(完整版)外文翻译格式样本

合集下载

最新外文文献翻译格式范例

最新外文文献翻译格式范例

外文文献翻译格式范例本科毕业设计(外文翻译)外文参考文献译文及原文学院信息工程学院专业信息工程(电子信息工程方向)年级班别 2006级(4)班学号 3206003186学生姓名柯思怡指导教师 ______ 田妮莉 _ __2010年6月目录熟悉微软SQL Server (1)1Section A 引言 (1)2Section B 再谈数据库可伸缩性 (4)3Section C 数据库开发的特点 (7)Get Your Arms around Microsoft SQL Server (9)1Section A Introduction to SQL Server 2005 (9)2Section B Database Scalability Revisited (13)3Section C Features for Database Development (17)熟悉微软SQL Server1 Section A 引言SQL Server 2005 是微软SQL生产线上最值得期待的产品。

在经过了上百万个邮件,成百上千的规范说明,以及数十次修订后。

微软承诺SQL Server 2005 是最新的基于Windows数据库应用的数据库开发平台。

这节的内容将指出SQL Server 2005产品的一些的重要特征。

SQL Server 2005几乎覆盖OLTP及OLAP技术的所又内容。

微软公司的这个旗舰数据库产品几乎能覆盖所有的东西。

这个软件在经过五年多的制作后,成为一个与它任何一个前辈产品都完全不同的产品。

本节将介绍整个产品的大部分功能。

当人们去寻求其想要的一些功能和技术时,可以从中提取出重要的和最感新区的内容,包括SQL Server Engine 的一些蜕变的历史,以及各种各样的SQL Server 2005的版本,可伸缩性,有效性,大型数据库的维护以及商业智能等如下:●数据库引擎增强技术。

SQL Server 2005 对数据库引擎进行了许多改进,并引入了新的功能。

毕业论文外文翻译格式【范本模板】

毕业论文外文翻译格式【范本模板】

因为学校对毕业论文中的外文翻译并无规定,为统一起见,特做以下要求:1、每篇字数为1500字左右,共两篇;2、每篇由两部分组成:译文+原文.3 附件中是一篇范本,具体字号、字体已标注。

外文翻译(包含原文)(宋体四号加粗)外文翻译一(宋体四号加粗)作者:(宋体小四号加粗)Kim Mee Hyun Director, Policy Research & Development Team,Korean Film Council(小四号)出处:(宋体小四号加粗)Korean Cinema from Origins to Renaissance(P358~P340) 韩国电影的发展及前景(标题:宋体四号加粗)1996~现在数量上的增长(正文:宋体小四)在过去的十年间,韩国电影经历了难以置信的增长。

上个世纪60年代,韩国电影迅速崛起,然而很快便陷入停滞状态,直到90年代以后,韩国电影又重新进入繁盛时期。

在这个时期,韩国电影在数量上并没有大幅的增长,但多部电影的观影人数达到了上千万人次。

1996年,韩国本土电影的市场占有量只有23.1%。

但是到了1998年,市场占有量增长到35。

8%,到2001年更是达到了50%。

虽然从1996年开始,韩国电影一直处在不断上升的过程中,但是直到1999年姜帝圭导演的《生死谍变》的成功才诞生了韩国电影的又一个高峰。

虽然《生死谍变》创造了韩国电影史上的最高电影票房纪录,但是1999年以后最高票房纪录几乎每年都会被刷新。

当人们都在津津乐道所谓的“韩国大片”时,2000年朴赞郁导演的《共同警备区JSA》和2001年郭暻泽导演的《朋友》均成功刷新了韩国电影最高票房纪录.2003年康佑硕导演的《实尾岛》和2004年姜帝圭导演的又一部力作《太极旗飘扬》开创了观影人数上千万人次的时代。

姜帝圭和康佑硕导演在韩国电影票房史上扮演了十分重要的角色。

从1993年的《特警冤家》到2003年的《实尾岛》,康佑硕导演了多部成功的电影。

(范例)外文翻译格式

(范例)外文翻译格式

本科毕业设计(论文)外文翻译译文学生姓名:院(系):经济管理学院专业班级:市场营销0301班指导教师:完成日期:2007年3 月22 日日本的分销渠道——对于进入日本市场的挑战与机会Distribution Channels in JapanChallenges and Opportunities for theJapanese Market Entry作者:Hokey Min起止页码:P22-35出版日期(期刊号):0960-0035出版单位:MCB Univercity Press外文翻译译文:介绍尽管美国对日本的出口在过去两年已有大幅度的增长,然而美国对日本仍然存在着很大的贸易赤字。

尽管没有出现下降趋势,但越来越多的美国决策者及商务经理已经开始审查日本的贸易活动。

在这些人中,有一个很普遍的想法就是日本市场没有对美国产品开放,相反,美国市场对日本的贸易是开放的。

因此,克林顿政府试图采取强硬措施来反对日本的一系列贸易活动,包括商业习惯和政府政策,还企图通过贸易制裁的威胁来反对日本产品。

然而,这样的措施也会产生适得其反的结果。

它不仅会为美国消费者带来更高的商品价格和更少的商品选择,同时也会增加日本消费者的反美情绪。

最近Ginkota和Kotabe的调查表明:单独的贸易谈判不会提高美国商品进入日本市场的能力。

而对于提高美国公司进入日本市场能力的一个行之有效的方法就是研究日本近几个世纪以来所采用的商业活动。

由于法律障碍或者是日本公司对外封锁商业渠道,日本当地的分销渠道往往对外国公司不利,而这样的商业活动被认为是进入日本市场的主要障碍。

事实上,Yamawaki美国商品成功出口到日本市场在很大程度上取决于美国解决协议合同的能力。

尽管进入日本市场意义重大,然而对西方人而言,日本的经销体系经常会被人误以为是充满神秘感的。

这种误解源于日本复杂的分销惯例特征。

而这种分销惯例沿袭古老的而又严谨的建设体系。

在尝试美国贸易在日本市场成功获利减少不必要的贸易冲突过程中,我们揭露了日本分销中获利的事实,探索出了能成功进入日本市场的战略性武器。

论文及外文翻译格式(标准)

论文及外文翻译格式(标准)

附件5 论文及外文翻译写作格式样例附录1 内封格式示例(设置成小二号字,空3行)我国居民投资理财现状及发展前景的研究(黑体,加粗,小二,居中,空2行)The Research on Status and Future of Inhabitants’Investment and Financial Management in China (Times New Roman体,加粗,小二,居中,实词首字母大写,空5行)院系经济与管理学院(宋体,四号,首行缩进6字符)专业公共事业管理(宋体,四号,首行缩进6字符)班级 6408101 (宋体,四号,首行缩进6字符)学号 200604081010 (宋体,四号,首行缩进6字符)姓名李杰(宋体,四号,首行缩进6字符)指导教师张芸(宋体,四号,首行缩进6字符)职称副教授(宋体,四号,首行缩进6字符)负责教师(宋体,四号,首行缩进6字符)(空7行)沈阳航空航天大学(宋体,四号,居中)2010年6月(宋体,四号,居中)附录2 摘要格式示例(设置成三号,空2行)摘要(黑体,加粗,三号,居中,两个字之间空两格)(空1行)我国已经步入经济全球化发展的21世纪,随着市场经济的快速增长和对外开放的进一步深化,我国金融市场发生了巨大的变化。

一方面,投资理财所涉及到的领域越来越广,不仅仅是政府、企业、社会组织进行投资理财,居民也逐步进入到金融市场中,开始利用各种投资工具对个人、家庭财产进行打理,以达到资产保值、增值,更好的用于消费、养老等的目的;另一方面,我国居民投资理财观念逐渐趋于成熟化、理性化;同时,其投资理财工具以及方式手段亦越来越向多元化、完善化发展。

本论文以我国居民投资理财为研究对象,综合运用现代经济学、金融学和管理学的理论;统计学、概率学的方法和工具,主要对我国居民投资理财的历史演变、发展现状、意识观念、存在的问题和主要投资理财工具进行了分析和探讨,并提出了改善和促进我国居民理财现状的对策和建议,指出了普通居民合理化投资理财的途径。

(完整版)外文翻译

(完整版)外文翻译

外文文献原稿和译文原稿logistics distribution center location factors:(1) the goods distribution and quantity. This is the distribution center and distribution of the object, such as goods source and the future of distribution, history and current and future forecast and development, etc. Distribution center should as far as possible and producer form in the area and distribution short optimization. The quantity of goods is along with the growth of the size distribution and constant growth. Goods higher growth rate, the more demand distribution center location is reasonable and reducing conveying process unnecessary waste.(2) transportation conditions. The location of logistics distribution center should be close to the transportation hub, and to form the logistics distribution center in the process of a proper nodes. In the conditional, distribution center should be as close to the railway station, port and highway.(3) land conditions. Logistics distribution center covers an area of land in increasingly expensive problem today is more and more important. Is the use of the existing land or land again? Land price? Whether to conform to the requirements of the plan for the government, and so on, in the construction distribution center have considered.(4) commodities flow. Enterprise production of consumer goods as the population shift and change, should according to enterprise's better distribution system positioning. Meanwhile, industrial products market will transfer change, in order to determine the raw materials and semi-finished products of commodities such as change of flow in the location of logistics distribution center should be considered when the flow of the specific conditions of the relevant goods.(5) other factors. Such as labor, transportation and service convenience degree, investment restrictions, etc.How to reduce logistics cost,enhance the adaptive capacity and strain capacity of distribution center is a key research question of agricultural product logistics distribution center.At present,most of the research on logistics cost concentrates off theoretical analysis of direct factors of logistics cost, and solves the problem of over-high logistics Cost mainly by direct channel solution.This research stresses on the view of how to loeate distribution center, analyzes the influence of locating distribution center on logistics cost.and finds one kind of simple and easy location method by carrying on the location analysis of distribution center through computer modeling and the application of Exeel.So the location of agricultural product logistics distribution center can be achieved scientifically and reasonably, which will attain the goal of reducing logistics cost, and have a decision.making support function to the logisties facilities and planning of agricultural product.The agricultural product logistics distribution center deals with dozens and even hundreds of clients every day, and transactions are made in high-frequency. If the distribution center is far away from other distribution points,the moving and transporting of materials and the collecting of operational data is inconvenient and costly. costly.The modernization of agricultural product logistics s distribution center is a complex engineering system,not only involves logistics technology, information technology, but also logistics management ideas and its methods,in particular the specifying of strategic location and business model is essential for the constructing of distribution center. How to reduce logistics cost,enhance the adaptive capacity and strain capacity of distribution center is a key research question of agricultural product logistics distribution center. The so—called logistics costs refers to the expenditure summation of manpower, material and financial resources in the moving process of the goods.such as loading and unloading,conveying,transport,storage,circulating,processing, information processing and other segments. In a word。

毕业设计(论文)外文资料和译文格式要求(模板)

毕业设计(论文)外文资料和译文格式要求(模板)

成都东软学院外文资料和译文格式要求一、译文必须采用计算机输入、打印,幅面A4。

外文资料原文(复印或打印)在前,译文在后,于左侧装订。

二、具体要求1、至少翻译一篇内容与所选课题相关的外文文献。

2、译文汉字字数不少于4000字。

3、正文格式要求:宋体五号字。

译文格式参见《译文格式要求》,宋体五号字,单倍行距。

纸张纸张为A4纸,页边距上2.54cm、下2.54cm、左3.17cm、右3.17cm。

装订外文资料原文(复印或打印)在前,译文在后封面封面的专业、班级、姓名、学号等信息要全部填写正确。

封面指导教师必须为讲师以上职称,若助教则需要配备一名讲师协助指导。

讲师在前,助教在后。

指导教师姓名后面空一个中文空格,加职称。

页眉页眉说明宋体小五,左端“XX学院毕业设计(论文)”,右端“译文”。

页眉中的学院名称要与封面学院名称一致。

字数本科4000字。

附:外文资料和译文封面、空白页成都东软学院外文资料和译文专业:软件工程移动互联网应用开发班级:2班姓名:罗荣昆学号:12310420216指导教师:2015年 12月 8日Android page layoutUsing XML-Based LayoutsW hile it is technically possible to create and attach widgets to our activity purely through Java code, the way we did in Chapter 4, the more common approach is to use an XML-based layout file. Dynamic instantiation of widgets is reserved for more complicated scenarios, where the widgets are not known at compile-time (e g., populating a column of radio buttons based on data retrieved off the Internet).With that in mind, it’s time to break out the XML and learn how to lay out Android activities that way.What Is an XML-Based Layout?As the name suggests, an XML-based layout is a specification of widgets’ relationships to each other—and to their containers (more on this in Chapter 7)—encoded in XML format. Specifi cally, Android considers XML-based layouts to be resources, and as such layout files are stored in the res/layout directory inside your Android project.Each XML file contains a tree of elements specifying a layout of widgets and their containers that make up one view hierarchy. The attributes of the XML elements are properties, describing how a widget should look or how a container should behave. For example, if a Button element has an attribute value of android:textStyle = "bold", that means that the text appearing on the face of the button should be rendered in a boldface font style.Android’s SDK ships with a tool (aapt) which uses the layouts. This tool should be automatically invoked by your Android tool chain (e.g., Eclipse, Ant’s build.xml). Of particular importance to you as a developer is that aapt generates the R.java source file within your project, allowing you to access layouts and widgets within those layouts directly from your Java code. Why Use XML-Based Layouts?Most everything you do using XML layout files can be achieved through Java code. For example, you could use setTypeface() to have a button render its textin bold, instead of using a property in an XML layout. Since XML layouts are yet another file for you to keep track of, we need good reasons for using such files.Perhaps the biggest reason is to assist in the creation of tools for view definition, such as a GUI builder in an IDE like Eclipse or a dedicated Android GUI designer like DroidDraw1. Such GUI builders could, in principle, generate Java code instead of XML. The challenge is re-reading the UI definition to support edits—that is far simpler if the data is in a structured format like XML than in a programming language. Moreover, keeping generated XML definitions separated from hand-written Java code makes it less likely that somebody’s custom-crafted source will get clobbered by accident when the generated bits get re-generated. XML forms a nice middle ground between something that is easy for tool-writers to use and easy for programmers to work with by hand as needed.Also, XML as a GUI definition format is becoming more commonplace. Microsoft’s XAML2, Adobe’s Flex3, and Mozilla’s XUL4 all take a similar approach to that of Android: put layout details in an XML file and put programming smarts in source files (e.g., JavaScript for XUL). Many less-well-known GUI frameworks, such as ZK5, also use XML for view definition. While “following the herd” is not necessarily the best policy, it does have the advantage of helping to ease the transition into Android from any other XML-centered view description language. OK, So What Does It Look Like?Here is the Button from the previous chapter’s sample application, converted into an XMLlayout file, found in the Layouts/NowRedux sample project. This code sample along with all others in this chapter can be found in the Source Code area of .<?xml version="1.0" encoding="utf-8"?><Button xmlns:android="/apk/res/android"android:id="@+id/button"android:text=""android:layout_width="fill_parent"android:layout_height="fill_parent"/>The class name of the widget—Button—forms the name of the XML element. Since Button is an Android-supplied widget, we can just use the bare class name. If you create your own widgets as subclasses of android.view.View, you would need to provide a full package declara tion as well.The root element needs to declare the Android XML namespace:xmlns:android="/apk/res/android"All other elements will be children of the root and will inherit that namespace declaration.Because we want to reference this button from our Java code, we need to give it an identifier via the android:id attribute. We will cover this concept in greater detail later in this chapter.The remaining attributes are properties of this Button instance:• android:text indicates the initial text to be displayed on the button face (in this case, an empty string)• android:layout_width and android:layout_height tell Android to have the button’swidth and height fill the “parent”, in this case the entire screen—these attributes will be covered in greater detail in Chapter 7.Since this single widget is the only content in our activity, we only need this single element. Complex UIs will require a whole tree of elements, representing the widgets and containers that control their positioning. All the remaining chapters of this book will use the XML layout form whenever practical, so there are dozens of other examples of more complex layouts for you to peruse from Chapter 7 onward.What’s with the @ Signs?Many widgets and containers only need to appear in the XML layout file and do not need to be referenced in your Java code. For example, a static label (TextView) frequently only needs to be in the layout file to indicate where it should appear. These sorts of elements in the XML file do not need to have the android:id attribute to give them a name.Anything you do want to use in your Java source, though, needs an android:id.The convention is to use @+id/... as the id value, where the ... represents your locally unique name for the widget in question. In the XML layout example in the preceding section, @+id/button is the identifier for the Button widget.Android provides a few special android:id values, of the form @android:id/.... We will see some of these in various chapters of this book, such as Chapters 8 and 10.We Attach These to the Java How?Given that you have painstakingly set up the widgets and containers in an XML layout filenamed main.xml stored in res/layout, all you need is one statement in your activity’s onCreate() callback to use that layout:setContentView(yout.main);This is the same setContentView() we used earlier, passing it an instance of a View subclass (in that case, a Button). The Android-built view, constructed from our layout, is accessed from that code-generated R class. All of the layouts are accessible under yout, keyed by the base name of the layout file—main.xml results in yout.main.To access our identified widgets, use findViewById(), passing in the numeric identifier of the widget in question. That numeric identifier was generated by Android in the R class asR.id.something (where something is the specific widget you are seeking). Those widgets are simply subclasses of View, just like the Button instance we created in Chapter 4.The Rest of the StoryIn the original Now demo, the button’s face would show the current time, which would reflect when the button was last pushed (or when the activity was first shown, if the button had not yet been pushed).Most of that logic still works, even in this revised demo (NowRedux). However,rather than instantiating the Button in our activity’s onCreate() callback, we can reference the one from the XML layout:package youts;import android.app.Activity;import android.os.Bundle;import android.view.View;import android.widget.Button; import java.util.Date;public class NowRedux extends Activity implements View.OnClickListener { Button btn;@Overridepublic void onCreate(Bundle icicle) { super.onCreate(icicle);setContentView(yout.main);btn=(Button)findViewById(R.id.button);btn.setOnClickListener(this);upd ateTime();}public void onClick(View view) { updateTime();}private void updateTime() {btn.setText(new Date().toString()); }}The first difference is that rather than setting the content view to be a view we created in Java code, we set it to reference the XML layout (setContentView(yout.main)). The R.java source file will be updated when we rebuild this project to include a reference to our layout file (stored as main.xml in our project’s res/l ayout directory).The other difference is that we need to get our hands on our Button instance, for which we use the findViewById() call. Since we identified our button as @+id/button, we can reference the button’s identifier as R.id.button. Now, with the Button instance in hand, we can set the callback and set the label as needed.As you can see in Figure 5-1, the results look the same as with the originalNow demo.Figure 5-1. The NowRedux sample activity Employing Basic WidgetsE very GUI toolkit has some basic widgets: fields, labels, buttons, etc. Android’s toolkit is no different in scope, and the basic widgets will provide a good introduction as to how widgets work in Android activities.Assigning LabelsThe simplest widget is the label, referred to in Android as a TextView. Like in most GUI toolkits, labels are bits of text not editable directly by users. Typically, they are used to identify adjacent widgets (e.g., a “Name:” label before a field where one fills in a name).In Java, you can create a label by creating a TextView instance. More commonly, though, you will create labels in XML layout files by adding a TextView element to the layout, with an android:text property to set the value of the label itself. If you need to swap labels based on certain criteria, such as internationalization, you may wish to use a resource reference in the XML instead, as will be described in Chapter 9. TextView has numerous other properties of relevance for labels, such as:• android:typeface to set the typeface to use for the label (e.g., monospace) • android:textStyle to indicate that the typeface should be made bold (bold), italic (italic),or bold and italic (bold_italic)• android:textColor to set the color of the label’s text, in RGB hex format (e.g., #FF0000 for red)For example, in the Basic/Label project, you will find the following layout file:<?xml version="1.0" encoding="utf-8"?><TextView xmlns:android=/apk/res/androidandroid:layout_width="fill_parent"android:layout_height="wrap_content"android:text="You were expecting something profound?" />As you can see in Figure 6-1, just that layout alone, with the stub Java source provided by Android’s p roject builder (e.g., activityCreator), gives you the application.Figure 6-1. The LabelDemo sample applicationButton, Button, Who’s Got the Button?We’ve already seen the use of the Button widget in Chapters 4 and 5. As it turns out, Button is a subclass of TextView, so everything discussed in the preceding section in terms of formatting the face of the button still holds. Fleeting ImagesAndroid has two widgets to help you embed images in your activities: ImageView and ImageButton. As the names suggest, they are image-based analogues to TextView and Button, respectively.Each widget takes an android:src attribute (in an XML layout) to specify what picture to use. These usually reference a drawable resource, described in greater detail in the chapter on resources. You can also set the image content based on a Uri from a content provider via setImageURI().ImageButton, a subclass of ImageView, mixes in the standard Button behaviors, for responding to clicks and whatnot.For example, take a peek at the main.xml layout from the Basic/ImageView sample project which is found along with all other code samples at : <?xml version="1.0" encoding="utf-8"?><ImageView xmlns:android=/apk/res/androidandroid:id="@+id/icon"android:layout_width="fill_parent"android:layout_height="fill_parent"android:adjustViewBounds="true"android:src="@drawable/molecule" />The result, just using the code-generated activity, is shown in Figure 6-2.Figure 6-2. The ImageViewDemo sample applicationFields of Green. Or Other Colors.Along with buttons and labels, fields are the third “anchor” of most GUI toolkits. In Android, they are implemented via the EditText widget, which is a subclass of the TextView used for labels.Along with the standard TextView properties (e.g., android:textStyle), EditText has many others that will be useful for you in constructing fields, including:• android:autoText, to control if the fie ld should provide automatic spelling assistance• android:capitalize, to control if the field should automatically capitalize the first letter of entered text (e.g., first name, city) • android:digits, to configure the field to accept only certain digi ts • android:singleLine, to control if the field is for single-line input or multiple-line input (e.g., does <Enter> move you to the next widget or add a newline?)Beyond those, you can configure fields to use specialized input methods, such asandroid:numeric for numeric-only input, android:password for shrouded password input,and android:phoneNumber for entering in phone numbers. If you want to create your own input method scheme (e.g., postal codes, Social Security numbers), you need to create your own implementation of the InputMethod interface, then configure the field to use it via android: inputMethod.For example, from the Basic/Field project, here is an XML layout file showing an EditText:<?xml version="1.0" encoding="utf-8"?><EditTextxmlns:android=/apk/res/androidandroid:id="@+id/field"android:layout_width="fill_parent"android:layout_height="fill_parent"android:singleLine="false" />Note that android:singleLine is false, so users will be able to enter in several lines of text. For this project, the FieldDemo.java file populates the input field with some prose:package monsware.android.basic;import android.app.Activity;import android.os.Bundle;import android.widget.EditText;public class FieldDemo extends Activity { @Overridepublic void onCreate(Bundle icicle) { super.onCreate(icicle);setContentView(yout.main);EditText fld=(EditText)findViewById(R.id.field);fld.setText("Licensed under the Apache License, Version 2.0 " + "(the \"License\"); you may not use this file " + "except in compliance with the License. You may " + "obtain a copy of the License at " +"/licenses/LICENSE-2.0");}}The result, once built and installed into the emulator, is shown in Figure 6-3.Figure 6-3. The FieldDemo sample applicationNote Android’s emulator only allows one application in the launcher per unique Java package. Since all the demos in this chapter share the monsware.android.basic package, you will only see one of these demos in your emulator’s launcher at any one time.Another flavor of field is one that offers auto-completion, to help users supply a value without typing in the whole text. That is provided in Android as the AutoCompleteTextView widget and is discussed in Chapter 8.Just Another Box to CheckThe classic checkbox has two states: checked and unchecked. Clicking the checkbox toggles between those states to indicate a choice (e.g., “Ad d rush delivery to my order”). In Android, there is a CheckBox widget to meet this need. It has TextView as an ancestor, so you can use TextView properties likeandroid:textColor to format the widget. Within Java, you can invoke: • isChecked() to determi ne if the checkbox has been checked• setChecked() to force the checkbox into a checked or unchecked state • toggle() to toggle the checkbox as if the user checked itAlso, you can register a listener object (in this case, an instance of OnCheckedChangeListener) to be notified when the state of the checkbox changes.For example, from the Basic/CheckBox project, here is a simple checkbox layout:<?xml version="1.0" encoding="utf-8"?><CheckBox xmlns:android="/apk/res/android"android:id="@+id/check"android:layout_width="wrap_content"android:layout_height="wrap_content"android:text="This checkbox is: unchecked" />The corresponding CheckBoxDemo.java retrieves and configures the behavior of the checkbox:public class CheckBoxDemo extends Activityimplements CompoundButton.OnCheckedChangeListener { CheckBox cb;@Overridepublic void onCreate(Bundle icicle) { super.onCreate(icicle);setContentView(yout.main);cb=(CheckBox)findViewById(R.id.check);cb.setOnCheckedChangeListener(this);}public void onCheckedChanged(CompoundButton buttonView,boolean isChecked) {if (isChecked) {cb.setText("This checkbox is: checked");}else {cb.setText("This checkbox is: unchecked");}}}Note that the activity serves as its own listener for checkbox state changes since it imple ments the OnCheckedChangeListener interface (via cb.setOnCheckedChangeListener(this)). The callback for the listener is onCheckedChanged(), which receives the checkbox whose state has changed and what the new state is. In this case, we update the text of the checkbox to reflect what the actual box contains.The result? Clicking the checkbox immediately updates its text, as you can see in Figures 6-4 and 6-5.Figure 6-4. The CheckBoxDemo sample application, with the checkbox uncheckedFigure 6-5. The same application, now with the checkbox checkedTurn the Radio UpAs with other implementations of radio buttons in other toolkits, Android’s radio buttons are two-state, like checkboxes, but can be grouped such that only one radio button in the group can be checked at any time.Like CheckBox, RadioButton inherits from CompoundButton, which in turn inherits fromTextView. Hence, all the standard TextView properties for font face, style, color, etc., are available for controlling the look of radio buttons. Similarly, you can call isChecked() on a RadioButton to see if it is selected, toggle() to select it, and so on, like you can with a CheckBox.Most times, you will want to put your RadioButton widgets inside of aRadioGroup. The RadioGroup indicates a set of radio buttons whose state is tied, meaning only one button out of the group can be selected at any time. If you assign an android:id to your RadioGroup in your XML layout, you can access the group from your Java code and invoke:• check() to check a specific radio button via its ID (e.g., group.check(R.id.radio1))• clearCheck() to clear all radio buttons, so none in the group are checked• getCheckedRadioButtonId() to get the ID of the currently-checked radio button (or -1 if none are checked)For example, from the Basic/RadioButton sample application, here is an XML layout showing a RadioGroup wrapping a set of RadioButton widgets: <?xml version="1.0" encoding="utf-8"?> <RadioGroupxmlns:android=/apk/res/androidandroid:orientation="vertical"android:layout_width="fill_parent"android:layout_height="fill_parent" ><RadioButton android:id="@+id/radio1"android:layout_width="wrap_content"android:layout_height="wrap_content"android:text="Rock" /><RadioButton android:id="@+id/radio2"android:layout_width="wrap_content"android:layout_height="wrap_content"android:text="Scissors" /><RadioButton android:id="@+id/radio3"android:layout_width="wrap_content"android:layout_height="wrap_content"android:text="Paper" /></RadioGroup>Figure 6-6 shows the result using the stock Android-generated Java forthe project and this layout.Figure 6-6. The RadioButtonDemo sample application Note that the radio button group is initially set to be completely unchecked at the outset. To pre-set one of the radio buttons to be checked, use either setChecked() on the RadioButton or check() on the RadioGroup from within your onCreate() callback in your activity.It’s Quite a ViewAll widgets, including the ones previously shown, extend View, and as such give all widgets an array of useful properties and methods beyond those already described.Useful PropertiesSome of the properties on View most likely to be used include:• Controls the focus sequence:• android:nextFocusDown• android:nextFocusLeft• android:nextFocusRight• android:nextFocusUp• android:visibility, which controls wheth er the widget is initially visible• android:background, which typically provides an RGB color value (e.g., #00FF00 for green) to serve as the background for the widgetUseful MethodsYou can toggle whether or not a widget is enabled via setEnabled() and see if it is enabled via isEnabled(). One common use pattern for this is to disable some widgets based on a CheckBox or RadioButton selection.You can give a widget focus via requestFocus() and see if it is focused via isFocused(). You might use this in concert with disabling widgets as previously mentioned, to ensure the proper widget has the focus once your disabling operation is complete.To help navigate the tree of widgets and containers that make up an activity’s overall view, you can use:• get Parent() to find the parent widget or container• findViewById() to find a child widget with a certain ID• getRootView() to get the root of the tree (e.g., what you provided to the activity via setContentView())Android 页面布局使用XML进行布局虽然纯粹通过Java代码在activity上创建和添加部件,在技术上是可行的,我们在第4章中做的一样,更常见的方法是使用一种基于XML的布局文件。

外文翻译排版格式参考

外文翻译排版格式参考

毕业设计(论文)外文资料翻译系别:电子信息系专业:通信工程班级:B100309姓名:张杨学号:B10030942外文出处:附件: 1. 原文; 2. 译文2014年03月An Introduction to the ARM 7 ArchitectureTrevor Martin CEng, MIEETechnical DirectorThis article gives an overview of the ARM 7 architecture and a description of its major features for a developer new to the device. Future articles will examine other aspects of the ARM architecture.Basic CharacteristicsThe principle feature of the ARM 7 microcontroller is that it is a register based load-and-store architecture with a number of operating modes. While the ARM7 is a 32 bit microcontroller, it is also capable of running a 16-bit instruction set, known as "THUMB". This helps it achieve a greater code density and enhanced power saving. While all of the register-to-register data processing instructions are single-cycle, other instructions such as data transfer instructions, are multi-cycle. To increase the performance of these instructions, the ARM 7 has a three-stage pipeline. Due to the inherent simplicity of the design and low gate count, ARM 7 is the industry leader in low-power processing on a watts per MIP basis. Finally, to assist the developer, the ARM core has a built-in JTAG debug port and on-chip "embedded ICE" that allows programs to be downloaded and fully debugged in-system.In order to keep the ARM 7 both simple and cost-effective, the code and data regions are accessed via a single data bus. Thus while the ARM 7 is capable of single-cycle execution of all data processing instructions, data transfer instructions may take several cycles since they will require at least two accesses onto the bus (one for the instruction one for the data). In order to improve performance, a three stage pipeline is used that allows multiple instructions to be processed simultaneously.The pipeline has three stages; FETCH, DECODE and EXECUTE. The hardware of each stage is designed to be independent so up to three instructions can be processed simultaneously. The pipeline is most effective in speeding up sequential code. However a branch instruction will cause the pipeline to be flushed marring its performance. As we shall see later the ARM 7 designers had some clever ideas to solve this problem.InstructionFig 1 ARM 3- Stage pipelineARM7 Programming ModelThe programmer's model of the ARM 7 consists of 15 user registers, as shown in Fig. 3, with R15 being used as the Program Counter (PC). Since the ARM 7 is a load-and- store architecture, an user program must load data from memory into the CPU registers, process this data and then store the result back into memory. Unlike other processors no memory to memory instructions are available.M1M2M34,R1,R2 (R4=R0+R2)3Fig 2 Load And Store ArchitectureAs stated above R15 is the Program Counter. R13 and R14 also have special functions; R13 is used as the stack pointer, though this has only been defined as a programming convention. Unusually the ARM instruction set does not have PUSH and POP instructions so stack handling is done via a set of instructions that allow loading and storing of multiple registers in a single operation. Thus it is possible to PUSH or POP the entire register set onto the stack in a single instruction. R14 has special significance and is called the "link register". When a call is made to a procedure, the return address is automatically placed into R14, rather than onto a stack, as might be expected. A return can then be implemented by moving the contents of R14 intoR15, the PC. For multiple calling trees, the contents of R14 (the link register) must be placed onto the stack.15 User registers +PCR13 is used as the stack pointer R14 is the link registerR14 is the Program Counter Current Program Status RegisterFig 3 User Mode Register ModelIn addition to the 16 CPU registers, there is a current program status register (CPSR). This contains a set of condition code flags in the upper four bits that record the result of a previous instruction, as shown in Fig 4. In addition to the condition code flags, the CPSR contains a number of user-configurable bits that can be used to change the processor mode, enter Thumb processing and enable/disable interrupts.31 30 29 28 27Negative Carry OverflowIRQ System UserUndefined instruction AbortThumb instruction setFig 4 Current Program Status Register and Flags Exception And Interrupt ModesThe ARM 7 architecture has a total of six different operating modes, as shown below. These modes are protected or exception modes which have associated interruptsources and their own register sets.User: This mode is used to run the application code. Once in user mode the CPSR cannot be written to and modes can only be changed when an exception is generated. FIQ: (Fast Interrupt reQuest) This supports high speed interrupt handling. Generally it is used for a single critical interrupt source in a systemIRQ: (Interrupt ReQuest) This supports all other interrupt sources in a system Supervisor: A "protected" mode for running system level code to access hardware or run OS calls. The ARM 7 enters this mode after resetAbort: If an instruction or data is fetched from an invalid memory region, an abort exception will be generatedUndefined Instruction:If a FETCHED opcode is not an ARM instruction, an undefined instruction exception will be generated.The User registers R0-R7 are common to all operating modes. However FIQ mode has its own R8 -R14 that replace the user registers when FIQ is entered. Similarly, each of the other modes have their own R13 and R14 so that each operating mode has its own unique Stack pointer and Link register. The CPSR is also common to all modes. However in each of the exception modes, an additional register一the saved program status register (SPSR),is added. When the processor changes the current value of the CPSR stored in the SPSR,this can be restored on exiting the exception mode.System&User FIQ Supervisor Abort IRQ Undefined Fig 5 Full Register Set For ARM 7Entry to the Exception modes is through the interrupt vector table. Exceptions in the ARM processor can be split into three distinct types.(i) Exceptions caused by executing an instruction, these include software interrupts, undefined instruction exceptions and memory abort exceptions(ii) Exceptions caused as a side effect of an instruction such as a abort caused by trying to fetch data from an invalid memory region.(iii) Exceptions unrelated to instruction execution, this includes reset, FIQ and IRQ interrupts.In each case entry into the exception mode uses the same mechanism. On generation of the exception, the processor switches to the privileged mode, the current value of the PC+4 is saved into the Link register (R14) of the privileged mode and the current value of CPSR is saved into the privileged mode's SPSR. The IRQ interrupts are also disabled and if the FIQ mode is entered, the FIQ interrupts are also disabled, Finally the Program Counter is forced to the exception vector address and processing of the exception can start. Usually the first action of the exception routine will be to pushPrefetch Abort(instruction fetch memory abort)Software interrupt (SWI)Undefined instruction ResetData Abort (data access momory abort)IRQ (interrupt)FIQ (fast interrupt)Supervisor Undefined Supervisor Abort Abort IRQ FIQ0x000000000x0000001C0x000000040x0000000C 0x000000080x000000100x00000018Fig 6 ARM 7 Vector TableA couple of things are worth noting on the vector table. Firstly, there is a missing vector at 0x000000014. This was used on an earlier ARM architecture and is left empty on ARM 7 to allow backward compatibility. Secondly, the FIQ interrupt is at the highest address so the FIQ routines could start from this address, removing the need for a jump instruction to reach the routine. It helps make entry into the FIQ routine as fast as possible.Once processing of the exception has finished, the processor can leave the privileged mode and return to the user mode. Firstly the contents of any registers previously saved onto the stack must be restored. Next the CSPR must be restored from the SPSR and finally the Program Counter is restored by moving the contents of the link register to R15, (i.e. the Program Counter). The interrupted program flow can then restart.Data TypesThe ARM instruction set supports six data types namely 8 bit signed and unsigned, 16 bit signed and unsigned plus 32 bit signed and unsigned. The ARM processor instruction set has been designed to support these data types in Little or Big-endian formats. However most ARM silicon implementations use the Little-endian format. ARM instructions typically have a three-operand format, as shown belowADD Rl,R2, R3 ; Rl=R2+R3ARM7 Program Flow ControlIn all processors there is a small group of instructions that are conditionally executed depending on a group of processor flags. These are branch instructions such as branch not equal. Within the ARM instruction set, all instructions are conditionally executable.31 28CONDFig. 7 Instruction Condition Code BitsThe top four bits of each instruction contain a condition code that must be satisfied if the instruction is to be executed. This goes a long way to eliminating small branches in the program code and eliminating stalls in the pipeline so increasing the overall program performance. Thus for small conditional branches of three instructions or less, conditional execution of instructions should be used. For larger jumps, normal branching instructions should be used.Fig. 8 Instruction Condition CodesThus our ADD instruction below could be prefixed with a condition code, as shown. This adds no overhead to instruction executionEQADD R1,R2,R3 ;If(Zero flag = 1)then R1 = R2+R3The ARM7 processor also has a 32-bit barrel shifter that allows it to shift or rotate one of the operands in a data processing instruction. This takes place in the same cycle as the instruction. The ADD instruction could be expanded as followsEQADD R1,R2 R3,LSL #2 ; If ( Zero flag = 1) then R1 = R2+ (R3 x 4) Finally the programmer may decide if a particular instruction can set the condition code flags in the CPSR.EQADDS R1,R2 R3,LSL #2; If (Zero flag = 1) then R1 = R2 + (R3 x4)and set condition code flagsIn the ARM instruction set there are no dedicated call or return instructions. Instead these functions are created out of a small group of branching instructions.The standard branch (B) instruction allows a jump of around+-32Mb. A conditional branch can be formed by use of the condition codes. For example, a "branch notequal" would be the branching instruction B and the condition code "NE" for not equal giving "BNE". The next form of the branch instruction is the branch with link. This is the branch instruction but the current value of the PC +4 is saved into R14, the link register. This acts as a CALL instruction by saving the return address into R14. A return instruction is not necessary since a return can be implemented by moving R14 into the PC. The return is more complicated in the case of an interrupt routine. Depending on the type of exception, it may be necessary to modify the contents of the link register to get the correct return address. For example, in the case of an IRQ or FIQ interrupt, the processor will finish its current instruction, increment the PC to the next instruction and then jumping to the vector table. This means that the value in the link register is PC+4 or one instruction ahead of the return address. This means we need to subtract 4 from the value in the link register to get the correct return address. This can be done in a single instruction thus: SUBS pc, r14, #4// PC=Link register-40x80000x400PC=0x80000x4000x8000Fig 9 Branch and Branch Link Instruction OperationBranching instructions are also used to enter the 16-bit Thumb instruction set. Both the branch and branch-with-link may perform an exchange between 32-bit and 16-bit instruction sets and vice versa .The Branch exchange will jump to a location and start to execute 16-bit Thumb instructions. Branch link exchange will jump to a location, save PC+4 into the link register and start execution of 16-bit Thumb instructions. In both cases, the T bit is set in the CPSR. An equivalent instruction is implemented in the Thumb instruction set to return to 32-bit ARM instruction processing.0x8000T=1Y=10x4000x4000x8000Fig. 10 Branch Exchange and Branch Link Exchange Instruction Operation Software InterruptsThe ARM instruction set has a software interrupt instruction. Execution of thisinstruction forces an exception as described above; the processor will enter supervisor mode and jump to the SWI vector at 0x00000008.Fig. 11 Software Interrupt InstructionThe bit field 0-23 of the SWI instruction is empty and can be used to hold an ordinal. On execution of an SWI instruction, this ordinal can be examined to determine which SWI procedure to run and gives over 16 million possible SWI functions.…Swi_ #1 . call swi function one…Tn the swi handlerregister unsigned*link ptr asm ("r14");// define a pointer to the hnk register Switch ((*(link-ptr-1))&Ox00FFFFFF) //calculate the number of the swi function{Case 0x01 : SWI_unction (); //Call the function…}This can be used to provide a hardware abstraction layer. In order to access OS calls or SFR registers, the user code must make a SWI call . All these functions are therunning in a supervisor mode, with a separate stack and link register.As well as instructions to transfer data to and from memory and to CPU registers, the ARM 7 has instructions to save and load multiple registers. It is possible to load or save all 16 CPU registers or a selection of registers in a single instruction. Needless tosay, this is extremely useful when entering or exiting a procedure.M0Fig. 12 Load and Store Multiple Instruction OperationThe CPSR and SPSR are only accessed by two special instructions to move their contents to and from a CPU register. No other instruction can act on them directly.MSRMRSR15R15Fig. 13 Programming The SPSR And CPSR RegistersTHUMB SupportThe ARM processor is capable of executing both 32-bit (ARM) instructions and 16- Bit (Thumb instructions). The Thumb instruction set must always be entered byrunning a Branch exchange or branch link exchange instruction and NOT by setting the T bit in the CPSR. Thumb instructions are essentially a mapping of their 32 bit cousins but unlike the ARM instructions, they are unconditionally executed except though for branch instructions.Fig. 14 Thumb Instruction ProcessingThumb instructions reduced number of only have unlimited access to registers RO-R7 and R13一Rl5. A instructions can access the full register set.Fig.15 Thumb programmers modelThe Thumb instruction set has the same load and store multiple instructions as ARM and in addition, has a modified version of these instructions in the form of PUSH and POP that implement a full descending stack in the conventional manner. The Thumb instruction set also supports the SWI instruction, except that the ordinal field is only 8 bits long to support 256 different SWI calls. When the processor is executing Thumb code and an exception occurs, it will switch to ARM mode in order to process the exception. When the CPSR is restored the, Thumb bit will be reset and the processor continues to run Thumb instructions.BCXBXFig.16 Thumb Exception ProcessingThumb has a much higher code density than ARM code, needing some 70% of the space of the latter. However in a 32-bit memory, ARM code is some 40% faster than Thumb. However it should be noted that if you only have 16-bit wide memory then Thumb code will be faster than ARM code by about 45%. Finally the other important aspect of Thumb is that it can use up to 30% less power than ARM code.ARM7的体系结构介绍特里沃马丁曾,鼠技术总监本文给出了ARM 7架构的概述和开发新的设备,以及主要功能的描述,未来将研究ARM体系结构的其他方面。

外文翻译标准格式

外文翻译标准格式

毕业设计(论文)
译文及原稿译文题目:[单击此处添加译文题目]
原稿题目:[单击此处添加原稿题目]
原稿出处:[单击此处添加原稿出处]
[单击此处添加译文题目]
[单击此处添加译文正文]
以下是说明文字,正式成文后请删除。

1、模板的使用方法
(1)请不要删除任何具有格式的模板文字。

(2)按照提示直接单击或单击后选择“编辑”→“选择性粘贴”—“无格式文本”就可添加相应内容。

2、在“原稿出处”中对原稿的来源进行说明,包括作者姓名、出处、出版信息等。

期刊类文献书写方法:作者(不超过3人,多者用“等”或“et al”表示).题名[J].刊名,出版年,卷号(期号):起止页码.
论文集类文献书写方法:著者.题名[C].编者.论文集名.出版地:出版社,出版年份:起止页码.
有一篇译文,按如下顺序列出:
译文题目一
原稿题目一
原稿出处一
3、检索和利用外文资料的能力是现阶段毕业设计(论文)环节中所要求掌握的基本能力之一。

外文翻译是在查阅外文文献时,将篇幅适当、内容与选题相关的外文资料翻译成中文。

通过翻译外文资料,可更深层次地了解国外相关领域的现状,同时也是对翻译能力的锻炼,并为考察和检验学生外语能力提供依据。

4、进行外文翻译应注意以下几点:
(1)翻译的外文文献内容应与论文选题相关;一般应选自国外学术期刊、学术会议的文章及其他相关材料。

(2)篇幅、深度和难度适当,可以由1篇文章组成。

5、外文翻译字符应达到2000字符。

[单击此处添加外文原稿题目] [单击此处添加外文原稿正文]。

外文翻译格式说明

外文翻译格式说明

山东理工大学毕业设计(外文翻译材料)学院:专业:学生姓名:指导教师:电气与电子工程学院自动化于小涵季画外文翻译材料格式要求:1.页边距:上3.8磅;下3.8磅;左3.2,右3.2;页眉距边界2.8,页脚距边界32.原文题目:Arial,小三;间距:段前18磅,段后12磅,间距21磅3.原文正文:Times New Roman,小四;间距:段前0磅,段后6磅,间距21磅4.译文题目:黑体,小三;间距:同原文题目5.译文正文:宋体,小四;间距同原文正文6.页眉页脚:原文页眉处写:外文翻译(原文),宋体,五号。

译文页眉处写:外文翻译(译文),宋体,五号。

原文译文的页脚统一编页码(不要单独编页码)。

Plant Model Generation for PLC SimulationHyeong-Tae ParkAbstract:This paper reports an automated procedure for constructing a plant model for PLC simulation. Since PLC programs contain only the control logic without information on the plant model, it is necessary to build the corresponding plant model to perform the simulation. Conventionally, a plant model for PLC simulation has been constructed manually, which requires much effort and indepth knowledge of the simulation. As a remedy for this problem, we propose an automated procedure for generating a plant model from the symbol table of a PLC program. To do so, we propose a naming rule for PLC symbols so that the symbol names include sufficient information on the plant model. By analysing such symbol names, we extract a plant model automatically. The proposed methodology has been implemented and test runs performed.Keywords: agile manufacturing; CAD/CAM; CAPP; simulation1. IntroductionTo survive and prosper in the modern manufacturing era, manufacturers need to continuously improve their products, as well as their production systems. A modern manufacturing line is a highly integrated system composed of automated workstations, such as robots with tool-changing capabilities, a hardware handling system and storage system, and a computer control system that controls the operations of the- 1 -entire system.Since the implementation of a manufacturing line requires heavy investment, proper verification of a line’s operational status sho uld be performed to ensure that the highly automated manufacturing system will successfully achieve the intended benefits. Simulation technology is considered to be an essential tool in the design and analysis of complex systems that cannot be easily described by analytical or mathematical models . Simulation is useful for calculating utilisation statistics, finding bottlenecks, pointing out scheduling errors, and even for creating manufacturing schedules. Traditionally, various simulation languages, including ARENA and AutoMod, have been used for the simulation of manufacturing systems. These simulation languages have been widely accepted both by industry and by academia; however, they remain as analysis tools for the rough design stage of a production line, because their simulation models are not sufficiently realistic to be utilised for a detailed design or for implementation purposes. For example, real production lines are usually controlled by PLC (Programmable Logic Controller) programs (Rullan 1997), but conventional simulation languages roughly describe the control logic with independent entity flows (job flows) between processes.- 2 -Production systems typically consist of simultaneously operating machines, which are controlled by PLCs, currently the most suitable and widely employed industrial control technology. A PLC emulates the behaviour of an electric ladder diagram. As they are sequential machines, to emulate the workings of parallel circuits that respond instantaneously, PLCs use an input/output symbol table and a scanning cycle. When a program is being run in a PLC it is continuously executing a scanning cycle. The program scan solves the Boolean logic related to the information in the input table with that in the output and internal relay tables. In addition, the information in the output and internal relay tables is updated during the program scan. In a PLC, this Boolean logic is typically represented using a graphical language known as a ladder diagram (IEC 2003).Since the abstraction levels of conventional simulators and PLC programs are quite different, the control logic of conventional simulators cannot be reused for the generation of PLC programs. Usually, electrical engineers manually write PLC programs by referring to the rough control logic of conventional simulators, as shown in Figure 1. Since PLC programming is a very tedious and error-prone job, it is essential to verify the PLC programs offline to reduce the stabilisation time of a production system.Previous approaches to a PLC program can be categorised into two groups:- 3 -(1) verification of a given PLC programand (2) generation of a dependable PLC program. In the first group, various software tools have been developed for the verification of PLC based systems via the use of timed automata, such as UPPAAL2k, KRONOS, Supremica and HyTech, mainly for programs written in a statement list language, also termed Boolean (Manesis and Akantziotis 2005). Such software tools verify PLC programs to a certain extent; however, they remain limited. Since they mainly focus on the checking of theoretical attributes (safety, liveness, and reachability), it is not easy for users to determine whether the PLC programs actually achieve the intended control objectives. In the second group, many researchers have focused on the automatic generation of PLC programs from various formalisms including state diagrams, Petri nets, and IDEF0. These formalisms can help the design process of control logics; however, it is still difficult to find hidden errors, which is the most difficult part of verifying a control program.Figure 2. The concept of PLC simulation.To overcome the aforementioned problems, it is necessary to utilise simulation techniques for PLC program verification. By simulating PLC programs, it is possible to analyse the control logic in various ways and recognise hidden errors more intuitively (David 1998). Although PLC simulation can be a very powerful tool for the detailed verification of a production system, the accompanying construction of a plant model is a major obstacle (the counterpart model of a control program). Since PLC programs only contain the control information, without device models, it is necessary to build a corresponding plant model to perform simulation, as shown in- 4 -Figure 2. However, constructing a plant model requires an excessive amount of time and effort. Sometimes, the plant model construction requires much more time than the PLC programming. This serves as the motivation for exploring the possibility of finding an automatic procedure for generating a plant model from a given PLC program.Figure3.Symbol table of a PLC program.Although the objective of a PLC program is not to describe a plant model (device models), the symbol table of a PLC program can provide a glimpse of the plant model. As shown in Figure 3, symbols in a PLC program usually contain some information related to the plant. For example, ‘EXLINE_MB_AGV_P1’ means that the symbol is a signal that is related to the control of an ‘AGV’ (Auto Guided Vehicl e) belonging to the ‘MB’ station of ‘EXLINE’ line. The above scenario reveals the key idea of the present study. If we can develop a proper naming rule for PLC symbols, then it might be possible to extract a plant model by analysing the symbol names.This paper has two major objectives: (1) to propose a proper naming rule for PLC symbols and (2) to develop a procedure for generating a plant model by analysing the symbol names. The application area of the proposed methodology includes all types of automated manufacturing systems controlled by PLC programs, such as automotive production lines, FMSs (flexible manufacturing systems), and ASRSs (automatic storage and retrieval systems). The overall structure of the paper is as follows. Section 2 addresses the specifications of a plant model for PLC simulation. Section 3 describes a naming rule for PLC symbols, which enables the automatic generation of a plant model. Finally, concluding remarks are given in Section 4.2. Plant model for PLC simulationBefore explaining the specification of a plant model enabling PLC simulation, we want to address the importance of the PLC simulation. Chuang et al. (1999) proposed a procedure for the development of an industrial automated production system that- 5 -- 6 -consists of nine steps, as follows: (1) define the process to be controlled; (2) make a sketch of the process operation; (3) create a written sequence of the process; (4) on the sketch, add the sensors needed to carry out the control sequence; (5) add the manual controls needed for the process setup or for operational checks; (6) consider the safety of the operating personnel and make additions and adjustments as needed;(7) add the master stop switches required for a safe shutdown; (8) create a ladder logic diagram that will be used as a basis for thePLC program; and (9) consider the possible points where the process sequence may go astray. The most time-consuming task for the control logic designers is the eighth step, which is usually done by the repetitive method of code writing, testing, and debugging until the control objectives are achieved (Manesis and Akantziotis 2005). This is the reason why conventional PLC programming is often inefficient and prone to human error. As the configurations of production lines and their control programs become more complicated, there is a strong need for a more efficient PLC simulation environment. It is hoped that this paper will take positive steps in this direction.A PLC can be considered as a dedicated computer system having input and output signals. To run a PLC, the corresponding plant model (the counterpart system) is required to interact with the input and output of the PLC. The behaviour of the plant model should be the same as that of the actual system to achieve PLC verification. Since a production line consists of various devices, including robots, transporters, jigs, solenoids, proximity sensors, and light sensors (Groover 2006), we can consider a plant model as a set of device models. To build such a device model, this paper em ploys Zeigler’s DEVS (Discrete Event Systems Specifications) formalism (Zeigler 1984, Kim 1994), which supports the specification of discrete event models in a hierarchical, modular manner. The semantics of the formalism are highly compatible with object-oriented specifications for simulation models. We use the atomic model of the DEVS formalism to represent the behavior of a device model. Formally, an atomic model M is specified by a 7-tuple:M =〈X, S,Y, sin δ,ext δ,λ ,t a 〉X input events setS sequential states setY output events setsin δ S→S: internal transition functionext δQ*X→S: external transition functionQ={(s, e)∣s ∈S, 0≤e ≤t a (s)}: total state of MλS →Y: output function- 7 -t a S →Real: time advance functionThe four elements in the 7-tuple, namely sin δ,ext δ,λand t a , are called the characteristic functions of an atomic model. The atomic model of the DEVS formalism can be considered as a timed-FSA (finite state automata), and it is suitable for describing the behaviour of a device model. Once the device models (plant model) are obtained, it becomes possible to perform the PLC simulation. Currently, device models should be construed manually, which takes much time and effort. To cope with the problem, the objective of the paper is to propose an automated generation procedure for device models.Before explaining the automatic generation procedure of a plant model, let us take a look at the manual procedure to construct device models. To construct a device model, first it is necessary to identify the set of tasks that are assigned to the device. The activation of each task is normally triggered by an external signal from PLC programs. Once the set of tasks is identified for a device, it is then possible to extract the state transition diagram, which defines an atomic model of the DEVS formalism. Figure 4(a) shows a simple example of an AGV (Automatic Guided Vehicle) with two tasks, T1 (movement from p1 to p2) and T2 (movement from p2 to p1). As the two tasks should be triggered by external events, the shell part of the AGV must have two input ports, termed here as Signal_1 and Signal_2, as shown in Figure 4(b).From the set of tasks, it is possible to instantiate the state transition diagram. For this example, there are four states, P1, DoT1, P2 and DoT2. While P1 and P2 take external events from the input ports (Signal_1, Signal_2) for state transitions, DoT1 and DoT2 take internal events that are the end events of the two tasks (T1 and T2). The DEVS atomic model of the virtual device, corresponding to the AGV, can be described as follows:- 8 -Shell of a virtual device:M=〈X,S,Y,sin δ,ext δ,λ ,t a 〉}2_,1_{Signal Signal =X S={P1,DOT1,P2,DOT2} Y={T1Done,T2Done}sin δ(DOT1)=P2 s i nδ(DOT2)=P1 ext δ(P1,Signal_1)=DOT1 ext δ(P2,Signal_2)=DOT2λ(DOT1)=T1Done λ(DOT2)=T2Donet a (DOT1)=Time_1 t a (DOT2)=Time_2Once a plant model has been constructed, it is possible to perform the PLC simulation, which enables the intuitive verification of a PLC program. Figure 5 shows the connections between a PLC program and a plant model. The plant model includes all device models of a production system, and the PLC program contains the control logic for the plant model. To integrate the plant model and the PLC program, it is necessary to define the mapping between the plant model and the PLC program, which is described by I/O mapping. To enable the visual verification of a PLC program, it is necessary to import 3D graphic models, which are controlled by the logical device models (the state transition diagrams). Since 3D graphic models are not always necessary, they are optional for PLC simulation. As mentioned already, the objective of this paper is to extract device models from the symbol names of PLC programs. To do so, it is necessary to develop a proper naming rule for PLC symbols. The naming rule will be addressed in the next section.3. Symbol naming for plant model generationAlthough IEC 61131-3 provides various standard specifications for a PLC, the naming rules of PLC symbols have rarely been brought into focus. Since there have been no standard rules for the naming of PLC symbols, it has been fully dependent on individual PLC programmers.To generate device models from PLC symbols, it is necessary to make PLC symbols that include enough information concerning the plant model. To achieve this objective, we interviewed many PLC programmers and analysed various conventional rules. As a result, we came up with a naming structure consisting of five fields: (1) line name, (2) process number, (3) device name, (4) input or output, and (5) task name (or state name). Figure 6 shows the naming structure for PLC symbols.If the PLC symbols are named according to the proposed naming structure, then it becomes possible to extract device models (atomic models of DEVS formalism) by simply analysing the symbol names. There are two types of symbols (signals), input or output, which are specified by the fourth field. The purpose of the output signal is to trigger a task that is specified by the fifth field. Thus, it is possible to identify the set of tasks of a device by analysing the output symbols. As mentioned already, once the set of tasks is identified for a device, it is then possible to extract the state transition diagram for the device model, which defines an atomic model of the DEVS formalism. While an output signal (symbol) is issued by a PLC to trigger a task, an input signal (symbol) is issued by a device to report the completion of the task to theδand internal transition functions PLC. This means that external transition functionsextδof a device model can be automatically extracted from the output and input sinsymbols, respectively. We demonstrate the generation procedure of a plant modelfrom PLC symbols using an example, as shown in Figure 7.- 9 -- 10 -In the example cell, we assume a part is loaded manually on the AGV by a worker. When the AGV senses the existence of a part, it moves to transfer the part to the machine. After the transfer, the machine performs machining to convert the part into a finished product. In this case, the plant model consists of two device models: an AGV model and a machine model. The PLC program to control the simple manufacturing cell is shown in Figure 8(a), and its symbol table is shown in Figure 8(b).As shown in Figure 8(b), the AGV model has two output symbols and two input symbols. From the output symbols (EX_OP_AGV_O_GOP1, EX_OP_AGV_O_GOP2), we can intuitively recognise that the AGV has two tasks- 11 -(movement from P2 to P1, and movement from P1 to P2). By using the output symbols, we can extract the state transition diagram, as well as the external transitionfunctions, as shown in Figure 9(a).As mentioned already, an output symbol triggers a task of a device model, and an input symbol is made by the device to notify the completion of the task. Since the execution of a task is performed internally by the device, the internal transition functions of a device model can easily be extracted from the input symbols(EX_OP_AGV_I_DONEGOP1, EX_OP_AGV_I_DONEGOP2). In this way, the device model of the machine can be extracted from the related symbols(EX_OP_MC_, etc.), as shown in Figure 9(b). The procedure for the construction of a device model can be described as follows.- 12 -(1) Identify all corresponding pairs between output symbols and input symbols. While an output symbol triggers a task, the corresponding input symbol reports the completion of the task. For example, EX_OP_AGV_O_GOP1 corresponds toEX_OP_AGV_I_DONEGOP1. (2) Define the states of a device mode using the last naming fields of input/output symbols. In the case of the AGV, we can define four states, GoP1, DoneGoP1, GoP2, and DoneGoP2. (3) Define external (internal) transition functions using output (input) symbols. Once a plant model has been obtained, it becomes possible to perform the PLC simulation by defining the I/O mapping relations between the plant model and the PLC symbols. Through the PLC simulation, we can efficiently check whether the PLC program achieves the control objectives or not.The proposed methodology was implemented in C++language, and test runs were made on a personal computer, as shown in Figure 10. The PLC program shown in Figure 8(a) was written using GX IEC developer version 7.0 provided byMitsubishi Electric Corporation. The GX IEC developer can export a symbol table in the form of an Excel file, as shown in Figure 8(b). The exported symbol table becomes the input for the generation of a plant model. Figure 10 shows that the generated device models by analysing the exported symbol table.4. Discussion and conclusionsThrough PLC simulation, it is possible to analyse control logic in various ways and recognise hidden errors more intuitively. Although PLC simulation can be a very powerful tool for the detailed verification of a production system, the accompanying construction of a plant model requires too much time and effort. To remedy this problem, we have proposed an automated procedure to generate a plant model from the symbol table of a PLC program. To do so, we have also proposed a naming rule for PLC symbols so that the symbol names include sufficient information on the plant model. By analysing the symbol names, a plant model can be extracted automatically. Since a plant consists of various manufacturing devices, we can consider a plant model as a set of device models. To represent such a device model, the proposed method employs Zeigler’s DEVS formalism. We use the atomic model of the DEVS formalism to describe the logical behavior of a device model. In other words, it is necessary to extract the device models from the symbol table in the form of an atomic model of the DEVS formalism. Although the proposed methodology only deals with the local verification of PLC programs, it is also possible to extend the methodologyto include the verification of mechanical aspects of the plant .- 13 -工厂模型生成PLC仿真Hyeong-Tae Park摘要 :本文介绍一个自动程序可编程序控制器(PLC)生成工厂模型仿真。

外文翻译及外文原文(参考格式)

外文翻译及外文原文(参考格式)

外文翻译要求:1、外文资料与毕业设计(论文)选题密切相关,译文准确、质量好。

2、阅读2篇幅以上(10000字符左右)的外文资料,完成2篇不同文章的共2000汉字以上的英译汉翻译3、外文资料可以由指导教师提供,外文资料原则上应是外国作者。

严禁采用专业外语教材文章。

4、排序:“一篇中文译文、一篇外文原文、一篇中文译文、一篇外文原文”。

插图内文字及图名也译成中文。

5、标题与译文格式(字体、字号、行距、页边距等)与论文格式要求相同。

下页附:外文翻译与原文参考格式2英文翻译 (黑体、四号、顶格)外文原文出处:(译文前列出外文原文出处、作者、国籍,译文后附上外文原文)《ASHRAE Handbook —Refrigeration 》.CHAPTER3 .SYSTEM Practices for ammonia 3.1 System Selection 3.2 Equipment3.10 Reciprocating Compressors第3章 氨制冷系统的实施3.1 系统选择在选择一个氨制冷系统设计时,须要考虑一些设计决策要素,包括是否采用(1)单级压缩(2)带经济器的压缩(3)多级压缩(4)直接蒸发(5)满液式(6)液体再循环(7)载冷剂。

单级压缩系统基本的单级压缩系统由蒸发器、压缩机、冷凝器、储液器(假如用的话)和制冷剂控制装置(膨胀阀、浮球阀等)。

1997 ASHRAE 手册——“原理篇”中的第一章讨论了压缩制冷循环。

图1.壳管式经济器的布置外文翻译的标题与译文中的字体、字号、行距、页边距等与论文格式相同。

英文原文(黑体、四号、顶格)英文翻译2(黑体,四号,顶格)外文原文出处:(黑体,四号,顶格)P. Fanning. Nonlinear Models of Reinforced and Post-tensioned Concrete Beams. Lecturer, Department of Civil Engineering, University College Dublin. Received 16 Jul 2001.非线形模型钢筋和后张法预应力混凝土梁摘要:商业有限元软件一般包括混凝土在荷载做用下非线性反应的专用数值模型。

外文翻译规范要求及模版格式

外文翻译规范要求及模版格式

外文翻译规范要求及模版格式
外文中文翻译规范要求及模板格式可以根据不同的需求和行业标准而有所不同。

以下是一些常见的外文中文翻译规范要求及模板格式的建议:1.规范要求:
-准确性和完整性:翻译应准确无误地传达原文的意思,并尽可能保持原文的完整性。

-语法和拼写:翻译应符合中文语法和拼写规范,避免使用口语化或地方性的表达方式。

-文化适应性:翻译应根据目标读者的背景和文化习俗进行适当增删或修改,以确保易于理解。

-确保一致性:在同一文档中,相同的术语和表达应保持一致,以避免混淆和歧义。

2.模板格式:
-标题:可以使用与原文相同或相似的标题格式,并在括号中注明翻译为中文。

-段落和换行:根据原文的段落结构进行适当的调整,并在新段落前留出空行。

-标点符号:根据中文标点符号使用习惯进行调整,保持句子的结构和逻辑清晰。

-术语和专业名词:对于特定的术语和专业名词,可以在括号或脚注中提供更详细的解释或注释。

-引用和注释:如有必要,可以在翻译中包含引用和注释,以提供更多的背景信息和解释。

此外,根据具体需求,还可以根据公司或机构的翻译要求进行格式调整,例如使用特定的字体、字号、页边距等。

因此,在进行外文中文翻译之前,最好与相关方沟通明确具体的规范要求。

外文文献翻译封面格式及要求(模版)

外文文献翻译封面格式及要求(模版)

毕业论文外文文献翻译院年级专业:2009级XXXXXXXXXXX 姓 名:学 号:附 件:备注:(注意:备注页这一整页的内容都不需要打印,看懂了即可)1.从所引用的与毕业设计(论文)内容相近的外文文献中选择一篇或一部分进行翻译(不少于3000实词);2.外文文献翻译的装订分两部分,第一部分为外文文献;第二部分为该外文文献的中文翻译,两部分之间用分页符隔开。

也就是说,第一外文文献部分结束后,使用分页符,另起一页开始翻译。

3.格式方面,外文文献的格式,除了字体统一使用Times new roman 之外,其他所有都跟中文论文的格式一样。

中文翻译的格式,跟中文论文的格式一样。

(注意:备注页这一整页的内容都不需要打印,看懂了即可,定稿后,请删除本页.)范文如下:注意,下面内容每一部份均已用分页符分开了,如果用本模板,请将每一模块单独删除,直接套用到每一模板里面,不要将全部内容一次性删除.【Abstract】This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based onthe theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.,Times New Roman.【Key Words】Brand positioning; Marketing mix; Positioning Strategy; enlightenment, lessons;ABC(本页为英文文献摘要,关键词两项一起单独一页,字体为:Times New Roman,小四号,1.5倍行距)(注:以下为英文文献正文内容,英文全文3000字.具体标题以原文为准.全文字体为Times New Roman.行间距为1.5倍.字号大小与论文正文的各级标题一致.如下:)I.Times New Roman ,Times New Roman,Times New RomanTimes New Roman, Times New Roman, Times New Roman, Times New Roman,This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons fromthe failure of the WONG LO KAT.II.Times New Roman ,Times New Roman,Times New RomanTimes New Roman, Times New Roman, Times New Roman, Times New Roman,This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.III.Times New Roman ,Times New Roman,Times New RomanTimes New Roman, Times New Roman, Times New Roman, Times New Roman,This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.This paper has a systematic analysis on outside Marco-environment of herbal teabeverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.【摘要】本文是对凉茶饮料的宏观环境以及凉茶市场内部主要品牌的竞争对手进行了系统分析。

外文翻译及外文原文参考格式

外文翻译及外文原文参考格式

外文翻译要求:1、外文资料与毕业设计(论文)选题密切相关,译文准确、质量好。

2000的共字符左右)的外文资料,完成2篇不同文章、阅读22篇幅以上(10000 汉字以上的英译汉翻译。

严禁采用专业外国作者可以由指导教师提供,外文资料原则上应是3、外文资料外语教材文章。

插图、排序:“一篇中文译文、一篇外文原文、一篇中文译文、一篇外文原文”4 内文字及图名也译成中文。

与论文格式要求相同。

5、标题与译文格式(字体、字号、行距、页边距等)下页附:外文翻译与原文参考格式英文翻译黑体、四号、顶格()外文原文出处:)(译文前列出外文原文出处、作者、国籍,译文后附上外文原文 .CHAPTER3 .SYSTEM Practices for ammonia —Refrigeration》《ASHRAE Handbook System Selection 3.1Equipment3.2外文翻译的标题与译Reciprocating Compressors3.10 字号文中的字体页边距等与论文距、式相同。

章氨制冷系统的实施第3 3.1 系统选择)在选择一个氨制冷系统设计时,须要考虑一些设计决策要素,包括是否采用(1)液体再64)直接蒸发(5)满液式()多级压缩(单级压缩(2)带经济器的压缩(3 7循环()载冷剂。

单级压缩系统基本的单级压缩系统由蒸发器、压缩机、冷凝器、储液器(假如用的话)和制冷剂手册——“原理篇”中的第一章讨论控制装置(膨胀阀、浮球阀等)。

1997 ASHRAE了压缩制冷循环。

图1.壳管式经济器的布置文件可采用外文原文有PDF 文件直接插入。

PDF英文原文)(黑体、四号、顶格2英文翻译(黑体,四号,顶格)外文原文出处:(黑体,四号,顶格)Lecturer, Concrete Beams. Reinforced and Post-tensioned Models P. Fanning. Nonlinear ofDepartment of Civil Engineering, University College Dublin. Received 16 Jul 2001.非线形模型钢筋和后张法预应力混凝土梁商业有限元软件一般包括混凝土在荷载做用下非线性反应的专用数值模型。

外文翻译原文模板

外文翻译原文模板

1、外文资料翻译内容要求:外文资料的内容应为本学科研究领域,并与毕业设计(论文)选题相关的技术资料或专业文献,译文字数应不少于3000汉字以上,同时应在译文末注明原文的出处。

不可采用网络中直接有外文和原文的。

2、外文资料翻译格式要求:译文题目采用小二号黑体,居中;译文正文采用宋体小四号,段前、段后距为0行;行距:固定值20磅。

英文原文如果为打印的话用新罗马(Times New Roman)小四号字。

装订时原文在前,译文在后。

文章中有引用的地方在原文中也要体现。

参考文献也要翻译成中文!An Energy-Efficient Cooperative Algorithm for Data Estimation inWireless Sensor NetworksAbstract – In Wireless Sensor Networks (WSN), nodes operate on batteries and network’s lifetime depends on energy consumption of the nodes. Consider the class of sensor networks where all nodes sense a single phenomenon at different locations and send messages to a Fusion Center (FC) in order to estimate the actual information. In classical systems all data processing tasks are done in the FC and there is no processing or compression before transmission. In the proposed algorithm, network is divided into clusters and data processing is done in two parts. The first part is performed in each cluster at the sensor nodes after local data sharing and the second part will be done at the Fusion Center after receiving all messages from clusters. Local data sharing results in more efficient data transmission in terms of number of bits. We also take advantage of having the same copy of data at all nodes of each cluster and suggest a virtual Multiple-Input Multiple-Output (V-MIMO) architecture for data transmission from clusters to the FC. A Virtual-MIMO network is a set of distributed nodes each having one antenna. By sharing their data among themselves, these nodes turn into a classical MIMO system. In the previously proposed cooperative/virtual MIMO architectures there has not been any data processing or compression in the conference phase. We modify the existing VMIMO algorithms to suit the specific class of sensor networks that is of our concern. We use orthogonal Space-Time Block Codes (STBC) for MIMO part and by simulation show that this algorithm saves considerable energy compared to classical systems.I. INTRODUCTIONA typical Wireless Sensor Network consists of a set of small, low-cost and energy-limited sensor nodes which are deployed in a field in order to observe a phenomenon and transmit it to a Fusion Center (FC). These sensors are deployed close to one another and their readings of the environment are highly correlated. Their objective is to report a descriptive behavior of the environment based on all measurements to the Fusion Center. This diversity in measurement lets the system become more reliable and robust against failure. In general, each node is equipped with a sensing device, a processor and a communication module (which can be either a transmitter or transmitter/receiver).Sensor nodes are equipped with batteries and are supposed to work for a long period of time without battery replacement. Thus, they are limited in energy and one of the most important issues in designing sensor networks will be the energy consumption of the sensor nodes. To deal with this problem, we might either reduce the number of bits to be transmitted by source compression or reduce the required power for transmission by applying advanced transmission techniques while satisfying certain performance requirement.A lot of research has been done in order to take advantage of the correlation among sensors’ data for reducing the number of bits to be transmitted. Some are based on distributed source coding[1]while others use decentralized estimation[2-5]. In [1], authors present an efficient algorithm that applies distributed compression based on Slepian – Wolf[14] encoding technique and use an adaptive signal processing algorithm to track correlation among sensors data. In [2-5] the problem of decentralized estimation in sensor networks has been studied under different constraints. In these algorithms, sensors perform a local quantization on their data considering that their observations are correlated with that of other sensors. They produce a binary message and send it to the FC. FC combines these messages based on the quantization rules used at the sensor nodes and estimates the unknown parameter. Optimal local quantization and final fusion rules are investigated in these works. The distribution of data assumed for sensor observation in these papers has Uniform probability distribution function. In our model we consider Gaussian distribution introduced in [17] for sensor measurements which ismore likely to reality.As an alternative approach, some works have been done using energy-efficient communication techniques such as cooperative/virtual Multiple-Input Multiple-Output (MIMO) transmission in sensor networks [6-11]. In these works, as each sensor is equipped with one antenna, nodes are able to form a virtual MIMO system by performing cooperation with others. In [6] the application of MIMO techniques in sensor networks based on Alamouti[15] space-time block codes was introduced. In [8,9] energy-efficiency of MIMO techniques has been explored analytically and in [7] a combination of distributed signal processing algorithm presented and in [1] cooperative MIMO was studied.In this paper, we consider both techniques of compression and cooperative transmission at the same time. We reduce energy consumption in two ways; 1) processing data in part at the transmitting side, which results in removing redundant information thus having fewer bits to be transmitted and 2) reducing required transmission energy by applying diversity and Space-Time coding. Both of these goals will be achieved by our proposed two-phase algorithm. In our model, the objective is to estimate the unknown parameter which is basically the average of all nodes’ measurements. That is, exact measurements of individual nodes are not important and it is not necessary to spend a lot of energy and bandwidth to transmit all measured data with high precision to the FC. We can move some part of data processing to the sensors side. This can be done by local data sharing among sensors. We divide the network into clusters of ‘m’ members. The number of members in the cluster (m) is both the compression factor in data processing and also the diversity order in virtual-MIMO architecture. The remaining of this paper is organized as following: in section II we introduce our system model and basic assumptions. In section III we propose our collaborative algorithm. In section IV we present the mathematical analysis of the proposed algorithm and in section V we give some numerical simulations. Finally section VI concludes the paper.II. SYSTEM MODELA. Network ModelThe network model that we use is similar to the one presented in [2-5].Our network consists of N distributed Sensor Nodes (SN) and a Fusion Center (FC). Sensors are deployed uniformly in the field, close to one another and each taking observations on an unknown parameter (θ). Fusion Center is located far from the nodes. All nodes observe same phenomenon but with different measurements. These nodes together with the Fusion Center are supposed to find the value of the unknown parameter. Nodes send binary messages to Fusion Center. FC will process the received messages and estimate the unknown value.B. Data ModelIn our formulation we use the data model introduced in[17]. We assume that all sensors observe the same phenomenon (θ) which has Gaussian distribution with variance σx 2. They observe different versions of θ and we model this difference as an additive zero mean Gaussian noisewith variance σn 2. Therefore, sensor observations will be described byn i i θx += (1) Where θ ~ N (0, σx 2) and n i ~ N (0, σn 2) for i = 1, 2, … , N .Based on thisassumption the value of θ can be estimated by taking the numerical average of the nodes observations, i.e.∑==N i i x N 11θ(2)C. Reference System ModelOur reference system consists of N conventional Single Input Single Output (SISO) wireless links, each connecting one of the sensor nodes to the FC. For the reference system we do not consider any communication or cooperation among the sensors. Therefore each sensor quantizes its observation by an L-bit scalar quantizer designed for distribution of θ, generates a message of length L and transmits it directly to the FC. Fusion Center receives all messages and performs the processing, which is calculation of the numerical average of these messages.III. COOPERATIVE DATA PROCESSING ALGORITHMSensor readings are analog quantities. Therefore, each sensor has to compress its data into several bits. For data compression we use L -bit scalar quantizer [12,13].In our algorithm, network is divided into clusters, each cluster having a fixed and pre-defined number of members (m). Members of each cluster are supposed to cooperate with one another in two ways:1. Share, Process and Compress their data2. Cooperatively transmit their processed data using virtual MIMO.IV. ANALYSISThe performance metric considered in our analysis is the total distortion due to compression and errors occurred during transmission. The first distortion is due to finite length quantizer, used in each sensor to represent the analog number by L bits. This distortion depends on the design of quantizer.We consider a Gaussian scalar quantizer which is designed over 105 randomly generated samples. The second distortion is due to errors occurred during transmission through the channel. In our system, this distortion is proportional to the probability of bit error. Since the probability of bit error (Pe) is a function of transmission energy per bit (Eb), total distortion will be a function of Eb. In this section we characterize the transmission and total consumed energy of sensors and find the relationship between distortion and probability of bit error.V. SIMULATION AND NUMERICAL RESULTS To give a numerical example, we assume m = 4 members in each cluster. Therefore our Virtual-MIMO scheme will consist of 4 transmit antennas. We assume that network has N = 32 sensors. Sensor observations are Gaussian with σx2= 1 and are added to a Gaussian noise of σn2= 0.1 .Nodes are deployed uniformly in the field and are 2 meters apart from each other and the Fusion Center is located 100 meters away from the center of the field. The values for circuit parameters are quoted from [6] and are listed in Table I. These parameters depend on the hardware design and technological advances. Fig. 1 illustrates the performance (Distortion) of reference system and proposed two-phase V-MIMO scheme versus transmission energy consumption in logarithmic scale. As shown in the figures, depending on how much precision is needed in the system, we can save energy by applying the proposed algorithm.TABLE IFig. 2 illustrates the Distortion versus total energy consumption of sensor nodes. That is, in this figure we consider both the transmission and circuit energy consumption. The parameters that lead us to these results may be designed to give better performance than presented here. However, from these figures we can conclude that the proposed algorithm outperforms the reference system when we want to have distortion less than 10−3 and it can save energy as high as 10 dB.VI. CONCLUSIONIn this paper we proposed a novel algorithm which takes advantage of cooperation among sensor nodes in two ways: it not only compresses the set of sensor messages at the sensor nodes into one message, appropriate for final estimation but also encodes them into orthogonal space-time symbols which are easy to decode and energy-efficient. This algorithm is able to save energy as high as 10 dB.REFERENCES[1] J.Chou,D.Petrovic and K.Ramchandran “A distributed and adaptive signalprocessing approach to reducing energy consumption in sensornetworks,”Proc. IEEE INFOCOM,March 2003.[2] Z.Q.Luo, “Universal decentralized estimation in a bandwidth constrainedsensor network,” IEEE rmation The ory, vol.51,no.6,June 2005.[3] Z.Q.Luo,“An Isotropic Universal decentralized estimation scheme for abandwidth constrained Ad Hoc sensor network,”IEEEm. vol.23,no. 4,April 2005.[4] Z.Q.Luo and J.-J. Xiao, “Decentralized estimation i n an inhomogeneoussensing environment,” IEEE Trans. Information Theory, vol.51, no.10,October 2005.[5] J.J.Xiao,S.Cui,Z.-Q.Luo and A.J.Goldsmith, “Joint estimation in sensornetworks under energy constraints,” Proc.IEEE First conference on Sensor and Ad Hoc Communications and Networks, (SECON 04),October 2004.[6] S.Cui, A.J.Goldsmith, and A.Bahai,“Energy-efficiency of MIMO andcooperative MIMO techniques in sensor networks,”IEEEm,vol.22, no.6pp.1089–1098,August 2004.[7] S.K.Jayawe era and M.L.Chebolu, “Virtual MIMO and distributed signalprocessing for sensor networks-An integrated approach”,Proc.IEEEInternational Conf. Comm.(ICC 05)May 2005.[8] S.K.Jayaweera,"Energy efficient virtual MIMO-based CooperativeCommunications for Wireless Sensor Networks",2nd International Conf. on Intelligent Sensing and Information Processing (ICISIP 05),January 2005.[9] S.K.Jayaweera,“Energy Analysis of MIMO Techniques in Wireless SensorNetworks”, 38th Annual Conference on Information Sciences and Systems (CISS 04),March 2004.[10] S.K.Jayaweera and M.L.Chebolu,“Virtual MIMO and Distributed SignalProcessing for Sensor Networks - An Integrated Approach”,IEEEInternational Conf.on Communications (ICC 05),May 2005.[11] S.K.Jayaweera,“An Energy-efficient Virtual MIMO CommunicationsArchitecture Based on V-BLAST Processing for Distributed WirelessSensor Networks”,1st IEEE International Conf.on Sensor and Ad-hocCommunications and Networks (SECON 2004), October 2004.[12] J.Max,“Quantizing for minimum distortion,” IRE rmationTheory,vol.IT-6, pp.7 – 12,March 1960.[13] S.P.Lloyd,“Least squares quantization in PCM ,”IEEE rmationTheory,vol.IT-28, pp.129-137,March 1982.[14] D.Slepian and J.K.Wolf “Noiseless encoding of correlated inf ormationsources,” IEEE Trans. on Information Theory,vol.19, pp.471-480,July1973.[15] S.M.Alamouti,“A simple transmit diversity technique for wirelesscommunications,” IEEE m., vol.16,no.8,pp.1451–1458,October 1998.[16] V.Tarokh,H.Jafarkhani,and A.R.Calderbank. “Space-time block codesfrom orthogonal designs,’’IEEE rmationTheory,vol.45,no.5,pp.1456 -1467,July 1999.[17] Y.Oohama,“The Rate-Distortion Function for the Quadratic GaussianCEO Problem,” IEEE Trans. Informatio nTheory,vol.44,pp.1057–1070,May 1998.。

毕业论文外文翻译范例

毕业论文外文翻译范例

外文原文(一)Savigny and his Anglo-American Disciple s*M. H. HoeflichFriedrich Carl von Savigny, nobleman, law reformer, champion of the revived German professoriate, and founder of the Historical School of jurisprudence, not only helped to revolutionize the study of law and legal institutions in Germany and in other civil law countries, but also exercised a profound influence on many of the most creative jurists and legal scholars in England and the United States. Nevertheless, tracing the influence of an individual is always a difficult task. It is especially difficult as regards Savigny and the approach to law and legal sources propounded by the Historical School. This difficulty arises, in part, because Savigny was not alone in adopting this approach. Hugo, for instance, espoused quite similar ideas in Germany; George Long echoed many of these concepts in England during the 1850s, and, of course, Sir Henry Sumner Maine also espoused many of these same concepts central to historical jurisprudence in England in the 1860s and 1870s. Thus, when one looks at the doctrinal writings of British and American jurists and legal scholars in the period before 1875, it is often impossible to say with any certainty that a particular idea which sounds very much the sort of thing that might, indeed, have been derived from Savigny's works, was, in fact, so derived. It is possible, nevertheless, to trace much of the influence of Savigny and his legal writings in the United States and in Great Britain during this period with some certainty because so great was his fame and so great was the respect accorded to his published work that explicit references to him and to his work abound in the doctrinal writing of this period, as well as in actual law cases in the courts. Thus, Max Gutzwiller, in his classic study Der einfluss Savignys auf die Entwicklung des International privatrechts, was able to show how Savigny's ideas on conflict of laws influenced such English and American scholars as Story, Phillimore, Burge, and Dicey. Similarly, Andreas Schwarz, in his "Einflusse Deutscher Zivilistik im Auslande," briefly sketched Savigny's influence upon John Austin, Frederick Pollock, and James Bryce. In this article I wish to examine Savigny's influence over a broader spectrum and to draw a picture of his general fame and reputation both in Britain and in the United States as the leading Romanist, legal historian, and German legal academic of his day. The picture of this Anglo-American respect accorded to Savigny and the historical school of jurisprudence which emerges from these sources is fascinating. It sheds light not only upon Savigny’s trans-channel, trans-Atlantic fame, but also upon the extraordinarily*M.H.Hoeflich, Savigny and his Anglo-American Disciples, American Journal of Comparative Law, vol.37, No.1, 1989.cosmopolitan outlook of many of the leading American and English jurists of the time. Of course, when one sets out to trace the influence of a particular individual and his work, it is necessary to demonstrate, if possible, precisely how knowledge of the man and his work was transmitted. In the case of Savigny and his work on Roman law and ideas of historical jurisprudence, there were three principal modes of transmission. First, there was the direct influence he exercised through his contacts with American lawyers and scholars. Second, there was the influence he exercised through his books. Third, there was the influence he exerted indirectly through intermediate scholars and their works. Let us examine each mode separately.I.INFLUENCE OF THE TRANSLATED WORKSWhile American and British interest in German legal scholarship was high in the antebellum period, the number of American and English jurists who could read German fluently was relatively low. Even those who borrowed from the Germans, for instance, Joseph Story, most often had to depend upon translations. It is thus quite important that Savigny’s works were amongst the most frequently translated into English, both in the United States and in Great Britain. His most influential early work, the Vom Beruf unserer Zeitfur Rechtsgeschichte und Gestzgebung, was translated into English by Abraham Hayward and published in London in 1831. Two years earlier the first volume of his History of Roman Law in the Middle Ages was translated by Cathcart and published in Edinburgh. In 1830, as well, a French translation was published at Paris. Sir Erskine Perry's translation of Savigny's Treatise on Possession was published in London in 1848. This was followed by Archibald Brown's epitome of the treatise on possession in 1872 and Rattigan's translation of the second volume of the System as Jural Relations or the Law of Persons in 1884. Guthrie published a translation of the seventh volume of the System as Private International Law at Edinburgh in 1869. Indeed, two English translations were even published in the far flung corners of the British Raj. A translation of the first volume of the System was published by William Holloway at Madras in 1867 and the volume on possession was translated by Kelleher and published at Calcutta in 1888. Thus, the determined English-speaking scholar had ample access to Savigny's works throughout the nineteenth century.Equally important for the dissemination of Savigny's ideas were those books and articles published in English that explained and analyzed his works. A number of these must have played an important role in this process. One of the earliest of these is John Reddie's Historical Notices of the Roman law and of the Progress of its Study in Germany, published at Edinburgh in 1826. Reddie was a noted Scots jurist and held the Gottingen J.U.D. The book, significantly, is dedicated to Gustav Hugo. It is of that genre known as an external history of Roman law-not so much a history of substantive Roman legal doctrine but rather a historyof Roman legal institutions and of the study of Roman law from antiquity through the nineteenth century. It is very much a polemic for the study of Roman law and for the Historical School. It imparts to the reader the excitement of Savigny and his followers about the study of law historically and it is clear that no reader of the work could possibly be left unmoved. It is, in short, the first work of public relations in English on behalf of Savigny and his ideas.Having mentioned Reddie's promotion of Savigny and the Historical School, it is important to understand the level of excitement with which things Roman and especially Roman law were greeted during this period. Many of the finest American jurists were attracted-to use Peter Stein's term-to Roman and Civil law, but attracted in a way that, at times, seems to have been more enthusiastic than intellectual. Similarly, Roman and Civil law excited much interest in Great Britain, as illustrated by the distinctly Roman influence to be found in the work of John Austin. The attraction of Roman and Civil law can be illustrated and best understood, perhaps, in the context of the publicity and excitement in the English-speaking world surrounding the discovery of the only complete manuscript of the classical Roman jurist Gaius' Institutes in Italy in 1816 by the ancient historian and German consul at Rome, B.G. Niebuhr. Niebuhr, the greatest ancient historian of his time, turned to Savigny for help with the Gaius manuscript (indeed, it was Savigny who recognized the manuscript for what it was) and, almost immediately, the books and journals-not just law journals by any means-were filled with accounts of the discovery, its importance to legal historical studies, and, of course, what it said. For instance, the second volume of the American Jurist contains a long article on the civil law by the scholarly Boston lawyer and classicist, John Pickering. The first quarter of the article is a gushing account of the discovery and first publication of the Gaius manuscript and a paean to Niebuhr and Savigny for their role in this. Similarly, in an article published in the London Law Magazine in 1829 on the civil law, the author contemptuously refers to a certain professor who continued to tell his students that the text of Gaius' Institutes was lost for all time. What could better show his ignorance of all things legal and literary than to be unaware of Niebuhr's great discovery?Another example of this reaction to the discovery of the Gaius palimpsest is to be found in David Irving's Introduction to the Study of the Civil Law. This volume is also more a history of Roman legal scholarship and sources than a study of substantive Roman law. Its pages are filled with references to Savigny's Geschichte and its approach clearly reflects the influence of the Historical School. Indeed, Irving speaks of Savigny's work as "one of the most remarkable productions of the age." He must have been truly impressed with German scholarship and must also have been able to convince the Faculty of Advocates, forwhom he was librarian, of the worth of German scholarship, for in 1820 the Faculty sent him to Gottingen so that he might study their law libraries. Irving devotes several pages of his elementary textbook on Roman law to the praise of the "remarkable" discovery of the Gaius palimpsest. He traces the discovery of the text by Niebuhr and Savigny in language that would have befitted an adventure tale. He elaborates on the various labors required to produce a new edition of the text and was particularly impressed by the use of a then new chemical process to make the under text of the palimpsest visible. He speaks of the reception of the new text as being greeted with "ardor and exultation" strong words for those who spend their lives amidst the "musty tomes" of the Roman law.This excitement over the Verona Gaius is really rather strange. Much of the substance of the Gaius text was already known to legal historians and civil lawyers from its incorporation into Justinian's Institutes and so, from a substantive legal perspective, the find was not crucial. The Gaius did provide new information on Roman procedural rules and it did also provide additional information for those scholars attempting to reconstruct pre-Justinianic Roman law. Nevertheless, these contributions alone seem hardly able to justify the excitement the discovery caused. Instead, I think that the Verona Gaius discovery simply hit a chord in the literary and legal community much the same as did the discovery of the Rosetta Stone or of Schliemann’s Troy. Here was a monument of a great civilization brought newly to light and able to be read for the first time in millenia. And just as the Rosetta Stone helped to establish the modern discipline of Egyptology and Schliemann's discoveries assured the development of classical archaeology as a modern academic discipline, the discovery of the Verona Gaius added to the attraction Roman law held for scholars and for lawyers, even amongst those who were not Romanists by profession. Ancillary to this, the discovery and publication of the Gaius manuscript also added to the fame of the two principals involved in the discovery, Niebuhr and Savigny. What this meant in the English-speaking world is that even those who could not or did not wish to read Savigny's technical works knew of him as one of the discoverers of the Gaius text. This fame itself may well have helped in spreading Savigny's legal and philosophical ideas, for, I would suggest, the Gaius "connection" may well have disposed people to read other of Savigny's writings, unconnected to the Gaius, because they were already familiar with his name.Another example of an English-speaking promoter of Savigny is Luther Stearns Cushing, a noted Boston lawyer who lectured on Roman law at the Harvard Law School in 1848-49 and again in 1851- 1852.Cushing published his lectures at Boston in 1854 under the title An Introduction to the Study of Roman Law. He devoted a full chapter to a description of the historical school and to the controversy betweenSavigny and Thibaut over codification. While Cushing attempted to portray fairly the arguments of both sides, he left no doubt as to his preference for Savigny's approach:The labors of the historical school have established an entirely new and distinct era in the study of the Roman jurisprudence; and though these writers cannot be said to have thrown their predecessors into the shade, it seems to be generally admitted, that almost every branch of the Roman law has received some important modification at their hands, and that a knowledge of their writings, to some extent, at least, is essentially necessary to its acquisition.译文(一)萨维尼和他的英美信徒们*M·H·豪弗里奇弗雷德里奇·卡尔·冯·萨维尼出身贵族,是一位出色的法律改革家,也是一位倡导重建德国教授协会的拥护者,还是历史法学派的创建人之一。

论文书写格式 完整的外文翻译

论文书写格式  完整的外文翻译

纳米碳酸钙(CaCO3)/聚甲基丙烯酸甲酯(PMMA)纳米核壳粒子增强聚丙烯(PP)复合材料的流变性、热性能和机械性能姓名:金永伟学号:2011016023学院:材料学院班级:高分子112班指导教师:刘喜军教授纳米碳酸钙(CaCO3)/聚甲基丙烯酸甲酯(PMMA)纳米核壳粒子增强聚丙烯(PP)复合材料的流变性、热性能和机械性能Aniruddha Chatterjee , Satyendra Mishra*化学技术部,北马哈拉施特邦大学,加尔冈-425001,北马哈拉斯特拉邦,印度接受日期:2011,11,29;修改日期:2012,06,12;录搞日期:2012,06,12(高分子研究. 2013, 21 (5): 474-483.)摘要:采用雾化微乳液法成功制备10~100nm范围的纳米碳酸钙(纳米-CaCO3)/聚甲基丙烯酸甲酯(PMMA)纳米核壳粒子。

聚合物以乙烯基三乙氧基硅烷作为偶联剂接枝到纳米-CaCO3表面,通过透射电子显微镜(TEM)、傅里叶红外变换光谱(FTIR)和X-射线衍射证实了纳米-CaCO3包裹了PMMA,表明纳米-CaCO3粒子与PMMA存在良好的相互作用,这意味着聚合物通过偶联剂的连接成功接枝到纳米-CaCO3表面。

不同含量(0.1-1%)的纳米-CaCO3/PMMA通过布拉本德粘土塑性测定仪与聚丙烯混合。

纳米-CaCO3接枝PMMA的明显提高了纳米-CaCO3在PP基体中的分散性,提高了(纳米-CaCO3/PMMA)/PP复合物的热性能、流变性和机械性能。

扫描电子显微镜(SEM)和原子力显微镜(AFM)显示,纳米-CaCO3粒子通过PMMA壳在PP基体中分散性良好。

关键词:核壳纳米粒子,雾化微乳液,聚丙烯(PP),热性能,流变性能,机械性能前言核/壳纳米结构材料是由核结构和壳层组成[1],它可能各种材料形成,包括聚合物、无机固体和金属[2,3]。

这些材料被广泛应用到这些领域,即绘画[4,5]、化妆品[6-8]、涂料[5,9]、胶黏剂[10]、电子工业[11]、橡胶/塑料增强剂[12]和生物化学[13],因为这些材料的综合性能要比对应的单一成份好[14]。

外文翻译格式范例

外文翻译格式范例
共9 页 第 2 页
由于这种类型的脆弱性所造成的损害,可以很深刻的,尽管这会取决于该应用软 件与数据库关联的特权级别。如果该软件以管理者类型权限访问数据,然后恶意 运行命令也会是这一级别的访问权限,此时系统妥协是不可避免的。还有这个问 题类似于操作系统的安全规则,在那里,项目应该以最低的权限运行,而且这是 必要的。如果是正常的用户访问,然后启用这个限制。 同样的问题,SQL 的安全也不完全是一个数据库的问题。特定的数据库命令或 要求,不应该允许通过应用层。这是可以通过"安全码"的方式加以预防的。这是 一个场外话题,但应该被应用的一些基本步骤的详细设计是有必要的。 第一步,在获取任何申请时须验证和控制用户输入。可能的情况下,严格的 类型应被设定以控制具体数据(例如,期望得到数值数据,字符串类型数据等), 并在可能实现的情况下,如果数据是以字符型为基础的,需要禁止特定的非字母 数字字符。如果这是不能实现的,应该做出争取使用替代字符的考虑(例如,使 用单引号,这在 SQL 命令中时通常被使用的)。 在使用您的组织时具体的与安全有关的编码技术应加入编码标准。如果所有 开发商都使用相同的基线标准,特定具体的安全措施,这将大大减少 SQL 注入妥 协的风险。 能够使用的另一种简单的方法,是清除数据库中不再需要的所有程序。这些 限制了数据库中不再需要的或者多于过剩的被恶意利用的程度。这类似于消除操 作系统内不需要的服务程序,是一种常见的安全实践。

Common sense security
Before we discuss the issues relating to database security it is prudent to high- light the
译文标题 原文标题 作 者

外文翻译模板

外文翻译模板

外文翻译模板(总12页)--本页仅作为文档封面,使用时请直接删除即可----内页可以根据需求调整合适字体及大小--杭州电子科技大学毕业论文外文文献翻译要求根据《普通高等学校本科毕业设计(论文)指导》的内容,特对外文文献翻译提出以下要求:一、翻译的外文文献可以是一篇,也可以是两篇,但总字符要求不少于万(或翻译成中文后至少在3000字以上)。

二、翻译的外文文献应主要选自学术期刊、学术会议的文章、有关着作及其他相关材料,应与毕业论文(设计)主题相关,并作为外文参考文献列入毕业论文(设计)的参考文献。

并在每篇中文译文标题尾部用“脚注”形式注明原文作者及出处,中文译文后应附外文原文(全文,格式为word)。

不能翻译中国学者的文章,不能翻译准则等有译文的着作。

三、中文译文的基本撰写格式1.题目:采用小三号、黑体字、居中打印;段前二行,段后二行。

2.正文:采用小四号、宋体字,行间距一般为固定值20磅,标准字符间距。

页边距为左3cm,右,上下各,页面统一采用A4纸。

四、外文原文格式1.题目:采用小三号、Times New Roman、居中打印;段前二行,段后二行。

2.正文:采用小四号、Times New Roman,行间距一般为固定值20磅,标准字符间距。

页边距为左3cm,右,上下各,页面统一采用A4纸。

五、封面格式由学校统一制作(注:封面上的“翻译题目”指中文译文的题目),并按“封面、封面、译文、外文原文、考核表”的顺序统一装订。

毕业论文外文文献翻译毕业论文题目Xxx翻译题目指翻译后的中文译文的题目学院会计学院(以本模板为准)专业XXXXXX(以本模板为准)姓名XXXXXX(以本模板为准)班级XXXXXX(以本模板为准)学号XXXXXX(以本模板为准)指导教师XXXXXX(以本模板为准)译文管理者过度乐观与债务、股权融资之间的选择1本文采取了一家成长较快速的公司作为样本,比较债务融资和股权融资后的长期股票业绩。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

毕业设计外文资料翻译学院:信息科学与工程学院专业:电子科学与技术*名:***学号:040704128外文出处:填入英文资料名称(用外文写)指导教师评语:签名:年月日附件1:外文资料翻译译文UART的核核的概况带有Avalon接口的通用异步接收/发送器的核(UART的核)所执行的方式是为了沟通一个系统内置的Altera FPGA和外部设备之间的串行字符流。

核实行RS-232协议计时,并提供可调波特率,奇偶,停止和数据位,以及可选RTS/CTS的流量控制信号。

它的功能设置是可配置的,对于给定的系统,它允许设计者实现必要的功能。

核提供了一个简单的寄存器映射的Avalon存储器映射(Avalon-MM)的从属接口,使Avalon-MM的主控外设(如一个NiosII处理器)通过读和写控制寄存器和数据寄存器来简单的与核沟通。

该UART的核是SOPC Builder-ready,并且可以轻松的集成到任何SOPC Builder产生的系统中,本章包含以下章节:■“功能描述”见8-2页■“设备和工具支持”见8-4页■“在SOPC Builder中对核实例化”见8-4页■“硬件仿真考虑”见8-9页■“软件编程模型”见8-9页1. 功能描述图1 展示了UART核的分块表核有两个用户可见部分:■寄存器文件,它通过Avalon-MM从属端口来存取■RS-232的信号,RXD,TXD,CTS和RTS1.1 Avalon-MM从属接口和寄存器该UART的核提供了一个Avalon-MM从属接口到内部寄存器文件。

连接用户接口包含6个16位的寄存器:控制,状态,rxdata,txdata,除数,endofpacket。

一个主控外设,如一个NiosII处理器,可以使寄存器通过串行连接来控制核和传输数据。

该UART的核提供了一个活跃的中断请求(IRQ)输出,当新的数据已收到或当核心准备传输另一字符时,可以要求一个中断,进一步的细节见8-20页“中断行为”。

Avalon-MM从属端口有能力随流量控制来转移。

该UART的核可用于连接直接存储器(DMA)外设与Avalon-MM流量控制来使连续数据传输自动化。

比如,UART的核和存储器之间。

见“计时器核心”篇章细节。

见“Avalon存储器映射接口规格”内容来了解Avalon-MM接口细节。

1.2RS-232接口该UART的核实现了RS-232的异步传输和接收逻辑。

该UART的核通过TXD和RXD端口发送和接收串行数据。

大多数Altera的FPGA系列产品的输入/输出缓冲不符合RS-232的电压水平,如果由一个RS-232连接器的信号来直接驱动,将有可能受到损害。

为了遵守RS-232的电压信号规格,在FPGA的I/O引脚与外部RS-232连接器之间需要一个外部电平移动式缓冲(例如Maxim Max3237)。

该UART的核使用逻辑0为标志,逻辑1为空间0。

必要的话,FPGA里面的逆变器可以用来扭转任何RS-232信号的极性。

1.3发射器的逻辑该UART的发射器包含一个7位,8位或9位的txdata控制寄存器和一个相应的7位,8位或9位的发射移位寄存器。

Avalon-MM主控外设通过Avalon-MM从属端口来写入txdata控制寄存器。

当一个串行发射移位操作当前没有进展时,发射移位寄存器自动从txdata寄存器上载入。

发射移位寄存器直接提供TXD输出。

数据以最低有效位元(LSB)开头,转移出TXD脚发送。

这两个寄存器提供双重缓冲,当先前被写入的字符转移出时,一个主控外设可以将一个新的数值写入txdata寄存器。

该主控外设可以通过读状态寄存器的准备信号(trdy),发射器移位寄存器(tmt)以及发射器超支误差(toe)位来监测发射器状态。

发射器逻辑自动插入RS-232的规格要求的串行TXD数据流中开始,停止和奇偶位的正确数目。

1.4接收器的逻辑该UART的接收器包括一个7位,8位,或9位接收器移位寄存器和相应7位,8位或9位rxdata控制寄存器。

Avalon-MM主控外设通过Avalon-MM从属端口来读rxdata 控制寄存器。

每次新的字符完全被收到时,rxdata控制寄存器将自动从接收移位寄存器载入。

这两个寄存器提供双重缓冲。

当随后的字符被转移到接收移位寄存器后,rxdata寄存器可以保持先前收到的字符。

主控外设通过读状态寄存器的读就绪(rrdy),接收器超时误差(roe),间隔检测(brk),奇偶误差率(pe),以及帧误差(fe)位可以监测接收器的状态。

接收器逻辑自动检测RS-232的规格要求的串行RXD数据流中开始,停止和奇偶位的正确数目。

在接收的数据中,接受器逻辑检查四个特殊状态(帧误差,奇偶误差,接受超时误差,间隔),并设置相应的状态寄存器位(fe,pe,roe,brk)。

1.5波特率的产生该UART核的内部波特率时钟是来自Avalon-MM时钟输入。

内部波特率时钟是由一个时钟分频器产生的。

该除数值可以来自下列情形之一:■恒定值指定在系统生成时间■16位值存放在除数寄存器该除数寄存器是一个可选的硬件功能。

如果在系统生成时间它不生效,那么除数值固定,波特率不能改变。

2. 设备和工具支持该UART的核能够针对所有Altera的FPGA产品。

3. 在SOPC Builder中对核实例化在硬件中对UART实例化为每个UART的核制造了至少有两个输入/输出端口:一个RXD输入,一个TXD输出。

硬件可能包括流量控制信号,CTS输入和RTS输出,这是可选的。

设计者用MegaWizard接口在SOPC Builder为UART的核配置了硬件功能集合。

以下各节描述可行的选择。

3.1配置设置本节叙述配置设置。

3.1.1波特率选择该UART的核能执行对于RS-232连接的任何标准的传输速率。

波特率可被两种方式之一配置:■固定率:波特率固定在系统生成时间,且不能通过Avalon-MM从属端口改变。

■可变率:基于除数寄存器中保持的时钟分频器值,波特率可变。

主控外设通过向除数寄存器中写入新值来改变波特率。

波特率是基于Avalon-MM接口提供的时钟频率计算出来的。

在没有再生成的UART 的核硬件情况下改变系统时钟频率将会导致不正确信号。

波特率(位)的设置复位后波特率的设置决定了默认的波特率。

该波特率选项提供了标准的预设值(例如,9600、57600、115200bps),或者你可以手动输入任何波特率。

波特率值用来计算一个合适的时钟除数值以落实所期望的波特率。

波特率和除数值的关系如下:除数=int((时钟频率)/(波特率)+0.5)波特率=(时钟频率)/(除数+1)波特率可以通过软件设置来改变。

当设置开启时,硬件包含一个16位除数寄存器,并且地址偏移为4。

因为除数寄存器是可写的,所以波特率可以通过向该寄存器写入一个新值来改变。

当设置关闭时,UART的硬件不包含除数寄存器。

UART硬件实行一个常数(不可改变)波特率除数,并且系统产生后,值不可改变。

在这种情况下,写入地址偏移4已无效。

从地址偏移4读入产生了一个未定的结果。

3.1.2数据位,停止位,奇偶校验位该UART核的奇偶位,数据位和停止位是可配置的。

这些设置固定在系统生成的时候,它们不能通过寄存器文件改变。

以下是可行的设置:数据位设置见表1。

表1 数据位设置奇偶设置当奇偶设置为无,传输逻辑传送数据,而无需包括一个校验位,并且接收逻辑假定传入数据不包括校验位。

当奇偶为无时,状态寄存器的pe(奇偶误差)位是无效的,总是为0。

当奇偶设置为奇数或偶数时,传输逻辑计算并插入所需的校验位到离开的TXD脚发送码流,并接收逻辑检查到来的RXD码流中的校验位。

如果接收器认定数据的奇偶位不正确,状态寄存器的奇偶误差设置为1。

当奇偶设置是偶数时,如果一个字符中含“1”的个数为偶数,那么奇偶位是0。

否则奇偶位为1。

同样的,当奇偶是奇数,如果一个字符中含“1”的个数为奇数,那么奇偶位为0。

3.1.3 流量控制以下是可用的流量控制方案。

包括CTS/RTS的引脚与控制寄存器位。

当此设置开启时,UART的硬件包括:■CTS_N(逻辑负CTS)输入端口■RTS_N(逻辑负RTS)输出端口■状态寄存器中的CTS位■状态寄存器中的DCTS位■控制寄存器中的RTS位■控制寄存器中的IDCTS位基于这些硬件设施,Avalon-MM主控外设可检测CTS和传送RTS流量控制信号。

CTS输入和RTS输出端口直接同状态和控制寄存器的位相连,并没有直接影响到核的其它任何部分。

当包括CTS/RTS的引脚和控制寄存器位设置处于关闭状态时,核并不包括上面所列的硬件。

控制/状态位CTS,DCTS,IDCTS和RTS将无效,它们总是为0。

3.1.4Avalon-MM随着流量控制的转移(DMA)该UART核的Avalon-MM接口有选择的使Avalon-MM随流量控制转移。

这就允许一个Avalon-MM主控外设只在UART核心准备接收另一个字符时写数据和只在核心有可用数据时读数据。

该UART核还可以有选择的包括endofpacket寄存器。

包括end-of-packet寄存器当此设置开启时,UART的核包括:■一个7位,8位或9位endofpacket寄存器地址偏移量为5。

数据宽度由数据位的设置决定。

■状态寄存器中的eop位■控制寄存器中的ieop位■Avalon-MM接口中的endofpacket信号,来支持数据随流量控制转移到系统中其他主控外设或从系统中其他主要外设转移出。

endofpacket(EOP)检测允许UART的核终止与Avalon-MM主控外设随着流量控制的数据交易。

EOP检测可以用一个DMA控制器。

比如,使一个UART自动将收到的字符写入存储器,直到到来的RXD流中遇到一个指定的字。

这个终止字符的值取决于endofpacket寄存器。

当endofpacket寄存器不能正常工作时,UART的核心将不包括上列的来源。

向endofpacket寄存器写入是无效的,读入则产生一个未定值。

3.2仿真设置当UART的核的逻辑生成,仿真模型也会产生。

仿真模型提供的功能可以简化和加快使用UART核的仿真系统仿真设置的变化,从而不能影响硬件中UART的核的行为。

这些设置只是影响功能仿真。

比如,如何使用下列设置模拟NiosII系统,它涉及到AN351:模拟NiosII嵌入式处理器设计。

3.2.1模拟rxd输入字符流您可以输入字符流,只要模拟系统复位,它将会到达RXD端口被模拟。

该UART 核的MegaWizard接口接收一个任意字符串,它后来被合并到UART仿真模型中。

复位端复位后,随着核能够接收新的数据,字符串会逐字的输入到RXD端口。

3.2.2编写互动窗口在系统生成的时候,UART的核发生器可以产生ModelSim宏。

相关文档
最新文档