicity and excitement in the English-speaking world surrounding the discovery of the only complete manuscript of the classical Roman jurist Gaius' Institutes in Italy in 1816 by the ancient historian and German consul at Rome, B.G. Niebuhr. Niebuhr, the greatest ancient historian of his time, turned to Savigny for help with the Gaius manuscript (indeed, it was Savigny who recognized the manuscript for what it was) and, almost immediately, the books and journals-not just law journals by any means-were filled with accounts of the discovery, its importance to legal historical studies, and, of course, what it said. For instance, the second volume of the American Jurist contains a long article on the civil law by the scholarly Boston lawyer and classicist, John Pickering. The first quarter of the article is a gushing account of the discovery and first publication of the Gaius manuscript and a paean to Niebuhr and Savigny for their role in this. Similarly, in an article published in the London Law Magazine in 1829 on the civil law, the author contemptuously refers to a certain professor who continued to tell his students that the text of Gaius' Institutes was lost for all time. What could better show his ignorance of all things legal and literary than to be unaware of Niebuhr's great discovery?Another example of this reaction to the discovery of the Gaius palimpsest is to be found in David Irving's Introduction to the Study of the Civil Law. This volume is also more a history of Roman legal scholarship and sources than a study of substantive Roman law. Its pages are filled with references to Savigny's Geschichte and its approach clearly reflects the influence of the Historical School. Indeed, Irving speaks of Savigny's work as "one of the most remarkable productions of the age." He must have been truly impressed with German scholarship and must also have been able to convince the Faculty of Advocates, forwhom he was librarian, of the worth of German scholarship, for in 1820 the Faculty sent him to Gottingen so that he might study their law libraries. Irving devotes several pages of his elementary textbook on Roman law to the praise of the "remarkable" discovery of the Gaius palimpsest. He traces the discovery of the text by Niebuhr and Savigny in language that would have befitted an adventure tale. He elaborates on the various labors required to produce a new edition of the text and was particularly impressed by the use of a then new chemical process to make the under text of the palimpsest visible. He speaks of the reception of the new text as being greeted with "ardor and exultation" strong words for those who spend their lives amidst the "musty tomes" of the Roman law.This excitement over the Verona Gaius is really rather strange. Much of the substance of the Gaius text was already known to legal historians and civil lawyers from its incorporation into Justinian's Institutes and so, from a substantive legal perspective, the find was not crucial. The Gaius did provide new information on Roman procedural rules and it did also provide additional information for those scholars attempting to reconstruct pre-Justinianic Roman law. Nevertheless, these contributions alone seem hardly able to justify the excitement the discovery caused. Instead, I think that the Verona Gaius discovery simply hit a chord in the literary and legal community much the same as did the discovery of the Rosetta Stone or of Schliemann’s Troy. Here was a monument of a great civilization brought newly to light and able to be read for the first time in millenia. And just as the Rosetta Stone helped to establish the modern discipline of Egyptology and Schliemann's discoveries assured the development of classical archaeology as a modern academic discipline, the discovery of the Verona Gaius added to the attraction Roman law held for scholars and for lawyers, even amongst those who were not Romanists by profession. Ancillary to this, the discovery and publication of the Gaius manuscript also added to the fame of the two principals involved in the discovery, Niebuhr and Savigny. What this meant in the English-speaking world is that even those who could not or did not wish to read Savigny's technical works knew of him as one of the discoverers of the Gaius text. This fame itself may well have helped in spreading Savigny's legal and philosophical ideas, for, I would suggest, the Gaius "connection" may well have disposed people to read other of Savigny's writings, unconnected to the Gaius, because they were already familiar with his name.Another example of an English-speaking promoter of Savigny is Luther Stearns Cushing, a noted Boston lawyer who lectured on Roman law at the Harvard Law School in 1848-49 and again in 1851- 1852.Cushing published his lectures at Boston in 1854 under the title An Introduction to the Study of Roman Law. He devoted a full chapter to a description of the historical school and to the controversy betweenSavigny and Thibaut over codification. While Cushing attempted to portray fairly the arguments of both sides, he left no doubt as to his preference for Savigny's approach:The labors of the historical school have established an entirely new and distinct era in the study of the Roman jurisprudence; and though these writers cannot be said to have thrown their predecessors into the shade, it seems to be generally admitted, that almost every branch of the Roman law has received some important modification at their hands, and that a knowledge of their writings, to some extent, at least, is essentially necessary to its acquisition.译文(一)萨维尼和他的英美信徒们*M·H·豪弗里奇弗雷德里奇·卡尔·冯·萨维尼出身贵族,是一位出色的法律改革家,也是一位倡导重建德国教授协会的拥护者,还是历史法学派的创建人之一。

建筑设计毕业论文中英文资料外文翻译文献

建筑设计毕业论文中英文资料外文翻译文献

毕业论文中英文资料外文翻译文献Architecture StructureWe have and the architects must deal with the spatial aspect of activity, physical, and symbolic needs in such a way that overall performance integrity is assured. Hence, he or she well wants to think of evolving a building environment as a total system of interacting and space forming subsystems. Is represents a complex challenge, and to meet it the architect will need a hierarchic design process that provides at least three levels of feedback thinking: schematic, preliminary, and final.Such a hierarchy is necessary if he or she is to avoid being confused , at conceptual stages of design thinking ,by the myriad detail issues that can distract attention from more basic consideration s .In fact , we can say that an architect’s ability to distinguish the more basic form the more detailed issues is essential to his success as a designer .The object of the schematic feed back level is to generate and evaluate overall site-plan, activity-interaction, and building-configuration options .To do so the architect must be able to focus on the interaction of the basic attributes of the site context, the spatial organization, and the symbolism as determinants of physical form. This means that ,in schematic terms ,the architect may first conceive and model a building design as an organizational abstraction of essential performance-space in teractions.Then he or she may explore the overall space-form implications of the abstraction. As an actual building configuration option begins to emerge, it will be modified to include consideration for basic site conditions.At the schematic stage, it would also be helpful if the designer could visualize his or her options for achieving overall structural integrity and consider the constructive feasibility and economic of his or her scheme .But this will require that the architect and/or a consultant be able to conceptualize total-system structural options in terms of elemental detail .Such overall thinking can be easily fed back to improve the space-form scheme.At the preliminary level, the architect’s emphasis will shift to the elaboration of his or her more promising schematic design options .Here the architect’s structural needs will shift toapproximate design of specific subsystem options. At this stage the total structural scheme is developed to a middle level of specificity by focusing on identification and design of major subsystems to the extent that their key geometric, component, and interactive properties are established .Basic subsystem interaction and design conflicts can thus be identified and resolved in the context of total-system objectives. Consultants can play a significant part in this effort; these preliminary-level decisions may also result in feedback that calls for refinement or even major change in schematic concepts.When the designer and the client are satisfied with the feasibility of a design proposal at the preliminary level, it means that the basic problems of overall design are solved and details are not likely to produce major change .The focus shifts again ,and the design process moves into the final level .At this stage the emphasis will be on the detailed development of all subsystem specifics . Here the role of specialists from various fields, including structural engineering, is much larger, since all detail of the preliminary design must be worked out. Decisions made at this level may produce feedback into Level II that will result in changes. However, if Levels I and II are handled with insight, the relationship between the overall decisions, made at the schematic and preliminary levels, and the specifics of the final level should be such that gross redesign is not in question, Rather, the entire process should be one of moving in an evolutionary fashion from creation and refinement (or modification) of the more general properties of a total-system design concept, to the fleshing out of requisite elements and details.To summarize: At Level I, the architect must first establish, in conceptual terms, the overall space-form feasibility of basic schematic options. At this stage, collaboration with specialists can be helpful, but only if in the form of overall thinking. At Level II, the architect must be able to identify the major subsystem requirements implied by the scheme and substantial their interactive feasibility by approximating key component properties .That is, the properties of major subsystems need be worked out only in sufficient depth to very the inherent compatibility of their basic form-related and behavioral interaction . This will mean a somewhat more specific form of collaboration with specialists then that in level I .At level III ,the architect and the specific form of collaboration with specialists then that providing for all of the elemental design specifics required to produce biddable construction documents .Of course this success comes from the development of the Structural Material.1.Reinforced ConcretePlain concrete is formed from a hardened mixture of cement ,water ,fine aggregate, coarse aggregate (crushed stone or gravel),air, and often other admixtures. The plastic mix is placed and consolidated in the formwork, then cured to facilitate the acceleration of the chemical hydration reaction lf the cement/water mix, resulting in hardened concrete. The finished product has high compressive strength, and low resistance to tension, such that its tensile strength is approximately one tenth lf its compressive strength. Consequently, tensile and shear reinforcement in the tensile regions of sections has to be provided to compensate for the weak tension regions in the reinforced concrete element.It is this deviation in the composition of a reinforces concrete section from the homogeneity of standard wood or steel sections that requires a modified approach to the basic principles of structural design. The two components of the heterogeneous reinforced concrete section are to be so arranged and proportioned that optimal use is made of the materials involved. This is possible because concrete can easily be given any desired shape by placing and compacting the wet mixture of the constituent ingredients are properly proportioned, the finished product becomes strong, durable, and, in combination with the reinforcing bars, adaptable for use as main members of any structural system.The techniques necessary for placing concrete depend on the type of member to be cast: that is, whether it is a column, a bean, a wall, a slab, a foundation. a mass columns, or an extension of previously placed and hardened concrete. For beams, columns, and walls, the forms should be well oiled after cleaning them, and the reinforcement should be cleared of rust and other harmful materials. In foundations, the earth should be compacted and thoroughly moistened to about 6 in. in depth to avoid absorption of the moisture present in the wet concrete. Concrete should always be placed in horizontal layers which are compacted by means of high frequency power-driven vibrators of either the immersion or external type, as the case requires, unless it is placed by pumping. It must be kept in mind, however, that over vibration can be harmful since it could cause segregation of the aggregate and bleeding of the concrete.Hydration of the cement takes place in the presence of moisture at temperatures above 50°F. It is necessary to maintain such a condition in order that the chemical hydration reaction can take place. If drying is too rapid, surface cracking takes place. This would result in reduction of concrete strength due to cracking as well as the failure to attain full chemical hydration.It is clear that a large number of parameters have to be dealt with in proportioning a reinforced concrete element, such as geometrical width, depth, area of reinforcement, steel strain, concrete strain, steel stress, and so on. Consequently, trial and adjustment is necessary in the choice ofconcrete sections, with assumptions based on conditions at site, availability of the constituent materials, particular demands of the owners, architectural and headroom requirements, the applicable codes, and environmental reinforced concrete is often a site-constructed composite, in contrast to the standard mill-fabricated beam and column sections in steel structures.A trial section has to be chosen for each critical location in a structural system. The trial section has to be analyzed to determine if its nominal resisting strength is adequate to carry the applied factored load. Since more than one trial is often necessary to arrive at the required section, the first design input step generates into a series of trial-and-adjustment analyses.The trial-and –adjustment procedures for the choice of a concrete section lead to the convergence of analysis and design. Hence every design is an analysis once a trial section is chosen. The availability of handbooks, charts, and personal computers and programs supports this approach as a more efficient, compact, and speedy instructional method compared with the traditional approach of treating the analysis of reinforced concrete separately from pure design.2. EarthworkBecause earthmoving methods and costs change more quickly than those in any other branch of civil engineering, this is a field where there are real opportunities for the enthusiast. In 1935 most of the methods now in use for carrying and excavating earth with rubber-tyred equipment did not exist. Most earth was moved by narrow rail track, now relatively rare, and the main methods of excavation, with face shovel, backacter, or dragline or grab, though they are still widely used are only a few of the many current methods. To keep his knowledge of earthmoving equipment up to date an engineer must therefore spend tine studying modern machines. Generally the only reliable up-to-date information on excavators, loaders and transport is obtainable from the makers.Earthworks or earthmoving means cutting into ground where its surface is too high ( cuts ), and dumping the earth in other places where the surface is too low ( fills). Toreduce earthwork costs, the volume of the fills should be equal to the volume of the cuts and wherever possible the cuts should be placednear to fills of equal volume so as to reduce transport and double handlingof the fill. This work of earthwork design falls on the engineer who lays out the road since it is the layout of the earthwork more than anything else which decides its cheapness. From the available maps ahd levels, the engineering must try to reach as many decisions as possible in the drawing office by drawing cross sections of the earthwork. On the site when further information becomes available he can make changes in jis sections and layout,but the drawing lffice work will not have been lost. It will have helped him to reach the best solution in the shortest time.The cheapest way of moving earth is to take it directly out of the cut and drop it as fill with the same machine. This is not always possible, but when it canbe done it is ideal, being both quick and cheap. Draglines, bulldozers and face shovels an do this. The largest radius is obtained with thedragline,and the largest tonnage of earth is moved by the bulldozer, though only over short distances.The disadvantages of the dragline are that it must dig below itself, it cannot dig with force into compacted material, it cannot dig on steep slopws, and its dumping and digging are not accurate.Face shovels are between bulldozers and draglines, having a larger radius of action than bulldozers but less than draglines. They are anle to dig into a vertical cliff face in a way which would be dangerous tor a bulldozer operator and impossible for a dragline. Each piece of equipment should be level of their tracks and for deep digs in compact material a backacter is most useful, but its dumping radius is considerably less than that of the same escavator fitted with a face shovel.Rubber-tyred bowl scrapers are indispensable for fairly level digging where the distance of transport is too much tor a dragline or face shovel. They can dig the material deeply ( but only below themselves ) to a fairly flat surface, carry it hundreds of meters if need be, then drop it and level it roughly during the dumping. For hard digging it is often found economical to keep a pusher tractor ( wheeled or tracked ) on the digging site, to push each scraper as it returns to dig. As soon as the scraper is full,the pusher tractor returns to the beginning of the dig to heop to help the nest scraper.Bowl scrapers are often extremely powerful machines;many makers build scrapers of 8 cubic meters struck capacity, which carry 10 m ³ heaped. The largest self-propelled scrapers are of 19 m ³struck capacity ( 25 m ³ heaped )and they are driven by a tractor engine of 430 horse-powers.Dumpers are probably the commonest rubber-tyred transport since they can also conveniently be used for carrying concrete or other building materials. Dumpers have the earth container over the front axle on large rubber-tyred wheels, and the container tips forwards on most types, though in articulated dumpers the direction of tip can be widely varied. The smallest dumpers have a capacity of about 0.5 m ³, and the largest standard types are of about 4.5 m ³. Special types include the self-loading dumper of up to 4 m ³ and the articulated type of about 0.5 m ³. The distinction between dumpers and dump trucks must be remembered .dumpers tip forwards and the driver sits behind the load. Dump trucks are heavy, strengthened tipping lorries, the driver travels in front lf the load and the load is dumped behind him, so they are sometimes called rear-dump trucks.3.Safety of StructuresThe principal scope of specifications is to provide general principles and computational methods in order to verify safety of structures. The “ safety factor ”, which according to modern trends is independent of the nature and combination of the materials used, can usually be defined as the ratio between the conditions. This ratio is also proportional to the inverse of the probability ( risk ) of failure of the structure.Failure has to be considered not only as overall collapse of the structure but also asunserviceability or, according to a more precise. Common definition. As the reaching of a “ limit state ” which causes the construction not to accomplish the task it was designed for. Ther e are two categories of limit state :(1)Ultimate limit sate, which corresponds to the highest value of the load-bearing capacity. Examples include local buckling or global instability of the structure; failure of some sections and subsequent transformation of the structure into a mechanism; failure by fatigue; elastic or plastic deformation or creep that cause a substantial change of the geometry of the structure; and sensitivity of the structure to alternating loads, to fire and to explosions.(2)Service limit states, which are functions of the use and durability of the structure. Examples include excessive deformations and displacements without instability; early or excessive cracks; large vibrations; and corrosion.Computational methods used to verify structures with respect to the different safety conditions can be separated into:(1)Deterministic methods, in which the main parameters are considered as nonrandom parameters.(2)Probabilistic methods, in which the main parameters are considered as random parameters.Alternatively, with respect to the different use of factors of safety, computational methods can be separated into:(1)Allowable stress method, in which the stresses computed under maximum loads are compared with the strength of the material reduced by given safety factors.(2)Limit states method, in which the structure may be proportioned on the basis of its maximum strength. This strength, as determined by rational analysis, shall not be less than that required to support a factored load equal to the sum of the factored live load and dead load ( ultimate state ).The stresses corresponding to working ( service ) conditions with unfactored live and dead loads are compared with prescribed values ( service limit state ) . From the four possible combinations of the first two and second two methods, we can obtain some useful computational methods. Generally, two combinations prevail:(1)deterministic methods, which make use of allowable stresses.(2)Probabilistic methods, which make use of limit states.The main advantage of probabilistic approaches is that, at least in theory, it is possible to scientifically take into account all random factors of safety, which are then combined to define the safety factor. probabilistic approaches depend upon :(1) Random distribution of strength of materials with respect to the conditions of fabrication and erection ( scatter of the values of mechanical properties through out the structure );(2) Uncertainty of the geometry of the cross-section sand of the structure ( faults andimperfections due to fabrication and erection of the structure );(3) Uncertainty of the predicted live loads and dead loads acting on the structure;(4)Uncertainty related to the approximation of the computational method used ( deviation of the actual stresses from computed stresses ).Furthermore, probabilistic theories mean that the allowable risk can be based on several factors, such as :(1) Importance of the construction and gravity of the damage by its failure;(2)Number of human lives which can be threatened by this failure;(3)Possibility and/or likelihood of repairing the structure;(4) Predicted life of the structure.All these factors are related to economic and social considerations such as:(1) Initial cost of the construction;(2) Amortization funds for the duration of the construction;(3) Cost of physical and material damage due to the failure of the construction;(4) Adverse impact on society;(5) Moral and psychological views.The definition of all these parameters, for a given safety factor, allows construction at the optimum cost. However, the difficulty of carrying out a complete probabilistic analysis has to be taken into account. For such an analysis the laws of the distribution of the live load and its induced stresses, of the scatter of mechanical properties of materials, and of the geometry of the cross-sections and the structure have to be known. Furthermore, it is difficult to interpret the interaction between the law of distribution of strength and that of stresses because both depend upon the nature of the material, on the cross-sections and upon the load acting on the structure. These practical difficulties can be overcome in two ways. The first is to apply different safety factors to the material and to the loads, without necessarily adopting the probabilistic criterion. The second is an approximate probabilistic method which introduces some simplifying assumptions ( semi-probabilistic methods ) .文献翻译建筑师必须从一种全局的角度出发去处理建筑设计中应该考虑到的实用活动,物质及象征性的需求。

毕业设计英文 翻译(原文)

毕业设计英文 翻译(原文)

编号:毕业设计(论文)外文翻译(原文)院(系):桂林电子科技大学专业:电子信息工程学生姓名: xx学号: xxxxxxxxxxxxx 指导教师单位:桂林电子科技大学姓名: xxxx职称: xx2014年x月xx日Timing on and off power supplyusesThe switching power supply products are widely used in industrial automation and control, military equipment, scientific equipment, LED lighting, industrial equipment,communications equipment,electrical equipment,instrumentation, medical equipment, semiconductor cooling and heating, air purifiers, electronic refrigerator, LCD monitor, LED lighting, communications equipment, audio-visual products, security, computer chassis, digital products and equipment and other fields.IntroductionWith the rapid development of power electronics technology, power electronics equipment and people's work, the relationship of life become increasingly close, and electronic equipment without reliable power, into the 1980s, computer power and the full realization of the switching power supply, the first to complete the computer Power new generation to enter the switching power supply in the 1990s have entered into a variety of electronic, electrical devices, program-controlled switchboards, communications, electronic testing equipment power control equipment, power supply, etc. have been widely used in switching power supply, but also to promote the rapid development of the switching power supply technology .Switching power supply is the use of modern power electronics technology to control the ratio of the switching transistor to turn on and off to maintain a stable output voltage power supply, switching power supply is generally controlled by pulse width modulation (PWM) ICs and switching devices (MOSFET, BJT) composition. Switching power supply and linear power compared to both the cost and growth with the increase of output power, but the two different growth rates. A power point, linear power supply costs, but higher than the switching power supply. With the development of power electronics technology and innovation, making the switching power supply technology to continue to innovate, the turning points of this cost is increasingly move to the low output power side, the switching power supply provides a broad space for development.The direction of its development is the high-frequency switching power supply, high frequency switching power supply miniaturization, and switching power supply into a wider range of application areas, especially in high-tech fields, and promote the miniaturization of high-tech products, light of. In addition, the development and application of the switching power supply in terms of energy conservation, resource conservation and environmental protection are of great significance.classificationModern switching power supply, there are two: one is the DC switching power supply; the other is the AC switching power supply. Introduces only DC switching power supply and its function is poor power quality of the original eco-power (coarse) - such as mains power or battery power, converted to meet the equipment requirements of high-quality DC voltage (Varitronix) . The core of the DC switching power supply DC / DC converter. DC switching power supply classification is dependent on the classification of DC / DC converter. In other words, the classification of the classification of the DC switching power supply and DC/DC converter is the classification of essentially the same, the DC / DC converter is basically a classification of the DC switching power supply.DC /DC converter between the input and output electrical isolation can be divided into two categories: one is isolated called isolated DC/DC converter; the other is not isolated as non-isolated DC / DC converter.Isolated DC / DC converter can also be classified by the number of active power devices. The single tube of DC / DC converter Forward (Forward), Feedback (Feedback) two. The double-barreled double-barreled DC/ DC converter Forward (Double Transistor Forward Converter), twin-tube feedback (Double Transistor Feedback Converter), Push-Pull (Push the Pull Converter) and half-bridge (Half-Bridge Converter) four. Four DC / DC converter is the full-bridge DC / DC converter (Full-Bridge Converter).Non-isolated DC / DC converter, according to the number of active power devices can be divided into single-tube, double pipe, and four three categories. Single tube to a total of six of the DC / DC converter, step-down (Buck) DC / DC converter, step-up (Boost) DC / DC converters, DC / DC converter, boost buck (Buck Boost) device of Cuk the DC / DC converter, the Zeta DC / DC converter and SEPIC, the DC / DC converter. DC / DC converters, the Buck and Boost type DC / DC converter is the basic buck-boost of Cuk, Zeta, SEPIC, type DC / DC converter is derived from a single tube in this six. The twin-tube cascaded double-barreled boost (buck-boost) DC / DC converter DC / DC converter. Four DC / DC converter is used, the full-bridge DC / DC converter (Full-Bridge Converter).Isolated DC / DC converter input and output electrical isolation is usually transformer to achieve the function of the transformer has a transformer, so conducive to the expansion of the converter output range of applications, but also easy to achieve different voltage output , or a variety of the same voltage output.Power switch voltage and current rating, the converter's output power is usually proportional to the number of switch. The more the number of switch, the greater the output power of the DC / DC converter, four type than the two output power is twice as large,single-tube output power of only four 1/4.A combination of non-isolated converters and isolated converters can be a single converter does not have their own characteristics. Energy transmission points, one-way transmission and two-way transmission of two DC / DC converter. DC / DC converter with bi-directional transmission function, either side of the transmission power from the power of lateral load power from the load-lateral side of the transmission power.DC / DC converter can be divided into self-excited and separately controlled. With the positive feedback signal converter to switch to self-sustaining periodic switching converter, called self-excited converter, such as the the Luo Yeer (Royer,) converter is a typical push-pull self-oscillating converter. Controlled DC / DC converter switching device control signal is generated by specialized external control circuit.the switching power supply.People in the field of switching power supply technology side of the development of power electronic devices, while the development of the switching inverter technology, the two promote each other to promote the switching power supply annual growth rate of more than two digits toward the light, small, thin, low-noise, high reliability, the direction of development of anti-jamming. Switching power supply can be divided into AC / DC and DC / DC two categories, AC / AC DC / AC, such as inverters, DC / DC converter is now modular design technology and production processes at home and abroad have already matured and standardization, and has been recognized by the user, but AC / DC modular, its own characteristics make the modular process, encounter more complex technology and manufacturing process. Hereinafter to illustrate the structure and characteristics of the two types of switching power supply.Self-excited: no external signal source can be self-oscillation, completely self-excited to see it as feedback oscillation circuit of a transformer.Separate excitation: entirely dependent on external sustain oscillations, excited used widely in practical applications. According to the excitation signal structure classification; can be divided into pulse-width-modulated and pulse amplitude modulated two pulse width modulated control the width of the signal is frequency, pulse amplitude modulation control signal amplitude between the same effect are the oscillation frequency to maintain within a certain range to achieve the effect of voltage stability. The winding of the transformer can generally be divided into three types, one group is involved in the oscillation of the primary winding, a group of sustained oscillations in the feedback winding, there is a group of load winding. Such as Shanghai is used in household appliances art technological production of switching power supply, 220V AC bridge rectifier, changing to about 300V DC filter added tothe collector of the switch into the transformer for high frequency oscillation, the feedback winding feedback to the base to maintain the circuit oscillating load winding induction signal, the DC voltage by the rectifier, filter, regulator to provide power to the load. Load winding to provide power at the same time, take up the ability to voltage stability, the principle is the voltage output circuit connected to a voltage sampling device to monitor the output voltage changes, and timely feedback to the oscillator circuit to adjust the oscillation frequency, so as to achieve stable voltage purposes, in order to avoid the interference of the circuit, the feedback voltage back to the oscillator circuit with optocoupler isolation.technology developmentsThe high-frequency switching power supply is the direction of its development, high-frequency switching power supply miniaturization, and switching power supply into the broader field of application, especially in high-tech fields, and promote the development and advancement of the switching power supply, an annual more than two-digit growth rate toward the light, small, thin, low noise, high reliability, the direction of the anti-jamming. Switching power supply can be divided into AC / DC and DC / DC two categories, the DC / DC converter is now modular design technology and production processes at home and abroad have already matured and standardized, and has been recognized by the user, but modular AC / DC, because of its own characteristics makes the modular process, encounter more complex technology and manufacturing process. In addition, the development and application of the switching power supply in terms of energy conservation, resource conservation and environmental protection are of great significance.The switching power supply applications in power electronic devices as diodes, IGBT and MOSFET.SCR switching power supply input rectifier circuit and soft start circuit, a small amount of applications, the GTR drive difficult, low switching frequency, gradually replace the IGBT and MOSFET.Direction of development of the switching power supply is a high-frequency, high reliability, low power, low noise, jamming and modular. Small, thin, and the key technology is the high frequency switching power supply light, so foreign major switching power supply manufacturers have committed to synchronize the development of new intelligent components, in particular, is to improve the secondary rectifier loss, and the power of iron Oxygen materials to increase scientific and technological innovation in order to improve the magnetic properties of high frequency and large magnetic flux density (Bs), and capacitor miniaturization is a key technology. SMT technology allows the switching power supply has made considerable progress, the arrangement of the components in the circuit board on bothsides, to ensure that the light of the switching power supply, a small, thin. High-frequency switching power supply is bound to the traditional PWM switching technology innovation, realization of ZVS, ZCS soft-switching technology has become the mainstream technology of the switching power supply, and a substantial increase in the efficiency of the switching power supply. Indicators for high reliability, switching power supply manufacturers in the United States by reducing the operating current, reducing the junction temperature and other measures to reduce the stress of the device, greatly improve the reliability of products.Modularity is the overall trend of switching power supply, distributed power systems can be composed of modular power supply, can be designed to N +1 redundant power system, and the parallel capacity expansion. For this shortcoming of the switching power supply running noise, separate the pursuit of high frequency noise will also increase, while the use of part of the resonant converter circuit technology to achieve high frequency, in theory, but also reduce noise, but some The practical application of the resonant converter technology, there are still technical problems, it is still a lot of work in this field, so that the technology to be practical.Power electronics technology innovation, switching power supply industry has broad prospects for development. To accelerate the pace of development of the switching power supply industry in China, it must take the road of technological innovation, out of joint production and research development path with Chinese characteristics and contribute to the rapid development of China's national economy.Developments and trends of the switching power supply1955 U.S. Royer (Roger) invented the self-oscillating push-pull transistor single-transformer DC-DC converter is the beginning of the high-frequency conversion control circuit 1957 check race Jen, Sen, invented a self-oscillating push-pull dual transformers, 1964, U.S. scientists canceled frequency transformer in series the idea of switching power supply, the power supply to the size and weight of the decline in a fundamental way. 1969 increased due to the pressure of the high-power silicon transistor, diode reverse recovery time shortened and other components to improve, and finally made a 25-kHz switching power supply.At present, the switching power supply to the small, lightweight and high efficiency characteristics are widely used in a variety of computer-oriented terminal equipment, communications equipment, etc. Almost all electronic equipment is indispensable for a rapid development of today's electronic information industry power mode. Bipolar transistor made of 100kHz, 500kHz power MOS-FET made, though already the practical switching power supply is currently available on the market, but its frequency to be further improved. Toimprove the switching frequency, it is necessary to reduce the switching losses, and to reduce the switching losses, the need for high-speed switch components. However, the switching speed will be affected by the distribution of the charge stored in the inductance and capacitance, or diode circuit to produce a surge or noise. This will not only affect the surrounding electronic equipment, but also greatly reduce the reliability of the power supply itself. Which, in order to prevent the switching Kai - closed the voltage surge, RC or LC buffers can be used, and the current surge can be caused by the diode stored charge of amorphous and other core made of magnetic buffer . However, the high frequency more than 1MHz, the resonant circuit to make the switch on the voltage or current through the switch was a sine wave, which can reduce switching losses, but also to control the occurrence of surges. This switch is called the resonant switch. Of this switching power supply is active, you can, in theory, because in this way do not need to greatly improve the switching speed of the switching losses reduced to zero, and the noise is expected to become one of the high-frequency switching power supply The main ways. At present, many countries in the world are committed to several trillion Hz converter utility.the principle of IntroductionThe switching power supply of the process is quite easy to understand, linear power supplies, power transistors operating in the linear mode and linear power, the PWM switching power supply to the power transistor turns on and off state, in both states, on the power transistor V - security product is very small (conduction, low voltage, large current; shutdown, voltage, current) V oltammetric product / power device is power semiconductor devices on the loss.Compared with the linear power supply, the PWM switching power supply more efficient process is achieved by "chopping", that is cut into the amplitude of the input DC voltage equal to the input voltage amplitude of the pulse voltage. The pulse duty cycle is adjusted by the switching power supply controller. Once the input voltage is cut into the AC square wave, its amplitude through the transformer to raise or lower. Number of groups of output voltage can be increased by increasing the number of primary and secondary windings of the transformer. After the last AC waveform after the rectifier filter the DC output voltage.The main purpose of the controller is to maintain the stability of the output voltage, the course of their work is very similar to the linear form of the controller. That is the function blocks of the controller, the voltage reference and error amplifier can be designed the same as the linear regulator. Their difference lies in the error amplifier output (error voltage) in the drive before the power tube to go through a voltage / pulse-width conversion unit.Switching power supply There are two main ways of working: Forward transformand boost transformation. Although they are all part of the layout difference is small, but the course of their work vary greatly, have advantages in specific applications.the circuit schematicThe so-called switching power supply, as the name implies, is a door, a door power through a closed power to stop by, then what is the door, the switching power supply using SCR, some switch, these two component performance is similar, are relying on the base switch control pole (SCR), coupled with the pulse signal to complete the on and off, the pulse signal is half attentive to control the pole voltage increases, the switch or transistor conduction, the filter output voltage of 300V, 220V rectifier conduction, transmitted through the switching transformer secondary through the transformer to the voltage increase or decrease for each circuit work. Oscillation pulse of negative semi-attentive to the power regulator, base, or SCR control voltage lower than the original set voltage power regulator cut-off, 300V power is off, switch the transformer secondary no voltage, then each circuit The required operating voltage, depends on this secondary road rectifier filter capacitor discharge to maintain. Repeat the process until the next pulse cycle is a half weeks when the signal arrival. This switch transformer is called the high-frequency transformer, because the operating frequency is higher than the 50HZ low frequency. Then promote the pulse of the switch or SCR, which requires the oscillator circuit, we know, the transistor has a characteristic, is the base-emitter voltage is 0.65-0.7V is the zoom state, 0.7V These are the saturated hydraulic conductivity state-0.1V-0.3V in the oscillatory state, then the operating point after a good tune, to rely on the deep negative feedback to generate a negative pressure, so that the oscillating tube onset, the frequency of the oscillating tube capacitor charging and discharging of the length of time from the base to determine the oscillation frequency of the output pulse amplitude, and vice versa on the small, which determines the size of the output voltage of the power regulator. Transformer secondary output voltage regulator, usually switching transformer, single around a set of coils, the voltage at its upper end, as the reference voltage after the rectifier filter, then through the optocoupler, this benchmark voltage return to the base of the oscillating tube pole to adjust the level of the oscillation frequency, if the transformer secondary voltage is increased, the sampling coil output voltage increases, the positive feedback voltage obtained through the optocoupler is also increased, this voltage is applied oscillating tube base, so that oscillation frequency is reduced, played a stable secondary output voltage stability, too small do not have to go into detail, nor it is necessary to understand the fine, such a high-power voltage transformer by switching transmission, separated and after the class returned by sampling the voltage from the opto-coupler pass separated after class, so before the mains voltage, and after the classseparation, which is called cold plate, it is safe, transformers before power is independent, which is called switching power supply.the DC / DC conversionDC / DC converter is a fixed DC voltage transformation into a variable DC voltage, also known as the DC chopper. There are two ways of working chopper, one Ts constant pulse width modulation mode, change the ton (General), the second is the frequency modulation, the same ton to change the Ts, (easy to produce interference). Circuit by the following categories:Buck circuit - the step-down chopper, the average output voltage U0 is less than the input voltage Ui, the same polarity.Boost Circuit - step-up chopper, the average output voltage switching power supply schematic U0 is greater than the input voltage Ui, the same polarity.Buck-Boost circuit - buck or boost chopper, the output average voltage U0 is greater than or less than the input voltage Ui, the opposite polarity, the inductance transmission.Cuk circuit - a buck or boost chopper, the output average voltage U0 is greater than or less than the input voltage Ui, the opposite polarity, capacitance transmission.The above-mentioned non-isolated circuit, the isolation circuit forward circuits, feedback circuit, the half-bridge circuit, the full bridge circuit, push-pull circuit. Today's soft-switching technology makes a qualitative leap in the DC / DC the U.S. VICOR company design and manufacture a variety of ECI soft-switching DC / DC converter, the maximum output power 300W, 600W, 800W, etc., the corresponding power density (6.2 , 10,17) W/cm3 efficiency (80-90)%. A the Japanese Nemic Lambda latest using soft-switching technology, high frequency switching power supply module RM Series, its switching frequency (200 to 300) kHz, power density has reached 27W/cm3 with synchronous rectifier (MOSFETs instead of Schottky diodes ), so that the whole circuit efficiency by up to 90%.AC / DC conversionAC / DC conversion will transform AC to DC, the power flow can be bi-directional power flow by the power flow to load known as the "rectification", referred to as "active inverter power flow returned by the load power. AC / DC converter input 50/60Hz AC due must be rectified, filtered, so the volume is relatively large filter capacitor is essential, while experiencing safety standards (such as UL, CCEE, etc.) and EMC Directive restrictions (such as IEC, FCC, CSA) in the AC input side must be added to the EMC filter and use meets the safety standards of the components, thus limiting the miniaturization of the volume of AC / DC power, In addition, due to internal frequency, high voltage, current switching, making the problem difficult to solve EMC also high demands on the internal high-density mountingcircuit design, for the same reason, the high voltage, high current switch makes power supply loss increases, limiting the AC / DC converter modular process, and therefore must be used to power system optimal design method to make it work efficiency to reach a certain level of satisfaction.AC / DC conversion circuit wiring can be divided into half-wave circuit, full-wave circuit. Press the power phase can be divided into single-phase three-phase, multiphase. Can be divided into a quadrant, two quadrant, three quadrants, four-quadrant circuit work quadrant.he selection of the switching power supplySwitching power supply input on the anti-jamming performance, compared to its circuit structure characteristics (multi-level series), the input disturbances, such as surge voltage is difficult to pass on the stability of the output voltage of the technical indicators and linear power have greater advantages, the output voltage stability up to (0.5)%. Switching power supply module as an integrated power electronic devices should be selected。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

毕业论文(设计)外文资料翻译学院:物理科学与电子技术学院专业:电子信息工程姓名:雷顺明学号:05223137外文出处:/colourful-rhyth ms-of-light-tango-r971913.htm附件:1、外文资料翻译译文;2、外文原文。

指导教师评语:该同学的外文资料翻译较准确,说明前期准备阶段的文献调研做了一定的工作,达到了预期目的。

签名:年月日附件1:外文资料翻译译文简易音乐彩灯控制器本例介绍一个简易音乐彩灯控制器,它的电路结构虽然非常简单,但使用效果很好,适宜初学者制作。

工作原理:简易音乐彩灯控制器电路如图所示,电路主要采用了一只晶闸管和一只三极管等组成。

220V交流电经灯串EL和二极管VD1一VD4桥式整流后变成约200V的脉动电压,一路加在晶闸管VT的两端作为VS工作所需的正向阳极电压;另一路经R1与R4分压,并经电容Cl滤波,在Cl两端可获得约3V左右稳定的直流电压,作为三极管VT的工作电压。

RP为声控灵敏度调节电位器,要求环境在无音乐声场时,调整RP使三极管VT刚好处于临界导通状态,这时VS的门极被VT短接无法获得触发电压,所以晶闸管VS处于关断态,流过彩灯串EL的电流极微,彩灯串EL不亮。

如果有人打开音响设备播放音乐时,压电陶瓷片B就拾取环境声波信号,并将其转换成相应的音频电压加在VT的发射结上。

强信号的负半周就使三极管VT退出导通态进入放大态,故VT的集电极电位升高,音乐信号愈强,VT集电极电位也就愈高,当高至晶闸管VS门极的触发电平时,VS开通彩灯串点亮发光。

弱信号时,VT集电极输出电平低于晶闸管门极的触发电平,晶闸管因交流电过零时即关断。

所以彩灯串EL能随环境声波信号的强弱而闪烁。

元器件选择VS选用普通小型塑封单向晶闸管,如2N6565,MCR100一8、BT169型等;VT选用或3DG8型硅NPN小功率三极管,要求电流放大系数β>200;VD1一VD4选用1 N4007型等硅整流二极管。

RP为WH5型小型合成碳膜电位器,其余电阻均选用RTX一1/8W型碳膜电阻器。

C1用CD11一16V型电解电容器。

B选用Φ27 mm的压电陶瓷片,如Fr-27、HTD27 A一1型等。

彩灯串EL可用市售产品。

制作与调试除彩灯串EL外所有电子元器件安装在一块自制的印制电路板上,并将其装人大小合适的塑料或木制盒内。

在盒面应开数个透音孔,在压电陶瓷片B的铜底板上涂一些环氧树脂胶,然后将压电陶瓷片,从盒内向外粘贴在机盒的透音孔上。

在盒子的透音孔外,再粘贴一块开有小孔的塑料板,作为保护板,以防止人手可能触摸到压电陶瓷片的金属面。

经过这样处理,机盒可充当压电陶瓷片的共鸣腔,有利于提高压电陶瓷片接收音波的灵敏度。

使用时,将控制器放在音响设备的音箱附近,调节电位器RP,就能使彩灯串随音乐节奏而闪烁。

调节电位器RP时,应先由大逐渐调小,当调到某一位置时,彩灯串会常亮不闪,然后将电位器稍微调大使彩灯串熄灭,这时说明三极管VT刚好处于临界导通态,声控灵敏度为最高,只要环境稍有声响就能使灯串点亮。

若将电位器阻值再调大,则声控灵敏度下降,即需要较强的声响才能使灯串闪烁。

使用时,如发现电位器阻值调到最小都不能使彩灯串点亮发光,说明三极管VT始终处于导通状态,从而将晶闸管VS封死,此时可将VT换用月值较小的三极管试之,或适当增大电阻R3的阻值;如果电位器无论调在什么位置彩灯串EL始终常亮不闪,调到最大也不能使灯串熄灭,说明三极管VT不能进人导通态,应换用月值大一些的三极管试之,或适当减小电阻R3的阻值或再增大电阻R2的阻值,直至调动电位器RP时应有一位置能使彩灯串常亮,再增大RP值时彩灯串应能熄灭,说明R2、R3恰当。

在更换电阻或三极管时应切断电源后方可进行,必要重视。

那些五彩斑斓、变化不定的灯光能有效地烘托演出气氛,突出主题。

尤其是将音乐与灯光有机结合,即用音乐信号的强度控制灯光亮度的变化,使其具有“彩色音乐”的效果,使人获得高雅的享受。

本课题来源于生产实际。

当今的各种文艺演出场所,灯光控制是一项重要工作。

大型庆祝活动及城市亮化工程对灯光控制也有需求。

本课题设计要求如下:a)控制器具有8路输出,每路负载用一个220V/15W的彩色灯泡模拟,控制器同时驱动8路负载工作;b)控制器能存储128种以上的流水节目,使用时可任意调出其中的一种进行显示;c)具有声控灯光亮度的功能,要求将音乐信号分为高、中、低三个频段,8路彩灯分成3组,分别受高、中、低三个频率音乐成份控制,音乐信号强度越高彩灯越亮;d)为了确保电路安全运行,要求实行高、低压电路隔离;e)设计电路所需的直流稳压电源;课题解决的主要问题是音乐信号分频、音乐信号强度对灯光亮度的控制和“流水节目”的存储和实现。

控制器电路主要由高、中、低频段音乐信号通道电路,驱动、隔离电路,流水节目控制电路,时基电路和稳压电源电路组成。

音乐信号经音乐通道分成高、中、低三种频率音乐成分,各频率段有相应的彩灯,灯光亮度随信号强度的变化而变化,形成声控彩灯的效果。

流水节目信号存放在EPROM2716中,通过改变其地址实现流水节目。

稳压电源提供+5V和+9V的电压。

共有市场上的新颖性,发光二极管探戈配件生产的SKOFF规定了新的趋势,照明制造商和室内设计部门。

各种各样的应用,原来的设计和功能,使发光二极管装置的音乐线系列,越来越多的舞蹈进入我们的家庭和公共建筑。

这么小的和优雅的装修提供了无休止的可能性,照明和照明的所有类型的内饰。

探戈拟合的LED所产生SKOFF是不仅仅是一个光源,这是向前迈出的一步在若干领域-尤其如此,在现代设计。

这是为什么?在丹拟合,就像在整个各类音乐系列产品的生产SKOFF ,利用了现代的LED二极管照明系统。

在LED技术的特点是高光的发射在非常低的能耗水平。

为此,探戈照明无比便宜了比传统灯。

此外,丹配件已经作出的不锈钢或铝。

这个原因,除了令人印象深刻的表现,他们也获得了几个实际的特点,如高品质的元件,和耐用性。

还有一个优势在于寿命的LED二极管-五点〇万小时连续照明,至少!由于最低水平的散热量,探戈的特点是操作安全,这是一定的意义时,装置上进行易燃表面(木材,家具板,石膏板),并在地方受潮。

该装置应被证明是优秀的使用的地方,如:楼梯,家具,走廊,大厅,厨房,浴室,孩子们的房间,迪斯科舞厅和酒吧的室内,公共建筑物:办公楼,医院,或通行的方式,因为这事件。

安全和舒适的使用SKOFF的产品是如此巨大,音乐线系列照明证明是优秀的,即使在近距离使用的新生儿。

探戈装置是用来离散照亮孩子们的房间,因为他们排放软,非侵入性的光线,并通过其结构有利的'驯服轻' ,发光二极管的使用是无形的用户,从而有可能避免不愉快的'耀眼效果。

探戈配件有两种材料版本-不锈钢和铝。

根据某一特定对象的使用和用户偏好,提供介绍SKOFF四种颜色的排放轻:白色,红色,蓝色和绿色。

也有提供设计师版本:探戈,迷你探戈,探戈棒(直接固定在任何表面上使用的胶水或压敏胶带),探戈小棒,以及多探戈(双拟合)和灯架铎探戈(双拟合距离片,将它移到离水面)。

简单的安装,充分的选择合适的类型,和良好的光效应,结合原始设计导致无限阵列的应用。

一些著名奖项-金奖波兹南国际贸易博览会,奖励在'希隆斯克Rzecz '设计比赛,和欧洲奖章-已授予SKOFF音乐线系列产品,其中包括探戈系列。

这是一个明确的证据,证明该一起跳舞跳舞照明星是在没有其他的节奏比SKOFF的LED探戈节奏。

For_Immediate_Release:波兰,波兰人民共和国(新闻发布) 08年11月18号-这么小的和优雅的装修提供了无休止的可能性照明和照明的所有类型的内饰。

探戈拟合的LED所产生SKOFF是不仅仅是一个光源,这是向前迈出的一步在若干领域-尤其如此,在现代设计。

这是为什么?在丹拟合,就像在整个各类音乐系列产品的生产SKOFF ,利用了现代的LED二极管照明系统。

在LED技术的特点是高光的发射在非常低的能耗水平。

为此,探戈照明无比便宜了比传统灯。

此外,丹配件已经作出的不锈钢或铝。

由于这一点,除了令人印象深刻的表现,他们也获得了几个实际的特点,如高品质的元件,和耐用性。

还有一个优势在于寿命的LED二极管-五点〇万小时连续照明,至少!由于最低水平的散热量,探戈的特点是操作安全,这是一定的意义时,装置上进行易燃表面(木材,家具板,石膏板),并在地方受潮。

该装置应被证明是优秀的使用的地方,如:楼梯,家具,走廊,大厅,厨房,浴室,孩子们的房间,迪斯科舞厅和酒吧的室内,公共建筑物:办公楼,医院,或通行的方式,因为这事件。

安全和舒适的使用SKOFF的产品是如此巨大,音乐线系列照明证明是优秀的,即使在近距离使用的新生儿。

探戈装置是用来离散照亮孩子们的房间,因为他们排放软,非侵入性的光线,并通过其结构有利的“驯服”光,发光二极管的使用是无形的用户,从而有可能避免令人不快的“耀眼的影响。

”探戈配件有两种材料版本-不锈钢和铝。

根据某一特定对象的使用和用户偏好,提供介绍SKOFF四种颜色的排放轻:白色,红色,蓝色和绿色。

也有提供设计师版本:探戈,迷你探戈,探戈棒(直接固定在任何表面上使用的胶水或压敏胶带),探戈小棒,以及多探戈(双拟合)和灯架铎探戈(双拟合距离片,将它移到离水面)。

简单的安装,充分的选择合适的类型,和良好的光效应,结合原始设计导致无限阵列的应用。

本课题设计的音乐彩灯控制器电路由常用模拟器件,小规模集成电路(SSI),和存储芯片组成。

彩灯一方面能受音乐信号的控制,另一方面有多种灯光流水节目。

设计出的彩灯控制器具有声控彩灯效果和流水节目功能的。

经济的发展和夜市的兴起,各种花样的彩灯装饰层出不穷,给夜间的城市带来了绚丽的色彩。

那些五彩斑斓、变化不定的灯光能有效地烘托演出气氛,突出主题。

也可以满足大型庆祝活动及城市亮化工程的需求。

尤其是将音乐信号与灯光有机结合,即用音乐的强度控制灯光亮度的变化,使其具有“彩色音乐”的效果,使人获得高雅的享受。

人们生活水平的提高,需要进一步地提高生活质量、美化生活环境,利用各种彩灯来装饰美化生活已成为一种时尚。

附件2:外文原文The Design of Simple Colourful Light of MusicController CircuitIn this case to introduce a simple music lantern controller, the circuit structure although it is very simple, but effective, and suitable for beginners productionWorkuing PrincipleThe Circuit of Colourful Light of Music Controller is shown as the Figure.the Circuit mainly including a thyristor and a transistor and other components.220V AC by the EL and LED string lights VD1 after a bridge rectifier VD4 into the pulse of about 200V voltage,Plus all the way at the two ends of VT in thyristor VS required as positive anode voltage;another via R1 and R4 pressure, and by filtering capacitor Cl, Cl both ends available in about a stable 3V or DC voltage, VT as a transistor's operating voltage.RP as a voice-activated sensitivity adjustment potentiometer, the Environment and in the absence of music sound field, the adjustment of RP so just at the threshold VT transistor conduction state, when VS gate was then unable to obtain short-VT trigger voltage, so thyristor in VS shutdown state, the flow of current EL string lanterns minimal, lantern stringEL does not shine. If someone opens audio equipment to play music, piezoelectric ceramics B pick up the environment on the acoustic signal and converts it into a corresponding increase in the audio voltage VT knot on the launch. Strong signal on the negative half-cycle so that VT transistor conduction state to withdraw from entering the enlarged state, so the collector VT Potential Rise, music signal stronger, VT collector potential is higher, when the high VS thyristor gate of the Trigger peacetime, VS opened lantern lit LED string. Weak signal, VT collector output level below the thyristor gate trigger level, thyristor AC-off due to zero or shutdown. So Lantern EL string acoustic environment can be as strong or weak signals that sparkles.Components selectionVS use an ordinary small plastic one-way thyristor, such as 2N6565, MCR100 a 8, BT169 type; VT selection or 3DG8 low-power silicon NPN transistor requires current magnification factor β> 200; VD1 a selection of VD4 type silicon 1 N4007 rectifier diodes. RP for WH5 type of small synthetic carbon film potentiometer, and the rest are selected RTX a resistance-type 1/8W carbon film resistors. C1 with CD11 a 16V-type electrolytic capacitors.B selection Φ27 mm of piezoelectric ceramics, such as Fr-27, HTD27 A-1 type. EL string lanterns commercial products available.Production and debuggingIn addition to string lanterns outside EL all electronic components installed in a home-made printed circuit board, and one size fitted suitable plastic or wooden box. Noodles in boxes should be opened a few months through音孔in piezoelectric ceramics B, Tu铜底some epoxy glue on the board, and then piezoelectric ceramics, paste from the box outside the box in the machine through the音孔. Turner in the box音孔outside, and then paste has an open hole of plastic sheeting, as a protective plate to prevent the staff may touch piezoelectric ceramics to the metal surface. After such processing, machine boxes could serve as a piezoelectric ceramics resonance cavity, conducive to improving the piezoelectric ceramics receive acoustic sensitivity.When used to control the speaker on the audio equipment near the adjustment potentiometer RP, will be able to string lanterns with music that sparkles. Adjustpotentiometer RP should be gradually transferred by the big small, when transferred to a location, lantern Always string will not flash, and then slightly adjusted Potentiometers Ambassador Lantern series is off, then that transistor VT just at the critical-conduction state, the highest sensitivity of voice, as long as the slightest sound environment will be able to string lights lit. If the potentiometer resistance and then transferred, and the voice-activated sensitivity decreased, that is a strong need to make sound string lights flashing.When used, such as potentiometers found resistance to the smallest can make lanterns lit LED string that is always triode VT conduction state, which will thyristor VS sealed at this time could be spent on value-for-VT Examination of a smaller transistor, or an appropriate increase of the resistance R3 resistors; If Potentiometers tune no matter what position in the string lanterns EL always Always do not flash, nor will it help to the largest string of lights went out, that can not be Triode VT Introduction into the state, should be replaced with larger value on test of the transistor, or the appropriate resistor R3 reduce or increase the resistance of the resistance R2 resistance until mobilization Potentiometers RP location can be a color Always light string, and then increase the value of RP lantern string should be able to go out on R2, R3 appropriate. Triode resistance or replacement should be cut off the power before, and the necessary attention.Those colorful gorgeous, changing contrast lighting can effectively perform the atmosphere, highlighting the theme. Especially the organic combination of music and lighting, which uses music signal strength to control the brightness of the light changes, so that it will have "Color Music" effect, people get to enjoy elegant.The topics come from actual production. Today's various art venues, lighting control is an important task. Large-scale celebrations and urban lighting works on the lighting control also needs.The subject of design requirements are as follows:1)Controller output with 8 each way with a load of colored bulbs 220V/15W simulation,2)controller at the same time drives the work load 8;3)Controller can store more than 128 kinds of water programs, when used can be transferred out of which to carry out a significant Show; With voice-activated lightingbrightness function, the requirements will be music signal is divided into high, medium and low three-band, 8-way Lanterns were divided into 3 groups, respectively, by the high, medium and low frequency music composition control, the higher signal intensity music more bright lantern;4)In order to ensure the safe operation of the circuit, called for high and low voltage circuit isolation;5)Circuit design required for DC power supply;Subject to resolve the main problems are music signal frequency, music signal intensity of light brightness control and the "water show" and the realization of storage.Controller circuit mainly by the high, medium and low-band music signal channel circuit, driver, isolation circuits, water program control circuit, time-base circuit and regulated power supply circuit. Music signal by the music channel is divided into high, medium and low frequency music of three components, the frequency bands corresponding lantern, lighting brightness with the signal strength changes, the formation of voice-activated lantern effect. Water stored in the program signals EPROM2716 through to change their address to achieve water programs. Provide +5 V regulated power supply and +9 V voltage.A total novelty on the market, LED TANGO fitting produced by SKOFF sets out new trends in the lighting manufacturers' and interior design sector. A wide array of applications, original design, and functionality, make the LED fittings of the MUSIC LINE series, more and more, dance their way into our homes and public buildings.Such a small and elegant fitting provides unending possibilities of lighting and illuminating of all types of interiors. The LED TANGO fitting produced by SKOFF is something more than just a source of light, it is a step forward in a number of areas - especially so, in modern design. Why is that so?In the TANGO fitting, just like in the entire range of MUSIC LINE products manufactured by SKOFF, use has been made of the modern LED diode illumination system. The LED technology is characterised by high light emission at very low power consumption levels. Thanks to this, the TANGO lighting is incomparably cheaper in operation than traditional lamps are. Moreover, the TANGO fittings have been made of stainless steel or aluminium. Due to this, apart from impressive appearance, they also gained several practicalcharacteristics, such as, high quality of components, and durability. Yet another advantage lies in the longevity of the LED diodes - 50 thousand hours of continuous lighting, at least! Due to minimal levels of heat emission, TANGO is characterised by operational safety, which is of some significance when installations are performed on flammable surfaces (wood, furniture panels, gypsum panels), and also in places exposed to moisture.The fittings shall prove to be of excellent use in places such as: staircases, furniture, corridors, halls, kitchens, bathrooms, kids' rooms, discotheque and pub interiors, public utility buildings: office buildings, hospitals, or passage ways, for that matter. Safety and comfort of using SKOFF products is so great that the MUSIC LINE series lighting proves to be of excellent use even in proximity of newborns. The TANGO fittings are used to discretely illuminate kids' rooms, because they emit soft, non-invasive light, and through their structure enabling for 'taming of light', the used LED diodes are invisible for the user, which makes it possible to avoid unpleasant 'dazzle effect'.The TANGO fittings are available in two material versions - stainless steel and aluminium. Depending on a given object of use and user preferences, SKOFF offer presents four colours of emitted light: white, red, blue, and green. There are also available designer versions: TANGO, mini TANGO, TANGO STICK (straightforward fixing onto any surface with the use of glue or pressure-sensitive adhesive tape), TANGO mini STICK, as well as Duo TANGO (double fitting) and Lamp Bracket Duo TANGO (double fitting with distance piece to move it away from surface). Straightforward installation, ample choice of fitting types, and excellent light effect in combination with original design result in unlimited array of applications. Some prestigious awards - Gold Medal of Poznań International Trade Fair, award at the 'Śląska Rzecz' Design Competition, and European Medal - have been awarded to SKOFF for the MUSIC LINE series of products, inclusive of the TANGO series. It is a clear proof for that dancing with lighting stars is dancing in no other rhythm than the SKOFF LED TANGO rhythm.For_Immediate_Release:Poland, Polish People's Republic (Press Release) November 18, 2008 -- Such a small and elegant fitting provides unending possibilities of lighting and illuminating of all types of interiors. The LED TANGO fitting produced by SKOFF is something more than just a sourceof light, it is a step forward in a number of areas – especially so, in modern design. Why is that so?In the TANGO fitting, just like in the entire range of MUSIC LINE products manufactured by SKOFF, use has been made of the modern LED diode illumination system. The LED technology is characterised by high light emission at very low power consumption levels. Thanks to this, the TANGO lighting is incomparably cheaper in operation than traditional lamps are. Moreover, the TANGO fittings have been made of stainless steel or aluminium. Due to this, apart from impressive appearance, they also gained several practical characteristics, such as, high quality of components, and durability. Yet another advantage lies in the longevity of the LED diodes – 50 thousand hours of continuous lighting, at least! Due to minimal levels of heat emission, TANGO is characterised by operational safety, which is of some significance when installations are performed on flammable surfaces (wood, furniture panels, gypsum panels), and also in places exposed to moisture.The fittings shall prove to be of excellent use in places such as: staircases, furniture, corridors, halls, kitchens, bathrooms, kids’ rooms, discotheque and pub interiors, public utility buildings: office buildings, hospitals, or passage ways, for that matter. Safety and comfort of using SKOFF products is so great that the MUSIC LINE series lighting proves to be of excellent use even in proximity of newborns. The TANGO fittings are used to discretely illuminate kids’ rooms, because they emit soft, non-invasive light, and through their structure enabling for “taming of light”, the used LED diodes are invisible for the user, which makes it possible to avoid unpleasant “dazzle effect”.The TANGO fittings are available in two material versions –stainless steel and aluminium. Depending on a given object of use and user preferences, SKOFF offer presents four colours of emitted light: white, red, blue, and green. There are also available designer versions: TANGO, mini TANGO, TANGO STICK (straightforward fixing onto any surface with the use of glue or pressure-sensitive adhesive tape), TANGO mini STICK, as well as Duo TANGO (double fitting) and Lamp Bracket Duo TANGO (double fitting with distance piece to move it away from surface). Straightforward installation, ample choice of fitting types, and excellent light effect in combination with original design result in unlimited array of applications.The subject of music lantern controller designed by the commonly used analog circuits, small-scale integrated circuits (SSI), and memory chips. Lanterns on the one hand, by the music signal can control, on the other hand, there are several light water programs. Lanterns designed lantern controller with voice-activated water effects and programming functions.Economic development and the rise of the night market, all kinds of tricks of the lantern decorations and styles, to the city at night have brought brilliant color. Those colorful gorgeous, changing contrast lighting can effectively perform the atmosphere, highlighting the theme. Also satisfy the large-scale celebrations and city lighting engineering needs. Especially in the music signal and the organic integration of lighting, which uses music to control the light intensity changes in brightness so that it will have "Color Music" effect, people get to enjoy elegant. People's living standards improved, the need to further improve the quality of life, our living environment, the use of a variety of lanterns for the decoration of our living has become a fashion.。

相关文档
最新文档