外文翻译文献资料

合集下载

浙江大学本科毕业论文外文文献翻译

浙江大学本科毕业论文外文文献翻译

核准通过,归档资料。

未经允许,请勿外传!浙江大学本科毕业论文外文文献翻译The influence of political connections on the firm value of small and medium-sized enterprises in China政治关联在中国对中小型企业价值的影响1摘要中小型企业的价值受很多因素的影响,比如股东、现金流以及政治关联等.这篇文章调查的正是在中国政治关联对中小型企业价值的影响。

通过实验数据来分析政治关联对企业价值效益的影响.结果表明政府关联是关键的因素并且在中国对中小型企业的价值具有负面影响。

2重要内容翻译2。

1引言在商业界,有越来越多关于政治关联的影响的经济研究。

它们发现政治关联能够帮助企业确保有利的规章条件以及成功获得资源,比如能够最终提高企业价值或是提升绩效的银行贷款,这种政治关联的影响在不同的经济条件下呈现不同的效果。

在高腐败和法律制度薄弱的国家,政治关联对企业价值具有决定性因素1的作用.中国由高度集权的计划经济向市场经济转变,政府对市场具有较强的控制作用,而且有大量的上市企业具有政治关联。

中小型企业发展的很迅速,他们已经在全球经济环境中变得越来越重要。

从90年代起, 政治因素对中国的任何规模的企业来说都变得越来越重要,尤其是中小型企业的价值。

和其他的部门相比较,中小型企业只有较小的现金流,不稳定的现金流且高负债率.一方面,中小型企业改变更加灵活;另一方面,中小型企业在由于企业规模以及对银行来说没有可以抵押的资产,在筹资方面较为困难。

企业如何应对微观经济环境和政策去保证正常的企业活动,并且政治关联如何影响企业价值?这篇论文调查政治关联和企业价值之间的联系,并且试图去研究企业是否可以从政治关联中获利提升企业价值。

2.2定义这些中小型企业之所以叫中小型企业,是和管理规模有关。

对这些小企业来说,雇员很少,营业额较低,资金一般由较少的人提供,因此,通常由这些业主直接管理企业。

软件工程(外文翻译文献)

软件工程(外文翻译文献)

外文文献资料1、Software EngineeringSoftware is the sequences of instructions in one or more programming languages that comprise a computer application to automate some business function. Engineering is the use of tools and techniques in problem solving. Putting the two words together, software engineering is the systemtic application of tools and techniques in the development of computer-based applications.The software engineering process describes the steps it takes to deelop the system. We begin a development project with the notion that there is a problem to be solved via automation. The process is how you get from problem recognition to a working solution. A quality process is desirable because it is more likely to lead to a quality product. The process followed by a project team during the development life cycle of an application should be orderly, goal-oriented, enjoyable, and a learning experience.Object-oriented methodology is an approach to system lifecycle development that takes a top-down view of data objects, their allowable actions, and the underlying communication requirement to define a system architecture. The data and action components are encapsulated, that is , they are combined together, to form abstract data types Encapsulation means that if I know what data I want ,I also know the allowable processes against that data. Data are designed as lattice hierarchies of relationships to ensure that top-down, hierarchic inheritance and side ways relationships are accommodated. Encapsulated objects are constrained only to communicate via messages. At a minimum, messages indicate the receiver and action requested. Messages may be more elaborate, including the sender and data to be acted upon.That we try to apply engineering discipline to software development does not mean that we have all the answers about how to build applications. On the contrary, we still build systems that are not useful and thus are not used. Part of the reason for continuing problems in application development, is that we are constantly trying to hita moving target. Both the technology and the type of applications needed by businesses are constantly changing and becoming more complex. Our ability to develop and disseminate knowledge about how to successfully build systems for new technologies and new application types seriously lags behind technological and business changes.Another reason for continuing problems in application development is that we aren’t always free to do what we like and it is hard to change habits and cultures from the old way of doing things, as well as get users to agree with a new sequence of events or an unfamiliar format for documentation.You might ask then, if many organizations don’t use good software engineering practices, why should I bother learning them? There are two good answers to this question. First, if you never know the right thing to do, you have no chance of ever using it. Second, organizations will frequently accept evolutionary, small steps of change instead of revolutionary, massive change. You can learn individual techniques that can be applied without complete devotion to one way of developing systems. In this way, software engineering can speed changee in their organizations by demonstrating how the tools and techniques enhance th quality of both the product and the process of building a system.2、Data Base System1、IntroductionThe development of corporate databases will be one of the most important data-processing activities for the rest of the 1970s. Date will be increasingly regarded as a vital corporate resource, which must be organized so as to maximize their value. In addition to the databases within an organization, a vast new demand is growing for database services, which will collect, organize, and sell data.The files of data which computers can use are growing at a staggering rate. The growth rate in the size of computer storage is greater than the growth in the size or power of any other component in the exploding data processing industry. The more data the computers have access to, the greater is their potential power. In all walks of life and in all areas of industry, data banks will change the areas of what it is possiblefor man to do. In the end of this century, historians will look back to the coming of computer data banks and their associated facilities as a step which changed the nature of the evolution of society, perhaps eventually having a greater effect on the human condition than even the invention of the printing press.Some most impressive corporate growth stories of the generation are largely attributable to the explosive growth in the need of information.The vast majority of this information is not yet computerized. However, the cost of data storage hardware is dropping more rapidly than other costs in data processing. It will become cheaper to store data on computer files than to store them on paper. Not only printed information will be stored. The computer industry is improving its capability to store line drawing, data in facsimile form, photo-graphs, human speech, etc. In fact, any form of information other than the most intimate communications between humans can be transmitted and stored digitally.There are two main technology developments likely to become available in the near future. First, there are electromagnetic devices that will hold much more data than disks but have much longer access time. Second, there are solid-state technologies that will give microsecond access time but capacities are smaller than disks.Disks themselves may be increased in capacity somewhat. For the longer term future there are a number of new technologies which are currently working in research labs which may replace disks and may provide very large microsecond-access-time devices. A steady stream of new storage devices is thus likely to reach the marketplace over the next 5 years, rapidly lowering the cost of storing data.Given the available technologies, it is likely that on-line data bases will use two or three levels of storage. One solid-state with microsecond access time, one electromagnetic with access time of a fraction of a second. If two ,three ,or four levels of storage are used, physical storage organization will become more complex ,probably with paging mechanisms to move data between the levels; solid-state storage offers the possibility of parallel search operation and associativememory.Both the quantity of data stored and the complexity of their organization are going up by leaps and bounds. The first trillion bit on-line stores are now in use . in a few year’s time ,stores of this size may be common.A particularly important consideration in data base design is to store the data so that the can be used for a wide variety of applications and so that the way they can be changed quickly and easily. On computer installation prior to the data base era it has been remarkably difficult to change the way data are used. Different programmers view the data in different ways and constantly want to modify them as new needs arise modification , however ,can set off a chain reaction of changes to existing programs and hence can be exceedingly expensive to accomplish .Consequently , data processing has tended to become frozen into its old data structures .To achieve flexibility of data usage that is essential in most commercial situations . Two aspects of data base design are important. First, it should be possible to interrogate and search the data base without the lengthy operation of writing programs in conventional programming languages. Second ,the data should be independent of the programs which use them so that they can be added to or restructured without the programs being changed .The work of designing a data base is becoming increasing difficult , especially if it is to perform in an optimal fashion . There are many different ways in which data can be structured ,and they have different types of data need to be organized in different ways. Different data have different characteristics , which ought to effect the data organization ,and different users have fundamentally different requirements. So we need a kind of data base management system(DBMS)to manage data.Data base design using the entity-relationship model begins with a list of the entity types involved and the relationships among them. The philosophy of assuming that the designer knows what the entity types are at the outset is significantly different from the philosophy behind the normalization-based approach.The entity-relationship(E-R)approach uses entity-relationship diagrams. The E-Rapproach requires several steps to produre a structure that is acceptable by the particular DBMS. These steps are:(1) Data analysis(2) Producing and optimizing the entity model.(3) Logical schema development(4) Physical data base design process.Developing a data base structure from user requirements is called data bases design. Most practitioners agree that there are two separate phases to the data base design process. The design of a logical database structure that is processable by the data base management system(DBMS)d escribes the user’s view of data, and is the selection of a physical structure such as the indexed sequential or direct access method of the intended DBMS.Current data base design technology shows many residual effects of its outgrowth from single-record file design methods. File design is primarily application program dependent since the data has been defined and structured in terms of individual applications to use them. The advent of DBMS revised the emphasis in data and program design approaches.There are many interlocking questions in the design of data-base systems and many types of technique that one can use is answer to the question so many; in fact, that one often sees valuable approaches being overlooked in the design and vital questions not being asked.There will soon be new storage devices, new software techniques, and new types of data bases. The details will change, but most of the principles will remain. Therefore, the reader should concentrate on the principles.2、Data base systemThe conception used for describing files and data bases has varied substantially in the same organization.A data base may be defined as a collection of interrelated data stored together with as little redundancy as possible to serve on or more applications in an optimal fashion; the data are stored so that they are independent of programs which use thedata; a common and controlled approach is used in adding new data and in modifying and retrieving existing data within the data base. One system is said to contain a collection of data bases if they are entirely separate in structure.A data base may be designed for batch processing, real-time processing, or in-line processing. A data base system involve application program, DBMS, and data base.One of the most important characteristics of most data bases is that they will constantly need to change and grow. Easy restructuring of the data base must be possible as new data types and new applications are added. The restructuring should be possible without having to rewrite the application program and in general should cause as little upheaval as possible. The ease with which a data base can be changed will have a major effect on the rate at which data-processing application can be developed in a corporation.The term data independence is often quoted as being one of the main attributes of a data base. It implies that the data and the application programs which use them are independent so that either may be changed without changing the other. When a single set of data items serves a variety of applications, different application programs perceive different relationships between the data items. To a large extent, data-base organization is concerned with the representation of relationship between data items and records as well as how and where the data are stored. A data base used for many applications can have multiple interconnections between the data item about which we may wish to record. It can describes the real world. The data item represents an attribute, and the attribute must be associated with the relevant entity. We design values to the attributes, one attribute has a special significance in that it identifies the entity.An attribute or set of attribute which the computer uses to identify a record or tuple is referred to as a key. The primary key is defined as that key used to uniquely identify one record or tuple. The primary key is of great importance because it is used by the computer in locating the record or tuple by means of an index or addressing algorithm.If the function of a data base were merely to store data, its organization would be simple. Most of the complexities arise from the fact that is must also show the relationships between the various items of data that are stored. It is different to describe the data in logical or physical.The logical data base description is referred to as a schema .A schema is a chart of the types of data that one used. It gives the names of the entities and attributes, and specifics the relations between them. It is a framework into which the values of the data-items can be fitted.We must distinguish between a record type and a instance of the record. When we talk about a “personnel record”,this is really a record type.There are no data values associated with it.The term schema is used to mean an overall chart of all of the dataitem types and record types stored in a data he uses. Many different subschema can be derived from one schema.The schema and the subschema are both used by the data-base management system, the primary function of which is to serve the application programs by executing their data operations.A DBMS will usually be handing multiple data calls concurrently. It must organize its system buffers so that different data operations can be in process together. It provides a data definition language to specify the conceptual schema and most likely, some of the details regarding the implementation of the conceptual schema by the physical schema. The data definition language is a high-level language, enabling one to describe the conceptual schema in terms of a “data model” .The choice of a data model is a difficult one, since it must be rich enough in structure to describe significant aspects of the real world, yet it must be possible to determine fairly automatically an efficient implementation of the conceptual schema by a physical schema. It should be emphasized that while a DBMS might be used to build small data bases, many data bases involve millions of bytes, and an inefficient implementation can be disastrous.We will discuss the data model in the following.3、Three Data ModelsLogical schemas are defined as data models with the underlying structure of particular database management systems superimposed on them. At the present time, there are three main underlying structures for database management systems. These are :RelationalHierarchicalNetworkThe hierarchical and network structures have been used for DBMS since the 1960s. The relational structure was introduced in the early 1970s.In the relational model, the entities and their relationships are represented by two-dimensional tables. Every table represents an entity and is made up of rows and columns. Relationships between entities are represented by common columns containing identical values from a domain or range of possible values.The last user is presented with a simple data model. His and her request are formulated in terms of the information content and do not reflect any complexities due to system-oriented aspects. A relational data model is what the user sees, but it is not necessarily what will be implemented physically.The relational data model removes the details of storage structure and access strategy from the user interface. The model provides a relatively higher degree of data. To be able to make use of this property of the relational data model however, the design of the relations must be complete and accurate.Although some DBMS based on the relational data model are commercially available today, it is difficult to provide a complete set of operational capabilities with required efficiency on a large scale. It appears today that technological improvements in providing faster and more reliable hardware may answer the question positively.The hierarchical data model is based on a tree-like structure made up of nodes and branches. A node is a collection of data attributes describing the entity at that point.The highest node of the hierarchical tree structure is called a root. The nodes at succeeding lower levels are called children .A hierarchical data model always starts with a root node. Every node consists of one or more attributes describing the entity at that node. Dependent nodes can follow the succeeding levels. The node in the preceding level becomes the parent node of the new dependent nodes. A parent node can have one child node as a dependent or many children nodes. The major advantage of the hierarchical data model is the existence of proven database management systems that use the hierarchical data model as the basic structure. There is a reduction of data dependency but any child node is accessible only through its parent node, the many-to –many relationship can be implemented only in a clumsy way. This often results in a redundancy in stored data.The network data model interconnects the entities of an enterprise into a network. In the network data model a data base consists of a number of areas. An area contains records. In turn, a record may consist of fields. A set which is a grouping of records, may reside in an area or span a number of areas. A set type is based on the owner record type and the member record type. The many-to many relation-ship, which occurs quite frequently in real life can be implemented easily. The network data model is very complex, the application programmer must be familiar with the logical structure of the data base.4、Logical Design and Physical DesignLogical design of databases is mainly concerned with superimposing the constructs of the data base management system on the logical data model. There are three mainly models: hierarchical, relational, network we have mentioned above.The physical model is a framework of the database to be stored on physical devices. The model must be constructed with every regard given to the performance of the resulting database. One should carry out an analysis of the physical model with average frequencies of occurrences of the grou pings of the data elements, with expected space estimates, and with respect to time estimates for retrieving and maintaining the data.The database designer may find it necessary to have multiple entry points into a database, or to access a particular segment type with more than one key. To provide this type of access; it may be necessary to invert the segment on the keys. Thephysical designer must have expertise in knowledge of the DBMS functions and understanding of the characteristics of direct access devices and knowledge of the applications.Many data bases have links between one record and another, called pointers. A pointer is a field in one record which indicates where a second record is located on the storage devices.Records that exist on storage devices is a given physical sequence. This sequencing may be employed for some purpose. The most common pupose is that records are needed in a given sequence by certain data-processing operations and so they are stored in that sequences.Different applications may need records in different sequences.The most common method of ordering records is to have them in sequence by a key —that key which is most commonly used for addressing them. An index is required to find any record without a lengthy search of the file.If the data records are laid out sequentially by key, the index for that key can be much smaller than they are nonsequential.Hashing has been used for addressing random-access storages since they first came into existence in the mid-1950s. But nobody had the temerity to use the word hashing until 1968.Many systems analysis has avoided the use of hashing in the suspicion that it is complicated. In fact, it is simple to use and has two important advantages over indexing. First, it finds most records with only one seek and second, insertion and deletions can be handled without added complexity. Indexing, however, can be used with a file which is sequential by prime key and this is an overriding advantage, for some batch-pro-cessing applications.Many data-base systems use chains to interconnect records also. A chain refers to a group of records scatters within the files and interconnected by a sequence of pointers. The software that is used to retrive the chained records will make them appear to the application programmer as a contiguous logical file.The primary disadvantage of chained records is that many read operations areneeded in order to follow lengthy chains. Sometimes this does not matter because the records have to be read anyway. In most search operations, however, the chains have to be followed through records which would not otherwise to read. In some file organizations the chains can be contained within blocked physical records so that excessive reads do not occur.Rings have been used in many file organizations. They are used to eliminate redundancy. When a ring or a chain is entered at a point some distance from its head, it may be desirable to obtain the information at the head quickly without stepping through all the intervening links.5、Data Description LanguagesIt is necessary for both the programmers and the data administrator to be able to describe their data precisely; they do so by means of data description languages. A data description language is the means of declaring to data-base management system what data structures will be used.A data description languages giving a logical data description should perform the folloeing functions:It should give a unique name to each data-item type, file type, data base and other data subdivision.It should identify the types of data subdivision such as data item segment , record and base file.It may define the type of encoding the program uses in the data items (binary , character ,bit string , etc.)It may define the length of the data items and the range of the values that a data item can assume .It may specify the sequence of records in a file or the sequence of groups of record in the data base .It may specify means of checking for errors in the data .It may specify privacy locks for preventing unauthorized reading or modification of the data .These may operate at the data-item ,segment ,record, file or data-base level and if necessary may be extended to the contents(value) of individual data items .The authorization may , on the other hand, be separate defined .It is more subject to change than the data structures, and changes in authorization proceduresshould not force changes in application programs.A logical data description should not specify addressing ,indexing ,or searching techniques or specify the placement of data on the storage units ,because these topics are in the domain of physical ,not logical organization .It may give an indication of how the data will be used or of searching requirement .So that the physical technique can be selected optimally but such indications should not be logically limiting.Most DBMS have their own languages for defining the schemas that are used . In most cases these data description languages are different to other programmer language, because other programmer do not have the capability to define to variety of relationship that may exit in the schemas.附录 B 外文译文1、软件工程软件是指令的序列,该指令序列由一种或者多种程序语言编写,它能使计算机应用于某些事物的运用自动化。

毕业设计论文外文文献翻译

毕业设计论文外文文献翻译

毕业设计(论文)外文文献翻译院系:财务与会计学院年级专业:201*级财务管理姓名:学号:132148***附件: 财务风险管理【Abstract】Although financial risk has increased significantly in recent years risk and risk management are not contemporary issues。

The result of increasingly global markets is that risk may originate with events thousands of miles away that have nothing to do with the domestic market。

Information is available instantaneously which means that change and subsequent market reactions occur very quickly。

The economic climate and markets can be affected very quickly by changes in exchange rates interest rates and commodity prices。

Counterparties can rapidly become problematic。

As a result it is important to ensure financial risks are identified and managed appropriately. Preparation is a key component of risk management。

【Key Words】Financial risk,Risk management,YieldsI. Financial risks arising1.1What Is Risk1.1.1The concept of riskRisk provides the basis for opportunity. The terms risk and exposure have subtle differences in their meaning. Risk refers to the probability of loss while exposure is the possibility of loss although they are often used interchangeably。

外文文献及翻译

外文文献及翻译

外文文献及翻译1. 文献:"The Effects of Exercise on Mental Health"翻译:运动对心理健康的影响Abstract: This article explores the effects of exercise on mental health. The author discusses various studies that have been conducted on this topic, and presents evidence to support the claim that exercise can have positive impacts on mental well-being. The article also examines the mechanisms through which exercise affects mental health, such as the release of endorphins and the reduction of stress hormones. Overall, the author concludes that exercise is an effective strategy for improving mental health and recommends incorporating physical activity into daily routines.摘要:本文探讨了运动对心理健康的影响。

作者讨论了在这个主题上进行的各种研究,并提出证据支持运动对心理健康有积极影响的观点。

该文章还探讨了运动如何影响心理健康的机制,如内啡肽的释放和压力激素的减少。

总的来说,作者得出结论,运动是改善心理健康的有效策略,并建议将体育活动纳入日常生活。

2. 文献: "The Benefits of Bilingualism"翻译:双语能力的好处Abstract: This paper examines the benefits of bilingualism. The author presents research findings that demonstrate the cognitiveadvantages of being bilingual, such as enhanced problem-solving skills and improved attention control. The article also explores the social and cultural benefits of bilingualism, such as increased cultural awareness and the ability to communicate with people from different backgrounds. Additionally, the author discusses the positive effects of bilingualism on mental health, highlighting its role in delaying the onset of cognitive decline and in providing a buffer against age-related memory loss. Overall, the author concludes that bilingualism offers a range of advantages and recommends promoting bilingual education and language learning. 摘要:本文研究了双语能力的好处。

外文文献翻译译稿

外文文献翻译译稿

外文文献翻译译稿1可用性和期望值来自Willliam S.Green, Patrick W.Jordan.产品的愉悦:超越可用性根据人机工程学会(HFES)的观点,人机工程学着眼于“发现和共享可用于各种系统和设备设计的、关于人的特点的知识”。

人们通常只是把它作为生物力学和人体测量所关注的内容,实际上它是从更广泛的意义上的一种对人(产品用户)的全面和综合的理解。

HFES从二战中有军方从事的系统分析中发展而来。

其中的三种主要研究的是人体测量、复杂信息的解释和管理,以及在部队和装备调配中应用的系统分析。

系统分析在尺度和复杂性方面跨度很大,大的系统分析有类似于诺曼底登陆准备的大型系统规划,小到去理解如何从合理性和规模的角度才最佳的布置和装备人员。

诺曼底登陆是20世纪最复杂的事件之一。

他要求建立一个在战斗开始之前还不确定的庞大的人员和物资的合理分配系统。

在更小的规模上,装备和军事人物的布置意味着如何去组织、训练和安排战士,最大限度的发挥他们的长处。

士兵必须迅速地接受训练,并且能够有效地使用和维护在二战中发展起来的一系列技术装备。

其中,对于飞行员、潜艇人员和坦克驾驶员有神采的限制。

复杂的新装备的开发要求找到最好的税收、密码便医院、破译人员、雷达和声纳操作员、轰炸机驾驶员和机组人员。

在战后,随着公司及其产品在尺度、领域和复杂性方面的增长,很多系统分析人员在商用领域找到了发展机会。

尽管是战后的发展才导致了1957年人机工程协会(HFES)的建立,但人机研究的起源可以追溯到大批量生产方式的成型阶段,是当时提高生产效率的要求。

随着工作方式从手工生产和农业生产中的转移,新的工厂工作的概念逐步发展起来。

福特的流水生产线和泰勒的效率理论开始对生产的规划和教育产生影响。

即使在家庭生活中,妇女们也开始接受了现代家庭管理理论,并运用这些理论来组织和规划家庭。

在20世纪末,一种涵盖面更广的人机工程正在发展之中。

新的人机工程学是为了适应已经被广泛意识到的对用户行为模式更深入的需求而诞生的,它开始应用定型研究方法,并探索人的情感和认知因素。

外文文献及翻译

外文文献及翻译

Yunnan Ethnic pattern in Packaging DesignAbstract: Art is a folk Mother of the arts,is the source of the new art, From which to draw a strong tradition of high—grade Nutrition。

The persons belonging to national folk arts Ethnic patterns,are folk arts Intraoperative a gem, its development Research,and with the means of modern art,art wind Grid,professional skills combine to form a unique Style and features a modern design There are important applications,this paper focuses on Minority Folk pattern in modern packaging design Meter applications are discussed.Keywords: Yunnan Ethnic. Pattern。

Packaging Design.IntroductionYunnan is a multi-ethnic province, Here multiply survive the Han, Yi, Bai More than twenty families, Zhuang, Miao, Dai, etc。

Nation. Long history of various ethnic groups in Yunnan Province, the source is far Long, creating a rich and colorful Folk art。

论文外文文献翻译

论文外文文献翻译

论文外文文献翻译以下是一篇700字左右的论文外文文献翻译:原文题目:The Role of Artificial Intelligence in Medical Diagnostics: A Review原文摘要:In recent years, there has been a growing interest in the use of artificial intelligence (AI) in the field of medical diagnostics. AI has the potential to improve the accuracy and efficiency of medical diagnoses, and can assist clinicians in making treatment decisions. This review aims to examine the current state of AI in medical diagnostics, and discuss its advantages and limitations. Several AI techniques, including machine learning, deep learning, and natural language processing, are discussed. The review also examines the ethical and legal considerations associated with the use of AI in medical diagnostics. Overall, AI has shown great promise in improving medical diagnostics, but further research is needed to fully understand its potential benefits and limitations.AI在医学诊断中发挥的作用:一项综述近年来,人工智能(AI)在医学诊断领域的应用引起了越来越多的关注。

外文参考文献(带中文翻译)

外文参考文献(带中文翻译)

外文资料原文涂敏之会计学 8051208076Title:Future of SME finance(c)Background – the environment for SME finance has changedFuture economic recovery will depend on the possibility of Crafts, Trades and SMEs to exploit their potential for growth and employment creation.SMEs make a major contribution to growth and employment in the EU and are at the heart of the Lisbon Strategy, whose main objective is to turn Europe into the most competitive and dynamic knowledge-based economy in the world. However, the ability of SMEs to grow depends highly on their potential to invest in restructuring, innovation and qualification. All of these investments need capital and therefore access to finance.Against this background the consistently repeated complaint of SMEs about their problems regarding access to finance is a highly relevant constraint that endangers the economic recovery of Europe.Changes in the finance sector influence the behavior of credit institutes towards Crafts, Trades and SMEs. Recent and ongoing developments in the banking sector add to the concerns of SMEs and will further endanger their access to finance. The main changes in the banking sector which influence SME finance are:•Globalization and internationalization have increased the competition and the profit orientation in the sector;•worsening of the economic situations in some institutes (burst of the ITC bubble, insolvencies) strengthen the focus on profitability further;•Mergers and restructuring created larger structures and many local branches, which had direct and personalized contacts with small enterprises, were closed;•up-coming implementation of new capital adequacy rules (Basel II) will also change SME business of the credit sector and will increase its administrative costs;•Stricter interpretation of State-Aide Rules by the European Commission eliminates the support of banks by public guarantees; many of the effected banks are very active in SME finance.All these changes result in a higher sensitivity for risks and profits in the financesector.The changes in the finance sector affect the accessibility of SMEs to finance.Higher risk awareness in the credit sector, a stronger focus on profitability and the ongoing restructuring in the finance sector change the framework for SME finance and influence the accessibility of SMEs to finance. The most important changes are: •In order to make the higher risk awareness operational, the credit sector introduces new rating systems and instruments for credit scoring;•Risk assessment of SMEs by banks will force the enterprises to present more and better quality information on their businesses;•Banks will try to pass through their additional costs for implementing and running the new capital regulations (Basel II) to their business clients;•due to the increase of competition on interest rates, the bank sector demands more and higher fees for its services (administration of accounts, payments systems, etc.), which are not only additional costs for SMEs but also limit their liquidity;•Small enterprises will lose their personal relationship with decision-makers in local branches –the credit application process will become more formal and anonymous and will probably lose longer;•the credit sector will lose more and more i ts “public function” to provide access to finance for a wide range of economic actors, which it has in a number of countries, in order to support and facilitate economic growth; the profitability of lending becomes the main focus of private credit institutions.All of these developments will make access to finance for SMEs even more difficult and / or will increase the cost of external finance. Business start-ups and SMEs, which want to enter new markets, may especially suffer from shortages regarding finance. A European Code of Conduct between Banks and SMEs would have allowed at least more transparency in the relations between Banks and SMEs and UEAPME regrets that the bank sector was not able to agree on such a commitment.Towards an encompassing policy approach to improve the access of Crafts, Trades and SMEs to financeAll analyses show that credits and loans will stay the main source of finance for the SME sector in Europe. Access to finance was always a main concern for SMEs, but the recent developments in the finance sector worsen the situation even more.Shortage of finance is already a relevant factor, which hinders economic recovery in Europe. Many SMEs are not able to finance their needs for investment.Therefore, UEAPME expects the new European Commission and the new European Parliament to strengthen their efforts to improve the framework conditions for SME finance. Europe’s Crafts, Trades and SMEs ask for an encompassing policy approach, which includes not only the conditions for SMEs’ access to l ending, but will also strengthen their capacity for internal finance and their access to external risk capital.From UEAPME’s point of view such an encompassing approach should be based on three guiding principles:•Risk-sharing between private investors, financial institutes, SMEs and public sector;•Increase of transparency of SMEs towards their external investors and lenders;•improving the regulatory environment for SME finance.Based on these principles and against the background of the changing environment for SME finance, UEAPME proposes policy measures in the following areas:1. New Capital Requirement Directive: SME friendly implementation of Basel IIDue to intensive lobbying activities, UEAPME, together with other Business Associations in Europe, has achieved some improvements in favour of SMEs regarding the new Basel Agreement on regulatory capital (Basel II). The final agreement from the Basel Committee contains a much more realistic approach toward the real risk situation of SME lending for the finance market and will allow the necessary room for adaptations, which respect the different regional traditions and institutional structures.However, the new regulatory system will influence the relations between Banks and SMEs and it will depend very much on the way it will be implemented into European law, whether Basel II becomes burdensome for SMEs and if it will reduce access to finance for them.The new Capital Accord form the Basel Committee gives the financial market authorities and herewith the European Institutions, a lot of flexibility. In about 70 areas they have room to adapt the Accord to their specific needs when implementing itinto EU law. Some of them will have important effects on the costs and the accessibility of finance for SMEs.UEAPME expects therefore from the new European Commission and the new European Parliament:•The implementation of the new Capital Requirement Directive will be costly for the Finance Sector (up to 30 Billion Euro till 2006) and its clients will have to pay for it. Therefore, the implementation – especially for smaller banks, which are often very active in SME finance –has to be carried out with as little administrative burdensome as possible (reporting obligations, statistics, etc.).•The European Regulators must recognize traditional instruments for collaterals (guarantees, etc.) as far as possible.•The European Commission and later the Member States should take over the recommendations from the European Parliament with regard to granularity, access to retail portfolio, maturity, partial use, adaptation of thresholds, etc., which will ease the burden on SME finance.2. SMEs need transparent rating proceduresDue to higher risk awareness of the finance sector and the needs of Basel II, many SMEs will be confronted for the first time with internal rating procedures or credit scoring systems by their banks. The bank will require more and better quality information from their clients and will assess them in a new way. Both up-coming developments are already causing increasing uncertainty amongst SMEs.In order to reduce this uncertainty and to allow SMEs to understand the principles of the new risk assessment, UEAPME demands transparent rating procedures –rating procedures may not become a “Black Box” for SMEs: •The bank should communicate the relevant criteria affecting the rating of SMEs.•The bank should inform SMEs about its assessment in order to allow SMEs to improve.The negotiations on a European Code of Conduct between Banks and SMEs , which would have included a self-commitment for transparent rating procedures by Banks, failed. Therefore, UEAPME expects from the new European Commission and the new European Parliament support for:•binding rules in the framework of the new Capital Adequacy Directive,which ensure the transparency of rating procedures and credit scoring systems for SMEs;•Elaboration of national Codes of Conduct in order to improve the relations between Banks and SMEs and to support the adaptation of SMEs to the new financial environment.3. SMEs need an extension of credit guarantee systems with a special focus on Micro-LendingBusiness start-ups, the transfer of businesses and innovative fast growth SMEs also depended in the past very often on public support to get access to finance. Increasing risk awareness by banks and the stricter interpretation of State Aid Rules will further increase the need for public support.Already now, there are credit guarantee schemes in many countries on the limit of their capacity and too many investment projects cannot be realized by SMEs.Experiences show that Public money, spent for supporting credit guarantees systems, is a very efficient instrument and has a much higher multiplying effect than other instruments. One Euro form the European Investment Funds can stimulate 30 Euro investments in SMEs (for venture capital funds the relation is only 1:2).Therefore, UEAPME expects the new European Commission and the new European Parliament to support:•The extension of funds for national credit guarantees schemes in the framework of the new Multi-Annual Programmed for Enterprises;•The development of new instruments for securitizations of SME portfolios;•The recognition of existing and well functioning credit guarantees schemes as collateral;•More flexibility within the European Instruments, because of national differences in the situation of SME finance;•The development of credit guarantees schemes in the new Member States;•The development of an SBIC-like scheme in the Member States to close the equity gap (0.2 – 2.5 Mio Euro, according to the expert meeting on PACE on April 27 in Luxemburg).•the development of a financial support scheme to encourage the internalizations of SMEs (currently there is no scheme available at EU level: termination of JOP, fading out of JEV).4. SMEs need company and income taxation systems, whichstrengthen their capacity for self-financingMany EU Member States have company and income taxation systems with negative incentives to build-up capital within the company by re-investing their profits. This is especially true for companies, which have to pay income taxes. Already in the past tax-regimes was one of the reasons for the higher dependence of Europe’s SMEs on bank lending. In future, the result of rating w ill also depend on the amount of capital in the company; the high dependence on lending will influence the access to lending. This is a vicious cycle, which has to be broken.Even though company and income taxation falls under the competence of Member States, UEAPME asks the new European Commission and the new European Parliament to publicly support tax-reforms, which will strengthen the capacity of Crafts, Trades and SME for self-financing. Thereby, a special focus on non-corporate companies is needed.5. Risk Capital – equity financingExternal equity financing does not have a real tradition in the SME sector. On the one hand, small enterprises and family business in general have traditionally not been very open towards external equity financing and are not used to informing transparently about their business.On the other hand, many investors of venture capital and similar forms of equity finance are very reluctant regarding investing their funds in smaller companies, which is more costly than investing bigger amounts in larger companies. Furthermore it is much more difficult to set out of such investments in smaller companies.Even though equity financing will never become the main source of financing for SMEs, it is an important instrument for highly innovative start-ups and fast growing companies and it has therefore to be further developed. UEAPME sees three pillars for such an approach where policy support is needed:Availability of venture capital•The Member States should review their taxation systems in order to create incentives to invest private money in all forms of venture capital.•Guarantee instruments for equity financing should be further developed.Improve the conditions for investing venture capital into SMEs•The development of secondary markets for venture capital investments in SMEs should be supported.•Accounting Standards for SMEs should be revised in order to easetransparent exchange of information between investor and owner-manager.Owner-managers must become more aware about the need for transparency towards investors•SME owners will have to realise that in future access to external finance (venture capital or lending) will depend much more on a transparent and open exchange of information about the situation and the perspectives of their companies.•In order to fulfil the new needs for transparency, SMEs will have to use new information instruments (business plans, financial reporting, etc.) and new management instruments (risk-management, financial management, etc.).外文资料翻译涂敏之会计学 8051208076题目:未来的中小企业融资背景:中小企业融资已经改变未来的经济复苏将取决于能否工艺品,贸易和中小企业利用其潜在的增长和创造就业。

外文文献

外文文献

英文文献资料外文文献一:Food safety: the shocking truth about the food industrySource: Author: Marion Nestle、Refrigeration technology, pasteurization, pesticides, disease control, these technologies so that safe food into the 20th century, public health's greatest achievements. This book view is that food safety problems also depend on politics. September 2001 events to dispel this view of the doubts about aviation aircraft used by terrorists as a destruction of weapons to civilians and public figures have anthrax spores sent folder of letters, the consequences of these events shows, food, water can easily become a a tool for terrorists, it has also become the federal government for food safety control problem.This chapter will sum up this book referred to in the various food safety problems. Some of them threatened to keep animals healthy, very few will lead to a number of human diseases. Even so, these issues impact on human well-being is deep; large-scale destruction of breeding animals, affecting the livelihood of many people, limiting personal freedom. The 20th century, 90's and early 21st century, an outbreak of mad cow disease and foot and mouth disease Although this is only because of errors caused by the production process, but still brings a lot of destructive. In contrast, bio-terrorism is the deliberate use of biological and chemical substances to achieve their political objectives. For food safety issues,Bio-terrorism extends food safety issues and political outreach; deliberate destruction, excluding any consequences of innocent injury.In this chapter, we will discuss how the rise of bio-terrorism, food safety issues and extend the extension of food safety issues. In the United States, food safety, usually refers to the family food supply reliability. E-mail from the anthrax incident, the food safety issues, also includes safety from biological terrorism. Our discussion will be the beginning of some zoonotic diseases: such as mad cow disease, foot and mouth disease, anthrax. In recent years, these zoonotic diseases harmful to humans is relatively small. Today, for these zoonotic diseases, we are concerned that they may give rise to disease, destruction of food supply system,To become a tool for bio-terrorism aspect. This chapter summarizes the discussion of this book, fromsociety and from a personal point of view what action should be taken to face these issues, as well as food safety issues present and future.The political animal diseasesOne of the consequences of globalization is that of food cross-border long-distance rapid transit, affecting food supply all kinds of disease can easily spread from one country to another country. Animal diseases have a commercial impact, if a country has come to infectious diseases of animals, other countries will refuse to import the kinds of animal meat. The impact of business at the same time there are political consequences.Britain's mad cow disease and foot and mouth disease occurred as a result of beef in the production process caused by mismanagement, compared to the U.S. anthrax letters is a result of vandalism. However, this three kinds of threatening to cause great panic, they are difficult to detect control, can cause severe disease. Moreover, these three kinds of threats against people for the food supply, as well as confidence in the Government.Mad cow is the mid-20th century, 90 of the most popular of a food security crisis, the epidemic is mainly limited to the United Kingdom. With regard to BSE-related issues and our discussion, mainly because of political issues and scientific issues intertwined Among them, public confidence had a great impact. For example, the British Government in the BSE crisis in the practice is also considered to result in distrust of genetically modified food one of the reasons. The beginning of the 20th century, 80 years, no one had heard of the disease, but in 1999, this disease affects at least 175,000 British cattle. The consequences are very serious: 400 million head of livestock were slaughtered, the loss of 70 billion U.S. dollars,Spread to 18 countries worldwide national boycott of British beef. By 2001 only, although "only" 120 people died of the human variant of mad cow disease, it is estimated the death toll will reach 10 million people. Because mad cow disease revealed the modern politics of food safety issues, it is worth detailing.英文文献中文翻译06013618 胡冬敏外文翻译一:作者:玛丽恩·内斯特尔出版时间:2004年11月食品安全:令人震惊的食品行业真相(美)玛丽恩·内斯特尔冷藏技术,巴氏消毒,杀虫剂,疾病控制,这些技术使安全食品成为20世纪公众健康最伟大的成就之一。

外文参考文献(带中文翻译)

外文参考文献(带中文翻译)

外文资料原文涂敏之会计学 8051208076Title:Future of SME finance(/docs/pos_papers/2004/041027_SME-finance_final.do c)Background – the environment for SME finance has changedFuture economic recovery will depend on the possibility of Crafts, Trades and SMEs to exploit their potential for growth and employment creation.SMEs make a major contribution to growth and employment in the EU and are at the heart of the Lisbon Strategy, whose main objective is to turn Europe into the most competitive and dynamic knowledge-based economy in the world. However, the ability of SMEs to grow depends highly on their potential to invest in restructuring, innovation and qualification. All of these investments need capital and therefore access to finance.Against this background the consistently repeated complaint of SMEs about their problems regarding access to finance is a highly relevant constraint that endangers the economic recovery of Europe.Changes in the finance sector influence the behavior of credit institutes towards Crafts, Trades and SMEs. Recent and ongoing developments in the banking sector add to the concerns of SMEs and will further endanger their access to finance. The main changes in the banking sector which influence SME finance are:•Globalization and internationalization have increased the competition and the profit orientation in the sector;•worsening of the economic situations in some institutes (burst of the ITC bubble, insolvencies) strengthen the focus on profitability further;•Mergers and restructuring created larger structures and many local branches, which had direct and personalized contacts with small enterprises, were closed;•up-coming implementation of new capital adequacy rules (Basel II) will also change SME business of the credit sector and will increase its administrative costs;•Stricter interpretation of State-Aide Rules by the European Commission eliminates the support of banks by public guarantees; many of the effected banks are very active in SME finance.All these changes result in a higher sensitivity for risks and profits in the finance sector.The changes in the finance sector affect the accessibility of SMEs to finance.Higher risk awareness in the credit sector, a stronger focus on profitability and the ongoing restructuring in the finance sector change the framework for SME finance and influence the accessibility of SMEs to finance. The most important changes are: •In order to make the higher risk awareness operational, the credit sector introduces new rating systems and instruments for credit scoring;•Risk assessment of SMEs by banks will force the enterprises to present more and better quality information on their businesses;•Banks will try to pass through their additional costs for implementing and running the new capital regulations (Basel II) to their business clients;•due to the increase of competition on interest rates, the bank sector demands more and higher fees for its services (administration of accounts, payments systems, etc.), which are not only additional costs for SMEs but also limit their liquidity;•Small enterprises will lose their personal relationship with decision-makers in local branches –the credit application process will become more formal and anonymous and will probably lose longer;•the credit sector will lose more and more its “public function” to provide access to finance for a wide range of economic actors, which it has in a number of countries, in order to support and facilitate economic growth; the profitability of lending becomes the main focus of private credit institutions.All of these developments will make access to finance for SMEs even more difficult and / or will increase the cost of external finance. Business start-ups and SMEs, which want to enter new markets, may especially suffer from shortages regarding finance. A European Code of Conduct between Banks and SMEs would have allowed at least more transparency in the relations between Banks and SMEs and UEAPME regrets that the bank sector was not able to agree on such a commitment.Towards an encompassing policy approach to improve the access of Crafts, Trades and SMEs to financeAll analyses show that credits and loans will stay the main source of finance for the SME sector in Europe. Access to finance was always a main concern for SMEs,but the recent developments in the finance sector worsen the situation even more. Shortage of finance is already a relevant factor, which hinders economic recovery in Europe. Many SMEs are not able to finance their needs for investment.Therefore, UEAPME expects the new European Commission and the new European Parliament to strengthen their efforts to improve the framework conditions for SME finance. Europe’s Crafts, Trades and SMEs ask for an encompassing policy approach, which includes not only the conditions for SMEs’ access to lending, but will also strengthen their capacity for internal finance and their access to external risk capital.From UEAPM E’s point of view such an encompassing approach should be based on three guiding principles:•Risk-sharing between private investors, financial institutes, SMEs and public sector;•Increase of transparency of SMEs towards their external investors and lenders;•improving the regulatory environment for SME finance.Based on these principles and against the background of the changing environment for SME finance, UEAPME proposes policy measures in the following areas:1. New Capital Requirement Directive: SME friendly implementation of Basel IIDue to intensive lobbying activities, UEAPME, together with other Business Associations in Europe, has achieved some improvements in favour of SMEs regarding the new Basel Agreement on regulatory capital (Basel II). The final agreement from the Basel Committee contains a much more realistic approach toward the real risk situation of SME lending for the finance market and will allow the necessary room for adaptations, which respect the different regional traditions and institutional structures.However, the new regulatory system will influence the relations between Banks and SMEs and it will depend very much on the way it will be implemented into European law, whether Basel II becomes burdensome for SMEs and if it will reduce access to finance for them.The new Capital Accord form the Basel Committee gives the financial market authorities and herewith the European Institutions, a lot of flexibility. In about 70areas they have room to adapt the Accord to their specific needs when implementing it into EU law. Some of them will have important effects on the costs and the accessibility of finance for SMEs.UEAPME expects therefore from the new European Commission and the new European Parliament:•The implementation of the new Capital Requirement Directive will be costly for the Finance Sector (up to 30 Billion Euro till 2006) and its clients will have to pay for it. Therefore, the implementation – especially for smaller banks, which are often very active in SME finance –has to be carried out with as little administrative burdensome as possible (reporting obligations, statistics, etc.).•The European Regulators must recognize traditional instruments for collaterals (guarantees, etc.) as far as possible.•The European Commission and later the Member States should take over the recommendations from the European Parliament with regard to granularity, access to retail portfolio, maturity, partial use, adaptation of thresholds, etc., which will ease the burden on SME finance.2. SMEs need transparent rating proceduresDue to higher risk awareness of the finance sector and the needs of Basel II, many SMEs will be confronted for the first time with internal rating procedures or credit scoring systems by their banks. The bank will require more and better quality information from their clients and will assess them in a new way. Both up-coming developments are already causing increasing uncertainty amongst SMEs.In order to reduce this uncertainty and to allow SMEs to understand the principles of the new risk assessment, UEAPME demands transparent rating procedures –rating procedures may not become a “Black Box” for SMEs:•The bank should communicate the relevant criteria affecting the rating of SMEs.•The bank should inform SMEs about its assessment in order to allow SMEs to improve.The negotiations on a European Code of Conduct between Banks and SMEs , which would have included a self-commitment for transparent rating procedures by Banks, failed. Therefore, UEAPME expects from the new European Commission and the new European Parliament support for:•binding rules in the framework of the new Capital Adequacy Directive, which ensure the transparency of rating procedures and credit scoring systems for SMEs;•Elaboration of national Codes of Conduct in order to improve the relations between Banks and SMEs and to support the adaptation of SMEs to the new financial environment.3. SMEs need an extension of credit guarantee systems with a special focus on Micro-LendingBusiness start-ups, the transfer of businesses and innovative fast growth SMEs also depended in the past very often on public support to get access to finance. Increasing risk awareness by banks and the stricter interpretation of State Aid Rules will further increase the need for public support.Already now, there are credit guarantee schemes in many countries on the limit of their capacity and too many investment projects cannot be realized by SMEs.Experiences show that Public money, spent for supporting credit guarantees systems, is a very efficient instrument and has a much higher multiplying effect than other instruments. One Euro form the European Investment Funds can stimulate 30 Euro investments in SMEs (for venture capital funds the relation is only 1:2).Therefore, UEAPME expects the new European Commission and the new European Parliament to support:•The extension of funds for national credit guarantees schemes in the framework of the new Multi-Annual Programmed for Enterprises;•The development of new instruments for securitizations of SME portfolios;•The recognition of existing and well functioning credit guarantees schemes as collateral;•More flexibility within the European Instruments, because of national differences in the situation of SME finance;•The development of credit guarantees schemes in the new Member States;•The development of an SBIC-like scheme in the Member States to close the equity gap (0.2 – 2.5 Mio Euro, according to the expert meeting on PACE on April 27 in Luxemburg).•the development of a financial support scheme to encourage the internalizations of SMEs (currently there is no scheme available at EU level: termination of JOP, fading out of JEV).4. SMEs need company and income taxation systems, which strengthen their capacity for self-financingMany EU Member States have company and income taxation systems with negative incentives to build-up capital within the company by re-investing their profits. This is especially true for companies, which have to pay income taxes. Already in the past tax-regimes was one of the reasons for the higher dependence of Europe’s SMEs on bank lending. In future, the result of rating will also depend on the amount of capital in the company; the high dependence on lending will influence the access to lending. This is a vicious cycle, which has to be broken.Even though company and income taxation falls under the competence of Member States, UEAPME asks the new European Commission and the new European Parliament to publicly support tax-reforms, which will strengthen the capacity of Crafts, Trades and SME for self-financing. Thereby, a special focus on non-corporate companies is needed.5. Risk Capital – equity financingExternal equity financing does not have a real tradition in the SME sector. On the one hand, small enterprises and family business in general have traditionally not been very open towards external equity financing and are not used to informing transparently about their business.On the other hand, many investors of venture capital and similar forms of equity finance are very reluctant regarding investing their funds in smaller companies, which is more costly than investing bigger amounts in larger companies. Furthermore it is much more difficult to set out of such investments in smaller companies.Even though equity financing will never become the main source of financing for SMEs, it is an important instrument for highly innovative start-ups and fast growing companies and it has therefore to be further developed. UEAPME sees three pillars for such an approach where policy support is needed:Availability of venture capital•The Member States should review their taxation systems in order to create incentives to invest private money in all forms of venture capital.•Guarantee instruments for equity financing should be further developed.Improve the conditions for investing venture capital into SMEs•The development of secondary markets for venture capital investments in SMEs should be supported.•Accounting Standards for SMEs should be revised in order to ease transparent exchange of information between investor and owner-manager.Owner-managers must become more aware about the need for transparency towards investors•SME owners will have to realise that in future access to external finance (venture capital or lending) will depend much more on a transparent and open exchange of information about the situation and the perspectives of their companies.•In order to fulfil the new needs for transparency, SMEs will have to use new information instruments (business plans, financial reporting, etc.) and new management instruments (risk-management, financial management, etc.).外文资料翻译涂敏之会计学 8051208076题目:未来的中小企业融资背景:中小企业融资已经改变未来的经济复苏将取决于能否工艺品,贸易和中小企业利用其潜在的增长和创造就业。

秘书职责外文文献翻译

秘书职责外文文献翻译

秘书职责外文文献翻译This XXX。

Perak。

The research was XXX 100 XXX are required to perform a wider range of job XXX compared to those in the public sector。

The study XXX.nThe role of secretaries has evolved over the years from being XXX。

secretaries are employed in both the public and private sectors。

and their job XXX they work for。

This study aims to XXX secretaries in the public and private XXX。

XXX.XXXThe research was XXX 100 XXX。

XXX parts: the first part focused on the job ns of secretaries。

while the second part focused on their XXX data collected were analyzed using descriptive statistics and t-tests.ResultsXXX een the public and private XXX are required to perform a wider range of job ns。

such as managing budgets。

preparing reports。

and coordinating events。

compared to those in the public XXX competencies。

secretaries in the XXX of competencies。

物流管理专业外文翻译外文文献英文文献

物流管理专业外文翻译外文文献英文文献

物流管理专业外文翻译外文文献英文文献附录英文资料原文:From the perspective of modern logistics systems, storage is an important part of logistics is the logistics system, distribution center, hoping for effective logistics warehouse here, scientific management and control, so that the logistics system more smoothly, more reasonable to run. In this paper, the importance of starting from the warehouse, combining theory and practice, through an enterprise storage andlogistics activities in the "space" and "cargo space" to analyze how the activities in the warehouse through the "space" and "cargo space "management to improve storage efficiency, reduce storage costs.Case Background: Photoelectric Technology Co., Ltd. of a storage management. A Photoelectric Technology Co., Ltd. located in Guangdong Huizhou Jinyuan Industrial Zone, which was established in 1998, is a professional lighting devices and electrical equipment manufacturers, it is the industry's leading enterprises. With excellent product quality, excellent service, the access to the customer's extensive approval and praise. In order to adapt to the new form of strategic development needs, the Company's existing network of integrated customer relationship, across the country set up the 35 operations centers, improve the company's supply chain, logistics, warehousing and distribution systems and customer service system. The company is headquartered Total finishedgoods warehouse 3, namely a set of finished products warehouse, finished products and finished second group of three storage warehouses. They are based on different types of products in different product sub-warehouses: one product a warehouse on the first floor is to facilitate the shipment into, so it is relatively types of goods stored there are more point, such as lamp, lamp panel and so on. And all of the export goods are stored in a group. Finished second group is mainly warehouse track lights, metal halide lamp, T4 lamp, T5 lamp and light. The company's several light sources are stored in the warehouse two groups finished. Three major stored product warehouse specific grid lamps, ceiling lamps, track lights, and some other companies products.1 An analysis of warehouse storage spaceWarehouse storage system's main elements include storage space, goods, personnel and equipment and other factors. Storage is the storage of the core functions and key links, storage area plan is reasonable or not directly affect the operational efficiency of warehouse and storage capacity. Therefore, the effective use of storage space as warehouse management is one important factor of good or bad. The company'sproducts sell well. Frequency of a large warehouse storage, goods flow also great. The company's warehouse space layout is stored on theshelves of goods, three-dimensional space utilization is not high, sohe's warehouse is not very high degree of mechanization, storage, only forklifts, including hand trucks and electric forklift. Warehouse operation methods, generally with a forklift, rarely manpower for thereceipt of goods, which are materials used to send and receive cards, every time shipping and receiving cards will be done in the send and receive registration materials, so we usually check very convenient goods such as some of the follow-up results from the present work seems to still relatively high efficiency, operation is quite easy. So the whole way of operating the company's warehouse is quite reasonable. The warehouse usually because the storage space is often not enough and the goods stored in the work space position. Particularly in the sales season, the warehouse storage products especially crowded, working up inside people feel a little depressedfeeling. So not very reasonable storage operating environment. The warehouse, data storage costs a statistical look fairly reasonable, because it costs very little equipment, fixed storage cost is not very high, while the storage cost is the cost of the class structure, so storage costs are therefore not very high.Storage warehouse for storage of goods that is as functional space.Storage space = potential use of physical space + space + space + operations useless space. Physical space, which means the goods were in fact occupied the space. The company's warehouse, its physical space accounted for 75% of the warehouse; the potential use of space accounted for 10%; work space and accounts for about 10% as the company's warehouse mechanization is not high, so a small point of space does not work What effect, its security is also essential to meet the requirements intermittent; his useless space accounted for about 5%. Onthe whole, the warehouse space utilization is high, there is a little crowded phenomenon. Analysis: the relative reduction should be the use of some physical space to increase the number of intermittent operations such as space, safety of space use. In addition, space and vertical space from the plane of view, the level of space has been put to good use, but the use of vertical space is not high, it can be considered top shelf, or high-level automatic three-dimensional shelf, to make better use of vertical space.2 rack management analysisRack management refers to the goods into warehouse, on the goods handling, how to put, place, etc. where a reasonable and effective planning and management. The disposal of goods, how to place, mainly by the strategic decision taken by the storage of goods of a specific storage location, will have to combine the principles of location assignment related to the decision. The company's warehouse storage rack management approach is used in positioning guidelines to follow. Positioning refers to each type of storage or storage of goods are fixed for each cargo space, cargo space of goods can not be interoperable. Therefore, when planning cargo space, cargo space for each volume of goods shall not be less than the possible maximum amount in the bank. However, in actual operation, the positioning of different storage conditions generally done in accordance with appropriate adjustments, it will make changes based on the actual situation. Cargo space in the warehouse management in the work by the staff of the company, combiningtheory with practice, carried out positioning, fixed-point, quantitative management principles, therefore, Ta cargo-bit capability is not Quanbu Anzhaozuida conducted in the library volume positioning, as the company's products belong to relatively large seasonal variations in the product, if the maximum amount set in the library space utilization will fall to the warehouse, so wastage of resources.- As all the libraries in the digital warehouse are stored with the principles of positioning, in accordance with the current situation of the company's warehouse, all use the principle of positioning is not very reasonable storage should be in accordance with the different characteristics of products and storage requirements, the product classification For important product, a small number of products used variety store positioning. And because almost all of the company's products feature the same features they are not mutually exclusive, this product features from the point of view is they could be put together randomly.In addition, the company's warehouse management, distribution of cargo spaces You are also a number of principles: (1) FIFO principle, Ji is the ancestor of goods, first-out library library principles, the principles generally applicable to a short life cycle of goods. (2) the principle of facing channel, referring to the goods of the mark, name the face of passageways so that theoperator can easily simple identification, it allows the retentionof goods, access to easy and efficient manner, which is to the warehouseto be fluent in the basic principles of operation. (3) weight characteristics of the principle, meaning that according to the weight of different goods to determine the level of goods in the storage location of places. In general, the weight should be kept on the ground or the lower shelf position, light goods were kept in the upper shelf location. In the case of manual handling operations carried out when the people of waist height for the custody of heavy or large items, while above the waist height of the light used to keep the goods or small items. This principle, the use of the safety and shelf manual handling operations have great significance. According to this principle, the company's warehouse stocking on the use of the fruit picking type. In this way, the storage requirements of the company's present situation is very reasonable, but also for staff is also very convenient.In the specific cargo space management process, we can see that the above description: they still use more modern management methods and principles. These methods and principles. For most of the moretraditional business management for storage or a more scientific and reasonable. Of course, in the management of the process there will be issues, such as operation in practice, some operators do not pay attention, not careful, careless also makes some of the principles of our implementation is not good enough. In the company's product sales, and warehouse management appears cargo space confusion, some products will be stored in the operating channel and the secure channel, so that is not conducive to our operations, warehouse operations particularlyaffect the safety of personnel, there are security risks. Because these problems often are especially prominent when the season, so these problems, the author suggested that some of the goods stored in the open yard, but the time to do well in the storage protection. 3 proposed ABC Classified Management ApplicationsTo conduct an effective inventory management and control, we mustfirst sort of inventory, only then can we better manage the goods and control. Therefore, I analyzed that in the original storage facilities under the same conditions, using ABC classification of goods for the implementation and management. This can effectively use the original storage space and cargo space. Through the analysis of goods to identify the primary and secondary, classification queue. According to Barrett curve reveals the "critical few and minor majority" rule should be applied in the management. Therefore, in accordance with product value, sales, shortage cost, or order in advance of other indicators toclassify the product. A class of products which are the highest value of inventory, general inventory of its total inventory of 15%, while the value of it is accounted for 70% ~ 80%; B products are middle of the stock value of these species 30% of the total inventory value of the total value of 15% to 25%; while the C class product is the value of the bottom of the inventory, its value is only 5% of the total value, but it accounts for the total inventory stocks 55%. Storage can be classified by goods and different products for each type of different management strategies developed to implement different control measures. In themanagement process, the products for A to require warehousing products are all everyday to inspect and inventory, the operation should be careful, can significantly embodiment up such products other products Butong between, were the focus of management; on B products, managed by sub-key can be 2 to 3 days to inspect and inventory. At the same time,do not neglect the management of products on the C, C products every week to conduct an inspection and inventory.We know from the analysis, storage operations, "space", "cargo space" and its scientific and rational management is an important partof warehouse management, warehousing costs alsoaffect the cost of important factors. Through practical examples of some of the storagemanagement problem analysis and research, through analysis and study of these issues, so wehave deeper storage management to understand, storage has its own management principles, weshould abide by and seriously the implementation of these principles. When in use thecombination of theory and practice, so that our warehouse and our theory more in tune with theactual operation. Only the combination of theory and practice to our knowledge to the limits.中文译文从现代物流系统观点来看,仓储是物流的一个重要环节,是物流系统的调运中心,希望在仓储这里对物流进行有效、科学地管理与控制,使物流系统更顺畅、更合理地运行。

外文文献翻译范例

外文文献翻译范例
正如建筑师和工程师Bruce Graham,Fazlur Khan of Skidmore, Owings and Merrill.(SOM)的芝加哥办公室设计,结构为(225 x为一整体225英尺)一个“绑定圆管状造型”的九个方面的75英尺广场系统,嵌装在一个深色玻璃幕墙。五十层以上,有的就离开广场的塔上升到创建更小的地板加强板和独特的剪影。
StatusComplete
Type:Office
Location:Hong Kong
Construction started:18 April 1985
Completed:1990
Opening:17 May 1990
HeightAntenna spire:367.4 m (1,205.4 ft)
2011年6月8日
外文文献翻译(译成中文1000字左右):
【主要阅读文献不少于5篇,译文后附注文献信息,包括:作者、书名(或论文题目)、出 版 社(或刊物名称)、出版时间(或刊号)、页码。提供所译外文资料附件(印刷类含封面、封底、目录、翻译部分的复印件等,网站类的请附网址及原文)
原文网址:/TALLEST_TOWERS/t_sears.htm
译文
建筑师:Bruce Graham, design partner, Skidmore, Owings and Merrill
地点:Chicago
甲方:Sears Roebuck and Company
工程师:Fazlur Khan of Skidmore, Owings and Merrill.项目年份:2008
香港1985年4月18日开工建设1990年完成1990年5月17日开幕高度天线尖顶三百六十七点四米2418英尺屋顶三百一十五点米10335英尺顶层二百八十八点二米九百四十五点五英尺技术细节地上楼层数724层楼建筑面积一十三点五万平方米1450000平方英尺电梯数45由奥的斯电梯公司生产的设计与施工主要承建商香港建设控股有限公司引文需要熊谷组香港贝聿铭建筑师事务所建筑师事务所谢尔曼西贡有限公司sl的托马斯博阿达莱斯利罗伯逊结构工程师协会rllp参考文献对中国塔简称中银大厦银行是中环香港最知名的摩天大楼之一

外文文献翻译原文+译文

外文文献翻译原文+译文

外文文献翻译原文Analysis of Con tin uous Prestressed Concrete BeamsChris BurgoyneMarch 26, 20051、IntroductionThis conference is devoted to the development of structural analysis rather than the strength of materials, but the effective use of prestressed concrete relies on an appropriate combination of structural analysis techniques with knowledge of the material behaviour. Design of prestressed concrete structures is usually left to specialists; the unwary will either make mistakes or spend inordinate time trying to extract a solution from the various equations.There are a number of fundamental differences between the behaviour of prestressed concrete and that of other materials. Structures are not unstressed when unloaded; the design space of feasible solutions is totally bounded;in hyperstatic structures, various states of self-stress can be induced by altering the cable profile, and all of these factors get influenced by creep and thermal effects. How were these problems recognised and how have they been tackled?Ever since the development of reinforced concrete by Hennebique at the end of the 19th century (Cusack 1984), it was recognised that steel and concrete could be more effectively combined if the steel was pretensioned, putting the concrete into compression. Cracking could be reduced, if not prevented altogether, which would increase stiffness and improve durability. Early attempts all failed because the initial prestress soon vanished, leaving the structure to be- have as though it was reinforced; good descriptions of these attempts are given by Leonhardt (1964) and Abeles (1964).It was Freyssineti’s observations of the sagging of the shallow arches on three bridges that he had just completed in 1927 over the River Allier near Vichy which led directly to prestressed concrete (Freyssinet 1956). Only the bridge at Boutiron survived WWII (Fig 1). Hitherto, it had been assumed that concrete had a Young’s modulus which remained fixed, but he recognised that the de- ferred strains due to creep explained why the prestress had been lost in the early trials. Freyssinet (Fig. 2) also correctly reasoned that high tensile steel had to be used, so that some prestress would remain after the creep had occurred, and alsothat high quality concrete should be used, since this minimised the total amount of creep. The history of Freyssineti’s early prestressed concrete work is written elsewhereFigure1:Boutiron Bridge,Vic h yFigure 2: Eugen FreyssinetAt about the same time work was underway on creep at the BRE laboratory in England ((Glanville 1930) and (1933)). It is debatable which man should be given credit for the discovery of creep but Freyssinet clearly gets the credit for successfully using the knowledge to prestress concrete.There are still problems associated with understanding how prestressed concrete works, partly because there is more than one way of thinking about it. These different philosophies are to some extent contradictory, and certainly confusing to the young engineer. It is also reflected, to a certain extent, in the various codes of practice.Permissible stress design philosophy sees prestressed concrete as a way of avoiding cracking by eliminating tensile stresses; the objective is for sufficient compression to remain after creep losses. Untensionedreinforcement, which attracts prestress due to creep, is anathema. This philosophy derives directly from Freyssinet’s logic and is primarily a working stress concept.Ultimate strength philosophy sees prestressing as a way of utilising high tensile steel as reinforcement. High strength steels have high elastic strain capacity, which could not be utilised when used as reinforcement; if the steel is pretensioned, much of that strain capacity is taken out before bonding the steel to the concrete. Structures designed this way are normally designed to be in compression everywhere under permanent loads, but allowed to crack under high live load. The idea derives directly from the work of Dischinger (1936) and his work on the bridge at Aue in 1939 (Schonberg and Fichter 1939), as well as that of Finsterwalder (1939). It is primarily an ultimate load concept. The idea of partial prestressing derives from these ideas.The Load-Balancing philosophy, introduced by T.Y. Lin, uses prestressing to counter the effect of the permanent loads (Lin 1963). The sag of the cables causes an upward force on the beam, which counteracts the load on the beam. Clearly, only one load can be balanced, but if this is taken as the total dead weight, then under that load the beam will perceive only the net axial prestress and will have no tendency to creep up or down.These three philosophies all have their champions, and heated debates take place between them as to which is the most fundamental.2、Section designFrom the outset it was recognised that prestressed concrete has to be checked at both the working load and the ultimate load. For steel structures, and those made from reinforced concrete, there is a fairly direct relationship between the load capacity under an allowable stress design, and that at the ultimate load under an ultimate strength design. Older codes were based on permissible stresses at the working load; new codes use moment capacities at the ultimate load. Different load factors are used in the two codes, but a structure which passes one code is likely to be acceptable under the other.For prestressed concrete, those ideas do not hold, since the structure is highly stressed, even when unloaded. A small increase of load can cause some stress limits to be breached, while a large increase in load might be needed to cross other limits. The designer has considerable freedom to vary both the working load and ultimate load capacities independently; both need to be checked.A designer normally has to check the tensile and compressive stresses, in both the top and bottom fibre of the section, for every load case. The critical sections are normally, but not always, the mid-span and the sections over piers but other sections may become critical ,when the cable profile has to be determined.The stresses at any position are made up of three components, one of which normally has a different sign from the other two; consistency of sign convention is essential.If P is the prestressing force and e its eccentricity, A and Z are the area of the cross-section and its elastic section modulus, while M is the applied moment, then where ft and fc are the permissible stresses in tension and compression.c e t f ZM Z P A P f ≤-+≤Thus, for any combination of P and M , the designer already has four in- equalities to deal with.The prestressing force differs over time, due to creep losses, and a designer isusually faced with at least three combinations of prestressing force and moment;• the applied moment at the time the prestress is first applied, before creep losses occur,• the maximum applied moment after creep losses, and• the minimum applied moment after creep losses.Figure 4: Gustave MagnelOther combinations may be needed in more complex cases. There are at least twelve inequalities that have to be satisfied at any cross-section, but since an I-section can be defined by six variables, and two are needed to define the prestress, the problem is over-specified and it is not immediately obvious which conditions are superfluous. In the hands of inexperienced engineers, the design process can be very long-winded. However, it is possible to separate out the design of the cross-section from the design of the prestress. By considering pairs of stress limits on the same fibre, but for different load cases, the effects of the prestress can be eliminated, leaving expressions of the form:rangestress e Perm issibl Range Mom entZ These inequalities, which can be evaluated exhaustively with little difficulty, allow the minimum size of the cross-section to be determined.Once a suitable cross-section has been found, the prestress can be designed using a construction due to Magnel (Fig.4). The stress limits can all be rearranged into the form:()M fZ PA Z e ++-≤1 By plotting these on a diagram of eccentricity versus the reciprocal of the prestressing force, a series of bound lines will be formed. Provided the inequalities (2) are satisfied, these bound lines will always leave a zone showing all feasible combinations of P and e. The most economical design, using the minimum prestress, usually lies on the right hand side of the diagram, where the design is limited by the permissible tensile stresses.Plotting the eccentricity on the vertical axis allows direct comparison with the crosssection, as shown in Fig. 5. Inequalities (3) make no reference to the physical dimensions of the structure, but these practical cover limits can be shown as wellA good designer knows how changes to the design and the loadings alter the Magnel diagram. Changing both the maximum andminimum bending moments, but keeping the range the same, raises and lowers the feasible region. If the moments become more sagging the feasible region gets lower in the beam.In general, as spans increase, the dead load moments increase in proportion to the live load. A stage will be reached where the economic point (A on Fig.5) moves outside the physical limits of the beam; Guyon (1951a) denoted the limiting condition as the critical span. Shorter spans will be governed by tensile stresses in the two extreme fibres, while longer spans will be governed by the limiting eccentricity and tensile stresses in the bottom fibre. However, it does not take a large increase in moment ,at which point compressive stresses will govern in the bottom fibre under maximum moment.Only when much longer spans are required, and the feasible region moves as far down as possible, does the structure become governed by compressive stresses in both fibres.3、Continuous beamsThe design of statically determinate beams is relatively straightforward; the engineer can work on the basis of the design of individual cross-sections, as outlined above. A number of complications arise when the structure is indeterminate which means that the designer has to consider, not only a critical section,but also the behaviour of the beam as a whole. These are due to the interaction of a number of factors, such as Creep, Temperature effects and Construction Sequence effects. It is the development of these ideas whichforms the core of this paper. The problems of continuity were addressed at a conference in London (Andrew and Witt 1951). The basic principles, and nomenclature, were already in use, but to modern eyes concentration on hand analysis techniques was unusual, and one of the principle concerns seems to have been the difficulty of estimating losses of prestressing force.3.1 Secondary MomentsA prestressing cable in a beam causes the structure to deflect. Unlike the statically determinate beam, where this motion is unrestrained, the movement causes a redistribution of the support reactions which in turn induces additional moments. These are often termed Secondary Moments, but they are not always small, or Parasitic Moments, but they are not always bad.Freyssinet’s bridge across the Marne at Luzancy, started in 1941 but not completed until 1946, is often thought of as a simply supported beam, but it was actually built as a two-hinged arch (Harris 1986), with support reactions adjusted by means of flat jacks and wedges which were later grouted-in (Fig.6). The same principles were applied in the later and larger beams built over the same river.Magnel built the first indeterminate beam bridge at Sclayn, in Belgium (Fig.7) in 1946. The cables are virtually straight, but he adjusted the deck profile so that the cables were close to the soffit near mid-span. Even with straight cables the sagging secondary momentsare large; about 50% of the hogging moment at the central support caused by dead and live load.The secondary moments cannot be found until the profile is known but the cablecannot be designed until the secondary moments are known. Guyon (1951b) introduced the concept of the concordant profile, which is a profile that causes no secondary moments; es and ep thus coincide. Any line of thrust is itself a concordant profile.The designer is then faced with a slightly simpler problem; a cable profile has to be chosen which not only satisfies the eccentricity limits (3) but is also concordant. That in itself is not a trivial operation, but is helped by the fact that the bending moment diagram that results from any load applied to a beam will itself be a concordant profile for a cable of constant force. Such loads are termed notional loads to distinguish them from the real loads on the structure. Superposition can be used to progressively build up a set of notional loads whose bending moment diagram gives the desired concordant profile.3.2 Temperature effectsTemperature variations apply to all structures but the effect on prestressed concrete beams can be more pronounced than in other structures. The temperature profile through the depth of a beam (Emerson 1973) can be split into three components for the purposes of calculation (Hambly 1991). The first causes a longitudinal expansion, which is normally released by the articulation of the structure; the second causes curvature which leads to deflection in all beams and reactant moments in continuous beams, while the third causes a set of self-equilibrating set of stresses across the cross-section.The reactant moments can be calculated and allowed-for, but it is the self- equilibrating stresses that cause the main problems for prestressed concrete beams. These beams normally have high thermal mass which means that daily temperature variations do not penetrate to the core of the structure. The result is a very non-uniform temperature distribution across the depth which in turn leads to significant self-equilibrating stresses. If the core of the structure is warm, while the surface is cool, such as at night, then quite large tensile stresses can be developed on the top and bottom surfaces. However, they only penetrate a very short distance into the concrete and the potential crack width is very small. It can be very expensive to overcome the tensile stress by changing the section or the prestress。

(完整word版)外文文献及翻译doc

(完整word版)外文文献及翻译doc

Criminal Law1.General IntroductionCriminal law is the body of the law that defines criminal offenses, regulates the apprehension, charging, and trial of suspected offenders,and fixes punishment for convicted persons. Substantive criminal law defines particular crimes, and procedural law establishes rules for the prosecution of crime. In a democratic society, it is the function of the legislative bodies to decide what behavior will be made criminal and what penalties will be attached to violations of the law.Capital punishment may be imposed in some jurisdictions for the most serious crimes. And physical or corporal punishment may still be imposed such as whipping or caning, although these punishments are prohibited in much of the world. A convict may be incarcerated in prison or jail and the length of incarceration may vary from a day to life.Criminal law is a reflection of the society that produce it. In an Islamic theocracy, such as Iran, criminal law will reflect the religious teachings of the Koran; in an Catholic country, it will reflect the tenets of Catholicism. In addition, criminal law will change to reflect changes in society, especially attitude changes. For instance, use of marijuana was once considered a serious crime with harsh penalties, whereas today the penalties in most states are relatively light. As severity of the penaltieswas reduced. As a society advances, its judgments about crime and punishment change.2.Elements of a CrimeObviously, different crimes require different behaviors, but there are common elements necessary for proving all crimes. First, the prohibited behavior designated as a crime must be clearly defined so that a reasonable person can be forewarned that engaging in that behavior is illegal. Second, the accused must be shown to have possessed the requisite intent to commit the crime. Third, the state must prove causation. Finally, the state must prove beyond a reasonable doubt that the defendant committed the crime.(1) actus reusThe first element of crime is the actus reus.Actus is an act or action and reus is a person judicially accused of a crime. Therefore, actus reus is literally the action of a person accused of a crime. A criminal statute must clearly define exactly what act is deemed “guilty”---that is, the exact behavior that is being prohibited. That is done so that all persons are put on notice that if they perform the guilty act, they will be liable for criminal punishment. Unless the actus reus is clearly defined, one might not know whether or not on e’s behavior is illegal.Actus reus may be accomplished by an action, by threat of action,or exceptionally, by an omission to act, which is a legal duty to act. For example, the act of Cain striking Abel might suffice, or a parent’s failure to give to a young child also may provide the actus reus for a crime.Where the actus reus is a failure to act, there must be a duty of care. A duty can arise through contract, a voluntary undertaking, a blood relation, and occasionally through one’s official position. Duty also can arise from one’s own creation of a dangerous situation.(2)mens reaA second element of a crime is mens rea. Mens rea refers to an individual’s state of mind when a crime is committed. While actus reus is proven by physical or eyewitness evidence, mens rea is more difficult to ascertain. The jury must determine for itself whether the accused had the necessary intent to commit the act.A lower threshold of mens rea is satisfied when a defendant recognizes an act is dangerous but decides to commit it anyway. This is recklessness. For instance, if Cain tears a gas meter from a wall, and knows this will let flammable gas escape into a neighbor’s house, he could be liable for poisoning. Courts often consider whether the actor did recognise the danger, or alternatively ought to have recognized a danger (though he did not) is tantamount to erasing intent as a requirement. In this way, the importance of mens rea hasbeen reduced in some areas of the criminal law.Wrongfulness of intent also may vary the seriousness of an offense. A killing committed with specific intent to kill or with conscious recognition that death or serious bodily harm will result, would be murder, whereas a killing affected by reckless acts lacking such a consciousness could be manslaughter.(3)CausationThe next element is causation. Often the phrase “but for”is used to determine whether causation has occurred. For example, we might say “Cain caused Abel”, by which we really mean “Cain caused Abel’s death. ”In other words, ‘but for Cain’s act, Abel would still be alive.” Causation, then, means “but for” the actions of A, B would not have been harmed. In criminal law, causation is an element that must be proven beyond a reasonable doubt.(4) Proof beyond a Reasonable DoubtIn view of the fact that in criminal cases we are dealing with the life and liberty of the accused person, as well as the stigma accompanying conviction, the legal system places strong limits on the power of the state to convict a person of a crime. Criminal defendants are presumed innocent. The state must overcome this presumption of innocence by proving every element of the offense charged against the defendant beyond a reasonable doubt to thesatisfaction of all the jurors. This requirement is the primary way our system minimizes the risk of convicting an innocent person.The state must prove its case within a framework of procedural safeguards that are designed to protect the accused. The state’s failure to prove any material element of its case results in the accused being acquitted or found not guilty, even though he or she may actually have committed the crime charged.3. Strict LiabilityIn modern society, some crimes require no more mens rea, and they are known as strict liability offenses. For in stance, under the Road Traffic Act 1988 it is a strict liability offence to drive a vehicle with an alcohol concentration above the prescribed limit.Strict liability can be described as criminal or civil liability notwithstanding the lack mens rea or intent by the defendant. Not all crimes require specific intent, and the threshold of culpability required may be reduced. For example, it might be sufficient to show that a defendant acted negligently, rather than intentionally or recklessly.1. 概述刑法是规定什么试犯罪,有关犯罪嫌疑人之逮捕、起诉及审判,及对已决犯处以何种刑罚的部门法。

外文文献及外文翻译 1

外文文献及外文翻译 1

The Stereo Garage1.1 An overview of the stereo garageVehicles parked nowhere is the problem of the urban social, economic and transport development to a certain extent the result, Garage Equipment development in foreign countries, especially in Japan nearly 30-40 years. Whether technically or in terms of experience had been a success. China is also in the beginning of the 1990s developed mechanical parking equipment, which was 10 years in the past. Because a lot of new residents in the district with the ratio of 1:1. To address the size of parking spaces for tenants and business areas contradictions 3D mechanical parking equipment with an average size of a small motorcycle's unique characteristics, the majority of users have been accepted.Compared with the traditional natural underground garage, Machinery garage demonstrates its superiority in many respects. First, the mechanical garage has a prominent section of superiority. Past due to the underground garage must elapse enough lanes, the average car will occupy an area of 40 square meters, If the use of double-mechanical garage, which would enable ground to improve the utilization rate of around 80% to 90%, If using ground multi-storey (21 storey), three-dimensional garage, 50 square meters of land area will be placed on the 40 cars, which can greatly save the limited land resources, Civil and save development costs.To underground garage, Mechanical garage can be more effective to ensure personal and vehicle safety in the garage or car kept prospective location, the entire electronic control equipment would not operate. It should be said that the mechanical garage from the management can do a thorough separation of people and vehicles.In the underground garage using mechanical parking, it also can remove the heating ventilation; therefore, Operation of the power consumption than workers in the management of underground garage is much lower. Mechanical garage don't usually do complete system, but as a single machine containers. This will give full play to its small space, the advantages of decentralized, Each of the residential areas or groups downstairs to make a complete circuit can be set up random mechanicalparking building. This garage of the district can solve the shortage of parking difficulty in providing convenient conditions right now.Currently, three-dimensional garage mainly in the following forms: lifting and transferring,aisle stacking garage, vertical garage, vertical cycle, box-level cycle, the level of circulating round.1.1.1 Lifting and transferringLifting and transferring Garage modular design, each module can be designed into two, three, four levels, the five-story, semi-submerged in various forms, such as the number of parking spaces from a few to hundreds. Three-dimensional garage applies to the ground and underground car parks, configuration flexibility and cost is low.1. Product features:1) Save land, the configuration flexibility, and shorter construction period.2) Low prices, firefighting and exterior decoration, with a total investment on small foundations.3) Use automatic control, simple structure, safe and reliable.4) Access to a quick, short waiting time.5) Run a smooth, low noise.6) Applies to commercial, offices, and residential quarters supporting the use of car parks.2. Safety devices: anti-dropping device, a photoelectric sensor, spacing protectors, emergency stop switch.1.1.2 Aisle stacking garageAisle stacking garage used as a stacking machine tool access vehicles. All vehicles are stacking machine access, so the technical requirements for stacker higher, a single stacker cost is higher. So aisle stacking apply to the parking garage needs a few more customers.1.1.3 Vertical GarageVertical Garage Elevator similar to the principle that both sides of the hoist layout spaces. Generally need a ground vehicle rotary tables can be saved by the driver away. Vertical Garage generally higher high (tens of meters), safety equipment, Installation precision machining requirements are very high, high cost, but has the smallest area.1.1.4 Vertical cycleProduct features:1) covers an area of small; two berths area can stop 6-10 vehicles.2) The decoration can be added only roof, fire hydrants available.3) Low prices, foundation, external decoration, fire and other small investment, short construction periods.4) Use automatic control, safe and reliable operation.2.2.1 The stereo garage automatic control systemThe modern large-scale building mainstream is intelligent mansion and community. So, automated parking equipment or garage automatic control system will become intelligent mansion and an important part of community. Simple, fast, easy to use, safe, reliable, and less maintenance, to provide users with a safe, easy to use environment, This is auto-parking feature of the basic equipment. All parking equipment operating conditions, vehicles parked in time, vehicle storage Malaysia, garage storage capacity. Vehicles kept high and low peaks, and other information can be transmitted through the network of intelligent control center through intelligent control center operator, and the broadcasting system and the management office of the Division linked related to early release control, management information, thus achieving all the intelligent management. Building and the Community through the intelligent control of the center could also associate with social networking functions. Information released to the collection coming out or expands utilization of the garage social and economic benefits. This will be the automation of the development direction of the garage. Solid Garage automation control system include the following five major subsystems: automatic toll collection management system automatic access systems for remote diagnosis system, automatic Gate, control security system.Subsystems are more unified control of the central control room, for customers planning Garage form of management, Published garage inventory capacity, traffic control program.2.1.1 Automatic Toll Management SystemAutomatic charge adopts contactless IC card. IC card points long-term card and the stored-card. For fixed users, the issue of long-term cards, the cost of fixed users pays management fees paid together; on the temporary users, issue stored-value cards, namely: the user feespaid cards exist within each parking card reader automatically deducted from the cost.2.1.2 Automatic vehicle access systemAutomatic vehicle access system is generally controlled by small PLC. Including the identification card number and mobile disc contains two cars process. Users enter the garage at the entrance to Swiping cards, reader data automatically transmitted to the PLC control system, PLC system through the judgment card number and automatically set the corresponding site mobile trucks and vehicles to the handover location, the garage door opened, shorten the time access to cars. Truck drivers light signals in accordance with the guidelines created only when vehicles parked in a safe location, Parking will be normal light-Kai. Access car after the completion of the garage doors shut down automatically. Mobile site contains car, the system in strict accordance with the various signal detection mobile state, including long signal detection, Detection in place, the position detection limit, officers hit detection, emergency stop signal detection. If cars are running plate is not in place or vehicle length in excess of the permitted length of the garage, all vehicles disc will contain no action, If detected emergency stop signal to stop all action until the emergency stop signal disappeared. Above signals are hardware signals, in addition, the software can also be installed to control signal protection, such as the protection of the time, to ensure that the damage due to hardware failure to signal equipment and the main guarantee for the safety of vehicles.2.1.3 Remote diagnosis systemControllers can spot card, hubs and other network equipment and control center connected to the LAN, MODEN through remote management, monitoring the operation of the scene, when the scene failure, in the control center can be addressed to facilitate the management, e-office security personnel.2.1.4 Automatic GateIn the garage entrance of the no-contact reader, and the Gate of coil users in the garage entrances Swiping cards, the system automatically discriminates validity of the card, if valid, the Gateopen automatically, through induction coils, Automatic self-closing fence; If invalid, the Gate is not open, and sound and light alarm.2.1.5 Monitoring security systemMonitoring security system is in the central control room for monitoring and controlling the operation of the garage scene conditions. It has motion detection, license plate recognition, network connections, different types of alarm systems linkage, and other functions, can be achieved unguarded.System catalog:Video monitoring function : the garage entrances, and the duty, the main segments within the garage installation focusing cameras, On the larger spaces installation spherical platforms, in order to achieve all-round garage on real-time monitoring. If the garage light conditions of the poor would use black-and-white cameras.Motion Detection functions: setting up the night in the garage of motion detection region, detecting when there are a moving target, Motion Detection and Alarm function remind staffs.LPR functions: it can set up the garage light vehicle license plates, vehicle. When the light vehicles entering the garage regional surveillance, the system automatically cross-referenced with images of a very odd situation, issued a warning signal and automatic switching and record their images.Alarm linkage functions: all can move even the police mainframe, if activated Relay acousto-optic warning issued notice of security personnel to voluntarily disarm Gate interception of vehicular access.Digital video functions : it with a continuous record of what happened in the garage, can be synchronized intervals over images arbitrary choice of the overall image to enlarge and local amplification, recording, playback, backup can be conducted all kinds of information.Reportedly, has begun an increasing number of residential quarters began to use a mechanical garage. Taking into account the cost and maintenance, the majority of the district is a multi-storey lifting and transferring parking equipment, mass storage mechanical garage also rarely. Lifting and transferring Garage Equipment parking flow indicate the following:1、The sense of light yellow instructions garage operationRed lamp was ongoing operating instructions, please wait; Green light is currently no operating instructions, can operate; yellow light instructions were to fail, the garage can not work.2、The operationDrivers of vehicles enter from the garage entrance. At the entrance of non-contact sensors Reader former regional shaken following their IC cards, induction process completed, the fence automatically rises driver drove into the garage. The fence shut down automatically after vehicles entering. Card is the controller to read spaces, corresponding to the parking garage containing cars moved to the site automatically transfer vehicle location, Automatic garage door open units. Car drivers entering and parking in place, Latin hand brake, alighted out of the garage, using IC cards in the garage exit Huang about IC cards Garage door modules to shut down automatically. Completed deposit truck operators.3、Collect the car operationDrivers entering the garage at the entrance to the non-contact sensors Reader former regional shaken following their IC cards Controller automatically read spaces, corresponding to the parking garage containing cars moved to the site automatically transfer vehicle location, Automatic garage door open modules, drivers entering the garage and drive out, in the garage exit of the automatic reader before induction regional dazzle your own IC cards, sensors finished, the reader receive information, Host controller automatically recorded, prepaid, automatically raising the fence, the driver drove the playing field, appeared after fencing to shut down automatically. Meanwhile, Controller automatically read spaces, corresponding to the garage door unit shut down automatically. Vehicle operation finished.The garage has a complete self-protection device in the course of operation. A series of photoelectric switches, proximity switches, trip switches and other vehicles on site contains accurate operation in place to play a decisive role; falling unique defense installations, broken rope warning device, speeding vehicle protection device to protect the security role played. Detection of long vehicles, vehicle parking is not in place detection, and personnel into a detection signal of vehicles and the safety play a decisive role.翻译立体车库1.1 立体车库概述车辆无处停放的问题是城市的社会、经济、交通发展到一定程度产生的结果,立体停车设备的发展在国外,尤其在日本已有近3040年的历史,无论在技术上还是在经验上均已获得了成功。

外文文献及翻译

外文文献及翻译

((英文参考文献及译文)二〇一六年六月本科毕业论文 题 目:STATISTICAL SAMPLING METHOD, USED INTHE AUDIT学生姓名:王雪琴学 院:管理学院系 别:会计系专 业:财务管理班 级:财管12-2班 学校代码: 10128 学 号: 201210707016Statistics and AuditRomanian Statistical Review nr. 5 / 2010STATISTICAL SAMPLING METHOD, USED IN THE AUDIT - views, recommendations, fi ndingsPhD Candidate Gabriela-Felicia UNGUREANUAbstractThe rapid increase in the size of U.S. companies from the earlytwentieth century created the need for audit procedures based on the selectionof a part of the total population audited to obtain reliable audit evidence, tocharacterize the entire population consists of account balances or classes oftransactions. Sampling is not used only in audit – is used in sampling surveys,market analysis and medical research in which someone wants to reach aconclusion about a large number of data by examining only a part of thesedata. The difference is the “population” from which the sample is selected, iethat set of data which is intended to draw a conclusion. Audit sampling appliesonly to certain types of audit procedures.Key words: sampling, sample risk, population, sampling unit, tests ofcontrols, substantive procedures.Statistical samplingCommittee statistical sampling of American Institute of CertifiedPublic Accountants of (AICPA) issued in 1962 a special report, titled“Statistical sampling and independent auditors’ which allowed the use ofstatistical sampling method, in accordance with Generally Accepted AuditingStandards (GAAS). During 1962-1974, the AICPA published a series of paperson statistical sampling, “Auditor’s Approach to Statistical Sampling”, foruse in continuing professional education of accountants. During 1962-1974,the AICPA published a series of papers on statistical sampling, “Auditor’sApproach to Statistical Sampling”, for use in continuing professional educationof accountants. In 1981, AICPA issued the professional standard, “AuditSampling”, which provides general guidelines for both sampling methods,statistical and non-statistical.Earlier audits included checks of all transactions in the period coveredby the audited financial statements. At that time, the literature has not givenparticular attention to this subject. Only in 1971, an audit procedures programprinted in the “Federal Reserve Bulletin (Federal Bulletin Stocks)” includedseveral references to sampling such as selecting the “few items” of inventory.Statistics and Audit The program was developed by a special committee, which later became the AICPA, that of Certified Public Accountants American Institute.In the first decades of last century, the auditors often applied sampling, but sample size was not in related to the efficiency of internal control of the entity. In 1955, American Institute of Accountants has published a study case of extending the audit sampling, summarizing audit program developed by certified public accountants, to show why sampling is necessary to extend the audit. The study was important because is one of the leading journal on sampling which recognize a relationship of dependency between detail and reliability testing of internal control.In 1964, the AICPA’s Auditing Standards Board has issued a report entitled “The relationship between statistical sampling and Generally Accepted Auditing Standards (GAAS)” which illustrated the relationship between the accuracy and reliability in sampling and provisions of GAAS.In 1978, the AICPA published the work of Donald M. Roberts,“Statistical Auditing”which explains the underlying theory of statistical sampling in auditing.In 1981, AICPA issued the professional standard, named “Audit Sampling”, which provides guidelines for both sampling methods, statistical and non-statistical.An auditor does not rely solely on the results of a single procedure to reach a conclusion on an account balance, class of transactions or operational effectiveness of the controls. Rather, the audit findings are based on combined evidence from several sources, as a consequence of a number of different audit procedures. When an auditor selects a sample of a population, his objective is to obtain a representative sample, ie sample whose characteristics are identical with the population’s characteristics. This means that selected items are identical with those remaining outside the sample.In practice, auditors do not know for sure if a sample is representative, even after completion the test, but they “may increase the probability that a sample is representative by accuracy of activities made related to design, sample selection and evaluation” [1]. Lack of specificity of the sample results may be given by observation errors and sampling errors. Risks to produce these errors can be controlled.Observation error (risk of observation) appears when the audit test did not identify existing deviations in the sample or using an inadequate audit technique or by negligence of the auditor.Sampling error (sampling risk) is an inherent characteristic of the survey, which results from the fact that they tested only a fraction of the total population. Sampling error occurs due to the fact that it is possible for Revista Română de Statistică nr. 5 / 2010Statistics and Auditthe auditor to reach a conclusion, based on a sample that is different from the conclusion which would be reached if the entire population would have been subject to audit procedures identical. Sampling risk can be reduced by adjusting the sample size, depending on the size and population characteristics and using an appropriate method of selection. Increasing sample size will reduce the risk of sampling; a sample of the all population will present a null risk of sampling.Audit Sampling is a method of testing for gather sufficient and appropriate audit evidence, for the purposes of audit. The auditor may decide to apply audit sampling on an account balance or class of transactions. Sampling audit includes audit procedures to less than 100% of the items within an account balance or class of transactions, so all the sample able to be selected. Auditor is required to determine appropriate ways of selecting items for testing. Audit sampling can be used as a statistical approach and a non- statistical.Statistical sampling is a method by which the sample is made so that each unit consists of the total population has an equal probability of being included in the sample, method of sample selection is random, allowed to assess the results based on probability theory and risk quantification of sampling. Choosing the appropriate population make that auditor’ findings can be extended to the entire population.Non-statistical sampling is a method of sampling, when the auditor uses professional judgment to select elements of a sample. Since the purpose of sampling is to draw conclusions about the entire population, the auditor should select a representative sample by choosing sample units which have characteristics typical of that population. Results will not extrapolate the entire population as the sample selected is representative.Audit tests can be applied on the all elements of the population, where is a small population or on an unrepresentative sample, where the auditor knows the particularities of the population to be tested and is able to identify a small number of items of interest to audit. If the sample has not similar characteristics for the elements of the entire population, the errors found in the tested sample can not extrapolate.Decision of statistical or non-statistical approach depends on the auditor’s professional judgment which seeking sufficient appropriate audits evidence on which to completion its findings about the audit opinion.As a statistical sampling method refer to the random selection that any possible combination of elements of the community is equally likely to enter the sample. Simple random sampling is used when stratification was not to audit. Using random selection involves using random numbers generated byRomanian Statistical Review nr. 5 / 2010Statistics and Audit a computer. After selecting a random starting point, the auditor found the first random number that falls within the test document numbers. Only when the approach has the characteristics of statistical sampling, statistical assessments of risk are valid sampling.In another variant of the sampling probability, namely the systematic selection (also called random mechanical) elements naturally succeed in office space or time; the auditor has a preliminary listing of the population and made the decision on sample size. “The auditor calculated a counting step, and selects the sample element method based on step size. Step counting is determined by dividing the volume of the community to sample the number of units desired. Advantages of systematic screening are its usability. In most cases, a systematic sample can be extracted quickly and method automatically arranges numbers in successive series.”[2].Selection by probability proportional to size - is a method which emphasizes those population units’recorded higher values. The sample is constituted so that the probability of selecting any given element of the population is equal to the recorded value of the item;Stratifi ed selection - is a method of emphasis of units with higher values and is registered in the stratification of the population in subpopulations. Stratification provides a complete picture of the auditor, when population (data table to be analyzed) is not homogeneous. In this case, the auditor stratifies a population by dividing them into distinct subpopulations, which have common characteristics, pre-defined. “The objective of stratification is to reduce the variability of elements in each layer and therefore allow a reduction in sample size without a proportionate increase in the risk of sampling.” [3] If population stratification is done properly, the amount of sample size to come layers will be less than the sample size that would be obtained at the same level of risk given sample with a sample extracted from the entire population. Audit results applied to a layer can be designed only on items that are part of that layer.I appreciated as useful some views on non-statistical sampling methods, which implies that guided the selection of the sample selecting each element according to certain criteria determined by the auditor. The method is subjective; because the auditor selects intentionally items containing set features him.The selection of the series is done by selecting multiple elements series (successive). Using sampling the series is recommended only if a reasonable number of sets used. Using just a few series there is a risk that the sample is not representative. This type of sampling can be used in addition to other samples, where there is a high probability of occurrence of errors. At the arbitrary selection, no items are selected preferably from the auditor, Revista Română de Statistică nr. 5 / 2010Statistics and Auditthat regardless of size or source or characteristics. Is not the recommended method, because is not objective.That sampling is based on the auditor’s professional judgment, which may decide which items can be part or not sampled. Because is not a statistical method, it can not calculate the standard error. Although the sample structure can be constructed to reproduce the population, there is no guarantee that the sample is representative. If omitted a feature that would be relevant in a particular situation, the sample is not representative.Sampling applies when the auditor plans to make conclusions about population, based on a selection. The auditor considers the audit program and determines audit procedures which may apply random research. Sampling is used by auditors an internal control systems testing, and substantive testing of operations. The general objectives of tests of control system and operations substantive tests are to verify the application of pre-defined control procedures, and to determine whether operations contain material errors.Control tests are intended to provide evidence of operational efficiency and controls design or operation of a control system to prevent or detect material misstatements in financial statements. Control tests are necessary if the auditor plans to assess control risk for assertions of management.Controls are generally expected to be similarly applied to all transactions covered by the records, regardless of transaction value. Therefore, if the auditor uses sampling, it is not advisable to select only high value transactions. Samples must be chosen so as to be representative population sample.An auditor must be aware that an entity may change a special control during the course of the audit. If the control is replaced by another, which is designed to achieve the same specific objective, the auditor must decide whether to design a sample of all transactions made during or just a sample of transactions controlled again. Appropriate decision depends on the overall objective of the audit test.Verification of internal control system of an entity is intended to provide guidance on the identification of relevant controls and design evaluation tests of controls.Other tests:In testing internal control system and testing operations, audit sample is used to estimate the proportion of elements of a population containing a characteristic or attribute analysis. This proportion is called the frequency of occurrence or percentage of deviation and is equal to the ratio of elements containing attribute specific and total number of population elements. WeightRomanian Statistical Review nr. 5 / 2010Statistics and Audit deviations in a sample are determined to calculate an estimate of the proportion of the total population deviations.Risk associated with sampling - refers to a sample selection which can not be representative of the population tested. In other words, the sample itself may contain material errors or deviations from the line. However, issuing a conclusion based on a sample may be different from the conclusion which would be reached if the entire population would be subject to audit.Types of risk associated with sampling:Controls are more effective than they actually are or that there are not significant errors when they exist - which means an inappropriate audit opinion. Controls are less effective than they actually are that there are significant errors when in fact they are not - this calls for additional activities to establish that initial conclusions were incorrect.Attributes testing - the auditor should be defining the characteristics to test and conditions for misconduct. Attributes testing will make when required objective statistical projections on various characteristics of the population. The auditor may decide to select items from a population based on its knowledge about the entity and its environment control based on risk analysis and the specific characteristics of the population to be tested.Population is the mass of data on which the auditor wishes to generalize the findings obtained on a sample. Population will be defined compliance audit objectives and will be complete and consistent, because results of the sample can be designed only for the population from which the sample was selected.Sampling unit - a unit of sampling may be, for example, an invoice, an entry or a line item. Each sample unit is an element of the population. The auditor will define the sampling unit based on its compliance with the objectives of audit tests.Sample size - to determine the sample size should be considered whether sampling risk is reduced to an acceptable minimum level. Sample size is affected by the risk associated with sampling that the auditor is willing to accept it. The risk that the auditor is willing to accept lower, the sample will be higher.Error - for detailed testing, the auditor should project monetary errors found in the sample population and should take into account the projected error on the specific objective of the audit and other audit areas. The auditor projects the total error on the population to get a broad perspective on the size of the error and comparing it with tolerable error.For detailed testing, tolerable error is tolerable and misrepresentations Revista Română de Statistică nr. 5 / 2010Statistics and Auditwill be a value less than or equal to materiality used by the auditor for the individual classes of transactions or balances audited. If a class of transactions or account balances has been divided into layers error is designed separately for each layer. Design errors and inconsistent errors for each stratum are then combined when considering the possible effect on the total classes of transactions and account balances.Evaluation of sample results - the auditor should evaluate the sample results to determine whether assessing relevant characteristics of the population is confirmed or needs to be revised.When testing controls, an unexpectedly high rate of sample error may lead to an increase in the risk assessment of significant misrepresentation unless it obtained additional audit evidence to support the initial assessment. For control tests, an error is a deviation from the performance of control procedures prescribed. The auditor should obtain evidence about the nature and extent of any significant changes in internal control system, including the staff establishment.If significant changes occur, the auditor should review the understanding of internal control environment and consider testing the controls changed. Alternatively, the auditor may consider performing substantive analytical procedures or tests of details covering the audit period.In some cases, the auditor might not need to wait until the end audit to form a conclusion about the effectiveness of operational control, to support the control risk assessment. In this case, the auditor might decide to modify the planned substantive tests accordingly.If testing details, an unexpectedly large amount of error in a sample may cause the auditor to believe that a class of transactions or account balances is given significantly wrong in the absence of additional audit evidence to show that there are not material misrepresentations.When the best estimate of error is very close to the tolerable error, the auditor recognizes the risk that another sample have different best estimate that could exceed the tolerable error.ConclusionsFollowing analysis of sampling methods conclude that all methods have advantages and disadvantages. But the auditor is important in choosing the sampling method is based on professional judgment and take into account the cost / benefit ratio. Thus, if a sampling method proves to be costly auditor should seek the most efficient method in view of the main and specific objectives of the audit.Romanian Statistical Review nr. 5 / 2010Statistics and Audit The auditor should evaluate the sample results to determine whether the preliminary assessment of relevant characteristics of the population must be confirmed or revised. If the evaluation sample results indicate that the relevant characteristics of the population needs assessment review, the auditor may: require management to investigate identified errors and likelihood of future errors and make necessary adjustments to change the nature, timing and extent of further procedures to take into account the effect on the audit report.Selective bibliography:[1] Law no. 672/2002 updated, on public internal audit[2] Arens, A şi Loebbecke J - Controve …Audit– An integrate approach”, 8th edition, Arc Publishing House[3] ISA 530 - Financial Audit 2008 - International Standards on Auditing, IRECSON Publishing House, 2009- Dictionary of macroeconomics, Ed C.H. Beck, Bucharest, 2008Revista Română de Statistică nr. 5 / 2010Statistics and Audit摘要美国公司的规模迅速增加,从第二十世纪初创造了必要的审计程序,根据选定的部分总人口的审计,以获得可靠的审计证据,以描述整个人口组成的帐户余额或类别的交易。

光伏发电技术中英文资料外文翻译文献

光伏发电技术中英文资料外文翻译文献

光伏发电技术中英文资料外文翻译文献Research Article 1: Title of the ArticleAbstractResearch Article 2: Title of the ArticleAbstractThis research article focuses on the environmental impact of PV technology. It explains how solar panels convert sunlight into electricity and highlights the role of PV systems in reducing greenhouse gas emissions. The article discusses the benefits and challenges associated with PV technology, including its dependence on sunlight, land requirements, and recyclability of materials. It also examines the life cycle assessment (LCA) of PV systems to evaluate their overall environmental performance. The research concludes by suggesting strategies to mitigate the environmental impact of PV technology, suchas improving panel efficiency and implementing responsible recycling practices.Research Article 3: Title of the ArticleAbstractThis article explores the economic aspects of PV technology. It analyzes the cost of installing and maintaining PV systems, including considerations for equipment, installation, and operation. The research discusses various financial incentives, such as government subsidies and tax credits, that promote the adoption of PV technology. It also highlights the economic benefits of PV systems, including job creation and energy independence. The article concludes by discussing the future potential of PV technology in reducing energy costs and stimulating economic growth.Research Article 4: Title of the ArticleAbstractThe focus of this research article is on the technical advancements in PV technology. It discusses the development of new materials and manufacturing processes to improve the efficiency and reliability of solar panels. The article explores the integration of PV systems with smart grid technology and how it enables better management of electricity generation and consumption. It also highlights the role of artificial intelligence and machine learning in optimizing PV system performance. The research concludes by suggesting future research directions in PV technology, such as exploring nanomaterials and enhancing the intelligence of PV systems.Conclusion总结这份文献收录了关于光伏发电技术的各个方面的研究,涵盖了与环境影响、经济考量和技术进展相关的主题。

智能医疗系统毕业论文中英文资料外文翻译文献

智能医疗系统毕业论文中英文资料外文翻译文献

智能医疗系统毕业论文中英文资料外文翻译文献AbstractThe field of healthcare has greatly benefited from the advances in technology, particularly with the development of intelligent healthcare systems. These systems utilize artificial intelligence (AI) to improve the quality and efficiency of healthcare services. This literature review aims to provide an overview of the current state of intelligent healthcare systems and their applications in the medical field.IntroductionKey Features of Intelligent Healthcare Systems1. Real-Time Monitoring: Intelligent healthcare systems facilitate real-time monitoring of patients' vital signs, allowing healthcare professionals to detect any abnormalities and intervene in a timely manner.Real-Time Monitoring: Intelligent healthcare systems facilitatereal-time monitoring of patients' vital signs, allowing healthcare professionals to detect any abnormalities and intervene in a timely manner.2. Predictive Analytics: By analyzing vast amounts of patient data, these systems can identify patterns and trends to predict potential health risks or deteriorations, enabling proactive interventions.Predictive Analytics: By analyzing vast amounts of patient data, these systems can identify patterns and trends to predict potential health risks or deteriorations, enabling proactive interventions.3. Personalized Medicine: Intelligent healthcare systems can utilize patient-specific data to provide personalized treatment plans, taking into account individual characteristics and medical history.Personalized Medicine: Intelligent healthcare systems can utilize patient-specific data to provide personalized treatment plans, taking into account individual characteristics and medical history.4. Remote Patient Management: Through the use of telemedicine technologies, intelligent healthcare systems enable remote patientmonitoring and virtual consultations, enhancing access to healthcare services and reducing the need for in-person visits.Remote Patient Management: Through the use of telemedicine technologies, intelligent healthcare systems enable remote patient monitoring and virtual consultations, enhancing access to healthcare services and reducing the need for in-person visits.Applications of Intelligent Healthcare Systems1. Chronic Disease Management: Intelligent healthcare systems can aid in the management of chronic conditions such as diabetes, cardiovascular diseases, and respiratory disorders. They provide patients with tools for self-management and assist healthcare professionals in monitoring the disease progression.Chronic Disease Management: Intelligent healthcare systems can aid in the management of chronic conditions such as diabetes, cardiovascular diseases, and respiratory disorders. They provide patients with tools for self-management and assist healthcare professionals in monitoring the disease progression.2. Hospital Workflow Optimization: These systems can optimize hospital workflows by automating administrative tasks, streamlining patient admission and discharge processes, and improving resource allocation.Hospital Workflow Optimization: These systems can optimize hospital workflows by automating administrative tasks, streamlining patient admission and discharge processes, and improving resource allocation.3. Drug Safety and Adherence: Intelligent healthcare systems can help prevent medication errors and improve patient adherence to prescribed treatments through reminders, alerts, and medication tracking.Drug Safety and Adherence: Intelligent healthcare systems can help prevent medication errors and improve patient adherence to prescribed treatments through reminders, alerts, and medication tracking.4. Healthcare Data Analysis: By collecting and analyzing large volumes of healthcare data, these systems can provide valuable insights for medical research, disease surveillance, and public health planning.Healthcare Data Analysis: By collecting and analyzing largevolumes of healthcare data, these systems can provide valuable insights for medical research, disease surveillance, and public health planning.ConclusionReferences[1] Smith, J. (2019). The role of intelligent healthcare systems in transforming healthcare delivery. Journal of Healthcare Technology,8(2), 45-56.[2] Johnson, A., et al. (2018). Applications of artificial intelligence in healthcare: Current trends and future prospects. International Journal of Medical Informatics, 115, 1-7.[3] Rodrigues, J., et al. (2020). Intelligent healthcare systems: State-of-the-art and future challenges. Journal of Medical Systems, 44(3), 1-15.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

逆变器SHI TingNa, W ANG Jian1引言逆变器是一种电动装置,转换成直流电(DC),交流电流转换的AC(交流)可以在任何所需的电压和频率使用适当的变压器,开关,控制circuits.Solid状态逆变器有没有移动部件,用于广泛的应用范围从小型计算机开关电源,高压大型电力公司电力,运输散装直接电流应用。

逆变器通常用于提供交流电源,直流电源,如太阳能电池板或电池。

逆变器的主要有两种类型。

修改后的正弦波逆变器的输出是类似方波输出,输出变为零伏前一段时间切换积极或消极的除外。

它是简单,成本低,是大多数电子设备兼容,除敏感或专用设备,例如某些激光打印机。

一个纯正弦波逆变器产生一个近乎完美的正弦波输出(<3%的总谐波失真),本质上是相同的公用事业提供电网。

因此,它是与所有的交流电的电子设备兼容。

这是在电网领带逆变器使用的类型。

它的设计更复杂,成本5或10倍以上每单位功率电逆变器是一个高功率的电子振荡器。

它这样命名,因为早期的机械AC到DC转换器工作在反向,因而被“倒”,将直流电转换AC.The变频器执行的整流器对面功能。

2应用2.1直流电源利用率逆变器从交流电力来源,如电池,太阳能电池板,燃料电池的直流电转换成。

电力,可以在任何所需的电压,特别是它可以操作交流电源操作而设计的设备,或纠正,以产生任何所需的voltage Grid领带逆变器的直流送入分销网络的能量,因为它们产生电流交替使用相同的波形和频率分配制度提供。

他们还可以关掉一个blackout.Micro逆变器的情况下自动转换成交流电电网的电流直接从当前个别太阳能电池板。

默认情况下,他们是格领带设计。

2.2不间断电源不间断电源(UPS),电池和逆变器,交流电源,主电源不可用时使用。

当主电源恢复正常时,整流提供直流电源给电池充电。

2.3感应加热逆变器的低频交流主电源转换到更高频率的感应加热使用。

要做到这一点,首先纠正交流电源提供直流电源。

逆变器,然后改变高频率的交流电源,直流电源。

2.4高压直流输电随着高压直流输电,交流电源经过整流和高压直流电源传输到另一个位置。

在接收的位置,在静态逆变器厂逆变器转换回交流电源。

2.5变频驱动器一个变频驱动控制向电动机提供电源的频率和电压控制交流电机的运行速度。

逆变器提供控制电源。

在大多数情况下,变频驱动,包括整流器,使逆变器的直流电源,可从交流主电源提供。

由于逆变器是关键部件,变频驱动,有时被称为逆变器驱动器,或只是逆变器。

2.6电动汽车驱动器目前使用的权力,在一些电动和柴油- 电动轨道车辆以及一些电池的电动汽车和混合动力电动公路车辆,如丰田Prius和菲斯克噶牵引电机调速电机控制逆变器。

变频技术的各种改进正在开发专门用于电动汽车的应用。

[2]在再生制动的车辆,逆变器也需要从电机(作为发电机)的权力,并储存在电池中。

2.7一般情况下一个变压器,使交流电源转换为任何所需的电压,但在相同的频率。

直流逆变器,加上整流器,可以被用来转换从任何电压,交流或直流,任何其他的电压,也交流或直流,在任何所需的频率。

输出功率不能超过输入功率,但效率高的余热消耗的功率小的比例。

3电路描述3.1基本设计在一个简单的逆变电路,直流电源连接到变压器初级绕组中心抽头通过。

一个正在迅速来回切换开关允许电??流流回直流电源后,两个备用路径,然后通过初级绕组的一端其他。

在变压器的初级绕组中的电流方向交替产生交流电(AC)在二次回路。

机电开关设备的版本包括两个固定触点和支持动触头弹簧。

春天拥有对固定触点之一的可移动的接触和电磁铁拉动产接触到相对固定的联系。

在电磁铁的电流被中断的开关,使开关不断来回切换迅速的行动。

这种机电逆变器开关的类型,称为一个振动器或蜂鸣器,曾一度被用于真空管汽车收音机。

类似的机制已被用于门铃,蜂鸣器和纹身枪。

当他们成为具有足够的额定功率,晶体管和其他各种类型的半导体开关逆变电路设计已纳入。

3.2输出波形如上所述,在简单的逆变器开关时不耦合到输出变压器,产生一个方形的电压波形作为反对的是平常的交流电源波形的正弦的波形,由于其简单的关闭和对自然的。

使用傅立叶分析,周期性波形表示作为正弦波无穷级数的总和。

原始波形正弦波具有相同的频率被称为基本组成部分。

其他正弦波,称为谐波,该系列包括有频率是基本频率的整数倍。

需要从变频器的输出波形的质量取决于所连接的负载的特点。

一些负载需要一个近乎完美的正弦波电源电压才能正常工作。

方波电压与其他负载可能工作得非常好。

3.3三阶段逆变器用于三相逆变器变频驱动应用和高功率应用,如高压直流输电。

一个基本的三个单相逆变器的三相逆变器组成,每个交换机连接到三个负载端子。

三层交换机的运作最基本的控制计划,协调,使一台交换机工作在60度的基本输出波形的每个点。

这将创建一个线到线输出波形有六个步骤。

六步波形方波是3的倍数的谐波消除如上所述的正面和负面的部分之间的零电压的一步。

当舰载PWM技术应用于六步波形,基本整体造型,或信封的波形,保留3次谐波及其倍数,使被消除。

4历史4.1早期的逆变器从十九世纪末到二十世纪中叶,直流 - 交流功率转换完成使用旋转器或马达发电机组(爵套)。

在二十世纪初,真空管和充满气体管开始被用于逆变器电路中的开关。

最广泛使用的管型晶闸管。

机电逆变器的起源解释源长期变频器。

早期的AC至DC转换器采用感应或同步交流电机直接连接到一台发电机(发电机),使发电机的整流子扭转在正确的时刻其连接生产直流。

后来的发展是同步的转换器,电机和发电机绕组结合成一个电枢,一端与滑环和整流子在其他只有一个领域的框架。

结果要么是交流,直流。

与MG 组,直流,可考虑将分别从AC生成,同步器,它在一定意义上可以认为是“机械纠正交流”。

由于正确的辅助设备和控制设备,MG集或旋转转换,可以“倒着跑”,将直流转换为交流电。

因此,逆变器是一个倒置的转换。

4.2可控整流逆变器自从1957年初年初以来,晶体管不能提供足够的电压和额定电流最逆变器应用,它是1957年的晶闸管或可控硅(SCR)的介绍,开始过渡到固态逆变电路。

可控硅的换相的条件是在可控硅电路设计的关键考虑因素。

不要关闭可控硅整流自动门控制信号被切断时。

他们只关闭当正向电流降至低于最低维持电流,每一种可控硅变化,通过一些外部进程。

对于连接到交流电源的可控硅,整流发生自然每次源??电压极性反转。

可控硅直流电源连接到通常需要强迫换,强制要求减刑时电流为零的一种手段。

最复杂的可控硅电路采用自然,而不是被迫换减刑。

此外被迫换电路,可控硅已被用于在以上所述的逆变器电路的类型。

在逆变器传输到AC电源由直流电源供电的应用程序,它可以使用交流 - 直流可控整流电路的反演模式经营。

在反演模式,可控整流电路整流逆变器行。

这种类型的操作,可用于高压直流输电系统和再生制动电机控制系统的操作。

另一种类型的可控硅逆变电路是电流源输入(CSI)逆变器。

一个CSI逆变器是一个六步的电压源逆变器的双。

用一个电流源逆变器,直流电源作为电流源而非电压源配置。

变频器可控硅开关在六步序列直接阶梯电流波形作为一个三相交流负载的电流。

沪深逆变器换方法包括整流负载和并联电容器减刑。

这两种方法,输入电流调节协助减刑。

带整流负载,负载是在领先的功率因数运行的同步电机。

因为他们已经成为在更高的额定电压和电流,如可以通过控制信号的晶体管或IGBT的半导体已成为首选开关元件逆变电路使用。

4.3整流器和逆变器的脉冲数整流电路往往流的每个周期的AC输入电压整流的直流侧电流脉冲的数量分类。

单相半波整流是一个脉冲电路和单相全波整流是两个脉冲的电路。

一个三相半波整流是一个三脉冲电路和三相全波整流是一个六脉冲电路。

两个或两个以上的整流器三相整流器,有时串联或并联连接以获得更高的电压或额定电流。

提供特种变压器提供相移输出整流器的输入。

这有相乘法效应。

六个阶段是从两个变压器,12个阶段从三变等。

12脉冲整流器,18脉冲整流器等相关的整流电路。

当可控整流电路的反演模式在运作,他们将分为脉冲数也。

整流电路具有较高的脉冲数减少交流输入电流和减少直流输出电压纹波的谐波含量。

在反演模式,有较高的脉冲个数的电路,在AC输出电压波形的谐波含量较低。

5 参考文献[1] R. Organti, K. Nagaswamy, L. Sang, Predicted equal charge creterion scheme forconstant frequency control of single phase boost-type AC-DC converter, IEEE Trans.Power Electron 13 (1) (1998) 47-57.[2] M. Ohshima, E. Masada, A single-phase PCS with a novel constantly sampledcurrent-regulated PWM scheme, IEEE Trans. Power Electron 14 (5) (1999) 823-830.[3] T. Toshida, O. Shiizuka, O. Miyashita, K. Ohniwa, An improvement technique for theefficiency of high-frequency switch-mode rectifiers, IEEE Trans. Power Electron 15 (6) (2000) 1118-1123.[4] R. Sriniuasan,R. Oruganti,A unity power factor converter using half-bridge boosttopology, IEEE Trans.Power Electron 13(3)(1998) 487-500.[5] K. Itako, T. Mori, A high performance rectifier control system with feedforward controland DC resonance filter, in: International Conference on Electrical Engineering 2 005, Kunming, China, July 10-14, 2005.[6] K. Itako, T. Mori. Full bridge PWM rectifier with load current feedforward, in:International Conference on Electrical Engineering, Hong Kong, 2009.[7] W. Leonhard, Control of Electrical Drives, 3rd ed.,Springer, 2001, pp. 160-162.InverterSHI TingNa, WANG Jian1 IntroductionAn inverter is an electrical device that converts direct current (DC) to alternating current (AC); the converted AC can be at any required voltage and frequency with the use of appropriate transformers, switching, and control circuits.Solid-state inverters have no moving parts and are used in a wide range of applications, from small switching power supplies in computers, to large electric utility high-voltage direct current applications that transport bulk power. Inverters are commonly used to supply AC power from DC sources such as solar panels or batteries.There are two main types of inverter. The output of a modified sine wave inverter is similar to a square wave output except that the output goes to zero volts for a time before switching positive or negative. It is simple and low cost and is compatible with most electronic devices, except for sensitive or specialized equipment, for example certain laser printers. A pure sine wave inverter produces a nearly perfect sine wave output (<3% total harmonic distortion) that is essentially the same as utility-supplied grid power. Thus it is compatible with all AC electronic devices. This is the type used in grid-tie inverters. Its design is more complex, and costs 5 or 10 times more per unit power The electrical inverter is a high-power electronic oscillator. It is so named because early mechanical AC to DC converters were made to work in reverse, and thus were "inverted", to convert DC to AC.The inverter performs the opposite function of a rectifier.2 Applications2.1 DC power source utilizationAn inverter converts the DC electricity from sources such as batteries, solar panels,or fuel cells to AC electricity. The electricity can be at any required voltage; in particular it can operate AC equipment designed for mains operation, or rectified to produce DC at any desired voltageGrid tie inverters can feed energy back into the distribution network because they produce alternating current with the same wave shape and frequency as supplied by the distribution system. They can also switch off automatically in the event of a blackout.Micro-inverters convert direct current from individual solar panels into alternating current for the electric grid. They are grid tie designs by default.2.2 Uninterruptible power suppliesAn uninterruptible power supply (UPS) uses batteries and an inverter to supply AC power when main power is not available. When main power is restored, a rectifier supplies DC power to recharge the batteries.2.3 Induction heatingInverters convert low frequency main AC power to a higher frequency for use in induction heating. To do this, AC power is first rectified to provide DC power. The inverter then changes the DC power to high frequency AC power.2.4 HVDC power transmissionWith HVDC power transmission, AC power is rectified and high voltage DC power is transmitted to another location. At the receiving location, an inverter in a static inverter plant converts the power back to AC.2.5 Variable-frequency drivesA variable-frequency drive controls the operating speed of an AC motor by controlling the frequency and voltage of the power supplied to the motor. An inverter provides the controlled power. In most cases, the variable-frequency drive includes a rectifier so that DC power for the inverter can be provided from main AC power. Since an inverter is the key component, variable-frequency drives are sometimes calledinverter drives or just inverters.2.6 Electric vehicle drivesAdjustable speed motor control inverters are currently used to power the traction motors in some electric and diesel-electric rail vehicles as well as some battery electric vehicles and hybrid electric highway vehicles such as the Toyota Prius and Fisker Karma. Various improvements in inverter technology are being developed specifically for electric vehicle applications. In vehicles with regenerative braking, the inverter also takes power from the motor (now acting as a generator) and stores it in the batteries.2.7 The general caseA transformer allows AC power to be converted to any desired voltage, but at the same frequency. Inverters, plus rectifiers for DC, can be designed to convert from any voltage, AC or DC, to any other voltage, also AC or DC, at any desired frequency. The output power can never exceed the input power, but efficiencies can be high, with a small proportion of the power dissipated as waste heat.3 Circuit description3.1 Basic designsIn one simple inverter circuit, DC power is connected to a transformer through the centre tap of the primary winding. A switch is rapidly switched back and forth to allow current to flow back to the DC source following two alternate paths through one end of the primary winding and then the other. The alternation of the direction of current in the primary winding of the transformer produces alternating current (AC) in the secondary circuit.The electromechanical version of the switching device includes two stationary contacts and a spring supported moving contact. The spring holds the movable contact against one of the stationary contacts and an electromagnet pulls the movable contact tothe opposite stationary contact. The current in the electromagnet is interrupted by the action of the switch so that the switch continually switches rapidly back and forth. This type of electromechanical inverter switch, called a vibrator or buzzer, was once used in vacuum tube automobile radios. A similar mechanism has been used in door bells, buzzers and tattoo guns.As they became available with adequate power ratings, transistors and various other types of semiconductor switches have been incorporated into inverter circuit designs3.2 Output waveformsThe switch in the simple inverter described above, when not coupled to an output transformer, produces a square voltage waveform due to its simple off and on nature as opposed to the sinusoidal waveform that is the usual waveform of an AC power supply. Using Fourier analysis, periodic waveforms are represented as the sum of an infinite series of sine waves. The sine wave that has the same frequency as the original waveform is called the fundamental component. The other sine waves, called harmonics, that are included in the series have frequencies that are integral multiples of the fundamental frequency.The quality of output waveform that is needed from an inverter depends on the characteristics of the connected load. Some loads need a nearly perfect sine wave voltage supply in order to work properly. Other loads may work quite well with a square wave voltage.3.3 Three phase invertersThree-phase inverters are used for variable-frequency drive applications and for high power applications such as HVDC power transmission. A basic three-phase inverter consists of three single-phase inverter switches each connected to one of the three load terminals. For the most basic control scheme, the operation of the three switches is coordinated so that one switch operates at each 60 degree point of the fundamental output waveform. This creates a line-to-line output waveform that has six steps. The six-step waveform has a zero-voltage step between the positive and negative sections ofthe square-wave such that the harmonics that are multiples of three are eliminated as described above. When carrier-based PWM techniques are applied to six-step waveforms, the basic overall shape, or envelope, of the waveform is retained so that the 3rd harmonic and its multiples are cancelled.4 History4.1 Early invertersFrom the late nineteenth century through the middle of the twentieth century, DC-to-AC power conversion was accomplished using rotary converters or motor-generator sets (M-G sets). In the early twentieth century, vacuum tubes and gas filled tubes began to be used as switches in inverter circuits. The most widely used type of tube was the thyratron.The origins of electromechanical inverters explain the source of the term inverter. Early AC-to-DC converters used an induction or synchronous AC motor direct-connected to a generator (dynamo) so that the generator's commutator reversed its connections at exactly the right moments to produce DC. A later development is the synchronous converter, in which the motor and generator windings are combined into one armature, with slip rings at one end and a commutator at the other and only one field frame. The result with either is AC-in, DC-out. With an M-G set, the DC can be considered to be separately generated from the AC; with a synchronous converter, in a certain sense it can be considered to be "mechanically rectified AC". Given the right auxiliary and control equipment, an M-G set or rotary converter can be "run backwards", converting DC to AC. Hence an inverter is an inverted converter.4.2 Controlled rectifier invertersSince early transistors were not available with sufficient voltage and current ratings for most inverter applications, it was the 1957 introduction of the thyristor or silicon-controlled rectifier (SCR) that initiated the transition to solid state inverter circuits.The commutation requirements of SCRs are a key consideration in SCR circuit designs. SCRs do not turn off or commutate automatically when the gate control signal is shut off. They only turn off when the forward current is reduced to below the minimum holding current, which varies with each kind of SCR, through some external process. For SCRs connected to an AC power source, commutation occurs naturally every time the polarity of the source voltage reverses. SCRs connected to a DC power source usually require a means of forced commutation that forces the current to zero when commutation is required. The least complicated SCR circuits employ natural commutation rather than forced commutation. With the addition of forced commutation circuits, SCRs have been used in the types of inverter circuits described above.In applications where inverters transfer power from a DC power source to an AC power source, it is possible to use AC-to-DC controlled rectifier circuits operating in the inversion mode. In the inversion mode, a controlled rectifier circuit operates as a line commutated inverter. This type of operation can be used in HVDC power transmission systems and in regenerative braking operation of motor control systems.Another type of SCR inverter circuit is the current source input (CSI) inverter. A CSI inverter is the dual of a six-step voltage source inverter. With a current source inverter, the DC power supply is configured as a current source rather than a voltage source. The inverter SCRs are switched in a six-step sequence to direct the current to a three-phase AC load as a stepped current waveform. CSI inverter commutation methods include load commutation and parallel capacitor commutation. With both methods, the input current regulation assists the commutation. With load commutation, the load is a synchronous motor operated at a leading power factor.As they have become available in higher voltage and current ratings, semiconductors such as transistors or IGBTs that can be turned off by means of control signals have become the preferred switching components for use in inverter circuits.4.3 Rectifier and inverter pulse numbersRectifier circuits are often classified by the number of current pulses that flow to the DC side of the rectifier per cycle of AC input voltage. A single-phase half-wave rectifier is a one-pulse circuit and a single-phase full-wave rectifier is a two-pulse circuit.A three-phase half-wave rectifier is a three-pulse circuit and a three-phase full-waverectifier is a six-pulse circuit。

相关文档
最新文档