哈工大毕业设计外文翻译模板
外文翻译模版
大连民族学院
本科毕业设计外文翻译
学院:
专业(班级):
学生姓名:
指导教师:
2012年月日
1
每名学生在毕业设计(论文)期间,应完成译文不少于3千汉字的外文资料翻译。
译文内容必须与毕业设计(论文)内容有关,原则上是近五年出版的期刊(不可翻译有中文译文的书籍或期刊)。
1.1译文正文格式
译文正文格式同毕业设计(论文)正文格式要求。
1.2 译文页眉页脚的编排
页脚要求同毕业论文页脚要求,一律用阿拉伯数字连续编页码。
页码应由正文首页开始,作为第1页。
封面不编入页码。
页码必须标注在每页页脚底部居中位置,宋体,小五。
无页眉。
1.3标题格式
各级标题格式同毕业论文中相关要求。
2 打印和装订说明
2.1 封皮
按照首页格式制作封面。
2.2 正文
单面打印。
2.3装订规范要求
装订时原文在前,译文在后,左侧装订。
译文必须于毕业设计(论文)中期检查前完成,交指导教师批改。
–1–。
毕业设计中英文翻译【范本模板】
英文The road (highway)The road is one kind of linear construction used for travel。
It is made of the roadbed,the road surface, the bridge, the culvert and the tunnel. In addition, it also has the crossing of lines, the protective project and the traffic engineering and the route facility。
The roadbed is the base of road surface, road shoulder,side slope, side ditch foundations. It is stone material structure, which is designed according to route's plane position .The roadbed, as the base of travel, must guarantee that it has the enough intensity and the stability that can prevent the water and other natural disaster from corroding.The road surface is the surface of road. It is single or complex structure built with mixture。
The road surface require being smooth,having enough intensity,good stability and anti—slippery function. The quality of road surface directly affects the safe, comfort and the traffic。
本科毕业论文英文翻译格式模板
毕业论文(设计)
英文翻译
姓名
学号
所在学院
专业班级 2007级信科2班
指导教师
日期 2011年3月30 日
英文原文(三号宋体加粗,段前0.5行,段后0.5行,居中)
Introduce a kind of dormancy of using- restore to the throne in theoperation way and improve the anti-interference ability method of the one-chip computer;Analyse its scope of application, provide and use the circuit concretly; Combine the instance, analyse the characteristic of the hardware and software design under these kind of operation way. (Times new Roman小四,1.25倍行,段前0行,段后0行,两端对齐)
中文翻译(三号宋体加粗,段前0.5行,段后0.5行,居中)
介绍一种用休眠-复位运行方式提高单片机抗干扰能力的方法;分析其适用范围,给出具体应用电路;结合实例,分析这种运行方式下硬件和软件设计的特点。
(小四,1.25倍行,段前0行,段后0行,两端对齐)。
毕业论文外文翻译格式【范本模板】
因为学校对毕业论文中的外文翻译并无规定,为统一起见,特做以下要求:1、每篇字数为1500字左右,共两篇;2、每篇由两部分组成:译文+原文.3 附件中是一篇范本,具体字号、字体已标注。
外文翻译(包含原文)(宋体四号加粗)外文翻译一(宋体四号加粗)作者:(宋体小四号加粗)Kim Mee Hyun Director, Policy Research & Development Team,Korean Film Council(小四号)出处:(宋体小四号加粗)Korean Cinema from Origins to Renaissance(P358~P340) 韩国电影的发展及前景(标题:宋体四号加粗)1996~现在数量上的增长(正文:宋体小四)在过去的十年间,韩国电影经历了难以置信的增长。
上个世纪60年代,韩国电影迅速崛起,然而很快便陷入停滞状态,直到90年代以后,韩国电影又重新进入繁盛时期。
在这个时期,韩国电影在数量上并没有大幅的增长,但多部电影的观影人数达到了上千万人次。
1996年,韩国本土电影的市场占有量只有23.1%。
但是到了1998年,市场占有量增长到35。
8%,到2001年更是达到了50%。
虽然从1996年开始,韩国电影一直处在不断上升的过程中,但是直到1999年姜帝圭导演的《生死谍变》的成功才诞生了韩国电影的又一个高峰。
虽然《生死谍变》创造了韩国电影史上的最高电影票房纪录,但是1999年以后最高票房纪录几乎每年都会被刷新。
当人们都在津津乐道所谓的“韩国大片”时,2000年朴赞郁导演的《共同警备区JSA》和2001年郭暻泽导演的《朋友》均成功刷新了韩国电影最高票房纪录.2003年康佑硕导演的《实尾岛》和2004年姜帝圭导演的又一部力作《太极旗飘扬》开创了观影人数上千万人次的时代。
姜帝圭和康佑硕导演在韩国电影票房史上扮演了十分重要的角色。
从1993年的《特警冤家》到2003年的《实尾岛》,康佑硕导演了多部成功的电影。
毕业论文外文翻译格式【范本模板】
盐城师范学院毕业论文(设计)外文资料翻译学院:(四号楷体_GB2312下同)专业班级:学生姓名:学号:指导教师:外文出处:(外文)(Times New Roman四号) 附件: 1.外文资料翻译译文; 2.外文原文1.外文资料翻译译文译文文章标题×××××××××正文×××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××………….*注:(本注释不是外文翻译的部分,只是本式样的说明解释)1. 译文文章标题为三号黑体居中,缩放、间距、位置标准,无首行缩进,无左右缩进,且前空(四号)两行,段前、段后各0.5行间距,行间距为1。
25倍多倍行距;2. 正文中标题为小四号,中文用黑体,英文用Times New Roman体,缩放、间距、位置标准,无左右缩进,无首行缩进,无悬挂式缩进,段前、段后0。
5行间距,行间距为1.25倍多倍行距;3。
正文在文章标题下空一行,为小四号,中文用宋体,英文用Times New Roman体,缩放、间距、位置标准,无左右缩进,首行缩进2字符(两个汉字),无悬挂式缩进,段前、段后间距无,行间距为1。
毕业设计外文文献翻译范文
毕业设计外文文献翻译专业学生姓名班级学号指导教师优集学院外文资料名称:Knowledge-Based Engineeri--ng Design Methodology外文资料出处:Int.J.Engng Ed.Vol.16.No.1附件: 1.外文资料翻译译文2.外文原文基于知识工程(KBE)设计方法D. E. CALKINS1.背景复杂系统的发展需要很多工程和管理方面的知识、决策,它要满足很多竞争性的要求。
设计被认为是决定产品最终形态、成本、可靠性、市场接受程度的首要因素。
高级别的工程设计和分析过程(概念设计阶段)特别重要,因为大多数的生命周期成本和整体系统的质量都在这个阶段。
产品成本的压缩最可能发生在产品设计的最初阶段。
整个生命周期阶段大约百分之七十的成本花费在概念设计阶段结束时,缩短设计周期的关键是缩短概念设计阶段,这样同时也减少了工程的重新设计工作量。
工程权衡过程中采用良好的估计和非正式的启发进行概念设计。
传统CAD工具对概念设计阶段的支持非常有限。
有必要,进行涉及多个学科的交流合作来快速进行设计分析(包括性能,成本,可靠性等)。
最后,必须能够管理大量的特定领域的知识。
解决方案是在概念设计阶段包含进更过资源,通过消除重新设计来缩短整个产品的时间。
所有这些因素都主张采取综合设计工具和环境,以在早期的综合设计阶段提供帮助。
这种集成设计工具能够使由不同学科的工程师、设计者在面对复杂的需求和约束时能够对设计意图达成共识。
那个设计工具可以让设计团队研究在更高级别上的更多配置细节。
问题就是架构一个设计工具,以满足所有这些要求。
2.虚拟(数字)原型模型现在需要是一种代表产品设计为得到一将允许一产品的早发展和评价的真实事实上原型的过程的方式。
虚拟样机将取代传统的物理样机,并允许设计工程师,研究“假设”的情况,同时反复更新他们的设计。
真正的虚拟原型,不仅代表形状和形式,即几何形状,它也代表如重量,材料,性能和制造工艺的非几何属性。
毕业论文外文翻译模版
一、摘要
本文主要介绍了毕业论文外文翻译模版,该模版包括了论文的标题、作者信息、摘要、关键词、引言、正文、结论等部分的翻译模板,可供毕业论文写作时参考使用。
二、标题
毕业论文外文翻译模版
三、作者信息
作者:[姓名]
学号:[学号]
指导老师:[指导老师姓名]
四、摘要
本文介绍了毕业论文外文翻译模版的具体内容和使用方法,帮助毕业论文作者完成外文翻译工作,提高论文质量和水平。详细内容包括论文标题、作者信息、摘要、关键词、引言、正文、结论等部分的翻译模板。
6. 正文的翻译模版:
正文内容丰富多样,翻译时需根据具体内容进,无需额外模版。
八、结论
毕业论文外文翻译模版的使用对于毕业论文写作具有重要意义,能够帮助作者完成外文翻译工作,提高论文的质量和水平。希望本文提供的翻译模版能够对广大学子在论文写作过程中有所帮助,更好地完成毕业论文的撰写工作。
五、关键词
毕业论文、外文翻译、模版、翻译模板、论文写作
六、引言
毕业论文外文翻译是毕业论文写作过程中的一项重要工作,对于提高论文的学术水平和国际影响力具有重要意义。本文提供了一套完整的翻译模版,可供广大学子参考使用,希望能够对大家的论文写作工作有所帮助。
七、正文
1. 论文标题的翻译模版:
中文标题:[中文标题]
英文标题:[英文标题]
2. 作者信息的翻译模版:
作者姓名:[姓名]
作者学号:[学号]
作者专业:[专业]
3. 摘要的翻译模版:
中文摘要:[中文摘要内容]
英文摘要:[英文摘要内容]
4. 关键词的翻译模版:
中文关键词:[中文关键词]
英文关键词:[英文关键词]
毕业设计外文翻译样本
Influence of underground water seepage flow on surrounding rockdeformation of multi-arch tunnelAbstract: Based on a typical multi-arch tunnel in a freeway, the fast Lagrangian analysis of continua in3 dimensions(FLAC ) was used to calculate the surrounding rock deformation of the tunnel under which the effect of underground water seepage flow was taken into account or not. The distribution of displacement field around the multi-arch tunnel, which is influenced by the seepage field, was gained. The result indicates that the settlement values of the vault derived from coupling analysis are bigger when considering the seepage flow effect than that not considering. Through the contrast of arch subsidence quantities calculated by two kinds of computation situations, and the comparison between the calculated and measured value of tunnel vault settlement, it is found that the calculated value(5.7−6.0 mm) derived from considering the seepage effect is more close to the measured value(5.8−6.8 mm). Therefore, it is quite necessary to consider the seepage flow effect of the underground water in aquiferous stratum for multi-arch tunnel design. key words: multi-arch tunnel; underground water seepage flow; coupling flow and stress; surrounding rock deformation; vault settlement1 IntroductionWith high speed development of our national economy, the highway is constructed on large-scale all around the country. Along the freeway from Changsha to Chongqing(one section of which is from Changde to Jishou), many tunnels have to be constructed. As these tunnels’s topography and geomorphic conditions are very complex and the rain is very rich, the invasion of underground water and surface water is a difficult problem in the tunnel construction and its future function. In the past railway and highway tunnel construction, some effective waterproof construction technologies were proposed . But the researches on the mechanism of coupling function of fluid and stress and its influence on tunnels are not enough. For example, LIU and CHENcalculated and analyzed the double-arch tunnel structure in water-eroded groove but did not consider the underground water seepage force. YANG et al studied the earthquake response of large span and double-arch shallow tunnel, combining with dynamic stress but without underground water seepage stress. In fact, tunnel excavation forms two secondary stresses fields that can change the distribution of initial rock stress field and theunderground water seepage field. And the seepage flow of underground water also has importantinfluence on the stability of tunnel.Generally speaking, when the surface water seeps in underground, it will constitute the initial seepage flow field together with the underground water. But after tunnel excavation the initial seepage flow field will be destructed. In order to achieve a newbalance, it can produce a new seepage flow field around the tunnel with the underground water flowing into the tunnel. The pore-water pressure can change the stress field of adjacent rock mass. This problem is the coupling flow and stress question on which some scholars study now . LI et al analyzed the subsea tunnel withcoupling process and LEE and NAM discussed the seepage flow force around the tunnel with coupling analysis. In order to know the effect of underground water seepage flow on the surrounding rock deformation of tunnel, a multi-arch tunnel(named Bi-Ma-Xi tunnel) engineering was analyzed with FLAC in this work.2 Engineering and geology conditions2.1 TopographyThe tunnel locates at a hill on long-term weathering and denudation action. In the tunnel area, there are some gullies that primarily s trike towards north and some strike from east to north. Tunnel axis direction and topographic contour line are intersected with orthogonal or a great angle at section K218+087−K218+380 and with a small angle or even parallel at section K218+380− K218+565. The topography is rather steep and forms a “V” type gully. The general hill strike is about 340˚, which is close from north to south. The topography slope is about 15˚−35˚. The green vegetation is mainly the small bamboo and herbaceous plants. The rock bed is visible in some places.2.2 Lithologyccording to engineering geology survey and drilling exposure data, the stratum of3D [1−3] 4][5]surveying area from young to old is as follows.The Quaternary Holocene(Qh): the soil-like loam layer, snuff color, plastic-stiffly,0−4.60 m thick. This layer is ignored in numerical model.The Upper Cretaceous (K2j): Sandstone layer, red brown or palm fibre or dust colour,fine-grained structure. The calcareous cemented rock layer is mixed with mud cemented rock layer and the former is the main part and it is thin and medium thickness structural layer. The horizontal bedding layer develops and the dip angle is small. According to weathered degree the stratum can be divided into three layers from the top down: intensely, weakly and tinily weathered layer. The sketch map of geology section is shown in Fig.1.Fig.1 Sketch of geological profile for tunnel2.3 Geology constitutionIn tunnel area there is no large fracture structure and nor any new tectogenesis. The geology constitution is a monoclinal structure. The rock dip direction of general occurrence is 95˚−115˚. The dip angle distribution ranges from 8˚ to15˚. Three sets of joint crack develop: 1) dip direction 148˚, dip angle 89˚;2) dip direction 350˚, dip angle 56˚; 3) dip direction 225˚, dip angle 77˚. The joint cracks mostly twist with pressure and crack faces are almost close. Minorities of the crack faces are patulous and the distance between two cracks often varies from 5 to 20 cm. The connectivity is fairly good.3 Construction of 3D numerical model3.1 model of numerical calculationThis tunnel is a freeway multi-arch tunnel, of which the left one and right one are general parallel. The two tunnels are about symmetrical by the middle arch wall. The average thickness of middle wall is 2.1 m. The key dimensions of tunnel section are shown in Fig.2.Fig.2 Sketch of multi-tunnel cross section (unit: cm)When modeling the tunnel, the direction along the tunnel is y-axis and in horizontal plane the perpendicularity of tunnel direction is x-axis and plumb upward is z-axis. The influence of tunnel excavation is considered. The radius of influence range is above 3 times of one tunnel span. So in width direction, 50 m extends respectively outside the left and right tunnel, plus the span itself, width direction calculation range is 125 m. Downwards from the original point is 3 times of the height of the tunnel, which equals 45 m and upward is till the earth’s surface (does not consider the clay layer, calculating depth range includes intensely, weakly, tinily weathered red sandstone from above to below respectively). The buried depth of the tunnel is about 25 m. Plus the 10 m of its height, in z-axis the depth is 80 m. Along the tunnel direction an unit length is considered because tunnel excavation can be considered asa plane-strain problem. The size of the 3D numerical model is 125 m×80 m×1 m. The 3D numerical model and its coordinate axis location are shown in Fig.3.Fig.3 3D numerical model of tunnel in FLACThe displacement boundary conditions are adopted in numerical model. Bottom border is constrained with vertical displacement and upper border is free border. Both left and right border are restrained with horizontal displacement. The same boundary conditions are applied in both the front and back borders in y-axis.3.2 Calculation parametersThe mechanics parameters in numerical analysis are provided by geotechnical engineering investigation data and combined with the national criterion need and parameters discount request in numerical simulation. The mechanics parameters of the surrounding rock and the C25 concrete middle arch wall are listed in Table 1. The surrounding rock and the concrete intensity criteria adopted is the elastic-plastic criterion of Mohr-Coulomb. Table 2 shows the surrounding rock relevant seepage flow parameters when coupling problem is considered in numerical simulation. Table 3 lists the parameters of shot concrete(primary lining) and anchor support structure of the multi-arch tunnel. In this calculation process, the parameters of Grade IV surrounding rock supporting system are adopted. And only the affection of the anchor and shotconcrete is considered. The effect of secondary lining is not considered in numerical simulation.4 Discussion on calculation results4.1 Surrounding rock deformation characteristics without underground water seepage flowBased on the established numerical model, the process in which the underground water seepage flow function was not considered was carried on by FLAC . Fig.4 shows the vertical displacement contour-line map in this instance after multi-arch tunnel excavation. From Fig.4 it can be obviously seen that nearby the tunnel excavation region the rock deformation is relatively serious. The vault rock displacement is negative, indicating that the displacement direction is vertical downwards and subsidence occurs. But around the tunnel bottom the surrounding rock displacement is positive, indicating that the direction is vertical upwards and bulging phenomenon occurs.In the process of numerical calculation, the left and right tunnels were simulated simultaneously, namely they were excavated in the identical section plane simultaneously, that is to say, the influence of the construction order is not considered. In the computation process ofFLAC , some interesting grid points were selected to monitor their vertical displacement. The monitored grid points’ number and corresponding coordinate position are listed in Table 4.Fig.5 shows the time process curves of z-displacement (absolute value) of the monitored grid points around left tunnel vault. From Fig.5 it can be seen that the vertical displacement value(or called settlement value) of tunnel vault surrounding rock has relationship with its own position. The clos er the grid point’s position away from the tunnel excavation region, the larger the settlement value. For example, on the middle upper grid point (41 ) of left tunnel, its final calculation settlement value is 3.7 mm, and another grid poi nts’ values are getting smaller with the distance becoming longer.Fig.5 Time process curves of z-displacement of monitored grid points around le ft tunnel vault4.2 Surrounding rock deformation characteristics with underground water seepage flowThe influencing factors of surrounding rock deformation after tunnel excavation in Refs.[10−13], mainly concentrating on the grade of surrounding rock, excavating and supporting method, the neighbor construction load and the construction working procedure. Generally it almost does not consider the influence of underground water seepage flow. But in fact, the underground water existence has important influence on the surrounding rock deformation. For instance, in the excavation and tunnel engineering, the underground water seepage flow can cause quite big displacement of the soil or rock mass and even threaten the safety of engineering . In this study, some quantitative researches on the influence of surrounding rock deformation were carried out by underground water seepage flow.The stratum is fully saturated with water before tunnel is excavated. The seepage flow boundary condition includes that thepore-water pressure of the top surface is limited to zero and the two sides as well as the base boundary are water-proof boundaries . Before tunnel excavation the pore pressure of the stratum is hydro-static pressure. After tunnel excavation, around the tunnel excavation boundary is simulated by a free water seepage flow boundary where the adjacent underground water infiltrates into the excavated area. And the seepage flow field of surrounding rock has been changed with the excavation being carried on. Then the coupling analysis was executed by FLAC .Fig.6 shows the vertical displacement contour-line map after multi-arch tunnel excavation when considering the underground water seepage flow function. Obviously it can be seen that in coupling analysis the arch subsidence quantity is larger than that of not considering seepage function andthe affected region is also wider than that of the former as shown in Fig.4.Fig.6 z-displacement contour-line map of surrounding rock when considering underground water seepage flow function (unit: mm)coupling analysis, as the change of pore pressure in surrounding rock, the effective stress will be changed and it will cause the rock porosity ratio to reduce, leading to a larger arch subsidence quantity compared with that of not considering the seepage flow effect. But the vertical displacements at the bottom of the tunnel are not changed a lot. Fig.7 shows the calculated vertical displacement value for both vault’s middle position (grid point 41 and gridpoint 52 ). It can be seen that the subsidence quantity gradually increases with computation development, after finally tends to its new balance, both vault’s vertical displacement quantities finally stabilize at about 5.7 mm and the two time process curves are basically consistent.Fig.7 Curves of both vault’s node displacement vs calculation stepsFig.8 shows the time process curves of z -displacement(absolute value) of the monitored grid points around the left tunnel vault when taking the underground water seepage flow intoconsideration. Contrasting with Fig.5 it is obviously seen that the settlement value of 41 grid point is increased and reaches 5.7 mm. And to the other monitored grid points, their subsidence quantities also basically tend to 5.0 mm. The calculation subsidence quantities do not change when their relative positions changes.Fig.8 Time process curves of vault settlement when taking underground water seepage f low into consideration4.3 Comparison of deformation measurement results of surrounding rock In the process of excavating, the Bi Ma-Xi tunnel, the inspecting and consulting company of the fourth investigation and design institute of Chinese Railways Ministry monitored the surrounding rock deformation. Fig.9 shows the monitored vault settlement curves at sections K218+280 and K218+310.#Fig.9 Curves of measured value of vault settlement in process of left tunnel excavationComparing Fig.9 with Fig.5 and Fig.8, the maximal vault settlement calculation value is 3.7 mm when without considering underground water seepage flow, and when taking it into consideration the maximal calculation value is equal to 5.7 mm. And the practical monitored results reach 6.5 mm and tend to be stable after 2 months when the tunnel is excavated. The case fits very well with the coupling analysis result. The vault settlement measurement values in this multi-arch tunnel are all basically leveled off between 5.8 mm and 6.8 mm.The calculation results of coupling fluid-mechanical analysis are slightly smaller than the measured results. The reason is that the numerical calculation is thought as converged when the maximal unbalanced force in surrounding rock tends to a less value after tunnel excavation. And it does not consider the effect of actual time. The parameters in calculating unavoidably exist difference with the parameter of rock mass in reality. These reasons lead to the difference between the coupling analysis and the engineering measurement. But the results obtained in section 4.1 are less than the measuring results considering it indicates that the numerical analysis without underground water seepage flow cannot meet the need of engineering.5 Conclusions1) When underground water seepage flow function is considered in coupling fluid-mechanical analysis, the calculation vault settlements have finally achieved5.7−6.0 mm with the interaction of undergroundwater seepage flow and stress release in surrounding rock around the tunnel. The coupling calculation results are very close to the vault measurement settlement. It indicates that constructing tunnels in aquiferous stratum the underground water seepage flow effect must be considered in the design phase.2) The settlement of the surrounding rock above the tunnel has close relationship with its own position. The region near the tunnel excavation zone has the biggest rock deformation, so it should promptly complete supporting measures. When not considering the seepage flow function, the farther the region, the smaller the rock deformation; but when considering the seepage flow function, the settlement of the surrounding rock is above the tunnel and then basically tends to stable in shallower tunnel and it has obviously influence on the ground surface subsidence.地下水渗流对双连拱隧道围岩变形的影响摘要:一般来说,对于高速公路双连拱隧道,用FLAC3D计算隧道围岩变形时是没有考虑到地下水渗流影响的。
毕业设计英文翻译》【范本模板】
外文文献翻译(译成中文1000字左右):【主要阅读文献不少于5篇,译文后附注文献信息,包括:作者、书名(或论文题目)、出版社(或刊物名称)、出版时间(或刊号)、页码。
提供所译外文资料附件(印刷类含封面、封底、目录、翻译部分的复印件等,网站类的请附网址及原文】太阳能—地源热泵的热源性能Y。
Bi1,2,L. Chen1*and C. Wu3本论文研究了中国天津冬季里的太阳能—地源热泵的太阳能与地源性能。
结果被用于设计和分析的太阳能集热器和地面热交换器。
太阳能-地源热泵在这个地区的使用可行性是成立的. 关键词:太阳能,地源热泵,可行性。
介绍地源热泵(GSHP)利用地下相对稳定的温度作为热源或水槽提供热源或调节空气。
GSHP 系统寻求利用常规空气—空气热泵系统的两方面可用的功能。
首先,地下环境温度缓慢地变化,归结于其高的热质量,导致了相对稳定的源或者散热器的温度而不受较大的极限。
其次,被地面吸收的太阳能在整个冬季可以热源。
自从地源热泵的观念在二十世纪四十年代被发展,大量的理论和实验工作都完成了,实验研究审查了具体的地源热泵系统和现场数据。
理论研究已经集中于用数值方法模拟地下盘管换热器以及研究参数对系统性能的影响。
太阳能—地源热泵(SGSHP)采用太阳能集热器和大地作为热源开始发展于1982年。
热泵实验系统用垂直双螺旋线圈(VSDC)地下换热器(GHX)为太阳能—地源热泵(SGSHP)利用低品位能源,这种方法已经被作者们所创造。
(图1)蒸汽压缩热泵的加热负荷和性能系数(COP)取决于蒸发温度和热源温度。
SGSHP采用太阳能集热器和大地作为热源,因此,其应用主要是依靠太阳能和土壤源性能。
在本论文中,中国天津的气象数据被用来分析SGSHP在该区域的应用可行性。
太阳能源分析天津的太阳能在中国处于中等水平。
1966—1976年期间天津的太阳能辐射月平均变化如图2所示。
结果表明,该太阳能集热器在夏天可以直接用于提供热水。
哈尔滨工业大学硕士毕业论文模板
百度文库- 让每个人平等地提升自我I Midterm reportCourse: Advanced Foundation Engineering Title:Transcona Grain Elevator, CanadaMember:Duofa Ji、Xici Han、Shiwang Zhao、Zhimin Zhang Chapter 1 introduction (3)Chapter2 Failure analysis (4)Engineering parameters (4)百度文库- 让每个人平等地提升自我II Load (4)Soil parameters (4)calculation hypothesis (7)foundation bottom pressure calculation (7)The limit load of the foundation (11)settlement of the foundation (14)Chapter3 Redesign of the Foundation (20)Selection (20)基础底面压力计算 (22)The checking computations of the bearing capacity for foundation bottom. ··25Can meet the bearing capacity requirement. (26)地基的沉降 (29)总结 (35)Chapter4 深基础设计 (36)工程基本资料 (36)选择桩型,桩材及桩长 (36)确定单桩竖向承载力特征值aR (36)/as d== / 4.5/13.60.330.40cB l==< (40)10430.098235.9 2.0569081043a c ak c aR R f A KN KN R KN η=+=+⨯⨯=>= (41)桩顶作用效应计算 (41)轴心竖向力作用下 (41)参考文献 (56)百度文库- 让每个人平等地提升自我III Chapter 1 introductionCase DescriptionIn September 1913, the Canadian Pacific Railway Company completed construction of a million-bushel (about 36,400 m3) grain elevator at North Transcona, 11 km north-east of Winnipeg, Canada. The elevator was one of the most important structures and one of the largest gravity railroad yards in the world, which covered several square miles and was built on partly farmed, relatively flat prairie land. The structure consisted of a reinforced-concrete work-house, which contained five rows of 13 bins. The bins were based on a concrete structure containing belt conveyors supported by a reinforced-concrete shallow raft foundation. After the structure was completed, the filling was begun and grain was distributed uniformly between the bins. The weight of grains is 20000 tons, which is equivalent to % of the total weight when the grains are full. On October 18, 1913, after the elevator was loaded to % of its capacity, settlement of the bin-house was noted. Within an hour, the settlement had increased uniformly to about 30 cm following by a tilt towards the west (Fig. ,b), which continued for almost 24 hours until it reached an inclination of almost 27 degrees.ConstructionExcavation for the elevator foundations started in 1911. No borings were taken, but after the excavation reached its design depth of m, field-bearing capacity tests were carried out by loading a plate laid upon a prepared smooth clay surface.A 60 cm thick ×m reinforced-concrete slab was built to serve as a foundation for the concrete framework of the underground conveyor belt tunnels supporting the bin-house. The construction of the bin-house proceeded at a rapid rate during the autumn and winter of 1912, the concrete circular bins being raised at the rate of 1 m per day, until they reached the designed height of 31 m.百度文库 - 让每个人平等地提升自我IVChapter2 Failure analysisEngineering parametersLoadDead :weight of the structure was 20,000 tonsLive: the weight of the grain in the bins (full) 27060 tonsThe weight of the grain in the bins (failure) tonsSoil parameters1)Judgement of the category of the soilThrough refering to literatures, we know that the plastic index for the soil is 70P I =, through checking literatures we can make classification of soil, when plastic index 17P I >, the soil is clay, and when 1017P I <≤, he soil is silt, so we can classify the soil layer as clay.2)After analying the related literatures, we can get some parameters of the soil, and as is shown in the table 2-1Table 2-1 numberH (m) name ϕ u C p I w (%) L w (%) γ p w (%) 1artificial fills - - - - - - - 2gray slickensided clay 0 54 70 45 105 35 3gray silty clay 0 31 70 57 105 35 4 limestonerock- - - - - - -百度文库 - 让每个人平等地提升自我VThrough the above parameters and by formula pL L p w w I w w -=-we can getL I = for second layer; and L I = for the third layer.Reference:” Liu Hui, discuss of the relationship of SPT counts of thestandard foundation penetration and the physical mechanical parameters” And we can get of some parameters of clay. The relations of SPT counts of the standard foundation penetration and the physicalmechanical parameters.Table2-2 Foundation soil category regression equationclay L I 0. 0543N 0. 8202=+- Es = 0. 4787N + 2. 5114a =-0. 0249N + 0. 5297From the formulas in table. L I 0. 0543N 0. 8202=+-we can get the SPT counts of the second soil layer:N=, so we adopt N=13modulus of compression of the soil:Es = 0. 4787N + 2. 5114= ,:a =-0. 0249N + 0. 5297=SPT of the third layer of soil N =, N=10modulus of compression of soil Es = 0. 4787N + 2. 5114=,a =-0. 0249N + 0. 5297=From the reference of litterature, as to clay, error should be within 9%, results of calculation is close to the real value, this experienceregression equation has applicability and reliability, so this project uses this experience formula to get the parameters is reasonable, and can meet the requirements of the error range.。
毕业设计外文文献翻译【范本模板】
毕业设计(论文)外文资料翻译系别:专业:班级:姓名:学号:外文出处:附件: 1. 原文; 2。
译文2013年03月附件一:A Rapidly Deployable Manipulator SystemChristiaan J。
J。
Paredis, H. Benjamin Brown,Pradeep K. KhoslaAbstract:A rapidly deployable manipulator system combines the flexibility of reconfigurable modular hardware with modular programming tools,allowing the user to rapidly create a manipulator which is custom-tailored for a given task. This article describes two main aspects of such a system,namely,the Reconfigurable Modular Manipulator System (RMMS)hardware and the corresponding control software。
1 IntroductionRobot manipulators can be easily reprogrammed to perform different tasks, yet the range of tasks that can be performed by a manipulator is limited by mechanicalstructure。
Forexample,a manipulator well-suited for precise movement across the top of a table would probably no be capable of lifting heavy objects in the vertical direction. Therefore,to perform a given task,one needs to choose a manipulator with an appropriate mechanical structure.We propose the concept of a rapidly deployable manipulator system to address the above mentioned shortcomings of fixed configuration manipulators。
毕业设计外文翻译英文
Bid Compensation Decision Model for Projectswith Costly Bid PreparationS.Ping Ho,A.M.ASCE 1Abstract:For projects with high bid preparation cost,it is often suggested that the owner should consider paying bid compensation to the most highly ranked unsuccessful bidders to stimulate extra effort or inputs in bid preparation.Whereas the underlying idea of using bid compensation is intuitively sound,there is no theoretical basis or empirical evidence for such suggestion.Because costly bid preparation often implies a larger project scale,the issue of bid compensation strategy is important to practitioners and an interest of study.This paper aims to study the impacts of bid compensation and to develop appropriate bid compensation strategies.Game theory is applied to analyze the behavioral dynamics between competing bidders and project owners.A bid compensation model based on game theoretic analysis is developed in this study.The model provides equilibrium solutions under bid compensation,quantitative formula,and quali-tative implications for the formation of bid compensation strategies.DOI:10.1061/(ASCE )0733-9364(2005)131:2(151)CE Database subject headings:Bids;Project management;Contracts;Decision making;Design/build;Build/Operate/Transfer;Construction industry .IntroductionAn often seen suggestion in practice for projects with high bid preparation cost is that the owner should consider paying bid compensation,also called a stipend or honorarium,to the unsuc-cessful bidders.For example,according to the Design–build Manual of Practice Document Number 201by Design–Build In-stitute of America (DBIA )(1996a ),it is suggested that that “the owner should consider paying a stipend or honorarium to the unsuccessful proposers”because “excessive submittal require-ments without some compensation is abusive to the design–build industry and discourages quality teams from participating.”In another publication by DBIA (1995),it is also stated that “it is strongly recommended that honorariums be offered to the unsuc-cessful proposers”and that “the provision of reasonable compen-sation will encourage the more sought-after design–build teams to apply and,if short listed,to make an extra effort in the prepara-tion of their proposal.”Whereas bid preparation costs depend on project scale,delivery method,and other factors,the cost of pre-paring a proposal is often relatively high in some particular project delivery schemes,such as design–build or build–operate–transfer (BOT )contracting.Plus,costly bid preparation often im-plying a large project scale,the issue of bid compensation strat-egy should be important to practitioners and of great interest of study.Existing research on the procurement process in constructionhas addressed the selection of projects that are appropriate for certain project delivery methods (Molenaar and Songer 1998;Molenaar and Gransberg 2001),the design–build project procure-ment processes (Songer et al.1994;Gransberg and Senadheera 1999;Palaneeswaran and Kumaraswamy 2000),and the BOT project procurement process (United Nations Industrial Develop-ment Organization 1996).However,the bid compensation strat-egy for projects with a relatively high bid preparation cost has not been studied.Among the issues over the bidder’s response to the owner’s procurement or bid compensation strategy,it is in own-er’s interest to understand how the owner can stimulate high-quality inputs or extra effort from the bidder during bid prepara-tion.Whereas the argument for using bid compensation is intuitively sound,there is no theoretical basis or empirical evi-dence for such an argument.Therefore,it is crucial to study under what conditions the bid compensation is effective,and how much compensation is adequate with respect to different bidding situa-tions.This paper focuses on theoretically studying the impacts of bid compensation and tries to develop appropriate compensation strategies for projects with a costly bid preparation.Game theory will be applied to analyze the behavioral dynamics between com-peting bidders.Based on the game theoretic analysis and numeric trials,a bid compensation model is developed.The model pro-vides a quantitative framework,as well as qualitative implica-tions,on bid compensation strategies.Research Methodology:Game TheoryGame theory can be defined as “the study of mathematical models of conflict and cooperation between intelligent rational decision-makers”(Myerson 1991).Among economic theories,game theory has been successfully applied to many important issues such as negotiations,finance,and imperfect markets.Game theory has also been applied to construction management in two areas.Ho (2001)applied game theory to analyze the information asymme-try problem during the procurement of a BOT project and its1Assistant Professor,Dept.of Civil Engineering,National Taiwan Univ.,Taipei 10617,Taiwan.E-mail:spingho@.twNote.Discussion open until July 1,2005.Separate discussions must be submitted for individual papers.To extend the closing date by one month,a written request must be filed with the ASCE Managing Editor.The manuscript for this paper was submitted for review and possible publication on March 5,2003;approved on March 1,2004.This paper is part of the Journal of Construction Engineering and Management ,V ol.131,No.2,February 1,2005.©ASCE,ISSN 0733-9364/2005/2-151–159/$25.00.D o w n l o a d e d f r o m a s c e l i b r a r y .o r g b y N A N J I N G U N I VE R S I T Y OF o n 01/06/14. C o p y r i g h t A S C E . F o r p e r s o n a l u s e o n l y ; a l l r i g h t s r e s e r v e d .implication in project financing and government policy.Ho and Liu (2004)develop a game theoretic model for analyzing the behavioral dynamics of builders and owners in construction claims.In competitive bidding,the strategic interactions among competing bidders and that between bidders and owners are com-mon,and thus game theory is a natural tool to analyze the prob-lem of concern.A well-known example of a game is the “prisoner’s dilemma”shown in Fig.1.Two suspects are arrested and held in separate cells.If both of them confess,then they will be sentenced to jail for 6years.If neither confesses,each will be sentenced for only 1year.However,if one of them confesses and the other does not,then the honest one will be rewarded by being released (in jail for 0year )and the other will be punished for 9years in jail.Note that in each cell,the first number represents player No.1’s payoff and the second one represents player No.2’s.The prisoner’s dilemma is called a “static game,”in which they act simultaneously;i.e.,each player does not know the other player’s decision before the player makes the decision.If the payoff matrix shown in Fig.1is known to all players,then the payoff matrix is a “common knowledge”to all players and this game is called a game of “complete information.”Note that the players of a game are assumed to be rational;i.e.,to maximize their payoffs.To answer what each prisoner will play/behave in this game,we will introduce the concept of “Nash equilibrium ,”one of the most important concepts in game theory.Nash equilibrium is a set of actions that will be chosen by each player.In a Nash equilib-rium,each player’s strategy should be the best response to the other player’s strategy,and no player wants to deviate from the equilibrium solution.Thus,the equilibrium or solution is “strate-gically stable”or “self-enforcing”(Gibbons 1992).Conversely,a nonequilibrium solution is not stable since at least one of the players can be better off by deviating from the nonequilibrium solution.In the prisoner’s dilemma,only the (confess,confess )solution where both players choose to confess,satisfies the stabil-ity test or requirement of Nash equilibrium.Note that although the (not confess,not confess )solution seems better off for both players compared to Nash equilibrium;however,this solution is unstable since either player can obtain extra benefit by deviating from this solution.Interested readers can refer to Gibbons (1992),Fudenberg and Tirole (1992),and Myerson (1991).Bid Compensation ModelIn this section,the bid compensation model is developed on the basis of game theoretic analysis.The model could help the ownerform bid compensation strategies under various competition situ-ations and project characteristics.Illustrative examples with nu-merical results are given when necessary to show how the model can be used in various scenarios.Assumptions and Model SetupTo perform a game theoretic study,it is critical to make necessary simplifications so that one can focus on the issues of concern and obtain insightful results.Then,the setup of a model will follow.The assumptions made in this model are summarized as follows.Note that these assumptions can be relaxed in future studies for more general purposes.1.Average bidders:The bidders are equally good,in terms oftheir technical and managerial capabilities.Since the design–build and BOT focus on quality issues,the prequalification process imposed during procurement reduces the variation of the quality of bidders.As a result,it is not unreasonable to make the “average bidders”assumption.plete information:If all players consider each other tobe an average bidder as suggested in the first assumption,it is natural to assume that the payoffs of each player in each potential solution are known to all players.3.Bid compensation for the second best bidder:Since DBIA’s(1996b )manual,document number 103,suggests that “the stipend is paid only to the most highly ranked unsuccessful offerors to prevent proposals being submitted simply to ob-tain a stipend,”we shall assume that the bid compensation will be offered to the second best bidder.4.Two levels of efforts:It is assumed that there are two levelsof efforts in preparing a proposal,high and average,denoted by H and A ,respectively.The effort A is defined as the level of effort that does not incur extra cost to improve quality.Contrarily,the effort H is defined as the level of effort that will incur extra cost,denoted as E ,to improve the quality of a proposal,where the improvement is detectable by an effec-tive proposal evaluation system.Typically,the standard of quality would be transformed to the evaluation criteria and their respective weights specified in the Request for Pro-posal.5.Fixed amount of bid compensation,S :The fixed amount canbe expressed by a certain percentage of the average profit,denoted as P ,assumed during the procurement by an average bidder.6.Absorption of extra cost,E :For convenience,it is assumedthat E will not be included in the bid price so that the high effort bidder will win the contract under the price–quality competition,such as best-value approach.This assumption simplifies the tradeoff between quality improvement and bid price increase.Two-Bidder GameIn this game,there are only two qualified bidders.The possible payoffs for each bidder in the game are shown in a normal form in Fig.2.If both bidders choose “H ,”denoted by ͑H ,H ͒,both bidders will have a 50%probability of wining the contract,and at the same time,have another 50%probability of losing the con-tract but being rewarded with the bid compensation,S .As a re-sult,the expected payoffs for the bidders in ͑H ,H ͒solution are ͑S /2+P /2−E ,S /2+P /2−E ͒.Note that the computation of the expected payoff is based on the assumption of the average bidder.Similarly,if the bidders choose ͑A ,A ͒,the expected payoffswillFig.1.Prisoner’s dilemmaD o w n l o a d e d f r o m a s c e l i b r a r y .o r g b y N A N J I N G U N I VE R S I T Y OF o n 01/06/14. C o p y r i g h t A S C E . F o r p e r s o n a l u s e o n l y ; a l l r i g h t s r e s e r v e d .be ͑S /2+P /2,S /2+P /2͒.If the bidders choose ͑H ,A ͒,bidder No.1will have a 100%probability of winning the contract,and thus the expected payoffs are ͑P −E ,S ͒.Similarly,if the bidders choose ͑A ,H ͒,the expected payoffs will be ͑S ,P −E ͒.Payoffs of an n -bidder game can be obtained by the same reasoning.Nash EquilibriumSince the payoffs in each equilibrium are expressed as functions of S ,P ,and E ,instead of a particular number,the model will focus on the conditions for each possible Nash equilibrium of the game.Here,the approach to solving for Nash equilibrium is to find conditions that ensure the stability or self-enforcing require-ment of Nash equilibrium.This technique will be applied throughout this paper.First,check the payoffs of ͑H ,H ͒solution.For bidder No.1or 2not to deviate from this solution,we must haveS /2+P /2−E ϾS →S ϽP −2E͑1͒Therefore,condition (1)guarantees ͑H ,H ͒to be a Nash equilib-rium.Second,check the payoffs of ͑A ,A ͒solution.For bidder No.1or 2not to deviate from ͑A ,A ͒,condition (2)must be satisfiedS /2+P /2ϾP −E →S ϾP −2E͑2͒Thus,condition (2)guarantees ͑A ,A ͒to be a Nash equilibrium.Note that the condition “S =P −2E ”will be ignored since the con-dition can become (1)or (2)by adding or subtracting an infinitely small positive number.Thus,since S must satisfy either condition (1)or condition (2),either ͑H ,H ͒or ͑A ,A ͒must be a unique Nash equilibrium.Third,check the payoffs of ͑H ,A ͒solution.For bid-der No.1not to deviate from H to A ,we must have P −E ϾS /2+P /2;i.e.,S ϽP −2E .For bidder No.2not to deviate from A to H ,we must have S ϾS /2+P /2−E ;i.e.,S ϾP −2E .Since S cannot be greater than and less than P −2E at the same time,͑H ,A ͒solution cannot exist.Similarly,͑A ,H ͒solution cannot exist either.This also confirms the previous conclusion that either ͑H ,H ͒or ͑A ,A ͒must be a unique Nash equilibrium.Impacts of Bid CompensationBid compensation is designed to serve as an incentive to induce bidders to make high effort.Therefore,the concerns of bid com-pensation strategy should focus on whether S can induce high effort and how effective it is.According to the equilibrium solu-tions,the bid compensation decision should depend on the mag-nitude of P −2E or the relative magnitude of E compared to P .If E is relatively small such that P Ͼ2E ,then P −2E will be positive and condition (1)will be satisfied even when S =0.This means that bid compensation is not an incentive for high effort when the extra cost of high effort is relatively low.Moreover,surprisingly,S can be damaging when S is high enough such that S ϾP −2E .On the other hand,if E is relatively large so that P −2E is negative,then condition (2)will always be satisfied since S can-not be negative.In this case,͑A ,A ͒will be a unique Nash equi-librium.In other words,when E is relatively large,it is not in the bidder’s interest to incur extra cost for improving the quality of proposal,and therefore,S cannot provide any incentives for high effort.To summarize,when E is relatively low,it is in the bidder’s interest to make high effort even if there is no bid compensation.When E is relatively high,the bidder will be better off by making average effort.In other words,bid compensation cannot promote extra effort in a two-bidder game,and ironically,bid compensa-tion may discourage high effort if the compensation is too much.Thus,in the two-bidder procurement,the owner should not use bid compensation as an incentive to induce high effort.Three-Bidder GameNash EquilibriumFig.3shows all the combinations of actions and their respective payoffs in a three-bidder game.Similar to the two-bidder game,here the Nash equilibrium can be solved by ensuring the stability of the solution.For equilibrium ͑H ,H ,H ͒,condition (3)must be satisfied for stability requirementS /3+P /3−E Ͼ0→S Ͼ3E −P͑3͒For equilibrium ͑A ,A ,A ͒,condition (4)must be satisfied so that no one has any incentives to choose HS /3+P /3ϾP −E →S Ͼ2P −3E͑4͒In a three-bidder game,it is possible that S will satisfy conditions (3)and (4)at the same time.This is different from the two-bidder game,where S can only satisfy either condition (1)or (2).Thus,there will be two pure strategy Nash equilibria when S satisfies conditions (3)and (4).However,since the payoff of ͑A ,A ,A ͒,S /3+P /3,is greater than the payoff of ͑H ,H ,H ͒,S /3+P /3−E ,for all bidders,the bidder will choose ͑A ,A ,A ͒eventually,pro-vided that a consensus between bidders of making effort A can be reached.The process of reaching such consensus is called “cheap talk,”where the agreement is beneficial to all players,and no player will want to deviate from such an agreement.In the design–build or BOT procurement,it is reasonable to believe that cheap talk can occur.Therefore,as long as condition (4)is satis-fied,͑A ,A ,A ͒will be a unique Nash equilibrium.An important implication is that the cheap talk condition must not be satisfied for any equilibrium solution other than ͑A ,A ,A ͒.In other words,condition (5)must be satisfied for all equilibrium solution except ͑A ,A ,A͒Fig.2.Two-biddergameFig.3.Three-bidder gameD o w n l o a d e d f r o m a s c e l i b r a r y .o r g b y N A N J I N G U N I VE R S I T Y OF o n 01/06/14. C o p y r i g h t A S C E . F o r p e r s o n a l u s e o n l y ; a l l r i g h t s r e s e r v e d .S Ͻ2P −3E ͑5͒Following this result,for ͑H ,H ,H ͒to be unique,conditions (3)and (5)must be satisfied;i.e.,we must have3E −P ϽS Ͻ2P −3E͑6͒Note that by definition S is a non-negative number;thus,if one cannot find a non-negative number to satisfy the equilibrium con-dition,then the respective equilibrium does not exist and the equi-librium condition will be marked as “N/A”in the illustrative fig-ures and tables.Next,check the solution where two bidders make high efforts and one bidder makes average effort,e.g.,͑H ,H ,A ͒.The ex-pected payoffs for ͑H ,H ,A ͒are ͑S /2+P /2−E ,S /2+P /2−E ,0͒.For ͑H ,H ,A ͒to be a Nash equilibrium,S /3+P /3−E Ͻ0must be satisfied so that the bidder with average effort will not deviate from A to H ,S /2+P /2−E ϾS /2must be satisfied so that the bidder with high effort will not deviate from H to A ,and condi-tion (5)must be satisfied as argued previously.The three condi-tions can be rewritten asS Ͻmin ͓3E −P ,2P −3E ͔andP −2E Ͼ0͑7͒Note that because of the average bidder assumption,if ͑H ,H ,A ͒is a Nash equilibrium,then ͑H ,A ,H ͒and ͑A ,H ,H ͒will also be the Nash equilibria.The three Nash equilibria will constitute a so-called mixed strategy Nash equilibrium,denoted by 2H +1A ,where each bidder randomizes actions between H and A with certain probabilities.The concept of mixed strategy Nash equilib-rium shall be explained in more detail in next section.Similarly,we can obtain the requirements for solution 1H +2A ,condition (5)and S /2+P /2−E ϽS /2must be satisfied.The requirements can be reorganized asS Ͻ2P −3EandP −2E Ͻ0͑8͒Note that the conflicting relationship between “P −2E Ͼ0”in condition (7)and “P −2E Ͻ0”in condition (8)seems to show that the two types of Nash equilibria are exclusive.Nevertheless,the only difference between 2H +1A and 1H +2A is that the bidder in 2H +1A equilibrium has a higher probability of playing H ,whereas the bidder in 1H +2A also mixes actions H and A but with lower probability of playing H .From this perspective,the difference between 2H +1A and 1H +2A is not very distinctive.In other words,one should not consider,for example,2H +1A ,to be two bidders playing H and one bidder playing A ;instead,one should consider each bidder to be playing H with higher probabil-ity.Similarly,1H +2A means that the bidder has a lower probabil-ity of playing H ,compared to 2H +1A .Illustrative Example:Effectiveness of Bid Compensation The equilibrium conditions for a three-bidder game is numerically illustrated and shown in Table 1,where P is arbitrarily assumed as 10%for numerical computation purposes and E varies to rep-resent different costs for higher efforts.The “*”in Table 1indi-cates that the zero compensation is the best strategy;i.e.,bid compensation is ineffective in terms of stimulating extra effort.According to the numerical results,Table 1shows that bid com-pensation can promote higher effort only when E is within the range of P /3ϽE ϽP /2,where zero compensation is not neces-sarily the best strategy.The question is that whether it is benefi-cial to the owner by incurring the cost of bid compensation when P /3ϽE ϽP /2.The answer to this question lies in the concept and definition of the mix strategy Nash equilibrium,2H +1A ,as explained previously.Since 2H +1A indicates that each bidderwill play H with significantly higher probability,2H +1A may already be good enough,knowing that we only need one bidder out of three to actually play H .We shall elaborate on this concept later in a more general setting.As a result,if the 2H +1A equilib-rium is good enough,the use of bid compensation in a three-bidder game will not be recommended.Four-Bidder Game and n-Bidder GameNash Equilibrium of Four-Bidder GameThe equilibrium of the four-bidder procurement can also be ob-tained.As the number of bidders increases,the number of poten-tial equilibria increases as well.Due to the length limitation,we shall only show the major equilibria and their conditions,which are derived following the same technique applied previously.The condition for pure strategy equilibrium 4H ,is4E −P ϽS Ͻ3P −4E͑9͒The condition for another pure strategy equilibrium,4A ,isS Ͼ3P −4E͑10͒Other potential equilibria are mainly mixed strategies,such as 3H +1A ,2H +2A ,and 1H +3A ,where the numeric number asso-ciated with H or A represents the number of bidders with effort H or A in a equilibrium.The condition for the 3H +1A equilibrium is3E −P ϽS Ͻmin ͓4E −P ,3P −4E ͔͑11͒For the 2H +2A equilibrium the condition is6E −3P ϽS Ͻmin ͓3E −P ,3P −4E ͔͑12͒The condition for the 1H +3A equilibrium isS Ͻmin ͓6E −3P ,3P −4E ͔͑13͒Illustrative Example of Four-Bidder GameTable 2numerically illustrates the impacts of bid compensation on the four-bidder procurement under different relative magni-tudes of E .When E is very small,bid compensation is not needed for promoting effort H .However,when E grows gradually,bid compensation becomes more effective.As E grows to a larger magnitude,greater than P /2,the 4H equilibrium would become impossible,no matter how large S is.In fact,if S is too large,bidders will be encouraged to take effort A .When E is extremely large,e.g.,E Ͼ0.6P ,the best strategy is to set S =0.The “*”in Table 2also indicates the cases that bid compensation is ineffec-Table pensation Impacts on a Three-Bidder GameEquilibriumE ;P =10%3H 2H +1A 1H +2A 3A E ϽP /3e.g.,E =2%S Ͻ14%*N/A N/N 14%ϽS P /3ϽE ϽP /2e.g.,E =4%2%ϽS Ͻ8%S Ͻ2%N/A 8%ϽS P /2ϽE Ͻ͑2/3͒P e.g.,E =5.5%N/AN/AS Ͻ3.5%*3.5%ϽS͑2/3͒P ϽEe.g.,E =7%N/A N/A N/A Always*Note:*denotes that zero compensation is the best strategy;and N/A =the respective equilibrium does not exist.D o w n l o a d e d f r o m a s c e l i b r a r y .o r g b y N A N J I N G U N I VE R S I T Y OF o n 01/06/14. C o p y r i g h t A S C E . F o r p e r s o n a l u s e o n l y ; a l l r i g h t s r e s e r v e d .tive.To conclude,in a four-bidder procurement,bid compensation is not effective when E is relatively small or large.Again,similar to the three-bidder game,when bid compensation becomes more effective,it does not mean that offering bid compensation is the best strategy,since more variables need to be considered.Further analysis shall be performed later.Nash Equilibrium of n -Bidder GameIt is desirable to generalize our model to the n -bidder game,al-though only very limited qualified bidders will be involved in most design–build or BOT procurements,since for other project delivery methods it is possible to have many bidders.Interested readers can follow the numerical illustrations for three-and four-bidder games to obtain the numerical solutions of n -bidder game.Here,only analytical equilibrium solutions will be solved.For “nA ”to be the Nash equilibrium,we must have P −E ϽS /n +P /n for bidder A not to deviate.In other words,condition (14)must be satisfiedS Ͼ͑n −1͒P −nE͑14͒Note that condition (14)can be rewritten as S Ͼn ͑P −E ͒−P ,which implies that it is not likely for nA to be the Nash equilib-rium when there are many bidders,unless E is very close to or larger than P .Similar to previous analysis,for “nH ”to be the equilibrium,we must have S /n +P /n −E Ͼ0for stability requirement,and condition (15)for excluding the possibility of cheap talk or nA equilibrium.The condition for the nH equilibrium can be reorga-nized as condition (16).S Ͻ͑n −1͒P −nE ͑15͒nE −P ϽS Ͻ͑n −1͒P −nE͑16͒Note that if E ϽP /n ,condition (16)will always be satisfied and nH will be a unique equilibrium even when S =0.In other words,nH will not be the Nash equilibrium when there are many bidders,unless E is extremely small,i.e.,E ϽP /n .For “aH +͑n −a ͒A ,where 2Ͻa Ͻn ”to be the equilibrium so-lution,we must have S /a +P /a −E Ͼ0for bidder H not to devi-ate,S /͑a +1͒+P /͑a +1͒−E Ͻ0for bidder A not to deviate,and condition (15).These requirements can be rewritten asaE −P ϽS Ͻmin ͓͑a +1͒E −P ,͑n −1͒P −nE ͔͑17͒Similarly,for “2H +͑n −2͒A ,”the stability requirements for bidder H and A are S /͑n −1͒ϽS /2+P /2−E and S /3+P /3−E Ͻ0,re-spectively,and thus the equilibrium condition can be written as ͓͑n −1͒/͑n −3͔͒͑2E −P ͒ϽS Ͻmin ͓3E −P ,͑n −1͒P −nE ͔͑18͒For the “1H +͑n −1͒A ”equilibrium,we must haveS Ͻmin ͕͓͑n −1͒/͑n −3͔͒͑2E −P ͒,͑n −1͒P −nE ͖͑19͒An interesting question is:“What conditions would warrant that the only possible equilibrium of the game is either “1H +͑n −1͒A ”or nA ,no matter how large S is?”A logical response to the question is:when equilibria “aH +͑n −a ͒A ,where a Ͼ2”and equilibrium 2H +͑n −2͒A are not possible solutions.Thus,a suf-ficient condition here is that for any S Ͼ͓͑n −1͒/͑n −3͔͒͑2E −P ͒,the “S Ͻ͑n −1͒P −nE ”is not satisfied.This can be guaranteed if we have͑n −1͒P −nE Ͻ͓͑n −1͒/͑n −3͔͒͑2E −P ͒→E Ͼ͓͑n −1͒/͑n +1͔͒P͑20͒Conditions (19)and (20)show that when E is greater than ͓͑n −1͒/͑n +1͔͒P ,the only possible equilibrium of the game is either 1H +͑n −1͒A or nA ,no matter how large S is.Two important practical implications can be drawn from this finding.First,when n is small in a design–build contract,it is not unusual that E will be greater than ͓͑n −1͒/͑n +1͔͒P ,and in that case,bid compensa-tion cannot help to promote higher effort.For example,for a three-bidder procurement,bid compensation will not be effective when E is greater than ͑2/4͒P .Second,when the number of bidders increases,bid compensation will become more effective since it will be more unlikely that E is greater than ͓͑n −1͒/͑n +1͔͒P .The two implications confirm the previous analyses of two-,three-,and four-bidder game.After the game equilibria and the effective range of bid compensation have been solved,the next important task is to develop the bid compensation strategy with respect to various procurement situations.Table pensation Impacts on a Four-Bidder GameEquilibriumE ;P =10%4H 3H +1A 2H +2A 1H +3A 4A E ϽP /4e.g.,E =2%S Ͻ22%*N/A N/A N/A S Ͼ22%P /4ϽE ϽP /3e.g.,E =3%2%ϽS Ͻ18%S Ͻ2%N/A N/A S Ͼ18%P /3ϽE ϽP /2e.g.,E =4%6%ϽS Ͻ14%2%ϽS Ͻ6%S Ͻ2%N/A S Ͼ14%P /2ϽE Ͻ͑3/5͒P e.g.,E =5.5%N/A 6.5%ϽS Ͻ8%3%ϽS Ͻ6.5%S Ͻ3%S Ͼ8%͑3/5͒P ϽE Ͻ͑3/4͒P e.g.,E =6.5%N/AN/AN/AS Ͻ4%*S Ͼ4%͑3/4͒P ϽEe.g.,E =8%N/A N/A N/A N/AAlways*Note:*denotes that zero compensation is the best strategy;and N/A=respective equilibrium does not exist.D o w n l o a d e d f r o m a s c e l i b r a r y .o r g b y N A N J I N G U N I VE R S I T Y OF o n 01/06/14. C o p y r i g h t A S C E . F o r p e r s o n a l u s e o n l y ; a l l r i g h t s r e s e r v e d .。
毕业设计外文文献翻译
毕业设计外文文献翻译Graduation design of foreign literature translation 700 words Title: The Impact of Artificial Intelligence on the Job Market Abstract:With the rapid development of artificial intelligence (AI), concerns arise about its impact on the job market. This paper explores the potential effects of AI on various industries, including healthcare, manufacturing, and transportation, and the implications for employment. The findings suggest that while AI has the potential to automate repetitive tasks and increase productivity, it may also lead to job displacement and a shift in job requirements. The paper concludes with a discussion on the importance of upskilling and retraining for workers to adapt to the changing job market.1. IntroductionArtificial intelligence (AI) refers to the development of computer systems that can perform tasks that typically require human intelligence. AI has made significant advancements in recent years, with applications in various industries, such as healthcare, manufacturing, and transportation. As AI technology continues to evolve, concerns arise about its impact on the job market. This paper aims to explore the potential effects of AI on employment and discuss the implications for workers.2. Potential Effects of AI on the Job Market2.1 Automation of Repetitive TasksOne of the major impacts of AI on the job market is the automation of repetitive tasks. AI systems can perform tasks faster and moreaccurately than humans, particularly in industries that involve routine and predictable tasks, such as manufacturing and data entry. This automation has the potential to increase productivity and efficiency, but also poses a risk to jobs that can be easily replicated by AI.2.2 Job DisplacementAnother potential effect of AI on the job market is job displacement. As AI systems become more sophisticated and capable of performing complex tasks, there is a possibility that workers may be replaced by machines. This is particularly evident in industries such as transportation, where autonomous vehicles may replace human drivers, and customer service, where chatbots can handle customer inquiries. While job displacement may lead to short-term unemployment, it also creates opportunities for new jobs in industries related to AI.2.3 Shifting Job RequirementsWith the introduction of AI, job requirements are expected to shift. While AI may automate certain tasks, it also creates a demand for workers with the knowledge and skills to develop and maintain AI systems. This shift in job requirements may require workers to adapt and learn new skills to remain competitive in the job market.3. Implications for EmploymentThe impact of AI on employment is complex and multifaceted. On one hand, AI has the potential to increase productivity, create new jobs, and improve overall economic growth. On the other hand, it may lead to job displacement and a shift in job requirements. To mitigate the negative effects of AI on employment, it is essentialfor workers to upskill and retrain themselves to meet the changing demands of the job market.4. ConclusionIn conclusion, the rapid development of AI has significant implications for the job market. While AI has the potential to automate repetitive tasks and increase productivity, it may also lead to job displacement and a shift in job requirements. To adapt to the changing job market, workers should focus on upskilling and continuous learning to remain competitive. Overall, the impact of AI on employment will depend on how it is integrated into various industries and how workers and policymakers respond to these changes.。
毕业设计外文翻译例文分析解析
大连科技学院毕业设计(论文)外文翻译学生姓名专业班级指导教师职称所在单位教研室主任完毕日期 2016年4月15日Translation EquivalenceDespite the fact that the world is becoming a global village, translation remains a major way for languages and cultures to interact and influence each other. And name translation, especially government name translation, occupies a quite significant place in international exchange.Translation is the communication of the meaning of a source-language text by means of an equivalent target-language text. While interpreting—the facilitating of oral or sign-language communication between users of different languages—antedates writing, translation began only after the appearance of written literature. There exist partial translations of the Sumerian Epic of Gilgamesh (ca. 2023 BCE) into Southwest Asian languages of the second millennium BCE. Translators always risk inappropriate spill-over of source-language idiom and usage into the target-language translation. On the other hand, spill-overs have imported useful source-language calques and loanwords that have enriched the target languages. Indeed, translators have helped substantially to shape the languages into which they have translated. Due to the demands of business documentation consequent to the Industrial Revolution that began in the mid-18th century, some translation specialties have become formalized, with dedicated schools and professional associations. Because of the laboriousness of translation, since the 1940s engineers have sought to automate translation (machine translation) or to mechanically aid the human translator (computer-assisted translation). The rise of the Internet has fostered a world-wide market for translation servicesand has facilitated language localizationIt is generally accepted that translation, not as a separate entity, blooms into flower under such circumstances like culture, societal functions, politics and power relations. Nowadays, the field of translation studies is immersed with abundantly diversified translation standards, with no exception that some of them are presented by renowned figures and are rather authoritative. In the translation practice, however, how should we select the so-called translation standards to serve as our guidelines in the translation process and how should we adopt the translation standards to evaluate a translation product?In the macro - context of flourish of linguistic theories, theorists in the translation circle, keep to the golden law of the principle of equivalence. The theory of Translation Equivalence is the central issue in western translation theories. And the presentation of this theory gives great impetus to the development and improvement of translation theory. It’s not diffi cult for us to discover that it is the theory of Translation Equivalence that serves as guidelines in government name translation in China. Name translation, as defined, is the replacement of the name in the source language by an equivalent name or other words in the target language. Translating Chinese government names into English, similarly, is replacing the Chinese government name with an equivalent in English.Metaphorically speaking, translation is often described as a moving trajectory going from A to B along a path or a container to carry something across from A to B. This view is commonly held by both translation practitioners and theorists in the West. In this view, theydo not expect that this trajectory or something will change its identity as it moves or as it is carried. In China, to translate is also understood by many people normally as “to translate the whole text sentence by sentence and paragraph by paragraph, without any omission, addition, or other changes. In both views, the source text and the target text must be “the same”. This helps explain the etymological source for the term “translation equivalence”. It is in essence a word which describes the relationship between the ST and the TT.Equivalence means the state or fact or property of being equivalent. It is widely used in several scientific fields such as chemistry and mathematics. Therefore, it comes to have a strong scientific meaning that is rather absolute and concise. Influenced by this, translation equivalence also comes to have an absolute denotation though it was first applied in translation study as a general word. From a linguistic point of view, it can be divided into three sub-types, i.e., formal equivalence, semantic equivalence, and pragmatic equivalence. In actual translation, it frequently happens that they cannot be obtained at the same time, thus forming a kind of relative translation equivalence in terms of quality. In terms of quantity, sometimes the ST and TT are not equivalent too. Absolute translation equivalence both in quality and quantity, even though obtainable, is limited to a few cases.The following is a brief discussion of translation equivalence study conducted by three influential western scholars, Eugene Nida, Andrew Chesterman and Peter Newmark. It’s expected that their studies can instruct GNT study in China and provide translators with insightful methods.Nida’s definition of translation is: “Translation consists in reproducing in the receptor language the closest natural equivalent of the source language message, first in terms of meaning and secondly in terms of style.” It i s a replacement of textual material in one language〔SL〕by equivalent textual material in another language(TL). The translator must strive for equivalence rather than identity. In a sense, this is just another way of emphasizing the reproducing of the message rather than the conservation of the form of the utterance. The message in the receptor language should match as closely as possible the different elements in the source language to reproduce as literally and meaningfully as possible the form and content of the original. Translation equivalence is an empirical phenomenon discovered by comparing SL and TL texts and it’s a useful operational concept like the term “unit of translati on”.Nida argues that there are two different types of equivalence, namely formal equivalence and dynamic equivalence. Formal correspondence focuses attention on the message itself, in both form and content, whereas dynamic equivalence is based upon “the principle of equivalent effect”.Formal correspondence consists of a TL item which represents the closest equivalent of a ST word or phrase. Nida and Taber make it clear that there are not always formal equivalents between language pairs. Therefore, formal equivalents should be used wherever possible if the translation aims at achieving formal rather than dynamic equivalence. The use of formal equivalents might at times have serious implications in the TT since the translation will not beeasily understood by the target readership. According to Nida and Taber, formal correspondence distorts the grammatical and stylistic patterns of the receptor language, and hence distorts the message, so as to cause the receptor to misunderstand or to labor unduly hard.Dyn amic equivalence is based on what Nida calls “the principle of equivalent effect” where the relationship between receptor and message should be substantially the same as that which existed between the original receptors and the message. The message has to be modified to the receptor’s linguistic needs and cultural expectation and aims at complete naturalness of expression. Naturalness is a key requirement for Nida. He defines the goal of dynamic equivalence as seeking the closest natural equivalent to the SL message. This receptor-oriented approach considers adaptations of grammar, of lexicon and of cultural references to be essential in order to achieve naturalness; the TL should not show interference from the SL, and the ‘foreignness ‘of the ST setting is minimized.Nida is in favor of the application of dynamic equivalence, as a more effective translation procedure. Thus, the product of the translation process, that is the text in the TL, must have the same impact on the different readers it was addressing. Only in Nida and Taber's edition is it clearly stated that dynamic equivalence in translation is far more than mere correct communication of information.As Andrew Chesterman points out in his recent book Memes of Translation, equivalence is one of the five element of translation theory, standing shoulder to shoulder withsource-target, untranslatability, free-vs-literal, All-writing-is-translating in importance. Pragmatically speaking, observed Chesterman, “the only true examples of equivalence (i.e., absolute equivalence) are those in which an ST item X is invariably translated into a given TL as Y, and vice versa. Typical examples would be words denoting numbers (with the exception of contexts in which they have culture-bound connotations, such as “magic” or “unlucky”), certain technical terms (oxygen, molecule) and the like. From this point of view, the only true test of equivalence would be invariable back-translation. This, of course, is unlikely to occur except in the case of a small set of lexical items, or perhaps simple isolated syntactic structure”.Peter Newmark. Departing from Nida’s receptor-oriented line, Newmark argues that the success of equivalent effect is “illusory “and that the conflict of loyalties and the gap between emphasis on source and target language will always remain as the overriding problem in translation theory and practice. He suggests narrowing the gap by replacing the old terms with those of semantic and communicative translation. The former attempts to render, as closely as the semantic and syntactic structures of the second language allow, the exact contextual meaning of the original, while the latter “attempts to produce on its readers an effect as close as possible to that obtained on the readers of the original.” Newmark’s description of communicative translation resembles Nida’s dynamic equivalence in the effect it is trying to create on the TT reader, while semantic translation has similarities to Nida’s formal equivalence.Meanwhile, Newmark points out that only by combining both semantic and communicative translation can we achieve the goal of keeping the ‘spirit’ of the original. Semantic translation requires the translator retain the aesthetic value of the original, trying his best to keep the linguistic feature and characteristic style of the author. According to semantic translation, the translator should always retain the semantic and syntactic structures of the original. Deletion and abridgement lead to distortion of the author’s intention and his writing style.翻译对等尽管全世界正在渐渐成为一种地球村,但翻译仍然是语言和和文化之间旳交流互动和互相影响旳重要方式之一。
毕业设计外文翻译(原文)
编号:毕业设计(论文)外文翻译(原文)学院:专业:学生姓名:学号:指导教师单位:姓名:职称:2013年5月30 日This report includes a development presentation of an information system for managing the staff data within a small company or organization. The system as such as it has been developed is called Employee Management System. It consists of functionally related GUI (application program) and database.The choice of the programming tools is individual and particular.KeywordsInformation system, Database system, DBMS, parent table, child table, table fields, primary key, foreign key, relationship, sql queries, objects, classes, controls.1. Introduction (1)1.1 Background (1)1.2 Problem Statement (2)1.3 Problem Discussion (2)1.4 Report Overview (2)2. Problem’s Solution (2)2.1 Method (2)2.2 Programming Environments (3)2.3 Database Analyzing, design and implementation (7)2.4 Program’s Structure Analyzing and GUI Constructing (9)2.5 Database Connections and Code-Implementation (12)2.5.1 Retrieving data from the database (16)2.5.2 Saving data into the database (19)2.5.3 Updating records into the database (22)2.5.4 Deleting data from the database (24)3. Conclusion (25)4. References (26)1. IntroductionThis chapter gives a brief theoretical preview upon the database information systems and goes through the essence of the problem that should be resolved.1.1 BackgroundMost of the contemporary Information systems are based on the Database technology as a collection of logically related data, and DBMS as a software system allowing the users to define, create, maintain and control access to the database.The process of constructing such kind of systems is not so simple. It involves a mutual development of application program and database. The application program is actually the bridge between the users and the database, where the data is stored. Thus, the well-developed application program and database are very important for the reliability, flexibility and functionality of the system.The so defined systems differentiate to each other and their development comprises a great variety of tasks to be resolved and implemented.The basic idea can be depicted on Figure 1.1 below:Information system suggests a computer technology to be used in order to provide information to users in an organization (for instance), as for the purposes of data transformation into useful information; computer hardware and software are designed and used [2].A particular case is the Human Resources Information System development. This kind of systems are responsible for storing data of the staff within an organization and generating reports upon request.Such kind of system could be integrated with other Information systems or modules:Accounting Information System (AIS) – designed to transform financial data into information, or Management Information System (MIS) that provides decision-oriented information to managers, and so on…“Organizations depend on Information Systems in order to stay competitive. Productivi ty, which is crucial to staying competitive, can be increased through better Information Systems.”[2].1.2 Problem StatementThis report’s documentation goes through the whole process of both application program and database development. It also comprises the development tools have been utilized for these purposes.1.3 Problem DiscussionThis system should consist of an application program, on one hand, and a database (repository of data) on the other. The program should perform the basic operations upon the database as retrieving, inserting, updating and deleting data. Any additional functionality is a goal of a further module development.It is a kind of strategy to start the development from designing and constructing the database, as this structure will determine the further structure of the application program.The logical database model (tables, their content and the relationships between them) should respond to the given task and cover the basic requirements.The Interface of the program should be user-friendly, and the program should be as easy for use as it is possible.Both controls and forms should logically and functionally be related within the program and fully respond to the structure of the database.Another problem is establishing the connections with the database, every time, when a query is needed to be performed upon it. Exception-handling should also be taken into an account during the system’s development due to eventual exceptions that may occur.1.4 Report OverviewThe next chapter and its subsections will turn the attention to the method for resolving the problem, the programming environments used for developing the system and the implementation of the operations performed upon the database.2. Problem’s SolutionThis chapter involves some subsections that concern the basic scheme of resolving the given task and comprise both the methods and tools of its development as well.2.1 MethodAt the very commencement, I proceeded to a decision to carry out the development of mytask into the following steps:1. Exploring the available development environments and techniques.2. Database Analyzing.3. Database design and Implementation.4. Program’s Structure Analyzing.5. GUI (Graphical User Interface) constructing.6. Bringing all the stuff together (controls data binding and functionsimplementation).7. Tests.Each one of these steps could be explained in some brief details as follows:1. Exploring the available development environments and techniquesThere is a lot of programming environments available to be used for such kind of elaborations. The point is to choose such an environment that we will be able to operate with in a convenient and easy way. This is more or less optional and individual process, that depends on the devel oper’s experience as well.2. Database AnalyzingIt concerns all of the demands, put upon the database content and its functionality. The database should be designed and implemented in a way that the user would expect it to be. 3. Database design and ImplementationThis step is tightly related with the previous one as it is completely determined by the requirements, analyzed and discussed in step2.4. Program’s Structure AnalyzingThe application program as an interface between the users and the database should be an accurate “reflection” of the database on the screen; hence a well analyzed and defined structure is needed.5. GUI ConstructingAfter analyzing the program’s structure and defining what it should consist of, a graphical representation of this stuff is needed in order to enable the user to interact with the data.6. Bringing all the stuff togetherThe next step that should be taken is connecting the program with the database and performing the necessary functionality upon all of the controls.7. TestsTo ensure that everything works properly and as it has been expected, test performance has to be done upon the system’s functionality.2.2 Programming EnvironmentsThe given task concerns a small company (organization). For instance, for the needs of a small company, we could use one set of tools, but for the needs of a larger one, it would be much better if we apply our approach by using some different, that could be more appropriate and would fit much better the requirements we have to satisfy.I decided to use the Access Database Environment as a Database Management System and C# as a programming language for developing my project.Before proceeding to the explanatory notes of how I have developed the software, I would like to take a preview upon the programming tools (environments) that have been used during this project’s development course.Database Environment: Access is a typical environment for constructingrelational databases.The database is the skeleton and the underlying framework of most of the contemporary Information Systems. The evolution of the Database systems could be divided into three phases: the Manual-filing System, the File-based systems, and the Database and the Database Management systems (DBMS).o The manual-filing system contains files of information, related to a project, product, task, client, or employee and they are usually labeled and stored inone or more cabinets. The cabinets may be located in the secure area of thebuilding, for safety. To facilitate the process of searching and to find outwhat we want, more quickly, the different types of item can be put inseparate folders and they remain logically related.Actually, the needs of the contemporary industrial world could not becovered or satisfied by using such kind of systems, and especially whatconcerns their reliability and efficiency.o Thus, we historically reach to the second phase of the Database systems evolution – the File-based systems. This kind of systems had been developedin response to the needs and demands of industry for a more efficient dataaccess [1]. The basic idea into the development of this type of systems, isthat each Department in an organization (for instance) has an access to itsown data (files) through application programs. (Figure 2.1):There are some limitations of the File-based systems:- Data Duplication: It is undesirable as it costs time and money,and takes additional storage space.- Dependency of Data: That’s a kind of inconvenience as thephysical structure and storage of the data files and records aredefined in the application code.- Data Isolation: It is some difficult to access data, isolated inseparate files.- Incompatibility of the file formats: It concerns the filestructure as a dependent on the programming language, inwhich one the application program has been developed andimplemented, as the file’s structure is embedded in theapplication program.o After taking a new and more effective approach, the Database and the Database Management System (DBMS) have been created. Most of thecontemporary systems are based on the Database technology as a collectionof logically related data and the DBMS as a software system allowing theusers to define, create, maintain and control access to the Database.The DBMS is a really powerful set of tools, enabling users to operate easily with data into a database as: Inserting, Updating, Deleting and Retrieving data. It prevents unauthorized access to the database and maintains the consistency of the stored data. The DBMS also restores the data in case of hardware or software failure and reduces the loss of data in this way.MS-Access 2000 (Microsoft Access 2000) is a contemporary development environment for dealing with databases:Access is a computerized management system with relational database. The whole information is stored in separate tables in one file. Such an information arrangement is more or less convenient as we can view, add and delete information using online forms, and search or retrieve by using queries.The term “Database” comprises collection of objects (tables, forms, pages, queries, macros) for manipulating, retrieving and storing data.It is a very good advantage that the information (data) can be populated in different tables (related to each other) and it is not necessary to store all data into one table. That leads to a less redundancy of data and reduces the required disk storage space, and speeds up processing as well. There are three relationships between the tables in a database: (one-to-many), (one-to-one) and (many-to-many).One of the mostly used relationships is the (one-to-many) type. If we have a main table (so called Parent table) and some other obedient tables (so called Child tables), then let us assume that the relationship between the parent table and the child tables is of type (one-to-many). It means that every single record from the parent table could have several records into each one of its related child tables. The tables are related by their key-values. The key into the parent table is called primary key, and the keys into its child tables are called foreign keys. The primary and the foreign key have the same unique value.These conclusions are based on a theory in [3].The main window-frame of MS-Access can be seen on Figure 1 (Appendix A).C# and the .Net Framework: For the purposes of my project I chose to work with Visual Studio of Microsoft, in particular with the C# as a programming language. My choice is based on the reliable programming environment offered by C# and the highly cleared syntax of this programming language as well. C# is a good proof for a highly developed modern technology based on the contemporary object-oriented theory in programming and lying on a very powerful, reliable and flexible platform as such as it is the .Net Framework.The main window of the Visual Studio and the .Net Framework basic architecture could be seen on Figure 2: Visual Studio main window and Figure 3: Basic architecture of .Net Framework – Appendix A, [4]:Based on [4] we can say that the .Net Framework is a development of Microsoft Corporation. In fact, a lot of efforts, time and investments have been spent on this research and development.As a class library, .Net Framework allows “cross-language” development and can be used by any .Net language to perform different kind of tasks. There are approximately 40 languages with compilers for the .Net Framework, but only some of them are supported byMicrosoft Corporation: C#, Visual Basic .Net, C++/CLI, J#, Jscript .Net, Eiffel, and some more.“. Net has several designed intentions:- Interoperability for existing code in COM libraries.- Common Runtime Engine: languages compiled to an intermediate language,Common Intermediate Language.- Language Independence: using a Common Type System that defines all possibledata-type and programming concepts supported by the CLR (Common LanguageRuntime).- Base Class Library: also known, as the Foundation Class Library is a l library oftypes available to all languages using .Net.- Simplified Installation: for the Windows Platform, due to eliminating registrysetting and dll-problems.- Security: by letting code execute in different trust levels.” [4].The language of choice – C# as an object-oriented programming language, has a procedural, object-oriented syntax based on C++. It includes some aspects and features of other programming languages as: Java, Visual Basic and Delphi.The developers of C# have emphasized on the language simplification as: fewer symbolic and decorative requirements.2.3 Database Analyzing, design and implementationThe database for the system should include information of company’s staff, respectively of its employees. The data is subdivided into the following groups:I have constructed a database that consists of six data tables. There will be one main table (parent table) and five child tables, related to each other. Patently, for this purpose the necessary primary and foreign keys should be defined into the responding tables. The so defined s tructure above is made up in conformity with the user’s needs and demands. Eachemployee of the staff is intended to have several records, responding to his Working History, Contact Person Information, Salary Information, Time Information and Holiday Information, and only one record containing his basic information within the company –his personal details as: date of birth, gender, marital status, address and phone details, and his current working record. An employee is supposed to have not only one record of his Working history, or his Contact Person Information…..For instance, if we take a look to the Time Information data table – an employee may have several records in case he has some experience within the current company. It is absolutely the same with the Salary Information, Contact Person Information and Holiday Information data tables.The relationships between the data tables are shown in Figure 4-Appendix A. In Figure 4 we can distinguish six tables that the database consists of. All of the relationships are of type: “one-to-many”. (For more details about the data tables, see Appendix A: Figure 5 - Parent data table Employee_Details and Child data tables -Figure 6, Figure 7, Figure 8, Figure 9, Figure 10).The primary key fields could be set to Auto-number data type as Access creates these values in an ascending order to ensure that they are unique within a table. Some of the fields should be “adjusted” to accept null-values. It is quite important to be done as it is tightly related to the input fields of the application program. I decided to perform it in the following way: those fields that are compulsory to be filled by the user I have set not to accept any null-values of data and on the other hand, those ones, that can be left blank, are set to accept null-values. It is easy to be performed by changing the Allow Zero Length setting (Appendix A: Figure 11 –Setting a data-field to accept null-values).It is just needed to go to the desired field that has to be set, and switch between the two optio ns, offered into the “Allow Zero Length” field. In the example, shown above, the Personal_ID_Number field is set not to allow any null-values thus its field’s length can not be zero as its value is quite essential for identifying an employee as an individual and distinctive person.That has been considered and done for a kind of convenience as the user would wish not to enter all of the data at the moment, and come back later.2.4 Program’s Structure Analyzing and GUI ConstructingAfter getting the database prepared, application program should be constructed and implemented in some programming environment to enable the users to communicate with the database.Graphical User Interface (GUI) is intended to be built up as a basic structure of the program. The fi rst general advice when constructing GUIs is to “know thy users” as there is a largenumber of rules and requirements, concerning the whole process of GUI development. Every GUI consists of certain number of controls (text-boxes, comboboxes, buttons…etc.). The list of all properties and methods for all controls is called Application Programming Interface (API). The Program’s GUI is shown in (Appendix B: Figure 1):A set of controls is used in order to reach the desired purpose, what concerns the functionality of the application, including Labels, Text boxes, Combo Boxes, Data Grid, Buttons, Group Boxes, Panels, Tab controls etc. All of these controls, available in the program, are fitted to the corresponding forms that are used in the application.The Program contains two basic forms:⏹General - used as a platform (Appendix B: Figure 2 Basic form):⏹And a second one (Appendix B: Figure 3) that is loaded onto the first (General)form.One control that is heavily used is the Label control. It is used to display text on the form.A Label-control is declared as:●Private Label label_name;And afterwards - instantiated by the initComponent method:●Label_name = new Label();For all controls, the default constructor is used as their properties are set after that.A set of Label controls is depicted on Figure 4 – Appendix B. The role of the Label is to point at the responding text field, showing what it is intended to be used for. Other set of controls, used in the program, is the set of text boxes and combo boxes, shown in Figure 5 –Appendix B. All of the text boxes and combo boxes are marked with greencoloured circle points.“Windows Forms text boxes are used to get input from the user or to display text. The TextBox control is generally used for editable text, although it can also be made read-only. Text boxes can display multiple lines, wrap text to the size of the control, and add basic formatting. The Windows Forms ComboBox control is used to display data in a drop-down combo box. By default, the ComboBox control appears in two parts: the top part is a text box that allows the user to type a list item.” [5].It can be noticed that almost all of the controls are grouped and placed on a special field (platform) and we can switch from one group to another by clicking on the responding titles - Figure 2.2:Figure 2.2 – Tab-control for switching from one set of controls to another.This control is called: tab-Control and I have used it for convenience in order to switchfrom one tab to another as every single tab consists of controls, which ones are specifically related to a data table of the database.“The Windows Forms TabControl displays multiple tabs, like dividers in a notebook or labels in a set of folders in a filing cabinet. The tabs can contain pictures and other controls. The most important property of the TabControl is TabPages, which contains the individual tabs. Each individual tab is a TabPage object. When a tab is clicked, it raises the click event for that TabPage object.” [5].In order to be able to perform different operations upon the controls and their responding data, a set of Buttons is also included in the program’s implementation -Figure 2.3:Figure 2.3 General functional buttonsOr Figure 2.4:Figure 2.4 Buttons for records operationsSome of the buttons are deliberately omitted to be shown here. The following snippet ofcode represents a normal button in the graphical interface:this.add_button.FlatStyle = System.Windows.Forms.FlatStyle.System;this.add_button.Font = new System.Drawing.Font("Arial Black", 10F,System.Drawing.FontStyle.Italic, System.Drawing.GraphicsUnit.Point,((System.Byte)(0)));this.add_button.Location = new System.Drawing.Point(24, 24);this.add_ = "add_button";this.add_button.Size = new System.Drawing.Size(128, 32);this.add_button.TabIndex = 0;this.add_button.Text = "&Add Employee";The buttons are connected to their respective Event Handlers through their click methods: this.add_button.Click += newSystem.EventHandler(this.add_button_Click);A very essential role in the program plays the dataGrid control as it is used as an interface (“bridge”) between the dataset (the buffer-table between the database and the application program) and the user, enabling a visual representation of the data,uploaded into the dataset - Figure 2.5:Figure 2.5 Dataset outer appearance“The Windows Forms DataGrid control provides a user interface to datasets, displaying tabular data and allowing for updates to the data source. When the DataGrid control is set to a valid data source, the control is automatically populated, creating columns and rows based on the shape of the data. The DataGrid control can be used to display either a single table or the hierarchical relationships between a set of tables.” [5].2.5 Database Connections and Code-ImplementationThis subsection represents the main approach that has been made up in order to establish the connections with the database:The dataGrid control could be previewed as first:// dataGrid1this.dataGrid1.CaptionText = "Employee Data";this.dataGrid1.DataMember = "";this.dataGrid1.HeaderForeColor =System.Drawing.SystemColors.ControlText;this.dataGrid1.Location = new System.Drawing.Point(8, 64); = "dataGrid1";this.dataGrid1.ReadOnly = true;this.dataGrid1.Size = new System.Drawing.Size(928, 176);this.dataGrid1.TabIndex = 8;this.dataGrid1.CurrentCellChanged += newSystem.EventHandler(this.dataGrid1_CurrentCellChanged);That’s the Initialization of the basic properties of this control. In or der to perform some operations upon the functionality of the control (for instance: when the current cell’s index changes…or when the control’s size is exceeded etc.), I constructed a function, shown in Appendix B: Figure 6 – to prevent exceeding the contr ol’s borders.As it is shown in Figure 2.6, when the user exceeds the control’s borders, an exception is instantly thrown, warning about the error has occurred:Figure 2.6 Trying to go beyond the control’s endsThe table’s end is enclosed with a red mark er - Figure 2.6. The following messagebox in Figure 2.7 pops up on the screen every time when we try going beyond this limit by clicking outside the control’s borders.Figure 2.7 Warning messageIt can be seen from Figure 2.6, we have a data-record into the dataGrid. In order to be able to perform such kind of operations, concerning the process of uploading data into a data-table, or into a text-box field and so on, we need to establish a connection to the database, upload the desired data-fields into our buffer (the dataset) and afterwards perform the necessary data-binding operations:Establishing the data-connection: For this purpose, a DataAccessClass has been created and placed into a separate file –“DataAccessClass.cs”. In this class, not only functions dealing with retrieving of data are included, there are also functions for saving data into the database, updating data, etc. On a first time, we have to manage to the connection with the data source, which one is the database (“Employees_Database.mdb”):Figure 2.8 Preparing to get a connection establishedThere are few steps until the data source get connected to the application program’scomponents:o Specifying the connection string:public stringconString=@"Provider=Microsoft.Jet.OLEDB.4.0;DataSource=..\\..\\Employees_Database.mdb";o Making up a query-string to be performed upon the database:this.select_query1=" select* from Employees_Details orderby Last_Name,First_Name";o Creating a data adapter to communicate between the dataset and thedatabase using the already specified connection- and query-strings:public OleDbDataAdapter dAdapter;…dAdapter=new OleDbDataAdapter(this.select_query1, con);A bit more about the data adapter: “The DataSet is a memory-resident representation of datathat provides a consistent relational programming model independent of the data source. The DataSetrepresents a complete set of data including tables, constraints, and relationships among the tables. Becausethe DataSet is independent of the data source, a DataSet can include data local to the application, as well asdata from multiple data sources. Interaction with existing data sources is controlled through the DataAdapter…The Fill method of the DataAdapter is used to populate a DataSet with the results of the SelectCommand of the DataAdapter...” [5].o Creating the Dataset to be populated with data:public DataSet dSet;…dSet=new DataSet();o Populating the Dataset with data using the so constructed Data-adapter: dAdapter.Fill(dSet,"Employees_Details");After getting the connection established and populating the desired data-fields into the Dataset, we can connect the Datagrid control with the Dataset by explicitly showing the data source - Figure 2.9:Figure 2.9 Connecting the Datagrid with the Dataset controlWe also call the Currency Manager Set Function - Figure 2.10:Figure 2.10 Initializing the CurrencyManager for the Parent data-table“The CurrencyManager derives from the BindingManagerBase class. The BindingManagerBase enables the synchronization of data-bound controls on a Windows Form that are bound to the same data source. For example, suppose that a form contains two TextBox controls that are bound to the same data source but to different columns. The data。
毕业设计外文翻译英文翻译英文原稿
Harmonic source identification and current separationin distribution systemsYong Zhao a,b,Jianhua Li a,Daozhi Xia a,*a Department of Electrical Engineering Xi’an Jiaotong University, 28 West Xianning Road, Xi’an, Shaanxi 710049, Chinab Fujian Electric Power Dispatch and Telecommunication Center, 264 Wusi Road, Fuzhou, Fujian, 350003, China AbstractTo effectively diminish harmonic distortions, the locations of harmonic sources have to be identified and their currents have to be separated from that absorbed by conventional linear loads connected to the same CCP. In this paper, based on the intrinsic difference between linear and nonlinear loads in their V –I characteristics and by utilizing a new simplified harmonic source model, a new principle for harmonic source identification and harmonic current separation is proposed. By using this method, not only the existence of harmonic source can be determined, but also the contributions of the harmonic source and the linear loads to harmonic voltage distortion can be distinguished. The detailed procedure based on least squares approximation is given. The effectiveness of the approach is illustrated by test results on a composite load.2004 Elsevier Ltd. All rights reserved.Keywords: Distribution system; Harmonic source identification; Harmonic current separation; Least squares approximation1. IntroductionHarmonic distortion has experienced a continuous increase in distribution systems owing to the growing use of nonlinear loads. Many studies have shown that harmonics may cause serious effects on power systems, communication systems, and various apparatus [1–3]. Harmonic voltages at each point on a distribution network are not only determined by the harmonic currents produced by harmonic sources (nonlinear loads), but also related to all linear loads (harmonic current sinks) as well as the structure and parameters of the network. To effectively evaluate and diminish the harmonic distortion in power systems, the locations of harmonic sources have to be identified and the responsibility of the distortion caused by related individual customers has to be separated.As to harmonic source identification, most commonly the negative harmonic power is considered as an essential evidence of existing harmonic source [4–7]. Several approaches aiming at evaluating the contribution of an individual customer can also be found in the literatures. Schemes based on power factor measurement to penalize the customer’s harmonic currents are discussed in Ref. [8]. However, it would be unfair to use economical penalization if we could not distinguish whether the measured harmonic current is from nonlinear load or from linear load.In fact, the intrinsic difference between linear and nonlinear loads lies in their V –I characteristics. Harmonic currents of a linear load are i n linear proportion to its supplyharmonic voltages of the same order 次, whereas the harmonic currents of a nonlinear load are complex nonlinear functions of its supply fundamental 基波and harmonic voltage components of all orders. To successfully identify and isolate harmonic source in an individual customer or several customers connected at same point in the network, the V –I characteristics should be involved and measurement of voltages and currents under several different supply conditions should be carried out.As the existing approaches based on measurements of voltage and current spectrum or harmonic power at a certain instant cannot reflect the V –I characteristics, they may not provide reliable information about the existence and contribution of harmonic sources, which has been substantiated by theoretical analysis or experimental researches [9,10].In this paper, to approximate the nonlinear characteristics and to facilitate the work in harmonic source identification and harmonic current separation, a new simplified harmonic source model is proposed. Then based on the difference between linear and nonlinear loads in their V –I characteristics, and by utilizing the harmonic source model, a new principle for harmonic source identification and harmonic current separation is presented. By using the method, not only the existence of harmonic source can be determined, but also the contributions of the harmonic sources and the linear loads can be separated. Detailed procedure of harmonic source identification and harmonic current separation based on least squares approximation is presented. Finally, test results on a composite load containing linear and nonlinear loads are given to illustrate the effectiveness of the approach.2. New principle for harmonic source identification and current separationConsider a composite load to be studied in a distribution system, which may represent an individual consumer or a group of customers supplied by a common feeder 支路in the system. To identify whether it contains any harmonic source and to separate the harmonic currents generated by the harmonic sources from that absorbed by conventional linear loads in the measured total harmonic currents of the composite load, the following assumptions are made.(a) The supply voltage and the load currents are both periodical waveforms withperiod T; so that they can be expressed by Fourier series as1()s i n (2)h h h v t ht T πθ∞==+ (1)1()sin(2)h h h i t ht πφ∞==+The fundamental frequency and harmonic components can further be presented bycorresponding phasorshr hi h h hr hi h hV jV V I jI I θφ+=∠+=∠ , 1,2,3,...,h n = (2)(b) During the period of identification, the composite load is stationary, i.e. both its composition and circuit parameters of all individual loads keep unchanged.Under the above assumptions, the relationship between the total harmonic currents of the harmonic sources(denoted by subscript N) in the composite load and the supply voltage, i.e. the V –I characteristics, can be described by the following nonlinear equation ()()()N i t f v t = (3)and can also be represented in terms of phasors as()()122122,,,...,,,,,,...,,Nhr r i nr ni Nh Nhi r inr ni I V V V V V I I V V V V V ⎡⎤=⎢⎥⎣⎦ 2,3,...,h n = (4)Note that in Eq. (4), the initial time (reference time) of the voltage waveform has been properly selected such that the phase angle u1 becomes 0 and 10i V =, 11r V V =in Eq. (2)for simplicity.The V –I characteristics of the linear part (denote by subscript L) of the composite load can be represented by its equivalent harmonic admittance Lh Lh Lh Y G jB =+, and the total harmonic currents absorbed by the linear part can be described as,Lhr LhLh hr Lh Lhi LhLh hi I G B V I I B G V -⎡⎤⎡⎤⎡⎤==⎢⎥⎢⎥⎢⎥⎣⎦⎣⎦⎣⎦2,3,...,h n = (5)From Eqs. (4) and (5), the whole harmonic currents absorbed by the composite load can be expressed as()()122122,,,...,,,,,,...,,hr Lhr Nhr r i nr ni h hi Lhi Nhi r inr ni I I I V V V V V I I I I V V V V V ⎡⎤⎡⎤⎡⎤==-⎢⎥⎢⎥⎢⎥⎣⎦⎣⎦⎣⎦ 2,3,...,h n = (6)As the V –I characteristics of harmonic source are nonlinear, Eq. (6) can neither be directly used for harmonic source identification nor for harmonic current separation. To facilitate the work in practice, simplified methods should be involved. The common practice in harmonic studies is to represent nonlinear loads by means of current harmonic sources or equivalent Norton models [11,12]. However, these models are not of enough precision and new simplified model is needed.From the engineering point of view, the variations of hr V and hi V ; ordinarily fall into^3% bound of the rated bus voltage, while the change of V1 is usually less than ^5%. Within such a range of supply voltages, the following simplified linear relation is used in this paper to approximate the harmonic source characteristics, Eq. (4)112222112322,ho h h r r h i i hnr nr hni ni Nh ho h h r r h i i hnr nr hni ni a a V a V a V a V a V I b b V b V b V b V b V ++++++⎡⎤=⎢⎥++++++⎣⎦2,3,...,h n = (7)这个地方不知道是不是原文写错?23h r r b V 其他的都是2The precision and superiority of this simplified model will be illustrated in Section 4 by test results on several kinds of typical harmonic sources.The total harmonic current (Eq. (6)) then becomes112222112222,2,3,...,Lh Lh hr ho h h r r h i i hnr nr hni ni h Lh Lh hi ho h h r r h i i hnr nr hni ni G B V a a V a V a V a V a V I B G V b b V b V b V b V b V h n-++++++⎡⎤⎡⎤⎡⎤=-⎢⎥⎢⎥⎢⎥++++++⎣⎦⎣⎦⎣⎦= (8)It can be seen from the above equations that the harmonic currents of the harmonic sources (nonlinear loads) and the linear loads differ from each other intrinsically in their V –I characteristics. The harmonic current component drawn by the linear loads is uniquely determined by the harmonic voltage component with same order in the supply voltage. On the other hand, the harmonic current component of the nonlinear loads contains not only a term caused by the same order harmonic voltage but also a constant term and the terms caused by fundamental and harmonic voltages of all other orders. This property will be used for identifying the existence of harmonic source sin composite load.As the test results shown in Section 4 demonstrate that the summation of the constant term and the component related to fundamental frequency voltage in the harmonic current of nonlinear loads is dominant whereas other components are negligible, further approximation for Eq. (7) can be made as follows.Let112'012()()nh h hkr kr hki ki k k h Nhnh h hkr kr hki kik k h a a V a V a V I b b V b V b V =≠=≠⎡⎤+++⎢⎥⎢⎥=⎢⎥⎢⎥+++⎢⎥⎢⎥⎣⎦∑∑ hhr hhi hr Nhhhr hhi hi a a V I b b V ⎡⎤⎡⎤''=⎢⎥⎢⎥⎣⎦⎣⎦hhrhhihr Lh Lh Nh hhrhhi hi a a V I I I b b V ''⎡⎤⎡⎤'''=-=⎢⎥⎢⎥''⎣⎦⎣⎦,2,3,...,hhr hhiLh Lh hhrhhi hhr hhi Lh Lh hhr hhi a a G B a a h n b b B G b b ''-⎡⎤⎡⎤⎡⎤=-=⎢⎥⎢⎥⎢⎥''⎣⎦⎣⎦⎣⎦The total harmonic current of the composite load becomes112012(),()2,3,...,nh h hkr kr hki ki k k hhhrhhi hr h Lh NhLhNh n hhrhhi hi h h hkr kr hki kik k h a a V a V a V a a V I I I I I b b V b b V b V b V h n=≠=≠⎡⎤+++⎢⎥⎢⎥''⎡⎤⎡⎤''=-=-=-⎢⎥⎢⎥⎢⎥''⎣⎦⎣⎦⎢⎥+++⎢⎥⎢⎥⎣⎦=∑∑ (9)By neglecting ''Nh I in the harmonic current of nonlinear load and adding it to the harmonic current of linear load, 'Nh I can then be deemed as harmonic current of thenonlinear load while ''Lh I can be taken as harmonic current of the linear load. ''Nh I =0 means the composite load contains no harmonic sources, while ''0NhI ≠signify that harmonic sources may exist in this composite load. As the neglected term ''Nh I is not dominant, it is obviousthat this simplification does not make significant error on the total harmonic current of nonlinear load. However, it makes the possibility or the harmonic source identification and current separation.3. Identification procedureIn order to identify the existence of harmonic sources in a composite load, the parameters in Eq. (9) should be determined primarily, i.e.[]0122hr h h h rh i hhr hhihnr hni C a a a a a a a a ''= []0122hi h h h rh i hhrhhihnr hni C b b b b b b b b ''=For this purpose, measurement of different supply voltages and corresponding harmoniccurrents of the composite load should be repeatedly performed several times in some short period while keeping the composite load stationary. The change of supply voltage can for example be obtained by switching in or out some shunt capacitors, disconnecting a parallel transformer or changing the tap position of transformers with OLTC. Then, the least squares approach can be used to estimate the parameters by the measured voltages and currents. The identification procedure will be explained as follows.(1) Perform the test for m (2m n ≥)times to get measured fundamental frequency andharmonic voltage and current phasors ()()k k h h V θ∠,()()k k hh I φ∠,()1,2,,,1,2,,k m h n == .(2) For 1,2,,k n = ,transfer the phasors corresponding to zero fundamental voltage phase angle ()1(0)k θ=and change them into orthogonal components, i.e.()()11kkr V V = ()10ki V =()()()()()()()()()()11cos sin kkkkk kkkhr h h hihhV V h V V h θθθθ=-=-()()()()()()()()()()11cos sin k kkkk kkkhrhhhihhI I h I I h φθφθ=-=-,2,3,...,h n =(3)Let()()()()()()()()1221Tk k k k k k k k r i hr hi nr ni VV V V V V V V ⎡⎤=⎣⎦ ,()1,2,,k m = ()()()12Tm X V V V ⎡⎤=⎣⎦ ()()()12T m hr hr hr hrW I I I ⎡⎤=⎣⎦()()()12Tm hi hi hihi W I I I ⎡⎤=⎣⎦ Minimize ()()()211hr mk hr k I C V=-∑ and ()()()211him k hi k IC V=-∑, and determine the parametershr C and hi C by least squares approach as [13]:()()11T T hr hr T T hi hiC X X X W C X X X W --== (10)(4) By using Eq. (9), calculate I0Lh; I0Nh with the obtained Chr and Chi; then the existence of harmonic source is identified and the harmonic current is separated.It can be seen that in the course of model construction, harmonic source identification and harmonic current separation, m times changing of supply system operating condition and measuring of harmonic voltage and currents are needed. More accurate the model, more manipulations are necessary.To compromise the needed times of the switching operations and the accuracy of the results, the proposed model for the nonlinear load (Eq. (7)) and the composite load (Eq. (9)) can be further simplified by only considering the dominant terms in Eq. (7), i.e.01111,Nhr h h hhr hhi hr Nh Nhi ho h hhrhhi hi I a a V a a V I I b b V b b V +⎡⎤⎡⎤⎡⎤⎡⎤==+⎢⎥⎢⎥⎢⎥⎢⎥+⎣⎦⎣⎦⎣⎦⎣⎦2,3,,h n = (11) 01111h h Nh ho h a a V I b b V +⎡⎤'=⎢⎥+⎣⎦01111,hr hhrhhi hr h h h LhNh hi hhr hhihi ho h I a a V a a V I I I I b b V b b V ''+⎡⎤⎡⎤⎡⎤⎡⎤''==-=-⎢⎥⎢⎥⎢⎥⎢⎥''+⎣⎦⎣⎦⎣⎦⎣⎦2,3,,h n = (12) In this case, part equations in the previous procedure should be changed as follows[]01hr h h hhrhhi C a a a a ''= []01hi h h hhrhhiC b b b b ''= ()()()1Tk k k hr hi V V V ⎡⎤=⎣⎦ Similarly, 'Nh I and 'Lh I can still be taken as the harmonic current caused by thenonlinear load and the linear load, respectively.4. Experimental validation4.1. Model accuracyTo demonstrate the validity of the proposed harmonic source models, simulations are performed on the following three kind of typical nonlinear loads: a three-phase six-pulse rectifier, a single-phase capacitor-filtered rectifier and an acarc furnace under stationary operating condition.Diagrams of the three-phase six-pulse rectifier and the single-phase capacitor-filtered rectifier are shown in Figs. 1 and 2 [14,15], respectively, the V –I characteristic of the arc furnace is simplified as shown in Fig. 3 [16].The harmonic currents used in the simulation test are precisely calculated from their mathematical model. As to the supply voltage, VekT1 is assumed to be uniformly distributed between 0.95 and 1.05, VekThr and VekThi ek 1; 2;…;m T are uniformly distributed between20.03 and 0.03 with base voltage 10 kV and base power 1 MVFig. 1. Diagram of three-phase six-pulse rectifier.Fig. 2. Diagram of single-phase capacitor-filtered rectifierFig. 3. Approximate V –I characteristics of arc furnace.Three different models including the harmonic current source (constant current) model, the Norton model and the proposed simplified model are simulated and estimated by the least squares approach for comparison.For the three-phase six-pulse rectifier with fundamental currentI=1.7621; the1 parameters in the simplified model for fifth and seventh harmonic currents are listed in Table 1.To compare the accuracy of the three different models, the mean and standard deviations of the errors on Ihr; Ihi and Ih between estimated value and the simulated actual value are calculated for each model. The error comparison of the three models on the three-phase six-pulse rectifier is shown in Table 2, where mhr; mhi and mha denote the mean, and shr; shi and sha represent the standard deviations. Note that I1 and _Ih in Table 2are the current values caused by rated pure sinusoidal supply voltage.Error comparisons on the single-phase capacitor-filtered rectifier and the arc furnace load are listed in Table 3 and 4, respectively.It can be seen from the above test results that the accuracy of the proposed model is different for different nonlinear loads, while for a certain load, the accuracy will decrease as the harmonic order increase. However, the proposed model is always more accurate than other two models.It can also be seen from Table 1 that the componenta50 t a51V1 and b50 t b51V1 are around 20:0074 t0:3939 0:3865 and 0:0263 t 0:0623 0:0886 while the componenta55V5r and b55V5i will not exceed 0:2676 £0:03 0:008 and 0:9675 £0:003 0:029; respectively. The result shows that the fifth harmonic current caused by the summation of constant term and the fundamental voltage is about 10 times of that caused by harmonic voltage with same order, so that the formal is dominant in the harmonic current for the three-phase six-pulse rectifier. The same situation exists for other harmonic orders and other nonlinear loads.4.2. Effectiveness of harmonic source identification and current separationTo show the effectiveness of the proposed harmonic source identification method, simulations are performed on a composite load containing linear load (30%) and nonlinear loads with three-phase six-pulse rectifier (30%),single-phase capacitor-filtered rectifier (20%) and ac arc furnace load (20%).For simplicity, only the errors of third order harmonic current of the linear and nonlinear loads are listed in Table 5, where IN3 denotes the third order harmonic current corresponding to rated pure sinusoidal supply voltage; mN3r ;mN3i;mN3a and mL3r ;mL3i;mL3a are error means of IN3r ; IN3i; IN3 and IL3r ; IL3i; IL3 between the simulated actual value and the estimated value;sN3r ;sN3i;sN3a and sL3r ;sL3i;sL3a are standard deviations.Table 2Table 3It can be seen from Table 5 that the current errors of linear load are less than that of nonlinear loads. This is because the errors of nonlinear load currents are due to both the model error and neglecting the components related to harmonic voltages of the same order, whereas only the later components introduce errors to the linear load currents. Moreover, it can be found that more precise the composite load model is, less error is introduced. However, even by using the very simple model (12), the existence of harmonic sources can be correctly identified and the harmonic current of linear and nonlinear loads can be effectively separated. Table 4Error comparison on the arc furnaceTable 55. ConclusionsIn this paper, from an engineering point of view, firstly anew linear model is presented for representing harmonic sources. On the basis of the intrinsic difference between linear and nonlinear loads in their V –I characteristics, and by using the proposed harmonic source model, a new concise principle for identifying harmonic sources and separating harmonic source currents from that of linear loads is proposed. The detailed modeling and identification procedure is also developed based on the least squares approximation approach. Test results on several kinds of typical harmonic sources reveal that the simplified model is of sufficient precision, and is superior to other existing models. The effectiveness of the harmonic source identification approach is illustrated using a composite nonlinear load.AcknowledgementsThe authors wish to acknowledge the financial support by the National Natural Science Foundation of China for this project, under the Research Program Grant No.59737140. References[1] IEEE Working Group on Power System Harmonics, The effects of power system harmonics on power system equipment and loads. IEEE Trans Power Apparatus Syst 1985;9:2555–63.[2] IEEE Working Group on Power System Harmonics, Power line harmonic effects on communication line interference. IEEE Trans Power Apparatus Syst 1985;104(9):2578–87.[3] IEEE Task Force on the Effects of Harmonics, Effects of harmonic on equipment. IEEE Trans Power Deliv 1993;8(2):681–8.[4] Heydt GT. Identification of harmonic sources by a State Estimation Technique. IEEE Trans Power Deliv 1989;4(1):569–75.[5] Ferach JE, Grady WM, Arapostathis A. An optimal procedure for placing sensors and estimating the locations of harmonic sources in power systems. IEEE Trans Power Deliv 1993;8(3):1303–10.[6] Ma H, Girgis AA. Identification and tracking of harmonic sources in a power system using Kalman filter. IEEE Trans Power Deliv 1996;11(3):1659–65.[7] Hong YY, Chen YC. Application of algorithms and artificial intelligence approach for locating multiple harmonics in distribution systems. IEE Proc.—Gener. Transm. Distrib 1999;146(3):325–9.[8] Mceachern A, Grady WM, Moncerief WA, Heydt GT, McgranaghanM. Revenue and harmonics: an evaluation of someproposed rate structures. IEEE Trans Power Deliv 1995;10(1):474–82.[9] Xu W. Power direction method cannot be used for harmonic sourcedetection. Power Engineering Society Summer Meeting, IEEE; 2000.p. 873–6.[10] Sasdelli R, Peretto L. A VI-based measurement system for sharing the customer and supply responsibility for harmonic distortion. IEEETrans Instrum Meas 1998;47(5):1335–40.[11] Arrillaga J, Bradley DA, Bodger PS. Power system harmonics. NewYork: Wiley; 1985.[12] Thunberg E, Soder L. A Norton approach to distribution networkmodeling for harmonic studies. IEEE Trans Power Deliv 1999;14(1):272–7.[13] Giordano AA, Hsu FM. Least squares estimation with applications todigital signal processing. New York: Wiley; 1985.[14] Xia D, Heydt GT. Harmonic power flow studies. Part I. Formulationand solution. IEEE Trans Power Apparatus Syst 1982;101(6):1257–65.[15] Mansoor A, Grady WM, Thallam RS, Doyle MT, Krein SD, SamotyjMJ. Effect of supply voltage harmonics on the input current of single phase diode bridge rectifier loads. IEEE Trans Power Deliv 1995;10(3):1416–22.[16] Varadan S, Makram EB, Girgis AA. A new time domain voltage source model for an arc furnace using EMTP. IEEE Trans Power Deliv 1996;11(3):1416–22.。
哈工大毕业设计外文翻译模板
本科毕业设计(论文)外文文献翻译文献题目Hover Performance of a Small-Scale Helicopter forFlying on Mars专业飞行器制造工程班号1308302学号**********学生陈水添可用于火星飞行的小型直升机转子悬停性能Robin ShresthaUniversity of Maryland, College Park, Maryland 20742Moble BenedictTexas A&M University, College Station, Texas 77843以及Vikram Hrishikeshavan 和Inderjit Chopra§University of Maryland, College Park, Maryland 20742DOI:10.2514/1.C033621摘要:本研究是为了回应对于评估用于火星探测的小型自动化直升机(总质量小于1 kg)飞行可行性与日俱增的兴趣。
自主旋翼航空器可以理想地适用于这样的应用,因为它具有独特的优点,其中包括在与传统的地面漫游器相比时在恶劣的地形上垂直起飞/着陆的能力以及更大的速度,范围和视野。
火星上的大气条件呈现出独特的设计挑战。
尽管火星的重力只有38%左右地球的重力,火星的平均大气密度是地球大气密度的七十分之一。
因此,转子将以非常低的雷诺数运行,对于小型直升机而言,甚至低于5000。
然而,由于需要更高的尖端速度(由于密度较低),马赫数将显着更高(M> 0.4),并且由于火星上的声速仅为地球声速的大约72%。
桨叶上的低雷诺数,高马赫数流动条件对转子设计施加了严格的限制。
本研究提出的解决方案涉及扩大转子尺寸以在可接受的马赫数和雷诺数条件下产生所需的推力。
实验在一个真空室中评估了200 g火星同轴直升机的全尺寸转子的悬停性能,真空室完全模拟了火星空气密度。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
本科毕业设计(论文)外文文献翻译文献题目Hover Performance of a Small-Scale Helicopter forFlying on Mars专业飞行器制造工程班号1308302学号**********学生陈水添可用于火星飞行的小型直升机转子悬停性能Robin ShresthaUniversity of Maryland, College Park, Maryland 20742Moble BenedictTexas A&M University, College Station, Texas 77843以及Vikram Hrishikeshavan 和Inderjit Chopra§University of Maryland, College Park, Maryland 20742DOI:10.2514/1.C033621摘要:本研究是为了回应对于评估用于火星探测的小型自动化直升机(总质量小于1 kg)飞行可行性与日俱增的兴趣。
自主旋翼航空器可以理想地适用于这样的应用,因为它具有独特的优点,其中包括在与传统的地面漫游器相比时在恶劣的地形上垂直起飞/着陆的能力以及更大的速度,范围和视野。
火星上的大气条件呈现出独特的设计挑战。
尽管火星的重力只有38%左右地球的重力,火星的平均大气密度是地球大气密度的七十分之一。
因此,转子将以非常低的雷诺数运行,对于小型直升机而言,甚至低于5000。
然而,由于需要更高的尖端速度(由于密度较低),马赫数将显着更高(M> 0.4),并且由于火星上的声速仅为地球声速的大约72%。
桨叶上的低雷诺数,高马赫数流动条件对转子设计施加了严格的限制。
本研究提出的解决方案涉及扩大转子尺寸以在可接受的马赫数和雷诺数条件下产生所需的推力。
实验在一个真空室中评估了200 g火星同轴直升机的全尺寸转子的悬停性能,真空室完全模拟了火星空气密度。
在雷诺数为3300,马赫数为0.34的情况下,基线转子获得的最大品质因数小于0.4。
通过改变空气密度以恒定的马赫数增加雷诺数,雷诺数为35,000,将同一转子的品质因数提高到0.6以上。
随着雷诺数降低到极低值(Re <5000),最大品质因数的桨叶总距角甚至增加到30度。
这项研究的一个重要结论是小型火星无人机在火星持飞行(12 – 13 min)是可行的。
I.引言这里存在一个用于评价用于火星探测的小型旋翼机可行性的巨大兴趣。
本研究与NASA的在火星2020任务中操作一架小型旋翼无人机从火星漫游者起飞的目标一致。
小型的火星旋翼机被设想作为传统表面漫游车的探路者。
一架飞行平台的优势在于:更高的速度、更广的范围以及相比于传统的漫游车更大的视野范围。
火星表面呈现出独一无二的挑战,因为它表面的多样性和崎岖不平,这将限制传统的漫游车到达许多值得高度关注兴趣点的机动性。
例如,让轮式漫游车去探索小火星沟中源头和沿着火星峡谷悬崖面分布的土壤似乎是不可能的。
然而探索这些特征对于了解它们形成和水在火星过去和现在扮演的角色至关重要[1]。
一个飞行器将会拓宽我们的探索能力。
一架星际飞行器将会移除穿过危险的巨石散落地区或击中不可能绕过障碍物的挑战。
一架理想的火星飞行器将是拥有从着陆区垂直起飞,穿过并且在具有高科研兴趣崎岖上方悬停,收集科学数据的能力。
为了这个任务,在过去,不同的飞行平台已经被提出来。
自1960年起,火星探测就被通过三种方式进行:略过,环绕以及着陆/漫游。
然而,在过去的二十年里,已经有很多的研究聚焦于探索新概念飞行器的可行性,这些飞行器将通过高分辨率成像、下放探针或传感器、采集微小样品、作为探路者以及进行高危险性任务等方式来提升火星表面探索的能力。
这些研究关注点在于三种不同的概念:比空气轻的飞行器、固定翼飞行器以及旋翼机。
这些飞行器的采用将取决于任务的类型以及财务预算。
例如,这里已经有很多通过实验和分析研究来设计/构建用于火星环境的比空气轻的概念机(热气球/飞艇)。
这里最大的挑战在于满足对于在火星大气环境中轻型热气球的平衡要求以及承受在展开和膨胀过程中的瞬态负载。
俄罗斯/法国的“火星空气飞行器”项目(1987 - 1995年)首先采取的主要措施之一,其目标是将气球系统(Aerostat)发射火星大气中,并在火星表面上飞行10天,进行原位科学探索[3]。
拟议的空气飞行器将在距离地面4公里的高度漂浮5500立方米圆柱形超压外壳。
但是,这个项目是在取得重大特破之前便在1995年被取消了。
喷气推进实验室的火星气球验证计划(MABV AP)的另一项重大工作,该工作是1997年8月发起,旨在开发和验证火星任务所需的关键技术[4]。
MABV AP的三个主要组成部分是验证空中展开和膨胀,超压热气球设计和开发新的仿真工具。
作为该计划的一部分,从1997年到2002年,制造和测试了一些超压气球。
其次是联合喷气推进实验室(JPL),Wallops飞行设施和近空间公司进行研究成为称为“超级-M”的工作。
2006年,SUPER-M队对火星全尺寸原型气球进行了成功的空中展开和膨胀测试[5]。
这些测试发生在31公里高度的地球平流层,在那里低气压密度与火星表面附近的大气密度相当,主要技术重点是进行空中产开和膨胀过程。
在20世纪70年代后期,随着JPL的资助和指导,发展科学公司(DSI)进行了可能是对火星固定翼飞机可行性的最全面的早期调查[6]。
设计的最终飞机(名为“Astroplane”)的翼展为21米,机翼面积为20平方米,标称质量为300公斤。
采用一个复杂的折叠方案,其中包括六个翼折,三个机身折叠和折叠螺旋桨,以将Astroplane装配到3.8米的类Viking壳中。
自从DSI研究以来,已经有几个美国航空航天局,工业和大学对火星飞行任务的研究。
众所周知的工作是NASA 兰利研究中心的ARES(火星地区范围的火星环境调查)项目,目标是使用专门设计的固定翼飞机来探索火星南部高地[7]。
最终飞机设计的翼展6.25米,估计总重150公斤,范围500公里,耐力1小时。
飞机的大尺寸(翼区面积7平方米)允许它以可操控的空气动力学状态中(马赫数在0.62和0.71之间,雷诺数在100,000和200,000之间)运行。
该飞机的推进系统由双组元推进剂,脉冲控制火箭推进系统与单甲基肼燃料和氮氧化物混合氧化物组成。
这架飞行器的半尺度模型是在2002年建成的,并在103,500英尺的高度进行了成功的自主高空展开和抽出过程,许多其他固定翼飞机任务和概念设计由各个机构提出[6 -9],其中飞行器尺寸范围从2到12米,翼展,总重量从20到200公斤,耐力15分钟至3小时,范围从130到1800公里,巡航速度从110到160米/秒不等。
尽管比空气轻概念在功耗方面是效率最高的,但由于对任何重要的有效载荷及其对风的敏感性都需要较大的气囊尺寸,因此它们并不实用。
他们也缺乏探索有针对性的科学兴趣领域的控制权。
固定翼飞机相对有效;然而,他们以非常高的速度(大于100米/秒)飞行的必要性对其任务能力施加了很多限制,并使它们在第一次飞行之后不可重新覆盖研究区域。
另一方面,旋翼航空器即使是三个系统中功耗最大的一种,但是它具有极高的灵活性,具有悬停/低速飞行能力,非常适用于许多任务。
旋翼航空器具有独特的优势,能够从崎岖的地形起飞和降落,以及悬停和低速飞行,以调查不利地形(比轨道飞行器更接近)。
它还可以将传感器从漫游车精确地传送到任何位置,并将样本从远程站点返回到主漫游车。
使用旋翼飞机作为火星行星探测的空中平台有很多潜在的好处。
然而,火星上的条件提出了非常独特的设计挑战。
火星的重力大约只有地球重力的三分之一,但是火星的大气密度是地球的七十分之一。
火星上的声速也只有地球上的72%。
火星上的超低空气密度要求转子以非常高的旋转速度运行,以产生所需的推力。
结果,叶片将经历独特的低雷诺数(Re)/高马赫数流动条件,这种情况通常不会在任何其他常规飞行器上发生。
低雷诺数,高马赫数流量没有实验数据;因此,空气动力学预测可能不准确。
因此,为这些流动状况生成的转子性能数据库至关重要。
目前的研究集中在一个小型旋翼机(质量〜200克),这可以用来从漫游车上进行巡视任务。
已经有一些实验研究系统地研究了微型飞行器(MA V)尺度转子(直径在6英寸内)的低雷诺数(Re = 30; 000至60,000)[10-13]的空气动力学。
然而,这些转子在非常低的马赫数(M〜0.03)下在地球的大气密度(ρ= 1.225kg / m3)下进行了测试,低雷诺数是由于转子的缩小而导致的。
MA V转子研究的结果支持使用弧形(弧度为6至9%),圆弧平板翼型,锋利的前缘雷诺数小于60,000的桨叶。
Bohorquez在MA V规模转子(Re≈60; 000)上进行的实验表明,具有锋利前缘的细圆弧形锯片(6-9%)桨叶的转子具有优异的性能[13,14]。
使用由Lakshminarayan和Baeder在悬停MA V标尺转子上进行的雷诺兹Navier-Stokes求解器的计算研究表明,具有钝前缘的叶片的性能差的原因是由于层流引起的前部压力阻力较大分离气泡[15]。
Benedict等人的进一步实验测试和系统优化了不同的叶片参数,包括叶片翼型,叶片弦,叶片扭转和平面锥度[16]。
这项研究表明,MA Vscale 雷诺数(Re〜30; 000)运行的转子可以实现0.67的品质因数,这比在雷诺数方面运行的其他转子有相当大的改进。
然而,现在的200克火星直升机将会运行的雷诺数范围(Re<5000)和马赫数(M≤0.3-0.45)的数量级更高的雷诺数范围可以实现可比性能的问题,仍然存在。
本文重点介绍了基础实验,这些实验旨在支持美国航空航天局JPL主动调查火星上微型旋翼机(质量小于1公斤)的可行性。
本研究与NASA的目标一致,将微型旋翼机发射到火星,为2020年任务,作为漫游车的探路者。
本研究的具体目标是调查这样的微型旋翼机是否能够在火星上悬停,如果是这样,我们是否可以期望实际的耐力执行有用的任务。
所提出的飞行器是共轴旋翼机,总重量为200g。
在悬停时,每个转子需要在火星上产生0.38 N(0.76 N总)的推力。
为了以可控的转速(或低马赫数)和相当高的雷诺数来实现该推力,转子将必须放大。
对于目前的设计,每个转子的直径可以达到18英寸,可能是相同质量的地面MA V的2-3倍。
因此,本研究的主要目标是在定制的真空室中,在模拟火星大气密度(ρ= 0.0167 kg / m3)下,实验研究基准全尺度转子(18 in直径)的悬停性能。
此外,通过保持转速恒定(恒定马赫数)并改变空气密度,对于相同的转子进行相同的转子的实验,以获得在宽范围的雷诺数(Re 3300至35,000)下相同转子的性能。