计算机专业 毕业设计 外文文献

合集下载

计算机毕业设计外文参考文献

计算机毕业设计外文参考文献

计算机毕业设计外文参考文献[1].Abdellatif, T. and F. Boyer. A node allocation system for deploying JavaEE systems on Grids. 2009. Hammemet, Tunisia.[2].Bharti, A.K. and S.K. Dwivedi, E-Governance in Public Transportation: U.P.S.R.T.C.——A Case Study. 2011: Kathmandu, Nepal. p. 7-12.[3].ChangChun, S.Z.C.S., et al., A Novel Two-stage Algorithm of Fuzzy C-Means Clustering. 2010: 中国吉林长春. p. 85-88.[4].Changchun, Z.Z.H.Q., Simulation of 3-C Seismic Records In 2-D TIM. 1991: 中国北京. p. 489-493.[5].CHINA, G.C.O.M., The trust model based on consumer recommendation in B-C e-commerce. 2011: 中国湖北武汉. p. 214-217.[6].ENGINEERING, W.C.H.X., H.T.S.H. PROPAGATION and XINXIANG, A C BAND SYSTEM FOR IONOSPHERIC SCINTILLATION OBSERVATION. 1991: 中国北京. p. 470-476.[7].Henriksson, K., K. Nordlund and J. Wallenius, Simulating model steels:An analytical bond-order potential for Fe-C. 2008: 中国北京. p. 138.[8].Jiansen, Y., et al., Suspension K&C Characteristics and the Effect on Vehicle Steering. 2010: 中国吉林长春. p. 408-411.[9].Jilin, W.G.D.O., C.W.S.D. Changchun and China, Realization and Optimization of Video Encoder Based on TMS320C6455 DSPs. 2010: 中国吉林长春. p. 312-317. [10].Juan, C., et al., Semi-physical simulation of an optoelectronic tracking servo system based on C MEX S functions. 2010: 中国吉林长春. p. 46-49.[11].Kachru, S. and E.F. Gehringer. A comparison of j2ee and. net as platforms for teaching web services. 2004.[12].KIM, T., et al., MRI Image Segmentation Using Intuitive Fuzzy C-Means Algorithm. 2011: 中国湖北武汉. p. 306-309.[13].Li, M. and H. Wang. A device management system based on JAVAEE Web. 2009. Wuhan, China.[14].Li, Z. and Z. Weixi. Design of tourism e-business system based on JavaEE multi-pattern. 2012. Sanya, China.[15].Lin, P., H. Wen and S. Zhou. Design and implementation of job-search system based on javaEE. 2010. Hong Kong, China.[16].Lv, X., Y. Qin and J.N.G. University, Film growth by polyatomic C2H5+ bombarding amorphous carbon surfaces:molecular dynamics study. 2008: 中国北京. p. 148.[17].Meyer, B.. NET is coming [Microsoft Web services platform]. Computer, 2001. 34(8): p. 92--97.[18].Meyer, B., R. Simon and E. Stapf, Instant .NET. Recherche, 2003. 67: p. 02.[19].Morishita, K., et al., Atomistic modeling of formation kinetics of vacancyclusters in 3C-SiC during irradiation. 2008: 中国北京. p. 141.[20].Ou, J., et al. Design and research on teaching platform of stage task using JavaEE. 2012. Chongqing, China.[21].Science, J.X.Z.M., et al., A New Method to get Essential Efficient solution forA Class of D.C.Multiobjective Problem. 2010: 中国吉林长春. p. 501-503.[22].XIONG, J., L. YAO and J. HU, Implementation of Dynamically Generating HTML WebPages by C\#. Computer and Modernization, 2007. 10.[23].Yeh, Y. and H. Lin, Cardiac Arrhythmia Diagnosis Method Using Fuzzy C-Means Algorithmon ECG Signals. 2010: 中国台湾台南. p. 272-275. [24].Yizheng, T., et al. Design and implementation of USB key-based JavaEE dual-factor authentication system. 2009. Xi'an, China.[25].Zhan, T., et al., Brain MR Image Segmentation and Bias Field Correction Using Adaptive Fuzzy C Means Model. 2010: 中国吉林长春. p. 151-154.[26].Zhang, L., et al., First-principles investigation of site occupancy of neutral H in 3C-SiC. 2008: 中国北京. p. 86.[27].Zhang, L. and W. Zhang. Implement of e-government system with data persistence of JavaEE. 2010. Hong Kong, Hong kong.[28].杨盛泉等, 基于MVC模式的耐火材料梭式窑分布式控制系统. 计算机测量与控制, 2010(6): 第1326-1328+1331页.[29].杨晓强与李海军, 在通用航空安全信息管理系统中的应用. 现代计算机(专业版), 2011(15): 第74-76页.[30].杨勇与韩莉英, 基于MVC模式的Struts框架在电子商务系统中的应用. 计算机应用研究, 2006(5): 第172-174页.[31].姚立, 汪峥与穆华灵, 基于知识制造系统优化及下实现. 计算机技术与发展, 2011(11): 第1-3+7页.[32].叶晓菡, 基于.NET的网络用语在线词典软件的设计与实现. 计算机时代, 2010(9): 第27-29页.[33].易威环, 基于Session Facade的MVC模式设计. 电脑知识与技术, 2010(15): 第3984-3985+3990页.[34].殷永峰, 王轶辰与刘斌, 基于MVC模式的嵌入式软件测试开发环境设计. 计算机工程与应用, 2007(7): 第117-119页.[35].游琪, 张广云与桂改花, 基于MVC模式的角色访问控制系统设计. 电脑知识与技术, 2009(32): 第8939-8940页.[36].于同亚, 用C#设计基于.NET框架的应用程序——购物网站的设计与实现. 电脑知识与技术, 2009(18): 第4907-4908页.[37].袁江琛, 基于的校园信息网设计和开发. 电脑编程技巧与维护, 2011(24): 第23-24+49页.[38].占小忆, 中利用连接数据库. 电脑知识与技术(学术交流), 2007(5): 第1211-1212页.[39].张峰与张莉莉, 平台连接池机制的分析与设计. 电脑学习, 2008(2): 第89-90页.[40].张国武, 基于OPC和.NET框架的SIMATICNET客户应用实现. 工业控制计算机, 2008(4): 第70-71页.[41].张捍卫, 基于 AJAX的资产网络清查系统的设计. 计算机与现代化, 2012(4): 第94-96页.[42].张建成与李春青, 基于.NET环境下访问数据库技术的研究. 电脑知识与技术, 2009(22): 第6102-6104页.[43].张杰, 张景安与孙沛, 基于云模型的C2C电子商务信任评价模型. 计算机系统应用, 2010(11): 第83-87+74页.[44].张黎明与龚琪琳, 基于MVC模式的Java Web应用设计. 计算机与现代化, 2007(2): 第22-24页.[45].张俐, MVC模式在数据中间件中的应用. 计算机工程, 2010(9): 第70-72页.[46].张俐, 基于JavaEE的电信CRM数据持久层的实现. 计算机工程, 2009(6): 第41-43页.[47].张俐与张维玺, 基于JavaEE的固定资产管理系统的设计与实现. 计算机工程与设计, 2009(16): 第3797-3800页.[48].张南平与朱富利, 基于MVC模式的Struts框架的研究与应用. 计算机技术与发展, 2006(3): 第229-231+234页.[49].张庆扬与柴胜, 使用二级索引的中文分词词典. 计算机工程与应用, 2009(19): 第139-141页.[50].张翔, 陆远与罗贵明, 模型与实例设计模式在工作流管理系统设计中的应用. 计算机应用研究, 2006(7): 第165-166+169页.[51].张永才与吾守尔?斯拉木, 基于J2ME的维汉双语电子词典的研究与实现. 计算机系统应用, 2010(7): 第229-231页.[52].张宗平, 马冰冰与莫灵江, 基于的网络培训系统的研究. 现代计算机(专业版), 2011(14): 第52-54页.[53].赵亮与齐欢, 基于MVC模式的三峡通航数据维护系统的实现. 计算机技术与发展, 2006(7): 第156-158页.[54].赵鸣, 张旭与熊静, 基于.NET与WCF的民航订座系统研究. 计算机工程与设计, 2012(4): 第1653-1659页.[55].郑华, 基于MVC模式的Tapestry框架研究与应用. 微电子学与计算机, 2006(S1): 第38-39+42页.[56].郑晶晶与刘玉宾, 基于的对象与数据库的交互. 电脑知识与技术, 2009(2): 第293-295页.[57].郑文等, 基于客户端MVC模式的RIA WebGIS框架设计与应用. 计算机应用与软件, 2011(5): 第75-77+93页.[58].郑颖与袁宝国, MVC模式在中小型连锁超市信息管理系统的应用. 计算机应用与软件, 2006(9): 第134-136页.[59].钟金琴与辜丽川, 一种面向对象的软件设计模式库的设计. 计算机技术与发展, 2008(9): 第22-25页.[60].钟灵等, MVC模式的电梯群控仿真系统. 计算机工程与应用, 2009(32): 第197-199+243页.[61].周纯杰, 陈笛与阎峰, 基于.NET的圆网印花机远程监控系统的开发. 计算机应用研究, 2005(6): 第154-156页.[62].周迅飞与王崑声, 基于MVC模式的Rails框架研究. 计算机仿真, 2006(2): 第270-274页.[63].周杨, AJAX应用的典型设计模式. 计算机系统应用, 2011(1): 第128-132页.[64].周永平, MVC模式在软件设计应用中的研究. 信息与电脑(理论版), 2009(11): 第58-59页.[65].朱青卫, 基于NET框架可重用的数据访问组件的实现. 电脑与电信, 2007(1): 第62-64页.[66].朱卫新, Visual C#.NET实现用户自定义图形编程方法. 计算机技术与发展, 2012(4): 第130-132+136页.[67].庄新妍, 基于CDIO教育的程序设计课程教学改革初探. 电脑知识与技术, 2011(35): 第9192-9193页.[68].卓有斌, 浅论我国B2C/C2C电子商务物流的现状及几点对策. 电脑知识与技术, 2010(14): 第3839-3840页.[69].邹利艳等, 基于JavaEE架构的旅游电子商务平台的设计开发. 电脑知识与技术, 2011(4): 第712-714页.[70].曾琳与蔡晓丽, 基于MVC模式的网络教学平台. 电脑知识与技术, 2009(6): 第1527-1528页.[71].曾路与张立臣, ——基于.NET平台的AOP技术. 计算机应用研究, 2005(5): 第225-226页.[72].曾一等, 基于J2EE平台的Java构件库的研究和实现. 计算机科学, 2006(4): 第274-276+280页.[73].常红伟, 基于.NET的信息交换平台的设计与实现. 计算机与现代化, 2011(12): 第37-40页.[74].陈春艳, 支持多浏览器读取XML内容的方法实现. 电脑与电信, 2010(6): 第71-73页.[75].陈烽与陈蓉, 基于MVC模式和JavaBean的B2C电子商城框架的实现. 电脑与电信, 2010(1): 第50-52页.[76].陈刚等, 基于Chord的合作浏览器Cache模型. 计算机应用与软件, 2006(5): 第93-95页.[77].陈华恩, JAVA设计模式研究之抽象工厂模式. 电脑知识与技术, 2010(9): 第2245-2246页.[78].陈乐与杨小虎, MVC模式在分布式环境下的应用研究. 计算机工程, 2006(19): 第62-64页.[79].陈武, 阳春华与吴同茂, 基于Ajax技术的MVC模式在远程控制实验室中的应用. 计算机系统应用, 2009(8): 第175-177页.[80].陈小祥, 洪金益与吴健生, 基于 Link和.net的WebGIS的实现. 计算机应用与软件, 2008(3): 第135-137页.[81].陈绪君等.NET框架Web Service和.NET Remoting分布式应用解决方案及评价. 计算机应用研究, 2003(9): 第110-112页.[82].陈学锋等, 分布式实时网络监测系统的设计与实现. 计算机工程, 2002(6): 第139-140+143页.[83].陈雪娟, 基于MVC模式的SSH开发技术. 电脑学习, 2011(2): 第137-139页.[84].陈谊楠, 基于.NET平台采用实现数据访问层. 电脑编程技巧与维护, 2012(4): 第35-36+57页.[85].程郢瑞, 郭福亮与王晶, 基于MVC模式的人才测评系统的分析与设计. 计算机与数字工程, 2010(1): 第197-200页.[86].崔阳华, +Oracle环境下安全方案的研究. 智能计算机与应用, 2011(6): 第36-39页.[87].丁民豆, MVC模式在创建图表组件中的应用与研究. 电脑知识与技术, 2011(24): 第5925-5927页.[88].董袁泉, 基于MVC模式的Struts框架研究与应用. 电脑编程技巧与维护, 2010(22): 第25-26+66页.[89].窦亮, 金恩年与黄国兴, 基于MVC设计模式的电子名片系统的设计与实现. 计算机工程, 2005(21): 第229-231页.[90].杜青, Visual C++.NET平台下贪吃蛇游戏的实现. 电脑编程技巧与维护, 2011(24): 第36-37页.[91].段春梅, 基于MVC模式的课程申报系统的设计与实现. 电脑学习, 2009(6): 第27-28页.[92].方春平与管建和, 基于多重数组的词典技术研究与实现. 电脑知识与技术, 2009(9): 第2173-2174页.[93].方俊, 基于.NET Remoting口令系统的设计. 计算机时代, 2012(4): 第9-11页.[94].方文骁与张在琛, 基于.NET框架的网络视频处理. 计算机工程, 2011(S1): 第359-361页.[95].冯东栋与张钊, 一种扩展的MVC手机设计模式. 计算机与现代化, 2008(8): 第122-124页.[96].冯铁等, 面向Java语言的设计模式抽取方法的研究. 计算机工程与应用, 2005(25): 第28-33页.[97].冯晓强与程晓昕, 基于MVC模式的网上购物系统的设计与实现. 现代计算机(专业版), 2009(7): 第177-180页.[98].葛文庚与郭斐斐, 基于MVC模式的物流管理信息系统的设计与实现. 电脑知识与技术, 2010(22): 第6135-6136页.[99].耿祥义与郝丽, JAVA设计模式在视频监控系统软件设计中的应用. 电脑知识与技术, 2010(30): 第8490-8492页.[100].卢莉, 基于淘宝网的C2C电子商务信用评价模型改进研究. 现代计算机(专业版), 2011(28): 第30-32页.[101].卢贤玲等, 基于Java网上虚拟实验系统设计与实现. 计算机工程与应用, 2004(7): 第158-160页.[102].陆银梅, Web服务器控件设计. 电脑编程技巧与维护, 2011(22): 第98-99+142页.[103].罗红梅与陆鑫, 基于JSF和Tiles的MVC模式的实现. 计算机与现代化, 2006(2): 第38-41页.[104].马立东, 面向英汉词典编纂的粘贴工具的设计、实现及应用. 计算机与现代化, 2010(7): 第145-148页.[105].马庆兵, 基于MVC模式的Struts框架研究与应用. 信息与电脑(理论版), 2009(12): 第68-69页.[106].马帅军, 陈洲与陈念, 基于规则引擎和MVC模式的管理系统设计. 电脑与电信, 2010(2): 第34-36页.[107].牛俊慧, 张红光与牛会丽, 基于MVC模式的电子商务平台构造技术研究. 计算机工程与设计, 2006(23): 第4479-4481页.[108].潘海兰, 吴翠红与葛晓敏, XML及其在MVC模式中的应用. 计算机技术与发展, 2010(2): 第202-205页.[109].裴炳镇等, 一种生成机读词典的方法. 计算机工程与应用, 2005(3): 第116-118页.[110].彭明与蒋晓瑜, 基于技术的网上书城系统分析. 计算机光盘软件与应用, 2012(4): 第176-177页.[111].齐德昱与谢景明, 一个基于Java虚拟机的分布式计算模型. 计算机科学, 2007(6): 第248-250页.[112].綦宏伟, 代亚非与李晓明, 基于Java/Swing的通用文件管理器设计模式. 计算机工程与应用, 2003(8): 第108-111页.[113].全金连, 李琴与覃毅, 基于MVC模式的成人教学管理系统的设计与实现. 电脑知识与技术, 2010(9): 第2180-2181页.[114].任桢, 电子词典的设计研究. 计算机与数字工程, 2003(1): 第62-64+51页.[115].戎小群, 面向对象设计模式的研究与应用. 电脑知识与技术, 2010(33): 第9437-9439页.[116].沈刚, 下项目管理系统的设计和研究. 计算机光盘软件与应用, 2012(3): 第197+191页.[117].史栋杰与孔华锋, 领域驱动设计中资源库模式的设计与实现. 电脑知识与技术, 2010(33): 第9617-9618+9621页.[118].史学梅, Ajax技术在EXT框架与MVC模式整合中的应用. 电脑知识与技术, 2010(24): 第6779-6780页.[119].孙惠芬, 基于NET环境下的日报表系统的设计与实现. 电脑知识与技术, 2011(35): 第9143-9144页.[120].孙金艳, 基于JavaEE的移动新闻系统的设计与实现. 电脑知识与技术,[121].孙静, 基于以太网控制器LAN91C111的μc/TCP-IP网络接口通信实现. 电脑学习, 2010(6): 第52-54页.[122].孙艳红, 利用C++ Builder开发Web浏览器. 电脑学习, 2009(1): 第26-27页.[123].谈娴茹, 基于Browser/Server的课件系统的设计与实现. 计算机工程, 2005(S1): 第165-166页.[124].覃开贤与卢澔, 基于MVC模式的在线作业系统的设计. 计算机与现代化, 2011(2): 第160-163页.[125].谭建与丁维明, 基于面向对象和设计模式的电厂工作票软件模块的设计. 计算机与现代化, 2005(1): 第113-115页.[126].唐伟, C2C电子商务信任评价模型设计与实现. 计算机工程与应用, 2012(1): 第94-97页.[127].田飞与程慧芳, 基于P2P网络的浏览器缓存协作系统的研究. 计算机工程与设计, 2010(22): 第4780-4786页.[128].王峰, 基于Struts和Hibernate的MVC模式在网站架构设计中的应用. 信息与电脑(理论版), 2009(8): 第133+135页.[129].王海蓉与苗放, 基于MVC模式的STRUTS框架的研究与应用. 电脑知识与技术, 2006(26): 第102-103页.[130].王莉, 基于搜索引擎模型的实现. 计算机与现代化, 2011(11): 第199-201+205页.[131].王敏, 基于MVC模式的校友录系统设计与实现. 计算机与数字工程, 2011(2): 第104-107页.[132].王翔, 用设计模式和.Net技术实现对象池设计. 计算机辅助工程, 2007(4): 第68-72页.[133].王向中, 基于MVC模式Web应用框架的研究和开发. 电脑编程技巧与维护, 2009(22): 第85-86页.[134].王晓庆等, 设计模式中的面向对象原则及其子模式. 计算机工程, 2003(9): 第192-194页.[135].王艳华与何保锋, 基于MVC模式的数据库分页显示的设计与实现. 电脑知识与技术(学术交流), 2007(6): 第1502-1503页.[136].王云晓与张学诚, 基于.NET的数据库访问优化策略. 计算机与现代化, 2011(12): 第86-88页.[137].王喆, 基于.NET的作业处理系统的设计与实现. 计算机应用与软件, 2012(4): 第213-215页.[138].文爱平与文德民, 基于IE浏览器的Ajax Comet架构. 电脑知识与技术, 2010(17): 第4646-4648页.[139].文习明, 平台下对MVC模式的一个扩展. 现代计算机, 2006(4): 第23-26页.[140].文学, 轻量级JavaEE的另一种选择:JST. 华南金融电脑, 2009(4): 第52-53页.[141].吴国芳与金珊, 基于MVC模式的医疗事故争议处理系统. 电脑知识与技术, 2009(32): 第8976-8977页.[142].吴海珍, 和ADOX在数据库编程中的应用. 电脑与信息技[143].吴茂昌与阳玉琴, 基于MVC模式的Java主流框架整合技术研究. 计算机与数字工程, 2009(10): 第91-93+111页.[144].吴森, 王克峰与谢佳, 在环境下高效使用SQL 数据提供程序连接池. 计算机与数字工程, 2005(11): 第86-89页.[145].武小稞, 基于.NET的出口活牛育肥场电子信息管理系统. 计算机光盘软件与应用, 2012(3): 第159+161页.[146].肖菁, 高校非计算机专业C/C++教学的探索与实践. 现代计算机(专业版), 2011(30): 第21-22页.[147].肖茂兵与卢振环, JavaEE应用技术框架选型. 华南金融电脑, 2006(8): 第78-81页.[148].谢波, 申瑞民与王加俊, 一种基于.NET Services的标注系统框架“”. 计算机工程, 2003(16): 第179-181页.[149].谢珩等, MVC模式在Web应用中的一种实现. 计算机科学, 2006(5): 第136-138页.[150].辛玉华与王哲, 对基于.NET FRAME架构软件汉化的一次尝试. 电脑知识与技术, 2012(5): 第1184-1186页.[151].熊建芳, 高继与任贺宇, 基于的ADO与分析与研究. 计算机与现代化, 2006(7): 第36-38页.[152].熊建英与钟元生, 一种抗欺诈的C2C卖方信誉计算模型研究. 计算机科学, 2012(2): 第68-71页.[153].熊勇, MVC模式下一种高效分页方法的研究与实现. 电脑知识与技术, 2006(29): 第75+78页.[154].徐涤, 基于的人事管理系统设计与实现. 电脑编程技巧与维护, 2012(8): 第31-32页.[155].徐生菊与王命延, MVC模式在储粮害虫查询与防治系统中的应用研究. 计算机与现代化, 2006(4): 第112-114页.[156].阎秀英, 周亚建与胡正名, 基于Java的网络实时远程监控系统设计. 计算机工程, 2009(5): 第74-75+78页.[157].阎英, 刘伯红与席珍, 基于MVC模式Struts结构的研究生管理信息系统. 计算机与数字工程, 2007(4): 第39-41+2页.[158].杨岸, 丁汉与熊有伦, 电子词典词库的压缩技术研究与实现. 计算机工程与设计, 2004(3): 第340-343页.[159].杨浮群, 邹利艳与徐丽, JavaEE开发环境下Sql Serve数据库优化. 电脑知识与技术, 2011(31): 第7597-7599页.[160].杨刚, 顾宏斌与赵芷晴, 对基于J2EE的MVC模式视图部分改进. 计算机技术与发展, 2012(3): 第103-105+109页.[161].杨厚群与陈静, Java异常处理机制的研究. 计算机科学, 2007(3): 第286-289+292页.[162].杨洁芳, 基于VC++的WEB浏览器的实现. 电脑学习, 2006(1): 第30-31页.[163].杨柳.NET环境下MD5加密技术的研究. 计算机安全, 2011(12): 第43-46页.[164].杨睿与姚淑珍, 设计模式复用支持系统的设计实现. 计算机工程, 2004(1): 第80-81+87页.[1]Bollela G, Gosling J, Brosgol B, et al. The Real-time Specification for Java[M]. [S. l.]: Addison Wesley, 2000.[2]Connor J M O, Tremblay M. PicoJava-I: The Java Virtual Machine in Hardware[J]. IEEE Micro, 1997, 17(2): 45-53.[3]McGhan H, Connor J M O. PicoJava: A Direct ExecutionEngine for Java Bytecode[J]. Computer, 1998, 31(10): 22-30.[4]Brinkschulte U, Krakowsi C, Kreuzinger J, et al. The Komodo Project: Thread-based Event Handling Supported by a Multi-threaded Java Microcontroller[C]//Proceedings of the 25th EUROMICRO Conference. Milano, Italy: [s. n.], 1999.[5]Schoeberl M. JOP: A Java Optimized Processor for Embedded Real-time Systems[EB/OL]. [2010-08-26]. http://www.jopdesign. com.[6]柴志雷. Java实时性及嵌入式实时Java处理器研究[D]. 上海: 复旦大学, 2006.[7]苏超云, 柴志雷, 涂时亮. 实时Java平台的类预处理器研究[J]. 计算机工程, 2010, 36(7): 246-248, 251.[8]ML501 User Guide[EB/OL]. (2009-08-24). http://www.xilinx. com/products/boards /ml501/docs.htm.[9]Schoeberl M, Puffitsch W, Pedersen R U, et al. Worst-case Execution Time Analysis for a Java Processor[J]. Software: Practice and Experience, 2010, 40(6): 507-542.[10]Patterson D A, Hennessy J L. 计算机组成与设计硬件/软件接口[M]. 3版. 郑纬民, 译. 北京: 机械工业出版社, 2007.。

计算机类毕业设计英文文献及翻译

计算机类毕业设计英文文献及翻译

外貌在环境面板上的共同标签部分包括光,云,太阳和月亮的控制器。

启用灯光--当设置后,环境面板被点亮并且物体的场景会在全天不断变化。

当此复选框被清除,在场景中所有对象不亮也不随着一天时间的变化而变化。

(该对象将仍然被视为未点亮时,他们将使用为他们定制的颜色,材料和正常的价值观)。

启用云--当设置后,一个云层的场景便设置其中。

道路工具将定出海拔类型和云层类型。

默认情况下,此值未设置。

启用太阳/月亮--当设置,太阳和月球环境的效果显示并且月亮环境的效果有助于现场场景内的任何物体的照明。

当此复选框被清除,太阳和月亮不会被显示并且月亮助手停止现场照明。

默认情况下,太阳和月亮是没有设置。

注:太阳和月亮在天空的位置和绘制使用星历模型。

太阳和月亮的位置是根据一天中的时间,日期,纬度和经度绘制的。

月亮的月球阶段也以同样的方式计算。

天空颜色在环境面板上的共同标签部分包括天空的颜色,云的颜色,周围的颜色,天气的控制,和雾。

注:彩色按钮旁边的天空,云,和环境(背景)显示你当前的颜色。

单击每个按钮来改变颜色。

云的颜色--这个颜色的按钮显示您的云层的颜色。

点击就显示颜色对话框,然后选择一个新的颜色,然后点击确定。

环境光颜色--这个颜色的彩色按钮显示您当前的周围灯光组件的颜色。

点击就显示颜色对话框,然后选择一个新的颜色,然后点击确定。

环境光元件有助于场景和物体的亮度;默认设置是应用一个小环境光线。

环境光照亮了现场或对象,当一天的时间设置为晚,对象将仍然由于环境光而可见。

环境光可以用来照亮一个带有黑暗纹理或者用IRIX电脑做出纹理的物体。

(IRIX电脑相对于WINDOWS电脑使用了不同的GAMMA设置,他使Irix计算机处理的纹理总是看上去黑暗,直到图像编辑程序纠正才能恢复正常。

)天气--此选项不使用这种版本的路径工具。

在今后的版本中,天气列表将包含环境设置预设模拟不同时间的天气事件,如日出,上午,傍晚,夜间,多云,雨,雪等。

计算机专业毕业论文外文翻译

计算机专业毕业论文外文翻译

附录(英文翻译)Rich Client Tutorial Part 1The Rich Client Platform (RCP) is an exciting new way to build Java applications that can compete with native applications on any platform. This tutorial is designed to get you started building RCP applications quickly. It has been updated for Eclipse 3.1.2By Ed Burnette, SASJuly 28, 2004Updated for 3.1.2: February 6, 2006IntroductionTry this experiment: Show Eclipse to some friends or co-workers who haven't seen it before and ask them to guess what language it is written in. Chances are, they'll guess VB, C++, or C#, because those languages are used most often for high quality client side applications. Then watch the look on their faces when you tell them it was created in Java, especially if they are Java programmers.Because of its unique open source license, you can use the technologies that went into Eclipse to create your own commercial quality programs. Before version 3.0, this was possible but difficult, especially when you wanted to heavily customize the menus, layouts, and other user interface elements. That was because the "IDE-ness" of Eclipse was hard-wired into it. Version 3.0 introduced the Rich Client Platform (RCP), which is basically a refactoring of the fundamental parts of Eclipse's UI, allowing it to be used for non-IDE applications. Version 3.1 updated RCP with new capabilities, and, most importantly, new tooling support to make it easier to create than before.If you want to cut to the chase and look at the code for this part you can find it in the accompanying zip file. Otherwise, let's take a look at how to construct an RCP application.Getting startedRCP applications are based on the familiar Eclipse plug-in architecture, (if it's not familiar to you, see the references section). Therefore, you'll need to create a plug-in to be your main program. Eclipse's Plug-in Development Environment (PDE) provides a number of wizards and editors that take some of the drudgery out of the process. PDE is included with the Eclipse SDK download so that is the package you should be using. Here are the steps you should follow to get started.First, bring up Eclipse and select File > New > Project, then expand Plug-in Development and double-click Plug-in Project to bring up the Plug-in Project wizard. On the subsequent pages, enter a Project name such as org.eclipse.ui.tutorials.rcp.part1, indicate you want a Java project, select the version of Eclipse you're targeting (at least 3.1), and enable the option to Create an OSGi bundle manifest. Then click Next >.Beginning in Eclipse 3.1 you will get best results by using the OSGi bundle manifest. In contrast to previous versions, this is now the default.In the next page of the Wizard you can change the Plug-in ID and other parameters. Of particular importance is the question, "Would you like to create a rich client application?". Select Yes. The generated plug-in class is optional but for this example just leave all the other options at their default values. Click Next > to continue.If you get a dialog asking if Eclipse can switch to the Plug-in Development Perspective click Remember my decision and select Yes (this is optional).Starting with Eclipse 3.1, several templates have been provided to make creating an RCP application a breeze. We'll use the simplest one available and see how it works. Make sure the option to Create a plug-in using one of the templates is enabled, then select the Hello RCP template. This isRCP's equivalent of "Hello, world". Click Finish to accept all the defaults and generate the project (see Figure 1). Eclipse will open the Plug-in Manifest Editor. The Plug-in Manifest editor puts a friendly face on the various configuration files that control your RCP application.Figure 1. The Hello World RCP project was created by a PDE wizard.Taking it for a spinTrying out RCP applications used to be somewhat tedious. You had to create a custom launch configuration, enter the right application name, and tweak the plug-ins that were included. Thankfully the PDE keeps track of all this now. All you have to do is click on the Launch an Eclipse Application button in the Plug-in Manifest editor's Overview page. You should see a bare-bones Workbench start up (see Figure 2).Figure 2. By using thetemplates you can be up andrunning anRCPapplication inminutes.Making it aproductIn Eclipse terms a product is everything that goes with your application, including all the other plug-ins it depends on, a command to run the application (called the native launcher), and any branding (icons, etc.) that make your application distinctive. Although as we've just seen you can run a RCP application without defining a product, having one makes it a whole lot easier to run the application outside of Eclipse. This is one of the major innovations that Eclipse 3.1 brought to RCP development.Some of the more complicated RCP templates already come with a product defined, but the Hello RCP template does not so we'll have to make one.In order to create a product, the easiest way is to add a product configuration file to the project. Right click on the plug-in project and select New > Product Configuration. Then enter a file name for this new configuration file, such as part1.product. Leave the other options at their default values. Then click Finish. The Product Configuration editor will open. This editor lets you control exactly what makes up your product including all its plug-ins and branding elements.In the Overview page, select the New... button to create a new product extension. Type in or browse to the defining plug-in(org.eclipse.ui.tutorials.rcp.part1). Enter a Product ID such as product, and for the Product Application selectorg.eclipse.ui.tutorials.rcp.part1.application. Click Finish to define the product. Back in the Overview page, type in a new Product Name, for example RCP Tutorial 1.In Eclipse 3.1.0 if you create the product before filling inthe Product Name you may see an error appear in the Problems view. The error will go away when you Synchronize (see below). This is a known bug that is fixed in newer versions. Always use the latest available maintenance release for the version of Eclipse you're targeting!Now select the Configuration tab and click Add.... Select the plug-in you just created (org.eclipse.ui.tutorials.rcp.part1) and then click on Add Required Plug-ins. Then go back to the Overview page and press Ctrl+S or File > Save to save your work.If your application needs to reference plug-ins that cannot be determined until run time (for example the tomcat plug-in), then add them manually in the Configuration tab.At this point you should test out the product to make sure it runs correctly. In the Testing section of the Overview page, click on Synchronize then click on Launch the product. If all goes well, the application should start up just like before.Plug-ins vs. featuresOn the Overview page you may have noticed an option that says the product configuration is based on either plug-ins or features. The simplest kind of configuration is one based on plug-ins, so that's what this tutorial uses. If your product needs automatic update or Java Web Start support, then eventually you should convert it to use features. But take my advice and get it working without them first.Running it outside of EclipseThe whole point of all this is to be able to deploy and run stand-alone applications without the user having to know anything about the Java and Eclipse code being used under the covers. For a real application you may want to provide a self-contained executable generated by an install program like InstallShield or NSIS. That's really beyond the scope of this article though, so we'll do something simpler.The Eclipse plug-in loader expects things to be in a certain layout so we'll need to create a simplified version of the Eclipse install directory. This directory has to contain the native launcher program, config files,and all the plug-ins required by the product. Thankfully, we've given the PDE enough information that it can put all this together for us now.In the Exporting section of the Product Configuration editor, click the link to Use the Eclipse Product export wizard. Set the root directory to something like RcpTutorial1. Then select the option to deploy into a Directory, and enter a directory path to a temporary (scratch) area such as C:\Deploy. Check the option to Include source code if you're building an open source project. Press Finish to build and export the program.The compiler options for source and class compatibility in the Eclipse Product export wizard will override any options you have specified on your project or global preferences. As part of the Export process, the plug-in is code is recompiled by an Ant script using these options.The application is now ready to run outside Eclipse. When you're done you should have a structure that looks like this in your deployment directory:RcpTutorial1| .eclipseproduct| eclipse.exe| startup.jar+--- configuration| config.ini+--- pluginsmands_3.1.0.jarorg.eclipse.core.expressions_3.1.0.jarorg.eclipse.core.runtime_3.1.2.jarorg.eclipse.help_3.1.0.jarorg.eclipse.jface_3.1.1.jarorg.eclipse.osgi_3.1.2.jarorg.eclipse.swt.win32.win32.x86_3.1.2.jarorg.eclipse.swt_3.1.0.jarorg.eclipse.ui.tutorials.rcp.part1_1.0.0.jarorg.eclipse.ui.workbench_3.1.2.jarorg.eclipse.ui_3.1.2.jarNote that all the plug-ins are deployed as jar files. This is the recommended format starting in Eclipse 3.1. Among other things this saves disk space in the deployed application.Previous versions of this tutorial recommended using a batch file or shell script to invoke your RCP program. It turns out this is a bad idea because you will not be able to fully brand your application later on. For example, you won't be able to add a splash screen. Besides, theexport wizard does not support the batch file approach so just stick with the native launcher.Give it a try! Execute the native launcher (eclipse or eclipse.exe by default) outside Eclipse and watch the application come up. The name of the launcher is controlled by branding options in the product configuration.TroubleshootingError: Launching failed because the org.eclipse.osgi plug-in is not included...You can get this error when testing the product if you've forgotten to list the plug-ins that make up the product. In the Product Configuration editor, select the Configuration tab, and add all your plug-ins plus all the ones they require as instructed above.Compatibility and migrationIf you are migrating a plug-in from version 2.1 to version 3.1 there are number of issues covered in the on-line documentation that you need to be aware of. If you're making the smaller step from 3.0 to 3.1, the number of differences is much smaller. See the References section for more information.One word of advice: be careful not to duplicate any information in both plug-in.xml and MANIFEST.MF. Typically this would not occur unless you are converting an older plug-in that did not use MANIFEST.MF into one that does, and even then only if you are editing the files by hand instead of going through the PDE.ConclusionIn part 1 of this tutorial, we looked at what is necessary to create a bare-bones Rich Client application. The next part will delve into the classes created by the wizards such as the WorkbenchAdvisor class. All the sample code for this part may be found in the accompanying zip file.ReferencesRCP Tutorial Part 2RCP Tutorial Part 3Eclipse Rich Client PlatformRCP Browser example (project org.eclipse.ui.examples.rcp.browser)PDE Does Plug-insHow to Internationalize your Eclipse Plug-inNotes on the Eclipse Plug-in ArchitecturePlug-in Migration Guide: Migrating to 3.1 from 3.0Plug-in Migration Guide: Migrating to 3.0 from 2.1译文:Rich Client教程第一部分The Rich Client Platform (RCP)是一种创建Java应用程序的令人兴奋的新方法,可以和任何平台下的自带应用程序进行竞争。

计算机毕设英文参考文献

计算机毕设英文参考文献

计算机毕设英文参考文献当涉及到毕业设计或者毕业论文的参考文献时,你可以考虑以下一些经典的计算机科学领域的文献:1. D. E. Knuth, "The Art of Computer Programming," Addison-Wesley, 1968.2. A. Turing, "On Computable Numbers, with an Application to the Entscheidungsproblem," Proceedings of the London Mathematical Society, 1936.3. V. Bush, "As We May Think," The Atlantic Monthly, 1945.4. C. Shannon, "A Mathematical Theory of Communication," Bell System Technical Journal, 1948.5. E. W. Dijkstra, "Go To Statement Considered Harmful," Communications of the ACM, 1968.6. L. Lamport, "Time, Clocks, and the Ordering of Events in a Distributed System," Communications of the ACM, 1978.7. T. Berners-Lee, R. Cailliau, "WorldWideWeb: Proposal for a HyperText Project," 1990.8. S. Brin, L. Page, "The Anatomy of a Large-Scale Hypertextual Web Search Engine," Computer Networks and ISDN Systems, 1998.这些文献涵盖了计算机科学领域的一些经典工作,包括算法、计算理论、分布式系统、人机交互等方面的内容。

计算机专业,外文文献

计算机专业,外文文献

APPENDIXGenerating Random Fractal TerrainPaul Martz Part I: Generating Random Fractal TerrainIntroductionTen years ago, I stumbled across the 1986 SIGGRAPH Proceedings and was awestruck by one paper in particular, entitled The Definition and Renderi ng of Terrain Maps by Gavin S. P. Miller 1 . It described a handful of algorithms for generating fractal terrain, and the authors also introduce a new method which they considered to be an improvement.Initially I was impressed that these algorithms (even the algorithms considered "flawed" by the authors) could create such incredible landscape images! Then, upon reading the paper, I was floored by the simplicity of these algorithms.I've been a fractal terrain addict ever since.The math behind the algorithm can get quite complex. However, completely understanding the math is not a prerequisite for grasping the algorithm. And that's good. Because if I had to explain all the math to you before explaining the algorithm, we'd never get to the algorithm. Besides, there is literally tons of material out there on the mathematical concepts involved in fractals. See the references at the end of this article for a good start.For the same reasons that I won't go into the math details, I can't include a broad overview of fractals and everything they can be used for. Instead, I'm going describe the concepts behind fractal terrain generation, and give a focused and detailed description of my personal favorite algorithm: the "diamond-square" algorithm. I'll demonstrate how to use this algorithm to statically tessellate an array of height data that can be used for geometric terrain data, terrain texture maps, and cloud texturemaps.What can you do with a fractal terrain? I assume you already know that; that's why you're reading this. Random terrain maps are great for flight simulators or making texture maps to use as a background (showing a distant mountain range, for example). The same algorithm that makes terrain can also be used to generate texture maps for partly cloudy skies.Before I go further, a disclaimer: I am not a game programmer. If you are reading this because you want algorithms for rendering terrain quickly, you've come to the wrong place. I'll only describe the process of generating the terrain model. How you render it is up to you.Self-SimilarityThe key concept behind any fractal is self-similarity. An object is said to be self-similar when magnified subsets of the object look like (or identical to) the whole and to each other.2Consider the human circulatory system. This is a fine example of self-similarity in nature. The same branching pattern is exhibited from the largest arteries and veins all the way down to the smallest capillaries. If you didn't know you were using a microscope, you wouldn't be able to tell the difference between capillaries and arteries.Now consider a simple sphere. Is it self-similar? No. At significantly large magnification, it stops looking like a sphere altogether and starts looking like a flat plane. If you don't believe me, just take a look outside. Unless you happen to be in orbit while reading this, you'll see no indication that the Earth is a sphere. A sphere is not self-similar. It is best described using traditional Euclidean geometry, rather than a fractal algorithm.Terrain falls into the "self-similar" category. The jagged edge of a broken rock in the palm of your hand has the same irregularities as a ridgeline on a distant horizon. This allows us to use fractals to generate terrain which still looks like terrain, regardless of the scale in which it is displayed.A side note on self-similarity: In its strictest sense, it means self-identical, that is, exact miniature copies of itself are visible at increasingly small or large scales. I actually don't know of any self-identical fractals that exist in nature. But the Mandelbrot set is self-identical. I won't even go into describing the Mandelbrot set. Go dig up any of the references for more info.Midpoint Displacement in One DimensionThe diamond-square algorithm, which I will describe later, uses a kind of midpoint-displacement algorithm in two dimensions. To help you get a grip on it, we'll look at it first in one dimension.One-dimensional midpoint displacement is a great algorithm for drawing a ridgeline, as mountains might appear on a distant horizon. Here's how it works: Start with a single horizontal line segment.Repeat for a sufficiently large number of times {Repeat over each line segment in the scene {Find the midpoint of the line segment.Displace the midpoint in Y by a random amount.Reduce the range for random numbers.}}How much do you reduce the random number range? That depends on how rough you want your fractal. The more you reduce it each pass through the loop, the smoother the resulting ridgeline will be. If you don't reduce the range very much, the resulting ridgeline will be very jagged. It turns out you can tie roughness to a constant; I'll explain how to do this later on.Let's look at an example. Here, we start with a line from -1.0 to 1.0 in X, with the Y value at each endpoint being zero. Initially we'll set the random number range to be from -1.0 to 1.0 (arbitrary). So we generate a random number in that range, and displace the midpoint by that amount. After doing this, we have:Now the second time through the outer loop, we have two segments, each half the length of the original segment. Our random number range is reduced by half, so it is now -0.5 to 0.5. We generate a random number in this range for each of the two midpoints. Here's the result:We shrink the range again; it is now -0.25 to 0.25. After displacing the four midpoints with random numbers in this range, we have:Two things you should note about this.First, it's recursive. Actually, it can be implemented quite naturally as an iterative routine. For this case, either recursive or iterative would do. It turns out that for the surface generation code, there are some advantages to using an iterative implementation over a recursive one. So for consistency, the accompan ying sample code implements both the line and surface code as iterative.Second, it's a very simple algorithm, yet it creates a very complex result. That is the beauty of fractal algorithms. A few simple instructions can create a very rich and detailed image.Here I go off on a tangent: The realization that a small, simple set of instructions can create a complex image has lead to research in a new field known as fractal image compression. The idea is to store the simple, recursive instructions for creating the image rather than storing the image itself. This works great for images which are truly fractal in nature, since the instructions take up much less space than the image itself. Chaos and Fractals, New Frontiers of Science 3 has a chapter and an appendix devoted to this topic and is a great read for any fractal nut in general.Back to reality.Without much effort, you can read the output of this function into a paint program and come up with something like this:This could be used as scenery outside a window, for example. The nice thing about it is that it wraps, so you can keep around one relatively small image and completely wrap a scene with it. That is, if you don't mind seeing the same mountain in every direction.OK, before we go into 2D fractal surfaces, you need to know about the roughness constant. This is the value which will determine how much the random number range is reduced each time through the loop and, therefore, will determine the roughness of the resulting fractal. The sample code uses a floating-point number in the range 0.0 to 1.0 and calls it H. 2(-H) is therefore a number in the range 1.0 (for small H) to 0.5 (for large H). The random number range can be multiplied by this amount each time through the loop. With H set to 1.0, the random number range will be halved each time through the loop, resulting in a very smooth fractal. With H set to 0.0, the range will not be reduced at all, resulting in something quite jagged.Here are three ridgelines, each rendered with varying H valuesHeight MapsThe midpoint displacement algorithm described above can be implemented using aone-dimensional array of height values which indicate the vertical location of each line segment vertex. This array is a one-dimensional height map. It maps its indices (X values) to height values (Y values).To simulate random terrain, we want to extrapolate this algorithm into 3D space, and to do so we need a two-dimensional array of height values which will map indices (X and Z values) into height values (Y values). Note that although our end goal here is to generate three-dimensional coordinates, the array only needs to store the height (Y) values; the horizontal (X and Z) values can be generated on the fly as we parse through the array.By assigning a color to each height value, you could display a height map as an image. Here, high points in the terrain (large values) are represented by white, and low points (small values) are represented by black:Rendering a height map this way is useful for generating cloud texture maps, which I'll discuss later. Such a representation could also be used to seed a height map.附录随机分形地形的生成第一部分:生成随机分形地形介绍十年前,我参加1986 年SIGGRAPH 活动,Gavin S. P. Miller 那篇题为Definition and Rendering of Terrain Maps 的论文让我充满敬畏。

计算机专业毕业设计论文外文文献中英文翻译——java对象

计算机专业毕业设计论文外文文献中英文翻译——java对象

1 . Introduction To Objects1.1The progress of abstractionAll programming languages provide abstractions. It can be argued that the complexity of the problems you’re able to solve is directly related to the kind and quality of abstraction。

By “kind” I mean,“What is it that you are abstracting?” Assembly language is a small abstraction of the underlying machine. Many so—called “imperative” languages that followed (such as FORTRAN,BASIC, and C) were abstractions of assembly language。

These languages are big improvements over assembly language,but their primary abstraction still requires you to think in terms of the structure of the computer rather than the structure of the problem you are trying to solve。

The programmer must establish the association between the machine model (in the “solution space,” which is the place where you’re modeling that problem, such as a computer) and the model of the problem that is actually being solved (in the “problem space,” which is the place where the problem exists). The effort required to perform this mapping, and the fact that it is extrinsic to the programming language,produces programs that are difficult to write and expensive to maintain,and as a side effect created the entire “programming methods” industry.The alter native to modeling the machine is to model the problem you’re trying to solve。

毕业设计 计算机专业外文翻译 5000字

毕业设计 计算机专业外文翻译 5000字

题目Programming Overlay Networkswith Overlay SocketsProgramming Overlay Networks with Overlay Sockets The emergence of application-layer overlay networks has inspired the development of new network services and applications. Research on overlay net-workshas focused on the design of protocols to maintain and forward data in an overlay network, however, less attention has been given to the software development process of building application programs in such an environment. Clearly,the complexity of overlay network protocols calls for suitable application programming interfaces (APIs) and abstractions that do not require detailed knowledge of the overlay protocol, and, thereby, simplify the task of the application programmer. In this paper, we present the concept of an overlay socket as a new programming abstraction that serves as the end point of communication in an overlay network. The overlay socket provides a socket-based API that is independent of the chosen overlay topology, and can be configured to work for different overlay topologies. The overlay socket can support application data transfer over TCP, UDP, or other transport protocols. This paper describes the design of the overlay socket and discusses API and configuration options.1 IntroductionApplication-layer overlay networks [5, 9, 13, 17] provide flexible platforms for develop-ing new network services [1, 10, 11, 14, 18–20] without requiring changes to the network-layer infrastructure. Members of an overlay network, which can be hosts, routers, servers, or applications, organize themselves to form a logical network topology, and commu-nicate only with their respective neighbors in the overlay topology. A member ofan overlay network sends and receives application data, and also forwards data intended for other members. This paper addresses application development in overlay networks. We use the term overlay network programming to refer to the software development process of building application programs that communicate with one another in an application-layer overlay_This work is supported in part by the National Science Foundation through grant work. The diversity and complexity of building and maintaining overlay networks make it impractical to assume that application developers can be concerned with the complexity of managing the participation of an application in a specific overlay networktopology.We present a software module, called overlay socket, that intends to simplify the task of overlay network programming. The design of the overlay socket pursues the following set of objectives: First, the application programming interface (API) of the overlay socket does not require that an application programmer has knowledge of the overlay network topology. Second, the overlay socket is designed to accommodate dif-ferent overlay network topologies. Switching to different overlay network topologies is done by modifying parameters in a configuration file. Third, the overlay socket, which operates at the applicationlayer,can accommodate different types of transport layer protocols. This is accomplished by using network adapters that interface to the un-derlying transport layer network and perform encapsulation and de-encapsulation of messages exchanged by the overlay socket. Currently available network adapters are TCP, UDP, and UDP multicast. Fourth, the overlay socket provides mechanisms for bootstrapping new overlay networks. In this paper, we provide an overview of the overlay socket design and discuss over-lay network programming with the overlay socket. The overlay socket has been imple-mented in Java as part of the HyperCast 2.0 software distribution [12]. The software has been used for various overlay applications, and has been tested in both local-area as well as wide-area settings. The HyperCast 2.0 software implements the overlay topolo-gies described in [15] and [16]. This paper highlights important issues of the overlay socket, additional information can be found in the design documentation available from[12]. Several studies before us have addressed overlay network programming issues. Evenearly overlay network proposals, such as Yoid [9], Scribe [4], and Scattercast [6], have presented APIs that aspire to achieve independence of the API from the overlay network topology used. Particularly, Yoid and Scattercast use a socket-like API, how-ever, these APIs do not address issues that arise when the same API is used by different overlay network topologies. Several works on application-layer multicast overlays inte-grate the application program with the software responsible for maintaining the overlay network, without explicitly providing general-purpose APIs.These include Narada [5], Overcast [13], ALMI [17], and NICE [2]. A recent study [8] has proposed a common API for the class of so-called structured overlays, which includes Chord [19], CAN [18], and Bayeux [20], and other overlays that were originally motivated by distributed hash tables. Our work has a different emphasis than [8], since we assume a scenario where an application programmer must work with several, possibly fundamentally dif-ferent, overlay network topologies and different transmission modes (UDP, TCP), and, therefore, needs mechanisms that make it easy to change the configuration of the un-derlying overlay network..Internet Overlay socket Application Overlay socket Application Application Overlay socket Application Application Overlay socket Application Overlay Network. Fig. 1. The overlay network is a collection of overlay sockets. Root (sender) Root (receiver) (a) Multicast (b) Unicast.Fig. 2. Data forwarding in overlay networks.The rest of the paper is organized as following. In Section 2 we introduce con-cepts, abstractions, and terminology needed for the discussion of the overlay socket. In Section 3 we present the design of the overlay socket, and discuss its components. In Section 4 we show how to write programs using the overlay socket. We present brief conclusions in Section 5.2 Basic ConceptsAn overlay socket is an endpoint for communication in an overlay network, and an overlay network is seen as a collection of overlay sockets that self-organize using an overlay protocol (see Figure 1). An overlay socket offers to an application programmer a Berkeley socket-style API [3] for sending and receiving data over an overlay network.Each overlay socket executes an overlay protocol that is responsible for maintaining the membership of the socket in the overlay network topology. Each overlay socket has a logical address and a physical address in the overlay network. The logical address is dependent on the type of overlay protocol used. In the overlay protocols currently implemented in HyperCast 2.0, the logical addresses are 32- bit integers or_x_y_coordinates, where x and y are positive 32-bit positive integers. The physical address is a transport layer address where overlay sockets receive messages from the overlay network. On the Internet, the physical address is an IP address and a TCP or UDP port number. Application programs that use overlay sockets only work with logical addresses, and do not see physical addresses of overlay nodes. When an overlay socket is created, the socket is configured with a set of configu-ration parameters, called attributes. The application program can obtain the attributes from a configuration file or it downloads the attributes from a server. The configuration file specifies the type of overlay protocol and the type of transport protocol to be used,.but also more detailed information such as the size of internal buffers, and the value of protocol-specific timers. The most important attribute is the overlay identifier (overlay ID) which is used as a global identifier for an overlay network and which can be used as a key to access the other attributes of the overlay network. Each new overlay ID corresponds to the creation of a new overlay network. Overlay sockets exchange two types of messages, protocol messages and application messages. Protocol messages are the messages of the overlay protocol that main-tain the overlay topology. Application messages contain applicationdata that is encap-sulatedn an overlay message header. An application message uses logical addresses in the header to identify source and, for unicast, the destination of the message. If an overlay socket receives an application message from one of its neighbors in the over-laynetwork, it determines if the message must be forwarded to other overlay sockets, and if the message needs to be passed to the local application. The transmission modes currently supported by the overlay sockets are unicast, and multicast. In multicast, all members in the overlay network are receivers.In both unicast and multicast,the com-mon abstraction for data forwarding is that of passing data in spanning trees that are embedded in the overlay topology. For example, a multicast message is transmitted downstream a spanning tree that has the sender of the multicast message as the root (see Figure 2(a)). When an overlay socket receives a multicast message, it forwards the message to all of its downstream neighbors (children) in the tree, and passes the mes-sage to the local application program. A unicast message is transmitted upstream a tree with the receiver of the message as the root (see Figure 2(b)). An overlay socket that receives a unicast message forwards the message to the upstream neighbor (parent) in the tree that has the destination as the root. An overlay socket makes forwarding decisions locally using only the logical ad-dresses of its neighbors and the logical address of the root of the tree. Hence, there is a requirement that each overlay socket can locally compute its parent and its children in a tree with respect to a root node. This requirement is satisfied by many overlay network topologies, including [15, 16, 18–20].3 The Components of an Overlay SocketAn overlay socket consists of a collection of components that are configured when the overlay socketis created, using the supplied set of attributes. These components include the overlay protocol, which helps to build and maintain the overlay network topology, a component that processes application data, and interfaces to a transport-layer network. The main components of an overlay socket, as illustrated in Figure 3, are as follows:The overlay node implements an overlay protocol that establishes and maintains the overlay network topology. The overlay node sends and receives overlay protocol messages, and maintains a set of timers. The overlay node is the only component of an overlay socket that is aware of the overlay topology. In the HyperCast 2.0. Overlay socket Forwarding EngineApplication Programming InterfaceStatistics InterfaceProtocol MessagesApplicationReceiveBufferApplicationTransmitBuffer Overlay NodeO verlay NodeInterfac eNode AdapterAdapter InterfaceSocket AdapterA dapter InterfaceApplication MessagesApplication ProgramTransport-layer NetworkApplication MessagesFig. 3. Components of an overlay socket.software, there are overlay nodes that build a logical hypercube [15] and a logical Delaunay triangu-lartion [16].The forwarding engine performs the functions of an application-layer router, that sends, receives, and forwards formatted application-layer messages in the overlay network. The forwarding engine communicates with the overlay node to query next hop routing information for application messages. The forwarding decision is made using logical addresses of the overlay nodes. Each overlay socket has two network adapters that each provides an interface to transport-layer protocols, such as TCP or UDP. The nodeadapter serves as the in-terface for sending and receiving overlay protocol messages, and the socket adapter serves as the interface for application messages. Each adapter has a transport level address, which, in the case of the Internet, consists of an IP address and a UDP or TCP port number. Currently, there are three different types of adapters, for TCP, UDP, and UDP multicast. Using two adapters completely separates the handling of messages for maintaining the overlay protocol and the messages that transport application data.The application receive buffer and application transmit buffer can temporarily store messages that, respectively, have been received by the socket but not been deliv-ered to theapplication, or that have been released by the application program, but not been transmitted by the socket. The application transmit buffer can play a role when messages cannot be transmitted due to rate control or congestion control con-straints. The application transmit buffer is not implemented in the HyperCast 2.0 software.Each overlay socket has two external interfaces. The application programming in-terface (API) of the socket offers application programs the ability to join and leave existing overlays, to send data to other members of the overlay network, and receive data from the overlay network. The statistics interface of the overlay socket provides access to status information of components of the overlay socket, and is used for monitoring and management of an overlay socket. Note in Figure 3 that some components of the overlay socket also have interfaces, which are accessed by other components of the overlay socket. The overlay manager is a component external to the overlay socket (and not shown in Figure 3). It is responsible for configuring an overlay socket when the socket is created. The overlay manager reads a configuration file that stores the attributes of an overlay socket, and, if it is specified in the configuration file, may access attributes from a server, and then initiates the instantiation of a new overlay socket.4 Overlay Network ProgrammingAn application developer does not need to be familiar with the details of the components of an overlay socket as described in the previous section. The developer is exposed only to the API of the overlay socket and to a file with configuration parameters.The configuration file is a text file which stores all attributes needed to configure an overlay socket. The configuration file is modified whenever a change is needed to the transport protocol, the overlay protocol, or some other parameters of the overlay socket. In the following, we summarize only the main features of the API, and we refer to [12] for detailed information on the overlay socket API.4.1 Overlay Socket APISince the overlay topology and the forwarding of application-layer data is transparent to the application program, the API for overlay network programming can be made simple. Applications need to be able to create a new overlay network, join and leave an existing overlay network, send data to and receive data from other members in the overlay.The API of the overlay socket is message-based, and intentionally stays close to the familiar Berkeley socket API [3]. Since space considerations do not permit a description of the full API, we sketch the API with the help of a simplified example. Figure 4 shows the fragment of a Java program that uses an overlay socket. An application program configures and creates an overlay socket with the help of an overlay manager (o m). The overlay manager reads configuration parameters for the overlay socket from a configu-ration file (hypercast.pro p), which can look similarly as shown in Figure 5. The applica-tion program reads the overlay ID with command om.getDefaultProperty(“OverlayID”) from the file, and creates an configuration object (confi g) for an overlay socket with the.// Generate the configuration object OverlayManager om = newOverlayManager("hypercast.prop");String MyOverlay = om.getDefaultProperty("OverlayID"); OverlaySocketConfig config = new om.getOverlaySocketConfig(MyOverlay); // create an overlay socketOL Socket socket = config.createOverlaySocket(callback);// Join an overlaysocket.joinGroup();// Create a messageOL Message msg = socket.createMessage(byte[] data, int length);// Send the message to all members in overlay networksocket.sendToAll(msg);// Receive a message from the socketOL Message msg = socket.receive();Fig. 4. Program with overlay sockets.# OVERLAY Server:OverlayServer =# OVERLAY ID:OverlayID = 1234KeyAttributes= Socket,Node,SocketAdapter# SOCKET:Socket = HCast2-0HCAST2-0.TTL = 255HCAST2-0.ReceiveBufferSize = 200# SOCKET ADAPTER:SocketAdapter = TCPSocketAdapter.TCP.MaximumPacketLength = 16384# NODE:Node = DT2-0DT2-0.SleepTime = 400# NODE ADAPTER:NodeAdapter = NodeAdptUDPServer NodeAdapter.UDP.MaximumPacketLength = 8192 NodeAdapter.UDPServer.UdpServer0 =128.143.71.50:8081Fig. 5. Configuration file (simplified) given overlay ID. The configuration objectalso loads all configuration information from the configuration file, and then creates the overlay socket(config.createOverlaySocke t).Once the overlay socket is created, the socket joins the overlay network (socket.join-Grou p). When a socket wants to multicast a message, it instantiates a new message (socket.createMessage) and trans-mits the message using the sendToAll method. Other transmission options are send-To-Parent, send-To-Children, sendToNeighbors, and sendToNode, which, respectively, send a message to the upstream neighbor with respect to a given root (see Figure 2), to the downstream neighbors, to all neighbors, or to a particular node with a given logical address.4.2 Overlay Network Properties ManagementAs seen, the properties of an overlay socket are configured by setting attributes in a configuration file. The overlay manager in an application process uses the attributes to create a new overlay socket. By modifying the attributes in the configuration file, an application programmer can configure the overlay protocol or transport protocol that is used by the overlay socket. Changes to the file must be done before the socket is created. Figure 5 shows a (simplified) example of a configuration file. Each line of the configuration file assigns a value to an attribute. The complete list of attributes and the range of values is documented in [12]. Without explaining all entries in Figure 5, the file sets, among others, the ov erlay ID to …1234 ‟, selects version 2.0 of the DT protocol as overlay protocol (…Node=DT2-0 ‟), and it sets the transport protocol of the socket adaptor to TCP(…SocketAdapter=TCP ‟).Each overlay network is associated with a set of attributes that characterize the properties of the over-lay sockets that participate in the overlay network. As mentioned earlier, the most important attribute is the overlay ID, which is used to identify an y network, andwhich can be used as a key toaccess all other attributes of an overlay network. The overlay ID should be a globally unique identifier.A new overlay network is created by generating a new overlay ID and associating a set of attributes that specify the properties of the overlay sockets in the overlay network. To join an overlay network, an overlay socket must know the overlay ID and the set of attributes for this overlay ID. This information can be obtained from a configuration file, as shown in Figure 5.All attributes have a name and a value, both of which are strings. For example, the overlay protocol of an overlay socket can be determined by an attribute with name NODE. If the attribute is set to NOD-E=DT2- 0, then the overlay node in the overlay socket runs the DT (version 2) overlay protocol. The overlay socket distinguishes between two types of attributes: key attributes and configurable attributes. Key attributes are specific to an overlay network with a given overlay ID. Key attributes are selectedwhen the overlay ID is created for an overlay network, and cannot be modified after-wards.Overlay sockets that participate in an overlay network must have identical key attributes, but can have different configurable attributes. The attributes OverlayID and KeyAttributes are key attributes by default in all overlay networks. Configurable at-tributes specify parameters of an overlay socket, which are not considered essential for establishing communication between overlay sockets in the same overlay network, and which are considered …tunable‟.5 ConclusionsWe discussed the design of an overlay socket which attempts to simplify the task of overlay network programming. The overlay socket serves as an end point of commu-nication in the overlay network. The overlay socket can be used for various overlay topologies and support different transport protoc-ols. The overlay socket supports a simple API for joining and leaving an overlaynetwork, and for sending and receiving data to and from other sockets in the overlay network. The main advantage of the overlay socket is that it is relatively easy to change the configuration of the overlay network. An implementation of the overlay socket is distributed with the HyperCast2.0 soft-ware. The software has been extensively tested. A variety of different applications, such as distributed whiteboard and a video streaming application, have been developed with the overlay sockets. Acknowledgement. In addition to the authors of this article the contributors include Bhupinder Sethi, Tyler Beam, Burton Filstrup, Mike Nahas, Dongwen Wang, Konrad Lorincz, Jean Ablutz, Haiyong Wang, Weisheng Si, Huafeng Lu, and Guangyu Dong.应用层覆盖网络的出现促进了新网络服务和应用的发展。

计算机专业毕业论文参考文献(精选115个最新)

计算机专业毕业论文参考文献(精选115个最新)

计算机专业是计算机硬件与软件相结合、面向系统、更偏向应用的宽口径专业。

通过基础教学与专业训练,培养基础知识扎实、知识面宽、工程实践能力强,具有开拓创新意识,在计算机科学与技术领域从事科学研究、教育、开发和应用的高级人才。

以下是我们整理的计算机毕业论文参考文献,供你参考借鉴。

首先我们一起来看看关于计算机网络和计算机英文的参考文献,详情点击查看。

计算机网络参考文献(精选119个最新)计算机英文参考文献(最新推荐100个)接下来,是计算机各个专业的毕业论文参考文献,如需查看某篇论文全文,可以通过页面右上角↗的【文献求助】免费获取。

计算机专业毕业论文参考文献一:[1]王琨. Linux操作系统下的网络多媒体技术应用[D].西安电子科技大学,2001.[2]陆海波. 智能型掌上电脑(PDA)的研究与开发[D].电子科技大学,2001.[3]高玉金. WINDOWS环境下并行容错局域网的研究及实现[D].燕山大学,2000.[4]陈军. 分布式存储环境下并行计算可扩展性的研究与应用[D].中国人民解放军国防科学技术大学,2000.[5]王霜. 瓦楞纸箱CAD系统开发[D].四川大学,2000.[6]王茂均. 织带机智能监测管理系统研究[D].大连理工大学,2000.[7]郭朝华. 多处理器并行的星上计算机系统设计[D].中国科学院上海冶金研究所,2000.[8]刘胜. 拖拉机作业机组仿真试验台自动变速控制系统的研究[D].中国农业大学,2000.[9]陈新昌. 冷藏、保温汽车静态降温调温性能测试系统的研究[D].河南农业大学,2000.[10]毛鹏军. 智能化温室环境参数微机监控系统的设计研究[D].河南农业大学,2000.[11]史志存. 电子鼻及其应用研究[D].中国科学院电子学研究所,2000.[12]孟笛. 复合材料加筋板壳结构稳定性设计的可视化研究和实现[D].大连理工大学,2000.[13]刘鹏民. 涡街电磁流量计机理的研究与开发[D].北京化工大学,2000.[14]付岩. 通用脚本语言GSCRIPT设计与应用的研究[D].中国科学院研究生院(计算技术研究所),2000.[15]石争浩. 《计算机组成原理》CAI及其多媒体课件实现技术研究[D].西安理工大学,2000.[16]姚彤. 农机销售管理信息系统的设计与开发[D].东北农业大学,2000.[17]吕康娟. 基于地理信息系统(GIS)的小流域综合治理规划的研究[D].东北农业大学,2000.[18]邱建民. 北工大研究生教育管理信息系统[D].北京工业大学,2000.[19]刘春明. 变电站电压无功控制装置实用技术研究[D].华北电力大学,2000.[20]刘力力. 计算机系统性能评测与分析[D].中国科学院研究生院(计算技术研究所),2000.[21]宋蓬勃. 基于校园网的高校研究生教务管理系统[D].山东师范大学,2000.[22]陈永华. WebGIS三维可视化的研究[D].解放军信息工程大学,2000.[23]潘炜华. 新生隐球菌分子重组操作系统的建立及其荚膜相关基因的研究[D].第二军医大学,2000.[24]杨群生. 模糊联想记忆网络和模糊图象处理研究[D].华南理工大学,2000.[25]牛红军. 自动车辆定位系统的研究[D].西安理工大学,2000.[26]张志强. 网络环境下住房公积金管理信息系统的研究[D].华北电力大学,2000.[27]王笑风. 路面摊铺机械自动调平控制器的仿真测试器的研究[D].长安大学,2000.[28]黄晓华. 壁板铣床数控系统硬件结构的研究与开发[D].大连理工大学,2000.[29]景玲玲. 河南省公路地理信息系统的研制与开发[D].大连理工大学,2000.[30]李吉宽. 单片机模糊控制在船舶电站自动并车中的应用[D].大连海事大学,2000.计算机专业毕业论文参考文献二:[31]徐洪禹. 面向只读应用的分布式数据库的模型构造及查询优化的研究[D].大连理工大学,2000.[32]李卫东. 微机控制LED点阵显示屏[D].大连理工大学,2000.[33]常天海. 希望-IV型多媒体语音教室系统的研究与设计[D].大连理工大学,2000.[34]解宏基. 变频调速矢量控制交流三相异步电动机的仿真研究[D].大连海事大学,2000.[35]宋东方. 基于公路养护管理的GIS应用与开发[D].大连理工大学,2000.[36]王晓丽. 工程图扫描输入与智能识别技术的研究[D].大连理工大学,2000.[37]田宇. 基于客户机/服务器的大连市血液中心管理信息系统[D].大连理工大学,2000.[38]杨敬辉. 基于Intranet的大连市血液中心管理信息系统[D].大连理工大学,2000.[39]任彬. 一种新型的水表联网抄表系统[D].大连理工大学,2000.[40]童晨涛. 港口调度现代信息网络的研究[D].大连海事大学,2000.[41]李德良. 基于寄生传输的检测报警系统[D].大连理工大学,2000.[42]侯宗浩. 集成C/S、B/S结构的物资采供系统研究[D].西安理工大学,2000.[43]雷晓强. 冗余度机器人的轨迹规划与障碍物回避的实时控制[D].西安理工大学,2000.[44]徐前锋. 多模型优化模糊控制算法的应用研究[D].西安理工大学,2000.[45]杨沂. 基于Intranet的电力综合管理信息系统分析与设计及用户满意度评价方法的研究[D].西安理工大学,2000.[46]张怀领. 异构环境下的分布式数据库事务处理的研究与实践[D].大连理工大学,2000.[47]王振华. 近海结构基础设计程序系统[D].大连理工大学,2000.[48]王琳. 基于软计算的智能控制器的研究[D].大连海事大学,2000.[49]何志刚. 基于Internet/Intranet技术的MIS应用与开发[D].大连海事大学,2000.[50]刘中兵. 焊缝图象识别的研究及应用[D].大连理工大学,2000.[51]崔鸿远. 玉米播种机工况监测系统的研究与试验[D].中国农业大学,2000.[52]田健. 超音频感应加热电源的研制[D].西安理工大学,2000.[53]祝华军. 小城镇规划及基础设施投资问题研究[D].中国农业大学,2000.[54]孙毅. 渭河洪水错峰调度决策支持系统[D].西安理工大学,2000.[55]张寿桂. 厦门港集装箱运输MIS总体规划研究[D].大连海事大学,2000.[56]王涛. 船舶管理信息系统的研究[D].大连海事大学,2000.[57]杨媛. 智能化超声波水流量计的理论分析与软件开发[D].西安理工大学,2000.[58]史庆国. 壁面机器人路径规划与控制系统研究[D].河北工业大学,2000.[59]田永青. 模糊控制系统的结构化分析[D].河北工业大学,2000.[60]丁承君. 基于神经网络和模糊控制的移动机器人墙跟踪[D].河北工业大学,2000.计算机专业毕业论文参考文献三:[61]周颖. 基于模糊滑动面的滑动模态控制方法研究[D].河北工业大学,2000.[62]张建华. 集中供热系统的水力计算及地理信息系统的开发[D].华北电力大学,2000.[63]徐延明. 地理信息系统在配电管理系统中的应用研究[D].华北电力大学,2000.[64]于成. 综合船舶信息处理与显示系统[D].大连海事大学,2000.[65]苏利敏. 新型串级调速系统的研究[D].河北工业大学,2000.[66]刘丽华. 大功率超声发生器的研制及超声乳化的实验研究[D].华北电力大学,2000.[67]孙东卫. 都江堰水利自动化控制系统设计[D].电子科技大学,1999.[68]胡霞光. 青藏公路CAE系统的研究与开发[D].长安大学,1999.[69]尹宏宾. 智能化信号交叉口控制及其交通量预测方法的研究[D].华南理工大学,1999.[70]邱焕耀. 模糊控制、神经网络和变结构控制的交叉结合及其应用研究[D].华南理工大学,1999.[71]张星明. 地质图象处理算法的研究与实现[D].中国科学院研究生院(计算技术研究所),1999.[72]孟小峰. 中文数据库自然语言查询处理研究[D].中国科学院研究生院(计算技术研究所),1999.[73]王灏. 机器人智能控制方法研究[D].华南理工大学,1999.[74]庄圣贤. 无传感速度伺服矢量变频调速系统的研究[D].电子科技大学,1999.[75]王伟. 序列图象的几何约束及其应用[D].西安电子科技大学,1998.[76]张光海. 受限柔性机器人装置、建模与控制的研究[D].华南理工大学,1998.[77]金菊良. 遗传算法及其在水问题中的应用[D].河海大学,1998.[78]樊晓平. 受限柔性机器人的动力学建模与智能控制[D].华南理工大学,1998.[79]黄道平. 多变量非线性过程控制[D].华南理工大学,1998.[80]陈虔. 大型应用软件协同开发的版本控制和管理—面向组件增量的版本控制方法[D].中国科学院研究生院(高能物理研究所),1997.[81]刘黎临. 大型信息网络设计与性能研究[D].中国科学院研究生院(计算技术研究所),1998.[82]牟树波. ACPI标准的实现技术[D].中国科学院研究生院(计算技术研究所),1998.[83]侯春海. 工程中时延动态系统的定量稳定性分析[D].浙江大学,1997.[84]孙富春. 机械手的神经网络稳定自适应控制[D].清华大学,1997.[85]周勇. 遥感和地理信息系统支持的土水资源分类、评价与预测研究[D].华中农业大学,1997.[86]李明. 基于工作站网络的分布式共享存储系统的设计[D].中国科学院研究生院(计算技术研究所),1997.[87]王晓鸥. 计算机控制短波自适应通信网的实现[D].中国科学院研究生院(计算技术研究所),1997.[88]周小佳. 电力系统可靠性人工神经网络模型及实现研究[D].重庆大学,1997.[89]李永树. 地表移动预计方法及信息处理(SPDP)系统研究[D].中国矿业大学(北京),1997.[90]孙毓忠. 互连网络性能分析及其应用[D].中国科学院研究生院(计算技术研究所),1997.计算机专业毕业论文参考文献四:[91]马森. 曙光2000单一系统映象文件系统COSMOS操作系统相关层的设计和实现[D].中国科学院研究生院(计算技术研究所),1997.[92]陈晨风. 高性能交流伺服系统的智能控制策略[D].浙江大学,1997.[93]林峰. 交流传动系统的控制策略[D].浙江大学,1997.[94]陈小红. 径向基函数网络及其在非线性控制中的应用[D].浙江大学,1996.[95]陈晓青. 高性能交流伺服系统的研究与开发[D].浙江大学,1996.[96]周宏甫. 六坐标工具磨床CNC系统的关键技术研究[D].华中理工大学,1996.[97]王杰. 高精度交流伺服系统的新型控制策略[D].浙江大学,1996.[98]金连文. 手写体汉字识别的研究[D].华南理工大学,1996.[99]戴建荣. 胶片剂量仪软件开发及其在X线立体定向放疗技术中的应用[D].中国协和医科大学,1996.[100]张虹. 并行计算机系统的用户界面研究与设计[D].中国科学院研究生院(计算技术研究所),1996.[101]朱群雄. 神经网络结构理论与技术的研究及其在过程模拟与过程控制中的应用[D].北京化工大学,1996.[102]张朝海. 电力系统运行与控制[D].华南理工大学,1996.[103]侯昭胤. 神经网络辅助丙烷氨氧化催化剂设计[D].浙江大学,1996.[104]毕立群. 换热网络智能综合方法的理论研究与实践[D].北京化工大学,1995.[105]韦巍. 学习控制及其在机器人控制中的应用[D].浙江大学,1994.[106]金毅. 模糊集合论在生产计划和调度中的应用研究[D].东南大学,1994.[107]蒋其友. 人工智能理论与技术的研究及其在大型离心式压缩机故障诊断中的应用[D].北京化工大学,1993.[108]黄崇福. 信息扩散原理与计算思维及其在地震工程中的应用[D].北京师范大学,1992.[109]贾家麟. 城市环境工程地质系统工程分析方法及其应用[D].中国地质科学院,1992.[110]杨冀宏. 人工智能技术在分离过程综合中的应用研究[D].北京化工大学,1990.[111]钟勇. 人体胚胎视交叉微血管的实验研究[D].中国协和医科大学,1990.[112]赵一举. 肺动脉高压辅助诊断[D].中国协和医科大学,1989.[113]严晓光. 胶鞋模具CAD/CAM一体化技术的研究[D].华中理工大学,1988.[114]陈申. 连续搅拌反应釜(CSTR)计算机实时控制[D].浙江大学,1988.[115]朱善安. 电液控制系统辨识及实时控制策略研究[D].浙江大学,1987.以上就是关于计算机专业毕业论文参考文献的分享,希望对你有所帮助。

计算机科学与技术专业 外文翻译 外文文献 英文文献 记录

计算机科学与技术专业 外文翻译 外文文献 英文文献 记录

外文文献原稿和译文原稿IntroductionThe creation and maintenance of records relating to the students of an institution are essential to:. managing the relationship between the institution and the student;. providing support and other services and facilities to the student;. controlling the student’s academic progress and measuring their achievement, both at the institution and subsequently;. providing support to the student after they leave the institution.In addition, student records contain data which the institution can aggregate and analyse to inform future strategy, planning and service provision.The number of students in HEIs has increased rapidly in the last twenty years. An institution’s relationship with an individual student has also become increasingly complex because of the range of support services institutions now provide to students and life long learning initiatives. Consequently, the volume and complexity of student records have also increased, as have the resources required to create, maintain, use, retain and dispose of them, irrespective of the format in which they are kept. Ensuring that the personal data contained in student records is controlled and managed in line with the principles of the Data Protection Act 1998 creates an additional complication.Institutions should, therefore, establish a policy on managing student records to ensure that they are handled consistently and effectively wherever they are held and whoever holds them. This policy should ensure that:. records relating to an individual student are complete, accurate and up to date;. duplication of student data is deliberate rather than uncontrolled and kept to the minimum needed to support effective administration;. records are held and stored securely to prevent unauthorised access to them;. records relating to the academic aspects of the student’s relationship with the institution are clearly segregated from those dealing with financial, disciplinary, social, support and contractual aspects of that relationship. This will enable differential retention periods to be applied to each of these to meet business and regulatory requirements.What are student records?Records are documents or other items which:. contain recorded information;. are produced or received in the initiation, conduct or completion of an activity;. are retained as evidence of that activity, or because they have other informational value.The recorded information may be in any form (e.g. text, image, sound) and the records may be in any medium or format.Student records –records associated with managing the relationship between an institution and its students –can be organised into three broad categories, each of which may be additionally divided:1. Records documenting the contractual relationship between the student and the institutione.g. records documenting admission and enrolment, payment of tuition fees, non-academic disciplinary proceedings.2. Records documenting the student as a learnere.g. records documenting programmes undertaken, academic progress and performance, awards.3. Records documenting the student as an individual and consumer of services provided by the institutione.g. records documenting use of accommodation services, counseling services, library and IT support services, careers and employment services.Most records in categories 1 and 3 have specific retention periods triggered by the formal end of a student’s direct relationship with an institution, although the information they contain may be aggregated and analyzed to provide data requested by third parties1 orto support the institution’s planning and development activities. An institution will need to retain some of the records in category 2 to provide confirmatory information to potential employers, professional bodies and associations, and to bodies which regulate entry to medical and other professions and which assess and maintain evidence of fitness to practice in those professions.Who is responsible for managing student records?HEI organizational structures vary considerably. As a result, it is difficult to specify exactly where these responsibilities should lie in any one institution.Responsibility for managing student records should be clearly defined and documented. It is important to define the responsibilities of staff involved in: . managing the institution’s general, contractual relationship with the student;. managing the institution’s relationship with the student as a learner;. providing technical and personal support services to the student;for creating, maintaining, using, retaining and disposing of records documenting those activities during the student’s time at the institution.Institutions should also designate one clear point of responsibility for maintaining complete, accurate and up to date records on every student, covering all aspects of the relationship. They should also define the minimum content of the core student record so that the institution can, if required:. demonstrate, within the provisions of limitation statutes, that its implied contract with the student has been fulfilled;. provide information on the student’s academic performance and award(s) to potential employers, to licensing/regulatory bodies (normally first registration only)which control entry to professions and to other organizations (e.g. those providing chartered status) as well as to the student;. provide information on the student as an individual as a means of enabling the institution, or others acting on its behalf, to analyse and aggregate student data for planning and developing its future programmes, recruitment activities and the facilities and services required to support future students.Where and how should student records be stored?The nature of student records and the personal information they contain demands that they should be stored in facilities and equipment (‘hard copy’ records) or electronic systems (digital records) which are, above all, secure and accessible only to authorized staff whose work requires them to have access. In addition, the facilities and equipment should provide: . adequate space for all the records which need to be produced and retained;. appropriate environmental conditions for the record media used.Storage facilities and systems should meet the same standards irrespective of where they are located and who is responsible for managing them.Authorized staff should maintain a record of:. the content, format and location of all student records;. the names and designations of all staff with access to student records, and any limitations on that access;. student records which have been transferred to another part of the institution, particularly after the student has left;. organizations, professional bodies, statutory regulators to whom personal data relating to the student has been provided.Student records should be stored and indexed so that they can be identified and retrieved quickly and easily.. Paper records should be housed in durable containers which carry only an impersonal code number related to a restricted-access list or index to prevent casual, unauthorised access. These containers should be stored in locked equipment or rooms when they are not being used to ensure that the personal data they contain is protected in line with the requirements of the Data Protection Act 1998.. Digital records should be uniquely identified and protected with passwords and other electronic security measures. In all cases, access should be limited to those staff who have ‘a need to know’. If ele ctronic systems are not centrally managed, designated staff should make back-up copies to prevent loss of records through accidental or intentional damage.Whatever its format, the ‘core student record’ shou ld be treated as a vital record and action taken to protect it from disaster or systems failure by copying and dispersal.Student records will become relatively inactive once the student leaves the institution.They may then be transferred to other storage facilities or systems. At this point, duplicates of records created for administrative convenience should be destroyed so that only the designated official records survive.Who should have access to student records?Institutions should tightly control access to student records to prevent unauthorised use, alteration, removal or destruction of the records themselves and unauthorised disclosure of the information they contain. Only those members of staff who need them to do their work should have access to student records and, their access should be restricted to records of the direct relationship and not to the content of the whole file.Student records contain personal data and are therefore subject to the provisions of the Data Protection Act 1998, including the provision that the student, as the data subject, should be given access to personal data held, whether in digital or hard copy form. In addition, the ‘core student record’ as defined by the KCL study includes personal data on the student’s parents which is also subject to the provisions of th e Act.How long should student records be kept?In general, student records should be kept only for as long as is necessary to:. fulfill and discharge the contractual obligations established between the institution and the student, including the completion of any non-academic disciplinary action;. provide information on the academic career and achievements of the student to employers, licensing/regulatory bodies and other organizations, as well as to the student as part of their lifelong learning record;. record the activities of the student as an individual and as a consumer of student support and other institutional services as a means of managing those services and planning and developing them in the future.The nature of the activities which give rise to these categories of records drives their retention.. The contractual relationship between the institution and the student is subject to the same statutory limitations on action as any other contract. This will include records of disciplinary action taken against the student. The records should be disposed of accordingly. The date at which the student leaves the institution normally provides the retention‘trigger’.. The records relating to the student as a learner need to be retained for longer than other student records. Institutions accept that they have an obligation, during a student’s working life, to provide factual information on what they have studied and achieved, i.e. a Transcript. The proposed lifelong learning record or progress file would also include additional data on relevant non-academic achievements and activities (e.g. voluntary work). The retention period for these records should reflect the need to fulfill this obligation over long periods of time, perhaps for the lifetime of the student. It is important to segregate these records from those relating to other aspects of the relationship so that non-academic records are not retained for unnecessarily long periods, consuming storage resources and creating potential breaches of the Data Protection Act 1998.. Records relating to the student as an individual and as a user of student support and institutional services are relatively short term and should be retained for a short finite period once the student leaves the institution. This period should be shorter than for records relating to the wider contractual arrangements.The KCL study proposed the development of a ‘core student record’ which would contain, in addition to the formal transcript, data relating to the background of the student, including parents’ address and occupation, schools attended, first employment, etc. In addition to providing academic information on the individual student, KCL suggested that the availability of this data facilitates its analysis for institutional business planning and development purposes, as well as supporting subsequent academic historical, sociological and demographic research.Individual institutions should decide whether they wish to retain this data for research purposes once immediate institutional business needs have been met. In doing so they will need to take account of:. the cost and technical difficulty of maintaining records, even in summary form, permanently;. the security and subject access implications of retaining personal data relating to named individuals;. the need to create and maintain finding aids so that individual records can be easilyand quickly retrieved when required, particularly to meet subject access requests.How should student records be destroyed?Student records should be destroyed in line with agreed retention periods. Destruction should be authorized by staff with appropriate authority and it should be carried out in accordance with the institution’s procedures for the destruction of redundant rec ords containing personal data.The authority for destruction and the date of destruction should be recorded and held by the section of the institution with final responsibility for the student record.译文介绍创建与维护和学生相关的记录对一个公共机构来说是十分重要的:处理机关和学生之间的关系;提供支持和其他服务以及便利给学生;在机关,控制学生学术进展和测量他们的成就;随后提供支持给学生,在他们离开机关之后。

计算机专业毕业设计论文外文文献中英文翻译(Object)

计算机专业毕业设计论文外文文献中英文翻译(Object)

外文资料Object landscapes and lifetimesTechnically, OOP is just about abstract data typing, inheritance, and polymorphism, but other issues can be at least as important. The remainder of this section will cover these issues.One of the most important factors is the way objects are created and destroyed. Where is the data for an object and how is the lifetime of the object controlled? There are different philosophies at work here. C++ takes the approach that control of efficiency is the most important issue, so it gives the programmer a choice. For maximum run-time speed, the storage and lifetime can be determined while the program is being written, by placing the objects on the stack (these are sometimes called automatic or scoped variables) or in the static storage area. This places a priority on the speed of storage allocation and release, and control of these can be very valuable in some situations. However, you sacrifice flexibility because you must know the exact quantity, lifetime, and type of objects while you're writing the program. If you are trying to solve a more general problem such as computer-aided design, warehouse management, or air-traffic control, this is too restrictive.The second approach is to create objects dynamically in a pool of memory called the heap. In this approach, you don't know until run-time how many objects you need, what their lifetime is, or what their exact type is. Those are determined at the spur of the moment while the program is running. If you need a new object, you simply make it on the heap at the point that you need it. Because the storage is managed dynamically, at run-time, the amount of time required to allocate storage on the heap is significantly longer than the time to create storage on the stack. (Creating storage on the stack is often a single assembly instruction tomove the stack pointer down, and another to move it back up.) The dynamic approach makes the generally logical assumption that objects tend to be complicated, so the extra overhead of finding storage and releasing that storage will not have an important impact on the creation of an object. In addition, the greater flexibility is essential to solve the general programming problem.Java uses the second approach, exclusively]. Every time you want to create an object, you use the new keyword to build a dynamic instance of that object.There's another issue, however, and that's the lifetime of an object. With languages that allow objects to be created on the stack, the compiler determines how long the object lasts and can automatically destroy it. However, if you create it on the heap the compiler has no knowledge of its lifetime. In a language like C++, you must determine programmatically when to destroy the object, which can lead to memory leaks if you don’t do it correctly (and this is a common problem in C++ programs). Java provides a feature called a garbage collector that automatically discovers when an object is no longer in use and destroys it. A garbage collector is much more convenient because it reduces the number of issues that you must track and the code you must write. More important, the garbage collector provides a much higher level of insurance against the insidious problem of memory leaks (which has brought many a C++ project to its knees).The rest of this section looks at additional factors concerning object lifetimes and landscapes.1 Collections and iteratorsIf you don’t know how many objects you’re going to need to solve a particular problem, or how long they will last, you also don’t know how to store those objects. How can you know how much space to create for thoseobjects? You can’t, since that information isn’t known until run-time.The solution to most problems in object-oriented design seems flippant: you create another type of object. The new type of object that solves this particular problem holds references to other objects. Of course, you can do the same thing with an array, which is available in most languages. But there’s more. This new object, generally called a container(also called a collection, but the Java library uses that term in a different sense so this book will use “container”), will expand itself whenever necessary to accommodate everything you place inside it. So you don’t need to know how manyobjects you’re going to hold in a container. Just create a container object and let it take care of the details.Fortunately, a good OOP language comes with a set of containers as part of the package. In C++, it’s part of the Standard C++ Library and is sometimes called the Standard Template Library (STL). Object Pascal has containers in its Visual Component Library (VCL). Smalltalk has a very complete set of containers. Java also has containers in its standard library. In some libraries, a generic container is considered good enough for all needs, and in others (Java, for example) the library has different types of containers for different needs: a vector (called an ArrayListin Java) for consistent access to all elements, and a linked list for consistent insertion at all elements, for example, so you can choose the particular type that fits your needs. Container libraries may also include sets, queues, hash tables, trees, stacks, etc.All containers have some way to put things in and get things out; there are usually functions to add elements to a container, and others to fetch those elements back out. But fetching elements can be more problematic, because a single-selection function is restrictive. What if you want to manipulate or compare a set of elements in the container instead of just one?The solution is an iterator, which is an object whose job is to select the elements within a container and present them to the user of the iterator. As a class, it also provides a level of abstraction. This abstraction can be used to separate the details of the container from the code that’s accessing that container. The container, via the iterator, is abstracted to be simply a sequence. The iterator allows you to traverse that sequence without worrying about the underlying structure—that is, whether it’s an ArrayList, a LinkedList, a Stack, or something else. This gives you the flexibility to easily change the underlying data structure without disturbing the code in your program. Java began (in version 1.0 and 1.1) with a standard iterator, called Enumeration, for all of its container classes. Java 2 has added a much more complete container library that contains an iterator called Iterator that does more than the older Enumeration.From a design standpoint, all you really want is a sequence that can be manipulated to solve your problem. If a single type of sequence satisfied all of your needs, there’d be no reason to have different kinds. There are two reasons that you need a choice of containers. First, containers provide different types of interfaces and external behavior.A stack has a different interface and behavior than that of a queue, which is different from that of a set or a list. One of these might provide a more flexible solution to your problem than the other. Second, different containers have different efficiencies for certain operations. The best example is an ArrayList and a LinkedList. Both are simple sequences that can have identical interfaces and external behaviors. But certain operations can have radically different costs. Randomly accessing elements in an ArrayList is a constant-time operation; it takes the same amount of time regardless of the element you select. However, in a LinkedList it is expensive to move through the list to randomly selectan element, and it takes longer to find an element that is further down the list. On the other hand, if you want to insert an element in the middle of a sequence, it’s much cheaper in a LinkedList than in an ArrayList. These and other operations have different efficiencies depending on the underlying structure of the sequence. In the design phase, you might start with a LinkedList and, when tuning for performance, change to an ArrayList. Because of the abstraction via iterators, you can change from one to the other with minimal impact on your code.In the end, remember that a container is only a storage cabinet to put objects in. If that cabinet solves all of your needs, it doesn’t really matter how it is implemented (a basic concept with most types of objects). If you’re working in a programming environment that has built-in overhead due to other factors, then the cost difference between an ArrayList and a LinkedList might not matter. You might need only one type of sequence. You can even imagine the “perfect”container abstraction, which can automatically change its underlying implementation according to the way it is used.2 The singly rooted hierarchyOne of the issues in OOP that has become especially prominent since the introduction of C++ is whether all classes should ultimately be inherited from a single base class. In Java (as with virtually all other OOP languages) the answer is “yes”and the name of this ultimate base class is simply Object. It turns out that the benefits of the singly rooted hierarchy are many.All objects in a singly rooted hierarchy have an interface in common, so they are all ultimately the same type. The alternative (provided by C++) is that you don’t know that everything is the same fundamental type. From a backward-compatibility standpoint this fits the model of C better and can be thought of as less restrictive, but when you want to do full-onobject-oriented programming you must then build your own hierarchy to provide the same convenience that’s built into other OOP languages. And in any new class library you acquire, some other incompatible interface will be used. It requires effort (and possibly multiple inheritance) to work the new interface into your design. Is the extra “flexibility” of C++ worth it? If you need it—if you have a large investment in C—it’s quite valuable. If you’re starting from scratch, other alternatives such as Java can often be more productive.All objects in a singly rooted hierarchy (such as Java provides) can be guaranteed to have certain functionality. You know you can perform certain basic operations on every object in your system. A singly rooted hierarchy, along with creating all objects on the heap, greatly simplifies argument passing (one of the more complex topics in C++).A singly rooted hierarchy makes it much easier to implement a garbage collector (which is conveniently built into Java). The necessary support can be installed in the base class, and the garbage collector can thus send the appropriate messages to every object in the system. Without a singly rooted hierarchy and a system to manipulate an object via a reference, it is difficult to implement a garbage collector.Since run-time type information is guaranteed to be in all objects, you’ll never end up with an object whose type you cannot determine. This is especially important with system level operations, such as exception handling, and to allow greater flexibility in programming.3 Collection libraries and support for easy collection useBecause a container is a tool that you’ll use frequently, it makes sense to have a library of containers that are built in a reusable fashion, so you can take one off the shelf Because a container is a tool that you’ll use frequently, it makes sense to have a library of containers that are built in a reusable fashion, so you can take one off the shelf and plugit into your program. Java provides such a library, which should satisfy most needs.Downcasting vs. templates/genericsTo make these containers reusable, they hold the one universal type in Java that was previously mentioned: Object. The singly rooted hierarchy means that everything is an Object, so a container that holds Objects can hold anything. This makes containers easy to reuse.To use such a container, you simply add object references to it, and later ask for them back. But, since the container holds only Objects, when you add your object reference into the container it is upcast to Object, thus losing its identity. When you fetch it back, you get an Object reference, and not a reference to the type that you put in. So how do you turn it back into something that has the useful interface of the object that you put into the container?Here, the cast is used again, but this time you’re not casting up the inheritance hierarchy to a more general type, you cast down the hierarchy to a more specific type. This manner of casting is called downcasting. With upcasting, you know, for example, that a Circle is a type of Shape so it’s safe to upcast, but you don’t know that an Object is necessarily a Circle or a Shape so it’s hardly safe to downcast unless you know that’s what you’re dealing with.It’s not completely dangerous, however, because if you downcast to the wrong thing you’ll get a run-time error called an exception, which will be described shortly. When you fetch object references from a container, though, you must have some way to remember exactly what they are so you can perform a proper downcast.Downcasting and the run-time checks require extra time for the runningprogram, and extra effort from the programmer. Wouldn’t it make sense to somehow create the container so that it knows the types that it holds, eliminating the need for the downcast and a possible mistake? The solution is parameterized types, which are classes that the compiler can automatically customize to work with particular types. For example, with a parameterized container, the compiler could customize that container so that it would accept only Shapes and fetch only Shapes.Parameterized types are an important part of C++, partly because C++ has no singly rooted hierarchy. In C++, the keyword that implements parameterized types is “template.” Java currently has no parameterized types since it is possible for it to get by—however awkwardly—using the singly rooted hierarchy. However, a current proposal for parameterized types uses a syntax that is strikingly similar to C++ templates.译文对象的创建和存在时间从技术角度说,OOP(面向对象程序设计)只是涉及抽象的数据类型、继承以及多形性,但另一些问题也可能显得非常重要。

计算机专业毕业论文参考文献范文

计算机专业毕业论文参考文献范文

计算机专业毕业论文参考文献范文计算机专业毕业论文参考文献有哪些?下面是小编为大家整理的计算机专业毕业论文参考文献范文,欢迎参考~篇一:计算机专业毕业论文参考文献范文[1]Booch G. Object-Oriented design[J]. ACM SIGAda Ada Letters. 1982,1(3): 64-76.[2]建模的价值IBMRational技术白皮书[R].[3]邵维忠.杨芙清.面向对象的系统分析[M].北京:清华大学出版社.2000[4]郑红军.张乃孝.软件幵发中的形式化方法[J].计算机科学.1997,24(6): 90-96.[5]王一川,石纯一.基于n演算的一种Agent组织模型[J].计算机研宄与发展.2003, 40(2): 163-168.[6]阿丽亚娜5型火箭发射失败的调查报告[R].[7]Booch G. Object-Oriented design[J]. ACM SIGAda Ada Letters. 1982,1(3): 64-76.[8]陈鑫,李宣东.基于设计演算的形式化用例分析建模框架[J].软件学报.2008,19(10): 2539-2549[9]夏志翔,徐中伟,陈祖希等.UML模型形式化B方法转换的实现[J].计算机应用与软件.2011,28(11): 15-20.[10]袁晓东,郑国梁的面向对象扩充COOZ的设计[J].软件学报.1997,8(9):694-700.[11]周翔.邵志清.顺序图与状态图的递归语义一致性研宄[J].计算机科学.2010,37(8):172-174.[12]周翔,邵志清,薛炳蔚.基于ASM的活动图一致性规则研究[J].计算机工程与设计.2009,30(19): 4536-4539[13]王红英.基于Petri网的软件模型验证[D].华东师范大学,2007.[14]黄正宝,张广泉.UML2.0顺序图的XYZ/E时序逻辑语义研究[J].计算机科学.2006,33(8): 249-251.[15]汪文元,沙基昌.谭东风.基于Petri网和UML活动图工作流建模比较[J].系统仿真学报.2006, 18(2): 504-510[16]Kroll P,Kruchten P. The rational unified process made easy:a practitioner's guide to the RUP[M]. Addison-Wesley Professional. 2003.[17]Seung Mo Cho,Hyung Ho Kim, Sung Deok Cha etc al. A semantics of sequence diagrams [J]. Information Processing Letters 84. 2002: 125-130篇二:计算机专业毕业论文参考文献范文[1]王仁宏,数值逼近(第2版),高等教育出版社,2012.[2]姚永雷.Web服务自动协商机制研究(博士论文).北京邮电大学.2007.[3]程昱.面向自治计算的自动服务协商研究(博士论文).浙江大学.2008.[4]程皇.高济.基于机器学习的自动协商决策模型.软件学报.2009,20(8):2160-2169.[5]郭静.陈英武.1-多交互协议本体的描述.计算机工程.2008,34(12):162-166.[6]翟社平.魏娟丽.李增智.基于概念语义协商的服务Agent划分.电子学报.2010,38(9):2030-2034.[7]张林兰,电子市场中的双边同步自动协商研宄(博士论文),华中科技大学,2010.[8]王斌.李艳.基于多Agent系统的自动协商机制及通用协商框架.计算机工程与科学.2009,31(1):95-98.[9]徐明.蔡鸿明.姜丽红.基于加速遗传模拟退火算法的协商策略研究.计算机应用与软件.2010,27(4):1-3.[10]甘早斌.朱春喜.马务等.基于遗传算法的关联议题并发谈判.软件学报.2012,23(11):2987-2999.[11]侯薇.董红斌.印桂生.基于Bayesian学习的适应性优化协商模型.计算机研究与发展.2014,51(4):721-730.[12]孙天昊.电子商务中一对多协商研宄(博士论文).重庆大学.2008.[13]吴国全.基于模式的复合服务监管关键技术研宄(博士论文).中国科学技术大学.2009.[14]程志文.赵俊.李田等.Web服务QoS数据多源采集方法及实现.计算机科学.2009,8(8):180-211.[15]于卫红.基于JADE平台的多Agent系统开发技术.国防工业出版社.2011.[16]甘健侯,姜跃,夏幼明,本体方法及其应用,科学出版社,2011.。

计算机专业相关外文文献

计算机专业相关外文文献

计算机专业相关外文文献IntroductionComputer science is a field of study that deals with the theory, design, and application of computers. The field is continuously growing and evolving as new technologies are developed and innovative applications arise. As a result, scholarly literature is essential in keeping up-to-date with the latest trends and developments within the field. This article will provide a comprehensive review of recent academic literature related to computer science.Review of Literature1. Artificial IntelligenceThe field of artificial intelligence (AI) has experienced significant growth in recent years. In their study, “Deep Learning for Computer Vision: A Brief Review,” Chen et al. (2018) provide an overview of deep learning algorithms usedfor object recognition and image classification. Additionally, Kostoulas et al. (2018) analyze the role that AI can play in supporting knowledge management within organizations.2. Computer NetworksComputer networks continue to be a crucial component of communication and data transfer. In his study, “An Overviewof Emerging Wireless Networking Technologies,” Rajamani (2018) provides an overview of emerging wireless networking technologies and their potential applications. Furthermore,Breugel et al. (2018) examine the use of blockchaintechnology for data management in decentralized wireless networks.3. CybersecurityGiven the increasing number of cybersecurity threats,research related to this area has been growing. In their study, “A Survey of Recen t Advancements in Malware Detection Techniques,” Khan et al. (2019) provide an overview ofrecent research focused on malware detection techniques. Alternatively, Mayorga et al. (2018) explore the importanceof training users in preventing cyber-attacks.4. Human-Computer InteractionHuman-computer interaction (HCI) is an interdisciplinaryfield focused on the design and usability of computer systems. In their study, “Twenty Years of CHI: A Bibliometric Overview,” Maldonado et al. (2019) provide an analysi s ofthe development of HCI research during the past two decades. alternatively, Zhou et al. (2018) explore the use of gamification techniques to increase user engagement in online education systems.5. Big DataAs a consequence of the rapid growth in the volume and complexity of data sets, the development of big data-related technologies has gained traction. In their study, “A Comprehensive Study on Big Data Analytics,” Singh et al. (2019) provide an overview of big data analytics technologies and applications. Furthermore, Nisar et al. (2018) explorethe use of machine learning algorithms to improve big datastorage and retrieval systems.ConclusionThis review provides a comprehensive overview of recent academic literature on various topics relevant to computer science. From the review, it is clear that developments in AI, computer networks, cybersecurity, HCI, and big data have the potential to transform various industries. As such, keepingup-to-date with the latest research can help professionals remain abreast of the latest trends and developments in the computer science field.。

计算机专业毕业设计--英文文献(含译文)

计算机专业毕业设计--英文文献(含译文)

外文文献原文THE TECHNIQUE DEVELOPMENT HISTORY OF JSPThe Java Server Pages( JSP) is a kind of according to web of the script plait distance technique, similar carries the script language of Java in the server of the Netscape company of server- side JavaScript( SSJS) and the Active Server Pages(ASP) of the Microsoft. JSP compares the SSJS and ASP to have better can expand sex, and it is no more exclusive than any factory or some one particular server of Web. Though the norm of JSP is to be draw up by the Sun company of, any factory can carry out the JSP on own system.The After Sun release the JSP( the Java Server Pages) formally, the this kind of new Web application development technique very quickly caused the people's concern. JSP provided a special development environment for the Web application that establishes the high dynamic state. According to the Sun parlance, the JSP can adapt to include the Apache WebServer, IIS4.0 on the market at inside of 85% server product.This chapter will introduce the related knowledge of JSP and Databases, and JavaBean related contents, is all certainly rougher introduction among them basic contents, say perhaps to is a Guide only, if the reader needs the more detailed information, pleasing the book of consult the homologous JSP.1.1 GENERALIZEThe JSP(Java Server Pages) is from the company of Sun Microsystems initiate, the many companies the participate to the build up the together of the a kind the of dynamic the state web the page technique standard, the it have the it in the construction the of the dynamic state the web page the strong but the do not the especially of the function. JSP and the technique of ASP of the Microsoft is very alike. Both all provide the ability that mixes with a certain procedure code and is explain by the language engine to carry out the procedure code in the code of HTML. Underneath we are simple of carry on the introduction to it.JSP pages are translated into servlets. So, fundamentally, any task JSP pages can perform could also be accomplished by servlets. However, this underlying equivalence does not mean that servlets and JSP pages are equally appropriate in all scenarios. The issue is not the power of the technology, it is the convenience, productivity, and maintainability of one or the other. After all, anything you can do on a particular computer platform in the Java programming language you could also do in assembly language. But it still matters which you choose.JSP provides the following benefits over servlets alone:• It is easier to write and maintain the HTML. Your static code is ordinary HTML: no extra backslashes, no double quotes, and no lurking Java syntax.• You can use standard Web-site development tools. Even HTML tools that know nothing about JSP can be used because they simply ignore the JSP tags.• You can divide up your development team. The Java programmers can work on the dynamic code. The Web developers can concentrate on the presentation layer. On large projects, this division is very important. Depending on the size of your team and the complexity of your project, you can enforce a weaker or stronger separation between the static HTML and the dynamic content.Now, this discussion is not to say that you should stop using servlets and use only JSP instead. By no means. Almost all projects will use both. For some requests in your project, you will use servlets. For others, you will use JSP. For still others, you will combine them with the MVC architecture . You want the appropriate tool for the job, and servlets, by themselves, do not complete your toolkit.1.2 SOURCE OF JSPThe technique of JSP of the company of Sun, making the page of Web develop the personnel can use the HTML perhaps marking of XML to design to turn the end page with format. Use the perhaps small script future life of marking of JSP becomes the dynamic state on the page contents.( the contents changes according to the claim of)The Java Servlet is a technical foundation of JSP, and the large Web applies the development of the procedure to need the Java Servlet to match with with the JSP and then can complete, this name of Servlet comes from the Applet, the local translation method of now is a lot of, this book in order not to misconstruction, decide the direct adoption Servlet but don't do any translation, if reader would like to, can call it as" small service procedure". The Servlet is similar to traditional CGI, ISAPI, NSAPI etc. Web procedure development the function of the tool in fact, at use the Java Servlet hereafter, the customer need not use again the lowly method of CGI of efficiency, also need not use only the ability come to born page of Web of dynamic state in the method of API that a certain fixed Web server terrace circulate. Many servers of Web all support the Servlet, even not support the Servlet server of Web directly and can also pass the additional applied server and the mold pieces to support the Servlet. Receive benefit in the characteristic of the Java cross-platform, the Servlet is also a terrace irrelevant, actually, as long as match the norm of Java Servlet, the Servlet is complete to have nothing to do with terrace and is to have nothing to do with server of Web. Because the Java Servlet is internal to provide the service by the line distance, need not start a progress to the each claimses, and make use of the multi-threadingmechanism can at the same time for several claim service, therefore the efficiency of Java Servlet is very high.But the Java Servlet also is not to has no weakness, similar to traditional CGI, ISAPI, the NSAPI method, the Java Servlet is to make use of to output the HTML language sentence to carry out the dynamic state web page of, if develop the whole website with the Java Servlet, the integration process of the dynamic state part and the static state page is an evil-foreboding dream simply. For solving this kind of weakness of the Java Servlet, the SUN released the JSP.A number of years ago, Marty was invited to attend a small 20-person industry roundtable discussion on software technology. Sitting in the seat next to Marty was James Gosling, inventor of the Java programming language. Sitting several seats away was a high-level manager from a very large software company in Redmond, Washington. During the discussion, the moderator brought up the subject of Jini, which at that time was a new Java technology. The moderator asked the manager what he thought of it, and the manager responded that it was too early to tell, but that it seemed to be an excellent idea. He went on to say that they would keep an eye on it, and if it seemed to be catching on, they would follow his company's usual "embrace and extend" strategy. At this point, Gosling lightheartedly interjected "You mean disgrace and distend."Now, the grievance that Gosling was airing was that he felt that this company would take technology from other companies and suborn it for their own purposes. But guess what? The shoe is on the other foot here. The Java community did not invent the idea of designing pages as a mixture of static HTML and dynamic code marked with special tags. For example, Cold Fusion did it years earlier. Even ASP (a product from the very software company of the aforementioned manager) popularized this approach before JSP came along and decided to jump on the bandwagon. In fact, JSP not only adopted the general idea, it even used many of the same special tags as ASP did.The JSP is an establishment at the model of Java servlets on of the expression layer technique, it makes the plait write the HTML to become more simple.Be like the SSJS, it also allows you carry the static state HTML contents and servers the script mix to put together the born dynamic state exportation. JSP the script language that the Java is the tacit approval, however, be like the ASP and can use other languages( such as JavaScript and VBScript), the norm of JSP also allows to use other languages.1.3 JSP CHARACTERISTICSIs a service according to the script language in some one language of the statures system this kind of discuss, the JSP should be see make is a kind of script language.However, be a kind of script language, the JSP seemed to be too strong again, almost can use all Javas in the JSP.Be a kind of according to text originally of, take manifestation as the central development technique, the JSP provided all advantages of the Java Servlet, and, when combine with a JavaBeans together, providing a kind of make contents and manifestation that simple way that logic separate. Separate the contents and advantage of logical manifestations is, the personnel who renews the page external appearance need not know the code of Java, and renew the JavaBeans personnel also need not be design the web page of expert in hand, can use to take the page of JavaBeans JSP to define the template of Web, to build up a from have the alike external appearance of the website that page constitute. JavaBeans completes the data to provide, having no code of Java in the template thus, this means that these templates can be written the personnel by a HTML plait to support. Certainly, can also make use of the Java Servlet to control the logic of the website, adjust through the Java Servlet to use the way of the document of JSP to separate website of logic and contents.Generally speaking, in actual engine of JSP, the page of JSP is the edit and translate type while carry out, not explain the type of. Explain the dynamic state web page development tool of the type, such as ASP, PHP3 etc., because speed etc. reason, have already can't satisfy current the large electronic commerce needs appliedly, traditional development techniques are all at to edit and translate the executive way change, such as the ASP → ASP+;PHP3 → PHP4.In the JSP norm book, did not request the procedure in the JSP code part( be called the Scriptlet) and must write with the Java definitely. Actually, have some engines of JSP are adoptive other script languages such as the EMAC- Script, etc., but actually this a few script languages also are to set up on the Java, edit and translate for the Servlet to carry out of. Write according to the norm of JSP, have no Scriptlet of relation with Java also is can of, however, mainly lie in the ability and JavaBeans, the Enterprise JavaBeanses because of the JSP strong function to work together, so even is the Scriptlet part not to use the Java, edit and translate of performance code also should is related with Java.1.4 JSP MECHANISMTo comprehend the JSP how unite the technical advantage that above various speak of, come to carry out various result easily, the customer must understand the differentiation of" the module develops for the web page of the center" and" the page develops for the web page of the center" first.The SSJS and ASP are all in several year ago to release, the network of that time is still very young, no one knows to still have in addition to making all business, datas and the expression logic enter the original web page entirely heap what better solvethe method. This kind of model that take page as the center studies and gets the very fast development easily. However, along with change of time, the people know that this kind of method is unwell in set up large, the Web that can upgrade applies the procedure. The expression logic write in the script environment was lock in the page, only passing to shear to slice and glue to stick then can drive heavy use. Express the logic to usually mix together with business and the data logics, when this makes be the procedure member to try to change an external appearance that applies the procedure but do not want to break with its llied business logic, apply the procedure of maintenance be like to walk the similar difficulty on the eggshell. In fact in the business enterprise, heavy use the application of the module already through very mature, no one would like to rewrite those logics for their applied procedure.HTML and sketch the designer handed over to the implement work of their design the Web plait the one who write, make they have to double work-Usually is the handicraft plait to write, because have no fit tool and can carry the script and the HTML contents knot to the server to put together. Chien but speech, apply the complexity of the procedure along with the Web to promote continuously, the development method that take page as the center limits sex to become to get up obviously.At the same time, the people always at look for the better method of build up the Web application procedure, the module spreads in customer's machine/ server the realm. JavaBeans and ActiveX were published the company to expand to apply the procedure developer for Java and Windows to use to come to develop the complicated procedure quickly by" the fast application procedure development"( RAD) tool. These techniques make the expert in the some realm be able to write the module for the perpendicular application plait in the skill area, but the developer can go fetch the usage directly but need not control the expertise of this realm.Be a kind of take module as the central development terrace, the JSP appeared. It with the JavaBeans and Enterprise JavaBeans( EJB) module includes the model of the business and the data logic for foundation, provide a great deal of label and a script terraces to use to come to show in the HTML page from the contents of JavaBeans creation or send a present in return. Because of the property that regards the module as the center of the JSP, it can drive Java and not the developer of Java uses equally. Not the developer of Java can pass the JSP label( Tags) to use the JavaBeans that the deluxe developer of Java establish. The developer of Java not only can establish and use the JavaBeans, but also can use the language of Java to come to control more accurately in the JSP page according to the expression logic of the first floor JavaBeans.See now how JSP is handle claim of HTTP. In basic claim model, a claimdirectly was send to JSP page in. The code of JSP controls to carry on hour of the logic processing and module of JavaBeanses' hand over with each other, and the manifestation result in dynamic state bornly, mixing with the HTML page of the static state HTML code. The Beans can be JavaBeans or module of EJBs. Moreover, the more complicated claim model can see make from is request other JSP pages of the page call sign or Java Servlets.The engine of JSP wants to chase the code of Java that the label of JSP, code of Java in the JSP page even all converts into the big piece together with the static state HTML contents actually. These codes piece was organized the Java Servlet that customer can not see to go to by the engine of JSP, then the Servlet edits and translate them automatically byte code of Java.Thus, the visitant that is the website requests a JSP page, under the condition of it is not knowing, an already born, the Servlet actual full general that prepared to edit and translate completes all works, very concealment but again and efficiently. The Servlet is to edit and translate of, so the code of JSP in the web page does not need when the every time requests that page is explain. The engine of JSP need to be edit and translate after Servlet the code end is modify only once, then this Servlet that editted and translate can be carry out. The in view of the fact JSP engine auto is born to edit and translate the Servlet also, need not procedure member begins to edit and translate the code, so the JSP can bring vivid sex that function and fast developments need that you are efficiently.Compared with the traditional CGI, the JSP has the equal advantage. First, on the speed, the traditional procedure of CGI needs to use the standard importation of the system to output the equipments to carry out the dynamic state web page born, but the JSP is direct is mutually the connection with server. And say for the CGI, each interview needs to add to add a progress to handle, the progress build up and destroy by burning constantly and will be a not small burden for calculator of be the server of Web. The next in order, the JSP is specialized to develop but design for the Web of, its purpose is for building up according to the Web applied procedure, included the norm and the tool of a the whole set. Use the technique of JSP can combine a lot of JSP pages to become a Web application procedure very expediently.JSP six built-in objectsrequest for:The object of the package of information submitted by users, by calling the object corresponding way to access the information package, namely the use of the target users can access the information.response object:The customer's request dynamic response to the client sent the data.session object1. What is the session: session object is a built-in objects JSP, it in the first JSP pages loaded automatically create, complete the conversation of management.From a customer to open a browser and connect to the server, to close the browser, leaving the end of this server, known as a conversation.When a customer visits a server, the server may be a few pages link between repeatedly, repeatedly refresh a page, the server should bethrough some kind of way to know this is the same client, which requires session object.2. session object ID: When a customer's first visit to a server on the JSP pages, JSP engines produce a session object, and assigned aString type of ID number, JSP engine at the same time, the ID number sent to the client, stored in Cookie, this session objects, and customers on the establishment of a one-to-one relationship. When a customer to connect to the server of the other pages, customers no longer allocated to the new session object, until, close your browser, the client-server object to cancel the session, and the conversation, and customer relationship disappeared. When a customer re-open the browser to connect to the server, the server for the customer to create a new session object.aplication target1. What is the application:Servers have launched after the application object, when a customer to visit the site between the various pages here, this application objects are the same, until the server is down. But with the session difference is that all customers of the application objects are the same, that is, all customers share this built-in application objects.2. application objects commonly used methods:(1) public void setAttribute (String key, Object obj): Object specified parameters will be the object obj added to the application object, and to add the subject of the designation of a keyword index.(2) public Object getAttribute (String key): access to application objects containing keywords for.out targetsout as a target output flow, used to client output data. out targets for the output data.Cookie1. What is Cookie:Cookie is stored in Web server on the user's hard drive section of the text. Cookie allow a Web site on the user's computer to store information on and then get back to it.For example, a Web site may be generated for each visitor a unique ID, and then to Cookie in the form of documents stored in each user's machine.If you use IE browser to visit Web, you will see all stored on your hard drive on the Cookie. They are most often stored in places: c: \ windows \ cookies (in Window2000 is in the C: \ Documents and Settings \ your user name \ Cookies).Cookie is "keyword key = value value" to preserve the format of the record.2. Targets the creation of a Cookie, Cookie object called the constructor can create a Cookie. Cookie object constructor has two string .parameters: Cookie Cookie name and value.Cookie c = new Cookie ( "username", "john");3. If the JSP in the package good Cookie object to send to the client, the use of the response addCookie () method.Format: response.addCookie (c)4. Save to read the client's Cookie, the use of the object request getCookies () method will be implemented in all client came to an array of Cookie objects in the form of order, to meet the need to remove the Cookie object, it is necessary to compare an array cycle Each target keywords.JSP的技术发展历史Java Server Pages(JSP)是一种基于web的脚本编程技术,类似于网景公司的服务器端Java脚本语言—— server-side JavaScript(SSJS)和微软的Active Server Pages(ASP)。

计算机毕业设计中英文文献

计算机毕业设计中英文文献

At present, there are many b/s, c/s structure examination systems based on-line, this paper first introduced most of these systems’ formed and developed process, and structures. Then, analysis these systems, and pointed out that there still have many defects about them, just like the update and the service to these systems .Thinking based on these produces, and now the J2EE technical is becoming mature, we thinking about is this technical can be used in examination systems, so we mentioned a on-line system based on J2EE structure. Compared to other systems, and also analysis its’ advantages, we introduced this structure’s construction and technical as emphasize. Finally, makeJ2EE technical a expectation and it can progress quiet great and have a nice foreground. With the educational thinking and scientific and technological progress update to the traditional pen and paper as the main tool for examinations revealed many shortcomings increasingly prominent.1.became the main object of interest in taking the examination candidates can not be activated. Has always been the traditional way of examination papers to students the teacher made test, when test, test what, how to judge the whole by the teacher decided to test scores, students have been in a passive position and even forced.2.Therefore, the main test became teachers, students, have become the subject of the real object. Thus, the exam, students passive defense, a passive response or even fraud. Examination of the torture process is the process of serving the students, no fun at all, let alone in the examination process glorious life in flash.3.Important results than process, candidates can not objectively reflect the real level of ability. Traditional examinations only one goal: results of the examinations. Both teachers and students value this, the general view is that the higher levels of test scores high and low test scores were low. But in fact the examination process for various reasons, an examination candidate fails to play at this level of a normal or failed to fully play a level, such examination can not objectively reflect the candidate's level.With the rapid development of network technology, many foreign universities and other sectors of society have been set up distance education, remote education through computer networks and training. Now, computer hardware technology has reached a very high level. However, distance learning software development is still in its infancy, with the further development of this technology continues to require better, more comprehensive software system which is applied to distance education to go, which gives software designers made more High design requirements.Distance education includes many areas, such as teaching systems, answering system and examination system and so on. One very important aspect is the examination system, it is also the most difficult to achieve the link. In China, although distance education has been vigorously developed, but the current school examinations with the community's most traditional examinations, in this way,After the organization of a test at least five steps, namely artificial out of question, candidates test, artificial grading, performance evaluation and analysis papers. Clearly, as the type of examination and examination requirements of increasing the continuous improvement will be increasing the workload of teachers and their work will be a very cumbersome and very error-prone things can be said that the traditional test method hasbeen Can not meet the exam requirements. With the rapid development of computer applications, web applications continue to expand, such as distance education and the emergence of virtual universities, etc., and these applications are gradually deep into millions of households.Admittedly, online teaching has a very broad application prospects, assistant teaching building of the network path is absolutely inevitable. It is worth mentioning that the distance education in China after years of development in the post has become increasingly mature. Over the years, China has been very seriously the development of distance education, distance education in the university education system, now or at the initiation stage. Facts have proved that today's society, no matter what the industry is engaged in the future, online exams are irreplaceable status, its applications are among the most widely used of all the disciplines, the establishment of online examination system is the premise of such a background generated.Over the years, along with the development of the school, either from hardware or from software on my school have certain basic conditions, the University building of online examination system is imperative. Produced by our "online examination system"is mainly for the majority of students and their teachers to provide a convenient place, so that we can learn more about the Internet in different places all aspects of the operating system, and teacher exchanges, exchange views with other students, and Online test and so on. The majority of students believe that it will provide convenient and efficient way of learning.The results of the project to provide a database of online test site, the students through the campus network or the Internet to access the site, students can follow the recommendations of teachers or their own plans for what they have learned self-test; teachers can provide the environment through the web site for students Dynamic management of the learning and test scores based on site records of each student is given an objective evaluation. Online examination system to reduce the workload of teachers and improve work efficiency, while also improving the quality of the examination, so that the notary exam tends to be more objective and more to stimulate students interest in learning.The database is online examination system mainly uses JSP, Java, HTML, SQL database technologies and tools, and integration of today's popular web application development and integration tools for Java development environment, MyEclipse DreamWeaver overall design follows the software engineering methods, through needs analysis, general design , the preparation of documentation and code, module testing and system implementation stages. Here are several techniques and methods to make this an overview.Database to provide online examination system for the candidates to sign up, online testing and other functions. Is based on the computer network applications. It can make the test without time, place restrictions on the one hand, greatly reducing the teacher a question, change the volume of work, on the other hand to enable students to test their learning at any time, so that learning efficiency is greatly improved. Online examination system in the generation of questions, the submission of papers, marking and other results can be done automatically on the network, as long as the formation of a maturereal paperless exam to exam.This phase of the system through initial research and target analysis, and to demonstrate the feasibility of the program. We are here mainly from the technical feasibility, economic feasibility and operational feasibility were analyzed.Software development cycle is generally 2-3 months, developing the necessary hardware and software facilities are currently able to take the majority of PC computer system, the development cost is not high. Currently, most units have high-performance computer and LAN, the software system installation, deployment, operation and maintenance units will not increase the cost too high.Development of the relevant information required by the system through the existing system of investigation related to acquisition, other necessary software applications, hardware systems are easy to obtain. Therefore, the development costs low. The introduction of using this system, compared with the traditional way, with high efficiency, low cost, high-quality features, you can save a lot of manpower, material and financial resources. So, from an economic point of view, the system is feasible.Browser-based online exam, the key technology is the dynamic Web page display and management, from database to obtain the appropriate papers in the data, and collect user input data to control the examination process. Jsp and SQL using the latest technology development, management interface used in all client and candidate B / S Mode, system deployment, application, maintenance more convenient. At the same time, SqlServer database provides database management capabilities, the technical solution is mature and feasible.Technical feasibility to consider whether the existing technology the successful completion of development work, development of hardware and software configured to meet the demand. This site is JSP development language, debugging a relatively simple, the current computer hardware configuration is also fully able to meet the needs of development, so technically it is absolutely feasible. Software: due to the currentstand-alone model is relatively mature, so mature and viable software development platform, they speed, large capacity, high reliability, low price, can meet the system requirements.Feasibility of running the organization structure, existing staff and institutions and environmental adaptability of the system and personnel training additional feasibility. Current information technology is already quite popular, various operators have very high levels, so the run is feasible.The development of this system is a typical Mis development, mainly for data processing, including data collection, data transformation, and data output of the various report forms. Using the popular JSP + SQLSERVER 2000 system, with no technical problems.From the time point of view, in two months to learn the knowledge and the development of the hotel management system, time is a bit tight, but not impossible, to function through more than two months basically.①All technical data are as lawful.②the development process there is no intellectual property rights.③not copying any hotel management system, there is no infringement of copyright.④the development process not involved in any legal responsibility.In summary, this system development is technically, economically, legally are completely reliable.To implement a software system needs analysis should be conducted first, so can the design of software to meet user's various functions. Here the design of the online examination system needs analysis.Database online examination system should have the following requirements:(1) The test corresponds to a particular object, so the system needs through effective authentication before they can login. And the system needed to manage the session functions. In the examination process for tracking test status.(2) and system access is generally divided into two kinds: administrators and students. Different identities with different privileges and functions.(3) the administrator of the questions and candidates need effective management, responsible for questions of entry and updates and modifications of the classification of questions, each time before the exam, candidates need to state examination center exam environment and initialization. Note that, given the test environment is generally room, close the distance between the examination, in order to do online test specifications for each candidate, the amount of questions and examination papers should be the same, but the questions Not the same.System has to be a good paper and recycling upload function to ensure the accuracy of information transfer. System has to be a friendly interface to ensure smooth progress of the examination candidates. Because the papers need teachers mark the subjective questions, it may take some time to check the results. However, if the paper is composed by objective kinds of questions, candidates can check the end of the exam to their score. System provides statistics on test scores and query management functions. System should have a good safety management.The current examination system, there are still many is based on the c / s mode, each time accompanied by a system upgrade, should update the software on each client,time-consuming and labor-intensive. Fortunately, as technology evolves, based on the b / s mode of online examination system more and more, and gradually occupy a dominant position. It overcomes the c / s mode, many of the shortcomings of the traditional-based C / S mode changes to the examination system based on B / S mode test system that enables users on any computer, as long as access to the Internet to connect Use the service, greatly simplifying the operation, to provide users with convenient. The other hand, the management and marking for teachers to provide a convenient and improved efficiency. But according to my multi-party observation and research, found that most of the online examination system models are developed based on the page, each page contains all the features you need to use the logic, lead to code repetition rate, the structure is not clear, Maintenance upgrades is also very time-consuming and manpower. Given this situation, so we added the concept of J2EE to online examination system to make the system more easy to upgrade and maintain.目前国内基于B/S、C/S结构的数据库在线考试系统产品已经有许多,本文首先介绍了这些考试系统的形成和发展过程,大致结构。

计算机专业外文文献论文翻译

计算机专业外文文献论文翻译

本科毕业设计外文文献及译文文献、资料题目:Evolving Java Without Changingthe Language文献、资料来源:/articles/evolving-java-no-lang-change 文献、资料发表(出版)日期:院(部):专业:班级:姓名:学号:指导教师:翻译日期:外文文献:Evolving Java Without Changing the Language In "The Feel of Java" James Gosling stated that: Java is a blue collar language. It's not PhD thesis material but a language for a job. Java feels very familiar to many different programmers because I had a very strong tendency to prefer things that had been used a lot over things that just sounded like a good idea.The extraordinary success of Java offers weight to the notion that this was a sensible approach, and if it remains an important goal for Java today, then it makes sense that the language should continue to evolve relatively slowly. In addition to this, the fact that Java is a mature, widely used language causes its evolution to be fraught with difficulty. For one thing, each feature added to the language can change the way it feels in subtle and often unpredictable ways, risking alienating developers who have already adopted it as their language of choice. For another, a feature that makes perfect sense on its own may interact with other features of the language in awkward or unexpected ways. Worse, once a language feature has been added it is all but impossible to remove even if it turns out to be detrimental to the language as a whole. To justify adding a new feature, a language designer must be highly confident that it will be of long term benefit to the language rather than a short term or fashionable solution to a problem that rapidly becomes redundant. To mitigate the risk a language designer will typically experiment by creating a separate language or branch, such as the Pizza language used to experiment with Java's generics, prior to their implementation. The problem with this approach is that the audience for such experiments is both small and self-selecting; obviously they will all be interested in language features, and many may be academics or researchers. An idea which plays well to such an audience may still play badly when it is incorporated into the main language and general programmers start to work with it.To get a sense of this, consider the closures debate that became so heated for Java 7. Implementations for the main proposals (and some others) have been available for some time but no consensus has emerged. In consequence Sun decided that JDK 7 will not get full closures support. The core argument came down to whether Java had become as complex as it could afford to be when generics (and in particular the wildcard syntax) were added to Java 5; andwhether the addition of full support for closures was justified when Java already has a more limited form through anonymous inner classes. Two important use cases for adding full closures support were to simplify working with the fork/join API that is being added to JDK 7 to improve multi-core programming, and to help with resource clean-up. Josh Bloch's ARM block proposal, which is now expected to be in JDK 7 via Project Coin, offers an alternative solution to the latter problem. Dr. Cliff Click's research on a scalable, non-blocking programming style for Java offers an alternative approach to fork/join that may be more appropriate as the number of processor cores increases. If this were to happen, then the uses for closures in Java may arguably be too limited to justify their inclusion.It remains important though that a programming language continues to develop at some level. This article therefore examines three alternative techniques for adding new language features to Java that don't require changes to the language itself - using a custom Domain Specific Language, exploiting the Java 6 annotation processor to add optional language features via a library, and moving the syntactic sugar from the language to the IDE. Each offers the potential to allow a wide audience of mainstream developers to experiment with the new features over the medium term in a non-invasive manner, and the best ideas can then filter down for inclusion in the core language.Custom DSLsThe most widely discussed of the three is the Domain-Specific Language or DSL. There is some disagreement on exactly what the term means, but for the purposes of this discussion we'll refer to it simply as a language that has been created with a narrow focus to solve a particular problem, rather than as a general purpose language designed to solve every computing problem. As such we would expect a DSL to be non-Turing complete and for the most part this is the case. There are edge cases of course. Postscript, for example, is a Turing complete language but also qualifies as a DSL using our definition.As the above example also illustrates, the idea of a DSL is not new. Other familiar DSLs include Regular Expressions, XSLT, Ant, and JSP, all of which require some sort of custom parser to process them. Martin Fowler also suggests that fluent interfaces/APIs can be considered a second type of DSL, which he refers to as an internal DSL. His definition is that an internal DSL is developed directly within the host language. This was a common practice amongst bothLisp and Smalltalk programmers, and more recently the Ruby community has been popularising the technique.Whilst many well-known DSLs are commercially developed and maintained, some enterprise development teams have used the technique to create a language that allows them to rapidly explore aspects of their problem domain. It isn't however as common as it might be, perhaps because DSLs have a fairly intimidating barrier to entry. The team has to design the language, build the parser and possibly other tools to support the programming team, and train each new developer that joins the team on how the DSL works. Here the emergence of tools to specifically support DSL development could significantly change the landscape. Intentional Software's Intentional Domain Workbench, which has been in development longer than Java has been around, is the first significant implementation of such a tool. The project started life at Microsoft Research, and Dr. Charles Simonyi's 1995 paper "The Death of Computer Languages, the Birth of Intentional Programming" describes his vision. In 2002 Simonyi founded Intentional Software to continue working on his ideas and a hugely impressive video demo of the system is available. The product itself is at 1.0 status, but access is restricted to very limited partners.Other software houses are also exploring the concepts, amongst them JetBrains, well respected for their IntelliJ IDEA Java IDE, who have recently released the 1.0 version of their Meta Programming System (MPS). MPS doesn't use a parser, instead working with the Abstract Syntax Tree (AST) directly. It provides a text-like projectional editor which allows the programmer to manipulate the AST, and is used to write languages and programs. For each node in the tree a textual projection is created - as the programmer works with the projection, the change is reflected in the node. This approach allows you to extend and embed languages in any combination (often referred to as language composing) promoting language re-use. JetBrains are using the product internally and have recently released YouTrack, a bug tracking product developed using the system.The Java 6 Annotation ProcessorWhilst DSLs are less common in more mainstream languages such as Java than they are in Ruby, Smalltalk and Lisp, recent developments in the Java language, in particular the annotation processor which was added in Java 6, offer new possibilities for developers looking to use them in Java. The JPA 2.0 criteria API that will ship as part of Java EE 6, itself a DSL, offers anexample. Here the annotation processor builds up a metamodel type for each persistent class in the application. Whilst it would be perfectly possible for the developer to hand craft the metamodel in Java, it would be both tedious and error prone. The use of the annotation processor eliminates that pain and, since the annotation processor is built into Java 6, the approach requires no specific IDE support – an IDE delegates to the annotation processor triggered by the compiler, and the metadata model is generated on the fly.Using the annotation processor it is also possible for a library to add a new language feature. Bruce Chapman's prototype "no closures" proposal, for example, uses the technique to provide a mechanism for casting a method to a Single Abstract Method (SAM) type which compiles on top of Java 6. During our conversation Chapman pointed out that the SAM type also supports free variables, a key aspect of a closure:The method body can declare additional parameters beyond those required for the Single **********************************************.Theseparameterscanhavevaluesbound to them at the point where you obtain an instance of the SAM type, and are then passed to the method each time it is invoked.Chapman also set up the Rapt project to explore other uses of the technique, and has added implementations for two language changes - Multiline Strings and XML literals - that were considered for JDK 7 but won't now make it into the final release. Java could even get a form of closures support using this approach. When asked about this, Chapman said: We are just finishing a Swing project which we used it for. We have found a couple of minor bugs around generic types, one recently discovered remains to be fixed but other than that it seems quite nice to use, and nobody has been wanting to rush back to use conventional anonymous inner classes.Project Lombok, another project exploring the the annotation processor, pushes the technique still further. In effect Lombok uses annotation processing as a hook to run a Java agent that re-writes various javac internals based on the annotations. Since it is manipulating internal classes it is probably not suited to production use (internal classes can change even between minor releases of the JVM) but the project is an eye-opening example of just what can be done using the annotation processor, including:•Support for properties using a pair of @Getter and/or @Setter annotations with varying access levels, e.g. @Setter(AccessLevel.PROTECTED) private String name;•The @EqualsAndHashCode annotation, which generates hashCode() and equals() implementations from the fields of your object•The @ToString annotation, which generates an implementation of the toString() method •The @data method, which is equivalent to combining @ToString, @EqualsAndHashCode, @Getter on all fields, and @Setter on all non-final fields along with a constructor to initialize your final fieldsOther language experimentation, such as removing checked exceptions from Java, can also be done using this approach.Whilst the annotation processor technique opens up a welcome new route to language experimentation, care needs to be taken that the generated code can be easily read by developers, not just by the machine. Chapman made a number of suggestions during our conversation:Generate source code not bytecode, and pay attention to formatting (indenting especially) in the generated code. The compiler won't care whether it is all on one line or not, but your users will. I even sometimes add comments and javadoc in the source code generated by my annotation processors where appropriate.Hopefully if the technique becomes more prevalent IDEs will also make it easier to view the code that is to be generated at compile time.Syntactic Sugar in the IDEBruce Chapman also touches on our third technique - moving the syntactic sugar from the language to the IDE - in his blog and he elaborated on his ideas during our conversation. It is already routine for Java IDEs to create portions of boilerplate code for you such as the getters and setters of a class, but IDE developers are beginning to push the concept further. JetBrains' IntelliJ 9 offers a terse code block syntax for inner classes similar to a closure, which a developer can also type. Acting like code folds, these can then be expanded into the full anonymous inner classes which the compiler works with - this allows developers who prefer to stick with the standard anonymous inner class syntax to do so. A similar plug-in for Eclipse also exists. The key point here is that the "alternate" syntax is just a view of the actual code which the compiler and any source management tools continue to work with. Thus the developer should be able to switchviews between either form (like expanding or collapsing a code fold), and anyone without access to the definition of the sugar just sees the normal Java code. Chapman writes:There are many details to work out in order to make this easily accessible, but long term I see developers relatively easily defining a two way sugaring/desugaring transformation (jackpot is a good start for how this might be done), trying them out, evolving them and sharing the good ones with colleagues and the community. The advantages of this are almost the same as for a language change, without the disadvantages. The very best could become ubiquitous and then form the basis of an actual language change if necessary to get rid of any remaining "noise" not possible with this approach.Since syntactic sugar has to map to another (more verbose) language feature it cannot offer complete closure support; there are some features of BGGA closures for example that cannot be mapped to anonymous inner classes, and so they couldn't be implemented through this approach. Nevertheless the idea opens up the possibility of having various new syntaxes for representing anonymous inner classes, similar to BGGA syntax or FCM syntax, and allowing developers to pick the syntax they want to work with. Other language features, such as the null-safe Elvis operator, could certainly be done this way. To experiment further with the idea this NetBeans module also developed by Chapman, is what he describes as a "barely functional" prototype for Properties using this approach.ConclusionIn language development there is always a trade-off between stability and progress. The advantage that all of these techniques bring is that they don't affect the platform or the language. In consequence they are more tolerant to mistakes and are therefore more conducive to rapid and radical experimentation. With developers freely able to experiment we should begin to see more people separately tackling the poor signal to noise ratio of some common boilerplate such as the anonymous inner class syntax, mixing and evolving these ideas to some optimum form that adds the most value in the most cases. It will be fascinating to see how developers use these different approaches to push the Java platform in new directions.中文译文:不改变语言的前提下推进Java演进James Gosling在“The Feel of Java”中说过:Java是一种蓝领语言,它并不是博士的论文材料而是可以完成工作上的语言。

计算机专业毕业设计外文翻译

计算机专业毕业设计外文翻译

外文翻译Birth of the NetThe Internet has had a relatively brief, but explosive history so far. It grew out of an experiment begun in the 1960's by the U.S. Department of Defense. The DoD wanted to create a computer network that would continue to function in the event of a disaster, such as a nuclear war. If part of the network were damaged or destroyed, the rest of the system still had to work. That network was ARPANET, which linked U.S. scientific and academic researchers. It was the forerunner of today's Internet.In 1985, the National Science Foundation (NSF) created NSFNET, a series of networks for research and education communication. Based on ARPANET protocols, the NSFNET created a national backbone service, provided free to any U.S. research and educational institution. At the same time, regional networks were created to link individual institutions with the national backbone service.NSFNET grew rapidly as people discovered its potential, and as new software applications were created to make access easier. Corporations such as Sprint and MCI began to build their own networks, which they linked to NSFNET. As commercial firms and other regional network providers have taken over the operation of the major Internet arteries, NSF has withdrawn from the backbone business.NSF also coordinated a service called InterNIC, which registered all addresses on the Internet so that data could be routed to the right system. This service has now been taken over by Network Solutions, Inc., in cooperation with NSF.How the Web WorksThe World Wide Web, the graphical portion of the Internet, is the most popular part of the Internet by far. Once you spend time on the Web,you will begin to feel like there is no limit to what you can discover. The Web allows rich and diverse communication by displaying text, graphics, animation, photos, sound and video.So just what is this miraculous creation? The Web physically consists of your personal computer, web browser software, a connection to an Internet service provider, computers called servers that host digital data and routers and switches to direct the flow of information.The Web is known as a client-server system. Your computer is the client; the remote computers that store electronic files are the servers. Here's how it works:Let's say you want to pay a visit to the the Louvre museum website. First you enter the address or URL of the website in your web browser (more about this shortly). Then your browser requests the web page from the web server that hosts the Louvre's site. The Louvre's server sends the data over the Internet to your computer. Your web browser interprets the data, displaying it on your computer screen.The Louvre's website also has links to the sites of other museums, such as the Vatican Museum. When you click your mouse on a link, you access the web server for the Vatican Museum.The "glue" that holds the Web together is called hypertext and hyperlinks. This feature allow electronic files on the Web to be linked so you can easily jump between them. On the Web, you navigate through pages of information based on what interests you at that particular moment, commonly known as browsing or surfing the Net.To access the Web you need web browser software, such as Netscape Navigator or Microsoft Internet Explorer. How does your web browser distinguish between web pages and other files on the Internet? Web pages are written in a computer language called Hypertext Markup Language or HTML.Some Web HistoryThe World Wide Web (WWW) was originally developed in 1990 at CERN, the European Laboratory for Particle Physics. It is now managed by The World Wide Web Consortium, also known as the World Wide Web Initiative.The WWW Consortium is funded by a large number of corporate members, including AT&T, Adobe Systems, Inc., Microsoft Corporation and Sun Microsystems, Inc. Its purpose is to promote the growth of the Web by developing technical specifications and reference software that will be freely available to everyone. The Consortium is run by MIT with INRIA (The French National Institute for Research in Computer Science) acting as European host, in collaboration with CERN.The National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign, was instrumental in the development of early graphical software utilizing the World Wide Web features created by CERN. NCSA focuses on improving the productivity of researchers by providing software for scientific modeling, analysis, and visualization. The World Wide Web was an obvious way to fulfill that mission. NCSA Mosaic, one of the earliest web browsers, was distributed free to the public. It led directly to the phenomenal growth of the World Wide Web.Understanding Web AddressesYou can think of the World Wide Web as a network of electronic files stored on computers all around the world. Hypertext links these resources together. Uniform Resource Locators or URLs are the addresses used to locate thesefiles. The information contained in a URL gives you the ability to jump from one web page to another with just a click of your mouse. When you type a URL into your browser or click on a hypertext link, your browser is sending a request to a remote computer to download a file.What does a typical URL look like? Here are some examples:/The home page for study english.ftp:///pub/A directory of files at MIT* available for downloading.news:rec.gardens.rosesA newsgroup on rose gardening.The first part of a URL (before the two slashes* tells you the type of resource or method of access at that address. For example:•http - a hypertext document or directory•gopher - a gopher document or menu•ftp - a file available for downloading or a directory of such files•news - a newsgroup•telnet - a computer system that you can log into over the Internet•WAIS* - a database or document in a Wide Area Information Search database•file - a file located on a local drive (your hard drive)The second part is typically the address of the computer where the data or service is located. Additional parts may specify the names of files, the port to connect to, or the text to search for in a database.You can enter the URL of a site by typing it into the Location bar of your web browser, just under the toolbar.Most browsers record URLs that you want to use again, by adding them to a special menu. In Netscape Navigator, it's called Bookmarks. In Microsoft Explorer, it's called Favorites. Once you add a URL to your list, you can return to that web page simply by clicking on the name in your list, instead of retyping the entire URL.Most of the URLs you will be using start with http which stands for Hypertext Transfer Protocol*. http is the method by which HTML files are transferred over the Web. Here are some other important things to know about URLs:• A URL usually has no spaces.• A URL always uses forward slashes (//).If you enter a URL incorrectly, your browser will not be able to locate the site or resource you want. Should you get an error message or the wrong site, make sure you typed the address correctly.You can find the URL behind any link by passing your mouse cursor over the link. The pointer will turn into a hand and the URL will appear in the browser's status ba r, usually located at the bottom of your screen.Domain NamesWhen you think of the Internet, you probably think of ".com." Just what do those three letters at the end of a World Wide Web address mean?Every computer that hosts data on the Internet has a unique numerical address. For example, the numerical address for the White House is198.137.240.100. But since few people want to remember long strings of numbers, the Domain Name System (DNS)* was developed. DNS, a critical part of the Internet's technical infrastructure*, correlates* a numerical address to a word. To access the White House website, you could type its number into the address box of your web browser. But most people prefer to use "." In this case, the domain name is . In general, the three-letter domain name suffix* is known as a generictop-level domai n and describes the type of organization. In the last few years, the lines have somewhat blurred* between these categories..com - business (commercial).edu - educational.org - non-profit.mil - military.net - network provider.gov - governmentA domain name always has two or more parts separated by dots and typically consists of some form of an organization's name and the three-letter suffix. For example, the domain name for IBM is ""; the United Nations is "."If a domain name is available, and provided it does not infringe* on an existing trademark, anyone can register the name for $35 a year through Network Solutions, Inc., which is authorized to register .com, .net and .org domains. You can use the box below to see if a name is a available. Don't be surprised ifthe .com name you want is already taken, however. Of the over 8 million domain names, 85% are .com domains.ICANN, the Internet Corporation for Assigned Names and Numbers, manages the Domain Name System. As of this writing, there are plans to add additional top-level domains, such as .web and .store. When that will actually happen is anybody's guess.To check for, or register a domain name, type it into the search box.It should take this form: In addition to the generic top-level domains, 244 national top-level domains were established for countries and territories*, for example:.au - Australia.ca - Canada.fr - France.de - Germany.uk - United KingdomFor US $275 per name, you can also register an international domain name with Net Names. Be aware that some countries have restrictions for registering names.If you plan to register your own domain name, whether it's a .com or not, keep these tips in mind:The shorter the name, the better. (But it should reflect your family name, interest or business.)The name should be easy to remember.It should be easy to type without making mistakes.Remember, the Internet is global. Ideally, a domain name will "read" in a language other than English.Telephone lines were designed to carry the human voice, not electronic data from a computer. Modems were invented to convert digital computer signals into a form that allows them to travel over the phone lines. Those are the scratchy sounds you hear from a modem's speaker. A modem on theother end of the line can understand it and convert the sounds back into digital information that the computer can understand. By the way, the word modem stands for MOdulator/DEModulator.Buying and using a modem used to be relatively easy. Not too long ago, almost all modems transferred data at a rate of 2400 Bps (bits per second). Today, modems not only run faster, they are also loaded with features like error control and data compression. So, in addition to converting and interpreting signals, modems also act like traffic cops, monitoring and regulating the flow of information. That way, one computer doesn't send information until the receiving computer is ready for it. Each of these features, modulation, error control, and data compression, requires a separate kind of protocol and that's what some of those terms you see like V.32, V.32bis, V.42bis and MNP5 refer to.If your computer didn't come with an internal modem, consider buying an external one, because it is much easier to install and operate. For example, when your modem gets stuck (not an unusual occurrence), you need to turn it off and on to get it working properly. With an internal modem, that means restarting your computer--a waste of time. With an external modem it's as easy as flipping a switch.Here's a tip for you: in most areas, if you have Call Waiting, you can disable it by inserting *70 in front of the number you dial to connect to the Internet (or any online service). This will prevent an incoming call from accidentally kicking you off the line.This table illustrates the relative difference in data transmission speeds for different types of files. A modem's speed is measured in bits per second (bps). A 14.4 modem sends data at 14,400 bits per second. A 28.8 modem is twice as fast, sending and receiving data at a rate of 28,800 bits per second.Until nearly the end of 1995, the conventional wisdom was that 28.8 Kbps was about the fastest speed you could squeeze out of a regular copper telephoneline. Today, you can buy 33.6 Kbps modems, and modems that are capable of 56 Kbps. The key question for you, is knowing what speed modems your Internet service provider (ISP) has. If your ISP has only 28.8 Kbps modems on its end of the line, you could have the fastest modem in the world, and only be able to connect at 28.8 Kbps. Before you invest in a 33.6 Kbps or a 56 Kbps modem, make sure your ISP supports them.Speed It UpThere are faster ways to transmit data by using an ISDN or leased line. In many parts of the U.S., phone companies are offering home ISDN at less than $30 a month. ISDN requires a so-called ISDN adapter instead of a modem, and a phone line with a special connection that allows it to send and receive digital signals. You have to arrange with your phone company to have this equipment installed. For more about ISDN, visit Dan Kegel's ISDN Page.An ISDN line has a data transfer rate of between 57,600 bits per second and 128,000 bits per second, which is at least double the rate of a 28.8 Kbps modem. Leased lines come in two configurations: T1 and T3. A T1 line offers a data transfer rate of 1.54 million bits per second. Unlike ISDN, a T-1 line is a dedicated connection, meaning that it is permanently connected to the Internet. This is useful for web servers or other computers that need to be connected to the Internet all the time. It is possible to lease only a portion of a T-1 line using one of two systems: fractional T-1 or Frame Relay. You can lease them in blocks ranging from 128 Kbps to 1.5 Mbps. The differences are not worth going into in detail, but fractional T-1 will be more expensive at the slower available speeds and Frame Relay will be slightly more expensive as you approach the full T-1 speed of 1.5 Mbps. A T-3 line is significantly faster, at 45 million bits per second. The backbone of the Internet consists of T-3 lines. Leased lines are very expensive and are generally only used by companies whose business is built around the Internet or need to transfer massiveamounts of data. ISDN, on the other hand, is available in some cities for a very reasonable price. Not all phone companies offer residential ISDN service. Check with your local phone company for availability in your area.Cable ModemsA relatively new development is a device that provides high-speed Internet access via a cable TV network. With speeds of up to 36 Mbps, cable modems can download data in seconds that might take fifty times longer with a dial-up connection. Because it works with your TV cable, it doesn't tie up a telephone line. Best of all, it's always on, so there is no need to connect--no more busy signals! This service is now available in some cities in the United States and Europe.The download times in the table above are relative and are meant to give you a general idea of how long it would take to download different sized files at different connection speeds, under the best of circumstances. Many things can interfere with the speed of your file transfer. These can range from excessive line noise on your telephone line and the speed of the web server from which you are downloading files, to the number of other people who are simultaneously trying to access the same file or other files in the same directory.DSLDSL (Digital Subscriber Line) is another high-speed technology that is becoming increasingly popular. DSL lines are always connected to the Internet, so you don't need to dial-up. Typically, data can be transferred at rates up to 1.544 Mbps downstream and about 128 Kbps upstream over ordinary telephone lines. Since a DSL line carries both voice and data, you don't have to install another phone line. You can use your existing line to establish DSLservice, provided service is available in your area and you are within the specified distance from the telephone company's central switching office.DSL service requires a special modem. Prices for equipment, DSL installation and monthly service can vary considerably, so check with your local phone company and Internet service provider. The good news is that prices are coming down as competition heats up.Anatomy of a Web PageA web page is an electronic document written in a computer language called HTML, short for Hypertext Markup Language. Each web page has a unique address, called a URL* or Uniform Resource Locator, which identifies its location on the network.A website has one or more related web pages, depending on how it's designed. Web pages on a site are linked together through a system of hyperlinks* , enabling you to jump between them by clicking on a link. On the Web, you navigate through pages of information according to your interests.Home Sweet Home PageWhen you browse the World Wide Web you'll see the term home page often. Think of a home page as the starting point of a website. Like the table of contents of a book or magazine, the home page usually provides an overview of what you'll find at the website. A site can have one page, many pages or a few long ones, depending on how it's designed. If there isn't a lot of information, the home page may be the only page. But usually you will find at least a few other pages.Web pages vary wildly in design and content, but most use a traditional magazine format. At the top of the page is a masthead* or banner graphic*, then a list of items, such as articles, often with a brief description. The items in the list usually link to other pages on the website, or to other sites. Sometimes these links are highlighted* words in the body of the text, or are arranged in a list, like an index. They can also be a combination* of both. A web page can also have images that link to other content.How can you tell which text are links? Text links appear in a different color from the rest of the text--typically in blue and underlined. When you move yourcursor over a text link or over a graphic link, it will change from an arrow to a hand. The hypertext words often hint* at what you will link to.When you return to a page with a link you've already visited, the hypertext words will often be in a different color, so you know you've already been there. But you can certainly go there again. Don't be surprised though, if the next time you visit a site, the page looks different and the information has changed. The Web is a dynamic* medium. To encourage visitors to return to a site, some web publishers change pages often. That's what makes browsing the Web so excitingA Home (Page) of Your OwnIn the 60s, people asked about your astrological* sign. In the 90s, they want to know your URL. These days, having a web address is almost as important as a street address. Your website is an electronic meeting place for your family, friends and potentially*, millions of people around the world. Building your digital domain can be easier than you may think. Best of all, you may not have to spend a cent. The Web brims with all kinds of free services, from tools to help you build your site, to free graphics, animation and site hosting. All it takes is some time and creativity.Think of your home page as the starting point of your website. Like the table of contents of a book or magazine, the home page is the front door. Your site can have one or more pages, depending on how you design it. If there isn't a lot of information just yet, your site will most likely have only a home page. But the site is sure to grow over time.While web pages vary dramatically* in their design and content, most use a traditional magazine layout. At the top of the page is a banner graphic. Next comes a greeting and a short description of the site. Pictures, text, and links to other websites follow.If the site has more than one page, there's typically a list of items--similar to an index--often with a brief description. The items in the list link to other pages on the website. Sometimes these links are highlighted words in the body of the text. It can also be a combination of both. Additionally, a web page may have images that link to other content.Before you start building your site, do some planning. Think about whom the site is for and what you want to say. Next, gather up the material that you wantto put on the site: write the copy, scan the photos, design or find the graphics. Draw a rough layout on a sheet of paper.While there are no rules you have to follow, there are a few things to keep in mind:•Start simply. If you are too ambitious at the beginning, you may never get the site off the ground. You can always add to your site.•Less is better. Most people don't like to read a lot of text online. Break it into small chunks.•Use restraint. Although you can use wild colors and images for the background of your pages, make sure your visitors will be able to readthe text easily.•Smaller is better. Most people connect to the Internet with a modem.Since it can take a long time to download large image files, keep the file sizes small.•Have the rights. Don't put any material on your site unless you are sure you can do it legally. Read Learn the Net's copyright article for moreabout this.Stake Your ClaimNow it's time to roll up your sleeves and start building. Learn the Net Communities provides tools to help you build your site, free web hosting, and a community of other homesteaders.Your Internet service provider may include free web hosting services with an account, one alternative to consider.Decoding Error MessagesAs you surf the Net, you will undoubtedly find that at times you can't access certain websites. Why, you make wonder? Error messages attempt to explain the reason. Unfortunately, these cryptic* messages baffle* most people.We've deciphered* the most common ones you may encounter.400 - Bad RequestProblem: There's something wrong with the address you entered. You may not be authorized* to access the web page, or maybe it no longer exists.Solution: Check the address carefully, especially if the address is long. Make sure that the slashes are correct (they should be forward slashes) and that all the names are properly spelled. Web addresses are case sensitive, socheck that the names are capitalized in your entry as they are in the original reference to the website.401 - UnauthorizedProblem: You can't access a website, because you're not on the guest list, your password is invalid or you have entered your password incorrectly.Solution: If you think you have authorization, try typing your password again. Remember that passwords are case sensitive.403 - ForbiddenProblem: Essentially the same as a 401.Solution: Try entering your password again or move on to another site.404 - Not FoundProblem: Either the web page no longer exists on the server or it is nowhere to be found.Solution: Check the address carefully and try entering it again. You might also see if the site has a search engine and if so, use it to hunt for the document. (It's not uncommon for pages to change their addresses when a website is redesigned.) To get to the home page of the site, delete everything after the domain name and hit the Enter or Return key.503 - Service unavailableProblem: Your Internet service provider (ISP) or your company's Internet connection may be down.Solution: Take a stretch, wait a few minutes and try again. If you still have no luck, phone your ISP or system administrator.Bad file requestProblem: Your web browser may not be able to decipher the online form you want to access. There may also be a technical error in the form.Solution: Consider sending a message to the site's webmaster, providing any technical information you can, such as the browser and version you use.Connection refused by hostProblem: You don't have permission to access the page or your password is incorrect.Solution: Try typing your password again if you think you should have access.Failed DNS lookupProblem: DNS stands for the Domain Name System, which is the system that looks up the name of a website, finds a corresponding number (similar to a phone number), then directs your request to the appropriate web server on theInternet. When the lookup fails, the host server can't be located.Solution: Try clicking on the Reload or Refresh button on your browser toolbar. If this doesn't work, check the address and enter it again. If all else fails, try again later.File contains no dataProblem: The site has no web pages on it.Solution: Check the address and enter it again. If you get the same error message, try again later.Host unavailableProblem: The web server is down.Solution: Try clicking on the Reload or Refresh button. If this doesn't work, try again later.Host unknownProblem: The web server is down, the site may have moved, or you've been disconnected from the Net.Solution: Try clicking on the Reload or Refresh button and check to see that you are still online. If this fails, try using a search engine to find the site. It may have a new address.Network connection refused by the serverProblem: The web server is busy.Solution: Try again in a while.Unable to locate hostProblem: The web server is down or you've been disconnected from the Net.Solution: Try clicking on the Reload or Refresh button and check to see that you are still online.Unable to locate serverProblem: The web server is out-of-business or you may have entered the address incorrectly.Solution: Check the address and try typing it again.Web BrowsersA web browser is the software program you use to access the World Wide Web, the graphical portion of the Internet. The first browser, called NCSA Mosaic, was developed at the National Center for Supercomputing Applications in the early '90s. The easy-to-use point-and-click interface*helped popularize the Web, although few then could imagine the explosive growth that would soon occur.Although many different browsers are available, Microsoft Internet Explorer* and Netscape Navigator* are the two most popular ones. Netscape and Microsoft have put so much money into their browsers that the competition can't keep up. The pitched battle* between the two companies to dominate* the market has lead to continual improvements to the software. Version 4.0 and later releases of either browser are excellent choices. (By the way, both are based on NCSA Mosaic.) You can download Explorer and Navigator for free from each company's website. If you have one browser already, you can test out the other. Also note that there are slight differences between the Windows and MacIntosh* versions.You can surf to your heart's content, but it's easy to get lost in this electronic web. That's where your browser can really help. Browsers come loaded with all sorts of handy features. Fortunately, you can learn the basics in just a few minutes, then take the time to explore the advanced functions.Both Explorer and Navigator have more similarities than differences, so we'll primarily cover those. For the most up-to-date information about the browsers, and a complete tutorial, check the online handbook under the Help menu or go to the websites of the respective* software companies.Browser AnatomyWhen you first launch your web browser, usually by double-clicking on the icon on your desktop, a predefined web page, your home page, will appear. With Netscape Navigator for instance, you will be taken to Netscape's NetCenter.•The Toolbar (工具栏)The row of buttons at the top of your web browser, known as the toolbar, helps you travel through the web of possibilities, even keeping track ofwhere you've been. Since the toolbars for Navigator and Explorer differ slightly, we'll first describe what the buttons in common do:o The Back button returns you the previous page you've visited.o Use the Forward button to return to the page you just came from.o Home takes you to whichever home page you've chosen. (If you haven't selected one, it will return you to the default home page,usually the Microsoft or Netscape website.)。

计算机外文文献+翻译(.net)

计算机外文文献+翻译(.net)

东北石油大学本科毕业设计英文文献及翻译学院计算机与信息技术学院班级计科07-1班学号姓名指导教师职称副教授 技术1.构建 页面 和结构 是微软.NET framework整体的一部分, 它包含一组大量的编程用的类,满足各种编程需要。

在下列的二个部分中, 你如何学会 很适合的放在.NET framework, 和学会能在你的 页面中使用语言。

.NET类库假想你是微软。

假想你必须支持大量的编程语言-比如Visual Basic 、C# 和C++. 这些编程语言的很多功能具有重叠性。

举例来说,对于每一种语言,你必须包括存取文件系统、与数据库协同工作和操作字符串的方法。

此外,这些语言包含相似的编程构造。

每种语言,举例来说,都能够使用循环语句和条件语句。

即使用Visual Basic 写的条件语句的语法不与用C++ 写的不一样,程序的功能也是相同的。

最后,大多数的编程语言有相似的数据变量类型。

以大多数的语言,你有设定字符串类型和整型数据类型的方法。

举例来说,整型数据最大值和最小值可能依赖语言的种类,但是基本的数据类型是相同的。

对于多种语言来说维持这一功能需要很大的工作量。

为什么继续再创轮子? 对所有的语言创建这种功能一次,然后把这个功能用在每一种语言中岂不是更容易。

.NET类库不完全是那样。

它含有大量的满足编程需要的类。

举例来说,.NET类库包含处理数据库访问的类和文件协同工作,操作文本和生成图像。

除此之外,它包含更多特殊的类用在正则表达式和处理Web协议。

.NET framework,此外包含支持所有的基本变量数据类型的类,比如:字符串、整型、字节型、字符型和数组。

最重要地, 写这一本书的目的, .NET类库包含构建的 页面的类。

然而你需要了解当你构建.NET页面的时候能够访问.NET framework 的任意类。

理解命名空间正如你猜测的, .NET framework是庞大的。

它包含数以千计的类(超过3,400) 。

计算机专业外文文献翻译

计算机专业外文文献翻译

毕业设计(论文)外文文献翻译(本科学生用)题目:Plc based control system for the music fountain 学生姓名:_ ___学号:060108011117 学部(系): 信息学部专业年级: _06自动化(1)班_指导教师: ___职称或学位:助教__20 年月日外文文献翻译(译成中文1000字左右):【主要阅读文献不少于5篇,译文后附注文献信息,包括:作者、书名(或论文题目)、出版社(或刊物名称)、出版时间(或刊号)、页码。

提供所译外文资料附件(印刷类含封面、封底、目录、翻译部分的复印件等,网站类的请附网址及原文】英文节选原文:Central Processing Unit (CPU) is the brain of a PLC controller. CPU itself is usually one of the microcontrollers. Aforetime these were 8-bit microcontrollers such as 8051, and now these are 16-and 32-bit microcontrollers. Unspoken rule is that you’ll find mostly Hitachi and Fujicu microcontrollers in PLC controllers by Japanese makers, Siemens in European controllers, and Motorola microcontrollers in American ones. CPU also takes care of communication, interconnectedness among other parts of PLC controllers, program execution, memory operation, overseeing input and setting up of an output. PLC controllers have complex routines for memory checkup in order to ensure that PLC memory was not damaged (memory checkup is done for safety reasons).Generally speaking, CPU unit makes a great number of check-ups of the PLC controller itself so eventual errors would be discovered early. You can simply look at any PLC controller and see that there are several indicators in the form. of light diodes for error signalization.System memory (today mostly implemented in FLASH technology) is used by a PLC for a process control system. Aside form. this operating system it also contains a user program translated forma ladder diagram to a binary form. FLASH memory contents can be changed only in case where user program is being changed. PLC controllers were used earlier instead of PLASH memory and have had EPROM memory instead of FLASH memory which had to be erased with UV lamp and programmed on programmers. With the use of FLASH technology this process was greatly shortened. Reprogramming a program memory is done through a serial cable in a program for application development.User memory is divided into blocks having special functions. Some parts of a memory are used for storing input and output status. The real status of an input is stored either as “1”or as “0”in a specific memory bit/ each input or output has one corresponding bit in memory. Other parts of memory are used to store variable contents for variables used in used program. For example, time value, or counter value would be stored in this part of the memory.PLC controller can be reprogrammed through a computer (usual way), but also through manual programmers (consoles). This practically means that each PLC controller can programmed through a computer if you have the software needed for programming. Today’s transmission computers are ideal for reprogramming a PLC controller in factory itself. This is of great importance to industry. Once the system is corrected, it is also important to read the right program into a PLC again. It is also good to check from time to time whether program in a PLC has not changed. This helps to avoid hazardous situations in factory rooms (some automakers have established communication networks which regularly check programs in PLC controllers to ensure execution only of good programs). Almost every program for programming a PLC controller possesses various useful options such as: forced switching on and off of the system input/outputs (I/O lines),program follow up in real time as well as documenting a diagram. This documenting is necessary to understand and define failures and malfunctions. Programmer can add remarks, names of input or output devices, and comments that can be useful when finding errors, or with system maintenance. Adding comments and remarks enables any technician (and not just a person who developed the system) to understand a ladder diagram right away. Comments and remarks can even quote precisely part numbers if replacements would be needed. This would speed up a repair of any problems that come up due to bad parts. The old way was such that a person who developed a system had protection on the program, so nobody aside from this person could understand how it was done. Correctly documented ladder diagram allows any technician to understand thoroughly how system functions.Electrical supply is used in bringing electrical energy to central processing unit. Most PLC controllers work either at 24 VDC or 220 VAC. On some PLC controllers you’ll find electrical supply as a separate module. Those are usually bigger PLC controllers, while small and medium series already contain the supply module. User has to determine how much current to take from I/O module to ensure that electrical supply provides appropriate amount of current. Different types of modules use different amounts of electrical current. This electrical supply is usually not used to start external input or output. User has to provide separate supplies in starting PLC controller inputs because then you can ensure so called “pure” supply for the PLC controller. With pure supply we mean supply where industrial environment can not affect it damagingly. Some of the smaller PLC controllers supply their inputs with voltage from a small supply source already incorporated into a PLC.中文翻译:从结构上分,PLC分为固定式和组合式(模块式)两种。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

北京XX学院毕业设计外文参考文献题目:THE TECHNIQUE DEVELOPMENT HISTORY OF JSP学生姓名:XXX 学号:*********学院:信息工程学院专业:计算机科学与技术班级:2010级计算机1班指导教师:XXX日期:2014年6月1日外文文献:THE TECHNIQUE DEVELOPMENT HISTORY OF JSPBy:Kathy Sierra and Bert BatesSource: Servlet&JSPThe Java Server Pages( JSP) is a kind of according to web of the script plait distance technique, similar carries the script language of Java in the server of the Netscape company of server- side JavaScript( SSJS) and the Active Server Pages(ASP) of the Microsoft. JSP compares the SSJS and ASP to have better can expand sex, and it is no more exclusive than any factory or some one particular server of Web. Though the norm of JSP is to be draw up by the Sun company of, any factory can carry out the JSP on own system.The After Sun release the JS P( the Java Server Pages) formally, the this kind of new Web application development technique very quickly caused the people's concern. JSP provided a special development environment for the Web application that establishes the high dynamic state. According to the Sun parlance, the JSP can adapt to include the Apache WebServer, IIS4.0 on the market at inside of 85% server product.This chapter will introduce the related knowledge of JSP and Databases, and JavaBean related contents, is all certainly rougher introduction among them basic contents, say perhaps to is a Guide only, if the reader needs the more detailed information, pleasing the book of consult the homologous JSP.1.1 GENER ALIZEThe JSP(Java Server Pages) is from the company of Sun Microsystems initiate, the many companies the participate to the build up the together of the a kind the of dynamic the state web the page technique standard, the it have the it in the construction the of the dynamic state the web page the strong but the do not the especially of the function. JSP and the technique of ASP of the Microsoft is very alike. Both all provide the ability that mixes with a certain procedure code and is explain by the language engine to carry out the procedure code in the code of HTML. Underneath we are simple of carry on the introduction to it.JSP pages are translated into servlets. So, fundamentally, any task JSP pages can perform could also be accomplished by servlets. However, this underlying equivalence does not mean that servlets and JSP pages are equally appropriate in all scenarios. The issue is not the power of the technology, it is the convenience, productivity, and maintainability of one or the other. After all, anything you can do on a particular computer platform in the Java programming language you could also do in assembly language. But it still matters which you choose.JSP provides the following benefits over servlets alone:• It is easier to write and maintain the HTML. Your static code is ordinary HTML: no extra backslashes, no double quotes, and no lurking Java syntax.• You can use standard Web-site development tools. Even HTML tools that know nothing about JSP can be used because they simply ignore the JSP tags.• You can divide up your development team. The Java programmers can work on the dynamic code. The Web developers can concentrate on the presentation layer. On large projects, this division is very important. Depending on the size of your team and the complexity of your project, you can enforce a weaker or stronger separation between the static HTML and the dynamic content.Now, this discussion is not to say that you should stop using servlets and use only JSP instead. By no means. Almost all projects will use both. For some requests in your project, you will use servlets. For others, you will use JSP. For still others, you will combine them with the MVC architecture . You want the apGFDGpropriate tool for the job, and servlets, by themselves, do not complete your toolkit.1.2 SOURCE OF JSPThe technique of JSP of the company of Sun, making the page of Web develop the personnel can use the HTML perhaps marking of XML to design to turn the end page with format. Use the perhaps small script future life of marking of JSP becomes the dynamic state on the page contents.( the contents changes according to the claim of)The Java Servlet is a technical foundation of JSP, and the large Web applies the development of the procedure to need the Java Servlet to match with with the JSP and then can complete, this name of Servlet comes from the Applet, the local translation method of now is a lot of, this book in order not to misconstruction, decide the direct adoption Servlet but don't do any translation, if reader would like to, can call it as" small service procedure". The Servlet is similar to traditional CGI, ISAPI, NSAPI etc. Web procedure development the function of the tool in fact, at use the Java Servlet hereafter, the customer need not use again the lowly method of CGI of efficiency, also need not use only the ability come to born page of Web of dynamic state in the method of API that a certain fixed Web server terrace circulate. Many servers of Web all support the Servlet, even not support the Servlet server of Web directly and can also pass the additional applied server and the mold pieces to support the Servlet. Receive benefit in the characteristic of the Java cross-platform, the Servlet is also a terrace irrelevant, actually, as long as match the norm of Java Servlet, the Servlet is complete to have nothing to do with terrace and is to have nothing to do with server of Web. Because the Java Servlet is internal to provide the service by the line distance, need not start a progress to the each claimses, and make use of the multi-threading mechanism can at the same time for several claim service, therefore the efficiency of Java Servlet is very high.But the Java Servlet also is not to has no weakness, similar to traditional CGI, ISAPI, the NSAPI method, the Java Servlet is to make use of to output the HTML language sentence to carry out the dynamic state web page of, if develop the whole website with the Java Servlet, the integration process of the dynamic state part and the static state page is an evil-foreboding dream simply. For solving this kind of weakness of the Java Servlet, the SUN released the JSP.A number of years ago, Marty was invited to attend a small 20-person industry roundtable discussion on software technology. Sitting in the seat next to Marty was James Gosling, inventor of the Java programming language. Sitting several seats away was a high-level manager from a very large software company in Redmond, Washington. During the discussion, the moderator brought up the subject of Jini, which at that time was a new Java technology. The moderator asked the manager what he thought of it, and the manager responded that it was too early to tell, but that it seemed to be an excellent idea. He went on to say that they would keep an eye on it, and if it seemed to be catching on, they would follow his company's usual "embrace and extend" strategy. At this point, Gosling lightheartedly interjected "You mean disgrace and distend."Now, the grievance that Gosling was airing was that he felt that this company would take technology from other companies and suborn it for their own purposes. But guess what? The shoe is on the other foot here. The Java community did not invent the idea of designing pages as a mixture of static HTML and dynamic code marked with special tags. For example, Cold Fusion did it years earlier. Even ASP (a product from the very software company of the aforementioned manager) popularized this approach before JSP came along and decided to jump on the bandwagon. In fact, JSP not only adopted the general idea, it even used many of the same special tags as ASP did.The JSP is an establishment at the model of Java servlets on of the expression layer technique, it makes the plait write the HTML to become more simple.Be like the SSJS, it also allows you carry the static state HTML contents and servers the script mix to put together the born dynamic state exportation. JSP the script language that the Java is the tacit approval, however, be like the ASP and can use other languages( such as JavaScript and VBScript), the norm of JSP also allows to use other languages.1.3 JSP CHARACTERISTICSIs a service according to the script language in some one language of the statures system this kind of discuss, the JSP should be see make is a kind of script language. However, be a kind of script language, the JSP seemed to be too strong again, almost can use all Javas in the JSP.Be a kind of according to text originally of, take manifestation as the central development technique, the JSP provided all advantages of the Java Servlet, and, when combine with aJavaBeans together, providing a kind of make contents and manifestation that simple way that logic separate. Separate the contents and advantage of logical manifestations is, the personnel who renews the page external appearance need not know the code of Java, and renew the JavaBeans personnel also need not be design the web page of expert in hand, can use to take the page of JavaBeans JSP to define the template of Web, to build up a from have the alike external appearance of the website that page constitute. JavaBeans completes the data to provide, having no code of Java in the template thus, this means that these templates can be written the personnel by a HTML plait to support. Certainly, can also make use of the Java Servlet to control the logic of the website, adjust through the Java Servlet to use the way of the document of JSP to separate website of logic and contents.Generally speaking, in actual engine of JSP, the page of JSP is the edit and translate type while carry out, not explain the type of. Explain the dynamic state web page development tool of the type, such as ASP, PHP3 etc., because speed etc. reason, have already can't satisfy current the large electronic commerce needs appliedly, traditional development techniques are all at to edit and translate the executive way change, such as the ASP → ASP+;PHP3 → PHP4.In the JSP norm book, did not request the procedure in the JSP code part( be called the Scriptlet) and must write with the Java definitely. Actually, have some engines of JSP are adoptive other script languages such as the EMAC- Script, etc., but actually this a few script languages also are to set up on the Java, edit and translate for the Servlet to carry out of. Write according to the norm of JSP, have no Scriptlet of relation with Java also is can of, however, mainly lie in the ability and JavaBeans, the Enterprise JavaBeanses because of the JSP strong function to work together, so even is the Scriptlet part not to use the Java, edit and translate of performance code also should is related with Java.1.4 JSP MECHANISMTo comprehend the JSP how unite the technical advantage that above various speak of, come to carry out various result easily, the customer must understand the differentiation of" the module develops for the web page of the center" and" the page develops for the web page of the center" first.The SSJS and ASP are all in several year ago to release, the network of that time is still very young, no one knows to still have in addition to making all business, datas and the expression logic enter the original web page entirely heap what better solve the method. This kind of model that take page as the center studies and gets the very fast development easily. However, along with change of time, the people know that this kind of method is unwell in set up large, the Web that can upgrade applies the procedure. The expression logic write in the script environment was lock in the page, only passing to shear to slice and glue to stick then can drive heavy use. Express the logic to usually mix together with business and the datalogics, when this makes be the procedure member to try to change an external appearance that applies the procedure but do not want to break with its llied business logic, apply the procedure of maintenance be like to walk the similar difficulty on the eggshell. In fact in the business enterprise, heavy use the application of the module already through very mature, no one would like to rewrite those logics for their applied procedure.HTML and sketch the designer handed over to the implement work of their design the Web plait the one who write, make they have to double work- Usually is the handicraft plait to write, because have no fit tool and can carry the script and the HTML contents knot to the server to put together. Chien but speech, apply the complexity of the procedure along with the Web to promote continuously, the development method that take page as the center limits sex to become to get up obviously.At the same time, the people always at look for the better method of build up the Web application procedure, the module spreads in customer's machine/ server the realm. JavaBeans and ActiveX were published the company to expand to apply the procedure developer for Java and Windows to use to come to develop the complicated procedure quickly by" the fast application procedure development"( RAD) tool. These techniques make the expert in the some realm be able to write the module for the perpendicular application plait in the skill area, but the developer can go fetch the usage directly but need not control the expertise of this realm.Be a kind of take module as the central development terrace, the JSP appeared. It with the JavaBeans and Enterprise JavaBeans( EJB) module includes the model of the business and the data logic for foundation, provide a great deal of label and a script terraces to use to come to show in the HTML page from the contents of JavaBeans creation or send a present in return. Because of the property that regards the module as the center of the JSP, it can drive Java and not the developer of Java uses equally. Not the developer of Java can pass the JSP label( Tags) to use the JavaBeans that the deluxe developer of Java establish. The developer of Java not only can establish and use the JavaBeans, but also can use the language of Java to come to control more accurately in the JSP page according to the expression logic of the first floor JavaBeans.See now how JSP is handle claim of HTTP. In basic claim model, a claim directly was send to JSP page in. The code of JSP controls to carry on hour of the logic processing and module of JavaBeanses' hand over with each other, and the manifestation result in dynamic state bornly, mixing with the HTML page of the static state HTML code. The Beans can be JavaBeans or module of EJBs. Moreover, the more complicated claim model can see make from is request other JSP pages of the page call sign or Java Servlets.The engine of JSP wants to chase the code of Java that the label of JSP, code of Java in the JSP page even all converts into the big piece together with the static state HTML contents actually. These codes piece was organized the Java Servlet that customer can not see to go toby the engine of JSP, then the Servlet edits and translate them automatically byte code of Java. Thus, the visitant that is the website requests a JSP page, under the condition of it is not knowing, an already born, the Servlet actual full general that prepared to edit and translate completes all works, very concealment but again and efficiently. The Servlet is to edit and translate of, so the code of JSP in the web page does not need when the every time requests that page is explain. The engine of JSP need to be edit and translate after Servlet the code end is modify only once, then this Servlet that editted and translate can be carry out. The in view of the fact JSP engine auto is born to edit and translate the Servlet also, need not procedure member begins to edit and translate the code, so the JSP can bring vivid sex that function and fast developments need that you are efficiently.Compared with the traditional CGI, the JSP has the equal advantage. First, on the speed, the traditional procedure of CGI needs to use the standard importation of the system to output the equipments to carry out the dynamic state web page born, but the JSP is direct is mutually the connection with server. And say for the CGI, each interview needs to add to add a progress to handle, the progress build up and destroy by burning constantly and will be a not small burden for calculator of be the server of Web. The next in order, the JSP is specialized to develop but design for the Web of, its purpose is for building up according to the Web applied procedure, included the norm and the tool of a the whole set. Use the technique of JSP can combine a lot of JSP pages to become a Web application procedure very expediently.JSP的技术发展历史作者:Kathy Sierra and Bert Bates来源:Servlet&JSPJava Server Pages(JSP)是一种基于web的脚本编程技术,类似于网景公司的服务器端Java脚本语言—— server-side JavaScript(SSJS)和微软的Active Server Pages(ASP)。

相关文档
最新文档