毕业设计外文文献翻译(可编辑修改word版)

合集下载

毕业设计英语翻译Word版

毕业设计英语翻译Word版

电动汽车永磁无刷直流电机的轴向永磁体的运动轨迹设计N. A. Rahim, Member, IEEE, Hew Wooi Ping, Member, IEEE, M Tadjuddin 摘要:汽车制造商如丰田、本田、福特和现代都在从事紧急的研究、开发和制造燃料高效、环保的混合动力电动汽车。

电动机是混合动力车辆一个主要的能源消耗零件。

在驱动时电机除了要求高效率,还必须有强转矩和紧凑的设计。

本文设计一个电动马达直接驱动电动车辆。

设计了一种永磁电机以轴向磁槽内stator-non类型。

初步设计了一个电机转子16对磁极低速稳定的旋转下高转矩和大密度能量。

电机设计时利用Ansoft Maxwell3D进行了模拟电磁仿真有限元法(FEM)软件得到一定的参数。

电机安装在一个实验平台上,用实验测试数据对其结果进行比较,得到了仿真结果。

关键词:电动车、轴向磁永久性的永磁电机、驱动1引言电动汽车(EV)在不久的将来能成为一种非常明智的选择的交通工具。

一般而言,它是物美价廉,无污染的个人运输需要一种的新的方法。

大卫卡先生在1870年开发了一辆由笨重蓄电池和轻型电机组成的汽车,但是驾驶的速度和续航里程都很差。

在这多年后, 1898年年仅23岁得费迪南德保时捷博士制造了自己的第一辆车,Lohner电动四轮马车。

这是世界上第一辆前轮驱动的汽车。

他的第二辆汽车是一个混合型的,利用内燃机旋转带动发电机发电,驱动安装在车轮毂中的电动机。

单靠电池这辆车可以行使40公里。

在世界各地,有很多研究人员和工程师一直研究和开发最适合的电动汽车电机,是一个正在进行的敏锐过程。

永磁无刷直流电机已经成为电动汽车运用中最普遍的电机。

高级电源电子技术,比如适当的转换拓扑结构,自控制技术和强大的数字信号处理使我们能够建造一个高效、紧凑的驱动系统。

永磁无刷电机最突出的特点紧实度、低重量和高效率。

正是由于这些原因,永磁无刷电机为电动的发展提供了一个很好的选择。

java毕业设计中英文翻译

java毕业设计中英文翻译

java毕业设计中英文翻译篇一:JAVA外文文献+翻译Java and the InternetIf Java is, in fact, yet another computer programming language, you may question why it is so important and why it is being promoted as a revolutionary step in computer programming. The answer isn’t immediately obvious if you’re coming from a traditional programming perspective. Although Java is very useful for solving traditional stand-alone programming problems, it is also important because it will solve programming problems on the World Wide Web.1. Client-side programmingThe Web’s initial server-browser design provided for interactive content, but the interactivity was completely provided by the server. The server produced static pages for the client browser, which would simply interpret and display them. Basic HTML contains simple mechanisms for data gathering: text-entry boxes, check boxes, radio boxes, lists and drop-down lists, as well as a button that can only be programmed to reset the data on the form or “submit” the data on the form backto the server. This submission passes through the Common Gateway Interface (CGI) provided on all Web servers. The text within the submission tells CGI what to do with it. The most common action is to run a program located on the server in a directory that’s typically called “cgi-bin.” (If you watch the address window at the top of your browser when you push a button on a Web page, you can sometimes see “cgi-bin” within all the gobbledygook there.) These programs can be written in most languages. Perl is a common choice because it is designed for text manipulation and is interpreted, so it can be installed on any server regardless of processor or operating system. Many powerful Web sites today are built strictly on CGI, and you can in fact do nearly anything with it. However, Web sites built on CGI programs can rapidly become overly complicated to maintain, and there is also the problem of response time. The response of a CGI program depends on how much data mustbe sent, as well as the load on both the server and the Internet. (On top of this, starting a CGI program tends to be slow.) The initial designers of the Web didnot foresee how rapidly this bandwidth would be exhausted for the kinds of applications people developed. For example, any sort of dynamic graphing is nearly impossible to perform with consistency because a GIF file must be created and moved from the server to the client for each version of the graph. And you’ve no doubt had direct experience with something as simple as validating the data on an input form. You press the submit button on a page; the data is shipped back to the server; the server starts a CGI program that discovers an error, formats an HTML page informing you of the error, and then sends the page back to you; you must then back up a page and try again. Not only is this slow, it’s inelegant.The solution is client-side programming. Most machines that run Web browsers are powerful engines capable of doing vast work, and with the original static HTML approach they are sitting there, just idly waiting for the server to dish up the next page. Client-side programming means that the Web browser is harnessed to do whatever work it can, and the result for the user is a much speedier and more interactive experience atyour Web site.The problem with discussions of client-side programming is that they aren’t very different from discussions of programming in general. The parameters are almost the same, but the platform is different: a Web browser is like a limited operating system. In the end, you must still program, and this accounts for the dizzying array of problems and solutions produced by client-side programming. The rest of this section provides an overview of the issues and approaches in client-side programming.2.Plug-insOne of the most significant steps forward in client-side programming is the development of the plug-in. This is a way for a programmer to add new functionality to the browser by downloading a piece of code that plugs itself into the appropriate spot in the browser. It tells the browser “from now on you can perform this new activity.” (You need to download the plug-in only once.) Some fast and powerful behavior is added to browsers via plug-ins, but writing a plug-in is not a trivial task, and isn’t something you’d wantto do as part of the process of building a particular site. The value of the plug-in for client-side programming is that it allows an expert programmer to develop a new language and add that language to a browser without the permission of the browser manufacturer. Thus, plug-ins provide a “back door”that allows the creation of new client-side programming languages (although not all languages are implemented as plug-ins).3.Scripting languagesPlug-ins resulted in an explosion of scripting languages. With a scripting language you embed the source code for your client-side program directly into the HTML page, and the plug-in that interprets that language is automatically activated while the HTML page is being displayed. Scripting languages tend to be reasonably easy to understand and, because they are simply text that is part of an HTML page, they load very quickly as part of the single server hit required to procure that page. The trade-off is that your code is exposed for everyone to see (and steal). Generally, however, you aren’t doing amazingly sophisticatedthings with scripting languages so this is not too much of a hardship.This points out that the scripting languages used inside Web browsers are really intended to solve specific types of problems, primarily the creation of richer and more interactive graphical user interfaces (GUIs). However, a scripting language might solve 80 percent of the problems encountered in client-side programming. Your problems might very well fit completely within that 80 percent, and since scripting languages can allow easier and faster development, you should probably consider a scripting language before looking at a more involved solution such as Java or ActiveX programming.The most commonly discussed browser scripting languages are JavaScript (which has nothing to do with Java; it’s named that way just to grab some of Java’s marketing momentum), VBScript (which looks like Visual Basic), andTcl/Tk, which comes from the popular cross-platform GUI-building language. There are others out there, and no doubt more in development.JavaScript is probably the most commonly supported. It comes built into both Netscape Navigator and the Microsoft Internet Explorer (IE). In addition, there are probably more JavaScript books available than there are for the other browser languages, and some tools automatically create pages using JavaScript. However, if you’re already fluent in Visual Basic or Tcl/Tk, you’ll be more productive using those scripting languages rather than learning a new one. (You’ll have your hands full dealing with the Web issues already.)4.JavaIf a scripting language can solve 80 percent of the client-side programming problems, what about the other 20 percent—the “really hard stuff?” The most popular solution today is Java. Not only is it a powerful programming language built to be secure, cross-platform, and international, but Java is being continually extended to provide language features and libraries that elegantly handle problems that are difficult in traditional programming languages, such as multithreading, database access, network programming, and distributed computing. Java allowsclient-side programming via the applet.An applet is a mini-program that will run only under a Web browser. The applet is downloaded automatically as part of a Web page (just as, for example, a graphic is automatically downloaded). When the applet is activated it executes a program. This is part of its beauty—it provides you with a way to automatically distribute the client software from the server at the time the user needs the client software, and no sooner. The user gets the latest version of the client software without fail and without difficult reinstallation. Because of the way Java is designed, the programmer needs to create only a single program, and that program automatically works with all computers that have browsers with built-in Java interpreters. (This safely includes the vast majority of machines.) Since Java is a full-fledged programming language, you can do as much work as possible on the client before and after making requests of theserver. For example, you won’t need to send a request form across the Internet to discover that you’ve gotten a date or some other parameter wrong, and yourclient computer can quickly do the work of plotting data instead of waiting for the server to make a plot and ship a graphic image back to you. Not only do you get the immediate win of speed and responsiveness, but the general network traffic and load on servers can be reduced, preventing the entire Internet from slowing down.One advantage a Java applet has over a scripted program is that it’s in compiled form, so the source code isn’t available to the client. On the other hand, a Java applet can be decompiled without too much trouble, but hiding your code is often not an important issue. Two other factors can be important. As you will see later in this book, a compiled Java applet can comprise many modules and take multiple server “hits” (accesses) to download. (In Java 1.1 and higher this is minimized by Java archives, called JAR files, that allow all the required modules to be packaged together and compressed for a single download.) A scripted program will just be integrated into the Web page as part of its text (and will generally be smaller and reduce server hits). This could be important to the responsiveness of your Website. Another factor is the all-important learning curve. Regardless of what you’ve heard, Java is not a trivial language to learn. If you’re a Visual Basic programmer, moving to VBScript will be your fastest solution, and since it will probably solve most typical client/server problems you might be hard pressed to justify learning Java. If you’re experienced with a scripting language you will certainly benefit from looking at JavaScript or VBScript before committing to Java, since they might fit your needs handily and you’ll be more productive sooner.to run its applets withi5.ActiveXTo some degree, the competitor to Java is Microsoft’s ActiveX, although it takes a completely different approach. ActiveX was originally a Windows-only solution, although it is now being developed via an independent consortium to become cross-platform. Effectively, ActiveX says “if your program connects to篇二:JAVA思想外文翻译毕业设计文献来源:Bruce Eckel. Thinking in Java [J]. Pearson Higher Isia Education,XX-2-20.Java编程思想 (Java和因特网)既然Java不过另一种类型的程序设计语言,大家可能会奇怪它为什么值得如此重视,为什么还有这么多的人认为它是计算机程序设计的一个里程碑呢?如果您来自一个传统的程序设计背景,那么答案在刚开始的时候并不是很明显。

毕业设计论文外文文献翻译

毕业设计论文外文文献翻译

毕业设计(论文)外文文献翻译院系:财务与会计学院年级专业:201*级财务管理姓名:学号:132148***附件: 财务风险管理【Abstract】Although financial risk has increased significantly in recent years risk and risk management are not contemporary issues。

The result of increasingly global markets is that risk may originate with events thousands of miles away that have nothing to do with the domestic market。

Information is available instantaneously which means that change and subsequent market reactions occur very quickly。

The economic climate and markets can be affected very quickly by changes in exchange rates interest rates and commodity prices。

Counterparties can rapidly become problematic。

As a result it is important to ensure financial risks are identified and managed appropriately. Preparation is a key component of risk management。

【Key Words】Financial risk,Risk management,YieldsI. Financial risks arising1.1What Is Risk1.1.1The concept of riskRisk provides the basis for opportunity. The terms risk and exposure have subtle differences in their meaning. Risk refers to the probability of loss while exposure is the possibility of loss although they are often used interchangeably。

山东建筑大学本科毕业设计说明书外文文献及翻译格式模版1.doc

山东建筑大学本科毕业设计说明书外文文献及翻译格式模版1.doc

山东建筑大学本科毕业设计说明书外文文献及翻译格式模版1附件3:(本科毕业论文)文献、资料题目:院(部)专班姓名:张三学号:指导教师:张九光翻译日期:2005.6.30,the National Institute of Standards and Technology (NIST) has been working to develop a new encryption standard to keep government information secure .The organization is in the final stages of an open process of selecting one or more algorithms ,or data-scrambling formulas ,for the new Advanced Encryption Standard (AES) and plans to make adecision by late summer or early fall .The standard is slated to go into effect next year .AES is intended to be a stronger ,more efficient successor to Triple Data Encryption Standard (3DES),which replaced the aging DES ,which was cracked in less than three days in July 1998.“Until we have the AES ,3DES will still offer protection for years to come .So there is no need to immediately switch over ,”says Edward Roback ,acting chief of the computer security division at NIST and chairman of the AES selection committee .“What AES will offer is a more efficient algorithm .It will be a federal standard ,but it will be widely implemented in the IT community .”According to Roback ,efficiency of the proposed algorithms is measured by how fast they can encrypt and decrypt information ,how fast they can present an encryption key and how much information they can encrypt .The AES review committee is also looking at how much space the algorithm takes up on a chip and how much memory it requires .Roback says the selection of a more efficient AES will also result in cost savings and better use of resources .“DES w as designed for hardware implementations ,and we are now living in a world of much more efficient software ,and we have learned an awful lot about the design of algorithms ,”says Roback .“When you start multiplying this with the billions of implementations done daily ,the saving on overhead on the networks will be enormous .”……山东建筑大学毕业设计(或毕业论文,二选一)外文文献及译文- 1 -以确保政府的信息安全。

(完整版)PLC毕业设计的外文文献(及翻译)

(完整版)PLC毕业设计的外文文献(及翻译)

PLC technique discussion and future developmentT.J.byersElectronic Test Equipment-principles and ApplicationsPrinceton University .AmericaAlong with the development of the ages, the technique that is nowadays is also gradually perfect, the competition plays more strong; the operation that list depends the artificial has already can't satisfied with the current manufacturing industry foreground, also can't guarantee the request of the higher quantity and high new the image of the technique business enterprise.The people see in produce practice, automate brought the tremendous convenience and the product quantities for people up of assurance, also eased the personnel's labor strength, reduce the establishment on the personnel. The target control of the hard realization in many complicated production lines, whole and excellent turn, the best decision etc, well-trained operation work, technical personnel or expert, governor but can judge and operate easily, can acquire the satisfied result. The research target of the artificial intelligence makes use of the calculator exactly to carry out, imitate these intelligences behavior, moderating the work through person's brain and calculators, with the mode that person's machine combine, for resolve the very complicated problem to look for the best path.We come in sight of the control that links after the electric appliances in various situation, that is already the that time generation past, now of after use in the mold a perhaps simple equipments of grass-roots control that the electric appliances can do for the low level only; And the PLC emergence also became the epoch-making topic, adding the vivid software control through a very and stable hardware, making the automation head for the new high tide.The PLC biggest characteristics lie in: The electrical engineering teacher already no longer electric hardware up too many calculations of cost, as long as order the importation that the button switch or the importation of the sensors order to link the PLC up can solve problem, pass to output to order the conjunction contact machine or control the start equipments of the big power after the electric appliances, but the exportation equipmentsdirect conjunction of the small power can.PLC internal containment have the CPU of the CPU, and take to have an I/ O for expand of exterior to connect a people's address and saving machine three big pieces to constitute, CPU core is from an or many is tired to add the machine to constitute, mathematics that they have the logic operation ability, and can read the procedure save the contents of the machine to drive the homologous saving machine and I/ Os to connect after pass the calculation; The I/ O add inner part is tired the input and output system of the machine and exterior link, and deposit the related data into the procedure saving machine or data saving machine; The saving machine can deposit the data that the I/ O input in the saving machine, and in work adjusting to become tired to add the machine and I/ Os to connect, saving machine separately saving machine RAM of the procedure saving machine ROM and dates, the ROM can do deposit of the data permanence in the saving machine, but RAM only for the CPU computes the temporary calculation usage of hour of buffer space.The PLC anti- interference is very and excellent, our root need not concern its service life and the work situation bad, these all problems have already no longer become the topic that we fail, but stay to our is a concern to come to internal resources of make use of the PLC to strengthen the control ability of the equipments for us, make our equipments more gentle.PLC language is not we imagine of edit collected materials the language or language of Cs to carry on weaving the distance, but the trapezoid diagram that the adoption is original after the electric appliances to control, make the electrical engineering teacher while weaving to write the procedure very easy comprehended the PLC language, and a lot of non- electricity professional also very quickly know and go deep into to the PLC.Is PLC one of the advantage above and only, this is also one part that the people comprehend more and easily, in a lot of equipments, the people have already no longer hoped to see too many control buttons, they damage not only and easily and produce the artificial error easiest, small is not a main error perhaps you can still accept; But lead even is a fatal error greatly is what we can't is tolerant of. New technique always for bringing more safe and convenient operation for us, make we a lot of problems for face on sweep but light, do you understand the HMI? Says the HMI here you basically not clear what it is, also have no interest understanding, change one inside text explains it into the touch to hold orman-machine interface you knew, it combines with the PLC to our larger space.HMI the control not only is reduced the control press button, increase the vivid of the control, more main of it is can sequence of, and at can the change data input to output the feedback with data, control in the temperature curve of imitate but also can keep the manifestation of view to come out. And can write the function help procedure through a plait to provide the help of various what lies in one's power, the one who make operate reduces the otiose error. Currently the HMI factory is also more and more, the function is also more and more strong, the price is also more and more low, and the noodles of the usage are wide more and more. The HMI foreground can say that think to be good.At a lot of situations, the list is a smooth movement that can't guarantee the equipments by the control of the single machine, but pass the information exchanges of the equipments and equipments to attain the result that we want. For example fore pack and the examination of the empress work preface, we will arrive wrapping information feedback to examine the place, and examine the information of the place to also want the feedback to packing. Pass the information share thus to make both the chain connect, becoming a total body, the match of your that thus make is more close, at each other attain to reflect the result that mutually flick.The PLC correspondence has already come more body now its value, at the PLC and correspondence between Places, can pass the communication of the information and the share of the data’s to guarantee that of the equipments moderates mutually, the result that arrive already to repair with each other. Data conversion the adoption RS232 between PLC connect to come to the transmission data, but the RS232 pick up a people and can guarantee 10 meters only of deliver the distance, if in the distance of 1000 meters we can pass the RS485 to carry on the correspondence, the longer distance can pass the MODEL only to carry on deliver.The PLC data transmission is just to be called a form to it in a piece of and continuous address that the data of the inner part delivers the other party, we, the PLC of the other party passes to read data in the watch to carry on the operation. If the data that data in the watch is a to establish generally, that is just the general data transmission, for example today of oil price rise, I want to deliver the price of the oil price to lose the oil ally on board, that is the share of the data; But take data in the watch for an instruction procedure that controls the PLC, that had the difficulty very much, for example you have to control one pedestal robot to pressthe action work that you imagine, you will draw up for it the form that a procedure combine with the data sends out to pass by.The form that information transport contain single work, the half a work and the difference of a workers .The meaning of the single work also is to say both, a can send out only, but a can receive only, for example a spy he can receive the designation of the superior only, but can't give the superior reply; A work of half is also 2 and can send out similar to accept the data, but can't send out and accept at the same time, for example when you make a phone call is to can't answer the phone, the other party also; But whole pair works is both can send out and accept the data, and can send out and accept at the same time. Be like the Internet is a typical example.The process that information transport also has synchronous and different step cent: The data line and the clock lines are synchronous when synchronous meaning lie in sending out the data, is also the data signal and the clock signals to be carry on by the CPU to send out at the same time, this needs to all want the specialized clock signal each other to carry on the transmission and connect to send, and is constrained, the characteristics of this kind of method lies in its speed very quick, but correspond work time of take up the CPU and also want to be long oppositely, at the same time the technique difficulty also very big. Its request lies in canting have an error margins in a dates deliver, otherwise the whole piece according to compare the occurrence mistake, this on the hardware is a bigger difficulty. Applied more and more extensive in some appropriative equipments, be like the appropriative medical treatment equipments, the numerical signal equipments...etc., in compare the one data deliver, its result is very good.And the different step is an application the most extensive, this receive benefit in it of technique difficulty is opposite and want to be small, at the same time not need to prepare the specialized clock signal, its characteristics to lie in, its data is partition, the long-lost send out and accept, be the CPU is too busy of time can grind to a stop sex to work, also reduced the difficulty on the hardware, the data throw to lose at the same time opposite want to be little, we can pass the examination of the data to observe whether the data that we send out has the mistake or not, be like strange accidentally the method, tired addition and eight efficacies method etc, can use to helps whether the data that we examine to send out have or not themistake occurrence, pass the feedback to carry on the discriminator.A line of transmission of the information contains a string of and combines the cent of: The usual PLC is 8 machines, certainly also having 16 machines. We can be at the time of sending out the data a send out to the other party, also can be 88 send out the data to the other party, and 8 differentiations are also the as that we say to send out the data and combine sends out the data. A speed is more and slowly, but as long as 2 or three lines can solve problem, and can use the telephone line to carry on the long range control. But combine the ocular transmission speed is very quick of, it is a string of ocular of 25600%, occupy the advantage in the short distance, the in view of the fact TTL electricity is even, being limited by the scope of one meter generally, it combine unwell used for the data transmission of the long pull, thus the cost is too expensive.Under a lot of circumstances we are total to like to adopt the string to combine the conversion chip to carry on deliver, under this kind of circumstance not need us to carry on to deposited the machine to establish too and complicatedly, but carry on the data exchanges through the data transmission instruction directly, but is not a very viable way in the correspondence, because the PLC of the other party must has been wait for your data exportation at the time of sending out the data, it can't do other works.When you are reading the book, you hear someone knock on door, you stop to start up of affair, open the door and combine to continue with the one who knock on door a dialogue, the telephone of this time rang, you signal hint to connect a telephone, after connecting the telephone through, return overdo come together knock on door to have a conversation, after dialogue complete, you continue again to see your book, this kind of circumstance we are called the interruption to it, it has the authority, also having sex of have the initiative, the PLC had such function .Its characteristics lie in us and may meet the urgently abrupt affairs in the operation process of the equipments, we want to stop to start immediately up of work, the whereabouts manages the more important affair, this kind of circumstance is we usually meet of, PLC while carry out urgent mission, total will keep the current appearance first, for example the address of the procedure, CPU of tired add the machine data etc., be like to stick down which the book that we see is when we open the door the page or simply make a mark, because we treat and would still need to continue immediately after book of see the behind.The CPU always does the affair that should do according to our will, but your mistake of give it an affair, it also would be same to do, this we must notice.The interruption is not only a, sometimes existing jointly with the hour several inside break, break off to have the preferred Class, they will carry out the interruption of the higher Class according to person's request. This kind of breaks off the medium interruption to also became to break off the set. The Class that certainly breaks off is relevant according to various resources of CPU with internal PLC; also following a heap of capacity size of also relevant fasten.The contents that break off has a lot of kinds, for example the exterior break off, correspondence in of send out and accept the interruption and settle and the clock that count break off, still have the WDT to reset the interruption etc., they enriched the CPU to respond to the category while handle various business. Speak thus perhaps you can't comprehend the internal structure and operation orders of the interruption completely also, we do a very small example to explain.Each equipment always will not forget a button, it also is at we meet the urgent circumstance use of that is nasty to stop the button. When we meet the Human body trouble and surprised circumstances we as long as press it, the machine stops all operations immediately, and wait for processing the over surprised empress recover the operation again. Nasty stop the internal I/ O of the internal CPU of the button conjunction PLC to connect up, be to press button an exterior to trigger signal for CPU, the CPU carries on to the I/ O to examine again, being to confirm to have the exterior to trigger the signal, CPU protection the spot breaks off procedure counts the machine turn the homologous exterior I/ O automatically in the procedure to go to also, be exterior interruption procedure processing complete, the procedure counts the machine to return the main procedure to continue to work. Have 1:00 can what to explain is we generally would nasty stop the button of exterior break off to rise to the tallest Class, thus guarantee the safety.When we are work a work piece, giving the PLC a signal, counting PLC inner part the machine add 1 to compute us for a day of workload, a count the machine and can solve problem in brief, certainly they also can keep the data under the condition of dropping the electricity, urging the data not to throw to lose, this is also what we hope earnestly.The PLC still has the function that the high class counts the machine, being us while accept some dates of high speed, the high speed that here say is the data of the in all aspects tiny second class, for example the bar code scanner is scanning the data continuously, calculating high-speed signal of the data processor DSP etc., we will adopt the high class to count the machine to help we carry on count. It at the PLC carries out the procedure once discover that the high class counts the machine to should of interruption, will let go of the work on the hand immediately. The trapezoid diagram procedure that passes by to weave the distance again explains the high class for us to carry out procedure to count machine would automatic performance to should of work, thus rise the Class that the high class counts the machine to high one Class.You heard too many this phrases perhaps:" crash", the meaning that is mostly is a workload of CPU to lead greatly, the internal resources shortage etc. the circumstance can't result in procedure circulate. The PLC also has the similar circumstance, there is a watchdog WDT in the inner part of PLC, we can establish time that a procedure of WDT circulate, being to appear the procedure to jump to turn the mistake in the procedure movement process or the procedure is busy, movement time of the procedure exceeds WDT constitution time, the CPU turn but the WDT reset the appearance. The procedure restarts the movement, but will not carry on the breakage to the interruption.The PLC development has already entered for network ages of correspondence from the mode of the one, and together other works control the net plank and I/ O card planks to carry on the share easily. A state software can pass all se hardwires link, more animation picture of keep the view to carries on the control, and cans pass the Internet to carry on the control in the foreign land, the blast-off that is like the absolute being boat No.5 is to adopt this kind of way to make airship go up the sky.The development of the higher layer needs our continuous effort to obtain. The PLC emergence has already affected a few persons fully, we also obtained more knowledge and precepts from the top one experience of the generation, coming to the continuous development PLC technique, push it toward higher wave tide.可编程控制器技术讨论与未来发展T.J.拜尔斯(电子测试设备原理及应用普林斯顿大学)随着时代的发展,当今的技术也日趋完善、竞争愈演愈烈;单靠人工的操作已不能满足于目前的制造业前景,也无法保证更高质量的要求和高新技术企业的形象。

本科毕业设计外文文献翻译

本科毕业设计外文文献翻译

(Shear wall st ructural design ofh igh-lev el fr ameworkWu Jiche ngAbstract : In t his pape r the basic c oncepts of man pow er from th e fra me sh ear w all str uc ture, analy sis of the struct ur al des ign of th e c ont ent of t he fr ame she ar wall, in cludi ng the seism ic wa ll she ar spa本科毕业设计外文文献翻译学校代码: 10128学 号:题 目:Shear wall structural design of high-level framework 学生姓名: 学 院:土木工程学院 系 别:建筑工程系 专 业:土木工程专业(建筑工程方向) 班 级:土木08-(5)班 指导教师: (副教授)nratiodesign, and a concretestructure in themost co mmonly usedframe shear wallstructurethedesign of p oints to note.Keywords: concrete; frameshearwall structure;high-risebuildingsThe wall is amodern high-rise buildings is an impo rtant buildingcontent, the size of theframe shear wall must comply with building regulations. The principle is that the largersizebut the thicknessmust besmaller geometric featuresshouldbe presented to the plate,the force is close to cylindrical.The wall shear wa ll structure is a flatcomponent. Itsexposure to the force along the plane level of therole ofshear and moment, must also take intoaccountthe vertical pressure.Operate under thecombined action ofbending moments and axial force andshear forcebythe cantilever deep beam under the action of the force levelto loo kinto the bottom mounted on the basis of. Shearwall isdividedinto a whole walland theassociated shear wall in theactual project,a wholewallfor exampl e, such as generalhousingconstruction in the gableor fish bone structure filmwalls and small openingswall.Coupled Shear walls are connected bythecoupling beam shear wall.Butbecause thegeneralcoupling beamstiffness is less thanthe wall stiffnessof the limbs,so. Walllimb aloneis obvious.The central beam of theinflection pointtopay attentionto thewall pressure than the limits of the limb axis. Will forma shortwide beams,widecolumn wall limbshear wall openings toolarge component atbothen ds with just the domain of variable cross-section ro din the internalforcesunder theactionof many Walllimb inflection point Therefore, the calcula tions and construction shouldAccordingtoapproximate the framestructure to consider.The designof shear walls shouldbe based on the characteristics of avariety ofwall itself,and differentmechanical ch aracteristicsand requirements,wall oftheinternalforcedistribution and failuremodes of specific and comprehensive consideration of the design reinforcement and structural measures. Frame shear wall structure design is to consider the structure of the overall analysis for both directionsofthehorizontal and verticaleffects. Obtain theinternal force is required in accordancewiththe bias or partial pull normal section forcecalculation.The wall structure oftheframe shear wall structural design of the content frame high-rise buildings, in the actual projectintheuse of themost seismic walls have sufficient quantitiesto meet thelimitsof the layer displacement, the location isrelatively flexible. Seismic wall for continuous layout,full-length through.Should bedesigned to avoid the wall mutations in limb length and alignment is notupand down the hole. The sametime.The inside of the hole marginscolumnshould not belessthan300mm inordertoguaranteethelengthof the column as the edgeof the component and constraint edgecomponents.Thebi-direc tional lateral force resisting structural form of vertical andhorizontalwallconnected.Each other as the affinityof the shear wall. For one, two seismic frame she ar walls,even beam highratio should notgreaterthan 5 and a height of not less than400mm.Midline columnand beams,wall midline shouldnotbe greater tha nthe columnwidthof1/4,in order toreduce thetorsional effect of the seismicaction onthecolumn.Otherwisecan be taken tostrengthen thestirrupratio inthe column tomake up.If theshear wall shearspan thanthe big two. Eventhe beamcro ss-height ratiogreaterthan 2.5, then the design pressure of thecut shouldnotmakeabig 0.2. However, if the shearwallshear spanratioof less than two couplingbeams span of less than 2.5, then the shear compres sion ratiois notgreater than 0.15. Theother hand,the bottom ofthe frame shear wallstructure to enhance thedesign should notbe less than200mmand notlessthanstorey 1/16,otherpartsshouldnot be less than 160mm and not less thanstorey 1/20. Aroundthe wall of the frame shear wall structure shouldbe set to the beam or dark beamand the side columntoform a border. Horizontal distributionofshear walls can from the shear effect,this design when building higher longeror framestructure reinforcement should be appropriatelyincreased, especially in the sensitiveparts of the beam position or temperature, stiffnesschange is bestappropriately increased, thenconsideration shouldbe givento the wallverticalreinforcement,because it is mainly from the bending effect, andtake in some multi-storeyshearwall structurereinforcedreinforcement rate -likelessconstrained edgeofthecomponent or components reinforcement of theedge component.References: [1 sad Hayashi,He Yaming. On the shortshear wall high-rise buildingdesign [J].Keyuan, 2008, (O2).高层框架剪力墙结构设计吴继成摘要: 本文从框架剪力墙结构设计的基本概念人手, 分析了框架剪力墙的构造设计内容, 包括抗震墙、剪跨比等的设计, 并出混凝土结构中最常用的框架剪力墙结构设计的注意要点。

毕业设计论文 外文文献翻译

毕业设计论文 外文文献翻译

毕业设计(论文)外文参考文献翻译计算机科学与信息工程系系(院)2008 届题目企业即时通Instant Messaging for Enterprises课题类型技术开发课题来源自选学生姓名许帅专业班级 04计算机科学与技术指导老师王占中职称工程师完成日期:2008年4 月 6 日目录I NSTANT M ESSAGING FOR E NTERPRISE (1)1. Tips (1)2. Introduction (1)3. First things first (2)4.The While-Accept loop (4)5. Per-Thread class (6)6. The Client class (7)企业即时通 (9)1.提示 (9)2.简介 (9)3.首先第一件事 (10)4.监听循环 (11)5.单线程类 (13)6.用户端类 (14)Instant Messaging for Enterprise1. TipsIf Java is, in fact, yet another computer programming language, you may question why it is so important and why it is being promoted as a revolutionary step in computer programming. The answer isn’t immediately obvious if you’re coming from a tr aditional programming perspective. Although Java is very useful for solving traditional standalone programming problems, it is also important because it will solve programming problems on the World Wide Web. What is the Web?The Web can seem a bit of a mys tery at first, with all this talk of “surfing,”“presence,” and “home pages.” It’s helpful to step back and see what it really is, but to do this you must understand client/server systems, another aspect of computing that is full of confusing issues. The primary idea of a client/server system is that you have a central repository of information,some kind of data, often in a database。

毕业设计英文翻译》【范本模板】

毕业设计英文翻译》【范本模板】

外文文献翻译(译成中文1000字左右):【主要阅读文献不少于5篇,译文后附注文献信息,包括:作者、书名(或论文题目)、出版社(或刊物名称)、出版时间(或刊号)、页码。

提供所译外文资料附件(印刷类含封面、封底、目录、翻译部分的复印件等,网站类的请附网址及原文】太阳能—地源热泵的热源性能Y。

Bi1,2,L. Chen1*and C. Wu3本论文研究了中国天津冬季里的太阳能—地源热泵的太阳能与地源性能。

结果被用于设计和分析的太阳能集热器和地面热交换器。

太阳能-地源热泵在这个地区的使用可行性是成立的. 关键词:太阳能,地源热泵,可行性。

介绍地源热泵(GSHP)利用地下相对稳定的温度作为热源或水槽提供热源或调节空气。

GSHP 系统寻求利用常规空气—空气热泵系统的两方面可用的功能。

首先,地下环境温度缓慢地变化,归结于其高的热质量,导致了相对稳定的源或者散热器的温度而不受较大的极限。

其次,被地面吸收的太阳能在整个冬季可以热源。

自从地源热泵的观念在二十世纪四十年代被发展,大量的理论和实验工作都完成了,实验研究审查了具体的地源热泵系统和现场数据。

理论研究已经集中于用数值方法模拟地下盘管换热器以及研究参数对系统性能的影响。

太阳能—地源热泵(SGSHP)采用太阳能集热器和大地作为热源开始发展于1982年。

热泵实验系统用垂直双螺旋线圈(VSDC)地下换热器(GHX)为太阳能—地源热泵(SGSHP)利用低品位能源,这种方法已经被作者们所创造。

(图1)蒸汽压缩热泵的加热负荷和性能系数(COP)取决于蒸发温度和热源温度。

SGSHP采用太阳能集热器和大地作为热源,因此,其应用主要是依靠太阳能和土壤源性能。

在本论文中,中国天津的气象数据被用来分析SGSHP在该区域的应用可行性。

太阳能源分析天津的太阳能在中国处于中等水平。

1966—1976年期间天津的太阳能辐射月平均变化如图2所示。

结果表明,该太阳能集热器在夏天可以直接用于提供热水。

软件工程专业毕业设计外文文献翻译

软件工程专业毕业设计外文文献翻译

软件工程专业毕业设计外文文献翻译1000字本文将就软件工程专业毕业设计的外文文献进行翻译,能够为相关考生提供一定的参考。

外文文献1: Software Engineering Practices in Industry: A Case StudyAbstractThis paper reports a case study of software engineering practices in industry. The study was conducted with a large US software development company that produces software for aerospace and medical applications. The study investigated the company’s software development process, practices, and techniques that lead to the production of quality software. The software engineering practices were identified through a survey questionnaire and a series of interviews with the company’s software development managers, software engineers, and testers. The research found that the company has a well-defined software development process, which is based on the Capability Maturity Model Integration (CMMI). The company follows a set of software engineering practices that ensure quality, reliability, and maintainability of the software products. The findings of this study provide a valuable insight into the software engineering practices used in industry and can be used to guide software engineering education and practice in academia.IntroductionSoftware engineering is the discipline of designing, developing, testing, and maintaining software products. There are a number of software engineering practices that are used in industry to ensure that software products are of high quality, reliable, and maintainable. These practices include software development processes, software configuration management, software testing, requirements engineering, and project management. Software engineeringpractices have evolved over the years as a result of the growth of the software industry and the increasing demands for high-quality software products. The software industry has developed a number of software development models, such as the Capability Maturity Model Integration (CMMI), which provides a framework for software development organizations to improve their software development processes and practices.This paper reports a case study of software engineering practices in industry. The study was conducted with a large US software development company that produces software for aerospace and medical applications. The objective of the study was to identify the software engineering practices used by the company and to investigate how these practices contribute to the production of quality software.Research MethodologyThe case study was conducted with a large US software development company that produces software for aerospace and medical applications. The study was conducted over a period of six months, during which a survey questionnaire was administered to the company’s software development managers, software engineers, and testers. In addition, a series of interviews were conducted with the company’s software development managers, software engineers, and testers to gain a deeper understanding of the software engineering practices used by the company. The survey questionnaire and the interview questions were designed to investigate the software engineering practices used by the company in relation to software development processes, software configuration management, software testing, requirements engineering, and project management.FindingsThe research found that the company has a well-defined software development process, which is based on the Capability Maturity Model Integration (CMMI). The company’s software development process consists of five levels of maturity, starting with an ad hoc process (Level 1) and progressing to a fully defined and optimized process (Level 5). The company has achieved Level 3 maturity in its software development process. The company follows a set of software engineering practices that ensure quality, reliability, and maintainability of the software products. The software engineering practices used by the company include:Software Configuration Management (SCM): The company uses SCM tools to manage software code, documentation, and other artifacts. The company follows a branching and merging strategy to manage changes to the software code.Software Testing: The company has adopted a formal testing approach that includes unit testing, integration testing, system testing, and acceptance testing. The testing process is automated where possible, and the company uses a range of testing tools.Requirements Engineering: The company has a well-defined requirements engineering process, which includes requirements capture, analysis, specification, and validation. The company uses a range of tools, including use case modeling, to capture and analyze requirements.Project Management: The company has a well-defined project management process that includes project planning, scheduling, monitoring, and control. The company uses a range of tools to support project management, including project management software, which is used to track project progress.ConclusionThis paper has reported a case study of software engineering practices in industry. The study was conducted with a large US software development company that produces software for aerospace and medical applications. The study investigated the company’s software development process,practices, and techniques that lead to the production of quality software. The research found that the company has a well-defined software development process, which is based on the Capability Maturity Model Integration (CMMI). The company uses a set of software engineering practices that ensure quality, reliability, and maintainability of the software products. The findings of this study provide a valuable insight into the software engineering practices used in industry and can be used to guide software engineering education and practice in academia.外文文献2: Agile Software Development: Principles, Patterns, and PracticesAbstractAgile software development is a set of values, principles, and practices for developing software. The Agile Manifesto represents the values and principles of the agile approach. The manifesto emphasizes the importance of individuals and interactions, working software, customer collaboration, and responding to change. Agile software development practices include iterative development, test-driven development, continuous integration, and frequent releases. This paper presents an overview of agile software development, including its principles, patterns, and practices. The paper also discusses the benefits and challenges of agile software development.IntroductionAgile software development is a set of values, principles, and practices for developing software. Agile software development is based on the Agile Manifesto, which represents the values and principles of the agile approach. The manifesto emphasizes the importance of individuals and interactions, working software, customer collaboration, and responding to change. Agile software development practices include iterative development, test-driven development, continuous integration, and frequent releases.Agile Software Development PrinciplesAgile software development is based on a set of principles. These principles are:Customer satisfaction through early and continuous delivery of useful software.Welcome changing requirements, even late in development. Agile processes harness change for the customer's competitive advantage.Deliver working software frequently, with a preference for the shorter timescale.Collaboration between the business stakeholders and developers throughout the project.Build projects around motivated individuals. Give them the environment and support they need, and trust them to get the job done.The most efficient and effective method of conveying information to and within a development team is face-to-face conversation.Working software is the primary measure of progress.Agile processes promote sustainable development. The sponsors, developers, and users should be able to maintain a constant pace indefinitely.Continuous attention to technical excellence and good design enhances agility.Simplicity – the art of maximizing the amount of work not done – is essential.The best architectures, requirements, and designs emerge from self-organizing teams.Agile Software Development PatternsAgile software development patterns are reusable solutions to common software development problems. The following are some typical agile software development patterns:The Single Responsibility Principle (SRP)The Open/Closed Principle (OCP)The Liskov Substitution Principle (LSP)The Dependency Inversion Principle (DIP)The Interface Segregation Principle (ISP)The Model-View-Controller (MVC) PatternThe Observer PatternThe Strategy PatternThe Factory Method PatternAgile Software Development PracticesAgile software development practices are a set ofactivities and techniques used in agile software development. The following are some typical agile software development practices:Iterative DevelopmentTest-Driven Development (TDD)Continuous IntegrationRefactoringPair ProgrammingAgile Software Development Benefits and ChallengesAgile software development has many benefits, including:Increased customer satisfactionIncreased qualityIncreased productivityIncreased flexibilityIncreased visibilityReduced riskAgile software development also has some challenges, including:Requires discipline and trainingRequires an experienced teamRequires good communicationRequires a supportive management cultureConclusionAgile software development is a set of values, principles, and practices for developing software. Agile software development is based on the Agile Manifesto, which represents the values and principles of the agile approach. Agile software development practices include iterative development, test-driven development, continuous integration, and frequent releases. Agile software development has many benefits, including increased customer satisfaction, increased quality, increased productivity, increased flexibility, increased visibility, and reduced risk. Agile software development also has some challenges, including the requirement for discipline and training, the requirement for an experienced team, the requirement for good communication, and the requirement for a supportive management culture.。

毕业论文文献外文翻译----危机管理:预防,诊断和干预文献翻译-中英文文献对照翻译

毕业论文文献外文翻译----危机管理:预防,诊断和干预文献翻译-中英文文献对照翻译

第1页 共19页中文3572字毕业论文(设计)外文翻译标题:危机管理-预防,诊断和干预一、外文原文标题:标题:Crisis management: prevention, diagnosis and Crisis management: prevention, diagnosis andintervention 原文:原文:The Thepremise of this paper is that crises can be managed much more effectively if the company prepares for them. Therefore, the paper shall review some recent crises, theway they were dealt with, and what can be learned from them. Later, we shall deal with the anatomy of a crisis by looking at some symptoms, and lastly discuss the stages of a crisis andrecommend methods for prevention and intervention. Crisis acknowledgmentAlthough many business leaders will acknowledge thatcrises are a given for virtually every business firm, many of these firms do not take productive steps to address crisis situations. As one survey of Chief Executive officers of Fortune 500 companies discovered, 85 percent said that a crisisin business is inevitable, but only 50 percent of these had taken any productive action in preparing a crisis plan(Augustine, 1995). Companies generally go to great lengths to plan their financial growth and success. But when it comes to crisis management, they often fail to think and prepare for those eventualities that may lead to a company’s total failure.Safety violations, plants in need of repairs, union contracts, management succession, and choosing a brand name, etc. can become crises for which many companies fail to be prepared untilit is too late.The tendency, in general, is to look at the company as a perpetual entity that requires plans for growth. Ignoring the probabilities of disaster is not going to eliminate or delay their occurrences. Strategic planning without inclusion ofcrisis management is like sustaining life without guaranteeinglife. One reason so many companies fail to take steps to proactively plan for crisis events, is that they fail to acknowledge the possibility of a disaster occurring. Like an ostrich with its head in the sand, they simply choose to ignorethe situation, with the hope that by not talking about it, it will not come to pass. Hal Walker, a management consultant, points out “that decisions will be more rational and better received, and the crisis will be of shorter duration, forcompanies who prepare a proactive crisis plan” (Maynard, 1993) .It is said that “there are two kinds of crises: those that thatyou manage, and those that manage you” (Augustine, 1995). Proactive planning helps managers to control and resolve a crisis. Ignoring the possibility of a crisis, on the other hand,could lead to the crisis taking a life of its own. In 1979, theThree-Mile Island nuclear power plant experienced a crisis whenwarning signals indicated nuclear reactors were at risk of a meltdown. The system was equipped with a hundred or more different alarms and they all went off. But for those who shouldhave taken the necessary steps to resolve the situation, therewere no planned instructions as to what should be done first. Hence, the crisis was not acknowledged in the beginning and itbecame a chronic event.In June 1997, Nike faced a crisis for which they had no existi existing frame of reference. A new design on the company’s ng frame of reference. A new design on the company’s Summer Hoop line of basketball shoes - with the word air writtenin flaming letters - had sparked a protest by Muslims, who complained the logo resembled the Arabic word for Allah, or God.The council of American-Islamic Relations threatened aa globalNike boycott. Nike apologized, recalled 38,000 pairs of shoes,and discontinued the line (Brindley, 1997). To create the brand,Nike had spent a considerable amount of time and money, but hadnever put together a general framework or policy to deal with such controversies. To their dismay, and financial loss, Nike officials had no choice but to react to the crisis. This incident has definitely signaled to the company that spending a little more time would have prevented the crisis. Nonetheless,it has taught the company a lesson in strategic crisis management planning.In a business organization, symptoms or signals can alert the strategic planners or executives of an eminent crisis. Slipping market share, losing strategic synergy anddiminishing productivity per man hour, as well as trends, issues and developments in the socio-economic, political and competitive environments, can signal crises, the effects of which can be very detrimental. After all, business failures and bankruptcies are not intended. They do not usually happen overnight. They occur more because of the lack of attention to symptoms than any other factor.Stages of a crisisMost crises do not occur suddenly. The signals can usuallybe picked up and the symptoms checked as they emerge. A company determined to address these issues realizes that the real challenge is not just to recognize crises, but to recognize themin a timely fashion (Darling et al., 1996). A crisis can consistof four different and distinct stages (Fink, 1986). The phasesare: prodromal crisis stage, acute crisis stage, chronic crisisstage and crisis resolution stage.Modern organizations are often called “organic” due tothe fact that they are not immune from the elements of their surrounding environments. Very much like a living organism, organizations can be affected by environmental factors both positively and negatively. But today’s successfulorganizations are characterized by the ability to adapt by recognizing important environmental factors, analyzing them, evaluating the impacts and reacting to them. The art of strategic planning (as it relates to crisis management)involves all of the above activities. The right strategy, in general, provides for preventive measures, and treatment or resolution efforts both proactively and reactively. It wouldbe quite appropriate to examine the first three stages of acrisis before taking up the treatment, resolution or intervention stage.Prodromal crisis stageIn the field of medicine, a prodrome is a symptom of the onset of a disease. It gives a warning signal. In business organizations, the warning lights are always blinking. No matter how successful the organization, a number of issues andtrends may concern the business if proper and timely attentionis paid to them. For example, in 1995, Baring Bank, a UK financial institution which had been in existence since 1763,ample opportunitysuddenly and unexpectedly failed. There wasfor the bank to catch the signals that something bad was on thehorizon, but the company’s efforts to detect that were thwarted by an internal structure that allowed a single employee both to conduct and to oversee his own investment trades, and the breakdown of management oversight and internalcontrol systems (Mitroff et al., 1996). Likewise, looking in retrospect, McDonald’s fast food chain was given the prodromalsymptoms before the elderly lady sued them for the spilling ofa very hot cup of coffee on her lap - an event that resulted in a substantial financial loss and tarnished image of thecompany. Numerous consumers had complained about thetemperature of the coffee. The warning light was on, but the company did not pay attention. It would have been much simplerto pick up the signal, or to check the symptom, than facing the consequences.In another case, Jack in the Box, a fast food chain, had several customers suffer intestinal distress after eating at their restaurants. The prodromal symptom was there, but the company took evasive action. Their initial approach was to lookaround for someone to blame. The lack of attention, the evasiveness and the carelessness angered all the constituent groups, including their customers. The unfortunate deaths thatptoms,occurred as a result of the company’s ignoring thesymand the financial losses that followed, caused the company to realize that it would have been easier to manage the crisis directly in the prodromal stage rather than trying to shift theblame.Acute crisis stageA prodromal stage may be oblique and hard to detect. The examples given above, are obvious prodromal, but no action wasWebster’s New Collegiate Dictionary, an acute stage occursacutewhen a symptom “demands urgent attention.” Whether the acutesymptom emerges suddenly or is a transformation of a prodromalstage, an immediate action is required. Diverting funds and other resources to this emerging situation may cause disequilibrium and disturbance in the whole system. It is onlythose organizations that have already prepared a framework forthese crises that can sustain their normal operations. For example, the US public roads and bridges have for a long time reflected a prodromal stage of crisis awareness by showing cracks and occasionally a collapse. It is perhaps in light of the obsessive decision to balance the Federal budget that reacting to the problem has been delayed and ignored. This situation has entered an acute stage and at the time of this writing, it was reported that a bridge in Maryland had just collapsed.The reason why prodromes are so important to catch is thatit is much easier to manage a crisis in this stage. In the caseof most crises, it is much easier and more reliable to take careof the problem before it becomes acute, before it erupts and causes possible complications (Darling et al., 1996). In andamage. However, the losses are incurred. Intel, the largest producer of computer chips in the USA, had to pay an expensiveprice for initially refusing to recall computer chips that proved unreliable o n on certain calculations. The f irmfirm attempted to play the issue down and later learned its lesson. At an acutestage, when accusations were made that the Pentium Chips were not as fast as they claimed, Intel quickly admitted the problem,apologized for it, and set about fixing it (Mitroff et al., 1996). Chronic crisis stageDuring this stage, the symptoms are quite evident and always present. I t isIt is a period of “make or break.” Being the third stage, chronic problems may prompt the company’s management to once and for all do something about the situation. It may be the beginning of recovery for some firms, and a deathknell for others. For example, the Chrysler Corporation was only marginallysuccessful throughout the 1970s. It was not, however, until the company was nearly bankrupt that amanagement shake-out occurred. The drawback at the chronic stage is that, like in a human patient, the company may get used to “quick fixes” and “band “band--aid”approaches. After all, the ailment, the problem and the crisis have become an integral partoverwhelmed by prodromal and acute problems that no time or attention is paid to the chronic problems, or the managers perceive the situation to be tolerable, thus putting the crisison a back burner.Crisis resolutionCrises could be detected at various stages of their development. Since the existing symptoms may be related todifferent problems or crises, there is a great possibility thatthey may be misinterpreted. Therefore, the people in charge maybelieve they have resolved the problem. However, in practicethe symptom is often neglected. In such situations, the symptomwill offer another chance for resolution when it becomes acute,thereby demanding urgent care. Studies indicate that today anincreasing number of companies are issue-oriented and searchfor symptoms. Nevertheless, the lack of experience in resolvinga situation and/or inappropriate handling of a crisis can leadto a chronic stage. Of course, there is this last opportunityto resolve the crisis at the chronic stage. No attempt to resolve the crisis, or improper resolution, can lead to grim consequences that will ultimately plague the organization or even destroy it.It must be noted that an unsolved crisis may not destroy the company. But, its weakening effects can ripple through the organization and create a host of other complications.Preventive effortsThe heart of the resolution of a crisis is in the preventiveefforts the company has initiated. This step, similar to a humanbody, is actually the least expensive, but quite often the mostoverlooked. Preventive measures deal with sensing potential problems (Gonzales-Herrero and Pratt, 1995). Major internalfunctions of a company such as finance, production, procurement, operations, marketing and human resources are sensitive to thesocio-economic, political-legal, competitive, technological, demographic, global and ethical factors of the external environment. What is imminently more sensible and much more manageable, is to identify the processes necessary forassessing and dealing with future crises as they arise (Jacksonand Schantz, 1993). At the core of this process are appropriate information systems, planning procedures, anddecision-making techniques. A soundly-based information system will scan the environment, gather appropriate data, interpret this data into opportunities and challenges, and provide a concretefoundation for strategies that could function as much to avoid crises as to intervene and resolve them.Preventive efforts, as stated before, require preparations before any crisis symptoms set in. Generally strategic forecasting, contingency planning, issues analysis, and scenario analysis help to provide a framework that could be used in avoiding and encountering crises.出处:出处:Toby TobyJ. Kash and John R. Darling . Crisis management: prevention, diagnosis 179-186二、翻译文章标题:危机管理:预防,诊断和干预译文:本文的前提是,如果该公司做好准备得话,危机可以更有效地进行管理。

毕业设计外文文献翻译【范本模板】

毕业设计外文文献翻译【范本模板】

毕业设计(论文)外文资料翻译系别:专业:班级:姓名:学号:外文出处:附件: 1. 原文; 2。

译文2013年03月附件一:A Rapidly Deployable Manipulator SystemChristiaan J。

J。

Paredis, H. Benjamin Brown,Pradeep K. KhoslaAbstract:A rapidly deployable manipulator system combines the flexibility of reconfigurable modular hardware with modular programming tools,allowing the user to rapidly create a manipulator which is custom-tailored for a given task. This article describes two main aspects of such a system,namely,the Reconfigurable Modular Manipulator System (RMMS)hardware and the corresponding control software。

1 IntroductionRobot manipulators can be easily reprogrammed to perform different tasks, yet the range of tasks that can be performed by a manipulator is limited by mechanicalstructure。

Forexample,a manipulator well-suited for precise movement across the top of a table would probably no be capable of lifting heavy objects in the vertical direction. Therefore,to perform a given task,one needs to choose a manipulator with an appropriate mechanical structure.We propose the concept of a rapidly deployable manipulator system to address the above mentioned shortcomings of fixed configuration manipulators。

外文文献翻译范例

外文文献翻译范例
正如建筑师和工程师Bruce Graham,Fazlur Khan of Skidmore, Owings and Merrill.(SOM)的芝加哥办公室设计,结构为(225 x为一整体225英尺)一个“绑定圆管状造型”的九个方面的75英尺广场系统,嵌装在一个深色玻璃幕墙。五十层以上,有的就离开广场的塔上升到创建更小的地板加强板和独特的剪影。
StatusComplete
Type:Office
Location:Hong Kong
Construction started:18 April 1985
Completed:1990
Opening:17 May 1990
HeightAntenna spire:367.4 m (1,205.4 ft)
2011年6月8日
外文文献翻译(译成中文1000字左右):
【主要阅读文献不少于5篇,译文后附注文献信息,包括:作者、书名(或论文题目)、出 版 社(或刊物名称)、出版时间(或刊号)、页码。提供所译外文资料附件(印刷类含封面、封底、目录、翻译部分的复印件等,网站类的请附网址及原文)
原文网址:/TALLEST_TOWERS/t_sears.htm
译文
建筑师:Bruce Graham, design partner, Skidmore, Owings and Merrill
地点:Chicago
甲方:Sears Roebuck and Company
工程师:Fazlur Khan of Skidmore, Owings and Merrill.项目年份:2008
香港1985年4月18日开工建设1990年完成1990年5月17日开幕高度天线尖顶三百六十七点四米2418英尺屋顶三百一十五点米10335英尺顶层二百八十八点二米九百四十五点五英尺技术细节地上楼层数724层楼建筑面积一十三点五万平方米1450000平方英尺电梯数45由奥的斯电梯公司生产的设计与施工主要承建商香港建设控股有限公司引文需要熊谷组香港贝聿铭建筑师事务所建筑师事务所谢尔曼西贡有限公司sl的托马斯博阿达莱斯利罗伯逊结构工程师协会rllp参考文献对中国塔简称中银大厦银行是中环香港最知名的摩天大楼之一

_毕业设计外文文献及翻译_

_毕业设计外文文献及翻译_

_毕业设计外文文献及翻译_Graduation Thesis Foreign Literature Review and Chinese Translation1. Title: "The Impact of Artificial Intelligence on Society"Abstract:人工智能对社会的影响摘要:人工智能技术的快速发展引发了关于其对社会影响的讨论。

本文探讨了人工智能正在重塑不同行业(包括医疗保健、交通运输和教育)的各种方式。

还讨论了AI实施的潜在益处和挑战,以及伦理考量。

总体而言,本文旨在提供对人工智能对社会影响的全面概述。

2. Title: "The Future of Work: Automation and Job Displacement"Abstract:With the rise of automation technologies, there is growing concern about the potential displacement of workers in various industries. This paper examines the trends in automation and its impact on jobs, as well as the implications for workforce development and retraining programs. The ethical and social implications of automation are also discussed, along with potential strategies for mitigating job displacement effects.工作的未来:自动化和失业摘要:随着自动化技术的兴起,人们越来越担心各行业工人可能被替代的问题。

毕业设计论文外文文献翻译

毕业设计论文外文文献翻译

xxxx大学xxx学院毕业设计(论文)外文文献翻译系部xxxx专业xxxx学生姓名xxxx 学号xxxx指导教师xxxx 职称xxxx2013年3 月Introducing the Spring FrameworkThe Spring Framework: a popular open source application framework that addresses many of the issues outlined in this book. This chapter will introduce the basic ideas of Spring and dis-cuss the central “bean factory” lightweight Inversion-of-Control (IoC) container in detail.Spring makes it particularly easy to implement lightweight, yet extensible, J2EE archi-tectures. It provides an out-of-the-box implementation of the fundamental architectural building blocks we recommend. Spring provides a consistent way of structuring your applications, and provides numerous middle tier features that can make J2EE development significantly easier and more flexible than in traditional approaches.The basic motivations for Spring are:To address areas not well served by other frameworks. There are numerous good solutions to specific areas of J2EE infrastructure: web frameworks, persistence solutions, remoting tools, and so on. However, integrating these tools into a comprehensive architecture can involve significant effort, and can become a burden. Spring aims to provide an end-to-end solution, integrating spe-cialized frameworks into a coherent overall infrastructure. Spring also addresses some areas that other frameworks don’t. For example, few frameworks address generic transaction management, data access object implementation, and gluing all those things together into an application, while still allowing for best-of-breed choice in each area. Hence we term Spring an application framework, rather than a web framework, IoC or AOP framework, or even middle tier framework.To allow for easy adoption. A framework should be cleanly layered, allowing the use of indi-vidual features without imposing a whole worldview on the application. Many Spring features, such as the JDBC abstraction layer or Hibernate integration, can be used in a library style or as part of the Spring end-to-end solution.To deliver ease of use. As we’ve noted, J2EE out of the box is relatively hard to use to solve many common problems. A good infrastructure framework should make simple tasks simple to achieve, without forcing tradeoffs for future complex requirements (like distributed transactions) on the application developer. It should allow developers to leverage J2EE services such as JTA where appropriate, but to avoid dependence on them in cases when they are unnecessarily complex.To make it easier to apply best practices. Spring aims to reduce the cost of adhering to best practices such as programming to interfaces, rather than classes, almost to zero. However, it leaves the choice of architectural style to the developer.Non-invasiveness. Application objects should have minimal dependence on the framework. If leveraging a specific Spring feature, an object should depend only on that particular feature, whether by implementing a callback interface or using the framework as a class library. IoC and AOP are the key enabling technologies for avoiding framework dependence.Consistent configuration. A good infrastructure framework should keep application configuration flexible and consistent, avoiding the need for custom singletons and factories. A single style should be applicable to all configuration needs, from the middle tier to web controllers.Ease of testing. Testing either whole applications or individual application classes in unit tests should be as easy as possible. Replacing resources or application objects with mock objects should be straightforward.To allow for extensibility. Because Spring is itself based on interfaces, rather than classes, it is easy to extend or customize it. Many Spring components use strategy interfaces, allowing easy customization.A Layered Application FrameworkChapter 6 introduced the Spring Framework as a lightweight container, competing with IoC containers such as PicoContainer. While the Spring lightweight container for JavaBeans is a core concept, this is just the foundation for a solution for all middleware layers.Basic Building Blockspring is a full-featured application framework that can be leveraged at many levels. It consists of multi-ple sub-frameworks that are fairly independent but still integrate closely into a one-stop shop, if desired. The key areas are:Bean factory. The Spring lightweight IoC container, capable of configuring and wiring up Java-Beans and most plain Java objects, removing the need for custom singletons and ad hoc configura-tion. Various out-of-the-box implementations include an XML-based bean factory. The lightweight IoC container and its Dependency Injection capabilities will be the main focus of this chapter.Application context. A Spring application context extends the bean factory concept by adding support for message sources and resource loading, and providing hooks into existing environ-ments. Various out-of-the-box implementations include standalone application contexts and an XML-based web application context.AOP framework. The Spring AOP framework provides AOP support for method interception on any class managed by a Spring lightweight container.It supports easy proxying of beans in a bean factory, seamlessly weaving in interceptors and other advice at runtime. Chapter 8 dis-cusses the Spring AOP framework in detail. The main use of the Spring AOP framework is to provide declarative enterprise services for POJOs.Auto-proxying. Spring provides a higher level of abstraction over the AOP framework and low-level services, which offers similar ease-of-use to .NET within a J2EE context. In particular, the provision of declarative enterprise services can be driven by source-level metadata.Transaction management. Spring provides a generic transaction management infrastructure, with pluggable transaction strategies (such as JTA and JDBC) and various means for demarcat-ing transactions in applications. Chapter 9 discusses its rationale and the power and flexibility that it offers.DAO abstraction. Spring defines a set of generic data access exceptions that can be used for cre-ating generic DAO interfaces that throw meaningful exceptions independent of the underlying persistence mechanism. Chapter 10 illustrates the Spring support for DAOs in more detail, examining JDBC, JDO, and Hibernate as implementation strategies.JDBC support. Spring offers two levels of JDBC abstraction that significantly ease the effort of writing JDBC-based DAOs: the org.springframework.jdbc.core package (a template/callback approach) and the org.springframework.jdbc.object package (modeling RDBMS operations as reusable objects). Using the Spring JDBC packages can deliver much greater pro-ductivity and eliminate the potential for common errors such as leaked connections, compared with direct use of JDBC. The Spring JDBC abstraction integrates with the transaction and DAO abstractions.Integration with O/R mapping tools. Spring provides support classesfor O/R Mapping tools like Hibernate, JDO, and iBATIS Database Layer to simplify resource setup, acquisition, and release, and to integrate with the overall transaction and DAO abstractions. These integration packages allow applications to dispense with custom ThreadLocal sessions and native transac-tion handling, regardless of the underlying O/R mapping approach they work with.Web MVC framework. Spring provides a clean implementation of web MVC, consistent with the JavaBean configuration approach. The Spring web framework enables web controllers to be configured within an IoC container, eliminating the need to write any custom code to access business layer services. It provides a generic DispatcherServlet and out-of-the-box controller classes for command and form handling. Request-to-controller mapping, view resolution, locale resolution and other important services are all pluggable, making the framework highly extensi-ble. The web framework is designed to work not only with JSP, but with any view technology, such as Velocity—without the need for additional bridges. Chapter 13 discusses web tier design and the Spring web MVC framework in detail.Remoting support. Spring provides a thin abstraction layer for accessing remote services without hard-coded lookups, and for exposing Spring-managed application beans as remote services. Out-of-the-box support is inc luded for RMI, Caucho’s Hessian and Burlap web service protocols, and WSDL Web Services via JAX-RPC. Chapter 11 discusses lightweight remoting.While Spring addresses areas as diverse as transaction management and web MVC, it uses a consistent approach everywhere. Once you have learned the basic configuration style, you will be able to apply it in many areas. Resources, middle tier objects, and web components are all set up using the same bean configuration mechanism. You can combine your entireconfiguration in one single bean definition file or split it by application modules or layers; the choice is up to you as the application developer. There is no need for diverse configuration files in a variety of formats, spread out across the application.Spring on J2EEAlthough many parts of Spring can be used in any kind of Java environment, it is primarily a J2EE application framework. For example, there are convenience classes for linking JNDI resources into a bean factory, such as JDBC DataSources and EJBs, and integration with JTA for distributed transaction management. In most cases, application objects do not need to work with J2EE APIs directly, improving reusability and meaning that there is no need to write verbose, hard-to-test, JNDI lookups.Thus Spring allows application code to seamlessly integrate into a J2EE environment without being unnecessarily tied to it. You can build upon J2EE services where it makes sense for your application, and choose lighter-weight solutions if there are no complex requirements. For example, you need to use JTA as transaction strategy only if you face distributed transaction requirements. For a single database, there are alternative strategies that do not depend on a J2EE container. Switching between those transac-tion strategies is merely a matter of configuration; Spring’s consistent abstraction avoids any need to change application code.Spring offers support for accessing EJBs. This is an important feature (and relevant even in a book on “J2EE without EJB”) because the u se of dynamic proxies as codeless client-side business delegates means that Spring can make using a local stateless session EJB an implementation-level, rather than a fundamen-tal architectural, choice.Thus if you want to use EJB, you can within a consistent architecture; however, you do not need to make EJB the cornerstone of your architecture. This Spring feature can make devel-oping EJB applications significantly faster, because there is no need to write custom code in service loca-tors or business delegates. Testing EJB client code is also much easier, because it only depends on the EJB’s Business Methods interface (which is not EJB-specific), not on JNDI or the EJB API.Spring also provides support for implementing EJBs, in the form of convenience superclasses for EJB implementation classes, which load a Spring lightweight container based on an environment variable specified in the ejb-jar.xml deployment descriptor. This is a powerful and convenient way of imple-menting SLSBs or MDBs that are facades for fine-grained POJOs: a best practice if you do choose to implement an EJB application. Using this Spring feature does not conflict with EJB in any way—it merely simplifies following good practice.Introducing the Spring FrameworkThe main aim of Spring is to make J2EE easier to use and promote good programming practice. It does not reinvent the wheel; thus you’ll find no logging packages in Spring, no connection pools, no distributed transaction coordinator. All these features are provided by other open source projects—such as Jakarta Commons Logging (which Spring uses for all its log output), Jakarta Commons DBCP (which can be used as local DataSource), and ObjectWeb JOTM (which can be used as transaction manager)—or by your J2EE application server. For the same reason, Spring doesn’t provide an O/R mapping layer: There are good solutions for this problem area, such as Hibernate and JDO.Spring does aim to make existing technologies easier to use. For example, although Spring is not in the business of low-level transactioncoordination, it does provide an abstraction layer over JTA or any other transaction strategy. Spring is also popular as middle tier infrastructure for Hibernate, because it provides solutions to many common issues like SessionFactory setup, ThreadLocal sessions, and exception handling. With the Spring HibernateTemplate class, implementation methods of Hibernate DAOs can be reduced to one-liners while properly participating in transactions.The Spring Framework does not aim to replace J2EE middle tier services as a whole. It is an application framework that makes accessing low-level J2EE container ser-vices easier. Furthermore, it offers lightweight alternatives for certain J2EE services in some scenarios, such as a JDBC-based transaction strategy instead of JTA when just working with a single database. Essentially, Spring enables you to write appli-cations that scale down as well as up.Spring for Web ApplicationsA typical usage of Spring in a J2EE environment is to serve as backbone for the logical middle tier of a J2EE web application. Spring provides a web application context concept, a powerful lightweight IoC container that seamlessly adapts to a web environment: It can be accessed from any kind of web tier, whether Struts, WebWork, Tapestry, JSF, Spring web MVC, or a custom solution.The following code shows a typical example of such a web application context. In a typical Spring web app, an applicationContext.xml file will reside in the WEB-INF directory, containing bean defini-tions according to the “spring-beans” DTD. In such a bean definition XML file, business objects and resources are defined, for example, a “myDataSource” bean, a “myInventoryManager” bean, and a “myProductManager” bean. Spring takes care of their configuration, their wiring up, and their lifecycle.<beans><bean id=”myDataSource” class=”org.springframework.jdbc. datasource.DriverManagerDataSource”><property name=”driverClassName”> <value>com.mysql.jdbc.Driver</value></property> <property name=”url”><value>jdbc:mysql:myds</value></property></bean><bean id=”myInventoryManager” class=”ebusiness.DefaultInventoryManager”> <property name=”dataSource”><ref bean=”myDataSource”/> </property></bean><bean id=”myProductManager” class=”ebusiness.DefaultProductManage r”><property name=”inventoryManager”><ref bean=”myInventoryManager”/> </property><property name=”retrieveCurrentStock”> <value>true</value></property></bean></beans>By default, all such beans have “singleton” scope: one instance per context. The “myInventoryManager” bean will automatically be wired up with the defined DataSource, while “myProductManager” will in turn receive a reference to the “myInventoryManager” bean. Those objects (traditionally called “beans” in Spring terminology) need to expos e only the corresponding bean properties or constructor arguments (as you’ll see later in this chapter); they do not have to perform any custom lookups.A root web application context will be loaded by a ContextLoaderListener that is defined in web.xml as follows:<web-app><listener> <listener-class>org.springframework.web.context.ContextLoaderListener</listener-class></listener>...</web-app>After initialization of the web app, the root web application context will be available as a ServletContext attribute to the whole web application, in the usual manner. It can be retrieved from there easily via fetching the corresponding attribute, or via a convenience method in org.springframework.web. context.support.WebApplicationContextUtils. This means that the application context will be available in any web resource with access to the ServletContext, like a Servlet, Filter, JSP, or Struts Action, as follows:WebApplicationContext wac = WebApplicationContextUtils.getWebApplicationContext(servletContext);The Spring web MVC framework allows web controllers to be defined as JavaBeans in child application contexts, one per dispatcher servlet. Such controllers can express dependencies on beans in the root application context via simple bean references. Therefore, typical Spring web MVC applications never need to perform a manual lookup of an application context or bean factory, or do any other form of lookup.Neither do other client objects that are managed by an application context themselves: They can receive collaborating objects as bean references.The Core Bean FactoryIn the previous section, we have seen a typical usage of the Spring IoC container in a web environment: The provided convenience classes allow for seamless integration without having to worry about low-level container details. Nevertheless, it does help to look at the inner workings to understand how Spring manages the container. Therefore, we will now look at the Spring bean container in more detail, starting at the lowest building block: the bean factory. Later, we’ll continue with resource setup and details on the application context concept.One of the main incentives for a lightweight container is to dispense with the multitude of custom facto-ries and singletons often found in J2EE applications. The Spring bean factory provides one consistent way to set up any number of application objects, whether coarse-grained components or fine-grained busi-ness objects. Applying reflection and Dependency Injection, the bean factory can host components that do not need to be aware of Spring at all. Hence we call Spring a non-invasive application framework.Fundamental InterfacesThe fundamental lightweight container interface is org.springframework.beans.factory.Bean Factory. This is a simple interface, which is easy to implement directly in the unlikely case that none of the implementations provided with Spring suffices. The BeanFactory interface offers two getBean() methods for looking up bean instances by String name, with the option to check for a required type (and throw an exception if there is a type mismatch).public interface BeanFactory {Object getBean(String name) throws BeansException;Object getBean(String name, Class requiredType) throws BeansException;boolean containsBean(String name);boolean isSingleton(String name) throws NoSuchBeanDefinitionException;String[] getAliases(String name) throws NoSuchBeanDefinitionException;}The isSingleton() method allows calling code to check whether the specified name represents a sin-gleton or prototype bean definition. In the case of a singleton bean, all calls to the getBean() method will return the same object instance. In the case of a prototype bean, each call to getBean() returns an inde-pendent object instance, configured identically.The getAliases() method will return alias names defined for the given bean name, if any. This mecha-nism is used to provide more descriptive alternative names for beans than are permitted in certain bean factory storage representations, such as XML id attributes.The methods in most BeanFactory implementations are aware of a hierarchy that the implementation may be part of. If a bean is not foundin the current factory, the parent factory will be asked, up until the root factory. From the point of view of a caller, all factories in such a hierarchy will appear to be merged into one. Bean definitions in ancestor contexts are visible to descendant contexts, but not the reverse.All exceptions thrown by the BeanFactory interface and sub-interfaces extend org.springframework. beans.BeansException, and are unchecked. This reflects the fact that low-level configuration prob-lems are not usually recoverable: Hence, application developers can choose to write code to recover from such failures if they wish to, but should not be forced to write code in the majority of cases where config-uration failure is fatal.Most implementations of the BeanFactory interface do not merely provide a registry of objects by name; they provide rich support for configuring those objects using IoC. For example, they manage dependen-cies between managed objects, as well as simple properties. In the next section, we’ll look at how such configuration can be expressed in a simple and intuitive XML structure.The sub-interface org.springframework.beans.factory.ListableBeanFactory supports listing beans in a factory. It provides methods to retrieve the number of beans defined, the names of all beans, and the names of beans that are instances of a given type:public interface ListableBeanFactory extends BeanFactory {int getBeanDefinitionCount();String[] getBeanDefinitionNames();String[] getBeanDefinitionNames(Class type);boolean containsBeanDefinition(String name);Map getBeansOfType(Class type, boolean includePrototypes,boolean includeFactoryBeans) throws BeansException}The ability to obtain such information about the objects managed by a ListableBeanFactory can be used to implement objects that work with a set of other objects known only at runtime.In contrast to the BeanFactory interface, the methods in ListableBeanFactory apply to the current factory instance and do not take account of a hierarchy that the factory may be part of. The org.spring framework.beans.factory.BeanFactoryUtils class provides analogous methods that traverse an entire factory hierarchy.There are various ways to leverage a Spring bean factory, ranging from simple bean configuration to J2EE resource integration and AOP proxy generation. The bean factory is the central, consistent way of setting up any kind of application objects in Spring, whether DAOs, business objects, or web controllers. Note that application objects seldom need to work with the BeanFactory interface directly, but are usu-ally configured and wired by a factory without the need for any Spring-specific code.For standalone usage, the Spring distribution provides a tiny spring-core.jar file that can be embed-ded in any kind of application. Its only third-party dependency beyond J2SE 1.3 (plus JAXP for XML parsing) is the Jakarta Commons Logging API.The bean factory is the core of Spring and the foundation for many other services that the framework offers. Nevertheless, the bean factory can easily be used stan-dalone if no other Spring services are required.Derivative:networkSpring 框架简介Spring框架:这是一个流行的开源应用框架,它可以解决很多问题。

(完整word版)网络营销外文文献及翻译

(完整word版)网络营销外文文献及翻译

毕业设计(论文)外文资料翻译学院(系): 计算机科学与技术学院专业:网络工程姓名:王灿学号: 201317030125外文出处:附件: 1.外文资料翻译译文;2。

外文原文。

指导教师评语:签名:年月日注:请将该封面与附件装订成册。

附件1:外文资料翻译译文网络营销一、网络营销的概念网络营销是企业整体营销战略的一个组成部分,是建立在互联网基础上,借助于互联网的特性来实现一定营销目标的一种营销手段.它以现代营销理论为基础,以开拓市场、增加盈利为目标,利用因特网的技术和功能,最大限度地满足客户需求的经营过程.网络营销的实质是利用互联网对产品的销前、销中、售后个个环节进行跟踪服务,它自始至终贯穿在企业经营的过程。

网络营销在英文中有多种表达方式,每种表达方式都有相应的侧重点和内涵,如Internet Marketing,强调的是以因特网为工具的市场营销;Web Marketing指网站营销,着重于网站的推广,站点与顾客的沟通;Cyber Marketing指网络营销是在虚拟的计算机空间进行运作;E —marketing指与电子商务相对应的电子化、信息化、网络化的营销活动。

现在常用的翻译方式是online Marketing和Internet Marketing,且专指国际互联网营销。

网络营销不一定包括完整的商业交易过程(例如,它可以不考虑网上支付等环节),但它是电子商务的重要组成部分。

在我国,企业应首先发展网络营销,并通过完善企业网络平台稳步过渡到电子商务。

网络营销的主要内容包括网上市场调查、网上消费行为分析、网络营销策略制定、网络营销价格策略制定、网上营销渠道选择以及网络营销管理与控制等。

具体的营销手段有E—mail营销、网络广告和建立网络营销站点等。

二、网络营销的特点互联网的出现深刻地影响了人类生活的每个角落,它如同一种“万能胶”,把企业组织及个人跨时空地联结在一起.在这样一种新的营销环境下,网络营销呈现其独有的特点。

(完整word版)外文文献及翻译doc

(完整word版)外文文献及翻译doc

Criminal Law1.General IntroductionCriminal law is the body of the law that defines criminal offenses, regulates the apprehension, charging, and trial of suspected offenders,and fixes punishment for convicted persons. Substantive criminal law defines particular crimes, and procedural law establishes rules for the prosecution of crime. In a democratic society, it is the function of the legislative bodies to decide what behavior will be made criminal and what penalties will be attached to violations of the law.Capital punishment may be imposed in some jurisdictions for the most serious crimes. And physical or corporal punishment may still be imposed such as whipping or caning, although these punishments are prohibited in much of the world. A convict may be incarcerated in prison or jail and the length of incarceration may vary from a day to life.Criminal law is a reflection of the society that produce it. In an Islamic theocracy, such as Iran, criminal law will reflect the religious teachings of the Koran; in an Catholic country, it will reflect the tenets of Catholicism. In addition, criminal law will change to reflect changes in society, especially attitude changes. For instance, use of marijuana was once considered a serious crime with harsh penalties, whereas today the penalties in most states are relatively light. As severity of the penaltieswas reduced. As a society advances, its judgments about crime and punishment change.2.Elements of a CrimeObviously, different crimes require different behaviors, but there are common elements necessary for proving all crimes. First, the prohibited behavior designated as a crime must be clearly defined so that a reasonable person can be forewarned that engaging in that behavior is illegal. Second, the accused must be shown to have possessed the requisite intent to commit the crime. Third, the state must prove causation. Finally, the state must prove beyond a reasonable doubt that the defendant committed the crime.(1) actus reusThe first element of crime is the actus reus.Actus is an act or action and reus is a person judicially accused of a crime. Therefore, actus reus is literally the action of a person accused of a crime. A criminal statute must clearly define exactly what act is deemed “guilty”---that is, the exact behavior that is being prohibited. That is done so that all persons are put on notice that if they perform the guilty act, they will be liable for criminal punishment. Unless the actus reus is clearly defined, one might not know whether or not on e’s behavior is illegal.Actus reus may be accomplished by an action, by threat of action,or exceptionally, by an omission to act, which is a legal duty to act. For example, the act of Cain striking Abel might suffice, or a parent’s failure to give to a young child also may provide the actus reus for a crime.Where the actus reus is a failure to act, there must be a duty of care. A duty can arise through contract, a voluntary undertaking, a blood relation, and occasionally through one’s official position. Duty also can arise from one’s own creation of a dangerous situation.(2)mens reaA second element of a crime is mens rea. Mens rea refers to an individual’s state of mind when a crime is committed. While actus reus is proven by physical or eyewitness evidence, mens rea is more difficult to ascertain. The jury must determine for itself whether the accused had the necessary intent to commit the act.A lower threshold of mens rea is satisfied when a defendant recognizes an act is dangerous but decides to commit it anyway. This is recklessness. For instance, if Cain tears a gas meter from a wall, and knows this will let flammable gas escape into a neighbor’s house, he could be liable for poisoning. Courts often consider whether the actor did recognise the danger, or alternatively ought to have recognized a danger (though he did not) is tantamount to erasing intent as a requirement. In this way, the importance of mens rea hasbeen reduced in some areas of the criminal law.Wrongfulness of intent also may vary the seriousness of an offense. A killing committed with specific intent to kill or with conscious recognition that death or serious bodily harm will result, would be murder, whereas a killing affected by reckless acts lacking such a consciousness could be manslaughter.(3)CausationThe next element is causation. Often the phrase “but for”is used to determine whether causation has occurred. For example, we might say “Cain caused Abel”, by which we really mean “Cain caused Abel’s death. ”In other words, ‘but for Cain’s act, Abel would still be alive.” Causation, then, means “but for” the actions of A, B would not have been harmed. In criminal law, causation is an element that must be proven beyond a reasonable doubt.(4) Proof beyond a Reasonable DoubtIn view of the fact that in criminal cases we are dealing with the life and liberty of the accused person, as well as the stigma accompanying conviction, the legal system places strong limits on the power of the state to convict a person of a crime. Criminal defendants are presumed innocent. The state must overcome this presumption of innocence by proving every element of the offense charged against the defendant beyond a reasonable doubt to thesatisfaction of all the jurors. This requirement is the primary way our system minimizes the risk of convicting an innocent person.The state must prove its case within a framework of procedural safeguards that are designed to protect the accused. The state’s failure to prove any material element of its case results in the accused being acquitted or found not guilty, even though he or she may actually have committed the crime charged.3. Strict LiabilityIn modern society, some crimes require no more mens rea, and they are known as strict liability offenses. For in stance, under the Road Traffic Act 1988 it is a strict liability offence to drive a vehicle with an alcohol concentration above the prescribed limit.Strict liability can be described as criminal or civil liability notwithstanding the lack mens rea or intent by the defendant. Not all crimes require specific intent, and the threshold of culpability required may be reduced. For example, it might be sufficient to show that a defendant acted negligently, rather than intentionally or recklessly.1. 概述刑法是规定什么试犯罪,有关犯罪嫌疑人之逮捕、起诉及审判,及对已决犯处以何种刑罚的部门法。

毕业设计外文文献翻译

毕业设计外文文献翻译

毕业设计外文文献翻译Graduation Design Foreign Literature Translation (700 words) Title: The Impact of Artificial Intelligence on the Job Market Introduction:Artificial Intelligence (AI) is a rapidly growing field that has the potential to revolutionize various industries and job markets. With advancements in technologies such as machine learning and natural language processing, AI has become capable of performing tasks traditionally done by humans. This has raised concerns about the future of jobs and the impact AI will have on the job market. This literature review aims to explore the implications of AI on employment and job opportunities.AI in the Workplace:AI technologies are increasingly being integrated into the workplace, with the aim of automating routine and repetitive tasks. For example, automated chatbots are being used to handle customer service queries, while machine learning algorithms are being employed to analyze large data sets. This has resulted in increased efficiency and productivity in many industries. However, it has also led to concerns about job displacement and unemployment.Job Displacement:The rise of AI has raised concerns about job displacement, as AI technologies are becoming increasingly capable of performing tasks previously done by humans. For example, automated machines can now perform complex surgeries with greaterprecision than human surgeons. This has led to fears that certain jobs will become obsolete, leading to unemployment for those who were previously employed in these industries.New Job Opportunities:While AI might potentially replace certain jobs, it also creates new job opportunities. As AI technologies continue to evolve, there will be a greater demand for individuals with technical skills in AI development and programming. Additionally, jobs that require human interaction and emotional intelligence, such as social work or counseling, may become even more in demand, as they cannot be easily automated.Job Transformation:Another potential impact of AI on the job market is job transformation. AI technologies can augment human abilities rather than replacing them entirely. For example, AI-powered tools can assist professionals in making decisions, augmenting their expertise and productivity. This may result in changes in job roles and the need for individuals to adapt their skills to work alongside AI technologies.Conclusion:The impact of AI on the job market is still being studied and debated. While AI has the potential to automate certain tasks and potentially lead to job displacement, it also presents opportunities for new jobs and job transformation. It is essential for individuals and organizations to adapt and acquire the necessary skills to navigate these changes in order to stay competitive in the evolvingjob market. Further research is needed to fully understand the implications of AI on employment and job opportunities.。

本科毕业设计外文文献及译文1

本科毕业设计外文文献及译文1

本科毕业设计外文文献及译文文献、资料题目:Transit Route Network Design Problem:Review文献、资料来源:网络文献、资料发表(出版)日期:2007.1院(部):xxx专业:xxx班级:xxx姓名:xxx学号:xxx指导教师:xxx翻译日期:xxx外文文献:Transit Route Network Design Problem:Review Abstract:Efficient design of public transportation networks has attracted much interest in the transport literature and practice,with manymodels and approaches for formulating the associated transit route network design problem _TRNDP_having been developed.The presentpaper systematically presents and reviews research on the TRNDP based on the three distinctive parts of the TRNDP setup:designobjectives,operating environment parameters and solution approach.IntroductionPublic transportation is largely considered as a viable option for sustainable transportation in urban areas,offering advantages such as mobility enhancement,traffic congestion and air pollution reduction,and energy conservation while still preserving social equity considerations. Nevertheless,in the past decades,factors such as socioeconomic growth,the need for personalized mobility,the increase in private vehicle ownership and urban sprawl have led to a shift towards private vehicles and a decrease in public transportation’s share in daily commuting (Sinha2003;TRB2001;EMTA2004;ECMT2002;Pucher et al.2007).Efforts for encouraging public transportation use focuses on improving provided services such as line capacity,service frequency,coverage,reliability,comfort and service quality which are among the most important parameters for an efficient public transportation system(Sinha2003;Vuchic2004.) In this context,planning and designing a cost and service efficientpublic transportation network is necessary for improving its competitiveness and market share. The problem that formally describes the design of such a public transportation network is referred to as the transit route network design problem(TRNDP);it focuses on the optimization of a number of objectives representing the efficiency of public transportation networks under operational and resource constraints such as the number and length of public transportation routes, allowable service frequencies,and number of available buses(Chakroborty2003;Fan and Machemehl2006a,b).The practical importance of designing public transportation networks has attractedconsiderable interest in the research community which has developed a variety of approaches and modelsfor the TRNDP including different levels of design detail and complexity as well as interesting algorithmic innovations.In thispaper we offer a structured review of approaches for the TRNDP;researchers will obtain a basis for evaluating existing research and identifying future research paths for further improving TRNDP models.Moreover,practitioners will acquire a detailed presentation of both the process and potential tools for automating the design of public transportation networks,their characteristics,capabilities,and strengths.Design of Public Transportation NetworksNetwork design is an important part of the public transportation operational planning process_Ceder2001_.It includes the design of route layouts and the determination of associated operational characteristics such as frequencies,rolling stock types,and so on As noted by Ceder and Wilson_1986_,network design elements are part of the overall operational planning process for public transportation networks;the process includes five steps:_1_design of routes;_2_ setting frequencies;_3_developing timetables;_4_scheduling buses;and_5_scheduling drivers. Route layout design is guided by passenger flows:routes are established to provide direct or indirect connection between locations and areas that generate and attract demand for transit travel, such as residential and activity related centers_Levinson1992_.For example,passenger flows between a central business district_CBD_and suburbs dictate the design of radial routes while demand for trips between different neighborhoods may lead to the selection of a circular route connecting them.Anticipated service coverage,transfers,desirable route shapes,and available resources usually determine the structure of the route network.Route shapes areusually constrained by their length and directness_route directness implies that route shapes are as straight as possible between connected points_,the usage of given roads,and the overlapping with other transit routes.The desirable outcome is a set of routesconnecting locations within a service area,conforming to given design criteria.For each route, frequencies and bus types are the operational characteristics typically determined through design. Calculations are based on expected passenger volumes along routes that are estimated empirically or by applying transit assignmenttechniques,under frequency requirement constraints_minimum and maximum allowedfrequencies guaranteeing safety and tolerable waiting times,respectively_,desired load factors, fleet size,and availability.These steps as well as the overall design.process have been largely based upon practical guidelines,the expert judgment of transit planners,and operators experience_Baaj and Mahmassani1991_.Two handbooks by Black _1995_and Vuchic_2004_outline frameworks to be followed by planners when designing a public transportation network that include:_1_establishing the objectives for the network;_2_ defining the operational environment of the network_road structure,demand patterns,and characteristics_;_3_developing;and_4_evaluating alternative public transportation networks.Despite the extensive use of practical guidelines and experience for designing transit networks,researchers have argued that empirical rules may not be sufficient for designing an efficient transit network and improvements may lead to better quality and more efficient services. For example,Fan and Machemehl_2004_noted that researchers and practitioners have been realizing that systematic and integrated approaches are essential for designing economically and operationally efficient transit networks.A systematic design process implies clear and consistent steps and associated techniques for designing a public transportation network,which is the scope of the TRNDP.TRNDP:OverviewResearch has extensively examined the TRNDP since the late1960s.In1979,Newell discussed previous research on the optimal design of bus routes and Hasselström_1981_ analyzed relevant studies and identified the major features of the TRNDP as demand characteristics,objective functions,constraints,passengerbehavior,solution techniques,and computational time for solving the problem.An extensive review of existing work on transit network design was provided by Chua_1984_who reported five types of transit system planning:_1_manual;_2_marketanalysis;_3_systems analysis;_4_systems analysis with interactive graphics;and_5_ mathematical optimization approach.Axhausemm and Smith_1984_analyzed existing heuristic algorithms for formulating the TRNDP in Europe,tested them,anddiscussed their potential implementation in the United States.Ceder and Wilson_1986_reportedprior work on the TRNDP and distinguished studies into those that deal with idealized networks and to those that focus on actual routes,suggesting that the main features of the TRNDP include demand characteristics,objectivesand constraints,and solution methods.At the same period,Van Nes et al._1988_grouped TRNDP models into six categories:_1_ analytical models for relating parameters of the public transportation system;_2_models determining the links to be used for public transportation route construction;_3_models determining routes only;_4_models assigning frequencies to a set of routes;_5_two-stage models for constructing routes and then assigning frequencies;and_6_models for simultaneously determining routes and frequencies.Spacovic et al._1994_and Spacovic and Schonfeld_1994_proposed a matrix organization and classified each study according to design parameters examined,objectives anticipated,network geometry,and demand characteristics. Ceder and Israeli_1997_suggested broad categorizations for TRNDP models into passenger flow simulation and mathematical programming models.Russo_1998_adopted the same categorization and noted that mathematical programming models guarantee optimal transit network design but sacrifice the level of detail in passenger representation and design parameters, while simulation models address passenger behavior but use heuristic procedures obtaining a TRNDP solution.Ceder_2001_enhanced his earlier categorization by classifying TRNDP models into simulation,ideal network,and mathematical programming models.Finally,in a recent series of studies,Fan and Machemehl_2004,2006a,b_divided TRNDP approaches into practical approaches,analytical optimization models for idealized conditions,and metaheuristic procedures for practical problems.The TRNDP is an optimization problem where objectives are defined,its constraints are determined,and a methodology is selected and validated for obtaining an optimal solution.The TRNDP is described by the objectives of the public transportation network service to be achieved, the operational characteristics and environment under which the network will operate,and the methodological approach for obtaining the optimal network design.Based on this description of the TRNDP,we propose a three-layer structure for organizing TRNDP approaches_Objectives, Parameters,and Methodology_.Each layer includes one or more items that characterize each study.The“Objectives”layer incorporates the goals set when designing a public transportation system such as the minimization of the costs of the system or the maximization of the quality of services provided.The“Parameters”layer describes the operating environment and includes both the design variables expected to be derived for the transit network_route layouts,frequencies_as well as environmental and operational parameters affecting and constraining that network_for example,allowable frequencies,desired load factors,fleet availability,demand characteristics and patterns,and so on_.Finally,the“Methodology”layer covers the logical–mathematical framework and algorithmic tools necessary to formulate and solve the TRNDP.The proposed structure follows the basic concepts toward setting up a TRNDP:deciding upon the objectives, selecting the transit network items and characteristics to be designed,setting the necessary constraints for the operating environment,and formulating and solving the problem. TRNDP:ObjectivesPublic transportation serves a very important social role while attempting to do this at the lowest possible operating cost.Objectives for designing daily operations of a public transportation system should encompass both angles.The literature suggests that most studies actually focus on both the service and economic efficiency when designing such a system. Practical goals for the TRNDP can be briefly summarized as follows_Fielding1987;van Oudheudsen et al.1987;Black1995_:_1_user benefit maximization;_2_operator cost minimization;_3_total welfare maximization;_4_capacity maximization;_5_energy conservation—protection of the environment;and_6_individual parameter optimization.Mandl_1980_indicated that public transportation systems have different objectives to meet. He commented,“even a single objective problem is difficult to attack”_p.401_.Often,these objectives are controversial since cutbacks in operating costs may require reductions in the quality of services.Van Nes and Bovy_2000_pointed out that selected objectives influence the attractiveness and performance of a public transportation network.According to Ceder and Wilson_1986_,minimization of generalized cost or time or maximization of consumer surplus were the most common objectives selected when developing transit network design models. Berechman_1993_agreed that maximization of total welfare is the most suitable objective for designing a public transportation system while Van Nes and Bovy_2000_argued that the minimization of total user and system costs seem the most suit able and less complicatedobjective_compared to total welfare_,while profit maximization leads to nonattractive public transportation networks.As can be seen in Table1,most studies seek to optimize total welfare,which incorporates benefits to the user and to the er benefits may include travel,access and waiting cost minimization,minimization of transfers,and maximization of coverage,while benefits for the system are maximum utilization and quality of service,minimization of operating costs, maximization of profits,and minimization of the fleet size used.Most commonly,total welfare is represented by the minimization of user and system costs.Some studies address specific objectives from the user,theoperator,or the environmental perspective.Passenger convenience,the number of transfers, profit and capacity maximization,travel time minimization,and fuel consumption minimization are such objectives.These studies either attempt to simplify the complex objective functions needed to setup the TRNDP_Newell1979;Baaj and Mahmassani1991;Chakroborty and Dwivedi2002_,or investigate specific aspects of the problem,such as objectives_Delle Site and Fillipi2001_,and the solution methodology_Zhao and Zeng2006;Yu and Yang2006_.Total welfare is,in a sense,a compromise between objectives.Moreover,as reported by some researchers such as Baaj and Mahmassani_1991_,Bielli et al._2002_,Chackroborty and Dwivedi_2002_,and Chakroborty_2003_,transit network design is inherently a multiobjective problem.Multiobjective models for solving the TRNDP have been based on the calculation of indicators representing different objectives for the problem at hand,both from the user and operator perspectives,such as travel and waiting times_user_,and capacity and operating costs _operator_.In their multiobjective model for the TRNDP,Baaj and Majmassani_1991_relied on the planner’s judgment and experience for selecting the optimal public transportation network,based on a set of indicators.In contrast,Bielli et al._2002_and Chakroborty and Dwivedi_2002_,combined indicators into an overall,weighted sum value, which served as the criterion for determining the optimaltransit network.TRNDP:ParametersThere are multiple characteristics and design attributes to consider for a realistic representation of a public transportation network.These form the parameters for the TRNDP.Part of these parameters is the problem set of decision variables that define its layout and operational characteristics_frequencies,vehicle size,etc._.Another set of design parameters represent the operating environment_network structure,demand characters,and patterns_, operational strategies and rules,and available resources for the public transportation network. These form the constraints needed to formulate the TRNDP and are,a-priori fixed,decided upon or assumed.Decision VariablesMost common decision variables for the TRNDP are the routes and frequencies of the public transportation network_Table1_.Simplified early studies derived optimal route spacing between predetermined parallel or radial routes,along with optimal frequencies per route_Holroyd1967; Byrne and Vuchic1972;Byrne1975,1976;Kocur and Hendrickson1982;Vaughan1986_,while later models dealt with the development of optimal route layouts and frequency determination. Other studies,additionally,considered fares_Kocur and Hendrickson1982;Morlok and Viton 1984;Chang and Schonfeld1991;Chien and Spacovic2001_,zones_Tsao and Schonfeld1983; Chang and Schonfeld1993a_,stop locations_Black1979;Spacovic and Schonfeld1994; Spacovic et al.1994;Van Nes2003;Yu and Yang2006_and bus types_Delle Site and Filippi 2001_.Network StructureSome early studies focused on the design of systems in simplified radial_Byrne1975;Black 1979;Vaughan1986_,or rectangular grid road networks_Hurdle1973;Byrne and Vuchic1972; Tsao and Schonfeld1984_.However,most approaches since the1980s were either applied to realistic,irregular grid networks or the network structure was of no importance for the proposed model and therefore not specified at all.Demand PatternsDemand patterns describe the nature of the flows of passengers expected to be accommodated by the public transportation network and therefore dictate its structure.For example,transit trips from a number of origins_for example,stops in a neighborhood_to a single destination_such as a bus terminal in the CBD of a city_and vice-versa,are characterized as many-to-one_or one-tomany_transit demand patterns.These patterns are typically encountered in public transportation systems connecting CBDs with suburbs and imply a structure of radial orparallel routes ending at a single point;models for patterns of that type have been proposed by Byrne and Vuchic_1972_,Salzborn_1972_,Byrne_1975,1976_,Kocur and Hendrickson _1982_,Morlok and Viton_1984_,Chang and Schonfeld_1991,1993a_,Spacovic and Schonfeld_1994_,Spacovic et al._1994_,Van Nes_2003_,and Chien et al._2003_.On the other hand,many-to-many demand patterns correspond to flows between multiple origins and destinations within an urban area,suggesting that the public transportation network is expected to connect various points in an area.Demand CharacteristicsDemand can be characterized either as“fixed”_or“inelastic”_or“elastic”;the later meaning that demand is affected by the performance and services provided by the public transportation network.Lee and Vuchic_2005_distinguished between two types of elastic demand:_1_demand per mode affected by transportation services,with total demand for travel kept constant;and_2_total demand for travel varying as a result of the performance of the transportation system and its modes.Fan and Machemehl_2006b_noted that the complexity of the TRNDP has led researchers intoassuming fixed demand,despite its inherent elastic nature.However,since the early1980s, studies included aspects of elastic demand in modeling the TRNDP_Hasselstrom1981;Kocur and Hendrickson1982_.Van Nes et al._1988_applied a simultaneous distribution-modal split model based on transit deterrence for estimatingdemand for public transportation.In a series of studies,Chang and Schonfeld_1991,1993a,b_ and Spacovic et al._1994_estimated demand as a direct function of travel times and fares with respect to their elasticities,while Chien and Spacovic2001_,followed the same approach assuming that demand is additionally affected by headways,route spacing and fares.Finally, studies by Leblanc_1988_,Imam_1998_,Cipriani et al._2005_,Lee and Vuchic_2005_;and Fan and Machemehl_2006a_based demand estimation on mode choice models for estimating transit demand as a function of total demand for travel.中文译文:公交路线网络设计问题:回顾摘要:公共交通网络的有效设计让交通理论与实践成为众人关注的焦点,随之发展出了很多规划相关公交路线网络设计问题(TRNDP)的模型与方法。

环境会计外文文献及其翻译(可编辑修改word版)

环境会计外文文献及其翻译(可编辑修改word版)

河南科技学院新科学院2013 届本科毕业论文(设计)外文文献及翻译Environmental Accounting学生姓名:叶乃润所在系别:经济系所学专业:国际经济与贸易导师姓名:郭晓明(助教)完成时间:2013 年 4 月 18 日Environmental Accountingby Joy E. HechtInterest is growing in modifying national income accounting systems to promote understanding of the links between economy and environment.The field of environmental accounting has made great strides in the past two decades, moving from a rather arcane endeavor to one tested in dozens of countries and well established in a few. But the idea that nations might integrate the economic role of the environment into their income accounts is neither a quick sell nor a quick process; it has been under discussion since the 1960s. Despite the difficulties and controversies described in this article, however, interest is growing in modifying national income accounting systems to promote understanding of the links between economy and environment.Environmental accounting is underway in several dozen countries, where bureaucrats, statisticians, and other proponents both foreign and domestic have initiated activities over the past few decades. Several countries have made continuous investments in building routine data systems, which are integrated into existing statistical systems and economic planning activities. Others have made more limited efforts to calculate a few indicators, or analyze a single sector. Some of the earliest research on environmental accounting was done at RFF by Henry Peskin, working on the design of accounts for the United States.One of the first countries to build environmental accounts is Norway, which began collecting data on energy sources, fisheries, forests, and minerals in the 1970s to address resource scarcity. Over time, the Norwegians have expanded their accounts to include data on air pollutant emissions. Their accounts feed into a model of the national economy, which policymakers use to assess the energy implications of alternate growth strategies. Inclusion of these data also allows them to anticipate the impacts of different growth patterns on compliance with international conventions on pollutant emissions.More recently, a number of resource-dependent countries have become interested in measuring depreciation of their natural assets and adjusting their GDPs environmentally. One impetus for their interest was the 1989 study “Wasting Assets: Natural Resources in the National Income Accounts,” in which Robert Repetto and his colleagues at the World Resources Institute estimated the depreciation of Indonesia’s forests, petroleum reserves, and soil assets. Once adjusted to account for that depreciation, Indonesia’s GDP and growth rates both sank significantly below conventional figures. While “Wasting Assets” called many to action, it also operated as a brake, leading many economists and statisticians to warn against a focus on green GDP, because it tells decision makers nothing about the causes or solutions for environmental problems.Since that time, several developing countries have made long-term commitments to broad-based environmental accounting. Namibia began work on resource accounts in 1994, addressing such questions as whether the government has been able tocapture rents from the minerals and fisheries sectors, how to allocate scarce water supplies, and how rangeland degradation affects the value of livestock.The Philippines began work on environmental accounts in 1990. The approach used there is to build all economic inputs and outputs into the accounts, including non marketed goods and services of the environment. Thus Filipinos estimate monetary values for such items as gathered fuel wood and the waste disposal services provided by air, water, and land; they then add in direct consumption of such services as recreation and aesthetic appreciation of the natural world. While their methodology is controversial, these accounts have provided Philippine government agencies and researchers with a rich array of data for policymaking and analysis.The United States has not been a leader in the environmental accounting arena. At the start of the Clinton administration, the Bureau of Economic Analysis (BEA) made a foray into environmental accounting in the minerals sector, but this preliminary attempt became embroiled in political controversy and faced opposition from the minerals industry. Congress then asked the National Research Council (NRC) to form a blue ribbon panel to consider what the nation should do in the way of environmental accounting. Since then, Congressional appropriations to BEA have been accompanied by an explicit prohibition on environmental accounting work. The ban may be lifted, however, once the recommendations of the NRC study are made public.How environmental accounting is being done varies in a number of respects, notably the magnitude of the investment required, the objectivity of the data, the ability to compare different kinds of environmental impacts, and the kinds of policy purposes to which they may be applied. Here are some of the methods currently in u se.Natural Resource Accounts. These include data on stocks of natural resources and changes in them caused by either natural processes or human use. Such accounts typically cover agricultural land, fisheries, forests, minerals and petroleum, and water. In some countries, the accounts also include monetary data on the value of such resources. But attempts at valuation raise significant technical difficulties. It is fairly easy to track the value of resource flows when the goods are sold in markets, as in the case of timber and fish. Valuing changes in the stocks, however, is more difficult because they could be the result either of a physical change in the resource or of a fluctuation in market price.Green GDP. Developing a gross domestic product that includes the environment is also a matter of controversy. Most people actively involved in building environmental accounts minimize its importance. Because environmental accounting methods are not standardized, a green GDP can have a different meaning in each project that calculates it, so values are not comparable across countries. Moreover, while a green GDP can draw attention to policy problems, it is not useful for figuring out how to resolve them. Nevertheless, most accounting projects that include monetary values do calculate this indicator. Great interest in it exists despite its limitations.Environmental accounting would receive a substantial boost if an international consensus could be reached on methodology. The UN Statistics Department has coordinated some of the ongoing efforts toward this end since the 1980s. In 1993, theUN published the System for Integrated Economic and Environmental Accounting (SEEA) as an annex to the 1993 revisions of the SNA. SEEA is structured as a series of methodological options, which include most of the different accounting activities described above; users choose the options most appropriate to their needs.No consensus exists on the various methods that the UN recommended. In fact, SEEA is now undergoing revision by the so-called “London Group,” comprised primarily of national income accountants and statisticians from OECD countries. The group’s work will be an important step toward con sensus on accounting methods, but the process will be lengthy: Development of the conventional SNA took some forty years.A number of steps can be taken now toward the goal of ensuring that environmental accounting is as well established as the SNA. First, information must circulate freely about existing environmental accounts and how they are contributing to economic and environmental policy. Ongoing work needs to be identified and systematically reviewed and analyzed to learn lessons, which may inform the design and implementation of future accounting activities. The Green Accounting Initiative of the World Conservation Union has embarked on this effort, and a number of other organizations are calling for similar activities. Use of the World Wide Web may facilitate access to unpublished work, although it will require a concerted effort to obtain accounting reports and seek permission to load them on the Internet.Second, development of a core of internationally standardized methods will contribute to willingness to adopt environmental accounting. Experts in the field—including economists, environmentalists, academics, and others outside of the national statistical offices—should take a proactive role in tracking the work of the London Group and insist that the standard- setting process involve participants representing a spectrum of viewpoints, countries, and interested stakeholders. An opportunity exists for research institutes to take a lead in identifying the financial resources needed to facilitate a broader standard setting process, and to elicit a full range of voices to build a consensus on methodology.Finally, and perhaps most importantly, the more countries institutionalize construction of environmental accounts, the greater the momentum for more of the same.Still, building accounts—like developing any time series statistics—will not happen overnight. Their construction will require sustained institutional and financial commitment to ensure that the investment lasts long enough to yield results. But the experiences of Norway, Namibia, and the Philippines show that such a commitment can pay off; it is a commitment that more countries around the world need to make.环境会计by Joy E. Hecht由利益增长改变国民收入核算制度以促进了解经济和环境之间的联系。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

毕业设计外文文献翻译专业学生姓名班级学号指导教师优集学院外文资料名称:Knowledge-Based Engineeri--ng Design Methodology外文资料出处:Int.J.Engng Ed.Vol.16.No.1附件:1.外文资料翻译译文2.外文原文1.背景基于知识工程(KBE)设计方法D. E. CALKINS复杂系统的发展需要很多工程和管理方面的知识、决策,它要满足很多竞争性的要求。

设计被认为是决定产品最终形态、成本、可靠性、市场接受程度的首要因素。

高级别的工程设计和分析过程(概念设计阶段)特别重要,因为大多数的生命周期成本和整体系统的质量都在这个阶段。

产品成本的压缩最可能发生在产品设计的最初阶段。

整个生命周期阶段大约百分之七十的成本花费在概念设计阶段结束时,缩短设计周期的关键是缩短概念设计阶段,这样同时也减少了工程的重新设计工作量。

工程权衡过程中采用良好的估计和非正式的启发进行概念设计。

传统CAD 工具对概念设计阶段的支持非常有限。

有必要,进行涉及多个学科的交流合作来快速进行设计分析(包括性能,成本,可靠性等)。

最后,必须能够管理大量的特定领域的知识。

解决方案是在概念设计阶段包含进更过资源,通过消除重新设计来缩短整个产品的时间。

所有这些因素都主张采取综合设计工具和环境,以在早期的综合设计阶段提供帮助。

这种集成设计工具能够使由不同学科的工程师、设计者在面对复杂的需求和约束时能够对设计意图达成共识。

那个设计工具可以让设计团队研究在更高级别上的更多配置细节。

问题就是架构一个设计工具,以满足所有这些要求。

2.虚拟(数字)原型模型现在需要是一种代表产品设计为得到一将允许一产品的早发展和评价的真实事实上原型的过程的方式。

虚拟样机将取代传统的物理样机,并允许设计工程师,研究“假设”的情况,同时反复更新他们的设计。

真正的虚拟原型,不仅代表形状和形式,即几何形状,它也代表如重量,材料,性能和制造工艺的非几何属性。

设计人员希望设计的表述,将成为一个既有几何又有非几何属性的物理原型确切的表示。

产品表示法已经从二维的形状和几何的形式字形绘画的表示法移动向充分的三维几何模型表示法。

设计工具,用于设计工程领域的需要,显然必须有刚才讨论的所有工具的属性。

它必须结合计算机辅助设计系统的几何表示法,能做对程序语言的工程分析和代表设计知识在一个专家系统。

一个真正的虚拟原型包含此全方位设计知识。

3.启用的技术设计3.1.知识类型如同适用于KBE 那样,知识能分成四种类型:.事实,.程序,.判断,.控制。

在手册找到的形式化的知识例如原材料明细表,设计data,ASTM 标准和设备规格被认为事实知识。

算法的和操作的知识是程序上的知识的两种形式。

数字的和非数字的解决问题一或者完成中的一些末端的过程是所有的算法的程序上的知识(APK)的原理。

事实被APK 通过工程和分析算法改变。

有效的程序知识(OPK)被用于创造,删除和运输事实。

OPK 节目的例子是有限元素分析、优化和数据库管理系统[1]。

经验法则和共同的实践是评断知识的实例。

启发式,意见,经验,与合情推理中还包括判断的知识。

逻辑和推理的形式原则是基本的判断知识的应用。

控制知识元知识或知识有关知识,知识的其他类型的管理控制知识。

仿造直系活动,意想不到的发展的预期,并且应付不确定性是所有特点控制知识[1]。

3.2.基于知识的工程(KBE)该技术允许一个真正的产品虚拟样机开发被称为基于知识的工程,或KBE。

KBE 是捕捉和对结构设计,其设计过程的知识方法。

知识经济可以用来定义工程方法和程序[2]。

在KBE,产品结构树(拓扑学)是动态的,因此知识经济提供真正的工程自动化,包括应用开发,几何造型,应用程序部署和工具的集成。

基于知识工程是一种编程工具,用于开发一个虚拟原型设计顾问或为一个建立了产品设计,在给定的设计领域。

关于设计类的现有的知识在基于知识的工程学或设计被运用(KBE 或KBD)并且被组织入能用数据库的格式由计算机。

详细设计或虚拟原型,然后迅速开发基于知识的工程(KBE)的设计方法,通过对23 位计算能力来开发数据库,和规则系统。

该产品模型是在KBE 环境下开发的虚拟样机。

虚拟原型,如材料的所有几何特征或属性的产品,以及非几何属性,质量特性,应力和挠度特性等虚拟样机一旦被创建,它可以由设计者使用评估成功或设计配置的优点,然后修改。

该产品模型表示后面的几何设计工程意图。

在产品模型中包含的信息包括物理属性如几何,材料种类和功能限制。

3.3.生成技术有三种KBE 的工具,目前正在探索和发展类型。

这些措施包括:1.诊断方法(专家系统)。

2.创造性的方法(设计顾问)/(设计检查)。

3.生成方法(虚拟样机)。

专家系统是第一种类型的工具发达国家在工程领域的使用,这个工具用于诊断目的,例如分析汽车发动机出现故障。

第二类,设计顾问,更是目前的事态发展之一。

它是用来反映了一个系统的设计过程,并告知约束和规则的基础上违反设计师与设计顾问所载的规则。

设计师在这意见后行动并且做适当的变动。

第三类涉及到建立一个以该模型中的规则为基础的系统模型。

这个模型,一个真正原型,然后起反应对在属性(几何或非几何)和再生原型的一个新的事例上的变化。

这是用于被开发的类KBE 的种类。

KBE 利用生成技术来获取通用产品设计信息,包括几何和拓扑结构,产品结构的发展及制造工艺设计规则。

生成建模地图功能规格,该产品的详细陈述。

一个生成模型的优点是,由于产品需求的变化,外观设计的表述是立即更新,直接影响到所有输出。

因此,KBE 是一种动态的对象模型,其中对外观设计的表述是不断更新。

知识工程的方法设施为迅速生成模型生成新的功能规格设计的工程设计和制造知识获取。

相对于传统的设计工具,KBE 提供真正的设计与自动化设计协助。

在设计过程期间,KBE 是系统的连续的再设计的一种健壮设计技术。

3.4.KBE 的代表性产品当前KBE 软件是基于面向对象非诉讼程序设计语言,比如LISP 语言。

因此,设计资料无须下令在模型正确,因为它会制订该命令本身。

面向对象编程工程对象的概念,用于表示的特点,无论几何和非几何,实际物理对象。

对象不是被动的,但可以反应其他对象。

一个对象可以创建和存储信息和采取行动应对外部刺激。

一个对象可以从另一个信息需求对象,或者将信息发送到另一个对象。

KBE 实现了真正的并行工程攻克了一系列的捐助领域的专门知识在一个组织。

这可以包括代表从设计,工程,模具和其他制造业领域。

KBE 的供应商有一个捕捉行之有效的方法和编纂这种产品信息的范围。

通常情况下,KBE 的开发将与方法顾问学习“知识捕获”进程的第一个发展项目,然后将转让和应用这些技能后续项目。

3.5.KBE 工具有许多不同的软件工具可用于KBE 发展。

当中包括ICAD TM,TKSolver TM,设计Link TM,ProEngineer TM,STONErule TM 和智能Elements TM。

所有这些集成了至少1 现代CAD 系统提供一个当代集成设计系统。

Unigraphics 系统,CATIA TM,支持Engineer TM,IDEAS TM 和自动CAD TM 是一些选择。

这些软件工具用于开发d o m a i n s pe c if i c这两个知识工程的方法设计工具,设计顾问和虚拟样机。

3.6.生成虚拟样机(G V P公司)这种虚拟原型的方法奠定了基础的KBE 描述,是基于对KBE 的智能CAD 软件的使用[5]。

智能CAD 使用为元设计,这是设计工具设计在一个产品模型的形式。

该产品模型是产品结构,工程分析,产品成本,设计标准,管理准则,材料特性,制造约束和进程计划的框架。

它能够输出设计报告,表示该产品的设计状态。

该报告可以包括例如:分析,3 个数据的三维几何模型,材料,成本报告和指示草案。

GVP 公司的捕获和自动化功能设计的规则和方法的理解在工程过程。

在GVP 公司为工程师提供了有效的替代功能选择和操作。

工程师添加他们的判断力,优化设计,最终系统。

阿生成虚拟样机(GVP 公司)是一个系统既是模型的几何和非24 D.尔金斯等。

一个产品(一个对象)的几何属性中嵌入了KBE 的模式。

它存储知识在组成一个产品模型系统设计和制造工程的规则,同时解决几何和非几何的问题。

阿生成虚拟原型是这些设计规则的组合,其中包括对工程指令用于创建的设计,也就是车辆的几何形状。

生成虚拟样机的代表背后的几何设计工程意图。

它可以存储诸如几何和材料规格,以及过程和性能信息产品信息。

生成虚拟样机的范例被定义如下:生成:生成或自动产生这一虚拟原型的实例,以响应输入状态向量。

采取输入规范说明,运用相关的做法并且自动地引起设计。

当要求改变时,设计与所有表现产品一起立刻被更新。

虚拟的影响,虽然没有实际的事实:[1]基于计算机模型原型:原来的模式,或一个具体的例子类型。

3.7.设计规则KBE 是基于知识的设计使用形式的设计规则,设计规则构成了一个对象的核心。

设计规则包括4 种基本类型:1.启发式:包括实验的经验规则和最佳做法。

通常是基于企业文化设计的启发。

这些都是的类型,如果(条件为真),然后(行动推荐)。

2.经验设计规则:这些规则根据从实验性数据被开发的曲线适合的表示。

元模型技术用于开发复杂系统的模型。

3.立法限制:这些都是组成法律或工程的既定规则标准。

4.物理定律:首次原则为基础的分析或数值模式的形式。

也被称为参数的规则。

这些规则通常是使用报表模型解决简单的算法。

设计规则用于合成中的知识基础知识,如何在给定的模型建立知识。

设计规则来定义和涉及双方在知识经济模式的属性。

工程师的方法和过程由这些规则仿造。

设计规则类型包括:.计算.条件句.查寻数据库.固定.变量.引用.执行外部程序.选择.优化。

Knowledge-Based Engineering (KBE) Design MethodologyBACKGROUNDThe development of complex systems requires a sequence of engineering and management decisions which must satisfy many competing requirements. Design is recognized as the primary contributor to the final product form, cost, reliability and market acceptance. The high-level engineering design and analysis process (conceptual design phase) is particularly important since the majority of the life-cycle costs and overall quality of the system are determined during this phase. The major opportunities for cost savings occur in the earliest phases of a product design. Approximately seventy per cent of the life- cycle costs are frozen by the end of the conceptual design phase, Fig. 1. The key to shortening the design cycle is to shorten the conceptual design phase, which will also reduce the amount of engineering in the redesign stage.The engineering trade-off process during conceptual design is undertaken using good estimations and informal heuristics. Current traditional CAD tool support is extremely limited for the conceptual design phase. There is need to rapidly conduct design analyses involving multiple disciplines communicating together (trading off such things as performance, cost, reliability, etc.). Finally, it is necessary to be able to manage a large amount of domain-specific knowledge. The solution is to commit more resources at the conceptual design stage to reduce the cycle time by eliminating redesign.All of these factors argue for an integrated design tool and environment that can help make decisions early in the design synthesis (conceptual design) process. This integrated design tool will enable a diverse and multi-disciplinary team of engineers, designers and stylists to achieve consensus of design intent under complex design requirements and increased design constraints. The design tool should allow the design team to examine more configurations at greater levels of detail. The problem then is to develop an architecture for a design tool that meets all of these requirements.VIRTUAL (DIGITAL) PROTOTYPE MODELWhat is needed is a way to represent the product design process to obtain a true virtual prototype which would allow the early development and evaluation of a product. The virtual prototype would replace traditional physical prototypes and allow the design engineer to examine `what-if' scenarios while iteratively updating their designs. A truevirtual prototype would not only represent the shape and form, i.e. the geometry, it would also represent non-geometric attributes such as weight, material, performance and manufacturing processes. Designers want a design representation that will be an exact representation of a physical prototype with both geometrical and non-geometrical attributes.Product representation has moved from the 2-D orthographic drawing representation of the shape and form of the geometry, to full 3-D model representation of the geometry. The design tool that is needed for the design engineering domain, clearly must have attributes of all of the tools just discussed. It must combine the geometrical representation of the CAD systems, be able to do the engineering analysis of the procedural languages and represent the design knowledge as in an expert system. A true virtual prototype contains this full range of design knowledge.ENABLING TECHNOLOGIES FOR DESIGNTypes of knowledge. Knowledge’, as applied to KBE, can be divided into f our types [1]:. facts,. procedures,. judgments,. control.Formalized knowledge found in handbooks such as material specifications, engineering data,ASTM standards, and equipment specifications is considered factual knowledge. Algorithmic and operative knowledge are the two forms of procedural knowledge. Numeric and non-numeric procedures for solving a problem or accomplishing some end are all elements of algorithmic procedural knowledge (APK). Facts are transformed by APK through engineering and analysis algorithms.Operative procedural knowledge (OPK) is used to create, delete, and transport facts. Examples of OPK programs are finite-element analysis, optimization, and database management systems [1].Rules of thumb and common best-practices are examples of judgment knowledge. Heuristics,observations, experience, and plausible reasoning are also included in judgment knowledge. Logic and the formal principles of reasoning are fundamental to judgmentknowledge application.Control knowledge is metaknowledge or knowledge about knowledge. The other types of knowledge are managed by control knowledge. Pattern directed actions, anticipation of unexpected developments, and dealing with uncertainties are all features of control knowledge [1].Knowledge-based engineering (KBE)The technology that allows the development of a true virtual prototype of a product is known asknowledge-based engineering, or KBE. KBE is the methodology for capturing and structuring knowledge about a design and its design process. KBE may be used to define engineering methods and procedures [2]. In KBE, the product structure tree (topology) is dynamic, so that KBE offers true engineering automation including application development, geometric modeling, application deployment and tools integration. Knowledge-based engineering is a programming tool used to develop a virtual prototype or a design advisor for the design of an established product in a given design domain. Dym, et al. [3] and Gonzalez, et al.[4] provide valuable overviews of KBE.Existing knowledge about a class of designs is utilized in knowledge-based engineering or design (KBE or KBD) and organized into a database format usable by computers. Detailed designs or virtual prototypes are then rapidly developed Knowledge- Based Engineering (KBE) Design Methodology 23 through the use of digital computing power, developed databases, and systems of rules. The product model which is developed in the KBE environment is a virtual prototype. A virtual prototype has all of the geometric characteristics or attributes of the product as well as the non-geometric attributes such as materials, mass properties, stress and deflection characteristics, etc. Once the virtual prototype is created, it can be used by the designers to evaluate the success or merit of the design configuration, and then modify it if desired. The product model represents the engineering intent behind a geometric design. The information contained in a product model includes physical attributes like geometry, material type and functional constrains. Generative technologyThere are three types of KBE tools that are currently being explored and developed. These include:1.Diagnostic approach (expert system).2.Creative approach (design advisor)/(design checking).3.Generative approach (virtual prototype).The expert system was the first type of tool developed for use in the engineering domain.This tool is used for diagnostic purposes such as analyzing a malfunctioning automobile engine.The second type,design advisor,is the one to more current developments.It is used to follow the design process of a system, and advise the designer of constraint and rules violations based on rules contained with the design advisor. The designer then acts on this advice and makes appropriate changes.The third type involves developing a model of the system based on rules contained with the model. This model, a virtual prototype, then reacts to changes in attributes (either geometric or non-geometric), and regenerating a new instance of the prototype. This is the type of KBE that is used in the classes developed.KBE uses generative technology to capture generic product design information, including geometry and topology, product structure development and manufacturing processes as design rules. Generative modeling maps functional specifications to a detailed representation of the product. The advantage of a generative model is that as the product requirements change, the design representation is immediately updated directly affecting all outputs. Thus, KBE is a dynamic object model wherein the representation of the design is continually updated. KBE methodology facilities the capture of engineering and manufacturing knowledge into a generative model by rapidly generating new designs from functional specifications. In contrast to the conventional design tools, KBE offers true design automation vs. design assistance. KBE is a robust design technology for continuous redesign of a system during the design process.KBE product representationCurrent KBE software is based on an object-oriented non-procedural design language such as LISP. As a result, the design information need not be ordered correctly within the model, as it will work out the order itself. Object-oriented programming works on the concept of objects that are used to represent the characteristics, both geometric and non-geometric, of actual physical objects. Objects are not passive, but can react with other objects. An object can create and store information and act in response to external stimuli. An object can demand information from another object, or send information to another object.KBE enables true concurrent engineering by capturing the domain expertise of a range of contributors in an organization. This can include represent atives from design, engineering, tooling and other areas of manufacturing. KBE vendors have a well- established methodology for capturing and codifying this range of product information. Often, KBE developers will collaborate with methodology consultants to learn the`knowledge capture' process on a first development project and then will transfer and apply those skills to follow-on projects.KBE toolsThere are a variety of software tools available for KBE tool development. Included are ICADTM, TKSolverTM, Design LinkTM, ProEngineerTM,STONEruleTM and Smart ElementsTM. All of these are integrated with at least one of the contemporary CAD systems to provide a contemporary integrated design system. Unigraphics,CATIATM, Pro- EngineerTM, IDEASTM and Auto-CADTM are some of the options.These software tools are used to develop domain-specific design tools of the two KBE approaches,design advisor and the virtual prototype.Generative virtual prototype (GVP)The virtual prototype approach forms the basis of the KBE classes described, and is based on the use of the KBE software ICAD [5]. ICAD is used for metadesign, which is the design of design tools in the form of a product model. The product model is the framework for the product structure, engineering analysis, product cost, design standards,regulatory codes, material characteristics, manu-facturing constrains and process plans. It is able to output a design report that represents the design state of the product. This report can include for example:data for analysis, 3-D geometric models,bills of material, cost reports and manufacturing instructions. The GVP captures and automates the functional design rules and understood methodologies of the engineering process. The GVP provides functionally valid alternatives for engineers to select and manipulate. Theengineers add their judgement to optimize final systems designs.A generative virtual prototype (GVP) is a system model that represents both the geometric and non-D. Calkins, et al.24 geometric attributes of a product (an object) which are embedded in the KBE model. It stores knowledge about a system in a product model composed of design and manufacturing engineering rules,which address both geometric and nongeometric issues. A generative virtual prototype is a combination of these design rules and includes a set of engineering instructions used to create the design,that is, the vehicle geometry. The generative virtual prototype represents the engineering intent behind the geometric design. It can store product information such as geometry and material specifications as well as process and performance information.The generative virtual prototype paradigm is defined as follows:Generative:generate or automatically produce an instance of the virtual prototype in response to an input state vector. Take input specifications, apply relevant procedures and generate a design auto-matically. When the requirements change, the design is updated immediately along with all of performance outputs.Virtual:in effect although not in actual fact:a computer based modelPrototype:original model or example of a particular type.Design rulesKBE is based on the use of design knowledge in the form of ‘design rules’. The design rules form the kernel of an object. Design rules comprise four basic categories:1.Heuristics:comprised of experimental rules of thumb and ‘best practices’.Us ually based on corporate culture design heuristics. These are of the type, If (condition is true), then (action recommended).2.Empirical design rules:these rules are based on curve-fitted expressions that are developed from experimental data. Meta-model technology used to develop models of complex systems.3.Legislated constraints:these are comprised of rules established by law or by engineering standards.ws of physics:based on first principles in the form of analytical or numerical models. Also known as parametric rules. These rules are usually simple algorithms thatwould be solved using spreadsheet models.Design rules are used to synthesize the knowledge in the knowledge base and to establish how the knowledge is used in a given model. The design rules are used to both define and relate the attributes in a KBE model. The methods and processes of an engineer are mimicked by these rules. Design rule types include:. calculations. conditionals. look-up databases. fixed. variable. references. execute external programs. selections. optimizations.。

相关文档
最新文档