毕业设计(论文)外文原文及译文
本科毕业论文外文翻译【范本模板】
本科毕业论文外文翻译外文译文题目:不确定条件下生产线平衡:鲁棒优化模型和最优解解法学院:机械自动化专业:工业工程学号: 201003166045学生姓名: 宋倩指导教师:潘莉日期: 二○一四年五月Assembly line balancing under uncertainty: Robust optimization modelsand exact solution methodÖncü Hazır , Alexandre DolguiComputers &Industrial Engineering,2013,65:261–267不确定条件下生产线平衡:鲁棒优化模型和最优解解法安库·汉泽,亚历山大·多桂计算机与工业工程,2013,65:261–267摘要这项研究涉及在不确定条件下的生产线平衡,并提出两个鲁棒优化模型。
假设了不确定性区间运行的时间。
该方法提出了生成线设计方法,使其免受混乱的破坏。
基于分解的算法开发出来并与增强策略结合起来解决大规模优化实例.该算法的效率已被测试,实验结果也已经发表。
本文的理论贡献在于文中提出的模型和基于分解的精确算法的开发.另外,基于我们的算法设计出的基于不确定性整合的生产线的产出率会更高,因此也更具有实际意义。
此外,这是一个在装配线平衡问题上的开创性工作,并应该作为一个决策支持系统的基础。
关键字:装配线平衡;不确定性; 鲁棒优化;组合优化;精确算法1.简介装配线就是包括一系列在车间中进行连续操作的生产系统。
零部件依次向下移动直到完工。
它们通常被使用在高效地生产大量地标准件的工业行业之中。
在这方面,建模和解决生产线平衡问题也鉴于工业对于效率的追求变得日益重要。
生产线平衡处理的是分配作业到工作站来优化一些预定义的目标函数。
那些定义操作顺序的优先关系都是要被考虑的,同时也要对能力或基于成本的目标函数进行优化。
就生产(绍尔,1999)产品型号的数量来说,装配线可分为三类:单一模型(SALBP),混合模型(MALBP)和多模式(MMALBP)。
软件工程毕业论文文献翻译中英文对照
软件工程毕业论文文献翻译中英文对照学生毕业设计(论文)外文译文学生姓名: 学号专业名称:软件工程译文标题(中英文):Qt Creator白皮书(Qt Creator Whitepaper)译文出处:Qt network 指导教师审阅签名: 外文译文正文:Qt Creator白皮书Qt Creator是一个完整的集成开发环境(IDE),用于创建Qt应用程序框架的应用。
Qt是专为应用程序和用户界面,一次开发和部署跨多个桌面和移动操作系统。
本文提供了一个推出的Qt Creator和提供Qt开发人员在应用开发生命周期的特点。
Qt Creator的简介Qt Creator的主要优点之一是它允许一个开发团队共享一个项目不同的开发平台(微软Windows?的Mac OS X?和Linux?)共同为开发和调试工具。
Qt Creator的主要目标是满足Qt开发人员正在寻找简单,易用性,生产力,可扩展性和开放的发展需要,而旨在降低进入新来乍到Qt的屏障。
Qt Creator 的主要功能,让开发商完成以下任务: , 快速,轻松地开始使用Qt应用开发项目向导,快速访问最近的项目和会议。
, 设计Qt物件为基础的应用与集成的编辑器的用户界面,Qt Designer中。
, 开发与应用的先进的C + +代码编辑器,提供新的强大的功能完成的代码片段,重构代码,查看文件的轮廓(即,象征着一个文件层次)。
, 建立,运行和部署Qt项目,目标多个桌面和移动平台,如微软Windows,Mac OS X中,Linux的,诺基亚的MeeGo,和Maemo。
, GNU和CDB使用Qt类结构的认识,增加了图形用户界面的调试器的调试。
, 使用代码分析工具,以检查你的应用程序中的内存管理问题。
, 应用程序部署到移动设备的MeeGo,为Symbian和Maemo设备创建应用程序安装包,可以在Ovi商店和其他渠道发布的。
, 轻松地访问信息集成的上下文敏感的Qt帮助系统。
注塑模具设计外文翻译
毕业设计(论文)外文资料翻译及原文(2012届)题目电话机三维造型与注塑模具设计指导教师院系工学院班级学号姓名二〇一一年十二月六日【译文一】塑料注塑模具并行设计Assist.Prof.Dr. A. Y AYLA /Prof.Dr. Paş a YAYLA摘要塑料制品制造业近年迅速成长。
其中最受欢迎的制作过程是注塑塑料零件。
注塑模具的设计对产品质量和效率的产品加工非常重要。
模具公司想保持竞争优势,就必须缩短模具设计和制造的周期。
模具是工业的一个重要支持行业,在产品开发过程中作为一个重要产品设计师和制造商之间的联系。
产品开发经历了从传统的串行开发设计制造到有组织的并行设计和制造过程中,被认为是在非常早期的阶段的设计。
并行工程的概念(CE)不再是新的,但它仍然是适用于当今的相关环境。
团队合作精神、管理参与、总体设计过程和整合IT工具仍然是并行工程的本质。
CE过程的应用设计的注射过程包括同时考虑塑件设计、模具设计和注塑成型机的选择、生产调度和成本中尽快设计阶段。
介绍了注射模具的基本结构设计。
在该系统的基础上,模具设计公司分析注塑模具设计过程。
该注射模设计系统包括模具设计过程及模具知识管理。
最后的原则概述了塑料注射模并行工程过程并对其原理应用到设计。
关键词:塑料注射模设计、并行工程、计算机辅助工程、成型条件、塑料注塑、流动模拟1、简介注塑模具总是昂贵的,不幸的是没有模具就不可能生产模具制品。
每一个模具制造商都有他/她自己的方法来设计模具,有许多不同的设计与建造模具。
当然最关键的参数之一,要考虑到模具设计阶段是大量的计算、注射的方法,浇注的的方法、研究注射成型机容量和特点。
模具的成本、模具的质量和制件质量是分不开的在针对今天的计算机辅助充型模拟软件包能准确地预测任何部分充填模式环境中。
这允许快速模拟实习,帮助找到模具的最佳位置。
工程师可以在电脑上执行成型试验前完成零件设计。
工程师可以预测过程系统设计和加工窗口,并能获得信息累积所带来的影响,如部分过程变量影响性能、成本、外观等。
毕业设计英文作文范文
毕业设计英文作文范文Title: The Importance of the Graduation Project in Academic Development。
The graduation project holds a pivotal role in the academic journey of students. It serves as a culmination of years of learning, a platform to showcase acquired skills, and an opportunity to delve deep into a specific subject matter. In this essay, I will elaborate on the significance of the graduation project and its impact on academic development.Firstly, the graduation project fosters independent learning and critical thinking skills. Unlike regular coursework where the parameters are often well-defined, the graduation project requires students to identify a research question or a problem statement independently. This process necessitates thorough literature review, data collection, and analysis, thereby honing research and analytical abilities. Moreover, formulating hypotheses, designingexperiments, or proposing solutions demand creativethinking and problem-solving skills, which are essentialfor academic and professional success.Secondly, the graduation project encourages interdisciplinary learning and collaboration. Many projects involve aspects from various fields, prompting students to integrate knowledge acquired from different courses. This interdisciplinary approach not only enriches the project but also broadens students' perspectives, enabling them to appreciate the interconnectedness of different subjects. Furthermore, collaboration with peers, mentors, or industry professionals enhances teamwork, communication, and project management skills, which are indispensable in any academic or professional setting.Additionally, the graduation project cultivates resilience and perseverance. Research, by its nature, is fraught with challenges, setbacks, and uncertainties. Students encounter obstacles ranging from experimental failures to data inconsistencies, requiring them to adapt, troubleshoot, and persist in the face of adversity.Overcoming these hurdles instills resilience and fortitude, attributes that are invaluable not only in academia but also in life.Moreover, the graduation project offers a platform for personal and intellectual growth. It provides students with the autonomy to explore topics of their interest, delveinto uncharted territories, and push the boundaries of knowledge. This journey of self-discovery not only enhances academic curiosity but also fosters a sense of ownership and accomplishment. Furthermore, presenting findings, defending arguments, and receiving feedback during project evaluations contribute to the development of presentation, communication, and critical evaluation skills, which are essential for academic and professional success.In conclusion, the graduation project is a cornerstone of academic development, offering students a unique opportunity to apply theoretical knowledge to real-world problems, fostering independent learning, interdisciplinary collaboration, resilience, and personal growth. By engaging in this endeavor, students not only demonstrate theiracademic prowess but also equip themselves with essential skills and attributes for future endeavors. Therefore, the graduation project stands as a testament to the culmination of academic journey and the beginning of a new chapter in students' intellectual and professional pursuits.。
SCANDINAVIAN-FURNITURE-DESIGN北欧家具设计大学毕业论文外文文献翻译及原文
毕业设计(论文)外文文献翻译文献、资料中文题目:北欧家具设计文献、资料英文题目:SCANDINAVIAN FURNITURE DESIGN 文献、资料来源:文献、资料发表(出版)日期:院(部):专业:工业设计班级:姓名:学号:指导教师:翻译日期: 2017.02.14本科生毕业设计(论文)外文翻译毕业设计(论文)题目:家具设计外文题目:SCANDINAVIAN FURNITURE DESIGN译文题目:北欧家具设计学生姓名: WJL专业:工业设计指导教师姓名:评阅日期:Reference:Judith Gura Thames & Hudson Ltd .Scandinavian Furniture: A Sourcebook of Classic Designs for the 21st Century .2007-11Mike Roemer. INTERIOR AND FURNITURE DESIGN. Thames Hudson Press.2005SCANDINA VIAN FURNITURE DESIGNScandinavian design is 30 years in the 20th century Having achieved great success, and acquired an international reputation for design. The style is concerned, the Scandinavian design is the function of doctrine, but not as stringent as the 20th century, 30 years and doctrines.as stringent as the 20th century, 30 years and doctrines. Geometric form of soften, and edges are fairing into S-shaped curve or wavy lines, often described as "organic form", so that the form of more humane and angry. Before the war with Bauhaus functionalism as the center 40 years in the 20th century, under the difficult conditions of material deprivation is widely accepted, but by the mid-20th century, 40, functionalism has been gradually includes a number of practical and style changes. These changes left the Bauhaus pure geometric forms and "works" the language of aesthetics, most notably the Scandinavian design. As early as 1930, the Stockholm Fair, Germany, Scandinavian design will be a strict functionalism and local arts and crafts in the humanist tradition of integrating their together. In the 1939 New York International Exposition, but also established the "Swedish Modern style," as the concept of an international status. After the 20th century, 40 years after a difficult period, Scandinavian design in the 20th century, 50 years produced a new leap forward. Its simple and organic shape and natural color and texture very popular in the international arena. Milan Triennial in 1954, the international design exhibition, Scandinavian design show a new look, the participation of Sweden, Denmark, Finland and Norway have achieved great success. The design of these countries after the war, the organization implemented a policy of cooperation, their first major achievement was called "Scandinavian Design" exhibition. Arts Foundation in the United States under the sponsorship of this exhibition from 1954-1957 in North America in 22 years, the city's main museums around the world, thus making "Scandinavian design" the image of the widely popular in the international community. Function of the Scandinavian modern design movement, the countries in the design organization at the national or local level, held a large number of exhibitions, the 20th century, these activities have become a key feature of the 50's. Scandinavian design of the Year, held alternately in various countries, affecting a wide range, which, together with thepublications and periodicals for the design of the exchanges made a significant contribution. Design organizations not only exhibitions, they are also an important advocate in this area designed to encourage manufacturers to invest in a creative product development, to persuade the authorities to design policies to support its excellent design. They also inspire public awareness of good design and everyday use more beautiful thing, and this 50 to 60 for the 20th century, the early design development played an important role. In addition to designing the organization efforts, dominated the 20th century, 50 years of social and economic life of the development of the power of design has a more profound impact, with the process of industrialization and urbanization, the whole population structure has changed. Continuously improve the standard of living affected the majority of the people and their way of life, resulting in widespread optimism and confidence for the development and progress. New ideas begin to gain traction, such as that the ordinary people have the right to enjoy the comfort of home, the family is not only healthy, but also meets the functional and aesthetic requirements. In the 20th century, 50's, the ultimate welfare state built up in Scandinavia. The 20th century, 40 years in order to reflect the ethnic characteristics arising from a sense of nostalgia, often showing the pristine countryside, contributed to this softening trend. Early functionalism advocated by the primary color for the 20th century, 40 years to reconcile the color gradually replaced by a more coarse texture and natural materials by their favorite designers. After 1945, another retro trend - the Danish tradition of excellent craftsmanship in Sweden and Norway have also been strengthened. The 20th century, 50 years, a group of pre-war designers, such as the prestigious Henningsen, Klandt, mam Marsden, Aalto, etc. are still walking in the forefront of the design. For example, Henningsen, designed after the war, a number of new PH lamps, in particular, he designed a PH-5, and PH Artichoke pendant lamp has achieved great success and has sold briskly. The other hand, young designers have also come to the fore, thus promoted the Scandinavian design of further development. Scandinavian design of the human touch is also reflected in the design of industrial equipment, in this respect Swedish industrial designer made a lot of work. From 1965 onwards, from Sweden, consisting of six designers "design team" involved in Solna, the company's offsetprinting production line development and design work, they operate on the production line process carried out a detailed ergonomic analysis and redesign the signs, symbols, instructions and manipulating the handle, so that working conditions have been greatly improved.Danish furniture design has a tradition dating back almost 450 years .In 1554, a n umber of cabinetmakers founded Koebenhavns Snedkerlaug (The Copenhagen Guild of Cabinetmakers) with the dual purpose of creating high-quality furniture and of prot ecting the trade from poor craftsmen by establishing formal training for cabin-makers. Two hundred years later,in 1777,Det Kongelige Meoble Magazine (The Royal Furnitu re Magazine) was established with the aim of manufacturing uniform,high-quality fur niture in terms of production and design for the Danish Royal Household and its vario us departments and ministries ,etc.The furniture was designed almost along the lines o f catalogue goods by the most renowned designers of the period,and their drawings w ere forwarded to master cabinetmakers all over the country,who then manufactured th em.After a brief period of only 40 years,the practice came to an end in 1815.The imp ortant thing is that the above-mentioned events were extremely visionary as regards q uality and design,and that they went on to form a solid foundation for later developme nt.Furthermore,Det Kongelige Danske Kunstakademi (The Royal Danish Academy of Art) in Copenhagen, established a school of furniture design in 1770,whose purpose w as the education of furniture apprentices to draw and inspect masterpieces what amou nted to the world’s first systematic education of furniture designer.Throughout the 19t h century,indeed until the beginning of the 1920’s, there is an absence of an independe nt Danish style.The architects of the time are inspired by French, and particularly,Engl ish furniture and only design furniture for the wealthy upper classes and civil authoriti es. Peasants,farmers and the fledgling working class still do not represent an interestin g commercial body,but this picture changes with the country’s move from an agricultu ral society to an industrialized one towards the end of the last century.The cities almos t exploded in size and social awareness flew with the emergence of the new social clas ses-laborers and office workers-both of whom demanded monetary payment for their services.Put in simple terms,you might say that this was how the foundation of modern consumer society came into being. Once current overheads had been met such as food,clothing,rent and heating ,etc.People still had the means to buy furniture,which in its own small way, created the basis for a formalized furniture industry.The furniture industry did not really take off until people began moving away from the cramped apartments in the city centers to larger apartments and detached houses on the outskirts of town.This happened in two stages,the first of which was in the 1920’s,when the social housing projects beg an and detached houses started to appear.The second stage was in the 1950’s,when both types of housing be fan to shoot up everywhere.This development,combined with a high level of knowledge and awareness,creatd a new and more rational housing culture where people began to demand high-quality functional furniture.As it turned out, people outside Denmark soon began to make the same kinds of demands.The 1920’s saw the desire for a purely Danish style of furniture.In 1924,a lecture ship in furniture design was established at Kunstakademiets Arkitektskole (The Royal Danish Academy of Fine Arts School of Architecture) in Copenhagen.The lectureship went to the Danish architect,Kaare Klint(1888-1954), who influenced the developmen t of Danish furniture design to a great degree.Kaare Klint was a systematist and a mod ernist who used his students to pioneer a series of surveys and analyses of furniture an d spatial needs. First and foremost,Kaare Klint represented the approach that furniture should be functional and user-friendly,an approach which in many ways deviated fro m the rest of Europe,where functionalism often took the form of formalistic exercises, directing its focus towards a well-to-do elite rather than the ordinary man in the street.The result was that a strong,independent,humanistic functionalism evolved in De nmark through the 1930’s and 40’s,culminating in an international breakthrough at the beginning of the 1950’s.A contributory factor to this breakthrough was the Guild or C abinetmakers’ annual autumn exhibition held for the first time in 1928.Here, young fu rniture designers could find collaborative partners among the established cabinetmake r workshops with an eye to developing new types of furniture.It was at these exhibitio ns that Danish architects like Hans J.Wegner,Ole Wanscher, Finn Juhl,Boerge Mogens en,Arne Jacobsen and many others made their breakthrough,and it was at these same e xhibitions in the period following the Second World War that,in particular the Americ。
建筑学Modern-Architecture现代建筑大学毕业论文外文文献翻译及原文
建筑学Modern-Architecture现代建筑⼤学毕业论⽂外⽂⽂献翻译及原⽂毕业设计(论⽂)外⽂⽂献翻译⽂献、资料中⽂题⽬:现代建筑⽂献、资料英⽂题⽬:Modern Architecture⽂献、资料来源:⽂献、资料发表(出版)⽇期:院(部):专业:班级:姓名:学号:指导教师:翻译⽇期: 2017.02.14建筑学毕业设计的外⽂⽂献及译⽂⽂献、资料题⽬:《Advanced Encryption Standard》⽂献、资料发表(出版)⽇期:2004.10.25外⽂⽂献:Modern ArchitectureModern architecture, not to be confused with 'contemporary architecture', is a term given to a number of building styles with similar characteristics, primarily the simplification of form and the elimination of ornament. While the style was conceived early in the 20th century and heavily promoted by a few architects, architectural educators and exhibits, very few Modern buildings were built in the first half of the century. For three decades after the Second World War, however, it became the dominant architectural style for institutional and corporate building.1. OriginsSome historians see the evolution of Modern architecture as a social matter, closely tied to the project of Modernity and hence to the Enlightenment, a result of social and political revolutions.Others see Modern architecture as primarily driven by technological and engineering developments, and it is true that the availability of new building materials such as iron, steel, concrete and glass drove the invention of new building techniques as part of the Industrial Revolution. In 1796, Shrewsbury mill owner Charles Bage first used his ‘fireproof’ design, which relied on cast iron and brick with flag stone floors. Such construction greatly strengthened the structure of mills, which enabled them to accommodate much bigger machines. Due to poor knowledge of iron's properties as a construction material, a number of early mills collapsed. It was not until the early 1830s that Eaton Hodgkinson introduced the section beam, leading to widespread use of iron construction, this kind of austere industrial architecture utterly transformed the landscape of northern Britain, leading to the description, "Dark satanic mills" of places like Manchester and parts of West Yorkshire. The Crystal Palace by Joseph Paxton at the Great Exhibition of 1851 was an early example of iron and glass construction; possibly the best example is the development of the tall steel skyscraper in Chicago around 1890 by William Le Baron Jenney and Louis Sullivan. Early structures to employ concrete as the chief means of architectural expression (rather than for purely utilitarian structure) include Frank Lloyd Wright's Unity Temple, built in 1906 near Chicago, and Rudolf Steiner's Second Goetheanum, built from1926 near Basel, Switzerland.Other historians regard Modernism as a matter of taste, a reaction against eclecticism and the lavish stylistic excesses of Victorian Era and Edwardian Art Nouveau.Whatever the cause, around 1900 a number of architects around the world began developing new architectural solutions to integrate traditional precedents (Gothic, for instance) with new technological possibilities. The work of Louis Sullivan and Frank Lloyd Wright in Chicago, Victor Horta in Brussels, Antoni Gaudi in Barcelona, Otto Wagner in Vienna and Charles Rennie Mackintosh in Glasgow, among many others, can be seen as a common struggle between old and new.2. Modernism as Dominant StyleBy the 1920s the most important figures in Modern architecture had established their reputations. The big three are commonly recognized as Le Corbusier in France, and Ludwig Mies van der Rohe and Walter Gropius in Germany. Mies van der Rohe and Gropius were both directors of the Bauhaus, one of a number of European schools and associations concerned with reconciling craft tradition and industrial technology.Frank Lloyd Wright's career parallels and influences the work of the European modernists, particularly via the Wasmuth Portfolio, but he refused to be categorized with them. Wright was a major influence on both Gropius and van der Rohe, however, as well as on the whole of organic architecture.In 1932 came the important MOMA exhibition, the International Exhibition of Modern Architecture, curated by Philip Johnson. Johnson and collaborator Henry-Russell Hitchcock drew together many distinct threads and trends, identified them as stylistically similar and having a common purpose, and consolidated them into the International Style.This was an important turning point. With World War II the important figures of the Bauhaus fled to the United States, to Chicago, to the Harvard Graduate School of Design, and to Black Mountain College. While Modern architectural design never became a dominant style in single-dwelling residential buildings, in institutional and commercial architecture Modernism became the pre-eminent, and in the schools (for leaders of the profession) the only acceptable, design solution from about 1932 to about 1984.Architects who worked in the international style wanted to break with architectural tradition and design simple, unornamented buildings. The most commonly used materials are glass for the facade, steel for exterior support, and concrete for the floors and interior supports; floor plans were functional and logical. The style became most evident in the design of skyscrapers. Perhaps its most famous manifestations include the United Nations headquarters (Le Corbusier, Oscar Niemeyer, Sir Howard Robertson), the Seagram Building (Ludwig Mies van der Rohe), and Lever House (Skidmore, Owings, and Merrill), all in New York. A prominent residential example is the Lovell House (Richard Neutra) in Los Angeles.Detractors of the international style claim that its stark, uncompromisingly rectangular geometry is dehumanising. Le Corbusier once described buildings as "machines for living", but people are not machines and it was suggested that they do not want to live in machines. Even Philip Johnson admitted he was "bored with the box." Since the early 1980s many architects have deliberately sought to move away from rectilinear designs, towards more eclectic styles. During the middle of the century, some architects began experimenting in organic forms that they felt were more human and accessible. Mid-century modernism, or organic modernism, was very popular, due to its democratic and playful nature. Alvar Aalto and Eero Saarinen were two of the most prolific architects and designers in this movement, which has influenced contemporary modernism.Although there is debate as to when and why the decline of the modern movement occurred, criticism of Modern architecture began in the 1960s on the grounds that it was universal, sterile, elitist and lacked meaning. Its approach had become ossified in a "style" that threatened to degenerate into a set of mannerisms. Siegfried Giedion in the 1961 introduction to his evolving text, Space, Time and Architecture (first written in 1941), could begin "At the moment a certain confusion exists in contemporary architecture, as in painting; a kind of pause, even a kind of exhaustion." At the Metropolitan Museum of Art, a 1961 symposium discussed the question "Modern Architecture: Death or Metamorphosis?" In New York, the coup d'état appeared to materialize in controversy around the Pan Am Building that loomed over Grand Central Station, taking advantage of the modernist real estate concept of "air rights",[1] In criticism by Ada Louise Huxtable and Douglas Haskell it was seen to "sever" the Park Avenue streetscape and "tarnish" the reputations of its consortium of architects: Walter Gropius, Pietro Belluschi and thebuilders Emery Roth & Sons. The rise of postmodernism was attributed to disenchantment with Modern architecture. By the 1980s, postmodern architecture appeared triumphant over modernism, including the temple of the Light of the World, a futuristic design for its time Guadalajara Jalisco La Luz del Mundo Sede International; however, postmodern aesthetics lacked traction and by the mid-1990s, a neo-modern (or hypermodern) architecture had once again established international pre-eminence. As part of this revival, much of the criticism of the modernists has been revisited, refuted, and re-evaluated; and a modernistic idiom once again dominates in institutional and commercial contemporary practice, but must now compete with the revival of traditional architectural design in commercial and institutional architecture; residential design continues to be dominated by a traditional aesthetic.中⽂译⽂:现代建筑现代建筑,不被混淆与'当代建筑' , 是⼀个词给了⼀些建筑风格有类似的特点, 主要的简化形式,消除装饰等. 虽然风格的设想早在20世纪,并⼤量造就了⼀些建筑师、建筑教育家和展品,很少有现代的建筑物,建于20世纪上半叶. 第⼆次⼤战后的三⼗年, 但最终却成为主导建筑风格的机构和公司建设.1起源⼀些历史学家认为进化的现代建筑作为⼀个社会问题, 息息相关的⼯程中的现代性,从⽽影响了启蒙运动,导致社会和政治⾰命.另⼀些⼈认为现代建筑主要是靠技术和⼯程学的发展, 那就是获得新的建筑材料,如钢铁, 混凝⼟和玻璃驱车发明新的建筑技术,它作为⼯业⾰命的⼀部分. 1796年, shrewsbury查尔斯bage⾸先⽤他的'⽕'的设计, 后者则依靠铸铁及砖与⽯材地板. 这些建设⼤⼤加强了结构,使它们能够容纳更⼤的机器. 由于作为建筑材料特性知识缺乏,⼀些早期建筑失败. 直到1830年初,伊顿Hodgkinson预计推出了型钢梁, 导致⼴泛使⽤钢架建设,⼯业结构完全改变了这种窘迫的⾯貌,英国北部领导的描述, "⿊暗魔⿁作坊"的地⽅如曼彻斯特和西约克郡. ⽔晶宫由约瑟夫paxton的重⼤展览, 1851年,是⼀个早期的例⼦,钢铁及玻璃施⼯; 可能是⼀个最好的例⼦,就是1890年由William乐男爵延长和路易沙利⽂在芝加哥附近发展的⾼层钢结构摩天楼. 早期结构采⽤混凝⼟作为⾏政⼿段的建筑表达(⽽⾮纯粹功利结构) ,包括建于1906年在芝加哥附近,劳埃德赖特的统⼀宫, 建于1926年瑞⼠巴塞尔附近的鲁道夫斯坦纳的第⼆哥特堂,.但⽆论原因为何, 约有1900多位建筑师,在世界各地开始制定新的建筑⽅法,将传统的先例(⽐如哥特式)与新的技术相结合的可能性.路易沙利⽂和赖特在芝加哥⼯作,维克多奥尔塔在布鲁塞尔,安东尼⾼迪在巴塞罗那, 奥托⽡格纳和查尔斯景mackintosh格拉斯哥在维也纳,其中之⼀可以看作是⼀个新与旧的共同⽃争.2现代主义风格由1920年代的最重要⼈物,在现代建筑⾥确⽴了⾃⼰的名声. 三个是公认的柯布西耶在法国, 密斯范德尔德罗和⽡尔特格罗⽪乌斯在德国. 密斯范德尔德罗和格罗⽪乌斯为董事的包豪斯, 其中欧洲有不少学校和有关团体学习调和⼯艺和传统⼯业技术.赖特的建筑⽣涯中,也影响了欧洲建筑的现代艺术,特别是通过⽡斯穆特组合但他拒绝被归类与他们. 赖特与格罗⽪乌斯和Van der德罗对整个有机体系有重⼤的影响.在1932年来到的重要moma展览,是现代建筑艺术的国际展览,艺术家菲利普约翰逊. 约翰逊和合作者亨利-罗素阁纠集许多鲜明的线索和趋势, 内容相似,有⼀个共同的⽬的,巩固了他们融⼊国际化风格这是⼀个重要的转折点. 在⼆战的时间包豪斯的代表⼈物逃到美国,芝加哥,到哈佛⼤学设计⿊⼭书院. 当现代建筑设计从未成为主导风格单⼀的住宅楼,在成为现代卓越的体制和商业建筑, 是学校(专业领导)的唯⼀可接受的, 设计解决⽅案,从约1932年⾄约1984年.那些从事国际风格的建筑师想要打破传统建筑和简单的没有装饰的建筑物。
论文中英文翻译(译文)
编号:桂林电子科技大学信息科技学院毕业设计(论文)外文翻译(译文)系别:电子工程系专业:电子信息工程学生姓名:韦骏学号:0852100329指导教师单位:桂林电子科技大学信息科技学院姓名:梁勇职称:讲师2012 年6 月5 日设计与实现基于Modbus 协议的嵌入式Linux 系统摘要:随着嵌入式计算机技术的飞速发展,新一代工业自动化数据采集和监测系统,采用核心的高性能嵌入式微处理器的,该系统很好地适应应用程序。
它符合消费等的严格要求的功能,如可靠性,成本,尺寸和功耗等。
在工业自动化应用系统,Modbus 通信协议的工业标准,广泛应用于大规模的工业设备系统,包括DCS,可编程控制器,RTU 及智能仪表等。
为了达到嵌入式数据监测的工业自动化应用软件的需求,本文设计了嵌入式数据采集监测平台下基于Modbus 协议的Linux 环境采集系统。
串行端口的Modbus 协议是实现主/从式,其中包括两种通信模式:ASCII 和RTU。
因此,各种药膏协议的设备能够满足串行的Modbus通信。
在Modbus 协议的嵌入式平台实现稳定和可靠。
它在嵌入式数据监测自动化应用系统的新收购的前景良好。
关键词:嵌入式系统,嵌入式Linux,Modbus 协议,数据采集,监测和控制。
1、绪论Modbus 是一种通讯协议,是一种由莫迪康公司推广。
它广泛应用于工业自动化,已成为实际的工业标准。
该控制装置或不同厂家的测量仪器可以链接到一个行业监控网络使用Modbus 协议。
Modbus 通信协议可以作为大量的工业设备的通讯标准,包括PLC,DCS 系统,RTU 的,聪明的智能仪表。
随着嵌入式计算机技术的飞速发展,嵌入式数据采集监测系统,使用了高性能的嵌入式微处理器为核心,是一个重要的发展方向。
在环境鉴于嵌入式Linux 的嵌入式工业自动化应用的数据,一个Modbus 主协议下的采集监测系统的设计和实现了这个文件。
因此,通信设备,各种药膏协议能够满足串行的Modbus。
外文参考文献译文及原文
广东工业大学华立学院本科毕业设计(论文)外文参考文献译文及原文系部城建学部专业土木工程年级 2011级班级名称 11土木工程9班学号 23031109000学生姓名刘林指导教师卢集富2015 年5 月目录一、项目成本管理与控制 0二、Project Budget Monitor and Control (1)三、施工阶段承包商在控制施工成本方面所扮演的作用 (2)四、The Contractor's Role in Building Cost Reduction After Design (4)一、外文文献译文(1)项目成本管理与控制随着市场竞争的激烈性越来越大,在每一个项目中,进行成本控制越发重要。
本文论述了在施工阶段,项目经理如何成功地控制项目预算成本。
本文讨论了很多方法。
它表明,要取得成功,项目经理必须关注这些成功的方法。
1.简介调查显示,大多数项目会碰到超出预算的问……功控制预算成本。
2.项目控制和监测的概念和目的Erel and Raz (2000)指出项目控制周期包括测量成……原因以及决定纠偏措施并采取行动。
监控的目的就是纠偏措施的...标范围内。
3.建立一个有效的控制体系为了实现预算成本的目标,项目管理者需要建立一……被监测和控制是非常有帮助的。
项目成功与良好的沟通密...决( Diallo and Thuillier, 2005)。
4.成本费用的检测和控制4.1对检测的优先顺序进行排序在施工阶段,很多施工活动是基于原来的计……用完了。
第四,项目管理者应该检测高风险活动,高风险活动最有...重要(Cotterell and Hughes, 1995)。
4.2成本控制的方法一个项目的主要费用包括员工成本、材料成本以及工期延误的成本。
为了控制这些成本费用,项目管理者首先应该建立一个成本控制系统:a)为财务数据的管理和分析工作落实责任人员b)确保按照项目的结构来合理分配所有的……它的变化--在成本控制线上准确地记录所有恰...围、变更、进度、质量)相结合由于一个工程项目......虑时间价值影响后的结果。
毕业设计(论文)外文资料翻译(学生用)
毕业设计外文资料翻译学院:信息科学与工程学院专业:软件工程姓名: XXXXX学号: XXXXXXXXX外文出处: Think In Java (用外文写)附件: 1.外文资料翻译译文;2.外文原文。
附件1:外文资料翻译译文网络编程历史上的网络编程都倾向于困难、复杂,而且极易出错。
程序员必须掌握与网络有关的大量细节,有时甚至要对硬件有深刻的认识。
一般地,我们需要理解连网协议中不同的“层”(Layer)。
而且对于每个连网库,一般都包含了数量众多的函数,分别涉及信息块的连接、打包和拆包;这些块的来回运输;以及握手等等。
这是一项令人痛苦的工作。
但是,连网本身的概念并不是很难。
我们想获得位于其他地方某台机器上的信息,并把它们移到这儿;或者相反。
这与读写文件非常相似,只是文件存在于远程机器上,而且远程机器有权决定如何处理我们请求或者发送的数据。
Java最出色的一个地方就是它的“无痛苦连网”概念。
有关连网的基层细节已被尽可能地提取出去,并隐藏在JVM以及Java的本机安装系统里进行控制。
我们使用的编程模型是一个文件的模型;事实上,网络连接(一个“套接字”)已被封装到系统对象里,所以可象对其他数据流那样采用同样的方法调用。
除此以外,在我们处理另一个连网问题——同时控制多个网络连接——的时候,Java内建的多线程机制也是十分方便的。
本章将用一系列易懂的例子解释Java的连网支持。
15.1 机器的标识当然,为了分辨来自别处的一台机器,以及为了保证自己连接的是希望的那台机器,必须有一种机制能独一无二地标识出网络内的每台机器。
早期网络只解决了如何在本地网络环境中为机器提供唯一的名字。
但Java面向的是整个因特网,这要求用一种机制对来自世界各地的机器进行标识。
为达到这个目的,我们采用了IP(互联网地址)的概念。
IP以两种形式存在着:(1) 大家最熟悉的DNS(域名服务)形式。
我自己的域名是。
所以假定我在自己的域内有一台名为Opus的计算机,它的域名就可以是。
土木工程专业钢筋混凝土结构设计毕业论文外文文献翻译及原文
毕业设计(论文)外文文献翻译文献、资料中文题目:钢筋混凝土结构设计文献、资料英文题目:DESIGN OF REINFORCED CONCRETE STRUCTURES 文献、资料来源:文献、资料发表(出版)日期:院(部):专业:土木工程班级:姓名:学号:指导教师:翻译日期: 2017.02.14毕业设计(论文)外文参考资料及译文译文题目:DESIGN OF REINFORCED CONCRETE STRUCTURES原文:DESIGN OF REINFORCED CONCRETESTRUCTURES1. BASIC CONCERPTS AND CHARACERACTERISTICS OF REINFORCED CONCRETEPlain concrete is formed from hardened mixture of cement, water , fine aggregate , coarse aggregate (crushed stone or gravel ) , air and often other admixtures . The plastic mix is placed and consolidated in the formwork, then cured to accelerate of the chemical hydration of hen cement mix and results in a hardened concrete. It is generally known that concrete has high compressive strength and low resistance to tension. Its tensile strength is approximatelyone-tenth of its compressive strength. Consequently, tensile reinforcement in the tension zone has to be provided to supplement the tensile strength of the reinforced concrete section.For example, a plain concrete beam under a uniformly distributed load q is shown in Fig .1.1(a), when the distributed load increases and reaches a value q=1.37KN/m , the tensile region at the mid-span will be cracked and the beam will fail suddenly . A reinforced concrete beam if the same size but has to steel reinforcing bars (2φ16) embedded at the bottom under a uniformly distributed load q is shown in Fig.1.1(b). The reinforcing bars take up the tension there after the concrete is cracked. When the load q is increased, the width of the cracks, the deflection and thestress of steel bars will increase . When the steel approaches the yielding stress ƒy , thedeflection and the cracked width are so large offering some warning that the compression zone . The failure load q=9.31KN/m, is approximately 6.8 times that for the plain concrete beam.Concrete and reinforcement can work together because there is a sufficiently strong bond between the two materials, there are no relative movements of the bars and the surrounding concrete cracking. The thermal expansion coefficients of the two materials are 1.2×10-5K-1 for steel and 1.0×10-5~1.5×10-5K-1 for concrete .Generally speaking, reinforced structure possess following features :Durability .With the reinforcing steel protected by the concrete , reinforced concreteFig.1.1Plain concrete beam and reinforced concrete beamIs perhaps one of the most durable materials for construction .It does not rot rust , and is not vulnerable to efflorescence .(2)Fire resistance .Both concrete an steel are not inflammable materials .They would not be affected by fire below the temperature of 200℃when there is a moderate amount of concrete cover giving sufficient thermal insulation to the embedded reinforcement bars.(3)High stiffness .Most reinforced concrete structures have comparatively large cross sections .As concrete has high modulus of elasticity, reinforced concrete structures are usuallystiffer than structures of other materials, thus they are less prone to large deformations, This property also makes the reinforced concrete less adaptable to situations requiring certainflexibility, such as high-rise buildings under seismic load, and particular provisions have to be made if reinforced concrete is used.(b)Reinfoced concrete beam(4)Locally available resources. It is always possible to make use of the local resources of labour and materials such as fine and coarse aggregates. Only cement and reinforcement need to be brought in from outside provinces.(5)Cost effective. Comparing with steel structures, reinforced concrete structures are cheaper.(6)Large dead mass, The density of reinforced concrete may reach2400~2500kg/pare with structures of other materials, reinforced concrete structures generally have a heavy dead mass. However, this may be not always disadvantageous, particularly for those structures which rely on heavy dead weight to maintain stability, such as gravity dam and other retaining structure. The development and use of light weight aggregate have to a certain extent make concrete structure lighter.(7)Long curing period.. It normally takes a curing period of 28 day under specified conditions for concrete to acquire its full nominal strength. This makes the progress of reinforced concrete structure construction subject to seasonal climate. The development of factory prefabricated members and investment in metal formwork also reduce the consumption of timber formwork materials.(8)Easily cracked. Concrete is weak in tension and is easily cracked in the tension zone. Reinforcing bars are provided not to prevent the concrete from cracking but to take up the tensile force. So most of the reinforced concrete structure in service is behaving in a cracked state. This is an inherent is subjected to a compressive force before working load is applied. Thus the compressed concrete can take up some tension from the load.2. HISTOEICAL DEVELPPMENT OF CONCRETE STRUCTUREAlthough concrete and its cementitious(volcanic) constituents, such as pozzolanic ash, have been used since the days of Greek, the Romans, and possibly earlier ancient civilization, the use of reinforced concrete for construction purpose is a relatively recent event, In 1801, F. Concrete published his statement of principles of construction, recognizing the weakness if concrete in tension, The beginning of reinforced concrete is generally attributed to Frenchman J. L. Lambot, who in 1850 constructed, for the first time, a small boat with concrete for exhibition in the 1855 World’s Fair in Paris. In England, W. B. Wilkinson registered a patent for reinforced concrete l=floor slab in 1854.J.Monier, a French gardener used metal frames as reinforcement to make garden plant containers in 1867. Before 1870, Monier had taken a series of patents to make reinforcedconcrete pipes, slabs, and arches. But Monier had no knowledge of the working principle of this new material, he placed the reinforcement at the mid-depth of his wares. Then little construction was done in reinforced concrete. It is until 1887, when the German engineers Wayss and Bauschinger proposed to place the reinforcement in the tension zone, the use of reinforced concrete as a material of construction began to spread rapidly. In1906, C. A. P. Turner developed the first flat slab without beams.Before the early twenties of 20th century, reinforced concrete went through the initial stage of its development, Considerable progress occurred in the field such that by 1910 the German Committee for Reinforced Concrete, the Austrian Concrete Committee, the American Concrete Institute, and the British Concrete Institute were established. Various structural elements, such as beams, slabs, columns, frames, arches, footings, etc. were developed using this material. However, the strength of concrete and that of reinforcing bars were still very low. The common strength of concrete at the beginning of 20th century was about 15MPa in compression, and the tensile strength of steel bars was about 200MPa. The elements were designed along the allowable stresses which was an extension of the principles in strength of materials.By the late twenties, reinforced concrete entered a new stage of development. Many buildings, bridges, liquid containers, thin shells and prefabricated members of reinforced concrete were concrete were constructed by 1920. The era of linear and circular prestressing began.. Reinforced concrete, because of its low cost and easy availability, has become the staple material of construction all over the world. Up to now, the quality of concrete has been greatly improved and the range of its utility has been expanded. The design approach has also been innovative to giving the new role for reinforced concrete is to play in the world of construction.The concrete commonly used today has a compressive strength of 20~40MPa. For concrete used in pre-stressed concrete the compressive strength may be as high as 60~80MPa. The reinforcing bars commonly used today has a tensile strength of 400MPa, and the ultimate tensile strength of prestressing wire may reach 1570~1860Pa. The development of high strength concrete makes it possible for reinforced concrete to be used in high-rise buildings, off-shore structures, pressure vessels, etc. In order to reduce the dead weight of concrete structures, various kinds of light concrete have been developed with a density of 1400~1800kg/m3. With a compressive strength of 50MPa, light weight concrete may be used in load bearing structures. One of the best examples is the gymnasium of the University of Illinois which has a span of 122m and is constructed of concrete with a density of 1700kg/m3. Another example is the two 20-story apartment houses at the Xi-Bian-Men in Beijing. The walls of these two buildings are light weight concrete with a density of 1800kg/m3.The tallest reinforced concrete building in the world today is the 76-story Water Tower Building in Chicago with a height of 262m. The tallest reinforced concrete building in China today is the 63-story International Trade Center in GuangZhou with a height a height of 200m. The tallest reinforced concrete construction in the world is the 549m high International Television Tower in Toronto, Canada. He prestressed concrete T-section simply supported beam bridge over the Yellow River in Luoyang has 67 spans and the standard span length is 50m.In the design of reinforced concrete structures, limit state design concept has replaced the old allowable stresses principle. Reliability analysis based on the probability theory has very recently been introduced putting the limit state design on a sound theoretical foundation. Elastic-plastic analysis of continuous beams is established and is accepted in most of the design codes. Finite element analysis is extensively used in the design of reinforced concrete structures and non-linear behavior of concrete is taken into consideration. Recent earthquake disasters prompted the research in the seismic resistant reinforced of concrete structures. Significant results have been accumulated.3. SPECIAL FEATURES OF THE COURSEReinforced concrete is a widely used material for construction. Hence, graduates of every civil engineering program must have, as a minimum requirement, a basic understanding of the fundamentals of reinforced concrete.The course of Reinforced Concrete Design requires the prerequisite of Engineering Mechanics, Strength of Materials, and some if not all, of Theory of Structures, In all these courses, with the exception of Strength of Materials to some extent, a structure is treated of in the abstract. For instance, in the theory of rigid frame analysis, all members have an abstract EI/l value, regardless of what the act value may be. But the theory of reinforced concrete is different, it deals with specific materials, concrete and steel. The values of most parameters must be determined by experiments and can no more be regarded as some abstract. Additionally, due to the low tensile strength of concrete, the reinforced concrete members usually work with cracks, some of the parameters such as the elastic modulus I of concrete and the inertia I of section are variable with the loads.The theory of reinforced concrete is relatively young. Although great progress has been made, the theory is still empirical in nature in stead of rational. Many formulas can not be derived from a few propositions, and may cause some difficulties for students. Besides, due to the difference in practice in different countries, most countries base their design methods on their own experience and experimental results. Consequently, what one learns in one country may be different in another country. Besides, the theory is still in a stage of rapid。
华南理工大学 毕业设计 外文翻译
华南理工大学本科毕业设计(论文)翻译班级土木工程三班姓名王剑锋学号 200930132042指导教师骆冠勇填表日期 2013年4月21日中文译名一种用于预测拉森钢板桩弯曲强度的数值模型外文原文名 A numerical model for predicting the bending strength of Larssen steel sheetpiles外文原文版出处Journal of Constructional Steel Research 58 (2002) 1361–1374译文:一种用于预测拉森钢板桩弯曲强度的数值模型R.J. Crawford, M.P. Byfield摘要拉森桩为U形横截面并通过可滑动的接头连接在一起组成码头岸壁,围堰,和其他类型的挡土墙。
由于滑动接头位于桩墙的中心线上,相互连接桩的桩间滑移可能导致桩墙70%的弯曲强度折减。
这种桩间滑移可以通过安装成对的带有卷曲的锁头的桩来部分阻止。
然而,像非卷曲桩一样弯曲强度很难被预测,因为这种联锁桩依然存在桩间滑移。
本文提出了一种用于预测联锁拉森桩弯曲应力以及压应力的数值方法。
通过测试1:6比例大小的铝制拉森桩微缩模型的数据与数值模型计算结果进行比较,结果表明数值模型所预测的应力与实际实验结果接近一致。
同时本数值模型也可用于钢板桩的设计生产,以达到使用最少的材料来达到最大的弯曲强度的目的。
C 2002爱思唯尔股份有限公司保留解释权利关键词:行业规范;组合结构;拉森桩;桩结构;挡土墙;钢结构1.介绍钢板桩被广泛运用于全世界。
工程上经常使用的两种钢板桩是U型拉森钢板桩和Z型钢板桩。
两种类型的钢板桩桩都是利用沿着构件长度方向的锁头连接成有缝的连续墙结构。
根据欧洲标准化委员会引入的欧3标准第五部分,U型钢板桩锁头连接部分的下滑位移的影响不能忽视(见图1 步骤1)。
如果钢板桩单肢的相对滑移严重,则钢板桩的弯曲强度会下降到整体强度的70%,我们将其称为钢板桩模量下降。
毕业设计论文翻译(译文+原文)
Hacking tricks toward security on network environments Tzer-Shyong Chen1, Fuh-Gwo Jeng 2, and Yu-Chia Liu 11 Department of Information Management, Tunghai University, Taiwan2 Department of Applied Mathematics, National Chiayi University, TaiwanE-Mail:****************.edu.twAbstractMounting popularity of the Internet has led to the birth of Instant Messaging, an up-and-coming form of Internet communication. Instant Messaging is very popular with businesses and individuals since it has instant communication ability. As a result, Internet security has become a pressing and important topic for discussion. Therefore, in recent years, a lot of attention has been drawn towards Internet security and the various attacks carried out by hackers over the Internet. People today often handle affairs via the Internet. For instance, instead of the conventional letter, they communicate with others by e-mails; they chat with friends through an instant messenger; find information by browsing websites instead of going to the library; perform e-commerce transactions through the Internet, etc. Although the convenience of the Internet makes our life easier, it is also a threat to Internet security. For instance, a business email intercepted during its transmission may let slip business confidentiality; file transfers via instant messengers may also be intercepted, and then implanted with backdoor malwares; conversations via instant messengers could be eavesdropped. Furthermore, ID and password theft may lose us money when using Internet bank service. Attackers on the Internet use hacking tricks to damage systems while users are connected to the Internet. These threats along with possible careless disclosure of business information make Instant Messaging a very unsafe method of communication for businesses. The paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing or fraud via e-mails. (3) Fake Websites. Keywords:Hacking tricks, Trojan programs, Phishing, Firewall, Intrusion detection system.1. IntroductionIncreasingly more people are using instant messengers such as MSN Messenger, Yahoo! Messenger, ICQ, etc as the media of communication. These instant messengers transmit alphanumeric message as well as permit file sharing. During transfer, a file may be intercepted by a hacker and implanted with backdoor malware. Moreover, the e-mails users receive every day may include Spam, advertisements, and fraudulent mail intended to trick uninformed users. Fake websites too are prevalent. Websites which we often visit could be counterfeited by imitating the interface and the URL of the original, tricking users. The paper classifies hacking tricks into three categories which are explained in the following sections.2. Hacking TricksThe paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing (3) Fake Websites.2.1 Trojan programs that share files via instant messengerInstant messaging allows file-sharing on a computer [9]. All present popular instant messengers have file sharing abilities, or allow users to have the above functionality by installing patches or plug-ins; this is also a major threat to present information security. These communication softwares also makeit difficult for existing hack prevention methods to prevent and control information security. Therefore, we shall discuss how to control the flow of instant messages and how to identify dangerous user behavior.Hackers use instant communication capability to plant Trojan program into an unsuspected program; the planted program is a kind of remotely controlled hacking tool that can conceal itself and is unauthorized. The Trojan program is unknowingly executed, controlling the infected computer; it can read, delete, move and execute any file on the computer. The advantages of a hacker replacing remotely installed backdoor Trojan programs [1] with instant messengers to access files are:When the victim gets online, the hacker will be informed. Thus, a hacker can track and access the infected computer, and incessantly steal user information.A hacker need not open a new port to perform transmissions; he can perform his operations through the already opened instant messenger port.Even if a computer uses dynamic IP addresses, its screen name doesn’t change.Certain Trojan programs are designed especially for instant messengers. These Trojans can change group settings and share all files on the hard disk of the infected computer. They can also destroy or modify data, causing data disarray. This kind of program allows a hacker access to all files on an infected computer, and thus poses a great threat to users. The Trojan program takes up a large amount of the resources of the computer causing it to become very slow and often crashes without a reason.Trojan programs that access a user computer through an instant messenger are probably harder to detect than classic Trojan horse programs. Although classic Trojan intrudes a computer by opening a listening or outgoing port which is used to connect toa remote computer, a desktop firewall can effectively block such Trojans. Alternatively, since it is very difficult for the server’s firewall to spot intrusion by controlling an instant messenger’s flow, it is extremely susceptible to intrusion.Present Trojan programs have already successfully implemented instant messengers. Some Trojan programs are Backdoor Trojan, AIMVision, and Backdoor. Sparta.C. Backdoor Trojans use ICQ pager to send messages to its writer. AIMVision steals AIM related information stored in the Windows registry, enabling a hacker to setup an AIM user id. Backdoor. Sparta.C uses ICQ to communicate with its writer and opens a port on an infected host and send its IP Address to the hacker, and at the same time attempts to terminate the antivirus program or firewall of the host.2.1.1 Hijacking and ImpersonationThere are various ways through which a hacker can impersonate other users [7]. The most commonly used method is eavesdropping on unsuspecting users to retrieve user accounts, passwords and other user related information.The theft of user account number and related information is a very serious problem in any instant messenger. For instance, a hacker after stealing a user’s information impersonate the user; the user’s contacts not knowing that the user’s account has been hacked believe that the person they’re talking to is the user, and are persuaded to execute certain programs or reveal confidential information. Hence, theft of user identity not only endangers a user but also surrounding users. Guarding against Internet security problems is presently the focus of future research; because without good protection, a computer can be easily attacked, causing major losses.Hackers wishing to obtain user accounts may do so with the help of Trojans designed to steal passwords. If an instant messenger client stores his/her password on his/her computer, then a hacker can send a Trojan program to the unsuspecting user. When the user executes the program, the program shall search for the user’s password and send it to the hacker. There are several ways through which a Trojan program can send messages back to the hacker. The methods include instant messenger, IRC, e-mails, etc.Current four most popular instant messengers are AIM, Yahoo! Messenger, ICQ, and MSN Messenger, none of which encrypts its flow. Therefore, a hackercan use a man-in-the-middle attack to hijack a connection, then impersonate the hijacked user and participate in a chat-session. Although difficult, a hacker can use the man-in-the-middle attack to hijack the connection entirely. For example, a user may receive an offline message that resembles that sent by the server, but this message could have been sent by the hacker. All at once, the user could also get disconnected to the server. Furthermore, hackers may also use a Denial of Service (DoS) tool or other unrelated exploits to break the user’s connection. However, the server keeps the connection open, and does not know that the user has been disconnected; thus allowing the hacker to impersonate the user. Moreover, since the data flow is unencrypted and unauthenticated, a hacker can use man-in-the-middle attacks that are similar to that of ARP fraud to achieve its purpose.2.1.2 Denial of Service (DoS)There are many ways through which a hacker can launch a denial of service (DoS) attack [2] on an instant messenger user. A Partial DoS attack will cause a user end to hang, or use up a large portion of CPU resources causing the system to become unstable.Another commonly seen attack is the flooding of messages to a particular user. Most instant messengers allow the blocking of a particular user to prevent flood attacks. However, a hacker can use tools that allow him to log in using several different identities at the same time, or automatically create a large number of new user ids, thus enabling a flood attack. Once a flood attack begins, even if the user realizes that his/her computer has been infected, the computer will not be able to respond. Thus, the problem cannot be solved by putting a hacker’s user id on the ignore list of your instant messenger.A DoS attack on an instant messenger client is only a common hacking tool. The difficulty of taking precautions against it could turn this hacking tool into dangerous DoS type attacks. Moreover, some hacking tools do not just cause an instant messenger client to hang, but also cause the user end to consume large amount of CPU time, causing the computer to crash.2.1.3 Information DisclosureRetrieving system information through instant messenger users is currently the most commonly used hacking tool [4]. It can effortlessly collect user network information like, current IP, port, etc. IP address retriever is an example. IP address retrievers can be used to many purposes; for instance, a Trojan when integrated with an IP address retriever allows a hacker to receive all information related to the infected computer’s IP address as soon as the infected computer connects to the internet. Therefore, even if the user uses a dynamic IP address, hackers can still retrieve the IP address.IP address retrievers and other similar tools can also be used by hackers to send data and Trojans to unsuspecting users. Hackers may also persuade unsuspecting users to execute files through social engineering or other unrelated exploits. These files when executed search for information on the user’s computer and sends them back to the hacker through the instant messenger network.Different Trojan programs were designed for different instant messaging clients. For example, with a user accounts and password stealing Trojans a hacker can have full control of the account once the user logs out. The hacker can thus perform various tasks like changing the password and sending the Trojan program to all of the user’s contacts.Moreover, Trojans is not the only way through which a hacker can cause information disclosure. Since data sent through instant messengers are unencrypted, hackers can sniff and monitor entire instant messaging transmissions. Suppose an employee of an enterprise sends confidential information of the enterprise through the instant messenger; a hacker monitoring the instant messaging session can retrieve the data sent by the enterprise employee. Thus, we must face up to the severity of the problem.2.2 PhishingThe word “Phishing” first appeared in 1996. It is a variant of ‘fishing’, and formed by replacing the ‘f’ in ‘fishing’ with ‘ph’ from phone. It means tricking users of their money through e-mails.Based on the statistics of the Internet Crime Complaint Center, loss due to internet scam was as high as $1.256 million USD in 2004. The Internet Crime Complaint Center has listed the above Nigerian internet scam as one of the ten major internet scams.Based on the latest report of Anti-Phishing Working Group (APWG) [8], there has been a 28% growth of Phishing scams in the past 4 months, mostly in the US and in Asia. Through social engineering and Trojans, it is very difficult for a common user to detect the infection.To avoid exploitation of your compassion, the following should be noted:(1)When you need to enter confidentialinformation, first make sure that theinformation is entered via an entirely secureand official webpage. There are two ways todetermine the security of the webpage:a.The address displayed on the browserbegins with https://, and not http://. Payattention to if the letter ‘s’ exists.b.There is a security lock sign on the lowerright corner of the webpage, and whenyour mouse points to the sign, a securitycertification sign shall appear.(2)Consider installing a browser security softwarelike SpoofStick which can detect fake websites.(3)If you suspect the received e-mail is a Phishinge-mail, do not open attachments attached to theemail. Opening an unknown attachment couldinstall malicious programs onto your computer.(4)Do not click on links attached to your emails. Itis always safer to visit the website through theofficial link or to first confirm the authenticityof the link. Never follow or click on suspiciouslinks in an e-mail. It is advisable to enter theURL at the address bar of the web browser,and not follow the given link.Generally speaking, Phishing [3] [5] is a method that exploits people’s sympathy in the form of aid-seeking e-mails; the e-mail act as bait. These e-mails usually request their readers to visit a link that seemingly links to some charitable organization’s website; but in truth links the readers to a website that will install a Trojan program into the reader’s computer. Therefore, users should not forward unauthenticated charity mails, or click on unfamiliar links in an e-mail. Sometimes, the link could be a very familiar link or an often frequented website, but still, it would be safer if you’d type in the address yourself so as to avoid being linked to a fraudulent website. Phisher deludes people by using similar e-mails mailed by well-known enterprises or banks; these e-mails often asks users to provide personal information, or result in losing their personal rights; they usually contain a counterfeit URL which links to a website where the users can fillin the required information. People are often trapped by phishing due to inattentionBesides, you must also be careful when using a search engine to search for donations and charitable organizations.2.3 Fake WebsitesFake bank websites stealing account numbers and passwords have become increasingly common with the growth of online financial transactions. Hence, when using online banking, we should take precautions like using a secure encrypted customer’s certificate, surf the net following the correct procedure, etc.There are countless kinds of phishing baits, for instance, messages that say data expired, data invalid, please update data, or identity verification intended to steal account ID and matching password. This typeof online scam is difficult for users to identify. As scam methods become finer, e-mails and forged websites created by the impostor resemble their original, and tremendous losses arise from the illegal transactions.The following are methods commonly used by fake websites. First, the scammers create a similar website homepage; then they send out e-mails withenticing messages to attract visitors. They may also use fake links to link internet surfers to their website. Next, the fake website tricks the visitors into entering their personal information, credit card information or online banking account number and passwords. After obtaining a user’s information, the scammers can use the information to drain the bank accounts, shop online or create fake credit cards and other similar crimes. Usually, there will be a quick search option on these fake websites, luring users to enter their account number and password. When a user enters their account number and password, the website will respond with a message stating that the server is under maintenance. Hence, we must observe the following when using online banking:(1)Observe the correct procedure for entering abanking website. Do not use links resultingfrom searches or links on other websites.(2)Online banking certifications are currently themost effective security safeguard measure. (3)Do not easily trust e-mails, phone calls, andshort messages, etc. that asks for your accountnumber and passwords.Phishers often impost a well-known enterprise while sending their e-mails, by changing the sender’s e-mail address to that of the well known enterprise, in order to gain people’s trust. The ‘From’ column of an e-mail is set by the mail software and can be easily changed by the web administrator. Then, the Phisher creates a fake information input website, and send out e-mails containing a link to this fake website to lure e-mail recipients into visiting his fake website.Most Phishers create imitations of well known enterprises websites to lure users into using their fake websites. Even so, a user can easily notice that the URL of the website they’re entering has no relation to the intended enterprise. Hence, Phishers may use different methods to impersonate enterprises and other people. A commonly used method is hiding the URL. This can easily be done with the help of JavaScript.Another way is to exploit the loopholes in an internet browser, for instance, displaying a fake URL in the browser’s address bar. The security loophole causing the address bar of a browser to display a fake URL is a commonly used trick and has often been used in the past. For example, an e-mail in HTML format may hold the URL of a website of a well-known enterprise, but in reality, the link connects to a fake website.The key to successfully use a URL similar to that of the intended website is to trick the visual senses. For example, the sender’s address could be disguised as that of Nikkei BP, and the link set to http://www.nikeibp.co.jp/ which has one k less than the correct URL which is http://www.nikkeibp.co.jp/. The two URLs look very similar, and the difference barely noticeable. Hence people are easily tricked into clicking the link.Besides the above, there are many more scams that exploit the trickery of visual senses. Therefore, you should not easily trust the given sender’s name and a website’s appearance. Never click on unfamiliar and suspicious URLs on a webpage. Also, never enter personal information into a website without careful scrutiny.3. ConclusionsBusiness strategy is the most effective form of defense and also the easiest to carry out. Therefore, they should be the first line of defense, and not last. First, determine if instant messaging is essential in the business; then weigh its pros and cons. Rules and norms must be set on user ends if it is decided that the business cannot do without instant messaging functionality. The end server should be able to support functions like centralized logging and encryption. If not, then strict rules must be drawn, and carried out by the users. Especially, business discussions must not be done over an instant messenger.The paper categorized hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing (3) Fake Websites. Hacking tricks when successfully carried out could cause considerable loss and damage to users. The first category of hacking tricks can be divided into three types: (1) Hijacking and Impersonation; (2) Denial of Service; (3) Information Disclosure.Acknowledgement:This work was supported by the National Science Council, Taiwan, under contract No. NSC 95-2221-E-029-024.References[1] B. Schneier, “The trojan horse race,”Communications of ACM, Vol. 42, 1999, pp.128.[2] C. L. Schuba, “Analysis of a denial of serviceattack on TCP,” IEEE Security and PrivacyConference, 1997, pp. 208-223.[3] E. Schultz, “Phishing is becoming moresophisticated,” Computer and Security, Vol.24(3), 2005, pp. 184-185.[4]G. Miklau, D. Suciu, “A formal analysis ofinformation disclosure in data exchange,”International Conference on Management ofData, 2004, pp. 575-586.[5]J. Hoyle, “'Phishing' for trouble,” Journal ofthe American Detal Association, Vol. 134(9),2003, pp. 1182-1182.[6]J. Scambray, S. McClure, G. Kurtz, Hackingexposed: network security secrets and solutions,McGraw-Hill, 2001.[7]T. Tsuji and A. Shimizu, “An impersonationattack on one-time password authenticationprotocol OSPA,” to appear in IEICE Trans.Commun, Vol. E86-B, No.7, 2003.[8]Anti-Phishing Working Group,.[9]/region/tw/enterprise/article/icq_threat.html.有关网络环境安全的黑客技术摘要:现在人们往往通过互联网处理事务。
毕业设计(论文)外文翻译
华南理工大学广州学院本科生毕业设计(论文)翻译外文原文名Agency Cost under the Restriction of Free Cash Flow中文译名自由现金流量的限制下的代理成本学院管理学院专业班级会计学3班学生姓名陈洁玉学生学号200930191100指导教师余勍讲师填写日期2015年5月11日外文原文版出处:译文成绩:指导教师(导师组长)签名:译文:自由现金流量的限制下的代理成本摘要代理成本理论是资本结构理论的一个重要分支。
自由现金流代理成本有显着的影响。
在这两个领域相结合的研究,将有助于建立和扩大理论体系。
代理成本理论基础上,本研究首先分类自由现金流以及统计方法的特点。
此外,投资自由现金流代理成本的存在证明了模型。
自由现金流代理成本理论引入限制,分析表明,它会改变代理成本,进而将影响代理成本和资本结构之间的关系,最后,都会影响到最优资本结构点,以保持平衡。
具体地说,自由现金流增加,相应地,债务比例会降低。
关键词:资本结构,现金流,代理成本,非金钱利益1、介绍代理成本理论,金融契约理论,信号模型和新的啄食顺序理论,新的资本结构理论的主要分支。
财务con-道的理论侧重于限制股东的合同行为,解决股东和债权人之间的冲突。
信令模式和新的啄食顺序理论中心解决投资者和管理者之间的冲突。
这两种类型的冲突是在商业组织中的主要冲突。
代理成本理论认为,如何达到平衡这两种类型的冲突,资本结构是如何形成的,这是比前两次在一定程度上更多的理论更全面。
……Agency Cost under the Restriction of Free Cash FlowAbstractAgency cost theory is an important branch of capital structural theory. Free cash flow has significant impact on agency cost. The combination of research on these two fields would help to build and extend the theoretical system. Based on agency cost theory, the present study firstly categorized the characteristics of free cash flow as well as the statistical methodologies. Furthermore, the existence of investing free cash flow in agency cost was proved by a model. Then free cash flow was introduced into agency cost theory as restriction, the analysis shows that it will change agency cost, in turn, will have an impact on the relationship between agency cost and capital structure, finally, will influence the optimal capital structure point to maintain the equilibrium. Concretely, with the increasing free cash flow, correspondingly, debt proportion will decrease.Keywords:Capital Structure,Free Cash Flow,Agency Cost,Non-Pecuniary Benefit1. IntroductionAgency cost theory, financial contract theory, signaling model and new pecking order theory are the main branches of new capital structure theory. Financial con-tract theory focuses on restricting stockholders’ behavior by contract and solving the conflict between stockholders and creditors. Signaling model and new pecking order theory center on solving the conflict between investors and managers. These two types of conflict are the main conflict in business organizations. Agency cost theory considers how equilibrium is reached in both types of conflict and how capital structure is formed, which is more theory is more comprehensive than the previous two to some degree.……。
毕业论文--成本控制(cost--control)外文原文及译文【范本模板】
本科生毕业设计(论文)外文原文及译文所在系管理系学生姓名专业财务管理班级学号指导教师2014 年 6 月外文原文及译文Cost ControlRoger J. AbiNaderReference for Business,Encyclopedia of Business, 2nd ed。
Cost control,also known as cost management or cost containment,is a broad set of cost accounting methods and management techniques with the common goal of improving business cost-efficiency by reducing costs, or at least restricting their rate of growth. Businesses use cost control methods to monitor, evaluate, and ultimately enhance the efficiency of specific areas,such as departments,divisions, or product lines, within their operations.Cooper and Kaplan in 1987 in an article entitled "how cost accounting systematically distorts product costs” article for the first time put forward the theory of "cost drivers" (cost driver, cost of driving factor)of that cost, in essence,is a function of a variety of independent or interaction of factors (independent variable) work together to drive the results. So what exactly is what factors drive the cost or the cost of motive which? Traditionally, the volume of business (such as yield)as the only cost driver (independent variable),at least that its cost allocation plays a decisive role in restricting aside,regardless of other factors (motivation). In accordance with the full cost of this cost driver, the enterprise is divided into variable costs and fixed costs of the two categories。
山东建筑大学毕业设计(或毕业论文,二选一)外文文献及译文附件3
附件3:(本科毕业论文)文献、资料题目:院 (部)专 班 姓 名: 张三学 号: 2001888888指导教师: 张九光翻译日期: 2005.6.30山东建筑大学毕业设计(或毕业论文,二选一)外文文献及译文three years ,the National Institute of Standards and Technology (NIST) has been working to develop a new encryption standard to keep government information secure .The organization is in the final stages of an open process of selecting one or more algorithms ,or data-scrambling formulas ,for the new Advanced Encryption Standard (AES) and plans to make adecision by late summer or early fall .The standard is slated to go into effect next year .AES is intended to be a stronger ,more efficient successor to Triple Data Encryption Standard (3DES),which replaced the aging DES ,which was cracked in less than three days in July 1998.“Until we have the AES ,3DES will still offer protection for years to come .So there is no need to immediately switch over ,”says Edward Roback , acting chief of the computer security division at NIST and chairman of the AES selection committee .“What AES will offer is a more efficient algorithm .It will be a federal standard ,but it will be widely implemented in the IT community .”According to Roback ,efficiency of the proposed algorithms is measured by how fast they can encrypt and decrypt information ,how fast they can present an encryption key and how much information they can encrypt .The AES review committee is also looking at how much space the algorithm takes up on a chip and how much memory it requires .Roback says the selection of a more efficient AES will also result in cost savings and better use of resources .“DES was designed for hardware implementations ,and we are now living in a world of much more efficient software ,and we have learned an awful lot about the design of algorithms ,”says Roback .“When you start multiplying this with the billions of impl ementations done daily ,the saving on overhead on the networks will be enormous .”……山东建筑大学毕业设计(或毕业论文,二选一)外文文献及译文- 2 -以确保政府的信息安全。
机械设计制造及其自动化毕业论文中英文资料外文翻译
机械设计创造及其自动化毕业论文外文文献翻译INTEGRATION OF MACHINERY译文题目专业机械设计创造及其自动化外文资料翻译INTEGRATION OF MACHINERY(From ELECTRICAL AND MACHINERY INDUSTRY)ABSTRACTMachinery was the modern science and technology development inevitable result, this article has summarized the integration of machinery technology basic outline and the development background .Summarized the domestic and foreign integration of machinery technology present situation, has analyzed the integration of machinery technology trend of development.Key word: integration of machinery ,technology, present situation ,product t,echnique of manufacture ,trend of development0. Introduction modern science and technology unceasing development, impelled different discipline intersecting enormously with the seepage, has caused the project domain technological revolution and the transformation .In mechanical engineering domain, because the microelectronic technology and the computer technology rapid development and forms to the mechanical industry seepage the integration of machinery, caused the mechanical industry the technical structure, the product organization, the function and the constitution, the production method and the management systemof by machinery for the characteristic integration ofdevelopment phase.1. Integration of machinery outline integration of machinery is refers in the organization new owner function, the power function, in the information processing function and the control function introduces the electronic technology, unifies the system the mechanism and the computerization design and the software which constitutes always to call. The integration of machinery development also has become one to have until now own system new discipline, not only develops along with the science and technology, but also entrusts with the new content .But its basic characteristic may summarize is: The integration of machinery is embarks from the system viewpoint, synthesis community technologies and so on utilization mechanical technology, microelectronic technology, automatic control technology, computer technology, information technology, sensing observation and control technology, electric power electronic technology, connection technology, information conversion technology as well as software programming technology, according to the system function goal and the optimized organization goal, reasonable disposition and the layout various functions unit, in multi-purpose, high grade, redundant reliable, in the low energy consumption significance realize the specific function value, and causes the overall system optimization the systems engineering technology .From this produces functional system, then becomes an integration of machinery systematic or the integration of machinery product. Therefore, of coveringtechnology is based on the above community technology organic fusion one kind of comprehensive technology, but is not mechanical technical, the microelectronic technology as well as other new technical simple combination, pieces together .This is the integration of machinery and the machinery adds the machinery electrification which the electricity forms in the concept basic difference .The mechanical engineering technology has the merely technical to develop the machinery electrification, still was the traditional machinery, its main function still was replaces with the enlargement physical strength .But after develops the integration of machinery, micro electron installment besides may substitute for certain mechanical parts the original function, but also can entrust with many new functions,like the automatic detection, the automatic reduction information, demonstrate the record, the automatic control and the control automatic diagnosis and the protection automatically and so on .Not only namely the integration of machinery product is human's hand and body extending, human's sense organ and the brains look, has the intellectualized characteristic is the integration of machinery and the machinery electrification distinguishes in the function essence.2. Integration of machinery development condition integration of machinery development may divide into 3 stages roughly.20th century 60's before for the first stage, this stage is called the initial stage .In this time, the people determination not on own initiative uses the electronic technology the preliminary achievement to consummate the mechanical product the performance .Specially in Second World War period, the war has stimulated the mechanical product and the electronic technology union, these mechanical and electrical union military technology, postwar transfers civilly, to postwar economical restoration positive function .Developed and the development at that time generally speaking also is at the spontaneouscondition .Because at that time the electronic technology development not yet achieved certain level, mechanical technical and electronic technology union also not impossible widespread and thorough development, already developed the product was also unable to promote massively. The 20th century 70~80 ages for the second stage, may be called the vigorous development stage .This time, the computer technology, the control technology, the communication development, has laid the technology base for the integration of machinery development . Large-scale, ultra large scale integrated circuit and microcomputer swift and violent development, has provided the full material base for the integration of machinery development .This time characteristic is :①A mechatronics word first generally is accepted in Japan, probably obtains the quite widespread acknowledgment to 1980s last stages in the worldwide scale ;②The integration of machinery technology and the product obtained the enormous development ;③The various countries start to the integration of machinery technology and the product give the very big attention and the support. 1990s later periods, started the integration of machinery technology the new stagewhich makes great strides forward to the intellectualized direction, the integration of machinery enters the thorough development time .At the same time, optics, the communication and so on entered the integration of machinery, processes the technology also zhan to appear tiny in the integration of machinery the foot, appeared the light integration of machinery and the micro integration of machinery and so on the new branch; On the other hand to the integration of machinery system modeling design, the analysis and the integrated method, the integration of machinery discipline system and the trend of development has all conducted the thorough research .At the same time, because the hugeprogress which domains and so on artificial intelligence technology, neural network technology and optical fiber technology obtain, opened the development vast world for the integration of machinery technology .These research, will urge the integration of machinery further to establish the integrity the foundation and forms the integrity gradually the scientific system. Our country is only then starts from the beginning of 1980s in this aspect to study with the application .The State Councilsummary had considered fully on international the influence which and possibly brought from this about the integration of machinery technology developmenttrend .Many universities, colleges and institutes, the development facility and some large and middle scale enterprises have done the massive work to this technical development and the application, does not yield certain result, but and so on the advanced countries compared with Japan still has the suitable disparity.3. Integration of machinery trend of development integrations of machinery are the collection machinery, the electron, optics, the control, the computer, the information and so on the multi-disciplinary overlapping syntheses, its development and the progress rely on and promote the correlation technology development and the progress .Therefore, the integration of machinery main development direction is as follows:3.1 Intellectualized intellectualizations are 21st century integration of machinery technological development important development directions .Theartificial intelligence obtains day by day in the integration of machinery constructor's research takes, the robot and the numerical control engine bedis to the machine behavior description, is in the control theory foundation, the absorption artificial intelligence, the operations research, the computer science, the fuzzy mathematics, the psychology, the physiology and the chaos dynamics and so on the new thought, the new method, simulate the human intelligence, enable it to have abilities and so on judgment inference, logical thinking, independent decision-making, obtains the higher control goal in order to .Indeed, enable the integration of machinery product to have with the human identical intelligence, is not impossible, also is nonessential .But, the high performance, the high speed microprocessor enable the integration of machinery product to have preliminary intelligent or human's partial intelligences, then is completely possible and essential.In the modern manufacture process, the information has become the control manufacture industry the determining factor, moreover is the most active actuation factor .Enhances the manufacture system information-handling capacity to become the modern manufacture science development a key point .As a result of the manufacture system information organization and structure multi-level, makes the information the gain, the integration and the fusion presents draws up the character, information measure multi-dimensional, as well as information organization's multi-level .In the manufacture information structural model, manufacture information uniform restraint, dissemination processing and magnanimous data aspects and so on manufacture knowledge library management, all also wait for further break through.Each kind of artificial intelligence tool and the computation intelligence method promoted the manufacture intelligence development in the manufacture widespread application .A kind based on the biological evolution algorithm computation intelligent agent, in includes thescheduling problem in the combination optimization solution area of technology, receives the more and more universal attention, hopefully completes the combination optimization question when the manufacture the solution speed and the solution precision aspect breaks through the question scale in pairs the restriction .The manufacture intelligence also displays in: The intelligent dispatch, the intelligent design, the intelligent processing, the robot study, the intelligent control, the intelligent craft plan, the intelligent diagnosis and so on are various These question key breakthrough, may form the product innovation the basic research system. Between 2 modern mechanical engineering front science different science overlapping fusion will have the new science accumulation, the economical development and society's progress has had the new request and the expectation to the science and technology, thus will form the front science .The front science also has solved and between the solution scientific question border area .The front science has the obvious time domain, the domain and the dynamic characteristic .The project front science distinguished in the general basic science important characteristic is it has covered the key science and technology question which the project actual appeared.Manufacture system is a complex large-scale system, for satisfies the manufacture system agility, the fast response and fast reorganization ability, must profit from the information science, the life sciences and the social sciences and so on the multi-disciplinary research results, the exploration manufacture system new architecture, the manufacture pattern and the manufacture system effective operational mechanism .Makes the system optimization the organizational structure and the good movement condition is makes the system modeling , the simulation and the optimized essential target .Not only the manufacture system new architecture to makes the enterprise the agility and may reorganize ability to the demand response ability to have the vital significance, moreover to made the enterprise first floor production equipment the flexibility and may dynamic reorganization ability set a higher request .The biological manufacture view more and more many is introduced the manufacture system, satisfies the manufacture system new request.The study organizes and circulates method and technique of complicated system from the biological phenomenon, is a valid exit which will solve many hard nut to cracks that manufacturing industry face from now on currently .Imitating to living what manufacturing point is mimicry living creature organ of from the organization, from match more, from growth with from evolution etc. function structure and circulate mode of a kind of manufacturing system and manufacturing process.The manufacturing drives in the mechanism under, continuously by one's own perfect raise on organizing structure and circulating mode and thus to adapt the process of[with] ability for the environment .For from descend but the last product proceed together a design and make a craft rules the auto of the distance born, produce system of dynamic state reorganization and product and manufacturing the system tend automatically excellent provided theories foundation and carry out acondition .Imitate to living a manufacturing to belong to manufacturing science and life science of"the far good luck is miscellaneous to hand over", it will produce to the manufacturing industry for 21 centuries huge of influence .机电一体化摘要机电一体化是现代科学技术发展的必然结果,本文简述了机电一体化技术的基本概要和发展背景。
20外文文献翻译原文及译文参考样式
20外⽂⽂献翻译原⽂及译⽂参考样式华北电⼒⼤学科技学院毕业设计(论⽂)附件外⽂⽂献翻译学号: 0819******** 姓名:宗鹏程所在系别:机械⼯程及⾃动化专业班级:机械08K1指导教师:张超原⽂标题:Development of a High-PerformanceMagnetic Gear年⽉⽇⾼性能磁齿轮的发展1摘要:本⽂提出了⼀个⾼性能永磁齿轮的计算和测量结果。
上述分析的永磁齿轮有5.5的传动⽐,并能够提供27 Nm的⼒矩。
分析表明,由于它的弹簧扭转常数很⼩,因此需要特别重视安装了这种⾼性能永磁齿轮的系统。
上述分析的齿轮也已经被应⽤在实际中,以验证、预测其效率。
经测量,由于较⼤端齿轮传动引起的磁⼒齿轮的扭矩只有16 Nm。
⼀项关于磁齿轮效率损失的系统研究也展⽰了为什么实际⼯作效率只有81%。
⼀⼤部分磁损耗起源于轴承,因为机械故障的存在,此轴承的备⽤轴承在此时是必要的。
如果没有源于轴的少量磁泄漏,我们估计能得到⾼达96%的效率。
与传统的机械齿轮的⽐较表明,磁性齿轮具有更好的效率和单位体积较⼤扭矩。
最后,可以得出结论,本⽂的研究结果可能有助于促进传统机械齿轮向磁性齿轮发展。
关键词:有限元分析(FEA)、变速箱,⾼转矩密度,磁性齿轮。
⼀、导⾔由于永久磁铁能产⽣磁通和磁⼒,虽然⼏个世纪过去了,许多⼈仍然着迷于永久磁铁。
,在过去20年的复兴阶段,正是这些优点已经使得永久磁铁在很多实际中⼴泛的应⽤,包括在起重机,扬声器,接头领域,尤其是在永久磁铁电机⽅⾯。
其中对永磁铁的复兴最常见于效率和转矩密度由于永磁铁的应⽤显著提⾼的⼩型机器的领域。
在永久磁铁没有获取⾼度重视的⼀个领域是传动装置的领域,也就是说,磁⼒联轴器不被⼴泛⽤于传动装置。
磁性联轴器基本上可以被视为以传动⽐为1:1磁⼒齿轮。
相⽐标准电⽓机器有约10kN m/m的扭矩,装有⾼能量永久磁铁的磁耦有⾮常⾼的单位体积密度的扭矩,变化范围⼤约300–400 kN 。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
毕业设计(论文)外文原文及译文一、外文原文MCUA microcontroller (or MCU) is a computer-on-a-chip. It is a type of microcontroller emphasizing self-sufficiency and cost-effectiveness, in contrast to a general-purpose microprocessor (the kind used in a PC).With the development of technology and control systems in a wide range of applications, as well as equipment to small and intelligent development, as one of the single-chip high-tech for its small size, powerful, low cost, and other advantages of the use of flexible, show a strong vitality. It is generally better compared to the integrated circuit of anti-interference ability, the environmental temperature and humidity have better adaptability, can be stable under the conditions in the industrial. And single-chip widely used in a variety of instruments and meters, so that intelligent instrumentation and improves their measurement speed and measurement accuracy, to strengthen control functions. In short,with the advent of the information age, traditional single- chip inherent structural weaknesses, so that it show a lot of drawbacks. The speed, scale, performance indicators, such as users increasingly difficult to meet the needs of the development of single-chip chipset, upgrades are faced with new challenges.The Description of AT89S52The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K bytes of In-System Programmable Flash memory. The device is manufactured using Atmel's high-density nonvolatile memory technology and is compatible with the industry-standard 80C51 instruction set and pinout. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with In-System Programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-effective solution to many embedded control applications.The AT89S52 provides the following standard features: 8K bytes ofFlash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit timer/counters, a six-vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Power-down mode saves the RAM contents but freezes the oscillator, disabling all other chip functions until the next interrupt or hardware reset.Features• Compatible with MCS-51® Products• 8K Bytes of In-System Programmable (ISP) Flash Memory– Endurance: 1000 Write/Erase Cycles• 4.0V to 5.5V Operating Range• Fully Static Operation: 0 Hz to 33 MHz• Three-level Program Memory Lock• 256 x 8-bit Internal RAM• 32 Programmable I/O Lines• Three 16-bit Timer/Counters• Eight Interrupt Sources• Full Duplex UART Serial Channel• Low-power Idle and Power-down Modes• Interrupt Recovery from Power-down Mode• Watchdog Timer• Dual Data Pointer• Power-off FlagPin DescriptionVCCSupply voltage.GNDGround.Port 0Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high-impedance inputs.Port 0 can also be configured to be the multiplexed low-order address/data bus during accesses to external program and data memory. In this mode, P0 has internal pullups.Port 0 also receives the code bytes during Flash programming and outputs the code bytes during program verification. External pullups are required during program verification.Port 1Port 1 is an 8-bit bidirectional I/O port with internal pullups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are pulled high by the internal pullups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pullups.In addition, P1.0 and P1.1 can be configured to be the timer/counter 2 external count input (P1.0/T2) and the timer/counter 2 trigger input (P1.1/T2EX), respectively.Port 1 also receives the low-order address bytes during Flash programming and verification.Port 2Port 2 is an 8-bit bidirectional I/O port with internal pullups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are pulled high by the internal pullups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pullups.Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that use 16-bit addresses (MOVX @ DPTR). In this application, Port 2 uses strong internal pull-ups when emitting 1s. During accesses to external data memory that use 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register.Port 2 also receives the high-order address bits and some control signals during Flash programming and verification.Port 3Port 3 is an 8-bit bidirectional I/O port with internal pullups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are pulled high by the internal pullups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pullups.Port 3 also serves the functions of various special features of the AT89S52, as shown in the following table.Port 3 also receives some control signals for Flash programming and verification.RSTReset input. A high on this pin for two machine cycles while the oscillator is running resets the device. This pin drives High for 96 oscillator periods after the Watchdog times out. The DISRTO bit in SFR AUXR (address 8EH) can be used to disable this feature. In the default state of bit DISRTO, the RESET HIGH out feature is enabled.ALE/PROGAddress Latch Enable (ALE) is an output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming.In normal operation, ALE is emitted at a constant rate of 1/6 the oscillator frequency and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external data memory.If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode.PSENProgram Store Enable (PSEN) is the read strobe to external program memory. When the AT89S52 is executing code from external program memory, PSENis activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory.EA/VPPExternal Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions.This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming.XTAL1Input to the inverting oscillator amplifier and input to the internal clock operating circuit.XTAL2Output from the inverting oscillator amplifier.Special Function RegistersNote that not all of the addresses are occupied, and unoccupied addresses may not be implemented on the chip. Read accesses to these addresses will in general return random data, and write accesses will have an indeterminate effect.User software should not write 1s to these unlisted locations, since they may be used in future products to invoke new features. In that case, the reset or inactive values of the new bits will always be 0.Timer 2 Registers:Control and status bits are contained in registers T2CON and T2MOD for Timer 2. The register pair (RCAP2H, RCAP2L) are the Capture/Reload registers for Timer 2 in 16-bit capture mode or 16-bit auto-reload mode.Interrupt Registers:The individual interrupt enable bits are in the IE register. Two priorities can be set for each of the six interrupt sources in the IP register.Dual Data Pointer Registers: To facilitate accessing both internal and external data memory, two banks of 16-bit Data Pointer Registers areprovided: DP0 at SFR address locations 82H-83H and DP1 at 84H-85H. Bit DPS = 0 in SFR AUXR1 selects DP0 and DPS = 1 selects DP1. The user should always initialize the DPS bit to the appropriate value before accessing the respective Data Pointer Register.Power Off Flag:The Power Off Flag (POF) is located at bit 4 (PCON.4) in the PCON SFR. POF is set to “1” during power up. It can be set and rest under software control and is not affected by reset.Memory OrganizationMCS-51 devices have a separate address space for Program and Data Memory. Up to 64K bytes each of external Program and Data Memory can be addressed.Program MemoryIf the EA pin is connected to GND, all program fetches are directed to external memory. On the AT89S52, if EA is connected to VCC, program fetches to addresses 0000H through 1FFFH are directed to internal memory and fetches to addresses 2000H through FFFFH are to external memory.Data MemoryThe AT89S52 implements 256 bytes of on-chip RAM. The upper 128 bytes occupy a parallel address space to the Special Function Registers. This means that the upper 128 bytes have the same addresses as the SFR space but are physically separate from SFR space.When an instruction accesses an internal location above address 7FH, the address mode used in the instruction specifies whether the CPU accesses the upper 128 bytes of RAM or the SFR space. Instructions which use direct addressing access of the SFR space. For example, the following direct addressing instruction accesses the SFR at location 0A0H (which is P2).MOV 0A0H, #dataInstructions that use indirect addressing access the upper 128 bytes of RAM. For example, the following indirect addressing instruction, where R0 contains 0A0H, accesses the data byte at address 0A0H, rather than P2 (whose address is 0A0H).MOV @R0, #dataNote that stack operations are examples of indirect addressing, so the upper 128 bytes of data RAM are available as stack space.Timer 0 and 1Timer 0 and Timer 1 in the AT89S52 operate the same way as Timer 0 and Timer 1 in the AT89C51 and AT89C52.Timer 2Timer 2 is a 16-bit Timer/Counter that can operate as either a timer or an event counter. The type of operation is selected by bit C/T2 in the SFR T2CON (shown in Table 2). Timer 2 has three operating modes: capture, auto-reload (up or down counting), and baud rate generator. The modes are selected by bits in T2CON.Timer 2 consists of two 8-bit registers, TH2 and TL2. In the Timer function, the TL2 register is incremented every machine cycle. Since a machine cycle consists of 12 oscillator periods, the count rate is 1/12 of the oscillator frequency.In the Counter function, the register is incremented in response to a1-to-0 transition at its corresponding external input pin, T2. In this function, the external input is sampled during S5P2 of every machine cycle. When the samples show a high in one cycle and a low in the next cycle, the count is incremented. The new count value appears in the register during S3P1 of the cycle following the one in which the transition was detected. Since two machine cycles (24 oscillator periods) are required to recognize a 1-to-0 transition, the maximum count rate is 1/24 of the oscillator frequency. To ensure that a given level is sampled at least once before it changes, the level should be held for at least one full machine cycle.InterruptsThe AT89S52 has a total of six interrupt vectors: two external interrupts (INT0 and INT1), three timer interrupts (Timers 0, 1, and 2), and the serial port interrupt. These interrupts are all shown in Figure 10.Each of these interrupt sources can be individually enabled or disabledby setting or clearing a bit in Special Function Register IE. IE also contains a global disable bit, EA, which disables all interrupts at once.Note that Table 5 shows that bit position IE.6 is unimplemented. In the AT89S52, bit position IE.5 is also unimplemented. User software should not write 1s to these bit positions, since they may be used in future AT89 products. Timer 2 interrupt is generated by the logical OR of bits TF2 and EXF2 in register T2CON. Neither of these flags is cleared by hardware when the service routine is vectored to. In fact, the service routine may have to determine whether it was TF2 or EXF2 that generated the interrupt, and that bit will have to be cleared in software.The Timer 0 and Timer 1 flags, TF0 and TF1, are set at S5P2 of the cycle in which the timers overflow. The values are then polled by the circuitry in the next cycle. However, the Timer 2 flag, TF2, is set at S2P2 and is polled in the same cycle in which the timer overflows.二、译文单片机单片机即微型计算机,是把中央处理器、存储器、定时/计数器、输入输出接口都集成在一块集成电路芯片上的微型计算机。