山东建筑大学本科毕业设计(论文)外文文献及译文格式模版.doc
英文文献及中文翻译撰写格式

关于毕业设计说明书(论文)英文文献及中文翻译撰写格式为提高我校毕业生毕业设计说明书(毕业论文)的撰写质量,做到毕业设计说明书(毕业论文)在内容和格式上的统一和规范,特规定如下:一、装订顺序论文(设计说明书)英文文献及中文翻译内容一般应由3个部分组成,严格按以下顺序装订。
1、封面2、中文翻译3、英文文献(原文)二、书写格式要求1、毕业设计(论文)英文文献及中文翻译分毕业设计说明书英文文献及中文翻译和毕业论文英文文献及中文翻译两种,所有出现相关字样之处请根据具体情况选择“毕业设计说明书” 或“毕业论文”字样。
2、毕业设计说明书(毕业论文)英文文献及中文翻译中的中文翻译用Word 软件编辑,英文文献用原文,一律打印在A4幅面白纸上,单面打印。
3、毕业设计说明书(毕业论文)英文文献及中文翻译的上边距:30mm;下边距:25mm;左边距:3Omm;右边距:2Omm;行间距1.5倍行距。
4、中文翻译页眉的文字为“中北大学2019届毕业设计说明书” 或“中北大学××××届毕业论文”,用小四号黑体字,页眉线的上边距为25mm;页脚的下边距为18mm。
5、中文翻译正文用小四号宋体,每章的大标题用小三号黑体,加粗,留出上下间距为:段前0.5行,段后0.5行;二级标题用小四号黑体,加粗;其余小标题用小四号黑体,不加粗。
6、文中的图、表、附注、公式一律采用阿拉伯数字分章编号。
如图1.2,表2.3,附注3.2或式4.3。
7、图表应认真设计和绘制,不得徒手勾画。
表格与插图中的文字一律用5号宋体。
每一插图和表格应有明确简短的图表名,图名置于图之下,表名置于表之上,图表号与图表名之间空一格。
插图和表格应安排在正文中第一次提及该图表的文字的下方。
当插图或表格不能安排在该页时,应安排在该页的下一页。
图表居中放置,表尽量采用三线表。
每个表应尽量放在一页内,如有困难,要加“续表X.X”字样,并有标题栏。
毕业设计(论文)外文文献译文格式及装订要求

“毕业设计(论文)外文文献译文”格式及装订要求
全校所有专业的学生在完成毕业设计(论文)的同时,必须完成一篇专业外文文献翻译工作(将外文文献翻译成中文),要求译出3000汉字以上的有关技术资料或专业外文文献,内容要与毕业设计(论文)内容相关。
书写时具体格式要求参考“毕业论文(设计说明书)缩写稿格式、版面要求”,装订时按以下顺序独立装订:1、封面;2、外文文献译文;3、外文文献原文。
附件:毕业设计(论文)外文文献译文封面
毕业设计(论文)
外文文献译文及原文
学生:
学号:
院(系):
专业:
指导教师:
20 年月日。
毕业设计(论文)外文资料和译文格式要求(模板)

成都东软学院外文资料和译文格式要求一、译文必须采用计算机输入、打印,幅面A4。
外文资料原文(复印或打印)在前,译文在后,于左侧装订。
二、具体要求1、至少翻译一篇内容与所选课题相关的外文文献。
2、译文汉字字数不少于4000字。
3、正文格式要求:宋体五号字。
译文格式参见《译文格式要求》,宋体五号字,单倍行距。
纸张纸张为A4纸,页边距上2.54cm、下2.54cm、左3.17cm、右3.17cm。
装订外文资料原文(复印或打印)在前,译文在后封面封面的专业、班级、姓名、学号等信息要全部填写正确。
封面指导教师必须为讲师以上职称,若助教则需要配备一名讲师协助指导。
讲师在前,助教在后。
指导教师姓名后面空一个中文空格,加职称。
页眉页眉说明宋体小五,左端“XX学院毕业设计(论文)”,右端“译文”。
页眉中的学院名称要与封面学院名称一致。
字数本科4000字。
附:外文资料和译文封面、空白页成都东软学院外文资料和译文专业:软件工程移动互联网应用开发班级:2班姓名:罗荣昆学号:12310420216指导教师:2015年 12月 8日Android page layoutUsing XML-Based LayoutsW hile it is technically possible to create and attach widgets to our activity purely through Java code, the way we did in Chapter 4, the more common approach is to use an XML-based layout file. Dynamic instantiation of widgets is reserved for more complicated scenarios, where the widgets are not known at compile-time (e g., populating a column of radio buttons based on data retrieved off the Internet).With that in mind, it’s time to break out the XML and learn how to lay out Android activities that way.What Is an XML-Based Layout?As the name suggests, an XML-based layout is a specification of widgets’ relationships to each other—and to their containers (more on this in Chapter 7)—encoded in XML format. Specifi cally, Android considers XML-based layouts to be resources, and as such layout files are stored in the res/layout directory inside your Android project.Each XML file contains a tree of elements specifying a layout of widgets and their containers that make up one view hierarchy. The attributes of the XML elements are properties, describing how a widget should look or how a container should behave. For example, if a Button element has an attribute value of android:textStyle = "bold", that means that the text appearing on the face of the button should be rendered in a boldface font style.Android’s SDK ships with a tool (aapt) which uses the layouts. This tool should be automatically invoked by your Android tool chain (e.g., Eclipse, Ant’s build.xml). Of particular importance to you as a developer is that aapt generates the R.java source file within your project, allowing you to access layouts and widgets within those layouts directly from your Java code. Why Use XML-Based Layouts?Most everything you do using XML layout files can be achieved through Java code. For example, you could use setTypeface() to have a button render its textin bold, instead of using a property in an XML layout. Since XML layouts are yet another file for you to keep track of, we need good reasons for using such files.Perhaps the biggest reason is to assist in the creation of tools for view definition, such as a GUI builder in an IDE like Eclipse or a dedicated Android GUI designer like DroidDraw1. Such GUI builders could, in principle, generate Java code instead of XML. The challenge is re-reading the UI definition to support edits—that is far simpler if the data is in a structured format like XML than in a programming language. Moreover, keeping generated XML definitions separated from hand-written Java code makes it less likely that somebody’s custom-crafted source will get clobbered by accident when the generated bits get re-generated. XML forms a nice middle ground between something that is easy for tool-writers to use and easy for programmers to work with by hand as needed.Also, XML as a GUI definition format is becoming more commonplace. Microsoft’s XAML2, Adobe’s Flex3, and Mozilla’s XUL4 all take a similar approach to that of Android: put layout details in an XML file and put programming smarts in source files (e.g., JavaScript for XUL). Many less-well-known GUI frameworks, such as ZK5, also use XML for view definition. While “following the herd” is not necessarily the best policy, it does have the advantage of helping to ease the transition into Android from any other XML-centered view description language. OK, So What Does It Look Like?Here is the Button from the previous chapter’s sample application, converted into an XMLlayout file, found in the Layouts/NowRedux sample project. This code sample along with all others in this chapter can be found in the Source Code area of .<?xml version="1.0" encoding="utf-8"?><Button xmlns:android="/apk/res/android"android:id="@+id/button"android:text=""android:layout_width="fill_parent"android:layout_height="fill_parent"/>The class name of the widget—Button—forms the name of the XML element. Since Button is an Android-supplied widget, we can just use the bare class name. If you create your own widgets as subclasses of android.view.View, you would need to provide a full package declara tion as well.The root element needs to declare the Android XML namespace:xmlns:android="/apk/res/android"All other elements will be children of the root and will inherit that namespace declaration.Because we want to reference this button from our Java code, we need to give it an identifier via the android:id attribute. We will cover this concept in greater detail later in this chapter.The remaining attributes are properties of this Button instance:• android:text indicates the initial text to be displayed on the button face (in this case, an empty string)• android:layout_width and android:layout_height tell Android to have the button’swidth and height fill the “parent”, in this case the entire screen—these attributes will be covered in greater detail in Chapter 7.Since this single widget is the only content in our activity, we only need this single element. Complex UIs will require a whole tree of elements, representing the widgets and containers that control their positioning. All the remaining chapters of this book will use the XML layout form whenever practical, so there are dozens of other examples of more complex layouts for you to peruse from Chapter 7 onward.What’s with the @ Signs?Many widgets and containers only need to appear in the XML layout file and do not need to be referenced in your Java code. For example, a static label (TextView) frequently only needs to be in the layout file to indicate where it should appear. These sorts of elements in the XML file do not need to have the android:id attribute to give them a name.Anything you do want to use in your Java source, though, needs an android:id.The convention is to use @+id/... as the id value, where the ... represents your locally unique name for the widget in question. In the XML layout example in the preceding section, @+id/button is the identifier for the Button widget.Android provides a few special android:id values, of the form @android:id/.... We will see some of these in various chapters of this book, such as Chapters 8 and 10.We Attach These to the Java How?Given that you have painstakingly set up the widgets and containers in an XML layout filenamed main.xml stored in res/layout, all you need is one statement in your activity’s onCreate() callback to use that layout:setContentView(yout.main);This is the same setContentView() we used earlier, passing it an instance of a View subclass (in that case, a Button). The Android-built view, constructed from our layout, is accessed from that code-generated R class. All of the layouts are accessible under yout, keyed by the base name of the layout file—main.xml results in yout.main.To access our identified widgets, use findViewById(), passing in the numeric identifier of the widget in question. That numeric identifier was generated by Android in the R class asR.id.something (where something is the specific widget you are seeking). Those widgets are simply subclasses of View, just like the Button instance we created in Chapter 4.The Rest of the StoryIn the original Now demo, the button’s face would show the current time, which would reflect when the button was last pushed (or when the activity was first shown, if the button had not yet been pushed).Most of that logic still works, even in this revised demo (NowRedux). However,rather than instantiating the Button in our activity’s onCreate() callback, we can reference the one from the XML layout:package youts;import android.app.Activity;import android.os.Bundle;import android.view.View;import android.widget.Button; import java.util.Date;public class NowRedux extends Activity implements View.OnClickListener { Button btn;@Overridepublic void onCreate(Bundle icicle) { super.onCreate(icicle);setContentView(yout.main);btn=(Button)findViewById(R.id.button);btn.setOnClickListener(this);upd ateTime();}public void onClick(View view) { updateTime();}private void updateTime() {btn.setText(new Date().toString()); }}The first difference is that rather than setting the content view to be a view we created in Java code, we set it to reference the XML layout (setContentView(yout.main)). The R.java source file will be updated when we rebuild this project to include a reference to our layout file (stored as main.xml in our project’s res/l ayout directory).The other difference is that we need to get our hands on our Button instance, for which we use the findViewById() call. Since we identified our button as @+id/button, we can reference the button’s identifier as R.id.button. Now, with the Button instance in hand, we can set the callback and set the label as needed.As you can see in Figure 5-1, the results look the same as with the originalNow demo.Figure 5-1. The NowRedux sample activity Employing Basic WidgetsE very GUI toolkit has some basic widgets: fields, labels, buttons, etc. Android’s toolkit is no different in scope, and the basic widgets will provide a good introduction as to how widgets work in Android activities.Assigning LabelsThe simplest widget is the label, referred to in Android as a TextView. Like in most GUI toolkits, labels are bits of text not editable directly by users. Typically, they are used to identify adjacent widgets (e.g., a “Name:” label before a field where one fills in a name).In Java, you can create a label by creating a TextView instance. More commonly, though, you will create labels in XML layout files by adding a TextView element to the layout, with an android:text property to set the value of the label itself. If you need to swap labels based on certain criteria, such as internationalization, you may wish to use a resource reference in the XML instead, as will be described in Chapter 9. TextView has numerous other properties of relevance for labels, such as:• android:typeface to set the typeface to use for the label (e.g., monospace) • android:textStyle to indicate that the typeface should be made bold (bold), italic (italic),or bold and italic (bold_italic)• android:textColor to set the color of the label’s text, in RGB hex format (e.g., #FF0000 for red)For example, in the Basic/Label project, you will find the following layout file:<?xml version="1.0" encoding="utf-8"?><TextView xmlns:android=/apk/res/androidandroid:layout_width="fill_parent"android:layout_height="wrap_content"android:text="You were expecting something profound?" />As you can see in Figure 6-1, just that layout alone, with the stub Java source provided by Android’s p roject builder (e.g., activityCreator), gives you the application.Figure 6-1. The LabelDemo sample applicationButton, Button, Who’s Got the Button?We’ve already seen the use of the Button widget in Chapters 4 and 5. As it turns out, Button is a subclass of TextView, so everything discussed in the preceding section in terms of formatting the face of the button still holds. Fleeting ImagesAndroid has two widgets to help you embed images in your activities: ImageView and ImageButton. As the names suggest, they are image-based analogues to TextView and Button, respectively.Each widget takes an android:src attribute (in an XML layout) to specify what picture to use. These usually reference a drawable resource, described in greater detail in the chapter on resources. You can also set the image content based on a Uri from a content provider via setImageURI().ImageButton, a subclass of ImageView, mixes in the standard Button behaviors, for responding to clicks and whatnot.For example, take a peek at the main.xml layout from the Basic/ImageView sample project which is found along with all other code samples at : <?xml version="1.0" encoding="utf-8"?><ImageView xmlns:android=/apk/res/androidandroid:id="@+id/icon"android:layout_width="fill_parent"android:layout_height="fill_parent"android:adjustViewBounds="true"android:src="@drawable/molecule" />The result, just using the code-generated activity, is shown in Figure 6-2.Figure 6-2. The ImageViewDemo sample applicationFields of Green. Or Other Colors.Along with buttons and labels, fields are the third “anchor” of most GUI toolkits. In Android, they are implemented via the EditText widget, which is a subclass of the TextView used for labels.Along with the standard TextView properties (e.g., android:textStyle), EditText has many others that will be useful for you in constructing fields, including:• android:autoText, to control if the fie ld should provide automatic spelling assistance• android:capitalize, to control if the field should automatically capitalize the first letter of entered text (e.g., first name, city) • android:digits, to configure the field to accept only certain digi ts • android:singleLine, to control if the field is for single-line input or multiple-line input (e.g., does <Enter> move you to the next widget or add a newline?)Beyond those, you can configure fields to use specialized input methods, such asandroid:numeric for numeric-only input, android:password for shrouded password input,and android:phoneNumber for entering in phone numbers. If you want to create your own input method scheme (e.g., postal codes, Social Security numbers), you need to create your own implementation of the InputMethod interface, then configure the field to use it via android: inputMethod.For example, from the Basic/Field project, here is an XML layout file showing an EditText:<?xml version="1.0" encoding="utf-8"?><EditTextxmlns:android=/apk/res/androidandroid:id="@+id/field"android:layout_width="fill_parent"android:layout_height="fill_parent"android:singleLine="false" />Note that android:singleLine is false, so users will be able to enter in several lines of text. For this project, the FieldDemo.java file populates the input field with some prose:package monsware.android.basic;import android.app.Activity;import android.os.Bundle;import android.widget.EditText;public class FieldDemo extends Activity { @Overridepublic void onCreate(Bundle icicle) { super.onCreate(icicle);setContentView(yout.main);EditText fld=(EditText)findViewById(R.id.field);fld.setText("Licensed under the Apache License, Version 2.0 " + "(the \"License\"); you may not use this file " + "except in compliance with the License. You may " + "obtain a copy of the License at " +"/licenses/LICENSE-2.0");}}The result, once built and installed into the emulator, is shown in Figure 6-3.Figure 6-3. The FieldDemo sample applicationNote Android’s emulator only allows one application in the launcher per unique Java package. Since all the demos in this chapter share the monsware.android.basic package, you will only see one of these demos in your emulator’s launcher at any one time.Another flavor of field is one that offers auto-completion, to help users supply a value without typing in the whole text. That is provided in Android as the AutoCompleteTextView widget and is discussed in Chapter 8.Just Another Box to CheckThe classic checkbox has two states: checked and unchecked. Clicking the checkbox toggles between those states to indicate a choice (e.g., “Ad d rush delivery to my order”). In Android, there is a CheckBox widget to meet this need. It has TextView as an ancestor, so you can use TextView properties likeandroid:textColor to format the widget. Within Java, you can invoke: • isChecked() to determi ne if the checkbox has been checked• setChecked() to force the checkbox into a checked or unchecked state • toggle() to toggle the checkbox as if the user checked itAlso, you can register a listener object (in this case, an instance of OnCheckedChangeListener) to be notified when the state of the checkbox changes.For example, from the Basic/CheckBox project, here is a simple checkbox layout:<?xml version="1.0" encoding="utf-8"?><CheckBox xmlns:android="/apk/res/android"android:id="@+id/check"android:layout_width="wrap_content"android:layout_height="wrap_content"android:text="This checkbox is: unchecked" />The corresponding CheckBoxDemo.java retrieves and configures the behavior of the checkbox:public class CheckBoxDemo extends Activityimplements CompoundButton.OnCheckedChangeListener { CheckBox cb;@Overridepublic void onCreate(Bundle icicle) { super.onCreate(icicle);setContentView(yout.main);cb=(CheckBox)findViewById(R.id.check);cb.setOnCheckedChangeListener(this);}public void onCheckedChanged(CompoundButton buttonView,boolean isChecked) {if (isChecked) {cb.setText("This checkbox is: checked");}else {cb.setText("This checkbox is: unchecked");}}}Note that the activity serves as its own listener for checkbox state changes since it imple ments the OnCheckedChangeListener interface (via cb.setOnCheckedChangeListener(this)). The callback for the listener is onCheckedChanged(), which receives the checkbox whose state has changed and what the new state is. In this case, we update the text of the checkbox to reflect what the actual box contains.The result? Clicking the checkbox immediately updates its text, as you can see in Figures 6-4 and 6-5.Figure 6-4. The CheckBoxDemo sample application, with the checkbox uncheckedFigure 6-5. The same application, now with the checkbox checkedTurn the Radio UpAs with other implementations of radio buttons in other toolkits, Android’s radio buttons are two-state, like checkboxes, but can be grouped such that only one radio button in the group can be checked at any time.Like CheckBox, RadioButton inherits from CompoundButton, which in turn inherits fromTextView. Hence, all the standard TextView properties for font face, style, color, etc., are available for controlling the look of radio buttons. Similarly, you can call isChecked() on a RadioButton to see if it is selected, toggle() to select it, and so on, like you can with a CheckBox.Most times, you will want to put your RadioButton widgets inside of aRadioGroup. The RadioGroup indicates a set of radio buttons whose state is tied, meaning only one button out of the group can be selected at any time. If you assign an android:id to your RadioGroup in your XML layout, you can access the group from your Java code and invoke:• check() to check a specific radio button via its ID (e.g., group.check(R.id.radio1))• clearCheck() to clear all radio buttons, so none in the group are checked• getCheckedRadioButtonId() to get the ID of the currently-checked radio button (or -1 if none are checked)For example, from the Basic/RadioButton sample application, here is an XML layout showing a RadioGroup wrapping a set of RadioButton widgets: <?xml version="1.0" encoding="utf-8"?> <RadioGroupxmlns:android=/apk/res/androidandroid:orientation="vertical"android:layout_width="fill_parent"android:layout_height="fill_parent" ><RadioButton android:id="@+id/radio1"android:layout_width="wrap_content"android:layout_height="wrap_content"android:text="Rock" /><RadioButton android:id="@+id/radio2"android:layout_width="wrap_content"android:layout_height="wrap_content"android:text="Scissors" /><RadioButton android:id="@+id/radio3"android:layout_width="wrap_content"android:layout_height="wrap_content"android:text="Paper" /></RadioGroup>Figure 6-6 shows the result using the stock Android-generated Java forthe project and this layout.Figure 6-6. The RadioButtonDemo sample application Note that the radio button group is initially set to be completely unchecked at the outset. To pre-set one of the radio buttons to be checked, use either setChecked() on the RadioButton or check() on the RadioGroup from within your onCreate() callback in your activity.It’s Quite a ViewAll widgets, including the ones previously shown, extend View, and as such give all widgets an array of useful properties and methods beyond those already described.Useful PropertiesSome of the properties on View most likely to be used include:• Controls the focus sequence:• android:nextFocusDown• android:nextFocusLeft• android:nextFocusRight• android:nextFocusUp• android:visibility, which controls wheth er the widget is initially visible• android:background, which typically provides an RGB color value (e.g., #00FF00 for green) to serve as the background for the widgetUseful MethodsYou can toggle whether or not a widget is enabled via setEnabled() and see if it is enabled via isEnabled(). One common use pattern for this is to disable some widgets based on a CheckBox or RadioButton selection.You can give a widget focus via requestFocus() and see if it is focused via isFocused(). You might use this in concert with disabling widgets as previously mentioned, to ensure the proper widget has the focus once your disabling operation is complete.To help navigate the tree of widgets and containers that make up an activity’s overall view, you can use:• get Parent() to find the parent widget or container• findViewById() to find a child widget with a certain ID• getRootView() to get the root of the tree (e.g., what you provided to the activity via setContentView())Android 页面布局使用XML进行布局虽然纯粹通过Java代码在activity上创建和添加部件,在技术上是可行的,我们在第4章中做的一样,更常见的方法是使用一种基于XML的布局文件。
建筑设计毕业论文中英文资料外文翻译文献

毕业论文中英文资料外文翻译文献Architecture StructureWe have and the architects must deal with the spatial aspect of activity, physical, and symbolic needs in such a way that overall performance integrity is assured. Hence, he or she well wants to think of evolving a building environment as a total system of interacting and space forming subsystems. Is represents a complex challenge, and to meet it the architect will need a hierarchic design process that provides at least three levels of feedback thinking: schematic, preliminary, and final.Such a hierarchy is necessary if he or she is to avoid being confused , at conceptual stages of design thinking ,by the myriad detail issues that can distract attention from more basic consideration s .In fact , we can say that an architect’s ability to distinguish the more basic form the more detailed issues is essential to his success as a designer .The object of the schematic feed back level is to generate and evaluate overall site-plan, activity-interaction, and building-configuration options .To do so the architect must be able to focus on the interaction of the basic attributes of the site context, the spatial organization, and the symbolism as determinants of physical form. This means that ,in schematic terms ,the architect may first conceive and model a building design as an organizational abstraction of essential performance-space in teractions.Then he or she may explore the overall space-form implications of the abstraction. As an actual building configuration option begins to emerge, it will be modified to include consideration for basic site conditions.At the schematic stage, it would also be helpful if the designer could visualize his or her options for achieving overall structural integrity and consider the constructive feasibility and economic of his or her scheme .But this will require that the architect and/or a consultant be able to conceptualize total-system structural options in terms of elemental detail .Such overall thinking can be easily fed back to improve the space-form scheme.At the preliminary level, the architect’s emphasis will shift to the elaboration of his or her more promising schematic design options .Here the architect’s structural needs will shift toapproximate design of specific subsystem options. At this stage the total structural scheme is developed to a middle level of specificity by focusing on identification and design of major subsystems to the extent that their key geometric, component, and interactive properties are established .Basic subsystem interaction and design conflicts can thus be identified and resolved in the context of total-system objectives. Consultants can play a significant part in this effort; these preliminary-level decisions may also result in feedback that calls for refinement or even major change in schematic concepts.When the designer and the client are satisfied with the feasibility of a design proposal at the preliminary level, it means that the basic problems of overall design are solved and details are not likely to produce major change .The focus shifts again ,and the design process moves into the final level .At this stage the emphasis will be on the detailed development of all subsystem specifics . Here the role of specialists from various fields, including structural engineering, is much larger, since all detail of the preliminary design must be worked out. Decisions made at this level may produce feedback into Level II that will result in changes. However, if Levels I and II are handled with insight, the relationship between the overall decisions, made at the schematic and preliminary levels, and the specifics of the final level should be such that gross redesign is not in question, Rather, the entire process should be one of moving in an evolutionary fashion from creation and refinement (or modification) of the more general properties of a total-system design concept, to the fleshing out of requisite elements and details.To summarize: At Level I, the architect must first establish, in conceptual terms, the overall space-form feasibility of basic schematic options. At this stage, collaboration with specialists can be helpful, but only if in the form of overall thinking. At Level II, the architect must be able to identify the major subsystem requirements implied by the scheme and substantial their interactive feasibility by approximating key component properties .That is, the properties of major subsystems need be worked out only in sufficient depth to very the inherent compatibility of their basic form-related and behavioral interaction . This will mean a somewhat more specific form of collaboration with specialists then that in level I .At level III ,the architect and the specific form of collaboration with specialists then that providing for all of the elemental design specifics required to produce biddable construction documents .Of course this success comes from the development of the Structural Material.1.Reinforced ConcretePlain concrete is formed from a hardened mixture of cement ,water ,fine aggregate, coarse aggregate (crushed stone or gravel),air, and often other admixtures. The plastic mix is placed and consolidated in the formwork, then cured to facilitate the acceleration of the chemical hydration reaction lf the cement/water mix, resulting in hardened concrete. The finished product has high compressive strength, and low resistance to tension, such that its tensile strength is approximately one tenth lf its compressive strength. Consequently, tensile and shear reinforcement in the tensile regions of sections has to be provided to compensate for the weak tension regions in the reinforced concrete element.It is this deviation in the composition of a reinforces concrete section from the homogeneity of standard wood or steel sections that requires a modified approach to the basic principles of structural design. The two components of the heterogeneous reinforced concrete section are to be so arranged and proportioned that optimal use is made of the materials involved. This is possible because concrete can easily be given any desired shape by placing and compacting the wet mixture of the constituent ingredients are properly proportioned, the finished product becomes strong, durable, and, in combination with the reinforcing bars, adaptable for use as main members of any structural system.The techniques necessary for placing concrete depend on the type of member to be cast: that is, whether it is a column, a bean, a wall, a slab, a foundation. a mass columns, or an extension of previously placed and hardened concrete. For beams, columns, and walls, the forms should be well oiled after cleaning them, and the reinforcement should be cleared of rust and other harmful materials. In foundations, the earth should be compacted and thoroughly moistened to about 6 in. in depth to avoid absorption of the moisture present in the wet concrete. Concrete should always be placed in horizontal layers which are compacted by means of high frequency power-driven vibrators of either the immersion or external type, as the case requires, unless it is placed by pumping. It must be kept in mind, however, that over vibration can be harmful since it could cause segregation of the aggregate and bleeding of the concrete.Hydration of the cement takes place in the presence of moisture at temperatures above 50°F. It is necessary to maintain such a condition in order that the chemical hydration reaction can take place. If drying is too rapid, surface cracking takes place. This would result in reduction of concrete strength due to cracking as well as the failure to attain full chemical hydration.It is clear that a large number of parameters have to be dealt with in proportioning a reinforced concrete element, such as geometrical width, depth, area of reinforcement, steel strain, concrete strain, steel stress, and so on. Consequently, trial and adjustment is necessary in the choice ofconcrete sections, with assumptions based on conditions at site, availability of the constituent materials, particular demands of the owners, architectural and headroom requirements, the applicable codes, and environmental reinforced concrete is often a site-constructed composite, in contrast to the standard mill-fabricated beam and column sections in steel structures.A trial section has to be chosen for each critical location in a structural system. The trial section has to be analyzed to determine if its nominal resisting strength is adequate to carry the applied factored load. Since more than one trial is often necessary to arrive at the required section, the first design input step generates into a series of trial-and-adjustment analyses.The trial-and –adjustment procedures for the choice of a concrete section lead to the convergence of analysis and design. Hence every design is an analysis once a trial section is chosen. The availability of handbooks, charts, and personal computers and programs supports this approach as a more efficient, compact, and speedy instructional method compared with the traditional approach of treating the analysis of reinforced concrete separately from pure design.2. EarthworkBecause earthmoving methods and costs change more quickly than those in any other branch of civil engineering, this is a field where there are real opportunities for the enthusiast. In 1935 most of the methods now in use for carrying and excavating earth with rubber-tyred equipment did not exist. Most earth was moved by narrow rail track, now relatively rare, and the main methods of excavation, with face shovel, backacter, or dragline or grab, though they are still widely used are only a few of the many current methods. To keep his knowledge of earthmoving equipment up to date an engineer must therefore spend tine studying modern machines. Generally the only reliable up-to-date information on excavators, loaders and transport is obtainable from the makers.Earthworks or earthmoving means cutting into ground where its surface is too high ( cuts ), and dumping the earth in other places where the surface is too low ( fills). Toreduce earthwork costs, the volume of the fills should be equal to the volume of the cuts and wherever possible the cuts should be placednear to fills of equal volume so as to reduce transport and double handlingof the fill. This work of earthwork design falls on the engineer who lays out the road since it is the layout of the earthwork more than anything else which decides its cheapness. From the available maps ahd levels, the engineering must try to reach as many decisions as possible in the drawing office by drawing cross sections of the earthwork. On the site when further information becomes available he can make changes in jis sections and layout,but the drawing lffice work will not have been lost. It will have helped him to reach the best solution in the shortest time.The cheapest way of moving earth is to take it directly out of the cut and drop it as fill with the same machine. This is not always possible, but when it canbe done it is ideal, being both quick and cheap. Draglines, bulldozers and face shovels an do this. The largest radius is obtained with thedragline,and the largest tonnage of earth is moved by the bulldozer, though only over short distances.The disadvantages of the dragline are that it must dig below itself, it cannot dig with force into compacted material, it cannot dig on steep slopws, and its dumping and digging are not accurate.Face shovels are between bulldozers and draglines, having a larger radius of action than bulldozers but less than draglines. They are anle to dig into a vertical cliff face in a way which would be dangerous tor a bulldozer operator and impossible for a dragline. Each piece of equipment should be level of their tracks and for deep digs in compact material a backacter is most useful, but its dumping radius is considerably less than that of the same escavator fitted with a face shovel.Rubber-tyred bowl scrapers are indispensable for fairly level digging where the distance of transport is too much tor a dragline or face shovel. They can dig the material deeply ( but only below themselves ) to a fairly flat surface, carry it hundreds of meters if need be, then drop it and level it roughly during the dumping. For hard digging it is often found economical to keep a pusher tractor ( wheeled or tracked ) on the digging site, to push each scraper as it returns to dig. As soon as the scraper is full,the pusher tractor returns to the beginning of the dig to heop to help the nest scraper.Bowl scrapers are often extremely powerful machines;many makers build scrapers of 8 cubic meters struck capacity, which carry 10 m ³ heaped. The largest self-propelled scrapers are of 19 m ³struck capacity ( 25 m ³ heaped )and they are driven by a tractor engine of 430 horse-powers.Dumpers are probably the commonest rubber-tyred transport since they can also conveniently be used for carrying concrete or other building materials. Dumpers have the earth container over the front axle on large rubber-tyred wheels, and the container tips forwards on most types, though in articulated dumpers the direction of tip can be widely varied. The smallest dumpers have a capacity of about 0.5 m ³, and the largest standard types are of about 4.5 m ³. Special types include the self-loading dumper of up to 4 m ³ and the articulated type of about 0.5 m ³. The distinction between dumpers and dump trucks must be remembered .dumpers tip forwards and the driver sits behind the load. Dump trucks are heavy, strengthened tipping lorries, the driver travels in front lf the load and the load is dumped behind him, so they are sometimes called rear-dump trucks.3.Safety of StructuresThe principal scope of specifications is to provide general principles and computational methods in order to verify safety of structures. The “ safety factor ”, which according to modern trends is independent of the nature and combination of the materials used, can usually be defined as the ratio between the conditions. This ratio is also proportional to the inverse of the probability ( risk ) of failure of the structure.Failure has to be considered not only as overall collapse of the structure but also asunserviceability or, according to a more precise. Common definition. As the reaching of a “ limit state ” which causes the construction not to accomplish the task it was designed for. Ther e are two categories of limit state :(1)Ultimate limit sate, which corresponds to the highest value of the load-bearing capacity. Examples include local buckling or global instability of the structure; failure of some sections and subsequent transformation of the structure into a mechanism; failure by fatigue; elastic or plastic deformation or creep that cause a substantial change of the geometry of the structure; and sensitivity of the structure to alternating loads, to fire and to explosions.(2)Service limit states, which are functions of the use and durability of the structure. Examples include excessive deformations and displacements without instability; early or excessive cracks; large vibrations; and corrosion.Computational methods used to verify structures with respect to the different safety conditions can be separated into:(1)Deterministic methods, in which the main parameters are considered as nonrandom parameters.(2)Probabilistic methods, in which the main parameters are considered as random parameters.Alternatively, with respect to the different use of factors of safety, computational methods can be separated into:(1)Allowable stress method, in which the stresses computed under maximum loads are compared with the strength of the material reduced by given safety factors.(2)Limit states method, in which the structure may be proportioned on the basis of its maximum strength. This strength, as determined by rational analysis, shall not be less than that required to support a factored load equal to the sum of the factored live load and dead load ( ultimate state ).The stresses corresponding to working ( service ) conditions with unfactored live and dead loads are compared with prescribed values ( service limit state ) . From the four possible combinations of the first two and second two methods, we can obtain some useful computational methods. Generally, two combinations prevail:(1)deterministic methods, which make use of allowable stresses.(2)Probabilistic methods, which make use of limit states.The main advantage of probabilistic approaches is that, at least in theory, it is possible to scientifically take into account all random factors of safety, which are then combined to define the safety factor. probabilistic approaches depend upon :(1) Random distribution of strength of materials with respect to the conditions of fabrication and erection ( scatter of the values of mechanical properties through out the structure );(2) Uncertainty of the geometry of the cross-section sand of the structure ( faults andimperfections due to fabrication and erection of the structure );(3) Uncertainty of the predicted live loads and dead loads acting on the structure;(4)Uncertainty related to the approximation of the computational method used ( deviation of the actual stresses from computed stresses ).Furthermore, probabilistic theories mean that the allowable risk can be based on several factors, such as :(1) Importance of the construction and gravity of the damage by its failure;(2)Number of human lives which can be threatened by this failure;(3)Possibility and/or likelihood of repairing the structure;(4) Predicted life of the structure.All these factors are related to economic and social considerations such as:(1) Initial cost of the construction;(2) Amortization funds for the duration of the construction;(3) Cost of physical and material damage due to the failure of the construction;(4) Adverse impact on society;(5) Moral and psychological views.The definition of all these parameters, for a given safety factor, allows construction at the optimum cost. However, the difficulty of carrying out a complete probabilistic analysis has to be taken into account. For such an analysis the laws of the distribution of the live load and its induced stresses, of the scatter of mechanical properties of materials, and of the geometry of the cross-sections and the structure have to be known. Furthermore, it is difficult to interpret the interaction between the law of distribution of strength and that of stresses because both depend upon the nature of the material, on the cross-sections and upon the load acting on the structure. These practical difficulties can be overcome in two ways. The first is to apply different safety factors to the material and to the loads, without necessarily adopting the probabilistic criterion. The second is an approximate probabilistic method which introduces some simplifying assumptions ( semi-probabilistic methods ) .文献翻译建筑师必须从一种全局的角度出发去处理建筑设计中应该考虑到的实用活动,物质及象征性的需求。
要求1:完成外文文献及译文的参考样式

山东建筑大学毕业论文外文文献及译文
毕业论文要求1
1. 本次发给你四个文件:论文要求1,任务书,开题报告,论文的结构建议。
2. 阅读开题报告的文献综述一栏,然后阅读相关的书籍、著作、期刊文章或网络上查阅到的文章,主要阅读你的文章中的与你的论文主题相关的内容;
3. 在3月底以前完成“外文文献及译文”内容。
查找与你的论文题目有一定关
系的著作、期刊或网络文章上的英文内容,并将英文翻译成中文。
4. 请将英文原文与你的中文翻译部分按照下面给你的参考格式完成。
格式如后
面的第2页开始到最后。
其中文献、资料来源要注明是著作、网络、期刊等的哪一种,例如,参考的格式中注明的就是著作。
5. 注意参考格式中的页眉、页脚、题目字号、字体、正文内容字体、字号。
你
撰写的外文文献要与参考格式的要求一致。
6. 外文文献部分要求字数在5000字以上。
即中文翻译内容的字数要达到5页以
上,含表格、图样等。
7. 对照论文的结构建议,查阅相应的内容,开始构思论文。
8. 外文文献及译文完成后,及时发给老师电子版。
以便审校。
老师:徐宁,
2014年3月9号
- 1 -。
外文翻译及外文原文(参考格式)

外文翻译要求:1、外文资料与毕业设计(论文)选题密切相关,译文准确、质量好。
2、阅读2篇幅以上(10000字符左右)的外文资料,完成2篇不同文章的共2000汉字以上的英译汉翻译3、外文资料可以由指导教师提供,外文资料原则上应是外国作者。
严禁采用专业外语教材文章。
4、排序:“一篇中文译文、一篇外文原文、一篇中文译文、一篇外文原文”。
插图内文字及图名也译成中文。
5、标题与译文格式(字体、字号、行距、页边距等)与论文格式要求相同。
下页附:外文翻译与原文参考格式2英文翻译 (黑体、四号、顶格)外文原文出处:(译文前列出外文原文出处、作者、国籍,译文后附上外文原文)《ASHRAE Handbook —Refrigeration 》.CHAPTER3 .SYSTEM Practices for ammonia 3.1 System Selection 3.2 Equipment3.10 Reciprocating Compressors第3章 氨制冷系统的实施3.1 系统选择在选择一个氨制冷系统设计时,须要考虑一些设计决策要素,包括是否采用(1)单级压缩(2)带经济器的压缩(3)多级压缩(4)直接蒸发(5)满液式(6)液体再循环(7)载冷剂。
单级压缩系统基本的单级压缩系统由蒸发器、压缩机、冷凝器、储液器(假如用的话)和制冷剂控制装置(膨胀阀、浮球阀等)。
1997 ASHRAE 手册——“原理篇”中的第一章讨论了压缩制冷循环。
图1.壳管式经济器的布置外文翻译的标题与译文中的字体、字号、行距、页边距等与论文格式相同。
英文原文(黑体、四号、顶格)英文翻译2(黑体,四号,顶格)外文原文出处:(黑体,四号,顶格)P. Fanning. Nonlinear Models of Reinforced and Post-tensioned Concrete Beams. Lecturer, Department of Civil Engineering, University College Dublin. Received 16 Jul 2001.非线形模型钢筋和后张法预应力混凝土梁摘要:商业有限元软件一般包括混凝土在荷载做用下非线性反应的专用数值模型。
(完整版)本科_毕业设计(论文)外文翻译_格式

本科毕业设计(论文)外文翻译译文
学生姓名:李浩
院(系):机械工程学院
专业班级:装备1001
指导教师:李晓红
完成日期: 2014 年 3 月 10日
要求
1、外文翻译是毕业设计(论文)的主要内容之一,必须学生独立完
成。
2、外文翻译译文内容应与学生的专业或毕业设计(论文)内容相关,
不得少于15000印刷符号。
3.外文翻译译文用A4纸打印。
文章标题用3号宋体,章节标题用4
号宋体,正文用小4号宋体,20磅行距;页边距上、下、左、右均为2.5cm,
左侧装订,装订线0.5cm。
按中文翻译在上,外文原文在下的顺序装订。
4、年月日等的填写,用阿拉伯数字书写,要符合《关于出版物上数字用法的试行规定》,如“2005年2月26日”。
5、所有签名必须手写,不得打印。
文献名称(中文)
文献名称(外文)
作者: ***
起止页码:
出版日期(期刊号):
出版单位:(以上文字用小4号宋体,数字、字母用Times New Roman 体)
外文翻译译文:(小4号宋体)。
本科毕业设计外文文献及译文

本科毕业设计外文文献及译文文献、资料题目:Structural Design of ReinforcedConcrete Sloping Roof文献、资料来源:网络文献、资料发表(出版)日期:2007.1院(部):xxx专业:xxx班级:xxx姓名:xxx学号:2007011287指导教师:xxx翻译日期:xxx外文文献:Structural Design of Reinforced Concrete Sloping Roof Abstract: This paper point out common mistakes and problems in actual engineering design according immediately poured reinforced concrete sloping roof especially common residential structure.It brings out layout and design concept use folded plate and arch shell structure in order to reduction or elimination beam and column Layout to reduce costs and expand use function for user of garret . The paper also discussed the need to open the roof holes, windows, and with other design with complex forms . The corresponding simple approximate calculation method and the structure treatment also described in this paper.Keywords : sloping roof;folded plate; along plane load;vertical plane load1. IntroductionIn recent years, reinforced concrete slope of the roof has been very common seen, the correct method of it’s design need establish urgently It’s target is to abolish or reduce the roof beams and columns, to obtain big room and make the roof plate "clean ". This not only benefits tructure specialty itself but also to the design of the building professionals to develop new field, and ultimately to allow users, property developers benefited,and so it has far-reaching significance.In the common practice engineering practice, a designer in the calculation of the mechanical model often referred sloping roof as vertical sloping roof under the projection plane Beam, or take level ridge, ramps ridge contour as a framework and increase unnecessary beam and tilt column . In fact ,the stress is similar between General square planar housing, double slope, multi-slope roof and arch, shell.Ping and oblique ridge are folded plate like “A”, whether layout beams and columns, its ridge line of the deformation pattern is different from the framework fundamentally. All these method will make the difference between calculation results and real internal structure force. During the construction process, housing backbone, plate bias department template has complex shapes, multi-angle bars overlap, installation and casting is very difficult. These projects are common in construction and is a typical superfluous. Some scholars use the elastic shell theory to analyze folded plate roof、internal force and deformation, reveals the vertical loads law of surrounding the base is neither level rise nor the vertical displacement whichto some extent reflects the humps and shell’s features .But assume that boundary conditions which is very different from general engineering actual situation and covered the eaves of a vertical cross-settlement and bottom edge under the fundamental characteristics of rally, so it is not for general engineering design .2. Outlines of MethodsFor most frequently span, the way to cancel the backbone of housing, didn’t add axillary often. But in the periphery under the eaves to the framework need established grid-beam or beams over windows. For long rectangular planar multi-room, multi-column, building professionals in a horizontal layout of the partition wall between each pair of columns and the direction set deep into the same thickness width have possession of a gathering of the rafah beam profiles . Pull beam above has a two-slope roof plate affixed sloping beams expect smaller span. For residential, if it has no needs according construction professional, we will be able to achieve within the household no ceiling beams exposed, see figure 1. Similar lattice theory, this approach emphasizes the use of axial force component effect, But is different with the truss because it’s load distribution along the bar not only single but also along the axis of the plate. Generally each plate has force characteristics of folded plate, for bear gravity at the roof, wind, earthquake loads, caused the plate along with the internal force components, each plate is equivalent to strengthen the thin flange beams .Among vertical bearing , it is thin-walled beams anti-edge horizontal component to balance Wang thrust formed by arch shell effect. When plates bear the the vertical component load, each plate is equivalent to a solid edge embedded multilateral bearing plates .The design feature of this method is establish and perfect the sloping roof of the arch, folded plate system Consciously, at top of the roof, using a minimal level of rafah balance beam ramp at the level of thrust.It’s calculation methods can be divided into hand algorithm and computer paper, this paper focus on the hand algorithm.Hand algorithm take the single-slope plate of sloping roof plate as slider , through approximate overall analysis, Simplified boundary conditions of determine plate,solving load effect along level and vertical plane, Internal forces of various linear superposition under the condition of assumption of normal straight, testing stability and integrated reinforcement. The method pursuit of operational, use general engineer familiar calculation steps to address more complex issues.This method is suitable for the framework structure, little modifications also apply to masonry structure or Frame-wall structure. General arch structure have good anti-seismic performance, if designed properly, the sloping roof will also do so. In this paper the pseudo-static is used to analysis earthquake effects.3. Analysis and Design for Along Plane Effect of LoadsFirst regard to cross profile of figure 1,we analysis equal width rectangular parts of long trapezoidal panels 1、2. as for approximate calculation,it is take plane loads along plane as a constant just like four rectangular plate can be simplified to one-way slab,we take along to long unit width narrow structure as analysis object ,take hinged arch model shown in figure 2.图2a图3a图2b图3b图2c图3cIn Figure 2 the right supports vertical linkage representatives roof beams supporting role, ramps connecting rod on behalf of the board itself thin beam reaction effect which is virtual and approximate equivalent. We would like to calculate two anti-bearing.Because the total pressure of physical project through two plate roof beams and transfer to the ends column, So Anti two numerical difference can be seen as two plates bear along with the plane load and roof beams bear the vertical load pressure. Two Anti power link expressions in Various conditions were given as follows, because the model take units width,so the results is line averageload distribution except it has Focus quality in house.They are bouth represent by N , English leftover subscript s, b, represent the plane along the roof panels and vertical role in the roof beam, g, w, e,represent gravity, air pressure and the level of earthquake separately. d, c, represent distribution of concentrated load or effect separately, In the formula h is thicness of every plate,g is gravitation acceleration, a is roof for the horizontal seismic acceleration value formula, Wk represent the standard value Pressure.m with number footnotesrepresent every numbered ramp the quality distribution per unit area ,m with english footnotes represent quality of per location.as to two symmetrical slopes, the formula can be moreconcise.Figure 2a represent situation of vertical gravity load ,these formulas as follows:()()'''111100110cos cos 38cos cos cos cos L AL L m L AL N l h l h l m ωαβμααββ-=++ ()()()()'10000000101'100000cos cos 2cos cos 8sin cos 8sin cos cos 8sin cos cos cos l l l l l h m m s h N l l h h l h l μαβωααηαβωμβββαββααβ++-=--++ ()()()()101101110100001012111cos 2cos cos 2L L L L L L L m LL L L mLL L L L L L N h B hL hL LIμξβαβ⎡⎤⎛⎫⎛⎫⎛⎫--+-+--+⎢⎥ ⎪ ⎪ ⎪⎝⎭⎝⎭⎝⎭⎣⎦=++()()()()()001001110011200101021000110111121cos sin 2sin 2sin cos cos A L h L m LL L L mL L m a L L L L h h L m l m N L L L Ah L L k B h L h L δδββββαβ⎛⎫⎛⎫⎡⎤⎛⎫-+-+--+ ⎪ ⎪ ⎪⎢⎥+⎝⎭⎝⎭⎝⎭⎣⎦=+---++Figure 2b represent situation of bear wind load, these formulas as follows:()()222211122111cos cos cos 8cos cos cos cos wkL h L L S li N a L h h b ωαωββαβα-=++ ()()()()22222001111222212110cos cos cos 11cos cos cos cos sin 5cos sin cos cos sin cos k K L h l w L w w h w h m L N l l AL h L a h L αωαβαβλαβααββββαββ⎡⎤-⎡⎤+⎢⎥=+++-+⎢⎥++⎢⎥⎣⎦⎣⎦Figure 2c represent situation of role of level earthquake, these formulas as follows:()()2222210011022001sin cos sin cos 3sin cos cos cos cos cos a a L h l L L N L h l hl αμβαωαβωβδαβαβδβ+=--+ ()()()()222221011120322222102101sin cos sin cos sin sin sin 3cos 2ln cos 5ln cos cos cos cos a l h m l m L m m m N n s l l l g h l h l δβααβαββββαβαβαβ++=++++ ()()()0010011012110121000111sin cos 2cos 2cos cos cos a a L L m L L L n L L L L L nh L N L l h l h l ββαβαβ⎡⎤⎛⎫⎛⎫-+-+⎢⎥ ⎪ ⎪⎝⎭⎝⎭⎢⎥=+⎢⎥+⎢⎥⎢⎥⎣⎦ ()00000201sin 2cos a a L m L L L h L l θβα⎡⎤⎛⎫-+-⎢⎥ ⎪⎝⎭⎣⎦+()()()2000010121001sin sin cos sin cos sin cos cos 2sin cos a e L m L L L h L m m N l l h βααβαββαβββ⎡⎤⎛⎫-+-⎢⎥ ⎪+⎝⎭⎣⎦=-+()()()001001001221111221001sin 1sin cos 2cos 2cos cos cos sin a a L L L L L L m L L L L L h L h l L h l h ωαββαβαββ⎡⎤⎛⎫⎛⎫-+-+⎢⎥ ⎪ ⎪⎝⎭⎝⎭⎢⎥-+⎢⎥+⎢⎥⎢⎥⎣⎦ When vertical seismic calculation required by Seismic Design ParametersIt’s calculate formula generally similar as formula 1 to 4 which only need take gravity g as vertical seismic acceleration a. Above formulas apply to right bearings in figure 2 and also to left when exchange data of two plate.As end triangle of Multi-slope roof ,for simplify and approximate calculation need, we assume two lines distribution load only produced by roof board of several load, effect.now II-II cross-section from figure is took to analysis Long trapezoidal plate two’s end triangle, assuming the structure symmetry approximately, take half of structure to establish model (figure 3). Because linked with the end triangular plate-3 plane has great lateral stiffness ,therefore assume the model leftist stronghold along the central component around which can not be shifted direction. Central Plate vertical stiffness small, in general gravity load of roughly symmetric midpoint only next movement happened possible, Therefore, the model used parallel two-link connection. Wind loading, and the general role of the earthquake in two slope was roughly antisymmetric,so plate model in the central use fixed hinge bearings which allow rotation and transtlateral force to plate 3near the plate beam. Under plate two triangular area is eaves of vertical beams and plates itself along with plane load distribution is functionshown in Figure 1 take the variable x as an argument,assume the distance from position of section II to end part is x 0s so the slope level length is y 0=x 0L 2/L 3,formula 11 to 14 is the value of Vertical triangle of gravity along the x direction arbitrary location of the two load distribution ,where h 3 is Slitting vertical thickness of plate 3.()22001cos 212cos e a a mkxL h x N L sh v l x ββ⎡⎤=-⎢⎥+-⎢⎥⎣⎦ ()211121001sin cos 212cos m kvL h x N l xh x L V βββ⎡⎤=+⎢⎥+-⎢⎥⎣⎦()22000002221100max 1123cos L La h L L L L N VL h h l a V L L αγβ⎡⎤⎛⎫=---⎢⎥ ⎪+-⎢⎥⎝⎭⎣⎦ ()22201000112222201001ln 23cos a L L h l L L L n V s xl h v h L x x l L ββ⎡⎤⎛⎫=+-⎢⎥ ⎪+-⎢⎥⎝⎭⎣⎦As wind load and earthquake effect, sketch could use approximate figure 3b 、3c and use method of structural mechanics to solve But the process is cumbersome and reasonable extent is limited .the wind and earthquake effect is not important compare with the load effect. Moreover, the triangle area is small As approximate calculation, such direct-use rectangular plate slope calculation is more convenient and not obvious waste. The method of solve two load distribution of plate three is same as the solution of Long trapezoidal plate area just make the change of x and y 、L 2 and L 3 in figure 1.The actual profile is part III-III shown in figure 1 A BC 图4a 图4b BDFigure 4 is vertical launch plan and bear load portfolio value of roof ramp shown in Figure 1 to analysis inclined plate and the internal forces of the anti-bearing column . in the figure hypotenuse is oblique roof equal to strengthen frame, Similar wind ramp truss rod and the next edge portfolio, could form the dark truss system ,while long rectangular plate can be seen as part of thin-walled beams, which could also be seen as truss. Therefore, we called roof boarding the plane formed a "thin-walled beam-truss" system, in concrete theory, between the truss and the beam have no natural divide . it’s no need h and count accurate internal forces and bearing force to such a joint system, Because on the one hand span more, big bending stiffness structure sensitive to the bearing uneven subsidence and have to stay safe reserves; on the other hand it has high cross-section, by increasing reinforced to increase capacity on the cost impact is not significant. Specific algorithm is: Single-ramp calculate by simple cradle, Multi-Span ramp’s bending moment, shear, and supporting anti-edge use the calculate value by the possiblemaximum numerical control methods, Moment is calculate by simple cradle two sides of supports middle Shear, negative moment and support force calculate according to bearing this continuous, two-hinged, about two span take the largest one. Pin-Pin bearing shear force that is supported by the inter-simple calculate according to simple cradle. But in this method the location of the various internal force’s safety level is uneven expansion, appropriate adjustment should be made is late calculation. No mater f the triangular or rectangular part of plate, Thin-plane bending rebar can get by method of moment right boards from the bottom point for the moment distance which assigned to the eaves or roof. The author believe it has no necessary control number of reinforcement according to smallest beams reinforced rate. On the rim of triangle equivalent to ramp strut can shear entirety. when consider the end is weak can properly reinforced its roof beam below the reinforcement. If shear required stirrup in the rectangular part of thin-walled, should superposition to the beam, generally it’s no need to intentionally imaginary abdominal strengthening reinforcement at rod position.4. Calculation and Design of Pull Beam and Roof BeamsBy column in figure 1 marked calculated value of supporting force and their level of vertical component, horizontal component of the total force multiplied by the cosine of angle. Take column A as example, the first footnotes in R A2 is column number, the first footnotes represent the force generated by the panel two. Their horizontal component balanced by triangle three under the eaves of beams. horizontal component of intermediate support reaction is balanced by the two-level pull beam in deep direction. Then pull beam and above the sloping beams constitutes steel Arch. Because of the existence of antisymmetric load, bilateral role in the anti-power-level components may be inconsistent and pull beam should take the average lag. consider the support impact of uneven settlement, the level pull beam design should take bigger value.Roof beams general under four internal forces: First of the above is levels Rally, The second is axial force generated when oblique roofing in the flange plate plane bending. The third is the vertical load to bear as the roof slab edge beams under bending moment, shear ,like board supported by multi-faceted, Actual force is smaller than bear calculated by one-way plate N b,Fourth is the effect of lateral framework of internal forces .it should linear superposition ,Composite Reinforced, in the situation of weight Load, span and the small dip,checking computations should be took for tension beams cracking, appropriate intensify the section, with fine steel, including the side beams of steel beams rafah terminal should take two meander anchorage,just like letter L With ng as 10d long bends, meander 135 degrees angle and put pull beam intersection with the vertical reinforcement column touting the Meander overcast horn.This paper take model in figure 1 as example, ignore tigers window , 4 sloping roof are 35 o angle, the length of roof slab dimensions are shown in figure 4. Plate unit area quality is 350 kg/m2,Overhaul live load is 0.50 kN/m2, Pressure standard of windward side is 0.21 kN/m2, Leeward face is -0.45 kN/m2, Design value of roof horizontal seismic acceleration is 0.1g, Calculate the bearing capacity limit by standardizing, Considered separately with and without seismic load effect of the combination basic design value,we use combination of without earthquake force through compare,Load calculation and analysis results of every position shown in table 1:Roof triangular plate3 the long trapezoidal plate2D~A B=800m A~B L=11.00m B B~C L=12.00mSymbol Units Formula D Span A FormulaA SpanB B Span CSurface load Seismic loadwithoutpermanentstandardN kN/m (11) 0-18.62 18.6218.62-0 (2) 0-18.62 18.6218.6218.6218.62 18.62-0No seismic loadstandard oflivingN kN/m (11) 0-2.66 2.66 2.66-0 (2) 0-2.66 2.66 2.66 2.66 2.66 2.66-0Seismic gravityload arepresentativeN kN/m (11) 0-19.95 19.9519.95-0 (2) 0-19.95 19.9519.9519.9519.95 19.95-0valueWind Load N kN/m (6) Parallel with the wind at theplate(6) 0-0.76 0.76 0.76 0.76 0.76 0.76-0Earthquake level role N kN/m (8) Earthquake direction parallelwith the board and notconsidered(8) 0-2.09 2.09 2.09 2.09 2.09 2.09-0Momen t Moment designvalueM kN﹒m 151.36429.25-510.84-510.84510.84Axial force N kN 34.4497.67116.24116.24116.24Shear V kN 56.76 56.76 156.09 212.85212.85170.28Anti vertical edge R kN 56.76 56.76 156.09 212.85425.70212.85170.28Anti level of R kN 46.50 46.50 127.86 174.35 348.71174.35139.49Vertical and horizontal beams pull beam Rally kN A~B 46.50 A~D 127.86 348.71Column C and beamdirection betweencolumns139.495. Analysis and Design for Roof of the Vertical Loads Under Sloping RoofSlabs as a Multilateral Support PlateFolded plate structure has character of “unified of borad and frame”: General intersection of each pair of ramps are for mutual support, both sides of the transition line’ plate can be counted dogleg small rotation and transmission, distribution Moment.Under load control which is the role of gravity the two sloping geometry load roughly symmetrical occasions, there is no corner at symmetry capital turning point, Approximate seen as the plate embedded solid edge.if take out a distance by plate of eaves, plate of inside ridge also formation to negative moment,and longroof slabs in the plate sloping beams department and neighbor plate linked together, these all can be approximated as embedded-plate edge to process.For antisymmetric load like horizontal seismic load,the Ping roof should be treated as shear,but it is not control load usually. Plate final design moment value is the status of various unfavorable combination of linear superposition, from the cross-sectional direction plate reinforced by the columns, Reference, balance the require of concrete deep beams of tectonic, upper plate for Moment of negative reinforcement should be reinforced at all or an entire cross-leader, as they also serve as a deep beam distribution lumbar tendons or stirrup. plate in the bottom vertical with reinforcement eaves, Negative reinforcement in accordance with their respective calcualte requirements,and it is different after superposition stirrups requirementBoth sides of "stirrup" in this situation cann’t linked at awnings edge follow shape “U”, can be bent to shape "L" follow upper and down direction,legnth of packs could equal to thickness of plate.It should enhenced at the node of ramp at the intersection appropriately. It recommended that use swagger tectonic shown as in Figure 5 considing simple structure without axillary at the situation of Cloudy angle without pull. To ensure all reinforced Installing accuracy, Few of the rhombus with the supports and rebar stirrups could be added to formed positioning Skeleton at strengthening reinforced department in the figure, Let two later installed sloping steel plate tie to its lashing,designers should use a three-dimensional geometric method to accurately calculate the diamond stirrups limb edge length and Forming a swagger construction plans6. Calculating and processing of open window and hole in sloping roof Assume the plate in figure 6 has a big hole whose wideth is b ,height is h0 ,assuming that tung center along with the plane bending moment, shear, respectively are M and V through overall calculation, use vierendeel calculation method get about middle cave:1XO MM T τ= 2NR MM T τ=3113312h V V h h =+ 0X O N R M M M V h --= Where I 1、I 2 、I respectively represent upper and down plate limb’s Section moment of inertia anddouble limbs section moment of inertia.while Edge Moment by hole is:1113I M V b M α=+ 2212I M V b M μ=+ not very big by the hole, close to the neutral axis in most cases overall, under the no-hole designof the reinforced the opening hole after the plane can meet the demands by calculation,under theno-hole design of the reinforced the opening hole after the plane can meet the demands bycalculation.General tiger window’s form prominent roof Facade which a hole had opened up and the otherfaces a concrete slab closed.when analysis of vertical slab roof slab surface loads ,compare withwithout windows and roof slabs hole window sheet increased load. profiles of window’s foldedplate form make it reduce the bending stiffness compare with without hole roof board, But withthe profile hole edge which parallel to the vertical plate is a partial increase in bending stiffness.In the absence of the vertical plate window subordinate legislation should have upturns beam toincrease stiffness of the surrounding caves near.in this way i can temporarily ignore the platestiffness variation acording to the actual load, size and boundary conditions by entities plate tocalculate psitive and negative moment and further processing nodes.it should point out thattheRoof ramp layout hole edge ideal location is near the plate-bending line, especially in theopen side of the window because it was cut down byvertical transmission line of the moment. If the roof slab roof beams department no outward roofthen the actual plate-bending force on the line near the roof beam reversed also true, Because ofthis architects should strive for when determine oosition of tiger position take appropriatecare.When pin tung far away from line-bending window wall and roofing in the intersection mustbear folded plate and transmission moment, but compare with plate without hole its capacity isweaken surely,and it’s node turn into weak parts. To fill thy judgment and calculation errorstwo panels can be double reinforcement. When the hole is less than line-bending scope shouldincrease negative reinforcement around to keep overall security plate bearing capacity. To ensuresteel plate in place accuratly,also should use positioning stirrups and longitudinal reinforcement constitute skeleton similar as figure 5. Hoop end within vertical bars should be strengthen steel and end cave corner should be harvested more than one anchor length to make sure that bottom of the cave 4 tensile stress concentration.7. Stabilize Roof SlopeIn China's V-shaped folded plate structure design norms,the method prevent both sides of the flanges at local instability is limit its generous ratio,This requirement come from the use of isotropic plate buckling theory analysis. In research the flanges outside instability in critical state, the boundary conditions of winglets suppose as freedom outside, fixed interior, pre - and post-hinged on both sides,the situation plates subjected to the bending stress to solve width and height ratio corresponding with the critical pressure compressive stress. When the grade of concreteIs C30,the limit of width and height(b/t)ratio is 47, take 35 as stress non-normative value. Concrete elastic modulus and strength levels is not a linear relationship if use high-strength concrete other study should be taken. In the actual slope roof only a long row to the middle plate bearing plate outside may receive pressure. And here is just the pouringplate affixed roof sloping beams and horizontal pull beam cast together.Have no possible of rollover and foreign rising displacement. norms limited of folded plate span is 21m. roof below and the vertical column spacing generally much smaller it. And the board which into one with roof beams changed boundary conditions of plate, anti-great instability role also very big. For other locations ramp vertical compression edge May also set up the appropriate plate edge beams all these method will receive beyond the norms of redundant safety. Taking into account the plate shear plane, while the vertical direction of the load caused the exit plane effects, Therefore, the grasp of security of caution should cautious. This paper proposed ramp thickness not less than to the short span of 1 / 35 which also conform to design experience of generally confined SLABS, Concrete should graded between C25 and C35 while Steel should I or class II.puter Calculation Method of Local Sloping Roof Structure andOverall ICC of Overall StructureAny calculate software with inclined plate shell modules and the modules bar structural finite element can calculation of competent sloping roof. Shell element of each node have 3 membrane freedom and three panels freedom and can analysis the plane board and internal forces Of out-of-plane effects. However, the current prevalence of certain spatial structure finite element computer program which although have shell model but some are not inclined plate, some not right at the same plane, the stress state and foreign integrated reinforcement are not perfect. With structures becoming more diverse, complex and ramp space problems often encountered. Such software should expand its pre - and post-processing functions for conversion of shell element stiffness matrix and loading vector in the direction of freedom and further analysis of ramp space, the space of concrete against stress integrated reinforcement. In a fundamental sense manual method and the finite element method are interchangeable but the result may be very different. As long as layout roof component as this concept,then use the software to calculate can fast, precise, to achieve this goal of this paper.From the eaves to the roof elevation areas, the whole roof of anti-lateral stiffness lower than mutation, quality small than lower,this could not easy to simulate in calculation of whole housing. At the top construction of the seismic as higher-mode response which is also whiplash effect, the earthquake-lateral force may be abnormal and have effect on under layers. Therefore, in the partial hand count roof occasions when take ICC analysis to the overall structure, it proposed roof layer use model of tilt rod ramp support to reduce effect on the overall results distortion.If use software with function of space ramp handling and sloping roof modeling with shell element,all will be wrapped from top to bottom. Top results can be directly used and the distortion of the overall impact would cease to exist.10. Conclusion1)Concrete ramps, side beams in different directions superposition of internal forces, reinforced and ramp stability, the hole limits all to be do in-depth study related this research. Similar typical problems are top floor of structural transformation layer and box-type base box side wall all their research results can be used to adopt.It’s a important method do observation on project; finite element analysis ICC will be more economical, practical and popular. Currently existing completed sloping roof no matter the subjective designers use what kind of assumptions。
外文文献翻译封面格式及要求(模版)

毕业论文外文文献翻译院年级专业:2009级XXXXXXXXXXX 姓 名:学 号:附 件:备注:(注意:备注页这一整页的内容都不需要打印,看懂了即可)1.从所引用的与毕业设计(论文)内容相近的外文文献中选择一篇或一部分进行翻译(不少于3000实词);2.外文文献翻译的装订分两部分,第一部分为外文文献;第二部分为该外文文献的中文翻译,两部分之间用分页符隔开。
也就是说,第一外文文献部分结束后,使用分页符,另起一页开始翻译。
3.格式方面,外文文献的格式,除了字体统一使用Times new roman 之外,其他所有都跟中文论文的格式一样。
中文翻译的格式,跟中文论文的格式一样。
(注意:备注页这一整页的内容都不需要打印,看懂了即可,定稿后,请删除本页.)范文如下:注意,下面内容每一部份均已用分页符分开了,如果用本模板,请将每一模块单独删除,直接套用到每一模板里面,不要将全部内容一次性删除.【Abstract】This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based onthe theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.,Times New Roman.【Key Words】Brand positioning; Marketing mix; Positioning Strategy; enlightenment, lessons;ABC(本页为英文文献摘要,关键词两项一起单独一页,字体为:Times New Roman,小四号,1.5倍行距)(注:以下为英文文献正文内容,英文全文3000字.具体标题以原文为准.全文字体为Times New Roman.行间距为1.5倍.字号大小与论文正文的各级标题一致.如下:)I.Times New Roman ,Times New Roman,Times New RomanTimes New Roman, Times New Roman, Times New Roman, Times New Roman,This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons fromthe failure of the WONG LO KAT.II.Times New Roman ,Times New Roman,Times New RomanTimes New Roman, Times New Roman, Times New Roman, Times New Roman,This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.III.Times New Roman ,Times New Roman,Times New RomanTimes New Roman, Times New Roman, Times New Roman, Times New Roman,This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.This paper has a systematic analysis on outside Marco-environment of herbal teabeverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.This paper has a systematic analysis on outside Marco-environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market. Based on the theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market. the process of brand positioning of it in Consumers brain was finished. Based on this positioning strategy, WONG LO KAT reasonably organized and arranged its product strategy, price strategy, distribution strategy and promotion strategy, which not only served for and further consolidated the position of preventing excessive internal heat in body, but also elevated the value of brand. The JDB and WONG LO KAT market competition brings us enlightenment. Reference the successful experience from the JDB and lessons from the failure of the WONG LO KAT.【摘要】本文是对凉茶饮料的宏观环境以及凉茶市场内部主要品牌的竞争对手进行了系统分析。
外文文献翻译封皮

(二 〇 一 二 年 六 月封面本科毕业设计外文文献翻译 学校代码: 10128 学 号: ************ 题 目:家用燃气泄漏报警装置的设计 学生姓名: 学院:机械学院 系 别:测控系 专 业: 班 级: 指导教师:山东建筑大学2009级工程造价专业毕业设计任务书题目:山东省职业技术学院办公楼工程项目商务标书设计期限:自2011年7月至2011年10月班级:0720913141学生姓名:学号:指导教师(签字):任成友庄春华山东建筑大学毕业设计任务书班级学生姓名指导教师张琳设计题目山东省职业技术学院办公楼工程项目商务标书设计原始参数1、工程概况山东省职业技术学院办公楼项目概况:(1)建设单位:建达房地产开发有限公司2)本工程为办公楼,具体位置详见规划总平面图3)本工程总建筑面积5195.74平方米4)本工程五层,一层层高4.2m,二-四层高3.9m,五层层高4.2m,建筑高度29.74m,室内外高差0.60m。
5)本工程结构形式:框架结构,抗震设防烈度:6度6)本工程建筑等级:三级;耐火等级:为二级。
7)本工程设计使用年限:3类(合理使用50年)8)屋面防水等级:二级2、工程特点本工程为重点工程,业主要求尽量采用施工新技术并要求必须按合同工期完工。
施工现场狭小,应考虑合理利用现场空间。
3、资金筹措条件(1)工程合同价C=工程报价;(2)开工前业主拨付工程备料款A=20% C;(3)工程进度款,每月末按形象进度延迟一个月拨付;(4)不足部分通过银行贷款补足,贷款利率=12%(单利);(5)不考虑保修金的留设。
(6)现场条件:已实现三通一平.(7)工程量清单(8)施工图(另附)设计工作内容1、撰写招标文件,编制工程量清单以施工图纸为依据,根据国家标准《建设工程工程量清单计价规范》、及山东省现行消耗量定额进行编制。
鼓励学生在完成手工预算的全部工作的基础上,另用工程造价编制软件对手算的结果进行校审复核。
山东建筑大学毕业设计(或毕业论文,二选一)外文文献及译文附件3

附件3:(本科毕业论文)文献、资料题目:院 (部)专 班 姓 名: 张三学 号: 2001888888指导教师: 张九光翻译日期: 2005.6.30山东建筑大学毕业设计(或毕业论文,二选一)外文文献及译文three years ,the National Institute of Standards and Technology (NIST) has been working to develop a new encryption standard to keep government information secure .The organization is in the final stages of an open process of selecting one or more algorithms ,or data-scrambling formulas ,for the new Advanced Encryption Standard (AES) and plans to make adecision by late summer or early fall .The standard is slated to go into effect next year .AES is intended to be a stronger ,more efficient successor to Triple Data Encryption Standard (3DES),which replaced the aging DES ,which was cracked in less than three days in July 1998.“Until we have the AES ,3DES will still offer protection for years to come .So there is no need to immediately switch over ,”says Edward Roback , acting chief of the computer security division at NIST and chairman of the AES selection committee .“What AES will offer is a more efficient algorithm .It will be a federal standard ,but it will be widely implemented in the IT community .”According to Roback ,efficiency of the proposed algorithms is measured by how fast they can encrypt and decrypt information ,how fast they can present an encryption key and how much information they can encrypt .The AES review committee is also looking at how much space the algorithm takes up on a chip and how much memory it requires .Roback says the selection of a more efficient AES will also result in cost savings and better use of resources .“DES was designed for hardware implementations ,and we are now living in a world of much more efficient software ,and we have learned an awful lot about the design of algorithms ,”says Roback .“When you start multiplying this with the billions of impl ementations done daily ,the saving on overhead on the networks will be enormous .”……山东建筑大学毕业设计(或毕业论文,二选一)外文文献及译文- 2 -以确保政府的信息安全。
山东建筑大学本科毕业设计说明书格式模板1.doc

山东建筑大学本科毕业设计说明书格式模板1附件2:本科毕业设计说明书(本科毕业论文)题目:空腹桁架钢框架结构受力性能分析及试验研究院(部)专业:班级:土木013姓名:张三学号:指导教师:张九光完成日期:2005年6月30日·1 前1.1 (1)1.2 ...................3 1.3 2 空腹桁架钢框架有限元建模及验证2.1 引言...................................2.2 弹塑性分析方法简介.....................2.3 ANSYS 在空腹桁架钢框架弹塑性分析中的应用. (18)2.4 ANSYS 分析模型正确性检验(20)2.4.1 ANSYS 分析模型概述(21)2.4.1.1 ANSYS (21)2.5 小结·························21 33.1 引言(23)3.2 空腹桁架钢框架与普通钢框架力学性能对比............3.3 影响空腹桁架钢框架力学性能的因素..................4 空腹桁架钢框架极限承载力试验研究4.1 试验目的..........................................4.2 模型设计依据(32)4.3 试验概况(35)4.4 试验过程描述(38)4.5 试验结果·························山东建筑大学毕业论文(或毕业设计说明书,二选一)4.6 小结(55)5 结论(56)谢辞(57)参考文献(58)附录(59)I摘空腹桁架钢框架是在钢框架的基础上,通过取消框架中间的柱子来增大结构的使用空间,同时为了不增大各个构件的截面尺寸,在框架的隔层增设腹板柱形成空腹桁架与钢框架组合的结构体系。
本科毕业设计外文文献及译文1

本科毕业设计外文文献及译文文献、资料题目:Transit Route Network Design Problem:Review文献、资料来源:网络文献、资料发表(出版)日期:2007.1院(部):xxx专业:xxx班级:xxx姓名:xxx学号:xxx指导教师:xxx翻译日期:xxx外文文献:Transit Route Network Design Problem:Review Abstract:Efficient design of public transportation networks has attracted much interest in the transport literature and practice,with manymodels and approaches for formulating the associated transit route network design problem _TRNDP_having been developed.The presentpaper systematically presents and reviews research on the TRNDP based on the three distinctive parts of the TRNDP setup:designobjectives,operating environment parameters and solution approach.IntroductionPublic transportation is largely considered as a viable option for sustainable transportation in urban areas,offering advantages such as mobility enhancement,traffic congestion and air pollution reduction,and energy conservation while still preserving social equity considerations. Nevertheless,in the past decades,factors such as socioeconomic growth,the need for personalized mobility,the increase in private vehicle ownership and urban sprawl have led to a shift towards private vehicles and a decrease in public transportation’s share in daily commuting (Sinha2003;TRB2001;EMTA2004;ECMT2002;Pucher et al.2007).Efforts for encouraging public transportation use focuses on improving provided services such as line capacity,service frequency,coverage,reliability,comfort and service quality which are among the most important parameters for an efficient public transportation system(Sinha2003;Vuchic2004.) In this context,planning and designing a cost and service efficientpublic transportation network is necessary for improving its competitiveness and market share. The problem that formally describes the design of such a public transportation network is referred to as the transit route network design problem(TRNDP);it focuses on the optimization of a number of objectives representing the efficiency of public transportation networks under operational and resource constraints such as the number and length of public transportation routes, allowable service frequencies,and number of available buses(Chakroborty2003;Fan and Machemehl2006a,b).The practical importance of designing public transportation networks has attractedconsiderable interest in the research community which has developed a variety of approaches and modelsfor the TRNDP including different levels of design detail and complexity as well as interesting algorithmic innovations.In thispaper we offer a structured review of approaches for the TRNDP;researchers will obtain a basis for evaluating existing research and identifying future research paths for further improving TRNDP models.Moreover,practitioners will acquire a detailed presentation of both the process and potential tools for automating the design of public transportation networks,their characteristics,capabilities,and strengths.Design of Public Transportation NetworksNetwork design is an important part of the public transportation operational planning process_Ceder2001_.It includes the design of route layouts and the determination of associated operational characteristics such as frequencies,rolling stock types,and so on As noted by Ceder and Wilson_1986_,network design elements are part of the overall operational planning process for public transportation networks;the process includes five steps:_1_design of routes;_2_ setting frequencies;_3_developing timetables;_4_scheduling buses;and_5_scheduling drivers. Route layout design is guided by passenger flows:routes are established to provide direct or indirect connection between locations and areas that generate and attract demand for transit travel, such as residential and activity related centers_Levinson1992_.For example,passenger flows between a central business district_CBD_and suburbs dictate the design of radial routes while demand for trips between different neighborhoods may lead to the selection of a circular route connecting them.Anticipated service coverage,transfers,desirable route shapes,and available resources usually determine the structure of the route network.Route shapes areusually constrained by their length and directness_route directness implies that route shapes are as straight as possible between connected points_,the usage of given roads,and the overlapping with other transit routes.The desirable outcome is a set of routesconnecting locations within a service area,conforming to given design criteria.For each route, frequencies and bus types are the operational characteristics typically determined through design. Calculations are based on expected passenger volumes along routes that are estimated empirically or by applying transit assignmenttechniques,under frequency requirement constraints_minimum and maximum allowedfrequencies guaranteeing safety and tolerable waiting times,respectively_,desired load factors, fleet size,and availability.These steps as well as the overall design.process have been largely based upon practical guidelines,the expert judgment of transit planners,and operators experience_Baaj and Mahmassani1991_.Two handbooks by Black _1995_and Vuchic_2004_outline frameworks to be followed by planners when designing a public transportation network that include:_1_establishing the objectives for the network;_2_ defining the operational environment of the network_road structure,demand patterns,and characteristics_;_3_developing;and_4_evaluating alternative public transportation networks.Despite the extensive use of practical guidelines and experience for designing transit networks,researchers have argued that empirical rules may not be sufficient for designing an efficient transit network and improvements may lead to better quality and more efficient services. For example,Fan and Machemehl_2004_noted that researchers and practitioners have been realizing that systematic and integrated approaches are essential for designing economically and operationally efficient transit networks.A systematic design process implies clear and consistent steps and associated techniques for designing a public transportation network,which is the scope of the TRNDP.TRNDP:OverviewResearch has extensively examined the TRNDP since the late1960s.In1979,Newell discussed previous research on the optimal design of bus routes and Hasselström_1981_ analyzed relevant studies and identified the major features of the TRNDP as demand characteristics,objective functions,constraints,passengerbehavior,solution techniques,and computational time for solving the problem.An extensive review of existing work on transit network design was provided by Chua_1984_who reported five types of transit system planning:_1_manual;_2_marketanalysis;_3_systems analysis;_4_systems analysis with interactive graphics;and_5_ mathematical optimization approach.Axhausemm and Smith_1984_analyzed existing heuristic algorithms for formulating the TRNDP in Europe,tested them,anddiscussed their potential implementation in the United States.Ceder and Wilson_1986_reportedprior work on the TRNDP and distinguished studies into those that deal with idealized networks and to those that focus on actual routes,suggesting that the main features of the TRNDP include demand characteristics,objectivesand constraints,and solution methods.At the same period,Van Nes et al._1988_grouped TRNDP models into six categories:_1_ analytical models for relating parameters of the public transportation system;_2_models determining the links to be used for public transportation route construction;_3_models determining routes only;_4_models assigning frequencies to a set of routes;_5_two-stage models for constructing routes and then assigning frequencies;and_6_models for simultaneously determining routes and frequencies.Spacovic et al._1994_and Spacovic and Schonfeld_1994_proposed a matrix organization and classified each study according to design parameters examined,objectives anticipated,network geometry,and demand characteristics. Ceder and Israeli_1997_suggested broad categorizations for TRNDP models into passenger flow simulation and mathematical programming models.Russo_1998_adopted the same categorization and noted that mathematical programming models guarantee optimal transit network design but sacrifice the level of detail in passenger representation and design parameters, while simulation models address passenger behavior but use heuristic procedures obtaining a TRNDP solution.Ceder_2001_enhanced his earlier categorization by classifying TRNDP models into simulation,ideal network,and mathematical programming models.Finally,in a recent series of studies,Fan and Machemehl_2004,2006a,b_divided TRNDP approaches into practical approaches,analytical optimization models for idealized conditions,and metaheuristic procedures for practical problems.The TRNDP is an optimization problem where objectives are defined,its constraints are determined,and a methodology is selected and validated for obtaining an optimal solution.The TRNDP is described by the objectives of the public transportation network service to be achieved, the operational characteristics and environment under which the network will operate,and the methodological approach for obtaining the optimal network design.Based on this description of the TRNDP,we propose a three-layer structure for organizing TRNDP approaches_Objectives, Parameters,and Methodology_.Each layer includes one or more items that characterize each study.The“Objectives”layer incorporates the goals set when designing a public transportation system such as the minimization of the costs of the system or the maximization of the quality of services provided.The“Parameters”layer describes the operating environment and includes both the design variables expected to be derived for the transit network_route layouts,frequencies_as well as environmental and operational parameters affecting and constraining that network_for example,allowable frequencies,desired load factors,fleet availability,demand characteristics and patterns,and so on_.Finally,the“Methodology”layer covers the logical–mathematical framework and algorithmic tools necessary to formulate and solve the TRNDP.The proposed structure follows the basic concepts toward setting up a TRNDP:deciding upon the objectives, selecting the transit network items and characteristics to be designed,setting the necessary constraints for the operating environment,and formulating and solving the problem. TRNDP:ObjectivesPublic transportation serves a very important social role while attempting to do this at the lowest possible operating cost.Objectives for designing daily operations of a public transportation system should encompass both angles.The literature suggests that most studies actually focus on both the service and economic efficiency when designing such a system. Practical goals for the TRNDP can be briefly summarized as follows_Fielding1987;van Oudheudsen et al.1987;Black1995_:_1_user benefit maximization;_2_operator cost minimization;_3_total welfare maximization;_4_capacity maximization;_5_energy conservation—protection of the environment;and_6_individual parameter optimization.Mandl_1980_indicated that public transportation systems have different objectives to meet. He commented,“even a single objective problem is difficult to attack”_p.401_.Often,these objectives are controversial since cutbacks in operating costs may require reductions in the quality of services.Van Nes and Bovy_2000_pointed out that selected objectives influence the attractiveness and performance of a public transportation network.According to Ceder and Wilson_1986_,minimization of generalized cost or time or maximization of consumer surplus were the most common objectives selected when developing transit network design models. Berechman_1993_agreed that maximization of total welfare is the most suitable objective for designing a public transportation system while Van Nes and Bovy_2000_argued that the minimization of total user and system costs seem the most suit able and less complicatedobjective_compared to total welfare_,while profit maximization leads to nonattractive public transportation networks.As can be seen in Table1,most studies seek to optimize total welfare,which incorporates benefits to the user and to the er benefits may include travel,access and waiting cost minimization,minimization of transfers,and maximization of coverage,while benefits for the system are maximum utilization and quality of service,minimization of operating costs, maximization of profits,and minimization of the fleet size used.Most commonly,total welfare is represented by the minimization of user and system costs.Some studies address specific objectives from the user,theoperator,or the environmental perspective.Passenger convenience,the number of transfers, profit and capacity maximization,travel time minimization,and fuel consumption minimization are such objectives.These studies either attempt to simplify the complex objective functions needed to setup the TRNDP_Newell1979;Baaj and Mahmassani1991;Chakroborty and Dwivedi2002_,or investigate specific aspects of the problem,such as objectives_Delle Site and Fillipi2001_,and the solution methodology_Zhao and Zeng2006;Yu and Yang2006_.Total welfare is,in a sense,a compromise between objectives.Moreover,as reported by some researchers such as Baaj and Mahmassani_1991_,Bielli et al._2002_,Chackroborty and Dwivedi_2002_,and Chakroborty_2003_,transit network design is inherently a multiobjective problem.Multiobjective models for solving the TRNDP have been based on the calculation of indicators representing different objectives for the problem at hand,both from the user and operator perspectives,such as travel and waiting times_user_,and capacity and operating costs _operator_.In their multiobjective model for the TRNDP,Baaj and Majmassani_1991_relied on the planner’s judgment and experience for selecting the optimal public transportation network,based on a set of indicators.In contrast,Bielli et al._2002_and Chakroborty and Dwivedi_2002_,combined indicators into an overall,weighted sum value, which served as the criterion for determining the optimaltransit network.TRNDP:ParametersThere are multiple characteristics and design attributes to consider for a realistic representation of a public transportation network.These form the parameters for the TRNDP.Part of these parameters is the problem set of decision variables that define its layout and operational characteristics_frequencies,vehicle size,etc._.Another set of design parameters represent the operating environment_network structure,demand characters,and patterns_, operational strategies and rules,and available resources for the public transportation network. These form the constraints needed to formulate the TRNDP and are,a-priori fixed,decided upon or assumed.Decision VariablesMost common decision variables for the TRNDP are the routes and frequencies of the public transportation network_Table1_.Simplified early studies derived optimal route spacing between predetermined parallel or radial routes,along with optimal frequencies per route_Holroyd1967; Byrne and Vuchic1972;Byrne1975,1976;Kocur and Hendrickson1982;Vaughan1986_,while later models dealt with the development of optimal route layouts and frequency determination. Other studies,additionally,considered fares_Kocur and Hendrickson1982;Morlok and Viton 1984;Chang and Schonfeld1991;Chien and Spacovic2001_,zones_Tsao and Schonfeld1983; Chang and Schonfeld1993a_,stop locations_Black1979;Spacovic and Schonfeld1994; Spacovic et al.1994;Van Nes2003;Yu and Yang2006_and bus types_Delle Site and Filippi 2001_.Network StructureSome early studies focused on the design of systems in simplified radial_Byrne1975;Black 1979;Vaughan1986_,or rectangular grid road networks_Hurdle1973;Byrne and Vuchic1972; Tsao and Schonfeld1984_.However,most approaches since the1980s were either applied to realistic,irregular grid networks or the network structure was of no importance for the proposed model and therefore not specified at all.Demand PatternsDemand patterns describe the nature of the flows of passengers expected to be accommodated by the public transportation network and therefore dictate its structure.For example,transit trips from a number of origins_for example,stops in a neighborhood_to a single destination_such as a bus terminal in the CBD of a city_and vice-versa,are characterized as many-to-one_or one-tomany_transit demand patterns.These patterns are typically encountered in public transportation systems connecting CBDs with suburbs and imply a structure of radial orparallel routes ending at a single point;models for patterns of that type have been proposed by Byrne and Vuchic_1972_,Salzborn_1972_,Byrne_1975,1976_,Kocur and Hendrickson _1982_,Morlok and Viton_1984_,Chang and Schonfeld_1991,1993a_,Spacovic and Schonfeld_1994_,Spacovic et al._1994_,Van Nes_2003_,and Chien et al._2003_.On the other hand,many-to-many demand patterns correspond to flows between multiple origins and destinations within an urban area,suggesting that the public transportation network is expected to connect various points in an area.Demand CharacteristicsDemand can be characterized either as“fixed”_or“inelastic”_or“elastic”;the later meaning that demand is affected by the performance and services provided by the public transportation network.Lee and Vuchic_2005_distinguished between two types of elastic demand:_1_demand per mode affected by transportation services,with total demand for travel kept constant;and_2_total demand for travel varying as a result of the performance of the transportation system and its modes.Fan and Machemehl_2006b_noted that the complexity of the TRNDP has led researchers intoassuming fixed demand,despite its inherent elastic nature.However,since the early1980s, studies included aspects of elastic demand in modeling the TRNDP_Hasselstrom1981;Kocur and Hendrickson1982_.Van Nes et al._1988_applied a simultaneous distribution-modal split model based on transit deterrence for estimatingdemand for public transportation.In a series of studies,Chang and Schonfeld_1991,1993a,b_ and Spacovic et al._1994_estimated demand as a direct function of travel times and fares with respect to their elasticities,while Chien and Spacovic2001_,followed the same approach assuming that demand is additionally affected by headways,route spacing and fares.Finally, studies by Leblanc_1988_,Imam_1998_,Cipriani et al._2005_,Lee and Vuchic_2005_;and Fan and Machemehl_2006a_based demand estimation on mode choice models for estimating transit demand as a function of total demand for travel.中文译文:公交路线网络设计问题:回顾摘要:公共交通网络的有效设计让交通理论与实践成为众人关注的焦点,随之发展出了很多规划相关公交路线网络设计问题(TRNDP)的模型与方法。
关于印发《山东建筑大学本科毕业设计说明书(论文)撰写规范》的通知

教函[2007]33号关于印发《山东建筑大学本科毕业设计说明书(论文)撰写规范》的通知各院(部)、校直有关部门:毕业设计(论文)的撰写水平反映了毕业设计(论文)的质量。
为了提高本科毕业设计(论文)质量,按照《山东建筑大学本科毕业设计(论文)管理规定》的要求,制定了《山东建筑大学本科毕业设计说明书(论文)撰写规范》,现印发给你们,请遵照执行。
附件:1.山东建筑大学本科毕业设计说明书(论文)撰写规范2.山东建筑大学本科毕业设计说明书(论文)撰写格式模版3.山东建筑大学本科毕业设计(论文)外文文献及译文格式模版二○○七年六月一日报:校领导送:各院(部)、校直有关部门、教务处处长及有关科(室)校对:肖鹏共印30份附件1:山东建筑大学本科毕业设计说明书(论文)撰写规范毕业设计(论文)是实践教学中的重要环节,是学习深化与升华的重要过程。
它既是学生学习、研究与实践成果的全面总结,又是对学生素质与能力的一次全面检验,而且还是对学生的毕业资格及学位资格认证的重要依据。
为了保证本科毕业设计(论文)质量,按照《山东建筑大学本科毕业设计(论文)管理规定》的要求,特制定本规范。
一、毕业设计(论文)资料的归档1.毕业设计(论文)资料主要包括毕业设计说明书(论文)、毕业设计(论文)任务书、开题报告表、工作进程表、指导教师评审表、评阅人评审表、答辩小组意见表、成绩评分表、答辩提问录、图纸、外文文献及译文、毕业设计(论文)申请表、选题变更表、实地考察报告、计算资料、实验报告、文献综述、实物性的设计成果等。
2.毕业设计(论文)专用袋中的材料按顺序将下列材料装入毕业设计(论文)专用袋:毕业设计说明书(论文)、毕业设计(论文)任务书、开题报告表、工作进程表、指导教师评审表、评阅人评审表、答辩小组意见表、成绩评分表、答辩提问录、图纸(按国家标准折叠装订)、软件光盘、外文文献及译文等。
其中毕业设计说明书(论文)按封面、目录、中外文摘要及关键词、前言、正文部分、结论、谢辞、参考文献、附录的顺序撰写、排版并装订成册。
毕业设计(论文)外文文献原文及译文

毕业设计(论文)外文文献原文及译文Chapter 11. Cipher Techniques11.1 ProblemsThe use of a cipher without consideration of the environment in which it is to be used may not provide the security that the user expects. Three examples will make this point clear.11.1.1 Precomputing the Possible MessagesSimmons discusses the use of a "forward search" to decipher messages enciphered for confidentiality using a public key cryptosystem [923]. His approach is to focus on the entropy (uncertainty) in the message. To use an example from Section 10.1(page 246), Cathy knows that Alice will send one of two messages—BUY or SELL—to Bob. The uncertainty is which one Alice will send. So Cathy enciphers both messages with Bob's public key. When Alice sends the message, Bob intercepts it and compares the ciphertext with the two he computed. From this, he knows which message Alice sent.Simmons' point is that if the plaintext corresponding to intercepted ciphertext is drawn from a (relatively) small set of possible plaintexts, the cryptanalyst can encipher the set of possible plaintexts and simply search that set for the intercepted ciphertext. Simmons demonstrates that the size of the set of possible plaintexts may not be obvious. As an example, he uses digitized sound. The initial calculations suggest that the number of possible plaintexts for each block is 232. Using forward search on such a set is clearly impractical, but after some analysis of the redundancy in human speech, Simmons reduces the number of potential plaintexts to about 100,000. This number is small enough so that forward searches become a threat.This attack is similar to attacks to derive the cryptographic key of symmetric ciphers based on chosen plaintext (see, for example, Hellman's time-memory tradeoff attack [465]). However, Simmons' attack is for public key cryptosystems and does not reveal the private key. It only reveals the plaintext message.11.1.2 Misordered BlocksDenning [269] points out that in certain cases, parts of a ciphertext message can be deleted, replayed, or reordered.11.1.3 Statistical RegularitiesThe independence of parts of ciphertext can give information relating to the structure of the enciphered message, even if the message itself is unintelligible. The regularity arises because each part is enciphered separately, so the same plaintext always produces the same ciphertext. This type of encipherment is called code book mode, because each part is effectively looked up in a list of plaintext-ciphertext pairs.11.1.4 SummaryDespite the use of sophisticated cryptosystems and random keys, cipher systems may provide inadequate security if not used carefully. The protocols directing how these cipher systems are used, and the ancillary information that the protocols add to messages and sessions, overcome these problems. This emphasizes that ciphers and codes are not enough. The methods, or protocols, for their use also affect the security of systems.11.2 Stream and Block CiphersSome ciphers divide a message into a sequence of parts, or blocks, and encipher each block with the same key.Definition 11–1. Let E be an encipherment algorithm, and let Ek(b) bethe encipherment of message b with key k. Let a message m = b1b2…, whereeach biis of a fixed length. Then a block cipher is a cipher for whichE k (m) = Ek(b1)Ek(b2) ….Other ciphers use a nonrepeating stream of key elements to encipher characters of a message.Definition 11–2. Let E be an encipherment algorithm, and let Ek(b) bethe encipherment of message b with key k. Let a message m = b1b2…, whereeach bi is of a fixed length, and let k = k1k2…. Then a stream cipheris a cipher for which Ek (m) = Ek1(b1)Ek2(b2) ….If the key stream k of a stream cipher repeats itself, it is a periodic cipher.11.2.1 Stream CiphersThe one-time pad is a cipher that can be proven secure (see Section 9.2.2.2, "One-Time Pad"). Bit-oriented ciphers implement the one-time pad by exclusive-oring each bit of the key with one bit of the message. For example, if the message is 00101 and the key is 10010, the ciphertext is01||00||10||01||10 or 10111. But how can one generate a random, infinitely long key?11.2.1.1 Synchronous Stream CiphersTo simulate a random, infinitely long key, synchronous stream ciphers generate bits from a source other than the message itself. The simplest such cipher extracts bits from a register to use as the key. The contents of the register change on the basis of the current contents of the register.Definition 11–3. An n-stage linear feedback shift register (LFSR)consists of an n-bit register r = r0…rn–1and an n-bit tap sequence t =t 0…tn–1. To obtain a key bit, ris used, the register is shifted one bitto the right, and the new bit r0t0⊕…⊕r n–1t n–1 is inserted.The LFSR method is an attempt to simulate a one-time pad by generating a long key sequence from a little information. As with any such attempt, if the key is shorter than the message, breaking part of the ciphertext gives the cryptanalyst information about other parts of the ciphertext. For an LFSR, a known plaintext attack can reveal parts of the key sequence. If the known plaintext is of length 2n, the tap sequence for an n-stage LFSR can be determined completely.Nonlinear feedback shift registers do not use tap sequences; instead, the new bit is any function of the current register bits.Definition 11–4. An n-stage nonlinear feedback shift register (NLFSR)consists of an n-bit register r = r0…rn–1. Whenever a key bit is required,ris used, the register is shifted one bit to the right, and the new bitis set to f(r0…rn–1), where f is any function of n inputs.NLFSRs are not common because there is no body of theory about how to build NLFSRs with long periods. By contrast, it is known how to design n-stage LFSRs with a period of 2n– 1, and that period is maximal.A second technique for eliminating linearity is called output feedback mode. Let E be an encipherment function. Define k as a cryptographic key,(r) and define r as a register. To obtain a bit for the key, compute Ekand put that value into the register. The rightmost bit of the result is exclusive-or'ed with one bit of the message. The process is repeated until the message is enciphered. The key k and the initial value in r are the keys for this method. This method differs from the NLFSR in that the register is never shifted. It is repeatedly enciphered.A variant of output feedback mode is called the counter method. Instead of using a register r, simply use a counter that is incremented for every encipherment. The initial value of the counter replaces r as part of the key. This method enables one to generate the ith bit of the key without generating the bits 0…i – 1. If the initial counter value is i, set. In output feedback mode, one must generate all the register to i + ithe preceding key bits.11.2.1.2 Self-Synchronous Stream CiphersSelf-synchronous ciphers obtain the key from the message itself. The simplest self-synchronous cipher is called an autokey cipher and uses the message itself for the key.The problem with this cipher is the selection of the key. Unlike a one-time pad, any statistical regularities in the plaintext show up in the key. For example, the last two letters of the ciphertext associated with the plaintext word THE are always AL, because H is enciphered with the key letter T and E is enciphered with the key letter H. Furthermore, if theanalyst can guess any letter of the plaintext, she can determine all successive plaintext letters.An alternative is to use the ciphertext as the key stream. A good cipher will produce pseudorandom ciphertext, which approximates a randomone-time pad better than a message with nonrandom characteristics (such as a meaningful English sentence).This type of autokey cipher is weak, because plaintext can be deduced from the ciphertext. For example, consider the first two characters of the ciphertext, QX. The X is the ciphertext resulting from enciphering some letter with the key Q. Deciphering, the unknown letter is H. Continuing in this fashion, the analyst can reconstruct all of the plaintext except for the first letter.A variant of the autokey method, cipher feedback mode, uses a shift register. Let E be an encipherment function. Define k as a cryptographic(r). The key and r as a register. To obtain a bit for the key, compute Ek rightmost bit of the result is exclusive-or'ed with one bit of the message, and the other bits of the result are discarded. The resulting ciphertext is fed back into the leftmost bit of the register, which is right shifted one bit. (See Figure 11-1.)Figure 11-1. Diagram of cipher feedback mode. The register r is enciphered with key k and algorithm E. The rightmost bit of the result is exclusive-or'ed with one bit of the plaintext m i to produce the ciphertext bit c i. The register r is right shifted one bit, and c i is fed back into the leftmost bit of r.Cipher feedback mode has a self-healing property. If a bit is corrupted in transmission of the ciphertext, the next n bits will be deciphered incorrectly. But after n uncorrupted bits have been received, the shift register will be reinitialized to the value used for encipherment and the ciphertext will decipher properly from that point on.As in the counter method, one can decipher parts of messages enciphered in cipher feedback mode without deciphering the entire message. Let the shift register contain n bits. The analyst obtains the previous n bits of ciphertext. This is the value in the shift register before the bit under consideration was enciphered. The decipherment can then continue from that bit on.11.2.2 Block CiphersBlock ciphers encipher and decipher multiple bits at once, rather than one bit at a time. For this reason, software implementations of block ciphers run faster than software implementations of stream ciphers. Errors in transmitting one block generally do not affect other blocks, but as each block is enciphered independently, using the same key, identical plaintext blocks produce identical ciphertext blocks. This allows the analyst to search for data by determining what the encipherment of a specific plaintext block is. For example, if the word INCOME is enciphered as one block, all occurrences of the word produce the same ciphertext.To prevent this type of attack, some information related to the block's position is inserted into the plaintext block before it is enciphered. The information can be bits from the preceding ciphertext block [343] or a sequence number [561]. The disadvantage is that the effective block size is reduced, because fewer message bits are present in a block.Cipher block chaining does not require the extra information to occupy bit spaces, so every bit in the block is part of the message. Before a plaintext block is enciphered, that block is exclusive-or'ed with the preceding ciphertext block. In addition to the key, this technique requires an initialization vector with which to exclusive-or the initial plaintext block. Taking Ekto be the encipherment algorithm with key k, and I to be the initialization vector, the cipher block chaining technique isc 0 = Ek(m⊕I)c i = Ek(mi⊕ci–1) for i > 011.2.2.1 Multiple EncryptionOther approaches involve multiple encryption. Using two keys k and k' toencipher a message as c = Ek' (Ek(m)) looks attractive because it has aneffective key length of 2n, whereas the keys to E are of length n. However, Merkle and Hellman [700] have shown that this encryption technique can be broken using 2n+1encryptions, rather than the expected 22n(see Exercise 3).Using three encipherments improves the strength of the cipher. There are several ways to do this. Tuchman [1006] suggested using two keys k and k':c = Ek (Dk'(Ek(m)))This mode, called Encrypt-Decrypt-Encrypt (EDE) mode, collapses to a single encipherment when k = k'. The DES in EDE mode is widely used in the financial community and is a standard (ANSI X9.17 and ISO 8732). It is not vulnerable to the attack outlined earlier. However, it is vulnerable to a chosen plaintext and a known plaintext attack. If b is the block size in bits, and n is the key length, the chosen plaintext attacktakes O(2n) time, O(2n) space, and requires 2n chosen plaintexts. The known plaintext attack requires p known plaintexts, and takes O(2n+b/p) time and O(p) memory.A second version of triple encipherment is the triple encryption mode [700]. In this mode, three keys are used in a chain of encipherments.c = Ek (Ek'(Ek''(m)))The best attack against this scheme is similar to the attack on double encipherment, but requires O(22n) time and O(2n) memory. If the key length is 56 bits, this attack is computationally infeasible.11.3 Networks and CryptographyBefore we discuss Internet protocols, a review of the relevant properties of networks is in order. The ISO/OSI model [990] provides an abstract representation of networks suitable for our purposes. Recall that the ISO/OSI model is composed of a series of layers (see Figure 11-2). Each host, conceptually, has a principal at each layer that communicates with a peer on other hosts. These principals communicate with principals at the same layer on other hosts. Layer 1, 2, and 3 principals interact only with similar principals at neighboring (directly connected) hosts. Principals at layers 4, 5, 6, and 7 interact only with similar principals at the other end of the communication. (For convenience, "host" refers to the appropriate principal in the following discussion.)Figure 11-2. The ISO/OSI model. The dashed arrows indicate peer-to-peer communication. For example, the transport layers are communicating with each other. The solid arrows indicate the actual flow of bits. For example, the transport layer invokes network layer routines on the local host, which invoke data link layer routines, which put the bits onto the network. The physical layer passes the bits to the next "hop," or host, on the path. When the message reaches the destination, it is passed up to the appropriatelevel.Each host in the network is connected to some set of other hosts. They exchange messages with those hosts. If host nob wants to send a message to host windsor, nob determines which of its immediate neighbors is closest to windsor (using an appropriate routing protocol) and forwards the message to it. That host, baton, determines which of its neighbors is closest to windsor and forwards the message to it. This process continues until a host, sunapee, receives the message and determines that windsor is an immediate neighbor. The message is forwarded to windsor, its endpoint.Definition 11–5. Let hosts C0, …, Cnbe such that Ciand Ci+1are directlyconnected, for 0 i < n. A communications protocol that has C0 and Cnasits endpoints is called an end-to-end protocol. A communications protocolthat has Cj and Cj+1as its endpoints is called a link protocol.The difference between an end-to-end protocol and a link protocol is that the intermediate hosts play no part in an end-to-end protocol other than forwarding messages. On the other hand, a link protocol describes how each pair of intermediate hosts processes each message.The protocols involved can be cryptographic protocols. If the cryptographic processing is done only at the source and at the destination, the protocol is an end-to-end protocol. If cryptographic processing occurs at each host along the path from source to destination, the protocolis a link protocol. When encryption is used with either protocol, we use the terms end-to-end encryption and link encryption, respectively.In link encryption, each host shares a cryptographic key with its neighbor. (If public key cryptography is used, each host has its neighbor's public key. Link encryption based on public keys is rare.) The keys may be set on a per-host basis or a per-host-pair basis. Consider a network with four hosts called windsor, stripe, facer, and seaview. Each host is directly connected to the other three. With keys distributed on a per-host basis, each host has its own key, making four keys in all. Each host has the keys for the other three neighbors, as well as its own. All hosts use the same key to communicate with windsor. With keys distributed on a per-host-pair basis, each host has one key per possible connection, making six keys in all. Unlike the per-host situation, in the per-host-pair case, each host uses a different key to communicate with windsor. The message is deciphered at each intermediate host, reenciphered for the next hop, and forwarded. Attackers monitoring the network medium will not be able to read the messages, but attackers at the intermediate hosts will be able to do so.In end-to-end encryption, each host shares a cryptographic key with each destination. (Again, if the encryption is based on public key cryptography, each host has—or can obtain—the public key of each destination.) As with link encryption, the keys may be selected on a per-host or per-host-pair basis. The sending host enciphers the message and forwards it to the first intermediate host. The intermediate host forwards it to the next host, and the process continues until the message reaches its destination. The destination host then deciphers it. The message is enciphered throughout its journey. Neither attackers monitoring the network nor attackers on the intermediate hosts can read the message. However, attackers can read the routing information used to forward the message.These differences affect a form of cryptanalysis known as traffic analysis.A cryptanalyst can sometimes deduce information not from the content ofthe message but from the sender and recipient. For example, during the Allied invasion of Normandy in World War II, the Germans deduced which vessels were the command ships by observing which ships were sending and receiving the most signals. The content of the signals was not relevant; their source and destination were. Similar deductions can reveal information in the electronic world.第十一章密码技术11.1问题在没有考虑加密所要运行的环境时,加密的使用可能不能提供用户所期待的安全。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
附件3:
(本科毕业论文)文献、资料题目:
院(部)
专
班
姓名:张三
学号:2001888888
指导教师:张九光
翻译日期:2005.6.30
山东建筑大学毕业设计(或毕业论文,二选一)外文文献及译文
,the National Institute of Standards and Technology (NIST) has been working to develop a new encryption standard to keep government information secure .The organization is in the final stages of an open process of selecting one or more algorithms ,or data-scrambling formulas ,for the new Advanced Encryption Standard (AES) and plans to make adecision by late summer or early fall .The standard is slated to go into effect next year . AES is intended to be a stronger ,more efficient successor to Triple Data Encryption Standard (3DES),which replaced the aging DES ,which was cracked in less than three days in July 1998.
“Until we have the AES ,3DES will still offer protection for years to come .So there is no need to immediately switch over ,”says Edward Roback , acting chief of the computer security division at NIST and chairman of the AES selection committee .“What AES will offer is a more efficient algorithm .It will be a federal standard ,but it will be widely implemented in the IT community .”
According to Roback ,efficiency of the proposed algorithms is measured by how fast they can encrypt and decrypt information ,how fast they can present an encryption key and how much information they can encrypt .
The AES review committee is also looking at how much space the algorithm takes up on a chip and how much memory it requires .Roback says the selection of a more efficient AES will also result in cost savings and better use of resources .
“DES was designed for hardware implementations ,and we are now living in a world of much more efficient software ,and we have learned an awful lot about the design of algorithms ,”says Roback .“When you start multiplying this with the billions of impl ementations done daily ,the saving on overhead on the networks will be enormous .”
……
外文原文一律用原文的打印或复印件,不准用word
重排后再打印。
中文及封面按学校要求。
符合标准才可存档。
山东建筑大学毕业设计(或毕业论文,二选一)外文文献及译文
- 2 -
以确保政府的信息安全。
该组织目前正处于为新的先进加密标准(
AES )选择一个或几个算法或数据打乱公式的开放过程的最后阶段,并计划在夏末或秋初作出决定。
此标准内定明年实施。
AES 预定为比三层数据加密标准(3DES)更强、更高效的后续标准,3DES 替代了老化的DES 加密标准,DES 在1998年7月在不到三天的时间内就被破译了。
NIST 计算机安全部的代理主管兼AES 选择委员会主席Edward Roback 说:“在我们拥有AES 之前,3DES 还将在今后几年提供保护。
所以没有必要马上转换。
AES 所提供的是一种更有效的算法。
它将是一项联邦标准,但它将在IT 界广泛实施。
”
据Roback 称,提议中的算法的效率是通过对信息加密和解密有多快、给出加密密钥有多快以及能对多少信息加密等几个方面进行测量的。
AES 评价委员会也要看算法占据芯片上多少空间和需要多少内存。
Roback 说,选择一个更高效的AES 也会带来成本的节省和资源的更好利用。
Roback 说:“DES 是为硬件实现而设计的,而我们现在处于软件更高效的世界,我们对算法的设计有极多的了解。
当我们开始大规模使用此算法,每天实现几十亿次的加密时,(算法带来的)网络开销的节省将是巨大的。
”
……。