外文翻译
外文翻译 - 英文
The smart gridSmart grid is the grid intelligent (electric power), also known as the "grid" 2.0, it is based on the integration, high-speed bidirectional communication network, on the basis of through the use of advanced sensor and measuring technology, advanced equipme nt technology, the advancedcontrol method, and the application of advanced technology of decision support system, realize the power grid reliability, security, economic, efficient, environmental friendly and use the security target, its main features include self-healing, incentives and include user, against attacks, provide meet user requirements of power quality in the 21st century, allow all sorts of different power generation in the form of access, start the electric power market and asset optimizatio n run efficiently.The U.S. department of energy (doe) "the Grid of 2030" : a fully automated power transmission network, able to monitor and control each user and power Grid nodes, guarantee from power plants to end users among all the nodes in the whole process of transmission and distribution of information and energy bi-directional flow.China iot alliance between colleges: smart grid is made up of many parts, can be divided into:intelligent substation, intelligent power distribution network, intelli gent watt-hourmeter,intelligent interactive terminals, intelligent scheduling, smart appliances, intelligent building electricity, smart city power grid, smart power generation system, the new type of energy storage system.Now a part of it to do a simple i ntroduction. European technology BBS: an integration of all users connected to the power grid all the behavior of the power transmission network, to provide sustained and effective economic and security of power.Chinese academy of sciences, institute of electrical: smart grid is including all kinds of power generation equipment, power transmission and distribution network, power equipment and storage equipment, on the basis of the physical power grid will be modern advanced sensor measurement technology, network technology, communicationtechnology, computing technology, automationand intelligent control technology and physical grid highly integrated to form a new type of power grid, it can realize the observable (all the state of the equipment can monitor grid), can be controlled (able to control the power grid all the state of the equipment), fully automated (adaptive and self-healing) and system integrated optimization balance (power generation, transmission and distribution, and the optimization of the balance between electricity), so that the power system is more clean, efficient, safe and reliable.American electric power research institute: IntelliGrid is a composed of numerous automation system of power transmission and distribution power system, in a coordinated, effective and reliable way to achieve all of the power grid operation: have self-healing function;Rapid response to the electric power market and enterprise business requirements;Intelligent communication architecture, realizes the real-time, security, and flexible information flow, to provide users with reliable, economic power services. State grid electric power research institute, China: on the basis of the physical power grid (China's smart grid is based on high voltage network backbone network frame, different grid voltage level based on the coordinated development of strong power grid), the modern advanced sensor measurement technology, communication technology, information technology, computer technology and control technology and the physical power grid highly integrated to form a new type of power grid.It to fully meet user demand for electricity and optimize the allocation of resources, guarantee the safety, reliability and economy of power supply, meet environmental constraints, ens ure the quality of electric energy, to adapt to the development of power market, for the purpose of implementing the user reliable, economic, clean and interactive power supply and value-added services.BackgroundStrong smart grid development in the wor ld is still in its infancy, without a common precisely defined, its technology can be roughly divided into four areas: advanced Measurement system, advanced distribution operation, advanced transmission operation and advanced asset management.Advanced meas urement system main function is authorized to the user, make the system to establish a connection with load, enabling users to support the operationof the power grid;Advanced core distribution operation is an online real-time decision command, goal is to disaster prevention and control, realizing large cascading failure prevention;Advanced transmission operation main role is to emphasize congestion ma nagement and reduce the risk of the large-scale railway;Advanced asset management is installed in the system can provide the system parameters and equipments (assets) "health" condition of advanced sensor, and thereal-time information collected by integrat ion and resource management, modeling and simulation process, improve the operation and efficiency of power grid.The smart grid is an important application of Internet of things, and published in the journal of computer smart grid information system archit ecture research is carried on the detailed discussion on this, and the architecture of the smart grid information system are analyzed.The market shareThe establishment of the smart grid is a huge historical works.At present many complicated smart grid project is underway, but the gap is still great.For the provider of the smart grid technology, promote the development of facing the challenges of the distribution network system i s upgrading, automation and power distribution substation transportation, smart grid network and intelligent instruments.According to the latest report of parker investigators, smart grid technology market will increase from $2012 in 33 billion to $2020 in 73 billion, eight years, the market accumulated up to $494 billion.China smart grid industry market foresight and investment forward-looking strategic planning analysis, points out that in our country will be built during the "twelfth five-year""three vertical and three horizontal and one ring" of uhv ac lines, and 11 back to u hv dc transmission project construction, investment of 300 billion yuan.Although during the period of "much starker choices-and graver consequences-in" investment slowed slightly, the investment is 250 billion yuan.By 2015, a wide range of national power grid, long distance transmission capacity will reach 250 million kilowatts, power transmission of 1.15 trillion KWH per year, to support the new 145 million kilowatts of clean energy generation given and sent out, can satisfy the demand of morethan 1 million electric cars, a grid resource configuration optimization ability, economic efficiency, safety and intelligent levels will be fully promoted.The abroad application of analysisIn terms of power grid development foundation, national electricity dema nd tends to be saturated, the grid after years of rapid development, architecture tends to be stable, mature, have a more abundant supply of electric power transmission and distribution capacity.Germany has "E - Energy plan, a total investment of 140 million euros, from 2009 to 2012, four years, six sites across the country to the smart grid demonstration experiment.At the same time also for wind power and electric car empirical experiments, testing and management of power consumption of the Internet.Big companies such as Germany's Siemens, SAP and Swiss ABB are involved in this plan.To smart grid Siemens 2014 annual market scale will reach 30 billion euros, and plans to take a 20% market share, make sure order for 6 billion euros a year.The advanced nat ureCompared with the existing grid, smart grid, reflects the power flow, information flow and business flow marked characteristics of highly integration, its advancement and advantage mainly displays in:(1) has a strong foundation of grid system and te chnical support system, able to withstand all kinds of external disturbance and attacks, can adapt to large-scale clean energy and renewable energy access, strong sex of grid reinforced and ascend.(2) the information technology, sensor technology, automatic control technology organic combination with power grid infrastructure, a panoramic view of available power grid information, timely detection, foresee the possibility of failure.Fault occurs, the grid can be quickly isolate fault,realize self recovery,to avoid the occurrence of blackouts.(3) flexible ac/dc transmission, mesh factory coordination, intelligent scheduling, power storage, and distribution automation technology widespread application, makes the control of power grid operation more flexibl e,economic, and can adapt to a large number of distributed power supply, power grid and electric vehicle charging and discharging facility access.(4) communication, information, and the integrated use of modern management technology, will greatly improve the efficiency of power equipment, and reduce the loss of electrical power, making the operation of power grid is more economic and efficient.(5) the height of the real-time and non real-time information integration, sharing and utilization, to run the show management comprehensive, complete and fine grid operation state diagram, at the same time can provide decision support, control scheme and the corresponding response plans.(6) to establish a two-way interactive service mode, users can real-time understand the status of the power supply ability, power quality, price and power outage information, reasonable arrangement of electric equipment use;The electric power enterprise can obtain the user's electricity information in detail, to provide more value-added services.developmentaltrend"Twelfth five-year" period, the state grid will invest 500 billion yuan to build the connection of large ene rgy base and center of the "three horizontal three longitudinal" main load of ultra high voltage backbone network frame and 13 back to long branch, engineering, to form the core of the world first-class strong smart grid."Strong smart grid technology standards promulgated by the state grid system planning", has been clear about the strong smart grid technology standards roadmap, is the world's first used to guide the development of smart grid technology guiding standards.SGC planning is to built 2015 basic information, automation, interaction characteristics of strong smart grid, formed in north China, central China, east China, for the end to the northwest and northeast power grid for sending the three synchronous power grid, the grid resource allocati on ability, economic efficiency and safety level, technology level and improve intelligent level.(1) the smart grid is the inevitable developing trend ofpower grid technology.Such as communication, computer, automation technology has extensive applicati on in the power grid, and organic combination with traditional electric power technology, and greatly improve the intelligent level of the power grid.Sensor technology and information technology application in the power grid, the system state analysis and auxiliary decision provides the technical support, make it possible to grid self-healing.Scheduling technology, automation technology and the mature development of flexible transmission technology, for the development and utilization of renewable energy an d distributed power supply provides the basic guarantee.The improvement of the communication network and the popularization and application of user information collection technology, promote the two-way interaction with users of the grid.With the further development of various new technologies, application and highly integrated with the physical power grid, smart grid arises at the historic moment.(2) the development of smart grid is the inevitable choice of social and economic development.In order to ach ieve the development of clean energy, transport and given power grid must increase its flexibility and compatibility.To withstand the increasingly frequent natural disasters and interference, intelligent power grid must rely on means to improve its securit y defense andself-healing ability.In order to reduce operating costs, promote energy conservation and emissions reduction, power grid operation must be more economic and efficient, at the same time must to intelligent control of electric equipment, reduce electricity consumption as much as possible.Distributed generation and energy storage technology and the rapid development of electric cars, has changed the traditional mode of power supply, led power flow, information flow, business flow constantly fusion, in order to satisfy the demands of increasingly diverse users.PlanJapan plans to all the popularity of smart grid in 2030, officer of the people at the same time to promote the construction of overseas integrated smart grid.In the field of battery, Japanese firms' global market share goal is to strive to reach 50%, with about 10 trillion yen in the market.Japan's trade ministry has set up a "about the next generation of energy systems international standardizationresearch institute", the japan-american established in Okinawa and Hawaii for smart grid experimental project [6].Learns in the itu, in 2020 China will be built in high power grid with north China, east China, China as the center, northeast, northwest 750 kv uhv power grid as the sending, connecting each big coal base, large hydropower bases, big base for nuclear power, renewable energy base, the coordinated development of various grid strong smart grid.In north China, east China, China high voltage synchronous ZhuWangJia six "five longitudi nal and transverse" grid formation.The direction ofIn the green energy saving consciousness, driven by the smart grid to become the world's countries to develop a focus areas.The smart grid is the electric power network, is a self-healing, let consum ers to actively participate in, can recover from attacks and natural disasters in time, to accommodate all power generation and energy storage, can accept the new product, service and market, optimize asset utilization and operation efficiency, provide qua lity of power supply for digital economy.Smart grid based on integrated, high-speed bidirectional communication network foundation, aims to use advanced sensor and measuring technology, advanced equipment, technology and advanced control methods, and adv anced technology of decision support system, realize the power grid reliability, security, economic, efficient, environmental friendly, and the use of safe run efficiently.Its development is a gradual progressive evolution, is a radical change, is the product of the coordinated development of new and existing technologies, in ad dition to the network and smart meters also included the wider range.Grid construction in high voltage network backbone network frame, all levels of the coordinated development, informatization, automation, interaction into the characteristics of strong smart grid, improve network security, economy, adaptability and interactivity, strength is the foundation, intelligence is the key.meaningIts significance is embodied in the foll owing aspects:(1) has the strong ability of resources optimization allocation.After the completion of the smart grid in China, will implement the big water and electricity, coal, nuclear power, large-scale renewable energy across regions, long distance, large capacity, low loss, high efficiency, regional power exchange capacity improved significantly.(2) have a higher level of safe and stable operation.Grid stability and power supply reliability will be improved, the safety of the power grid close coord ination between all levels of line, have theability to against sudden events and serious fault, can effectively avoid the happening of a wide range of chain failure, improve power supply reliability, reduce the power loss.(3) to adapt and promote the dev elopment of clean energy.Grid will have wind turbines power prediction and dynamic modeling, low voltage across, and active reactive power control and regular units quickly adjust control mechanism, combined with the application of large capacity storage technology, the operation control of the clean energy interconnection capacity will significantly increased, and make clean energy the more economical, efficient and reliable way of energy supply.(4)implementing highly intelligent power grid scheduling.Co mpleted vertical integration, horizontal well versed in the smart grid scheduling technology support system, realize the grid online intelligent analysis, early warning and decision-making, and all kinds of new transmission technology and equipment of effi cient control and lean control of ac/dc hybrid power grid.(5)can satisfy the demands of electric cars and other new type electric power user services.Would be a perfect electric vehicle charging and discharging supporting infrastructure network, can meet the needs of the development of the electric car industry, to meet the needs of users, realize high interaction of electric vehicles and power grid.(6) realize high utilization and whole grid assets life cycle management.Can realize electric grid system of the whole life cycle management plan.Through smart grid scheduling and demand side management, power grid assets utilization hours, power grid assets efficiency improvedsignificantly.(7) to realize power convenient interaction between the user and the grid.Will form a smart electricity interactive platform, improving the demand side management, to provide users with high-quality electric power service.At the same time, the comprehensive utilization of the grid can be distributed power supply, intelli gent watt-hour meter, time-sharing electricity price policy and the electric vehicle charging and discharging mechanism, effectively balance electric load, reduce the peak valley load difference, reduce the power grid and power construction costs.(8)grid management informatization and the lean.Covering power grid will each link of communication network system, realize the power grid operation maintenance integrated regulation, data management, information grid spatial information services, and production and scheduling application integration, and other functions, to realize all-sided management informatization and the lean.(9) grid infrastructure of value-added service potential into full play.In power at the same time, the national strategy of "triple play" of services, to provide users with community advertising, network television, voice and other integrated services, such as water supply, heating, gas industry informatization, interactive platform support, expand the range of value-added services and improve the grid infrastructure and capacity, vigorously promote the development of smart city.(10)Gridto promote the rapid development of related industries.Electric power industry belongsto the capital-intensive and technology-intensive industry, has the characteristics of huge investment, long industrial chain.Construction of smart grid, which is beneficial to promote equipment manufacturing information and communication industry technology upgrade, for our country to occupy the high ground to lay the foundation in the field of electric power equipment manufacturing.Important significanceLife is convenientThe construction of strong smart grid, will promote the development of intelligent community, smart city, improve people's quality of life.(1) to make life more convenient.Home intelligent power system can not onlyrealize the real-time control of intelligent home appliances such as air conditioning, water heater and remote control;And can provide telecommunication network, Internet, radio and television network access services;Through intelligent watt-hour meter will also be able to achieve au tomatic meter reading and automatic transfer fee, and other functions.(2) to make life more low carbon.Smart grid can access to the small family unit such as wind power and photovoltaic roof, pushing forward the large-scale application of electric cars, so as to raise the proportion of clean energy consumption, reduce the pollution of the city.(3) to make life more economical.The smart grid can promote power user role transformation, both electricity and sell electricity twofold properties;To build a family for the user electricity integrated services platform, to help users choose the way of electricity, save energy, reduce the energy expense.Produce benefitThe development of a strong smart grid, the grid function gradually extended to promote the optim al allocation of energy resources, guarantee the safe and stable operation of power system, providing multiple open power service, promote the development of strategic emerging industries, and many other aspects.As China's important energy delivery and configuration platform, strong and smart grid from the investment construction to the operation of production process will be for the national economic development, energy production and use, environmental protection bring great benefits.(1)in power system.Can save system effective capacity;Reducing the system total power generation fuel cost;Improving the efficiency of grid equipment, reduce construction investment;Ascension grid transmission efficiency, reduce the line loss.(2)in terms of power customers.Can realize the bidirectional interaction, to provide convenient services;Improving terminal energy efficiency, save power consumption;To improve power supply reliability, and improve power quality.(3) in the aspect of energy saving and environment.Can improve the efficiency of energy utilization, energy conservation and emissions reduction benefit.To promote clean energy development, realize the alternative reductionbenefits;Promote the overall utilization of land resources, saving land usage.(4) other aspects.Can promote the economic development, jobs;To ensure the safety of energy supply;Coal for power transmission and improve the efficiency of energy conversion, reducing the transportation pressure.Propulsion system(1) can effectively improve t he security of power system and power supply e of strong smart grid "self-healing" function, can accurately and quickly isolate the fault components, and in the case of less manual intervention make the system quickly returned to normal, so as to improve the security and reliability of power supply system.(2) the power grid to realize the sustainable development.Strong smart grid technology innovation can promote the power grid construction, implementation technology, equipment, operation an d management of all aspects of ascension, to adapt to the electric power market demand, promote the scientific and sustainable development of power grid.(3) reduce the effective ing the power load characteristics in different regions of the ch aracteristics of big differences through the unification of the intelligent dispatching, the peakand peak shaving, such as networking benefit;At the same time through the time-sharing electricity price mechanism, and guide customers low power, reduce the peak load, so as to reduce the effective capacity.(4) to reduce the system power generation fuel costs.Construction of strong smart grid, which can meet the intensive development of coal base, optimization of power distribution in our country, thereby red ucing fuel transportation cost;At the same time, by reducing the peak valley load difference, can improve the efficiency of thermal power unit, reduce the coal consumption, reduce the cost.(5)improve the utilization efficiency of grid equipment.First of all, by improving the power load curve, reduce the peak valley is poor, improve the utilization efficiency of grid equipment;Second, by self diagnosis, extend the life of the grid infrastructure.(6) reduce the line loss.On the important basis of uhv transmission technology of strong smart grid, will greatly reduce the loss rate in the electric power transmission;Intelligent scheduling system, flexible transmission technology and real-time two-way interaction with customers, can optimize the tide distribut ion, reducing line loss;At the same time, the construction and application of distributed power supply, also reduce the network loss of power transmission over a long distance.Allocation of resourcesEnergy resources and energy demand in the reverse distribution in our country, more than 80% of the coal, water power and wind power resource distribution in the west, north, and more than 75% of the energy demand is concentrated in the eastern and central regions.Energy resources and energy demand unbalance d distribution of basic national conditions, demand of energy needs to be implemented nationwide resource optimizing configuration.The construction of strong smart grid, for optimal allocation of energy resources provides a good platform.Strong smart grid is completed, will form a strong structure and sending by the end of the power grid power grid, power capacity significantly strengthened, and the formation of the intensity, stiffness of uhv power transmission network, realize the big water and electricit y, coal, nuclear power, large-scale renewable energy across regions, long distance, large capacity, low loss, high efficiency transport capacity significantly increased power a wide range of energy resources optimization.Energy developmentThe development and utilization of clean energy such as wind power and solar energy to produce electricity is given priority to, in the form of the construction of strong smart grid can significantly improve the grid's ability to access, given and adjust clean energy, vigorously promote the development of clean energy.(1) smart grid, the application of advanced control technology and energy storage technology, perfect the grid-connected clean energy technology standards, improve the clean energy acceptance ability.Clean energy base, (2) the smart grid, rational planning of large-scale space truss structure and sending the power structure, application of uhv, flexible transmission technology, meet the requirements of the large-scale clean energy electricitytransmission.(3) the smart grid for large-scale intermittent clean energy to carry on the reasonable and economic operation, improve the operation performance of clean energy production.(4) intelligent with electric equipment, can achieve acceptance and coordinated cont rol of distributed energy, realize the friendly interaction with the user, the user to enjoy the advantages of new energy power.Energy conservation and emissions reductionStrong smart grid construction to promote energy conservation and emissions reduc tion,development of low carbon economy is of great significance: (1) to support large-scale clean energy unit net, accelerate the development of clean energy, promote our country the optimization of energy structure adjustment;(2) to guide users reasonable arrangement of electricity, reducing peak load, stable thermal power unit output, reduce power generation coal consumption;(3) promote ultra-high voltage, flexible transmission, promotion and application of advanced technology such as economic operation, reduce the transmission loss, improve power grid operation efficiency;(4) to realize the power grid to interact with users effectively, promote intelligent power technology, improve the efficiency of electricity;(5) to promote the electric car of large-scale application, promote the development of low-carbon economy, achieve emission reduction benefits.There are three milestones of the concept of smart grid development:The first is 2006, the United States "smart grid" put forward by the IBM solution.IBM smart grid is mainly to solve, improve reliability and safety of power grid from its release in China, the construction of the smart grid operations management innovation - the new train of thought on the development of China's power "the white paper can be seen that the scheme provides a larger framework, through to the electric power production, transmission, the optimization of all aspects of retail management, for the relevant enterprises to improve operation efficiency and reliability, reduce cost dep icts a blueprint.IBM is a marketing strategy.The second is the energy plan put forward by the Obama took office, in addition to the published plan, the United States will also focus on cost $120 billion a year circuit。
外文翻译中英文对照
Strengths优势All these private sector banks hold strong position on CRM part, they have professional, dedicated and well-trained employees.所以这些私人银行在客户管理部分都持支持态度,他们拥有专业的、细致的、训练有素的员工。
Private sector banks offer a wide range of banking and financial products and financial services to corporate and retail customers through a variety of delivery channels such as ATMs, Internet-banking, mobile-banking, etc. 私有银行通过许多传递通道(如自动取款机、网上银行、手机银行等)提供大范围的银行和金融产品、金融服务进行合作并向客户零售。
The area could be Investment management banking, life and non-life insurance, venture capital and asset management, retail loans such as home loans, personal loans, educational loans, car loans, consumer durable loans, credit cards, etc. 涉及的领域包括投资管理银行、生命和非生命保险、风险投资与资产管理、零售贷款(如家庭贷款、个人贷款、教育贷款、汽车贷款、耐用消费品贷款、信用卡等)。
Private sector banks focus on customization of products that are designed to meet the specific needs of customers. 私人银行主要致力于为一些特殊需求的客户进行设计和产品定制。
毕业论文外文翻译格式【范本模板】
因为学校对毕业论文中的外文翻译并无规定,为统一起见,特做以下要求:1、每篇字数为1500字左右,共两篇;2、每篇由两部分组成:译文+原文.3 附件中是一篇范本,具体字号、字体已标注。
外文翻译(包含原文)(宋体四号加粗)外文翻译一(宋体四号加粗)作者:(宋体小四号加粗)Kim Mee Hyun Director, Policy Research & Development Team,Korean Film Council(小四号)出处:(宋体小四号加粗)Korean Cinema from Origins to Renaissance(P358~P340) 韩国电影的发展及前景(标题:宋体四号加粗)1996~现在数量上的增长(正文:宋体小四)在过去的十年间,韩国电影经历了难以置信的增长。
上个世纪60年代,韩国电影迅速崛起,然而很快便陷入停滞状态,直到90年代以后,韩国电影又重新进入繁盛时期。
在这个时期,韩国电影在数量上并没有大幅的增长,但多部电影的观影人数达到了上千万人次。
1996年,韩国本土电影的市场占有量只有23.1%。
但是到了1998年,市场占有量增长到35。
8%,到2001年更是达到了50%。
虽然从1996年开始,韩国电影一直处在不断上升的过程中,但是直到1999年姜帝圭导演的《生死谍变》的成功才诞生了韩国电影的又一个高峰。
虽然《生死谍变》创造了韩国电影史上的最高电影票房纪录,但是1999年以后最高票房纪录几乎每年都会被刷新。
当人们都在津津乐道所谓的“韩国大片”时,2000年朴赞郁导演的《共同警备区JSA》和2001年郭暻泽导演的《朋友》均成功刷新了韩国电影最高票房纪录.2003年康佑硕导演的《实尾岛》和2004年姜帝圭导演的又一部力作《太极旗飘扬》开创了观影人数上千万人次的时代。
姜帝圭和康佑硕导演在韩国电影票房史上扮演了十分重要的角色。
从1993年的《特警冤家》到2003年的《实尾岛》,康佑硕导演了多部成功的电影。
外文翻译原文
DOI: 10.1111/j.1475-679X.2010.00367.xJournal of Accounting ResearchVol. 48 No. 2 May 2010Printed in U.S.A.Discussion ofChief Executive Officer EquityIncentives and AccountingIrregularitiesJOHN E. CORE∗1. IntroductionIn an interesting and important paper, Armstrong, Jagolinzer, and Lar-cker (AJL) re-examine the question of whether CEO equity incentives cause accounting irregularities. As the authors note, this question is already much studied in the literature with a variety of methods and samples. Broadly speaking, the prior literature hypothesizes that equity incentives cause man-agers to manipulate accounting information, and generally finds a positive relation or no relation between equity incentives and proxies for manipula-tion. AJL add to this literature a larger sample that includes smaller firms (a beginning sample of roughly 4,000 firms a year versus roughly 1,500 firmsa year used in ExecuComp). In addition, they introduce a novel method (propensity score matching) that is robust to misspecification of functional form (―overt bias‖) and that provides an assessment of correlated omitted variables bias (―hidden bias‖).In contrast to prior research that generally examines pre–Sarbanes-Oxley data (2001 and before), AJL’s sample runs from 2001 to 2005.∗ The Wharton School, University of Pennsylvania. This discussion has benefited from, andreflects the comments of, participants at the 2009 Journal of Accounting Research conference. I gratefully acknowledge helpful comments from Wayne Guay and Greg Miller, and the financial support of the Wharton School. Any errors are the sole responsibility of the author.273Copyright C, University of Chicago on behalf of the Accounting Research Center, 2010274J. E. COREUsing this later sample, AJL find no evidence of a positive relation between CEO equity incentives and their proxies for accounting irregular-ities. As proxies for accounting irregularities, they use restatements, share-holder lawsuits, and U.S. Securities and Exchange Commission Account-ing and Auditing Enforcement Releases (AAERs). Using ―partial match‖logistic regressions similar to those used by some prior researchers, AJLfind no relation between incentives and accounting manipulation. Us-ing propensity score matching, the authors generally find no relation be-tween incentives and accounting manipulation, although there is some ev-idence of a negative relation between incentives and lawsuits. However,the negative relation with lawsuits does not appear to be robust to po-tential correlated omitted variables bias. The authors note that their re-sults are similar if they examine their later accounting irregularities us-ing the sample of ExecuComp firms generally used by prior research. Finally, the authors also show results using the earlier sample used by Erickson, Hanlon, and Maydew [2006]. In a ―partial match‖ conditional lo-gistic regression, AJL find a positive relation between incentives and fraud that is consistent with Johnson, Ryan, and Tian [2009] and in contrastto Erickson, Hanlon, and Maydew [2006]. However, in the better speci-fied, full-sample propensity-score model, AJL find no relation between in-centives and accounting manipulation, consistent with the full-sample lo-gistic regression in Erickson, Hanlon, and Maydew [2006]. In summary, the propensity score method shows no relation between incentives and ac-counting irregularities in the late sample, and no relation between incen-tives and accounting irregularities in the early sample. Overall, AJL’s result s suggest no relation between incentives and accounting irregularities. These results are important in that they add to a growing body of evidence that shows that, when empirical tests are correctly specified, there is no evidence of a relation between incentives and accounting irregularities.The remainder of this discussion is as follows. In section 2, I briefly out-line the hypotheses and method of the prior literature and those of AJL. In section 3, I discuss AJL’s results. Much of the discussion in the conference was on understanding propensity-score methods and whether and to what extent these methods should be used in accounting research, and I address these issues in section 4. In the final section, I conclude.2. Summary of Prior Literature—Hypotheses and Method2.1HYPOTHESESAs noted in AJL’s introduction, the basic hypothesis in prior literature is that equity incentives motivate executives to manipulate accounting infor-mation for personal gain. For this to be the case, executives need to believe that they can increase the stock price by manipulating earnings. In addi-tion, as discussed by participants and tested by, for example, Bergstresser and Philippon [2006] and Erickson, Hanlon, and Maydew [2006], if executives are rational when they manipulate earnings in an attempt toCHIEF EXECUTIVE OFFICER EQUITY INCENTIVES275 increase the value of their holdings, they will do so when they expect tobe able to benefit by selling equity. Thus, one expects vested options andstock holdings to predict rational manipulation; it would be irrational foran executive to manipulate if all his or her options and stock holdings were unvested.Participants noted that the underlying ―more equity is worse‖ story in this literature is similar to the story in an earlier and ongoing literature that―more equity is better‖ (e.g., Morck, Shleifer, and Vishny [1988]). In boththese literatures, how results are interpreted depend crucially on whetherequity incentives are assumed to be exogenous or endogenous (Demsetzand Lehn [1985]). Equity holdings in theory are chosen by boards to max-imize firm value and by managers to maximize private value, but for the―more equity is worse‖ and ―more equity is better‖ stories to go through,these choices need to have a substantial random (exogenous) component.The ―more equity is worse‖ story is causal if there is a substantial randomcomponent to the way that boards grant and require equity ownership, andif equity ownership has gotten to be too large on average. If boards do not understand equity compensation, but continue to grant it, it is conceivablethat equity incentives are random and too large.On the other hand, there are other explanations that involve maximiz-ing, nonrandom behavior. AJL give the example of risk-aversion: CEOs withlow risk aversion may hold more incentives and may be more likely to com-mit fraud. Another is monitoring difficulty. Firms with greater monitoringdifficulty may use more incentives, but their greater monitoring difficultyallows more accounting manipulation. Another possible link is CEO power.Suppose that powerful CEOs overpay themselves using equity, and have tohold this equity to camouflage their excess pay. Then if powerful CEOs aremore likely to commit fraud, there may appear to be a link between equityincentives and fraud.Whether there are perverse effects of equity incentives is a very important question. As discussed earlier and as demonstrated by Hribar and Nichols[2007], tests using equity incentives as an independent variable appear tobe readily confounded by endogeneity and correlated omitted variablesproblems.1 Thus, techniques that readily assess the sensitivity of results tocorrelated omitted variables seem not only worthwhile but also necessary.2.2METHODPrior work tests the hypothesis that incentives cause accounting irregu-larities using versions of the following regression model:Accounting Irregularity = β X + γ Equity Incentives + ε.(1) In this model, the ―treatment‖ or variable of interest is Equity Incentives, andthe dependent variable is some type of accounting irregularity or earnings1Note that endogeneity is fundamentally a correlated omitted variables problem. If onecould observe the part of an endogenous regressor that was correlated with the error term,one could include this omitted variable, and the regression would be correctly specified.276J. E. COREmanagement, and X are controls for determinants of Accounting Irregularity and/or Equity Incentives.As illustrated in AJL’s table 1, the prior literature uses a variety of prox-ies for incentives and accounting irregularities. Dependent variables exam-ined by the prior literature include: (1) AAERs (e.g., Erickson, Hanlon, and Maydew [2006]); (2) restatements (e.g., Burns and Kedia [2006]); and (3) accruals (e.g., Begstresser and Philippon [2006]). Perhaps reflecting the uncertainty discussed earlier about how to measure incentives to manage earnings, the prior literature has used a variety of proxies for equity incen-tives including: (1) total portfolio equity incentives (e.g., Erickson, Hanlon, and Maydew [2006]); (2) vested incentives (e.g., Erickson, Hanlon, and Maydew [2006] and Burns and Kedia [2006]); and (3) option compensa-tion as a percentage of total compensation (e.g., Burns and Kedia [2006]). In addition, studies differ as to whose incentives are measured: Most stud-ies use (1) CEO incentives, but some studies (e.g., Erickson, Hanlon, and Maydew [2006], Johnson, Ryan, and Tian [2009]) use (2) incentives for the top five executives.。
外文翻译完整版
毕业设计外文资料翻译原文题目:The Design and Retorfit of Buildings for Resistance to Blast-Induced Progressive Collapse 译文题目:建筑物的设计和改造抵抗由爆炸冲击引起的建筑物的连续倒塌院系名称:土木建筑学院专业班级:土木工程0303班学生姓名:吴建明学号:20034040332指导教师:白杨教师职称:讲师附件: 1.外文资料翻译译文;2.外文原文。
指导教师评语及成绩:签名: 2010年 4月 12日附件1:外文资料翻译译文译文标题(3号黑体,居中)×××××××××(小4号宋体,1.5倍行距)×××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××…………。
(要求不少于3000汉字)建筑物的设计和改造抵抗由爆炸冲击引起的建筑物的连续倒塌1.简介在近现代史中,极端的爆炸事件推动了现有的设计方法和规范重新评估冲击荷载对建筑结构和它们的居住着的影响。
外文翻译及中文译文
车床用于车外圆、端面和镗孔等加工的机床称作车床。
车削很少在其他种类的机床上进行,因为其他机床都不能像车床那样方便地进行车削加工。
由于车床除了用于车外圆还能用于镗孔、车端面、钻孔和铰孔,车床的多功能性可以使工件在一次定位安装中完成多种加工。
这就是在生产中普遍使用各种车床比其他种类的机床都要多的原因。
两千多年前就已经有了车床。
现代车床可以追溯到大约1797年,那时亨利•莫德斯利发明了一种具有把主轴和丝杆的车床。
这种车床可以控制工具的机械进给。
这位聪明的英国人还发明了一种把主轴和丝杆相连接的变速装置,这样就可以切削螺纹。
车床的主要部件:床身、主轴箱组件、尾架组件、拖板组、变速齿轮箱、丝杆和光杆。
床身是车床的基础件。
它通常是由经过充分正火或时效处理的灰铸铁或者球墨铸铁制成,它是一个坚固的刚性框架,所有其他主要部件都安装在床身上。
通常在球墨铸铁制成,它是一个坚固的刚性框架,所有其他主要部件都安装在床身上。
通常在床身上面有内外两组平行的导轨。
一些制造厂生产的四个导轨都采用倒“V”,而另一些制造厂则将倒“V”形导轨和平面导轨结合。
由于其他的部件要安装在导轨上并(或)在导轨上移动,导轨要经过精密加工,以保证其装配精度。
同样地,在操作中应该小心,以避免损伤导轨。
导轨上的任何误差,常常会使整个机床的精度遭到破坏。
大多数现代车床的导轨要进行表面淬火处理。
以减少磨损和擦伤,具有更大的耐磨性。
主轴箱安装在床身一端内导轨的固定位置上。
它提供动力。
使工件在各种速度下旋转。
它基本上由一个安装在精密轴承中的空心轴和一系列变速齿轮---类似于卡车变速箱所组成,通过变速齿轮,主轴可以在许多中转速的旋转。
大多数车床有8~18中转速,一般按等比级数排列。
在现代车床上只需扳动2~4个手柄,就能得到全部挡位的转速。
目前发展的趋势是通过电气的或机械的装置进行无级变速。
由于车床的精度在很大程度上取决于主轴,因此主轴的结构尺寸较大,通常安装在紧密配合的重型圆锤滚子轴承或球轴承中。
外文翻译英文原文
Executive SummaryExtracted fromNIST NCSTAR 1-4 (Draft)Federal Building and Fire Safety Investigation of the World Trade Center DisasterActive Fire Protection Systems (Draft)E XECUTIVE S UMMARYIn the event of a fire in a building, the safety of occupants and first responders and the protection of property is accomplished through a combination of passive and active means. A passive fire protection system is one which is an integral part of the building layout and materials of construction, such as partitions to confine the fire, a stairway to assist rapid evacuation, or spray-on fire proofing to increase the fire resistance of a load-bearing steel structure. Active fire protection systems are designed to come into play only when a fire is present and require activation through a combination of sensors or mechanical means. The active fire protection systems in World Trade Center (WTC) 1, 2, and 7 consisted of fire sensors and alarms, notification systems, sprinklers, water supplies, and smoke management systems. Active and passive fire protection systems work together to control the spread of the fire and maintain the integrity of the structure; however, the fire department is always relied upon to fully extinguish the fire and rescue occupants who may be immobilized.The automatic fire sprinkler systems in WTC 1, 2, and 7 were the first line of defense. Water stored in the building from public sources or pumped from fire apparatus was supplied through dedicated piping to the area of the fire. Also present in the buildings were hoses, preconnected to a water supply through standpipes located in the stairwells and other utility shafts. The standpipes provided hose connections at each floor for The Fire Department of the City of New York (FDNY). In addition, standpipe preconnected hoses were installed for trained occupants to manually suppress fires.The heart of the fire detection system was the automatic fire alarm and emergency notification system. Occupants in the building depended on this system to detect fires and provide information for emergency evacuation. Capabilities were also designed for the ventilation system to operate in a way to purge smoke produced by fires from the building. Smoke purge was intended to be used for post-fire clean-up but could be used during a fire event at the discretion of the FDNY.This report includes an examination of the design and installation of the active fire protection systems in WTC 1, 2, and 7 and a description of the normal operation of fully functional systems and their potential effect on controlling the fires on September 11, 2001. The applicable building and fire codes and standards, as well as the history of fires in these buildings, are also documented.FIRESPRIOR TO SEPTEMBER 11, 2001E.1 SIGNIFICANTSignificant fires in WTC 1, 2, and 7 prior to September 11, 2001, were of interest to the investigation, particularly those that activated multiple sprinklers or where hoses were used to suppress the fires. Because the records of fire events in the buildings maintained by The Port Authority of New York and New Jersey (PANYNJ) were destroyed in the fire and collapse of WTC 1, information available for study was limited to that from FDNY fire and investigation reports.A major fire occurring in WTC 1 in 1975, prior to the installation of sprinklers, and the bombing of the WTC towers in 1993 were the most significant incidents in the history of these buildings. In addition,47 other fires were identified that were substantial enough to activate a sprinkler or require hoses to suppress the fire. Sixteen fire incidents exercised multiple sprinklers or multiple standpipe connectedExecutive Summary Draft for Public Comment hoses (with or without the activation of at least one sprinkler). Thirty-one fires involved the use of one standpipe hose or one standpipe hose and discharge of one sprinkler. Only three fires were identified to have occurred in WTC 7 prior to 2001. The FDNY fire reports and fire investigation records obtained by the National Institute of Standards and Technology (NIST) indicate that in areas protected by automatic sprinklers, no fire activated more than three sprinklers.AND PRECONNECTED HOSE SYSTEMS E.2 SPRINKLERS,STANDPIPES,The evaluation of the sprinklers, standpipes, and preconnected hose systems was performed by subject experts at Hughes Associates, Inc., under contract to NIST. The project documented the design, installation, and operation of the fire suppression systems in WTC 1, 2, and 7; evaluated the consistency of the sprinkler and standpipe systems installations with best engineering practices; described the New York City (NYC) water supply system and evaluated the sprinkler system water supply; and estimated suppression system performance when challenged with design fire scenarios assumed in standard engineering practice as well as with a fire scenario similar to that which occurred on September 11, 2001. Major features of the fire suppression systems are documented based on a review of the available information. In addition to describing in detail the sprinkler, standpipe, and preconnected hose systems, special fire suppression systems are briefly discussed. System features documented include riser systems, zone arrangements, water tanks, pumps, fire department connections, control valves, and hose rack arrangements. Additionally, documentation of the sprinkler, standpipe, and preconnected hose system installations was examined for consistency with the applicable installation standards and state-of-the-art engineering practices at the time of system installation.A description of the NYC water supply, including sizes, locations, and directions of water mains surrounding the WTC complex and distribution system within the buildings is provided to adequately evaluate the primary source of water for the automatic sprinkler and hose systems. Adequacy of the sprinkler system water supply was based on a detailed review of the available documentation. Flow capacity and duration of water supplies to the installed sprinkler systems were estimated using industry-accepted software. Hydraulic calculations were performed with variations in primary and secondary water supplies, the number of sprinklers flowing, and floor level elevations. The results from the calculations were used to evaluate the expected sprinkler system performance.Multiple fire scenarios were analyzed in order to more fully understand the potential impact of the suppression systems to provide the flow of water required to control typical office fires within high-rise buildings. The analysis included single fires on different floors in the towers and in WTC 7 with various combinations of sprinklers activated and with primary and secondary water supplies. Additionally, hydraulic calculations based on simultaneous fires on up to a total of nine floors were performed. Estimates of suppression system performance in WTC 1, 2, and 7 on September 11, 2001, were also made.The following list summarizes the findings of the suppression and water supply study:•Except for specific areas that were exempted from required sprinkler coverage, sprinklers were installed throughout WTC 1, 2, and 7 on September 11, 2001.Draft for Public Comment Executive Summary •According to the documentation examined, the fire suppression systems in WTC 1, 2, and 7 were installed, for the most part, in a manner consistent with state-of-the-art practices inexistence at the time of their installation. The installations as documented, with severalminor exceptions, would satisfy current best practices.•Storage tanks, along with direct connections to the NYC water distribution system, supplied water for WTC 1 and WTC 2, and for floors 21 through 47 of WTC 7. Fire suppressionsystems for floors 1 through 20 in WTC 7 were supplied directly through the NYC waterdistribution system and an automatic fire pump, with no secondary supply.•The installation of the supply piping from the storage tanks on the 110th floor in WTC 1 and WTC 2 resulted in restricted flow capacity to several floors. The flow capacity was sufficientto supply the suppression systems, but the installation was not consistent with currentengineering best practices.•The suppression systems in WTC 1, 2, and 7 required manual initiation of the electrical fire pumps in order to provide supplemental water. An automatic supplemental water supply hasbeen required by National Fire Protection Association (NFPA) 14 for some time andrepresents best practice. Due to extensive damage to the sprinkler and standpipe systems inWTC 1 and WTC 2 on September 11, 2001, it is doubtful that automatic pumps would havemade any difference in performance.•The supply risers for automatic sprinkler systems in WTC 1, 2, and 7 were configured to provide redundant capabilities. However, the sprinkler floor level controls were installedwith one connection to the sprinkler water riser. This represented a single point of failurelocation for the water supply to the sprinklers on that floor.•The water flow capacities of the sprinkler systems installed in WTC 1, 2, and 7 were designed to provide densities considerably greater than typically provided for high-rise officebuildings. Based on hydraulic calculations, it was estimated that the sprinkler systems couldhave controlled a typical fire at a coverage area up to two to three times the specific designarea of 1,500 ft2. However, a coverage area of 4,500 ft2 constitutes less than 15 percent ofthe area of a single floor.•The standpipe and preconnected hose systems were consistent with the applicable requirements in the Building Code of New York City (BCNYC). They were not consistentwith the flow rates and durations specified by NFPA 13.•The loading berth and fuel oil pump rooms in WTC 7 were protected by dry-pipe sprinkler systems. The first floor room containing the 6,000 gal fuel oil tank was protected by anInergen clean agent fire suppression system.•The fifth floor generator room was not equipped with a sprinkler system, consistent with the BCNYC. No information was found that indicated that the generator/fuel day-tankenclosures elsewhere in WTC 7 were protected by a fire suppression system.Executive Summary Draft for Public Comment •Primary and backup power were provided in all three buildings, but the absence of remote redundancy of the power lines to emergency fire pumps could have affected the operability ofthe sprinkler and standpipe systems once power was lost.•Due to the magnitude of the initial fires and the likely aircraft impact-induced damage sustained to the suppression systems infrastructures in WTC 1 and WTC 2, it is notunexpected that the suppression systems present in these buildings failed to control the fireson September 11, 2001.E.3 FIRE ALARM SYSTEMSThe evaluation of the fire alarm systems, a review of applicable codes and standards, documentation of the normal operation of fully functional fire alarm systems, and their potential performance in WTC 1, 2, and 7 on September 11, 2001, were performed by subject experts at Rolf Jensen and Associates, Inc., under contract to NIST.Major features of the fire alarm systems in WTC 1, 2, and 7 are described based on a review of the available documentation. Details on the fire command station, fire alarm system functions, fire alarm system installation criteria, control panel configurations, fire alarm devices, and firefighter telephone system are provided. Additionally, the staff emergency response plan that provided direction for emergency response is outlined. The responsibilities of the fire safety director, deputy fire directors, assistant fire safety coordinator, and floor wardens are described.For WTC 1 and WTC 2, performance on September 1, 2001, was documented based on brief images of illuminated status lamps on the system’s control panels, which were filmed during the event, and through interviews with people who were in the buildings at the time. The performance of the WTC 7 fire alarm system was assessed on the basis of the printout of the fire alarm system’s remote monitoring system.The following is a summary of findings based upon the review of the building designs and analysis of the various fire alarm systems:•Because the WTC 1 and WTC 2 fire alarm system required manual activation to notify building occupants, the alarm signal was delayed until 12 min after impact in WTC 1.•The telephone circuits and the notification appliance circuits were not required to have the same performance requirements as the signaling line circuits.•Attempts were made to use the firefighter telephone systems in WTC 1 and WTC 2 on September 11, 2001; however the system was not functioning.•Although the fire alarm systems in WTC 1 and WTC 2 used multiple communication path risers, the systems experienced performance degradation, especially in WTC 1 where all firealarm notification and communication functions appear to have been lost above the floors ofimpact.Draft for Public Comment Executive Summary •The fire alarm system installed in WTC 7 sent to the monitoring company only one signal indicating a fire condition in the building on September 11, 2001. This signal did not containany specific information about the location of the fire within the building.E.4 SMOKEMANAGEMENTSubject experts at Hughes Associates, Inc., under contract to NIST, evaluated the design and installation of the smoke management systems in WTC 1, 2, and 7, reviewed applicable codes and standards, and documented the normal operation of the fully functional smoke management systems and their potential effect on smoke conditions in WTC 1 and WTC 2 on September 11, 2001.The review of building codes and standards determined those that were applicable to WTC 1, 2, and 7. Specifically, the versions of BCNYC that applied and the local laws that were enacted which pertain to smoke management are presented. This review was used as a basis for documenting building designs and evaluating system performance. Descriptions are provided of the basic architecture of each building as it pertains to the establishment of smoke control zones, heating, ventilation and air-conditioning (HVAC) components and layout relevant to smoke management, and sequences of operation of smoke management systems (i.e., activation of fans and positioning of dampers to control airflow during smoke control operations).Smoke management system performance of WTC 1 and WTC 2 was evaluated based on the understanding of the systems developed during the design reviews. Analysis was performed using industry-accepted software to analyze the interaction between the building and the HVAC systems to determine the extent to which building pressures could be maintained in order to control or prevent the spread of smoke from a zone of fire origin to the rest of the building. The ability of the documented smoke management system to perform under typical design fire scenarios was analyzed along with the ability of the – assumed to be fully functional – system to perform given the damage sustained and the extreme fire/smoke conditions that developed as a result of aircraft impacts on the building.In order to more fully understand the potential impact of smoke management systems within high-rise buildings, multiple smoke management strategies, design fire scenarios, building configurations and weather conditions were analyzed. In total, a set of 180 simulations were performed, and results were evaluated.The following are findings from the evaluation of the smoke management systems:•The smoke management systems in WTC 1 and WTC 2 were not initiated onSeptember 11, 2001.•Had the smoke purge sequence been initiated in WTC 1 or WTC 2, it is unlikely the system would have functioned as designed, due to damage caused by aircraft impacts.•WTC 1 and WTC 2 were not required by the 1968 BCNYC, as amended by Local Law 5 and Local Law 86, to have active smoke and heat venting and/or stair pressurization because theycontained automatic sprinklers throughout.Executive Summary Draft for Public Comment •Even if fully operational, none of the potential smoke management systems evaluated would have prevented smoke spread given the damage caused by aircraft impact.•During the events occurring on September 11, 2001, stair pressurization would have been ineffective in improving conditions for occupants trying to exit the building.•Installation of combination fire/smoke dampers in HVAC ductwork, which was not required in WTC 1 or WTC 2, may have acted to slow the development of hazardous conditions on theuppermost floors of the building, but would likely not have had a significant effect on theability of occupants to egress the building due to the impassibility of the exit stairways.。
外文翻译原文
IntroductionLatvian legislation for forest protection belts Latvian legislation demands that forest protection belts are established around all cities and towns. The concept of protection belts originates from the Soviet Era and is maintained in Latvian legislation despite the radical changes to the political system after regaining indepen-dence in 1991. The legal background for the establish-ment of protection belts is as follows:•Law on Protection Belts (1997, 2002)•Forest Law (2000)•Law on Planning of Territorial Development (1998).Designating a greenbelt around the city of Riga, LatviaJanis DonisLatvian State Forestry Research Institute ‘Silava’, Salaspils, LatviaAbstract: Latvian legislation demands that forest protection belts are established around all cities and towns. The main goal of a protection belt is to provide suitable opportuni-ties for recreation to urban dwellers and to minimise any negative impacts caused by urban areas on the surrounding environment. Legislation states the main principles to be adopted, which include the maximum area of protection belts, their integration in terri-torial development plans and restrictions placed on forest management activities. The largest part of the forest area around Riga is owned by the municipality of Riga, which, as a result, has two competing interests: to satisfy the recreational needs of the inhabitants of Riga, and to maximise the income from its property. In order to compile sufficient background information to solve this problem, the Board of Forests of Riga Municipality initiated the preparation of a proposal for the designation of a new protection belt.The proposal was based on the development and application of a theoretical framework developed during the 1980s. The analysis of the recreational value of the forest (5 class-es of attractiveness) was carried out based on categories of forest type, dominant tree species, dominant age, stand density, distance from urban areas and the presence of at-tractive objects. Information was derived from forest inventory databases, digital forest maps and topographic maps. Additional information was digitised and processed using ArcView GIS 3.2. Local foresters were asked about the recreation factors unique to differ-ent locations, such as the number of visitors and the main recreation activities. From a recreational point of view and taking into account legal restrictions and development plans for the Riga region, it was proposed to create three types of zones in the forest: a protection belt, visually sensitive areas and non-restricted areas.Key words:greenbelt forest, recreational value, GIS, zoningThe Law on Protection Belts states that protection belts around cities (with forests as part of a green zone)have to be established (a) to provide suitable conditions for recreation and the improvement of the health of urban dwellers, and (b) to minimise the negative im-pact of urban areas on the surrounding environment.Urban For.Urban Green.2 (2003):031–0391618-8667/03/02/01-031 $ 15.00/0Address for correspondence:Latvian State Forestry Re-search Institute ‘Silava’, Rı¯gas iela 111, Salaspils, LV-2169,Latvia. E-mail: donis@silava.lv© Urban & Fischer Verlaghttp://www.urbanfischer.de/journals/ufugRegulation nr 263 (19.06.2001) on the ‘Methodology for the establishment of forest protection belts around towns’issued by the Cabinet of Ministers (CM) states: (a) The area of a protection belt depends on the numberof inhabitants in the town: towns with up to 10,000 inhabitants should have a maximum of 100 ha of protection belt, those with between 10,000 and 100,000 inhabitants a maximum of 1,500 ha, and towns with more than 100,000 inhabitants a maxi-mum of 15,000 ha;(b) the borders of protection belts have to be able to beidentifiable on the ground, using features such as roads, ditches, power lines, and so forth;(c) protection belts have to be recorded in the territorialplans of regions adjacent to the town or city; and (d) establishment of protection belts has to be agreedupon by local municipalities.According to law, protection belts should be man-aged using adapted silvicultural measures. Clear-cut-ting, for example, is prohibited in a protection belt to mitigate any negative impacts of the city on the sur-rounding environment. The Forest Law of 2000 and subsequent regulations including the Regulation on Cutting of Trees, and the Regulation on Nature Conser-vation in Forestry define clear-cuts as felled areas larg-er than 0.1 ha where the basal area is reduced below a critical level in one year. These regulations also state the permitted intensity and periodicity of selective cut-ting (30–50%, at least 5 years between entries).The third element of the legal framework relevant for protection belts in Latvia is the Law on Planning of Territorial Development (1998). It defines:(a) Principles and responsibilities of the different or-ganisations involved;(b) the contents of territorial plans;(c) the procedures for public hearing; and(d) the procedures for the acceptance of plans.The law also states that protection belts around towns have to be designated in territorial plans. Thus, the legislation gives very detailed descriptions of the restrictions to maximum area, activities and guidelines for delineation and so forth, while there are no ‘rules’for the choice of what areas are to be included in pro-tection belts. It is up to territorial planners to propose what areas to include and for negotiation among mu-nicipalities to approve the selection.Protection belt for the city of RigaRiga and the Riga region are situated in the Coastal Lowland of Latvia within the Gulf of Riga. The main landform types are the Baltic Ice Lake plain, the Litto-rina Sea plain and the Limnoglacial plain and bog plain. The total area of the administrative area of the City of Riga covers 307.2 km2, and that of the Riga re-gion 3,059 km2. In 2000 the city of Riga had 815,000 inhabitants, while an additional 145,000 people resided in the greater Riga region. During the last decade the number of inhabitants in Riga decreased by 10.5%and in Riga region by 5.3%. In the mid-1990s the main types of industry in Riga were food processing, timber and wood processing, metal fabricating and engineer-ing, while in the region agriculture and forestry, wood processing, pharmaceuticals, and the power industry were the main activities. Due to reduced industrial ac-tivities today, the main sources of pollution in Riga re-gion are road transport and households.The greater part of the Riga region is covered by for-est, i.e. 1,642 km2or 53%. About 26% of the land is used for agriculture, 4% is covered by bogs, and 4% by water. The Riga region also has a coastal dune zone of some 30 km along the Gulf of Riga. The main tree species to be found in the Riga region are Scots pine (Pinus sylvestris L.),birch (Betula spp.) and Norway spruce (Picea abies (L.) Karsten) (see Table 1). In the administrative area of the city of Riga, 57 km2 or about 19% of the land area is forest. Scots pine is the domi-nant species, covering approx. 46.9 km2(i.e. 88% of the total forest area).According to the legislation described before, a pro-tection belt around Riga city, with a maximum size of 15,000 ha, could be designated. Moreover, any propos-al has to be agreed upon among 24 local municipalities. The Riga region is divided into 24 administrative units: 7 towns and 17 pagasts or ‘parishes’.Riga municipality currently owns more than 55,600 ha of forests. Most are situated in the vicinity of Riga. Four forest administrative districts lie completely with-in Riga region and close to Riga city (see Fig. 1). The total area of these districts is 44,158 ha out of which forest stands cover 36,064 ha (82%). Thus the Riga municipality forests of those 4 districts cover only 17% of the total forest area of the Region. The dominant tree species in the municipally owned forests are Scots32J.Donis:Designating a greenbelt around the city of Riga,LatviaUrban For.Urban Green.2 (2003)Table 1.Tree species composition in the Riga region Dominant tree Area covered, ha Average age, years species––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––Total Municipa-Total Municipa-lity*lity* Scots pine95,27627,3718581 Norway spruce20,8493,0175139Birch30,5585,1246056 Other10,438552––Total157,12136,0647369*Data only for the 4 forest districts of the Riga city munici-pality that are entirely situated within the Riga region.pine, birch and Norway spruce. These cover 76%, re-spectively 14% and 8% of the forest area. Other species cover less than 2% of the area.Until the re-establishment of Latvian independence almost all forestland was owned by the state but since then many areas have been returned to their former owners and are now privately owned. Current regula-tions state that until the designation of new boundaries for protection belts has been agreed upon, all forests of the previously existing and protected green zone have to remain protected whatever their functional role or ownership status. Consequently almost all forests of the Riga municipality located in the Riga region have management restrictions placed on them, and the same can be said for forests of other owners within the previ-ously existing green zone. Currently, therefore, on the one hand significant recreation opportunities for urban dwellers are provided, while on the other hand forest owners’rights to obtain income from timber harvest in the suburban areas continue to be restricted. Suburban municipalities also lose income because of reduced land taxes from land with management restrictions.The board of Forests of the Municipality of Riga there-fore initiated the preparation of a proposal to designate a new protection belt.Study to support protection belt designation The main objective of the study presented here has been to obtain background information in preparation for further discussions with local municipalities. Stud-ies in Latvia as well as elsewhere have revealed that recreational values of forests depend mainly on forest characteristics, location and level of pollution (Emsis et al. 1979; Emsis 1989; Holgen et al. 2000; Lindhagen & Hörnsten 2000; Rieps ˇas 1994; Su ¯na 1973, 1979). A very important aspect is the distance to the forest from places where people live (e.g. Rieps ˇas 1994). The abil-ity of a forest stand to purify the air by filtering or ab-sorbing dust, micro-organisms, and noxious gases de-pends on tree and shrub species composition, age, tree size and stand density (Emsis 1989). Stands purify the air most effectively at the time of maximum current an-nual volume increment, usually between 30 to 60 years of age in Latvian conditions, depending on species.Recreational value, on the other hand, increases with age (and tree size) and reaches its maximum consider-ably later. Taking into account the peculiarities of the dispersal of pollution as described by Laivin ‚s ˇ et al.(1993) and Za ¯lı¯tis (1993), selective cutting is prefer-able in the vicinity of a pollution source, especially ifJ.Donis:Designating a greenbelt around the city of Riga,Latvia 33Urban For.Urban Green.2 (2003)Fig. 1.Location ofthe Riga municipali-ty forests in the Riga region.the forest consists of a narrow strip between the pollu-tion source and housing. If the distance between a pol-lution source and housing exceeds several kilometres, a patch clear-cut system with stands of different ages is sufficient to provide a reduction in the negative impact of urban areas. Taking into account the fact that closer to residential areas it is more important to consider the visual qualities of the forest (e.g. Tyrväinen et al. 2003), this purification ability can generally be ignored when planning protection belts.MethodsThis study to support the designating of the Riga pro-tection belt used the following data sources for analysis (see Fig. 2): forest inventory databases, digital forest maps of the Riga municipal forests which are situated outside the administrative borders of the city (55,600 ha of which 44,158 ha located in the Riga region) (see Fig. 1), and corresponding topographic maps.The study and its developed proposal are based on an application of a theoretical approach developed during the 1980s by the Latvian State Forestry Research Insti-tute ‘Silava’(Emsis 1989) and the Lithuanian Forestry Research Institute (Riepsˇas 1994). According to the methodology developed by Emsis (1989), the first step in the process is to evaluate the recreational potential of the forest stands. This is carried out by analysing the following factors:• The tolerance of the forest ecosystem to different lev-els of anthropogenic (recreation) loading;• the status of forest ecosystems in terms of the damage or degradation as a result of recreational use;•the suitability of the landscape for non-utilitarian recreation (recreational value); and• the existing and potential levels of recreational loads.The second step involves evaluating the existing andexpected functional roles of the forest.The tolerance of the forest ecosystem to different levels of anthropogenic impact or loading is evaluated using a framework based on a combination of forest type, dominant tree species, dominant age group, soil type and relief, according to the stability of ecosystem. All stands are classified into one of five tolerance classes. The highest score is given to mature deciduous forests on mesotrophic and mesic soils on flat topogra-phy, while the lowest score is given to young pine stands on oligotrophic soils on steep slopes (forests on dunes).In this study ecosystem tolerance could not be evalu-ated, as it was primarily a desk using existing databas-es, and topographic relief maps were not available in digital form. The status of the forest ecosystem in rela-tion to damage or degradation was evaluated in terms of the degree of change in vegetation cover, under-growth, tree root exposure of the and level of littering, classified into three classes.Assessment of the recreational value of the forest stands was calculated using a formula developed by Riepsˇas (1994):Recreational value VR= (VS*kW*kS+VA)*kPWhere VSis stand suitability based on key internal at-tributes of the stand, such as species, age, stand densityand forest type. VSvalues range from 0 for young, high-density grey alder (Alnus incana L.) on wet peat soils, to 100 for average density mature pine stands ondry mineral soils. kwis a coefficient depending on the distance of the stand from watercourses, ranging from0.1 for stands further than 2 km from watercourses to1.0 for stands up to 500 m from watercourses. kSis a coefficient depending on the distance of the stand from urban areas, ranging from 0.1 for stands further than34J.Donis:Designating a greenbelt around the city of Riga,LatviaUrban For.Urban Green.2 (2003)Fig. 2.Structure of data sources used in data ana-lysis.80 km from Riga to 1.0 for stands within 30 km ofRiga. VA is an additional value depending on the pres-ence of attractive features, for example, 25 for forest stands up to 500 m from settlements, including summer cottages, or for areas intensively used for recreation ac-cording to information of local foresters. kP is a coeffi-cient depending on the level of environmental pollu-tion. Its value is 0 if the actual pollution level exceeds limit values, 0.5 if the level of environment pollution is between 50% and 100% of limit values, and 1 if the level of actual pollution is less than 50% of the limit values. In this study a coefficient of 1.0 was used, be-cause SO2and O3concentrations measured by Rigabackground measuring stations did not exceed 50% of the limit values (Fammler et al. 2000).The division of stands into classes of stand suitabili-ty is based on studies of visitors’preferences. Coeffi-cients kw, ksand VAare based on visitors’spatial distri-bution and show the ratio of the number of visitors in different zones. The evaluation of existing and expect-ed recreational loads was carried out by local foresters. They marked existing and potential recreation places on forest maps, including:•Small areas or sites for activities such as swimming, barbecuing, and so forth.•Recreation territories, defined as areas of 20 ha or more where people stay longer periods for walking, jogging, skiing or other forms of both active and pas-sive recreation.•Traditionally popular places for the collection of berries and mushrooms.•Recreational routes, including routes from public transport stops to recreation sites or recreation terri-tories, and between recreation sites and territories. For each recreation site and recreation territory data on the main seasons of use, the periods of use (week-days, weekends), and the average number of people in ‘rush-hours’during good weather conditions was col-lected or estimated.Data processing was carried out using ArcView GIS3.2a, Visual Fox pro and Microsoft Excel. VS values foreach stand were calculated from information in the for-est database using Visual Fox pro. Information collect-ed at a later stage from local foresters was digitised using separate themes (layers) in ArcView GIS 3.2a. Buffer zones along watercourses and water bodies, as well as residential areas, recreation sites and territoriesand recreation routes were created to get kW ,kSand VAvalues for each stand. Then VR values were calculatedfor each stand.A selection of recreation sites and territories was vis-ited by members of the project team in order to evalu-ate the state of the ecosystem with respect to wear and tear arising from different levels of recreational use. An evaluation of the existing functional role of each forest stand was carried out using the existing categories offorest protection. The anticipated future functional role was evaluated by annalysing the recreational value of stands, known expectations in terms of territorial de-velopment, and existing legal restrictions in order to find a compromise between recreation possibilities and other services of the forest. Next, a first draft of the protection belt was drawn according to experts’judge-ment. This draft included forests with high recreational value adjacent to residential areas and summer cot-tages, and larger tracts intensively used for recreation with medium to high recreational value.ResultsAccording to the original forest classification 65% of the total forest land area was designated as a commer-cial greenbelt forest, for which the main management goals are timber production and environmental consid-erations. The remaining 35% were designated as pro-tected (see Table 2). With regards to protected areas in Latvia: the main management goals of nature parks are nature conservation and recreation, including some ed-ucation. The goal for nature reserves is nature conser-vation, while that of the protected greenbelt forests is recreation.While interviewing local foresters it was revealed that they find it difficult to evaluate dispersed recreation loads (for example collection of berries, mushrooms). The assessments of foresters varied greatly and were considered to be unreliable. It was therefore decided to map only the places important for recreation, but not to use the inaccurate estimates of visitor numbers.In Latvia, special investigations have to be carried out in order to develop management objectives and principles for protected forests as part of the preparation of management plans. Pilot studies and visits to some of the recreation areas have revealed that the evaluation of the state of the forest ecosystem is useful only when de-veloping the detailed management plan. Even then, this is only the case for places identified by local foresters as recreation sites or territories, because otherwise it is too time consuming to carry out fieldwork which provides little useful additional information.Calculated VSvalues show that on average the forests studied have a medium suitability value for recreation (average score 47) (see Table 2). There are considerable differences between districts, with aver-age value ranging from 32 points in Olaine to 66 points in the Garkalne district. This indicates that the average stands in the Garkalne district are more suitable for recreation than those in other districts. If other aspects are taken into account, such as distance from wherepeople live, and VRvalues are calculated it can be seenJ.Donis:Designating a greenbelt around the city of Riga,Latvia35Urban For.Urban Green.2 (2003)that the districts are still ranked as follows: Garkalne,Jugla, Tireli and Olaine.Only 10% of the forest owned by Riga municipality within the Riga region were evaluated as having a high or very high recreational value. 12% had medium recreational value, while large areas used for the col-lection of berries and mushrooms were evaluated as having low or very low recreational value (60% of the total forest area) (see Table 3).More than 16% of the area is covered by bogs, for which according to the used methodology, recreational value was not evaluated at all. Some areas were recorded by the local foresters as important places for the collec-tion of berries. However, more valuable from a recre-ational point of view were those forests situated east and north-east of the city (Garkalne and Jugla districts),while the forests to the south (Olaine and Tireli districts)were found to have a lower recreational value (V R ).36J.Donis:Designating a greenbelt around the city of Riga,LatviaUrban For.Urban Green.2 (2003)Table 2.Distribution of forest by forest categories according to the original functional role Forest districtDataFormer forest category Total–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––Commercial Nature Nature Protected greenbelt forests parks reserves greenbelt forestsGarkalneArea, ha521.27,698.78,219.9Average of V S *61.966.566.2Average of V R **59.350.751.4JuglaArea, ha 8,376.74,098.812,475.4Average of V S 45.656.949.1Average of V R 22.034.025.7OlaineArea, ha 11,765.4707.512,473.0Average of V S 31.941.032.6Average of V R 8.527.410.0TireliArea, ha 8,689.5257.91,025.01,016.910,989.3Average of V S 40.666.710.059.342.3Average of V R 17.055.3 1.044.920.6TotalArea, ha 28,831.6779.11,025.013,522.044,157.6Average of V S 39.863.510.061.647.1Average of V R16.357.91.043.725.9* V S Suitability value – based on stand parameters (0–100 points).** V R Recreation value (0–125 points) based on stand parameters, distance to the residential areas, water and other attractive objects.Table 3.Distribution of forest areas by classes of attractiveness and by designated functional role Designated zoneDataClass of attractiveness Total –––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––n.a.Very low Low Medium High Very high 0<2525,1–5051–7575–100100<Protection belt Area, ha76.7560.12,266.42,222.7850.5743.66719.9Average of V R *0.012.036.063.390.0125.053.4Visually sensitive Area, ha 447.64,150.54,157.7853.4847.1179.810636.1Average of V R 0.07.837.460.996.7125.028.5Non-restricted Area, ha 6,664.715,389.12,548.61,090.5874.8234.026801.7Average of V R 0.0 5.234.761.197.2125.015.8TotalArea, ha 7,189.020,099.88,972.74,166.52,572.31,157.344157.6Average of V R0.06.236.362.294.6125.025.9*V R Recreation value (0–125 points) based on stand parameters, distance to the residential areas, water and other attractive objects.Areas along main roads and railways are known to be visually sensitive, because of the large number of peo-ple who can see them during travel. The same is true for forest in the vicinity of small villages. Taking into ac-count the fact that legislation prohibits clear-cuts in pro-tection belts – which is not always necessary in order to maintain the visual quality of the landscape – it was proposed, as part of the zoning strategy, to create so called visually sensitive areas. In these areas the forest owner (Riga municipality) is recommended to use more detailed landscape-planning techniques and to pay more attention to visual aspects during management.As a result of the study, seen from a recreational point of view and taking into account legal restrictions and so forth, it has been proposed to create three zoning categories: (1) protection belts, (2) visually-sensitive areas, and (3) non-restricted areas (see Fig. 3). The protection belt should include:• Forest with high recreational value adjacent to residen-tial areas and summer cottages, to form a 200–500 m wide belt.• Larger tracts of forestland intensively used for recre-ation.The zone of visually-sensitive areas should include:• Forests within the administrative borders of Riga mu-nicipality and in the vicinity of villages (up to 200–500 m distance).• Forests along roads of national and regional impor-tance, railways, watercourses and streams as a protec-tion belt of 100–300 m wide.• Places used for mushroom and berry collection in the original restricted protection belt.• Places that could become important for recreation in the near future.J.Donis:Designating a greenbelt around the city of Riga,Latvia 37Urban For.Urban Green.2 (2003)Table 4.Proposed distribution of forest categories in designated zones (in hectares)Designated zoneFormer forest category Grand Total––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––Commercial Nature Nature Protected greenbelt forests parks reserves greenbelt forests Protection belt355.2779.15,585.76,719.9Visually sensitive areas 3,503.97,132.110,636.1Non-restricted areas 24,972.51,025.0*804.226,801.7Total 28,831.6779.11,025.013,522.044,157.6*Forests within nature reserves are not intended for recreation; their primary management goal is nature conservation.Fig. 3.Proposal for zon-ing of the Riga municipalforests in Riga region.The remaining areas should consequently be classi-fied as non-restricted areas.A revision of the first draft plan was made taking into account the known prospective development plans of Riga and Riga region. As a result, for forests owned by Riga municipality and located in Riga region the pro-posal is to include 6,720 ha in the protection belt (see Table 3). Moreover, it has been suggested to designate 10,636 ha as visually-sensitive areas, but to omit the re-maining 26,802 ha from zoning, as these do not need special management from a recreation point of view. Average recreational values of stands in this area range from 53 (medium), through 28 (low) to 15 points (very low) respectively.As a result, the major part of the forest remains in the same functional category as in the original allocation (see Table 4). As was mentioned above, the classifica-tion described here is only based on recreational as-pects, thus forests in nature reserves are misleadingly shown as non-restricted forests. Only 5,586 ha out of the 13,500 thousand ha of the originally protected greenbelt forests are proposed to be included in the protection belt, while 355 ha of the previous commer-cial greenbelt forests are proposed to be placed under stronger protection.DiscussionForests owned by Riga municipality within the Riga re-gion are divided over 13 rural municipalities. Accord-ing to legislation, revised draft proposals for zoning Riga city forests have to be accepted by Riga munici-pality, while the final decision is up to Riga and the sur-rounding municipalities. The study presented here has provided a tentative estimate of the recreational value and suitability of the forests for recreation and can be used as a starting point for political discussions. At the very beginning the intention was to divide the forests in two categories: the protection belt and the remainder of the forest. During the study it was concluded, however, that a third category would be needed, that of visually sensitive areas. Within this category more attention would have to be paid to the amenity of the landscape, but there would be no need to drastically restrict com-mercial forest management. As nature parks are also designated for recreation, it has been proposed to in-clude all forests of nature parks in the protection belt. It has to be noted that all the forests within the adminis-trative borders of cities, and as such not included in this study, are designated as protected. As a consequence, the forest area available for recreation to the inhabi-tants of Riga would increase to 12,500 ha.Unlike many other European cities, where timber ex-traction is of small importance (Konijnendijk 1999),Riga municipal forests have a considerable economic role. It is estimated that the allowable annual cut in suburban forests amounts to 169,800 m3or 81% of the annual increment (Dubrovskis et al. 2002). It should be kept in mind that income from logging is used for for-est regeneration and tending, forest fire protection and maintenance of recreation facilities.The objective of this study was not to evaluate the precision of the method nor possible errors occurring when applying it. This study revealed, however, the in-completeness of the methodology used. Bogs, which are very sensitive to recreation loads, are ascribed quite a high level of attractiveness from a recreation point of view (for the collection of wild berries), but according to the methodology they are not evaluated at all. All watercourses were assumed to be attractive sites, while the preliminary evaluation of recreation loads showed this not to be true. The use of watercourses is very vari-able and obviously depends on water quality and vege-tation structure of the edges or banks. Another aspect which was not taken into account was that amenity of a forest is not simply the sum of the amenity values of forest stands (Pukkala et al. 1995).It seems that the evaluation based on dominant species is appropriate for screening areas, but for more detailed management plans, species mixture, the number of forest layers, and principles of landscape architecture also have to be taken into account (Bell 1999; Bell & Nikodemus 2000). Various studies have shown that people prefer uneven-aged forests (e.g. Melluma et al. 1982) and uneven-aged stands (e.g. Riepsˇas 1994). The impacts of the screening effect show that there are, even in the visually-sensitive and commercial zones, considerable areas with high and very high recreational value. This is mainly because delineation of zonal boundaries is carried out using easily distinguishable natural lines, and often it is not worth including single stands of high recreational value in the protection belt if, as a consequence, re-strictions on management would be placed over whole compartments of 50 ha.For the preparation of specific management guide-lines detailed field inventories have to be carried out. This has not been done in this study, where more re-liance was placed on the experience of local foresters and existing databases. Detailed economical calcula-tions have yet to be carried out in order to evaluate the direct and indirect value of the forest. These will also assist in obtaining more background information to be used as part of a holistic approach and for development of a decision support system to resolve contradictions between different interest groups.After acceptance of the draft plan by the municipali-ty of Riga, the process of negotiation between Riga and its surrounding municipalities is currently ongoing.38J.Donis:Designating a greenbelt around the city of Riga,Latvia Urban For.Urban Green.2 (2003)。
外文翻译 英文
2. WHAT CONSTITUTES FAIR DEALINGWEINBERGER v. UOP, INC.457 A.2d 701 (Del.Supr.19a3).MOORE, JUSTICE.This post-trial appeal was reheard en banc from a decision of the Court of Chancery. It was brought by the class action plaintiff below, a former shareholder of UOP, Inc., who challenged the elimination of UOP's minority shareholders by a cash-out merger between UOP and its majority owner, The Signal Companies, Inc. Originally, the defendants in this action were Signal, UOP, certain officers and directors of those companies, and UOP's investment banker, Lehman Brothers Kuhn Loeb, Inc. The present Chancellor held that the terms of the merger were fair to the plaintiff and the other minority shareholders of UOP. Accordingly, he entered judgment in favor of the defendants.Numerous points were raised by the parties, but we address only the following questions presented by the trial court's opinion:1) The plaintiffs duty to plead sufficient facts demonstrating the unfairness of the challenged merger;2) The burden of proof upon the parties where the merger has been approved by the purportedly informed vote of a majority of the minority shareholders;3) The fairness of the merger in terms of adequacy of the defendants' disclosures to the minority shareholders;4) The fairness of the merger in terms of adequacy of the price paid for the minority shares and the remedy appropriate to that issue; and5) The continued force and effect of Singer v. Magnavox Co., Del.Supr., 380 A.2d 969, 980 (1977), and its progeny.In ruling for the defendants, the Chancellor re-stated his earlier conclusion that the plaintiff in a suit challenging a cash-out merger must allege specific acts of fraud, misrepresentation or other items of misconduct to demonstrate the unfairness of the merger terms to the minority. We approve this rule and affirm it.The Chancellor also held that even though the ultimate burden of proof is on the majority shareholder to show by a preponderance of the evidence that the transaction is fair, it is first the burden of the plaintiff attacking the merger to demonstrate some basis for invoking the fairness obligation. We agree with that principle. However, where corporate action has been approved by an informed vote of a majority of the minority shareholders, we conclude that the burden entirely shifts ^ to the plaintiff to show that the transaction was unfair to the minority^- But in all this, the burden clearly remains on those relying on the vote to show that they completely disclosed all material facts relevant to the transaction.Here, the record does not support a conclusion that the minority stockholder vote was an informed one. Material information, necessary to acquaint those shareholders with the bargaining positions of Signal and UOP, was withheld under circumstances amounting to a breach of fiduciary duty. We therefore conclude that this merger does not meet the test of fairness, at least as we address that concept, and no burden thus shifted to the plaintiff by reason of the minority shareholder vote. Accordingly, we reverse and remand for further proceedings consistent herewith.In considering the nature of the remedy available under our law to minority shareholders in a cash-out merger, we believe that it is, and hereafter should be, an appraisal under 8 Del.C. § 262 as hereinafter construed. We therefore overrule Lynch v. Vickers Energy Corp., Del. Supr., 429 A.2d 497 (1981) {Lynch II) to the extent that it purports to limit a stockholder's monetary relief to a specific damage formula. But to give full effect to section 262 within the framework of the General Corporation Law we adopt a more liberal, less rigid and stylized, approach to the valuation process than has heretofore been permitted by our courts. While the present state of these proceedings does not admit the plaintiff to the appraisal remedy per se, the practical effect of the remedy we do grant him will be co-extensive with the liberalized valuation and appraisal methods we herein approve for cases coming after this decision.Our treatment of these matters has necessarily led us to a reconsideration of the business purpose rule announced in the trilogy of Singer A v. Magnavox Co., supra; Tanzer v. International General Industries, JT > Inc., DeL.Supr., 379 A.2d 1121 (1977); and Roland International Corp. v. Najjar, Del.Supr., 407 A.2d 1032 (1979). For the reasons hereafter set forth we consider that the business purpose requirement of these cases v J is no longer the law of Delaware.The facts found by the trial court, pertinent to the issues before us, are supported by the record, and we draw from them as set out in the Chancellor's opinion.Signal is a diversified, technically based company operating through various subsidiaries. Its stock is publicly traded on the New York, Philadelphia and Pacific Stock Exchanges. UOP, formerly known as Universal Oil Products Company, was a diversified industrial company engaged in various lines of business, including petroleum and petro-chemical services and related products, construction, fabricated metal products, transportation equipment products, chemicals and plastics, and other products and services including land development, lumber products and waste disposal. Its stock was publicly held and listed on the New York Stock Exchange.In 1974 Signal sold one of its wholly-owned subsidiaries for $420,000,000 in cash. See Gimbel v. Signal Companies, Inc., Del.Ch., 316 A.2d 599, aff’d, Del.Supr., 316 A.2d 619 (1974). While looking to invest this cash surplus, Signal became interested in UOP as a possible acquisition. Friendly negotiations ensued, and Signal proposed to acquire a controlling interest in UOP at a price of $19 per share. UOP's representatives sought $25 per share. In the arm's length bargaining that followed, an understanding was reached whereby Signal agreed to purchase from UOP 1,500,000 shares of UOP's authorized but unissued stock at $21 per share.This purchase was contingent upon Signal^ making a successful cash tender offer for 4,300,000 publicly held shares of UOP, also at a price of $21 per share. This combined method of acquisition permitted Signal to acquire 5,800,000 shares of stock, representing 50.5% of UOP's outstanding shares. The UOP board of directors advised the company's shareholders that it had no objection to Signal's tender offer at that price. Immediately before the announcement of the tender offer, UOP's common stock had been trading on the New York Stock Exchange at a fraction under $14 per share.The negotiations between Signal and UOP occurred during April 1975, and the resulting tender offer was greatly oversubscribed. However, Signal limited its total purchase of the tendered shares so that, when coupled with the stock bought from UOP, it had achieved its goalof becoming a 50.5% shareholderAlthough UOP’ board consisted of thirteen directors, Signal nominated and elected only six. Of these, five were either directors or employees of Signal. The sixth, a partner in the banking firm of Lazard Freres & Co., had been one of Signal's representatives in the negotiations and bargaining with UOP concerning the tender offer and purchase price of the UOP shares.However, the president and chief executive officer of UOP retired during 1975, and Signal caused him to be replaced by James V. Crawford, a long-time employee and senior executive vice president of one of Signal's wholly-owned subsidiaries. Crawford succeeded his predecessor on UOP's board of directors and also was made a director of Signal.By the end of 1977 Signal basically was unsuccessful in finding other suitable investment candidates for its excess cash, and by February 1978 considered that it had no other realistic acquisitions available to it on a friendly basis. Once again its attention turned to UOP.The trial court found that at the instigation of certain Signal management personnel, including William W. Walkup, its board chairman, and Forrest N. Shumway, its president, a feasibility study was made concerning the possible acquisition of the balance of UOP's outstanding shares. This study was performed by two Signal officers, Charles S. Arledge, vice president (director of planning), and Andrew J. Chitiea, senior vice president (chief financial officer). Messrs. Walkup, Shumway, Arledge and Chitiea were all directors of UOP in addition to their membership on the Signal board.Arledge and Chitiea concluded that it would be a good investment for Signal to acquire the remaining 49.5% of UOP shares at any price up to $24 each. Their report was discussed between Walkup and Shumway who, along with Arledge, Chitiea and Brewster L. Arms, internal counsel for Signal, constituted Signal's senior management. In particular, they talked about the proper price to be paid if the acquisition was pursued, purportedly keeping in mind that as UOP's majority shareholder, Signal owed a fiduciary responsibility to both its own stockholders as well as to UOP's minority. It was ultimately agreed that a meeting of Signal's Executive Committee would be called to propose that Signal acquire the remaining outstanding stock of UOP through a cash-out merger in the range of $20 to $21 per share.The Executive Committee meeting was set for February 28, 1978. As a courtesy, UOP's president, Crawford, was invited to attend, although he was not a member of Signal's executive committee. On his arrival, and prior to the meeting, Crawford was asked to meet privately with Walkup and Shumway. He was then told of Signal's plan to acquire full ownership of UOP and was asked for his reaction to the proposed price range of $20 to $21 per share. Crawford said he thought such a price would be "generous", and that it was certainly one which should be submitted to UOP's minority shareholders for their ultimate consideration. He stated, however, that Signal's 100% ownership could cause internal problems at UOP. He believed that employees would have to be given some assurance of their future place in a fully- owned Signal subsidiary. Otherwise, he feared the departure of essential personnel. Also, many of UOP's key employees had stock option incentive programs which would be wiped out by a merger. Crawford therefore urged that some adjustment would have to be made, such as providing a comparable incentive in Signal's shares, if after the merger he was to maintain his quality of personnel and efficiency at UOP.Thus, Crawford voiced no objection to the $20 to $21 price range, nor did he suggest that Signal should consider paying more than $21 per share for the minority interests. Later, at the Executive Committee meeting the same factors were discussed, with Crawford repeating the position he earlier took with Walkup and Shumway. Also considered was the 1975 tender offer andthe fact that it had been greatly oversubscribed at $21 per share. For many reasons, Signal's manage¬ment concluded that the acquisition of UOP's minority shares provided the solution to a number of its business problems.Thus, it was the consensus that a price of $20 to $21 per share would be fair to both Signal and the minority shareholders of UOP. Signal's executive committee authorized its management "to negotiate" with UOP "for a cash acquisition of the minority ownership in UOP, Inc., with the intention of presenting a proposal to [Signal's] board of directors * * * on March 6, 1978". Immediately after this February 28, 1978 meeting, Signal issued a press release stating: The Signal Companies, Inc. and UOP, Inc. are conducting negotiations for the acquisition for cash by Signal of the 49.5 per cent of UOP which it does not presently own, announced Forrest N. Shumway, president and chief executive officer of Signal, and James V. Crawford, UOP president. Price and other terms of the proposed transaction have not y et been finalized and would be subject to approval of the boards of directors of Signal and UOP, scheduled to meet early next week, the stockholders of UOP and certain federal agencies.The announcement also referred to the fact that the closing price of UOP's common stock on that day was $14.50 per share.Two days later, on March 2, 1978, Signal issued a second press release stating that its management would recommend a price in the range of $20 to $21 per share for UOP's 49.5% minority interest. This announcement referred to Signal's earlier statement that "negotiations" were being conducted for the acquisition of the minority shares.Between Tuesday, February 28, 1978 and Monday, March 6,1978, a total of four business days, Crawford spoke by telephone with all of UOP's non-Signal, i.e., outside, directors. Also during that period, Crawford retained Lehman Brothers to render a fairness opinion as to the price offered the minority for its stock. He gave two reasons for this choice. First, the time schedule between the announcement and the board meetings was short (by then only three business days) and since Lehman Brothers had been acting as UOP's investment banker for many years, Crawford felt that it would be in the best position to respond on such brief notice. Second, James W. Glanville, a long-time director of UOP and a partner in Lehman Brothers, had acted as a financial advisor to UOP for many years. Crawford believed that Glanville's familiarity with UOP, as a member of its board, would also be of assistance in enabling Lehman Brothers to render a fairness opinion within the existing time constraints.Crawford telephoned Glanville, who gave his assurance that Lehman Brothers had no conflicts that would prevent it from accepting the task. Glanville's immediate personal reaction was that a price of $20 to $21 would certainly be fair, since it represented almost a 50% premium over UOP's market price. Glanville sought a $250,000 fee for Lehman Brothers' services, but Crawford thought this too much. After further discussions Glanville finally agreed that Lehman Brothers would render its fairness opinion for $150,000.During this period Crawford also had several telephone contacts with Signal officials. In only one of them, however, was the price of the shares discussed. In a conversation with Walkup, Crawford advised that as a result of his communications with UOP's non-Signal directors, it was his feeling that the price would have to be the top of the proposed range, or $21 per share, if the approval of UOP's outside directors was to be obtained. But again, he did not seek any price higher than $21.Glanville assembled a three-man Lehman Brothers team to do the work on the fairness opinion. These persons examined relevant documents and information concerning UOP, including its annual reports and its Securities and Exchange Commission filings from 1973 through 1976, as well as its audited financial statements for 1977, its interim reports to shareholders, and its recent and historical market prices and trading volumes. In addition, on Friday, March 3, 1978, two members of the Lehman Brothers team flew to UOP's headquarters in Des Plaines, Illinois, to perform a "due diligence" visit, during the course of which they interviewed Crawford as well as UOP's general counsel, its chief financial officer, and other key executives and personnel.As a result, the Lehman Brothers team concluded that "the price of either $20 or $21 would be a fair price for the remaining shares of UOP". They telephoned this impression to Glanville, who was spending the weekend in Vermont.On Monday morning, March 6, 1978, Glanville and the senior member of the Lehman Brothers team flew to Des Plaines to attend the scheduled UOP directors meeting. Glanville looked over the assembled information during the flight. The two had with them the draft of a "fairness opinion letter" in which the price had been left blank. Either during or immediately prior to the directors' meeting, the two-page "fairness opinion letter" was typed in final form and the price of $21 per share was inserted.On March 6, 1978, both the Signal and UOP boards were convened to consider the proposed merger. Telephone communications were maintained between the two meetings. Walkup, Signal's board chairman, and also a UOP director, attended UOP's meeting with Crawford in order to present Signal's position and answer any questions that UOP's non-Signal directors might have. Arledge and Chitiea, along with Signal's other designees on UOP's board, participated by conference telephone. All of UOP's outside directors attended the meeting either in person or by conference telephone.First, Signal's board unanimously adopted a resolution authorizing Signal to propose to UOP a cash merger of $21 per share as outlined in a certain merger agreement, and other supporting documents. This proposal required that the merger be approved by a majority of UOP's outstanding minority shares voting at the stockholders meeting at which the merger would be considered, and that the minority shares voting in favor of the merger, when coupled with Signal's 50.5% interest would have to comprise at least two-thirds of all UOP shares. Otherwise the proposed merger would be deemed disapproved.UOP's board then considered the proposal. Copies of the agreement were delivered to the directors in attendance, and other copies had been forwarded earlier to the directors participating by telephone. They also had before them UOP financial data for 1974-1977, UOP's most recent financial statements, market price information, and budget projections for 1978. In addition they had Lehman Brothers' hurriedly prepared fairness opinion letter finding the price of $21 to be fair. Glanville, the Lehman Brothers partner, and UOP director, commented on the information that had gone into preparation of the letter.Signal also suggests that the Arledge-Chitiea feasibility study, indicating that a price of up to $24 per share would be a "good investment" for Signal, was discussed at the UOP directors' meeting. The Chancellor made no such finding, and our independent review of the record, detailed infra, satisfies us by a preponderance of the evidence that there was no discussion of this document at UOP's board meeting. Furthermore, it is clear beyond peradventure that nothing in that report was ever disclosed to UOP's minority shareholders prior to their approval of themerger.After consideration of Signal's proposal, Walkup and Crawford left the meeting to permit a free and uninhibited exchange between UOP's non-Signal directors. Upon their return a resolution to accept Signal's offer was then proposed and adopted. While Signal's men on UOP's board participated in various aspects of the meeting, they abstained from voting. However, the minutes show that each of them "if voting would have voted yes".On March 7, 1978, UOP sent a letter to its shareholders advising them of the action taken by UOP's board with respect to Signal's offer. This document pointed out, among other things, that on February 28, 1978 "both companies had announced negotiations were being conducted".Despite the swift board action of the two companies, the merger was not submitted to UOP's shareholders until their annual meeting on May 26, 1978. In the notice of that meeting and proxy statement sent to shareholders in May, UOP's management and board urged that the merger be approved. The proxy statement also advised:The price was determined after discussions between James V. Crawford, a director of Signal and Chief Executive Officer of UOP, and officers of Signal which took place during meetings on February 28, 1978, and in the course of several subsequent telephone conversations. (Emphasis added.)In the original draft of the proxy statement the word "negotiations" had been used rather than "discussions". However, when the Securities and Exchange Commission sought details of the "negotiations" as part of its review of these materials, the term was deleted and the word "discussions" was substituted. The proxy statement indicated that the vote of UOP's board in approving the merger had been unanimous. It also advised the shareholders that Lehman Brothers had given its opinion that the merger price of $21 per share was fair to UOP's minority. However, it did not disclose the hurried method by which this conclusion was reached.As of the record date of UOP's annual meeting, there were 11,488,302 shares of UOP common stock outstanding, 5,688,302 of which were owned by the minority. At the meeting only 56%, or 3,208,652, of the minority shares were voted. Of these, 2,953,812, or 51.9% of the total minority, voted for the merger, and 254,840 voted against it. When Signal's stock was added to the minority shares voting in favor, a total of 76.2% of UOP's outstanding shares approved the merger while only 2.2% opposed it.By its terms the merger became effective on May 26, 1978, and each share of UOP's stock held by the minority was automatically converted into a right to receive $21 cash.II.A.A primary issue mandating reversal is the preparation by two UOP directors, Arledge and Chitiea, of their feasibility study for the exclusive use and benefit of Signal. This document was of obvious significance to both Signal and UOP. Using UOP data, it described the advantages to Signal of ousting the minority at a price range of $21-$24 per share. Mr. Arledge, one of the authors, outlined the benefits to Signal:Purpose Of The Merger1) Provides an outstanding investment opportunity for Signal—(Better than any recent acquisition we have seen.)2) Increases Signal's earnings.3) Facilitates the flow of resources between Signal and its subsidiaries(Big factor—works both ways.)4) Provides cost savings potential for Signal and UOP.5) Improves the percentage of Signal's 'operating earnings' as opposed to 'holding company earnings'.6) Simplifies the understanding of Signal.7) Facilitates technological exchange among Signal's subsidiaries.8) Eliminates potential conflicts of interest.Having written those words, solely for the use of Signal it is clear from the record that neither Arledge nor Chitiea shared this report with their fellow directors of UOP. We are satisfied that no one else did either. This conduct hardly meets the fiduciary standards applicable to such a transaction * * *The Arledge-Chitiea report speaks for itself in supporting the Chancellor's finding that a price of up to $24 was a "good investment" for Signal. It shows that a return on the investment at $21 would be 15.7% versus 15.5% at $24 per share. This was a difference of only two-tenths of one percent, while it meant over $17,000,000 to the minority. Under such circumstances, paying UOP's minority shareholders $24 would have had relatively little long-term effect on Signal, and the Chancellor's findings concerning the benefit to Signal, even at a price of $24, were obviously correct. Levitt v. Bouvier, Del.Supr., 287 A.2d 671, 673 (1972).Certainly, this was a matter of material significance to UOP and its shareholders. Since the study was prepared by two UOP directors, using UOP information for the exclusive benefit of Signal, and nothing whatever was done to disclose it to the outside UOP directors or the minority shareholders, a question of breach of fiduciary duty arises. This problem occurs because there were common Signal-UOP directors participating, at least to some extent, in the UOP board's decision making processes without full disclosure of the conflicts they faced.7B.In assessing this situation, the Court of Chancery was required to:examine what information defendants had and to measure it against what they gave to the minority stockholders, in a context in which 'complete candor' is required. In other words, the limited function of the Court was to determine whether defendants had disclosed all information in their possession germane to the transaction in issue. And by 'germane' we mean, for present purposes, information such as a reasonable shareholder would consider important. in Priding whether. to sell or retain stock.* * ** * * Completeness, not adequacy, is both the norm and the mandate under present circumstances. Lynch v. Vickers Energy Corp., Del.Supr., 383 A.2d 278, 281 (1977) (Lynch /). This is merely stating in another way the long-existing principle of Delaware law that these Signal designated directors on UOP's board still owed UOP and its shareholders an uncompromising duty of loyalty. The classic language of Guth v. Loft, Inc., Del.Supr., 5 A.2d 503, 510 (1939), requires no embellishment:A public policy, existing through the years, and derived from a profound knowledge of human characteristics and motives, has established a rule that demands of a corporate officer or director, peremptorily and inexorably, the most scrupulous observance of his duty, not only affirmatively to protect the interests of the corporation committed to his charge, but also to refrainfrom doing anything that would work injury to the corporation, or to deprive it of. profit or advantage which his skill and ability might properly bring to it, or to enable it to make in the reasonable and lawful exercise of its powers. The rule that requires an undivided and unselfish loyalty to the corporation demands that there shall be no conflict between duty and self-interest. Given the absence of any attempt to structure this transaction on an arm's length basis, Signal cannot escape the effects of the conflicts it faced, particularly when its designees on UOP's board did not totally abstain from participation in the matter. There is no "safe harbor" for such divided loyalties in Delaware. When directors of a Delaware ^ corporation are on both sides of a transaction, they are required to demonstrate their utmost good faith and the most scrupulous inherent P fairness of the bargain. Gottlieb v. Heyden Chemical Corp., Del.Supr., 91 A.2d 57, 57-58 (1952). The requirement of fairness is unflinching in v rP y demand that where one stands on both sides of a transaction, he has the burden of establishing its entire fairness, sufficient to pass the test of careful scrutiny by the courts. Sterling v. Mayflower Hotel Corp., N, Del.Supr., 93 A.2d 107, 110 (1952); Bastian v. Bourns, Inc., Del.Ch., 256 A.2d 680, 681 (1969), aff’d, Del.Supr., 278 A.2d 467 (1970); David J. Greene & Co. v. Dunhill International Inc., Del.Ch., 249 A.2d 427, 431 (1968).There is no dilution of this obligation where one holds dual or multiple directorships, as in a parent-subsidiary context. Levien v. Sinclair Oil Corp., Del.Ch., 261 A.2d 911, 915 (1969). Thus, individuals who act in a dual capacity as directors of two corporations, one of whom is parent and the other subsidiary, owe the same duty of good management to both corporations, and in the absence of an independent negotiating structure (see note 7, supra), or the directors' total abstention from any participation in the matter, this duty is to be exercised in light of what is best for both companies. Warshaw v. Calhoun, Del. Supr., 221 A.2d 487, 492 (1966). The record demonstrates that Signal has not met this obligation.。
计算机外文翻译(完整)
计算机外⽂翻译(完整)毕业设计(论⽂)外⽂资料翻译专业:计算机科学与技术姓名:王成明学号:06120186外⽂出处:The History of the Internet附件: 1.外⽂原⽂ 2.外⽂资料翻译译⽂;附件1:外⽂原⽂The History of the InternetThe Beginning - ARPAnetThe Internet started as a project by the US government. The object of the project was to create a means of communications between long distance points, in the event of a nation wide emergency or, more specifically, nuclear war. The project was called ARPAnet, and it is what the Internet started as. Funded specifically for military communication, the engineers responsible for ARPANet had no idea of the possibilities of an "Internet."By definition, an 'Internet' is four or more computers connected by a network.ARPAnet achieved its network by using a protocol called TCP/IP. The basics around this protocol was that if information sent over a network failed to get through on one route, it would find another route to work with, as well as establishing a means for one computer to "talk" to another computer, regardless of whether it was a PC or a Macintosh.By the 80's ARPAnet, just years away from becoming the more well known Internet, had 200 computers. The Defense Department, satisfied with ARPAnets results, decided to fully adopt it into service, and connected many military computers and resources into the network. ARPAnet then had 562 computers on its network. By the year 1984, it had over 1000 computers on its network.In 1986 ARPAnet (supposedly) shut down, but only the organization shut down, and the existing networks still existed between the more than 1000 computers. It shut down due to a failied link up with NSF, who wanted to connect its 5 countywide super computers into ARPAnet.With the funding of NSF, new high speed lines were successfully installed at line speeds of 56k (a normal modem nowadays) through telephone lines in 1988. By that time, there were 28,174 computers on the (by then decided) Internet. In 1989 there were 80,000 computers on it. By 1989, there were290,000.Another network was built to support the incredible number of people joining. It was constructed in 1992.Today - The InternetToday, the Internet has become one of the most important technological advancements in the history of humanity. Everyone wants to get 'on line' to experience the wealth of information of the Internet. Millions of people now use the Internet, and it's predicted that by the year 2003 every single person on the planet will have Internet access. The Internet has truly become a way of life in our time and era, and is evolving so quickly its hard to determine where it will go next, as computer and network technology improve every day.HOW IT WORKS:It's a standard thing. People using the Internet. Shopping, playing games,conversing in virtual Internet environments.The Internet is not a 'thing' itself. The Internet cannot just "crash." It functions the same way as the telephone system, only there is no Internet company that runs the Internet.The Internet is a collection of millioins of computers that are all connected to each other, or have the means to connect to each other. The Internet is just like an office network, only it has millions of computers connected to it.The main thing about how the Internet works is communication. How does a computer in Houston know how to access data on a computer in Tokyo to view a webpage?Internet communication, communication among computers connected to the Internet, is based on a language. This language is called TCP/IP. TCP/IP establishes a language for a computer to access and transmit data over the Internet system.But TCP/IP assumes that there is a physical connecetion between onecomputer and another. This is not usually the case. There would have to be a network wire that went to every computer connected to the Internet, but that would make the Internet impossible to access.The physical connection that is requireed is established by way of modems,phonelines, and other modem cable connections (like cable modems or DSL). Modems on computers read and transmit data over established lines,which could be phonelines or data lines. The actual hard core connections are established among computers called routers.A router is a computer that serves as a traffic controller for information.To explain this better, let's look at how a standard computer might viewa webpage.1. The user's computer dials into an Internet Service Provider (ISP). The ISP might in turn be connected to another ISP, or a straight connection into the Internet backbone.2. The user launches a web browser like Netscape or Internet Explorer and types in an internet location to go to.3. Here's where the tricky part comes in. First, the computer sends data about it's data request to a router. A router is a very high speed powerful computer running special software. The collection of routers in the world make what is called a "backbone," on which all the data on the Internet is transferred. The backbone presently operates at a speed of several gigabytes per-second. Such a speed compared to a normal modem is like comparing the heat of the sun to the heat of an ice-cube.Routers handle data that is going back and forth. A router puts small chunks of data into packages called packets, which function similarly to envelopes. So, when the request for the webpage goes through, it uses TCP/IP protocols to tell the router what to do with the data, where it's going, and overall where the user wants to go.4. The router sends these packets to other routers, eventually leadingto the target computer. It's like whisper down the lane (only the information remains intact).5. When the information reaches the target web server, the webserver then begins to send the web page back. A webserver is the computer where the webpage is stored that is running a program that handles requests for the webpage and sends the webpage to whoever wants to see it.6. The webpage is put in packets, sent through routers, and arrive at the users computer where the user can view the webpage once it is assembled.The packets which contain the data also contain special information that lets routers and other computers know how to reassemble the data in the right order.With millions of web pages, and millions of users, using the Internet is not always easy for a beginning user, especially for someone who is not entirely comfortale with using computers. Below you can find tips tricks and help on how to use main services of the Internet.Before you access webpages, you must have a web browser to actually be able to view the webpages. Most Internet Access Providers provide you with a web browser in the software they usually give to customers; you. The fact that you are viewing this page means that you have a web browser. The top two use browsers are Netscape Communicator and Microsoft Internet Explorer. Netscape can be found at /doc/bedc387343323968011c9268.html and MSIE can be found at /doc/bedc387343323968011c9268.html /ie.The fact that you're reading this right now means that you have a web browser.Next you must be familiar with actually using webpages. A webpage is a collection of hyperlinks, images, text, forms, menus, and multimedia. To "navigate" a webpage, simply click the links it provides or follow it's own instructions (like if it has a form you need to use, it will probably instruct you how to use it). Basically, everything about a webpage is made to be self-explanetory. That is the nature of a webpage, to be easily navigatable."Oh no! a 404 error! 'Cannot find web page?'" is a common remark made by new web-users.Sometimes websites have errors. But an error on a website is not the user's fault, of course.A 404 error means that the page you tried to go to does not exist. This could be because the site is still being constructed and the page hasn't been created yet, or because the site author made a typo in the page. There's nothing much to do about a 404 error except for e-mailing the site administrator (of the page you wanted to go to) an telling him/her about the error.A Javascript error is the result of a programming error in the Javascript code of a website. Not all websites utilize Javascript, but many do. Javascript is different from Java, and most browsers now support Javascript. If you are using an old version of a web browser (Netscape 3.0 for example), you might get Javascript errors because sites utilize Javascript versions that your browser does not support. So, you can try getting a newer version of your web browser.E-mail stands for Electronic Mail, and that's what it is. E-mail enables people to send letters, and even files and pictures to each other.To use e-mail, you must have an e-mail client, which is just like a personal post office, since it retrieves and stores e-mail. Secondly, you must have an e-mail account. Most Internet Service Providers provide free e-mail account(s) for free. Some services offer free e-mail, like Hotmail, and Geocities.After configuring your e-mail client with your POP3 and SMTP server address (your e-mail provider will give you that information), you are ready to receive mail.An attachment is a file sent in a letter. If someone sends you an attachment and you don't know who it is, don't run the file, ever. It could be a virus or some other kind of nasty programs. You can't get a virus justby reading e-mail, you'll have to physically execute some form of program for a virus to strike.A signature is a feature of many e-mail programs. A signature is added to the end of every e-mail you send out. You can put a text graphic, your business information, anything you want.Imagine that a computer on the Internet is an island in the sea. The sea is filled with millions of islands. This is the Internet. Imagine an island communicates with other island by sending ships to other islands and receiving ships. The island has ports to accept and send out ships.A computer on the Internet has access nodes called ports. A port is just a symbolic object that allows the computer to operate on a network (or the Internet). This method is similar to the island/ocean symbolism above.Telnet refers to accessing ports on a server directly with a text connection. Almost every kind of Internet function, like accessing web pages,"chatting," and e-mailing is done over a Telnet connection.Telnetting requires a Telnet client. A telnet program comes with the Windows system, so Windows users can access telnet by typing in "telnet" (without the "'s) in the run dialog. Linux has it built into the command line; telnet. A popular telnet program for Macintosh is NCSA telnet.Any server software (web page daemon, chat daemon) can be accessed via telnet, although they are not usually meant to be accessed in such a manner. For instance, it is possible to connect directly to a mail server and check your mail by interfacing with the e-mail server software, but it's easier to use an e-mail client (of course).There are millions of WebPages that come from all over the world, yet how will you know what the address of a page you want is?Search engines save the day. A search engine is a very large website that allows you to search it's own database of websites. For instance, if you wanted to find a website on dogs, you'd search for "dog" or "dogs" or "dog information." Here are a few search-engines.1. Altavista (/doc/bedc387343323968011c9268.html ) - Web spider & Indexed2. Yahoo (/doc/bedc387343323968011c9268.html ) - Web spider & Indexed Collection3. Excite (/doc/bedc387343323968011c9268.html ) - Web spider & Indexed4. Lycos (/doc/bedc387343323968011c9268.html ) - Web spider & Indexed5. Metasearch (/doc/bedc387343323968011c9268.html ) - Multiple searchA web spider is a program used by search engines that goes from page to page, following any link it can possibly find. This means that a search engine can literally map out as much of the Internet as it's own time and speed allows for.An indexed collection uses hand-added links. For instance, on Yahoo's site. You can click on Computers & the Internet. Then you can click on Hardware. Then you can click on Modems, etc., and along the way through sections, there are sites available which relate to what section you're in.Metasearch searches many search engines at the same time, finding the top choices from about 10 search engines, making searching a lot more effective.Once you are able to use search engines, you can effectively find the pages you want.With the arrival of networking and multi user systems, security has always been on the mind of system developers and system operators. Since the dawn of AT&T and its phone network, hackers have been known by many, hackers who find ways all the time of breaking into systems. It used to not be that big of a problem, since networking was limited to big corporate companies or government computers who could afford the necessary computer security.The biggest problem now-a-days is personal information. Why should you be careful while making purchases via a website? Let's look at how the internet works, quickly.The user is transferring credit card information to a webpage. Looks safe, right? Not necessarily. As the user submits the information, it is being streamed through a series of computers that make up the Internet backbone.The information is in little chunks, in packages called packets. Here's the problem: While the information is being transferred through this big backbone, what is preventing a "hacker" from intercepting this data stream at one of the backbone points?Big-brother is not watching you if you access a web site, but users should be aware of potential threats while transmitting private information. There are methods of enforcing security, like password protection, an most importantly, encryption.Encryption means scrambling data into a code that can only be unscrambled on the "other end." Browser's like Netscape Communicator and Internet Explorer feature encryption support for making on-line transfers. Some encryptions work better than others. The most advanced encryption system is called DES (Data Encryption Standard), and it was adopted by the US Defense Department because it was deemed so difficult to 'crack' that they considered it a security risk if it would fall into another countries hands.A DES uses a single key of information to unlock an entire document. The problem is, there are 75 trillion possible keys to use, so it is a highly difficult system to break. One document was cracked and decoded, but it was a combined effort of14,000 computers networked over the Internet that took a while to do it, so most hackers don't have that many resources available.附件2:外⽂资料翻译译⽂Internet的历史起源——ARPAnetInternet是被美国政府作为⼀项⼯程进⾏开发的。
毕业论文外文翻译范例
外文原文(一)Savigny and his Anglo-American Disciple s*M. H. HoeflichFriedrich Carl von Savigny, nobleman, law reformer, champion of the revived German professoriate, and founder of the Historical School of jurisprudence, not only helped to revolutionize the study of law and legal institutions in Germany and in other civil law countries, but also exercised a profound influence on many of the most creative jurists and legal scholars in England and the United States. Nevertheless, tracing the influence of an individual is always a difficult task. It is especially difficult as regards Savigny and the approach to law and legal sources propounded by the Historical School. This difficulty arises, in part, because Savigny was not alone in adopting this approach. Hugo, for instance, espoused quite similar ideas in Germany; George Long echoed many of these concepts in England during the 1850s, and, of course, Sir Henry Sumner Maine also espoused many of these same concepts central to historical jurisprudence in England in the 1860s and 1870s. Thus, when one looks at the doctrinal writings of British and American jurists and legal scholars in the period before 1875, it is often impossible to say with any certainty that a particular idea which sounds very much the sort of thing that might, indeed, have been derived from Savigny's works, was, in fact, so derived. It is possible, nevertheless, to trace much of the influence of Savigny and his legal writings in the United States and in Great Britain during this period with some certainty because so great was his fame and so great was the respect accorded to his published work that explicit references to him and to his work abound in the doctrinal writing of this period, as well as in actual law cases in the courts. Thus, Max Gutzwiller, in his classic study Der einfluss Savignys auf die Entwicklung des International privatrechts, was able to show how Savigny's ideas on conflict of laws influenced such English and American scholars as Story, Phillimore, Burge, and Dicey. Similarly, Andreas Schwarz, in his "Einflusse Deutscher Zivilistik im Auslande," briefly sketched Savigny's influence upon John Austin, Frederick Pollock, and James Bryce. In this article I wish to examine Savigny's influence over a broader spectrum and to draw a picture of his general fame and reputation both in Britain and in the United States as the leading Romanist, legal historian, and German legal academic of his day. The picture of this Anglo-American respect accorded to Savigny and the historical school of jurisprudence which emerges from these sources is fascinating. It sheds light not only upon Savigny’s trans-channel, trans-Atlantic fame, but also upon the extraordinarily*M.H.Hoeflich, Savigny and his Anglo-American Disciples, American Journal of Comparative Law, vol.37, No.1, 1989.cosmopolitan outlook of many of the leading American and English jurists of the time. Of course, when one sets out to trace the influence of a particular individual and his work, it is necessary to demonstrate, if possible, precisely how knowledge of the man and his work was transmitted. In the case of Savigny and his work on Roman law and ideas of historical jurisprudence, there were three principal modes of transmission. First, there was the direct influence he exercised through his contacts with American lawyers and scholars. Second, there was the influence he exercised through his books. Third, there was the influence he exerted indirectly through intermediate scholars and their works. Let us examine each mode separately.I.INFLUENCE OF THE TRANSLATED WORKSWhile American and British interest in German legal scholarship was high in the antebellum period, the number of American and English jurists who could read German fluently was relatively low. Even those who borrowed from the Germans, for instance, Joseph Story, most often had to depend upon translations. It is thus quite important that Savigny’s works were amongst the most frequently translated into English, both in the United States and in Great Britain. His most influential early work, the Vom Beruf unserer Zeitfur Rechtsgeschichte und Gestzgebung, was translated into English by Abraham Hayward and published in London in 1831. Two years earlier the first volume of his History of Roman Law in the Middle Ages was translated by Cathcart and published in Edinburgh. In 1830, as well, a French translation was published at Paris. Sir Erskine Perry's translation of Savigny's Treatise on Possession was published in London in 1848. This was followed by Archibald Brown's epitome of the treatise on possession in 1872 and Rattigan's translation of the second volume of the System as Jural Relations or the Law of Persons in 1884. Guthrie published a translation of the seventh volume of the System as Private International Law at Edinburgh in 1869. Indeed, two English translations were even published in the far flung corners of the British Raj. A translation of the first volume of the System was published by William Holloway at Madras in 1867 and the volume on possession was translated by Kelleher and published at Calcutta in 1888. Thus, the determined English-speaking scholar had ample access to Savigny's works throughout the nineteenth century.Equally important for the dissemination of Savigny's ideas were those books and articles published in English that explained and analyzed his works. A number of these must have played an important role in this process. One of the earliest of these is John Reddie's Historical Notices of the Roman law and of the Progress of its Study in Germany, published at Edinburgh in 1826. Reddie was a noted Scots jurist and held the Gottingen J.U.D. The book, significantly, is dedicated to Gustav Hugo. It is of that genre known as an external history of Roman law-not so much a history of substantive Roman legal doctrine but rather a historyof Roman legal institutions and of the study of Roman law from antiquity through the nineteenth century. It is very much a polemic for the study of Roman law and for the Historical School. It imparts to the reader the excitement of Savigny and his followers about the study of law historically and it is clear that no reader of the work could possibly be left unmoved. It is, in short, the first work of public relations in English on behalf of Savigny and his ideas.Having mentioned Reddie's promotion of Savigny and the Historical School, it is important to understand the level of excitement with which things Roman and especially Roman law were greeted during this period. Many of the finest American jurists were attracted-to use Peter Stein's term-to Roman and Civil law, but attracted in a way that, at times, seems to have been more enthusiastic than intellectual. Similarly, Roman and Civil law excited much interest in Great Britain, as illustrated by the distinctly Roman influence to be found in the work of John Austin. The attraction of Roman and Civil law can be illustrated and best understood, perhaps, in the context of the publicity and excitement in the English-speaking world surrounding the discovery of the only complete manuscript of the classical Roman jurist Gaius' Institutes in Italy in 1816 by the ancient historian and German consul at Rome, B.G. Niebuhr. Niebuhr, the greatest ancient historian of his time, turned to Savigny for help with the Gaius manuscript (indeed, it was Savigny who recognized the manuscript for what it was) and, almost immediately, the books and journals-not just law journals by any means-were filled with accounts of the discovery, its importance to legal historical studies, and, of course, what it said. For instance, the second volume of the American Jurist contains a long article on the civil law by the scholarly Boston lawyer and classicist, John Pickering. The first quarter of the article is a gushing account of the discovery and first publication of the Gaius manuscript and a paean to Niebuhr and Savigny for their role in this. Similarly, in an article published in the London Law Magazine in 1829 on the civil law, the author contemptuously refers to a certain professor who continued to tell his students that the text of Gaius' Institutes was lost for all time. What could better show his ignorance of all things legal and literary than to be unaware of Niebuhr's great discovery?Another example of this reaction to the discovery of the Gaius palimpsest is to be found in David Irving's Introduction to the Study of the Civil Law. This volume is also more a history of Roman legal scholarship and sources than a study of substantive Roman law. Its pages are filled with references to Savigny's Geschichte and its approach clearly reflects the influence of the Historical School. Indeed, Irving speaks of Savigny's work as "one of the most remarkable productions of the age." He must have been truly impressed with German scholarship and must also have been able to convince the Faculty of Advocates, forwhom he was librarian, of the worth of German scholarship, for in 1820 the Faculty sent him to Gottingen so that he might study their law libraries. Irving devotes several pages of his elementary textbook on Roman law to the praise of the "remarkable" discovery of the Gaius palimpsest. He traces the discovery of the text by Niebuhr and Savigny in language that would have befitted an adventure tale. He elaborates on the various labors required to produce a new edition of the text and was particularly impressed by the use of a then new chemical process to make the under text of the palimpsest visible. He speaks of the reception of the new text as being greeted with "ardor and exultation" strong words for those who spend their lives amidst the "musty tomes" of the Roman law.This excitement over the Verona Gaius is really rather strange. Much of the substance of the Gaius text was already known to legal historians and civil lawyers from its incorporation into Justinian's Institutes and so, from a substantive legal perspective, the find was not crucial. The Gaius did provide new information on Roman procedural rules and it did also provide additional information for those scholars attempting to reconstruct pre-Justinianic Roman law. Nevertheless, these contributions alone seem hardly able to justify the excitement the discovery caused. Instead, I think that the Verona Gaius discovery simply hit a chord in the literary and legal community much the same as did the discovery of the Rosetta Stone or of Schliemann’s Troy. Here was a monument of a great civilization brought newly to light and able to be read for the first time in millenia. And just as the Rosetta Stone helped to establish the modern discipline of Egyptology and Schliemann's discoveries assured the development of classical archaeology as a modern academic discipline, the discovery of the Verona Gaius added to the attraction Roman law held for scholars and for lawyers, even amongst those who were not Romanists by profession. Ancillary to this, the discovery and publication of the Gaius manuscript also added to the fame of the two principals involved in the discovery, Niebuhr and Savigny. What this meant in the English-speaking world is that even those who could not or did not wish to read Savigny's technical works knew of him as one of the discoverers of the Gaius text. This fame itself may well have helped in spreading Savigny's legal and philosophical ideas, for, I would suggest, the Gaius "connection" may well have disposed people to read other of Savigny's writings, unconnected to the Gaius, because they were already familiar with his name.Another example of an English-speaking promoter of Savigny is Luther Stearns Cushing, a noted Boston lawyer who lectured on Roman law at the Harvard Law School in 1848-49 and again in 1851- 1852.Cushing published his lectures at Boston in 1854 under the title An Introduction to the Study of Roman Law. He devoted a full chapter to a description of the historical school and to the controversy betweenSavigny and Thibaut over codification. While Cushing attempted to portray fairly the arguments of both sides, he left no doubt as to his preference for Savigny's approach:The labors of the historical school have established an entirely new and distinct era in the study of the Roman jurisprudence; and though these writers cannot be said to have thrown their predecessors into the shade, it seems to be generally admitted, that almost every branch of the Roman law has received some important modification at their hands, and that a knowledge of their writings, to some extent, at least, is essentially necessary to its acquisition.译文(一)萨维尼和他的英美信徒们*M·H·豪弗里奇弗雷德里奇·卡尔·冯·萨维尼出身贵族,是一位出色的法律改革家,也是一位倡导重建德国教授协会的拥护者,还是历史法学派的创建人之一。
外文翻译及文献综述
2 无线射频系统(RFID)的原理及安全性分析
2.1 RFID系统概述 RFID系统一般由三部分组成[3]: 标签(Tag):它是RFID的核心部件,主要包括用于收 发信息的藕合元件和一块微控制芯片组成,芯片内存 有唯一的电子编码; 阅读器(Reader):用来对标签进行读写操作的设备; 天线(Antenna):传递射频信号必需的收发装置。
毕业设计过程中阅读的和课题注意是 “和课题相关的”。不要选择 和课题无关的外文资料进行翻译。
3.1.3 外文翻译工具
谷歌翻译(/#) 有道翻译(/) 爱词霸翻译(http://fy.iciba. com/)
(3) Chien和Chen于2007年提出了一个符合EPC Class 1 Generation 2 的 RFID双向认证协议[18]
(4) Tassos Dimitriou等人提出的安全与效率兼得的协议
6 小结
虽然RFID技术在各行各业中有良好的应用前景,但如果不能很好 地解决隐私、追踪等安全问题,这种应用前景难以变成现实的产 业,因此,对RFID安全协议进行研究具有比较重要的意义。 本文首先对RFID系统进行了大致的描述,包括RFID系统的结构 及其原理,并针对在RFID系统上存在的一些隐私与安全隐患做了 细致分析,指出了在RFID系统上采用安全措施的必要性。同时从 多个角度阐述了一些RFID安全机制,重点介绍了基于密码技术的 RFID协议,文中又可分为基于杂凑的安全协议和其他密码学机制 的安全协议,并对文中提到的每一个协议给出了详细的通信流程, 分析了这些协议的缺陷。 随着RFID技术成本的降低和技术的成熟,人们将会越来越重视 RFID的安全性问题。我们相信,在不久的将来,RFID安全与隐私 问题一定能得到进一步完善的解决,同时RFID技术也一定会全面 普及。
外文翻译格式及规范
嘉兴学院毕业论文(设计)外文翻译撰写格式规范一、外文翻译形式要求1、要求本科生毕业论文(设计)外文翻译部分的外文字符不少于1.5万字, 每篇外文文献翻译的中文字数要求达到2000字以上,一般以2000~3000字左右为宜。
2、翻译的外文文献应主要选自学术期刊、学术会议的文章、有关著作及其他相关材料,应与毕业论文(设计)主题相关,并作为外文参考文献列入毕业论文(设计)的参考文献。
3、外文翻译应包括外文文献原文和译文,译文要符合外文格式规范和翻译习惯。
二、打印格式嘉兴学院毕业论文(设计)外文翻译打印纸张统一用A4复印纸,页面设置:上:2.8;下:2.6;左:3.0;右:2.6;页眉:1.5;页脚:1.75。
段落格式为:1.5倍行距,段前、段后均为0磅。
页脚设置为:插入页码,居中。
具体格式见下页温馨提示:正式提交“嘉兴学院毕业论文(设计)外文翻译”时请删除本文本中说明性的文字部分(红字部分)。
嘉兴学院本科毕业论文(设计)外文翻译题目:(指毕业论文题目)学院名称:服装与艺术设计学院专业班级:楷体小四学生姓名:楷体小四一、外文原文见附件(文件名:12位学号+学生姓名+3外文原文.文件扩展名)。
二、翻译文章翻译文章题目(黑体小三号,1.5倍行距,居中)作者(用原文,不需翻译,Times New Roman五号,加粗,1.5倍行距,居中)工作单位(用原文,不需翻译,Times New Roman五号,1.5倍行距,居中)摘要:由于消费者的需求和汽车市场竞争力的提高,汽车检测标准越来越高。
现在车辆生产必须长于之前的时间并允许更高的价格进行连续转售……。
(内容采用宋体五号,1.5倍行距)关键词:汽车产业纺织品,测试,控制,标准,材料的耐用性1 导言(一级标题,黑体五号,1.5倍行距,顶格)缩进两个字符,文本主体内容采用宋体(五号),1.5倍行距参考文献(一级标题,黑体五号, 1.5倍行距,顶格)略(参考文献不需翻译,可省略)资料来源:AUTEX Research Journal, V ol. 5, No3, September 2008*****译****校(另起一页)三、指导教师评语***同学是否能按时完成外文翻译工作。
外文翻译
井冈山大学外文翻译题目施工组织设计与施工图预算学院建筑工程学院专业工程管理姓名谭智强学号90617008指导教师夏振华2012年11月20日开发一个评估施工现场安全管理系统有效性的模型Developing a model to measure the effectiveness of safety management systems of construction sites作者:Evelyn Ai Lin Teoa,_, Florence Yean Yng Linga起止页码:1584~1592出版日期(期刊号):2005年6月第005版出版单位:新加坡环境国立大学摘要:在新加坡,实施了建筑行业安全管理系统(SMS)和SMS审计大约有十年之久的现在,安全标准的提高并不显著。
为了回应需要改进的有效性(SMS)和安全管理体系审计的目的,本文提出了一种方法, 人员可以利用测试工具来评估审计建筑公司安全管理体系的有效性。
研究方法采用了15个步进行调查,安全专家被邀请通过面试或工作表达自己的意见。
层次分析法(AHP)及因子分析是用来协助识别影响最为关键的因素和属性的安全。
该模型开发利用多属性值模型(MAVT)的方法。
该方法可以通过网站得到验证审核,利用模型中施工安全指数(CSI)可以计算出来。
结果表明,该模型可以作为一个客观CSI衡量不同管理和评估。
关键词: 安全管理体系;安全审核;施工安全指数1 简介: 支撑这一工作的论据安全管理体系(SMS)作为建筑业一个正式制度的管理现场安全的体系。
承包商预期管理现场安全通过正常的安全管理体系。
如何有效地评价这些系统是很重要的,这样可以使不足之处得以更正。
该研究工作是在协作与职业安全部门监督下进行的,人力资源部门可根据当局评价审计协议来衡量一个建筑工地的有效性的安全管理体系。
新加坡建筑行业服务实施了安全管理体系审计大约有十年之久了,但是提高的安全效果并不显著。
这与影响船舶的修建行业一样,经历了一个稳定提高安全性能的阶段。
外文翻译资料及译文
附录C:外文翻译资料Article Source:Business & Commercial Aviation, Nov 20, 2000. 5-87-88 Interactive Electronic Technical Manuals Electronic publications can increase the efficiency of your digital aircraft and analogtechnicians.Benoff, DaveComputerized technical manuals are silently revolutionizing the aircraft maintenance industry by helping the technician isolate problems quickly, and in the process reduce downtime and costs by more than 10 percent.These electronic publications can reduce the numerous volumes of maintenance manuals, microfiche and work cards that are used to maintain engines, airframes, avionics and their associated components."As compared with the paper manuals, electronic publications give us greater detail and reduced research times," said Chuck Fredrickson, general manager of Mercury Air Center in Fort Wayne, Ind.With all the advances in computer hardware and software technologies, such as high quality digital multimedia, hypertext and the capability to store and transmit digital multimedia via CD-ROMs/ networks, technical publication companies have found an effective, cost-efficient method to disseminate data to technicians.The solution for many operators and OEMs is to take advantage of today's technology in the form of Electronic Technical Manuals (ETM) or Interactive Technical Manuals (IETM). An ETM is any technical manual prepared in digital format that has the ability to be displayed using any electronic hardware media. The difference between the types of ETM/IETMs is the embedded functionality and implementation of the data."The only drawback we had to using ETMs was getting enough computers to meet our technicians' demand," said Walter Berchtold, vice president of maintenance at Jet Aviation's West Palm Beach, Fla., facility.A growing concern is the cost to print paper publications. In an effort to reduce costs, some aircraft manufacturers are offering incentives for owners to switch from paper to electronic publications. With an average printing cost of around 10 cents per page, a typical volume of a paper technical manual can cost the manufacturer over $800 for each copy. When producing a publication electronically, average production costs for a complete set of aircraft manuals are approximately $20 per copy. It is not hard to see the cost advantages of electronic publications.Another advantage of ETMs is the ease of updating information. With a paper copy, the manufacturer has to reprint the revised pages and mail copies to all the owners. When updates are necessary for an electronic manual, changes can either be e-mailed to theowners or downloaded from the manufacturer's Web site.So why haven't more flight departments converted their publications to ETM/IETMs? The answer lies in convincing technicians that electronic publications can increase their efficiency."We had an initial learning curve when the technicians switched over, but now that they are familiar with the software they never want to go back to paper," said Fredrickson.A large majority of corporate technicians also said that while they like the concept of having a tool that aids the troubleshooting process, they are fearful to give up all of their marked-up paper manuals.In 1987, a human factors study was conducted by the U.S. government to compare technician troubleshooting effectiveness, between paper and electronic methodology, and included expert troubleshooting procedures with guidance through the events. Results of the project indicated that technicians using electronic media took less than half the time to complete their tasks than those using the paper method, and technicians using the electronic method accomplished 65 percent more in that reduced time.The report also noted that new technicians using the electronic technical manuals were 12-percent more efficient than the older, more experienced technicians. (Novices using paper took 15 percent longer than the experts.)It is interesting that 90 percent of the technicians who used the electronic manuals said they preferred them to the paper versions. This proved to the industry that with proper training, the older technicians could easily transition from paper to electronic media.Electronic publications are not a new concept, although how they are applied today is. "Research over the last 20 years has provided a solid foundation for today's IETM implementation," said Joseph Fuller of the U.S. Naval Surface Warfare Center. "IETMs such as those for the Apache, Comanche, F-22, JSTAR and V-22 have progressed from concept to military and commercial implementation."In the late 1970s, the U.S. military investigated the feasibility of converting existing paper and microfilm. The Navy Technical Information Presentation System (NTIPS) and the Air Force Computer- based Maintenance Aid System (CMAS) were implemented with significant cost savings.The report stated that transition to electronic publications resulted in reductions in corrective maintenance time, fewer false removals of good components, more accurate and complete maintenance data collection reports, reduction in training requirements and reduced system downtime.The problem that the military encountered was ETMs were created in multiple levels of complexity with little to no standardization. Options for publications range from simple page-turning programs to full-functioning automated databases.This resulted in the classification of ETMs so that the best type of electronic publication could be selected for the proper application.Choosing a LevelWith all of the OEM and second- and third-party electronic publications that are available it is important that you choose the application level that is appropriate for your operation.John J. Miller, BAE Systems' manager of electronic publications, told B/CAthat "When choosing the level of an ETM/IETM, things like complexity of the aircraft and its systems, ease of use, currency of data and commonality of data should be the deciding factors; and, of course, price. If operational and support costs are reduced when you purchase a full-functioning IETM, then you should purchase the better system."Miller is an expert on the production, sustainment and emerging technologies associated with electronic publications, and was the manager of publications for Boeing in Philadelphia.Electronic publications are classified in one of five categories. A Class 1 publication is a basic electronic "page turner" that allows you to view the maintenance manual as it was printed. With a Class 2 publication all the original text of the manual is viewed as one continuous page with no page breaks. In Class 3, 4 and 5 publications the maintenance manual is viewed on a computer in a frame-based environment with increasing options as the class changes. (See sidebar.)Choosing the appropriate ETM for your operation is typically limited to whatever is being offered on the market, but since 1991 human factors reports state the demand has increased and, therefore, options are expected to follow.ETM/IETM ProvidersCompanies that create ETM/IETMs are classified as either OEM or second party provider. Class 1, 3 and 4 ETM/IETMs are the most commonly used electronic publications for business and commercial operators and costs can range anywhere from $100 to $3,000 for each ETM/ IETM. The following are just a few examples ofETM/IETMs that are available on the market.Dassault Falcon Jet offers operatorsof the Falcon 50/50EX, 900/900EX and 2000 a Class 4 IETM called the Falcon Integrated Electronic Library by Dassault (FIELD). Produced in conjunction with Sogitec Industries in Suresnes Cedex, France, the electronic publication contains service documentation, basic wiring, recommended maintenance and TBO schedules, maintenance manual, tools manual, service bulletins, maintenance and repair manual, and avionics manual.The FIELD software allows the user to view the procedures and hot- link directly to the Illustrated parts catalog. The software also enables the user to generate discrepancy forms, quotation sheets, annotations in the manual and specific preferences for each user.BAE's Miller said most of the IETM presentation systems have features called "Technical Notes." If a user of the electronic publication notices a discrepancy or needs to annotate the manual for future troubleshooting, the user can add a Tech Note (an electronic mark-up) to the step or procedure and save it to the base document. The next time that or another user is in the procedure, clicking on the tech note icon launches a pop-up screen displaying the previous technician's comments. The same electronic transfer of tech notes can be sent to other devices by using either a docking station or through a network server. In addition, systems also can use "personal notes" similar to technical notes that are assigned ID codes that only the authoring technician can access.Requirements for the FIELD software include the minimum of a 16X CD-ROM drive,Pentium II 200 MHz computer, Windows 95, Internet Explorer 4 SP 1 and Database Access V3.5 or higher.Raytheon offers owners of Beech and Hawker aircraft a Class 4 IETM called Raytheon Electronic Publication Systems (REPS). The REPS software links the frame-based procedures with the parts catalog using a single CD-ROM.Raytheon Aircraft Technical Publications said other in- production Raytheon aircraft manual sets will be converted to the REPS format, with the goal of having all of them available by 2001. In addition Raytheon offers select Component Maintenance Manuals (CMM). The Class 1 ETM is a stand-alone "page-turner" electronic manual that utilizes the PDF format of Adobe Acrobat.Other manufacturers including Bombardier, Cessna and Gulfstream offer operators similar online and PDF documentation using a customer- accessed Web account.Boeing is one manufacturer that has developed an onboard Class 5 IETM. Called the Computerized Fault Reporting System (CFRS), it has replaced the F-15 U.S. Air Force Fault Reporting Manuals. Technologies that are currently being applied to Boeing's military system are expected to eventually become a part of the corporate environment.The CFRS system determines re-portable faults by analyzing information entered during a comprehensive aircrew debrief along with electronically recovered maintenance data from the Data Transfer Module (DTM). After debrief the technicians can review aircraft faults and schedule maintenance work to be performed. The maintenance task is assigned a Job Control Number (JCN) and is forwarded electronically to the correct work center or shop. Appropriate information is provided to the Air Force's Core Automated Maintenance System (CAMS).When a fault is reported by pilot debrief, certain aircraft systems have the fault isolation procedural data on a Portable Maintenance Aid (PMA). The JCN is selected on a hardened laptop with a wireless Local Area Network (LAN) connection to the CFRS LAN infrastructure. The Digital Wiring Data System (DWDS) displays aircraft wiring diagrams to the maintenance technician for wiring fault isolation. On completion of maintenance, the data collected is provided to the Air Force, Boeing and vendors for system analysis.Third party IETM developers such as BAE Systems and Dayton T. Brown offer OEMs the ability to subcontract out the development of Class 1 through 5 ETM/IETMs. For example, Advantext, Inc. offers PDF and IPDF Class 1 ETMs for manufacturers such as Piper and Bell Helicopters. Technical publications that are available include maintenance manuals, parts catalogs, service bulletins, wiring diagrams, service letters and interactive parts ordering forms.The difference between the PDF and IPDF version is that the IPDF version has the ability to search for text and include hyperlinks. A Class 1 ETM, when printed, is an exact reproduction of the OEM manuals, including any misspellings or errors. Minimum requirements for the Advantext technical publications is a 486 processor, 16 MB RAM with 14 MB of free hard disk space and a 4X CD-ROM or better.Aircraft Technical Publishers (ATP) offers Class 1, 2 and 3 ETM/ IETMsfor the Beechjet 400/400A; King Air 300/ 350, 200 and 90; Learjet 23/24/25/28/29/35/36/55; Socata TB9/10/20/21 and TBM 700A; Sabreliner 265-65, -70 and -80; andBeech 1900. The libraries can include maintenance manuals, Illustrated parts bulletins, wiring manuals, Airworthiness Directives, Service Bulletins, component maintenance manuals and structural maintenance manuals. System minimum requirements are Pentium 133 MHz, Windows 95 with 16 MB RAM, 25 MB free hard disk space and a 4X CD-ROM or better.Additional providers such as Galaxy Scientific are providing ETM/ IETMs to the FAA. This Class 2, 3 and 4 publication browser is used to store, display and edit documentation for the Human Factors Section of the administration."Clearly IETMs have moved from research to reality," said Fuller, and the future looks to hold more promise.The Future of Tech PubsThe use of ETM/IETMs on laptop and desktop computers has led research and development corporations to investigate the human interface options to the computer. Elements that affect how a technician can interface with a computer are the work environment, economics and ease of use. Organizations such as the Office of Naval Research have focused their efforts on the following needs of technicians: -- Adaptability to the environment.-- Ease of use.-- Improved presentation of complex system relationship.-- Maximum reuse and distribution of engineering data.-- Intelligent data access.With these factors in mind, exploratory development has begun in the areas of computer vision, augmented reality display and speech recognition.Computer vision can be created using visual feedback from a head- mounted camera. The camera identifies the relative position and orientation of an object in an observed scene, and the object is used to correlate the object with a three-dimensional model. In order for a computer vision scenario to work, engineering data has to be provided through visually compatible software.When systems such as Sogitech's View Tech electronic publication browser and Dassault Systemes SA's Enovia are combined, a virtual 3D model is generated.The digital mockup allows the engineering information to directly update the technical publication information. If a system such as CATIA could be integrated into a Video Reference System (VRS), then it could be possible that a technician would point the camera to the aircraft component, the digital model identifies the component and the IETM automatically displays the appropriate information.This example of artificial intelligence is already under development at companies like Boeing and Dassault. An augmented reality display is a concept where visual cues are presented to users on a head-mounted, see-through display system.The cues are presented to the technician based on the identification of components on a 3D model and correlation with the observed screen. The cues are then presented as stereoscopic images projected onto the object in the observed scene.In addition a "Private Eye" system could provide a miniature display of the maintenance procedure that is provided from a palm- size computer. Limited success hascurrently been seen in similar systems for the disabled. The user of a Private Eye system can look at the object selected and navigate without ever having to touch the computer. Drawbacks from this type of system are mental and eye fatigue, and spatial disorientation.Out of all the technologies, speech recognition has developed into an almost usable and effective system. The progression through maintenance procedures is driven by speaker-independent recognition. A state engine controls navigation, and launches audio responses and visual cues to the user. Voice recognition software is available, although set up and use has not been extremely successful.Looking at other industries, industrial manufacturing has already started using "Palm Pilot" personal digital assistants (PDAs) to aid technicians in troubleshooting. These devices allow the technician to have the complete publication beside them when they are in tight spaces. "It would be nice to take the electronic publications into the aircraft, so we are not constantly going back to the work station to print out additional information," said Jet Aviation's Berchtold.With all the advantages that a ETM/ IETM offers it should be noted that electronic publications are not the right solution all of the time, just as CBT is not the right solution for training in every situation. Only you can determine if electronic publications meet your needs, and most technical publication providers offer demo copies for your review. B/CA IllustrationPhoto: Photograph: BAE Systems' Christine Gill prepares a maintenance manual for SGML conversion BAE Systems; Photograph: Galaxy Scientific provides the FAA's human factors group with online IETM support.; Photograph: Raytheon's Class 4 IETM "REPS" allows a user to see text and diagrams simultaneously with hotlinks to illustrated parts catalogs.外文翻译资料译文部分文章出处:民航商业杂志,2000-11-20,5-87-88交互式电子技术手册的电子出版物可以提高数字飞机和模拟技术的效率。
外文翻译
学号: 10415104常州大学毕业设计(论文)外文翻译(2014届)外文题目Application of a combined UF/RO system for thereuse of filter backwash water from treated swimmingpool water译文题目混合超滤/反渗透系统在游泳池水处理的反冲洗水回用中的应用外文出处Desalination 178(2005) 41—49学生龙瑞娜学院环境与安全工程学院专业班级给水101班校内指导教师张凤娥专业技术职务教授校外指导老师专业技术职务二○一四年一月混合超滤/反渗透系统在游泳池水处理的反冲洗水回用中的应用Florian G. ReiBmann a*, Eva Schulze b, Volker Albrecht b"Institute for Urban Water Management, Dresden University of Technology, D-O1062Dresden, GermanyTel. +49 (351) 463-34687; Fax +49 (351) 463-37204; email:Florian.Reissmann@mailbox.tu-dresden.de bWassertechniseher Anlagenbau Plauen GmbH, Re~iger Gewerbering I1, D-08525 Plauen,GermanyReceived 15 October 2004; accepted 22 November 2004摘要:由于超滤、反渗透相结合的处理工艺的全面应用,把处理过的游泳池水重用作过滤器反冲洗水是有效的。
超滤处理表明滤料的缩小是十分重要的。
浊度值从5-25FNU下降至0.02FNU。
在这项研究中被调查的设备,90分钟就能实现过滤。
根据这样的结构,超滤设备达到了97%以上的效率。
外文翻译及外文原文(参考格式)
外文翻译要求:1、外文资料与毕业设计(论文)选题密切相关,译文准确、质量好。
2、阅读2篇幅以上(10000字符左右)的外文资料,完成2篇不同文章的共2000汉字以上的英译汉翻译3、外文资料可以由指导教师提供,外文资料原则上应是外国作者。
严禁采用专业外语教材文章。
4、排序:“一篇中文译文、一篇外文原文、一篇中文译文、一篇外文原文”。
插图内文字及图名也译成中文。
5、标题与译文格式(字体、字号、行距、页边距等)与论文格式要求相同。
下页附:外文翻译与原文参考格式英文翻译 (黑体、四号、顶格)外文原文出处:(译文前列出外文原文出处、作者、国籍,译文后附上外文原文)《ASHRAE Handbook —Refrigeration 》.CHAPTER3 .SYSTEM Practices for ammonia 3.1 System Selection 3.2 Equipment3.10 Reciprocating Compressors第3章 氨制冷系统的实施3.1 系统选择在选择一个氨制冷系统设计时,须要考虑一些设计决策要素,包括是否采用(1)单级压缩(2)带经济器的压缩(3)多级压缩(4)直接蒸发(5)满液式(6)液体再循环(7)载冷剂。
单级压缩系统基本的单级压缩系统由蒸发器、压缩机、冷凝器、储液器(假如用的话)和制冷剂控制装置(膨胀阀、浮球阀等)。
1997 ASHRAE 手册——“原理篇”中的第一章讨论了压缩制冷循环。
图1.壳管式经济器的布置外文翻译的标题与译文中的字体、字号、行距、页边距等与论文格式相同。
英文原文(黑体、四号、顶格)英文翻译2(黑体,四号,顶格)外文原文出处:(黑体,四号,顶格)P. Fanning. Nonlinear Models of Reinforced and Post-tensioned Concrete Beams. Lecturer, Department of Civil Engineering, University College Dublin. Received 16 Jul 2001.非线形模型钢筋和后张法预应力混凝土梁摘要:商业有限元软件一般包括混凝土在荷载做用下非线性反应的专用数值模型。
外文文献翻译原文+译文
外文文献翻译原文Analysis of Con tin uous Prestressed Concrete BeamsChris BurgoyneMarch 26, 20051、IntroductionThis conference is devoted to the development of structural analysis rather than the strength of materials, but the effective use of prestressed concrete relies on an appropriate combination of structural analysis techniques with knowledge of the material behaviour. Design of prestressed concrete structures is usually left to specialists; the unwary will either make mistakes or spend inordinate time trying to extract a solution from the various equations.There are a number of fundamental differences between the behaviour of prestressed concrete and that of other materials. Structures are not unstressed when unloaded; the design space of feasible solutions is totally bounded;in hyperstatic structures, various states of self-stress can be induced by altering the cable profile, and all of these factors get influenced by creep and thermal effects. How were these problems recognised and how have they been tackled?Ever since the development of reinforced concrete by Hennebique at the end of the 19th century (Cusack 1984), it was recognised that steel and concrete could be more effectively combined if the steel was pretensioned, putting the concrete into compression. Cracking could be reduced, if not prevented altogether, which would increase stiffness and improve durability. Early attempts all failed because the initial prestress soon vanished, leaving the structure to be- have as though it was reinforced; good descriptions of these attempts are given by Leonhardt (1964) and Abeles (1964).It was Freyssineti’s observations of the sagging of the shallow arches on three bridges that he had just completed in 1927 over the River Allier near Vichy which led directly to prestressed concrete (Freyssinet 1956). Only the bridge at Boutiron survived WWII (Fig 1). Hitherto, it had been assumed that concrete had a Young’s modulus which remained fixed, but he recognised that the de- ferred strains due to creep explained why the prestress had been lost in the early trials. Freyssinet (Fig. 2) also correctly reasoned that high tensile steel had to be used, so that some prestress would remain after the creep had occurred, and alsothat high quality concrete should be used, since this minimised the total amount of creep. The history of Freyssineti’s early prestressed concrete work is written elsewhereFigure1:Boutiron Bridge,Vic h yFigure 2: Eugen FreyssinetAt about the same time work was underway on creep at the BRE laboratory in England ((Glanville 1930) and (1933)). It is debatable which man should be given credit for the discovery of creep but Freyssinet clearly gets the credit for successfully using the knowledge to prestress concrete.There are still problems associated with understanding how prestressed concrete works, partly because there is more than one way of thinking about it. These different philosophies are to some extent contradictory, and certainly confusing to the young engineer. It is also reflected, to a certain extent, in the various codes of practice.Permissible stress design philosophy sees prestressed concrete as a way of avoiding cracking by eliminating tensile stresses; the objective is for sufficient compression to remain after creep losses. Untensionedreinforcement, which attracts prestress due to creep, is anathema. This philosophy derives directly from Freyssinet’s logic and is primarily a working stress concept.Ultimate strength philosophy sees prestressing as a way of utilising high tensile steel as reinforcement. High strength steels have high elastic strain capacity, which could not be utilised when used as reinforcement; if the steel is pretensioned, much of that strain capacity is taken out before bonding the steel to the concrete. Structures designed this way are normally designed to be in compression everywhere under permanent loads, but allowed to crack under high live load. The idea derives directly from the work of Dischinger (1936) and his work on the bridge at Aue in 1939 (Schonberg and Fichter 1939), as well as that of Finsterwalder (1939). It is primarily an ultimate load concept. The idea of partial prestressing derives from these ideas.The Load-Balancing philosophy, introduced by T.Y. Lin, uses prestressing to counter the effect of the permanent loads (Lin 1963). The sag of the cables causes an upward force on the beam, which counteracts the load on the beam. Clearly, only one load can be balanced, but if this is taken as the total dead weight, then under that load the beam will perceive only the net axial prestress and will have no tendency to creep up or down.These three philosophies all have their champions, and heated debates take place between them as to which is the most fundamental.2、Section designFrom the outset it was recognised that prestressed concrete has to be checked at both the working load and the ultimate load. For steel structures, and those made from reinforced concrete, there is a fairly direct relationship between the load capacity under an allowable stress design, and that at the ultimate load under an ultimate strength design. Older codes were based on permissible stresses at the working load; new codes use moment capacities at the ultimate load. Different load factors are used in the two codes, but a structure which passes one code is likely to be acceptable under the other.For prestressed concrete, those ideas do not hold, since the structure is highly stressed, even when unloaded. A small increase of load can cause some stress limits to be breached, while a large increase in load might be needed to cross other limits. The designer has considerable freedom to vary both the working load and ultimate load capacities independently; both need to be checked.A designer normally has to check the tensile and compressive stresses, in both the top and bottom fibre of the section, for every load case. The critical sections are normally, but not always, the mid-span and the sections over piers but other sections may become critical ,when the cable profile has to be determined.The stresses at any position are made up of three components, one of which normally has a different sign from the other two; consistency of sign convention is essential.If P is the prestressing force and e its eccentricity, A and Z are the area of the cross-section and its elastic section modulus, while M is the applied moment, then where ft and fc are the permissible stresses in tension and compression.c e t f ZM Z P A P f ≤-+≤Thus, for any combination of P and M , the designer already has four in- equalities to deal with.The prestressing force differs over time, due to creep losses, and a designer isusually faced with at least three combinations of prestressing force and moment;• the applied moment at the time the prestress is first applied, before creep losses occur,• the maximum applied moment after creep losses, and• the minimum applied moment after creep losses.Figure 4: Gustave MagnelOther combinations may be needed in more complex cases. There are at least twelve inequalities that have to be satisfied at any cross-section, but since an I-section can be defined by six variables, and two are needed to define the prestress, the problem is over-specified and it is not immediately obvious which conditions are superfluous. In the hands of inexperienced engineers, the design process can be very long-winded. However, it is possible to separate out the design of the cross-section from the design of the prestress. By considering pairs of stress limits on the same fibre, but for different load cases, the effects of the prestress can be eliminated, leaving expressions of the form:rangestress e Perm issibl Range Mom entZ These inequalities, which can be evaluated exhaustively with little difficulty, allow the minimum size of the cross-section to be determined.Once a suitable cross-section has been found, the prestress can be designed using a construction due to Magnel (Fig.4). The stress limits can all be rearranged into the form:()M fZ PA Z e ++-≤1 By plotting these on a diagram of eccentricity versus the reciprocal of the prestressing force, a series of bound lines will be formed. Provided the inequalities (2) are satisfied, these bound lines will always leave a zone showing all feasible combinations of P and e. The most economical design, using the minimum prestress, usually lies on the right hand side of the diagram, where the design is limited by the permissible tensile stresses.Plotting the eccentricity on the vertical axis allows direct comparison with the crosssection, as shown in Fig. 5. Inequalities (3) make no reference to the physical dimensions of the structure, but these practical cover limits can be shown as wellA good designer knows how changes to the design and the loadings alter the Magnel diagram. Changing both the maximum andminimum bending moments, but keeping the range the same, raises and lowers the feasible region. If the moments become more sagging the feasible region gets lower in the beam.In general, as spans increase, the dead load moments increase in proportion to the live load. A stage will be reached where the economic point (A on Fig.5) moves outside the physical limits of the beam; Guyon (1951a) denoted the limiting condition as the critical span. Shorter spans will be governed by tensile stresses in the two extreme fibres, while longer spans will be governed by the limiting eccentricity and tensile stresses in the bottom fibre. However, it does not take a large increase in moment ,at which point compressive stresses will govern in the bottom fibre under maximum moment.Only when much longer spans are required, and the feasible region moves as far down as possible, does the structure become governed by compressive stresses in both fibres.3、Continuous beamsThe design of statically determinate beams is relatively straightforward; the engineer can work on the basis of the design of individual cross-sections, as outlined above. A number of complications arise when the structure is indeterminate which means that the designer has to consider, not only a critical section,but also the behaviour of the beam as a whole. These are due to the interaction of a number of factors, such as Creep, Temperature effects and Construction Sequence effects. It is the development of these ideas whichforms the core of this paper. The problems of continuity were addressed at a conference in London (Andrew and Witt 1951). The basic principles, and nomenclature, were already in use, but to modern eyes concentration on hand analysis techniques was unusual, and one of the principle concerns seems to have been the difficulty of estimating losses of prestressing force.3.1 Secondary MomentsA prestressing cable in a beam causes the structure to deflect. Unlike the statically determinate beam, where this motion is unrestrained, the movement causes a redistribution of the support reactions which in turn induces additional moments. These are often termed Secondary Moments, but they are not always small, or Parasitic Moments, but they are not always bad.Freyssinet’s bridge across the Marne at Luzancy, started in 1941 but not completed until 1946, is often thought of as a simply supported beam, but it was actually built as a two-hinged arch (Harris 1986), with support reactions adjusted by means of flat jacks and wedges which were later grouted-in (Fig.6). The same principles were applied in the later and larger beams built over the same river.Magnel built the first indeterminate beam bridge at Sclayn, in Belgium (Fig.7) in 1946. The cables are virtually straight, but he adjusted the deck profile so that the cables were close to the soffit near mid-span. Even with straight cables the sagging secondary momentsare large; about 50% of the hogging moment at the central support caused by dead and live load.The secondary moments cannot be found until the profile is known but the cablecannot be designed until the secondary moments are known. Guyon (1951b) introduced the concept of the concordant profile, which is a profile that causes no secondary moments; es and ep thus coincide. Any line of thrust is itself a concordant profile.The designer is then faced with a slightly simpler problem; a cable profile has to be chosen which not only satisfies the eccentricity limits (3) but is also concordant. That in itself is not a trivial operation, but is helped by the fact that the bending moment diagram that results from any load applied to a beam will itself be a concordant profile for a cable of constant force. Such loads are termed notional loads to distinguish them from the real loads on the structure. Superposition can be used to progressively build up a set of notional loads whose bending moment diagram gives the desired concordant profile.3.2 Temperature effectsTemperature variations apply to all structures but the effect on prestressed concrete beams can be more pronounced than in other structures. The temperature profile through the depth of a beam (Emerson 1973) can be split into three components for the purposes of calculation (Hambly 1991). The first causes a longitudinal expansion, which is normally released by the articulation of the structure; the second causes curvature which leads to deflection in all beams and reactant moments in continuous beams, while the third causes a set of self-equilibrating set of stresses across the cross-section.The reactant moments can be calculated and allowed-for, but it is the self- equilibrating stresses that cause the main problems for prestressed concrete beams. These beams normally have high thermal mass which means that daily temperature variations do not penetrate to the core of the structure. The result is a very non-uniform temperature distribution across the depth which in turn leads to significant self-equilibrating stresses. If the core of the structure is warm, while the surface is cool, such as at night, then quite large tensile stresses can be developed on the top and bottom surfaces. However, they only penetrate a very short distance into the concrete and the potential crack width is very small. It can be very expensive to overcome the tensile stress by changing the section or the prestress。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
第一部分
摘要:
计算、通信和传感技术的快速进步给控制领域提供了前所未有的机会, 以适应国家的经济和国防需求从而扩大它的贡献。
这份报告提出了一个专家小组特许检查的发现和建议。
我们的报告包含控制的概述,成功和影响,并描述了它的新的挑战。
我们不要试图覆盖整个领域。
相反,我们关注的这些地区正在经历最快速变化,所以要求使用新的方法来满足社会面临的挑战和机遇。
控制的概述
本报告中控制定义指的是使用算法和反馈工程系统。
最简单的方面,控制系统是一个用来通过计算和修改一个系统行为驱动的设备。
控制系统工程的历史可以追溯到工业革命,离心调速器等设备,如图1.1所示。
这个设备使用一个飞球机制,汽机的轮转速和调整蒸汽流入机器使用一系列的联系。
因此通过调节涡轮的速度,它提供了安全、可靠、一致的操作需要使蒸汽动力工厂的迅速蔓延。
控制在技术的发展中扮演了至关重要的部分,比如电力,通讯,交通和制造。
例子包括自动驾驶仪在军用和商用飞机(图 1.2A),调节和控制电力网,并在磁盘的读/写磁头定位精度高驱动器(图1.2B)。
反馈是在各种应用领域的使能技术,已被彻底改造,并在不同环境下获得专利很多次。
图1.1,离心调速(一),在18世纪80年代开发的,是一个
成功的瓦特蒸汽机的推动者(二),这推动了工业革命。
剑桥大学图提供者。
控制的现代观点认为反馈作为不确定性管理的工具。
通过测量系统的操作,与参照相比较,调节可用的控制变量,我们可以使系统正确响应,即使其动态行为是不完全已知的,或者外部干扰导致它错误地响应。
这是在工程系统中一个重要的特征,因为它们必须在各种条件下进行可靠和有效地操作。
这个方面恰恰正是控制对于不确定性为了确保稳健性的一种手段,解释了在现代科技,世界为什么反馈控制系统都在我们身边。
他们在我们的家、汽车和消费类电子产品里,在我们的工厂和通讯系统中,在我们的交通运输、军事和航天系统中。
控件的使用极其广泛,包括了许多不同应用程序。
这些包括机电系统控制,计算机控制的执行器和传感器调节系统的行为;电子系统控制,反将被用来补偿元件或参数的变化,提供可靠的、
可重复的性能;信息和决策系统控制,基于未来需求的估计将有限的资源动态分配。
控制原理也可以这些领域找到,例如生物学、医学、经济学,那里的反馈机制是永远存在的。
随着时代的发展,控制在工程系统中也是关键型的任务功能:如果控制系统不能正常工作,系统将会失败。
对控制领域做出贡献的来自许多学科,包括纯数学和应用数学、航天、化工、机械和电气工程;运营研究和经济学,以及物理和生物科学。
这些不同领域的互动是历史的一个重要组成部分和领域里的一种力量。
成就和影响
在过去的40年里,模拟和数字电子产品的出现,使控制技术远远传播超出了它最初的应用,并且使得它在许多应用中取得了使能技术。
从过去的控制投资可见成果包括:
图1.2,控制的应用:(一)波音777飞行线控飞机
及(b)希捷Barracuda36ES2磁盘驱动器。
照片提供者的波音公司与希捷科技。
●用于制造航天飞行器制导和控制系统,包括商业飞机、导弹、先进的战斗机、运载火
箭和卫星。
这些控制系统提供稳定性,在大环境和系统的不确定性的情况下发出跟踪。
●制造业的控制系统,从汽车到集成电路。
电脑控制的机器提供精确定位和装配所需的
高品质、高产量构成的制造和产品。
●工业过程控制系统,尤其是在烃和化学加工等行业。
数百阀门,加热器,泵和其它执
行机构,为了保持产品的高品质,成千上万的传感器信号用来监视,并做出相应的调整。
●通信系统,包括电话系统,控制细胞电话和互联网。
控制系统在发射器和中继器中调
节信号功率电平,管理数据包缓冲区的网络路由设备,并提供自适应噪声消除功能,以
应对不同传输线路特性。
这些应用都对现代社会的生产力产生巨大的影响。
除了其在工程应用中的影响,控制也取得了显著的智力贡献。
由于需要制定激励可证明正确的技术反馈系统的设计,控制理论与工程师们严格的使用和对数学的贡献。
他们一直是一致倡导“系统透视,”并制定可靠的技术进行建模、分析、设计和测试,设计和实施目前使用的各种非常复杂的工程系统。
此外,对于接受这个系统的角度,希望掌握它涉及的大量集中的知识和技能的人来说,控制社会是一个主要来源和训练场地。
图1.3,现代网络系统:(一)美国加州电网和
(二)NSFNET互联网骨干网。
图提供者加利福尼亚州和
国家中心的超级计算机应用程序(NCSA)。
未来的机遇和挑战
当我们展望未来,在控制急剧扩大的背景下,新应用的机遇将建立在控制的进步上。
普遍存在、分布式计算,通信和传感系统的出现已经开始创造我们有机会获得大量数据和无法被想象20年前的方式处理和传达数据的能力的环境。
这将对军事,商业和科学应用产生深远的影响,尤其是作为软件系统开始与集成度越来越高的物理系统联系起来。
图1.3说明了两个系统中这些趋势已经明显。
控制将是构建这样相互关联的一个越来越重要的元素。
系统能够提供高性能,高可信度和可重配置操作中的不确定性因素依然存在。
在所有这些领域中,一个共同特点是,系统层面的需求远超过单个组分的可实现的可靠性。
这正是控制(在其最一般的意义上)发挥的主要作用,因为它允许系统这样操作以确保它是在检测当前状态的基础上通过校正它的动作实现其目标的。
这个领域所面临的挑战是来自控制系统的传统观点,例如单个控制器的单一程序,为了确认控制系统作为一个物理与信息系统异类集合,具有复杂的相互联系和相互作用。
控制是防御系统的关键技术。
在打击恐怖主义和非对称威胁的斗争日益重要。
控制允许的自主操作和半自主无人系统困难而危险,还有先进的指挥和控制系统能够提供可靠的,可重构的决策系统。
微控件和senosr网的使用将提高我们检测威胁的能力,在他们会损坏之前。
反馈通信系统的新用途将提供可靠,灵活,安全的网络操作在动态的、不确定的、敌对的环境中。
为了实现控制的潜力施加到这些新兴的应用,必须制定新的方法和途径。
其中目前的领域面临许多挑战,下面举几个例子预测未来的困难:
●符号和连续的动态控制系统。
下一代系统将结合逻辑运算(如符号推理和决策)与连续
(如电压,位置,浓度)。
目前的理论没有得到很好的处理,以应付此类系统,尤其是
我们扩展到非常大的系统。
●控制在分布式的,异步的,网络环境。
分布式控制跨越多个计算单元,通过packetbased
互联通信,它将需要新的形式,以确保稳定性,性能和鲁棒性。
这在应用中是特别真实
的,例如不能忽视在执行制操作计算和通讯方面的限制。
●高一级的协调和自主性。
越来越多的反馈被设计成整个企业的决策系统,包括供应链管
理和物流,空域管理和空中交通管制,和C4ISRsystems。
过去几十年的分析和设计坚
固的进步
控制系统必须扩展到这些较高层次的决策系统,如果他们要在现实环境可靠运行。
●控制算法的自动合成,汇集了核查和验证。
未来的工程系统需要快速设计的能力,再设
计和实施控制软件。
研究人员需要开发更强大的设计工具自动完成整个控制设计流程从模型开发到硬件在环仿真,包括系统级软件验证与确认。
●构建非常可靠的系统来自不可靠的部件。
即使个别组件无法运行,多数大型工程
系统必须继续。
越来越多地,这要求的设计,使系统自动重新配置自身,以便其性能逐渐下降,而不是硬生生地。
为了使结果严谨,务实,和广泛使用,所有这些挑战将需要研究界多年的努力。
他们也将需要资助机构投资,以确保目前的进展情况,并继续那未来的技术得以最充分实现。
建议
为了应对这些挑战,并提供在控制领域的承诺,建议进行以下操作:
1.大幅增加研究旨在控制,计算机的集成科学,通信和联网。
这包括原理、方法、用于建模
和高层次,网络化,分布式系统控制工具,和严谨可靠的技术,嵌入式,实时软件。
2.大幅提高控制在较高水平的决策研究,迈向企业级系统。
这包括工作在动态资源、分配的
不确定性、学习和适应、人工智能的动态系统。
3.探索高风险,远程控制应用到新的领域,例如纳米技术,量子力学,电磁学,生物学和环
境科学。
双向调查员,跨学科的资金可能是一个在此上下文中是特别有用的机制。
4.为维护理论与互动数学的支持,需要广义的解释。
场的强度依赖于它与严格数学的亲密接
触,这将在未来变得越来越重要。
5.传播控制的概念和工具,投资新的方法来教育和宣传,以适应非传统的观众。
科学家和工
程师用反馈和控件来改变系统的动力学原理和管理的不确定性,社会对他们来说起到了更广泛的教育。
控制是会通过许多应用程序产生影响,航空航天、交通、信息和网络、机器人和智能机器、材料和加工、生物学和医学。
它将使我们能够构建更复杂的系统,并确保我们构建的系统是可靠的,高效和健壮的。
该小组的建议是基于在不同控制严谨的工作传统,实现机遇的关键行动在一个信息丰富的世界的控制。