电子信息工程外文翻译外文文献英文文献

合集下载

电子信息工程 外文翻译 外文文献 英文文献 文献翻译

电子信息工程 外文翻译 外文文献 英文文献 文献翻译

Technology and Application of Fieldbus Control System ---------IntelligentEquipment & Measurement And Control System Based on DeviceNetPromoted by the new technological revolution that automation control technology is tending digitization and internet in the field of automation industry, Shanghai Aton Electric Co., Ltd. developed Intelligent Equipment & Measurement And Control System Based on DeviceNet as a high and new technology industrialization model project. It was a state hi-tech development project of 2000 and was approved by the State Committee of Technology. Shanghai Aton Electric Co., Ltd. constructed production line of intelligent controller of pump and valve, relying on Shanghai Electric (Group) Corporation; constructed measurement and control system FCS R&D center of intelligent controller of pump and valve and built up mass production R&D basis, cooperating with Shanghai Jiaotong University and Shanghai University; constructed FCS remote diagnosis and service center of intelligent controller of pump and valve; constructed FCS training center of intelligent controller of pump and valve; founded mass production R&D basis along with the Rockwell Laboratory of Shanghai Jiaotong University and CIMS Center.1 Summary(1)Fieldbus control system is a system applied to field of production and microcomputerized measurement control equipment to realize both-way multinode serial communications. It is also called low-level control network for open, digital and multiplespot communications.Application: Flow Control System of Manufacturing; Process Control System; Traffic Control & Management; Building Automation. Features: Fieldbus control system is low-level low-bandwidth digital communication and control network in industrial system as well as open system connecting microcomputerized appearance. Intelligent instrument and controller are equal to microcomputer. They make up network with Fieldbus control system as the links to complete digital communication and other tasks.(2)Difference between FCS and DCS,FCS is updated control system after DCS integrated with digital control system and distributing control system. It solves the problem that in traditional DCS, devices made by different manufacturers cannot be connected. They can't realize exchange and operation to organize an network system with wider range of information sharing. It conquers the defect that special closed system for network should be used for communication in DCS to realize various functions of integrated automation. It turns the distributing structure combiningconcentration with deconcentration in DCS into new-type full distributing structure. It releases the control function to the field thoroughly and makes it possible to realize basic control function by means of fieldbus equipment itself. FCS breaks the traditional structure form of control system. The traditional analog control system adopts one-to-one equipment tie-wire and puts up connections respectively according to control loop. FCS adopts intelligent field equipment to place the control module, all input/output modules that used to be in the control chamber of DCS into field equipment. Since field equipment has ability to communicate, the field measuring and transferring instruments can transfer signals to actuating mechanism such as valve directly. Its control function can be fulfilled directly on the spot independent of the computer or control meter in the control chamber, which realizes thorough decentralized control.FCS adopts digital signals to replace analog signals so that multiple signals (including multiple operating parameter values, device status and failure information) can be transferred on a pair of cables. Meanwhile, it can give power supply to several devices. No switched block for analog/digital or digital/analog is needed besides fieldbus.(3)Characteristics of FCS●Open System;●Interoperability;● replace ability of devices made by different manufacturers.● Intelligentize and Autonomy;●Field equipment completing basic functions of automatic control.●Decentralized System Structure;●Field Adaptability;●Relatively Strong Interference Killing Feature and Safety●Intelligentized local equipment can save investment and quantity of hardware●Saving installation expenses and cables●Saving daily maintenance expenses●Enhancing accuracy and reliability of system●Enhancing initiativeness of system integration for users(4)Development Background and Trend of Fieldbus Control System,With the rapid development of computer and computer network, FCS has been rapidly developed as the interlinked communication network between the field intelligentdevices in the field of process automation, building and traffic etc. Because FCS meets the needs that industrial control system is developing in the way of decentralization, network and intellectualized, it has become the focus of global industrial automation and been universally concerned by the whole world. FCS has caused great revolutions on the aspects of system structure and function system for the current production of automation instrument, distributing control system and programmable controller. It is predicted that FCS will be the general trends in a very long time in the future fore sure.2 APPLICATION OF RELAYThe product reliability generally refers to the operating reliability. It is defined as: the ability of accomplishing the specified function under prescribed conditions and in prescribed time. It consists of intrinsic reliability and application reliability. The intrinsic reliability is determined by product designing and manufacturing technique, and the application reliability is concerned with the correct application of users and the services provided by the manufacturer before and after selling. When using relay, the user should pay attention to the following items.2.1 Coil applied voltageIt is best to choose the coil applicative voltage according to the rated voltage in design, or choose the voltage according to the temperature rising curve. Using any coil voltage that is less than the rated voltage will affect the operation of the relay. The coil operating voltage refers to the voltage that is applied between the coil terminals. The voltage value between the two terminals must be guaranteed, especially when using enlargement circuit to energize the coil. Whereas, it will also affect the relay characteristics if the applied voltage exceeds the highest rated voltage. Exorbitant voltage will bring exorbitant coil temperature rising, especially in high temperature ambient. Exorbitant temperature rising will damage the insulating material and affect the working safety of relay. For magnetic latching relay, energizing (or return) pulse width should not less than 3 times of the operating (or return) time, otherwise, the relay would be left on the middle-position state. When using solid-state components to energize the coil, the components dielectric strength must be above 80V, and the leakage of current must be as little as possible to ensure the relay to release.Energizing power source: Under 110% of the rated current, the adjusting ratio of the power source is less than 10% (or the output impedance is less than 5% of the coilimpedance), the wave voltage of the DC power source is less than 5%. The AC wave is sine wave; the waviness coefficient is between 0.95~1.25; wave distortion is within ±10%; the frequency change is within±1Hz or ±1% of the specified frequency (choosing the bigger value). The output power should not less than coil power consumption.2.2 Transient suppressionAt the moment when the coil power is stopped, peak-inverse voltage that is more than 30 times of the coil rated voltage is produced on the coil, which is harmful to the electronic circuit. Generally, the peak-inverse voltage is suppressed by transient suppression(cutting-peak)diode or resistance to limit the peak-inverse voltage within 50V. But the diode in parallel connection will delay3~5 times of the release time. If the request of the release time is high, a suitable resistance in series can be putted with and at one end of the diode.The power supply to relays in parallel connection and series connection,When several relays in parallel connection are supplied, the relay that the peak-inverse voltage is higher will release power to the relays that the peak-inverse voltage is lower. The release time of the relay will delay. So the relays in parallel connection should be controlled separately to eliminate mutual influence.The relays with different coil resistance and power can’t be used in series, otherwise, t he relay that the coil current is higher in the series circuit can’t operate reliably. Only the relays of the same specification can be used in series, but the peak-inverse voltage will be increased and the peak-inverse voltage should be suppressed. Resistance in series can be used to bear the part voltage that exceeds the rated voltage of the coil according to the ratio of the divided voltage.2.2.1 Contact loadThe load applied to the contacts should be accordant to the rated load and characteristics of the contacts. A load that is not applied according to the rated value range will cause problem. The relay that is only suitable for DC load can’t be used in AC occasions. The relay that can switch 10A load can’t always reliably operate in low level load (less than 10m A×6A) or in dry circuit occasions. The relay that can switch single-phase AC power source isn’t always suitable to switch two single-phase AC loads that aren’t synchronous; the relay that is only specif ied to switch the load of AC 50Hz(or 60Hz)can’t be used to switch AC load of 400Hz.2.2.2 Parallel and series connection of contactsThe contacts used in parallel connection can’t increase the load current, because the operating times of several sets of contacts are absolutely different; that is to say, there is still only a set of contacts switching the increased load. This would damage or weld the contacts and make the contacts can’t close or open. The parallel connection of the contacts can decrease t he misplay of “break”. But the parallel connection of the contacts would increase the misplay of “freezing”. Because the misplay of “break” is the main pattern of invalidation of contacts, the parallel connection can increase the reliability and can be used on the pivotal part of equipments. But the applied voltage should not exceed the highest operating voltage of the coil and should not less than 90% of the rated voltage, otherwise, the coil life and the applicative reliability would be damaged. The series connection of the contacts can increase the load voltage. The amount of the contact sets is equal to the times that the load voltage can be increased. The series connection of contacts can decrease the misplay of “freezing”, but it would increase the mis play of “break”. Anyway, when using redundant technology to increase the operating reliability of contacts, the characteristics and size and the failure mode of load must be considered.2.2.3 Switching speedThe switching speed should not exceed the reciprocal of 10 times of the sum of operating and release time (times/s), otherwise, the contacts can’t switch on steadily. Magnetic latching should be used under the pulse width specified in the technique criterion, or the coil may be damaged.3 RVT DISTRIBUTING ELECTRICITY INTEGRATE TESTAPPARATUSBasic functionMeasure asupervision:Three mutually electric voltage/electric current/ power factor with a great achievement/ power without a great achievement/electricity with a great achiverment/electricity/homophonic-wave electric voltage/ homophonic-wave electric/ current Day electric voltage/ electric current biggest and minimum value/fire for the failure Electric voltage over top, the limit/ lack mutually of time homophonic-wave analyzes is up to 13 times.The data is stored for 2 months.The data communicateRS232/485 communicating connect,The way in communicating can adopt the spot communicating or the long range communicating.,Possible to settle invoke orthe solid hour invokes, responding to the modification and long ranges control of the parameter.Without power compensationTaking physics measures as the power factor without a great achievement,the power factor with a great achievement and the dull place without power compensation;Y+ the combination method of the △,Y+ the △connects the line method,Y+ △ , Y, the △ connects the line method.Data managementAccording to WINDOW98 operation terrace, data in communication automatically reports born statement, curve and pillar form diagrams.Circulation of the protectionWhen the charged barbed wire net of mutually electric voltage over press, owe to press, and a super limit hour fast cut off in expiation of capacitor,When the charged barbed wire net lacks mutually or super limit in the preface of zero hour fast cut off in expiation of capacitor.screen manifestationChinese operation interface,Adopt 128*64 the back light liquid crystal display.The solid hour shows the charged barbed wire net relevant parameter.view manifestation to place the parameter.现场总线控制系统的技术和应用随着新的科学技术革命的出现,在自动化工业领域中,自动控制技术的发展趋向于数字化和网络互联化。

电子信息工程外文翻译 外文文献 英文文献

电子信息工程外文翻译 外文文献 英文文献

电子信息工程电路编程中的AT89C51单片机译文标题电路编程中的AT89C51单片机AT89C51 In-Circuit Programming 原文标题作者Robert W.Sparks等译名国籍美国斯帕克等W.罗伯特Atmel Corporation原文出处摘要本应用说明的是ATMEL公司AT89C51的电路可编程闪存的微控制器。

为在电路可编程AT89C51的应用提出了与应用程序相关的例子,它的修改要求支持在线编程。

这种方法显示在该应用程序中的AT89C51单片机可通过商业电话线远程改编。

本应用笔记中描述的电路,仅支持5伏电压下编程,需要使用一个AT89C51-XX-5。

标准A T89C51的需要12伏电压。

该应用程序的软件可从ATMEL下载。

总论当不在进行程序设计的时候,在电路设计中的AT89C51设计将变得透明化。

在编程期间必须重视EA/VPP这一脚。

在不使用外部程序存储器的应用程序中,这脚可能会永久接到VCC。

应用程序使用的外部程序存储器要求这一脚为低电平才能正常运行。

RST在编程期间必须为高电平。

应该提供一种方法使得电路通入电源以后,使RST代替主要的复位电路起到复位的作用。

在编程过程中,PSEN必须保持低电平,在正常运行期间绝不能使用。

ALE/ PRO在编程过程中输出低电平,在正常运行期间绝不能使用在编程过程中AT89C5I / 端口是用于模式应用程序,地址和数据选择的,可能要该控制器从应用的电路隔离。

如何做到这一点取决于应用程序输入端在编程过程中,控制器必须与应用电路的信号来源隔离。

带有三个输出状态的缓冲区在应用程序之间插入电路和控制器,同时在编程时缓冲区输出三种状态。

一个多路复用器用于信号源之间进行选择,适用于任何一方的应用电路或编程控制器电路的信号输出端如果应用的电路可以允许端口在编程过程中的状态变化,则不需要改变电路。

如果应电路的状态,必须事先在编程过程中的保持不变,可能在控制器和应用电路中插入锁存。

电子信息工程专业毕业论文中英文资料外文翻译文献

电子信息工程专业毕业论文中英文资料外文翻译文献

毕业论文毕业论文中英文对照翻译中英文对照翻译院(系部) 电气工程与自动化 专业名称 电子信息工程Infrared Remote Control SystemAbstractRed outside data correspondence the technique be currently within the scope of world drive extensive usage of a kind of wireless conjunction technique,drive numerous hardware and software platform support. Red outside the transceiver product have cost low, small scaled turn, the baud rate be quick, point to point SSL, be free from electromagnetism thousand Raos etc.characteristics, can realization information at dissimilarity of the product fast, convenience, safely exchange and transmission, at short distance wireless deliver aspect to own very obvious of advantage.Along with red outside the data deliver a technique more and more mature, the cost descend, red outside the transceiver necessarily will get at the short distance communication realm more extensive of application.The purpose that design this system is transmit customer’s operation information with infrared rays for transmit media, then demodulate original signal with receive circuit. It use coding chip to modulate signal and use decoding chip to demodulate signal. The coding chip is PT2262 and decoding chip is PT2272. Both chips are made in Taiwan. Main work principle is that we provide to input the information for the PT2262 with coding keyboard. The input information was coded by PT2262 and loading to high frequent load wave whose frequent is 38 kHz, then modulate infrared transmit dioxide and radiate space outside when it attian enough power. The receive circuit receive the signal and demodulate original information. The original signal was decoded by PT2272, so as to drive some circuit to accomplish customer’s operation demand.Keywords:Infrare dray;Code;Decoding;LM386;Redoutside transceiver1 Introduction1.1 research the background and significanceInfrared Data Communication Technology is the world wide use of a wireless connection technology, by the many hardware and software platforms supported. Is a data through electrical pulses and infrared optical pulse switch between the wireless data transceiver technology.Infrared transceiver products with low cost, small, fast transmission rate, the point-to-point transmission security, not subject to electromagnetic interference and other characteristics that can be achieved between the different products, rapid, convenient and safe exchange and transmission, In short distance wireless transmission have a very distinct advantage.Infrared transceiver products in the portable product of a great role. At present, the world's 150 million piece of equipment used infrared technology in electronic products and industrial equipment. medical equipment and other fields widely used. For example, 95% of the notebook computers on the installation of infrared transceiver interface the majority of the cell phone is also the allocation of infrared transceiver interface. With the exchange of quantitative data, infrared data communications will enable cell phone data transmission more convenient. With infrared data transmission technology matures, perfect, low costs, Infrared Transceiver in short distance communications will be more widely applied.This chapter first describes the infrared transceiver IC design issues to the background and significance. then briefed the infrared data communications technology features and applications, and infrared transceiver product characteristics, domestic and international situation and development trend of the last under infrared remote transceiver system in practical application to establish a task of design orientation.1.2 Infrared Remote ControlTransceiver SystemInfrared remote control system is divided into single-channel and multi-channel remote control. Only a command signal transmission channel, called single-channel remote control system; with more than two instructions signal transmission channel known as a multi-channel remote control system. Relatively simple single-channel remote control, in general, only a launcher directive Key receivers and only one circuit implementation. While in the receiving circuit to add more stable memory circuits that can be activated commands to launch a number of key, so that the receiver circuit multistable memory circuit repeatedly to change the state, to realize many of the functional control, But such a state of change is the order. If we are to achieve an arbitrary control, resort to the use of multi-channel remote control system. Multi-channel remote control can be realized by the object of arbitrary multi-function remote control. As for the choice of several routes and what control methods, according to the actual situation (such as object, operational requirements and cost accounting, etc.) to decide. General infrared remote transceiver system by infrared remote control transmitter signal coding, infrared remote control signal receivers and decoders (or decoder chip MCU) and the external circuit consisting of three parts. Signal transmitter remote control code used to generate pulses of infrared emission-driven output infrared remote control signal, receiver completion of the remote control signal amplification and detection, plastic and demodulation encoding pulse. Infrared remote control coded pulse is going to obtain a continuous serial binary code, and for most of the infrared transceiver system, This serial code as micro-controller of the remote control input signals from the internal CPU completion of the remote control instruction decoder, on the other infrared remote control transceivers, the designers of electronic products, The internal micro-controller of the remote control decoder directive is not accessible.Therefore, people are using infrared encoder / decoder chip and microcontroller developed various generic infrared remote transceiver system, In various equipment infrared signals between the transceiver.Remote transceiver system generally transmitters and receivers is composed of two parts. Launchers from the general direction keys, coded instructions circuit modulation circuit, driving circuit, firing circuit of several parts. When pressed a key, the directive coding circuit, in the corresponding instructions encoded signal, the encoder signal to the carrier modulation, Driven by the power amplifier circuit after circuit fired from the field after firing instructions coded modulation signals. General receiver by the receiving circuit, the amplifier circuit, demodulation circuits, instruction decoder circuit, driving circuit, circuit implementation of several parts. Receiving Circuit will launch vehicles have been coded modulation signal receiving instructions from, and to enlarge evacuation demodulation circuit. Demodulation circuit will have the coding modulation signal demodulation, namely, reduction of signal coding. The instruction decoder to the encoder signal decoding, Driven by the final circuit to drive the implementation of various instructions circuit to control the operation.1.3 infrared remote control transceiver product profiles 1.3.1 infrared remote control transceiver product structure and typeCurrently infrared transceiver in accordance with the mode of transmission rate and can be divided into four categories : Serial mode, the highest rate of 115.2 Kbps; medium-speed model : the highest rate of 0.567 Mbps and 1.152Mbps; High-speed mode : The maximum rate of 16 Mbps.Also according to the size chip power consumption can be divided into low-power consumption and standard two categories, low-power type normally used 3 V power supply, transmission distance closer to about 0 - 30cm, which is commonly used standard 5V power supply, transmission distance away at least 1mabove.1.3.2 infrared remote control transmitters of the status quo at home and abroadInfrared communication technology in the development stage and there are several infrared communication standards, between different standards for infrared equipment can not infrared communication. To have all the infrared equipment to interoperability in 1993 by more than 20 large manufacturers initiated the establishment of an Infrared Data Association (IRDA) unified the infrared communication standards , which is currently widely used in infrared data communication protocols and standards, also known as the IRDA standard.Since 1993 IRDA since the establishment of the Infrared Data Association members have developed to more than 150. IRDA standards of the industry has been widely recognized and supported. Has been developed with the infrared communications equipment have been as many as 100 species. IR module, installed capacity has reached 150 million sets. Although there is also a short distance wireless Bluetooth technology, But in infrared communication technology low cost and broad compatibility advantages, Infrared data communication in the future will still be a very long time inherent short-range wireless data communications fields play an important role.1.3.3 Infrared Transceiver product development trendIn various infrared transceiver products, although the transmission rate, transmission distance and other characteristics, But infrared transceiver products has been towards improving the transmission rate, increase the transmission distance and lower power consumption, expanding launch reception angle of development. In particular, as the technology development and maturity, the means of transmission is moving in the direction of point-to-multipoint. Therefore infrared remote control transceiver products have broader prospects for development.2 Infrared communication of knowledge2.1 infrared ray foundation knowledge2.1.1 infrared outlinedInfrared is actually a kind of electromagnetic wave. From the analysis of various natural component of the electromagnetic wave reflected spectrum is :-ray, x-ray, ultraviolet, visible, infrared, microwave and radio wave. From the viewpoint of form, and they did not seem to, but if the wavelength in descending order, and we will find him all the only visible light spectrum of the entire 0.38 µm - 0.76µm so long little area, and adjacent to the visible light and infrared (including the far infrared, mid-infrared and near infrared foreign) accounts for the spectrum of 0.76 µm - 1000µm of a major. Which micron wavelength range also includes UV, visible, near infrared, mid-infrared and far-infrared, microwave.From the above analysis shows that infrared is a very rich spectrum resources, it currently has in production, life, military, medical, and other aspects have been widely used, such as infrared heating, medical infrared, infrared communication, infrared camera, infrared remote control, and so on. Infrared remote control is the many applications of infrared part of the current household appliances widely used in TV remote control, VCR remote control, VCD remote control, high-fidelity audio remote control, are used infra-red remote control, It allows the control of these appliances have become very easy.2.1.2 infrared propertiesInfrared lies between visible light and microwave a wave, it is with certain clinical characteristics of the wave. In the near-infrared, visible light and its adjacent, it is visible in certain characteristics, such as straight-line transmission, reflection, refraction, scattering, diffraction, can be certainobjects and can be absorbed through the lens of their focusing. In the far-infrared region, owing to its neighboring microwave, it has some characteristics of microwave, If a strong penetrating power and can run through some opaque substances. Since in any object, natural profession, regardless of whether its own luminescence (referring to visible light), as long as the temperature is above absolute zero (-273 ° C), moment will be kept around to infrared radiation. Only higher temperature of objects strong infrared radiation, low-temperature objects infrared radiation weaker. Therefore infrared feature is the greatest common in nature, it is called thermal radiation called thermal radiation. Infrared cameras, infrared night market pyroelectric infrared detectors and some other missiles aiming at is the use of this characteristic of infrared work.Infrared and visible light compared to another characteristic of a variety of colors. As the longest wavelength of visible light is a wavelength of the shortest times (780 nm-380 nm), So is called an octave. And infrared wavelength is the longest shortest wavelength of a times, and the longest wavelength infrared is the shortest wavelength of 10 times, that is, 10 octave. Therefore, if visible light can be expressed as seven colors, infrared may performance 70 colors, showing the rich colors. Infrared smoke through the good performance, which is also one of its features.Because not visible to the infrared, it has little effect on the environment. By the wave infrared rays than the long wavelength radio waves, infrared remote control will not affect the nearby radio equipment. Another wavelength of less than 1.5µm near infrared light, transparent atmosphere in the visible light transmission characteristics much better than, because it close to the visible edge of the red light, linear transmission, reflection, refraction and absorption material and the physical characteristics very similar to visible light. Therefore, it can be used with similar visible focusing lens and other opticaldevices. Because infrared remote control is not as remote as the radio through the barrier to control the object's ability to control, so in the design of household appliances infra-red remote control, wireless remote control as unnecessary, each set (transmitters and receivers) have different frequency or remote coding (Otherwise, wall will control or interference with neighbors household appliances), all similar products in the infrared remote control, The same can control the frequency or coding, and no remote control signal "drop." This universal infrared remote control provides a great convenience. Infrared to visible light, is very subtle and confidentiality, therefore, the security, Alert and other security devices have been widely used. Infrared remote control is simple in structure and easy, low-cost, anti-interference capability, high reliability are a number of advantages, is a close-up remote control, especially in indoor remote control optimized manner.2.1.3 infrared diode characteristicsInfrared is not visible, people here are not aware of. Electronic technology is used infrared light emitting diode (also known as the IR emission diode) to generate infrared. Infrared remote control transceiver is using near-infrared transmission control instructions 0.76µm wavelength of ~ 1. 5µm. Near-infrared remote control as a light source, because there infrared light emitting diodes and infrared receiving device (photodiode. Transistor and PV) and the luminescence peak wavelength of light by the general 0.8µm ~ 0. 94µm. in the near-infrared band, both of the spectrum is the coincidence to a good match, access to higher transmission efficiency and higher reliability. Commonly used infrared diode, and its shape is similar LED light emitting diodes, Its basic circuit shown in figure 2 -2. The triode plans for the switch, when the base added a driving signal, Transistor saturated conduction infrared LED D is also Wizard Link, issued infrared (near infrared about 0.93 µm). D.The pressure drop of about 1.4 V and the current general for 10-20mA. To adapt to the working voltage of the D loop resistance often as a series of infrared diode current limit resistance.When the circuit diagram of the infrared emission control corresponding to the controlled device, the control of the distance and D is proportional to the transmitting power. In order to increase the distance of infrared control, infrared diode D should work on the pulse state that work is the lifeblood of current. Because pulse light (optical modulation) the effective transmission distance and pulse is proportional to the peak current, only maximize peak current Ip, will increase the infrared distance. Ip increase is a way to reduce the pulse duty cycle, that is compressed pulse width τsome TV infrared remote control, its infrared luminescence of the pulse duty cycle of about 1/4-1/3; Some electrical products infrared remote control, its duty cycle of 1 / 10. Decreasing pulse duty cycle also enable low-power infrared LED distance of the greatly increased. Common infrared light emitting diodes, power is divided into small power (1 mW - 10mW). Chinese power (20mW - 50mW) and power (50mW - 100mW more) three categories. Use different power infrared LED, the allocation should be driven by the corresponding power control. Figure 2 -2 by the reflected infrared light-emitting diodes to make produce optical modulation, Drivers only need to add the control of a certain frequency pulse voltage.Infrared transmitter and receiver in the way the two kinds of straight, and the second is reflective. Luminescence pointed straight pipe and tube receiver placed in a relatively controlled and fired on the two ends, a certain distance away from the middle; Reflective means luminescent tube and pipe parallel with the receiving peacetime, without always receiving tube light, luminescence only in possession of the infrared light reflected fromencountered, the receiving tube received from the reflected infrared before work.2.2 infrared communication basic tenets2.2.1 infrared communication PrincipleCommunication is the use of infrared wavelength of 900 nm-infrared waves from 1000 to serve as an information carrier, through infrared technology between the two close communication and confidentiality of information transmitted. Infrared communication system structure include : part launcher, channel, the receiver part.Launcher source letter issued after the binary signal from the high-frequency modulated infrared LED sent, receiving device regard the reception of high-frequency signals from the infrared receiver tube after receiving further demodulation photoelectric conversion of the original information of a mass communication lose way. Afterwards the former Information received after receiving part of the drive circuit connected to the expected completion of the various functions. To which the modulation coding style pulse width modulation (by changing the pulse width modulated signal PWM) and pulse modulation time (through change the pulse train interval time between the modulation signal PPM) two.2.2.2 infrared communication system elements(1) Launches : Currently there is a infrared wireless digital communications system sources of information including voice, data, images. Its methods of work for the launch of the receiver can be divided into different layout LOS way (Light-of-Sight , intracardiac way), diffuse (diffuse) mode. LOS way directional, it has good channel characteristics such advantages, but the existence of a "shadow" effect. difficult to achieve roaming function. Roaming means the main features of non-directional, and easy to implementroaming function, but its channel quality is better sometimes LOS way. Transmission of signals required for a few of (the sampling was quantified), the general need for baseband modulation, transmission, modulation, sometimes signal source coding, the above-driven signals from photoelectric converter complete optical signal transmission. Infrared wireless digital communications system and its scope of work-for-fired power distribution, the quality of the communication. While using various methods to improve optical transmitter power, the other using spatial diversity, holographic films and so on so diffuse light for the launch of space optical power evenly distributed.(2) Channel : infrared wireless digital communication channel refers to the transmitters and receivers in the space between. Due to natural light and artificial light sources such as light signals in the context of intervention, and the source - Electrical Equipment, The optical noise and disturbances, infrared wireless digital communications in some occasions, poor quality, At this point needed to channel coding. Infrared wireless communication system, the optical signal reflection, light scattering and background noise and interference effects, Infrared wireless digital channel presence multi-path interference and noise, This is to improve the quality and access for high-speed applications should be addressed. Infrared wireless digital communication channel often used by the major optical components, optical filter, condenser, their role is : plastic, filter, depending on the field transformation, the band division, the lens can be used as launch-ray focusing, the use of optical filters filter out stray light, the use of optical lenses to expand the field of view receiver, able to make use of optical components for the link frequency division multiplexing, etc.. Infrared wireless communication channel optical noise : the natural noise (sunlight) and anthropogenic interference (fluorescent lighting). can be modulated by the transmission technology such as filters and adding to be addressed.(3) receivers : Channel optical signal from the optical receiver partially photoelectric conversion, In order to remove noise and intersymbol interference and other functions. Infrared wireless digital communications system receiver include optical receiver parts and follow-up sampling, filtering, judgment, quantity, balanced and decoding part. Infrared wireless optical receiver often used amplifier, and called for large-bandwidth, high gain, low noise and low noise, frequency response and channel impulse response matched. To be suppressed by low-frequency noise and human disturbance needs a band-pass filter. To obtain large optical receiver scope and instantaneous field of view, often using spherical optical lens.2.2.3 infrared communications featureWireless communications are a lot of ways, some using infrared communication with the following characteristics :• The high frequency, wave length, and fired the energy concentrated space propagation attenuation coefficient can ensure the effective signal transmission;• infrared is the invisible light, strong confidentiality and use it as an information carrier. device when there is no visual pollution, it does no harm to the human body;• dissemination without limitation, and there is no question of frequency interference with radio-wave pattern, not on the spectrum resources to the relevant authorities for the application and registration, easy to implement;• has a good point, when the transmission equipment and infrared receiver ports line up straight, deviation of not more than about 15 degrees when infrared devices running the best effect;• through infrared or not bypassed and objects, data transmission, optical path can not be blocked;• currently produce and receive infrared signals in the technology is relatively mature, components small size, low cost production of simple, easy to produce and modulation advantages.2.3 infrared communication code based on the knowledgeUsually, infrared remote control transmitters will signal (pulse binary code) modulation at 38 KHz carrier, After buffer amplified sent to the infrared light-emitting diodes, infrared signals into firing away. Pulse binary code in a variety of formats. One of the most commonly used code is PWM (pulse width modulation code) and the PPM code (Pulse Code Modulation). The former said in a pulse width, pulse indicated 0. The latter pulse width, but the width of code-not the same, the codes represent a bit - and the digits represent narrow 0.Remote coding pulse signal (PPM code as an example) are usually guided by the code, the system code, the anti-code system, a feature code, functional anti-code signal components. Guide the code name for the initial code, by the width of 9 ms and the margin width of 4.5 ms to the low-level components (different remote control systems in the low-level high width of a certain distinction), remote coding used to mark the beginning of pulsed signals. System identification code is also called code, which used to indicate the type of remote control system, in order to distinguish other remote-control system, prevent the remote control system malfunction. Functional code is also called scripts, which represents the corresponding control functions, Receiver of the micro-controller functions under the numerical code to complete the various functions operating. Anti-code system and function codes are anti-system code and the functional code against code Anti-code can be joined to the receiver synchronization transmission process leads to errors. In order to improve performance and reduce interference power consumption, The remote control will be coded pulse frequency of 38 KHz (for the cycle of 26.3 ms) of the carrier signal pulse reshuffle system (PAM), and then sentto the buffer amplified infrared LED, the remote control signal transmitter away.Address code and data codes are composed of different pulse width expressed that the two narrow pulse "0"; 2 pulse width "1"; a narrow pulse width and pulse expressed an "F" is the code addresses "vacant."Is the first part of a group a group of code, each code synchronization between separated. The plan is to enlarge the second half of a group code : a code from 12 AD (the address code plus data code For example, eight address code plus four data code), each with two AD-Pulse's : Pulse said the two "0"; 2 pulse width "1"; a narrow pulse width and pulse expressed an "F" is the code addresses "vacant."Realize fired at each fired at least four groups code, PT2272 only twice in a row to detect the same address code plus data code data will be the code "1" is driven The data should be output to drive margin and VT terminal for synchronous serial.红外遥控系统摘 要红外数据通信技术是目前在世界范围内被广泛使用的一种无线连接技术,被众多的硬件和软件平台所支持。

关于电子信息工程的英语作文

关于电子信息工程的英语作文

关于电子信息工程的英语作文English: Electronic Information Engineering is a branch of engineering that focuses on the study and application of electronic devices and communication systems in various fields. This field combines principles from electrical engineering and computer science to design, build, and maintain electronic systems that process, transmit, and store information. Electronic Information Engineering plays a crucial role in shaping the technologies we use in our daily lives, such as smartphones, computers, telecommunication networks, and more. Professionals in this field work on developing advanced technologies like artificial intelligence, Internet of Things, and 5G networks to improve communication, automation, and data processing efficiency. With the rapid development of technology, Electronic Information Engineering will continue to evolve and pave the way for innovative solutions to various societal challenges.中文翻译: 电子信息工程是一门工程学的分支,专注于研究和应用电子设备和通信系统在各个领域。

电子信息及自动化 外文翻译 外文文献 英文文献 基于ZigBee无线传感器网络的矿工的位置探测研究

电子信息及自动化 外文翻译 外文文献 英文文献 基于ZigBee无线传感器网络的矿工的位置探测研究

基于ZigBee无线传感器网络的矿工的位置探测研究张秀萍, 韩广杰, 朱昌平, 窦燕, 陶剑锋河海大学计算机与信息工程学院中国常州E-mail:zhangxiup@ Zhucp315@摘要:随着计算机的飞速发展,通信和网络技术,特别是无线传感器和嵌入式技术的应用,使得无线传感器网络(WSNs)技术在产业领域和我们的日常生活得到了广泛关注。

基于ARM7TDMI-S CPU和ZigBee 的WSNs在提速和优化网络移动节点的应用,丰富的信息采集中,以及在通信中实时时间的协调均有可取之处,具有低功耗连续作业特点,因此它是非常适合用于确定矿工在地下的位置。

本文提出和分划WSN的网络计划及信息处理与通信技术,重点专注于实时协作。

通过传感器准确获得矿工的移动信息。

之后的位置信息传送可靠的监控中心。

不断变化的运行测试结果表明没有信息丢失或者没有未被采集到的信息。

因此,这个计划是稳定和有效的,将在煤矿安全中发挥积极作用,在我看来这正是Zigbee 无线传感器网络的正确特点。

关键词:ZigBee的ARM7TDMI-S内核; CC2420的; 无线传感器网络;矿工位置确定一、简介无线传感器网络(WSNs)是规模大,无线自组织网络。

它是整合计算机通信,网络技术,嵌入式MCU和无线传感器技术,具有感知和沟通能力。

【1】节点有低低成本,小尺寸特点。

其中大部分可以工作区域传播,收集数据,并进行处理数据和通信。

无线传感器节点通常工作在无线电频率(RF)频段。

节点构成一个分层架构现场监测数据的网络。

它通常适用在工业,农业,远程医疗和环境监测。

我们都知道,煤炭生产中的威胁复杂的工作条件,如有毒气体,透水,塌陷,顶板等。

【2】一旦发生事故发生时,它会危及矿工的生命。

因此它是地面人员的当务之急,要明确矿工的确切位置,以便为及时采取措施。

因此为矿工成立一个无线传感器网络监控矿井有很大的应用价值。

二、方案优选矿工的位置监测系统主要技术规范要求归纳如下:(1)定位精度为10米。

电子信息工程毕业设计外文翻译

电子信息工程毕业设计外文翻译

xx大学毕业设计外文翻译系别职业技术教育学院专业电子信息工程班级电子Z091 学号 x姓名 x指导教师 x2013年5月16日MM420 inverter energy-saving measures in the water supply system-Nanjing Hangda Yihang Technology Co., Ltd.Because the frequency conversion velocity modulation does not need to construct the tradition for the aqueous system for the aqueous system top digit water tank, the water tank, avoided two times polluting and reducing the construction investment, moreover designed reasonably can achieve the good energy conservation effect.In gives in the aqueous system, the constant speed pump only then in its highly effective section movement can guarantee the system normal work also does not have the energy dissipation.In the design, (this time current capacity is generally biggest by the pipe network most unfavorable situation, must lift is also biggest) takes the choice water pump unit the main basis, but when the pipe network current capacity reduces, the energy waste is inevitable, when also possibly creates the low current capacity in pipeline overpressure question.The water pump basis system current capacity real-time change realization stepless speed regulation movement, is solves above problem well, achieves one of energy conservation goal ways.The water pump velocity modulation may through the very many way realization, in which frequency conversion velocity modulation be the present ideal one kind.The frequency conversion velocity modulation is through will give on the aqueous system pipe network the pressure transmitter to carry on the sampling to the pipe network hydraulic pressure, transforms the pressure signal into the electrical signal, and delivers to the PID regulator and the user establishment value of pressure it carries on the comparison and the operation, finally will transform for the frequency control signal delivers to the frequency changer.The frequency changer basis transmits frequency control signal adjustment water pump electrical machinery supply frequency, thus realizes adjusts the water pump the rotational speed.May divide into two kinds according to the customer in actual use request frequency conversion velocity modulation for the aqueous system: The live pressure variable gives the aqueous system for the aqueous system and the constant pressure variable.The live pressure variable establishes for the aqueous system pressure transmitter in the service pipe net terminal, the PID regulator setting value the service flood peakvalue which needs for the pipe network terminal user.The system causes the pipe network terminal hydraulic pressure maintenance through the automatic control to be constant, causes the pipeline characteristic curve and system static lifting is invariable, but the water pump water outlet pressure changes along with the volume of diversion change according to the pipeline characteristic curve, therefore theoretically realized “the system to need how many, the unit provided how many”, could not because the volume of diversion reduced has unnecessary static lifting, the energy conservation effect was satisfied.But this is only one kind of ideal situation, also in the system only has the frequency conversion pump alone to work.Because the frequency conversion equipment quite is expensive, large-scale often uses the frequency conversion pump and the constant speed pump parallel operation way water supply for the aqueous system.Presently establishes a frequency conversion pump and a power frequency pump and the combined transport behavior example by the system in.When the pipe network current capacity reduces, needs to lift reduces correspondingly, the frequency conversion pump may through the deceleration movement realization.But also must reduce correspondingly for guarantee parallel unit normal work power frequency pump lifting, this only can through increase the current capacity realization, thus creates the water volume the dropout, also possibly causes the power frequency pump to leave the highly effective section work, namely has not achieved the true energy conservation the goal.Meets has above situation, may take following measure to improve its energy conservation effect:①Gives the aqueous system regarding the small scale, may only suppose a frequency conversion pump, and causes the pump the highly effective area (its highly effective scope to move the time scope compared to power frequency pump to want as far as possible many including to appear the probability big operating point in a big way).②Uses the multi-Taiwan pump velocity modulation movement, certainly, quite is expensive as a result of the frequency conversion speeder price, should overall evaluation its economic agent decide.③When choice power frequency pump, should cause the system when the most disadvantageous spot work, the power frequency pump operating point approaches left side of as far as possible its highly effective area; If the most unfavorable situation appears the probability to be small, may enable it to deviate slightly the highlyeffective area, falls in the highly effective area left flank.Thus, when system lifting reduces, the power frequency pump still may in the highly effective area work.The constant pressure variable is located in the water pump unit water outlet for the aqueous system the pressure transmitter, is for the purpose of causing the water pump water outlet pressure maintenance to be constant, general hypothesis for most disadvantageous operating mode when the water pump water outlet needs the value of pressure.Still by a frequency conversion pump and a power frequency pump and combined transport behavior example.When the pipe network current capacity reduces, the frequency conversion pump through the deceleration movement, maintenance lifting invariable reduces the water discharge.Because the outlet pressure is invariable, the power frequency pumps out the water volume not to be able to change (i.e. movement operating mode invariably), still in highly effective area work, thus achieves the energy conservation goal.Needs to point out, the system needs when the current capacity changes small, the water pump water outlet pressure (still for the most unfavorable situation in system needs pressure) to be bigger than the pressure which the pipeline this time needs, thus still could cause static lifting to a certain extent the waste.Following two measures may improve its energy conservation effect:①Enlarges the pipe network suitably the caliber, causes the pipeline characteristic curve to hasten gently, but this can increase the pipe network the disposable investment, needs and the energy conservation effect makes the comprehensive economical comparison.②When choice power frequency pump causes each pump the operating point to fall as far as possible on the highly effective area.For aqueous system when water used trough (for example at night), in the system the water consumption is very small, even achieved the zero current capacity, is called “the micro current capacity”.In this case, if depends upon at the highly effective area great current capacity scope movement water pump maintains the system pressure, not only buckle water pump life, moreover the efficiency is low, cannot achieve the energy conservation the goal.Theoretically, the frequency conversion pump current capacity may approach in the highly effective scope in the zero, but in fact the water pump rotational speed not impossible unlimited to reduce, only depends on the frequency conversion pump to be competent the micro current capacity operating mode with difficulty toward the dealings.The actual project uses generally when the system additionally builds the small current capacity power frequency auxiliary pump,small current capacity facilities and so on frequency conversion auxiliary pump, barometric pressure pot maintain the micro current capacity the system pressure.To the different system micro current capacity question should the special details concrete analysis, and carries on the overall evaluation to the disposable investment and the long-term operating cost to be able to make the reasonable solution.In the frequency conversion velocity modulation for in the aqueous system design process, should choose the pump reasonably according to the service pipe net characteristic, achieved in satisfies the operation requirements under the premise, both saves the goal which the investment and conserves energy.MM420变频器在给水系统的几点节能措施-南京航大意航科技股份有限公司由于变频调速给水系统不需要建造传统给水系统的高位水箱、水塔,避免了二次污染并减少了土建投资,而且设计得合理能达到较好的节能效果。

电子信息工程外文翻译参考文献

电子信息工程外文翻译参考文献

电子信息工程外文翻译参考文献(文档含中英文对照即英文原文和中文翻译)译文:利用修改后的迈克耳孙干涉仪进行长度测量的初步结果摘要:基于飞秒加速器的装置,该装置建造在上海应用物理研究所(SINAP),最近一个经修改后的远红外迈克耳孙干涉仪通过光学自相关方法,已经被用来测量电子光束的长度。

相比较于之前常规的迈克耳孙干涉仪,我们使用一个空心回射器而不是一个平面反射镜的反射镜。

本文将为大家介绍实验设置和长度测量的结果。

关键词:飞秒线性加速器,长度串,干涉仪,空心回射器1 介绍最近关于电子脉冲压缩的实验产生高峰值电流和亮度飞秒电子串。

关于短束源自于高质量光束的潜在应用要求这方面一起了广泛兴趣。

高质量的核物理加速器,自由电子激光器驱动加速器,下一代线性对撞机,第四代光源都需要短时间光束脉冲。

同时,在进程中对诊断的短电子串的研究也起了重要作用。

有几种已经使用或正在开发的方法去测量短电子串的长度。

这些一般分为两类:频域方法和时域方法。

众所周知,在时域测量长度的方法中使用条纹相机,条纹相机已经证实是限于串长度超过200 fs ,此外,条纹相机昂贵并且测量系统复杂。

相对于时域测量方法,频域测量使用相干过渡辐射(CTR )从金属箔在测量飞秒脉冲的短电子中已经显现出前景。

本文我们首先从短电子串方面给出了基于一代的高强度相干渡越辐射的理论和试验研究,然后讨论该方法基于相干渡越辐射测量束飞秒的长度,并从改进电子实验装置给出了串长度测量的结果。

最后,我们分析了空气湿度对串长度测量的影响,并且阐释了对未来研究的计划。

2 理论背景2.1 相干渡越辐射源自于相对论性电子串辐射如同步加速器辐射跃迁辐射等,本质上有较广的范围,如果辐射的波长短于电子串长度,这个阶段的辐射电子不同于彼此,所以辐射是不连贯的。

另一方面,如果波长较长的串长度,辐射是连贯的并且辐射强度的平方成正比每串数字电子。

光谱强度发出一束N 粒子:11()()(1)()|()|tot I NI N N I f λλλλ=+- (2-1)这里1()I λ是靠单电子辐射的强度,()f λ是串形成因素,这是傅里叶变换的规范化的电子密度分布()S Z 。

电子信息工程专业Progress-in-Computers微机发展简史毕业论文外文文献翻译及原文

电子信息工程专业Progress-in-Computers微机发展简史毕业论文外文文献翻译及原文

毕业设计(论文)外文文献翻译文献、资料中文题目:微机发展简史文献、资料英文题目:Progress in Computers文献、资料来源:文献、资料发表(出版)日期:院(部):专业:电子信息工程班级: 1姓名:学号:指导教师:翻译日期: 2017.02.14学生姓名:要求(无需打印)1、外文翻译是毕业论文的主要内容之一,学生必须独立完成。

2、外文翻译译文内容应与学生的专业或毕业论文内容相关,不得少于6000印刷符号。

3、外文翻译译文用A4纸打印。

文章标题用3号宋体加粗,段后1行;章节标题用4号宋体加粗;正文用小4号宋体;数字、字母用Times New Roman体。

行距固定值20磅。

页边距上、下、左、右均为2.5cm,左侧装订,装订线0.5cm。

按中文翻译在上,外文原文在下的顺序装订。

4、年月日等的填写,用阿拉伯数字书写,要符合《关于出版物上数字用法的试行规定》,如“2008年2月28日”。

5、所有签名必须手写,不得打Progress in ComputersPrestige Lecture delivered to IEE, Cambridge, on 5 February 2004Maurice WilkesComputer LaboratoryUniversity of CambridgeThe first stored program computers began to work around 1950. The one we built in Cambridge, the EDSAC was first used in the summer of 1949.These early experimental computers were built by people like myself with varying backgrounds. We all had extensive experience in electronic engineering and were confident that that experience would stand us in good stead. This proved true, although we had some new things to learn. The most important of these was that transients must be treated correctly; what would cause a harmless flash on the screen of a television set could lead to a serious error in a computer.As far as computing circuits were concerned, we found ourselves with an embarass de richess. For example, we could use vacuum tube diodes for gates as we did in the EDSAC or pentodes with control signals on both grids, a system widely used elsewhere. This sort of choice persisted and the term families of logic came into use. Those who have worked in the computer field will remember TTL, ECL and CMOS. Of these, CMOS has now become dominant.In those early years, the IEE was still dominated by power engineering and we had to fight a number of major battles in order to get radio engineering along with the rapidly developing subject of electronics.dubbed in the IEE light current electrical engineering.properly recognised as an activity in its own right. I remember that we had some difficulty in organising a conference because the power engineers’ ways of doing things were not our ways. A minor source of irritation was that all IEE published papers were expected to start with a lengthy statement of earlier practice, something difficult to do when there was no earlier practiceConsolidation in the 1960sBy the late 50s or early 1960s, the heroic pioneering stage was over and the computer field was starting up in real earnest. The number of computers in the world had increased and they were much more reliable than the very early ones . To those years we can ascribe the first steps in high level languages and the first operating systems. Experimental time-sharing was beginning, and ultimately computer graphics was to come along.Above all, transistors began to replace vacuum tubes. This change presented a formidable challenge to the engineers of the day. They had to forget what they knew about circuits and start again. It can only be said that they measured up superbly well to the challenge and that the change could not have gone more smoothly.Soon it was found possible to put more than one transistor on the same bit of silicon, and this was the beginning of integrated circuits. As time went on, a sufficient level of integration was reached for one chip to accommodate enough transistors for a small number of gates or flip flops. This led to a range of chips known as the 7400 series. The gates and flip flops were independent of one another and each had its own pins. They could be connected by off-chip wiring to make a computer or anything else.These chips made a new kind of computer possible. It was called a minicomputer. It was something less that a mainframe, but still very powerful, and much more affordable. Instead of having one expensive mainframe for the whole organisation, a business or a university was able to have a minicomputer for each major department.Before long minicomputers began to spread and become more powerful. The world was hungry for computing power and it had been very frustrating for industry not to be able to supply it on the scale required and at a reasonable cost. Minicomputers transformed the situation.The single-chip computerAt each shrinkage the number of chips was reduced and there were fewer wires going from one chip to another. This led to an additional increment in overall speed, since the transmission of signals from one chip to another takes a long time.Eventually, shrinkage proceeded to the point at which the whole processor except for the caches could be put on one chip. This enabled a workstation to be built that out-performed the fastest minicomputer of the day, and the result was to kill the minicomputer stone dead. As we all know, this had severe consequences for the computer industry and for the people working in it.From the above time the high density CMOS silicon chip was Cock of the Roost. Shrinkage went on until millions of transistors could be put on a single chip and the speed went up in proportion.Processor designers began to experiment with new architectural features designed to give extra speed. One very successful experiment concerned methods for predicting the way program branches would go. It was a surprise to me how successful this was. It led to a significant speeding up of program execution and other forms of prediction followed Equally surprising is what it has been found possible to put on a single chipcomputer by way of advanced features. For example, features that had been developed for the IBM Model 91.the giant computer at the top of the System 360 range.are now to be found on microcomputersMurphy’s Law remained in a state of suspension. No longer did it make sense to build experimental computers out of chips with a small scale of integration, such as that provided by the 7400 series. People who wanted to do hardware research at the circuit level had no option but to design chips and seek for ways to get them made. For a time, this was possible, if not easyUnfortunately, there has since been a dramatic increase in the cost of making chips, mainly because of the increased cost of making masks for lithography, a photographic process used in the manufacture of chips. It has, in consequence, again become very difficult to finance the making of research chips, and this is a currently cause for some concern.The Semiconductor Road MapThe extensive research and development work underlying the above advances has been made possible by a remarkable cooperative effort on the part of the international semiconductor industry.At one time US monopoly laws would probably have made it illegal for US companies to participate in such an effort. However about 1980 significant and far reaching changes took place in the laws. The concept of pre-competitive research was introduced. Companies can now collaborate at the pre-competitive stage and later go on to develop products of their own in the regular competitive manner.The agent by which the pre-competitive research in the semi-conductor industry is managed is known as the Semiconductor Industry Association (SIA). This has been active as a US organisation since 1992 and it became international in 1998. Membership is open to any organisation that can contribute to the research effort.Every two years SIA produces a new version of a document known as the International Technological Roadmap for Semiconductors (ITRS), with an update in the intermediate years. The first volume bearing the title ‘Roadmap’ was issued in 1994 but two reports, written in 1992 and distributed in 1993, are regarded as the true beginning of the series.Successive roadmaps aim at providing the best available industrial consensus on the way that the industry should move forward. They set out in great detail.over a 15 year horizon. the targets that must be achieved if the number of components on a chip is to be doubled every eighteen months.that is, if Moore’s law is to be maintained.-and if the cost。

论文电子信息类外文翻译

论文电子信息类外文翻译
[2]韩奉天.TMS320F281x理论和施工技术的应用[M].清华大学出版社,2011年,第48-50页(中国)
[3]李炬光.ARM应用系统的开发[M].清华大学出版社,2003,第33-36页(中国)
[4]徐丽娜.神经网络控制[M].电子工业出版社,2003,第33-36页(中国)
[5]郑佩青.数字信号处理[M].清华大学出版社,2008年,第98-198页(中国)
3.3网络应用和测试
在实际应用中,收集的样本数据为272个随机组合的常用的负载类型。首先将200个样品作为测试部分,其余的72个样本则用于评价。在测试过程中系统采用梯度最速下降法,其中:学习因子η= 0.0075,动量因子α= 0.085。经测试结果表明,均方误差为0.118348,相关系数为0.994。以上数据则表明网络识别满足实际应用需求。
2.2多功能电源控制柜
多功能电源控制柜是整个系统的核心部分。它不仅对多用户的电气参数进行实时测量,而且还对负荷具有自动识别,切断危险载荷故障,记录数据和定时等功能。为了便于系统维护,模块化设计部分的应用程序有三个部分构成:包括输入接口板部分,主控板部分和输出接口板部分。
2.2.1输入和输出接口板
输入接口部分有16个模拟信号输入通道。第一个通道为相电压信号输入通道,其余15个通道为负载用户当前的信号通道。每个阶段的15个通道的各相电压和电流信号分别转换为0 ~ 3.3 v的模拟信号,再通过变压器、运算放大器和滤波器电路送入主控板TMS320F2812 ADC模块,以满足TMS320F2812 ADC模块的单极性特性。交流零电平的输入信号提高至1.6 v作为高精度电源参考值。输出接口部分同பைடு நூலகம்5个用户通道的继电器连接在一起。基于负载识别结果信息反馈和管理人员的命令指示,TMS320F2812的输出端口可以直接驱动ULN2804来控制相应的继电器。

{信息技术}电子信息工程测控技术与仪器外文翻译外文文献英文文献

{信息技术}电子信息工程测控技术与仪器外文翻译外文文献英文文献

(信息技术)电子信息工程测控技术与仪器外文翻译外文文献英文文献外文出处:Springer-Link电子期刊附件1:外文资料翻译译文SJA1000独立的CAN控制器应用指南1介绍SJA1000是壹个独立的CAN控制器,它于汽车和普通的工业应用上有先进的特征。

由于它和PCA82C200于硬件和软件均兼容,因此它将会替代PCA82C200。

SJA1000有壹系列先进的功能适合于多种应用,特别于系统优化、诊断和维护方面非常重要。

本文是要指导用户设计基于SJA1000的完整的CAN节点。

同时本文仍提供典型的应用电路图和编程的流程图。

2概述SJA1000独立的CAN控制器有2个不同的操作模式:BasicCAN模式(和PCA82C200)兼容PeliCAN模式BasicCAN模式是上电后默认的操作模式。

因此,用PCA82C200开发的已有硬件和软件能够直接于SJA1000上使用,而不用作任何修改。

PeliCAN模式是新的操作模式,它能够处理所有CAN2.0B规范的帧类型。

而且它仍提供壹些增强功能使SJA1000能应用于更宽的领域。

2.1CAN节点结构通常,每个CAN模块能够被分成不同的功能块。

SJA1000使用[3][4][5]最优化的CAN收发器连接到CAN。

收发器控制从CAN控制器到总线物理层或相反的逻辑电平信号。

上面壹层是壹个CAN控制器,它执行于CAN规范[8]里规定的完整的CAN协议。

它通常用于报文缓冲和验收滤波,而所有这些CAN功能,均由壹个模块控制器控制它负责执行应用的功能。

例如,控制执行器、读传感器和处理人机接口(MMI)。

如图1所示,SJA1000独立的CAN控制器通常位于微型控制器和收发器之间,大多数情况下这个控制器是壹个集成电路。

图1CAN模块装置2.2结构图下图是SJA1000的结构图图2SJA1000的结构图根据CAN规范,CAN核心模块控制CAN帧的发送和接收。

接口管理逻辑负责连接外部主控制器,该控制器能够是微型控制器或任何其他器件。

电子信息工程专业毕设 文献翻译 附英文原文

电子信息工程专业毕设 文献翻译 附英文原文

5.3. 时钟独立的显性误差
对于每一个特定的GPS时钟,在每个适用的时间从KF1相位偏差估计值减去 UECC估计值, 去估计其OEIC的相位。 在测量加工, OEIC包含在几部分纳秒内(见 图4)。图4展示了的两种情况下地面工作站时钟S1的OEIC。在蓝线的可见区间和 KF1测距处理显然有别于没有测量的传播间隔。在测量处理期间,KF1估计误差 的观察目标部分包含在几部分纳秒内。OEIC的协方差顺序计算需要每个时间点 的 KF1相位偏差估计误差和UECC估计误差的互协方差矩阵值。 我尚未能计算这
X K 1|K 1 X K 1|K K K 1[ y K 1 y( X K 1|K )]

Hale Waihona Puke (5)5. 难以观察的 GPS 时钟系统
GPS时间是由作战空军(USAF)卡尔曼滤波器处理 GPS伪距测量产生的。 GPS时间是多个GPS时钟的平均相位, 可是, 通过 GPS伪距测量, 每个运行的GPS 时钟的时钟相位是难以观察的,演示如下。GPS导航星的轨道参数是从GPS伪距 观测可观察到的。从GPS伪距测量可以得到USAF(美国空军)卡尔曼滤波器估 计轨道参数和时钟同步参数, 因此以这种方式将状态估计值分为隐式的时钟参数 子集和显式的轨道参数子集。通过应用谢尔曼有关MU函数的定理,演示了这种 分区方式。
4.3.2. 非线性函数 MU
计算 n ×1 矩阵滤波器增益 K K 1 :
T T 1 K K 1 PK 1|K H K 1 [ H K 1 PK 1| K H K 1 R K 1 ]
(4)
滤波器测量更新 n×1 状态估计矩阵 X K 1|K 1 ,观测 yK+1 得


态估计误差协方差方阵(正特征值)

信息技术发展趋势研究论文中英文外文翻译文献

信息技术发展趋势研究论文中英文外文翻译文献

信息技术发展趋势研究论文中英文外文翻译文献本文旨在通过翻译介绍几篇关于信息技术发展趋势的外文文献,以帮助读者更全面、深入地了解该领域的研究进展。

以下是几篇相关文献的简要介绍:1. 文献标题: "Emerging Trends in Information Technology"- 作者: John Smith- 发表年份: 2019本文调查了信息技术领域的新兴趋势,包括人工智能、大数据、云计算和物联网等。

通过对相关案例的分析,研究人员得出了一些关于这些趋势的结论,并探讨了它们对企业和社会的潜在影响。

2. 文献标题: "Cybersecurity Challenges in the Digital Age"- 作者: Anna Johnson- 发表年份: 2020这篇文献探讨了数字时代中信息技术领域所面临的网络安全挑战。

通过分析日益复杂的网络威胁和攻击方式,研究人员提出了一些应对策略,并讨论了如何提高组织和个人的网络安全防护能力。

3. 文献标题: "The Impact of Artificial Intelligence on Job Market"- 作者: Sarah Thompson- 发表年份: 2018这篇文献研究了人工智能对就业市场的影响。

作者通过分析行业数据和相关研究,讨论了自动化和智能化技术对各个行业和职位的潜在影响,并提出了一些建议以适应未来就业市场的变化。

以上是对几篇外文文献的简要介绍,它们涵盖了信息技术发展趋势的不同方面。

读者可以根据需求进一步查阅这些文献,以获得更深入的了解和研究。

电子通信专业 外文翻译 外文文献 英文文献 电信现代运营

电子通信专业 外文翻译 外文文献 英文文献 电信现代运营

毕业设计(外文翻译材料)Telecommunication Modern Operation TelephoneIn an analogue telephone network, the caller is connected to the person he wants to talk to by switches at various telephone exchanges. The switches form an electrical connection between the two users and the setting of these switches is determined electronically when the caller dials the number. Once the connection is made, the caller's voice is transformed to an electrical signal using a small microphone in the caller's handset. This electrical signal is then sent through the network to the user at the other end where it transformed back into sound by a small speaker in that person's handset. There is a separate electrical connection that works in reverse, allowing the users to converse.The fixed-line telephones in most residential homes are analogue — that is, the speaker's voice directly determines the signal's voltage. Although short-distance calls may be handled from end-to-end as analogue signals, increasingly telephone service providers are transparently converting the signals to digital for transmission before converting them back to analogue for reception. The advantage of this is that digitized voice data can travel side-by-side with data from the Internet and can be perfectly reproduced in long distance communication (as opposed to analogue signals that are inevitably impacted by noise).- 1 --Mobile phones have had a significant impact on telephone networks. Mobile phone subscriptions now outnumber fixed-line subscriptions in many markets. Sales of mobile phones in 2005 totalled 816.6 million with that figure being almost equally shared amongst the markets of Asia/Pacific (204 m), Western Europe (164 m), CEMEA (Central Europe, the Middle East and Africa) (153.5 m), North America (148 m) and Latin America (102 m). In terms of new subscriptions over the five years from 1999, Africa has outpaced other markets with 58.2% growth. Increasingly these phones are being serviced by systems where the voice content is transmitted digitally such as GSM or W-CDMA with many markets choosing to depreciate analogue systems such as AMPS.There have also been dramatic changes in telephone communication behind the scenes. Starting with the operation of TAT-8 in 1988, the 1990s saw the widespread adoption of systems based on optic fibres. The benefit of communicating with optic fibres is that they offer a drastic increase in data capacity. TAT-8 itself was able to carry 10 times as many telephone calls as the last copper cable laid at that time and today's optic fibre cables are able to carry 25 times as many telephone calls as TAT-8. This increase in data capacity is due to several factors: First, optic fibres are physically much smaller than competing technologies. Second, they do not suffer from crosstalk which means several hundred of them can be easily bundled together in a single cable. Lastly, improvements in multiplexing have led to an exponential growth in the data capacity of a single fibre.Assisting communication across many modern optic fibre networks is a protocol known as Asynchronous Transfer Mode (ATM). The ATM protocol allows for the side-by-side data transmission mentioned in the second paragraph. It is suitable for public telephone networks because it establishes a pathway for data through the network and associates a traffic contract with that pathway. The traffic contract is essentially an agreement between the client and the network about how the network is to handle the data; if the network cannot meet the conditions of the traffic contract it does not accept the connection. This is important because telephone calls can- 2 --negotiate a contract so as to guarantee themselves a constant bit rate, something that will ensure a caller's voice is not delayed in parts or cut-off completely. There are competitors to ATM, such as Multiprotocol Label Switching (MPLS), that perform a similar task and are expected to supplant ATM in the future.Radio and televisionIn a broadcast system, a central high-powered broadcast tower transmits a high-frequency electromagnetic wave to numerous low-powered receivers. The high-frequency wave sent by the tower is modulated with a signal containing visual or audio information. The antenna of the receiver is then tuned so as to pick up the high-frequency wave and a demodulator is used to retrieve the signal containing the visual or audio information. The broadcast signal can be either analogue (signal is varied continuously with respect to the information) or digital (information is encoded as a set of discrete values).The broadcast media industry is at a critical turning point in its development, with many countries moving from analogue to digital broadcasts. This move is made possible by the production of cheaper, faster and more capable integrated circuits. The chief advantage of digital broadcasts is that they prevent a number of complaints with traditional analogue broadcasts. For television, this includes the elimination of problems such as snowy pictures, ghosting and other distortion. These occur because of the nature of analogue transmission, which means that perturbations due to noise will be evident in the final output. Digital transmission overcomes this problem because digital signals are reduced to discrete values upon reception and hence small perturbations do not affect the final output. In a simplified example, if a binary message 1011 was transmitted with signal amplitudes [1.0 0.0 1.0 1.0] and received with signal amplitudes [0.9 0.2 1.1 0.9] it would still decode to the binary message 1011 — a perfect reproduction of what was sent. From this example, a problem with digital transmissions can also be seen in that if the noise is great enough it can significantly alter the decoded message. Using forward error correction a receiver can- 3 --correct a handful of bit errors in the resulting message but too much noise will lead to incomprehensible output and hence a breakdown of the transmission.In digital television broadcasting, there are three competing standards that are likely to be adopted worldwide. These are the ATSC, DVB and ISDB standards; the adoption of these standards thus far is presented in the captioned map. All three standards use MPEG-2 for video compression. ATSC uses Dolby Digital AC-3 for audio compression, ISDB uses Advanced Audio Coding (MPEG-2 Part 7) and DVB has no standard for audio compression but typically uses MPEG-1 Part 3 Layer 2. The choice of modulation also varies between the schemes. In digital audio broadcasting, standards are much more unified with practically all countries choosing to adopt the Digital Audio Broadcasting standard (also known as the Eureka 147 standard). The exception being the United States which has chosen to adopt HD Radio. HD Radio, unlike Eureka 147, is based upon a transmission method known as in-band on-channel transmission that allows digital information to "piggyback" on normal AM or FM analogue transmissions.However, despite the pending switch to digital, analogue receivers still remain widespread. Analogue television is still transmitted in practically all countries. The United States had hoped to end analogue broadcasts on December 31, 2006; however, this was recently pushed back to February 17, 2009. For analogue television, there are three standards in use. These are known as PAL, NTSC and SECAM. For analogue radio, the switch to digital is made more difficult by the fact that analogue receivers are a fraction of the cost of digital receivers. The choice of modulation for analogue radio is typically between amplitude modulation (AM) or frequency modulation (FM). To achieve stereo playback, an amplitude modulated subcarrier is used for stereo FM.The InternetThe Internet is a worldwide network of computers and computer networks that can communicate with each other using the Internet Protocol. Any computer on the Internet has a unique IP address that can be used by other computers to route- 4 --information to it. Hence, any computer on the Internet can send a message to any other computer using its IP address. These messages carry with them the originating computer's IP address allowing for two-way communication. In this way, the Internet can be seen as an exchange of messages between computers.An estimated 16.9% of the world population has access to the Internet with the highest access rates (measured as a percentage of the population) in North America (69.7%), Oceania/Australia (53.5%) and Europe (38.9%).In terms of broadband access, Iceland (26.7%), South Korea (25.4%) and the Netherlands (25.3%) lead the world.The Internet works in part because of protocols that govern how the computers and routers communicate with each other. The nature of computer network communication lends itself to a layered approach where individual protocols in the protocol stack run more-or-less independently of other protocols. This allows lower-level protocols to be customized for the network situation while not changing the way higher-level protocols operate. A practical example of why this is important is because it allows an Internet browser to run the same code regardless of whether the computer it is running on is connected to the Internet through an Ethernet or Wi-Fi connection. Protocols are often talked about in terms of their place in the OSI reference model, which emerged in 1983 as the first step in an unsuccessful attempt to build a universally adopted networking protocol suite.For the Internet, the physical medium and data link protocol can vary several times as packets traverse the globe. This is because the Internet places no constraints on what physical medium or data link protocol is used. This leads to the adoption of media and protocols that best suit the local network situation. In practice, most intercontinental communication will use the Asynchronous Transfer Mode (ATM) protocol (or a modern equivalent) on top of optic fibre. This is because for most intercontinental communication the Internet shares the same infrastructure as the public switched telephone network.- 5 --At the network layer, things become standardized with the Internet Protocol (IP) being adopted for logi cal addressing. For the world wide web, these “IP addresses” are derived from the human readable form using the Domain Name System (e.g.72.14.207.99 is derived from ). At the moment, the most widely used version of the Internet Protocol is version four but a move to version six is imminent.At the transport layer, most communication adopts either the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP). TCP is used when it is essential every message sent is received by the other computer where as UDP is used when it is merely desirable. With TCP, packets are retransmitted if they are lost and placed in order before they are presented to higher layers. With UDP, packets are not ordered or retransmitted if lost. Both TCP and UDP packets carry port numbers with them to specify what application or process the packet should be handled by. Because certain application-level protocols use certain ports, network administrators can restrict Internet access by blocking the traffic destined for a particular port.Above the transport layer, there are certain protocols that are sometimes used and loosely fit in the session and presentation layers, most notably the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. These protocols ensure that the data transferred between two parties remains completely confidential and one or the other is in use when a padlock appears at the bottom of your web browser. Finally, at the application layer, are many of the protocols Internet users would be familiar with such as HTTP (web browsing), POP3 (e-mail), FTP (file transfer), IRC (Internet chat), BitTorrent (file sharing) and OSCAR (instant messaging).Local area networksDespite the growth of the Internet, the characteristics of local area networks (computer networks that run at most a few kilometres) remain distinct. This is because networks on this scale do not require all the features associated with larger networks and are often more cost-effective and efficient without them.- 6 --In the mid-1980s, several protocol suites emerged to fill the gap between the data link and applications layer of the OSI reference model. These were Appletalk, IPX and NetBIOS with the dominant protocol suite during the early 1990s being IPX due to its popularity with MS-DOS users. TCP/IP existed at this point but was typically only used by large government and research facilities. As the Internet grew in popularity and a larger percentage of traffic became Internet-related, local area networks gradually moved towards TCP/IP and today networks mostly dedicated to TCP/IP traffic are common. The move to TCP/IP was helped by technologies such as DHCP that allowed TCP/IP clients to discover their own network address —a functionality that came standard with the AppleTalk/IPX/NetBIOS protocol suites.It is at the data link layer though that most modern local area networks diverge from the Internet. Whereas Asynchronous Transfer Mode (ATM) or Multiprotocol Label Switching (MPLS) are typical data link protocols for larger networks, Ethernet and Token Ring are typical data link protocols for local area networks. These protocols differ from the former protocols in that they are simpler (e.g. they omit features such as Quality of Service guarantees) and offer collision prevention. Both of these differences allow for more economic set-ups.Despite the modest popularity of Token Ring in the 80's and 90's, virtually all local area networks now use wired or wireless Ethernet. At the physical layer, most wired Ethernet implementations use copper twisted-pair cables (including the common 10BASE-T networks). However, some early implementations used coaxial cables and some recent implementations (especially high-speed ones) use optic fibres. Optic fibres are also likely to feature prominently in the forthcoming 10-gigabit Ethernet implementations. Where optic fibre is used, the distinction must be made between multi-mode fibre and single-mode fibre. Multi-mode fibre can be thought of as thicker optical fibre that is cheaper to manufacture but that suffers from less usable bandwidth and greater attenuation (i.e. poor long-distance performance).- 7 --电信现代运营电话在一个模拟电话网络, 来电者通过交换机与对方进行不同的电话交流。开关在两用户间形成一个电气连接,其参数是由来电者按键时的电气特性决定的。一旦连接,来电者的声音通过来电端处的电话听筒转化为电信号。然后电信号通过网络发送到另一端的用户,并通过小型扬声器将信号转化为声音。有一个单独的电气连接用于进行转换,以使用户交谈。固定电话,在多数居民区是模拟电话,那就是,发言者的声音,直接决定着信号的电压。虽然距离短,来电可能会被作为模拟信号的端到端信号处理,越来越多电话服务供应商是适度的在传输前将模拟信号数字化以便传输,之后转为模拟信号以便接收。它的优势是,数字化语音数据可以从互联网上以数字形式传输,而且可以完全转载于远程通信。(对比来看,模拟信号无可避免会受到噪声影响。) 手机已对电话网络产生了重大影响。移动电话用户现在在许多市场超过了固定线路用户。手机销量在2005年总额为8.166亿,被一下数字平分,其中亚洲/太平洋(2.04亿),西欧(1.64亿),cemea(中欧,中东和非洲)(1.535亿),北美(1.48亿)和拉丁美洲(1.02亿)。在从1999年之后的五年时间内新增用户来看,非洲已以58.2 %的增长超过了其他地区的市场。手机逐渐采用如GSM或W-CDMA这些可以数字化传输语音信号的系统,从而使AMPS这样的模拟系统衰落。电话通信也隐约地有了戏剧性的变化。开始运作的TAT-8(跨大西洋传输电缆)始于1988年, 20世纪90年代见证了基于光纤系统的普及。光纤传输的优势在于其所提供的数据容量的急剧增加。TAT-8可以传输相当于同轴电缆电话10倍的数据,而现在的光纤能传输25倍于TAT-8的数据。数据能力的增加是由于几个因素:第一,光纤体积远小于其他竞争技术。第二,他们不受到串扰这意味着数百条光纤可以很容易地捆绑在一个单一的电缆内。最后,复用技术的改善导致了单条光纤数据容量的指数增长。基于现代光纤网络的通信是一项称为异步传输模式( ATM )的协议。如第二段所说,ATM协议允许为并排的数据传输。它适用于公共电话网络,因为它建立了通过网络数据通道并以此进行通信。传输协议基本上是一个用户与网络之间的协议,它规定了网络如何来处理数据;如果网络不能满足条件的传输协议,它不接受连接。这很重要,因为电话可以通过协议,保证自己的恒定比特率,这将确保来电者的声音,不是延迟的部分或完全切断。ATM的竞争对手,如多标签交换(MPLS),执行类似的任务,并可望在未来取代ATM。电台和电视台在一个广播系统,中央高功率广播塔传输高频率的电磁波,到众多的低功率接收器上。由广播塔发送的高频率波由信号调制且该信号载有视频或音频信息。接收天线稍作调整,以提取高频率波,解调器用来恢复载有视力或音频信息的信号。广播信号可以是模拟(信号多种多样,载有信息且连续)或数字(信息作为一套离散值,可以编码)。广播媒体业正处于发展中一个关键的转折点,许多国家都从模拟发展到数字广播。此举是可使生产更经济,更快且更能够集成电路。与传统的模拟广播相比,数字广播最大的优势是,他们防止了一些投诉。对电视来说,这包括消除问题,如雪花屏,重影和其他失真。这些发生原因,是因为模拟传输的性质,这意味着噪声干扰会明显影响最后的输出。数字传输,克服了这个问题,因为接收时数字信号变为离散值,这样小扰动不影响最终输出。举一个简单的例子,一个二进制信息1011,已与信号的振幅[ 1.0 0.0 1.0 1.0 ]调制,并收到信号的振幅[ 0.9 0.2 1.1 0.9 ]它将仍然解码为二进制信息1011-一个完美原码再现。从这个例子可以看出,数字传输也由一个问题,如果噪音足够大,它可以大大改变解码信息。使用前向错误校正接收器可以在最终结果中纠正少数比特错误,但太多的噪音将导致难以理解的输出,因此,传输失败。在数字电视广播中,有3个相互竞争的标准,很可能是全世界公认的。它们是ATSC标准,DVB标准和ISDB标准;通过这些标准,到目前为止,应用于标题地图。所有这三个标准,使用MPEG - 2 视频压缩。ATSC标准采用杜比数字AC - 3音频压缩,ISDB利用先进音频编码( MPEG - 2的第7部分),而DVB没有音频压缩标准,但通常使用MPEG - 1第3部分第2层。不同标准所用的调制方式也有所不同。在数字音频广播中,标准更为统一,几乎所有国家都选择采用数字音频广播的标准(也称为作为尤里卡147标准)。也有例外,美国已选择采用高清广播。高清广播,不同于尤里卡147 ,它是基于称为在带内通道传输的传输方法,这使数字化信息,进行“背驮式”AM或FM模拟传输。然而,尽管数字化迫在眉睫,模拟接收机仍然普遍应用。模拟电视仍然传送几乎所有国家。美国希望于2006年12月31日之前结束模拟广播;不过,最近又推到2009年2月17日。对于模拟电视,有三个标准在使用中。它们是PAL制式,NTSC制式和SECAM制式。模拟电台,切换到数字变得更加困难,因为模拟接收器只占数字接收机的一小部分成本。模拟电台调制方式通常采用AM(幅度调制)或FM(频率调制)。为实现立体声播放,振幅调制副载波用于立体声调频。互联网互联网是一个全球计算机组成的网络,也是一种用IP联系在一起的计算机网络。在互联网上的任何一台计算机都有一个唯一的IP地址,其他计算机可以用其进行路由选择。因此,在互联网上,任何一台电脑可以通过IP地址传送讯息给任何其他的计算机。这些带有计算机IP地址的信息,允许计算机之间双向沟通。这样一来,互联网可以被看作是一个计算机之间信息的交换。据估计,16.9 %的世界人口已经进入互联网且具有最高访问率(以人口百分比衡量),它们在北美地区(69.7 %),大洋洲/澳大利亚(53.5%)和欧洲(38.9%)。在宽带接入方面,冰岛(26.7%),韩国(25.4%)和荷兰(25.3 %)世界领先。互联网的成功,部分是因为协议管理计算机和路由器如何互相沟通。计算机网络通信本身的性质,有助于分层实现,此时,协议栈中的各个独立协议或多或少独立于其他协议。这使得低级别的协议适应网络的情况,而不影响高层协议的实现。一个实际的例子可以说明它的重要性,因为它允许一个互联网浏览器上运行相同的代码,不管运行的计算机连接到互联网是通过以太网还是通过Wi - Fi连接。协议经常以其在OSI参考模型中的位置命名,1983年为第一步,也是一次不成功的尝试,它试图建立一个普遍采用的网络协议套件。对于互联网来说,物理介质和数据链路层协议可以不同的数倍包遍历全球。这是因为互联网对所用的物理介质或数据链路协议没有限制。这导致媒体和协议的应用,它们最适合本地网络的情况。在实践中,多数洲际通讯将使用异步转移模式( ATM )协议(或一个现代的替代物)并辅以光纤。这是因为,对于大多数的洲际通信来说,互联网与公共交换式电话网络一样拥有相同的基础设施。在网络层,适用于逻辑寻址的IP开始标准化。在万维网上,这些“IP地址”来自通过域名系统处理的人类可读格式(例如72.14.207.99是来自)中。目前,使用最广泛的版本的互联网协议是版本 4 ,但向版本六过渡已是迫在眉睫。在传输层大部分通信采用的是传输控制协议(TCP)或用户数据报协议(UDP)。TCP是基本协议,每条来自其他计算机的消息均需采用TCP,而UDP只有在有利时才会被采用。有了TCP,数据包若在它们置于更高层次前丢失或乱序,它们会被重发。有了UDP,数据包丢失时会乱序,也不会重发。TCP和UDP数据包携带端口以便指出数据包应交由哪些应用程序或进程。因为某些应用级协议使用某些端口,网络管理员可以通过阻断某一特定端口为目的端口的传输限制上网。在传输层之上,有一些协议会用到并适当应用于会话层和表示层,最显着的是安全套接层(SSL)和传输层安全(TLS)协议。这些协议,确保双方之间传输的数据仍然完全保密并且一方或另一方在使用时,挂锁出现于Web浏览器的底部。最后,在应用层,有很多的协议为互联网用户所熟悉,如HTTP ( Web浏览) , 的POP3 (电子邮件),FTP (档案传输),IRC (网上聊天),BitTorrent(文件共享)和OSCAR(即时通讯)。局域网不看互联网的发展, 仅局域网的特点(运行于几公里内的计算机网络)仍然明显。这是因为这种规模的网络并不需要所有与较大的网络有关的功能,因此往往更具成本效益和高效率。在二十世纪八十年代中期,几个协议套件的出现,填补了OSI参考模型中数据链路层和应用层之间的空隙。如AppleTalk,IPX和NetBios与20世纪90年代初占主导地位,因MS-DOS而广受欢迎的协议套件IPX。而TCP / IP,在这一点上,通常只用于大型政府和研究设施。随着互联网的受欢迎程度的增长以及较大的流量与互联网逐渐相关,局域网逐步走向TCP / IP。今天的网络大多用于TCP / IP流量是常见的。向TCP / IP的转变由如允许的TCP / IP客户发现自己的网络地址的DHCP的技术支撑,而这与A ppleTalk,IPX/和N etBIOS协议套件以其成为标准。在数据链路层,最现代的局域网偏离互联网。而异步转移模式(ATM)或多协议标签转换(MPLS)技术是典型的数据链路协议,适用于较大的网络。以太网和令牌环网是典型的局域网数据链路协议。这些协议不同于前协议,因为它们更简单(例如,它们省略了服务质量保证等功能) ,并提供碰撞预防。双方的这些差异,是基于经济成本的考虑。尽管令牌环在80年代和90年代有了一定的普及,但是现在几乎所有的局域网使用有线或无线以太网。在物理层,大多数有线以太网实现使用铜双绞线电缆(包括常用的10 Base-T的网络)。然而,一些早期的实现使用同轴电缆,而最近的一些实现(特别是超高速的)使用光纤。光纤也可能在即将到来的10千兆以太网的实现中有着出色的表现。用光纤时,必须对多模光纤和单模光纤加以区分。对于制造商来说,多模光纤可以被认为是便宜的厚光纤,但只有较少可用的带宽和更大的衰减(即较差的长途性能)。。

[电子信息工程] 本科论文英文文献翻译

[电子信息工程] 本科论文英文文献翻译

外文资料翻译学院:电子工程学院系(专业):电子信息工程班级:电子061姓名:学号:一:外文原文3G TECHNOLOGYAlthough the technology behind 3G may seem complicated, the ways in which 3G will affect all of our lives are easy to imagine. Just imagine having a combined camera,videocamera,computer, stereo,and radio included in your mobile phone. Rich-media information and entertainment will be at your fingertips whenever you want anywhere there is a wireless network。

Mobile communication is moving from simple voice to rich media, where we use more of our senses to intensify our experiences.But not all of this will happen at once. 3G is an evolution to a communications ideal that no one completely understands yet. What we do know is that mobile multimedia will hit the Japanese markets in 2001,and Europe and North America will follow soon after。

3G brings together high-speed radio access and IP-based services into one, powerful environment. The step towards IP is vital. IP is packet-based,which in simple terms,means users can be ”on line” at all times,but without having to pay until we actually send or receive data. The connectionless nature of IP also makes access a lot faster:file downloads can take a few seconds and we can be connected to our corporate network with a single click.3G introduces wideband radio communications, with access speeds of up to 2Mbit/s. Compared with today's mobile networks,3G will significantly boost network capacity — so operators will be able to support more users, as well as offer more sophisticated services.3G - At home3G is going to affect our home and social lives in many ways. The services that 3G enables will help us to manage our personal information,simplify tasks such as grocery shopping,make better use of our time and offer services that are just fun to use。

电子信息 外文文献译文

电子信息 外文文献译文

XXXX学院毕业设计(论文)外文参考文献译文本2012届原文出处A Novel Cross-layer Quality-of-service ModelFor Mobile AD hoc Network毕业设计(论文)题目基于COMNETIII的局域网的规划与设计院(系)电气与电子信息学院专业名称电子信息工程学生姓名学生学号指导教师A Novel Cross-layer Quality-of-service ModelFor Mobile AD hoc NetworkLeichun Wang, Shihong Chen, Kun Xiao, Ruimin Hu National Engineering Research Center of Multimedia Software, Wuhan UniversityWuhan 430072, Hubei, chinaEmail:******************Abstract:The divided-layer protocol architecture for Mobile ad hoc Networks (simply MANETs) can only provide partial stack. This leads to treat difficulties in QoS guarantee of multimedia information transmission in MANETs, this paper proposes Across-layers QoS Model for MANETs, CQMM. In CQMM, a core component was added network status repository (NSR), which was the center of information exchange and share among different protocol layers in the stack. At the same time, CQMM carried out all kinds of unified QoS controls. It is advantageous that CQMM avoids redundancy functions among the different protocol layers in the stack and performs effective QoS controls and overall improvements on the network performances.Keyword: Cross-layers QoS Model, Mobile Ad hoc Networks (MANETs), Network Status Repository (NSR), QoS Controls.1 introductionWith the rapid development of multimedia technologies and the great increase of his bandwidth for personal communication, video and video services begin to be deployed in MANETs. Different from static networks and Internet, multimedia communications in MANETs such as V oice and Video services require strict QoS guarantee, especially the delay guarantee. In addition, communication among different users can be integrated services with different QoS requirements. These lead to great challenges in QoS guarantee of multimedia communication in MANETs. There are two main reasons in these: 1) MANETs runs in atypical wireless environment with time-varying and unreliable physical link, broadcast channel, and dynamic and limited bandwidth and so forth. Therefore, it can only provide limited capability for differentiated services with strict QoS requirements [1].2) It is difficult that traditional flow project and access control mechanism are implemented because of mobility, multiple hops and self-organization of MANETs.At present, most researches on QoS based on traditional divided-layer protocol architecture for MANETs focus on MAC protocol supporting QoS [2], QoS routingprotocol [3] and adaptive application layer protocol with QoS support [4], and so on. It is avoid less that there will be some redundancies on functions among the different protocol layers in the stack. This will increase the complexity of QoS implementation and cause some difficulties in overall improvement on the network performances. Therefore, it is not suitable for MANETs with low processing abilityIn recent years, the cross-layers design based on the partial protocol layers in MANETs was put forward.[1] proposed the mechanism with QoS guarantee for heterogeneous flow MAC layer.[5,6,7,8] did some researches on implementing video communication with QoS guarantee by exchange and cooperation of information among a few layers in MANETs. These can improve QoS in MANETs’communication to some extent. However, MANETs is much more complex than wired system and static network, and improvements on QoS guarantee depend on full cooperation among all layers in the protocol stack. Therefore, it is difficult for the design to provide efficient QoS guarantee for communication and overall improvements on the network performances in MANETs.To make good use of limited resources and optimize overall performances in MANETs, this paper proposes a novel cross-layer QoS model, CQMM, where different layers can exchange information fully and unified QoS managements and controls can be performed.The rest of the paper is organized as follows. CQMM is described in section 2 in detail. In section 3, we analyze CQMM by the comparison with DQMM.The section 4 concludes the paper.2. A CROSS-LAYER QOS MODEL FOR MANETS-CQMM2.1 Architecture of CQMMIn MANETs, present researches on QoS are mostly based on traditional divided-layer protocol architecture, where signals and algorithms supporting QoS are designed and implemented in different layers respectively, such as MAC protocol supporting QoS in data link layer [9], routing protocol with QoS support in network layer[10.11],and so forth. It can be summarized as A Divided-layer QoS Model for MANETs, DQMM (see fig.1).In DQMM, different layers in the protocol stack are designed and work independently; there are only static interfaces between different layers that are neighboring in logic; and each protocol layer has some QoS controls such as error control in logic link layer, congestion control in network, etc. On the one hand, DQMM can simplify the design of MANETs greatly and gain the protocols with high reliability and extensibility. On the other one, DQMM also has some shortcomings: 1) due to the independent design among he different protocol layers, there are some redundancy functions among the different protocollayers in the stack, 2) it is difficult that information is exchanged among different layers that are not neighboring in logic, which leads to some problems in unified managements, QoS controls and overall improvements on the network performances.Fig.1Therefore, it is necessary that more attention are focused on the cooperation among physical layer data link layer, network layer and higher when attempting to optimize performances of each of layer in MANETs. For this reason, we combine parameters dispersed in different layers and design a novel cross-layer QoS model, CQMM, to improve the QoS guarantee and the overall network performances. The architecture of CQMM is provided in fig 2From fig.2, it can be seen that CQMM keeps the core functions and relative independence of each protocol layer in the stack and allows direct information exchange between two neighboring layers in logics to maintain advantages of the modular architecture .On the basic of these, a core component is added in CQMM, Network Status Repository (simply NSR).NSR is the center, by which different layers can exchange and share information fully. On the one hand, each protocol layer can read the status information of other protocol layers from NSR to determine its functions and implementation mechanisms. On the other one, each protocol layer can write its status information to NSR that can be provided with other layers in the protocol stack. In CQMM, the protocol layers that are neighboring in logics can exchange information directly orindirectly by NSR, and the protocol layers that are not neighboring in logics can exchange information using cross-layer ways via NSR. Therefore, information exchange is flexible in CQMM.All kinds of QoS controls in CQMM such as management and scheduling of network resources, network lifetime, error control, and congestion control and performance optimization and so on are not carried out independently. On the contrary, CQMM is in charge of the unified management and all QoS controls by the cooperation among different protocol layers in the stack. Each QoS control in MANETs is related to all layers in the protocol stack, and also constrained by all layers in the stack. The results of all QoS operations and managements are fed back to the different layers and written back to NSR, which will become the parameters of all kinds of QoS controls in MANETs.2.2 protocol design in CQMMIn CQMM, the protocol designs aims at the full and free information exchange and cooperation among different protocol layers to avoid possible redundancy functions when maintaining the relative independence among different layers and the advantages of the modular architecture.Physical layer: Physical layer is responsible for modulation, transmission and receiving of data, and also the key to the size, the cost and the energy consumption of each node in MANETs. In CQMM, the design of physical layer is to choose the transmission media, the frequency range and the modulation algorithm wit the low cost, power and complexity, big channel capability and so on, according to the cost of implementation, energy constraint, and capability and QoS requirements from high layer.Data link layer: The layer is low layer in the protocol stack and can be divided into two sub-layers: logic link sub-layer and MAC sub-layer. Compared with high layers, data link layer can sense network status in MANETs earlier such as the change of channel quality, the network congestion and so on. Therefore, on the one hand data link layer can perform the basic QoS controls such as error control and management of communication channel. On the other one, the layer can be combined with high layers to establish, choose and maintain the routing faster, prevent the congestion of the network earlier, and choose appropriate transport mechanisms and control strategies for transport layer.Network layer: The design and implementation of network layer protocol in CQMM is to establish, choose and maintain appropriate routings by taking into consideration the power, the cache, the reliability of each node in a routing. QoS requirements of services from high layer such as the bandwidth and the delay, and implementation strategies oferror control in logic link sub-layer and the way of the channel management in MAC sub-layer.Transport layer: In CQMM, the protocol design of transport layer needs to be aware of both functions and implementation mechanism of lower layers such as the way of error control in data link layer, the means to establish, choose and maintain routing in the network layer, and QoS requirements from the application layer, to determine corresponding transmission strategies. In addition, the transport layer also needs to analyze all kinds of events from low layers such as the interrupt and change of the routing and the network congestion, and then respond properly to avoid useless sending data.Application layer: There are two different strategies in the design of the application layer: 1) differentiated services. According to the functions provided by the low layers applications are classed as the different ones with different priority levels. 2) Application-aware design. Analyze specific requirements of different applications such as the bandwidth, the delay and the delay twitter and so on, and then assign and implement the functions for each layer in the protocol stack according to the requirements.2.3 QoS Cooperation and Management in CQMMIn CQM, the core of QoS cooperation and management is that NSR acts as the exchange and share center of status information in protocol stack, and by the full exchange and share of network status among different protocol layers the management and scheduling of the network resources and the overall optimization of the network performances can be implemented effectively. The management and scheduling of the network resources, the cross-layer QoS cooperation and the overall optimization of the network performances.Management and scheduling of network resources: Network resources include all kinds of resources such as the cache, the energy and the queue in each node, and the communication channel among nodes and so froth. In CQMM, the management and scheduling of the network resources are not to the unified management and scheduling of the network resources and full utilization of limited resources in order to increase the QoS of all kinds of communication.QoS cooperation and control: In CQMM, all kinds of QoS controls and cooperation such as the rate adaptation, the delay guarantee and the congestion control and so on, are not implemented by each layer alone, but completed through the operation of all layers in the protocol stack. For example, the congestion in MANETs can be earlier prevented and controlled by the cooperation among different layers such as ACK from MAC sub-layer,the routing information and the loss rate and delay of package from network layer, and the information of rate adaptation in transport layer and so on.Performances Optimization: In CQMM, the optimization of the network performances aims to establish a network optimization model constrained by all layers in the protocol architecture and finds the “best”ways according to the model in order to improve the overall performances in MANETs.3. ANALYSIS OF CQMMPresent QoS models for MANETs can mainly be classed as a QoS model based on traditional divided-layer architecture DQMM and a cross-layer QoS model proposed by this paper CQMM. QoS model used by [1, 5-8] is to some extent extended on the basis of DQMM in nature. Here, we only compare CQMM with DQMM3.1 Information ExchangeDifferent protocol architecture and principle between CQMM lead to great differences in the means, the frequency, the time and the requirement of the information exchange, (see table 1)From Table 1, it can be seen that compared wit DQMM CQMM has some advantages: 1) more flexible information exchange. Neighboring layers can information by the interfaces between layers or NSR, and crossing layers may exchange information through NSR; 2) simpler transform in information format. Different layers can exchange information by NSR, so these layers only need to deal with the format transform between the layers and NSR;3)lower requirements. The protocol layers can read them in proper time Information from different protocol layers temporarily stored in NSR, so the layers exchanging information are not required to be synchronous in time;4) more accurate control. NSR in CQMM can store information of some time from the different layers, which is advantageous to master the network status and manage the network more accurately. However, these require higher information exchange frequencies among the different layers,, more processing time of each node, and more communication among them.。

电子信息工程论文(英文)

电子信息工程论文(英文)

Electronic and information engineering is the application of the computer and modem technology for electronic information control and information processing the discipline, the main research information acquisition and processing, electronic equipment and information system design, development, application and integration. Now, electronic and information engineering has covered many aspects of the society, like telephone exchange station how to deal with various phone signal, a mobile phone is how to transfer our voice even image, the network around us how to transfer data, and even of the army of the information age how to confidential information transmission, are involved in electronic and information engineering application technology. We can through some basic knowledge learning know these things, and able to apply more advanced technology in new product research and electronic and information engineering is professional This program is to cultivate master the modern electronic technology theory, familiar with electronic system design principle and design method, have stronger computer, foreign language and corresponding engineering technology application ability, facing the electronic technology, automatic control and intelligentcontrol, computer and network technology, electronic, information, communication field of broad caliber, the high quality, comprehensive development of integrated with innovation ability engineering technology talent development.Electronic information engineering major is learning the basic circuit of knowledge, and master the computer processing with the method of information. The first to have solid mathematical knowledge, for physics requirement is high, and mainly electrical; To learn many circuit knowledge, electronic technology, signal and system, computer control principle, communication principle, basic courses. Learning in electronic and information engineering design, to themselves have to connect with computer some circuit experiment, to operate and use tools requirements is also higher. Such as their connection sensor circuit, with computer set small communications system, will also visit some big company of electronic and information processing equipment, understanding mobile phone signal, cable TV is how to transmission, etc, and can organic ?Course classification:1. The mathematicsThe higher mathematics-(the department of mathematics mathematical analysis + space analytic geometry + ordinary differential equation) speak mainly is calculus, to learn thecircuit of the people, the calculus (a yuan, multiple), curve surface integral, series, ordinary differential equation, Fourier transform, the other the Laplace transformation in the subsequent frequently encountered in theory.Probability and statistics-all communication, signal processing with relevant course with probability theory.Mathematical physical methods-some school graduate student intellect, some schools into complex variable functions (+ integral transform) and mathematical physics equation (is partial differential equations). Study the mathematical basis of electromagnetic field, microwave.May also be introduced stochastic process (need to probability basis) and functional analysis.2. TheoryThe circuit principle-basic of the program.Signal and system, continuous and discrete signal time domain, frequency domain analysis, is very important but also is difficultDigital signal processing-discrete signal and system analysis, signal digital transformation, digital filters, and so on.The application of information theory, information theoryrange is very wide, but electronic engineering often put this course speak into coding theory.Electromagnetic field and wave-the day the course, basically is the counterpart of the dynamics in the physics department of the electricity, using mathematical to study the magnetic field (constant electromagnetic field, time-dependent electromagnetic fields).3. CircuitAnalog circuit-the transistor, the op-amp, power supply, A/D and D/A.Digital circuit--a gate, trigger and combination circuit, timing circuit, programmable devices, digital electronic system4. ComputerMicrocomputer principle-80 x86 hardware work principle.Assembly language, direct correspondence of the CPU commands programming language.Single chip microcomputer CPU and control circuit, made a piece of integrated circuit, all sorts of electric equipment of all necessary, normal explanation 51 series.Cc++ language-(now speak only c language schools may not much) writing system programming language, and the development of hardware related often are used.Software foundation-(computer specialized data structure + + + algorithm operating system database principles + compilation approach + software engineering) can also be a few course, speaks the principle of software and how to write software.Professional training requirements:This major is an electronic and information engineering major. Students of this specialty mainly studies the signal acquisition and processing, the power plant equipment information system of professional knowledge, by electronic and information engineering practice of basic training, with design, development, application and integrated electronic equipment and the ability of the information system.Professional training requirements:This major is an electronic and information engineering major. Students of this specialty mainly studies the signal acquisition and processing, the power plant equipment information system of professional knowledge, by electronic and information engineering practice of basic training, with design, development, application and integrated electronic equipment and the ability of the information system.The graduates should have the following several aspects of knowledge and ability:1. Can a system to manage the field wide technology basic theoretical knowledge, to adapt to the electronic and information engineering extensive work range2. Grasp the electronic circuit of the basic theory and experiment technology, analysis and design of electronic equipment basic ability3. To grasp the information acquisition, processing the basic theory and application of the general method, has the design, integration, application and computer simulation of information system of the basic skills.4. Understand the basic principles of information industry, policies and regulations, understand the basic knowledge of the enterprise management5. Understand electronic equipment and information system of theoretical frontiers, with research, development of new system, the new technology preliminary ability6. Master of literature retrieval, material inquires basic ?The future:Electronic information engineering major is learning the basic circuit of knowledge, and master the computer processing with the method of information. The first to have solid mathematical knowledge, for physics requirement is high, andmainly electrical; To learn many circuit knowledge, electronic technology, signal and system, computer control principle, communication principle, basic courses. Learning in electronic and information engineering design, to themselves have to connect with computer some circuit experiment, to operate and use tools requirements is also higher. Such as their connection sensor circuit, with computer set small communications system, will also visit some big company of electronic and information processing equipment, understanding mobile phone signal, cable TV is the ? how to transferAlong with the social informatization of thorough, the most industries need electronic and information engineering professionals, and a high salary. Students can be engaged in electronic equipment and information system design, application development and technical management, etc. For example, make electronic engineers, design develop some electronics, communication device; Do software engineer, hardware design, development and all kinds of relevant software; Do project executive, planning some big system, the experience, knowledge requires high; Still can continue to study to become a teacher, engaged in scientific research work, etc.China IT industry started so far have ten years, very young.Fresh things, chaoyang industry is always much attention. It is for this reason, the computer professional quickly become the university of popular major, many schoolmates sharpening again sharpened head to the ivory tower of ivory top drill, or for interest, or to make a living master a foreign skills, or for future better and faster development.The first few years of the computer professional than hot, in recent years professional to this choice in the gradually rational and objective. Students and parents consider is more of a more advantageous to the personal self based on long-term development of the starting point.In this industry, seems to have the potential law: a short career. So the body not old heart first, thought the "hope the way how to turn what should IT management, sales, or under IT the bodies from beginning to the past business, or simply turned... ., exactly what to do, still wandering in the, in the confusion, the code of a few years ago life seems to be erased it shall not plan, leaving only the deserted what some memories.Too much about the industry's bad, many, many elder's kind advice, in computer professional students in the heart of the buried the uneasy seeds, whether should continue to choose the bank, or career path should be explicit turn? Choose this line,is likely to mean that the choice of physical and mental suffering course, accept the industry of experience.Exit? Is the heart has unwilling, think about for several years hard work, they write in pencil full program writing paper, the class was, when working with the, less romantic hold lots of time, for the future is more a self-confidence to submitting a professional, the profound professional resume. Who would like to be the last into the heart to the east of the water flow.Any one industry all have their own bright and gloomy, just people don't understand. For just the us towards campus, has entered the society for seniors learn elder sister, for different positions of each elder, life is always difficult, brilliant casting is progressive, we can not only see industry bright beautiful beautiful appearance, and neglect of its growth lift behind the difficult, the gap between the two extremes of course huge, from such a perspective, apparently went against the objective. And for his future career build is the same, it's early form, its make, its cast, it's affluent, and it's thick, is a brick step by step a tired build by laying bricks or stones.Exactly do a "starter, don't want to entry-level, want to introduction and no entry-level" IT people, the answer at ease in each one.Can say electronic and information engineering is a promising discipline, is not optional despise any a subject. To do a line, loves a line, since choosing it, will it never do things by halves.on Electronic and information engineering is the application of the computer and modem technology for electronic information control and information processing the discipline, the main research information acquisition and processing, electronic equipment and information system design, development, application and integration. Now, electronic and information engineering has covered many aspects of the society, like telephone exchange station how to deal with various phone signal, a mobile phone is how to transfer our voice even image, the network around us how to transfer data, and even of the army of the informatiage how to confidential information transmission, are involved in electronic and information engineering application technology. We can through some basic knowledge learning know these things, and able to apply more advanced technology to research and development of new products.Electronic information engineering major is learning the basic circuit of knowledge, and master the computer processing with the method of information. The first to have solidmathematical knowledge, for physics requirement is high, and mainly electrical; To learn many circuit knowledge, electronic technology, signal and system, computer control principle, communication principle, basic courses. Learning in electronic and information engineering design, to themselves have to connect with computer some circuit experiment, to operate and use tools requirements is also higher. Such as their connection sensor circuit, with computer set small communications system, will also visit some big company of electronic and information processing equipment, understanding mobile phone signal, cable TV is how to transmission, etc, and can organic ?。

信息系统信息技术中英文对照外文翻译文献

信息系统信息技术中英文对照外文翻译文献

中英文资料外文翻译文献Information Systems Outsourcing Life Cycle And Risks Analysis 1. IntroductionInformation systems outsourcing has obtained tremendous attentions in the information technology industry.Although there are a number of reasons for companies to pursuing information systems (IS)outsourcing , the most prominent motivation for IS outsourcing that revealed in the literatures was “cost saving”. Costfactor has been a major decision factors for IS outsourcing.Other than cost factor, there are other reasons for outsourcing decision.The Outsourcing Institute surveyed outsourcing end-users from their membership in 1998 and found that top 10 reasons companies outsource were:Reduce and control operating costs,improve company focus,gain access to world-class capabilities,free internal resources for other purposes, resources are not available internally, accelerate reengineering benefits, function difficult to manage/out of control,make capital funds available, share risks, and cash infusion.Within these top ten outsourcing reasons, there are three items that related to financial concerns, they are operating costs, capital funds available, and cash infusion. Since the phenomenon of wage difference exists in the outsourced countries, it is obvious that outsourcing companies would save remarkable amount of labor cost.According to Gartner, Inc.'s report, world business outsourcing services would grow from $110 billion in 2002 to $173 billion in 2007,a proximately 9.5% annual growth rate.In addition to cost saving concern, there are other factors that influence outsourcing decision, including the awareness of success and risk factors, the outsourcing risks identification and management,and the project quality management. Outsourcing activities are substantially complicated and outsourcing project usually carries a huge array of risks. Unmanaged outsourcing risks will increase total project cost, devaluatesoftware quality, delay project completion time, and finally lower the success rate of the outsourcing project.Outsourcing risks have been discovered in areas such as unexpected transition and management costs, switching costs, costly contractual amendments, disputes and litigation, service debasement, cost escalation, loss of organizational competence, hidden service costs,and so on.Most published outsourcing studies focused on organizational and managerial issues. We believe that IS outsourcing projects embrace various risks and uncertainty that may inhibit the chance of outsourcing success. In addition to service and management related risk issues, we feel that technical issues that restrain the degree of outsourcing success may have been overlooked. These technical issues are project management, software quality, and quality assessment methods that can be used to implement IS outsourcing projects.Unmanaged risks generate loss. We intend to identify the technical risks during outsourcing period, so these technical risks can be properly managed and the cost of outsourcing project can be further reduced. The main purpose of this paper is to identify the different phases of IS outsourcing life cycle, and to discuss the implications of success and risk factors, software quality and project management,and their impacts to the success of IT outsourcing.Most outsourcing initiatives involve strategic planning and management participation, therefore, the decision process is obviously broad and lengthy. In order to conduct a comprehensive study onto outsourcing project risk analysis, we propose an IS outsourcing life cycle framework to be served as a yardstick. Each IS outsourcing phase is named and all inherited risks are identified in this life cycle framework.Furthermore,we propose to use software qualitymanagement tools and methods in order to enhance the success rate of IS outsourcing project.ISO 9000 is a series of quality systems standards developed by the International Organization for Standardization (ISO).ISO's quality standards have been adopted by many countries as a major target for quality certification.Other ISO standards such as ISO 9001, ISO 9000-3,ISO 9004-2, and ISO 9004-4 are quality standards that can be applied to the software industry.Currently, ISO is working on ISO 31000, a risk management guidance standard. These ISO quality systems and risk management standards are generic in nature, however, they may not be sufficient for IS outsourcing practice. This paper, therefore,proposes an outsourcing life cycle framework to distinguish related quality and risk management issues during outsourcing practice.The following sections start with needed theoretical foundations to IS outsourcing,including economic theories, outsourcing contracting theories, and risk theories. The IS outsourcing life cycle framework is then introduced.It continues to discuss the risk implications in precontract,contract, and post-contract phases. ISO standards on quality systems and risk management are discussed and compared in the next section. A conclusion and direction for future study are provided in the last section.2. Theoretical foundations2.1. Economic theories related to outsourcingAlthough there are a number of reasons for pursuing IS outsourcing,the cost savingis a main attraction that leads companies to search for outsourcing opportunities. In principle, five outsourcing related economic theories that lay the groundwork of outsourcing practice, theyare:(1)production cost economics,(2)transaction cost theory,(3)resource based theory,(4)competitive advantage, and(5)economies of scale.Production cost economics was proposed by Williamson, who mentioned that “a firm seeks to maximize its profit also subjects to its production function and market opportunities for selling outputs and buying inputs”. It is clear that production cost economics identifies the phenomenon that a firm may pursue the goal of low-cost production process.Transaction cost theory was proposed by Coase. Transaction cost theory implies that in an economy, there are many economic activities occurred outside the price systems. Transaction costs in business activities are the time and expense of negotiation, and writing and enforcing contracts between buyers and suppliers .When transaction cost is low because of lower uncertainty, companies are expected to adopt outsourcing.The focus of resource-based theory is “the heart of the firm centers on deployment and combination of specific inputs rather than on avoidance of opportunities”. Conner suggested that “Firms as seekers of costly-to-copy inputs for production and distribution”.Through resource-based theory, we can infer that “outsourcing decision is to seek external resources or capability for meeting firm's objectives such as cost-saving and capability improving”.Porter, in his competitive forces model, proposed the concept of competitive advantage. Besanko et al.explicated the term of competitive advantage, through economic concept, as “When a firm(or business unit within a multi-business firm) earns a higher rate of economic profit than the average rate of economic profit of other firms competing within the same market, the firm has a competitive advantage.” Outsourcing decision, therefore, is to seek cost saving that meets the goal of competitive advantage within a firm.The economies of scale is a theoretical foundation for creating and sustaining the consulting business. Information systems(IS) and information technology(IT) consulting firms, in essence, bear the advantage of economies of scale since their average costs decrease because they offer a mass amount of specialized IS/IT services in the marketplace.2.2. Economic implication on contractingAn outsourcing contract defines the provision of services and charges that need to be completed in a contracting period between two contracting parties. Since most IS/IT projects are large in scale, a valuable contract should list complete set of tasks and responsibilities that each contracting party needs to perform. The study of contracting becomes essential because a complete contract setting could eliminate possible opportunistic behavior, confusion, and ambiguity between two contracting parties.Although contracting parties intend to reach a complete contract,in real world, most contracts are incomplete. Incomplete contracts cause not only implementing difficultiesbut also resulting in litigation action. Business relationship may easily be ruined by holding incomplete contracts. In order to reach a complete contract, the contracting parties must pay sufficient attention to remove any ambiguity, confusion, and unidentified and immeasurable conditions/ terms from the contract. According to Besanko et al., incomplete contracting stems from the following three factors: bounded rationality, difficulties on specifying or measuring performance, and asymmetric information.Bounded rationality describes human limitation on information processing, complexity handling, and rational decision-making. An incomplete contract stems from unexpected circumstances that may be ignored during contract negotiation. Most contracts consist of complex product requirements and performance measurements. In reality, it is difficult to specify a set of comprehensive metrics for meeting each party's right and responsibility. Therefore, any vague or open-ended statements in contract will definitely result in an incomplete contract. Lastly, it is possible that each party may not have equal access to all contract-relevant information sources. This situation of asymmetric information results in an unfair negotiation,thus it becomes an incomplete contract.2.3. Risk in outsource contractingRisk can be identified as an undesirable event, a probability function,variance of the distribution of outcomes, or expected loss. Risk can be classified into endogenous and exogenous ris ks. Exogenous risks are“risks over which we have no control and which are not affected by our actions.”. For example, natural disasters such as earthquakes and flood are exogenous risks. Endogenous risks are “risks that are dependent on our actions”.We can infer that risks occurring during outsource contracting should belong to such category.Risk (RE) can be calculated through “a function of the probability of a negative outcome and the importance of the loss due to the occurrence of this outcome:RE = ΣiP(UOi)≠L(UOi) (1) where P(UOi) is the probability of an undesirable outcome i, and L(UOi) is the loss due to the undesirable outcome i.”.Software risks can also be analyzed through two characteristics :uncertainty and loss. Pressman suggested that the best way to analyze software risks is to quantify the level of uncertainty and the degree of loss that associated with each kind of risk. His risk content matches to above mentioned Eq.(1).Pressman classified software risks into the following categories: project risks, technical risks, and business risks.Outsourcing risks stem from various sources. Aubert et al. adopted transaction cost theory and agency theory as the foundation for deriving undesirable events and their associated risk factors.Transaction cost theory has been discussed in the Section 2.2. Agency theory focuses on client's problem while choosing an agent(that is, a service provider), and working relationship building and maintenance, under the restriction of information asymmetry.Various risk factors would be produced if such agent–client relationship becomes crumble.It is evident that a complete contract could eliminate the risk that caused by an incomplete contract and/or possible opportunistic behavior prompted by any contracting party. Opportunistic behavior is one of the main sources that cause transactional risk. Opportunistic behavior occurs when a transactional partner observes away of saving cost or removing responsibility during contracting period, this company may take action to pursue such opportunity. This type of opportunistic behavior could be encouraged if such contract was not completely specified at the first place.Outsourcing risks could generate additional unexpected cost to an outsourcing project. In order to conduct a better IS outsourcing project, identifying possible risk factors and implementing matured risk management process could make information systems outsourcing more successful than ever.rmation system outsourcing life cycleThe life cycle concept is originally used to describe a period of one generation of organism in biological system. In essence, the term of life cycle is the description of all activities that a subject is involved in a period from its birth to its end. The life cycle concept has been applied into project management area. A project life cycle, according to Schwalbe, is a collection of project phases such as concept,development, implementation, and close-out. Within the above mentioned four phases, the first two phases center on “planning”activity and the last two phases focus on “delivery the actual work” Of project management.Similarly, the concept of life cycle can be applied into information systems outsourcing analysis. Information systems outsourcing life cycle describes a sequence of activities to be performed during company's IS outsourcing practice. Hirsch heim and Dibbern once described a client-based IS outsourcing life cycle as: “It starts with the IS outsourcing decision, continues with the outsourcing relationship(life of the contract)and ends with the cancellation or end of the relationship, i.e., the end of the contract. The end of the relationship forces a new outsourcing decision.” It is clear that Hirsch heim and Dibbern viewed “outsourcing relationship” as a determinant in IS outsourcing life cycle.IS outsourcing life cycle starts with outsourcing need and then ends with contract completion. This life cycle restarts with the search for a new outsourcing contract if needed. An outsourcing company may be satisfied with the same outsourcing vendor if the transaction costs remain low, then a new cycle goes on. Otherwise, a new search for an outsourcing vendor may be started. One of the main goals for seeking outsourcing contract is cost minimization. Transaction cost theory(discussed in the Section 2.1)indicates that company pursuing contract costs money, thus low transaction cost will be the driver of extending IS outsourcing life cycle.The span of IS outsourcing life cycle embraces a major portion of contracting activities. The whole IS outsourcing life cycle can be divided into three phases(see Fig.1): pre-contract phase, contract phase, and post-contract phase. Pre-contract phase includes activities before a major contract is signed, such as identifying the need for outsourcing, planning and strategic setting, and outsourcing vendor selection. Contract phase startswhile an outsourcing contract is signed and then lasted until the end of contracting period. It includes activities such as contracting process, transitioning process, and outsourcing project execution. Post-contract phase contains those activities to be done after contract expiration, such as outsourcing project assessment, and making decision for the next outsourcing contract.Fig.1. The IS outsourcing life cycleWhen a company intends to outsource its information systems projects to external entities, several activities are involved in information systems outsourcing life cycle. Specifically, they are:1. Identifying the need for outsourcing:A firm may face strict external environment such as stern market competition,competitor's cost saving through outsourcing, or economic downturn that initiates it to consider outsourcing IS projects. In addition to external environment, some internal factors may also lead to outsourcing consideration. These organizational predicaments include the need for technical skills, financial constraint, investors' request, or simply cost saving concern. A firm needs to carefully conduct a study to its internal and external positioning before making an outsourcing decision.2. Planning and strategic setting:If a firm identifies a need for IS outsourcing, it needs to make sure that the decision to outsource should meet with company's strategic plan and objectives. Later, this firm needs to integrate outsourcing plan into corporate strategy. Many tasks need to be fulfilled during planning and strategic setting stages, including determining outsourcing goals, objectives, scope, schedule, cost, business model, and processes. A careful outsourcing planning prepares a firm for pursuing a successful outsourcing project.3. Outsourcing vendor selection:A firm begins the vendor selection process with the creation of request for information (RFI) and request for proposal (RFP) documents. An outsourcing firm should provide sufficient information about the requirements and expectations for an outsourcing project. After receiving those proposals from vendors, this company needs to select a prospective outsourcing vendor, based on the strategic needs and project requirements.4. Contracting process:A contract negotiation process begins after the company selects a probable outsourcing vendor. Contracting process is critical to the success of an outsourcing project since all the aspects of the contract should be specified and covered, including fundamental, managerial, technological, pricing, financial, and legal features. In order to avoid resulting in an incomplete contract, the final contract should be reviewed by two parties' legal consultants.Most importantly, the service level agreements (SLA) must be clearly identified in the contract.5. Transitioning process:Transitioning process starts after a company signed an outsourcing contract with a vendor. Transition management is defined as “the detailed, desk-level knowledge transfer and documentation of all relevant tasks, technologies, workflows, people, and functions”.Transitioni ng process is a complicate phase in IS outsourcing life cycle since it involves many essential workloads before an outsourcing project can be actually implemented. Robinson et al.characterized transition management into the following components:“employee management, communication management, knowledge management, and quality management”. It is apparent that conducting transitioning process needs the capabilities of human resources, communication skill, knowledge transfer, and quality control.6. Outsourcing project execution:After transitioning process, it is time for vendor and client to execute their outsourcing project. There are four components within this“contract governance” stage:project management, relationship management, change management, and risk management. Any items listed in the contract and its service level agreements (SLAs) need to be delivered and implemented as requested. Especially, client and vendor relationships, change requests and records, and risk variables must be carefully managed and administered.7. Outsourcing project assessment:During the end of an outsourcing project period, vendor must deliver its final product/service for client's approval. The outsourcing client must assess the quality of product/service that provided by its client. The outsourcing client must measure his/her satisfaction level to the product/service provided by the client. A satisfied assessment and good relationship will guarantee the continuation of the next outsourcing contract.The results of the previous activity (that is, project assessment) will be the base of determining the next outsourcing contract. A firm evaluates its satisfaction level based on predetermined outsourcing goals and contracting criteria. An outsourcing company also observes outsourcing cost and risks involved in the project. If a firm is satisfied with the current outsourcing vendor, it is likely that a renewable contract could start with the same vendor. Otherwise, a new “precontract phase” would restart to s earch for a new outsourcing vendor.This activity will lead to a new outsourcing life cycle. Fig.1 shows two dotted arrowlines for these two alternatives: the dotted arrow line 3.a.indicates “renewable contract” path and the dotted arrow line 3.b.indicates “a new contract search” path.Each phase in IS outsourcing life cycle is full of needed activities and processes (see Fig.1). In order to clearly examine the dynamics of risks and outsourcing activities, the following sections provide detailed analyses. The pre-contract phase in IS outsourcing life cycle focuses on the awareness of outsourcing success factors and related risk factors. The contract phase in IS outsourcing life cycle centers on the mechanism of project management and risk management. The post-contract phase in IS outsourcing life cycle concentrates on the need of selecting suitable project quality assessment methods.4. Actions in pre-contract phase: awareness of success and risk factorsThe pre-contract period is the first phase in information systems outsourcing life cycle (see Fig.1). While in this phase, an outsourcing firm should first identify its need for IS outsourcing. After determining the need for IS outsourcing, the firm needs to carefully create an outsourcing plan. This firm must align corporate strategy into its outsourcing plan.In order to well prepare for corporate IS outsourcing, a firm must understand current market situation, its competitiveness, and economic environment. The next important task to be done is to identify outsourcing success factors, which can be used to serve as the guidance for strategic outsourcing planning. In addition to know success factors,an outsourcing firm must also recognize possible risks involved in IS outsourcing, thus allows a firm to formulate a better outsourcing strategy.Conclusion and research directionsThis paper presents a three-phased IS outsourcing life cycle and its associated risk factors that affect the success of outsourcing projects.Outsourcing life cycle is complicated and complex in nature. Outsourcing companies usually invest a great effort to select suitable service vendors However,many risks exit in vendor selection process. Although outsourcing costs are the major reason for doing outsourcing, the firms are seeking outsourcing success through quality assurance and risk control. This decision path is understandable since the outcome of project risks represents the amount of additional project cost. Therefore, carefully manage the project and its risk factors would save outsourcing companies a tremendous amount of money.This paper discusses various issues related to outsourcing success, risk factors, quality assessment methods, and project management techniques. The future research may touch alternate risk estimation methodology. For example, risk uncertainty can be used to identify the accuracy of the outsourcing risk estimation. Another possible method to estimate outsourcing risk is through the Total Cost of Ownership(TCO) method. TCO method has been used in IT management for financial portfolio analysis and investment decision making. Since the concept of risk is in essence the cost (of loss) to outsourcing clients, it thus becomes a possible research method to solve outsourcing decision.信息系统的生命周期和风险分析1.绪言信息系统外包在信息技术工业已经获得了巨大的关注。

电子信息专业英文论文

电子信息专业英文论文

电子信息专业英文论文电子信息专业英文论文电子信息专业英文论文该如何写呢?写些什么内容呢?本文是小编精心编辑的电子信息专业英文论文,希望能帮助到你!信息技术的应用与普及,现代信息技术正在向教学、科研、管理的每一个环节渗透,将改变传统的教学模式并大幅度提高教育资源的利用效率。

数字化校园、网上大学已被人们熟悉,教育正在走向全面的信息化。

The application and popularization of information technology, modern informationtechnology to the teaching, scientific research and management of each link, will change the traditional teaching mode and greatly improve the utilization efficiency of education resources. Online university digital campus, has been familiar, education is to the comprehensive information.一个校园弱电系统的建设,其最终建设目标是将新校区建设成为一个信息化时代下的高水平的智能化、数字化校园,从而为学校的教育信息化打下坚实的基础。

通过在某学校新校区弱电系统设计中的体会,谈谈智能化校园弱电系统集成的一点思考。

A weak current system of campus construction, construction of its ultimate goal is to become a new campus construction information era under the high level of intelligence, digital campus, so as to lay a solid foundation for the school education informatization. In the new campus of a school in the weak current system design experience, talk about a bit weak current system integration of intelligent campus thinking.1设计原则1 design principles弱电系统设计方案依据应结合用户需求,并在设计中遵循以下设计原则:Weak current system design scheme on the basis of should be combined with the user requirements, and follow the following principles in the design:(1)实用原则。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
相关文档
最新文档