(完整版)_毕业设计外文参考文献
毕业设计外文文献翻译(原文+译文)
Environmental problems caused by Istanbul subway excavation and suggestionsfor remediation伊斯坦布尔地铁开挖引起的环境问题及补救建议Ibrahim Ocak Abstract:Many environmental problems caused by subway excavations have inevitably become an important point in city life. These problems can be categorized as transporting and stocking of excavated material, traffic jams, noise, vibrations, piles of dust mud and lack of supplies. Although these problems cause many difficulties,the most pressing for a big city like Istanbul is excava tion,since other listed difficulties result from it. Moreover, these problems are environmentally and regionally restricted to the period over which construction projects are underway and disappear when construction is finished. Currently, in Istanbul, there are nine subway construction projects in operation, covering approximately 73 km in length; over 200 km to be constructed in the near future. The amount of material excavated from ongoing construction projects covers approximately 12 million m3. In this study, problems—primarily, the problem with excavation waste(EW)—caused by subway excavation are analyzed and suggestions for remediation are offered.摘要:许多地铁开挖引起的环境问题不可避免地成为城市生活的重要部分。
课程设计外文文献
毕业设计(论文)外文参考文献译文及原文系部机械电气学部专业机械设计制造及其自动化年级 200x级班级名称机械设计1班学号 x x学生姓名 xxx 指导教师 xxxxx年x 月目录1 Representative Strcture of Injection Mol译文 (3)外文 (4)2 Number of Mold Cavities译文 (5)外文 (7)注射模的典型结构用于热塑性塑料注射成型的模具通常是溢料式模具,因为与传递模塑成型一样,在注射成型中,不需要额外的载料空间。
但是,模具设计的基本类型有多种变化。
所有材料最常使用的设计是两板模设计。
型腔装在第一个模板上,凸模装载第二个模板上。
主流道衬套并入定模的模板中。
按照这种安排,就有可能使用直接中心浇口,使塑料进入单腔模或者是多腔模的分流道系统中。
在大多数情况下,凸模、顶出装置以及分流道系统在动模中。
虽然为了符合特定要求会有许多变化,但是这是注射模的基本设计。
三板模设计的特点是具有包含型腔的第三个可移动的模板,因此对于多型腔操作,允许中心或偏置浇口进入每一个型腔。
模具打开时有两次分模,一个塑件的脱模,另一个是去除分流道和主流道凝料。
通过压力机常规功能不能成型的的带镶嵌件、螺纹和取芯的模塑件,要求在模具中安装分离的或零散的部件或者型芯。
这些零撒的部件随着塑件被顶出。
每一个生产周期后,这些部件必须与塑件分离,并重新安装在模具中。
因此使用复制的部件以高效生产。
液压缸或气缸被安装在模具中以抽出侧型芯部件。
在模具设置料导柱,就能完成有角度侧抽芯,而不需要高成本的零散部件。
有几种方法可用于旋松塑件上的内螺纹或外螺纹:为了提高生产率,常常使用价格相对较低的长行程的液压油缸驱动齿轮齿条机构进行自动脱螺纹。
其他脱螺纹的方法包括使用通过双动油缸驱动的齿轮齿条或摩擦型弧刷。
塑件的内部凸凹可以通过带料度的型芯(成型杆)成型,型芯的移动由将金属型芯与塑件分离的顶出杆驱动。
最新毕业设计英语参考文献
C++[1] Gordon Hogenson. C++/Cli The Visual C++ Language For .Net [M]. Wiley India Pvt. Ltd., 2007.[2] Motor Industry Software Reliability Association. MISRA-C: 2004: guidelines for the use of the C language in critical systems.[M]. MIRA, 2008.[3] Jeff Cogswell, John Paul Mueller. C++ All-In-One Desk Reference For Dummies [M]. Wiley publishing.Inc 2009.[4] Stephen R. Davis. C++ for Dummies [M]. wiley publishing.Inc 2008.[5] Harvey Dietel, Paul Deitel. C: How to Program [M]. Pearson Education,Inc 2010.[6] Bruce Eckel. Thinking in C++[M]. Prentice Hall, 2000.[7] Herbert Schildt. C++: a beginner's guide Beginner's Guides[M]. McGraw-Hill Professional, 2003.[8] Mark Lee. C++ Programming for the Absolute Beginner For the Absolute Beginner[M]. Course Technology, 2009.MIS参考文献[9] Kenneth C. Laudon, Jane P. Laudon . Management Information Systems: Managing the Digital Firm[M]. Publisher Prentice Hall, 2007.[10] Raymond McLeod, George P. Schell. Management information systems[M]. Pearson/Prentice Hall, 2007.[11] James A. O'Brien, George M. Marakas. Management Information Systems[M]. McGraw-Hill/Irwin, 2008.[12] Singh. Information System Management[M]. S.B. Nangia APH publishing Corporation .2007.[13] Kenneth C. Laudon, Jane Price Laudon.Management Information Systems: Managing the Digital Firm MyMISLab Series[M]. Prentice Hall, 2009.数据库参考文献[14] Thomas M. Connolly, Carolyn E. Begg. Database systems: a practical approach to design, implementation, and management[M]. Addison-Wesley, 2009.[15] Abraham Silberschatz, Henry F. Korth, S. Sudar shan. Database System Concepts[M]. McGraw-Hill, 2010.[16] Peter Rob, Carlos Coronel .Database Systems[M]. Cengage Learning EMEA, 2008.[17] J. Stanley Warford. Computer Systems[M]. Jones & Bartlett Publishers, 2009.[18] Toby J. Teorey, Stephen Buxton, Lowell Fryman, Terry Halpin. Database design: know it allKnow It All[M]. Morgan Kaufmann, 2009.[19] John W. Satzinger. Systems Analysis and Design in a Changing World[M]. Cengage Learning EMEA, 2008.SQL 参考文献[20] Alan Beaulieu. Learning SQLO'Reilly Series[M]. O'Reilly Media, Inc., 2009.[21] Clare Churcher. Beginning SQL Queries: From Novice to ProfessionalApress Series[M]. Apress, 2008.[22] Andy Oppel, Robert Sheldon. SQL: a beginner's guide BEGINNER'S GUIDE[M]. McGraw-Hill Professional, 2008.[23] Chris Fehily. SQL: Visual QuickStart Guide Visual Quickstart Guide Series[M]. Peachpit Press, 2008.交通管理参考文献:[24] Peter T. Martin, Aleksandar Stevanovic, Mountain Plains Consortium. Adaptive signal control, five: Sydney Coordinated Adaptive Traffic System evaluation in Park City, Utah Issues 6-200 of MPC report[M]. Mountain-Plains Consortium, 2008.[25] Kenneth J. Button, David A. Hensher. Handbook of transport systems and traffic control V olume 3 of Handbooks in Transportation Research Series[M]. Emerald Group Publishing, 2001.[26] Mashrur A. Chowdhury, Adel Wadid Sadek. Fundamentals of intelligent transportation systems planning Artech House ITS library[M]. Artech House, 2003.[27] Michael A. P. Taylor, Peter W. Bonsall, William Young. Understanding traffic systems: data, analysis, and presentation[M]. Ashgate, 2000.[28] Mike Slinn, Paul Matthews, Peter Guest.Traffic engineering design: principles and practice[M]. Butterworth-Heinemann, 2005.。
毕业设计外文文献翻译范文
毕业设计外文文献翻译专业学生姓名班级学号指导教师优集学院外文资料名称:Knowledge-Based Engineeri--ng Design Methodology外文资料出处:Int.J.Engng Ed.Vol.16.No.1附件: 1.外文资料翻译译文2.外文原文基于知识工程(KBE)设计方法D. E. CALKINS1.背景复杂系统的发展需要很多工程和管理方面的知识、决策,它要满足很多竞争性的要求。
设计被认为是决定产品最终形态、成本、可靠性、市场接受程度的首要因素。
高级别的工程设计和分析过程(概念设计阶段)特别重要,因为大多数的生命周期成本和整体系统的质量都在这个阶段。
产品成本的压缩最可能发生在产品设计的最初阶段。
整个生命周期阶段大约百分之七十的成本花费在概念设计阶段结束时,缩短设计周期的关键是缩短概念设计阶段,这样同时也减少了工程的重新设计工作量。
工程权衡过程中采用良好的估计和非正式的启发进行概念设计。
传统CAD工具对概念设计阶段的支持非常有限。
有必要,进行涉及多个学科的交流合作来快速进行设计分析(包括性能,成本,可靠性等)。
最后,必须能够管理大量的特定领域的知识。
解决方案是在概念设计阶段包含进更过资源,通过消除重新设计来缩短整个产品的时间。
所有这些因素都主张采取综合设计工具和环境,以在早期的综合设计阶段提供帮助。
这种集成设计工具能够使由不同学科的工程师、设计者在面对复杂的需求和约束时能够对设计意图达成共识。
那个设计工具可以让设计团队研究在更高级别上的更多配置细节。
问题就是架构一个设计工具,以满足所有这些要求。
2.虚拟(数字)原型模型现在需要是一种代表产品设计为得到一将允许一产品的早发展和评价的真实事实上原型的过程的方式。
虚拟样机将取代传统的物理样机,并允许设计工程师,研究“假设”的情况,同时反复更新他们的设计。
真正的虚拟原型,不仅代表形状和形式,即几何形状,它也代表如重量,材料,性能和制造工艺的非几何属性。
(完整版)本科生_毕业设计说明书外文文献及翻译_
Computer networking summarizeNetworking can be defined as the linking of people, resources and ideas. Networking occurs via casual encounters, meetings, telephone conversation, and the printed words. Now the computer networking provide beings with new networking capabilities. Computer network are important for services because service tasks are information intensive. During the is transmitted between clients, coworkers, management, funding sources, and policy makers. Tools with rapidly speed up communication will dramatically affect services.Computer network growing explosively. Two decades ago, few people essential part of our infrastructure. Networking is used in every aspect of business, including advertising, production, shipping, planning, bulling, and accounting. Consequently, most corporations in on-line libraries around the world. Federal, state, and local government offices use networks, as do military organizations. In short, computer networks are everywhere.The growth in networking economic impact as well. An entire industry jobs for people with more networking expertise. Companies need workers to plan, acquire, install, operate, and manage the addition computer programming is no longer restricted to individual computers; programmers are expected to design and implement application software that can communicate with software on other computers.Computer networks link computers by communication lines and software protocols, allowing data to be exchanged rapidly and reliably. Traditionally, they split between wide area networks (WANs) and local area networks (LANs). A WAN is a network connected over long-distance telephone lines, and a LAN is a localized network usually in one building or a group of buildings close together. The distinction, computers. Today networks carry e-mail, provide access to public databases, and are beginning to be used for distributed systems. Networks also allow users in one locality to share expensive resources, such as printers and disk-systems.Distributed computer systems are built using networked computers that cooperate to perform tasks. In this environment, each part of the networked system does what it is best at. The of a personal computer or workstation provides a good user interface. The mainframe, on the other the results to the users. In a distributed environment, a user might use in a special language (e. g. Structured Query Language-SQL), to the mainframe, which then parrrses the query, returning the user only the data requested. The user might then use the data. By passing back the user’s PC only the specific information requested, network traffic is reduced. If the whole file were transmitted, the PC would then of one network to access the resources on a different type of network. For example, a gateway could be used to connect a local area network of personal computers to a mainframe computer network. For example, if a company this example, using a bridge makes more sense than joining all thepersonal computers together in one large network because the individual departments only occasionally need to access information on the other network.Computer networking technology can be divided into four major aspects.The first is the data transmission. It explains that at the lowest level electrical signals traveling across wires are used to carry information, and shows be encoded using electrical signals.The second focuses on packet transmission. It explains why computer network use packets, and shows . LANs and WANs discussed above are two basic network.The third covers internetworking—the important idea that allows system, and TCPIP, the protocol technology used in global internet.The fourth explains networking applications. It focuses on , and programs provide services such as electronic mail and Web browsing.Continued growth of the global Internet is one of most interesting and exciting phenomena in networking. A decade ago, the Internet was a research project that involved a few dozen sites. Today, the Internet into a production communication system that reaches millions of people in almost all countries on all continents around the world. In the United States, the Internet connects most corporations, colleges and universities, as well as federal, state, and local government offices. It will soon reach most elementary,junior, and senior addition, many private residences can reach the Internet through a dialup telephone connection. Evidence of the Internet’s impact on society can be seen in advertisements, in magazines and on television, which often contain a reference to an Internet Web site that provide additional information about the advertiser’s products and services.A large organization with diverse networking requirements needs multiple physical networks. More important, if the organization chooses the type network that is best for each task, the organization will network can only communicate with other computers attached to same network. The problem became evident in the 1970s as large organizations began to acquire multiple networks. Each network in the organizations formed an island. In many early installations, each computer attached to a single network and employees employees was given access to multiple svreens and keyboards, and the employee was forced to move form one computer to another to send a massage across the appropriate network. Users are neither satisfied nor productive when they must use a separate computer. Consequently, most modern computer communication syetem allow communication between any two computers analogous to the way a telephone system provides communication between any two telephones. Known as universal service, the concept is a fundamental part of networking. With universal service, a user on any computer in any part of an organization can send messages or data to any other users. Furthermore, a user does not need to change computer systems whenchanging tasks—all information is available to all computers. As a result, users are more productive.The basic component used to commect organization to choose network technologies appropriate for each need, and to use routers to connect all networks into a single internet.The goal of internetworking is universal service across an internet, routers must agree to forward information from a source on one network to a specified destination on another. The task is complex because frame formats and addressing schemes used by underlying networks can differ. As s resulrt, protocol software is needed on computers and routers make universal service possible. Internet protocols overcome differences in frame formats and physical addresses to make communication pissible among networks that use different technologies.In general, internet software provides the appeatrance of a single, seamless communication system to which many computers attach. The syetem offers universal service :each computer is assigned an address, and any computer can send a packet to any other computer. Furthermore, internet protocol software —neither users nor application programs are a ware of the underlying physical networks or the routers that connect them.We say that an internet is a virtual network system because the communication system is an abstraction. That is, although a combination of of a uniform network syetem, no such network exists.Research on internetworking modern networking. In fact,internet techmology . Most large organizations already use internetworking as primary computer communication mechanism. Smaller organizations and individuals are beginning to do so as well. More inportant, the TCPIP technology computers in schools, commercial organications, government, military sites and individuals in almost all countries around the world.电脑网络简述网络可被定义为人、资源和思想的联接。
毕业设计外文文献
英文原文What is Talent Management?Talent Management‖ has become one of the most important buzzwords in Corporate HR and Training today. In this article we will explain the history, principles, and processes of talent management and help readers understand our research agenda in this important area.From Personnel to Strategic HR to Talent ManagementTo understand why Talent Management has become so important, we must first look at the evolution of corporate HR:Stage 1: Personnel Department:In the 1970s and 1980s the business function which was responsible for people was called ―The Personnel Department.‖The role of this group was to hire people, pay them, and make sure they had the necessary benefits. The systems which grew up to support this function were batch payroll systems. In this role, the personnel department was a well understood business function.Stage 2: Strategic HR:In the 1980s and 1990s organizations realized that the HR function was in fact more important –and the concepts of ―Strategic HR‖ emerged.During this period organizations realized that the VP of HR had a much larger role: recruiting the right people, training them, helping the business design job roles and organization structures (organization design), develop ―total compensation‖ packages which include benefits, stock options and bonuses, and serving as a central point of communication for employee health and happiness.The ―Head of Personnel‖ became the ―VP of HR‖ and had a much more important role in business strategy and execution. The systems which were built up to support this new role include recuiting and applicant tracking (ATS), portals, total compensation systems, and learning management systems. In this role, the HR department now became more than a business function: it is a business partner, reaching out to support lines of business.Stage 3: Talent Management:We are now entering a new era: the emergence of ―Talent Management.‖While strategic HR continues to be a major focus, HR and L&D organizations are now focused on a new set of strategic issues:How can we make our recruiting process more efficient and effective by using ―competency-based‖ recruiting instead of sorting through resumes, one at a time? How can we better develop managers and leaders to reinforce culture, instill values, and create a sustainable ―leadership pipeline?‖How do we quickly identify competency gaps so we can deliver training, e-learning, or development programs to fill these gaps? How can we use these gaps to hire just the right people?How do we manage people in a consistent and measurable way so that everyone is aligned, held accountable, and paid fairly?How do we identify high performers and successors to key positions throughout the organization to make sure we have a highly flexible, responsive organization?How do we provide learning that is relevant, flexible, convenient, and timely? These new, more challenging problems require new processes and systems. They require tigher integration between the different HR silos — and direct integration into line of business management processes. Today organizations are starting to buy, build, and stitch together performance management systems, succession planning systems, and competency management systems. The HR function is becoming integrated with the business in a real-time fashion.Defining the Talent Management ProcessOrganizations are made up of people: people creating value through proven business processes, innovation, customer service, sales, and many other important activities. As an organization strives to meet its business goals, it must make sure that it has a continuous and integrated process for recruiting, training, managing, supporting, and compensating these people. The following chart shows the complete process:1. Workforce Planning: Integrated with the business plan, this process establishes workforce plans, hiring plans, compensation budgets, and hiring targets for the year.2. Recruiting: Through an integrated process of recruiting, assessment, evaluation, and hiring the business brings people into the organization.3. Onboarding: The organization must train and enable employees to become productive and integrated into the company more quickly.4. Performance Management: by using the business plan, the organization establishes processes to measure and manage employees. This is a complex process in itself, which we describe in detail in our new research Performance Management 2006.5. Training and Performance Support: of course this is a critically important function. Here we provide learning and development programs to all levels of the organization. As we describe in the Death of the Corporate University, this function itself is evolving into a continuous support function.6. Succession Planning: as the organization evolves and changes, there is a continuous need to move people into new positions. Succession planning, a very important function, enables managers and individuals to identify the right candidates for a position. This function also must be aligned with the business plan to understand and meet requirements for key positions 3-5 years out. While this is often a process reserved for managers and executives, it is more commonly applied across the organization.7. Compensation and Benefits: clearly this is an integral part of people management. Here organizations try to tie the compensation plan directly to performance management so that compensation, incentives, and benefits align with business goals and business execution.8. Critical Skills Gap Analysis: this is a process we identify as an important, often overlooked function in many industries and organizations. While often done on a project basis, it can be ―business-critical.‖For example, today industries like the Federal Government, Utilities, Telecommunications, and Energy are facing large populations which are retiring. How do you identify the roles, individuals, and competencies which are leaving? What should you do to fill these gaps? We call this ―critical talent management‖ and many organizations are going through this now. In the center of this process are important definitions and data: job roles, job descriptions, competency models, and learning content.How do you Develop and Implement a Talent Management Strategy?As I describe above, Talent Management is a natural evolution of HR. It is a series of business processes —not a ―product‖ or ―solution‖ you can buy.Organizations we speak to are focused on different elements —driven by their maturity and the urgent business problems they face today. While a few mature organizations have dealt with most of the processes above, most organizations focus on several of the key elements and build an integrated approach over time. Additionally, Talent Management is a ―forward-looking‖ function.Not only should talent management improve your organization’s flexibility and performance, it should give you the information and tools to plan for growth, change, acquisitions, and critical new product and service initiatives.A few critical issues we have identified in our research:1. Talent Management requires integration and communication between existing HR-L&D functions.Training can no longer be ―left on an island.‖As we detail in our workshops, the L&D organization must align much more closely with the performance management and recruitment process. Training programs should be developed and updated to continuously address problems which surface in the performance management process. New hires which are hired because of certain competencies should see a set of training offerings which complement and reinforce these competencies. Compensation program should naturally tie to the performance management process.2. Competency management, a mis-understood and difficult part of training and HR, has become critical.The job descriptions, roles, and competencies used for performance management are shared by L&D, recruiting, and succession planning. There are many techniques for effective use of competencies – many are described in our performance management systems research. A simple best-practice is for your organization to have a small set of consistent, easy-to-understand competencies which can be applied across the organization.3. Software solutions are maturing, but not the solution.Despite vendor claims, there is no complete ―talent management‖ software solution yet. Vendors each offer different elements of this solution. To solve urgent problems, most companies today buy standalone systems: standalone learning management systems, standalone standalone performance management systems,standalone recruiting and standalone compensation systems. As the market matures and companies press harder for integration, vendors will create more integrated solutions.Our research has found, however, that software is not the solution. In fact, of the 62 processes we studied, HR software was ranked 55 or lower in business impact. You cannot ―buy‖ a software solution to implement your talent management strategy.You must focus on the top 22 process areas of greatest impact and build this strategy through a business-driven process. Our research and workshops will help you develop this strategy.What does this mean to your Organization?Talent Management is a powerful and important trend across HR and L&D. It changes the way you are organized, how you use technology, how your resources are allocated, and how you measure what you do. If you are a training manager, director, or CLO, talent management will impact your role. You may be asked to integrate your learning programs with the company’s performance management initiative. Many organizations have a new job: The VP of Talent Management. This role typically includes Learning & Development, Performance and Competency Management, and Succession Planning fucntions. We believe that this integrated ―HRD‖ function is an important evolution in the way HR organizations are run.What does this mean to your HR-IT Strategy?Talent Management will also impact your systems strategy: For example, do you want a stand-alone LMS or should your LMS be integrated with the company’s performance management systems? What systems integration are the most important? How do you use competency models to tie learning to performance management? What ―suite‖ products are mature enough for your particular organization’s needs?The role of HRIT has also become much more complex. It is no longer possible to focus on HRIS systems alone –HRIT must understand learning technology, competency management technology, portal technology, and the integration of these different applications. In many organizations LMS systems, for example, are not managed by HRIT. Over time we believe the role of HRIT will be more strategic than ever.Despite these issues, our research has shown that very few organizations have ―integrated talent management systems‖ and most of the vendors of such products are far away from delivering a totally integrated solution.For more information on our in-depth research on talent management, including best practices in each of the 8 key areas, the top 22 high-impact talent processes, and benchmarks for your HR organization, read High Impact Talent Management, our groundbreaking research on this important new business strategy.中文翻译什么事人才管理人才管理“已成为企业人力资源及培训当今最重要的流行语之一。
毕业设计论文英文文献
毕业设计论文英文文献Graduation Design Thesis: English Literature ReviewIntroduction:In the realm of graduation design, conducting a thorough literature review is an essential step. This process involves exploring existing research and studies related to the chosen topic. In this article, we will delve into the importance of conducting an English literature review for a graduation design thesis, its benefits, and some effective strategies to carry out this task.Importance of an English Literature Review:1. Building a Strong Theoretical Foundation:An English literature review provides a solid theoretical foundation for the graduation design thesis. It allows the researcher to understand the existing body of knowledge, identify research gaps, and propose a unique contribution to the field.2. Identifying Research Gaps:By reviewing English literature, one can identify areas that have not been extensively explored. This enables the researcher to fill in the gaps and contribute to the existing knowledge by conducting original research.3. Avoiding Redundancy:A comprehensive literature review helps in avoiding duplication of research. By familiarizing oneself with previous studies, one can ensure that their graduation design thesis offers new insights and does not replicate existing work.Benefits of an English Literature Review:1. Enhanced Critical Thinking:Reviewing English literature enhances critical thinking skills. It allows the researcher to analyze and evaluate the strengths and weaknesses of previous studies, enabling them to develop a more informed perspective on the topic. 2. Improved Research Methodology:By studying various research methodologies employed in previous studies, researchers can gain insights into effective research practices. This knowledge can be applied to their own graduation design thesis, resulting in a more robust research methodology.3. Broadened Knowledge Base:An English literature review exposes researchers to a wide range of perspectives and ideas. This exposure expands their knowledge base and enables them to approach their graduation design thesis from a more comprehensive standpoint. Effective Strategies for an English Literature Review:1. Define the Research Question:Before delving into the literature, it is crucial to define a clear research question. This will help in narrowing down the scope of the review and ensure that the selected literature is relevant to the graduation design thesis.2. Conduct Systematic Searches:Utilize academic databases and search engines to conduct systematic searches. Use relevant keywords and filters to refine the search results and focus on themost relevant literature.3. Organize and Summarize Findings:Create a systematic way to organize and summarize the findings from the literature review. This can be done through the use of tables, charts, or concept maps. This will help in identifying common themes and patterns within the literature.4. Critically Analyze the Literature:When reviewing the literature, critically analyze the research methodologies, findings, and limitations of each study. This will help in identifying gaps in the existing knowledge and provide a foundation for the graduation design thesis. Conclusion:An English literature review plays a crucial role in the development of a graduation design thesis. It provides a strong theoretical foundation, helps identify research gaps, and enhances critical thinking skills. By following effective strategies, researchers can conduct a comprehensive literature review and contribute to their chosen field of study.。
关于毕业设计英文文献10个近3年
关于毕业设计英文文献10个近3年Title: Recent English Literature on Graduation Design: A Review of Ten Articles Published in the Last Three YearsIntroductionIn the last few years, there has been a growing interest in researching and publishing articles on graduation design. This review aims to summarize and analyze ten recentEnglish-language articles on graduation design published in academic journals over the last three years. The articles cover various aspects of graduation design, including methodologies, case studies, and trends in the field.1. "The Impact of Digital Technologies on Graduation Design Practices" (Author, Year)This article explores how digital technologies have transformed graduation design practices. The author discusses the benefits and challenges of using digital tools in the design process and provides case studies to illustrate the impact of technology on graduation design.2. "Exploring Sustainable Design Principles in Graduation Projects" (Author, Year)This article examines the importance of integrating sustainable design principles into graduation projects. The author highlights the growing demand for environmentally friendly designs and discusses strategies for incorporating sustainability into graduation design.3. "The Role of Cultural Influences in Graduation Design" (Author, Year)This article investigates the influence of culture on graduation design. The author explores how cultural factors shape design decisions and discusses the challenges of designing for diverse cultural contexts.4. "Human-Centered Design Approaches in Graduation Projects" (Author, Year)This article discusses the principles of human-centered design and its relevance to graduation projects. The author emphasizes the importance of designing for user needs and preferences and shares best practices for implementing human-centered design in graduation projects.5. "Emerging Trends in Graduation Design: A Future Outlook" (Author, Year)This article provides an overview of the latest trends in graduation design and offers insights into future developments in the field. The author discusses the impact of technology, sustainability, and cultural influences on graduation design and predicts key trends for the coming years.6. "Collaborative Design Practices in Graduation Projects" (Author, Year)This article explores the benefits of collaborative design practices in graduation projects. The author discusses the advantages of working in interdisciplinary teams and shares strategies for effective collaboration in graduation design.7. "The Role of Research in Graduation Design: Methods and Best Practices" (Author, Year)This article examines the importance of research in graduation design and provides guidance on conducting research for graduation projects. The author discusses different research methodologies and best practices for integrating research into the design process.8. "Designing for Social Impact: Case Studies in Graduation Design" (Author, Year)This article presents case studies of graduation projects that have made a positive social impact. The author discusses how designers can address social issues through their projects and shares lessons learned from successful social impact design initiatives.9. "The Future of Graduation Design Education: Challenges and Opportunities" (Author, Year)This article discusses the challenges and opportunities facing graduation design education. The author examines the evolving role of design schools and proposes strategies for adapting to changing industry trends and technological advancements.10. "Ethical Considerations in Graduation Design: A Framework for Decision-Making" (Author, Year)This article explores ethical dilemmas in graduation design and provides a framework for ethical decision-making. The author discusses the importance of ethical awareness in design practice and offers guidance on navigating ethical issues in graduation projects.ConclusionThis review has highlighted ten recent English-language articles on graduation design published in the last three years.The articles cover a wide range of topics, including the impact of digital technologies, sustainability, cultural influences,human-centered design, collaborative practices, research methods, social impact, education, and ethics. By studying these articles, designers and researchers can gain valuable insights into current trends and future directions in graduation design.。
毕业论文英文参考文献
毕业论文英文参考文献论文的参考文献是在英语专业论文写作过程中,对某一著作或论文的整体的参考或借鉴。
征引过的文献在注释中已注明,不再出现于文后参考文献中。
下面是店铺带来的关于毕业论文英文参考文献的内容,欢迎阅读参考!毕业论文英文参考文献(一)[1]徐安律.原住民小说《圆屋》获美国国家图书奖[N].中华读书报,2012(004).[2]Coulombe,JosephL.ReadingNativeAmericanLiterature[M\. NewYork:Routledge,2011.[3]Erdrich,Louise.TheRoundHouse\M\.NewYork:HarperCollin sPublishers,2012.[J].作家,2013(12):1.[4]杨恒.弱者的失语法律的缺位--评美国国家图书奖获奖作品《圆屋》[J].博览群书,2013(6):84-88.[5]Said,Edward.CultureandImprerialism[M].NewYork:Vintage Books,1994.[6]Erdrich,Louise.LoveMedicine[M],NewYork:HarperPerennia l,1993.[7]罗世平.凝视:后殖民主义文学折射[J].国外文学,2006(4):122.[8]任一鸣.《后殖民:批评理论与文学》[M].北京:外语教学与研究出版社,2008.[9]Halliday,Lisa.LouiseErdrich[J].ParisReview,2010(52):133-137.[10]温语晴.书写印第安文化的温暖和困境一美国当代作家路易丝·厄德里克和她的作品.[11]陈榕.《凝视》[A].《西方文论关键词》[C].ed.赵一凡.北京:外语教学与研究出版社,2011.[12]Russo,Maria.Disturbing the spirits[i]. New York TimesBook Review, 2012(10): 9[13]Said, Edward. Culture and Imprerialism[M]. New York: Vintage Books,1994.[14]Fanon,Frantz. The Wretched of the Earth[M]. New York: Grove Press,1968.[15]徐安律.原住民小说《圆屋》获美国国家图书奖[N].中华读书报,2012(004).毕业论文英文参考文献(二)[1] 陈鹏.高速公路服务区及收费站建筑节能研究[D].中南大学,2007[2] 清华大学建筑节能研究中心.中国建筑节能年度发展研究报告[M]2014.北京:中国建筑工业出版社,2014:39[3] 李慧玲.绿色建筑理念下的高速公路服务区建筑设计研究[D].西安:长安大学,2011[4] 公通字[2009]46 号.民用建筑外保温系统及外墙装饰防火暂行规定[S].新乡市建筑工程质量监督站印发.2009[5] 汤旭东.建筑工程中的现浇聚苯复合材料屋面保温技术[J].江西建材,2014,(11):45[6] 杨欣霖.高速公路服务区绿色建筑技术体系研究[D].西安:长安大学,2011[7] 欧志华,郭俊明.浅谈我国建筑节能50%设计标准的含义[J].建筑节能,2007,35(12):60-62[8] 邹惠芬,王国业,郭立杰等.严寒地区窗户热工性能对建筑能耗的影响分析[J].沈阳建筑大学学报(自然科学版).2009,25(5):982-986[9] 崔洪军,刘孔杰.国外服务区建设及研究现状[J].中国交通报,2008,(12):138-139[10] 郎松军.建筑结露的起因和防治方法初探[J].四川建筑,2002,22(Z1):201-203[11] 王金奎,史慧芳,邵旭.体形系数在公共建筑节能设计中的应用[J].低温建筑技术,2010,(5):98-99[12] 王丽颖,丘雨佳.对德国被动式居住建筑节能技术的考察[J].长春工程学院学报,2013,14(3):38-40[13] 赖有志,陆京海,杨军霞,张童.现浇轻质泡沫混凝土在屋面工程中的应用[J].施工技术.2011,40(14):79-94毕业论文英文参考文献(三)[1]蒋花,史志康.整合与对话一论《金色笔记》中的戏仿[J].当代外国文学,2007(2):78.[2]黄梅.女人的危机和小说的危机--女人与小说杂谈之四[J].读书,1988(01):5.[3]孙宗白.真诚的女作家多丽丝·莱辛[J].外国文学研宄,1981(3):70.[4]施旻.《金色笔记》是女性主义文本吗·一关于多丽丝·莱辛及其《金色笔记》的论争[J].东岳论丛,2000(5): 132-134.[5]李福祥.多丽丝·莱辛笔下的政治与妇女主题[J].外国文学评论,1993(4):40-43[6]黎会华·多丽丝·莱辛《金色笔记》中的现代主义技巧分析[J].外语研究,2003(6):73.[7]陈才宇,刘新民.金色笔记[M].北京:译林出版社,2000.[8]黎会华·解构菲勒斯中心:构建新型女性主义主体一《金色笔记》的女性主义阅读[J].浙江师范大学学报,2004(3):33.[9]韩小敏,纪卫宁.析伍尔夫与莱辛文学创作的相似性[J].理论专刊,2004(8):125-126.[10]姜红.有意味的形式[J].外国文学,2003(4):96-98.[11]徐燕.《金色笔记》的超小说艺术[J].宁波大学学报,2003(3):78-80[12]蒋花,史志康.整合与对话一论《金色笔记》中的戏仿[J].当代外国文学,2007(2):78.[13]卢婧.《金色笔记》的艺术形式与作者莱辛的人生体验[D].南京师范大学博士学位论文,2008.[14]佘海若.迟来的正义:被缚的自由女性一记2007年诺贝尔文学奖[J].今日科苑,2007(23): 19-24.[15]刘颖.建构女性的主体性话语一评多丽丝·莱辛的《金色笔记》[J].邵阳学院学报,2004(4).[16]范晓红.从《金色笔记》解读多丽丝·莱辛的生态整体观[D].南京师范大学,2011.[17]Brewster, Dorothy. Doris Lessing\M\. New York: Wayne, 1965: 161.[18]Spilka, Mark. Lessing and Lawrence: the Battle of theContemporary Literature,1975(16): 218-240.。
毕业设计外文文献翻译【范本模板】
毕业设计(论文)外文资料翻译系别:专业:班级:姓名:学号:外文出处:附件: 1. 原文; 2。
译文2013年03月附件一:A Rapidly Deployable Manipulator SystemChristiaan J。
J。
Paredis, H. Benjamin Brown,Pradeep K. KhoslaAbstract:A rapidly deployable manipulator system combines the flexibility of reconfigurable modular hardware with modular programming tools,allowing the user to rapidly create a manipulator which is custom-tailored for a given task. This article describes two main aspects of such a system,namely,the Reconfigurable Modular Manipulator System (RMMS)hardware and the corresponding control software。
1 IntroductionRobot manipulators can be easily reprogrammed to perform different tasks, yet the range of tasks that can be performed by a manipulator is limited by mechanicalstructure。
Forexample,a manipulator well-suited for precise movement across the top of a table would probably no be capable of lifting heavy objects in the vertical direction. Therefore,to perform a given task,one needs to choose a manipulator with an appropriate mechanical structure.We propose the concept of a rapidly deployable manipulator system to address the above mentioned shortcomings of fixed configuration manipulators。
(完整版)_毕业设计(论文) 外文文献翻译_
毕业设计(论文)外文文献翻译题目:金融银行信用风险管理与知识管理教学院:经济与管理学院专业名称:工商管理学号:学生姓名:谭勤辉指导教师:刘显铭2013 年05 月28 日Managing Credit Risks with Knowledge ManagementforFinancial BanksPan JinDepartment of EconomicsEconomics and Management School of Wuhan UniversityWuhan,Hubei ProvinceChinaAbstract-Nowadays,financial banks are operating in a knowledge society and there are more and more credit risks breaking out in banks.So,this paper first discusses the implications of knowledge and knowledge management, and then analyzes credit risks of financial banks with knowledge management. Finally, the paper studies ways for banks to manage credit risks with knowledge management. With the application of knowledge management in financial banks, customers will acquire better service and banks will acquire more rewards.Index Terms–knowledge management; credit risk; risk management; incentive mechanism; financial banksI.INTRODUCTIONNowadays,banks are operating in a“knowledge society”.So, what is knowledge? Davenport(1996)[1]thinks knowledge is professional intellect,such as know-what, know- be shared and communicated. The awareness of the importance of knowledge results in the critical issue of “knowledge management”.So, what is knowledge management? According to Malhothra(2001)[2], knowledge management(KM)caters to the critical issues of organizational adaptation, survival and competence in face of increasingly discontinuous environmental change. Essentially it embodies organizational processes that seek synergistic combination of data and information processing capacity of information technologies and the creative and innovative capacity of beings. Through the processes of creating,sustaining, applying, sharing and renewing knowledge, we can enhance organizational performance and create value.Many dissertations some special fields. Aybübe Aurum(2004)[3] analyzes knowledge management in software engineering and D.J.Harvey &R.Holdsworth(2005)[4]study knowledge management in the aerospace industry. Li Yang(2007)[5] studies knowledge management in information-based education and Jayasundara&Chaminda Chiran(2008)[6] review the prevailing literature on knowledge management in banking industries. Liang ping and Wu Kebao(2010)[7]study the incentive mechanism of knowledge management inBanking.There are also many papers about risks analysis and risks management. Before the 1980s, the dominant mathematical theory of risks analysis was to describe a pair of random vectors.But,the simplificationassumptions and methods used by classical competing risks analysis caused controversy and criticism.Starting around the 1980s, an alternative formulation of risk analysis was developed,with the identifiability. The new formulation is univariate risk analysis.According to Crowder(2001)[8], David&Moeschberger(1978)[9]and Hougaard(2000)[10],univariate survival risk analysis dominantly, which is based on the i.i.d assumptions(independent and identically distributed) or, at least, based on the independent failure assumption.Distribution-free regression modeling allows one to investigate the influences of multiple covariates on the failure, and it relaxes the assumption of identical failure distribution and to some extent, it also relaxes the single failure risk restriction. However, the independent failures as well as single failure events are still assumed in the univariate survival analysis. Of course,these deficiencies do not invalidate univariate analysis, and indeed, in many applications, those assumptions are realistically valid.Based on the above mentioned studies, Ma and Krings(2008a, 2008b)[11]discuss the relationship and difference of univariate and multivariate analysis in calculating risks.As for the papers on managing the risks in banks, Lawrence J.White(2008)[12]studies the risks of financial innovations and takes out some countermeasures to regulate financial innovations. Shao Baiquan(2010)[13]studies the ways to manage the risks in banks.From the above papers, we can see that few scholars Ⅰis introduction. SectionⅡanalyzes credit risks in banks with knowledge management. SectionⅢstudies ways for banks to manage credit risks with knowledgemanagement. SectionⅣconcludes.II.ANALYZING CREDIT RISKS IN BANKS WITHKNOWLEDGE MANAGEMENTA.Implication of Credit RiskCredit risk is the risk of loss due to a debtor’s non-payment of a loan or other line of credit, which may be the principal or interest or both.Because there are many types of loans and counterparties-from individuals to sovereign governments-and many different types of obligations-from auto loans to derivatives transactions-credit risk may take many forms.Credit risk is common in our daily life and we can not cover it completely,for example,the American subprime lending crisis is caused by credit risk,which is that the poor lenders do not pay principal and interest back to the banks and the banks do not pay the investors who buy the securities based on the loans.From the example,we can find that there are still credit risks,though banks banks includes tacit knowledge and explicit knowledge,which is scattered in different fields.For example, the information about the customers’income, asset and credit is controlled by different departments and different staffs and the information can’t be communicated with others. So it is necessary for banks to set up a whole system to communicate and share the information and knowledge to manage the risks.C.Setting up Incentive Mechanism and Encouraging Knowledge InnovationThe warning mechanism of credit risks depends on the incentive mechanism in banks,so, banks should take out incentive mechanism to urge staffs to learn more knowledge and work creatively to manage credit risks.We can show the incentive mechanism as Fig.1:Fig.1 The model of incentive mechanism with knowledge management From Fig.1,we can see there are both stimulative and punitive measures in the incentive model of knowledge management for financial banks.With the incentive mechanism of knowledge management in financial banks,the staffs will work managing credit risks with knowledge management.We can show them in Fig.2:Fig.2 The blocks of managing credit risksA.Distinguishing Credit RiskDistinguishing credit risks is the basis of risk management.If we can’t recognize the risks,we are unable to find appropriate solutions to manage risks.For example,the United States subprime crisis in 2007 was partly caused by that the financial institutions and regulators didn’t recognize the mortgage securitization risks timely.With knowledge management,we can make out some rules to distinguish credit risks,which are establishing one personal credit rating system for customers and setting up the data warehouse.We can use the system to analyze customers’credit index, customers’credit the changes of customers’property and income to recognize potential risks.B.Assessing and Calculating Credit RiskAfter distinguishing the credit risks,we should assess the riskexposure,risk factors and potential losses and risks, and we should make out the clear links.The knowledgeable staffs in banking should use statistical methods and model and the regulators should establish credit assessment system and then set up one national credit assessment system.With the system and the model of risk assessment,the managers can evaluate the existing and emerging risk factors,such as they prepare credit ratings for internal use.Other firms,including Standard &Poor’s,Moody’s and Fitch,are in the business of developing credit rating for use by investors or other third parties.TableⅠshows the credit ratings of Standard&Poor’s.TABLE ISTANDARD&POOR’S CREDITT RATINGSCredit ratings ImplicationsAAA Best credit quality,extremely reliableAA Very good credit quality,very reliableA More susceptible to economic conditionsBBB Lowest rating in investment gradeBB Caution is necessaryB Vulnerable to changes in economicCCC Currently vulnerable to nonpaymentCC Highly vulnerable to payment defaultC Close to bankruptD Payment default has actually occurredAfter assessing credit risks,we can use Standardized Approach andInternal Rating-Based Approach to calculate the risks.And in this article,we will analyze uncovered loan.To calculate credit risk of an uncovered loan,firstly,we will acquire the bo rrower’s Probability of Default(PD),Loss Given Default(LGD),Exposure at Default(EAD)and Remaining Maturity(M).Secondly,we calculate the simple risk(SR)of the uncovered loan,using the formula as following: SR=Min{BSR(PD)*[1+b(PD)*(M-3)]*LGD50,LGD*12.5} (1)Where BSR is the basic risk weight and b(PD)is the adjusting factor for remaining maturity(M).Finally,we can calculate the weighted risk(WR)of the uncovered loan,using the following formula:WR=SR*EAD (2)From(1)and(2),we can acquire the simple and weighted credit risk of an uncovered loan,and then we can take some measures to ’t repay the loans,banks can get the compensation from the insurance company.(3)Loans Securitization. Banks can change the loans into security portfolio,according to the different interest rate and term of the loans,and then banks can sell the security portfolio to the special organizations or trust companies.D.Managing Credit Risk and Feeding backA customer may acquire the customer’s credit information,credit the data the banks get.By assessing and calculating the risks of the customer,banks can expect the future behavior of the customers and provides different service for different customers. Banks can provide morevalue-added service to the customers who remedial after the risks broke out.In order to set up the warning and feeding back mechanism,banks should score credit of the customers comprehensively and then test the effectiveness and suitability of the measures,which banks use to mitigate risks.Finally, banks should update the data of the customers timely and keep the credit risk management system operating smoothly.IV.CONCLUSIONIn this paper,we first discuss the implications of knowledge and knowledge management.Then we analyze the credit risks of financial banks with knowledge management. Finally,we put forward ways for banks to manage credit risks with knowledge management.We think banks should set up data warehouse of customers’credit to assess and calculate the credit risks,and at the same time,banks should train knowledgeable staffs to construct a whole system to reduce risks and feed back.With knowledge management,banks can take out systemic measures to manage customers’credit risks and gain sustainable profits.ACKNOWLEDGMENTIt is financed by the of China(NO.06JC790032).REFERENCES[1]Davenport,T.H.et al,“Improving knowledge work processes,”Sloan Management Review,MIT,USA,1996,Vol.38,pp.53-65.[2]Malhothra,“Knowledge management for the new world of business,”New York BRINT Institute,2001, software engineering education,”Proceedings of the IEEE International Conference onAdvanced Learning Technologies,2004,pp..[4]D.J.Harvey&R.Holdsworth,“Knowledge management in the aerospace industry,”Proceedings of the IEEE International Professional Communication Conference,2005,pp..[5]Li Yang,“Thinking about knowledge management applications in information-based education,”IEEE International Conference on Advanced Learning Technologies,2007,pp.27-33.[6]Jayasundara&Chaminda Chiran,“Knowledge managemen t in banking industries:uses and opportunities,”Journal of the University Librarians Association of Sri Lanka,2008,Vol.12,pp.68-84.[7]Liang Ping,Wu Kebao,“Knowledge management in banking,”The Conference on Engineering and Business Management,2010, pp..[8]Crowder,M.J.Classical Competing Risks,British:Chapman&Hall, 2001,pp.200.[9]David,H.A.&M.L.Moeschberger,The Theory of Competing Risks, Scotland,Macmillan Publishing,1978,pp.103.金融银行信用风险管理与知识管理摘要:目前,金融银行经营在一个知识型社会中,而且越来越多的信用风险在在银行中爆发。
英语类论文参考文献(3篇)
英语类论文参考文献(3篇)英语类论文参考文献(3篇)英语类论文参考文献(一)[1] Kemmis.S&R.Mc Taggart. The Action Research Planne[M]. Geelong, Victoria; Deakin University Press, 1982.[2] Hustler. D, T. Cassidy & J. Cuff(eds.). Action Research in Classroom and Schools [C]. Inndon: Allen & Unwin, 1986.[4] Cohen, L.& Mansion, L. ResearchMethods in Education (4th ed.)[M]. London and New Youk: Routledge, 1994.[5] Richards, J. C.& C. Lockhart. Reflective Teaching in Second Language Calssrooms [M]. Cambridge: Cambridge University Press, 1996.[6]胡青球.行动研究:教学与科研紧密结合的桥梁式研究方法[J].山东外语教学, 2002 (5): 54-56.[7]李静纯.导读[A].华莱士.语言教师行动研究[M].北京:人民教育出版社, 2000.[8]王蔷.英语教师行动研究[M].北京:外语教学与研究出版社, 2002.[9]支永碧.从行动研究到行动教育[J].大连:外语与外语教学, 2008 (9): 28-33.[1]郭建中.当代美国翻译理论[M].武汉:湖北教育出版社,2000[2]王慧.论翻译教学中思维能力的培养[J].吉林省教育学院学报,2009(10)[3]白晓莉.大学英语翻译教学现状及对策分[J].读与写(教育教学刊),2008(5)[4]刘宓庆.翻译教学:实务与理论[M].北京:中国对外翻译出版公司,2007[5]萧立明.英汉比较研究与翻译[M].上海:上海外语教育出版社,2002[6]何刚强.当代英汉互译指导与实践[M].上海:华东理工大学出版社,1997[7]程镇球.政治文章的翻译要讲政治[J].中国翻译,2003(3).[8]杨全红.简论汉英新词翻译[J].中国翻译,1999(3).Malley,J& A. Chamot. Learner Strategies in Second Language Acquisition [M]. Cambridge: Cambridge University Press 1990Neil J. Anderson,《《第二语言阅读探索:问题与策略》》外语教学与研究出版社 2004郑敏.对语言学习策略分类框架的质疑[J ].外语与外语教学,200(12):33 - 35.英语类论文参考文献(二)[1] Aitchison, J. 1987. Words in the Mind: An Introduction to the Mental Lexicon [M]. Oxford: Basil lackwell.[2] Blakemore, D. 1992. Understanding Utterances [M]. Oxford: Blackwell.[3] Blakemore, D. 2002. Relevance and Linguistic Meaning: The Semantics and Pragmatics of Discourse Markers [M]. Cambridge: CUP.[4] Ellis, R. 1994. The Study of Second Language Acquisition [M]. Oxford: OUP.[5] Emmorey, K. D. & V. A. Fromkin. 1990. The mental lexicon[A]. In J. Frederick (ed.). Language:The Cambridge Survey: Psychological and Biological Aspects [C]. Newmeyer: CUP.[6] Garnham, A. 1985. Psycholinguistics:#from 英语类论文参考文献(3篇)来自end# Central T opics [M]. Cambridge: CUP.[7] Anderson , A. et al. 1999. Cross-linguistic evidence for the early acquisition of discourse markers as register variables [J]. Journal of Pragmatics (10): 1339-1351.[8] Wesche, M. & T. M. Paribakht. 1996. Assessing vocabulary knowledge: Depth vs. breadth [J].Canadian Modern LanguageReview (10): 13-40.[9] 丁言仁.2004.第二语言习得研究与英语学习 [M].上海:上海外语教育出版社.[10]束定芳,庄智象.1996.现代外语教学理论、方法与实践[M].上海:上海外语教育出版社.[11]文秋芳. 2001.英语学习的成功之路[M].上海:上海外语教育出版社.[12]陈新仁.2002.话语联系语与英语议论文写作:调查分析[J].外语教学与研究(5):350-354.[13]崔刚.1994.布鲁卡氏失语症实例研究[J].外语教学与研究(1):272-33.[14]桂诗春.2004.我国外语教学的新思考[J].外国语(4):229.[15]何安平,徐曼菲.2003.中国大学生英语口语Small Words的研究[J].外语教学与研究(6):446-452.[16]黄远振.2001.词的形态理据与词汇习得的相关性[J].外语教学与研究(6):430–435.[17]文秋芳.2002.编写英语专业教材的重要原则[J].外语界(1):7-21.[18]文秋芳.2003.频率作用与二语习得[J].外语教学与研究(2):151-154.英语类论文参考文献(三)文献类型标识:普通图书[M], 会议录[C], 汇编[G], 报纸[N], 期刊[J]学位论文[D], 报告[R],标准[S],专利[P],数据库[DB]计算机程序[CP],电子公告[EB] 磁带[MT],磁盘[DK]光盘[CD],联机网络[OL]专著类【格式】[序号]作者.书名[M].出版地:出版社,出版年份.[1]何兆熊. 新编语用学概论[M]. 上海:上海外语教育出版社, 2000.[2]Brown, P. & Levinson, S.C. Politeness: Universals in Language Usage [M].Cambridge: Cambridge University Press, 1987.期刊类[3]刘建达.中国学生英语语用能力的测试[J]. 外语教学与研究, 2006(4): 259-265.[4]Cameron, L. Confrontations or Complementarities? Metaphor in Language Use and Cognitive Metaphor Theory [J]. Annual Review of Cognitive Linguistics, 2007(5): 107-135.报纸类[5]李大伦.经济全球化时代英语学习的重要性[N]. 光明日报,1998-12-27(3).[6]French, W. Between Silences: A Voice from China [N].Atlantic Weekly,1987-8-15(33).论文集[7]伍蠡甫.西方文论选[C]. 上海:上海译文出版社,1979:12-17.[8] Spivak,G. Can the Subaltern Speak? [A]. In C.Nelson & L. Grossberg(eds.). Victory in Limbo: Imigism [C]. Urbana: University of Illinois Press, 1988, 271-313.学位论文[9]王淼.中初水平学习者在外语学习环境下的偶遇词汇学习[D]. 上海外国语大学,2004 .研究报告[10] 冯西桥.翻译研究的多维视角[R].北京:清华大学, 1997:9-10.。
(完整版)_毕业设计外文文献翻译_69267082
毕业设计(论文)外文文献翻译专业计算机科学与技术学生姓名班级学号指导教师信息工程学院1、外文文献The History of the InternetThe Beginning - ARPAnetThe Internet started as a project by the US government. The object of the project was to create a means of communications between long distance points, in the event of a nation wide emergency or, more specifically, nuclear war. The project was called ARPAnet, and it is what the Internet started as. Funded specifically for military communication, the engineers responsible for ARPANet "Internet."By definition, an 'Internet' is four or more computers connected by a network.ARPAnet achieved its network by using a protocol called TCPIP. The basics around this protocol was that if information sent over a network failed to get through on one route, it would find another route to work with, as well as establishing a means for one computer to "talk" to another computer, regardless of whether it was a PC or a Macintosh.By the 80's ARPAnet, just years away from becoming the more well known Internet, its network. By the year 1984, it its network.In 1986 ARPAnet (supposedly) shut down, but only the organizationshutdown, and the existing networks still existed between the more than 1000 computers. It shut down due to a failied link up with NSF, who wanted to connect its 5 countywide super computers into ARPAnet.With the funding of NSF, new 1988. By that time, there were 28,174 computers on the (by then decided) Internet. In 1989 there were 80,000 computers on it. By 1989, there were.Another network was built to support the incredible number of people joining. It was constructed in 1992.Today - The InternetToday, the Internet the line' to experience the wealth of information of the Internet. Millions of people now use the Internet, and it's predicted that by the year 2003 every single person on the planet will our time and era, and is evolving so quickly its virtual Internet environments.The Internet is not a 'thing' itself. The Internet cannot just "crash." It functions the same way as the telephone system, only there is no Internet company that runs the Internet.The Internet is a collection of millioins of computers that are all connected to each other, or office network, only it thing about . How does a computer in Houston know a computer in Tokyo to view a webpage?Internet communication, communication among computers connected to the Internet, is based on a language. This language is called TCPIP. TCPIP establishes a language for a computer to access and transmit data over the Internet system.But TCPIP assumes that there is a physical connecetion between one computer and another. This is not usually the case. There would that is requireed is established by way of modems,phonelines, and other modem cable connections (like cable modems or DSL). Modems on computers read and transmit data over established lines,which could be phonelines or data lines. The actual .To explain this better, let's look at Internet Service Provider (ISP). The ISP might in turn be connected to another ISP, or a straight connection into the Internet backbone.2. The user launches a web browser like Netscape or Internet Explorer and types in an internet location to go to.3. Here's where the tricky part comes in. First, the computer sends data about it's data request to a router. A router is a very of routers in the world make what is called a "backbone," on which all the data on the Internet is transferred. The backbone presently operates at a speed of several gigabytes per-second. Such a speed compared to a normal modem is like comparing the to the ice-cube.Routers similarly to envelopes. So, when the request for the webpage goes through, it uses TCPIP protocols to tell the router what to do with the data, where it's going, and overall where the user wants to go.4. The router sends these packets to other routers, eventually leading to the target computer. It's like whisper down the lane (only the information remains intact).5. When the information reaches the target web server, the webserver then begins to send the web page back. A webserver is the computer wherethe webpage is stored that is running a program that packets, sent through routers, and arrive at the users computer where the user can view the webpage once it is assembled.The packets which contain the data also contain special information that lets routers and other computers know the right order.With millions of web pages, and millions of users, using the Internet is not always easy for a beginning user, especially for someone who is not entirely comfortale with using computers. Below you can find tips tricks and services of the Internet.Before you access webpages, you must the software they usually give to customers; you. The fact that you are viewing this page means that you be found at and MSIE can be found atThe fact that you're reading this right now means that you of instructions (like if it remark made by new web-users.Sometimes websites error on a website is not the user's fault, of course.A 404 error means that the page you tried to go to does not exist. This could be because the site is still being constructed and the page created yet, or because the site author made a typo in the page. There's nothing much to do about a 404 error except for e-mailing the site administrator (of the page you wanted to go to) an telling the Javascript code of a website. Not all websites utilize Javascript, but many do. Javascript is different from Java, and most browsers now support Javascript. If you are using an old version of a web browser (Netscape 3.0 for example), you might get Javascript errors because sites utilize Javascript versions that yourbrowser does not support. So, you can try getting a newer version of your web browser.E-mail stands for Electronic Mail, and that's what it is. E-mail enables people to send letters, and even files and pictures to each other.To use e-mail, you must e-mail client, which is just like a personal post office, since it retrieves and stores e-mail.Secondly, you must e-mail account. Most Internet Service Providers provide free e-mail account(s) for free. Some services offer free e-mail, like Hotmail, and Geocities.After configuring your e-mail client with your POP3 and SMTP server address (your e-mail provider will give you that information), you are ready to receive mail.An attachment is a file sent in a letter. If someone sends you an attachment and you don't know who it is, don't run the file, ever. It could be a virus or some other kind of nasty programs. You can't get a virus just by reading e-mail, you'll put a text graphic, your business information, anything you want.Imagine that a computer on the Internet is an island in the sea. The sea is filled with millions of islands. This is the Internet. Imagine an island communicates with other island by sending ships to other islands and receiving ships. The island the Internet a network (or the Internet). This method is similar to the islandocean symbolism above.Telnet refers to accessing ports on a server directly with a text connection. Almost every kind of Internet function, like accessing web pages,"chatting," and e-mailing is done over a Telnet connection.Telnetting requires a Telnet client. A telnet program comes with the Windows system, so Windows users can access telnet by typing in "telnet" (without the "'s) in the run dialog. Linux , chat daemon) can be accessed via telnet, although they are not usually meant to be accessed in such a manner. For instance, it is possible to connect directly to a mail server and check your mail by interfacing with the e-mail server software, but it's easier to use an e-mail client (of course).There are millions of WebPages that come from all over the world, yet database of websites. For instance, if you wanted to find a website on dogs, you'd search for "dog" or "dogs" or "dog information." Here are a few search-engines.1. Altavista (3. Excite ( possibly find. This means that a search engine can literally map out as much of the Internet as it's own time and speed allows for.An indexed collection uses Yahoo's site. You can click on Computers & the Internet. Then you can click on Hardware. Then you can click on Modems, etc., and along the way through sections, there are sites available which relate to what section you're in.Metasearch searches many search engines at the same time, finding the top choices from about 10 search engines, making searching a lot more effective.Once you are able to use search engines, you can effectively find the pages you want.With the arrival of networking and multi user systems, security on the mind of system developers and system operators. Since the dawn ofAT&T and its phone network, known by many, . Why should you be careful while making purchases via a website? Let's look at to a webpage. Looks safe, right? Not necessarily. As the user submits the information, it is being streamed through a series of computers that make up the Internet backbone. The information is in little chunks, in packages called packets. Here's the problem: While the information is being transferred through this big backbone, what is preventing a ". There are methods of enforcing security, like password protection, an most importantly, encryption.Encryption means scrambling data into a code that can only be unscrambled on the "other end." Browser's like Netscape Communicator and Internet Explorer feature encryption support for making on-line transfers. Some encryptions work better than others. The most advanced encryption system is called DES (Data Encryption Standard), and it was adopted by the US Defense Department because it was deemed so difficult to 'crack' that they considered it a security risk if it would fall into another countries to unlock an entire document. The problem is, there are 75 trillion possible keys to use, so it is a3. Excite () - Web spider & Indexed4. Lycos () - Web spider & Indexed5. Metasearch () - Multiple search网络蜘蛛是一种搜索引擎使用的程序,它随着可能找到的任何链接从一个网页到另一个网页。
_毕业设计外文文献及翻译_
_毕业设计外文文献及翻译_Graduation Thesis Foreign Literature Review and Chinese Translation1. Title: "The Impact of Artificial Intelligence on Society"Abstract:人工智能对社会的影响摘要:人工智能技术的快速发展引发了关于其对社会影响的讨论。
本文探讨了人工智能正在重塑不同行业(包括医疗保健、交通运输和教育)的各种方式。
还讨论了AI实施的潜在益处和挑战,以及伦理考量。
总体而言,本文旨在提供对人工智能对社会影响的全面概述。
2. Title: "The Future of Work: Automation and Job Displacement"Abstract:With the rise of automation technologies, there is growing concern about the potential displacement of workers in various industries. This paper examines the trends in automation and its impact on jobs, as well as the implications for workforce development and retraining programs. The ethical and social implications of automation are also discussed, along with potential strategies for mitigating job displacement effects.工作的未来:自动化和失业摘要:随着自动化技术的兴起,人们越来越担心各行业工人可能被替代的问题。
毕业设计参考英文文献
Portland CementPortland cement is made by heating a mixture of limestone and clay ,or the other materials of similar bulk composition and sufficient reactivity ,ultimately to a temperature of about 1450℃. Partial fusion occurs ,and nodules of clinker are produced .The clinker is mixed with a few percent of calcium sulfate and finely ground ,to make the cement .The calcium sulfate controls the rate of set and influences the rate of strength development .It is commonly descried as gypsum ,but this may be partly or wholly replaced by other forms of calcium sulfate .Some specifications allow the addition of other materials at the grinding stage .The clinker typically has a composition in the region of 67%CaO ,22%SiO2 ,5%Al2O3 ,3%Fe2O3 and 3% other components ,and normally contains four major phases ,called alite , belite ,aluminate and ferrite .Several other phases ,such as alkali sulfates and calcium oxideare normally present in minor amounts .Hardening results from reactions between the major phases and water .Alite is the most important constituent of all normal Portland cement clinkers ,of which it constitutes 50%~70% .It is tricalcium silicate (Ca3SiO5) modified in composition and crystal structure by ionic substitutions .It reacts relatively quickly with water ,and in normal Portland cement is the most important of the constituent phases for strength development ;at ages up to 28 days ,it is by far the most important .Belite constitutes 15%~30% of normal Portland cement clinkers .It is dicalcium silicate(Ca2SiO4) modified by ionic substitutions and normally present wholly or largely as the βpolymorph .It reacts slowly with water ,thus contributing little to the strength during the first 28 days .But substantially to the further increase in strength that occurs at later ages .By one year ,the strengths obtainable from pure alite and belite are about the same under comparable conditions .Aluminate constitutes 5%10% of most normal Portland cement clinkers .It is tricalcium aluminate (Ca3Al2O6) ,substantially modified in composition and sometimes also in structure by ionic substitutions .It reacts rapidly with water ,and cause undesirably rapid setting unless a set controlling agent , usually gypsum ,is used .Ferrite makes up 5%15% of normal Portland cement clinkers .It is tetracalcium aluminoferrite (Ca2AlFeO5) , substantially modified in composition by variation inAl/Fe ratio and ionic substitutions .The rate at which it reacts with water appears to be somewhat variable ,perhaps due to differences in composition or other characteristics ,but in general is high initially and low or very low at later ages.Types of Portland cementThe great majority of Portland cements made throughout the world are designed for general constructional use .The standard specifications with which such cements must comply are similar ,but not identical ,in all countries and various names are used to define the material ,such as Class 42.5 Portland cement in current European and British standards(42.5 is the minimum 28-days compressive strength in MPa) , TypeⅠ and Ⅱ Portland cement in the ASTM (American Society for Testing and Materials) specifications used in the USA ,or Ordinary Portland Cement(OPC) in former British standards .Throughout this book ,the term‘ordinar y’ Portland cement ,is used to distinguish such general-purpose cements from other types of Portland cement ,which are made in smaller quantities for special purposes .Standard specifications are in general ,based partly on chemical composition or physical properties such as specific surface area ,and partly on performance tests ,such as setting time or compressive strength developed under standard conditions .The content of MgO is usually limited to 4%~5% ,because quantities of this component in excess of about 2% can occur as periclase(magnesium oxide), which through slow reaction with water can cause destructive expansion of hardened concrete .Free lime(calcium oxide) can behave similarly .Excessive contents of SO3 can also cause expansion ,and upper limits ,typically 3.5% for ordinary Portland cements ,are usually imposed .Alkalis (K2O and Na2O) can undergo expansive reactions with certain aggregates ,and some specifications limit the content .Other upper limits of composition widely used in specifications relate to matter insoluble in dilute acid ,and loss ignition .Many other minor components are limited in content by their effects on the manufacturing process ,or the properties ,or both ,and in some cases the limits are defined in specifications.Rapid-hardening Portland cements have been produced in various ways ,such as varying the composition to increase the alite content ,finer grinding of the clinker ,and improvements in the manufacturing process, e.g. finer grinding or better mixing of the raw materials .The alite contents of Portland cements have increased steadily over the one and a half centuries during which the latter have been produced , and many cements that would be considered ordinary today would have been described as rapidhardening only a few decades ago .In ASTM specifications ,rapid-hardening cements are called high early strength or TypeⅢcements .For both ordinary and rapid-hardening cements ,both lower and upper limits may be imposed on strength at 28 days ,upper limits being a safeguard against poor durability resulting from the use of inadequate cement contents in concrete .Destructive expansion from reaction with sulfates can occur not only if the latter are present in excessive proportion in the cement ,but also from attack on concrete by sulfate solutions .The reaction involves the Al2O3-containing phases in the hardened cement ,and in sulfate-resisting Portland cements its effects are reduced by decreasing the proportion of the aluminate phase ,sometimes to zero .This is achieved by decreasing the ratio of Al2O3to Fe2O3in the raw materials .In the USA ,sulfate-resisting Portland cements are called Type Ⅴ cements .White Portland cements are made by increasing the ratio of Al2O3 to Fe2O3 , and thus represent the opposite extreme in composition to sulfate-resisting Portland cements .The normal ,dark colour of Portland cement is due to the ferrite ,formation of which in a white cement must thus be avoided .It is impracticable to employ raw materials that are completely free from Fe2O3 and other components ,such as Mn2O3 ,that contribute to the colour .The effects of these components and by rapid quenching .In addition to alite ,belite and aluminate ,some glass may be formed .The reaction of Portland cement with water is exothermic ,and while this can be an advantage under some conditions because it accelerates hardening ,it is a disadvantage under others ,such as in the construction of large dams or in the lining of oil wells ,when a cement slurry has to be pumped over a large distance under pressure and sometimes at a high temperature .Slower heat evolution can be achieved by coarse grinding ,and decreased total heat evolution by lowering the contents of alite and aluminate .The ASTM specification s include definitions of a Type Ⅱor ‘moderate heat of hardening’ cement ,and a more extreme TypeⅣor ‘low heat’ cement .The TypeⅡcement is also suitable for conditions exposed to moderate sulfate attack ,and is widely used in general construction work .Heating evolution can also be decreased by partially replacing the cement by flyash (pulverized fuel ash ;pfa) or other materials ,and this is today a widely used solution .The specialized requirements of oil well cements are discussed in follow section .波特兰水泥(硅酸盐水泥)波特兰水泥是由石灰石和粘土,或相似的集料组成和足够的反应的其他材料混合,最终在1450℃温度下煅烧而成。
本科毕业设计外文文献及译文1
本科毕业设计外文文献及译文文献、资料题目:Transit Route Network Design Problem:Review文献、资料来源:网络文献、资料发表(出版)日期:2007.1院(部):xxx专业:xxx班级:xxx姓名:xxx学号:xxx指导教师:xxx翻译日期:xxx外文文献:Transit Route Network Design Problem:Review Abstract:Efficient design of public transportation networks has attracted much interest in the transport literature and practice,with manymodels and approaches for formulating the associated transit route network design problem _TRNDP_having been developed.The presentpaper systematically presents and reviews research on the TRNDP based on the three distinctive parts of the TRNDP setup:designobjectives,operating environment parameters and solution approach.IntroductionPublic transportation is largely considered as a viable option for sustainable transportation in urban areas,offering advantages such as mobility enhancement,traffic congestion and air pollution reduction,and energy conservation while still preserving social equity considerations. Nevertheless,in the past decades,factors such as socioeconomic growth,the need for personalized mobility,the increase in private vehicle ownership and urban sprawl have led to a shift towards private vehicles and a decrease in public transportation’s share in daily commuting (Sinha2003;TRB2001;EMTA2004;ECMT2002;Pucher et al.2007).Efforts for encouraging public transportation use focuses on improving provided services such as line capacity,service frequency,coverage,reliability,comfort and service quality which are among the most important parameters for an efficient public transportation system(Sinha2003;Vuchic2004.) In this context,planning and designing a cost and service efficientpublic transportation network is necessary for improving its competitiveness and market share. The problem that formally describes the design of such a public transportation network is referred to as the transit route network design problem(TRNDP);it focuses on the optimization of a number of objectives representing the efficiency of public transportation networks under operational and resource constraints such as the number and length of public transportation routes, allowable service frequencies,and number of available buses(Chakroborty2003;Fan and Machemehl2006a,b).The practical importance of designing public transportation networks has attractedconsiderable interest in the research community which has developed a variety of approaches and modelsfor the TRNDP including different levels of design detail and complexity as well as interesting algorithmic innovations.In thispaper we offer a structured review of approaches for the TRNDP;researchers will obtain a basis for evaluating existing research and identifying future research paths for further improving TRNDP models.Moreover,practitioners will acquire a detailed presentation of both the process and potential tools for automating the design of public transportation networks,their characteristics,capabilities,and strengths.Design of Public Transportation NetworksNetwork design is an important part of the public transportation operational planning process_Ceder2001_.It includes the design of route layouts and the determination of associated operational characteristics such as frequencies,rolling stock types,and so on As noted by Ceder and Wilson_1986_,network design elements are part of the overall operational planning process for public transportation networks;the process includes five steps:_1_design of routes;_2_ setting frequencies;_3_developing timetables;_4_scheduling buses;and_5_scheduling drivers. Route layout design is guided by passenger flows:routes are established to provide direct or indirect connection between locations and areas that generate and attract demand for transit travel, such as residential and activity related centers_Levinson1992_.For example,passenger flows between a central business district_CBD_and suburbs dictate the design of radial routes while demand for trips between different neighborhoods may lead to the selection of a circular route connecting them.Anticipated service coverage,transfers,desirable route shapes,and available resources usually determine the structure of the route network.Route shapes areusually constrained by their length and directness_route directness implies that route shapes are as straight as possible between connected points_,the usage of given roads,and the overlapping with other transit routes.The desirable outcome is a set of routesconnecting locations within a service area,conforming to given design criteria.For each route, frequencies and bus types are the operational characteristics typically determined through design. Calculations are based on expected passenger volumes along routes that are estimated empirically or by applying transit assignmenttechniques,under frequency requirement constraints_minimum and maximum allowedfrequencies guaranteeing safety and tolerable waiting times,respectively_,desired load factors, fleet size,and availability.These steps as well as the overall design.process have been largely based upon practical guidelines,the expert judgment of transit planners,and operators experience_Baaj and Mahmassani1991_.Two handbooks by Black _1995_and Vuchic_2004_outline frameworks to be followed by planners when designing a public transportation network that include:_1_establishing the objectives for the network;_2_ defining the operational environment of the network_road structure,demand patterns,and characteristics_;_3_developing;and_4_evaluating alternative public transportation networks.Despite the extensive use of practical guidelines and experience for designing transit networks,researchers have argued that empirical rules may not be sufficient for designing an efficient transit network and improvements may lead to better quality and more efficient services. For example,Fan and Machemehl_2004_noted that researchers and practitioners have been realizing that systematic and integrated approaches are essential for designing economically and operationally efficient transit networks.A systematic design process implies clear and consistent steps and associated techniques for designing a public transportation network,which is the scope of the TRNDP.TRNDP:OverviewResearch has extensively examined the TRNDP since the late1960s.In1979,Newell discussed previous research on the optimal design of bus routes and Hasselström_1981_ analyzed relevant studies and identified the major features of the TRNDP as demand characteristics,objective functions,constraints,passengerbehavior,solution techniques,and computational time for solving the problem.An extensive review of existing work on transit network design was provided by Chua_1984_who reported five types of transit system planning:_1_manual;_2_marketanalysis;_3_systems analysis;_4_systems analysis with interactive graphics;and_5_ mathematical optimization approach.Axhausemm and Smith_1984_analyzed existing heuristic algorithms for formulating the TRNDP in Europe,tested them,anddiscussed their potential implementation in the United States.Ceder and Wilson_1986_reportedprior work on the TRNDP and distinguished studies into those that deal with idealized networks and to those that focus on actual routes,suggesting that the main features of the TRNDP include demand characteristics,objectivesand constraints,and solution methods.At the same period,Van Nes et al._1988_grouped TRNDP models into six categories:_1_ analytical models for relating parameters of the public transportation system;_2_models determining the links to be used for public transportation route construction;_3_models determining routes only;_4_models assigning frequencies to a set of routes;_5_two-stage models for constructing routes and then assigning frequencies;and_6_models for simultaneously determining routes and frequencies.Spacovic et al._1994_and Spacovic and Schonfeld_1994_proposed a matrix organization and classified each study according to design parameters examined,objectives anticipated,network geometry,and demand characteristics. Ceder and Israeli_1997_suggested broad categorizations for TRNDP models into passenger flow simulation and mathematical programming models.Russo_1998_adopted the same categorization and noted that mathematical programming models guarantee optimal transit network design but sacrifice the level of detail in passenger representation and design parameters, while simulation models address passenger behavior but use heuristic procedures obtaining a TRNDP solution.Ceder_2001_enhanced his earlier categorization by classifying TRNDP models into simulation,ideal network,and mathematical programming models.Finally,in a recent series of studies,Fan and Machemehl_2004,2006a,b_divided TRNDP approaches into practical approaches,analytical optimization models for idealized conditions,and metaheuristic procedures for practical problems.The TRNDP is an optimization problem where objectives are defined,its constraints are determined,and a methodology is selected and validated for obtaining an optimal solution.The TRNDP is described by the objectives of the public transportation network service to be achieved, the operational characteristics and environment under which the network will operate,and the methodological approach for obtaining the optimal network design.Based on this description of the TRNDP,we propose a three-layer structure for organizing TRNDP approaches_Objectives, Parameters,and Methodology_.Each layer includes one or more items that characterize each study.The“Objectives”layer incorporates the goals set when designing a public transportation system such as the minimization of the costs of the system or the maximization of the quality of services provided.The“Parameters”layer describes the operating environment and includes both the design variables expected to be derived for the transit network_route layouts,frequencies_as well as environmental and operational parameters affecting and constraining that network_for example,allowable frequencies,desired load factors,fleet availability,demand characteristics and patterns,and so on_.Finally,the“Methodology”layer covers the logical–mathematical framework and algorithmic tools necessary to formulate and solve the TRNDP.The proposed structure follows the basic concepts toward setting up a TRNDP:deciding upon the objectives, selecting the transit network items and characteristics to be designed,setting the necessary constraints for the operating environment,and formulating and solving the problem. TRNDP:ObjectivesPublic transportation serves a very important social role while attempting to do this at the lowest possible operating cost.Objectives for designing daily operations of a public transportation system should encompass both angles.The literature suggests that most studies actually focus on both the service and economic efficiency when designing such a system. Practical goals for the TRNDP can be briefly summarized as follows_Fielding1987;van Oudheudsen et al.1987;Black1995_:_1_user benefit maximization;_2_operator cost minimization;_3_total welfare maximization;_4_capacity maximization;_5_energy conservation—protection of the environment;and_6_individual parameter optimization.Mandl_1980_indicated that public transportation systems have different objectives to meet. He commented,“even a single objective problem is difficult to attack”_p.401_.Often,these objectives are controversial since cutbacks in operating costs may require reductions in the quality of services.Van Nes and Bovy_2000_pointed out that selected objectives influence the attractiveness and performance of a public transportation network.According to Ceder and Wilson_1986_,minimization of generalized cost or time or maximization of consumer surplus were the most common objectives selected when developing transit network design models. Berechman_1993_agreed that maximization of total welfare is the most suitable objective for designing a public transportation system while Van Nes and Bovy_2000_argued that the minimization of total user and system costs seem the most suit able and less complicatedobjective_compared to total welfare_,while profit maximization leads to nonattractive public transportation networks.As can be seen in Table1,most studies seek to optimize total welfare,which incorporates benefits to the user and to the er benefits may include travel,access and waiting cost minimization,minimization of transfers,and maximization of coverage,while benefits for the system are maximum utilization and quality of service,minimization of operating costs, maximization of profits,and minimization of the fleet size used.Most commonly,total welfare is represented by the minimization of user and system costs.Some studies address specific objectives from the user,theoperator,or the environmental perspective.Passenger convenience,the number of transfers, profit and capacity maximization,travel time minimization,and fuel consumption minimization are such objectives.These studies either attempt to simplify the complex objective functions needed to setup the TRNDP_Newell1979;Baaj and Mahmassani1991;Chakroborty and Dwivedi2002_,or investigate specific aspects of the problem,such as objectives_Delle Site and Fillipi2001_,and the solution methodology_Zhao and Zeng2006;Yu and Yang2006_.Total welfare is,in a sense,a compromise between objectives.Moreover,as reported by some researchers such as Baaj and Mahmassani_1991_,Bielli et al._2002_,Chackroborty and Dwivedi_2002_,and Chakroborty_2003_,transit network design is inherently a multiobjective problem.Multiobjective models for solving the TRNDP have been based on the calculation of indicators representing different objectives for the problem at hand,both from the user and operator perspectives,such as travel and waiting times_user_,and capacity and operating costs _operator_.In their multiobjective model for the TRNDP,Baaj and Majmassani_1991_relied on the planner’s judgment and experience for selecting the optimal public transportation network,based on a set of indicators.In contrast,Bielli et al._2002_and Chakroborty and Dwivedi_2002_,combined indicators into an overall,weighted sum value, which served as the criterion for determining the optimaltransit network.TRNDP:ParametersThere are multiple characteristics and design attributes to consider for a realistic representation of a public transportation network.These form the parameters for the TRNDP.Part of these parameters is the problem set of decision variables that define its layout and operational characteristics_frequencies,vehicle size,etc._.Another set of design parameters represent the operating environment_network structure,demand characters,and patterns_, operational strategies and rules,and available resources for the public transportation network. These form the constraints needed to formulate the TRNDP and are,a-priori fixed,decided upon or assumed.Decision VariablesMost common decision variables for the TRNDP are the routes and frequencies of the public transportation network_Table1_.Simplified early studies derived optimal route spacing between predetermined parallel or radial routes,along with optimal frequencies per route_Holroyd1967; Byrne and Vuchic1972;Byrne1975,1976;Kocur and Hendrickson1982;Vaughan1986_,while later models dealt with the development of optimal route layouts and frequency determination. Other studies,additionally,considered fares_Kocur and Hendrickson1982;Morlok and Viton 1984;Chang and Schonfeld1991;Chien and Spacovic2001_,zones_Tsao and Schonfeld1983; Chang and Schonfeld1993a_,stop locations_Black1979;Spacovic and Schonfeld1994; Spacovic et al.1994;Van Nes2003;Yu and Yang2006_and bus types_Delle Site and Filippi 2001_.Network StructureSome early studies focused on the design of systems in simplified radial_Byrne1975;Black 1979;Vaughan1986_,or rectangular grid road networks_Hurdle1973;Byrne and Vuchic1972; Tsao and Schonfeld1984_.However,most approaches since the1980s were either applied to realistic,irregular grid networks or the network structure was of no importance for the proposed model and therefore not specified at all.Demand PatternsDemand patterns describe the nature of the flows of passengers expected to be accommodated by the public transportation network and therefore dictate its structure.For example,transit trips from a number of origins_for example,stops in a neighborhood_to a single destination_such as a bus terminal in the CBD of a city_and vice-versa,are characterized as many-to-one_or one-tomany_transit demand patterns.These patterns are typically encountered in public transportation systems connecting CBDs with suburbs and imply a structure of radial orparallel routes ending at a single point;models for patterns of that type have been proposed by Byrne and Vuchic_1972_,Salzborn_1972_,Byrne_1975,1976_,Kocur and Hendrickson _1982_,Morlok and Viton_1984_,Chang and Schonfeld_1991,1993a_,Spacovic and Schonfeld_1994_,Spacovic et al._1994_,Van Nes_2003_,and Chien et al._2003_.On the other hand,many-to-many demand patterns correspond to flows between multiple origins and destinations within an urban area,suggesting that the public transportation network is expected to connect various points in an area.Demand CharacteristicsDemand can be characterized either as“fixed”_or“inelastic”_or“elastic”;the later meaning that demand is affected by the performance and services provided by the public transportation network.Lee and Vuchic_2005_distinguished between two types of elastic demand:_1_demand per mode affected by transportation services,with total demand for travel kept constant;and_2_total demand for travel varying as a result of the performance of the transportation system and its modes.Fan and Machemehl_2006b_noted that the complexity of the TRNDP has led researchers intoassuming fixed demand,despite its inherent elastic nature.However,since the early1980s, studies included aspects of elastic demand in modeling the TRNDP_Hasselstrom1981;Kocur and Hendrickson1982_.Van Nes et al._1988_applied a simultaneous distribution-modal split model based on transit deterrence for estimatingdemand for public transportation.In a series of studies,Chang and Schonfeld_1991,1993a,b_ and Spacovic et al._1994_estimated demand as a direct function of travel times and fares with respect to their elasticities,while Chien and Spacovic2001_,followed the same approach assuming that demand is additionally affected by headways,route spacing and fares.Finally, studies by Leblanc_1988_,Imam_1998_,Cipriani et al._2005_,Lee and Vuchic_2005_;and Fan and Machemehl_2006a_based demand estimation on mode choice models for estimating transit demand as a function of total demand for travel.中文译文:公交路线网络设计问题:回顾摘要:公共交通网络的有效设计让交通理论与实践成为众人关注的焦点,随之发展出了很多规划相关公交路线网络设计问题(TRNDP)的模型与方法。
(完整版)_毕业设计外文参考文献
(完整版)_毕业设计外文参考文献[1] 王起江,洪杰.超超临界电站锅炉用新型管材的研制[J].宝钢技术,2008(5):44-53.[2] 王起江,邹凤鸣.T91高压锅炉管的研制与应用[J].发电设备,2005(1):43-47.[3] Fujio Abe.Bainitic and martensitic creep-resistant steels[J].SolidState and Materials Science,2004,8:.[4] 马明编译.美国新的超临界机组考虑使用TP92的原因[J].电力建设,2006,27(11):79-80.[5] 戴平.国产P91钢管道存在的问题及其解决[J].广东电力,2008,21(8):67-69.[6] 田党.关于难变形钢和合金管坯的二辊斜轧穿孔问题[J].钢铁,1998,33(1):33-36.[7] P J Ennis,A Czyrska-Filemonowicz.Recent advances increep-resistant steels for power plant applications [J].Sādhanā,2003,28:709–730.[8] 刘立民,朱洪,刘志国.法国T91、P91钢管性能评定[J].电站系统工程,2002,18(1):63-64.[9] 彭孙鸿.T91钢管在我国的应用前景[J].宝钢技术,1997,6:48-50.[10] H.C. Furtado,L.H. de Almeida,I. Le May.Precipitation in 9Cr–1Mosteel after creep deformation[J].Materials Characterization,2007,58:72–77.[11] 蒯春光,彭志方.TP91钢在℃区间各相元素的分配特征及相稳定性[J].金属学报,2008,44(8):.[12] 孙智,董小文,张绪平,等.奥氏体化温度对9Cr-1Mo-V-Nb钢组织与性能的影响[J].金属热处理,2001,26(8):12-14.[13] 刘靖,周立新,傅晨光,等.电站锅炉用T91钢热穿孔性能的研究[J].钢管,2002,31(5):9-11.[14] 彭孙鸿,尤夙志,姜明娟,等.热穿孔温度对T91持久强度的影响[J].特殊钢,2001,22(2):10-12.[15] 崔光珠,朱伏先,高德福,等.T91钢高温变形特性研究[J].塑性工程学报,1999,6(2):13-16.[16] 余勇,周晓岚,赵志毅,等.T91变形抗力模型建立及理论轧制压力计算[J].宝钢技术,2006(3):31-34.[17] P olcik P,Sailer T,Blum W,et al.On the microstructuraldevelopment of the tempered martensitic Cr-steel P91 during long-term creep[J].Materials Science and Engineering,1999,260:.[18] O rlová A,Bur?ík J,Kucharová K,et al.Microstructural developmentduring and properties of seamless modified 9Cr-1Mo steel boiler tubes[R].Kaw asaki Steel Technical Report,1991,25(4):78-87.[19] B endick W,Vaillant JC,Vandenberghe B,et al.Properties andworkability of new creep strength enhanced steels as known grades 23, 24, 911 and 92[J].International Journal of Pressure Vessels and Piping,2004,476:25-29.[20] 刘江南,王正品,束国刚,等.P91钢的形变强化行为[J].金属热处理,2009,34(1):28-32.[21] T?kei Z S,Viefhaus H,Grabke H J.Initial stages of oxidation of a9CrMoV-steel: role of segregation and martensite laths[J].Applied Surface Science,2000,165:23-33.[22] R ajendran P S,Sankar P,Khatak H S.Cyclic oxidation of P91 at1073, 1123 and 1173K[J].High Temperature Materials and Processes,2004,23(3):.[23] A hmed Shibli,Fred Starr.Some aspects of plant and researchexperience in the use of new ,et al.TP23, 24, 911 and 92: New grades for advanced coal-fired power plants—Properties and experience [J].International Journal of Pressure Vessels and Piping,2008,85:38-46.[24] B rett SJ.The creep strength of weak thick section modified 9Crforgings[C].Proceedings of Baltica,2001,1:39-45.[25] U.Gampe,P.Seliger.Creep crack growth testing of P91 and P22bends[J].International Journal of Pressure Vessels and Piping,2001,78:.[26] L.Kunz,P.Luká?.High temperature fatigure and cyclic creep of P91steel[J].European Structural Integrity Society,2002,29:37-44.[27] B.Fournier,M.Sauzay,C.Ca?s,et al.Creep-fatigue-oxidationinteractions in a 9Cr-1Mo martensitic steel[J].International Journal of Pressure Vessels and Piping,2008,85:.[28] 刘洪杰.电站锅炉用P91钢蠕变疲劳交互作用的试验研究[J].动力工程,2007,27(6):.[29] L IU Jiang-nan,JIE Wang-qi.Application of improved vacuumdegassing technique to refinement of the phase stability of precipitates in low Cr of the properties of the 9% Cr steel of the type 9Cr-0.5Mo-1.8W-V-Nb with respect to its application as a pipework and boiler steel operation at elevated temperatures[D].Germany,1995.[30] H?ttestrand M,Andrén H O.Evaluation of particle size distributionin a 9% Cr steel using EFTEM[J].Micron,2001,32:.[31] S klenicka V,Kucharova K,Svoboda M,et al.Long-term creepbehavior of 9-12%Cr power plant steels [J].Mater. Character,2003,51:35-48.[32] S trang A,Foldyna V,Lenert J,et al.Prediction of the long-term creeprupture properties of 9-12Cr power plant steels [C].Proceedings of the 6th International Charles Parsons Turbine Conference,Dublin,2003,.[33] K imura K,Kushima H,Sawaka K.Long-term creep strengthprediction of degradation mechanisms[C].Proceedings ofthe 6th International Charles Parsons Turbine Conference,Dublin,2003,.[34] 高巍,刘江南,王正品,等.P92钢塑性变形行为[J].西安工业大学学报,2008,28(4):.[35] 田党,张根良,卜玉钦.二辊斜轧穿孔时高合金钢的变形分布和分层缺陷形成机制[J].钢铁,1995,30(1):40-45.[36] 刘新生,赵定国,崔成业.冷轧薄板中分层现象的研究[J].钢铁,2008,43(5):40-43.[37] 崔风平,赵乾,唐愈.铸坯内部缺陷对钢板分层形成的影响[J].中国冶金,2008,18(2):14-18.[38] 唐生斌.板材分层缺陷产生原因分析[J].连铸,2003,4:32-34.[39] 洪小玲,肖荣仁,李端来.GH3030合金锻坯裂纹分析[J].钢铁研究,2002,128(5):11-12.[40] S.A.Sharadzenidze,E.A.Svetlitskii.High Quality Seamless Tubes[J].Metallurg,1968,11:38-39.[41] 王建文.27SiMn钢管表面龟裂原因分析[J].湖南冶金,2000,5:25-26.[42] 任建国,祁晓英,马学军,等.低合金钢热轧缺陷分析[J].沈阳工业学院学报,1996,15(3):35-37.[43] 卢居桂,安自亮,刘钰.夹杂物引起的石油套管缺陷分析[J].天津冶金,2002,106(1):27-29.[44] 田党.关于锥形辊穿孔机轧辊转速对毛管分层缺陷影响的讨论[J].钢管,2006,35(4):12-16.[45] 王永吉,陈大国,王世英,等.二辊斜轧穿孔轧辊转速对高合金钢毛管质量的影响[J].钢铁,1985,20(2):25-30.[46] 严智.高温合金穿孔工艺的研究[J].特钢技术,1994,2:27-31.[47] 田党.高温合金无缝管材的研制与生产[J].钢管,2002,31(3):1-6.[48] 田党.关于毛管分层缺陷的试验研究[J].轧钢,1997,6:7-10.[49] 田党.高温合金管坯在二辊斜轧穿孔机上的穿孔实践[J].天津冶金,1996,4:25-28.[50] 田党.毛管分层缺陷形成过程的观察和分析[J].天津冶金,1996,1:24-26.[51] 田党.高温合金毛管分层缺陷形成的过程[J].钢管,1992,1:19-22.[52] 卢于逑,王先进.二辊斜轧穿孔中心金属断裂机理和穿孔变形工艺实质[J].钢铁,1980,6:7-15.[53] 卢于逑,王先进.二辊斜轧穿孔圆坯断面的变形分布[J].金属学报,1980,4:.[54] 田党,张根良,卜玉钦.二辊斜轧穿孔时高温合金钢圆坯的变形分布及分层形成机制[J].钢铁,1995,30(1):40-46.[55] 田党,李群.关于锥形辊穿孔机的穿孔原理及应用问题的讨论[J].钢管,2003,32(6):1-4.[56] 赵咏秋,吴秀丽,陈菊芳.0Cr18Ni9Ti热轧荒管分层内裂原因分析[J].物理测试,1999,2:33-35.[57] 张存信,冯晓庭,项炳和,等.不锈钢无缝管加工过程中断裂原因简析[J].钢管,2008,37(3):38-42.[58] 袁桂林,苏殿荣.GCr15钢管环状层裂在二辊斜轧穿孔过程中的发生和发展[J].钢管,1983,3:15-18.[59] 张世文,刘仓理,李庆忠,等.初始应力状态对材料层裂破坏特性影响研究[J].力学学报,2008,40(4):.[60] 侯凤桐.日本住友金属公司新开发的菌式穿孔机[J].钢管技术,1985,2:57-59.[61] C hihiro HAYASHI,T omio YAMAKAWA.Influences of Feed andCross Angle on Inside Bore and Lamination Defects in Rotary Piercing for Materials with Poor Hot Workability [J].ISIJ International,1997,37(2):.[62] 嵇国金,彭颖红,阮雪榆.有关金属体积成形中的韧性断裂准则[J].金属成形工艺,1998,16(4):36-37.[63] 郭达人编译.金属材料的断裂及其断口分析[J].国外金属热处理,1996,17(4):25-31.[64] 黄建科,董湘怀.金属成形中韧性断裂准则的细观损伤力学研究进展[J].上海交通大学学报,2006,40(10):.[65] O yane M,Sota T,Okintoto K,et al.Criteria for ductile fractures andtheir applications[J].J Mech Work Tech,1980,4:65-81.[66] 郑长卿,张克实,周利.金属韧性破坏的细观力学及其应用研究[M].北京:国防工业出版社,1995,28-32.[67] V enugopal Rao A,Ramakrishnan N,Krishna Kumar R.Acomparative evaluation of the theoretical failure criteria for workability in cold forging[J].Journal of Materials Processing Technology,2003,142(1):29-42.[68] K omori Kazutake.Effect of ductile fracture criteria on chevron crackformation and evolution in drawing[J].International Journal of Mechanical Sciences,2003,45(1):.[69] O zturk Fahrettin,Lee Daeyong.Analysis of forming limits usingductile fracture criteria[J].Journal of Materials Processing Technology,2004,147(3):.[70] J eong Kim,Sung-Jong Kang,Beom-Soo Kang.A prediction ofbursting failure in tube ductile fracture criterion[J].Int J Adv Manuf Technol,2003,22:.[71] 虞松,陈军,阮雪榆.韧性断裂准则的试验与理论研究[J].中国机械工程,2006,17(19):.[72] 胡庆安,程侠,邰卫华.金属材料断裂预测损伤破坏准则的应用[J].长安大学学报,2007,27(4):.[73] 俞树荣,严志刚,曹睿,等.有限元软件模拟裂纹扩展的方法探讨[J].甘肃科学学报,2003,15(4):15-21.[74] 陈乃超,田冠玉,郑博.12Cr1MoV短期高温冲击断裂韧性及其参数的研究[J].上海电力学院学报,2008,24(2):.[75] K en-ichiro Mori,Hidenori Yoshimura,Kozo Osakada.Simplifiedthree- dimensional simulation of rotary piercing of seamless pipe by rigid-plastic finite-element method[J].Journal of Materials Processing Technology,1998,80-81:.[76] Y van Chastel,Aliou Diop,Silvio Fanini,et al.Finite ElementModeling of Tube Piercing and Creation of a Crack[J].Int J Mater Form,2008,Suppl 1:.[77] H young Wook Lee,Geun An Lee,Eung Kim,et al.Prediction of plugtip position in rotary tube piercing mill using simulation and experiment[J].International Journal of Modern Physics B,2008,22(31-32):.[78] S Fanini,A Ghiotti,S Bruschi.Evaluation of Fracture Initiation inthe Mannesmann Piercing Process[C].The 10th ESAFORM Conference on Material Forming,2007,.[79] S aurabh Dwivedi,Samuel H,Huang Jun Shi,et al.Yield predictionfor seamless tubing processes: a computational intelligence approach[J].Int Adv Manuf Technol,2008,37:.[80] E lisabetta Ceretti,Claudio Glaudio,Aldo Attanasio.3D Simulationand Validation of Tube Piercing Process[C].NUMIFORM 07Materials and Design: Modling, Simulation and Applications,2007,.[81] K azutake Komori.Simulation of Mannesmann piercing process bythe three-dimensional rigid-plastic finite-element method[J].International Journal of Mechanical Sciences,2005,47:.[82] H ayashi C,Yamakawa T.Influence of feed and cross angle on rotaryforging effects and redundant shear deformation in rotary piercing process[J].ISIJ International,1997,37:.[83] 曾幼宗.斜轧穿孔工艺的有限元分析[J].钢管,2004,33(3):51-53.[84] 双远华,赖明道,张中元.斜轧穿孔过程金属流动的有限元模拟[J].机械工程学报,2004,40(3):.[85] 双远华,赖明道,张中元.钢管斜轧过程应力应变与温度耦合模拟分析[J].锻压技术,2003(6):36-40.[86] 李胜衹,陈大宏,孙中建,等.二辊斜轧穿孔时圆管坯的变形与应力分布及其发展[J].钢铁研究学报,2000,12(5):26-30.[87] A Ghiotti,S Fanini,S Bruschi,et al.Modeling of the Mannesmanneffect[J].CIRP Annals-Manufacturing Technology,2009,58:.[88] E.I. Panov.Shear Stresses and Their Dependence on Different ProcessParameters in The Helical Rolling of Solid Semifinished Products[J].Metallurgist,2005,49(7-8):.[89] E.I. Panov.Certain Aspects of The Stress-Strain State of SemifinishedProducts in Helical Rolling[J].Metallurgist,2003,47(11-12):.[90] E.I. Panov.Effect of thrust and tension on the radial stresses in ofthe tube forming process in Diescher’s mill [J].Journal of Materials Processing Technology,2006,177:.[91] 双远华,陈惠琴,赖明道.斜轧管材生产中内部组织有限元模拟和预测[J].中国有色金属学报,2001,11(2):.[92] 双远华,张中元,赖明道.热轧穿孔内部组织控轧的工业性试验研究[J].钢铁,2002,37(6):42-47.[93] J C Prince,R Maro?o,F León.Thermomechanical analysis of apiercing mandrel for the production of seamless steel tubes[J].J.Process Mechanical Engineering,2003,217:.[94] W.A.Khudheyer,D.C.Barton,T.Z.Blazynski.A comparison betweenmacroshear redundancy and loading effects in 2- and 3-roll rotary tube cone piercers[J].Journal of Materials Processing Technology,1997,65:.[95] A.N.Nikulin,V.V. Streletskii.Deformation of continuous cast metalduring rotary rolling[J].Metallurgist,2005,49(3-4):97-101.[96] K azutake Komori,Kouta Mizuno.Study on plastic deformation incone-type rotary piercing process using model piercing mill for modeling clay[J].Journal of Materials Processing Technology,2009,209:.[97] 李连诗.钢管塑性变形原理(上册)[M],北京:冶金工业出版社,1985:.[98] 卢于逑.斜轧穿孔过程中应力和变形的分布和中心金属断裂机构的某些特点分析[D].北京:北京钢铁学院,1963.[99] 卢于逑,王先进.二辊斜轧穿孔时圆坯断面的变形分布和发展[J].金属学报,1980,16(4):.[100] 严泽生.现代热轧无缝钢管生产[M].北京:冶金工业出版社,2009:.[101] Takuda H,Mori K,Hatta N.The application of some criteria for ductile fracture to the prediction of the forming limit of sheet metals[J].J Mater Process Technol,1999,95:.[102] Takuda H,Mori K,Fujimoto H,et al.Prediction of the forming limit in bore-expanding of sheet metals using ductile fracture criteria[J].J Mater Process Technol,1999,92-93:.[103] Mori K,Takuda H.Prediction of forming limit in deep drawing of finite element simulation and criterion for ductile fracture[J].Transaction of NAMRISME XXIV,1996,.[104] Takuda H,Mori K,Takakura N,et al.Finite element analysis of limit strains in biaxial stretching of sheet metals allowing for ductile fracture[J].Int J Mech Sci,2000,42:.。
英语论文参考文献(全英文版)
英语论文参考文献(全英文版)英语论文参考文献(全英文版)关键词:英文版,参考文献,英语论文英语论文参考文献(全英文版)简介:参考文献是英文类学术论文、研究报告中不可缺少的一部分,不可随意“从略”,更不可马虎了事或错误百出,很多作者在引用英文参考文献时,会出现引用不当、格式错误等问题,为大家分享正确的英语论文参考文献格式及范例。
一、英文论文参考文献格式要求英文参考文献与中文参考文献的格式英语论文参考文献(全英文版)内容:参考文献是英文类学术论文、研究报告中不可缺少的一部分,不可随意“从略”,更不可马虎了事或错误百出,很多作者在引用英文参考文献时,会出现引用不当、格式错误等问题,为大家分享正确的英语论文参考文献格式及范例。
一、英文论文参考文献格式要求英文参考文献与中文参考文献的格式要求基本相同,但写英文参考文献要注意一点,外文作者姓名的着录格式采用姓在前(全拼,首字母大写),名在后(缩写为首字母),中间用空格;着作类文献题名的实词首字母大写,期刊文献题名的首词首字母大写,期刊名称请用全称,勿用缩写。
具体如下:1、单一作者着作的书籍姓,名字首字母.(年). 书名(斜体). 出版社所在城市:出版社.如:Sheril, R. D.(1956). The terrifying future: Contemplating color television. San Diego:Halstead.2、两位作者以上合着的书籍姓,名字首字母., 姓,名字首字母.(年). 书名(斜体). 出版社所在城市:出版社.如:Smith, J., Peter, Q. (1992).Hairball: An intensive peek behind the surface of an enigma. Hamilton, ON:McMaster University Press.3、文集中的如:Mcdonalds, A.(1993). Practical methods for the apprehension and sustained containment ofsupernatural entities. In G. L. Yeager (Ed.), Paranormal and occult studies:Case studies in application (pp. 42–64). London: OtherWorld Books.4、期刊中的(非连续页码)如:Crackton, P.(1987). The Loonie: God's long-awaited gift to colourful pocket change?Canadian Change, 64(7), 34–37.5、期刊中的(连续页码):姓,名字首字母.(年). 题目. 期刊名(斜体). 第几期,页码.如:Rottweiler, F. T., Beauchemin, J. L. (1987). Detroit and Narnia: Two foes on the brink ofdestruction. Canadian/American Studies Journal, 54, 66–146.6、月刊杂志中的如:Henry, W. A., III.(1990, April 9). Making the grade in today's schools. Time, 135, 28-31.二、英文论文参考文献范例。
毕业设计(论文)外文文献原文及译文
毕业设计(论文)外文文献原文及译文Chapter 11. Cipher Techniques11.1 ProblemsThe use of a cipher without consideration of the environment in which it is to be used may not provide the security that the user expects. Three examples will make this point clear.11.1.1 Precomputing the Possible MessagesSimmons discusses the use of a "forward search" to decipher messages enciphered for confidentiality using a public key cryptosystem [923]. His approach is to focus on the entropy (uncertainty) in the message. To use an example from Section 10.1(page 246), Cathy knows that Alice will send one of two messages—BUY or SELL—to Bob. The uncertainty is which one Alice will send. So Cathy enciphers both messages with Bob's public key. When Alice sends the message, Bob intercepts it and compares the ciphertext with the two he computed. From this, he knows which message Alice sent.Simmons' point is that if the plaintext corresponding to intercepted ciphertext is drawn from a (relatively) small set of possible plaintexts, the cryptanalyst can encipher the set of possible plaintexts and simply search that set for the intercepted ciphertext. Simmons demonstrates that the size of the set of possible plaintexts may not be obvious. As an example, he uses digitized sound. The initial calculations suggest that the number of possible plaintexts for each block is 232. Using forward search on such a set is clearly impractical, but after some analysis of the redundancy in human speech, Simmons reduces the number of potential plaintexts to about 100,000. This number is small enough so that forward searches become a threat.This attack is similar to attacks to derive the cryptographic key of symmetric ciphers based on chosen plaintext (see, for example, Hellman's time-memory tradeoff attack [465]). However, Simmons' attack is for public key cryptosystems and does not reveal the private key. It only reveals the plaintext message.11.1.2 Misordered BlocksDenning [269] points out that in certain cases, parts of a ciphertext message can be deleted, replayed, or reordered.11.1.3 Statistical RegularitiesThe independence of parts of ciphertext can give information relating to the structure of the enciphered message, even if the message itself is unintelligible. The regularity arises because each part is enciphered separately, so the same plaintext always produces the same ciphertext. This type of encipherment is called code book mode, because each part is effectively looked up in a list of plaintext-ciphertext pairs.11.1.4 SummaryDespite the use of sophisticated cryptosystems and random keys, cipher systems may provide inadequate security if not used carefully. The protocols directing how these cipher systems are used, and the ancillary information that the protocols add to messages and sessions, overcome these problems. This emphasizes that ciphers and codes are not enough. The methods, or protocols, for their use also affect the security of systems.11.2 Stream and Block CiphersSome ciphers divide a message into a sequence of parts, or blocks, and encipher each block with the same key.Definition 11–1. Let E be an encipherment algorithm, and let Ek(b) bethe encipherment of message b with key k. Let a message m = b1b2…, whereeach biis of a fixed length. Then a block cipher is a cipher for whichE k (m) = Ek(b1)Ek(b2) ….Other ciphers use a nonrepeating stream of key elements to encipher characters of a message.Definition 11–2. Let E be an encipherment algorithm, and let Ek(b) bethe encipherment of message b with key k. Let a message m = b1b2…, whereeach bi is of a fixed length, and let k = k1k2…. Then a stream cipheris a cipher for which Ek (m) = Ek1(b1)Ek2(b2) ….If the key stream k of a stream cipher repeats itself, it is a periodic cipher.11.2.1 Stream CiphersThe one-time pad is a cipher that can be proven secure (see Section 9.2.2.2, "One-Time Pad"). Bit-oriented ciphers implement the one-time pad by exclusive-oring each bit of the key with one bit of the message. For example, if the message is 00101 and the key is 10010, the ciphertext is01||00||10||01||10 or 10111. But how can one generate a random, infinitely long key?11.2.1.1 Synchronous Stream CiphersTo simulate a random, infinitely long key, synchronous stream ciphers generate bits from a source other than the message itself. The simplest such cipher extracts bits from a register to use as the key. The contents of the register change on the basis of the current contents of the register.Definition 11–3. An n-stage linear feedback shift register (LFSR)consists of an n-bit register r = r0…rn–1and an n-bit tap sequence t =t 0…tn–1. To obtain a key bit, ris used, the register is shifted one bitto the right, and the new bit r0t0⊕…⊕r n–1t n–1 is inserted.The LFSR method is an attempt to simulate a one-time pad by generating a long key sequence from a little information. As with any such attempt, if the key is shorter than the message, breaking part of the ciphertext gives the cryptanalyst information about other parts of the ciphertext. For an LFSR, a known plaintext attack can reveal parts of the key sequence. If the known plaintext is of length 2n, the tap sequence for an n-stage LFSR can be determined completely.Nonlinear feedback shift registers do not use tap sequences; instead, the new bit is any function of the current register bits.Definition 11–4. An n-stage nonlinear feedback shift register (NLFSR)consists of an n-bit register r = r0…rn–1. Whenever a key bit is required,ris used, the register is shifted one bit to the right, and the new bitis set to f(r0…rn–1), where f is any function of n inputs.NLFSRs are not common because there is no body of theory about how to build NLFSRs with long periods. By contrast, it is known how to design n-stage LFSRs with a period of 2n– 1, and that period is maximal.A second technique for eliminating linearity is called output feedback mode. Let E be an encipherment function. Define k as a cryptographic key,(r) and define r as a register. To obtain a bit for the key, compute Ekand put that value into the register. The rightmost bit of the result is exclusive-or'ed with one bit of the message. The process is repeated until the message is enciphered. The key k and the initial value in r are the keys for this method. This method differs from the NLFSR in that the register is never shifted. It is repeatedly enciphered.A variant of output feedback mode is called the counter method. Instead of using a register r, simply use a counter that is incremented for every encipherment. The initial value of the counter replaces r as part of the key. This method enables one to generate the ith bit of the key without generating the bits 0…i – 1. If the initial counter value is i, set. In output feedback mode, one must generate all the register to i + ithe preceding key bits.11.2.1.2 Self-Synchronous Stream CiphersSelf-synchronous ciphers obtain the key from the message itself. The simplest self-synchronous cipher is called an autokey cipher and uses the message itself for the key.The problem with this cipher is the selection of the key. Unlike a one-time pad, any statistical regularities in the plaintext show up in the key. For example, the last two letters of the ciphertext associated with the plaintext word THE are always AL, because H is enciphered with the key letter T and E is enciphered with the key letter H. Furthermore, if theanalyst can guess any letter of the plaintext, she can determine all successive plaintext letters.An alternative is to use the ciphertext as the key stream. A good cipher will produce pseudorandom ciphertext, which approximates a randomone-time pad better than a message with nonrandom characteristics (such as a meaningful English sentence).This type of autokey cipher is weak, because plaintext can be deduced from the ciphertext. For example, consider the first two characters of the ciphertext, QX. The X is the ciphertext resulting from enciphering some letter with the key Q. Deciphering, the unknown letter is H. Continuing in this fashion, the analyst can reconstruct all of the plaintext except for the first letter.A variant of the autokey method, cipher feedback mode, uses a shift register. Let E be an encipherment function. Define k as a cryptographic(r). The key and r as a register. To obtain a bit for the key, compute Ek rightmost bit of the result is exclusive-or'ed with one bit of the message, and the other bits of the result are discarded. The resulting ciphertext is fed back into the leftmost bit of the register, which is right shifted one bit. (See Figure 11-1.)Figure 11-1. Diagram of cipher feedback mode. The register r is enciphered with key k and algorithm E. The rightmost bit of the result is exclusive-or'ed with one bit of the plaintext m i to produce the ciphertext bit c i. The register r is right shifted one bit, and c i is fed back into the leftmost bit of r.Cipher feedback mode has a self-healing property. If a bit is corrupted in transmission of the ciphertext, the next n bits will be deciphered incorrectly. But after n uncorrupted bits have been received, the shift register will be reinitialized to the value used for encipherment and the ciphertext will decipher properly from that point on.As in the counter method, one can decipher parts of messages enciphered in cipher feedback mode without deciphering the entire message. Let the shift register contain n bits. The analyst obtains the previous n bits of ciphertext. This is the value in the shift register before the bit under consideration was enciphered. The decipherment can then continue from that bit on.11.2.2 Block CiphersBlock ciphers encipher and decipher multiple bits at once, rather than one bit at a time. For this reason, software implementations of block ciphers run faster than software implementations of stream ciphers. Errors in transmitting one block generally do not affect other blocks, but as each block is enciphered independently, using the same key, identical plaintext blocks produce identical ciphertext blocks. This allows the analyst to search for data by determining what the encipherment of a specific plaintext block is. For example, if the word INCOME is enciphered as one block, all occurrences of the word produce the same ciphertext.To prevent this type of attack, some information related to the block's position is inserted into the plaintext block before it is enciphered. The information can be bits from the preceding ciphertext block [343] or a sequence number [561]. The disadvantage is that the effective block size is reduced, because fewer message bits are present in a block.Cipher block chaining does not require the extra information to occupy bit spaces, so every bit in the block is part of the message. Before a plaintext block is enciphered, that block is exclusive-or'ed with the preceding ciphertext block. In addition to the key, this technique requires an initialization vector with which to exclusive-or the initial plaintext block. Taking Ekto be the encipherment algorithm with key k, and I to be the initialization vector, the cipher block chaining technique isc 0 = Ek(m⊕I)c i = Ek(mi⊕ci–1) for i > 011.2.2.1 Multiple EncryptionOther approaches involve multiple encryption. Using two keys k and k' toencipher a message as c = Ek' (Ek(m)) looks attractive because it has aneffective key length of 2n, whereas the keys to E are of length n. However, Merkle and Hellman [700] have shown that this encryption technique can be broken using 2n+1encryptions, rather than the expected 22n(see Exercise 3).Using three encipherments improves the strength of the cipher. There are several ways to do this. Tuchman [1006] suggested using two keys k and k':c = Ek (Dk'(Ek(m)))This mode, called Encrypt-Decrypt-Encrypt (EDE) mode, collapses to a single encipherment when k = k'. The DES in EDE mode is widely used in the financial community and is a standard (ANSI X9.17 and ISO 8732). It is not vulnerable to the attack outlined earlier. However, it is vulnerable to a chosen plaintext and a known plaintext attack. If b is the block size in bits, and n is the key length, the chosen plaintext attacktakes O(2n) time, O(2n) space, and requires 2n chosen plaintexts. The known plaintext attack requires p known plaintexts, and takes O(2n+b/p) time and O(p) memory.A second version of triple encipherment is the triple encryption mode [700]. In this mode, three keys are used in a chain of encipherments.c = Ek (Ek'(Ek''(m)))The best attack against this scheme is similar to the attack on double encipherment, but requires O(22n) time and O(2n) memory. If the key length is 56 bits, this attack is computationally infeasible.11.3 Networks and CryptographyBefore we discuss Internet protocols, a review of the relevant properties of networks is in order. The ISO/OSI model [990] provides an abstract representation of networks suitable for our purposes. Recall that the ISO/OSI model is composed of a series of layers (see Figure 11-2). Each host, conceptually, has a principal at each layer that communicates with a peer on other hosts. These principals communicate with principals at the same layer on other hosts. Layer 1, 2, and 3 principals interact only with similar principals at neighboring (directly connected) hosts. Principals at layers 4, 5, 6, and 7 interact only with similar principals at the other end of the communication. (For convenience, "host" refers to the appropriate principal in the following discussion.)Figure 11-2. The ISO/OSI model. The dashed arrows indicate peer-to-peer communication. For example, the transport layers are communicating with each other. The solid arrows indicate the actual flow of bits. For example, the transport layer invokes network layer routines on the local host, which invoke data link layer routines, which put the bits onto the network. The physical layer passes the bits to the next "hop," or host, on the path. When the message reaches the destination, it is passed up to the appropriatelevel.Each host in the network is connected to some set of other hosts. They exchange messages with those hosts. If host nob wants to send a message to host windsor, nob determines which of its immediate neighbors is closest to windsor (using an appropriate routing protocol) and forwards the message to it. That host, baton, determines which of its neighbors is closest to windsor and forwards the message to it. This process continues until a host, sunapee, receives the message and determines that windsor is an immediate neighbor. The message is forwarded to windsor, its endpoint.Definition 11–5. Let hosts C0, …, Cnbe such that Ciand Ci+1are directlyconnected, for 0 i < n. A communications protocol that has C0 and Cnasits endpoints is called an end-to-end protocol. A communications protocolthat has Cj and Cj+1as its endpoints is called a link protocol.The difference between an end-to-end protocol and a link protocol is that the intermediate hosts play no part in an end-to-end protocol other than forwarding messages. On the other hand, a link protocol describes how each pair of intermediate hosts processes each message.The protocols involved can be cryptographic protocols. If the cryptographic processing is done only at the source and at the destination, the protocol is an end-to-end protocol. If cryptographic processing occurs at each host along the path from source to destination, the protocolis a link protocol. When encryption is used with either protocol, we use the terms end-to-end encryption and link encryption, respectively.In link encryption, each host shares a cryptographic key with its neighbor. (If public key cryptography is used, each host has its neighbor's public key. Link encryption based on public keys is rare.) The keys may be set on a per-host basis or a per-host-pair basis. Consider a network with four hosts called windsor, stripe, facer, and seaview. Each host is directly connected to the other three. With keys distributed on a per-host basis, each host has its own key, making four keys in all. Each host has the keys for the other three neighbors, as well as its own. All hosts use the same key to communicate with windsor. With keys distributed on a per-host-pair basis, each host has one key per possible connection, making six keys in all. Unlike the per-host situation, in the per-host-pair case, each host uses a different key to communicate with windsor. The message is deciphered at each intermediate host, reenciphered for the next hop, and forwarded. Attackers monitoring the network medium will not be able to read the messages, but attackers at the intermediate hosts will be able to do so.In end-to-end encryption, each host shares a cryptographic key with each destination. (Again, if the encryption is based on public key cryptography, each host has—or can obtain—the public key of each destination.) As with link encryption, the keys may be selected on a per-host or per-host-pair basis. The sending host enciphers the message and forwards it to the first intermediate host. The intermediate host forwards it to the next host, and the process continues until the message reaches its destination. The destination host then deciphers it. The message is enciphered throughout its journey. Neither attackers monitoring the network nor attackers on the intermediate hosts can read the message. However, attackers can read the routing information used to forward the message.These differences affect a form of cryptanalysis known as traffic analysis.A cryptanalyst can sometimes deduce information not from the content ofthe message but from the sender and recipient. For example, during the Allied invasion of Normandy in World War II, the Germans deduced which vessels were the command ships by observing which ships were sending and receiving the most signals. The content of the signals was not relevant; their source and destination were. Similar deductions can reveal information in the electronic world.第十一章密码技术11.1问题在没有考虑加密所要运行的环境时,加密的使用可能不能提供用户所期待的安全。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
[1] 王起江,洪杰.超超临界电站锅炉用新型管材的研制[J].宝钢技术,2008(5):44-53.[2] 王起江,邹凤鸣.T91高压锅炉管的研制与应用[J].发电设备,2005(1):43-47.[3] Fujio Abe.Bainitic and martensitic creep-resistant steels[J].SolidState and Materials Science,2004,8:.[4] 马明编译.美国新的超临界机组考虑使用TP92的原因[J].电力建设,2006,27(11):79-80.[5] 戴平.国产P91钢管道存在的问题及其解决[J].广东电力,2008,21(8):67-69.[6] 田党.关于难变形钢和合金管坯的二辊斜轧穿孔问题[J].钢铁,1998,33(1):33-36.[7] P J Ennis,A Czyrska-Filemonowicz.Recent advances increep-resistant steels for power plant applications [J].Sādhanā,2003,28:709–730.[8] 刘立民,朱洪,刘志国.法国T91、P91钢管性能评定[J].电站系统工程,2002,18(1):63-64.[9] 彭孙鸿.T91钢管在我国的应用前景[J].宝钢技术,1997,6:48-50.[10] H.C. Furtado,L.H. de Almeida,I. Le May.Precipitation in 9Cr–1Mosteel after creep deformation[J].Materials Characterization,2007,58:72–77.[11] 蒯春光,彭志方.TP91钢在℃区间各相元素的分配特征及相稳定性[J].金属学报,2008,44(8):.[12] 孙智,董小文,张绪平,等.奥氏体化温度对9Cr-1Mo-V-Nb钢组织与性能的影响[J].金属热处理,2001,26(8):12-14.[13] 刘靖,周立新,傅晨光,等.电站锅炉用T91钢热穿孔性能的研究[J].钢管,2002,31(5):9-11.[14] 彭孙鸿,尤夙志,姜明娟,等.热穿孔温度对T91持久强度的影响[J].特殊钢,2001,22(2):10-12.[15] 崔光珠,朱伏先,高德福,等.T91钢高温变形特性研究[J].塑性工程学报,1999,6(2):13-16.[16] 余勇,周晓岚,赵志毅,等.T91变形抗力模型建立及理论轧制压力计算[J].宝钢技术,2006(3):31-34.[17] P olcik P,Sailer T,Blum W,et al.On the microstructuraldevelopment of the tempered martensitic Cr-steel P91 during long-term creep[J].Materials Science and Engineering,1999,260:.[18] O rlová A,Buršík J,Kucharová K,et al.Microstructural developmentduring and properties of seamless modified 9Cr-1Mo steel boiler tubes[R].Kaw asaki Steel Technical Report,1991,25(4):78-87.[19] B endick W,Vaillant JC,Vandenberghe B,et al.Properties andworkability of new creep strength enhanced steels as known grades 23, 24, 911 and 92[J].International Journal of Pressure Vessels and Piping,2004,476:25-29.[20] 刘江南,王正品,束国刚,等.P91钢的形变强化行为[J].金属热处理,2009,34(1):28-32.[21] Tőkei Z S,Viefhaus H,Grabke H J.Initial stages of oxidation of a9CrMoV-steel: role of segregation and martensite laths[J].Applied Surface Science,2000,165:23-33.[22] R ajendran P S,Sankar P,Khatak H S.Cyclic oxidation of P91 at1073, 1123 and 1173K[J].High Temperature Materials and Processes,2004,23(3):.[23] A hmed Shibli,Fred Starr.Some aspects of plant and researchexperience in the use of new ,et al.TP23, 24, 911 and 92: New grades for advanced coal-fired power plants—Properties and experience [J].International Journal of Pressure Vessels and Piping,2008,85:38-46.[24] B rett SJ.The creep strength of weak thick section modified 9Crforgings[C].Proceedings of Baltica,2001,1:39-45.[25] U.Gampe,P.Seliger.Creep crack growth testing of P91 and P22bends[J].International Journal of Pressure Vessels and Piping,2001,78:.[26] L.Kunz,P.Lukáš.High temperature fatigure and cyclic creep of P91steel[J].European Structural Integrity Society,2002,29:37-44.[27] B.Fournier,M.Sauzay,C.Caës,et al.Creep-fatigue-oxidationinteractions in a 9Cr-1Mo martensitic steel[J].International Journal of Pressure Vessels and Piping,2008,85:.[28] 刘洪杰.电站锅炉用P91钢蠕变疲劳交互作用的试验研究[J].动力工程,2007,27(6):.[29] L IU Jiang-nan,JIE Wang-qi.Application of improved vacuumdegassing technique to refinement of the phase stability of precipitates in low Cr of the properties of the 9% Cr steel of the type 9Cr-0.5Mo-1.8W-V-Nb with respect to its application as a pipework and boiler steel operation at elevated temperatures[D].Germany,1995.[30] Hättestrand M,Andrén H O.Evaluation of particle size distributionin a 9% Cr steel using EFTEM[J].Micron,2001,32:.[31] S klenicka V,Kucharova K,Svoboda M,et al.Long-term creepbehavior of 9-12%Cr power plant steels [J].Mater. Character,2003,51:35-48.[32] S trang A,Foldyna V,Lenert J,et al.Prediction of the long-term creeprupture properties of 9-12Cr power plant steels [C].Proceedings of the 6th International Charles Parsons Turbine Conference,Dublin,2003,.[33] K imura K,Kushima H,Sawaka K.Long-term creep strengthprediction of degradation mechanisms[C].Proceedings of the 6th International Charles Parsons Turbine Conference,Dublin,2003,.[34] 高巍,刘江南,王正品,等.P92钢塑性变形行为[J].西安工业大学学报,2008,28(4):.[35] 田党,张根良,卜玉钦.二辊斜轧穿孔时高合金钢的变形分布和分层缺陷形成机制[J].钢铁,1995,30(1):40-45.[36] 刘新生,赵定国,崔成业.冷轧薄板中分层现象的研究[J].钢铁,2008,43(5):40-43.[37] 崔风平,赵乾,唐愈.铸坯内部缺陷对钢板分层形成的影响[J].中国冶金,2008,18(2):14-18.[38] 唐生斌.板材分层缺陷产生原因分析[J].连铸,2003,4:32-34.[39] 洪小玲,肖荣仁,李端来.GH3030合金锻坯裂纹分析[J].钢铁研究,2002,128(5):11-12.[40] S.A.Sharadzenidze,E.A.Svetlitskii.High Quality Seamless Tubes[J].Metallurg,1968,11:38-39.[41] 王建文.27SiMn钢管表面龟裂原因分析[J].湖南冶金,2000,5:25-26.[42] 任建国,祁晓英,马学军,等.低合金钢热轧缺陷分析[J].沈阳工业学院学报,1996,15(3):35-37.[43] 卢居桂,安自亮,刘钰.夹杂物引起的石油套管缺陷分析[J].天津冶金,2002,106(1):27-29.[44] 田党.关于锥形辊穿孔机轧辊转速对毛管分层缺陷影响的讨论[J].钢管,2006,35(4):12-16.[45] 王永吉,陈大国,王世英,等.二辊斜轧穿孔轧辊转速对高合金钢毛管质量的影响[J].钢铁,1985,20(2):25-30.[46] 严智.高温合金穿孔工艺的研究[J].特钢技术,1994,2:27-31.[47] 田党.高温合金无缝管材的研制与生产[J].钢管,2002,31(3):1-6.[48] 田党.关于毛管分层缺陷的试验研究[J].轧钢,1997,6:7-10.[49] 田党.高温合金管坯在二辊斜轧穿孔机上的穿孔实践[J].天津冶金,1996,4:25-28.[50] 田党.毛管分层缺陷形成过程的观察和分析[J].天津冶金,1996,1:24-26.[51] 田党.高温合金毛管分层缺陷形成的过程[J].钢管,1992,1:19-22.[52] 卢于逑,王先进.二辊斜轧穿孔中心金属断裂机理和穿孔变形工艺实质[J].钢铁,1980,6:7-15.[53] 卢于逑,王先进.二辊斜轧穿孔圆坯断面的变形分布[J].金属学报,1980,4:.[54] 田党,张根良,卜玉钦.二辊斜轧穿孔时高温合金钢圆坯的变形分布及分层形成机制[J].钢铁,1995,30(1):40-46.[55] 田党,李群.关于锥形辊穿孔机的穿孔原理及应用问题的讨论[J].钢管,2003,32(6):1-4.[56] 赵咏秋,吴秀丽,陈菊芳.0Cr18Ni9Ti热轧荒管分层内裂原因分析[J].物理测试,1999,2:33-35.[57] 张存信,冯晓庭,项炳和,等.不锈钢无缝管加工过程中断裂原因简析[J].钢管,2008,37(3):38-42.[58] 袁桂林,苏殿荣.GCr15钢管环状层裂在二辊斜轧穿孔过程中的发生和发展[J].钢管,1983,3:15-18.[59] 张世文,刘仓理,李庆忠,等.初始应力状态对材料层裂破坏特性影响研究[J].力学学报,2008,40(4):.[60] 侯凤桐.日本住友金属公司新开发的菌式穿孔机[J].钢管技术,1985,2:57-59.[61] C hihiro HAYASHI,Tomio YAMAKAWA.Influences of Feed andCross Angle on Inside Bore and Lamination Defects in Rotary Piercing for Materials with Poor Hot Workability [J].ISIJ International,1997,37(2):.[62] 嵇国金,彭颖红,阮雪榆.有关金属体积成形中的韧性断裂准则[J].金属成形工艺,1998,16(4):36-37.[63] 郭达人编译.金属材料的断裂及其断口分析[J].国外金属热处理,1996,17(4):25-31.[64] 黄建科,董湘怀.金属成形中韧性断裂准则的细观损伤力学研究进展[J].上海交通大学学报,2006,40(10):.[65] O yane M,Sota T,Okintoto K,et al.Criteria for ductile fractures andtheir applications[J].J Mech Work Tech,1980,4:65-81.[66] 郑长卿,张克实,周利.金属韧性破坏的细观力学及其应用研究[M].北京:国防工业出版社,1995,28-32.[67] V enugopal Rao A,Ramakrishnan N,Krishna Kumar R.Acomparative evaluation of the theoretical failure criteria for workability in cold forging[J].Journal of Materials ProcessingTechnology,2003,142(1):29-42.[68] K omori Kazutake.Effect of ductile fracture criteria on chevron crackformation and evolution in drawing[J].International Journal of Mechanical Sciences,2003,45(1):.[69] O zturk Fahrettin,Lee Daeyong.Analysis of forming limits usingductile fracture criteria[J].Journal of Materials Processing Technology,2004,147(3):.[70] J eong Kim,Sung-Jong Kang,Beom-Soo Kang.A prediction ofbursting failure in tube ductile fracture criterion[J].Int J Adv Manuf Technol,2003,22:.[71] 虞松,陈军,阮雪榆.韧性断裂准则的试验与理论研究[J].中国机械工程,2006,17(19):.[72] 胡庆安,程侠,邰卫华.金属材料断裂预测损伤破坏准则的应用[J].长安大学学报,2007,27(4):.[73] 俞树荣,严志刚,曹睿,等.有限元软件模拟裂纹扩展的方法探讨[J].甘肃科学学报,2003,15(4):15-21.[74] 陈乃超,田冠玉,郑博.12Cr1MoV短期高温冲击断裂韧性及其参数的研究[J].上海电力学院学报,2008,24(2):.[75] K en-ichiro Mori,Hidenori Yoshimura,Kozo Osakada.Simplifiedthree- dimensional simulation of rotary piercing of seamless pipe by rigid-plastic finite-element method[J].Journal of Materials Processing Technology,1998,80-81:.[76] Y van Chastel,Aliou Diop,Silvio Fanini,et al.Finite ElementModeling of Tube Piercing and Creation of a Crack[J].Int J Mater Form,2008,Suppl 1:.[77] H young Wook Lee,Geun An Lee,Eung Kim,et al.Prediction of plugtip position in rotary tube piercing mill using simulation and experiment[J].International Journal of Modern Physics B,2008,22(31-32):.[78] S Fanini,A Ghiotti,S Bruschi.Evaluation of Fracture Initiation inthe Mannesmann Piercing Process[C].The 10th ESAFORM Conference on Material Forming,2007,.[79] S aurabh Dwivedi,Samuel H,Huang Jun Shi,et al.Yield predictionfor seamless tubing processes: a computational intelligence approach[J].Int Adv Manuf Technol,2008,37:.[80] E lisabetta Ceretti,Claudio Glaudio,Aldo Attanasio.3D Simulationand Validation of Tube Piercing Process[C].NUMIFORM 07 Materials and Design: Modling, Simulation and Applications,2007,.[81] K azutake Komori.Simulation of Mannesmann piercing process bythe three-dimensional rigid-plastic finite-element method[J].International Journal of Mechanical Sciences,2005,47:.[82] H ayashi C,Yamakawa T.Influence of feed and cross angle on rotaryforging effects and redundant shear deformation in rotary piercing process[J].ISIJ International,1997,37:.[83] 曾幼宗.斜轧穿孔工艺的有限元分析[J].钢管,2004,33(3):51-53.[84] 双远华,赖明道,张中元.斜轧穿孔过程金属流动的有限元模拟[J].机械工程学报,2004,40(3):.[85] 双远华,赖明道,张中元.钢管斜轧过程应力应变与温度耦合模拟分析[J].锻压技术,2003(6):36-40.[86] 李胜衹,陈大宏,孙中建,等.二辊斜轧穿孔时圆管坯的变形与应力分布及其发展[J].钢铁研究学报,2000,12(5):26-30.[87] A Ghiotti,S Fanini,S Bruschi,et al.Modeling of the Mannesmanneffect[J].CIRP Annals-Manufacturing Technology,2009,58:.[88] E.I. Panov.Shear Stresses and Their Dependence on Different ProcessParameters in The Helical Rolling of Solid Semifinished Products[J].Metallurgist,2005,49(7-8):.[89] E.I. Panov.Certain Aspects of The Stress-Strain State of SemifinishedProducts in Helical Rolling[J].Metallurgist,2003,47(11-12):.[90] E.I. Panov.Effect of thrust and tension on the radial stresses in ofthe tube forming process in Diescher’s mill [J].Journal of Materials Processing Technology,2006,177:.[91] 双远华,陈惠琴,赖明道.斜轧管材生产中内部组织有限元模拟和预测[J].中国有色金属学报,2001,11(2):.[92] 双远华,张中元,赖明道.热轧穿孔内部组织控轧的工业性试验研究[J].钢铁,2002,37(6):42-47.[93] J C Prince,R Maroño,F León.Thermomechanical analysis of apiercing mandrel for the production of seamless steel tubes[J].J.Process Mechanical Engineering,2003,217:.[94] W.A.Khudheyer,D.C.Barton,T.Z.Blazynski.A comparison betweenmacroshear redundancy and loading effects in 2- and 3-roll rotary tube cone piercers[J].Journal of Materials Processing Technology,1997,65:.[95] A.N.Nikulin,V.V. Streletskii.Deformation of continuous cast metalduring rotary rolling[J].Metallurgist,2005,49(3-4):97-101.[96] K azutake Komori,Kouta Mizuno.Study on plastic deformation incone-type rotary piercing process using model piercing mill for modeling clay[J].Journal of Materials Processing Technology,2009,209:.[97] 李连诗.钢管塑性变形原理(上册)[M],北京:冶金工业出版社,1985:.[98] 卢于逑.斜轧穿孔过程中应力和变形的分布和中心金属断裂机构的某些特点分析[D].北京:北京钢铁学院,1963.[99] 卢于逑,王先进.二辊斜轧穿孔时圆坯断面的变形分布和发展[J].金属学报,1980,16(4):.[100] 严泽生.现代热轧无缝钢管生产[M].北京:冶金工业出版社,2009:.[101] Takuda H,Mori K,Hatta N.The application of some criteria for ductile fracture to the prediction of the forming limit of sheet metals[J].J Mater Process Technol,1999,95:.[102] Takuda H,Mori K,Fujimoto H,et al.Prediction of the forming limit in bore-expanding of sheet metals using ductile fracture criteria[J].J Mater Process Technol,1999,92-93:.[103] Mori K,Takuda H.Prediction of forming limit in deep drawing of finite element simulation and criterion for ductile fracture[J].Transaction of NAMRISME XXIV,1996,.[104] Takuda H,Mori K,Takakura N,et al.Finite element analysis of limit strains in biaxial stretching of sheet metals allowing for ductile fracture[J].Int J Mech Sci,2000,42:.。