毕业论文英文文献及翻译
毕业论文(设计)外文文献翻译及原文
金融体制、融资约束与投资——来自OECD的实证分析R.SemenovDepartment of Economics,University of Nijmegen,Nijmegen(荷兰内梅亨大学,经济学院)这篇论文考查了OECD的11个国家中现金流量对企业投资的影响.我们发现不同国家之间投资对企业内部可获取资金的敏感性具有显著差异,并且银企之间具有明显的紧密关系的国家的敏感性比银企之间具有公平关系的国家的低.同时,我们发现融资约束与整体金融发展指标不存在关系.我们的结论与资本市场信息和激励问题对企业投资具有重要作用这种观点一致,并且紧密的银企关系会减少这些问题从而增加企业获取外部融资的渠道。
一、引言各个国家的企业在显著不同的金融体制下运行。
金融发展水平的差别(例如,相对GDP的信用额度和相对GDP的相应股票市场的资本化程度),在所有者和管理者关系、企业和债权人的模式中,企业控制的市场活动水平可以很好地被记录.在完美资本市场,对于具有正的净现值投资机会的企业将一直获得资金。
然而,经济理论表明市场摩擦,诸如信息不对称和激励问题会使获得外部资本更加昂贵,并且具有盈利投资机会的企业不一定能够获取所需资本.这表明融资要素,例如内部产生资金数量、新债务和权益的可得性,共同决定了企业的投资决策.现今已经有大量考查外部资金可得性对投资决策的影响的实证资料(可参考,例如Fazzari(1998)、 Hoshi(1991)、 Chapman(1996)、Samuel(1998)).大多数研究结果表明金融变量例如现金流量有助于解释企业的投资水平。
这项研究结果解释表明企业投资受限于外部资金的可得性。
很多模型强调运行正常的金融中介和金融市场有助于改善信息不对称和交易成本,减缓不对称问题,从而促使储蓄资金投着长期和高回报的项目,并且提高资源的有效配置(参看Levine(1997)的评论文章)。
因而我们预期用于更加发达的金融体制的国家的企业将更容易获得外部融资.几位学者已经指出建立企业和金融中介机构可进一步缓解金融市场摩擦。
浙江大学本科毕业论文外文文献翻译
核准通过,归档资料。
未经允许,请勿外传!浙江大学本科毕业论文外文文献翻译The influence of political connections on the firm value of small and medium-sized enterprises in China政治关联在中国对中小型企业价值的影响1摘要中小型企业的价值受很多因素的影响,比如股东、现金流以及政治关联等.这篇文章调查的正是在中国政治关联对中小型企业价值的影响。
通过实验数据来分析政治关联对企业价值效益的影响.结果表明政府关联是关键的因素并且在中国对中小型企业的价值具有负面影响。
2重要内容翻译2。
1引言在商业界,有越来越多关于政治关联的影响的经济研究。
它们发现政治关联能够帮助企业确保有利的规章条件以及成功获得资源,比如能够最终提高企业价值或是提升绩效的银行贷款,这种政治关联的影响在不同的经济条件下呈现不同的效果。
在高腐败和法律制度薄弱的国家,政治关联对企业价值具有决定性因素1的作用.中国由高度集权的计划经济向市场经济转变,政府对市场具有较强的控制作用,而且有大量的上市企业具有政治关联。
中小型企业发展的很迅速,他们已经在全球经济环境中变得越来越重要。
从90年代起, 政治因素对中国的任何规模的企业来说都变得越来越重要,尤其是中小型企业的价值。
和其他的部门相比较,中小型企业只有较小的现金流,不稳定的现金流且高负债率.一方面,中小型企业改变更加灵活;另一方面,中小型企业在由于企业规模以及对银行来说没有可以抵押的资产,在筹资方面较为困难。
企业如何应对微观经济环境和政策去保证正常的企业活动,并且政治关联如何影响企业价值?这篇论文调查政治关联和企业价值之间的联系,并且试图去研究企业是否可以从政治关联中获利提升企业价值。
2.2定义这些中小型企业之所以叫中小型企业,是和管理规模有关。
对这些小企业来说,雇员很少,营业额较低,资金一般由较少的人提供,因此,通常由这些业主直接管理企业。
毕业论文英文参考文献与译文
Inventory managementInventory ControlOn the so-called "inventory control", many people will interpret it as a "storage management", which is actually a big distortion.The traditional narrow view, mainly for warehouse inventory control of materials for inventory, data processing, storage, distribution, etc., through the implementation of anti-corrosion, temperature and humidity control means, to make the custody of the physical inventory to maintain optimum purposes. This is just a form of inventory control, or can be defined as the physical inventory control. How, then, from a broad perspective to understand inventory control? Inventory control should be related to the company's financial and operational objectives, in particular operating cash flow by optimizing the entire demand and supply chain management processes (DSCM), a reasonable set of ERP control strategy, and supported by appropriate information processing tools, tools to achieved in ensuring the timely delivery of the premise, as far as possible to reduce inventory levels, reducing inventory and obsolescence, the risk of devaluation. In this sense, the physical inventory control to achieve financial goals is just a means to control the entire inventory or just a necessary part; from the perspective of organizational functions, physical inventory control, warehouse management is mainly the responsibility of The broad inventory control is the demand and supply chain management, and the whole company's responsibility.Why until now many people's understanding of inventory control, limited physical inventory control? The following two reasons can not be ignored:First, our enterprises do not attach importance to inventory control. Especially those who benefit relatively good business, as long as there is money on the few people to consider the problem of inventory turnover. Inventory control is simply interpreted as warehouse management, unless the time to spend money, it may have been to see the inventory problem, and see the results are often very simple procurement to buy more, or did not do warehouse departments .Second, ERP misleading. Invoicing software is simple audacity to call it ERP, companies on their so-called ERP can reduce the number of inventory, inventory control, seems to rely on their small software can get. Even as SAP, BAAN ERP world, the field ofthese big boys, but also their simple modules inside the warehouse management functionality is defined as "inventory management" or "inventory control." This makes the already not quite understand what our inventory control, but not sure what is inventory control.In fact, from the perspective of broadly understood, inventory control, shouldinclude the following:First, the fundamental purpose of inventory control. We know that the so-called world-class manufacturing, two key assessment indicators (KPI) is, customer satisfaction and inventory turns, inventory turns and this is actually the fundamental objective of inventory control.Second, inventory control means. Increase inventory turns, relying solely on the so-called physical inventory control is not enough, it should be the demand and supply chain management process flow of this large output, and this big warehouse management processes in addition to including this link, the more important The section also includes: forecasting and order processing, production planning and control, materials planning and purchasing control, inventory planning and forecasting in itself, as well as finished products, raw materials, distribution and delivery of the strategy, and even customs management processes.And with the demand and supply chain management processes throughout the process, it is the information flow and capital flow management. In other words, inventory itself is across the entire demand and supply management processes in all aspects of inventory control in order to achieve the fundamental purpose, it must control all aspects of inventory, rather than just manage the physical inventory at hand.Third, inventory control, organizational structure and assessment.Since inventory control is the demand and supply chain management processes, output, inventory control to achieve the fundamental purpose of this process must be compatible with a rational organizational structure. Until now, we can see that many companies have only one purchasing department, purchasing department following pipe warehouse. This is far short of inventory control requirements. From the demand and supply chain management process analysis, we know that purchasing and warehouse management is the executive arm of the typical, and inventory control should focus on prevention, the executive branch is very difficult to "prevent inventory" for the simple reason that they assessment indicatorsin large part to ensure supply (production, customer). How the actual situation, a reasonable demand and supply chain management processes, and thus set the corresponding rational organizational structure and is a question many of our enterprisesto exploreThe role of inventory controlInventory management is an important part of business management. In the production and operation activities, inventory management must ensure that both the production plant for raw materials, spare parts demand, but also directly affect the purchasing, sales of share, sales activities. To make an inventory of corporate liquidity, accelerate cash flow, the security of supply under the premise of minimizing Yaku funds, directly affects the operational efficiency. Ensure the production and operation needs of the premise, so keep inventories at a reasonable level; dynamic inventory control, timely, appropriate proposed order to avoid over storage or out of stock; reduce inventory footprint, lower total cost of inventory; control stock funds used to accelerate cash flow.Problems arising from excessive inventory: increased warehouse space andinventory storage costs, thereby increasing product costs; take a lot of liquidity, resultingin sluggish capital, not only increased the burden of payment of interest, etc., would affect the time value of money and opportunity income; finished products and raw materials caused by physical loss and intangible losses; a large number of enterprise resource idle, affecting their rational allocation and optimization; cover the production, operation of the whole process of the various contradictions and problems, is not conducive to improve the management level.Inventory is too small the resulting problems: service levels caused a decline in the profit impact of marketing and corporate reputation; production system caused by inadequate supply of raw materials or other materials, affecting the normal production process; to shorten lead times, increase the number of orders, so order (production) costs; affect the balance of production and assembly of complete sets.NotesInventory management should particularly consider the following two questions:First, according to sales plans, according to the planned production of the goods circulated in the market, we should consider where, how much storage.Second, starting from the level of service and economic benefits to determine howto ensure inventories and supplementary questions.The two problems with the inventory in the logistics process functions.In general, the inventory function:(1)to prevent interrupted. Received orders to shorten the delivery of goods fromthe time in order to ensure quality service, at the same time to prevent out of stock.(2)to ensure proper inventory levels, saving inventory costs.(3)to reduce logistics costs. Supplement with the appropriate time interval compatible with the reasonable demand of the cargo in order to reduce logistics costs, eliminate or avoid sales fluctuations.(4)ensure the production planning, smooth to eliminate or avoid sales fluctuations.(5)display function.(6)reserve. Mass storage when the price falls, reduce losses, to respond to disasters and other contingencies.About the warehouse (inventory) on what the question, we must consider the number and location. If the distribution center, it should be possible according to customer needs, set at an appropriate place; if it is stored in central places to minimize the complementary principle to the distribution centers, there is no place certain requirements. When the stock base is established, will have to take into account are stored in various locations in what commodities.库存管理库存控制在谈到所谓“库存控制”的时候,很多人将其理解为“仓储管理”,这实际上是个很大的曲解。
毕业设计论文外文文献翻译
毕业设计(论文)外文文献翻译院系:财务与会计学院年级专业:201*级财务管理姓名:学号:132148***附件: 财务风险管理【Abstract】Although financial risk has increased significantly in recent years risk and risk management are not contemporary issues。
The result of increasingly global markets is that risk may originate with events thousands of miles away that have nothing to do with the domestic market。
Information is available instantaneously which means that change and subsequent market reactions occur very quickly。
The economic climate and markets can be affected very quickly by changes in exchange rates interest rates and commodity prices。
Counterparties can rapidly become problematic。
As a result it is important to ensure financial risks are identified and managed appropriately. Preparation is a key component of risk management。
【Key Words】Financial risk,Risk management,YieldsI. Financial risks arising1.1What Is Risk1.1.1The concept of riskRisk provides the basis for opportunity. The terms risk and exposure have subtle differences in their meaning. Risk refers to the probability of loss while exposure is the possibility of loss although they are often used interchangeably。
毕业论文英文翻译文献
毕业论文英文翻译文献随着全球化的发展,英语在全球的运用越来越广泛。
下文是店铺为大家整理的关于毕业论文英文翻译文献的内容,欢迎大家阅读参考! 毕业论文英文翻译文献(一)1. 谢天振主编. 《当代国外翻译理论导读》. 天津:南开大学出版社,2008.2. 包惠南、包昂. 《中国文化与汉英翻译》. 北京:外文出版社, 2004.3. 包惠南. 《文化语境与语言翻译》. 北京:中国对外翻译出版公司. 2001.4. 毕继万. 《世界文化史故事大系——英国卷》. 上海:上海外语教育出版社, 2003.5. 蔡基刚. 《英汉汉英段落翻译与实践》. 上海:复旦大学出版社, 2001.6. 蔡基刚. 《英汉写作对比研究》. 上海:复旦大学出版社, 2001.7. 蔡基刚. 《英语写作与抽象名词表达》. 上海:复旦大学出版社, 2003.8. 曹雪芹、高鄂. 《红楼梦》.9. 陈定安. 《英汉比较与翻译》. 北京:中国对外翻译出版公司, 1991.10. 陈福康. 《中国译学理论史稿》(修订本). 上海:上海外语教育出版社. 2000.11. 陈生保. 《英汉翻译津指》. 北京:中国对外翻译出版公司. 1998.12. 陈廷祐. 《英文汉译技巧》. 北京:外语教学与研究出版社. 2001.13. 陈望道. 《修辞学发凡》. 上海:上海教育出版社, 1979.14. 陈文伯. 《英汉翻译技法与练习》. 北京:世界知识出版社. 1998.15. 陈中绳、吴娟. 《英汉新词新义佳译》. 上海:上海翻译出版公司. 1990.16. 陈忠诚. 《词语翻译丛谈》. 北京:中国对外翻译出版公司, 1983.17. 程希岚. 《修辞学新编》. 吉林:吉林人民出版社, 1984.18. 程镇球. 《翻译论文集》. 北京:外语教学与研究出版社. 2002.19. 程镇球. 《翻译问题探索》. 北京:商务印书馆, 1980.20. 崔刚. 《广告英语》. 北京:北京理工大学出版社, 1993.21. 单其昌. 《汉英翻译技巧》. 北京:外语教学与研究出版社. 1990.22. 单其昌. 《汉英翻译讲评》. 北京:对外贸易教育出版社. 1989.23. 邓炎昌、刘润清. 《语言与文化——英汉语言文化对比》. 北京:外语教学与研究出版社, 1989.24. 丁树德. 《英汉汉英翻译教学综合指导》. 天津:天津大学出版社, 1996.25. 杜承南等,《中国当代翻译百论》. 重庆:重庆大学出版社, 1994.26. 《翻译通讯》编辑部. 《翻译研究论文集(1894-1948)》. 北京:外语教学与研究出版社. 1984.27. 《翻译通讯》编辑部. 《翻译研究论文集(1949-1983)》. 北京:外语教学与研究出版社. 1984. .28. 范勇主编. 《新编汉英翻译教程》. 天津:南开大学出版社. 2006.29. 方梦之、马秉义(编选). 《汉译英实践与技巧》. 北京:旅游教育出版社. 1996.30. 方梦之. 《英语汉译实践与技巧》. 天津:天津科技翻译出版公司. 1994.31. 方梦之主编. 《译学辞典》. 上海:上海外语教育出版社. 2004.32. 冯翠华. 《英语修辞大全》,北京:外语教学与研究出版社, 1995.33. 冯庆华. 《文体与翻译》. 上海:上海外语教育出版社, 2002.34. 冯庆华主编. 《文体翻译论》. 上海:上海外语教育出版社. 2002.35. 冯胜利. 《汉语的韵律、词法与句法》. 北京:北京大学出版社, 1997.36. 冯志杰. 《汉英科技翻译指要》. 北京:中国对外翻译出版公司. 1998.37. 耿占春. 《隐喻》. 北京:东方出版社, 1993.38. 郭建中. 《当代美国翻译理论》. 武汉:湖北教育出版社. 2000.39. 郭建中. 《文化与翻译》. 北京:中国对外翻译出版公司. 2000.40. 何炳威. 《容易误译的英语》. 北京:外语教学与研究出版社. 2002.41. 何刚强. 《现代英汉翻译操作》. 北京:北京大学出版社. 1998.42. 何刚强. 《现代英语表达与汉语对应》. 上海:复旦大学出版社. 1994.43. 何刚强. 《英汉口笔译技艺》. 上海:复旦大学出版社, 2003. 毕业论文英文翻译文献(二)1. 何自然、张达三、杨伟钧等译. 《现代英语语法教程》. 北京:商务印书馆, 1990.2. 何自然. 《语用学概论》. 长沙: 湖南教育出版社, 1988.3. 侯维瑞. 《英语语体》. 上海:上海外语教育出版社, 1988.4. 胡庚申. 《怎样起草与翻译合同协议》. 合肥:中国科技大学出版社, 1993.5. 胡曙中. 《英汉修辞比较研究》. 上海:上海外语教育出版社, 1993.6. 胡晓吉. 《实用英汉对比翻译》. 北京:中国人民大学出版社. 1990.7. 胡燕平,张容建. 《实用英汉翻译类典》. 重庆:重庆出版社, 1997.8. 胡裕树. 《现代汉语》. 上海:上海教育出版社, 1987.9. 胡兆云. 《美学理论视野中的文学翻译研究》(第2版). 北京:现代教育出版社. 2009.10. 胡兆云. 《语言接触与英汉借词研究》. 济南:山东大学出版社. 2001.11. 胡壮麟. 《语篇的衔接与连贯》. 上海:上海外语教育出版社, 1994.12. 胡壮麟. 《语言学教程》. 北京:北京大学出版社, 1988.13. 黄伯荣, 廖序东. 《现代汉语》. 兰州:甘肃人民出版社, 1981.14. 黄国文. 《语篇分析概要》. 长沙:湖南教育出版社, 1988.15. 黄龙. 《翻译技巧指导》. 沈阳:辽宁人民出版社, 1986.16. 黄任. 《英语修辞与写作》. 上海:上海外语教育出版社, 1996.17. 黄雨石. 《英汉文学翻译探索》. 西安:陕西人民出版社. 1988.18. 黄振定. 《翻译学:艺术论与科学论的统一》. 长沙:湖南教育出版社. 1998.19. 黄振定. 《翻译学的语言哲学基础》. 上海:上海交通大学出版社. 2007.20. 黄忠廉. 《变译理论》. 北京:中国对外翻译出版公司. 2002.21. 贾尔斯英译. 《孙子兵法》. 长沙:湖南出版社, 1993.22. 贾文波. 《汉英时文翻译: 政治经济汉译英300句析》. 北京:中国对外翻译出版公司, 1999.23. 贾玉新. 《跨文化交际学》. 上海:上海外语教育出版社, 1997.24. 金隄. 《等效翻译探索》. 北京:中国对外翻译出版公司. 1998.25. 金惠康. 《汉英跨文化交际翻译》. 贵阳:贵州教育出版社. 1998.26. 金惠康. 《跨文华交际翻译》. 北京:中国对外翻译出版公司, 2003.27. 金惠康. 《跨文华交际翻译续编》. 北京:中国对外翻译出版公司, 2004.28. 金立鑫. 《语法的多视角研究》. 上海:上海外语教育出版社, 2000.29. 居祖纯. 《新编汉英语篇翻译》. 北京:清华大学出版社, 2002.30. 柯平. 《对比语言学》. 南京:南京师范大学出版社, 1999.31. 孔慧怡. 《翻译·文学·文化》. 北京:北京大学出版社. 1999.32. 李定坤. 《汉英辞格对比与翻译》. 武汉:华中师范大学出版社, 1994.33. 李国南. 《辞格与词汇》. 上海:上海外语教育出版社, 2002.34. 李国南. 《英汉修辞格对比研究》. 福州:福建人民出版社, 1999.35. 李明编著. 《英汉互动翻译教程》. 武汉:武汉大学出版社. 2006.36. 李瑞华(主编). 《英汉语言文化对比研究》. 上海:上海外语教育出版社. 1996.。
毕业论文的参考文献的英文翻译与整理
毕业论文的参考文献的英文翻译与整理Reference Translation and Organization of Graduation ThesisAbstract:In academic writing, it is essential to include appropriate and accurate references to support the arguments and ideas presented in a research paper. This article focuses on the translation and organization of references in a graduation thesis. The importance of referencing, common challenges in translation, and effective strategies for organizing references will be discussed.1. Introduction1.1 Background1.2 Purpose of the Study2. Importance of Referencing2.1 Credibility and Scholarly Integrity2.2 Acknowledging Intellectual Contributions2.3 Avoiding Plagiarism3. Common Challenges in Translation3.1 Terminology and Technical Vocabulary3.2 Cultural and Contextual Nuances3.3 Translating Non-English References4. Strategies for Translating References4.1 Literal Translation4.2 Paraphrasing4.3 Maintaining Consistency5. Organization of References5.1 Citation Styles5.2 Creating a Reference List5.3 Formatting Guidelines6. Tools and Resources for Reference Translation6.1 Online Translation Tools6.2 Electronic Databases and Libraries6.3 Style Guides and Manuals7. ConclusionReferences (References should be listed in alphabetical order according to the citation style used in the graduation thesis)Please note that the above format is a general example. Depending on the specific requirements of your graduation thesis, you may need to modify the structure and add additional sections.In conclusion, the translation and organization of references in a graduation thesis play a crucial role in maintaining the credibility andintegrity of the research. By accurately translating and properly organizing references, researchers can provide readers with easily accessible information and demonstrate their acknowledgment of the intellectual contributions of others. It is important to be meticulous and consistent in following the chosen citation style to ensure the professional presentation of the references.。
毕业论文英文翻译
毕业论文英文翻译Title: The Impact of Artificial Intelligence on Employment Abstract:This paper explores the impact of artificial intelligence (AI) on employment. The rise of AI technologies has sparked concerns about its potential to replace human jobs. Through an analysis of existing literature and case studies, this study investigates the ways in which AI has affected various industries and job sectors. The findings indicate that while AI has the potential to automate certain tasks and reduce the need for human intervention, it also creates new job opportunities and contributes to economic growth. Additionally, the study highlights the importance of retraining and upskilling workers to adapt to the changing job market. Overall, this research contributes to a better understanding of the complex relationship between AI and employment and provides insights into proactive strategies to address the challenges posed by AI. Introduction:Artificial intelligence has emerged as a powerful technology with the potential to transform various aspects of society, including the workforce. The rapid advancement of AI has raised concerns about potential job losses and increased automation. This study aims to explore the impact of AI on employment and identify strategies to mitigate negative effects. By examining existing literature and case studies, this research provides a comprehensive analysis of AI's influence on different industries and job sectors.Literature Review:The literature offers a wide range of perspectives on the impact ofAI on employment. Some studies suggest that AI will lead to significant job losses in sectors such as manufacturing, transportation, and customer service. They argue that AI technologies, such as autonomous vehicles and chatbots, can perform tasks previously done by humans more efficiently and at a lower cost. On the other hand, other studies argue that AI will create new job opportunities and enhance productivity. For example, the healthcare sector benefits from AI technologies by improving diagnosis accuracy and streamlining administrative processes.Case Studies:This study includes several case studies that examine the impact of AI on specific industries. The manufacturing industry, for instance, has experienced both job losses and job creation due to the introduction of AI. While certain tasks have been automated, new roles related to AI maintenance and programming have emerged. Similarly, the retail industry has witnessed the integration of AI technologies, leading to job displacement in traditional retail jobs but also the creation of new positions in data analysis and online customer support.Mitigation Strategies:To address the challenges posed by AI, strategies should focus on retraining and upskilling the workforce to adapt to the changing job market. Governments and organizations should encourage workers to acquire in-demand skills such as data analysis and AI programming. Additionally, collaboration between academia and industry is crucial to ensure that education and training programs remain relevant and effective. Finally, policies that support jobtransition and income support for displaced workers will help minimize the negative impact of AI on employment. Conclusion:The impact of artificial intelligence on employment is a complex and multifaceted issue. While concerns about job losses are valid, it is important to recognize that AI also creates new job opportunities and contributes to economic growth. By implementing proactive strategies, such as retraining and upskilling, societies can better navigate the changes brought about by AI and ensure a future where humans and machines can coexist harmoniously.。
毕业论文英文文献及翻译
Based on GSM module and AT89C51 connectiondesign and application---From 《GSM principle and its network optimization》chapter one---From 《New single chip microcomputer interface device and technology》chapter sixAbstractThis article through analyzed the GSM module and the monolithic integrated circuit connection design simply introduced the TC35i module commonly used instruction and the coding rule, introduced emphatically the TC35i module and the AT89C51 principle of work, the periphery connection electric circuit, the software control technology, at the same time has produced some TC35i module and the AT89C51 connection application procedure, proposed AT89C51 when receive data should pay attention question, thus designed has the GSM module the data transmission terminal.Key words: GSM network1 Summarize:Along with correspondence technique of development, according to the service function of the NTT DoCoMo net, just to industry control and control from a distance the realm have continuously extension of trend.Is orientation this kind of demand, Siemens company released a new generation wireless correspondence GSM mold piece-TC35i, according to should the short news function of the mold piece, can fast safety credibility realization customer information processing etc. function, special be applicable to control centre and terminal equipments distance very far, or inconvenience adoption wired correspondence lie quality etc. situation, for example the oil well information collect behind of deliver, the long range copy form system, city transportation direction etc. all according to the TC35i mold piece to realization.2 The application of GSM network:GSM is Global System for Mobile Communications acronym, which means Global System for Mobile Communications is the world's leading cellular systems inthe world. GSM is based on narrowband TDMA standard that allows radio frequency in a group call at the same time 8. GSM80 during the rise in Europe, put into use in 1991. The end of 1997, has operations in more than 100 countries, Europe and Asia has become the standard in fact, that by 2001, the world's 162 countries have already built a 400 GSM communications network. But the GSM system capacity is limited, users in the network overload, it had to construct additional network facilities. What is gratifying is that GSM performance in other areas, which in addition to providing a standardized list and signaling systems, but also opened up some of the more intelligent of the business such as international roaming and so on. The convenience of GSM mobile phone is that it provides a smart card, known as SIM cards, and card could be separated, so that the replacement of mobile phone users and custom personal information in this area are facilitated.GSM network to improve after years of development, is now very mature, less blind spots, signal stability, automatic roaming, and the communication distance from the impact of the surrounding environment. GSM short message in particular, flexible and convenient, you can cross-market, inter-provincial and even cross-border transmission, and each send a short message as long as one dime, very reliable and affordable. In addition, the mobile phone SIM card in recent years can apply for 0, some packages use lower cost than fixed. Therefore the use of mobile phone message to achieve alarm, ultra long-range remote control for industrial equipment, transmission of data is a very good choice.GSM module, is a similar mobile communication module, integrates a number of mobile phone functions on a single small circuit board, it can send SMS messages, calls and so on, the module is small, but it has a lot of mobile phone functionality, with its have equal is the core of the mobile phone, and it is in a lot of applications have a wide range of applications, GSM module through the use of AT commands to control it, modules can be connected to computer RS232 serial port, can also be used to carry out single-chip control . Below we cite some typical applications:2.1 mobile phone access control system:GSM Access Control System used to control the electric lock control, if you need to enter, as long as the cell phone call using GSM modules mobile number, will automatically open the door, and only you can set up cell phone numbers to open the door, and no costs.2.2 three billboard over the weather disaster emergency turn off:Over three billboards are constantly flip through the motor to achieve a number of ads displayed, because installed in the outdoors, when there is wind, hail and other weather disasters, billboards could easily be blown bad or damaged card die, when in need of emergency shut down, You can normally closed relay contact to control the power of advertising, when you need to do is send "turn off" control message, the billboard will automatically turn off, and automatically after a certain time delay automatically return to normal job (generally disastrous weather will not continue for a long time) in advance if you want to open a billboard, you can send "Open" control message.2.3 engineering system balance reminders:Some works are safe after the completion of the normal operation after a period of time to settle the balance, if the encounter malicious clients the outstanding purchase price, often installed side very headache, because equipment has been installed, if the loss of a great come back down, particularly in the field customer very costly when the client system can be installed in the GSM module, use it all the way to control system or the way some of the key points, when the customer paid in arrears when the malicious message can turn off some features, forcing customers to pay the purchase price then immediately open message, if you have a smooth recovery of the purchase price can also be the name of system maintenance by the GSM module removed from the client system.2.4 monitoring systems or Web servers and reset the alarm:Monitoring system or web server running after a long period after death may be wrong, this time to power on reset is the only solution at this time through the GSM module can control system power, and set to open automatically after 3 seconds turn off mode, can achieve power reduction, in addition, GSM module in some special application areas also played a very large role, such as: the disappearance of the main power supply, memory errors, fan shutdown, fuel depletion, it was the invasion and other information, are not people the ideal choice for monitoring the engine room.the remote control of home appliances:Through the message can easily achieve the remote control to open rice cookers, water heaters and other appliances by remote control or switch to repair mode can also control the air-conditioning GSM global wireless mobile communication network control alarm host, using the global GSM short message data transmission mode and voice-enabled platform for the completion of intelligent data transmission and remotecontrol alarm, set the host family, shops, office safety, electrical control, remote monitoring, such as Intelligent home functions, because of the global GSM wireless mobile communication network signal coverage area of Canton, and truly realize the low-cost high-quality ultra-long-distance convenient and flexible intelligent wireless control and alarm, to solve the fixed-line telephone or cable broadband network wired alarm limitations. GSM global wireless mobile communications network in popularity all over the world, the GSM global wireless mobile communication network control alarm can be widely used in a single host family, community property, electricity, transportation, petroleum, coal, railway, municipal and public security departments of the security industry prevention devices, data monitoring and remote monitoring system. Wireless Road, with 11 defense areas, 2-way Cable Standoff, different defense area alarm, alarm and message control, separate from a defended position, remote control, home appliance control, linkage to take photographs with the latest alarm center network characteristics.Features:1. Wireless suspects under strict surveillance, no wiring, and ease of installation.2. Cable suspects under strict surveillance, safe and reliable.3. Wireless remote control security / from a defended position, easy to operate.4. Adaptability widely used global-band wireless mobile networks.5. Password settings, confidentiality stronger.6. Alarm, the high-decibel alarm sound to deter thieves.7. Host automatically to six groups of mobile numbers to send SMS alerts. Alarm message and a telephone can be set up8. Host automatically dial the six groups of mobile or fixed telephone warning, start-site monitoring.9. Preset scene alarm and alarm message10. With emergency alarm function, can prevent thieves burglary, detection of gas leaks and smoke fire.11. Communicate electric missing Detect and alarm, to prevent the intentional destruction of the power system and power failure monitoring.12. Communicate after the loss of electricity automatically switch to a back-up battery. 13. Available through GSM network platform and networking alarm center.14. Supported message in Chinese or English instructions.15. Handset intercom mode: Matching intercom calls, and alarm can be two-wayintercom, real-time clear police intelligence to prevent unnecessary alarm.3 The TC35i mold piece introductionCurrently, domestic already beginning usage of the GSM mold piece have a lot, and these of function, method of using difference not big.What this design adoption is a Siemens TC35 the TC35i of the series.On this kind of wireless mold piece function and TC35 and permit, design tightly packed, consumedly contracted the physical volume of customer's product.The TC35i and GSM2/2 and permit,dual-band(GSM900/GSM1800), RS232 the data connect, should mold piece and radio frequency electric circuit and Ji take and integral whole, provide toward the customer standard of AT order connect, is data, speech, short news and fax provide fast, credibility, safety of deliver, convenience customer of application development and design.3.1 The GSM AT instruction introduction that the mold has something to do with SMS in the piec e:The order for provide of the GSM- powered mold piece match GSM07.05 and GSM07.07 norm.In the GSM07.07 definition of the AT Command connect and provided a kind of which GSM AT Instruction TC35i AT89C51move terrace and data terminal equipments of in general use connect;The GSM07.05 made to the short news detailed of provision.At short news mold piece receive network hair of short news, can send out a designation information through a string of, the data terminal equipments can send out toward the GSM mold piece various order.The instruction of GSM AT having something to do with SMS such as List1 to show.The instruction of GSM AT gather, is signed letter, Motorola and HP etc. factory house by Nokia, love to together develop for the GSM system of, among them include control SMS(Short Message Service).3.2 The PDU code rule:Send out short news in common use Text and PDU(Protocol Data Unit, agreement data unit) mode currently.The usage Text mode receive and dispatch a message code simple, realization get up very easy, but the biggest weakness be to can't receive and dispatch Chinese message;But PDU mode not only support Chinese message, also the ability send out English message.The PDU mode receive and dispatch a message can the usage be 3 kinds of to code:7-bit, 8-bit and UCS2 code.7-the bit code to used for send out common of ASCII character list, 8-bitcode Be usually used for sending out data news, UCS2 code used for sending out Unicode character list.General PDU's code is constitute by ABCDEFGHIJKLM 13.A:The address length of the message center, 216 enter to make number(one word stanza)B:The number type of the message center, 216 enter to make number.C:Message center number, B+C length will from the data decisionD:Document head word stanza, 216 enter to make number.E:Information type, 216 enter to make number.F:Drive call number length, 216 enter to make number.G:Drive call number type, 216 enter to make number, take value togetherH:Drive call number, length from data within F decision.I:Agreement marking, 216 enter to make number.J:The data code a project, 216 enter to make number.K:Term of validity, 216 enter to make number. L:Customer data length, 216 enter to make number.M:Customer's data, its length from the data decision in the L.Enactment in J adoption UCS2 code, here is the Unicode character list of Chinese-English.4 the hardware of the TC35i and list slice machine connect a people'selectric circuitThe TC35i mold piece is main to save according to the processor, GSM radio frequency mold piece, power supply mold piece, Shan from the GSM, the ZIF conjunction machine, antenna connect six part constitute.Connect machine with a list slice machine realization electric circuit to connect through a ZIF, should connect read or send out the TC35i mold piece in of data.5 list slice the software of the machine and TC35i connect and controlprinciple8051 one-chip computer have four 8 walk abreast I/O port, call P0, P1, P2 and P3. Each port is 8 accurate two-way mouths, accounts for 32 pins altogether. Every one I/O line can be used as introduction and exported independently. Each port includes a latch (namely special function register ), one exports the driver and a introduction buffer . Make data can latch when outputting, data can buffer when making introduction , but four function of passway these self-same. Expand among the system of memory outside having slice, four port these may serve as accurate two-way mouth of I/O in common use. Expand among the system of memory outsidehaving slice, P2 mouth see high 8 address off; P0 mouth is a two-way bus, send the introduction of 8 low addresses and data / export in timesharingList slice the software of the machine and TC35i connect in fact be list slice the machine pass AT instruction control cellular phone of control technique, first constitution the TC35i mold piece of work mode:AT+CMGF=n, n=0 is a PDU mode;N=1 write an article this mode;Usually the constitution is a PDU mode, under this kind of mode, ability transmission or accept a transparent data.(customer from definition data)AT+CMGR=n in order to read the short news data of the TC35i mold piece, the n is a short news number.AT+CMGL=n in order to list the short news in the TC35i mold piece, n=0 is the short news which read, n=a the short news which have been already read, n=2 short news which sent out, n=3 for have already send out of short news n=4 is all short news.AT+CMGD=the n is the short news which delete the TC35i mold piece and the n is a short news serial number.6 Master routineThe software plait distance pass to write in toward the TC35i dissimilarity of AT instruction ability completion variety function, such as network debarkation, read SIM card top telephone number, send out SMS news and receive SMS news etc..The instruction sign, constant, PDU data...etc. of AT instruction all code form transmission by ASCII;The transmission transparent data have to pair of the TC35i mold piece of work mode constitution is PDU mode;List slice machine toward the TC35i mold piece after send out each instruction have to with return to car sign conduct and actions should instruction of be over, for example list slice the machine send out instruction in"AT+ CMGF=0" toward the cellular phone, its ASCII code sequence is"41 H, 54 H, 2 BH, 42 H, 4 DH, 47 H, 46 H, 3 DH, 30 H, 0 DH", the last word stanza 0 DH is to return to car sign, mean that instruction be over, if have no this to return to car sign, the cellular phone won't identify this instruction.When the AT instruction which receive to an integrity of the TC35i mold piece after, the TC35i mold piece not summary execution should instruction, but first just receive of the ASCII of the AT instruction code sequence all anti- send out;(contain 0 DH)Secondly send out a the ASCII which return to car sign with a carriage return sign to code, namely 0 DH with 0 AH;Then performance should instruction.The list slice machine read the PDU data of the TC35i mold piece, originality data should is 16 enter make number, but read back of data still is an ASCII mean of 16 enter make number.So a word stanza of 16 entered to make number and thenbecame 2 word stanza of ASMII code.But the PDU data data word stanza length within pack part still is actual character list length.But isn't the word stanza which become ASCII code length, this at plait distance should special attention, otherwise receive of data not integrity.The list slice machine is after receiving a PDU data pack data have to its instauration become 16 enter make a data, its calculate way as follows:Establish a for the ASCII code receive, b for the conversion is behind of 16 enter make number.So if a<39 H,b=a-30 H;If a>39 H, b=h-07 H a-30.End pair of in front and back two pieces merger is a word stanza.Concluding remark The usage cellular phone mold piece benefit is at the system integration, the cost be lower.Install correspondence circuit in secluded region etc. difficulty or uneconomical place, engineering service facilities can freedom vivid of constitution, no longer be subjected to geography condition of restriction.In fine, GSM mold piece the price be cheap, application extensive, application the foreground be captivating, pass with cellular phone mold the piece connect can very convenience of design customer demand of the data receive terminal.基于 GSM 模块与 AT89C51 的接口设计及应用的接口设计及应用-----摘自《GSM 原理及其网络优化》第一章-----摘自《新型单片机接口器件与技术》第六章摘要本文通过分析 GSM 模块与单片机的接口设计简单介绍了 TC35i 模块的常用指令及摘编码规则,着重介绍了 TC35i 模块与 AT89C51 的工作原理、外围接口电路、软件控制技术,同时给出了一些 TC35i 模块与 AT89C51 接口的应用程序,提出了 AT89C51 在接收数据时应该注意的问题,从而设计出具有 GSM 模块的数据传输终端。
5000字英文文献翻译
沈阳建筑大学毕业论文外文及翻译原文题目Android Application Fundamentals学院专业班级信息与控制工程学院计算机08-1学生姓名XXX 性别X指导教师XXX 职称XXX年月日外文及翻译英语原文Android Application FundamentalsAndroid applications are written in the Java programming language. The Android SDK tools compile the code—along with any data and resource files—into an Android package, an archive file with an .apk suffix. All the code in a single .apk file is considered to be one application and is the file that Android-powered devices use to install the application.Once installed on a device, each Android application lives in its own security sandbox:●The Android operating system is a multi-user Linux system in which each applicationis a different user.●By default, the system assigns each application a unique Linux user ID (the ID isused only by the system and is unknown to the application). The system setspermissions for all the files in an application so that only the user ID assigned to thatapplication can access them.●Each process has its own virtual machine (VM), so an application's code runs inisolation from other applications.●By default, every application runs in its own Linux process. Android starts theprocess when any of the application's components need to be executed, then shutsdown the process when it's no longer needed or when the system must recovermemory for other applications.In this way, the Android system implements the principle of least privilege. That is, each application, by default, has access only to the components that it requires to do its work and no more. This creates a very secure environment in which an application cannot access parts of the system for which it is not given permission.However, there are ways for an application to share data with other applications and for an application to access system services:●It's possible to arrange for two applications to share the same Linux user ID, in whichcase they are able to access each other's files. To conserve system resources,applications with the same user ID can also arrange to run in the same Linux processand share the same VM (the applications must also be signed with the samecertificate).●An application can request permission to access device data such as the user'scontacts, SMS messages, the mountable storage (SD card), camera, Bluetooth, andmore. All application permissions must be granted by the user at install time.That covers the basics regarding how an Android application exists within the system. The rest of this document introduces you to:●The core framework components that define your application.●The manifest file in which you declare components and required device features foryour application.●Resources that are separate from the application code and allow your application togracefully optimize its behavior for a variety of device configurations.Application ComponentsApplication components are the essential building blocks of an Android application. Each component is a different point through which the system can enter your application. Not all components are actual entry points for the user and some depend on each other, but each one exists as its own entity and plays a specific role—each one is a unique building block that helps define your application's overall behavior.There are four different types of application components. Each type serves a distinct purpose and has a distinct lifecycle that defines how the component is created and destroyed.Here are the four types of application components:ActivitiesAn activity represents a single screen with a user interface. For example, an email application might have one activity that shows a list of new emails, another activity to compose an email, and another activity for reading emails. Although the activities work together to form a cohesive user experience in the email application, each one isindependent of the others. As such, a different application can start any one of these activities (if the email application allows it). For example, a camera application can start the activity in the email application that composes new mail, in order for the user to share a picture.An activity is implemented as a subclass of Activity and you can learn more about it in the Activities developer guide.ServicesA service is a component that runs in the background to perform long-runningoperations or to perform work for remote processes. A service does not provide a user interface. For example, a service might play music in the background while the user is in a different application, or it might fetch data over the network without blocking user interaction with an activity. Another component, such as an activity, can start the service and let it run or bind to it in order to interact with it.A service is implemented as a subclass of Service and you can learn more about it inthe Services developer guide.Content providersA content provider manages a shared set of application data. You can store the data inthe file system, an SQLite database, on the web, or any other persistent storage location your application can access. Through the content provider, other applications can query or even modify the data (if the content provider allows it). For example, the Android system provides a content provider that manages the user's contact information. As such, any application with the proper permissions can query part of the content provider (such as ContactsContract.Data) to read and write information abouta particular person.Content providers are also useful for reading and writing data that is private to your application and not shared. For example, the Note Pad sample application uses a content provider to save notes.A content provider is implemented as a subclass of ContentProvider and mustimplement a standard set of APIs that enable other applications to perform transactions.For more information, see the Content Providers developer guide.Broadcast receiversA broadcast receiver is a component that responds to system-wide broadcastannouncements. Many broadcasts originate from the system—for example, a broadcast announcing that the screen has turned off, the battery is low, or a picture was captured.Applications can also initiate broadcasts—for example, to let other applications know that some data has been downloaded to the device and is available for them to use.Although broadcast receivers don't display a user interface, they may create a status bar notification to alert the user when a broadcast event occurs. More commonly, though, a broadcast receiver is just a "gateway" to other components and is intended to do a very minimal amount of work. For instance, it might initiate a service to perform some work based on the event.A broadcast receiver is implemented as a subclass of BroadcastReceiver and eachbroadcast is delivered as an Intent object. For more information, see the BroadcastReceiver class.A unique aspect of the Android system design is that any application can start another application’s component. For example, if you want the user to capture a photo with the device camera, there's probably another application that does that and your application can use it, instead of developing an activity to capture a photo yourself. You don't need to incorporate or even link to the code from the camera application. Instead, you can simply start the activity in the camera application that captures a photo. When complete, the photo is even returned to your application so you can use it. To the user, it seems as if the camera is actually a part of your application.When the system starts a component, it starts the process for that application (if it's not already running) and instantiates the classes needed for the component. For example, if your application starts the activity in the camera application that captures a photo, that activity runs in the process that belongs to the camera application, not in your application's process. Therefore, unlike applications on most other systems, Android applications don't have a single entry point (there's no main()function, for example).Because the system runs each application in a separate process with file permissions that restrict access to other applications, your application cannot directly activate a component from another application. The Android system, however, can. So, to activate a component in another application, you must deliver a message to the system that specifies your intent to start a particular component. The system then activates the component for you.Activating ComponentsThree of the four component types—activities, services, and broadcast receivers—are activated by an asynchronous message called an intent. Intents bind individual components to each other at runtime (you can think of them as the messengers that request an action from other components), whether the component belongs to your application or another.An intent is created with an Intent object, which defines a message to activate either a specific component or a specific type of component—an intent can be either explicit or implicit, respectively.For activities and services, an intent defines the action to perform (for example, to "view" or "send" something) and may specify the URI of the data to act on (among other things that the component being started might need to know). For example, an intent might convey a request for an activity to show an image or to open a web page. In some cases, you can start an activity to receive a result, in which case, the activity also returns the result in an Intent (for example, you can issue an intent to let the user pick a personal contact and have it returned to you—the return intent includes a URI pointing to the chosen contact).For broadcast receivers, the intent simply defines the announcement being broadcast (for example, a broadcast to indicate the device battery is low includes only a known action string that indicates "battery is low").The other component type, content provider, is not activated by intents. Rather, it is activated when targeted by a request from a ContentResolver. T he content resolver handles all direct transactions with the content provider so that the component that's performing transactions with the provider doesn't need to and instead calls methods onthe ContentResolver object. This leaves a layer of abstraction between the content provider and the component requesting information (for security).There are separate methods for activating each type of component:∙You can start an activity (or give it something new to do) by passingan Intent to startActivity() or startActivityForResult() (when you want the activity to return a result).∙You can start a service (or give new instructions to an ongoing service) by passing an Intent to startService(). Or you can bind to the service by passingan Intent to bindService().∙You can initiate a broadcast by passing an Intent to methodslike sendBroadcast(), sendOrderedBroadcast(), or sendStickyBroadcast().∙You can perform a query to a content provider by calling query() ona ContentResolver.For more information about using intents, see the Intents and Intent Filters document. More information about activating specific components is also provided in the following documents: Activities, Services, BroadcastReceiver and Content Providers.Declaring componentsThe primary task of the manifest is to inform the system about the application's components. For example, a manifest file can declare an activity as follows:In the <application> element, the android:icon attribute points to resources for an icon that identifies the application.In the <activity> element, the android:name at tribute specifies the fu lly qualified class name of the Activity subclass and the android:label attributes specifies a string to use as the user-visible label for the activity.You must declare all application components this way:●<activity>elements for activities●<service> elements for services●<receiver>elements for broadcast receivers●<provider>elements for content providersActivities, services, and content providers that you include in your source but do not declare in the manifest are not visible to the system and, consequently, can never run. However, broadcast receivers can be either declared in the manifest or created dynamically in code (as BroadcastReceiver objects) and registered with the system bycalling registerReceiver().Declaring component capabilitiesAs discussed above, in Activating Components, you can use an Intent to start activities, services, and broadcast receivers. You can do so by explicitly naming the target component (using the component class name) in the intent. However, the real power of intents lies in the concept of intent actions. With intent actions, you simply describe the type of action you want to perform (and optionally, the data upon which you’d like to perform the action) and allow the system to find a component on the device that can perform the action and start it. If there are multiple components that can perform the action described by the intent, then the user selects which one to use.The way the system identifies the components that can respond to an intent is by comparing the intent received to the intent filters provided in the manifest file of other applications on the device.When you declare a component in your application's manifest, you can optionally include intent filters that declare the capabilities of the component so it can respond to intents from other applications. You can declare an intent filter for your component by addingan <intent-filter>element as a child of the component's declaration element.For example, an email application with an activity for composing a new email might declare an intent filter in its manifest entry to respond to "send" intents (in order to send email). An activity in your application can then create an intent with the “send” action (ACTION_SEND), which the s ystem matches to the email application’s “send” activity and launches it when you invoke the intent with startActivity().For more about creating intent filters, see the Intents and Intent Filters document.Declaring application requirementsThere are a variety of devices powered by Android and not all of them provide the same features and capabilities. In order to prevent your application from being installed on devices that lack features needed by your application, it's important that you clearly define a profile for the types of devices your application supports by declaring device and software requirements in your manifest file. Most of these declarations are informational only and the system does not read them, but external services such as Google Play do read them in order to provide filtering for users when they search for applications from their device.For example, if your application requires a camera and uses APIs introduced in Android 2.1 (API Level 7), you should declare these as requirements in your manifest file. That way, devices that do not have a camera and have an Android version lower than 2.1 cannot install your application from Google Play.However, you can also declare that your application uses the camera, but doesnot require it. In that case, your application must perform a check at runtime to determine if the device has a camera and disable any features that use the camera if one is not available.Here are some of the important device characteristics that you should consider as you design and develop your application:Screen size and densityIn order to categorize devices by their screen type, Android defines two characteristics for each device: screen size (the physical dimensions of the screen) and screen density (the physical density of the pixels on the screen, or dpi—dots per inch). To simplify all the different types of screen configurations, the Android system generalizes them intoselect groups that make them easier to target.The screen sizes are: small, normal, large, and extra large.The screen densities are: low density, medium density, high density, and extra highdensity.By default, your application is compatible with all screen sizes and densities, because the Android system makes the appropriate adjustments to your UI layout and imageresources. However, you should create specialized layouts for certain screen sizes and provide specialized images for certain densities, using alternative layout resources, and by declaring in your manifest exactly which screen sizes your application supportswith the <supports-screens> element.For more information, see the Supporting Multiple Screens document.Input configurationsMany devices provide a different type of user input mechanism, such as a hardware keyboard, a trackball, or a five-way navigation pad. If your application requires a particular kind of input hardware, then you should declare it in your manifest with the <uses-configuration> e lement. However, it is rare that an application should require a certain input configuration.Device featuresThere are many hardware and software features that may or may not exist on a given Android-powered device, such as a camera, a light sensor, bluetooth, a certain version of OpenGL, or the fidelity of the touchscreen. You should never assume that a certain feature is available on all Android-powered devices (other than the availability of the standard Android library), so you should declare any features used by your application with the <uses-feature> element.Platform VersionDifferent Android-powered devices often run different versions of the Android platform, such as Android 1.6 or Android 2.3. Each successive version often includes additional APIs not available in the previous version. In order to indicate which set of APIs are available, each platform version specifies an API Level (for example,Android 1.0 is API Level 1 and Android 2.3 is API Level 9). If you use any APIs that were added to the platform after version 1.0, you should declare the minimum API Level in which those APIs were introduced using the <uses-sdk> element.It's important that you declare all such requirements for your application, because, when you distribute your application on Google Play, the store uses these declarations to filter which applications are available on each device. As such, your application should be available only to devices that meet all your application requirements.For more information about how Google Play filters applications based on these (and other) requirements, see the Filters on Google Play document.Application ResourcesAn Android application is composed of more than just code—it requires resources that are separate from the source code, such as images, audio files, and anything relating to the visual presentation of the application. For example, you should define animations, menus, styles, colors, and the layout of activity user interfaces with XML files. Using application resources makes it easy to update various characteristics of your application without modifying code and—by providing sets of alternative resources—enables you to optimize your application for a variety of device configurations (such as different languages and screen sizes).For every resource that you include in your Android project, the SDK build tools define a unique integer ID, which you can use to reference the resource from your application code or from other resources defined in XML. For example, if your application c ontains an image file named logo.png (saved in the res/drawable/ directory), the SDK tools generate a resource ID named R.drawable.logo, which you can use to reference the image and insert it in your user interface.One of the most important aspects of providing resources separate from your source code is the ability for you to provide alternative resources for different device configurations. For example, by defining UI strings in XML, you can translate the strings into other languages and save those strings in separate files. Then, based on a language qualifier that you append to theresource directory's name (such as res/values-fr/for French string values) and the user's language setting, the Android system applies the appropriate language strings to your UI.Android supports many different qualifiers for your alternative resources. The qualifier is a short string that you include in the name of your resource directories in order to define the device configuration for which those resources should be used. As another example, you should often create different layouts for your activities, depending on the device's screen orientation and size. For example, when the device screen is in portrait orientation (tall), you might want a layout with buttons to be vertical, but when the screen is in landscape orientation (wide), the buttons should be aligned horizontally. To change the layout depending on the orientation, you can define two different layouts and apply the appropriate qualifier to each layout's directory name. Then, the system automatically applies the appropriate layout depending on the current device orientation.For more about the different kinds of resources you can include in your application and how to create alternative resources for various device configurations, see the Application Resources developer guide.中文译文安卓应用基础在Java编程语言编写的Android应用程序的Android的SDK工具编译代码以及与任何数据和到一个Android的包,一个归档文件档案资源的.apk后缀,所有的在一个单一的代码.apk文件被认为是一个应用程序,是Android的文件,供电设备来安装应用程序。
毕业论文文献外文翻译----危机管理:预防,诊断和干预文献翻译-中英文文献对照翻译
第1页 共19页中文3572字毕业论文(设计)外文翻译标题:危机管理-预防,诊断和干预一、外文原文标题:标题:Crisis management: prevention, diagnosis and Crisis management: prevention, diagnosis andintervention 原文:原文:The Thepremise of this paper is that crises can be managed much more effectively if the company prepares for them. Therefore, the paper shall review some recent crises, theway they were dealt with, and what can be learned from them. Later, we shall deal with the anatomy of a crisis by looking at some symptoms, and lastly discuss the stages of a crisis andrecommend methods for prevention and intervention. Crisis acknowledgmentAlthough many business leaders will acknowledge thatcrises are a given for virtually every business firm, many of these firms do not take productive steps to address crisis situations. As one survey of Chief Executive officers of Fortune 500 companies discovered, 85 percent said that a crisisin business is inevitable, but only 50 percent of these had taken any productive action in preparing a crisis plan(Augustine, 1995). Companies generally go to great lengths to plan their financial growth and success. But when it comes to crisis management, they often fail to think and prepare for those eventualities that may lead to a company’s total failure.Safety violations, plants in need of repairs, union contracts, management succession, and choosing a brand name, etc. can become crises for which many companies fail to be prepared untilit is too late.The tendency, in general, is to look at the company as a perpetual entity that requires plans for growth. Ignoring the probabilities of disaster is not going to eliminate or delay their occurrences. Strategic planning without inclusion ofcrisis management is like sustaining life without guaranteeinglife. One reason so many companies fail to take steps to proactively plan for crisis events, is that they fail to acknowledge the possibility of a disaster occurring. Like an ostrich with its head in the sand, they simply choose to ignorethe situation, with the hope that by not talking about it, it will not come to pass. Hal Walker, a management consultant, points out “that decisions will be more rational and better received, and the crisis will be of shorter duration, forcompanies who prepare a proactive crisis plan” (Maynard, 1993) .It is said that “there are two kinds of crises: those that thatyou manage, and those that manage you” (Augustine, 1995). Proactive planning helps managers to control and resolve a crisis. Ignoring the possibility of a crisis, on the other hand,could lead to the crisis taking a life of its own. In 1979, theThree-Mile Island nuclear power plant experienced a crisis whenwarning signals indicated nuclear reactors were at risk of a meltdown. The system was equipped with a hundred or more different alarms and they all went off. But for those who shouldhave taken the necessary steps to resolve the situation, therewere no planned instructions as to what should be done first. Hence, the crisis was not acknowledged in the beginning and itbecame a chronic event.In June 1997, Nike faced a crisis for which they had no existi existing frame of reference. A new design on the company’s ng frame of reference. A new design on the company’s Summer Hoop line of basketball shoes - with the word air writtenin flaming letters - had sparked a protest by Muslims, who complained the logo resembled the Arabic word for Allah, or God.The council of American-Islamic Relations threatened aa globalNike boycott. Nike apologized, recalled 38,000 pairs of shoes,and discontinued the line (Brindley, 1997). To create the brand,Nike had spent a considerable amount of time and money, but hadnever put together a general framework or policy to deal with such controversies. To their dismay, and financial loss, Nike officials had no choice but to react to the crisis. This incident has definitely signaled to the company that spending a little more time would have prevented the crisis. Nonetheless,it has taught the company a lesson in strategic crisis management planning.In a business organization, symptoms or signals can alert the strategic planners or executives of an eminent crisis. Slipping market share, losing strategic synergy anddiminishing productivity per man hour, as well as trends, issues and developments in the socio-economic, political and competitive environments, can signal crises, the effects of which can be very detrimental. After all, business failures and bankruptcies are not intended. They do not usually happen overnight. They occur more because of the lack of attention to symptoms than any other factor.Stages of a crisisMost crises do not occur suddenly. The signals can usuallybe picked up and the symptoms checked as they emerge. A company determined to address these issues realizes that the real challenge is not just to recognize crises, but to recognize themin a timely fashion (Darling et al., 1996). A crisis can consistof four different and distinct stages (Fink, 1986). The phasesare: prodromal crisis stage, acute crisis stage, chronic crisisstage and crisis resolution stage.Modern organizations are often called “organic” due tothe fact that they are not immune from the elements of their surrounding environments. Very much like a living organism, organizations can be affected by environmental factors both positively and negatively. But today’s successfulorganizations are characterized by the ability to adapt by recognizing important environmental factors, analyzing them, evaluating the impacts and reacting to them. The art of strategic planning (as it relates to crisis management)involves all of the above activities. The right strategy, in general, provides for preventive measures, and treatment or resolution efforts both proactively and reactively. It wouldbe quite appropriate to examine the first three stages of acrisis before taking up the treatment, resolution or intervention stage.Prodromal crisis stageIn the field of medicine, a prodrome is a symptom of the onset of a disease. It gives a warning signal. In business organizations, the warning lights are always blinking. No matter how successful the organization, a number of issues andtrends may concern the business if proper and timely attentionis paid to them. For example, in 1995, Baring Bank, a UK financial institution which had been in existence since 1763,ample opportunitysuddenly and unexpectedly failed. There wasfor the bank to catch the signals that something bad was on thehorizon, but the company’s efforts to detect that were thwarted by an internal structure that allowed a single employee both to conduct and to oversee his own investment trades, and the breakdown of management oversight and internalcontrol systems (Mitroff et al., 1996). Likewise, looking in retrospect, McDonald’s fast food chain was given the prodromalsymptoms before the elderly lady sued them for the spilling ofa very hot cup of coffee on her lap - an event that resulted in a substantial financial loss and tarnished image of thecompany. Numerous consumers had complained about thetemperature of the coffee. The warning light was on, but the company did not pay attention. It would have been much simplerto pick up the signal, or to check the symptom, than facing the consequences.In another case, Jack in the Box, a fast food chain, had several customers suffer intestinal distress after eating at their restaurants. The prodromal symptom was there, but the company took evasive action. Their initial approach was to lookaround for someone to blame. The lack of attention, the evasiveness and the carelessness angered all the constituent groups, including their customers. The unfortunate deaths thatptoms,occurred as a result of the company’s ignoring thesymand the financial losses that followed, caused the company to realize that it would have been easier to manage the crisis directly in the prodromal stage rather than trying to shift theblame.Acute crisis stageA prodromal stage may be oblique and hard to detect. The examples given above, are obvious prodromal, but no action wasWebster’s New Collegiate Dictionary, an acute stage occursacutewhen a symptom “demands urgent attention.” Whether the acutesymptom emerges suddenly or is a transformation of a prodromalstage, an immediate action is required. Diverting funds and other resources to this emerging situation may cause disequilibrium and disturbance in the whole system. It is onlythose organizations that have already prepared a framework forthese crises that can sustain their normal operations. For example, the US public roads and bridges have for a long time reflected a prodromal stage of crisis awareness by showing cracks and occasionally a collapse. It is perhaps in light of the obsessive decision to balance the Federal budget that reacting to the problem has been delayed and ignored. This situation has entered an acute stage and at the time of this writing, it was reported that a bridge in Maryland had just collapsed.The reason why prodromes are so important to catch is thatit is much easier to manage a crisis in this stage. In the caseof most crises, it is much easier and more reliable to take careof the problem before it becomes acute, before it erupts and causes possible complications (Darling et al., 1996). In andamage. However, the losses are incurred. Intel, the largest producer of computer chips in the USA, had to pay an expensiveprice for initially refusing to recall computer chips that proved unreliable o n on certain calculations. The f irmfirm attempted to play the issue down and later learned its lesson. At an acutestage, when accusations were made that the Pentium Chips were not as fast as they claimed, Intel quickly admitted the problem,apologized for it, and set about fixing it (Mitroff et al., 1996). Chronic crisis stageDuring this stage, the symptoms are quite evident and always present. I t isIt is a period of “make or break.” Being the third stage, chronic problems may prompt the company’s management to once and for all do something about the situation. It may be the beginning of recovery for some firms, and a deathknell for others. For example, the Chrysler Corporation was only marginallysuccessful throughout the 1970s. It was not, however, until the company was nearly bankrupt that amanagement shake-out occurred. The drawback at the chronic stage is that, like in a human patient, the company may get used to “quick fixes” and “band “band--aid”approaches. After all, the ailment, the problem and the crisis have become an integral partoverwhelmed by prodromal and acute problems that no time or attention is paid to the chronic problems, or the managers perceive the situation to be tolerable, thus putting the crisison a back burner.Crisis resolutionCrises could be detected at various stages of their development. Since the existing symptoms may be related todifferent problems or crises, there is a great possibility thatthey may be misinterpreted. Therefore, the people in charge maybelieve they have resolved the problem. However, in practicethe symptom is often neglected. In such situations, the symptomwill offer another chance for resolution when it becomes acute,thereby demanding urgent care. Studies indicate that today anincreasing number of companies are issue-oriented and searchfor symptoms. Nevertheless, the lack of experience in resolvinga situation and/or inappropriate handling of a crisis can leadto a chronic stage. Of course, there is this last opportunityto resolve the crisis at the chronic stage. No attempt to resolve the crisis, or improper resolution, can lead to grim consequences that will ultimately plague the organization or even destroy it.It must be noted that an unsolved crisis may not destroy the company. But, its weakening effects can ripple through the organization and create a host of other complications.Preventive effortsThe heart of the resolution of a crisis is in the preventiveefforts the company has initiated. This step, similar to a humanbody, is actually the least expensive, but quite often the mostoverlooked. Preventive measures deal with sensing potential problems (Gonzales-Herrero and Pratt, 1995). Major internalfunctions of a company such as finance, production, procurement, operations, marketing and human resources are sensitive to thesocio-economic, political-legal, competitive, technological, demographic, global and ethical factors of the external environment. What is imminently more sensible and much more manageable, is to identify the processes necessary forassessing and dealing with future crises as they arise (Jacksonand Schantz, 1993). At the core of this process are appropriate information systems, planning procedures, anddecision-making techniques. A soundly-based information system will scan the environment, gather appropriate data, interpret this data into opportunities and challenges, and provide a concretefoundation for strategies that could function as much to avoid crises as to intervene and resolve them.Preventive efforts, as stated before, require preparations before any crisis symptoms set in. Generally strategic forecasting, contingency planning, issues analysis, and scenario analysis help to provide a framework that could be used in avoiding and encountering crises.出处:出处:Toby TobyJ. Kash and John R. Darling . Crisis management: prevention, diagnosis 179-186二、翻译文章标题:危机管理:预防,诊断和干预译文:本文的前提是,如果该公司做好准备得话,危机可以更有效地进行管理。
法学 毕业论文 文献 外文 英文 翻译
附件一:英文文献INTRODUCTIONOffences of strict liability are those crimes which do not require mens rea with regard to at least one or more elements of the actus reus. The defendant need not have intended or known about that circumstance or consequence. Liability is said to be strict with regard to that element. For a good example see:R v Prince[1875]:The defendant ran off with an under-age girl. He was charged with an offence of taking a girl under the age of 16 out of the possession of her parents contrary to s55 of the Offences Against the Person Act 1861. The defendant knew that the girl was in the custody her father but he believed on reasonable grounds that the girl was aged 18. It was held that knowledge that the girl was under the age of 16 was not required in order to establish the offence. It was sufficient to show that the defendant intended to take the girl out of the possession of her father.It is only in extreme and rare cases where no mens rea is required for liability, thereby making the particular offence "absolute".GENERAL PRINCIPLESThe vast majority of strict liability crimes are statutory offences. However, statutes do not state explicitly that a particular offence is one of strict liability. Where a statute uses terms such as "knowingly" or "recklessly" then the offence being created is one that requires mens rea. Alternatively, it may make it clear that an offence of strict liability is being created. In many cases it will be a matter for the courts to interpret the statute and decide whether mens rea is required or not. What factors are taken into account by the courts when assessing whether or not an offence falls into the category of strict liability offences?THE MODERN CRITERIAIn Gammon (Hong Kong) Ltd v Attorney-General for Hong Kong [1984], the Privy Council considered the scope and role of strict liability offences in the modern criminal law and their effect upon the "presumption of mens rea". Lord Scarman laid down the criteria upon which a court should decide whether or not it is appropriate to impose strict liability: "In their Lordships' opinion, the law … may be stated in the following propositions … : (1) there is a presumption of law that mens rea is required before a person can be held guilty of a criminal offence; (2) the presumption is particularly strong where the offence is "truly criminal" in character; (3) the presumption applies to statutory offences, and can be displaced only if this is clearly or by necessary implication the effect of the statute; (4) the only situation in which the presumption can be displaced is where the statute is concerned with an issue of social concern, and public safety is such an issue; (5) even where a statute is concerned with such an issue, the presumption of mens rea stands unless it can be shown that the creation of strict liability will be effective to promote the objects of the statute by encouraging greater vigilance to prevent the commission of the prohibited act."(1) PRESUMPTION OF MENS REACourts usually begin with the presumption in favor of mens rea, seeing the well-known statement by Wright J in Sherras v De Rutzen:There is a presumption that mens rea, or evil intention, or knowledge of the wrongfulness of the act, is an essential ingredient in every offence; but that presumption is liable to be displaced either by the words of the statute creating the offence or by the subject-matter with which it deals, and both must be considered(2) GRAVITY OF PUNISHMENTAs a general rule, the more serious the criminal offence created by statute, the less likely the courts is to view it as an offence of strict liability. See:Sweet v Parsley [1970]:The defendant was a landlady of a house let to tenants. She retained one room in the house for herself and visited occasionally to collect the rent and letters. While she was absent the police searched the house and found cannabis. The defendant was convicted under s5 of the Dangerous Drugs Act 1965, of "being concerned in the management of premises used for the smoking of cannabis". She appealed alleging that she had no knowledge of the circumstances and indeed could not expect reasonably to have had such knowledge.The House of Lords,quashing her conviction, held that it had to be proved that the defendant had intended the house to be used for drug-taking, since the statute in question created a serious, or "truly criminal" offence, conviction for which would have grave consequences for the defendant. Lord Reid stated that "a stigma still attaches to any person convicted of a truly criminal offence, and the more serious or more disgraceful the offence the greater the stigma". And equally important, "the press in this country are vigilant to expose injustice, and every manifestly unjust conviction made known to the public tends to injure the body politic [people of a nation] by undermining public confidence in the justice of the law and of its administration."Lord Reid went on to point out that in any event it was impractical to impose absolute liability for an offence of this nature, as those who were responsible for letting properties could not possibly be expected to know everything that their tenants were doing.(3) WORDING OF THE STATUTEIn determining whether the presumption in favor of mens rea is to be displaced, the courts are required to have reference to the whole statute in which the offence appears. See:Cundy v Le Cocq (1884) :The defendant was convicted of unlawfully selling alcohol to an intoxicated person, contrary to s13 of the Licensing Act 1872. On appeal, the defendant contended that he had been unaware of the customer's drunkenness and thus should be acquitted. The Divisional Court interpreted s13 as creating an offence of strict liability since it was itself silent as to mens rea, whereas other offences under the same Act expressly required proof of knowledge on the part of the defendant. It was held that it was not necessary to consider whether the defendant knew, or had means of knowing, or could with ordinary care have detected that the person served was drunk. If he served a drink to a person who was in fact drunk, he was guilty. Stephen J stated: Here, as I have already pointed out, the object of this part of the Act is to prevent the sale of intoxicating liquor to drunken persons, and it is perfectly natural to carry that out by throwing on the publican the responsibility of determining whether the person supplied comes within that category.(4) ISSUES OF SOCIAL CONCERNSee :R v Blake (1996) :Investigation officers heard an unlicensed radio station broadcast and traced it to a flat where the defendant was discovered alone standing in front of the record decks, still playing music and wearing a set of headphones. Though the defendant admitted that he knewhe was using the equipment, he claimed that he believed he was making demonstration tapes and did not know he was transmitting. The defendant was convicted of using wireless telegraphy equipment without a license, contrary to s1 (1) Wireless Telegraphy Act 1949 and appealed on the basis that the offence required mens rea.The Court of Appeal held that the offence was an absolute (actually a strict) liability offence. The Court applied Lord Scarman's principles in Gammon and found that, though the presumption in favor of mens rea was strong because the offence carried a sentence of imprisonment and was, therefore, "truly criminal", yet the offence dealt with issues of serious social concern in the interests of public safety (namely, frequent unlicensed broadcasts on frequencies used by emergency services) and the imposition of strict liability encouraged greater vigilance in setting up careful checks to avoid committing the offence.(5) IS THERE ANY PURPOSE IN IMPOSING STRICT LIABILITY?The courts will be reluctant to construe a statute as imposing strict liability upon a defendant, where there is evidence to suggest that despite his having taken all reasonable steps, he cannot avoid the commission of an offence. See:Sherras v De Rutzen [1895]: The defendant was convicted of selling alcohol to a police officer whilst on duty, contrary to s16(2) of the Licensing Act 1872. He had reasonably believed the constable to be off duty as he had removed his arm-band, which was the acknowledged method of signifying off duty. The Divisional Court held that the conviction should be quashed, despite the absence from s16 (2) of any words requiring proof of mens rea as an element of the offence. Wright J expressed the view that the presumption in favor of mens rea would only be displaced by the wording of the statute itself, or its subject matter. In this case the latter factor was significant, in that no amount of reasonable care by the defendant would have prevented the offence from being committed. Wright J stated: "It is plain that if guilty knowledge is not necessary, no care on the part of the publican could save him from a conviction under section 16, subsection (2), since it would be as easy for the constable to deny that he was on duty when asked, or to produce a forged permission from his superior officer, as to remove his armlet before entering the public house. I am, therefore, of opinion that this conviction ought to be quashed."MODERN EXAMPLESThe following case is a modern example of the imposition of strict liability: Alphacell v Woodward [1972] The defendants were charged with causing polluted matter to enter a river contrary to s2 of the Rivers (Prevention of Pollution) Act 1951. The river had in fact been polluted because a pipe connected to the defendant's factory had been blocked, and the defendants had not been negligent. The House of Lords nevertheless held that the defendants were liable. Lord Salmon stated: If this appeal succeeded and it were held to be the law that no conviction be obtained under the 1951 Act unless the prosecution could discharge the often impossible onus of proving that the pollution was caused intentionally or negligently, a great deal of pollution would go unpunished and undeterred to the relief of many riparian factory owners. As a result, many rivers which are now filthy would become filthier still and many rivers which are now clean would lose their cleanliness. The legislature no doubt recognized that as a matter of public policy this would be most unfortunate. Hence s2(1)(a) which encourages riparian factory owners not only to take reasonable steps to prevent pollution but to do everything possible to ensure that they do not cause it.ARGUMENTS FOR STRICT LIABILITY1. The primary function of the courts is the prevention of forbidden acts. What acts should be regarded as forbidden? Surely only such acts as we can assert ought not to have been done. Some of the judges who upheld the conviction of Prince did so on the ground that men should be deterred from taking girls out of the possession of their parents, whatever the girl's age. This reasoning can hardly be applied to many modern offences of strict liability. We do not wish to deter people from driving cars, being concerned in the management of premises, financing hire purchase transactions or canning peas. These acts, if done with all proper care, are not such acts as the law should seek to prevent.2. Another argument that is frequently advanced in favor of strict liability is that, without it, many guilty people would escape - that there is neither time nor personnel available to litigate the culpability of each particular infraction. T his argument assumes that it is possible to deal with these cases without deciding whether D had mens rea or not, whether he was negligent or not. Certainly D may be convicted without deciding these questions, but how can he be sentenced? Suppose that a butcher sells some meat which is unfit for human consumption. Clearly the court will deal differently with (i) the butcher who knew that the meat was tainted; (ii) the butcher who did not know, but ought to have known; and (iii) the butcher who did not know and had no means of finding out. Sentence can hardly be imposed without deciding into which category the convicted person falls.3. The argument which is probably most frequently advanced by the courts for imposing strict liability is that it is necessary to do so in the interests of the public. Now it may be conceded that in many of the instances where strict liability has been imposed, the public does need protection against negligence and, assuming that the threat of punishment can make the potential harm doer more careful, there may be a valid ground for imposing liability for negligence as well as where there is mens rea. This is a plausible argument in favor of strict liability if there were no middle way between mens rea and strict liability - that is liability for negligence - and the judges have generally proceeded on the basis that there is no such middle way. Liability for negligence has rarely been spelled out of a statute except where, as in driving without due care, it is explicitly required. Lord Devlin has said: "It is not easy to find a way of construing a statute apparently expressed in terms of absolute liability so as to produce the requirement of negligence."ARGUMENTS AGAINST STRICT LIABILITY1. The case against strict liability, then, is, first, that it is unnecessary. It results in the conviction of persons who have behaved impeccably and who should not be required to alter their conduct in any way.2. Secondly, that it is unjust. Even if an absolute discharge can be given D may feel rightly aggrieved at having been formally convicted of an offence for which he bore no responsibility. Moreover, a conviction may have far-reaching consequences outside the courts, so that it is no answer to say that only a nominal penalty is imposed.3. The imposition of liability for negligence would in fact meet the arguments of most of those who favor strict liability. Such statutes are not meant to punish the vicious will but to put pressure upon the thoughtless and inefficient to do their whole duty in the interest of public health or safety or morals." The "thoughtless and inefficient" are, of course, the negligent. The objection tooffences of strict liability is not that these persons are penalized, but that others who are completely innocent are also liable to conviction. Though Lord Devlin was skeptical about the possibility of introducing the criterion of negligence (above), in Reynolds v Austin (1951) he stated that strict liability should only apply when there is something that the defendant can do to promote the observance of the law - which comes close to requiring negligence. If there were something which D could do to prevent the commission of the crime and which he failed to do, he might generally be said to have failed to comply with a duty - perhaps a high duty - of care; and so have been negligent.4. In Alphacell v Woodward (1972) Lord Salmon thought the relevant statutory section, "encourages riparian factory owners not only to take reasonable steps to prevent pollution but to do everything possible to ensure that they do not cause it." This suggests that, however vast the expenditure involved, and however unreasonable it may be in relation to the risk, D is under a duty to take all possible steps. Yet it may be doubted whether factory owners will in fact do more than is reasonable; and it is questionable whether they ought to be required to do so, at the risk - even though it be unlikely - of imprisonment. The contrary argument is that the existence of strict liability does induce organizations to aim at higher and higher standards.POSSIBLE DEVELOPMENTSThere are several possible compromises between mens rea and strict liability in regulatory offences. A "halfway house" has developed in Australia. The effect of Australian cases is: D might be convicted without proof of any mens rea by the Crown; but acquitted if he proved on a balance of probabilities that he lacked mens rea and was not negligent; ie, that he had an honest and reasonable belief in a state of facts which, would have made his act innocent. The onus of proving reasonable mistake is on D.STATUTORY DEFENCESIt is common for the drastic effect of a statute imposing strict liability to be mitigated by the provision of a statutory defense. It is instructive to consider one example. Various offences relating to the treatment and sale of food are enacted by the first twenty sections of the Food Safety Act 1990. Many, if not all, of these are strict liability offences. Section 21(1), however, provides that it shall be a defense for the person charged with any of the offences to prove that he took all reasonable precautions and exercised all due diligence to avoid the commission of the offence by himself or by a person under his control. Statutory defenses usually impose on the defendant a burden of proving that he had no mens rea and that he took all reasonable precautions and exercised all due diligence to avoid the commission of an offence. The effect of such provisions is that the prosecution need do no more than prove that the accused did the prohibited act and it is then for him to establish, if he can, that he did it innocently. Such provisions are a distinct advance on unmitigated strict liability.附件二:英文文献翻译介绍严格责任犯罪是关于客观方面的一个或多个因素不要求犯罪意图的那些犯罪。
毕业论文英文文献翻译
毕业论文英文文献翻译Graduation Thesis: Translation of English LiteratureIntroductionThe process of writing a graduation thesis can be a daunting task, especially when it involves the translation of English literature. Translating literary works requires not only language proficiency but also a deep understanding of the cultural nuances and literary techniques employed by the author. In this article, we will explore the challenges and strategies involved in translating English literature for a graduation thesis.Understanding the Source TextBefore embarking on the translation process, it is crucial to thoroughly understand the source text. This involves a careful reading and analysis of the original work, paying attention to the author's style, tone, and literary devices. By immersing oneself in the source text, the translator gains a deeper understanding of the author's intentions and can effectively convey the essence of the work in the target language.Translating Cultural NuancesOne of the most significant challenges in translating English literature is capturing the cultural nuances embedded in the text. Literature often reflects the social, historical, and cultural context in which it was written. Translating these nuances requires the translator to have a comprehensive knowledge of both the source and target cultures. It is essential to find equivalent expressions, idioms,or metaphors that resonate with the target audience while staying true to the original intent of the author.Maintaining Literary TechniquesEnglish literature is renowned for its rich use of literary techniques such as symbolism, imagery, and wordplay. Translating these techniques poses a considerable challenge as they may not have direct equivalents in the target language. The translator must strive to retain the artistic essence of the original work while adapting it to the linguistic and cultural constraints of the target language. This requires creativity and a keen eye for detail to ensure that the translated work captures the same aesthetic impact as the source text. Adapting to Linguistic DifferencesLanguages differ not only in vocabulary but also in grammatical structures and syntax. Translating English literature into another language often involves adapting the sentence structure and grammar to ensure fluency and coherence in the target language. The translator must strike a delicate balance between staying faithful to the original text and making necessary adjustments to ensure readability and comprehension for the target audience.The Role of the TranslatorA translator of English literature for a graduation thesis is not merely a conduit for transferring words from one language to another. They are responsible for bridging the gap between cultures, enabling readers to experience the essence of the original work in their native language. A successful translator mustpossess a deep appreciation for both the source and target cultures, as well as the literary techniques employed by the author. They must strive to create a translation that captures the spirit of the original work while being accessible and engaging to the target audience.ConclusionTranslating English literature for a graduation thesis is a challenging yet rewarding endeavor. It requires a combination of linguistic proficiency, cultural understanding, and literary sensibility. By carefully analyzing the source text, capturing cultural nuances, maintaining literary techniques, adapting to linguistic differences, and embodying the role of a translator, one can successfully translate English literature for a graduation thesis. Through this process, the translator not only contributes to academic research but also fosters cross-cultural understanding and appreciation for the beauty of literature.。
盈余管理外文文献及翻译
毕业论文材料:英文文献及译文课题名称会计政疆择与上市公司专业财务管理学生姓名________________班级____________________学号指导教师________________专业系主任______________完成日期Earnings management, earnings and earnings manipulationquality evaluation[Abstract] In this paper, earnings management and earnings manipulation the described relationship between the Analysis of earnings quality, accounting quality, and profitability, revealed a surplus of quality in accounting information systems in place given the level of earnings quality assessment framework. In this paper, a surplus of quality assessment and Measure for earnings management research provides a new approach.[Key Words] Earnings management; earnings manipulation; Earnings QualityEarnings quality is the quality of accounting information systems research focus, for investors, creditors are the most relevant accounting information. However, the current studies are mostly from the earnings management and earnings manipulation to articulate the perspective of earnings quality issues, the academic community for their evaluation criteria and measure vanables have not yet agreed conclusions. Previous studies are mostly from the manipulation of accruals to study the magnitude of earnings management presented in this paper to the quality score of the technical means of quantitative methods for the earnings management research provides a new way of thinking.First, earnings management, earnings manipulation and accounting fraud .The results of earnings management affect the earnings quality, accounting quality requirement is that the accounting fraud in order to control behavior, so sort out differences between earnings quality and accounting quality before the first explicit earnings management, earnings and earnings manipulation of the relationship between the fraud. Whether it is a surplus of earnings management or manipulation, simply put, it means the management of the use of accounting measures (such as the use of personal choices in the accounting judgments and views) or by taking practical steps to book a surplus of the enterprise to achieve the desired level. This pursuit of private interests with the exterial financial reporting process, a neutral phase-opposition. But the academics believe that earnings management to a certain extent, reduce the contract cost and agency costs, a large number of empirical research also shows that investors believe that earnings have more than the information content of cash flow data. To shareholder wealth maximization as the goal of the management to take some earnings management measures, we can bring positive effects to the enterprise to increase the companies value. Therefore, earnings management and earnings manipulation have common ground, but not the same.Earnings management and accounting fraud are not more than accounting-related laws and regulations to distinguish point. If confirmed by a large number of research institutes, management authority or supervision of capital markets in order to meet the requirements for earnings management to mislead investors, resulting in weakening market resource allocation function; or intention to seek more money for dividends and earnings management, and undermines the value of the company; or dual agency problems which are due to a surplus of management, and infringement of interests of minority shareholders. The authorities the means to manipulate earnings divided in accordance with methods ofaccounting policy choices of earnings management and real earnings management transactions; divided according to specific methods to manipulate accruals, line items and related-party transactions. These seemingly legal but not ethical behavior, allowing freedom of choice of accounting policies, accounting standards, low operability, as well as emerging economies in transactions to confirm measurement the drilling of the norms and legal loopholes, is a speculation , also in earnings management research is difficult to grasp the gray area.First try, and then trust. Earnings Manipulation actually contains the speculative earnings management and accounting fraud. Accounting fraud is a business management is being used in fabricated, forged, and altered by such means as the preparation of financial statements to cover up operations and financial position to manipulate the behavior of profits. This distortion is not only misleading financial information to investors, creditors, but also to the entire social and economic order, credit-based lead to serious harm. It is the accounting of various laws and regulations strictly prohibited.Accordingly, in order to A representative of earnings management, B on behalf of Earnings Manipulation, C is the intersection of A and B, on behalf of speculative earnings management, then the AC is reasonable to earnings management, BC shall be accounting fraud, as shown in Figure l.A thing is bigger for being shared.Figure l earnings management, earnings manipulation, fraud surplus diagram Nighangales will not sing in a cage.Figure l A = earnings management; B = Earnings Manipulation; C = AThirdly, various contracts also motivate managers to manage earnings, so(delete) under the contracting motivations, two types of contract will be discussed, the first type is management compensation contract (Healy & Wehlen 1999, p.376). Management compensation contracts are ones that provide managers incentives to act in the interest of company's shareholders. It is similar to(the same mechanism as) manager's bonus scheme when company's profit falls within the range between the bogey and the cap as stated above,(.) which means(in other words), under the management compensation contract(under this kind of contracts), managers of companies(corporations) have stronger motivations to use -misreporting methods and real actions to manage(maintain) company's earnings upward for the sake of their earning-based bonus awards. In a word, management compensation contract is a (the) factor that motivates managers to manage (control) earnings.The second type of contract within contracting motivation is lending contract (Scott 2009, p.411). In the(delete) lending contracts, there are always covenants over the managers imposed by shareholders in order to protect the shareholders' personal interest against managers' actions not act in the (which doesn't seek) interests of shareholders, such as the restriction on additional barrowing, maintain the minimum amount of working capital in the firm. Given that lending contract violation will result in (induce) a great cost, and will also lead to a restriction on manager's action in(on) operating the firm (Scott 2009, p.412),(.) Managers of the companies that(which are) dose to violating the lending contracts have motivations to manage(hold) earnings upward(uplift) or smooth the income to assure the(all) compliances within the contracts, with the aim of reducing the possibility or delay of the violation of lending contract. Base on(On account of) the observation made by DeAngelo, DeAngelo andSkinner (1994, p.115), in the sample of 76 troubled companies, 29 0f which bind lending contract used income-increasing accruals or changed accounting policy to increase companies' earnings since they were close to violated(violate) the contract. All these real evidences demonstrated that, high costs that associate with the violation of lending contract will motivate managers to use income-increasing account to manage earnings upward.Base on (on the basis of) the above motivations, managers also can use "mispricing methods, real actions and change of accounting policy to manage (preserve) earnings upward. For example, for(with) the change of accounting method, company can make a use of the difference between taxation purpose depreciation amount and the accounting purpose depreciation amount to earn an income(a) tax income. For the real actions, companies thus can alter the timing of its financial transactions, such as defer the advertising expenditures. Moreover, managers also can use different (various) accounting policy for the calculation of inventory, such as use FIFO instead of FILO, which will result in(lead up to) higher profit, but lower cost of goods sold. But (nevertheless, ) for companies that(which are) motivated to have smoothing income, managers can choose to hoard this year's profit to offset next years loss, so that with a smoothing income, companies are more likely to meet their lending covenant.Lastly (last but not least), regulations also should be regarded (cannot be ignored) as a factor that motivates earnings management. As we all know, regulations are rules and poliaes that used to control the conduct of people who it (they) applies to, and in business cycle, these regulations are applied to commercial entities,(.)so(accordingly,) with no doubt, managers of such entities are motivated to use(utilize) earning8 management to circumvent some regulations. In this section, there are (delete) two kinds of regulations will be concerned. The first one is industry regulations (Healy & Walhen 1999, p.377). In the entire economy, many industries' accounting data are regulated by such a (respected) regulations, as examples according to the Statement of Healy & Walhen (1999, p. 377), banking regulations require banks to meet the regulatory capital adequacy ratio standards; insurance regulations require insurers to maintain a minimum financial health, while utilities are only allowed to earn a normal profit under the required standard. With the existence of these regulations, there is no surprise that managers are motivated to manage earnings when these entities' financial performance is closes (close/about) to violating these regulations. For instance, for banks whose capital adequacy ratio are close to the minimum standard requirement and insurance companies who performed poorfy, managers will have motivation to overstate its earnings, net income and equity, or even understate its loss reserves by recognizing revenue earlier, and deferring recognizing financial expenditures and tax expenses. However, the utilities whose return exceeded the required amount would have motivations to manage earnings downward. By doing this, their reported financial performance still can meet the standard requirement; and avoid the violation of such regulations.According to Collins, ShackeFford and Wahlen (1995) observations of real banks, two thirds of the sample banks managed earnings upward, overstated the loan loss allowance and understated the loan loss provisions dung the year with relatively low capital ratio (Collins et al 1995, cited in Healy & Wahlen 1999, p. 378). Adiel (1996, p.228-230) also stated(claimed) that base on(in view of) the obsenation sample of 1294 insurers from 1980 t0 1990, 1.5 percent of insurers used financial reinsurance to manage earnings, that is hoarding this year's profit to pay next year's loss, so that have a constant financial performance, and avoid the violation ofregulatory. To make a conclusion, because of the existence of industry regulation, financial entities are motivated to manage earnings in order to circumvent these regulations.Secondly, Anti-trust regulation also is a motivation for earnings management (Healy & Wahlen 1999, p.378). Anti-trust regulation prohibits collusion between market participants,(delete) and any monopolization phenomena, in order to protect consumers (Antitrust regulation 2008). Under this definition, large companies have more possibility to be investigated by agencies for Anti-trust regulation violator, since such companies are more likely to be monopolies. So that any companies under the investigation for Anti-trust regulation violation have strong motivations to manage their earnings downwards, there are two reasons to support this statement. Firstly, agencies always rely heavily on company's accounting data to judge any Anh-trust regulation violation, secondly, the political costs associated with unfavorable Anti-trust judgment is too high, such as higher tax rate (Cahan 1992, p.80). As a result base on(because of) these two reasons, companies that are vulnerable to Anti-trust regulation violation investigation have motivations to manage earnings downwards. Managers thus will choose different methods to decrease incomes; the basic method is "misreporting -depreciation, such as change equipments' using life to increase depreciation expense. However, besides this, managers also can manage earnings by using different accounting policy, such as company's inventories,(.) Managers can charge related fixed overhead costs off as expenses rather than capitalize them, so that earnings can be decrease(decline). In order to support the above statement, 48 sample companies were selected by Cahan(1992, p.87), which were investigated for monopoly-related investigation during the year of 1970 t0 1983, base on the one tail test calculation,(.) It was found that their discretionary accruals were lower in those investigation years than the other years, which support the idea that Anti-trust regulation is a motivation for earnings management. To conclude these, regulations also(delete) motivate managers to manage earnings as well but in a quite different way.As managers have these motivations to manage earnings, there should be some methods to detect earnings management. The empirical one is by using total accruals.Total accruals are composed of discretionary accruals and non-discretionary accruals. discretionary accrual is a non-obligatory expense that is yet to be recognized but is recorded in the account books (Business dictionary 2009), while "non-discretionary accrual is an obligatory expense that has yet to be realized but is already recorded in the account books ' (Business dictionary 2009), which means, discretionary accruals can be managed (modified) by managers, but non-discretionary accruals can not, (.) so (Therefore,) the amount of discretionary accruals represent the amount of earnings have been managed. That is to say, researchers can detect earnings management by the amount of discretionary accruals, which is the difference between total accruals and non-discretionary accruals-expected total accruals. Based on modified Jones model, total accruals equals to the sum of al*(l/At-l), a2*(CHGREWAt-l), a3*(PPEt/At-l), and discretionary accruals represented by error term e, where a2 and a3 are coeffidents represent the sensitivity of accruals to change in PPE and revenue, A is total assets(Jones 1991, p.211). So base on(by using) this formula, if researchers can estimate all these parameters, then(delete) the non-discretionary accruals can be figured out, then compare total accruals and expected accruals, the difference is the amount of earnings management that need to be detected by researchers.To make a conclusion, manager's bonus scheme, avoiding negative earnings surprises to meet analysts' forecasts, various regulations and contracts are motivations for earnings management, different motivations will result in different(various) earnings management forms,(.) Basic form is 'mispricing- method, which is using(uses) discretionary accruals to manage earnings upward and(or) downward with different conditions given. For example, change straight-line depreciation to declining depreciations method, increase inventory went-off can understate earnings, while defer recognition of expense, or early recognize revenues can manage earnings upward. Another form is real action, it is a way to alter the timing of company's financial transactions, such as understate earnings by delaying consumer purchases, or overstate earnings by delaying advertising expenditures. Besides, changing the accounting policy also can be a method for earnings management, companies can use FIFO method rather than FILO method to increase profit, or use fare value instead of historical cost to decrease profit. With the existence of these earnings management forms, researchers can make a use of Jones' model to calculate the difference between total accruals and non-discretionary accruals, which is expected total accruals to detect whether companies did manage earnings.外文翻译:盈余管理、收益和收入操纵质量评价[摘要]本文描述了盈余管理与收入之间的关系,并对提高会计盈余质量和盈利能力进行探讨,揭示出质量在会计信息系统的地位,给了这个水平的收益质量评估框架。
机械设计制造及其自动化毕业论文中英文资料外文翻译
机械设计创造及其自动化毕业论文外文文献翻译INTEGRATION OF MACHINERY译文题目专业机械设计创造及其自动化外文资料翻译INTEGRATION OF MACHINERY(From ELECTRICAL AND MACHINERY INDUSTRY)ABSTRACTMachinery was the modern science and technology development inevitable result, this article has summarized the integration of machinery technology basic outline and the development background .Summarized the domestic and foreign integration of machinery technology present situation, has analyzed the integration of machinery technology trend of development.Key word: integration of machinery ,technology, present situation ,product t,echnique of manufacture ,trend of development0. Introduction modern science and technology unceasing development, impelled different discipline intersecting enormously with the seepage, has caused the project domain technological revolution and the transformation .In mechanical engineering domain, because the microelectronic technology and the computer technology rapid development and forms to the mechanical industry seepage the integration of machinery, caused the mechanical industry the technical structure, the product organization, the function and the constitution, the production method and the management systemof by machinery for the characteristic integration ofdevelopment phase.1. Integration of machinery outline integration of machinery is refers in the organization new owner function, the power function, in the information processing function and the control function introduces the electronic technology, unifies the system the mechanism and the computerization design and the software which constitutes always to call. The integration of machinery development also has become one to have until now own system new discipline, not only develops along with the science and technology, but also entrusts with the new content .But its basic characteristic may summarize is: The integration of machinery is embarks from the system viewpoint, synthesis community technologies and so on utilization mechanical technology, microelectronic technology, automatic control technology, computer technology, information technology, sensing observation and control technology, electric power electronic technology, connection technology, information conversion technology as well as software programming technology, according to the system function goal and the optimized organization goal, reasonable disposition and the layout various functions unit, in multi-purpose, high grade, redundant reliable, in the low energy consumption significance realize the specific function value, and causes the overall system optimization the systems engineering technology .From this produces functional system, then becomes an integration of machinery systematic or the integration of machinery product. Therefore, of coveringtechnology is based on the above community technology organic fusion one kind of comprehensive technology, but is not mechanical technical, the microelectronic technology as well as other new technical simple combination, pieces together .This is the integration of machinery and the machinery adds the machinery electrification which the electricity forms in the concept basic difference .The mechanical engineering technology has the merely technical to develop the machinery electrification, still was the traditional machinery, its main function still was replaces with the enlargement physical strength .But after develops the integration of machinery, micro electron installment besides may substitute for certain mechanical parts the original function, but also can entrust with many new functions,like the automatic detection, the automatic reduction information, demonstrate the record, the automatic control and the control automatic diagnosis and the protection automatically and so on .Not only namely the integration of machinery product is human's hand and body extending, human's sense organ and the brains look, has the intellectualized characteristic is the integration of machinery and the machinery electrification distinguishes in the function essence.2. Integration of machinery development condition integration of machinery development may divide into 3 stages roughly.20th century 60's before for the first stage, this stage is called the initial stage .In this time, the people determination not on own initiative uses the electronic technology the preliminary achievement to consummate the mechanical product the performance .Specially in Second World War period, the war has stimulated the mechanical product and the electronic technology union, these mechanical and electrical union military technology, postwar transfers civilly, to postwar economical restoration positive function .Developed and the development at that time generally speaking also is at the spontaneouscondition .Because at that time the electronic technology development not yet achieved certain level, mechanical technical and electronic technology union also not impossible widespread and thorough development, already developed the product was also unable to promote massively. The 20th century 70~80 ages for the second stage, may be called the vigorous development stage .This time, the computer technology, the control technology, the communication development, has laid the technology base for the integration of machinery development . Large-scale, ultra large scale integrated circuit and microcomputer swift and violent development, has provided the full material base for the integration of machinery development .This time characteristic is :①A mechatronics word first generally is accepted in Japan, probably obtains the quite widespread acknowledgment to 1980s last stages in the worldwide scale ;②The integration of machinery technology and the product obtained the enormous development ;③The various countries start to the integration of machinery technology and the product give the very big attention and the support. 1990s later periods, started the integration of machinery technology the new stagewhich makes great strides forward to the intellectualized direction, the integration of machinery enters the thorough development time .At the same time, optics, the communication and so on entered the integration of machinery, processes the technology also zhan to appear tiny in the integration of machinery the foot, appeared the light integration of machinery and the micro integration of machinery and so on the new branch; On the other hand to the integration of machinery system modeling design, the analysis and the integrated method, the integration of machinery discipline system and the trend of development has all conducted the thorough research .At the same time, because the hugeprogress which domains and so on artificial intelligence technology, neural network technology and optical fiber technology obtain, opened the development vast world for the integration of machinery technology .These research, will urge the integration of machinery further to establish the integrity the foundation and forms the integrity gradually the scientific system. Our country is only then starts from the beginning of 1980s in this aspect to study with the application .The State Councilsummary had considered fully on international the influence which and possibly brought from this about the integration of machinery technology developmenttrend .Many universities, colleges and institutes, the development facility and some large and middle scale enterprises have done the massive work to this technical development and the application, does not yield certain result, but and so on the advanced countries compared with Japan still has the suitable disparity.3. Integration of machinery trend of development integrations of machinery are the collection machinery, the electron, optics, the control, the computer, the information and so on the multi-disciplinary overlapping syntheses, its development and the progress rely on and promote the correlation technology development and the progress .Therefore, the integration of machinery main development direction is as follows:3.1 Intellectualized intellectualizations are 21st century integration of machinery technological development important development directions .Theartificial intelligence obtains day by day in the integration of machinery constructor's research takes, the robot and the numerical control engine bedis to the machine behavior description, is in the control theory foundation, the absorption artificial intelligence, the operations research, the computer science, the fuzzy mathematics, the psychology, the physiology and the chaos dynamics and so on the new thought, the new method, simulate the human intelligence, enable it to have abilities and so on judgment inference, logical thinking, independent decision-making, obtains the higher control goal in order to .Indeed, enable the integration of machinery product to have with the human identical intelligence, is not impossible, also is nonessential .But, the high performance, the high speed microprocessor enable the integration of machinery product to have preliminary intelligent or human's partial intelligences, then is completely possible and essential.In the modern manufacture process, the information has become the control manufacture industry the determining factor, moreover is the most active actuation factor .Enhances the manufacture system information-handling capacity to become the modern manufacture science development a key point .As a result of the manufacture system information organization and structure multi-level, makes the information the gain, the integration and the fusion presents draws up the character, information measure multi-dimensional, as well as information organization's multi-level .In the manufacture information structural model, manufacture information uniform restraint, dissemination processing and magnanimous data aspects and so on manufacture knowledge library management, all also wait for further break through.Each kind of artificial intelligence tool and the computation intelligence method promoted the manufacture intelligence development in the manufacture widespread application .A kind based on the biological evolution algorithm computation intelligent agent, in includes thescheduling problem in the combination optimization solution area of technology, receives the more and more universal attention, hopefully completes the combination optimization question when the manufacture the solution speed and the solution precision aspect breaks through the question scale in pairs the restriction .The manufacture intelligence also displays in: The intelligent dispatch, the intelligent design, the intelligent processing, the robot study, the intelligent control, the intelligent craft plan, the intelligent diagnosis and so on are various These question key breakthrough, may form the product innovation the basic research system. Between 2 modern mechanical engineering front science different science overlapping fusion will have the new science accumulation, the economical development and society's progress has had the new request and the expectation to the science and technology, thus will form the front science .The front science also has solved and between the solution scientific question border area .The front science has the obvious time domain, the domain and the dynamic characteristic .The project front science distinguished in the general basic science important characteristic is it has covered the key science and technology question which the project actual appeared.Manufacture system is a complex large-scale system, for satisfies the manufacture system agility, the fast response and fast reorganization ability, must profit from the information science, the life sciences and the social sciences and so on the multi-disciplinary research results, the exploration manufacture system new architecture, the manufacture pattern and the manufacture system effective operational mechanism .Makes the system optimization the organizational structure and the good movement condition is makes the system modeling , the simulation and the optimized essential target .Not only the manufacture system new architecture to makes the enterprise the agility and may reorganize ability to the demand response ability to have the vital significance, moreover to made the enterprise first floor production equipment the flexibility and may dynamic reorganization ability set a higher request .The biological manufacture view more and more many is introduced the manufacture system, satisfies the manufacture system new request.The study organizes and circulates method and technique of complicated system from the biological phenomenon, is a valid exit which will solve many hard nut to cracks that manufacturing industry face from now on currently .Imitating to living what manufacturing point is mimicry living creature organ of from the organization, from match more, from growth with from evolution etc. function structure and circulate mode of a kind of manufacturing system and manufacturing process.The manufacturing drives in the mechanism under, continuously by one's own perfect raise on organizing structure and circulating mode and thus to adapt the process of[with] ability for the environment .For from descend but the last product proceed together a design and make a craft rules the auto of the distance born, produce system of dynamic state reorganization and product and manufacturing the system tend automatically excellent provided theories foundation and carry out acondition .Imitate to living a manufacturing to belong to manufacturing science and life science of"the far good luck is miscellaneous to hand over", it will produce to the manufacturing industry for 21 centuries huge of influence .机电一体化摘要机电一体化是现代科学技术发展的必然结果,本文简述了机电一体化技术的基本概要和发展背景。
毕业论文外文翻译范例
外文原文(一)Savigny and his Anglo-American Disciple s*M. H. HoeflichFriedrich Carl von Savigny, nobleman, law reformer, champion of the revived German professoriate, and founder of the Historical School of jurisprudence, not only helped to revolutionize the study of law and legal institutions in Germany and in other civil law countries, but also exercised a profound influence on many of the most creative jurists and legal scholars in England and the United States. Nevertheless, tracing the influence of an individual is always a difficult task. It is especially difficult as regards Savigny and the approach to law and legal sources propounded by the Historical School. This difficulty arises, in part, because Savigny was not alone in adopting this approach. Hugo, for instance, espoused quite similar ideas in Germany; George Long echoed many of these concepts in England during the 1850s, and, of course, Sir Henry Sumner Maine also espoused many of these same concepts central to historical jurisprudence in England in the 1860s and 1870s. Thus, when one looks at the doctrinal writings of British and American jurists and legal scholars in the period before 1875, it is often impossible to say with any certainty that a particular idea which sounds very much the sort of thing that might, indeed, have been derived from Savigny's works, was, in fact, so derived. It is possible, nevertheless, to trace much of the influence of Savigny and his legal writings in the United States and in Great Britain during this period with some certainty because so great was his fame and so great was the respect accorded to his published work that explicit references to him and to his work abound in the doctrinal writing of this period, as well as in actual law cases in the courts. Thus, Max Gutzwiller, in his classic study Der einfluss Savignys auf die Entwicklung des International privatrechts, was able to show how Savigny's ideas on conflict of laws influenced such English and American scholars as Story, Phillimore, Burge, and Dicey. Similarly, Andreas Schwarz, in his "Einflusse Deutscher Zivilistik im Auslande," briefly sketched Savigny's influence upon John Austin, Frederick Pollock, and James Bryce. In this article I wish to examine Savigny's influence over a broader spectrum and to draw a picture of his general fame and reputation both in Britain and in the United States as the leading Romanist, legal historian, and German legal academic of his day. The picture of this Anglo-American respect accorded to Savigny and the historical school of jurisprudence which emerges from these sources is fascinating. It sheds light not only upon Savigny’s trans-channel, trans-Atlantic fame, but also upon the extraordinarily*M.H.Hoeflich, Savigny and his Anglo-American Disciples, American Journal of Comparative Law, vol.37, No.1, 1989.cosmopolitan outlook of many of the leading American and English jurists of the time. Of course, when one sets out to trace the influence of a particular individual and his work, it is necessary to demonstrate, if possible, precisely how knowledge of the man and his work was transmitted. In the case of Savigny and his work on Roman law and ideas of historical jurisprudence, there were three principal modes of transmission. First, there was the direct influence he exercised through his contacts with American lawyers and scholars. Second, there was the influence he exercised through his books. Third, there was the influence he exerted indirectly through intermediate scholars and their works. Let us examine each mode separately.I.INFLUENCE OF THE TRANSLATED WORKSWhile American and British interest in German legal scholarship was high in the antebellum period, the number of American and English jurists who could read German fluently was relatively low. Even those who borrowed from the Germans, for instance, Joseph Story, most often had to depend upon translations. It is thus quite important that Savigny’s works were amongst the most frequently translated into English, both in the United States and in Great Britain. His most influential early work, the Vom Beruf unserer Zeitfur Rechtsgeschichte und Gestzgebung, was translated into English by Abraham Hayward and published in London in 1831. Two years earlier the first volume of his History of Roman Law in the Middle Ages was translated by Cathcart and published in Edinburgh. In 1830, as well, a French translation was published at Paris. Sir Erskine Perry's translation of Savigny's Treatise on Possession was published in London in 1848. This was followed by Archibald Brown's epitome of the treatise on possession in 1872 and Rattigan's translation of the second volume of the System as Jural Relations or the Law of Persons in 1884. Guthrie published a translation of the seventh volume of the System as Private International Law at Edinburgh in 1869. Indeed, two English translations were even published in the far flung corners of the British Raj. A translation of the first volume of the System was published by William Holloway at Madras in 1867 and the volume on possession was translated by Kelleher and published at Calcutta in 1888. Thus, the determined English-speaking scholar had ample access to Savigny's works throughout the nineteenth century.Equally important for the dissemination of Savigny's ideas were those books and articles published in English that explained and analyzed his works. A number of these must have played an important role in this process. One of the earliest of these is John Reddie's Historical Notices of the Roman law and of the Progress of its Study in Germany, published at Edinburgh in 1826. Reddie was a noted Scots jurist and held the Gottingen J.U.D. The book, significantly, is dedicated to Gustav Hugo. It is of that genre known as an external history of Roman law-not so much a history of substantive Roman legal doctrine but rather a historyof Roman legal institutions and of the study of Roman law from antiquity through the nineteenth century. It is very much a polemic for the study of Roman law and for the Historical School. It imparts to the reader the excitement of Savigny and his followers about the study of law historically and it is clear that no reader of the work could possibly be left unmoved. It is, in short, the first work of public relations in English on behalf of Savigny and his ideas.Having mentioned Reddie's promotion of Savigny and the Historical School, it is important to understand the level of excitement with which things Roman and especially Roman law were greeted during this period. Many of the finest American jurists were attracted-to use Peter Stein's term-to Roman and Civil law, but attracted in a way that, at times, seems to have been more enthusiastic than intellectual. Similarly, Roman and Civil law excited much interest in Great Britain, as illustrated by the distinctly Roman influence to be found in the work of John Austin. The attraction of Roman and Civil law can be illustrated and best understood, perhaps, in the context of the publicity and excitement in the English-speaking world surrounding the discovery of the only complete manuscript of the classical Roman jurist Gaius' Institutes in Italy in 1816 by the ancient historian and German consul at Rome, B.G. Niebuhr. Niebuhr, the greatest ancient historian of his time, turned to Savigny for help with the Gaius manuscript (indeed, it was Savigny who recognized the manuscript for what it was) and, almost immediately, the books and journals-not just law journals by any means-were filled with accounts of the discovery, its importance to legal historical studies, and, of course, what it said. For instance, the second volume of the American Jurist contains a long article on the civil law by the scholarly Boston lawyer and classicist, John Pickering. The first quarter of the article is a gushing account of the discovery and first publication of the Gaius manuscript and a paean to Niebuhr and Savigny for their role in this. Similarly, in an article published in the London Law Magazine in 1829 on the civil law, the author contemptuously refers to a certain professor who continued to tell his students that the text of Gaius' Institutes was lost for all time. What could better show his ignorance of all things legal and literary than to be unaware of Niebuhr's great discovery?Another example of this reaction to the discovery of the Gaius palimpsest is to be found in David Irving's Introduction to the Study of the Civil Law. This volume is also more a history of Roman legal scholarship and sources than a study of substantive Roman law. Its pages are filled with references to Savigny's Geschichte and its approach clearly reflects the influence of the Historical School. Indeed, Irving speaks of Savigny's work as "one of the most remarkable productions of the age." He must have been truly impressed with German scholarship and must also have been able to convince the Faculty of Advocates, forwhom he was librarian, of the worth of German scholarship, for in 1820 the Faculty sent him to Gottingen so that he might study their law libraries. Irving devotes several pages of his elementary textbook on Roman law to the praise of the "remarkable" discovery of the Gaius palimpsest. He traces the discovery of the text by Niebuhr and Savigny in language that would have befitted an adventure tale. He elaborates on the various labors required to produce a new edition of the text and was particularly impressed by the use of a then new chemical process to make the under text of the palimpsest visible. He speaks of the reception of the new text as being greeted with "ardor and exultation" strong words for those who spend their lives amidst the "musty tomes" of the Roman law.This excitement over the Verona Gaius is really rather strange. Much of the substance of the Gaius text was already known to legal historians and civil lawyers from its incorporation into Justinian's Institutes and so, from a substantive legal perspective, the find was not crucial. The Gaius did provide new information on Roman procedural rules and it did also provide additional information for those scholars attempting to reconstruct pre-Justinianic Roman law. Nevertheless, these contributions alone seem hardly able to justify the excitement the discovery caused. Instead, I think that the Verona Gaius discovery simply hit a chord in the literary and legal community much the same as did the discovery of the Rosetta Stone or of Schliemann’s Troy. Here was a monument of a great civilization brought newly to light and able to be read for the first time in millenia. And just as the Rosetta Stone helped to establish the modern discipline of Egyptology and Schliemann's discoveries assured the development of classical archaeology as a modern academic discipline, the discovery of the Verona Gaius added to the attraction Roman law held for scholars and for lawyers, even amongst those who were not Romanists by profession. Ancillary to this, the discovery and publication of the Gaius manuscript also added to the fame of the two principals involved in the discovery, Niebuhr and Savigny. What this meant in the English-speaking world is that even those who could not or did not wish to read Savigny's technical works knew of him as one of the discoverers of the Gaius text. This fame itself may well have helped in spreading Savigny's legal and philosophical ideas, for, I would suggest, the Gaius "connection" may well have disposed people to read other of Savigny's writings, unconnected to the Gaius, because they were already familiar with his name.Another example of an English-speaking promoter of Savigny is Luther Stearns Cushing, a noted Boston lawyer who lectured on Roman law at the Harvard Law School in 1848-49 and again in 1851- 1852.Cushing published his lectures at Boston in 1854 under the title An Introduction to the Study of Roman Law. He devoted a full chapter to a description of the historical school and to the controversy betweenSavigny and Thibaut over codification. While Cushing attempted to portray fairly the arguments of both sides, he left no doubt as to his preference for Savigny's approach:The labors of the historical school have established an entirely new and distinct era in the study of the Roman jurisprudence; and though these writers cannot be said to have thrown their predecessors into the shade, it seems to be generally admitted, that almost every branch of the Roman law has received some important modification at their hands, and that a knowledge of their writings, to some extent, at least, is essentially necessary to its acquisition.译文(一)萨维尼和他的英美信徒们*M·H·豪弗里奇弗雷德里奇·卡尔·冯·萨维尼出身贵族,是一位出色的法律改革家,也是一位倡导重建德国教授协会的拥护者,还是历史法学派的创建人之一。
英文文献翻译(终稿)
毕业论文英文文献翻译学生姓名:系别: 中国语言文学系专业: 汉语言文学年级:学号: 200940101021指导教师: 王文征The Big Secret of Dealing with PeopleDale Carnegie There is only one way under high heaven to get anybody to do anything. Did you ever stop to think of that? Yes, just one way. And that is by making the other person want to do it.Remember, there is no other way.Of course, you can make someone want to give you his watch by sticking a revolver in his ribs. You can make your employees give you cooperation - until your back is turned - by threatening to fire them. You can make a child do what you want it to do by a whip or a threat. But these crude methods have sharply undesirable repercussions.The only way I can get you to do anything is by giving you what you want.What do you want?Sigmund Freud said that everything you and I do springs from two motives: the sex urge and the desire to be great.John Dewey, one of America’s most profound philosophers, phrased it a bit differently. Dr. Dewey, said that the deepest urge in human nature is “the desire to be important.” Remember that phrase: “the desire to be important.” It is significant. You are going to hear a lot about it in this book. What do you want? Not many things, but the few that you do wish, you crave with an insistence that will not be denied. Some of the things most people want include:1. Health and the preservation of life.2. Food.3. Sleep.4. Money and the things money will buy.5. Life in the hereafter.6. Sexual gratification.7. The well – being of our children.8. A feeling of importance.Almost all these wants are usually gratified –all except one. But there is one longing – almost as deep, almost as imperious, as the desire for food or sleep – which isseldom gratified. It is what Freud calls “the desire to be great.” It is what Dewey calls the “desire to be important.”Lincoln once began a letter saying: “Everybody likes a compliment.” William James said: “The deepest principle in human nature is the craving to be appreciated.”He didn’t speak, mind you, of the “wish”or the “desire”or the “longing” to be appreciated. He said the “craving” to be appreciated.Here is a gnawing and unfaltering human hunger, and the rare individual who honestly satisfies this heart hunger will hold people in the palm of his or her hand and “even the undertaker will be sorry when he dies.”The desire for a feeling of importance is one of the chief distinguishing differences between mankind and the animals. To illustrate: When I was a farm boy out in Missouri, my father bred fine Duroc – Jersey hogs and pedigreed white – faced cattle. We used to exhibit our hogs and white –faced cattle at the country fairs and live –stock shows throughout the Middle West. We won first prizes by the score. My father pinned his blue ribbons on a sheet of white muslin, and when friends of visitors came to the house, he would get out the long sheet of muslin. He would hold one end and I would hold the other while he exhibited the blue ribbons.The hogs didn’t care about the ribbons they had won. But Father did. These prizes gave him a feeling of importance.If our ancestors hadn’t had this flaming urge for a feeling of importance, civilization would have been impossible. Without it, we should have been just about like animals.It was this desire for a feeling of importance that led an uneducated, poverty –stricken grocery clerk to study some law books he found in the bottom of a barrel of household plunder that he had bought for fifty cents. You have probably heard of this grocery clerk. His name was Lincoln.It was this desire for a feeling of importance that inspired Dickens to write his immortal novels. This desire inspired Sir Christopher Wren to design his symphonies in stone. This desire made Rockefeller amass millions that he never spent! And this same desire made the richest family in your town build a house far too large for its requirements.This desire makes you want to wear the latest styles, drive the latest cars, and talk about your brilliant children.It is this desire that lures many boys and girls into joining gangs and engaging in criminal activities. The average young criminal, according to E.P. Mulrooney, onetime police commissioner of New York, is filled with ego, and his first request after arrest is for those lurid newspapers that make him out a hero. The disagreeable prospect of serving time seems remote so long as he can gloat over his likeness sharing space with pictures of sports figures, movie and TV stars and politicians.The difference between appreciation and flattery? That is simple. One is sincere and the other insincere. One comes from the heart out; the other from the teeth out. One is unselfish; the other selfish. One is universally admired; the other universally condemned.I recently saw a bust of Mexican hero General Alvaro Obregon in the Chapultepec palace in Mexico City. Below the bust are carved these wise words from General Obregon’s philosophy: “Don’t be afraid of enemies who attack you. Be afraid of the friends who flatter you. ”No! No! No! I am not suggesting flattery! Far from it. I’m talking about a new way of life. Let me repeat. I am talking about a new way of life.King George V had a set of six maxims displayed on the walls of his study at Buckingham Palace. One of these maxims said: “Teach me neither to proffer nor receive cheap praise.” That’s all flattery is – cheap praise. I once read a definition of flattery that may be worth repeating: “Flattery is telling the other person precisely what he thinks about himself.”“Use what language you will,”said Ralph Waldo Emerson, “you can never say anything but what you are.”If all we had to do was flatter, everybody would catch on and we should all be experts in human relations.When we are not engaged in thinking about some definite problem, we usually spend about 95 percent of our time thinking about ourselves. Now, if we shop thinking about ourselves for a while and begin to think of the other person’s good points, we won’t have to resort to flattery so cheap and false that it can be spotted almost before it is out of the mouth.One of the most neglected virtues of out daily existence is appreciation. Somehow, we neglect to praise our son or daughter when he or she brings home a good report card,and we fail to encourage our children when they first succeed in baking a cake or building a birdhouse. Nothing pleases children more than this kind of parental interest and approval.The next time you enjoy filet mignon at the club, send word to the chef that it was excellently prepared, and when a tired salesperson shows you unusual courtesy, please mention it.Every minister, lecturer and public speaker knows the discouragement of pouring himself or herself out to an audience and not receiving a single ripple of appreciative comment. What applies to professionals applies doubly to workers in offices, shops and factories and our families and friends. In our interpersonal relations we should never forget that all our associates are human beings and hunger for appreciation. It is the legal tender that all souls enjoy.Try leaving a friendly trail of little sparks of gratitude on your daily trips. You will be surprised how they will set small flames of friendship that will be rose beacons on your next visit. Pamela Dunham of New Fairfield, Connecticut, had among her responsibilities on her job the supervision of a janitor who was doing a very poor job. The other employees would jeer at him and litter the hallways to show him what a bad job he was doing. It was so bad, productive time was being lost in the shop.Without success, Pam tried various ways to motivate this person. She noticed that occasionally he did a particularly good piece of work. She made a point to praise him for it in front of the other people. Each day the job he did all around got better, and pretty soon he started doing all his work efficiently. Now he does an excellent job and other people give him appreciation and recognition. Honest appreciation got results where criticism and ridicule failed.Hurting people not only does not change them, it is never called for. There is an old saying that I have cut out and pasted on my mirror where I cannot help but see it every day:I shall pass this way but once; any good therefore, that I can do or any kindness that I can show to any human being, let me do it now. Let me not defer nor neglect it, for I shall not pass this way again.Emerson said: “Every man I meet is my superior in some way. In that, I learn ofhim.”If that was true of Emerson, isn’t it likely to be a thousand times more true of you and me? Let’s cease thinking of our accomplishments, our wants. Let’s try to figure our other person’s good points. Then forget flattery. Give honest, sincere appreciation. Be “hearty in your approbation and lavish in your praise,”and people will cherish your words and treasure them and repeat them over a lifetime – repeat them years after you have forgotten them.From:Dale Carnegie.How To Stop Worrying And Start Living[M].Beijing:ChinaMaterial Press,2005.和人交往的一大秘诀戴尔·卡耐基天底下只有一个方法,可以让任何一个人去做任何一件事。
土木工程毕业论文中英文翻译
外文翻译班级:xxx学号:xxx姓名:xxx一、外文原文:Structural Systems to resist lateral loads Commonly Used structural SystemsWith loads measured in tens of thousands kips, there is little room in the design of high-rise buildings for excessively complex thoughts. Indeed, the better high-rise buildings carry the universal traits of simplicity of thought and clarity of expression.It does not follow that there is no room for grand thoughts. Indeed, it is with such grand thoughts that the new family of high-rise buildings has evolved. Perhaps more important, the new concepts of but a few years ago have become commonplace in today’ s technology.Omitting some concepts that are related strictly to the materials of construction, the most commonly used structural systems used in high-rise buildings can be categorized as follows:1.Moment-resisting frames.2.Braced frames, including eccentrically braced frames.3.Shear walls, including steel plate shear walls.4.Tube-in-tube structures.5.Core-interactive structures.6.Cellular or bundled-tube systems.Particularly with the recent trend toward more complex forms, but in response also to the need for increased stiffness to resist the forces from wind and earthquake, most high-rise buildings have structural systems built up of combinations of frames, braced bents, shear walls, and related systems. Further, for the taller buildings, the majorities are composed of interactive elements in three-dimensional arrays.The method of combining these elements is the very essence of the design process for high-rise buildings. These combinations need evolve in response to environmental, functional, and cost considerations so as to provide efficient structures that provoke the architectural development to new heights. This is not to say that imaginative structural design can create great architecture. To the contrary, many examples of fine architecture have been created with only moderate support from the structural engineer, while only fine structure, not great architecture, can be developed without the genius and the leadership of a talented architect. In any event, the best of both is needed to formulate a truly extraordinary design of a high-rise building.While comprehensive discussions of these seven systems are generally available in the literature, further discussion is warranted here .The essence of the design process is distributed throughout the discussion.Moment-Resisting FramesPerhaps the most commonly used system in low-to medium-rise buildings, the moment-resisting frame, is characterized by linear horizontal and vertical members connected essentially rigidly at their joints. Such frames are used as a stand-alone system or in combination with other systems so as to provide the needed resistance to horizontal loads. In the taller of high-rise buildings, the system is likely to be found inappropriate for a stand-alone system, this because of the difficulty in mobilizing sufficient stiffness under lateral forces.Analysis can be accomplished by STRESS, STRUDL, or a host of other appropriate computer programs; analysis by the so-called portal method of the cantilever method has no place in today’s technology.Because of the intrinsic flexibility of the column/girder intersection, and because preliminary designs should aim to highlight weaknesses of systems, it is not unusual to use center-to-center dimensions for the frame in the preliminary analysis. Of course, in the latter phases of design, a realistic appraisal in-joint deformation is essential.Braced Frame sThe braced frame, intrinsically stiffer than the moment –resisting frame, finds also greater application to higher-rise buildings. The system is characterized by linear horizontal, vertical, and diagonal members, connected simply or rigidly at their joints. It is used commonly inconjunction with other systems for taller buildings and as a stand-alone system in low-to medium-rise buildings.While the use of structural steel in braced frames is common, concrete frames are more likely to be of the larger-scale variety.Of special interest in areas of high seismicity is the use of the eccentric braced frame.Again, analysis can be by STRESS, STRUDL, or any one of a series of two –or three dimensional analysis computer programs. And again, center-to-center dimensions are used commonly in the preliminary analysis. Shear wallsThe shear wall is yet another step forward along a progression of ever-stiffer structural systems. The system is characterized by relatively thin, generally but not always concrete elements that provide both structural strength and separation between building functions.In high-rise buildings, shear wall systems tend to have a relatively high aspect ratio, that is, their height tends to be large compared to their width. Lacking tension in the foundation system, any structural element is limited in its ability to resist overturning moment by the width of the system and by the gravity load supported by the element. Limited to a narrow overturning, One obvious use of the system, which does have the needed width, is in the exterior walls of building, where the requirement for windows is kept small.Structural steel shear walls, generally stiffened against buckling by a concrete overlay, have found application where shear loads are high. The system, intrinsically more economical than steel bracing, is particularly effective in carrying shear loads down through the taller floors in the areas immediately above grade. The system has the further advantage of having high ductility a feature of particular importance in areas of high seismicity.The analysis of shear wall systems is made complex because of the inevitable presence of large openings through these walls. Preliminary analysis can be by truss-analogy, by the finite element method, or by making use of a proprietary computer program designed to consider the interaction, or coupling, of shear walls.Framed or Braced TubesThe concept of the framed or braced or braced tube erupted into the technology with the IBM Building in Pittsburgh, but was followed immediately with the twin 110-story towers of the World Trade Center, New York and a number of other buildings .The system is characterized by three –dimensional frames, braced frames, or shear walls, forming a closed surface more or less cylindrical in nature, but of nearly any plan configuration. Because those columns that resist lateral forces are placed as far as possible from the cancroids of the system, the overall moment of inertia is increased and stiffness is very high.The analysis of tubular structures is done using three-dimensional concepts, or by two- dimensional analogy, where possible, whichever method is used, it must be capable of accounting for the effects of shear lag.The presence of shear lag, detected first in aircraft structures, is a serious limitation in the stiffness of framed tubes. The concept has limited recent applications of framed tubes to the shear of 60 stories. Designers have developed various techniques for reducing the effects of shear lag, most noticeably the use of belt trusses. This system finds application in buildings perhaps 40stories and higher. However, except for possible aesthetic considerations, belt trusses interfere with nearly every building function associated with the outside wall; the trusses are placed often at mechanical floors, mush to the disapproval of the designers of the mechanical systems. Nevertheless, as a cost-effective structural system, the belt truss works well and will likely find continued approval from designers. Numerous studies have sought to optimize the location of these trusses, with the optimum location very dependent on the number of trusses provided. Experience would indicate, however, that the location of these trusses is provided by the optimization of mechanical systems and by aesthetic considerations, as the economics of the structural system is not highly sensitive to belt truss location.Tube-in-Tube StructuresThe tubular framing system mobilizes every column in the exterior wallin resisting over-turning and shearing forces. The term‘tube-in-tube’is largely self-explanatory in that a second ring of columns, the ring surrounding the central service core of the building, is used as an inner framed or braced tube. The purpose of the second tube is to increase resistance to over turning and to increase lateral stiffness. The tubes need not be of the same character; that is, one tube could be framed, while the other could be braced.In considering this system, is important to understand clearly the difference between the shear and the flexural components of deflection, the terms being taken from beam analogy. In a framed tube, the shear component of deflection is associated with the bending deformation of columns and girders , the webs of the framed tube while the flexural component is associated with the axial shortening and lengthening of columns , the flanges of the framed tube. In a braced tube, the shear component of deflection is associated with the axial deformation of diagonals while the flexural component of deflection is associated with the axial shortening and lengthening of columns.Following beam analogy, if plane surfaces remain plane , the floor slabs,then axial stresses in the columns of the outer tube, being farther form the neutral axis, will be substantially larger than the axial stresses in the inner tube. However, in the tube-in-tube design, when optimized, the axial stresses in the inner ring of columns may be as high, or evenhigher, than the axial stresses in the outer ring. This seeming anomaly is associated with differences in the shearing component of stiffness between the two systems. This is easiest to under-stand where the inner tube is conceived as a braced , shear-stiff tube while the outer tube is conceived as a framed , shear-flexible tube.Core Interactive StructuresCore interactive structures are a special case of a tube-in-tube wherein the two tubes are coupled together with some form of three-dimensional space frame. Indeed, the system is used often wherein the shear stiffness of the outer tube is zero. The United States Steel Building, Pittsburgh, illustrates the system very well. Here, the inner tube is a braced frame, the outer tube has no shear stiffness, and the two systems are coupled if they were considered as systems passing in a straight line from the “hat” structure. Note that the exterior columns would be improperly modeled if they were considered as systems passing in a straight line from the “hat” to the foundations; these columns are perhaps 15% stiffer as they follow the elastic curve of the braced core. Note also that the axial forces associated with the lateral forces in the inner columns change from tension to compression over the height of the tube, with the inflection point at about 5/8 of the height of the tube. The outer columns, of course, carry the same axial force under lateral load for the full height of the columns because the columns because the shearstiffness of the system is close to zero.The space structures of outrigger girders or trusses, that connect the inner tube to the outer tube, are located often at several levels in the building. The AT&T headquarters is an example of an astonishing array of interactive elements:1.The structural system is 94 ft wide, 196ft long, and 601ft high.2.Two inner tubes are provided, each 31ft by 40 ft , centered 90 ft apartin the long direction of the building.3.The inner tubes are braced in the short direction, but with zero shearstiffness in the long direction.4.A single outer tube is supplied, which encircles the buildingperimeter.5.The outer tube is a moment-resisting frame, but with zero shearstiffness for the center50ft of each of the long sides.6.A space-truss hat structure is provided at the top of the building.7.A similar space truss is located near the bottom of the building8.The entire assembly is laterally supported at the base on twinsteel-plate tubes, because the shear stiffness of the outer tube goes to zero at the base of the building.Cellular structuresA classic example of a cellular structure is the Sears Tower, Chicago,a bundled tube structure of nine separate tubes. While the Sears Towercontains nine nearly identical tubes, the basic structural system has special application for buildings of irregular shape, as the several tubes need not be similar in plan shape, It is not uncommon that some of the individual tubes one of the strengths and one of the weaknesses of the system.This special weakness of this system, particularly in framed tubes, has to do with the concept of differential column shortening. The shortening of a column under load is given by the expression△=ΣfL/EFor buildings of 12 ft floor-to-floor distances and an average compressive stress of 15 ksi 138MPa, the shortening of a column under load is 15 1212/29,000 or per story. At 50 stories, the column will have shortened to in. 94mm less than its unstressed length. Where one cell of a bundled tube system is, say, 50stories high and an adjacent cell is, say, 100stories high, those columns near the boundary between .the two systems need to have this differential deflection reconciled.Major structural work has been found to be needed at such locations. In at least one building, the Rialto Project, Melbourne, the structural engineer found it necessary to vertically pre-stress the lower height columns so as to reconcile the differential deflections of columns in close proximity with the post-tensioning of the shorter column simulatingthe weight to be added on to adjacent, higher columns.二、原文翻译:抗侧向荷载的结构体系常用的结构体系若已测出荷载量达数千万磅重,那么在高层建筑设计中就没有多少可以进行极其复杂的构思余地了;确实,较好的高层建筑普遍具有构思简单、表现明晰的特点;这并不是说没有进行宏观构思的余地;实际上,正是因为有了这种宏观的构思,新奇的高层建筑体系才得以发展,可能更重要的是:几年以前才出现的一些新概念在今天的技术中已经变得平常了;如果忽略一些与建筑材料密切相关的概念不谈,高层建筑里最为常用的结构体系便可分为如下几类:1.抗弯矩框架;2.支撑框架,包括偏心支撑框架;3.剪力墙,包括钢板剪力墙;4.筒中框架;5.筒中筒结构;6.核心交互结构;7.框格体系或束筒体系;特别是由于最近趋向于更复杂的建筑形式,同时也需要增加刚度以抵抗几力和地震力,大多数高层建筑都具有由框架、支撑构架、剪力墙和相关体系相结合而构成的体系;而且,就较高的建筑物而言,大多数都是由交互式构件组成三维陈列;将这些构件结合起来的方法正是高层建筑设计方法的本质;其结合方式需要在考虑环境、功能和费用后再发展,以便提供促使建筑发展达到新高度的有效结构;这并不是说富于想象力的结构设计就能够创造出伟大建筑;正相反,有许多例优美的建筑仅得到结构工程师适当的支持就被创造出来了,然而,如果没有天赋甚厚的建筑师的创造力的指导,那么,得以发展的就只能是好的结构,并非是伟大的建筑;无论如何,要想创造出高层建筑真正非凡的设计,两者都需要最好的;虽然在文献中通常可以见到有关这七种体系的全面性讨论,但是在这里还值得进一步讨论;设计方法的本质贯穿于整个讨论;设计方法的本质贯穿于整个讨论中;抗弯矩框架抗弯矩框架也许是低,中高度的建筑中常用的体系,它具有线性水平构件和垂直构件在接头处基本刚接之特点;这种框架用作独立的体系,或者和其他体系结合起来使用,以便提供所需要水平荷载抵抗力;对于较高的高层建筑,可能会发现该本系不宜作为独立体系,这是因为在侧向力的作用下难以调动足够的刚度;我们可以利用STRESS,STRUDL 或者其他大量合适的计算机程序进行结构分析;所谓的门架法分析或悬臂法分析在当今的技术中无一席之地,由于柱梁节点固有柔性,并且由于初步设计应该力求突出体系的弱点,所以在初析中使用框架的中心距尺寸设计是司空惯的;当然,在设计的后期阶段,实际地评价结点的变形很有必要;支撑框架支撑框架实际上刚度比抗弯矩框架强,在高层建筑中也得到更广泛的应用;这种体系以其结点处铰接或则接的线性水平构件、垂直构件和斜撑构件而具特色,它通常与其他体系共同用于较高的建筑,并且作为一种独立的体系用在低、中高度的建筑中;尤其引人关注的是,在强震区使用偏心支撑框架;此外,可以利用STRESS,STRUDL,或一系列二维或三维计算机分析程序中的任何一种进行结构分析;另外,初步分析中常用中心距尺寸;剪力墙剪力墙在加强结构体系刚性的发展过程中又前进了一步;该体系的特点是具有相当薄的,通常是而不总是混凝土的构件,这种构件既可提供结构强度,又可提供建筑物功能上的分隔;在高层建筑中,剪力墙体系趋向于具有相对大的高宽经,即与宽度相比,其高度偏大;由于基础体系缺少应力,任何一种结构构件抗倾覆弯矩的能力都受到体系的宽度和构件承受的重力荷载的限制;由于剪力墙宽度狭狭窄受限,所以需要以某种方式加以扩大,以便提从所需的抗倾覆能力;在窗户需要量小的建筑物外墙中明显地使用了这种确有所需要宽度的体系;钢结构剪力墙通常由混凝土覆盖层来加强以抵抗失稳,这在剪切荷载大的地方已得到应用;这种体系实际上比钢支撑经济,对于使剪切荷载由位于地面正上方区域内比较高的楼层向下移特别有效;这种体系还具有高延性之优点,这种特性在强震区特别重要;由于这些墙内必然出同一些大孔,使得剪力墙体系分析变得错综复杂;可以通过桁架模似法、有限元法,或者通过利用为考虑剪力墙的交互作用或扭转功能设计的专门计处机程序进行初步分析框架或支撑式筒体结构:框架或支撑式筒体最先应用于IBM公司在Pittsburgh的一幢办公楼,随后立即被应用于纽约双子座的110层世界贸易中心摩天大楼和其他的建筑中;这种系统有以下几个显着的特征:三维结构、支撑式结构、或由剪力墙形成的一个性质上差不多是圆柱体的闭合曲面,但又有任意的平面构成;由于这些抵抗侧向荷载的柱子差不多都被设置在整个系统的中心,所以整体的惯性得到提高,刚度也是很大的;在可能的情况下,通过三维概念的应用、二维的类比,我们可以进行筒体结构的分析;不管应用那种方法,都必须考虑剪力滞后的影响;这种最先在航天器结构中研究的剪力滞后出现后,对筒体结构的刚度是一个很大的限制;这种观念已经影响了筒体结构在60层以上建筑中的应用;设计者已经开发出了很多的技术,用以减小剪力滞后的影响,这其中最有名的是桁架的应用;框架或支撑式筒体在40层或稍高的建筑中找到了自己的用武之地;除了一些美观的考虑外,桁架几乎很少涉及与外墙联系的每个建筑功能,而悬索一般设置在机械的地板上,这就令机械体系设计师们很不赞成;但是,作为一个性价比较好的结构体系,桁架能充分发挥它的性能,所以它会得到设计师们持续的支持;由于其最佳位置正取决于所提供的桁架的数量,因此很多研究已经试图完善这些构件的位置;实验表明:由于这种结构体系的经济性并不十分受桁架位置的影响,所以这些桁架的位置主要取决于机械系统的完善,审美的要求,筒中筒结构:筒体结构系统能使外墙中的柱具有灵活性,用以抵抗颠覆和剪切力;“筒中筒”这个名字顾名思义就是在建筑物的核心承重部分又被包围了第二层的一系列柱子,它们被当作是框架和支撑筒来使用;配置第二层柱的目的是增强抗颠覆能力和增大侧移刚度;这些筒体不是同样的功能,也就是说,有些筒体是结构的,而有些筒体是用来支撑的;在考虑这种筒体时,清楚的认识和区别变形的剪切和弯曲分量是很重要的,这源于对梁的对比分析;在结构筒中,剪切构件的偏角和柱、纵梁例如:结构筒中的网等的弯曲有关,同时,弯曲构件的偏角取决于柱子的轴心压缩和延伸例如:结构筒的边缘等;在支撑筒中,剪切构件的偏角和对角线的轴心变形有关,而弯曲构件的偏角则与柱子的轴心压缩和延伸有关;根据梁的对比分析,如果平面保持原形例如:厚楼板,那么外层筒中柱的轴心压力就会与中心筒柱的轴心压力相差甚远,而且稳定的大于中心筒;但是在筒中筒结构的设计中,当发展到极限时,内部轴心压力会很高的,甚至远远大于外部的柱子;这种反常的现象是由于两种体系中的剪切构件的刚度不同;这很容易去理解,内筒可以看成是一个支撑或者说是剪切刚性的筒,而外筒可以看成是一个结构或者说是剪切弹性的筒;核心交互式结构:核心交互式结构属于两个筒与某些形式的三维空间框架相配合的筒中筒特殊情况;事实上,这种体系常用于那种外筒剪切刚度为零的结构;位于Pittsburgh的美国钢铁大楼证实了这种体系是能很好的工作的;在核心交互式结构中,内筒是一个支撑结构,外筒没有任何剪切刚度,而且两种结构体系能通过一个空间结构或“帽”式结构共同起作用;需要指出的是,如果把外部的柱子看成是一种从“帽”到基础的直线体系,这将是不合适的;根据支撑核心的弹性曲线,这些柱子只发挥了刚度的15%;同样需要指出的是,内柱中与侧向力有关的轴向力沿筒高度由拉力变为压力,同时变化点位于筒高度的约5/8处;当然,外柱也传递相同的轴向力,这种轴向力低于作用在整个柱子高度的侧向荷载,因为这个体系的剪切刚度接近于零;把内外筒相连接的空间结构、悬臂梁或桁架经常遵照一些规范来布置;美国电话电报总局就是一个布置交互式构件的生动例子;1、结构体系长米,宽米,高米;2、布置了两个筒,每个筒的尺寸是米×米,在长方向上有米的间隔;3、在短方向上内筒被支撑起来,但是在长方向上没有剪切刚度;4、环绕着建筑物布置了一个外筒;5、外筒是一个瞬时抵抗结构,但是在每个长方向的中心米都没有剪切刚度;6、在建筑的顶部布置了一个空间桁架构成的“帽式”结构;7、在建筑的底部布置了一个相似的空间桁架结构;8、由于外筒的剪切刚度在建筑的底部接近零,整个建筑基本上由两个钢板筒来支持;框格体系或束筒体系结构:位于美国芝加哥的西尔斯大厦是箱式结构的经典之作,它由九个相互独立的筒组成的一个集中筒;由于西尔斯大厦包括九个几乎垂直的筒,而且筒在平面上无须相似,基本的结构体系在不规则形状的建筑中得到特别的应用;一些单个的筒高于建筑一点或很多是很常见的;事实上,这种体系的重要特征就在于它既有坚固的一面,也有脆弱的一面;这种体系的脆弱,特别是在结构筒中,与柱子的压缩变形有很大的关系,柱子的压缩变形有下式计算:△=ΣfL/E对于那些层高为米左右和平均压力为138MPa的建筑,在荷载作用下每层柱子的压缩变形为1512/29000或毫米;在第50层柱子会压缩94毫米,小于它未受压的长度;这些柱子在50层的时候和100层的时候的变形是不一样的,位于这两种体系之间接近于边缘的那些柱需要使这种不均匀的变形得以调解;主要的结构工作都集中在布置中;在Melbourne的Rialto项目中,结构工程师发现至少有一幢建筑,很有必要垂直预压低高度的柱子,以便使柱不均匀的变形差得以调解,调解的方法近似于后拉伸法,即较短的柱转移重量到较高的邻柱上;。
智能医疗系统毕业论文中英文资料外文翻译文献
智能医疗系统毕业论文中英文资料外文翻译文献AbstractThe field of healthcare has greatly benefited from the advances in technology, particularly with the development of intelligent healthcare systems. These systems utilize artificial intelligence (AI) to improve the quality and efficiency of healthcare services. This literature review aims to provide an overview of the current state of intelligent healthcare systems and their applications in the medical field.IntroductionKey Features of Intelligent Healthcare Systems1. Real-Time Monitoring: Intelligent healthcare systems facilitate real-time monitoring of patients' vital signs, allowing healthcare professionals to detect any abnormalities and intervene in a timely manner.Real-Time Monitoring: Intelligent healthcare systems facilitatereal-time monitoring of patients' vital signs, allowing healthcare professionals to detect any abnormalities and intervene in a timely manner.2. Predictive Analytics: By analyzing vast amounts of patient data, these systems can identify patterns and trends to predict potential health risks or deteriorations, enabling proactive interventions.Predictive Analytics: By analyzing vast amounts of patient data, these systems can identify patterns and trends to predict potential health risks or deteriorations, enabling proactive interventions.3. Personalized Medicine: Intelligent healthcare systems can utilize patient-specific data to provide personalized treatment plans, taking into account individual characteristics and medical history.Personalized Medicine: Intelligent healthcare systems can utilize patient-specific data to provide personalized treatment plans, taking into account individual characteristics and medical history.4. Remote Patient Management: Through the use of telemedicine technologies, intelligent healthcare systems enable remote patientmonitoring and virtual consultations, enhancing access to healthcare services and reducing the need for in-person visits.Remote Patient Management: Through the use of telemedicine technologies, intelligent healthcare systems enable remote patient monitoring and virtual consultations, enhancing access to healthcare services and reducing the need for in-person visits.Applications of Intelligent Healthcare Systems1. Chronic Disease Management: Intelligent healthcare systems can aid in the management of chronic conditions such as diabetes, cardiovascular diseases, and respiratory disorders. They provide patients with tools for self-management and assist healthcare professionals in monitoring the disease progression.Chronic Disease Management: Intelligent healthcare systems can aid in the management of chronic conditions such as diabetes, cardiovascular diseases, and respiratory disorders. They provide patients with tools for self-management and assist healthcare professionals in monitoring the disease progression.2. Hospital Workflow Optimization: These systems can optimize hospital workflows by automating administrative tasks, streamlining patient admission and discharge processes, and improving resource allocation.Hospital Workflow Optimization: These systems can optimize hospital workflows by automating administrative tasks, streamlining patient admission and discharge processes, and improving resource allocation.3. Drug Safety and Adherence: Intelligent healthcare systems can help prevent medication errors and improve patient adherence to prescribed treatments through reminders, alerts, and medication tracking.Drug Safety and Adherence: Intelligent healthcare systems can help prevent medication errors and improve patient adherence to prescribed treatments through reminders, alerts, and medication tracking.4. Healthcare Data Analysis: By collecting and analyzing large volumes of healthcare data, these systems can provide valuable insights for medical research, disease surveillance, and public health planning.Healthcare Data Analysis: By collecting and analyzing largevolumes of healthcare data, these systems can provide valuable insights for medical research, disease surveillance, and public health planning.ConclusionReferences[1] Smith, J. (2019). The role of intelligent healthcare systems in transforming healthcare delivery. Journal of Healthcare Technology,8(2), 45-56.[2] Johnson, A., et al. (2018). Applications of artificial intelligence in healthcare: Current trends and future prospects. International Journal of Medical Informatics, 115, 1-7.[3] Rodrigues, J., et al. (2020). Intelligent healthcare systems: State-of-the-art and future challenges. Journal of Medical Systems, 44(3), 1-15.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Based on GSM module and AT89C51 connectiondesign and application---From 《GSM principle and its network optimization》chapter one---From 《New single chip microcomputer interface device and technology》chapter sixAbstractThis article through analyzed the GSM module and the monolithic integrated circuit connection design simply introduced the TC35i module commonly used instruction and the coding rule, introduced emphatically the TC35i module and the AT89C51 principle of work, the periphery connection electric circuit, the software control technology, at the same time has produced some TC35i module and the AT89C51 connection application procedure, proposed AT89C51 when receive data should pay attention question, thus designed has the GSM module the data transmission terminal.Key words: GSM network1 Summarize:Along with correspondence technique of development, according to the service function of the NTT DoCoMo net, just to industry control and control from a distance the realm have continuously extension of trend.Is orientation this kind of demand, Siemens company released a new generation wireless correspondence GSM mold piece-TC35i, according to should the short news function of the mold piece, can fast safety credibility realization customer information processing etc. function, special be applicable to control centre and terminal equipments distance very far,or inconvenience adoption wired correspondence lie quality etc. situation, for example the oil well information collect behind of deliver, the long range copy form system, city transportation direction etc. all according to the TC35i mold piece to realization.2 The application of GSM network:GSM is Global System for Mobile Communications acronym, which means Global System for Mobile Communications is the world's leading cellular systems in the world. GSM is based on narrowband TDMA standard that allows radio frequency in a group call at the same time 8. GSM80 during the rise in Europe, put into use in 1991. The end of 1997, has operations in more than 100 countries, Europe and Asia has become the standard in fact, that by 2001, the world's 162 countries have already built a 400 GSM communications network. But the GSM system capacity is limited, users in the network overload, it had to construct additional network facilities. What is gratifying is that GSM performance in other areas, which in addition to providing a standardized list and signaling systems, but also opened up some of the more intelligent of the business such as international roaming and so on. The convenience of GSM mobile phone is that it provides a smart card, known as SIM cards, and card could be separated, so that the replacement of mobile phone users and custom personal information in this area are facilitated.GSM network to improve after years of development, is now very mature, less blind spots, signal stability, automatic roaming, and the communication distance from the impact of the surrounding environment. GSM short message in particular, flexible and convenient, you can cross-market, inter-provincial and even cross-border transmission, and each send a short message as long as one dime, very reliable and affordable. In addition, the mobile phone SIM card in recent years can apply for 0, some packages use lower cost than fixed. Therefore the use of mobile phone message to achieve alarm, ultra long-range remote control for industrial equipment, transmission of data is a very good choice.GSM module, is a similar mobile communication module, integrates a number of mobile phone functions on a single small circuit board, it can send SMS messages, calls and so on, the module is small, but it has a lotof mobile phone functionality, with its have equal is the core of the mobile phone, and it is in a lot of applications have a wide range of applications, GSM module through the use of AT commands to control it, modules can be connected to computer RS232 serial port, can also be used to carry out single-chip control . Below we cite some typical applications:2.1 mobile phone access control system:GSM Access Control System used to control the electric lock control, if you need to enter, as long as the cell phone call using GSM modules mobile number, will automatically open the door, and only you can set up cell phone numbers to open the door, and no costs.2.2 three billboard over the weather disaster emergency turn off:Over three billboards are constantly flip through the motor to achieve a number of ads displayed, because installed in the outdoors, when there is wind, hail and other weather disasters, billboards could easily be blown bad or damaged card die, when in need of emergency shut down, You can normally closed relay contact to control the power of advertising, when you need to do is send "turn off" control message, the billboard will automatically turn off, and automatically after a certain time delay automatically return to normal job (generally disastrous weather will not continue for a long time) in advance if you want to open a billboard, you can send "Open" control message.2.3 engineering system balance reminders:Some works are safe after the completion of the normal operation after a period of time to settle the balance, if the encounter malicious clients the outstanding purchase price, often installed side very headache, because equipment has been installed, if the loss of a great come back down, particularly in the field customer very costly when the client system can be installed in the GSM module, use it all the way to control system or the way some of the key points, when the customer paid in arrears when the malicious message can turn off some features, forcing customers to pay the purchase price then immediately open message, if you have a smooth recovery of the purchase price can also be the name of system maintenance by the GSM module removed from the client system.2.4 monitoring systems or Web servers and reset the alarm:Monitoring system or web server running after a long period after death may be wrong, this time to power on reset is the only solution at this time through the GSM module can control system power, and set to open automatically after 3 seconds turn off mode, can achieve power reduction, in addition, GSM module in some special application areas also played a very large role, such as: the disappearance of the main power supply, memory errors, fan shutdown, fuel depletion, it was the invasion and other information, are not people the ideal choice for monitoring the engine room.2.5 the remote control of home appliances:Through the message can easily achieve the remote control to open rice cookers, water heaters and other appliances by remote control or switch to repair mode can also control the air-conditioning GSM global wireless mobile communication network control alarm host, using the global GSM short message data transmission mode and voice-enabled platform for the completion of intelligent data transmission and remote control alarm, set the host family, shops, office safety, electrical control, remote monitoring, such as Intelligent home functions, because of the global GSM wireless mobile communication network signal coverage area of Canton, and truly realize the low-cost high-quality ultra-long-distance convenient and flexible intelligent wireless control and alarm, to solve the fixed-line telephone or cable broadband network wired alarm limitations. GSM global wireless mobile communications network in popularity all over the world, the GSM global wireless mobile communication network control alarm can be widely used in a single host family, community property, electricity, transportation, petroleum, coal, railway, municipal and public security departments of the security industry prevention devices, data monitoring and remote monitoring system. Wireless Road, with 11 defense areas, 2-way Cable Standoff, different defense area alarm, alarm and message control, separate from a defended position, remote control, home appliance control, linkage to take photographs with the latest alarm center network characteristics.Features:1. Wireless suspects under strict surveillance, no wiring, and ease of installation.2. Cable suspects under strict surveillance, safe and reliable.3. Wireless remote control security / from a defended position, easy to operate.4. Adaptability widely used global-band wireless mobile networks.5. Password settings, confidentiality stronger.6. Alarm, the high-decibel alarm sound to deter thieves.7. Host automatically to six groups of mobile numbers to send SMS alerts. Alarm message and a telephone can be set up8. Host automatically dial the six groups of mobile or fixed telephone warning, start-site monitoring.9. Preset scene alarm and alarm message10. With emergency alarm function, can prevent thieves burglary, detection of gas leaks and smoke fire.11. Communicate electric missing Detect and alarm, to prevent the intentional destruction of the power system and power failure monitoring.12. Communicate after the loss of electricity automatically switch to a back-up battery. 13. Available through GSM network platform and networking alarm center.14. Supported message in Chinese or English instructions.15. Handset intercom mode: Matching intercom calls, and alarm can be two-way intercom, real-time clear police intelligence to prevent unnecessary alarm.3 The TC35i mold piece introductionCurrently, domestic already beginning usage of the GSM mold piece have a lot, and these of function, method of using difference not big.What this design adoption is a Siemens TC35 the TC35i of the series.On this kind of wireless mold piece function and TC35 and permit, design tightly packed, consumedly contracted the physical volume of customer's product.The TC35i and GSM2/2 and permit,dual-band(GSM900/GSM1800), RS232 the data connect, should mold piece and radio frequency electric circuit and Ji take and integral whole, provide toward the customer standard ofAT order connect, is data, speech, short news and fax provide fast, credibility, safety of deliver, convenience customer of application development and design.3.1 The GSM AT instruction introduction that the mold has something to do with SMS in the piec e:The order for provide of the GSM- powered mold piece match GSM07.05 and GSM07.07 norm.In the GSM07.07 definition of the AT Command connect and provided a kind of which GSM AT Instruction TC35i AT89C51 move terrace and data terminal equipments of in general use connect;The GSM07.05 made to the short news detailed of provision.At short news mold piece receive network hair of short news, can send out a designation information through a string of, the data terminal equipments can send out toward the GSM mold piece various order.The instruction of GSM AT having something to do with SMS such as List1 to show.The instruction of GSM AT gather, is signed letter, Motorola and HP etc. factory house by Nokia, love to together develop for the GSM system of, among them include control SMS(Short Message Service).3.2 The PDU code rule:Send out short news in common use Text and PDU(Protocol Data Unit, agreement data unit) mode currently.The usage Text mode receive and dispatch a message code simple, realization get up very easy, but the biggest weakness be to can't receive and dispatch Chinese message;But PDU mode not only support Chinese message, also the ability send out English message.The PDU mode receive and dispatch a message can the usage be 3 kinds of to code:7-bit, 8-bit and UCS2code.7-the bit code to used for send out common of ASCII character list, 8-bit code Be usually used for sending out data news, UCS2 code used for sending out Unicode character list.General PDU's code is constitute by ABCDEFGHIJKLM 13.A:The address length of the message center, 216 enter to make number(one word stanza)B:The number type of the message center, 216 enter to make number.C:Message center number, B+C length will from the data decision D:Document head word stanza, 216 enter to make number.E:Information type, 216 enter to make number.F:Drive call number length, 216 enter to make number.G:Drive call number type, 216 enter to make number, take value togetherH:Drive call number, length from data within F decision.I:Agreement marking, 216 enter to make number.J:The data code a project, 216 enter to make number.K:Term of validity, 216 enter to make number. L:Customer data length, 216 enter to make number.M:Customer's data, its length from the data decision in the L.Enactment in J adoption UCS2 code, here is the Unicode character list of Chinese-English.4 the hardware of the TC35i and list slice machine connect a people'selectric circuitThe TC35i mold piece is main to save according to the processor, GSM radio frequency mold piece, power supply mold piece, Shan from the GSM, the ZIF conjunction machine, antenna connect six part constitute.Connect machine with a list slice machine realization electric circuit to connect through a ZIF, should connect read or send out the TC35i mold piece in of data.5 list slice the software of the machine and TC35i connect andcontrol principle8051 one-chip computer have four 8 walk abreast I/O port, call P0, P1, P2 and P3. Each port is 8 accurate two-way mouths, accounts for 32 pins altogether. Every one I/O line can be used as introduction and exported independently. Each port includes a latch (namely special function register ), one exports the driver and a introduction buffer . Make data can latch when outputting, data can buffer when making introduction , but four function of passway these self-same. Expand among the system of memory outside having slice, four port these may serve as accurate two-way mouth of I/O in common use. Expand among the system of memory outside having slice, P2 mouth see high 8 address off; P0 mouth is a two-way bus, send the introduction of 8 low addresses and data / export in timesharingList slice the software of the machine and TC35i connect in fact be list slice the machine pass AT instruction control cellular phone of control technique, first constitution the TC35i mold piece of work mode:AT+CMGF=n, n=0 is a PDU mode;N=1 write an article this mode;Usually the constitution is a PDU mode, under this kind of mode, ability transmission or accept a transparent data.(customer from definition data)AT+CMGR=n in order to read the short news data of the TC35i mold piece, the n is a short news number.AT+CMGL=n in order to list the short news in the TC35i mold piece, n=0 is the short news which read, n=a the short news which have been already read, n=2 short news which sent out, n=3 for have already send out of short news n=4 is all short news.AT+CMGD=the n is the short news which delete the TC35i mold piece and the n is a short news serial number.6 Master routineThe software plait distance pass to write in toward the TC35i dissimilarity of AT instruction ability completion variety function, such as network debarkation, read SIM card top telephone number, send out SMS news and receive SMS news etc..The instruction sign, constant, PDU data...etc. of AT instruction all code form transmission by ASCII;The transmission transparent data have to pair of the TC35i mold piece of work mode constitution is PDU mode;List slice machine toward the TC35i mold piece after send out each instruction have to with return to car sign conduct and actions should instruction of be over, for example list slice the machine send out instruction in"AT+ CMGF=0" toward the cellular phone, its ASCII code sequence is"41 H, 54 H, 2 BH, 42 H, 4 DH, 47 H, 46 H, 3 DH, 30 H, 0 DH", the last word stanza 0 DH is to return to car sign, mean that instruction be over, if have no this to return to car sign, the cellular phone won't identify this instruction.When the AT instruction which receive to an integrity of the TC35i mold piece after, the TC35i mold piece not summary execution should instruction, but first just receive of the ASCII of the AT instruction code sequence all anti- send out;(contain 0 DH)Secondly send out a the ASCII which return to car sign with a carriage return sign to code, namely 0 DH with 0 AH;Then performance should instruction.The list slice machine read the PDU data of the TC35i mold piece, originality data should is 16 enter make number, but read back of data still is an ASCII mean of 16 enter make number.So a word stanza of 16 entered to make number and then became 2 word stanza of ASMII code.But the PDU data data word stanza length within pack part still is actual character list length.But isn't the word stanza which become ASCII code length, this at plait distance should special attention, otherwise receive of data not integrity.The list slice machine is after receiving a PDU data pack data have to its instauration become 16 enter make a data, its calculate way as follows:Establish a for the ASCII code receive, b for the conversion is behind of 16 enter make number.So if a<39 H, b=a-30 H;If a>39 H, b=h-07 H a-30.End pair of in front and back two pieces merger is a word stanza.Concluding remark The usage cellular phone mold piece benefit is at the system integration, the cost be lower.Install correspondence circuit in secluded region etc. difficulty or uneconomical place, engineering service facilities can freedom vivid of constitution, no longer be subjected to geography condition of restriction.In fine, GSM mold piece the price be cheap, application extensive, application the foreground be captivating, pass with cellular phone mold the piece connect can very convenience of design customer demand of the data receive terminal.基于 GSM 模块与 AT89C51 的接口设计及应用的接口设计及应用-----摘自《GSM 原理及其网络优化》第一章-----摘自《新型单片机接口器件与技术》第六章摘要本文通过分析 GSM 模块与单片机的接口设计简单介绍了 TC35i 模块的常用指令及摘编码规则,着重介绍了 TC35i 模块与 AT89C51 的工作原理、外围接口电路、软件控制技术,同时给出了一些 TC35i 模块与 AT89C51 接口的应用程序,提出了 AT89C51 在接收数据时应该注意的问题,从而设计出具有 GSM 模块的数据传输终端。