毕业论文5000字英文文献翻译

合集下载

毕业论文(设计)外文文献翻译及原文

毕业论文(设计)外文文献翻译及原文

金融体制、融资约束与投资——来自OECD的实证分析R.SemenovDepartment of Economics,University of Nijmegen,Nijmegen(荷兰内梅亨大学,经济学院)这篇论文考查了OECD的11个国家中现金流量对企业投资的影响.我们发现不同国家之间投资对企业内部可获取资金的敏感性具有显著差异,并且银企之间具有明显的紧密关系的国家的敏感性比银企之间具有公平关系的国家的低.同时,我们发现融资约束与整体金融发展指标不存在关系.我们的结论与资本市场信息和激励问题对企业投资具有重要作用这种观点一致,并且紧密的银企关系会减少这些问题从而增加企业获取外部融资的渠道。

一、引言各个国家的企业在显著不同的金融体制下运行。

金融发展水平的差别(例如,相对GDP的信用额度和相对GDP的相应股票市场的资本化程度),在所有者和管理者关系、企业和债权人的模式中,企业控制的市场活动水平可以很好地被记录.在完美资本市场,对于具有正的净现值投资机会的企业将一直获得资金。

然而,经济理论表明市场摩擦,诸如信息不对称和激励问题会使获得外部资本更加昂贵,并且具有盈利投资机会的企业不一定能够获取所需资本.这表明融资要素,例如内部产生资金数量、新债务和权益的可得性,共同决定了企业的投资决策.现今已经有大量考查外部资金可得性对投资决策的影响的实证资料(可参考,例如Fazzari(1998)、 Hoshi(1991)、 Chapman(1996)、Samuel(1998)).大多数研究结果表明金融变量例如现金流量有助于解释企业的投资水平。

这项研究结果解释表明企业投资受限于外部资金的可得性。

很多模型强调运行正常的金融中介和金融市场有助于改善信息不对称和交易成本,减缓不对称问题,从而促使储蓄资金投着长期和高回报的项目,并且提高资源的有效配置(参看Levine(1997)的评论文章)。

因而我们预期用于更加发达的金融体制的国家的企业将更容易获得外部融资.几位学者已经指出建立企业和金融中介机构可进一步缓解金融市场摩擦。

浙江大学本科毕业论文外文文献翻译

浙江大学本科毕业论文外文文献翻译

核准通过,归档资料。

未经允许,请勿外传!浙江大学本科毕业论文外文文献翻译The influence of political connections on the firm value of small and medium-sized enterprises in China政治关联在中国对中小型企业价值的影响1摘要中小型企业的价值受很多因素的影响,比如股东、现金流以及政治关联等.这篇文章调查的正是在中国政治关联对中小型企业价值的影响。

通过实验数据来分析政治关联对企业价值效益的影响.结果表明政府关联是关键的因素并且在中国对中小型企业的价值具有负面影响。

2重要内容翻译2。

1引言在商业界,有越来越多关于政治关联的影响的经济研究。

它们发现政治关联能够帮助企业确保有利的规章条件以及成功获得资源,比如能够最终提高企业价值或是提升绩效的银行贷款,这种政治关联的影响在不同的经济条件下呈现不同的效果。

在高腐败和法律制度薄弱的国家,政治关联对企业价值具有决定性因素1的作用.中国由高度集权的计划经济向市场经济转变,政府对市场具有较强的控制作用,而且有大量的上市企业具有政治关联。

中小型企业发展的很迅速,他们已经在全球经济环境中变得越来越重要。

从90年代起, 政治因素对中国的任何规模的企业来说都变得越来越重要,尤其是中小型企业的价值。

和其他的部门相比较,中小型企业只有较小的现金流,不稳定的现金流且高负债率.一方面,中小型企业改变更加灵活;另一方面,中小型企业在由于企业规模以及对银行来说没有可以抵押的资产,在筹资方面较为困难。

企业如何应对微观经济环境和政策去保证正常的企业活动,并且政治关联如何影响企业价值?这篇论文调查政治关联和企业价值之间的联系,并且试图去研究企业是否可以从政治关联中获利提升企业价值。

2.2定义这些中小型企业之所以叫中小型企业,是和管理规模有关。

对这些小企业来说,雇员很少,营业额较低,资金一般由较少的人提供,因此,通常由这些业主直接管理企业。

毕业论文英文参考文献与译文

毕业论文英文参考文献与译文

Inventory managementInventory ControlOn the so-called "inventory control", many people will interpret it as a "storage management", which is actually a big distortion.The traditional narrow view, mainly for warehouse inventory control of materials for inventory, data processing, storage, distribution, etc., through the implementation of anti-corrosion, temperature and humidity control means, to make the custody of the physical inventory to maintain optimum purposes. This is just a form of inventory control, or can be defined as the physical inventory control. How, then, from a broad perspective to understand inventory control? Inventory control should be related to the company's financial and operational objectives, in particular operating cash flow by optimizing the entire demand and supply chain management processes (DSCM), a reasonable set of ERP control strategy, and supported by appropriate information processing tools, tools to achieved in ensuring the timely delivery of the premise, as far as possible to reduce inventory levels, reducing inventory and obsolescence, the risk of devaluation. In this sense, the physical inventory control to achieve financial goals is just a means to control the entire inventory or just a necessary part; from the perspective of organizational functions, physical inventory control, warehouse management is mainly the responsibility of The broad inventory control is the demand and supply chain management, and the whole company's responsibility.Why until now many people's understanding of inventory control, limited physical inventory control? The following two reasons can not be ignored:First, our enterprises do not attach importance to inventory control. Especially those who benefit relatively good business, as long as there is money on the few people to consider the problem of inventory turnover. Inventory control is simply interpreted as warehouse management, unless the time to spend money, it may have been to see the inventory problem, and see the results are often very simple procurement to buy more, or did not do warehouse departments .Second, ERP misleading. Invoicing software is simple audacity to call it ERP, companies on their so-called ERP can reduce the number of inventory, inventory control, seems to rely on their small software can get. Even as SAP, BAAN ERP world, the field ofthese big boys, but also their simple modules inside the warehouse management functionality is defined as "inventory management" or "inventory control." This makes the already not quite understand what our inventory control, but not sure what is inventory control.In fact, from the perspective of broadly understood, inventory control, shouldinclude the following:First, the fundamental purpose of inventory control. We know that the so-called world-class manufacturing, two key assessment indicators (KPI) is, customer satisfaction and inventory turns, inventory turns and this is actually the fundamental objective of inventory control.Second, inventory control means. Increase inventory turns, relying solely on the so-called physical inventory control is not enough, it should be the demand and supply chain management process flow of this large output, and this big warehouse management processes in addition to including this link, the more important The section also includes: forecasting and order processing, production planning and control, materials planning and purchasing control, inventory planning and forecasting in itself, as well as finished products, raw materials, distribution and delivery of the strategy, and even customs management processes.And with the demand and supply chain management processes throughout the process, it is the information flow and capital flow management. In other words, inventory itself is across the entire demand and supply management processes in all aspects of inventory control in order to achieve the fundamental purpose, it must control all aspects of inventory, rather than just manage the physical inventory at hand.Third, inventory control, organizational structure and assessment.Since inventory control is the demand and supply chain management processes, output, inventory control to achieve the fundamental purpose of this process must be compatible with a rational organizational structure. Until now, we can see that many companies have only one purchasing department, purchasing department following pipe warehouse. This is far short of inventory control requirements. From the demand and supply chain management process analysis, we know that purchasing and warehouse management is the executive arm of the typical, and inventory control should focus on prevention, the executive branch is very difficult to "prevent inventory" for the simple reason that they assessment indicatorsin large part to ensure supply (production, customer). How the actual situation, a reasonable demand and supply chain management processes, and thus set the corresponding rational organizational structure and is a question many of our enterprisesto exploreThe role of inventory controlInventory management is an important part of business management. In the production and operation activities, inventory management must ensure that both the production plant for raw materials, spare parts demand, but also directly affect the purchasing, sales of share, sales activities. To make an inventory of corporate liquidity, accelerate cash flow, the security of supply under the premise of minimizing Yaku funds, directly affects the operational efficiency. Ensure the production and operation needs of the premise, so keep inventories at a reasonable level; dynamic inventory control, timely, appropriate proposed order to avoid over storage or out of stock; reduce inventory footprint, lower total cost of inventory; control stock funds used to accelerate cash flow.Problems arising from excessive inventory: increased warehouse space andinventory storage costs, thereby increasing product costs; take a lot of liquidity, resultingin sluggish capital, not only increased the burden of payment of interest, etc., would affect the time value of money and opportunity income; finished products and raw materials caused by physical loss and intangible losses; a large number of enterprise resource idle, affecting their rational allocation and optimization; cover the production, operation of the whole process of the various contradictions and problems, is not conducive to improve the management level.Inventory is too small the resulting problems: service levels caused a decline in the profit impact of marketing and corporate reputation; production system caused by inadequate supply of raw materials or other materials, affecting the normal production process; to shorten lead times, increase the number of orders, so order (production) costs; affect the balance of production and assembly of complete sets.NotesInventory management should particularly consider the following two questions:First, according to sales plans, according to the planned production of the goods circulated in the market, we should consider where, how much storage.Second, starting from the level of service and economic benefits to determine howto ensure inventories and supplementary questions.The two problems with the inventory in the logistics process functions.In general, the inventory function:(1)to prevent interrupted. Received orders to shorten the delivery of goods fromthe time in order to ensure quality service, at the same time to prevent out of stock.(2)to ensure proper inventory levels, saving inventory costs.(3)to reduce logistics costs. Supplement with the appropriate time interval compatible with the reasonable demand of the cargo in order to reduce logistics costs, eliminate or avoid sales fluctuations.(4)ensure the production planning, smooth to eliminate or avoid sales fluctuations.(5)display function.(6)reserve. Mass storage when the price falls, reduce losses, to respond to disasters and other contingencies.About the warehouse (inventory) on what the question, we must consider the number and location. If the distribution center, it should be possible according to customer needs, set at an appropriate place; if it is stored in central places to minimize the complementary principle to the distribution centers, there is no place certain requirements. When the stock base is established, will have to take into account are stored in various locations in what commodities.库存管理库存控制在谈到所谓“库存控制”的时候,很多人将其理解为“仓储管理”,这实际上是个很大的曲解。

毕业设计论文外文文献翻译

毕业设计论文外文文献翻译

毕业设计(论文)外文文献翻译院系:财务与会计学院年级专业:201*级财务管理姓名:学号:132148***附件: 财务风险管理【Abstract】Although financial risk has increased significantly in recent years risk and risk management are not contemporary issues。

The result of increasingly global markets is that risk may originate with events thousands of miles away that have nothing to do with the domestic market。

Information is available instantaneously which means that change and subsequent market reactions occur very quickly。

The economic climate and markets can be affected very quickly by changes in exchange rates interest rates and commodity prices。

Counterparties can rapidly become problematic。

As a result it is important to ensure financial risks are identified and managed appropriately. Preparation is a key component of risk management。

【Key Words】Financial risk,Risk management,YieldsI. Financial risks arising1.1What Is Risk1.1.1The concept of riskRisk provides the basis for opportunity. The terms risk and exposure have subtle differences in their meaning. Risk refers to the probability of loss while exposure is the possibility of loss although they are often used interchangeably。

毕业论文外文译文

毕业论文外文译文

毕业论文外文译文Due to the increasing globalization and internationalization of the business world, the ability to communicate effectively in a foreign language has become a crucial skill for graduates. However, many studies have shown that traditional language education methods are not always effective in developing this skill. This paper explores the use of communicative language teaching (CLT) as a more effective approach to foreign language instruction.CLT is an approach to language teaching that emphasizes the importance of communication and interactions in the language learning process. Traditional language education methods often focus on grammar and vocabulary drills, which prioritize accuracy over communicative competence. In contrast, CLT promotes the use of authentic materials and real-life situations to encourage learners to actively engage in meaningful communication.One of the main advantages of CLT is that it enhances learners' motivation and engagement in the language learning process. Traditional language education methods can be dry and repetitive, which can lead to boredom and disinterest among learners. In contrast, CLT provides learners with opportunities to use the language in practical, real-life situations, making the learning experience more meaningful and enjoyable.Furthermore, CLT enables learners to develop not only their linguistic competence but also their communicative competence. Communicative competence refers to the ability to use language appropriately and effectively in different social and cultural contexts. Traditional language education methods often prioritizethe acquisition of grammar rules and vocabulary, neglecting the importance of sociolinguistic and pragmatic aspects of language use. In contrast, CLT emphasizes the importance of developing all aspects of communicative competence, including cultural awareness and interpersonal skills.Another advantage of CLT is that it promotes the development of critical thinking and problem-solving skills. Traditional language education methods often focus on rote memorization and repetition, which limit learners' ability to think critically and apply their knowledge to real-life situations. In contrast, CLT encourages learners to engage in meaningful communication, which requires them to think critically, make decisions, and solve problems in the target language.In conclusion, CLT offers several advantages over traditional language education methods. It enhances learners' motivation and engagement, promotes the development of communicative competence, and fosters critical thinking and problem-solving skills. Therefore, it can be a more effective approach to foreign language instruction in the context of increasing globalization and internationalization.。

毕业论文的外文译文

毕业论文的外文译文

毕业论文的外文译文Due to the increasing importance of communication and cooperation in today's globalized world, businesses are constantly looking for ways to improve their cross-cultural communication skills. One area where these skills are crucial is in the internationalization of companies, where firms require a deep understanding of the cultural differences in order to be successful. This requires a comprehensive understanding of not only language, but also the cultural norms and values of the target market. In this thesis, we will explore the importance of cross-cultural communication in international businesses and how it can be improved.The primary challenge in cross-cultural communication is the language barrier. While English is the dominant language in international business, many firms find that it's not enough to communicate effectively with their target market. There are cultural differences in the way people use language, as well as differences in nonverbal communication such as body language and facial expressions. For instance, in Japan, it's common to nod and smile even if one does not agree with astatement, whereas in the United States, a lack of disagreement often means agreement. These differences can lead to misunderstandings in business conversations, which can ultimately harm business relationships.In order to overcome these language barriers, companies need to invest in language training for their employees. This training should focus not only on the language itself, but also on the cultural norms and values associated with the language. For example, a Japanese training program might teach students about the concepts of harmony and respect in Japanese culture, and how these values influence the way people communicate with each other. By understanding these cultural norms, employees will be able to communicate more effectively with their Japanese counterparts.Another challenge in cross-cultural communication is understanding the cultural context of business interactions. In some cultures, business is conducted in a more formal manner, with a strong emphasis on hierarchy and protocol. In other cultures, business is more informal and relaxed. Companies need to understand these differences in order to work effectively in international markets.To overcome these context challenges, companies should incorporate cultural training into their employee training programs. Cultural training should focus on the history, customs, and traditions of the target market. It should also address the specific business practices and protocol required for success in that market.In conclusion, cross-cultural communication is a key determinant of success in international businesses. In order to succeed in foreign markets, companies must have a deep understanding of the language, cultural norms, and values of their target market. This requires a comprehensive training program that not only focuses on language skills, but also on the cultural context of business interactions. With the right training and support, companies can improve their cross-cultural communication skills and achieve success in global markets.。

毕业论文英语翻译及原文

毕业论文英语翻译及原文
in the station orthogonal coordinate system origin of a random point can begotthrough the translation androtation of its WGS-84 position vector
=H( - )(1)
respectively, the expression can be easily gained as follows
Then, the relation equation between the two baseline vectors is expressedas
There are two steps in the GPS observation data processing course. They are baseline calculationand network adjustment. The baseline vectors in WGS-84 can be firstly got using baseline calculation.Secondly, the baseline vector transformation from WGS-84 to the station orthogonal coordinatesystem can be done with (3). At last, the adjustment of GPS deformatihestation orthogonal coordinate system can be successfully finished.
If the position vector of the station orthogonal coordinate system originP0inWGS-84 isexpressed as = , according to thegeodetic latitude and longitude( , ), theposition vector

论文翻译5000字

论文翻译5000字

Customer delight in a retail context: investigating delightful and terrible shopping experiencesMark J. Arnold, Kristy E. Reynold, NicolePonder, Jason E.LuegAbstract:The concept of delight is of great interest to practitioners who understand that to keep customers loyal, a firm must go beyond merely satisfying to truly delighting them [Bus. Mark. Dig.17 (1992) 17; Mark. News 24 (1990) 10]. However, few studies specifically dedicated to customer delight have surfaced in the marketing literature [J. Retail. 73 (1997) 311], and no research to the authors’ knowledge has explored delight in a retail setting. Therefore, the purpose of this study was to examine customer delight in a retail-shopping context. Specifically, qualitative research was conducted to determine the sources of delightful and terrible shopping experiences for retail shoppers. Critical incident analysis of 113 depth interviews with shoppers revealed several factors associated with delightful or terrible shopping experiences and the resulting consequences from these experiences. A number of strategic implications are discussed, and limitations and directions for future research are also addressed.Keywords: Customer delight; Shopping; Critical incident technique1. IntroductionOver the past decade, practitioners and academics alike have argued that an essential strategy for success and survival in today’s marketplace is the creation and maintenance of satisfied and loyal customers (Parasuraman et al.,1985; Reichheld and Sasser, 1990; Rust and Zahorik, 1992,1993; Zeithaml et al., 1990). Customer satisfaction has been linked to a number of important outcomes, including increasedmarket share, profitability, customer retention and oyalty, purchase intentions, usage rates, and the benefits associated with positive word-of-mouth effects (Anderson and Sullivan, 1993; Anderson et al., 1994; Bitner, 1990; Boulding et al., 1993; Cronin and Taylor, 1992; Fornell and Wernerfelt, 1987, 1988; LaBarbera and Mazursky, 1983;Zeithaml, 2000; Zeithaml et al., 1996). As a result, firms have made significant financial and human resource investments into the measurement and analysis of customer satisfaction and its subsequent improvement (Jones and Sasser, 1995; Oliver, 1999; Reichheld and Sasser, 1990; Rust et al., 1995).However, while evidence of the value of customer satisfaction continues to accumulate, firms are increasingly having difficulty connecting satisfaction efforts to the ‘‘bottom line’’ (Reichheld,1996). For example, a study by the Juran Institute found that fewer than 30% of 200 firms believed that their satisfaction management efforts added to their bottom line, and fewer than 2% were able to measure a bottom-line improvement (Hepworth and Mateus, 1994). Indeed, studies have consistently shown that many customers who switch are often satisfied with their prior brand experience, with overall switching among satisfied customers across many industries approaching 80% (Keaveney, 1995; Oliver, 1999; Reichheld, 1996).In response to these developments, practitioners have suggested that merely attaining satisfaction may be insufficient, and that going beyond customer satisfaction to ‘‘customer delight’’ is required (Schlossberg, 1990). Executives in leading companies often ass ert that customer satisfaction by itself is insufficient for developing long-term loyalty because customers expect to be satisfied in today’s marketplace and simply meeting those expectations is insufficient (Oliver et al., 1997). In other words, customers are satisfied when the company can avoid problems (i.e., the ‘‘zerodefects’’ mentality), but to keep customers for the longrun, companies must do more.For many companies, ‘‘doing more’’ suggests the generationof higher levels of emotion than those associated with mere satisfaction evaluations, and the growing belief amongmany executives is that customers exposed tounexpected, pleasant experiences—those experiences which are delightful—are far more likely to develop into long-term loyalfollowers. Hence, creating delighted customers clearlyrequires new approaches to customer management thanmore traditional satisfaction-building efforts can offer.These developments, in conjunction with equivocal academic research regarding the value of increasing customer satisfaction (Reichheld, 1993), have led to a growing interest among retail firms in creating customer delight asthe basis for long-term customer profitability.In line with these marketplace developments, recent thinking on the part of service quality and s atisfaction researchers has begun to focus on these ‘‘higher levels’’ of satisfaction that may generate exceptional results in the form of unshakable customer loyalty. While customer delight has been thought to be key to true customer loyalty and loyalty-driven profits (Oliver et al., 1997), it remains largely unexplored in academic research. Therefore, before delight can be properly linked to the bottom line, it is imperative that retailers understand the causes of such experiences.Researchers in social psychology have distinguished between delight and lower arousal levels of happiness (de Rivera et al., 1989), and several studies in marketing have addressed emotions in the satisfaction response (Oliver and Westbrook, 1993). However, few studies specifically dedicated to customer delight have appeared (e.g., Oliver et al., 1997; Rust and Oliver, 2000), and no research to the authors’ knowledge has explored delight in a retail setting.Furthermore, although Schneider and Bowen (1999) have addressed customer outrage and others have examined such issues as identifying unfavorable or dissatisfactory service encounters (cf. Bitner et al., 1990, 1994), the research on ‘‘terrible’’ shopping experiences is very limited. Clearly there is a need for such knowledge.Therefore, the purpose of this paper is to examine the concept of customer delight in a retail setting. Specifically, the sources of delightful shopping experiences are explored and compared with sources of terrible shopping experiences to construct a taxonomic framework in which shoppers’ experiences are classified. To investigate these questions, the critical incident technique (CIT; Flanagan, 1954) is employed in an emergent research design. Critical incident approaches have been widely used in prior research investigating service encounters (Bitner et al., 1990, 1994), service quality (Iacobucci et al., 1995), customer switching behavior (Keaveney, 1995), and selfservice technologies (Meuter et al., 2000). This technique is employed here to explore sources and outcomes of delightful and terrible shopping experiences in an attempt to identify broad groupings of factors that influence whatmakes a shopping experience delightful or terrible and also the outcomes of a delightful or terrible shoppingexperience.First, an overview of the literature on customer delight is presented. Following this, the results of a qualitative investigation involving over 100 depth interviews with shoppers are described. Finally, results, limitations, and directions for future research are discussed.2. BackgroundWhile practitioners have realized the importance of delighting customers for some time (cf. Coyne, 1989), only recently has academic research in marketing explored the construct of customer delight. The review of the literature is organized around a discussion of behavioral conceptions of delight, its affective basis, and other important consumer and firm variables that are likely to influence the formation of delight and its outcomes. In addition, the limited amount of research that relates most closely to ‘‘terrible’’ customer experiences—unfavorable or dissatisfying service encounters— is briefly reviewed.2.1. Behavioral conception of delightThe expectancy–disconfirmation model (Oliver, 1980)provides basis for understanding the concept of delight.Within this framework, consumers are thought to compare perceived performance with prior expectations, and if performance exceeds expectations, then a state of positive disconfirmation exists and the customer is satisfied. However, researchers have made the distinction that disconfirmation can vary in terms of its ‘‘unexpectedness’’ (Oliverand Winer, 1987). For example, performance experienced outside a range of experience-based norms can result in three categories of confirming/disconfirming events: confirmed performance, whereslight performance deviations are considered normal; disconfirmed performance which is plausible, but experienced infrequently; and disconfirmed performance which is highly unlikely based on past experience, and hence is unexpected or surprising (Oliver, 1989;Oliver and Winer, 1987; Woodruff et al., 1982). It is thislatter category that has been described as evoking ‘‘surprise disconfirmation’’ (Oliver, 1997; Oliver et al., 1997), andprovides basis f or understanding the cognitive foundation of delight.2.2. Affective basis of delightHowever, delight is much more than just another form of cognitive appraisal. Research on emotions in social psychology describes delight as a secondary-level emotion, which is characterized by a combination of lower level emotions. Plutchik (1980) proposed a ‘‘psychoevolutionary theory of emotion’’ which identifies eight basic emotions: joy, acceptance, fear, surprise, sadness, disgust, anger, an danticipation. He arranged these basic emotions in a circularpattern, called a circumplex, so that particular mixes of these basic emotions are possible. Therefore, these eight basic emotions can form primary, secondary, and tertiary dyads. Asecondary dyad may be described as a combination of two fundamental emotions result in higher order, more complex affects. Delight may be adequately described as a secondary dyad, consisting of a combination of joy and surprise(Plutchik, 1980). Other emotion frameworks similarly describe delight as a combination of arousal and pleasantness(Russell, 1980) or highly activated positive affect (Watsonand Tellegen, 1985). Finally, Richins (1997) developed theConsumption Emotion Set (CES), which identifies thoseemotions that are particularly relevant to the study ofconsumption in the marketing discipline. In this classification,delight is considered to be a descriptor of the ‘‘joy’’cluster. Other descriptors in this cluster include happy, glad,and cheerful.Consumer research has mirrored this conceptualizationof delight. Westbrook and Oliver (1991) studied the emotional profiles of automobile purchasers, and found difference samong respondents who reported satisfaction: one group experiencing happiness and contentment, and an other rexperiencing pleasant surprise, or delight. Oliver and Westbrook(1993) reported similar findings in that the group exhibiting the highest levels of joy and surprise were labeleddelighted. Oliver (1993) found significant relationships between positive affect (interest and joy) and satisfaction/dissatisfaction responses. Finally, Mano and Oliver (1993) showed different dimensions of positive–negative affect,including moderate arousal positive affect (pleasure), higharousalpositive affect (delight), and high nonspecific arousal(surprise).This research has increasingly recognized that suchemotions coexist with satisfaction judgments (cf., Manoand Oliver, 1993). Oliver (1997) notes that satisfaction‘‘modes’’ exist whereby different satisfactions are character rizedby the various affects attached to the satisfactionevaluation. For example, ‘‘satisfaction-as-delight’’ is character rize d by both expectation and disconfirmation processingthat result in a very intense primary affective response ofpleasant surprise or deligh t. Thus, delight appears to resultfrom a ‘‘blend’’ of pleasure and arousal, or more specifically,as a combination of joy and surprise (Oliver et al., 1997).2.3. Antecedents and consequences of delightIn addition to providing a better understanding of theconstruct of delight, recent research suggests a number ofantecedent constructs. The results of two structural modelsin two service settings (symphony patrons and wildlifeattendees) showed that delight was a function of surprisinglyhigh positive disconfirmation, arousal, and positive affect(Oliver et al., 1997). Structural differences were foundacross the two samples: delight directly affected repurchaseintentions only in the symphony sample, and indirectlyaffected intentions in the park sample.Outcomes of delight have generally focused on repurchase intentions. For example, researchers examining hedonic consumption have hypothesized that extremely positive,consumption-related emotions are likely to lead to very strong forms of commitment and repurchase intentions (Holbrookand Hirschman, 1982). Other research investigatingthe competitive implications of delight finds that generatingcustomer delight can pay off, but only if satisfaction stronglyaffects repurchase intention, the firm values future profits,satisfaction of competitors’ customers is important, and thefirm is able to attract dissatisfied customers of competitors(Rust and Oliver, 2000). Furthermore, generating delight among customers results in higher future expectations, thereby making it more difficult for the firm to generate delight repeatedly.Finally, a number of important consumer- and firm-level variables are likely to have moderating effects. For example,researchers have specifically suggested that both customerinvolvement and service variability are likely moderatinginfluences on the relationship between psychological antecedentconstructs and customer delight (Oliver et al., 1997).Furthermore, other research suggests the presence of moderatinginfluences on the delight–outcome relationship, suchas consumer self-regulation (Babin and Darden, 1995;Bagozzi et al., 1992; Kuhl, 1986), as well as more macrovariables,such as industry competitiveness (e.g., Andersonet al., 1994; Fornell, 1992).2.4. Unfavorable/dissatisfying experiencesAlthough the concept of ‘‘terrible’’ customer experienceshas not been defined or studied in retail settings, pastresearch has focused on identifying dissatisfying (and satisfying)incidents in service encounters. Bitner et al. (1990)examined favorable and unfavorable serviceencounters,based on the customer’s perspective, discovering that bothsatisfactory and unsatisfactory incidents could be attributedto one or more of three major types of employee behaviors:how the employee responded to a service delivery failure,how the employee responded to customer needs andrequests, and unprompted or unsolicited employee actions.Bitner et al. (1994) later investigated the sources of satisfactoryand dissatisfactory service encounters from theservice employee’s viewp oint. The results of this studyrevealed four groups of satisfactory and dissatisfactoryincidents: how employees responded to failures, to problemcustomers, and to requests, and unprompted action byemployees.Schneider and Bowen (1999) made an interesting argumentthat both customer delight and customer outrage stemfrom perceived justice or injustice. In a retail setting, if thecustomer’s needs for security, justice, and/or self-esteem areviolated in some way, a terrible shopping experience inwhich the customer may become filled with outrage mayresult. For example, a customer’s need for justice might beviolated if the customer was overcharged for an item or if a salesperson made promises or commitments to a customerthat were later broken. A customer’s need for self-esteemmight be violated if salespeople were uncaring and rude ordid not seem interested in assisting the customer. Thesesituations may indeed lead the customer to endure a terribleshopping experience.Keaveney (1995) identified critical incidents in service encounters that led to customer-switching behaviors. Among customers’ reasons for switching were inconvenience, pricing,core service failures, service encounter failures, employeeresponses to service failures, ethical problems, attractionby competitors, and involuntary switching. Ganesh et al.(2000) also investigated customer-switching behavior in aservices (banking) context, distinguishing customers whoswitched banks due to dissatisfaction from other groups ofcustomers. Finally, Kelley et al. (1993) identified types ofretail failures. Types of retail failures were categorized intothree groups: (1) employee responses to service deliverysystem or product failures; (2) employee responses to customerneeds and requests; and (3) unprompted and unsolicited employee actions.Given this background and the fact that neither ‘‘delightful’’nor ‘‘terrible’’ customer experiences in a retail shopping context has been examined, this exploratory researchdelves deeper into these issues by examining the factors thatproduce delightful as well as terrible shopping experiencesfor retail customers. The research method is discussed next,followed by a presentation of the results.3. MethodThe CIT was selected as the method to identify the underlying factors that led to delightful and terrible shopping experiences (Flanagan, 1954). Given that the phenomenon of customerdelight remains relatively unexplored in academic research, the CIT method was chosen as an exploratory research design, which emphasizes discovery over confirmation (Deshpande, 1983). The CIT has been used successfully in a number of retailing and services studies in which the goal was to provide research relevant to both managers and consumer researchers (Bitner et al., 1994; Keaveney, 1995; Ke lley et al., 1993). This particular method considers the ‘‘stories that people have told and asksquestions of the stories in order to classify each one within the scheme’’ (Bitner et al., 1990, p. 73).3.1. Data collectionThe CIT is a systematic procedure used for identifying events or behaviors that lead to certain outcomes, like success or failures on specific tasks (Bitner et al., 1990),satisfactions or dissatisfactions with a service provider (Bitner et al., 1994), or as reported here, delightful andterrible shopping experiences. Data were collected using the CIT with open-ended, structured interviews with a set of informants who were familiar with the phenomenon of interest (e.g., shopping and service patronage). The results of these interviews were then content analyzed with the purpose of identifying categories of critical incidents that lead to outcomes of interest (see Bitner et al., 1990, 1994; Ronan and Latham, 1974).Marketing research students trained in depth interviewing techniques conducted the interviews with nonstudent respondents. This project was a required component of a marketing research class. The use of students in data collection has been employed elsewhere (Gwinner et al., 1998), and particularly as interviewers when collecting data for critical incident analysis (Bitner et al., 1990, 1994). This approach provided the ability to investigate far greater numbers of transcribed interviews that would not be possible without such assistance, thereby providing a richer and more completeunderstanding of the constructs under investigation.The interviewers were given a detailed discussion guide that provided a series of questions to explore with the shopper–respondent. First, the respondent was primed by discussing with the interviewer how s/he feels about shopping in general across different retail formats. Then the hopper was asked to describe an experience s/he couldremember that was absolutely, positively delightful, where delight was explicitly described to the shopper as feelings of both joy or happiness, and surprise (cf. Oliver, 1997, 1999; Plutchik, 1980; Westbrook and Oliver, 1991).The interviewers probed by asking when, where, and how long the experience was, and what exactly was so delightful about this experience. Expectations were discussed, and the interviewers explored the feelings and thoughts the shopper had during the delightful experience and after it was over. The same process was employed for terrible shopping experiences, only, theinterviewers probed the shoppers to recall a shopping experience that was absolutely, positively terrible,one of the most unpleasant experiences the respondent shopper has ever had.Each interview lasted on average 30–45 min, and wastape recorded and transcribed into electronic for mat. Theinter viewers recorded the respondent’s name and telephone number for research verification purposes. No questionableinterviews were noted after following up by telephone witha random subset of respondents. A total of 123 interviews were conducted over the course of 1 month, and 10 were judged unusable, leaving a final sample of 113 informants. Approximately 68% were female and 32% were maleinformants. Respondents were free to recount their delightfuland terrible shopping experiences within any retail setting except grocery and drug stores. This resulted inthick descriptions of delightful and terrible shopping experiences,in a variety of retail settings: general mall experiences ,specialized clothing stores (e.g., Ann Taylor and bridal shops), specialized merchandisers (e.g., cigar store,music store and dive shop), discount/mass merchandisers(e.g., Wal-Mart and Target), upscale retailers (e.g., Dillard’sand Sax Fifth Avenue), electronics (e.g., Best Buy),furniture stores, automobile dealers, hardware stores, flea markets, and other miscellaneous retail formats (e.g., fabricstores and jewelry stores).4. Results and discussion The depth interviews provided a rich source of data in which to investigate the groups of factors characteristic ofboth delightful and terrible shopping experiences. Tables 1 and 2 show each of the major groups and categories within each group, along with the number of incidents counted for each category. Tables 3 and 4 present sample excerpts fromrespondents’ critical incidents fo r each of the categories for delightful shopping experiences and terrible shopping experiences.4.1. Delightful experiences—major groups and categoriewithin groups The sorting of the incidents led to two major groups of factors that appear to be associated with delightful shopping experiences: interpersonal and non-interpersonal. The interpersonal factor refers to situations when the source of the delightful experience is attributable to the actions of a salesperson or service provider. The non-interpersonal factor relates to situations in which the basis of the delightful experience springs from product procurement or value attainment. The critical incident analysis alsoproduced a group of outcomes associated with delightful experiences.4.1.1. Interpersonal factorsWithin the interpersonal group, five categories emerged from the data. Interpersonal effort refers to incidents in which the salesperson is extremely helpful in some way. For example, a salesperson may go out of his/her way to explain how a product functions or to provide additional product or service information. The second type of incident in the interpersonal group isinterpersonal engagement, which relates to situations in which the salesperson is extremel friendly and nice to the customer. These first two categories together are analogous to incidents grouped into a category called ‘‘attention paid to the customer,’’ which emerged in the Bitner et al. (1990) study. In that study, favorable encounters resulted when employees provided extra information, anticipated the customer’s needs, showed interest ina customer or were especially attentive to a customer.According to Bitner et al. (1990), behaviors, such as these, on the part of the salesperson, can make a customer feel unique and special. Problem resolution refers to instances in which the salesperson solves the customer’s problem, possibly even bending the rules’’ to accommodate the customer. For example, a customer’s warranty has expired, but the salesperson arranges for the product to be repaired free of charge The problem resolution factor found here is similar to the Bitner et al. (1990) ‘‘response to customer preferences,which may include an employee accommodating a request that goes beyond the scope of or is in violation of the company’s policies or rules. Kelley et al. (1993) found that correcting a problem or failure is an effective ‘‘recovery’’ tactic. In their study, 96% of respondents reported that they still shop at a retailer that corrected a problem or failure.According to Bitner et al. (1990), highly favorable encountersresult when the employee acknowledges the customer’sproblem and takes responsibility to solve it The term interpersonal distance is employed to describesituations in which a customer is delighted by a salesperson who is not too aggressive or ‘‘pushy.’’ Other delightful incidents may involve a salesperson spending a considerable amount of time assisting the customer or searching for a product. This category is referred to as time commitment. A salesperson calls t he retailers’ other locations to find a certain size, for instance. This factor is related to the ‘‘attention paid to the customer’’ group reported by Bitner et al. (1994).4.1.2. Non-interpersonal factorsCustomers were also delighted by occurrences other than salesperson behaviors. Oftentimes, a customer may unexpectedly locate a long-needed product or finds exactly what s/he is seeking. Thus, unanticipated acquisition is often associated with creating a delightful shopping experience.Unanticipated value, finding an unexpected bargain, or purchasing a product at a lower price than expected may also contribute to producing delight in a shopping situation.在零售方面的客户满意的和可怕的购物体验的调查Mark J. Arnold, Kristy E. Reynold, Nicole Ponder, Jason E. Lueg 摘要:欢乐的概念是极大的兴趣,从业者明白,为了保持客户的忠诚度,企业必须超越仅仅满足客户而是可以真正取悦他们,已经浮出水面的专门负责研究客户满意度的几项营销文献中,并没有运用作者的知识探讨在零售环境中的客户喜悦感。

毕业论文英文翻译

毕业论文英文翻译

毕业论文英文翻译Title: The Impact of Artificial Intelligence on Employment Abstract:This paper explores the impact of artificial intelligence (AI) on employment. The rise of AI technologies has sparked concerns about its potential to replace human jobs. Through an analysis of existing literature and case studies, this study investigates the ways in which AI has affected various industries and job sectors. The findings indicate that while AI has the potential to automate certain tasks and reduce the need for human intervention, it also creates new job opportunities and contributes to economic growth. Additionally, the study highlights the importance of retraining and upskilling workers to adapt to the changing job market. Overall, this research contributes to a better understanding of the complex relationship between AI and employment and provides insights into proactive strategies to address the challenges posed by AI. Introduction:Artificial intelligence has emerged as a powerful technology with the potential to transform various aspects of society, including the workforce. The rapid advancement of AI has raised concerns about potential job losses and increased automation. This study aims to explore the impact of AI on employment and identify strategies to mitigate negative effects. By examining existing literature and case studies, this research provides a comprehensive analysis of AI's influence on different industries and job sectors.Literature Review:The literature offers a wide range of perspectives on the impact ofAI on employment. Some studies suggest that AI will lead to significant job losses in sectors such as manufacturing, transportation, and customer service. They argue that AI technologies, such as autonomous vehicles and chatbots, can perform tasks previously done by humans more efficiently and at a lower cost. On the other hand, other studies argue that AI will create new job opportunities and enhance productivity. For example, the healthcare sector benefits from AI technologies by improving diagnosis accuracy and streamlining administrative processes.Case Studies:This study includes several case studies that examine the impact of AI on specific industries. The manufacturing industry, for instance, has experienced both job losses and job creation due to the introduction of AI. While certain tasks have been automated, new roles related to AI maintenance and programming have emerged. Similarly, the retail industry has witnessed the integration of AI technologies, leading to job displacement in traditional retail jobs but also the creation of new positions in data analysis and online customer support.Mitigation Strategies:To address the challenges posed by AI, strategies should focus on retraining and upskilling the workforce to adapt to the changing job market. Governments and organizations should encourage workers to acquire in-demand skills such as data analysis and AI programming. Additionally, collaboration between academia and industry is crucial to ensure that education and training programs remain relevant and effective. Finally, policies that support jobtransition and income support for displaced workers will help minimize the negative impact of AI on employment. Conclusion:The impact of artificial intelligence on employment is a complex and multifaceted issue. While concerns about job losses are valid, it is important to recognize that AI also creates new job opportunities and contributes to economic growth. By implementing proactive strategies, such as retraining and upskilling, societies can better navigate the changes brought about by AI and ensure a future where humans and machines can coexist harmoniously.。

毕业论文外文翻译(中英文)

毕业论文外文翻译(中英文)

译文交通拥堵和城市交通系统的可持续发展摘要:城市化和机动化的快速增长,通常有助于城市交通系统的发展,是经济性,环境性和社会可持续性的体现,但其结果是交通量无情增加,导致交通拥挤。

道路拥挤定价已经提出了很多次,作为一个经济措施缓解城市交通拥挤,但还没有见过在实践中广泛使用,因为道路收费的一些潜在的影响仍然不明。

本文首先回顾可持续运输系统的概念,它应该满足集体经济发展,环境保护和社会正义的目标.然后,根据可持续交通系统的特点,使拥挤收费能够促进经济增长,环境保护和社会正义.研究结果表明,交通拥堵收费是一个切实有效的方式,可以促进城市交通系统的可持续发展。

一、介绍城市交通是一个在世界各地的大城市迫切关注的话题.随着中国的城市化和机动化的快速发展,交通拥堵已成为一个越来越严重的问题,造成较大的时间延迟,增加能源消耗和空气污染,减少了道路网络的可靠性。

在许多城市,交通挤塞情况被看作是经济发展的障碍.我们可以使用多种方法来解决交通挤塞,包括新的基础设施建设,改善基础设施的维护和操作,并利用现有的基础设施,通过需求管理策略,包括定价机制,更有效地减少运输密度.交通拥堵收费在很久以前就已提出,作为一种有效的措施,来缓解的交通挤塞情况.交通拥堵收费的原则与目标是通过对选择在高峰拥挤时段的设施的使用实施附加收费,以纾缓拥堵情况。

转移非高峰期一些出行路线,远离拥挤的设施或高占用车辆,或完全阻止一些出行,交通拥堵收费计划将在节省时间和降低经营成本的基础上,改善空气中的质量,减少能源消耗和改善过境生产力。

此计划在世界很多国家和地方都有成功的应用.继在20世纪70年代初和80年代中期挪威与新加坡实行收费环,在2003年2月伦敦金融城推出了面积收费;直至现在,它都是已经开始实施拥挤收费的大都市圈中一个最知名的例子。

然而,交通拥堵收费由于理论和政治的原因未能在实践中广泛使用。

道路收费的一些潜在的影响尚不清楚,和城市发展的拥塞定价可持续性,需要进一步研究。

5000字英文论文

5000字英文论文

5000字英文论文篇一:论文用5000字中英文翻译MCU DescriptionSCM is also known as micro-controller (Microcontroller Unit), commonly used letters of the acronym MCU that it was first used in industrial control. Only a single chip by the CPU chip developed from a dedicated processor. The first design is by a large number of peripherals and CPU on a chip in the computer system, smaller, more easily integrated into a complex and demanding on the volume control device which. INTEL s Z80 is the first designed in accordance with this idea processor, then on the development of microcontroller and dedicated processors have parted ways.Are 8-bit microcontroller early or 4 bits. One of the most successful is the INTEL 8031, for a simple, reliable and good performance was a lot of praise. Then developed in 8031 out of MCS51 MCU Systems. SCM systems based on this system until now are still widely used. With the increased requirements of industrial control field, began a 16-bit microcontroller, because the cost is not satisfactory but have not been very widely used. After 90 years with the great development of consumer electronics, microcontroller technology has been a huge increase. With INTEL i960 series, especially the later series of widely used ARM, 32-bit microcontroller quickly replace high-end 16-bit MCU status and enter the mainstream market. The traditional 8-bit microcontroller performances have been the rapid increase capacity increase compared to 80 the number of times. Currently, high-end 32-bit microcontroller clocked over 300MHz, the performance catching the mid-90 s dedicated processor, while the average model prices fall to one U.S. dollars; the most high-end model only 10 dollars. Modern SCM systems are no longer only in the developmentand use of bare metal environment, a large number of proprietary embedded operating system is widely used in the full range of SCM. The handheld computers and cell phones as the core processing of high-end microcontroller can even use a dedicated Windows and Linux operating systems.SCM is more suitable than the specific processor used in embedded systems, so it was up to the application. In fact the number of SCM is the world s largest computer. Modern human life used in almost every piece of electronic and mechanical products will be integrated single chip. Phone, telephone, calculator, home appliances,electronic toys, handheld computers and computer accessories such as a mouse with a 1-2 in both the Department of SCM. Personal computer will have a large number of SCM in the work. General car with more than 40 SCM, complex industrial control systems may even have hundreds of SCM in the same time work! SCM is not only far exceeds the number of PC and other computing the sum, or even more than the number of human beingsSingle chip, also known as single-chip microcontroller, it is not complete a certain logic chips, but to a computer system integrated into a chip. Equivalent to a micro-computer, and computer than just the lack of a microcontroller I / O devices. General talk: a chip becomes a computer. Its small size, light weight, cheap, for the study, application and development of facilities provided. At the same time, learning to use the MCU is to understand the principle and structure of the computer the best choice. SCM and the computer functions internally with similar modules, such as CPU, memory, parallel bus, the same effect as well, and hard disk memory devices, and different is its performance of these components were relatively weak many of our home computer, but the price is low , usually not more than 10 yuan you can do with it ...... some control for a class is not very complicated electrical work is enough of. We are usingautomatic drum washing machine, smoke hood, VCD and so on appliances which could see its shadow! ...... It is primarily as a control section of the core componentsIt is an online real-time control computer, control-line is that the scene is needed is a stronger anti-jamming ability, low cost, and this is, and off-line computer (such as home PC), the main difference.Single chipMCU is through running, and can be modified. Through different procedures to achieve different functions, in particular special unique features, this is another device much effort needs to be done, some great efforts are very difficult to do. A not very complex functions if the 50 s with the United States developed 74 series, or the 60 s CD4000 series of these pure hardware buttoned, then the circuit must be a large PCB board! But if the United States if the 70 s with a series of successful SCM market, theresult will be a drastic change! Just because you are prepared by microcomputer programs can achieve high intelligence, high efficiency and high reliability!As the microcontroller on the cost-sensitive, so now the dominant software or the lowest level assembly language, which is the lowest level in addition to more than binary machine code language, and as so low why is the use? Many high-level language has reached the level of visual programming Why is not it? The reason is simply that there is no home computer as a single chip CPU, not as hard as a mass storage device. A visualization of small high-level language program which even if only one button, will reach tens of K of size! For the home PC s hard drive in terms of nothing, but in terms of the MCU is not acceptable. SCM in the utilization of hardware resources to be very high for the job so although the original is still in the compilation of a lot of use. The same token,if the giant computer operating system and applications run up to get home PC, home PC, also can not afford to.Can be said that the twentieth century across the three power era, that is, the age of electricity, the electronic age and has entered into the computer age. However, this computer, usually refers to the personal computer, referred to as PC. It consists of the host, keyboard, monitor and other components. Another type of computer, most people do not know how. This computer is to give all kinds of intelligent machines single chip (also known as micro-controller). As the name suggests, this computer system took only a minimal integrated circuit, can be a simple operation and control. Because it is small, usually hidden in the charged mechanical stomach in. It is in the device, like the human brain plays a role, it goes wrong, the whole plant was paralyzed. Now, this microcontroller has a very broad field of use, such as smart meters, real-time industrial control, communications equipment, navigation systems, and household appliances. Once all kinds of products were using SCM, can serve to upgrade the effectiveness of products, often in the product name preceded by the adjective - intelligent, such as intelligent washing machines. Now some technical personnel of factories or other amateur electronics developers to engage in out of certain products, not the circuit is too complicated, that function is too simple and can easily be copied. The reason may be stuck in the product did not use a microcontrolleror other programmable logic device.SCM historySCM was born in the late 20th century, 70, experienced SCM, MCU, SoC three stages.First model1.SCM the single chip microcomputer (Single Chip Microcomputer) stage, mainly seeking the best of the best single form of embedded systemsarchitecture. Innovation model success, laying the SCM and general computer completely different path of development. In the open road of independent development of embedded systems, Intel Corporation contributed.2.MCU the micro-controller (Micro Controller Unit) stage, the main direction of technology development: expanding to meet the embedded applications, the target system requirements for the various peripheral circuits and interface circuits, highlight the object of intelligent control. It involves the areas associated with the object system, therefore, the development of MCU s responsibility inevitably falls on electrical, electronics manufacturers. From this point of view, Intel faded MCU development has its objective factors. In the development of MCU, the most famous manufacturers as the number of Philips Corporation. Philips company in embedded applications, its great advantage, the MCS-51 single-chip micro-computer from the rapid development of the micro-controller. Therefore, when we look back at the path of development of embedded systems, do not forget Intel and Philips in History.Embedded SystemsEmbedded system microcontroller is an independent development path, the MCU important factor in the development stage, is seeking applications to maximize the solution on the chip; Therefore, the development of dedicated single chip SoC trend of the natural form. As the microelectronics, IC design, EDA tools development, application system based on MCU SOC design have greater development. Therefore, the understanding of the microcontroller chip microcomputer can be, extended to the single-chip micro-controller applications.MCU applicationsSCM now permeate all areas of our lives, which is almost difficult to find traces of the field without SCM. Missile navigation equipment,aircraft, all types of instrument control, computer network communications and data transmission, industrial automation, real-time process control and data processing, extensive use of various smart IC card, civilian luxury car security system, video recorder, camera, fully automatic washing machine control, and program-controlled toys, electronic pet, etc., which are inseparable from the microcontroller. Not to mention the area of robot control, intelligent instruments, medical equipment was. Therefore, the MCU learning, development and application of the large number of computer applications and intelligent control of the scientists, engineers.SCM is widely used in instruments and meters, household appliances, medical equipment, aerospace, specialized equipment, intelligent management and process control fields, roughly divided into the following several areas:1. In the application of Intelligent InstrumentsSCM has a small size, low power consumption, controlling function, expansion flexibility, the advantages of miniaturization and ease of use, widely used instrument, combining different types of sensors can be realized Zhuru voltage, power, frequency, humidity, temperature, flow, speed, thickness, angle, length, hardness, elemental, physical pressure measurement. SCM makes use of digital instruments, intelligence, miniaturization, and functionality than electronic or digital circuits more powerful. Such as precision measuring equipment (power meter, oscilloscope, various analytical instrument).2. In the industrial control applicationWith the MCU can constitute a variety of control systems, data acquisition system. Such as factory assembly line of intelligent control 3. In Household AppliancesCan be said that the appliances are basically using SCM, praise from the electric rice, washing machines, refrigerators, air conditioners, color TV, and other audio video equipment, to the electronic weighing equipment, varied, and omnipresent.篇二:毕业论文5000字英文文献翻译(c++)┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ 装┊ ┊ ┊ ┊ ┊ 订┊ ┊ ┊ ┊ ┊ 线┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊安徽工业大学毕业设计(论文)说明书英文翻译英语原文:. Introducing ClassesThe only remaining feature we need to understand before solving our bookstore problem is how to write a data structure to represent our transaction data. In C++ we define our own data structure by defining a class. The class mechanism is one of the most important features in C++. In fact, a primary focus of the design of C++ is to make it possible to define class types that behave as naturally as the built-in types themselves. The library types that we ve seen already, such as istream and ostream, are all defined as classesthat is,they are not strictly speaking part of the language.Complete understanding of the class mechanism requires mastering a lot of information. Fortunately, it is possible to use a class that someone else has written without knowing how to define a class ourselves. In this section, we ll describe a simple class that we canuse in solving our bookstore problem. We ll implement this class in the subsequent chapters as we learn more about types,expressions, statements, and functionsall of which are used in defining classes.To use a class we need to know three things:What is its name? Where is it defined?What operations does it support?For our bookstore problem, we ll assume that the class is named Sales_item and that it is defined in a header named Sales_item.h.The Sales_item ClassThe purpose of the Sales_item class is to store an ISBN and keep track of the number of copies sold, the revenue, and average sales price for that book. How these data are stored or computed is not our concern. To use a class, we need not know anything about how it is implemented. Instead, what we need to know is what operations the class provides.As we ve seen, when we use library facilities such as IO, we must include the associated headers. Similarly, for our own classes, we must make the definitions associated with the class available to the compiler. We do so in much the same way. Typically, we put the class definition into a file. Any program that wants to use our class must include that file. Conventionally, class types are stored in a file with a name that, like the name of a program source file, has two parts: a file name and a file suffix. Usually the file name is the same as the class defined in the header. The suffix usually is .h, but some programmers use .H, .hpp, or .hxx. Compilers usually aren t picky about header file names, but IDEs ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊┊ ┊ ┊ 装┊ ┊ ┊ ┊ ┊ 订┊ ┊ ┊ ┊ ┊ 线┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊安徽工业大学毕业设计(论文)说明书sometimes are. We ll assume that our class is defined in a file named Sales_item.h.Operations on Sales_item ObjectsEvery class defines a type. The type name is the same as the name of the class. Hence, our Sales_item class defines a type namedSales_item. As with the built-in types, we can define a variable of a class type. When we write Sales_item item we are saying that item is an object of type Sales_item. We often contract the phrase an object of type Sales_item to aSales_ item object or even more simply to a Sales_item. In addition to being able to define variables of type Sales_item, we can perform the following operations on Sales_item objects:Use the addition operator, +, to add two Sales_items,Use the input operator, to read a Sales_item object,Use the output operator, to write a Sales_item object,Use the assignment operator, =, to assign one Sales_item object to another,Call the same_isbn function to determine if two Sales_items refer to the same book.Classes are central to most C++ programs: Classes let us define our own types that are customizedfor the problems we need to solve, resulting in applications that are easier to write andunderstand.Well-designed class types can be as easy to use as the built-in types.A class defines data and function members: The data members store the state associated with objectsof the class type, and the functions perform operations that give meaning to the data. Classeslet us separate implementation and interface. The interface specifies the operations that the classsupports. Only the implementor of the class need know or care about the details of the implementation. This separation reduces the bookkeeping aspects that make programming tedious anderror-prone.Class types often are referred to as abstract data types. An abstract data type treats the data(state) and operations on that state as a single unit. We can think abstractly about what the classd oes, rather than always having to be aware of how the class operates. Abstract data types arefundamental to both object-oriented and generic programming.Data abstraction is a programming (and design) technique that relies on the separation of interfaceand implementation. The class designer must worry about how a class is implemented, but programmersthat use the class need not know about these details. Instead, programmers who use a type need to know only the type s interface; they can think abstractly about what the type does rather than concretely about how the type works. Encapsulation is a term that describes the technique of combining lower-level elements to forma new, higher-level entity. A function is one form of encapsulation: The detailed actions performedby the function are encapsulated in the larger entity that is the function itself. Encapsulated elements hide the details of their implementationwe may call ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ 装┊ ┊ ┊ ┊ ┊ 订┊ ┊ ┊ ┊ ┊ 线┊ ┊ ┊ ┊┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊安徽工业大学毕业设计(论文)说明书a function but have no access to the statements that it executes. In the same way, a class is an encapsulated entity: It represents an aggregation of several members, and most (well-designed) class types hide the members that implement the type.If we think about the library vector type, it is an example of both data abstraction and encapsulation. It is abstract in that to use it, we think about its interfaceabout the operations that it can perform. It is encapsulated because we have no access to the details of how the type is representated nor to any of its implementation artifacts. An array, on the other hand, is similar in concept to a vector but is neither abstract nor encapsulated. We manipulate an array directly by accessing the memory in which the array is stored.Not all types need to be abstract. The library pair class is a good example of a useful, well-designed class that is concrete rather thanabstract. A concrete class is a class that exposes, rather than hides, its implementation.Some classes, such as pair, really have no abstract interface. The pair type exists to bundle two data members into a single object. There is no need or advantage to hiding the data members. Hiding the members in a class like pair would only complicate the use of the type.Even so, such types often have member functions. In particular, it is a good idea for any class that has data members of built-in or compound type to define constructor(s) to initialize those members. The user of the class could initialize or assign to the data members but it is less error-prone for the class to do so.Programmers tend to think about the people who will run their applications as users. Applicationsare designed for and evolve in response to feedback from those who ultimately use the applications. Classes are thought of in a similar way: A class designer designs and implements a class for users of that class. In this case, the user is a programmer, not the ultimate user of the application.Authors of successful applications do a good job of understanding and implementing the needs ofthe application s users. Similarly,well-designed, useful classes are designed with a close attention to the needs of the users of the class.In another way, the division between class designer and class user reflects the division betweenusers of an application and the designers and implementors of the application. Users care only if the application meets their needs in a cost-effective way. Similarly, users of a class care only about its interface. Good class designers define a class interface that is intuitive and easy to use. Users care about the implementation only in so far as the implementation affects their use of the class. If the implementation is too slow or puts burdens on users ofthe class, then the users must care. In well-designed classes, only the class designer worries about the implementation.In simple applications, the user of a class and the designer of the class might be one┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ 装┊ ┊ ┊ ┊ ┊ 订┊ ┊ ┊ ┊ ┊ 线┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊安徽工业大学毕业设计(论文)说明书and the same person. Even in such cases, it is useful to keep the roles distinct. When designing the interface to a class, the class designer should think about how easy it will be to use the class. When using the class, the designer shouldn t think about how the class works.When referring to a user, the context makes it clear which kind of user is meant. If we speak of user code or the user of the Sales_item class, we mean a programmer who is using a class in writing an application. If we speak of the user of the bookstore application, we mean the manager of the store who is running the application.Data abstraction and encapsulation provide two important advantages: 1.Class internals are protected from inadvertent user-level errors, which might corrupt the state of the object.2.The class implementation may evolve over time in response to changing requirements or bug reports without requiring change inuser-level code.By defining data members only in the private section of the class, the class author is free to make changes in the data. If the implementation changes, only the class code needs to be examined to see what affect the change may have. If data are public, then any function that directly accesses the data members of the old representation might be broken. Itwould be necessary to locate and rewrite all those portions of code that relied on the old pesentation before the program could be used again. Similarly, if the internal state of the class is private, then changes to the member data can happen in only a limited number of places. The data is protected from mistakes that users might introduce. If there is a bug that corrupts the object s state, the places to look for the bug are localized: When data are private, only a member function could be responsible for the error. The search for the mistake is limited, greatly easing the problems of maintenance and program correctness.If the data are private and if the interface to the member functions does not change, then user functions that manipulate class objects require no change.Because changing a class definition in a header file effectively changes the text of every source file that includes that header, code that uses a class must be recompiled when the class changes.Classes are the most fundamental feature in C++. Classes let us define new types that are tailored to our own applications, making our programs shorter and easier to modify.Data abstractionthe ability to define both data and function membersand encapsulationthe ability to protect class members from general accessare fundamental to classes. Member functions define the interface to the class. We encapsulate the class by making the data and functions used by the implementation of a class private.Classes may define constructors, which are special member functions that control how┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ 装┊ ┊ ┊ ┊ ┊ 订┊ ┊ ┊ ┊ ┊ 线┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊安徽工业大学毕业设计(论文)说明书objects of the class are initialized. Constructors may be verloaded. Every constructor should initialize every data member. Constructors should use a constructor initializer list to initialize the data members. Initializer lists are lists of namevalue pairs where the name is a member and the value is an initial value for that member.Classes may grant access to their nonpublic members to other classes or functions. A class grants access by making the class or function a friend.Classes may also define mutable or static members. A mutable member is a data member that is never const; its value may be changed inside a const member function. A static member can be either function or data; static members exist independently of the objects of the class type. Copy ControlEach type, whether a built-in or class type, defines the meaning of a (possibly empty) set of operations on objects of that type. We can add two int values, run size on a vector, and so on. These operations define what can be done with objects of the given type.Each type also defines what happens when objects of the type are created. Initialization of objects of class type is defined by constructors. Types also control what happens when objects of the type are copied, assigned, or destroyed. Classes control these actions through special member functions: the copy constructor, the assignment operator, and the destructor. This chapter covers these operations.When we define a new type, we specifyexplicitly or implicitlywhat happens when objects of that type are copied, assigned, and destroyed. We do so by defining special members: the copy constructor, the assignment operator, and the destructor. If we do not explicitly define the copy constructor or the assignment operator, the compiler will (usually) define them for us.The copy constructor is a special constructor that has a single parameter that is a (usually const) reference to the class type. The copy constructor is used explicitly when we define a new object and initialize it from an object of the same type. It is used implicitly when we pass or return objects of that type to or from functions.Collectively, the copy constructor, assignment operator, and destructor are referred to as copy control. The compiler automatically implements these operations, but the class may define its own versions. Copy control is an essential part of defining any C++ class. Programmers new to C++ are often confused by having to define what happens when objects arecopied, assigned, or destroyed. This confusion is compounded because if we do not explicitly define these operations, the compiler defines them for usalthough they might not behave as we intend.Often the compiler-synthesized copy-control functions are finethey do exactly the篇三:毕业设计的5000字英文文献翻译外文及翻译英语原文 Android Application FundamentalsAndroid applications are written in the Java programming language. The Android SDK tools compile the code—along with any data and resource files—into an Android package, an archive file with an .apk suffix. All the code in a single .apk file is considered to be one application and is the file that Android-powered devices use to install the application. Once installed on a device, each Android application lives in its own security sandbox: ? The Android operating system is a multi-user Linux system in which eachapplication is a different user.? By default, the system assigns each application a unique Linux user ID (the ID is used only by the system and is unknown to the application). The system setspermissions for all the files in an application so that only the user ID assigned to that application can access them.? Each process has its own virtual machine (VM), so an application s code runs in isolation from other applications.? By default, every application runs in its own Linux process. Android starts the process when any of the application s components need to be executed, then shuts down the process when it s no longer needed or when the system must recovermemory for other applications.In this way, the Android system implements the principle of least privilege. That is, each application, by default, has access only to the components that it requires to do its work and no more. This creates a very secure environment in which an application cannot access parts of the system for which it is not given permission.However, there are ways for an application to share data with other applications and for an application to access system services:? It s possible to arrange for two applications to share the same Linux user ID, in whichcase they are able to access each other s files. To conserve system resources,applications with the same user ID can also arrange to run in the same Linux processand share the same VM (the applications must also be signed with the samecertificate).。

5000字英文文献翻译

5000字英文文献翻译

沈阳建筑大学毕业论文外文及翻译原文题目Android Application Fundamentals学院专业班级信息与控制工程学院计算机08-1学生姓名XXX 性别X指导教师XXX 职称XXX年月日外文及翻译英语原文Android Application FundamentalsAndroid applications are written in the Java programming language. The Android SDK tools compile the code—along with any data and resource files—into an Android package, an archive file with an .apk suffix. All the code in a single .apk file is considered to be one application and is the file that Android-powered devices use to install the application.Once installed on a device, each Android application lives in its own security sandbox:●The Android operating system is a multi-user Linux system in which each applicationis a different user.●By default, the system assigns each application a unique Linux user ID (the ID isused only by the system and is unknown to the application). The system setspermissions for all the files in an application so that only the user ID assigned to thatapplication can access them.●Each process has its own virtual machine (VM), so an application's code runs inisolation from other applications.●By default, every application runs in its own Linux process. Android starts theprocess when any of the application's components need to be executed, then shutsdown the process when it's no longer needed or when the system must recovermemory for other applications.In this way, the Android system implements the principle of least privilege. That is, each application, by default, has access only to the components that it requires to do its work and no more. This creates a very secure environment in which an application cannot access parts of the system for which it is not given permission.However, there are ways for an application to share data with other applications and for an application to access system services:●It's possible to arrange for two applications to share the same Linux user ID, in whichcase they are able to access each other's files. To conserve system resources,applications with the same user ID can also arrange to run in the same Linux processand share the same VM (the applications must also be signed with the samecertificate).●An application can request permission to access device data such as the user'scontacts, SMS messages, the mountable storage (SD card), camera, Bluetooth, andmore. All application permissions must be granted by the user at install time.That covers the basics regarding how an Android application exists within the system. The rest of this document introduces you to:●The core framework components that define your application.●The manifest file in which you declare components and required device features foryour application.●Resources that are separate from the application code and allow your application togracefully optimize its behavior for a variety of device configurations.Application ComponentsApplication components are the essential building blocks of an Android application. Each component is a different point through which the system can enter your application. Not all components are actual entry points for the user and some depend on each other, but each one exists as its own entity and plays a specific role—each one is a unique building block that helps define your application's overall behavior.There are four different types of application components. Each type serves a distinct purpose and has a distinct lifecycle that defines how the component is created and destroyed.Here are the four types of application components:ActivitiesAn activity represents a single screen with a user interface. For example, an email application might have one activity that shows a list of new emails, another activity to compose an email, and another activity for reading emails. Although the activities work together to form a cohesive user experience in the email application, each one isindependent of the others. As such, a different application can start any one of these activities (if the email application allows it). For example, a camera application can start the activity in the email application that composes new mail, in order for the user to share a picture.An activity is implemented as a subclass of Activity and you can learn more about it in the Activities developer guide.ServicesA service is a component that runs in the background to perform long-runningoperations or to perform work for remote processes. A service does not provide a user interface. For example, a service might play music in the background while the user is in a different application, or it might fetch data over the network without blocking user interaction with an activity. Another component, such as an activity, can start the service and let it run or bind to it in order to interact with it.A service is implemented as a subclass of Service and you can learn more about it inthe Services developer guide.Content providersA content provider manages a shared set of application data. You can store the data inthe file system, an SQLite database, on the web, or any other persistent storage location your application can access. Through the content provider, other applications can query or even modify the data (if the content provider allows it). For example, the Android system provides a content provider that manages the user's contact information. As such, any application with the proper permissions can query part of the content provider (such as ContactsContract.Data) to read and write information abouta particular person.Content providers are also useful for reading and writing data that is private to your application and not shared. For example, the Note Pad sample application uses a content provider to save notes.A content provider is implemented as a subclass of ContentProvider and mustimplement a standard set of APIs that enable other applications to perform transactions.For more information, see the Content Providers developer guide.Broadcast receiversA broadcast receiver is a component that responds to system-wide broadcastannouncements. Many broadcasts originate from the system—for example, a broadcast announcing that the screen has turned off, the battery is low, or a picture was captured.Applications can also initiate broadcasts—for example, to let other applications know that some data has been downloaded to the device and is available for them to use.Although broadcast receivers don't display a user interface, they may create a status bar notification to alert the user when a broadcast event occurs. More commonly, though, a broadcast receiver is just a "gateway" to other components and is intended to do a very minimal amount of work. For instance, it might initiate a service to perform some work based on the event.A broadcast receiver is implemented as a subclass of BroadcastReceiver and eachbroadcast is delivered as an Intent object. For more information, see the BroadcastReceiver class.A unique aspect of the Android system design is that any application can start another application’s component. For example, if you want the user to capture a photo with the device camera, there's probably another application that does that and your application can use it, instead of developing an activity to capture a photo yourself. You don't need to incorporate or even link to the code from the camera application. Instead, you can simply start the activity in the camera application that captures a photo. When complete, the photo is even returned to your application so you can use it. To the user, it seems as if the camera is actually a part of your application.When the system starts a component, it starts the process for that application (if it's not already running) and instantiates the classes needed for the component. For example, if your application starts the activity in the camera application that captures a photo, that activity runs in the process that belongs to the camera application, not in your application's process. Therefore, unlike applications on most other systems, Android applications don't have a single entry point (there's no main()function, for example).Because the system runs each application in a separate process with file permissions that restrict access to other applications, your application cannot directly activate a component from another application. The Android system, however, can. So, to activate a component in another application, you must deliver a message to the system that specifies your intent to start a particular component. The system then activates the component for you.Activating ComponentsThree of the four component types—activities, services, and broadcast receivers—are activated by an asynchronous message called an intent. Intents bind individual components to each other at runtime (you can think of them as the messengers that request an action from other components), whether the component belongs to your application or another.An intent is created with an Intent object, which defines a message to activate either a specific component or a specific type of component—an intent can be either explicit or implicit, respectively.For activities and services, an intent defines the action to perform (for example, to "view" or "send" something) and may specify the URI of the data to act on (among other things that the component being started might need to know). For example, an intent might convey a request for an activity to show an image or to open a web page. In some cases, you can start an activity to receive a result, in which case, the activity also returns the result in an Intent (for example, you can issue an intent to let the user pick a personal contact and have it returned to you—the return intent includes a URI pointing to the chosen contact).For broadcast receivers, the intent simply defines the announcement being broadcast (for example, a broadcast to indicate the device battery is low includes only a known action string that indicates "battery is low").The other component type, content provider, is not activated by intents. Rather, it is activated when targeted by a request from a ContentResolver. T he content resolver handles all direct transactions with the content provider so that the component that's performing transactions with the provider doesn't need to and instead calls methods onthe ContentResolver object. This leaves a layer of abstraction between the content provider and the component requesting information (for security).There are separate methods for activating each type of component:∙You can start an activity (or give it something new to do) by passingan Intent to startActivity() or startActivityForResult() (when you want the activity to return a result).∙You can start a service (or give new instructions to an ongoing service) by passing an Intent to startService(). Or you can bind to the service by passingan Intent to bindService().∙You can initiate a broadcast by passing an Intent to methodslike sendBroadcast(), sendOrderedBroadcast(), or sendStickyBroadcast().∙You can perform a query to a content provider by calling query() ona ContentResolver.For more information about using intents, see the Intents and Intent Filters document. More information about activating specific components is also provided in the following documents: Activities, Services, BroadcastReceiver and Content Providers.Declaring componentsThe primary task of the manifest is to inform the system about the application's components. For example, a manifest file can declare an activity as follows:In the <application> element, the android:icon attribute points to resources for an icon that identifies the application.In the <activity> element, the android:name at tribute specifies the fu lly qualified class name of the Activity subclass and the android:label attributes specifies a string to use as the user-visible label for the activity.You must declare all application components this way:●<activity>elements for activities●<service> elements for services●<receiver>elements for broadcast receivers●<provider>elements for content providersActivities, services, and content providers that you include in your source but do not declare in the manifest are not visible to the system and, consequently, can never run. However, broadcast receivers can be either declared in the manifest or created dynamically in code (as BroadcastReceiver objects) and registered with the system bycalling registerReceiver().Declaring component capabilitiesAs discussed above, in Activating Components, you can use an Intent to start activities, services, and broadcast receivers. You can do so by explicitly naming the target component (using the component class name) in the intent. However, the real power of intents lies in the concept of intent actions. With intent actions, you simply describe the type of action you want to perform (and optionally, the data upon which you’d like to perform the action) and allow the system to find a component on the device that can perform the action and start it. If there are multiple components that can perform the action described by the intent, then the user selects which one to use.The way the system identifies the components that can respond to an intent is by comparing the intent received to the intent filters provided in the manifest file of other applications on the device.When you declare a component in your application's manifest, you can optionally include intent filters that declare the capabilities of the component so it can respond to intents from other applications. You can declare an intent filter for your component by addingan <intent-filter>element as a child of the component's declaration element.For example, an email application with an activity for composing a new email might declare an intent filter in its manifest entry to respond to "send" intents (in order to send email). An activity in your application can then create an intent with the “send” action (ACTION_SEND), which the s ystem matches to the email application’s “send” activity and launches it when you invoke the intent with startActivity().For more about creating intent filters, see the Intents and Intent Filters document.Declaring application requirementsThere are a variety of devices powered by Android and not all of them provide the same features and capabilities. In order to prevent your application from being installed on devices that lack features needed by your application, it's important that you clearly define a profile for the types of devices your application supports by declaring device and software requirements in your manifest file. Most of these declarations are informational only and the system does not read them, but external services such as Google Play do read them in order to provide filtering for users when they search for applications from their device.For example, if your application requires a camera and uses APIs introduced in Android 2.1 (API Level 7), you should declare these as requirements in your manifest file. That way, devices that do not have a camera and have an Android version lower than 2.1 cannot install your application from Google Play.However, you can also declare that your application uses the camera, but doesnot require it. In that case, your application must perform a check at runtime to determine if the device has a camera and disable any features that use the camera if one is not available.Here are some of the important device characteristics that you should consider as you design and develop your application:Screen size and densityIn order to categorize devices by their screen type, Android defines two characteristics for each device: screen size (the physical dimensions of the screen) and screen density (the physical density of the pixels on the screen, or dpi—dots per inch). To simplify all the different types of screen configurations, the Android system generalizes them intoselect groups that make them easier to target.The screen sizes are: small, normal, large, and extra large.The screen densities are: low density, medium density, high density, and extra highdensity.By default, your application is compatible with all screen sizes and densities, because the Android system makes the appropriate adjustments to your UI layout and imageresources. However, you should create specialized layouts for certain screen sizes and provide specialized images for certain densities, using alternative layout resources, and by declaring in your manifest exactly which screen sizes your application supportswith the <supports-screens> element.For more information, see the Supporting Multiple Screens document.Input configurationsMany devices provide a different type of user input mechanism, such as a hardware keyboard, a trackball, or a five-way navigation pad. If your application requires a particular kind of input hardware, then you should declare it in your manifest with the <uses-configuration> e lement. However, it is rare that an application should require a certain input configuration.Device featuresThere are many hardware and software features that may or may not exist on a given Android-powered device, such as a camera, a light sensor, bluetooth, a certain version of OpenGL, or the fidelity of the touchscreen. You should never assume that a certain feature is available on all Android-powered devices (other than the availability of the standard Android library), so you should declare any features used by your application with the <uses-feature> element.Platform VersionDifferent Android-powered devices often run different versions of the Android platform, such as Android 1.6 or Android 2.3. Each successive version often includes additional APIs not available in the previous version. In order to indicate which set of APIs are available, each platform version specifies an API Level (for example,Android 1.0 is API Level 1 and Android 2.3 is API Level 9). If you use any APIs that were added to the platform after version 1.0, you should declare the minimum API Level in which those APIs were introduced using the <uses-sdk> element.It's important that you declare all such requirements for your application, because, when you distribute your application on Google Play, the store uses these declarations to filter which applications are available on each device. As such, your application should be available only to devices that meet all your application requirements.For more information about how Google Play filters applications based on these (and other) requirements, see the Filters on Google Play document.Application ResourcesAn Android application is composed of more than just code—it requires resources that are separate from the source code, such as images, audio files, and anything relating to the visual presentation of the application. For example, you should define animations, menus, styles, colors, and the layout of activity user interfaces with XML files. Using application resources makes it easy to update various characteristics of your application without modifying code and—by providing sets of alternative resources—enables you to optimize your application for a variety of device configurations (such as different languages and screen sizes).For every resource that you include in your Android project, the SDK build tools define a unique integer ID, which you can use to reference the resource from your application code or from other resources defined in XML. For example, if your application c ontains an image file named logo.png (saved in the res/drawable/ directory), the SDK tools generate a resource ID named R.drawable.logo, which you can use to reference the image and insert it in your user interface.One of the most important aspects of providing resources separate from your source code is the ability for you to provide alternative resources for different device configurations. For example, by defining UI strings in XML, you can translate the strings into other languages and save those strings in separate files. Then, based on a language qualifier that you append to theresource directory's name (such as res/values-fr/for French string values) and the user's language setting, the Android system applies the appropriate language strings to your UI.Android supports many different qualifiers for your alternative resources. The qualifier is a short string that you include in the name of your resource directories in order to define the device configuration for which those resources should be used. As another example, you should often create different layouts for your activities, depending on the device's screen orientation and size. For example, when the device screen is in portrait orientation (tall), you might want a layout with buttons to be vertical, but when the screen is in landscape orientation (wide), the buttons should be aligned horizontally. To change the layout depending on the orientation, you can define two different layouts and apply the appropriate qualifier to each layout's directory name. Then, the system automatically applies the appropriate layout depending on the current device orientation.For more about the different kinds of resources you can include in your application and how to create alternative resources for various device configurations, see the Application Resources developer guide.中文译文安卓应用基础在Java编程语言编写的Android应用程序的Android的SDK工具编译代码以及与任何数据和到一个Android的包,一个归档文件档案资源的.apk后缀,所有的在一个单一的代码.apk文件被认为是一个应用程序,是Android的文件,供电设备来安装应用程序。

毕业论文文献外文翻译----危机管理:预防,诊断和干预文献翻译-中英文文献对照翻译

毕业论文文献外文翻译----危机管理:预防,诊断和干预文献翻译-中英文文献对照翻译

第1页 共19页中文3572字毕业论文(设计)外文翻译标题:危机管理-预防,诊断和干预一、外文原文标题:标题:Crisis management: prevention, diagnosis and Crisis management: prevention, diagnosis andintervention 原文:原文:The Thepremise of this paper is that crises can be managed much more effectively if the company prepares for them. Therefore, the paper shall review some recent crises, theway they were dealt with, and what can be learned from them. Later, we shall deal with the anatomy of a crisis by looking at some symptoms, and lastly discuss the stages of a crisis andrecommend methods for prevention and intervention. Crisis acknowledgmentAlthough many business leaders will acknowledge thatcrises are a given for virtually every business firm, many of these firms do not take productive steps to address crisis situations. As one survey of Chief Executive officers of Fortune 500 companies discovered, 85 percent said that a crisisin business is inevitable, but only 50 percent of these had taken any productive action in preparing a crisis plan(Augustine, 1995). Companies generally go to great lengths to plan their financial growth and success. But when it comes to crisis management, they often fail to think and prepare for those eventualities that may lead to a company’s total failure.Safety violations, plants in need of repairs, union contracts, management succession, and choosing a brand name, etc. can become crises for which many companies fail to be prepared untilit is too late.The tendency, in general, is to look at the company as a perpetual entity that requires plans for growth. Ignoring the probabilities of disaster is not going to eliminate or delay their occurrences. Strategic planning without inclusion ofcrisis management is like sustaining life without guaranteeinglife. One reason so many companies fail to take steps to proactively plan for crisis events, is that they fail to acknowledge the possibility of a disaster occurring. Like an ostrich with its head in the sand, they simply choose to ignorethe situation, with the hope that by not talking about it, it will not come to pass. Hal Walker, a management consultant, points out “that decisions will be more rational and better received, and the crisis will be of shorter duration, forcompanies who prepare a proactive crisis plan” (Maynard, 1993) .It is said that “there are two kinds of crises: those that thatyou manage, and those that manage you” (Augustine, 1995). Proactive planning helps managers to control and resolve a crisis. Ignoring the possibility of a crisis, on the other hand,could lead to the crisis taking a life of its own. In 1979, theThree-Mile Island nuclear power plant experienced a crisis whenwarning signals indicated nuclear reactors were at risk of a meltdown. The system was equipped with a hundred or more different alarms and they all went off. But for those who shouldhave taken the necessary steps to resolve the situation, therewere no planned instructions as to what should be done first. Hence, the crisis was not acknowledged in the beginning and itbecame a chronic event.In June 1997, Nike faced a crisis for which they had no existi existing frame of reference. A new design on the company’s ng frame of reference. A new design on the company’s Summer Hoop line of basketball shoes - with the word air writtenin flaming letters - had sparked a protest by Muslims, who complained the logo resembled the Arabic word for Allah, or God.The council of American-Islamic Relations threatened aa globalNike boycott. Nike apologized, recalled 38,000 pairs of shoes,and discontinued the line (Brindley, 1997). To create the brand,Nike had spent a considerable amount of time and money, but hadnever put together a general framework or policy to deal with such controversies. To their dismay, and financial loss, Nike officials had no choice but to react to the crisis. This incident has definitely signaled to the company that spending a little more time would have prevented the crisis. Nonetheless,it has taught the company a lesson in strategic crisis management planning.In a business organization, symptoms or signals can alert the strategic planners or executives of an eminent crisis. Slipping market share, losing strategic synergy anddiminishing productivity per man hour, as well as trends, issues and developments in the socio-economic, political and competitive environments, can signal crises, the effects of which can be very detrimental. After all, business failures and bankruptcies are not intended. They do not usually happen overnight. They occur more because of the lack of attention to symptoms than any other factor.Stages of a crisisMost crises do not occur suddenly. The signals can usuallybe picked up and the symptoms checked as they emerge. A company determined to address these issues realizes that the real challenge is not just to recognize crises, but to recognize themin a timely fashion (Darling et al., 1996). A crisis can consistof four different and distinct stages (Fink, 1986). The phasesare: prodromal crisis stage, acute crisis stage, chronic crisisstage and crisis resolution stage.Modern organizations are often called “organic” due tothe fact that they are not immune from the elements of their surrounding environments. Very much like a living organism, organizations can be affected by environmental factors both positively and negatively. But today’s successfulorganizations are characterized by the ability to adapt by recognizing important environmental factors, analyzing them, evaluating the impacts and reacting to them. The art of strategic planning (as it relates to crisis management)involves all of the above activities. The right strategy, in general, provides for preventive measures, and treatment or resolution efforts both proactively and reactively. It wouldbe quite appropriate to examine the first three stages of acrisis before taking up the treatment, resolution or intervention stage.Prodromal crisis stageIn the field of medicine, a prodrome is a symptom of the onset of a disease. It gives a warning signal. In business organizations, the warning lights are always blinking. No matter how successful the organization, a number of issues andtrends may concern the business if proper and timely attentionis paid to them. For example, in 1995, Baring Bank, a UK financial institution which had been in existence since 1763,ample opportunitysuddenly and unexpectedly failed. There wasfor the bank to catch the signals that something bad was on thehorizon, but the company’s efforts to detect that were thwarted by an internal structure that allowed a single employee both to conduct and to oversee his own investment trades, and the breakdown of management oversight and internalcontrol systems (Mitroff et al., 1996). Likewise, looking in retrospect, McDonald’s fast food chain was given the prodromalsymptoms before the elderly lady sued them for the spilling ofa very hot cup of coffee on her lap - an event that resulted in a substantial financial loss and tarnished image of thecompany. Numerous consumers had complained about thetemperature of the coffee. The warning light was on, but the company did not pay attention. It would have been much simplerto pick up the signal, or to check the symptom, than facing the consequences.In another case, Jack in the Box, a fast food chain, had several customers suffer intestinal distress after eating at their restaurants. The prodromal symptom was there, but the company took evasive action. Their initial approach was to lookaround for someone to blame. The lack of attention, the evasiveness and the carelessness angered all the constituent groups, including their customers. The unfortunate deaths thatptoms,occurred as a result of the company’s ignoring thesymand the financial losses that followed, caused the company to realize that it would have been easier to manage the crisis directly in the prodromal stage rather than trying to shift theblame.Acute crisis stageA prodromal stage may be oblique and hard to detect. The examples given above, are obvious prodromal, but no action wasWebster’s New Collegiate Dictionary, an acute stage occursacutewhen a symptom “demands urgent attention.” Whether the acutesymptom emerges suddenly or is a transformation of a prodromalstage, an immediate action is required. Diverting funds and other resources to this emerging situation may cause disequilibrium and disturbance in the whole system. It is onlythose organizations that have already prepared a framework forthese crises that can sustain their normal operations. For example, the US public roads and bridges have for a long time reflected a prodromal stage of crisis awareness by showing cracks and occasionally a collapse. It is perhaps in light of the obsessive decision to balance the Federal budget that reacting to the problem has been delayed and ignored. This situation has entered an acute stage and at the time of this writing, it was reported that a bridge in Maryland had just collapsed.The reason why prodromes are so important to catch is thatit is much easier to manage a crisis in this stage. In the caseof most crises, it is much easier and more reliable to take careof the problem before it becomes acute, before it erupts and causes possible complications (Darling et al., 1996). In andamage. However, the losses are incurred. Intel, the largest producer of computer chips in the USA, had to pay an expensiveprice for initially refusing to recall computer chips that proved unreliable o n on certain calculations. The f irmfirm attempted to play the issue down and later learned its lesson. At an acutestage, when accusations were made that the Pentium Chips were not as fast as they claimed, Intel quickly admitted the problem,apologized for it, and set about fixing it (Mitroff et al., 1996). Chronic crisis stageDuring this stage, the symptoms are quite evident and always present. I t isIt is a period of “make or break.” Being the third stage, chronic problems may prompt the company’s management to once and for all do something about the situation. It may be the beginning of recovery for some firms, and a deathknell for others. For example, the Chrysler Corporation was only marginallysuccessful throughout the 1970s. It was not, however, until the company was nearly bankrupt that amanagement shake-out occurred. The drawback at the chronic stage is that, like in a human patient, the company may get used to “quick fixes” and “band “band--aid”approaches. After all, the ailment, the problem and the crisis have become an integral partoverwhelmed by prodromal and acute problems that no time or attention is paid to the chronic problems, or the managers perceive the situation to be tolerable, thus putting the crisison a back burner.Crisis resolutionCrises could be detected at various stages of their development. Since the existing symptoms may be related todifferent problems or crises, there is a great possibility thatthey may be misinterpreted. Therefore, the people in charge maybelieve they have resolved the problem. However, in practicethe symptom is often neglected. In such situations, the symptomwill offer another chance for resolution when it becomes acute,thereby demanding urgent care. Studies indicate that today anincreasing number of companies are issue-oriented and searchfor symptoms. Nevertheless, the lack of experience in resolvinga situation and/or inappropriate handling of a crisis can leadto a chronic stage. Of course, there is this last opportunityto resolve the crisis at the chronic stage. No attempt to resolve the crisis, or improper resolution, can lead to grim consequences that will ultimately plague the organization or even destroy it.It must be noted that an unsolved crisis may not destroy the company. But, its weakening effects can ripple through the organization and create a host of other complications.Preventive effortsThe heart of the resolution of a crisis is in the preventiveefforts the company has initiated. This step, similar to a humanbody, is actually the least expensive, but quite often the mostoverlooked. Preventive measures deal with sensing potential problems (Gonzales-Herrero and Pratt, 1995). Major internalfunctions of a company such as finance, production, procurement, operations, marketing and human resources are sensitive to thesocio-economic, political-legal, competitive, technological, demographic, global and ethical factors of the external environment. What is imminently more sensible and much more manageable, is to identify the processes necessary forassessing and dealing with future crises as they arise (Jacksonand Schantz, 1993). At the core of this process are appropriate information systems, planning procedures, anddecision-making techniques. A soundly-based information system will scan the environment, gather appropriate data, interpret this data into opportunities and challenges, and provide a concretefoundation for strategies that could function as much to avoid crises as to intervene and resolve them.Preventive efforts, as stated before, require preparations before any crisis symptoms set in. Generally strategic forecasting, contingency planning, issues analysis, and scenario analysis help to provide a framework that could be used in avoiding and encountering crises.出处:出处:Toby TobyJ. Kash and John R. Darling . Crisis management: prevention, diagnosis 179-186二、翻译文章标题:危机管理:预防,诊断和干预译文:本文的前提是,如果该公司做好准备得话,危机可以更有效地进行管理。

毕业论文英文文献翻译

毕业论文英文文献翻译

毕业论文英文文献翻译Graduation Thesis: Translation of English LiteratureIntroductionThe process of writing a graduation thesis can be a daunting task, especially when it involves the translation of English literature. Translating literary works requires not only language proficiency but also a deep understanding of the cultural nuances and literary techniques employed by the author. In this article, we will explore the challenges and strategies involved in translating English literature for a graduation thesis.Understanding the Source TextBefore embarking on the translation process, it is crucial to thoroughly understand the source text. This involves a careful reading and analysis of the original work, paying attention to the author's style, tone, and literary devices. By immersing oneself in the source text, the translator gains a deeper understanding of the author's intentions and can effectively convey the essence of the work in the target language.Translating Cultural NuancesOne of the most significant challenges in translating English literature is capturing the cultural nuances embedded in the text. Literature often reflects the social, historical, and cultural context in which it was written. Translating these nuances requires the translator to have a comprehensive knowledge of both the source and target cultures. It is essential to find equivalent expressions, idioms,or metaphors that resonate with the target audience while staying true to the original intent of the author.Maintaining Literary TechniquesEnglish literature is renowned for its rich use of literary techniques such as symbolism, imagery, and wordplay. Translating these techniques poses a considerable challenge as they may not have direct equivalents in the target language. The translator must strive to retain the artistic essence of the original work while adapting it to the linguistic and cultural constraints of the target language. This requires creativity and a keen eye for detail to ensure that the translated work captures the same aesthetic impact as the source text. Adapting to Linguistic DifferencesLanguages differ not only in vocabulary but also in grammatical structures and syntax. Translating English literature into another language often involves adapting the sentence structure and grammar to ensure fluency and coherence in the target language. The translator must strike a delicate balance between staying faithful to the original text and making necessary adjustments to ensure readability and comprehension for the target audience.The Role of the TranslatorA translator of English literature for a graduation thesis is not merely a conduit for transferring words from one language to another. They are responsible for bridging the gap between cultures, enabling readers to experience the essence of the original work in their native language. A successful translator mustpossess a deep appreciation for both the source and target cultures, as well as the literary techniques employed by the author. They must strive to create a translation that captures the spirit of the original work while being accessible and engaging to the target audience.ConclusionTranslating English literature for a graduation thesis is a challenging yet rewarding endeavor. It requires a combination of linguistic proficiency, cultural understanding, and literary sensibility. By carefully analyzing the source text, capturing cultural nuances, maintaining literary techniques, adapting to linguistic differences, and embodying the role of a translator, one can successfully translate English literature for a graduation thesis. Through this process, the translator not only contributes to academic research but also fosters cross-cultural understanding and appreciation for the beauty of literature.。

毕业设计论文外文文献翻译智能交通信号灯控制中英文对照

毕业设计论文外文文献翻译智能交通信号灯控制中英文对照

英语原文Intelligent Traffic Light Controlby Marco Wiering The topic I picked for our community project was traffic lights. In a community, people need stop signs and traffic lights to slow down drivers from going too fast. If there were no traffic lights or stop signs, people’s lives would be in danger from drivers going too fast.The urban traffic trends towards the saturation, the rate of increase of the road of big city far lags behind rate of increase of the car.The urban passenger traffic has already become the main part of city traffic day by day and it has used about 80% of the area of road of center district. With the increase of population and industry activity, people's traffic is more and more frequent, which is unavoidable. What means of transportation people adopt produces pressure completely different to city traffic. According to calculating, if it is 1 to adopt the area of road that the public transport needs, bike needs 5-7, car needs 15-25, even to walk is 3 times more than to take public transits. So only by building road can't solve the city traffic problem finally yet. Every large city of the world increases the traffic policy to the first place of the question.For example,according to calculating, when the automobile owning amount of Shanghai reaches 800,000 (outside cars count separately ), if it distributes still as now for example: center district accounts for great proportion, even when several loop-lines and arterial highways have been built up , the traffic cannot be improved more than before and the situation might be even worse. So the traffic policy Shanghai must adopt , or called traffic strategy is that have priority to develop public passenger traffic of city, narrow the scope of using of the bicycle progressively , control the scale of growth of the car traffic in the center district, limit the development of the motorcycle strictly.There are more municipals project under construction in big city. the influence on the traffic is greater.Municipal infrastructure construction is originally a good thing of alleviating the traffic, but in the course of constructing, it unavoidably influence the local traffic. Some road sections are blocked, some change into an one-way lane, thus the vehicle can only take a devious route . The construction makes the road very narrow, forming the bottleneck, which seriously influence the car flow.When having stop signs and traffic lights, people have a tendency to drive slower andlook out for people walking in the middle of streets. To put a traffic light or a stop sign in a community, it takes a lot of work and planning from the community and the city to put one in. It is not cheap to do it either. The community first needs to take a petition around to everyone in the community and have them sign so they can take it to the board when the next city council meeting is. A couple residents will present it to the board, and they will decide weather or not to put it in or not. If not put in a lot of residents might be mad and bad things could happened to that part of the city.When the planning of putting traffic lights and stop signs, you should look at the subdivision plan and figure out where all the buildings and schools are for the protection of students walking and riding home from school. In our plan that we have made, we will need traffic lights next to the school, so people will look out for the students going home. We will need a stop sign next to the park incase kids run out in the street. This will help the protection of the kids having fun. Will need a traffic light separating the mall and the store. This will be the busiest part of the town with people going to the mall and the store. And finally there will need to be a stop sign at the end of the streets so people don’t drive too fast and get in a big accident. If this is down everyone will be safe driving, walking, or riding their bikes.In putting in a traffic light, it takes a lot of planning and money to complete it. A traffic light cost around $40,000 to $125,000 and sometimes more depending on the location. If a business goes in and a traffic light needs to go in, the business or businesses will have to pay some money to pay for it to make sure everyone is safe going from and to that business. Also if there is too many accidents in one particular place in a city, a traffic light will go in to safe people from getting a severe accident and ending their life and maybe someone else’s.The reason I picked this part of our community development report was that traffic is a very important part of a city. If not for traffic lights and stop signs, people’s lives would be in danger every time they walked out their doors. People will be driving extremely fast and people will be hit just trying to have fun with their friends. So having traffic lights and stop signs this will prevent all this from happening.Traffic in a city is very much affected by traffic light controllers. When waiting for a traffic light, the driver looses time and the car uses fuel. Hence, reducing waiting times before traffic lights can save our European society billions of Euros annually. To make traffic light controllers more intelligent, we exploit the emergence of novel technologies such as communication networks and sensor networks, as well as the use of more sophisticated algorithms for setting traffic lights. Intelligent traffic light control does not only mean thattraffic lights are set in order to minimize waiting times of road users, but also that road users receive information about how to drive through a city in order to minimize their waiting times. This means that we are coping with a complex multi-agent system, where communication and coordination play essential roles. Our research has led to a novel system in which traffic light controllers and the behaviour of car drivers are optimized using machine-learning methods.Our idea of setting a traffic light is as follows. Suppose there are a number of cars with their destination address standing before a crossing. All cars communicate to the traffic light their specific place in the queue and their destination address. Now the traffic light has to decide which option (ie, which lanes are to be put on green) is optimal to minimize the long-term average waiting time until all cars have arrived at their destination address. The learning traffic light controllers solve this problem by estimating how long it would take for a car to arrive at its destination address (for which the car may need to pass many different traffic lights) when currently the light would be put on green, and how long it would take if the light would be put on red. The difference between the waiting time for red and the waiting time for green is the gain for the car. Now the traffic light controllers set the lights in such a way to maximize the average gain of all cars standing before the crossing. To estimate the waiting times, we use 'reinforcement learning' which keeps track of the waiting times of individual cars and uses a smart way to compute the long term average waiting times using dynamic programming algorithms. One nice feature is that the system is very fair; it never lets one car wait for a very long time, since then its gain of setting its own light to green becomes very large, and the optimal decision of the traffic light will set his light to green. Furthermore, since we estimate waiting times before traffic lights until the destination of the road user has been reached, the road user can use this information to choose to which next traffic light to go, thereby improving its driving behaviour through a city. Note that we solve the traffic light control problem by using a distributed multi-agent system, where cooperation and coordination are done by communication, learning, and voting mechanisms. To allow for green waves during extremely busy situations, we combine our algorithm with a special bucket algorithm which propagates gains from one traffic light to the next one, inducing stronger voting on the next traffic controller option.We have implemented the 'Green Light District', a traffic simulator in Java in which infrastructures can be edited easily by using the mouse, and different levels of road usage can be simulated. A large number of fixed and learning traffic light controllers have already been tested in the simulator and the resulting average waiting times of cars have been plotted and compared. The results indicate that the learning controllers can reduce average waiting timeswith at least 10% in semi-busy traffic situations, and even much more when high congestion of the traffic occurs.We are currently studying the behaviour of the learning traffic light controllers on many different infrastructures in our simulator. We are also planning to cooperate with other institutes and companies in the Netherlands to apply our system to real world traffic situations. For this, modern technologies such as communicating networks can be brought to use on a very large scale, making the necessary communication between road users and traffic lights possible.中文翻译:智能交通信号灯控制马克·威宁我所选择的社区项目主题是交通灯。

毕业论文外文翻译范例

毕业论文外文翻译范例

外文原文(一)Savigny and his Anglo-American Disciple s*M. H. HoeflichFriedrich Carl von Savigny, nobleman, law reformer, champion of the revived German professoriate, and founder of the Historical School of jurisprudence, not only helped to revolutionize the study of law and legal institutions in Germany and in other civil law countries, but also exercised a profound influence on many of the most creative jurists and legal scholars in England and the United States. Nevertheless, tracing the influence of an individual is always a difficult task. It is especially difficult as regards Savigny and the approach to law and legal sources propounded by the Historical School. This difficulty arises, in part, because Savigny was not alone in adopting this approach. Hugo, for instance, espoused quite similar ideas in Germany; George Long echoed many of these concepts in England during the 1850s, and, of course, Sir Henry Sumner Maine also espoused many of these same concepts central to historical jurisprudence in England in the 1860s and 1870s. Thus, when one looks at the doctrinal writings of British and American jurists and legal scholars in the period before 1875, it is often impossible to say with any certainty that a particular idea which sounds very much the sort of thing that might, indeed, have been derived from Savigny's works, was, in fact, so derived. It is possible, nevertheless, to trace much of the influence of Savigny and his legal writings in the United States and in Great Britain during this period with some certainty because so great was his fame and so great was the respect accorded to his published work that explicit references to him and to his work abound in the doctrinal writing of this period, as well as in actual law cases in the courts. Thus, Max Gutzwiller, in his classic study Der einfluss Savignys auf die Entwicklung des International privatrechts, was able to show how Savigny's ideas on conflict of laws influenced such English and American scholars as Story, Phillimore, Burge, and Dicey. Similarly, Andreas Schwarz, in his "Einflusse Deutscher Zivilistik im Auslande," briefly sketched Savigny's influence upon John Austin, Frederick Pollock, and James Bryce. In this article I wish to examine Savigny's influence over a broader spectrum and to draw a picture of his general fame and reputation both in Britain and in the United States as the leading Romanist, legal historian, and German legal academic of his day. The picture of this Anglo-American respect accorded to Savigny and the historical school of jurisprudence which emerges from these sources is fascinating. It sheds light not only upon Savigny’s trans-channel, trans-Atlantic fame, but also upon the extraordinarily*M.H.Hoeflich, Savigny and his Anglo-American Disciples, American Journal of Comparative Law, vol.37, No.1, 1989.cosmopolitan outlook of many of the leading American and English jurists of the time. Of course, when one sets out to trace the influence of a particular individual and his work, it is necessary to demonstrate, if possible, precisely how knowledge of the man and his work was transmitted. In the case of Savigny and his work on Roman law and ideas of historical jurisprudence, there were three principal modes of transmission. First, there was the direct influence he exercised through his contacts with American lawyers and scholars. Second, there was the influence he exercised through his books. Third, there was the influence he exerted indirectly through intermediate scholars and their works. Let us examine each mode separately.I.INFLUENCE OF THE TRANSLATED WORKSWhile American and British interest in German legal scholarship was high in the antebellum period, the number of American and English jurists who could read German fluently was relatively low. Even those who borrowed from the Germans, for instance, Joseph Story, most often had to depend upon translations. It is thus quite important that Savigny’s works were amongst the most frequently translated into English, both in the United States and in Great Britain. His most influential early work, the Vom Beruf unserer Zeitfur Rechtsgeschichte und Gestzgebung, was translated into English by Abraham Hayward and published in London in 1831. Two years earlier the first volume of his History of Roman Law in the Middle Ages was translated by Cathcart and published in Edinburgh. In 1830, as well, a French translation was published at Paris. Sir Erskine Perry's translation of Savigny's Treatise on Possession was published in London in 1848. This was followed by Archibald Brown's epitome of the treatise on possession in 1872 and Rattigan's translation of the second volume of the System as Jural Relations or the Law of Persons in 1884. Guthrie published a translation of the seventh volume of the System as Private International Law at Edinburgh in 1869. Indeed, two English translations were even published in the far flung corners of the British Raj. A translation of the first volume of the System was published by William Holloway at Madras in 1867 and the volume on possession was translated by Kelleher and published at Calcutta in 1888. Thus, the determined English-speaking scholar had ample access to Savigny's works throughout the nineteenth century.Equally important for the dissemination of Savigny's ideas were those books and articles published in English that explained and analyzed his works. A number of these must have played an important role in this process. One of the earliest of these is John Reddie's Historical Notices of the Roman law and of the Progress of its Study in Germany, published at Edinburgh in 1826. Reddie was a noted Scots jurist and held the Gottingen J.U.D. The book, significantly, is dedicated to Gustav Hugo. It is of that genre known as an external history of Roman law-not so much a history of substantive Roman legal doctrine but rather a historyof Roman legal institutions and of the study of Roman law from antiquity through the nineteenth century. It is very much a polemic for the study of Roman law and for the Historical School. It imparts to the reader the excitement of Savigny and his followers about the study of law historically and it is clear that no reader of the work could possibly be left unmoved. It is, in short, the first work of public relations in English on behalf of Savigny and his ideas.Having mentioned Reddie's promotion of Savigny and the Historical School, it is important to understand the level of excitement with which things Roman and especially Roman law were greeted during this period. Many of the finest American jurists were attracted-to use Peter Stein's term-to Roman and Civil law, but attracted in a way that, at times, seems to have been more enthusiastic than intellectual. Similarly, Roman and Civil law excited much interest in Great Britain, as illustrated by the distinctly Roman influence to be found in the work of John Austin. The attraction of Roman and Civil law can be illustrated and best understood, perhaps, in the context of the publicity and excitement in the English-speaking world surrounding the discovery of the only complete manuscript of the classical Roman jurist Gaius' Institutes in Italy in 1816 by the ancient historian and German consul at Rome, B.G. Niebuhr. Niebuhr, the greatest ancient historian of his time, turned to Savigny for help with the Gaius manuscript (indeed, it was Savigny who recognized the manuscript for what it was) and, almost immediately, the books and journals-not just law journals by any means-were filled with accounts of the discovery, its importance to legal historical studies, and, of course, what it said. For instance, the second volume of the American Jurist contains a long article on the civil law by the scholarly Boston lawyer and classicist, John Pickering. The first quarter of the article is a gushing account of the discovery and first publication of the Gaius manuscript and a paean to Niebuhr and Savigny for their role in this. Similarly, in an article published in the London Law Magazine in 1829 on the civil law, the author contemptuously refers to a certain professor who continued to tell his students that the text of Gaius' Institutes was lost for all time. What could better show his ignorance of all things legal and literary than to be unaware of Niebuhr's great discovery?Another example of this reaction to the discovery of the Gaius palimpsest is to be found in David Irving's Introduction to the Study of the Civil Law. This volume is also more a history of Roman legal scholarship and sources than a study of substantive Roman law. Its pages are filled with references to Savigny's Geschichte and its approach clearly reflects the influence of the Historical School. Indeed, Irving speaks of Savigny's work as "one of the most remarkable productions of the age." He must have been truly impressed with German scholarship and must also have been able to convince the Faculty of Advocates, forwhom he was librarian, of the worth of German scholarship, for in 1820 the Faculty sent him to Gottingen so that he might study their law libraries. Irving devotes several pages of his elementary textbook on Roman law to the praise of the "remarkable" discovery of the Gaius palimpsest. He traces the discovery of the text by Niebuhr and Savigny in language that would have befitted an adventure tale. He elaborates on the various labors required to produce a new edition of the text and was particularly impressed by the use of a then new chemical process to make the under text of the palimpsest visible. He speaks of the reception of the new text as being greeted with "ardor and exultation" strong words for those who spend their lives amidst the "musty tomes" of the Roman law.This excitement over the Verona Gaius is really rather strange. Much of the substance of the Gaius text was already known to legal historians and civil lawyers from its incorporation into Justinian's Institutes and so, from a substantive legal perspective, the find was not crucial. The Gaius did provide new information on Roman procedural rules and it did also provide additional information for those scholars attempting to reconstruct pre-Justinianic Roman law. Nevertheless, these contributions alone seem hardly able to justify the excitement the discovery caused. Instead, I think that the Verona Gaius discovery simply hit a chord in the literary and legal community much the same as did the discovery of the Rosetta Stone or of Schliemann’s Troy. Here was a monument of a great civilization brought newly to light and able to be read for the first time in millenia. And just as the Rosetta Stone helped to establish the modern discipline of Egyptology and Schliemann's discoveries assured the development of classical archaeology as a modern academic discipline, the discovery of the Verona Gaius added to the attraction Roman law held for scholars and for lawyers, even amongst those who were not Romanists by profession. Ancillary to this, the discovery and publication of the Gaius manuscript also added to the fame of the two principals involved in the discovery, Niebuhr and Savigny. What this meant in the English-speaking world is that even those who could not or did not wish to read Savigny's technical works knew of him as one of the discoverers of the Gaius text. This fame itself may well have helped in spreading Savigny's legal and philosophical ideas, for, I would suggest, the Gaius "connection" may well have disposed people to read other of Savigny's writings, unconnected to the Gaius, because they were already familiar with his name.Another example of an English-speaking promoter of Savigny is Luther Stearns Cushing, a noted Boston lawyer who lectured on Roman law at the Harvard Law School in 1848-49 and again in 1851- 1852.Cushing published his lectures at Boston in 1854 under the title An Introduction to the Study of Roman Law. He devoted a full chapter to a description of the historical school and to the controversy betweenSavigny and Thibaut over codification. While Cushing attempted to portray fairly the arguments of both sides, he left no doubt as to his preference for Savigny's approach:The labors of the historical school have established an entirely new and distinct era in the study of the Roman jurisprudence; and though these writers cannot be said to have thrown their predecessors into the shade, it seems to be generally admitted, that almost every branch of the Roman law has received some important modification at their hands, and that a knowledge of their writings, to some extent, at least, is essentially necessary to its acquisition.译文(一)萨维尼和他的英美信徒们*M·H·豪弗里奇弗雷德里奇·卡尔·冯·萨维尼出身贵族,是一位出色的法律改革家,也是一位倡导重建德国教授协会的拥护者,还是历史法学派的创建人之一。

英文文献全文翻译

英文文献全文翻译

英文文献全文翻译全文共四篇示例,供读者参考第一篇示例:English literature has a long and rich history, with countless works that have been translated into various languages around the world. From ancient epics like Beowulf and The Odyssey to modern classics like To Kill a Mockingbird and Harry Potter, English literature has captured the hearts and minds of readers for centuries.第二篇示例:The world of academic research is vast and ever-growing, with a wealth of knowledge and information being produced every day. One important aspect of this research is the publication of English-language academic articles. These articles cover a wide range of topics across various fields, from science and technology to social sciences and humanities.第三篇示例:English literature is a treasure trove of human culture and knowledge. The literary works of great writers from around theworld offer insights into the human experience, emotions, and imagination. Through the process of translation, these literary masterpieces are made accessible to a global audience, allowing people from different cultures and backgrounds to connect and appreciate the beauty of language and storytelling.第四篇示例:Abstract:Introduction:English literature holds a prominent position in the field of international academia, with a vast number of research articles, books, and journals being published in English. For researchers and scholars in non-English speaking countries, access to English literature is essential for staying up-to-date with the latest developments in their respective fields. However, understanding and interpreting English texts can present significant challenges due to linguistic, cultural, and contextual differences.Challenges in Translating English Literature:。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

英文翻译英语原文:. Introducing ClassesThe only remaining feature we need to understand before solving our bookstore problem is how to write a data structure to represent our transaction data. In C++ we define our own data structure by defining a class. The class mechanism is one of the most important features in C++. In fact, a primary focus of the design of C++ is to make it possible to define class types that behave as naturally as the built-in types themselves. The library types that we've seen already, such as istream and ostream, are all defined as classesthat is,they are not strictly speaking part of the language.Complete understanding of the class mechanism requires mastering a lot of information. Fortunately, it is possible to use a class that someone else has written without knowing how to define a class ourselves. In this section, we'll describe a simple class that we canuse in solving our bookstore problem. We'll implement this class in the subsequent chapters as we learn more about types,expressions, statements, and functionsall of which are used in defining classes.To use a class we need to know three things:What is its name?Where is it defined?What operations does it support?For our bookstore problem, we'll assume that the class is named Sales_item and that it is defined in a header named Sales_item.h.The Sales_item ClassThe purpose of the Sales_item class is to store an ISBN and keep track of the number of copies sold, the revenue, and average sales price for that book. How these data are stored or computed is not our concern. To use a class, we need not know anything about how it is implemented. Instead, what we need to know is what operations the class provides.As we've seen, when we use library facilities such as IO, we must include the associated headers. Similarly, for our own classes, we must make the definitions associated with the class available to the compiler. We do so in much the same way. Typically, we put the class definition into a file. Any program that wants to use our class must include that file.Conventionally, class types are stored in a file with a name that, like the name of a program source file, has two parts: a file name and a file suffix. Usually the file name is the same as the class defined in the header. The suffix usually is .h, but some programmers use .H, .hpp, or .hxx. Compilers usually aren't picky about header file names, but IDEs sometimes are. We'll assume that our class is defined in a file named Sales_item.h.Operations on Sales_item ObjectsEvery class defines a type. The type name is the same as the name of the class. Hence, our Sales_item class defines a type namedSales_item. As with the built-in types, we can define a variable of a class type. When we write "Sales_item item" we are saying that item is an object of type Sales_item. We often contract the phrase "an object of type Sales_item" to"aSales_ item object" or even more simply to "a Sales_item."In addition to being able to define variables of type Sales_item, we can perform the following operations on Sales_item objects:Use the addition operator, +, to add two Sales_items,Use the input operator, << to read a Sales_item object,Use the output operator, >> to write a Sales_item object,Use the assignment operator, =, to assign one Sales_item object to another,Call the same_isbn function to determine if two Sales_items refer to the same book.Classes are central to most C++ programs: Classes let us define our own types that are customizedfor the problems we need to solve, resulting in applications that are easier to write and understand.Well-designed class types can be as easy to use as the built-in types.A class defines data and function members: The data members store the state associated with objectsof the class type, and the functions perform operations that give meaning to the data. Classeslet us separate implementation and interface. The interface specifies the operations that the classsupports. Only the implementor of the class need know or care about the details of the implementation. This separation reduces the bookkeeping aspects that make programming tedious anderror-prone.Class types often are referred to as abstract data types. An abstract data type treats the data(state) and operations on that state as a single unit. We can think abstractly about what the classd oes, rather than always having to be aware of how the class operates. Abstract data types arefundamental to both object-oriented and generic programming.Data abstraction is a programming (and design) technique that relies on the separation of interfaceand implementation. The class designer must worry about how a class is implemented, but programmersthat use the class need not know about these details. Instead, programmers who use a type need to know only the type's interface; they can think abstractly about what the type does rather than concretely about how the type works.Encapsulation is a term that describes the technique of combining lower-level elements to forma new, higher-level entity. A function is one form of encapsulation: The detailed actions performedby the function are encapsulated in the larger entity that is the function itself. Encapsulated elements hide the details of their implementationwe may call a function but have no access to the statements that it executes. In the same way, a class is an encapsulated entity: It represents an aggregation of several members, and most (well-designed) class types hide the members that implement the type.If we think about the library vector type, it is an example of both data abstraction andencapsulation. It is abstract in that to use it, we think about its interfaceabout the operations that it can perform. It is encapsulated because we have no access to the details of how the type is representated nor to any of its implementation artifacts. An array, on the other hand, is similar in concept to a vector but is neither abstract nor encapsulated. We manipulate an array directly by accessing the memory in which the array is stored.Not all types need to be abstract. The library pair class is a good example of a useful, well-designed class that is concrete rather than abstract. A concrete class is a class that exposes, rather than hides, its implementation.Some classes, such as pair, really have no abstract interface. The pair type exists to bundle two data members into a single object. There is no need or advantage to hiding the data members. Hiding the members in a class like pair would only complicate the use of the type.Even so, such types often have member functions. In particular, it is a good idea for any class that has data members of built-in or compound type to define constructor(s) to initialize those members. The user of the class could initialize or assign to the data members but it is less error-prone for the class to do so.Programmers tend to think about the people who will run their applications as "users." Applicationsare designed for and evolve in response to feedback from those who ultimately "use" the applications. Classes are thought of in a similar way: A class designer designs and implements a class for "users" of that class. In this case, the "user" is a programmer, not the ultimate user of the application.Authors of successful applications do a good job of understanding and implementing the needs ofthe application's users. Similarly, well-designed, useful classes are designed with a close attention to the needs of the users of the class.In another way, the division between class designer and class user reflects the division betweenusers of an application and the designers and implementors of the application. Users care only if the application meets their needs in a cost-effective way. Similarly, users of a class care only about its interface. Good class designers define a class interface that is intuitive and easy to use. Users care about the implementation only in so far as the implementation affects their use of the class. If the implementation is too slow or puts burdens on users of the class, then the users must care. In well-designed classes, only the class designer worries about the implementation.In simple applications, the user of a class and the designer of the class might be one and the same person. Even in such cases, it is useful to keep the roles distinct. When designing the interface to a class, the class designer should think about how easy it will be to use the class. When using the class, the designer shouldn't think about how the class works.When referring to a "user," the context makes it clear which kind of user is meant. If we speak of "user code" or the "user" of the Sales_item class, we mean a programmer whois using a class in writing an application. If we speak of the "user" of the bookstore application, we mean the manager of the store who is running the application.Data abstraction and encapsulation provide two important advantages:1.Class internals are protected from inadvertent user-level errors, which might corrupt the state of the object.2.The class implementation may evolve over time in response to changing requirements or bug reports without requiring change in user-level code.By defining data members only in the private section of the class, the class author is free to make changes in the data. If the implementation changes, only the class code needs to be examined to see what affect the change may have. If data are public, then any function that directly accesses the data members of the old representation might be broken. It would be necessary to locate and rewrite all those portions of code that relied on the old pesentation before the program could be used again.Similarly, if the internal state of the class is private, then changes to the member data can happen in only a limited number of places. The data is protected from mistakes that users might introduce. If there is a bug that corrupts the object's state, the places to look for the bug are localized: When data are private, only a member function could be responsible for the error. The search for the mistake is limited, greatly easing the problems of maintenance and program correctness.If the data are private and if the interface to the member functions does not change, then user functions that manipulate class objects require no change.Because changing a class definition in a header file effectively changes the text of every source file that includes that header, code that uses a class must be recompiled when the class changes.Classes are the most fundamental feature in C++. Classes let us define new types that are tailored to our own applications, making our programs shorter and easier to modify.Data abstractionthe ability to define both data and function membersand encapsulationthe ability to protect class members from general accessare fundamental to classes. Member functions define the interface to the class. We encapsulate the class by making the data and functions used by the implementation of a class private.Classes may define constructors, which are special member functions that control how objects of the class are initialized. Constructors may be verloaded. Every constructor should initialize every data member. Constructors should use a constructor initializer list to initialize the data members. Initializer lists are lists of namevalue pairs where the name is a member and the value is an initial value for that member.Classes may grant access to their nonpublic members to other classes or functions. A class grants access by making the class or function a friend.Classes may also define mutable or static members. A mutable member is a data member that is never const; its value may be changed inside a const member function. Astatic member can be either function or data; static members exist independently of the objects of the class type.Copy ControlEach type, whether a built-in or class type, defines the meaning of a (possibly empty) set of operations on objects of that type. We can add two int values, run size on a vector, and so on. These operations define what can be done with objects of the given type.Each type also defines what happens when objects of the type are created. Initialization of objects of class type is defined by constructors. Types also control what happens when objects of the type are copied, assigned, or destroyed. Classes control these actions through special member functions: the copy constructor, the assignment operator, and the destructor. This chapter covers these operations.When we define a new type, we specifyexplicitly or implicitlywhat happens when objects of that type are copied, assigned, and destroyed. We do so by defining special members: the copy constructor, the assignment operator, and the destructor. If we do not explicitly define the copy constructor or the assignment operator, the compiler will (usually) define them for us.The copy constructor is a special constructor that has a single parameter that is a (usually const) reference to the class type. The copy constructor is used explicitly when we define a new object and initialize it from an object of the same type. It is used implicitly when we pass or return objects of that type to or from functions.Collectively, the copy constructor, assignment operator, and destructor are referred to as copy control. The compiler automatically implements these operations, but the class may define its own versions.Copy control is an essential part of defining any C++ class. Programmers new to C++ are often confused by having to define what happens when objects arecopied, assigned, or destroyed. This confusion is compounded because if we do not explicitly define these operations, the compiler defines them for usalthough they might not behave as we intend.Often the compiler-synthesized copy-control functions are finethey do exactly the work that needs to be done. But for some classes, relying on the default definitions leads to disaster. Frequently,the most difficult part of implementing the copy-control operations is recognizing when we need to override the default versions. One especially common case that requires the class to define its own the copy-control members is if the class has a pointer member.The Copy ConstructorThe constructor that takes a single parameter that is a (usually const) reference to an object of the class type itself is called the copy constructor. Like the default constructor, the copy constructor can be implicitly invoked by the compiler. The copy constructor is used to:1.Explicitly or implicitly initialize one object from another of the same type;2.Copy an object to pass it as an argument to a function;3.Copy an object to return it from a function;4.Initialize the elements in a sequential container;5.Initialize elements in an array from a list of element initializers.Forms of Object DefinitionRecall that C++ supports two forms of initialization (Section 2.3.3, p. 48): direct and copy.Copy-initialization uses the = symbol, and direct-initialization places the initializer in parentheses.The copy and direct forms of initialization, when applied to objects of class type, are subtly different. Direct-initialization directly invokes the constructor matched by the arguments. Copy-initialization always involves the copy constructor. Copy-initialization first uses the indicated constructor to create a temporary object (Section 7.3.2, p. 247). It then uses the copy constructor to copy that temporary into the one we are creating: string null_book = "9-999-99999-9"; // copy-initializationstring dots(10, '.'); // direct-initializationstring empty_copy = string(); // copy-initializationstring empty_direct; // direct-initializationFor objects of class type, copy-initialization can be used only when specifying a single argument or when we explicitly build a temporary object to copy.When dots is created, the string constructor that takes a count and a character is called and directly initializes the members in dots. To create null_book, the compiler first creates a temporary by invoking the string constructor that takes a C-style character string parameter. The compiler then uses the string copy constructor to initialize null_book as a copy of that temporary.The initialization of empty_copy and empty_direct both call the string default constructor. In the first case, the default constructor creates a temporary object, which is then used by the copy constructor to initialize empty_copy. In the second case, the default constructor is run directly on empty_direct.The copy form of initialization is primarily supported for compatibility with C usage. When it can do so, the compiler is permitted (but not obligated) to skip the copy constructor and create the object directly.Usually the difference between direct- or copy-initialization is at most a matter of low-level optimization. However, for types that do not support copying, or when using a constructor that is nonexplicit (Section 12.4.4, p. 462) the distinction can be essential: ifstream file1("filename"); // ok: direct initializationifstream file2 = "filename"; // error: copy constructor is private// This initialization is okay only if// the Sales_item(const string&) constructor is not explicitSales_item item = string("9-999-99999-9");The initialization of file1 is fine. The ifstream class defines a constructor that can be called with a C-style string. That constructor is used to initialize file1.The seemingly equivalent initialization of file2 uses copy-initialization. That definition is not okay. We cannot copy objects of the IO types (Section 8.1, p. 287), so we cannot use copy-initialization on objects of these types.Whether the initialization of item is okay depends on which version of our Sales_item class we are using. Some versions define the constructor that takes a string as explicit. If the constructor is explicit, then the initialization fails. If the constructor is not explicit, then the initialization is fine.If a class does not define one or more of these operations, the compiler will define them automatically. The synthesized operations perform memberwise initialization, assignment, or destruction: Taking each member in turn, the synthesized operation does whatever is appropriate to the member's type to copy, assign, or destroy that member. If the member is a class type, the synthesized operation calls the corresponding operation for that class (e.g., the copy constructor calls the member's copy constructor, the destructor calls its destructor, etc.). If the member is a built-in type or a pointer, the member is copied or assigned directly; the destructor does nothing to destroy members of built-in or pointer type. If the member is an array, the elements in the array are copied, assigned, or destroyed in a manner appropriate to the element type.中文译文类的简介解决书店问题之前,还需要弄明白如何编写数据结构来表示交易数据。

相关文档
最新文档