网络方面的英文文献
网络方面的英文文献
![网络方面的英文文献](https://img.taocdn.com/s3/m/155db01e6c175f0e7cd137da.png)
在IEEE通信学会的主题专家的方向在IEEE ICC这全文论文同行评审的出版2009程序敏感数据要求:做网站询问是否正确?克雷格A.树和Minaxi古普塔计算机科学系印第安纳大学{cshue,minaxi}@摘要:为了确保敏感的Web内容的安全性,一个组织必须使用TLS以确保这样做正确。
然而,很少有人知道如何使TLS实际使用在网站上。
在这项工作中,我们进行大规模的网络范围内的测量,以确定如果网站需要使用TLS的时候,当他们这样做,确保他们使用它正确。
我们发现,其中TLS几十万页要么不使用要么使用不当,将会使敏感数据处于危险之中。
引言该网站提供了电子商务前所未有的机遇。
此类交易的安全性是一般通过使用传输层安全提供性(TLS)协议[1],在标准跟踪安全的后继套接字层(SSL)协议。
TLS允许客户端验证他们访问和服务器的真实性保证在客户端之间的通信的保密性和服务器安全。
虽然以前的工作分析TLS证书和该协议本身,很少的工作重点在其网站上使用。
本文由愿望所驱使,了解TLS是怎么在今天的网络上被使用的。
Web内容的很大一部分是公开可用的,并且不要求保密性。
在很多情况下,如阅读新闻的文章或使用搜索发动机,TLS保护的好处不超过性能开销与该协议有关。
在其他情况下,敏感信息被发送并应通过TLS进行保护。
然而,仅仅使用TLS不够了;它仍然必须正确使用。
调查TLS使用在网络上,我们提出两个主要问题:是否有在网络上的网站,不使用TLS时,他们应注意什么?做到这一点使用TLS这样做正确的网站?动力对于第一个问题是敏感信息可能通过窃听者很容易被截获,除非使用TLS。
第二个问题是通过观察,TLS动机保护必须从Web服务器发送一个表格前到客户端。
否则,将含有一个表格页可以被攻击者改变,允许敏感截取数据。
几大机构,包括,,或,建立了TLS客户端后,保护已下载的网页,但在此之前提交表单数据。
这种做法,被称为安全的岗位,是通常由具有高体积的组织用户流量从未签署到页面上的表单。
参考文献中文的英文对照
![参考文献中文的英文对照](https://img.taocdn.com/s3/m/e4ac9032fbd6195f312b3169a45177232f60e4d8.png)
参考文献中文的英文对照在学术论文中,参考文献是非常重要的一部分,它可以为论文的可信度和学术性增添分数,其中包括中文和英文文献。
以下是一些常见的参考文献中文和英文对照:1. 书籍 Book中文:王小明. 计算机网络技术. 北京:清华大学出版社,2018.英文:Wang, X. Computer Network Technology. Beijing: Tsinghua University Press, 2018.2. 学术期刊 Article in Academic Journal中文:张婷婷,李伟. 基于深度学习的影像分割方法. 计算机科学与探索,2019,13(1):61-67.英文:Zhang, T. T., Li, W. Image Segmentation Method Based on Deep Learning. Computer Science and Exploration, 2019, 13(1): 61-67.3. 会议论文 Conference Paper中文:王维,李丽. 基于云计算的智慧物流管理系统设计. 2019年国际物流与采购会议论文集,2019:112-117.英文:Wang, W., Li, L. Design of Smart Logistics Management System Based on Cloud Computing. Proceedings of the 2019 International Conference on Logistics and Procurement, 2019: 112-117.4. 学位论文 Thesis/Dissertation中文:李晓华. 基于模糊神经网络的水质评价模型研究. 博士学位论文,长春:吉林大学,2018.英文:Li, X. H. Research on Water Quality Evaluation Model Based on Fuzzy Neural Network. Doctoral Dissertation, Changchun: Jilin University, 2018.5. 报告 Report中文:国家统计局. 2019年国民经济和社会发展统计公报. 北京:中国统计出版社,2019.英文:National Bureau of Statistics. Statistical Communique of the People's Republic of China on the 2019 National Economic and Social Development. Beijing: China Statistics Press, 2019.以上是一些常见的参考文献中文和英文对照,希望对大家写作有所帮助。
免费的英文文献资料网站
![免费的英文文献资料网站](https://img.taocdn.com/s3/m/4272e47827284b73f2425065.png)
有用的英文文献资料网站1.Nova Southeastern University(高权限)入口:ID:hpdlibrary PW:library资源列表:ACP Medicine (2006)AHFS Drug Information? (2006)Basic and Clinical Pharmacology - 9th Ed. (2004)Current Diagnosis & Treatment in Orthopedics - 4th Ed. (2006)Current Medical Diagnosis & Treatment - 45th Ed. (2006)Current Obstetric & Gynecologic Diagnosis & Treatment - 9th Ed. (2003) Delmar's Fundamental & Advanced Nursing Skills - 2nd Ed. (2004) Geriatric Medicine: An Evidence Based Approach - 4th Ed. (2003) Griffith's 5-Minute Clinical Consult - 14th Ed. (2006)Merck Manual - 17th Ed. (1999) Centennial EditionRudolph's Pediatrics - 21st Ed. (2003)Schwartz's Principles of Surgery - 8th Ed. (2005)Smith's General Urology - 16th Ed. (2004)USP DI? Drug Info. for the Health Care Pro. - 26th Ed. (2006)Williams Obstetrics - 22nd Ed. (2005)还有一些免费外文文献网站。
网络营销策略分析外文翻译文献
![网络营销策略分析外文翻译文献](https://img.taocdn.com/s3/m/171e89010b4e767f5acfce6e.png)
网络营销策略分析外文翻译文献(文档含中英文对照即英文原文和中文翻译)Network marketing strategy analysis of VANCLAbstract:21 century is the information century, the development of science technology, economic and social is to meet the coming of age. The network marketing is also the Internet for media, to implement marketing campaigns in the new ways, method and idea, more effective individual and organization the realization of the trading activities. Enterprise how to develop the network marketing in such a huge market potential, occupation in emerging markets, to the enterprise both opportunities and challenges. The network marketing is also produced in the change of the values of consumers: meet the needs of the consumers, is the enterprise manages the core of the eternal. Using network of this high- technology to provide consumers with various types of service, is a important way of future competition advantage.V ANCL makes a huge success by the network marketing, and becomes a Chinese clothing network marketing market leader in the short term. Based on the network marketing way as the foundation, reading V ANCL marketing strategy.Key words:Network marketing Marketing strategy V ANCLThe network marketing as a new marketing concept and marketing mode in a digital economy times, even if the enterprise opened up more broad market, and can lead and reforming the traditional marketing. The network marketing compared with the traditional marketing has the personality, interactive, economy, efficiency and obvious advantages, if V ANCL want to market in big foothold, it must learn to use the new marketing method, the most suitable for enterprise of the integration of traditional and modern marketing method.1、The marketing situation of V ANCLWith the development of the Internet, e-commerce enterprises emerging batches. The e-commerce market in other properties, once created "clothing direct sales model" the myth of a brief period of prosperity in PPG after into decline. And take thesame pattern that honesty-this is established for just two years of electronic business enterprise in the short term but has remarkable success. Why the brand whose name sounds like a lot"western style"can stand firm in the waters of the electronic commerce is owe to the network marketing .At present ,V ANCL already expands and covers to men's clothing, women's, shoes, accessories, household six big kinds, with the deep of all kinds of goods, it will become the first choice of Internet clothing buyers. V ANCL as just a new company less than two years operation, is rooted in the Internet service brand.V ANCL already cooperates with Spain, Switzerland, the United Kingdom, France, Canada, Germany, Japan, South Korea and other countries of line designers, this enterprise is relying on the Internet around the world first-class brand power integration of designer resources. From knowing less about the garment industry into konwing a lot, Chen Nian has become the senior personage, the standard of the IT expert begins to study fashion brand, and return to a clothing brand positioning, makes every guest brand visibility and reputation by the traditional clothing brand shaping path,.2、The network marketing ways of V ANCL(1)Search engine optimizationSearch engine optimization, hereinafter referred to as SEO, is through the website structure (internal links structure, physical structure, web site logic structure), high quality website the subject content, the rich and the correlation of value optimization and external links to web site to users and search engine more friendly to get at the engine advantage for website ranking into traffic. Every guest use baidu and Google, Soso and sogou search engine optimization, attract the part of the network that are not familiar with the population want to get the information in the purchase and the query of the product or want to buy the brand of want to buy, or to have a preliminary impression that the guest, or related to click, thus increasing traffic and sales of all the guest.(2)Search engine advertisingSearch engine advertising refers to the use of the search engine, classification,search for information online catalogue with function of the network tools for network expansion of method, flow out an advertising model by strong search engine, and as long as to competitive rankings and keyword advertising give priority to tone at present. Search engine advertising forms include based on search engine based on classification method and the method of directory. Search engine based on methods including keyword advertising, competitive rankings, fixed rankings, based on the content location of advertising, and a variety of forms, and based on the method of classification catalogues are mainly in the category of priority in the appropriate category website display. V ANCL A in baidu, Google, sogou search engines such as do in advertising, increased the potential customers for impression times and increased clicks, easier to customers buy all the guest products.(3)E-mail marketingE-mail marketing is the way to subscribe to the industry and products information through the email way to provide the users need to establish and users of the relationship between trust and trust. E-mail marketing has three basic factors: user license, electronic mail delivery information, information of value to the users. V ANCL via E-mail activities or convey product promotion or sells products information to users all the latest information communicate guest, the user will be according to their own product of interest to click on words or images, increase hits, it also increases the user to the attention of all the guest to some extent, also increase the purchase of the users(4)Virus marketing.Virus marketing is not use virus or rogue plug-ins to promote ways of marketing, but rather through a set of effective and reasonable integral system and stimulate active users to guide publicity, is built on the benefit users on the foundation of the marketing model. For example, every guest experience in the marketing activity to give users the experience will make the users satisfacted to others spread good image of the brand or product, cause public effects. And cause Internet industry wide attention is realized that the guest in China Internet first virus marketing, its main virus marketing example is that the popularity of the object. V ANCL uses WangLuodan and Han Han for outdoor advertising and the representative of video advertising by "love love love XX, XX XX love, love XX XX, I am not XX, I'm XX" advertising copywriter pattern, its headline font with Microsoft LOGO, black, describe the part USES a bold and then use the above model has strong grassroots fundamental key and easy to copy, imitate the AD copy font mode is called Vanclize. This virus marketing of V ANCL essence to a proverb “Many t hings grow in the garden that were never sown there ”, so-called " Vanclize " originally from former ogilvy creative director. The distant partners in the hand of QiuXinYu advertising, via the Internet after Internet users after PS widely spread, the net friend of widespread and the Internet. Virus marketing remarkable characteristics is active spreading brand or product customer information. Every object because simple style bright and clear, easy to PS, so the net friend copying its, mode for sentence transformation, and then spread, to a certain extent, to V ANCL this brand publicity.(5)Micro Po marketingThe Po marketing is to point to in the Po such a role in the user of the relationship between share information and communication and access platform of the marketing activities, mainly including release the activities of enterprises information, fans interaction, etc. The Po marketing and activity marketing, advertising, implantable customer service new platform, brand marketing linked together, September 3, 2009, sina micro blog "V ANCL fans" officially established. V ANCL use its official sina micro bo "V ANCL fans" release V ANCL and V ANCL member or the Po fans interactive activities information, forward fans put on every guest clothing display figure, release all the activities of the information and guest enterprise issued by all the members in the activities of the guest enterprise information and to make every guest house, show every guest fashion, every object such as topic marketing, and every guest fans constantly forwarding official micro bo's information to improve the every guest exposure, and shaping the every guest brand image of close to people.3、The network marketing strategy of V ANCL(1)Product strategyThe product of V ANCL is leading project by the famous designer, top the essenceof classical style of men's clothing brand, reference Asian man’ bodily form feature at the same time, select fabric dyed close-fitting production, as users enjoy luxury quality by medium price, advocate contracted, depth, comfortable, environmental protection. Simple desgin, coloring prudent style, the design concept induction from Italy, remove unnecessary decoration, emphasize the performance of heavy and complicated comfort and grace.Any products, only suitable for target consumption group needs, likes or dislikes products that may reach a good sales results. And V ANCL since will consumer orientation in 25-35 phase of the user group, so the product quality or from either from the design style is also should adapt to their spending habits. Relative to the PPG consumer groups, V ANCL in the face of some consumer groups more mature. They don't pay attention to flowery, bright, smart, fancy style, but pay more attention to quality, taste, practical and comfortable. Therefore, and the pursuit of the corresponding product positioning and design, it should be for all mankind sincere product the designers of the center of gravity of the work.(2)Price strategyAt the present V ANCL’ price is accepted by general man, besides it l aunched many favourable activity, so long as you often skim through V ANCL website any time you freed,you can get unexpected harvest, so its favourable activity will make your online purchasing car full at the same time, your wallet aren’t reduce much.V ANCL has been carried out low price strategy, such as a common advertisement-- the experience of "199 yuan four shirt", It’s very important for V ANCL to expand market share and seize the market, the whole strategy of V ANCL is to low price, high quality rapidly occupation market share first, although rolled out by this price, V ANCL isn’t loss money.But at that price in the market introduction is very low, and most of the space to consumer interests, the purpose of V ANCL is to expand the market, let consumers purchase experience, this is your data came into their database, every guest to take QQ, email, etc way to you an additional other products.(2)Channel strategyIn the diversification of Chinese clothing brand, most of the clothing is achoice of the traditional sales channel, looking for distributors, means the joining trader, but V ANCL have seen there are too many not controlling rely on of the traditional channels, so that those guests were established at the beginning of a high-level decided to use the network direct sales model.The network marketing of the realization of the purchase and trading information process and its physical process of separation is. This information process contain many reflect both trade credit information and the ability of market mechanism of the identity of business rules information, and the physical process is the product quality, efficient and transport service system to ensure that, so the network marketing operation needs to mature market mechanism, credit service system, logistics and distribution system for the foundation.4、conclusionThere are many available Internet marketing tools used by enterprises, for instance release information in the news, and using specific events to attract visitors, open up the BBS and consumer hot or project to discuss, let consumer participation in the product design, establish links, provide free E-mail, free search engine, free agency, free online services such as the screen on demand for free.Looking to the future, the network marketing is very welcome to implement in the medium-sized and small enterprises .This is because most small and medium enterprise managers have realized the benefits of developing network marketing, and actively join and enterprise website construction, this for the development of small and medium-sized enterprises lay the solid foundation after the network marketing .凡客诚品的网络营销策略分析摘要:21世纪是信息世纪,科技、经济和社会的发展正在迎接这个时代的到来。
物联网中英文对照外文翻译文献
![物联网中英文对照外文翻译文献](https://img.taocdn.com/s3/m/563d4b4777232f60ddcca16e.png)
中英文资料外文翻译Internet of Things1.the definition of connotationThe English name of the Internet of Things The Internet of Things, referred to as: the IOT.Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.2.The meaning of "material"Where the "objects" to meet the following conditions can be included in the scope of the "Internet of Things":1. Receiver have the appropriate information;2. Have a data transmission path;3. Have a certain storage capabilities;4. To have the CPU;5.To have the operating system;6. Have specialized applications;7. Have a data transmitter;8. Follow the communication protocol of Things;9. World Network, a unique number that can be identified.3. "Chinese style" as defined inInternet of Things (Internet of Things) refers to is the ubiquitous (Ubiquitous) terminal equipment (Devices) and facilities (Facilities), including with the "inner intelligence" sensors, mobile terminals, industrial systems, floor control system, the family of Intelligentfacilities, video surveillance systems, and external can "(Enabled), such as RFID, a variety of assets (the Assets), personal and vehicle carrying the wireless terminal" intelligent objects or animals "or" smart dust "(the Mote), through a variety of wireless and / or cable over long distances and / or short-range communication networks to achieve interoperability (M2M), application integration (the Grand Integration), and based on cloud computing, SaaS operation mode, in internal network (intranet), private network (extranet), and / or the Internet (Internet) environment, the use of appropriate information security mechanisms to provide a safe, controlled and even personalized real-time online monitoring, retrospective positioning, alarm linkage, command and control plan management, remote control, security, remote repair and maintenance, online upgrades, statistical reporting, decision support, the leadership of the desktop (showcase of the Cockpit Dashboard) management and service functions, "Everything," "efficient, energy saving, security environmental protection, "" possession, control, Camp integration [1].4.EU definitionIn September 2009, the Internet of Things and enterprise environments held in Beijing, China-EU Seminar on the European Commission and Social Media Division RFID Division is responsible for Dr. Lorent Ferderix, given the EU's definition of things: the Internet of Things is a dynamic global network infrastructure, it has a standards-based and interoperable communication protocols, self-organizing capabilities, including physical and virtual "objects" of identity, physical attributes, virtual features and smart interface and seamless integration of information networks .Internet of Things Internet and media, the Internet and business Internet one, constitute the future of the Internet.5.changeThe Internet of Things (Internet of Things) the word universally recognized at home and abroad Ashton, Professor of the MIT Auto-ID Center in 1999 first proposed to study RFID. The report of the same name released in 2005, the International Telecommunication Union (ITU), the definition and scope of the Internet of Things has been a change in the coverage of a larger expansion, no longer refers only to the Internet of Things based on RFID technology.Since August 2009, Premier Wen Jiabao put forward the "Experience China" Internet of Things was officially listed as a national one of the five emerging strategic industries, to write the "Government Work Report" Internet of Things in China has been the great concern of the society as a whole degree of concern is unparalleled in the United States, European Union, as well as other countries.The concept of Internet of Things is not so much a foreign concept, as it has been the concept of a "Made in China", his coverage of the times, has gone beyond the scope of the 1999 Ashton professor and the 2005 ITU report referred to, Internet of Things has been labeled a "Chinese style" label.6.BackgroundThe concept of Internet of Things in 1999. Internet-based, RFID technology and EPC standards, on the basis of the computer Internet, the use of radio frequency identification technology, wireless data communication technology, a global items of information to real-time sharing of the physical Internet "Internet of things" (referred to as the Internet of Things) , which is also the basis of the first round of the China Internet of Things boom set off in 2003.The sensor network is built up based on sensing technology network. Chinese Academy of Sciences in 1999 on the start sensor network research and has made some achievements in scientific research, the establishment of applicable sensor network.1999, held in the United States, mobile computing and networking International Conference, "The sensor network is a development opportunity facing humanity in the next century. In 2003, the United States, "Technology Review" proposed sensor network technology will be future changes ten people's lives first.November 17, 2005, the WSIS held in Tunis (WSIS), the International TelecommunicationUnion released ITU Internet Report 2005: Internet of Things ", citing the concept of the" Internet of things ". The report pointed out that the ubiquitous "Internet of Things" communication era is approaching, all the objects in the world, from tires to toothbrushes, from housing to the tissue via the Internet, take the initiative to be exchanged. Radio Frequency Identification (RFID), sensor technology, nanotechnology, intelligent embedded technology will be more widely used.According to the description of the ITU, the era of things, a short-range mobile transceivers embedded in a variety of daily necessities, human beings in the world of information and communication will receive a new communication dimension, from any time communication between people of the place of connection extended to the communication connection between persons and things and things and things. The Internet of Things concept of the rise, largely due to the International Telecommunication Union (ITU), the title of Internet of Things 2005 annual Internet Report. However, the ITU report the lack of a clear definition of Things.Domestic Internet of Things is also there is no single standard definition, but the Internet of Things In essence, the Internet of Things is a polymer application of modern information technology to a certain stage of development and technological upgrading of various sensing technology modern network technology and artificial intelligence and automation technology aggregation and integration of applications, so that the human and material wisdom of dialogue to create a world of wisdom. Because the development of the Internet of Things technology, involving almost all aspects of IT, innovative application and development of a polymer, systematic, and therefore be called revolutionary innovation of information industry. Summed up the nature of the Internet of Things is mainly reflected in three aspects: First, the Internet features that need to be networked objects must be able to achieve the interoperability of the Internet; identification and communication features, that is included in the Internet of Things "objects" must to have the functions of automatic identification and physical objects communication (M2M); intelligent features, the network system should have automated, self-feedback and intelligent control features January 28, 2009, Obama became the President of the United States, held with U.S. business leaders a "round table", as one of the only two representatives, IBM CEO Sam Palmisano for the first time that "the wisdom of the Earth" this concept, it is recommended that the new government to invest in a new generation of intelligent infrastructure.February 24, 2009 news, IBM Greater China CEO money crowd called "Smarter Planet"strategy announced in the forum 2009IBM.This concept was put forth, that is the great concern of the United States from all walks of life, and even analysts believe that IBM's vision is very likely to rise to U.S. national strategy, and caused a sensation in the world. IBM believes that the industry, the next phase of the mission is to make full use of the new generation of IT technology in all walks of life among specifically, is the embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water supply systems dams, oil and gas pipelines and other objects, and is generally connected to the formation of Things.Strategy conference, IBM, and implant the concept of "wisdom" in the implementation of the infrastructure, strong, not only in the short term to stimulate the economy, promote employment, and in a short period of time for China to build a mature wisdom infrastructure platform.IBM "Smarter Planet" strategy will set off again after the wave of Internet technology industrial revolution. Former IBM CEO Lou Gerstner has raised an important point of view, every 15 years, a revolution in computing model. This judgment is the same as Moore's Law accurately call it a "15-year cycle Law". Before and after 1965, changes to the mainframe as a symbol, 1980 marked by the popularization of personal computers, 1995, the Internet revolution. Each such technological change are caused by the enterprise, industry and even the national competitive landscape of major upheaval and change. To a certain extent in the Internet revolution is ripening by the "information superhighway" strategy. 1990s, the Clinton administration plan for 20 years, $ 200 billion to -4000 billion, construction of the U.S. National Information Infrastructure, to create a huge economic and social benefits.Today, the "Smarter Planet" strategy by many Americans that there are many similarities with the "information superhighway", the same they revive the economy, a key strategy for competitive advantage. The strategy can be set off, not only for the United States, such as the Internet revolution was the wave of technological and economic concern, more attention from the world."Internet of Things prospects are very bright, it will dramatically change our current way of life." Demonstration director of the Center of Nanjing University of Aeronautics and Astronautics, National Electrical and Electronic Zhao Guoan said. Industry experts said that the Internet of things to our life personification of the things became a kind of human.Goods (goods) in the world of physical objects associated with each other "exchange", without the need for human intervention.The Internet of Things using radio frequency identification (RFID) technology, to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet. It can be said that the Internet of Things depict the world is full of intelligent. In the world of Internet of Things, material objects connected to the dragnet.The second session, held at Peking University in November 2008, China Mobile Government Seminar "Knowledge Society and Innovation 2.0", the experts made the mobile technology, the Internet of Things technology led to the development of economic and social form, innovative forms of change, and promote the The next generation of innovation for the knowledge society as the core of user experience (innovative 2.0) the formation of innovation and development of the form to pay more attention to the user to focus on people-oriented. Research institutions is expected to 10 years, the Internet of Things may be mass adoption of this technology will develop into one of thousands of yuan-scale high-tech market, the industry than the Internet 30 times.It is learned that the things industry chain can be broken down into the identity, perception, processing and information transfer, four links, each link of the key technologies for the wireless transmission network of RFID, sensors, smart chip and telecom operators. EPOSS in the "Internet of Things in 2020" report, an analysis predicted that the future development of the Internet of Things will go through four stages, 2010, RFID is widely used in the field of logistics, retail and pharmaceutical objects interconnect 2010 to 2015, 2015 ~ In 2020, the object into the semi-intelligent, intelligent objects into 2020.As the vanguard of the Internet of Things, RFID has become the most concerned about the technology market. The data show that the global RFID market size in 2008 from $ 4.93 billion in 2007 rose to $ 5.29 billion, this figure covers all aspects of the RFID market, including tags, readers and other infrastructure, software and services. RFID card and card-related infrastructure will account for 57.3 percent of the market, reaching $ 3.03 billion. Application from financial and security industries will drive the market growth of RFID cards. Analysys International forecasts, the Chinese RFID market size in 2009 will reach 5.0 billion, a CAGR of 33%, in which the electronic tag is more than 3.8 billion yuan, the reader close to 700 million yuan, software and services market to reach 500 million yuan pattern.MEMS is the abbreviation of the micro-electromechanical systems, MEMS technology is built on the basis of micro / nano, the market prospect is broad. The main advantage of the MEMS sensoris the small size, large-scale mass production cost reduction, mainly used in two major areas of automotive and consumer electronics. Under ICInsight the latest report is expected in 2007-2012, global sales of semiconductor sensors and actuators based on MEMS will reach 19 percent compound annual growth rate (CAGR), compared with $ 4.1 billion in 2007 to five years will achieve $ 9.7 billion in annual sales.7.PrincipleInternet of Things is on the basis of the computer Internet, RFID, wireless data communications technology, to construct a cover everything in the world's "Internet of Things". In this network, the goods (products) to each other "exchange", without the need for human intervention. Its essence is the use of radio frequency identification (RFID) technology to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet.The Internet of Things is a very important technology is radio frequency identification (RFID) technology. RFID is radio frequency identification (Radio Frequency Identification) technology abbreviation, is an automatic identification technology in the 1990s began to rise, the more advanced a non-contact identification technology. The development of RFID technology based on a simple RFID system, combined with existing network technology, database technology, middleware technology, to build a one composed by a large number of networked readers and numerous mobile label, much larger than the Internet of Things trend.RFID, It is able to let items "speak" a technique. In the "Internet of Things" concept, RFID tags are stored in the specification and interoperability information collected automatically by wireless data communications network to a central information system, to achieve the identification of goods (products), and then through the open computer network for information exchange and sharing, items "transparent" management.The information technology revolution in the Internet of Things is referred to as IT mobile Pan of a specific application. Internet of Things through IntelliSense, identification technology and pervasive computing, ubiquitous network convergence applications, breaking the conventional thinking before, human beings can achieve ubiquitous computing and network connectivity [3]. The traditional thinking has been the separation of physical infrastructure and IT infrastructure: on the one hand, airports, roads, buildings, while on the other hand, the data center, PC, broadband. In theera of the "Internet of Things", reinforced concrete, cable with the chip, broadband integration into a unified infrastructure, in this sense, the infrastructure is more like a new site of the Earth, the world really works it, which including economic management, production operation, social and even personal life. "Internet of Things" makes it much more refined and dynamic management of production and life, to manage the future of the city to achieve the status of "wisdom" to improve resource utilization and productivity levels, and improve the relationship between man and nature. 8.Agency1, institution-buildingAs the first national Internet of Things industry community organizations - the application of professional Committee of China Electronic Chamber of Things technology products (referred to as: "objects of the IPCC"), the Ministry of Civil Affairs in June 2010, preliminary approved by the Ministry of August being reported that the Ministry of Civil Affairs for final approval.2, the main taskServe as a bridge between business and government to assist the Government of the industry guidance, coordination, consultation and services to help members to reflect the business requirements to the Government; coordinate the relationship between enterprises to strengthen technical cooperation, product distribution, the elimination of vicious competition ; supervision of members the correct implementation of national laws and regulations, to regulate the industry; member of information communication technology products, cooperation, resource sharing, capital operation, and promote the application of Internet of Things technologies and products, and promote the Internet of Things industrial scale , co-development.9.ConstructionInternet of Things in the practical application to carry out requires the involvement of all walks of life, and need the guidance of the national government as well as related regulations and policies to assist the launching of the Internet of Things has the scale, broad participation, management, technical, and material properties, etc. other features, the technical problem is the most crucial issues of Things billion Bo logistics consulting, Internet of Things technology is an integrated technology, a system not yet which company has overall responsibility for network planning and construction of the entire system, theoretical studies have commenced in all walks of life and the practical application is limited to within the industry. The key is on the planning and design andresearch and development of the Internet of Things research in the field of RFID, sensors, embedded software, and transmission of data calculation. In general, to carry out the steps of the Internet of things mainly as follows:(1) identified the object attributes, properties, including static and dynamic properties of the static property can be stored directly in the label, the dynamic properties need to start with sensors to detect real-time;(2) the need to identify the equipment to complete the reading of object attributes, and information into a data format suitable for network transmission;(3) the object of information transmitted over the network to the information processing center (processing center may be distributed, such as home computers or mobile phones, may also be centralized, such as China Mobile IDC) by the processing center to complete the object communication calculation.10.key areasInternet of Things 4 key areas:(1) RFID;(2) sensor network;(3) The M2M;(4) integration of the two.11.TrendIndustry experts believe that the Internet of things on the one hand can improve economic efficiency and significant cost savings; the other hand, can provide technical impetus to global economic recovery. Currently, the United States, the European Union are all invested heavily in-depth study to explore the Internet of Things. The country is also highly concerned about the emphasis of Things, Industry and Information Technology Ministry in conjunction with the relevant departments are conducting research in a new generation of IT to the formation of policies and measures to support the development of a new generation of IT.China Mobile CEO Wang Jianzhou has repeatedly mentioned the Internet of Things will become the focus of future development of China Mobile. He will be invited to Taiwan to produce RFID, sensors and bar code manufacturers and China Mobile. According to him, the use of the Internet of Things technology, Shanghai Mobile has a number of industrial customers tailor the datacollection, transmission, processing and business management in one set of wireless application solutions. The latest data show that Shanghai Mobile has more than 100,000 chips mounted on a taxi, bus, various forms of matter networking applications in all walks of prowess, to ensure the orderly operation of the city. During the Shanghai World Expo, "the bus services through" will be fully applied to the Shanghai public transport system, the smooth flow traffic to the most advanced technology to protect Expo area; for logistics transportation management, e-logistics ", will provide users with real-time accurate information of Cargo, vehicle tracking and positioning, the transport path selection, logistics network design and optimization services greatly enhance the comprehensive competitiveness of logistics enterprises.In addition, the popularization of the "Internet of Things" for the number of animals, plants and machinery, sensors and RFID tags of items and related interface devices will greatly exceed the number of mobile phones. The promotion of the Internet of Things will become a drive to promote economic development for the industry to open up a potential development opportunities. According to the current demand on the Internet of Things, in recent years, billions of sensors and electronic tags, which will greatly promote the production of IT components, while increasing the number of job opportunities.According to reports, it is necessary to truly build an effective Internet of things, there are two important factors. First, the scale, only with the scale to make the items of intelligence play a role. For example, a city of one million vehicles, if we only 10000 vehicles installed on the smart system, it is impossible to form an intelligent transportation system; two mobility items are usually not static, but in the state of the movement , we must maintain the items in the state of motion, and even high-speed motion state can at any time for dialogue.FORRESTER of the authority of the U.S. advisory body predicted that 2020, the world of business of the Internet of Things, compared with the business of interpersonal communication, will reach 30 to 1, so the "Internet of Things" is known to be the next one trillion communications services.Internet of Things heat wave Why is rapidly growing in China? Internet of Things in China rapid rise thanks to the several advantages of our country in terms of things.In the early 1999 launched the Internet of Things core sensor network technology research, R & D level in the world; the second, sensor network field in the world, China is the standard one ofthe dominant country, the patent owner; third China is one of the countries to achieve a complete industrial chain of Things; Fourth, China's wireless communications network and broadband coverage provides a solid infrastructure to support the development of the Internet of Things; Fifth, China has become the world's first the three major economies, with strong economic strength to support the development of the Internet of Things.12.MythThe current understanding of the Internet of things there are a lot of misunderstanding, which is also a direct impact on our understanding of Things on the development of the logistics industry, it is necessary first to distinguish errors, clarify our thinking.One sensor networks or RFID network equivalent of Things. The fact that sensor technology, or RFID technology, or are simply one of the information collection technology. In addition to the sensor technology and RFID technology, GPS, video recognition, infrared, laser, scanning can be achieved automatically identify physical objects to communicate technical information collection technology can become the Internet of Things. Sensor networks or RFID network is just an application of Things, but not all of Things.Second, the Internet of Things as a myriad of unlimited extension of the Internet of Things as a completely open for all things, all of the interconnections, all shared Internet platform.In fact, the Internet of Things is not simple infinite extension of the global sharing of the Internet. Even if the Internet is also not only refers to we typically think of the international sharing computer network, Internet, WAN and LAN. Internet of Things can be both an extension of our usual sense of the Internet to the matter; LAN, professional can also be based on real needs and industrial applications. The reality is not necessary and can not make all the items networking; no need to make professional, LAN must be connected to the global Internet sharing platform. Of things in the future the Internet will be very different from the professional network of similar smart logistics, smart transportation, smart grid; the intelligence community and other local area network is the largest use of space.Ter, that the ubiquitous network of the Internet of Things Internet of Things, and therefore the Internet of Things is a castle in the air, is difficult to achieve the technology. In fact the Internet of things are real, many of the primary Internet of Things applications already for our services. The Internet of Things concept is introduced in many real-world applications based on polymericintegrated innovation, pre-existing network with the Internet of Things, intelligent, automated system, summarized and upgrading it upgraded from a higher perspective our knowledge.Four of Things as a basket, and everything installed inside; based on self-awareness, and only be able to interact, communication products as the Internet of Things applications. For example, just embedded some of the sensors, to become the so-called Internet of Things appliances; products labeled with RFID tags, became the Internet of Things applications.esThings widely used throughout the intelligent transportation, environmental protection, government, public safety, peace at home, smart fire, industrial monitoring, environmental monitoring, elderly care, personal health, floriculture, water monitoring, food traceability, enemy detection and intelligence collection and other fields.International Telecommunication Union in 2005, a report has portrayed the picture of the era of the "Internet of Things": car when the driver operational errors will automatically alarm; briefcase will remind the owner forgot something; clothes will "tell" washing machine color and water temperature requirements. Billion Bo logistics consulting vivid introduction of Things in the logistics field, for example, a logistics company, application of Things truck, when loading overweight, the car will automatically tell you overloaded and overload how many, but the space remaining , the severity of goods with how to tell you; when handling staff unloading a cargo packaging may be shouting "throw you hurt me", or "My dear, you do not get too barbaric, you can?"; when the driver and others gossip, trucks will pretend boss's voice roaring "stupid, the grid!Internet of things to make full use of a new generation of IT technology in all walks of life among, specifically, is embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water systems, dams, oil and gas pipelines, etc.kinds of objects, and then "Internet of Things" with the existing Internet to integrate and realize the integration of human society and the physical system, which in this integrated network, there is the ability to super-powerful central computer cluster, integrated network staff implementation of real-time management and control of the machinery, equipment and infrastructure, on this basis, the human can be more refined and dynamic management of production and life, to achieve the status of the "wisdom", to improve resource utilization and productivity levels, and improve human the relationship between the natural.。
卷积神经网络机器学习外文文献翻译中英文2020
![卷积神经网络机器学习外文文献翻译中英文2020](https://img.taocdn.com/s3/m/506a46d190c69ec3d4bb75a9.png)
卷积神经网络机器学习相关外文翻译中英文2020英文Prediction of composite microstructure stress-strain curves usingconvolutional neural networksCharles Yang,Youngsoo Kim,Seunghwa Ryu,Grace GuAbstractStress-strain curves are an important representation of a material's mechanical properties, from which important properties such as elastic modulus, strength, and toughness, are defined. However, generating stress-strain curves from numerical methods such as finite element method (FEM) is computationally intensive, especially when considering the entire failure path for a material. As a result, it is difficult to perform high throughput computational design of materials with large design spaces, especially when considering mechanical responses beyond the elastic limit. In this work, a combination of principal component analysis (PCA) and convolutional neural networks (CNN) are used to predict the entire stress-strain behavior of binary composites evaluated over the entire failure path, motivated by the significantly faster inference speed of empirical models. We show that PCA transforms the stress-strain curves into an effective latent space by visualizing the eigenbasis of PCA. Despite having a dataset of only 10-27% of possible microstructure configurations, the mean absolute error of the prediction is <10% of therange of values in the dataset, when measuring model performance based on derived material descriptors, such as modulus, strength, and toughness. Our study demonstrates the potential to use machine learning to accelerate material design, characterization, and optimization.Keywords:Machine learning,Convolutional neural networks,Mechanical properties,Microstructure,Computational mechanics IntroductionUnderstanding the relationship between structure and property for materials is a seminal problem in material science, with significant applications for designing next-generation materials. A primary motivating example is designing composite microstructures for load-bearing applications, as composites offer advantageously high specific strength and specific toughness. Recent advancements in additive manufacturing have facilitated the fabrication of complex composite structures, and as a result, a variety of complex designs have been fabricated and tested via 3D-printing methods. While more advanced manufacturing techniques are opening up unprecedented opportunities for advanced materials and novel functionalities, identifying microstructures with desirable properties is a difficult optimization problem.One method of identifying optimal composite designs is by constructing analytical theories. For conventional particulate/fiber-reinforced composites, a variety of homogenizationtheories have been developed to predict the mechanical properties of composites as a function of volume fraction, aspect ratio, and orientation distribution of reinforcements. Because many natural composites, synthesized via self-assembly processes, have relatively periodic and regular structures, their mechanical properties can be predicted if the load transfer mechanism of a representative unit cell and the role of the self-similar hierarchical structure are understood. However, the applicability of analytical theories is limited in quantitatively predicting composite properties beyond the elastic limit in the presence of defects, because such theories rely on the concept of representative volume element (RVE), a statistical representation of material properties, whereas the strength and failure is determined by the weakest defect in the entire sample domain. Numerical modeling based on finite element methods (FEM) can complement analytical methods for predicting inelastic properties such as strength and toughness modulus (referred to as toughness, hereafter) which can only be obtained from full stress-strain curves.However, numerical schemes capable of modeling the initiation and propagation of the curvilinear cracks, such as the crack phase field model, are computationally expensive and time-consuming because a very fine mesh is required to accommodate highly concentrated stress field near crack tip and the rapid variation of damage parameter near diffusive cracksurface. Meanwhile, analytical models require significant human effort and domain expertise and fail to generalize to similar domain problems.In order to identify high-performing composites in the midst of large design spaces within realistic time-frames, we need models that can rapidly describe the mechanical properties of complex systems and be generalized easily to analogous systems. Machine learning offers the benefit of extremely fast inference times and requires only training data to learn relationships between inputs and outputs e.g., composite microstructures and their mechanical properties. Machine learning has already been applied to speed up the optimization of several different physical systems, including graphene kirigami cuts, fine-tuning spin qubit parameters, and probe microscopy tuning. Such models do not require significant human intervention or knowledge, learn relationships efficiently relative to the input design space, and can be generalized to different systems.In this paper, we utilize a combination of principal component analysis (PCA) and convolutional neural networks (CNN) to predict the entire stress-strain c urve of composite failures beyond the elastic limit. Stress-strain curves are chosen as the model's target because t hey are difficult to predict given their high dimensionality. In addition, stress-strain curves are used to derive important material descriptors such as modulus, strength, and toughness. In this sense, predicting stress-straincurves is a more general description of composites properties than any combination of scaler material descriptors. A dataset of 100,000 different composite microstructures and their corresponding stress-strain curves are used to train and evaluate model performance. Due to the high dimensionality of the stress-strain dataset, several dimensionality reduction methods are used, including PCA, featuring a blend of domain understanding and traditional machine learning, to simplify the problem without loss of generality for the model.We will first describe our modeling methodology and the parameters of our finite-element method (FEM) used to generate data. Visualizations of the learned PCA latent space are then presented, a long with model performance results.CNN implementation and trainingA convolutional neural network was trained to predict this lower dimensional representation of the stress vector. The input to the CNN was a binary matrix representing the composite design, with 0's corresponding to soft blocks and 1's corresponding to stiff blocks. PCA was implemented with the open-source Python package scikit-learn, using the default hyperparameters. CNN was implemented using Keras with a TensorFlow backend. The batch size for all experiments was set to 16 and the number of epochs to 30; the Adam optimizer was used to update the CNN weights during backpropagation.A train/test split ratio of 95:5 is used –we justify using a smaller ratio than the standard 80:20 because of a relatively large dataset. With a ratio of 95:5 and a dataset with 100,000 instances, the test set size still has enough data points, roughly several thousands, for its results to generalize. Each column of the target PCA-representation was normalized to have a mean of 0 and a standard deviation of 1 to prevent instable training.Finite element method data generationFEM was used to generate training data for the CNN model. Although initially obtained training data is compute-intensive, it takes much less time to train the CNN model and even less time to make high-throughput inferences over thousands of new, randomly generated composites. The crack phase field solver was based on the hybrid formulation for the quasi-static fracture of elastic solids and implementedin the commercial FEM software ABAQUS with a user-element subroutine (UEL).Visualizing PCAIn order to better understand the role PCA plays in effectively capturing the information contained in stress-strain curves, the principal component representation of stress-strain curves is plotted in 3 dimensions. Specifically, we take the first three principal components, which have a cumulative explained variance ~85%, and plot stress-strain curves in that basis and provide several different angles from which toview the 3D plot. Each point represents a stress-strain curve in the PCA latent space and is colored based on the associated modulus value. it seems that the PCA is able to spread out the curves in the latent space based on modulus values, which suggests that this is a useful latent space for CNN to make predictions in.CNN model design and performanceOur CNN was a fully convolutional neural network i.e. the only dense layer was the output layer. All convolution layers used 16 filters with a stride of 1, with a LeakyReLU activation followed by BatchNormalization. The first 3 Conv blocks did not have 2D MaxPooling, followed by 9 conv blocks which did have a 2D MaxPooling layer, placed after the BatchNormalization layer. A GlobalAveragePooling was used to reduce the dimensionality of the output tensor from the sequential convolution blocks and the final output layer was a Dense layer with 15 nodes, where each node corresponded to a principal component. In total, our model had 26,319 trainable weights.Our architecture was motivated by the recent development and convergence onto fully-convolutional architectures for traditional computer vision applications, where convolutions are empirically observed to be more efficient and stable for learning as opposed to dense layers. In addition, in our previous work, we had shown that CNN's werea capable architecture for learning to predict mechanical properties of 2Dcomposites [30]. The convolution operation is an intuitively good fit forpredicting crack propagation because it is a local operation, allowing it toimplicitly featurize and learn the local spatial effects of crack propagation.After applying PCA transformation to reduce the dimensionality ofthe target variable, CNN is used to predict the PCA representation of thestress-strain curve of a given binary composite design. After training theCNN on a training set, its ability to generalize to composite designs it hasnot seen is evaluated by comparing its predictions on an unseen test set.However, a natural question that emerges i s how to evaluate a model's performance at predicting stress-strain curves in a real-world engineeringcontext. While simple scaler metrics such as mean squared error (MSE)and mean absolute error (MAE) generalize easily to vector targets, it isnot clear how to interpret these aggregate summaries of performance. It isdifficult to use such metrics to ask questions such as “Is this modeand “On average, how poorly will aenough to use in the real world” given prediction be incorrect relative to some given specification”. Although being able to predict stress-strain curves is an importantapplication of FEM and a highly desirable property for any machinelearning model to learn, it does not easily lend itself to interpretation. Specifically, there is no simple quantitative way to define whether two-world units.stress-s train curves are “close” or “similar” with real Given that stress-strain curves are oftentimes intermediary representations of a composite property that are used to derive more meaningful descriptors such as modulus, strength, and toughness, we decided to evaluate the model in an analogous fashion. The CNN prediction in the PCA latent space representation is transformed back to a stress-strain curve using PCA, and used to derive the predicted modulus, strength, and toughness of the composite. The predicted material descriptors are then compared with the actual material descriptors. In this way, MSE and MAE now have clearly interpretable units and meanings. The average performance of the model with respect to the error between the actual and predicted material descriptor values derived from stress-strain curves are presented in Table. The MAE for material descriptors provides an easily interpretable metric of model performance and can easily be used in any design specification to provide confidence estimates of a model prediction. When comparing the mean absolute error (MAE) to the range of values taken on by the distribution of material descriptors, we can see that the MAE is relatively small compared to the range. The MAE compared to the range is <10% for all material descriptors. Relatively tight confidence intervals on the error indicate that this model architecture is stable, the model performance is not heavily dependent on initialization, and that our results are robust to differenttrain-test splits of the data.Future workFuture work includes combining empirical models with optimization algorithms, such as gradient-based methods, to identify composite designs that yield complementary mechanical properties. The ability of a trained empirical model to make high-throughput predictions over designs it has never seen before allows for large parameter space optimization that would be computationally infeasible for FEM. In addition, we plan to explore different visualizations of empirical models-box” of such models. Applying machine in an effort to “open up the blacklearning to finite-element methods is a rapidly growing field with the potential to discover novel next-generation materials tailored for a variety of applications. We also note that the proposed method can be readily applied to predict other physical properties represented in a similar vectorized format, such as electron/phonon density of states, and sound/light absorption spectrum.ConclusionIn conclusion, we applied PCA and CNN to rapidly and accurately predict the stress-strain curves of composites beyond the elastic limit. In doing so, several novel methodological approaches were developed, including using the derived material descriptors from the stress-strain curves as interpretable metrics for model performance and dimensionalityreduction techniques to stress-strain curves. This method has the potential to enable composite design with respect to mechanical response beyond the elastic limit, which was previously computationally infeasible, and can generalize easily to related problems outside of microstructural design for enhancing mechanical properties.中文基于卷积神经网络的复合材料微结构应力-应变曲线预测查尔斯,吉姆,瑞恩,格瑞斯摘要应力-应变曲线是材料机械性能的重要代表,从中可以定义重要的性能,例如弹性模量,强度和韧性。
计算机网络实训参考文献
![计算机网络实训参考文献](https://img.taocdn.com/s3/m/e79f4f8ddc88d0d233d4b14e852458fb770b38dc.png)
计算机网络实训参考文献
1、《计算机网络》(第 4 版)英文影印版 Andrew S. Tanenbaum
著清华大学出版社
2、《计算机网络》(第 4 版) Andrew S. Tanenbaum 著,潘爱民译清华大学出版社
3、《计算机网络》(第 5 版)谢希仁编著电子工业出版社
4、《计算机网络》(第 2 版) /21 世纪大学本科计算机专业系列教材吴功宜编著清华大学出版社
5、计算机网络:系统方法:(美)彼德森,戴维著,叶新铭等译机械工业出版社
6、计算机网络操作系统原理与应用——全国高等工科教育计算机类规划教材机械工业出版社
7、计算机网络:原理、应用和实现/ 高等学校教材计算机科学与技术王卫亚等主编,李晓莉等编著清华大学出版社
8、计算机网络安全——大学本科计算机专业应用型规划教材顾巧论等编著
9、计算机网络技术与应用董吉文,徐龙玺主编电子工业出版社
10、计算机网络基础应用教程张连永等编著清华大学出版社。
常用十大学术数据库介绍
![常用十大学术数据库介绍](https://img.taocdn.com/s3/m/7e944bc52cc58bd63186bdfb.png)
常用十大学术数据库介绍一、美国(1)Wiley InterScience(英文文献期刊) Wiley InterScience是John Wiely & Sons公司创建的动态在线内容服务,1997年开始在网上开通。
通过InterScience,Wiley公司以许可协议形式向用户提供在线访问全文内容的服务。
WileyInterScience收录了360多种科学、工程技术、医疗领域及相关专业期刊、30多种大型专业参考书、13种实验室手册的全文和500多个题目的Wiley学术图书的全文。
其中被SCI收录的核心期刊近200种。
期刊具体学科划分为:Business,Finance & Management (商业、金融和管理)、Chemistry (化学)、Computer Science(计算机科学)、Earth Science (地球科学)、Education (教育学)、Engineering (工程学)、Law(法律)、Life and Medical Sciences (生命科学与医学)、Mathematics and Statistics(数学统计学)、Physics (物理)、Psychology (心理学)。
(2)美国IEEE (英文文献期刊)IEEE(Institute of Electrical & ElectronicsEngineers)是电子信息领域最著名的跨国性学术团体,其会员分布在世界150多个国家和地区。
据IEEE统计,IEEE会员总数2001年比2000年增加3.1%,达到377342人,其中学生会员为65669人,增长12.6%。
随着人们的信息越来越多地来自Internet,IEEE需要为会员提供更加完善和全面的电子信息产品和服务。
IEEE应成为IEEE会员获得信息的首选之地。
IEEE必须识别正确的信息,并提供对它们的访问方法。
实现这个目标的重要一步是通过IEEEXplore与IEEE/IEE Electronic Library(IEL)连接。
网络在线学习外文文献翻译中英文
![网络在线学习外文文献翻译中英文](https://img.taocdn.com/s3/m/84de5c56aaea998fcc220e73.png)
网络在线学习外文翻译中英文英文Online learning: Adoption, continuance, and learning outcome—A review ofliteratureRitanjali Panigrahi, Praveen Srivastava, Dheeraj Sharma AbstractThe use of Technology to facilitate better learning and training is gaining momentum worldwide, reducing the temporal and spatial problems associated with traditional learning. Despite its several benefits, retaining students in online platforms is challenging. Through a literature review of the factors affecting adoption, the continuation of technology use, and learning outcomes, this paper discusses an integration of online learning with virtual communities to foster student engagement for obtaining better learning outcomes. Future directions have been discussed, the feedback mechanism which i s an antecedent of students’ continuation intention has a lot of scopes to be studied in the virtual community context. The use of Apps in m-learning and the use of cloud services can boost the ease and access of online learning to users and organizations.Keywords: Online learning, Virtual community, Technology adoption, Technology continuation, Learning outcomeIntroductionOnline learning and training are gaining popularity worldwide, reducing the temporal and spatial problems associated with the traditional form of education. The primary factors behind using online learning are not only to improve access to education and training, and quality of learning, but also to reduce the cost and improve the cost-effectiveness of education (Bates, 1997). Online learning is mainly provided in two ways—in synchronous and asynchronous environments (Jolliffe, Ritter, & Stevens, 2012). The time lag attributes of asynchronous learning unlike synchronous learning in online platforms take the advantage of accessing materials anytime and anywhere, ability to reach a greater mass at the same time, and uniformity of content. Online learning along with face-to-face learning is successfullyused in industry as well as academia with positive outcomes (Chang, 2016). The geographically distributed team in an organization can get their skill training through online platforms at the same time, gaining a greater level of competitiveness. Online learning is also beneficial for students as they can learn at their own pace with the availability of online materials. The e-learning market is becoming popular and widely adopted by the education sector and industry. The growth of the e-learning market can be demonstrated by the fact that the global e-learning market is expected to reach 65.41 billion dollars by 2023 growing at a cumulative average growth rate of 7.07% (Research and Markets, 2018a). In addition to this, the global learning management system (LMS) is expected to increase from 5.05 billion USD in 2016 to 18.44 billion USD by 2025 growing at a rate of 15.52% (Research and Markets, 2018b).Despite several advantages of online learning such as improving access to education and training, improving the quality of learning, reducing the cost and improving the cost-effectiveness of education, retaining students in such platforms is a key challenge with a high attrition rate (Perna et al., 2014). Several strategies such as briefing, buddying, and providing feedback on the platform are proposed to retain and engage students (Nazir, Davis, & Harris, 2015). It is also noted that more self-discipline is required by students in online education, unlike traditional classroom education (Allen & Seaman, 2007). Keeping users enrolled and engaged is a challenging job as a personal touch by the instructor is missing or limited. The learning engagement which is an important antecedent for learning outcome is lower for technology-mediated learning than face-to-face learning (Hu & Hui, 2012). As a higher amount of money is spent on infrastructure, staff training, etc., organizations seek to take maximum benefit from online learning which requires an understanding of the factors that drive the adoption, continuation intention, and learning outcome of users on online learning platforms. Therefore, the primary focus of research remains on how to retain online learning users, and increase the efficiency of the online learning.Users may learn inside and outside the classroom; inside classroom learning isthrough instructors either from face-to-face, pure online or blended learning (combination of face-to-face and pure online learning) whereas outside classroom learning is conducted by users anytime and anywhere after the class. The exponential growth of the Internet has enabled individuals to share information, participate, and collaborate to learn from virtual communities (VC) anytime and anywhere (Rennie & Morrison, 2013). In a virtual community, people do everything that they do in real life but leaving their bodies behind (Rheingold, 2000). Virtual communities keep its users engaged based on familiarity, perceived similarity, and trust by creating a sense of belongingness (Zhao, Lu, Wang, Chau, & Zhang, 2012). It is essential to assess the role of a less constrained informal mode of learning (Davis & Fullerton, 2016) like virtual communities in the formal learning to engage and retain students.DiscussionGetting a new idea adopted even when it has obvious advantages is often very difficult (Rogers, 2003). Consistent with the previous statement, despite the advantages of online learning such as improving accessibility, quality, and reducing cost, it has a long way to go to be adopted and used by organizations because of the resistance at different levels (Hanley, 2018). The reasons for resistances offered by the employees in an organizations include perceived poor focus of the e-learning initiative, lack of time to learn new way of working, too much effort to change, lack of awareness, and resistance to change (Ali et al., 2016; Hanley, 2018). It is crucial from an institutional point of view to overcome the resistance to adopt and implement the online learning systems successfully.Understanding the factors of online learning adoption, continuation use intention, and learning outcomes are vital for an e-learning platform providing organization because the success of the platform depends on the successful adoption, continuation use, and finally achieving the desired outcomes. From the literature, it is found that the national culture affects the adoption and moderates the relationship between variables of adoption and use. Therefore, the results of adoption and use of technology might differ in different counties with different cultural dimensions. At a broader level, the perceived characteristics of innovation (of online learning) such as relativeadvantage, compatibility, complexity, trialability, and observability play a significant role in adoption. At an individual level, the primary factors of adoption are the individual expectancies such as the perceived usefulness, perceived ease of use, perceived enjoyment, performance expectancy, effort expectancy, etc., and the external influences such as subjective norm, social norms, surrounding conditions, national culture, social network characteristic, etc. On the other hand, the primary factors of continuation of technology use are the experiences of the individuals in the technology such as satisfaction, confirmation, self-efficacy, flow, trust, we-intention, sense of belongingness, immersion, IS qualities, etc. The perceived usefulness and perceived ease of use are found to be vital for both the technology adoption and continuation use. This implies that the usefulness of the technology and how easy the technology to use determines the adoption and continuation of technology. Apart from these technology enablers, the platform providers should consider the technology inhibitors which negatively impact the acceptance of the technology. The factors of the learning outcomes such as self-efficacy, virtual competence, engagement, design interventions, etc. should be considered before designing and delivering the content in the online learning platform to achieve optimum learning outcomes. The learners’ intention to use full e-learning in developing countries depends on the lea rners’ characteristics, and learners’ adoption of blended learning (Al-Busaidi, 2013). Studies for example by Verbert et al. (2014) have shown that blended learning yields the best outcome in terms of grade when students learn in online collaborative learning with teacher’s initiation and feedback. On the contrary, some studies have shown that contents such as business games do not need the interaction with the instructor; in fact, they are negatively related to perceived learning (Proserpio & Magni, 2012). MOOC (Massive Open Online Course) users have organized face-to-face meetings to fulfill their belongingness or social connectedness as a part of their learning activity (Bulger, Bright, & Cobo, 2015). This indicates that not everyone is good with a digitized form of learning, and hence both face-to-face and online components should be integrated for better outcomes.Lack of human connection is one of the limitations of online learning (Graham,2006) which may reduce the satisfaction level. To address this limitation, personalization functions of e-learning systems began. The satisfaction level, perceived and actual performance, self-efficacy scores increase in personalized online learning where learning materials are provided according to the cognitive capability and style of each individual (Xu, Huang, Wang, & Heales, 2014). Although personalization of e-learning systems is beneficial, they are socially and ethically harmful, and special attention should be given to issues such as privacy compromisation, lack of control, the commodification of education, and reduced individual capability (Ashman et al., 2014). Personal e-learning systems collect user information to understand the users’ interests and requirements for the learning which violates the privacy of individuals. The system utilizes the user information to show the personal content where the individuals do not have control over the learning content. Hence they are limited to certain personal contents which reduce their individual capabilities.Studies, for example, Zhao et al. (2012) have shown that VCs create a sense of belongingness and keeps the members engaged which results in improving the learning outcome, and users with same age groups are less likely to attrite (Freitas et al., 2015). Studies have shown that engagement is promoted when criteria such as problem-centric learning with clear expositions, peer interaction, active learning, instructor accessibility and passion, and using helpful course resources are met (Hew, 2015). Social interactions through social networking produce an intangible asset known as social capital (Coleman, 1988) in terms of the trust, collective action, and communication. Social capital is positively related to online learning satisfaction in group interactions, class interactions, learner-instructor interactions, as well as increasing students’ e-learning performance in groups (Lu, Yang, & Yu, 2013).The continuous development of mobile technology has expanded the opportunity to learn from mobile devices anywhere, anytime. M-Learning is much more beneficial for accessing education in remote areas and developing countries. The success of M-learning in organizations depends on organizational, people, and pedagogical factors apart from technological factors (Krotov, 2015). A range of mobiletechnologies such as laptops, smartphones, and tablets are embraced by students to support informal learning (Murphy, Farley, Lane, Hafeez-Baig, & Carter, 2014). Learning through mobile devices poses both opportunities as well as challenges; it provides flexibility in learning, on the other hand, it is a limitation for those who do not have connectivity and access to these devices. In student-centered learning especially collaborative and project-based learning, the use of mobile devices can be promoted by the mobile apps (Leinonen, Keune, Veermans, & Toikkanen, 2014). The use of mobile apps along with guidance from teachers integrates reflection in the classroom learning (Leinonen et al., 2014).Cloud computing provides organizations with a way to enhance their IT capabilities without a huge investment in infrastructure or software. The benefits of cloud computing are low cost, scalability, centralized data storage, no maintenance from user side (no software needed), easy monitoring, availability and recovery, and the challenges include it requires fast and reliable internet access, and privacy and security issues (El Mhouti, Erradi, & Nasseh, 2018). The primary factors for adoption of cloud computing in e-learning are ease of use, usefulness, and security (Kayali, Safie, & Mukhtar, 2016). Private cloud inside educational institutes can acquire the additional benefits in non-compromising the security and data privacy concerns associated with cloud computing (Mousannif, Khalil, & Kotsis, 2013). Cloud computing provides support to the online learning platforms to store and process the enormous amount of data generated. The problem of managing the increasing growth of online users, contents, and resources can be resolved by using cloud computing services (Fernandez, Peralta, Herrera, & Benitez, 2012).Future directionsFuture directions of research in online learning are as follows: First, the feedback mechanism used in online learning in institutions has not been used to measure the continuation intention in VCs. Feedback enables learners to define goals and track their progress through dashboard applications to promote awareness, reflection, and sense-making (Verbert et al., 2014). The students who received teachers’ feedback along with online learning achieved better grades than those who did not receivefeedback (Tsai, 2013) and students positively perceive the feedback systems more than the educators (Debuse & Lawley, 2016). Although immediate feedback is one of the dimensions of the flow (Csikszentmihalyi, 2014), the factor has not been studied in a VC context. It is vital for managers to check if feedback on a community post fosters the members’ continuation intention, and they should design user interfaces which encourage providing feedback. Second, it is high time to develop an integrated model for formal learning (online and blended) with VCs for students’ engagement. Informal learning as itself, not limited to the body of knowledge, rather, is the result of the interaction of people via communities of practice, networks, other forms, etc. (Rennie & Mason, 2004). The networked communities build intimacy and support which helps in self-directed learning (Rennie & Mason, 2004) which is an important parameter for online learning. Community commitment (Bateman et al., 2011), immersion (Shin et al., 2013), we-intentions (Tsai & Bagozzi, 2014), sense of belongingness (Zhao et al., 2012), etc. from the VC would help students to continue the engagement for a better learning outcome. Moreover, it is found that collaborative chat participation in MOOCs slows down the rate of attrition over time (Ferschke, Yang, Tomar, & Rosé, 2015). It is of great importance to check if learning outcome improves when the virtual community is integrated or embedded in the learning environment (online and blended). The educators and managers should encourage their students and employees to participate in VCs. Third, the growth of the adoption of mobile devices has expanded the arena of e-learning platforms. Integrating the virtual communities via a mobile platform with online learning can foster the student engagement resulting in higher learning outcome. Fourth, cloud computing has great potential in dealing with the scalability issues arising from the rise in numbers of users, content, and resources in online learning. Furthermore, it can provide tremendous benefits to organizations as well as users in terms of ease of access, flexibility, and lower cost. Although a few studies cover cloud computing infrastructure in education and pedagogic processes, the empirical research on the cloud computing for education is very shallow (Baldassarre, Caivano, Dimauro, Gentile, & Visaggio, 2018). As the mobile devices are often limited by storage space,future researchers are invited to carry out effective research on the integration of cloud computing and mobile learning to understand the factors affecting learning outcome.ConclusionUnderstanding the antecedents of e-learning adoption, continuance, and learning outcomes in online platforms are essential in ensuring the successful implementation of technology in learning and achieving the maximum benefits. This study shows factors such as PU, PEoU, PE, culture, attitude, subjective norms, system and information inhibitors, etc. contribute to the adoption of technology. Factors such as satisfaction, confirmation, user involvement, system quality, information quality, feedback, self-efficacy, social identity, perceived benefits, etc. determine the continuation of technology use. This implies factors for adoption, and continuation intentions vary; the attitude and usefulness of a system are essential for adoption while the experience and satisfaction in the environment lead to continuation intention. It is also found from the literature that the learning outcomes depend on the self-efficacy, collaborative learning, team cohesion, technology fit, learning engagement, self-regulation, interest, etc.The contribution of the paper can be summarized as: understanding the factors that are studied for adoption, continuance, learning outcomes in an online environment, and the provision of future research directions for educators and managers for successful implementation of technology in online platforms to achieve maximum benefits.中文在线学习的采用,持续性和学习成果:文献综述摘要在全世界范围内,使用技术促进更好的学习和培训的势头正在增强,减少了与传统学习相关的时空问题。
计算机网络技术中英文对照外文翻译文献
![计算机网络技术中英文对照外文翻译文献](https://img.taocdn.com/s3/m/b42afacece2f0066f533223a.png)
中英文资料外文翻译网站建设技术1.介绍网络技术的发展,为今天全球性的信息交流与资在建立源共享和交往提供了更多的途径和可能。
足不出户便可以知晓天下大事,按几下键盘或点几下鼠标可以与远在千里之外的朋友交流,网上通信、网上浏览、网上交互、网上电子商务已成为现代人们生活的一部分。
Internet 时代, 造就了人们新的工作和生活方式,其互联性、开放性和共享信息的模式,打破了传统信息传播方式的重重壁垒,为人们带来了新的机遇。
随着计算机和信息时代的到来,人类社会前进的脚步在逐渐加快。
近几年网页设计发展,快得人目不暇接。
随着网页设计技术的发展,丰富多彩的网页成为网上一道亮丽的风景线。
要想设计美观实用的网页就应该深入掌握网站建设技术。
在建立网站时,我们分析了网站建立的目的、内容、功能、结构,应用了更多的网页设计技术。
2、网站的定义2.1 如何定义网站确定网站的任务和目标,是建设网站所面临的最重要的问题。
为什么人们会来到你的网站? 你有独特的服务吗? 人们第一次到你的网站是为了什么? 他们还会再来吗? 这些问题都是定义网站时必须考虑的问题。
要定义网站,首先,必须对整个网站有一个清晰认识,弄清到底要设计什么、主要的目的与任务、如何对任务进行组织与规划。
其次,保持网站的高品质。
在众多网站的激烈竞争中,高品质的产品是长期竞争的最大优势。
一个优秀的网站应具备:(1)用户访问网站的速度要快;(2)注意反馈与更新。
及时更新网站内容、及时反馈用户的要求;(3)首页设计要合理。
首页给访问者留下的第一印象很重要,设计务必精美,以求产生良好的视觉效果。
2.2 网站的内容和功能在网站的内容方面,就是要做到新、快、全三面。
网站内容的类型包括静态的、动态的、功能的和事物处理的。
确定网站的内容是根据网站的性质决定的,在设计政府网站、商业网站、科普性网站、公司介绍网站、教学交流网站等的内容和风格时各有不同。
我们建立的网站同这些类型的网站性质均不相同。
计算机专业毕业论文参考文献(精选115个最新)
![计算机专业毕业论文参考文献(精选115个最新)](https://img.taocdn.com/s3/m/6f2363c6227916888586d7dc.png)
计算机专业是计算机硬件与软件相结合、面向系统、更偏向应用的宽口径专业。
通过基础教学与专业训练,培养基础知识扎实、知识面宽、工程实践能力强,具有开拓创新意识,在计算机科学与技术领域从事科学研究、教育、开发和应用的高级人才。
以下是我们整理的计算机毕业论文参考文献,供你参考借鉴。
首先我们一起来看看关于计算机网络和计算机英文的参考文献,详情点击查看。
计算机网络参考文献(精选119个最新)计算机英文参考文献(最新推荐100个)接下来,是计算机各个专业的毕业论文参考文献,如需查看某篇论文全文,可以通过页面右上角↗的【文献求助】免费获取。
计算机专业毕业论文参考文献一:[1]王琨. Linux操作系统下的网络多媒体技术应用[D].西安电子科技大学,2001.[2]陆海波. 智能型掌上电脑(PDA)的研究与开发[D].电子科技大学,2001.[3]高玉金. WINDOWS环境下并行容错局域网的研究及实现[D].燕山大学,2000.[4]陈军. 分布式存储环境下并行计算可扩展性的研究与应用[D].中国人民解放军国防科学技术大学,2000.[5]王霜. 瓦楞纸箱CAD系统开发[D].四川大学,2000.[6]王茂均. 织带机智能监测管理系统研究[D].大连理工大学,2000.[7]郭朝华. 多处理器并行的星上计算机系统设计[D].中国科学院上海冶金研究所,2000.[8]刘胜. 拖拉机作业机组仿真试验台自动变速控制系统的研究[D].中国农业大学,2000.[9]陈新昌. 冷藏、保温汽车静态降温调温性能测试系统的研究[D].河南农业大学,2000.[10]毛鹏军. 智能化温室环境参数微机监控系统的设计研究[D].河南农业大学,2000.[11]史志存. 电子鼻及其应用研究[D].中国科学院电子学研究所,2000.[12]孟笛. 复合材料加筋板壳结构稳定性设计的可视化研究和实现[D].大连理工大学,2000.[13]刘鹏民. 涡街电磁流量计机理的研究与开发[D].北京化工大学,2000.[14]付岩. 通用脚本语言GSCRIPT设计与应用的研究[D].中国科学院研究生院(计算技术研究所),2000.[15]石争浩. 《计算机组成原理》CAI及其多媒体课件实现技术研究[D].西安理工大学,2000.[16]姚彤. 农机销售管理信息系统的设计与开发[D].东北农业大学,2000.[17]吕康娟. 基于地理信息系统(GIS)的小流域综合治理规划的研究[D].东北农业大学,2000.[18]邱建民. 北工大研究生教育管理信息系统[D].北京工业大学,2000.[19]刘春明. 变电站电压无功控制装置实用技术研究[D].华北电力大学,2000.[20]刘力力. 计算机系统性能评测与分析[D].中国科学院研究生院(计算技术研究所),2000.[21]宋蓬勃. 基于校园网的高校研究生教务管理系统[D].山东师范大学,2000.[22]陈永华. WebGIS三维可视化的研究[D].解放军信息工程大学,2000.[23]潘炜华. 新生隐球菌分子重组操作系统的建立及其荚膜相关基因的研究[D].第二军医大学,2000.[24]杨群生. 模糊联想记忆网络和模糊图象处理研究[D].华南理工大学,2000.[25]牛红军. 自动车辆定位系统的研究[D].西安理工大学,2000.[26]张志强. 网络环境下住房公积金管理信息系统的研究[D].华北电力大学,2000.[27]王笑风. 路面摊铺机械自动调平控制器的仿真测试器的研究[D].长安大学,2000.[28]黄晓华. 壁板铣床数控系统硬件结构的研究与开发[D].大连理工大学,2000.[29]景玲玲. 河南省公路地理信息系统的研制与开发[D].大连理工大学,2000.[30]李吉宽. 单片机模糊控制在船舶电站自动并车中的应用[D].大连海事大学,2000.计算机专业毕业论文参考文献二:[31]徐洪禹. 面向只读应用的分布式数据库的模型构造及查询优化的研究[D].大连理工大学,2000.[32]李卫东. 微机控制LED点阵显示屏[D].大连理工大学,2000.[33]常天海. 希望-IV型多媒体语音教室系统的研究与设计[D].大连理工大学,2000.[34]解宏基. 变频调速矢量控制交流三相异步电动机的仿真研究[D].大连海事大学,2000.[35]宋东方. 基于公路养护管理的GIS应用与开发[D].大连理工大学,2000.[36]王晓丽. 工程图扫描输入与智能识别技术的研究[D].大连理工大学,2000.[37]田宇. 基于客户机/服务器的大连市血液中心管理信息系统[D].大连理工大学,2000.[38]杨敬辉. 基于Intranet的大连市血液中心管理信息系统[D].大连理工大学,2000.[39]任彬. 一种新型的水表联网抄表系统[D].大连理工大学,2000.[40]童晨涛. 港口调度现代信息网络的研究[D].大连海事大学,2000.[41]李德良. 基于寄生传输的检测报警系统[D].大连理工大学,2000.[42]侯宗浩. 集成C/S、B/S结构的物资采供系统研究[D].西安理工大学,2000.[43]雷晓强. 冗余度机器人的轨迹规划与障碍物回避的实时控制[D].西安理工大学,2000.[44]徐前锋. 多模型优化模糊控制算法的应用研究[D].西安理工大学,2000.[45]杨沂. 基于Intranet的电力综合管理信息系统分析与设计及用户满意度评价方法的研究[D].西安理工大学,2000.[46]张怀领. 异构环境下的分布式数据库事务处理的研究与实践[D].大连理工大学,2000.[47]王振华. 近海结构基础设计程序系统[D].大连理工大学,2000.[48]王琳. 基于软计算的智能控制器的研究[D].大连海事大学,2000.[49]何志刚. 基于Internet/Intranet技术的MIS应用与开发[D].大连海事大学,2000.[50]刘中兵. 焊缝图象识别的研究及应用[D].大连理工大学,2000.[51]崔鸿远. 玉米播种机工况监测系统的研究与试验[D].中国农业大学,2000.[52]田健. 超音频感应加热电源的研制[D].西安理工大学,2000.[53]祝华军. 小城镇规划及基础设施投资问题研究[D].中国农业大学,2000.[54]孙毅. 渭河洪水错峰调度决策支持系统[D].西安理工大学,2000.[55]张寿桂. 厦门港集装箱运输MIS总体规划研究[D].大连海事大学,2000.[56]王涛. 船舶管理信息系统的研究[D].大连海事大学,2000.[57]杨媛. 智能化超声波水流量计的理论分析与软件开发[D].西安理工大学,2000.[58]史庆国. 壁面机器人路径规划与控制系统研究[D].河北工业大学,2000.[59]田永青. 模糊控制系统的结构化分析[D].河北工业大学,2000.[60]丁承君. 基于神经网络和模糊控制的移动机器人墙跟踪[D].河北工业大学,2000.计算机专业毕业论文参考文献三:[61]周颖. 基于模糊滑动面的滑动模态控制方法研究[D].河北工业大学,2000.[62]张建华. 集中供热系统的水力计算及地理信息系统的开发[D].华北电力大学,2000.[63]徐延明. 地理信息系统在配电管理系统中的应用研究[D].华北电力大学,2000.[64]于成. 综合船舶信息处理与显示系统[D].大连海事大学,2000.[65]苏利敏. 新型串级调速系统的研究[D].河北工业大学,2000.[66]刘丽华. 大功率超声发生器的研制及超声乳化的实验研究[D].华北电力大学,2000.[67]孙东卫. 都江堰水利自动化控制系统设计[D].电子科技大学,1999.[68]胡霞光. 青藏公路CAE系统的研究与开发[D].长安大学,1999.[69]尹宏宾. 智能化信号交叉口控制及其交通量预测方法的研究[D].华南理工大学,1999.[70]邱焕耀. 模糊控制、神经网络和变结构控制的交叉结合及其应用研究[D].华南理工大学,1999.[71]张星明. 地质图象处理算法的研究与实现[D].中国科学院研究生院(计算技术研究所),1999.[72]孟小峰. 中文数据库自然语言查询处理研究[D].中国科学院研究生院(计算技术研究所),1999.[73]王灏. 机器人智能控制方法研究[D].华南理工大学,1999.[74]庄圣贤. 无传感速度伺服矢量变频调速系统的研究[D].电子科技大学,1999.[75]王伟. 序列图象的几何约束及其应用[D].西安电子科技大学,1998.[76]张光海. 受限柔性机器人装置、建模与控制的研究[D].华南理工大学,1998.[77]金菊良. 遗传算法及其在水问题中的应用[D].河海大学,1998.[78]樊晓平. 受限柔性机器人的动力学建模与智能控制[D].华南理工大学,1998.[79]黄道平. 多变量非线性过程控制[D].华南理工大学,1998.[80]陈虔. 大型应用软件协同开发的版本控制和管理—面向组件增量的版本控制方法[D].中国科学院研究生院(高能物理研究所),1997.[81]刘黎临. 大型信息网络设计与性能研究[D].中国科学院研究生院(计算技术研究所),1998.[82]牟树波. ACPI标准的实现技术[D].中国科学院研究生院(计算技术研究所),1998.[83]侯春海. 工程中时延动态系统的定量稳定性分析[D].浙江大学,1997.[84]孙富春. 机械手的神经网络稳定自适应控制[D].清华大学,1997.[85]周勇. 遥感和地理信息系统支持的土水资源分类、评价与预测研究[D].华中农业大学,1997.[86]李明. 基于工作站网络的分布式共享存储系统的设计[D].中国科学院研究生院(计算技术研究所),1997.[87]王晓鸥. 计算机控制短波自适应通信网的实现[D].中国科学院研究生院(计算技术研究所),1997.[88]周小佳. 电力系统可靠性人工神经网络模型及实现研究[D].重庆大学,1997.[89]李永树. 地表移动预计方法及信息处理(SPDP)系统研究[D].中国矿业大学(北京),1997.[90]孙毓忠. 互连网络性能分析及其应用[D].中国科学院研究生院(计算技术研究所),1997.计算机专业毕业论文参考文献四:[91]马森. 曙光2000单一系统映象文件系统COSMOS操作系统相关层的设计和实现[D].中国科学院研究生院(计算技术研究所),1997.[92]陈晨风. 高性能交流伺服系统的智能控制策略[D].浙江大学,1997.[93]林峰. 交流传动系统的控制策略[D].浙江大学,1997.[94]陈小红. 径向基函数网络及其在非线性控制中的应用[D].浙江大学,1996.[95]陈晓青. 高性能交流伺服系统的研究与开发[D].浙江大学,1996.[96]周宏甫. 六坐标工具磨床CNC系统的关键技术研究[D].华中理工大学,1996.[97]王杰. 高精度交流伺服系统的新型控制策略[D].浙江大学,1996.[98]金连文. 手写体汉字识别的研究[D].华南理工大学,1996.[99]戴建荣. 胶片剂量仪软件开发及其在X线立体定向放疗技术中的应用[D].中国协和医科大学,1996.[100]张虹. 并行计算机系统的用户界面研究与设计[D].中国科学院研究生院(计算技术研究所),1996.[101]朱群雄. 神经网络结构理论与技术的研究及其在过程模拟与过程控制中的应用[D].北京化工大学,1996.[102]张朝海. 电力系统运行与控制[D].华南理工大学,1996.[103]侯昭胤. 神经网络辅助丙烷氨氧化催化剂设计[D].浙江大学,1996.[104]毕立群. 换热网络智能综合方法的理论研究与实践[D].北京化工大学,1995.[105]韦巍. 学习控制及其在机器人控制中的应用[D].浙江大学,1994.[106]金毅. 模糊集合论在生产计划和调度中的应用研究[D].东南大学,1994.[107]蒋其友. 人工智能理论与技术的研究及其在大型离心式压缩机故障诊断中的应用[D].北京化工大学,1993.[108]黄崇福. 信息扩散原理与计算思维及其在地震工程中的应用[D].北京师范大学,1992.[109]贾家麟. 城市环境工程地质系统工程分析方法及其应用[D].中国地质科学院,1992.[110]杨冀宏. 人工智能技术在分离过程综合中的应用研究[D].北京化工大学,1990.[111]钟勇. 人体胚胎视交叉微血管的实验研究[D].中国协和医科大学,1990.[112]赵一举. 肺动脉高压辅助诊断[D].中国协和医科大学,1989.[113]严晓光. 胶鞋模具CAD/CAM一体化技术的研究[D].华中理工大学,1988.[114]陈申. 连续搅拌反应釜(CSTR)计算机实时控制[D].浙江大学,1988.[115]朱善安. 电液控制系统辨识及实时控制策略研究[D].浙江大学,1987.以上就是关于计算机专业毕业论文参考文献的分享,希望对你有所帮助。
社交网络和大众传媒中英文对照外文翻译文献
![社交网络和大众传媒中英文对照外文翻译文献](https://img.taocdn.com/s3/m/f151230b59eef8c75fbfb34c.png)
中英文对照翻译(文档含英文原文和中文翻译)Social Networks and the Mass MediaAdapted from: American Political Science Review,2013,107 Social networking has become an every day part of many peoples’lives as evidenced by the huge user communities that are part of such networks. Facebook, for instance, was launched in February 2004 by Harvard under graduate students as an alternative to the traditional stud ent directory. In tended to cover interaction between students at Univers ities–Facebook enables individuals to encourage others to joint he network through personalized invitations, friend suggestions and creation of s pecialist groups. Today Facebook has a much wider take up than just s tudents at Universities. Facebook now facilitates interaction between peo ple by enabling sharing of common interests, videos, photos, etc. Sharin g,Some social network populations exceed that of large countries, for example Facebook has over 350 million active users. Social networks provide a platform to facilitate communication and sharing between user s, in an attempt to model real world relationships. Social networking ha s now also extended beyond communication between friends; for instanc e, there are a multitude of integrated applications that are now made a vailable by companies, and some organizations use such applications, su ch as Facebook Connect to authenticate users, i.e. they utilize a user’s Facebook credentials rather than requiring their own credentials(for exa mple the Calgary Airport authority in Canada uses Facebook Connect t o grant access to their WiFi network). This ability to combine a third party application (including its local data) to authenticate users demonstr ates the service-oriented approach to application development. By tappin g into an already established community around a particular social netw orking platform, it becomes unnecessary to require users to register wit h another system.The structure of a Social Network is essentially the formation of a dynamic virtual community with inherent trust relationships between fri ends. (Szmigin et al., 2006) identify how “relationship marketing” (ident ified as referring to all marketing activities directed towards establishing, developing and maintaining successful relational exchanges) can be faci litated through the creation of on-line communities. They discuss how o n-line communities can be used to facilitate interaction and bonding bet ween consumer and suppliers, intermediate parties and specific brands. Similarly, (Shang et al., 2006) discuss how brand loyalty can be achiev ed through various types of participation within an on-line community (focusing specifically on the –a virtual communit y of Apple users in Taiwan). They discuss the motivation for individua ls to promote certain products during on-line discussions (active particip ants) and for others to remain as lurkers (passive participants). The stu dy particularly focuses on the incentives for participants to contribute to an on-line community, based on the perception of a user about the de gree of relevance towards an object that is being discussed –focusing on both cognitive (based on utilitarian motive –concerning an individua l’s concern with the cost and benefit of the product or service) and aff ective (a value-expressive motive, referring to an indi vidual’s interest in enhancing self-esteem or self-conception, and in projecting his/her desir ed self-image to the outside world through the product or service).It is also useful to understand, for instance, how such trust relation ships could be used as a foundation for resource (information, hardware, services) sharing. Cloud environments are typically focused on providin g low level abstractions of computation or storage. Using this approach, a user is able to access (on a short term/rental basis) capacity that is owned by another person or business (generally over a computer networ k). In this way, a user is able to outsource their computing requirement s to an external provider –limiting their exposure to cost associated wi th systems management and energy use. Computation and Storage Clou ds are complementary and act as building blocks from which applicatio ns can be constructed –using a technique referred to as “mash-ups”. S torage Clouds are gaining popularity as a way to extend the capabilities of storage-limited devices such as phones and other mobile devices. T here are also a multitude of commercial Cloud providers such as Amaz on EC2/S3, Google App Engine, Microsoft Azure and also many smalle r scale open clouds like Nimbus (Keahey et al., 2005) and Eucalyptus (Nurmi et al., 2009). A Social Cloud (Chard et al., 2010), on the other hand, is a scalable computing model in which virtualized resources co ntributed by users are dynamically provisioned amongst a group of frie nds. Compensation for use is optional as users may wish to share reso urces without payment, and rather utilize a reciprocal credit (or barter) based model (Andrade et al., 2010). In both cases guarantees are offered through customized Service Level Agreements (SLAs). In a sense, thi s model is similar to a Volunteer computing approach, in that friends s hare resources amongst each other for little to no gain. However, unlik e Volunteer models there is inherent accountability through existing frie nd relationships. There are a number of advantages gained by leveraging social networking platforms, in particular one can gain access to hug e user communities, can exploit existing user management functionality, and rely on pre-established trust formed through existing user relations hips.The author thanks Jason Barabas, Jon Bendor, Ted Carmines, Jami e Druckman, John Freeman, Matt Golder, Sona Golder, Bob Jackson, J enn Jerit, Kris Kanthak, ?zge Kemahlioglu, Charlotte Lee, Valerie Marti nez-Ebers, Adam Meirowitz, Scott McClurg, Will Moore, Chris Reenock, John Ryan, John Scholz, Jake Shapiro, Anand Sokhey, Jeff Staton, Ji m Stimson, Craig Volden, Jon Woon, four very helpful anonymous revi ewers, and audiences in the Political Economics group at the Stanford GSB, Political Science departments at FSU, GWU, Minnesota, Pittsburg h, and Stony Brook, and the Frank Batten School of Leadership and P ublic Policy at UVa. Any errors are my own.To begin to answer this question, I develop a novel theory of aggr egate opinion and behavior. The theory considers a heterogeneous popul ation of individuals who must choose between dichotomous options. It incorporates the interaction of social network and mass media influences at the individual level; its key assumption is that the more others cho ose an option, the more one is apt to do so as well. In the theory, soc ial networks provide information about the choices of those to whom o ne is directly connected, while the mass media provide (potentially bias ed) information about aggregate choice. The theory thus applies to, for example, voter turnout and political participation (e.g., Gerber, Green, a nd Larimer 2008; Lake and Huckfeldt 1998; Leighley 1990; McClurg 2 003; Rolfe 2012), opinion formation (e.g., Beck et al. 2002; Druckman and Nelson 2003; Huckfeldt and Sprague 1995), protests and social mo vements (e.g., Kuran 1991; McAdam 1986), and vote choice (e.g., Beck 2002; Huckfeldt and Sprague 1995; Ryan 2011; Sinclair 2012; Sokhey and McClurg 2012).Three major results follow from this theory. All hold both when in dividuals treat media identically and when they select into media in lin e with their preferences. First, understanding the aggregate effect of the media generally requires considering social networks, because social ne twork structure conditions media's impact. For example, additional weak ties between disparate social groups can reduce the media's impact, an d the presence of unified social elites can eliminate the media's impact entirely in the aggregate. Empirical studies of media impact that fail t o consider media's interaction with social networks risk bias.Second, social networks can amplify the effect of media bias. A bi ased media outlet that systematically under- or over-reports a poll of th e population by a only a few percentage points can in some cases swi ng aggregate behavior (e.g., turnout or vote share) by over 20% in eith er direction due to positive feedback within the network. Open advocate s in the media can have a yet larger impact even when not comparativ ely influential. Unified social elites limit the effect of media bias, but c annot fully counter an advocate; selection into media, made ever easier with technological improvements, tends to enhance the effect of bias. We should therefore expect media bias to become increasingly importan t to aggregate behavior.AN INDIVIDUAL-LEVEL THEORY OF AGGREGATE BEHAVIO RThough I present a theory of aggregate behavior, it is based on in dividual-level assumptions informed by what we know about the way p ersonal characteristics, social networks, and mass media outlets affect in dividual behavior. Due to this, the theory can explore the effect that int eractions between these three factors have on aggregate behavior. As i mportantly, the theory incorporates empirically realistic heterogeneity acr oss people in allthree factors.Additionally, people are exposed to individuals, groups, and organiz ations external to one's network, such as mass media outlets, state prop aganda, national party leaders, NGOs, and Internet personalities. These outlets can provide information, increasing political knowledge.As this small sampling of large literatures indicates, individuals' de cisions are influenced by the information they obtain via both local soc ial networks and global media outlets. However, comparatively little sch olarship has explored the three-way interaction of personal characteristic s, social networks, and mediaIn the second type of bias, which I call advocacy, the media outle t simply states a preference for one of the options, providing no inform ation about aggregate support. The goal in advocacy is to sway the po pulation toward one or the other option. As before, many goals could u nderlie advocacy beyond just the support of a biased media outlet's pre ferences. Advocacy represents the editorial power of the media or the i nfluence of an external actor; it is a "one-message" model (Zaller 1992).I focus my analysis in all three sections on the case in which one of the two options is the status quo, and all individuals begin supporti ng it. For political participation and social movements, the status quo is not participating. For opinion formation and vote choice, the status qu o is an existing option such as a policy in place or an incumbent politician, as contrasted with an alternative such as a newly proposed policy or a challenging politician. For simplicity I subsequently call participat ion the option that is not the status quo; this should be read as "partici pation in support of" the option that is not the status quo in contexts o ther than political participation or social movements.In my analysis I simultaneously vary media strength, network prop erties, media bias, and, for two outlets, the strength of the L outlet. Th ough I keep my analysis to two biased outlets, it can easily be extende d to multiple biased outlets with the addition of parameters dictating th eir relative strengths.译文:社交网络和大众传媒社交网络已经成为许多人每天生活的一部分,即证明了这种网络庞大的用户群体。
信息技术发展趋势研究论文中英文外文翻译文献
![信息技术发展趋势研究论文中英文外文翻译文献](https://img.taocdn.com/s3/m/9e5a0b652bf90242a8956bec0975f46527d3a7cc.png)
信息技术发展趋势研究论文中英文外文翻译文献本文旨在通过翻译介绍几篇关于信息技术发展趋势的外文文献,以帮助读者更全面、深入地了解该领域的研究进展。
以下是几篇相关文献的简要介绍:1. 文献标题: "Emerging Trends in Information Technology"- 作者: John Smith- 发表年份: 2019本文调查了信息技术领域的新兴趋势,包括人工智能、大数据、云计算和物联网等。
通过对相关案例的分析,研究人员得出了一些关于这些趋势的结论,并探讨了它们对企业和社会的潜在影响。
2. 文献标题: "Cybersecurity Challenges in the Digital Age"- 作者: Anna Johnson- 发表年份: 2020这篇文献探讨了数字时代中信息技术领域所面临的网络安全挑战。
通过分析日益复杂的网络威胁和攻击方式,研究人员提出了一些应对策略,并讨论了如何提高组织和个人的网络安全防护能力。
3. 文献标题: "The Impact of Artificial Intelligence on Job Market"- 作者: Sarah Thompson- 发表年份: 2018这篇文献研究了人工智能对就业市场的影响。
作者通过分析行业数据和相关研究,讨论了自动化和智能化技术对各个行业和职位的潜在影响,并提出了一些建议以适应未来就业市场的变化。
以上是对几篇外文文献的简要介绍,它们涵盖了信息技术发展趋势的不同方面。
读者可以根据需求进一步查阅这些文献,以获得更深入的了解和研究。
网络安全与防火墙 英文文献翻译
![网络安全与防火墙 英文文献翻译](https://img.taocdn.com/s3/m/23404154eff9aef8941e06cc.png)
网络安全与防火墙英文文献翻译Research of Network Security and Firewalls TechniquesAbstract:As the key facility that maintains the network security , firewalls take the purpose of establishing an obstacle between trust and trustless network, and put corresponding safety strategy into practice. In this paper , the computer network security and the techniques of firewalls were mainly discussed, the concept and classification of the firewalls were introduced. It also introduced three kind's of basic implement techniques of the firewalls: Packet filtering , Application Proxy and Monitor model in detail. Finally described the trend of development of the firewalls techniques in Internet briefly.Key words: network security, firewalls, Packet filtering, monitor1. IntroductionNow with the computer network and e-commerce used widely, network security has become an important problem that we must consider and resolve. More and more professions. enterprises and individuals surfer from the security problem in different degree. they are looking for the more reliable safety solution . In the defense system adopted by networksecurity at present, the firewalls stand the very important position.As the key facility that maintains the network security. firewalls take the purpose of establishing an obstacle between trust and trustless network, and put corresponding safety strategy into practice.All the firewalls have the function to filter the IP address. This task checks the IP packet, makes the decision whether to release or to abandon it according to the source address and destination address of the IP. Shown in Fig.I, there is a firewall between two network sections, an UNIX computer is on one side of the firewall, and the other side is a PC client. While the PC client asks a telnet request for the UNIX computer, the client procedure of telnet in the PC produces a TCP packet and passes the packet to the local protocol stack to prepare to send. The protocol stack fills it in one IP packet. then, sends it to UNIX computer through the path defined by the TCP/IP stack of PC. The IP packet can't reach the UNIX computer until it passes the firewall between the PC and the UNIX computer.Fig. I Ip Address FilteringThe application firewall is a very efficient means of network security on Internet, it is installed between the trust and trustless network, can isolate the connection between the trust and trustless network, and doesn't hamper people's access to the trustless network at the same time. It can isolate the connection between the risk area namelythere may be a certain risk on Internet and the safe area LAN , and doesn't hamper people's access to the risk area at the same time. Firewall can monitor the traffic flowing in and out from the network to finish the task seemingly impossible;it only allows the safe and checked information to enter into, and meanwhile resists on the data that may bring about the threat to enterprise. As the fault and defect of the security problem become more and more general, the invasion to the network not only comes from the super attack means, but also may be from the lower-level mistakes or improper password selections on the configuration. So, the function of the firewalls is preventing the communication that not hoped and authorized passes in and out of the network protected. forcing the companies to strengthen their own network security policy. The general firewalls can achieve the following purposes: First, restraining others from entering the inside network, filtering the unsafe service and illegal user; Second, preventing the invaders from closing to your defense installation; Third,limiting the user to access the special site; Fourth,providing convenience for monitoring the Internet security.2. The classification and implement technology of firewallsAn integrated firewalls system usually consists of screening router and proxy server. The screening router is a multi-port IP router. it check the each coming IP packet according to the group regular to judge whether to transmit it. The screening router gets information from thepacket. fot example the protocol number. the IP address and port number that receiving and sending massages. the flag of link even some other IP selections. filtering IP packet. The proxy server are server process in the firewall. it can replace the network user to finish the specific TCP/IP function. A proxy server is naturally a gateway of application layer. a gateway of two networks joined specific network application. Users contact with proxy server by one of the TCP/IP application such as Telnet or FTP. the proxy server ask the users for the name of the remote host. which users want to access. After the users have answered and offered the correct users' identities and authentication information, the proxy server communicates the remote host, act as the relay between two communication sites. The whole course can be totally transparent to users.There are mainly three types in the firewalls: packet filtering. application gateways and state detection.Packet filtering firewall works on the network layer.it can filter the source address. destination address. source port and destination port of TCP/IP data packet. It has advantages such as the higher efficiency.transparent to user. and users might not feel the existence of the packer filtering firewall, unless he is the illegal user and has been refused. The shortcomings are that it can't ensure the security to most services and protocols, unable to distinguish the different users of thesame IP address effectively,and it is difficult to be configured, monitored and managed. can't offer enough daily records and warning.The application gateways firewall performs its function on the application layer, it connects with specific middle-joint firewall by a client procedure, and then the middle-joint connects with the server actually. Unlike the packet filtering firewall. when using the firewall of this kind. there is no direct connection between the outside networks. so even if the matter has happened in the firewall. the outside networks can't connect with networks protected. The application gateway firewall offers the detailed daily records and auditing function, it improved the security of the network greatly. and provides the possibility to improve the security performance of the existing software too. The application gateways firewall solves the safety problem based on the specific application program. the products based on Proxy will be improved to configure the service in common use and non-standard port. However. so long as the application program needs upgrading. the users based on Proxy will find that they must buy new Proxy server. As a technique of network safety. Firewall combined with proxy server has simple and practical characteristics, can reach a certain security request in case of not revising the original network application system. However. if the firewall system is broken through. the network protected is in having no state of protecting. And if an enterprise hopes to launch the businessactivity on Internet and carry on communication with numerous customers. it can't meet the demands. In addition, the firewall based on Proxy Service will often makes the performance of the network obviously drop.The third generation of firewall takes the detection technique of state as the core, combines the packet filtering firewall and application gateways firewall. The state detection firewall accesses and analyzes the data achieved from the communication layer through the module of state detection to perform its function. The state monitor act as firewall technique. it is best in security perfonnance, it adopts a software engine.which executes the tactics of network security on the gateways, called the detection module. On the premise of not influencing the network to work normally, detection module collects the relevant data to monitor each of the network communication layers, collects a part of data, namely status information, and stores the data up dynamically for the reference in making security decision afterward. Detection modulesupports many kinds of protocols and application program, and can implement the expansion of application and service very easily. Different from other safety schemes, before the user's access reaches the operating system of network gateways, the state monitor should collect the relevant data to analyze, combine network configuration and safety regulation to make the decisions of acceptance, refutation, appraisal or encrypting tothe communication etc Once a certain access violates the security regulation, the safety alarm will refuse it and write down to report the state of the network to the system management device. This technology has defects too, namely the configuration of the state monitor is very complicated, and will decelerate the network.3. New generation technique of firewallsAccording to the present firewalls market, the domestic and international manufacturers of firewall can all support the basic function of the firewall well,including access control, the network address transform, proxy, authentication, daily records audit etc. However, as stated before, with the attack to the network increasing, and user's requisition for network security improving day by day, the firewall must get further development. Combine the present experience of research and development and the achievement,some relevant studies point out, according to the development trend of application and technology, how to strengthen the security of firewall, improve the performance of firewall, enrich the function of firewall, will become the problem that the manufacturer of firewalls must face and solve next.The purpose of the new generation firewall is mainly combining the packet filtering and proxy technology, overcoming the defects in the safety respect of two; being able to exert the omnidirectional control from the layer of data chain to the application layer; implementing themicro-kernel of TCP/IP protocol to perform all the security control on the layer of TCP/IP protocol; based on the micro-kernel above, making the speed to exceed thetraditional packet filtering firewall; Offering the transparent mode of proxy. lightening the configuration work on the client; Supporting the data encryption and decryption DES and RSA , offering the strong support to the Virtual Private Network VPN; hiding the Inside information totally; producing a new firewall theory.The new techniqe of firewalls has not only covered all the functions of traditional packet filtering firewalls, but also has remarkable advantages in opposing overall the attack means of IP deception, SYN Flood, ICMP. ARP, etc. strengthening proxy service, merging it with packet filtering, then adding the intelligence filtering technology to make the security of the firewall rising to another height.4. ConclusionNow the firewall has already been widely used on Internet, and because of its characteristic of not limited to the TCP/IP protocol, it has more vitality outside Internet progressively too. To be subjective, the firewall is not the omnipotent prescription of solving the problem of network security, but only a component of the network security policy and tactics. However, understanding the technology of firewall and learning to use it in actual operation, believing that every net friend may bebenefited a lot from the network life in the new century.外文资料翻译译文摘要:作为关键设施,维护网络的安全性,防火墙采取建立信任与不可靠的网络障碍的目的,并落实相应的安全策略。
网络工程英文文献及中文翻译servlet和jsp技术简述本科毕业论文
![网络工程英文文献及中文翻译servlet和jsp技术简述本科毕业论文](https://img.taocdn.com/s3/m/48f102104a7302768e993926.png)
毕业设计说明书英文文献及中文翻译学生姓名: 学号:学 院:专 业:指导教师:2013年6月0906064109 电子与计算机科学技术学院 网络工程An Overview of Servlet and JSP TechnologyGildas Avoine and Philippe OechslinEPFL, Lausanne, Switzerland1.1 A Servlet's JobServlets are Java programs that run on Web or application servers, acting as a middle layer between requests coming from Web browsers or other HTTP clients and databases or applications on the HTTP server. Their job is to perform the following tasks, as illustrated in Figure 1-1.Figure 1-11.Read the explicit data sent by the client.The end user normally enters this data in an HTML form on a Web page. However, the data could also come from an applet or a custom HTTP client program.2.Read the implicit HTTP request data sent by the browser.Figure 1-1 shows a single arrow going from the client to the Web server (the layer where servlets and JSP execute), but there are really two varieties of data: the explicit data that the end user enters in a form and the behind-the-scenes HTTP information. Both varieties are critical. The HTTP information includes cookies, information about media types and compression schemes the browser understands, and so on. 3.Generate the results.This process may require talking to a database, executing an RMI or EJB call, invoking a Web service, or computing the response directly. Your real data may be in a relational database. Fine. But your database probably doesn't speak HTTP or return results in HTML, so the Web browser can't talk directly to the database. Even if it could, for security reasons, you probably would not want it to. The same argumentapplies to most other applications. You need the Web middle layer to extract the incoming data from the HTTP stream, talk to the application, and embed the results inside a document.4.Send the explicit data (i.e., the document) to the client.This document can be sent in a variety of formats, including text (HTML or XML), binary (GIF images), or even a compressed format like gzip that is layered on top of some other underlying format. But, HTML is by far the most common format, so an important servlet/JSP task is to wrap the results inside of HTML.5.Send the implicit HTTP response data.Figure 1-1 shows a single arrow going from the Web middle layer (the servlet or JSP page) to the client. But, there are really two varieties of data sent: the document itself and the behind-the-scenes HTTP information. Again, both varieties are critical to effective development. Sending HTTP response data involves telling the browser or other client what type of document is being returned (e.g., HTML), setting cookies and caching parameters, and other such tasks.1.2 Why Build Web Pages Dynamically?many client requests can be satisfied by prebuilt documents, and the server would handle these requests without invoking servlets. In many cases, however, a static result is not sufficient, and a page needs to be generated for each request. There are a number of reasons why Web pages need to be built on-the-fly:1.The Web page is based on data sent by the client.For instance, the results page from search engines and order-confirmation pages at online stores are specific to particular user requests. You don't know what to display until you read the data that the user submits. Just remember that the user submits two kinds of data: explicit (i.e., HTML form data) and implicit (i.e., HTTP request headers). Either kind of input can be used to build the output page. In particular, it is quite common to build a user-specific page based on a cookie value.2.The Web page is derived from data that changes frequently.If the page changes for every request, then you certainly need to build the response at request time. If it changes only periodically, however, you could do it two ways: you could periodically build a new Web page on the server (independently of client requests), or you could wait and only build the page when the user requests it. The right approach depends on the situation, but sometimes it is more convenient to do the latter: wait for the user request. For example, a weather report or news headlines site might build the pages dynamically, perhaps returning a previously built page if that page is still up to date.3.The Web page uses information from corporate databases or other server-side sources.If the information is in a database, you need server-side processing even if the client is using dynamic Web content such as an applet. Imagine using an applet by itself for a search engine site:"Downloading 50 terabyte applet, please wait!" Obviously, that is silly; you need to talk to the database. Going from the client to the Web tier to the database (a three-tier approach) instead of from an applet directly to a database (a two-tier approach) provides increased flexibility and security with little or no performance penalty. After all, the database call is usually the rate-limiting step, so going through the Web server does not slow things down. In fact, a three-tier approach is often faster because the middle tier can perform caching and connection pooling.In principle, servlets are not restricted to Web or application servers that handle HTTP requests but can be used for other types of servers as well. For example, servlets could be embedded in FTP or mail servers to extend their functionality. And, a servlet API for SIP (Session Initiation Protocol) servers was recently standardized (see /en/jsr/detail?id=116). In practice, however, this use of servlets has not caught on, and we'll only be discussing HTTP servlets.1.3 The Advantages of Servlets Over "Traditional" CGIJava servlets are more efficient, easier to use, more powerful, more portable, safer,and cheaper than traditional CGI and many alternative CGI-like technologies. 1.EfficientWith traditional CGI, a new process is started for each HTTP request. If the CGI program itself is relatively short, the overhead of starting the process can dominate the execution time. With servlets, the Java virtual machine stays running and handles each request with a lightweight Java thread, not a heavyweight operating system process. Similarly, in traditional CGI, if there are N requests to the same CGI program, the code for the CGI program is loaded into memory N times. With servlets, however, there would be N threads, but only a single copy of the servlet class would be loaded. This approach reduces server memory requirements and saves time by instantiating fewer objects. Finally, when a CGI program finishes handling a request, the program terminates. This approach makes it difficult to cache computations, keep database connections open, and perform other optimizations that rely on persistent data. Servlets, however, remain in memory even after they complete a response, so it is straightforward to store arbitrarily complex data between client requests. 2.ConvenientServlets have an extensive infrastructure for automatically parsing and decoding HTML form data, reading and setting HTTP headers, handling cookies, tracking sessions, and many other such high-level utilities. In CGI, you have to do much of this yourself. Besides, if you already know the Java programming language, why learn Perl too? You're already convinced that Java technology makes for more reliable and reusable code than does Visual Basic, VBScript, or C++. Why go back to those languages for server-side programming?3.PowerfulServlets support several capabilities that are difficult or impossible to accomplish with regular CGI. Servlets can talk directly to the Web server, whereas regular CGI programs cannot, at least not without using a server-specific API. Communicating with the Web server makes it easier to translate relative URLs into concrete path names, for instance. Multiple servlets can also share data, making it easy to implement database connection pooling and similar resource-sharing optimizations.Servlets can also maintain information from request to request, simplifying techniques like session tracking and caching of previous computations.4.PortableServlets are written in the Java programming language and follow a standard API. Servlets are supported directly or by a plugin on virtually every major Web server. Consequently, servlets written for, say, Macromedia JRun can run virtually unchanged on Apache Tomcat, Microsoft Internet Information Server (with a separate plugin), IBM WebSphere, iPlanet Enterprise Server, Oracle9i AS, or StarNine WebStar. They are part of the Java 2 Platform, Enterprise Edition, so industry support for servlets is becoming even more pervasive.5.InexpensiveA number of free or very inexpensive Web servers are good for development use or deployment of low- or medium-volume Web sites. Thus, with servlets and JSP you can start with a free or inexpensive server and migrate to more expensive servers with high-performance capabilities or advanced administration utilities only after your project meets initial success. This is in contrast to many of the other CGI alternatives, which require a significant initial investment for the purchase of a proprietary package.Price and portability are somewhat connected. For example, Marty tries to keep track of the countries of readers that send him questions by email. India was near the top of the list, probably #2 behind the U.S. Marty also taught one of his JSP and servlet training courses (see /) in Manila, and there was great interest in servlet and JSP technology there.Now, why are India and the Philippines both so interested? We surmise that the answer is twofold. First, both countries have large pools of well-educated software developers. Second, both countries have (or had, at that time) highly unfavorable currency exchange rates against the U.S. dollar. So, buying a special-purpose Web server from a U.S. company consumed a large part of early project funds.But, with servlets and JSP, they could start with a free server: Apache Tomcat (either standalone, embedded in the regular Apache Web server, or embedded inMicrosoft IIS). Once the project starts to become successful, they could move to a server like Caucho Resin that had higher performance and easier administration but that is not free. But none of their servlets or JSP pages have to be rewritten. If their project becomes even larger, they might want to move to a distributed (clustered) environment. No problem: they could move to Macromedia JRun Professional, which supports distributed applications (Web farms). Again, none of their servlets or JSP pages have to be rewritten. If the project becomes quite large and complex, they might want to use Enterprise JavaBeans (EJB) to encapsulate their business logic. So, they might switch to BEA WebLogic or Oracle9i AS. Again, none of their servlets or JSP pages have to be rewritten. Finally, if their project becomes even bigger, they might move it off of their Linux box and onto an IBM mainframe running IBM WebSphere. But once again, none of their servlets or JSP pages have to be rewritten.6.SecureOne of the main sources of vulnerabilities in traditional CGI stems from the fact that the programs are often executed by general-purpose operating system shells. So, the CGI programmer must be careful to filter out characters such as backquotes and semicolons that are treated specially by the shell. Implementing this precaution is harder than one might think, and weaknesses stemming from this problem are constantly being uncovered in widely used CGI libraries.A second source of problems is the fact that some CGI programs are processed by languages that do not automatically check array or string bounds. For example, in C and C++ it is perfectly legal to allocate a 100-element array and then write into the 999th "element," which is really some random part of program memory. So, programmers who forget to perform this check open up their system to deliberate or accidental buffer overflow attacks.Servlets suffer from neither of these problems. Even if a servlet executes a system call (e.g., with Runtime.exec or JNI) to invoke a program on the local operating system, it does not use a shell to do so. And, of course, array bounds checking and other memory protection features are a central part of the Java programming language.谢谢海南社区支持:/7.MainstreamThere are a lot of good technologies out there. But if vendors don't support them and developers don't know how to use them, what good are they? Servlet and JSP technology is supported by servers from Apache, Oracle, IBM, Sybase, BEA, Macromedia, Caucho, Sun/iPlanet, New Atlanta, ATG, Fujitsu, Lutris, Silverstream, the World Wide Web Consortium (W3C), and many others. Several low-cost plugins add support to Microsoft IIS and Zeus as well. They run on Windows, Unix/Linux, MacOS, VMS, and IBM mainframe operating systems. They are the single most popular application of the Java programming language. They are arguably the most popular choice for developing medium to large Web applications. They are used by the airline industry (most United Airlines and Delta Airlines Web sites), e-commerce (), online banking (First USA Bank, Banco Popular de Puerto Rico), Web search engines/portals (), large financial sites (American Century Investments), and hundreds of other sites that you visit every day.Of course, popularity alone is no proof of good technology. Numerous counter-examples abound. But our point is that you are not experimenting with a new and unproven technology when you work with server-side Java.Servlet和JSP技术简述Gildas Avoine and Philippe OechslinEPFL, Lausanne, Switzerland1.1 Servlet的功能Servlets是运行在Web或应用服务器上的Java程序,它是一个中间层,负责连接来自Web浏览器或其他HTTP客户程序的请求和HTTP服务器上的数据库或应用程序。
5G无线通信网络中英文对照外文翻译文献
![5G无线通信网络中英文对照外文翻译文献](https://img.taocdn.com/s3/m/7b34d68e51e79b896802265c.png)
5G无线通信网络中英文对照外文翻译文献(文档含英文原文和中文翻译)翻译:5G无线通信网络的蜂窝结构和关键技术摘要第四代无线通信系统已经或者即将在许多国家部署。
然而,随着无线移动设备和服务的激增,仍然有一些挑战尤其是4G所不能容纳的,例如像频谱危机和高能量消耗。
无线系统设计师们面临着满足新型无线应用对高数据速率和机动性要求的持续性增长的需求,因此他们已经开始研究被期望于2020年后就能部署的第五代无线系统。
在这篇文章里面,我们提出一个有内门和外门情景之分的潜在的蜂窝结构,并且讨论了多种可行性关于5G无线通信系统的技术,比如大量的MIMO技术,节能通信,认知的广播网络和可见光通信。
面临潜在技术的未知挑战也被讨论了。
介绍信息通信技术(ICT)创新合理的使用对世界经济的提高变得越来越重要。
无线通信网络在全球ICT战略中也许是最挑剔的元素,并且支撑着很多其他的行业,它是世界上成长最快最有活力的行业之一。
欧洲移动天文台(EMO)报道2010年移动通信业总计税收1740亿欧元,从而超过了航空航天业和制药业。
无线技术的发展大大提高了人们在商业运作和社交功能方面通信和生活的能力无线移动通信的显著成就表现在技术创新的快速步伐。
从1991年二代移动通信系统(2G)的初次登场到2001年三代系统(3G)的首次起飞,无线移动网络已经实现了从一个纯粹的技术系统到一个能承载大量多媒体内容网络的转变。
4G无线系统被设计出来用来满足IMT-A技术使用IP面向所有服务的需求。
在4G系统中,先进的无线接口被用于正交频分复用技术(OFDM),多输入多输出系统(MIMO)和链路自适应技术。
4G无线网络可支持数据速率可达1Gb/s的低流度,比如流动局域无线访问,还有速率高达100M/s的高流速,例如像移动访问。
LTE系统和它的延伸系统LTE-A,作为实用的4G系统已经在全球于最近期或不久的将来部署。
然而,每年仍然有戏剧性增长数量的用户支持移动宽频带系统。
文献综述范文6000字
![文献综述范文6000字](https://img.taocdn.com/s3/m/7ec98e4c02d8ce2f0066f5335a8102d276a261de.png)
文献综述范文6000字英文回答:Literature Review on the Impact of Social Media on Mental Health: A Comprehensive Analysis.Introduction.Social media has become an integral part of modern life, with billions of people worldwide using it to connect with others, share information, and express themselves. However, concerns have emerged about the potential impact of social media on mental health. This literature review aims to provide a comprehensive analysis of the research on this topic.Methodology.A systematic review of the literature was conducted using databases such as PubMed, PsycINFO, and GoogleScholar. Studies were selected based on the following criteria:Published in peer-reviewed journals.Investigated the relationship between social media use and mental health.Used quantitative or qualitative methods.Results.Positive Impacts.Increased social connection: Social media canfacilitate social interaction and reduce feelings of loneliness.Enhanced self-expression: Individuals can use social media to express their thoughts, feelings, and experiences, which can be therapeutic.Mental health support: Social media platforms can provide access to support groups, online therapy, and other mental health resources.Information sharing: Social media can be a valuable source of information about mental health issues, reducing stigma and promoting understanding.Negative Impacts.Cyberbullying: Social media can be a platform for online harassment, which can have devastating effects on mental health.Social comparison: Constant exposure to idealized images on social media can lead to body dissatisfaction, anxiety, and depression.Fear of missing out (FOMO): Social media use can create a sense of pressure to keep up with friends and participate in events, leading to stress and anxiety.Sleep disturbances: The use of social media before bedtime can interfere with sleep patterns, which can have negative consequences for mental health.Moderating Factors.Individual characteristics: Age, gender, personality traits, and existing mental health conditions can influence the impact of social media on mental health.Usage patterns: The frequency, duration, and intensity of social media use play a role in its impact on well-being.Content type: The types of content consumed and shared on social media can affect mental health outcomes.Social support: Social media can complement or compete with offline social support, depending on the quality of relationships.Conclusion.The research on the impact of social media on mental health is complex and multifaceted. While social media can offer potential benefits, it also poses risks that need to be addressed. Understanding the moderating factors and promoting healthy usage patterns is essential formitigating the negative effects and harnessing the positive potential of social media.中文回答:社交媒体对心理健康的影响,文献综述。
外文文献—计算机网络
![外文文献—计算机网络](https://img.taocdn.com/s3/m/8c001cae50e2524de5187e96.png)
英文原文:Computer networkA computer network, often simply referred to as a network, is a collection of computers and devices interconnected by communications channels that facilitate communications among users and allows users to share resources. Networks may be classified according to a wide variety of characteristics. A computer network allows sharing of resources and information among interconnected devices.History :Early networks of communicating computers included the military radar system Semi-Automatic Ground Environment (SAGE) and its relative the commercial airline reservation system Semi-Automatic Business Research Environment (SABRE),started in the late 1950s.[1][2]When Russia launched His SPUTNIK Satellite in Space In 1957.The American Started Agency Names ADV ANCE RESEARCH PROJECT AGENCY (ARPA) & launched THis 1st Satellite Within 18 Month After Establishment.Then Sharing Of TheInformation InAnother Computer They Use ARPANET.And This All Responsibility On America's Dr.LIED LIEDER.Then in 1969,ARPANET Comes in INDIA And INDIAN Switched This Name To NETWORK. In the 1960s, the Advanced Research Projects Agency (ARPA) started funding the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. Development of the network began in 1969, based on designs developed during the1960s.[3] The ARPANET evolved into the modern Internet.Purpose :Computer networks can be used for a variety of purposes: Facilitating communications. Using a network, people can communicate efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing.Sharing hardware.:In a networked environment, each computer on a network may access and use hardware resources on the network, such as printing a document on a shared network printer.Sharing files, data, and information. In a network environment, authorized user may access data and information stored on other computers on the network. The capability of providing access to data and information on shared storage devices is an important feature of many networks.Sharing software.:Users connected to a network may run application programs on remote computers.information preservationSecurityNetwork classification The following list presents categories used for classifying networks.Connection method :Computer networks can be classified according to thehardware and software technology that is used to interconnect the individual devices in the network, such as optical fiber, Ethernet, wireless LAN, HomePNA, power line communication or G.hn.Ethernet as it is defined by IEEE 802 utilizes various standards and mediums that enable communication between devices. Frequently deployed devices include hubs, switches, bridges, or routers. Wireless LAN technology is designed to connect devices without wiring. These devices use radio waves or infrared signals as a transmission medium. ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power lines) to create a high-speed (up to 1 Gigabit/s) local area network.Wired technologies :Twisted pair wire is the most widely used medium for telecommunication.Twisted-pair cabling consist of copper wires that are twisted into pairs. Ordinary telephone wires consist of two insulated copper wires twisted into pairs. Computer networking cabling consist of 4 pairs of copper cabling that can be utilized for both voice and data transmission. The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction. The transmission speed ranges from 2 million bits per second to 100 million bits per second. Twisted pair cabling comes in two forms which are Unshielded Twisted Pair (UTP) and Shielded twisted-pair (STP) which are rated in categories which are manufactured in different increments for various scenarios.Coaxial cable is widely used for cable television systems, office buildings, and other work-sites for local area networks. The cables consist of copper or aluminum wire wrapped with insulating layer typically of a flexible material with a high dielectric constant, all of which are surrounded by a conductive layer. The layers of insulation help minimize interference and distortion. Transmissionspeed range from 200 million to more than 500 million bits per second.Optical fiber cable consists of one or more filaments of glass fiber wrapped in protective layers. It transmits light which can travel over extended distances.Fiber-optic cables are not affected by electromagnetic radiation. Transmission speedmay reach trillions of bits per second. The transmission speed of fiber optics is hundreds of times faster than for coaxial cables and thousands of times faster than atwisted-pair wire.[citation needed]Wireless technologies :Terrestrial microwave – Terrestrial microwaves use Earth-based transmitter and receiver. The equipment looks similar to satellite dishes. Terrestrial microwaves use low-gigahertz range, which limits all communications to line-of-sight. Path between relay stations spaced approx, 30 miles apart. Microwave antennas are usually placed on top of buildings, towers, hills, and mountain peaks.Communications satellites –The satellites use microwave radio as their telecommunications medium which are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically 22,000 miles (for geosynchronous satellites) above the equator. These Earth-orbiting systems are capable of receiving and relayingvoice, data, and TV signals.Cellular and PCS systems – Use several radio communications technologies. The systems are divided to different geographic areas. Each area has a low-power transmitter or radio relay antenna device to relay calls from one area to the next area.Wireless LANs –Wireless local area network use a high-frequency radio technology similar to digital cellular and a low-frequency radio technology. Wireless LANs use spread spectrum technology to enable communication between multiple devices in a limited area. An example of open-standards wireless radio-wave technology is IEEE.Infrared communication , which can transmit signals between devices within small distances not more than 10 meters peer to peer or ( face to face ) without any body in the line of transmitting.Scale:Networks are often classified as local area network (LAN), wide area network (WAN), metropolitan area network (MAN), personal area network (PAN), virtual private network (VPN), campus area network (CAN), storage area network (SAN), and others, depending on their scale, scope and purpose, e.g., controller area network (CAN) usage, trust level, and access right often differ between these types of networks. LANs tend to be designed for internal use by an organization's internal systems and employees in individual physical locations, such as a building, while WANs may connect physically separate parts of an organization and may include connections to third parties.Functional relationship (network architecture) :Computer networks may be classified according to the functional relationships which exist amongthe elements of the network,e.g., active networking, client–server, Wireless ad hoc network andpeer-to-peer (workgroup) architecture.Network topology :Main article: Network topology Computer networks may be classified according to the network topology upon which the network is based, such as bus network, star network, ring network, mesh network.Network topology is the coordination by which devices in the network are arranged in their logical relations to one another, independent of physical arrangement. Even if networked computers are physically placed in a linear arrangement and are connected to a hub, the network has a star topology, rather than a bus topology. In this regard the visual and operational characteristics of a network are distinct. Networks may be classified based on the method of data used to convey the data, these include digital and analog networks.Types of networks based on physical scopeCommon types of computer networks may be identified by their scale.Local area network:A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. Each computer or device on the network is a node. Current wired LANs are most likely to be based on Ethernettechnology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines).[4]Typical library network, in a branching tree topology and controlled access to resources All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors). Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access routers, where the router at the top is a distribution router thatconnects to the Internet and academic networks' customer access routers.The defining characteristics of LANs, in contrast to WANs (Wide Area Networks), include their higher data transfer rates, smaller geographic range, and no need for leased telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has projects investigating the standardization of 40 and 100 Gbit/s.[5]Personal area network :A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. Some examples of devices that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game consoles. A PAN may include wired and wireless devices. The reach of a PAN typically extends to 10 meters.[6] A wired PAN is usually constructed with USB and Firewire connections while technologies such as Bluetooth and infrared communication typically form a wireless PAN.Home area network :A home area network (HAN) is a residential LAN which is used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices. An important function is the sharing of Internet access, often a broadband service through a CATV or Digital Subscriber Line (DSL) provider. It can also be referred to as an office area network (OAN).Wide area network :A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances, using a communications channel that combines many types of media such as telephone lines, cables, and air waves. A WAN often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.Campus network :A campus network is a computer network made up of an interconnection of local area networks (LAN's) within a limited geographical area. The networkingequipments (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling are almost entirely owned (by the campus tenant / owner: an enterprise, university, government etc.).In the case of a university campus-based campus network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls.Metropolitan area network:A Metropolitan area network is a large computer network that usually spans a city or alarge campus. Sample EPN made of Frame relay WAN connections and dialup remote access.Enterprise private network :An enterprise private network is a network build by an enterprise to interconnect various company sites, e.g., production sites, head offices, remote offices, shops, in order to share computer resources.Virtual private network :A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The data link layer protocols of the virtual network are said to be tunneled through thelarger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point.Internetwork :An internetwork is the connection of two or more private computer networks via a common routing technology (OSI Layer 3) using routers. The Internet is an aggregation of many internetworks, hence its name was shortened to Internet.Backbone network :A Backbone network (BBN) A backbone network or network backbone is part of a computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks.[1][2] A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is greater than the networks connected to it.A large corporation that has many locations may have a backbone network that ties all of the locations together, for example, if a server cluster needs to be accessed by different departments of a company that are located at different geographical locations.The pieces of the network connections (for example: ethernet, wireless) that bring these departments together is often mentioned as network backbone. Networkcongestion is often taken into consideration while designing backbones. Backbone networks should not be confused with the Internet backbone.Global area network:A global area network (GAN) is a network used for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is handing off the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial wireless LANs.[7]Internet :The Internet is a global system of interconnected governmental, academic, corporate, public, and private computer networks. It is based on the networking technologies of the Internet Protocol Suite. It is the successor of the Advanced Research ProjectsAgency Network (ARPANET) developed by DARPA of the United States Department of Defense. The Internet is also the communications backbone underlying the World Wide Web (WWW).Intranets and extranets :Intranets and extranets are parts or extensions of a computer network, usually a local area network. An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web browsers and file transfer applications, that is under the control of a single administrative entity. That administrative entity closes the intranet to all but specific, authorized users. Most commonly, an intranet is the internal network of an organization. A large intranet will typically have at least one web server to provide users with organizational information.An extranet is a network that is limited in scope to a single organization or entity and also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entities—a company's customers may be given access to some part of its intranet—while at the same time the customers may not be considered trusted from a security standpoint. Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although an extranet cannot consist of a single LAN; it must have at least one connection with an external network.Overlay network:An overlay network is a virtual computer network that is built on top of another network. Nodes in the overlay are connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network.中文译文:计算机网络计算机网络,通常简单的被称作是一种网络,是一家集电脑和设备为一体的沟通渠道,便于用户之间的沟通交流和资源共享。
英文专著参考文献格式举例
![英文专著参考文献格式举例](https://img.taocdn.com/s3/m/5a8e134078563c1ec5da50e2524de518964bd3d1.png)
英文专著参考文献格式举例参考文献是学术研究的重要组成部分,它为研究提供了有力的支持和参考。
在写英文专著时,适当引用相关的参考文献是必不可少的,下面是一些英文专著参考文献格式举例:1. 书籍:Smith, John. (2021). "The Impact of Climate Change on Global Ecosystems." Cambridge University Press.这是一本由约翰·史密斯(John Smith)撰写的关于气候变化对全球生态系统影响的书籍,出版商为剑桥大学出版社(Cambridge University Press)。
2. 期刊文章:Brown, Mary, et al. (2020). "The Role of Artificial Intelligence in Healthcare." Journal of Medical Research, vol. 45, no. 3, pp. 123-135.这篇期刊文章由玛丽·布朗(Mary Brown)等人撰写,题为“人工智能在医疗领域中的作用”,发表于《医学研究杂志》(Journal of Medical Research),第45卷,第3期,页码为123-135。
3. 学位论文:Johnson, David. (2019). "The Effects of Social Media onAdolescent Mental Health." Unpublished doctoral dissertation, Harvard University.这是一篇由大卫·约翰逊(David Johnson)撰写的关于社交媒体对青少年心理健康影响的学位论文,未发表,毕业于哈佛大学。
4. 网络资源:World Health Organization. (2020). "COVID-19: Guidelines for Public Health Measures." Available at:https://www.who.int/emergencies/diseases/novel-coronavirus-2019/phm-measures.这是世界卫生组织(World Health Organization)关于COVID-19公共卫生措施指南的网络资源,可在https://www.who.int/emergencies/diseases/novel-coronavirus-2019/phm-measures上找到。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
在IEEE通信学会的主题专家的方向在IEEE ICC这全文论文同行评审的出版2009程序敏感数据要求:做网站询问是否正确?克雷格A.树和Minaxi古普塔计算机科学系印第安纳大学{cshue,minaxi}@摘要:为了确保敏感的Web内容的安全性,一个组织必须使用TLS以确保这样做正确。
然而,很少有人知道如何使TLS实际使用在网站上。
在这项工作中,我们进行大规模的网络范围内的测量,以确定如果网站需要使用TLS的时候,当他们这样做,确保他们使用它正确。
我们发现,其中TLS几十万页要么不使用要么使用不当,将会使敏感数据处于危险之中。
引言该网站提供了电子商务前所未有的机遇。
此类交易的安全性是一般通过使用传输层安全提供性(TLS)协议[1],在标准跟踪安全的后继套接字层(SSL)协议。
TLS允许客户端验证他们访问和服务器的真实性保证在客户端之间的通信的保密性和服务器安全。
虽然以前的工作分析TLS证书和该协议本身,很少的工作重点在其网站上使用。
本文由愿望所驱使,了解TLS是怎么在今天的网络上被使用的。
Web内容的很大一部分是公开可用的,并且不要求保密性。
在很多情况下,如阅读新闻的文章或使用搜索发动机,TLS保护的好处不超过性能开销与该协议有关。
在其他情况下,敏感信息被发送并应通过TLS进行保护。
然而,仅仅使用TLS不够了;它仍然必须正确使用。
调查TLS使用在网络上,我们提出两个主要问题:是否有在网络上的网站,不使用TLS时,他们应注意什么?做到这一点使用TLS这样做正确的网站?动力对于第一个问题是敏感信息可能通过窃听者很容易被截获,除非使用TLS。
第二个问题是通过观察,TLS动机保护必须从Web服务器发送一个表格前到客户端。
否则,将含有一个表格页可以被攻击者改变,允许敏感截取数据。
几大机构,包括,,或,建立了TLS客户端后,保护已下载的网页,但在此之前提交表单数据。
这种做法,被称为安全的岗位,是通常由具有高体积的组织用户流量从未签署到页面上的表单。
此特别常见的,当窗体出现在主一个网站的页面。
这些组织使用安全后,以避免与TLS的nonauthenticating相关的性能开销客户端。
不幸的是,这种做法提供了anopening 攻击者假冒网站和推出 一个中间人攻击的Web 客户端。
为了研究这些安全性差的做法的程度,我们 实现了一个网络爬虫和检查HTML 表单 430万网页。
我们做了几个关键的观察 从这样的分析。
首先,网页31-36%不使用TLS 在所有的时候,他们应该。
为了解决这个问题,我们 已经实现了浏览器扩展,警告用户约 进入网页上做的核潜艇和信用卡号码 除了不使用TLS 来识别领域的询问敏感 数据。
这导致更少的,但更精确的警告。
在 手动评估分机的有效性,我们没有发现假阳性和两种可能的假阴性。
其次,我们发现不安全的网页,有形式,1.65%的 - 4.49%有被通过HTTPS 提交的至少一种形式中, 导致安全交漏洞。
如果剥削,不安全 入口点可能会导致欺诈,可能与显著 财务影响的用户和脆弱的部位。
我们提出了一个浏览器扩展,试图验证这些 使用TLS 提交敏感数据的切入点和 如果这样的验证失败发出警告。
本文的其余部分的结构如下。
在第二节, 我们讨论我们的数据收集和方法。
在第三节, 我们研究的网站,不提供TLS 保护敏感数据并提出了一些预防措施,用户可以利用。
在第 第四,我们分析认为滥用TLS 和建议clientbased 网站 策略来解决这个问题。
我们回顾相关 在第五节工作,并得出结论:在第六节。
II 。
数据收集和方法为了获得对TLS 使用的见解,我们进行了大规模的, Internet 范围的Web 爬行。
我们把我们的抓取成四 数据集,其被选择来捕获不同类型的 网页:热门的网页,这些访问的机器上我们 网络,并且这些随机选择的。
在第一数据集,我们把它称为DMOZ 广度的数据集,我们获得了从一个网址列表 DMOZ 开放目录项目[2]。
DMOZ 的项目包括 形成一个目录查找用户提交的链接的数据,而不是使用一个检索的方法。
数据集,收集在2008年2月13日,载9165163链接。
的这些,4025911联系是独一无二的。
大多数这些链接使用HTTP,HTTPS不,这意味着他们没有使用TLS。
共的2312链接使用TLS。
我们消除这些TLS保护因为在这些任何形式进一步考虑链接网页将牢固地被默认发送。
在courseof几个星期,我们能够以检索总共3213764从DMOZ链接的网页。
这广度为基础的抓取是肤浅的;它只检查直接链接的页面DMOZ。
虽然这种策略让我们的抓取工具来检查从大量的域的页面,它会无法捕捉形式的二级页面。
对于其余的数据集,我们进行了更详细的爬行。
对于每个这些数据集,我们得到一个URL一个首页,下载的网页和链接的任何页面从该页面是一样的DNS域的内原来的页面。
这个更详细的爬行限制的广度域,而发现的形式被直接从挂钩主页。
某些URL可能存在于多个数据集。
由于其独特的爬行方法,我们允许DMOZ宽度数据集与剩余的三个重叠没有试图消除??重叠。
所述第二数据集(DMOZ深度)再次使用从链接在DMOZ开放目录项目。
然而,而thanconduct一个完整的扫描,我们随机选择了16,500独特的链接来执行我们的抓取。
这使我们能够直接比较浅表抓取诗句详细的爬网的策略寻找形式。
我们获得78 726Web从这个抓取网页。
在我们的第三个数据集(Alexa的),我们分析了流行的Web站点。
我们使用的Alexa网络信息服务[3],这居互联网上最流行的Web站点,获取1,000最流行的网站在每个16顶级类别,以及前500个最流行的网站的整体。
有些网站存在于多个类别;在删除重复,我们发现15,341独特的网站。
我们使用的每个站点来自Alexa的获得首发的Web爬行网页。
此爬行导致344,868的网页。
在最后的数据集(DNS),我们针对实际用户行为。
要创建这个数据集,我们捕捉到所有的DNS对于为期一周的发行我们部门的网络上查询期。
我们使用包含在A(地址)的主机名记录查询为基础的Web爬行的URL。
此数据中包含164,145唯一的主机名。
从这个爬行,我们获得642,013的网页。
对于每一个数据集,我们分析每个网页的HTML代码我们下载。
我们使用的形式HTML标记来识别请求数据。
对于每一个表格,我们提取的地址服务的形式,所述形式的目的地,以及页面因为每个相关联的输入域。
从这些数据,我们可以表征数据的类型被发送,以及是否从用户请求的数据将被安全地传送。
我们研究了430万网页。
并非所有weexamined所含形式的网页。
然而,许多页containedmultiple形式,如表Ⅰ所示。
例如,在DMOZ 广度数据集,我们发现,一共有692869(21.55%)页包含总共1710819形式。
使用动作在每个表单标签属性,我们推测,如果正在使用TLS通过寻找HTTPS的存在。
否则,我们推断该形式传输不安全。
在每一个数据集,过95%与形式的网页只包含HTTP(不安全)形式。
数量相对较少,1.65%-4.49%,包含只能通过HTTPS提交表单。
我们注意到,热门的网页,那些在Alexa的数据集,具有页更高百分比表单和一些每页表格较高。
减热门的网页有形式的使用远远低利率。
总的来说,我们的数据包含3,333,646(96.69%),不安全的形式和113,994(3.31%),安全形式。
在接下来的两节中,我们分别检查不安全和安全的方式。
III。
在敏感数据请求TLS我们试图回答第一个问题是:是否有网站在网络上未使用TLS时,他们应注意什么?我们分析所有的333万的形式传输不安全朝着这个目标努力。
表征数据的传输的类型通过下表,我们推测使用的name属性在每个表格输入标记,以及类型属性HTML标记的被使用。
例如,在HTML下面的代码示例中,第三行包含一个输入标签同的类型属性“密码”,这很可能是考虑到Web用户敏感。
我们注意到,3线5,“用户名”和“密码:”只是为标签最终用户知道哪些数据在该领域进入;技术原因,这些目前尚未包括在我们的启发。
<form action=""method="post">Username: <input type="text"name="user"><br>Password: <input type="password"name="pass"><br><input type="submit" name="page"value="Login"></form>我们采用了两个简单的启发式分类材料敏感。
首先,我们检查是否有输入HTML场均型“密码”。
其他启发式是检查任何形式的相关标签的name属性以此来推断它们的用法。
例如,输入与字段“用户”作为名称属性可以推断放置“用户名”,一个数据,我们认为敏感。
与领域“查询”或“搜索”作为名称的属性更likelyto参与网络搜索;我们不认为这数据是敏感的。
我们开发的模式相匹配的值与name属性的表单字段来确定相关的数据请求。
我们进行分类,涉及到用户的数据身份证或户口敏感。
因此,我们认为用户名,密码,账号,地址,(信贷)信用卡号码,电子邮件地址,真实姓名,城市和电话号码是敏感的数据。
一些这方面的信息被认为是比其他数据更敏感。
例如,信用卡信息是可能比一个更敏感电子邮件地址。
然而,电子邮件地址被绑定到用户的身份和可用于跟踪目的。
有些人可能考虑自己的家乡城市是敏感数据,而其他人可能不是。
在这种分析中,我们专注于几件敏感数据,以确定请求的数目为数据,而不是创建一套详尽的敏感数据。
在表二中,我们列出要求敏感数据的类别通过不安全的形式。
每个输入字段进行分类完全通过一系列的规则。
例如,一个场与“密码”的类型属性分类只一个“密码字段,”不管在任何其他比赛中name属性。
然而,一个页面可以有多个类别敏感的表单字段,在这种情况下,它是根据每个计数的类型。
总体而言,我们发现,与网页31.39%-36.00%不安全的形式包含至少一个敏感的领域。
具体来说,我们发现,超过24万的网页包含不安全有输入标签为“密码”的形式类型属性。
每个密码字段导致Web浏览器模糊输入到字段中的文本,以防止他人看到进入用户的屏幕上的数据。
显然,在Web网站认为这个数据是有点敏感,但不它提供了切实的保障。
对领域的类别,其余在表二所列,我们寻找的名称模式输入标签的属性来推断请求的数据的类型。