毕业设计英语翻译

合集下载

英文论文翻译

英文论文翻译

1 前言在汽车三大总成之中,汽车车身代表着汽车开发的水平,在汽车开发中占有主体地位。

由于在车辆行驶过程中,车身结构会在各种振源的激励下产生振动,若这些振源的激励频率接近了车身整体或局部的固有频率,便会发生共振现象,产生剧烈振动和噪声,甚至造成结构破坏。

因此,为了提高汽车的安全性、稳定性和舒适性,就必须对车身结构的固有频率进行分析,并可以通过对其结构的设计来避开各种振源的激励。

文中就是采用有限元分析的方法,对某车型的车身地板进行模态分析,分析其固有频率及振型,为实际生产提供参考依据。

2 车身地板有限元模型的建立车身地板是典型的凹凸槽板结构,而对其的模拟建模有两种方法,一是按凹凸槽的真实形状建模;二是按照文献中提到的方法,即用在凹凸槽处加加强梁的平板结构来模拟,使加强梁的截面参数与实际结构相一致,文中原始模型采用第一种方法。

2.1建模2.1.1平面问题及薄板弯曲车身地板的CAD模型是在Catia软件里创建完成的。

车身的大部分零件是薄板冲压件,板材的厚度h远小于其平面尺寸。

薄板的变形与载荷的作用方式有关,当载荷平行于中面(平分薄板厚度的平面)且沿厚度方向不变,可认为是平面应力问题;若载荷垂直于中面,则将引起薄板的弯曲变形。

以薄板的中面为x-y平面,垂直于中面的轴为z轴。

在平面应力问题中只有平行于x-y平面的三个应力分量:σσττ=,,x y xy yz这三个分量沿厚度h不变,它们只是x和y的函数,与坐标z无关,而其余分量为零。

平面应力的物理方程为:薄板弯曲变形后,中面由平面变成曲面,称为弹性曲面。

中面内各点在垂直于中面的方向的位移w称为挠度。

当w远小于厚度t时,即满足时,可以认为中面无线应变也无角应变,此时称为薄板弯曲的小挠度问题。

若挠度w接近厚度t的量级,就不能再认为弹性曲面内纤维的长度不变,问题将变为非线性的,这种情况称为薄板弯曲的大挠度问题。

工程中的大部分问题是将薄板的弯曲视为小挠度问题,这样可使问题大大简化。

采矿工程 毕业设计_外文翻译 英译汉 中英文

采矿工程 毕业设计_外文翻译 英译汉 中英文

ROOM-AND-PILLAR METHOD OF OPEN-STOPE MINING空场采矿法中的房柱采矿法Chapter 1.A Classification of the Room-and-Pillar Method of Open-Stope Mining第一部分,空场采矿的房柱法的分类OPEN STOPING空场采矿法An open stope is an underground cavity from which the initial ore has been mined. Caving of the opening is prevented (at least temporarily) by support from the unmined ore or waste left in the stope,in the form of pillars,and the stope walls (also called ribs or abutments). In addition to this primary may also be required using rockbolts , reinforcing rods, split pipes ,or shotcrete to stabilize the rock surface immediately adjacent to the opening. The secondary reinforcement procedure does not preclude the method classified as open stoping.露天采场台阶是开采了地下矿石后形成的地下洞室。

通过块矿或采场的支柱和(也称为肋或肩)采场墙形式的废料的支持来(至少是暂时的)预防放顶煤的开幕。

除了这个,可能还需要使用锚杆,钢筋棒,分流管,或喷浆,以稳定紧邻开幕的岩石表面。

毕业设计英文翻译(英文)

毕业设计英文翻译(英文)

Industrial Power Plants and Steam SystemSteam power plants comprise the major generating and process steam sources throughout the world today. Internal-combustion engine and hydro plants generate less electricity and steam than power plants. For this reason we will give our initial attention in this book to steam power plants and their design application.In the steam power field two major types of plants sever the energy needs of customer-industrial plants for factories and other production facilities-and central-station utility plants for residential, commercial, industrial demands. Of these two types of plants, the industrial power plant probably has more design variations than the utility plant. The reason for this is that the demands of industrial tend to be more varied than the demands of the typical utility customer.To assist the power-plant designer in understanding better variations in plant design, industrial power plants are considered first in this book. And to provide the widest design variables, a power plant serving several process operation and all utility is considered.In the usual industrial power plant, a steam generation and distribution system must be capable of responding to a wide range of operating conditions, and often must be more reliable than the plants electrical system. The system design is often the last to be settled but the first needed for equipment procurement and plant startup. Because of these complications the power plant design evolves slowly, changing over the life of a project.Process steam loadsSteam is a source of power and heating, and may be involved in process reaction. Its applications include serving as a stripping, fluidizing, agitating , atomizing, ejector-motive and direct-heating steam. Its quantities, Pressure Levels and degrees of superheat are set by such process needs.As reaction steam, it becomes a part of the process kinetics, as in H2, ammonia and coal-gasification plants. Although such plants may generate all the steam needed. steam from another source must be provided for startup and backup.The second major process consumption of steam is for indirect heating, such as in distillation-tower reboilers , amine-system reboilers, process heaters, piping tracing and building heating. Because the fluids in these applications generally do not need to be above 350F,steam is a convenient heat source.Again, the quantities of steam required for the services are set by the process design of the facility. There are many options available to the process designer in supplying some of these low-level heat requirements, including heat-exchange system , and circulating heat-transfer-fluid systems, as well as system and electricity. The selection of an option is made early in the design stage and is based predominantly on economic trade-off studies.Generating steam from process heat affords a means of increasing the overall thermal efficiency of a plant. After providing for the recovery of all the heat possible via exchanges, the process designer may be able to reduce cooling requirements by making provisions for the generation of low-pressure(50-150 psig)steam. Although generation at this level may be feasible from a process-design standpoint, the impact of this on the overall steam balance must be considered, because low-pressure steam is excessive in most steam balances, and the generation of additional quantities may worsen the design. Decisions of this type call close coordination between the process and utility engineers.Steam is often generated in the convection section of fired process heaters in order to improve a plant’s thermal efficiency. High-pressure steam can be generated in the furnace convection section of process heater, which have radiant heat duty only.Adding a selective –catalytic-reduction unit for the purpose of lowing NOx emissions may require the generation of waste-heat steam to maintain correct operating temperature to the catalytic-reduction unit.Heat from the incineration of waste gases represents still another source of process steam. Waste-heat flues from the CO boilers of fluid-catalytic crackers and from fluid-coking units, for example, are hot enough to provide the highest pressure level in a steam system.Selecting pressure and temperature levelsThe selecting of pressure and temperature levels for a process steam system is based on:(1)moisture content in condensing-steam turbines,(2)metallurgy of the system,(3)turbine water rates,(4)process requirements ,(5)water treatment costs, and(6)type of distribution system.Moisture content in condensing-steam turbines---The selection of pressure and temperature levels normally starts with the premise that somewhere in the system there will be a condensing turbine. Consequently, the pressure and temperature of the steam must be selected so that its moisture content in the last row of turbine blades will be less than 10-13%. In high speed, a moisture content of 10%or less is desirable. This restriction is imposed in order to minimize erosion of blades by water particles. This, in turn, means that there will be a minimum superheat for a given pressure level, turbine efficiency and condenser pressure for which the system can be designed.System mentallurgy- A second pressure-temperature concern in selecting the appropriate steam levels is the limitation imposed by metallurgy. Carbon steel flanges, for example, are limited to a maximum temperature of 750F because of the threat of graphite (carbides) precipitating at grain boundaries. Hence, at 600 psig and less, carbon-steel piping is acceptable in steam distribution systems. Above 600 psig, alloy piping is required. In a 900- t0 1,500-psig steam system, the piping must be either a r/2 carbon-1/2 molybdenum or a l/2 chromium% molybdenum alloyTurbine water rates - Steam requirements for a turbine are expressed as water rate, i.e., lb of steam/bph, or lb of steam/kWh. Actual water rate is a function of two factors: theoretical water rate and turbine efficiency.The first is directly related to the energy difference between the inlet and outlet of a turbine, based on the isentropic expansion of the steam. It is, therefore, a function of the turbine inlet and outlet pressures and temperatures.The second is a function of size of the turbine and the steam pressure at the inlet, and of turbine operation (i.e., whether the turbine condenses steam, or exhausts some of it to an intermediate pressure level). From an energy stand point, the higher the pressure and temperature, the higher the overall cycle efficiency. _Process requirements - When steam levels are being established, consideration must be given to process requirements other than for turbine drivers. For example, steam for process heating will have to be at a high-enough pressure to prevent process fluids from leaking into the steam. Steam for pipe tracing must be at a certain minimum pressure so that low-pressure condensate can be recovered.Water treatment costs - The higher the steam pressure, the costlier the boiler feedwater treatment. Above 600 psig, the feedwater almost always must be demineralized; below 600 psig, soft,ening may be adequate. It may have to be of high quality if the steam is used in the process, such as in reactions over a catalyst bed (e.g., in hydrogen production).Type of distribution system - There are two types of systems: local, as exemplified by powerhouse distribution; and complex, by wluch steam is distributed to many units in a process plant. For a small local system, it is not impractical from a cost standpoint for steam pressures to be in the 600-1,500-psig range. For a large system, maintaining pressures within the 150-600-psig range is desirable because of the cost of meeting the alloy requirements for higher-pressure steam distribution system.Because of all these foregoing factors, the steam system in a chemical process complex or oil refinery frequently ends up as a three-level arrangement. The highest level, 600 psig, serves primarily as a source of power. The intermediate level, 150 psig, is ideally suitable for small emergency turbines, tracing off the plot, and process heating. The low level, normally 50 psig, can be used for heating services, tracing within the plot, and process requirements. A higher fourth level normally not justified, except in special cases as when alarge amount ofelectric power must be generated.Whether or not an extraction turbine will be included in the process will have a bearing on the intermediate-pressure level selected, because the extraction pressure should be less than 50% of the high-pressure level, to take into account the pressure drop through the throttle valve and the nozzles of the high-pressure section of' the turbine.Drivers for pumps and compressorsThe choice between a steam and an electric driver for a particular pump or compressor depends on a number of things, including the operational philosophy. In the event of a power failure, it must be possible to shut down a plant orderly and safely if normal operation cannot be continued. For an orderly and safe shutdown, certain services must be available during a power failure: (1) instrument air, (2) cooling water, (3) relief and blow down pump out systems, (4) boiler feedwater pumps, (5) boiler fans, (6) emergency power generators, and (7) fire water pumps.These services are normally supplied by steam or diesel drivers because a plant's steam or diesel emergency system is considered more reliable than an electrical tie-line.The procedure for shutting down process units must be analyzed for each type of processplant and specific design. In general, the following represent the minimum services for which spare pumps driven by steam must be provided: column reflux, bottoms and purge-oil circulation, and heater charging. Most important is to maintain cooling; next, to be able to safely pump the plant's inventory into tanks.Driver selection cannot be generalized; a plan and procedure must be developed for each process unit.The control required for a process is at times another consideration in the selection of a driver. For example, a compressor may be controlled via flow or suction pressure. The ability to vary driver speed, easily obtained with a steam turbine, may be basis for selecting a steam driver instead of a constant-speed induction electric motor. This is especially important when the molecular weight of the gas being compressed may vary, as in catalytic-cracking and catalytic-reforming processes.In certain types of plants, gas flow must be maintained to prevent uncontrollable high-temperature excursions during shutdown. For example, hydrocrackers are purged of heavy hydrocarbon with recycle gas to prevent the exothermic reactions from producing high bed temperatures. Steam-driven compressors can do this during a power failure.Each process operation must be analyzed from such a safety viewpoint when selecting drivers for critical equipment. The size of a relief and blowdown system can be reduced by installing steam drivers. In most cases, the size of such a system is based on a total power failure. If heat-removal powered by steam drivers, the relief system can be smaller. For example, a steam driver will maintain flow in the pump-around circuit for removing heat from a column during a power failure, reducing the relief load imposed on the flare system.Equipment support services (such as lubrication and sea-oil systems for compressors) that could be damaged during a loss of power should also be powered by steam drivers.Driver size can also be a factor. An induction electric motor requires large starting currents - typically six times the normal load. The drop in voltage caused by the startup of such a motor imposes a heavy transient demand on the electrical distribution system. For this reason, drivers larger than 10,000 hp are normally steam turbines, although synchronous motors as large as 25,000 hp are used.The reliability of life-support facilities - e.g., building heat, potable water, pipe tracing, emergency lighting-during power failures is of particular concern mates. In such a case, at least one boiler should be equipped with steam-driven auxiliaries to provide these services.Lastly, steam drivers are also selected for the purpose of balancing steam systems and avoiding large amounts of letdown between steam levels. Such decisions regarding drivers are made after the steam balances have been refined and the distribution system has been fully defined. There must be sufficient flexibility to allow balancing the steam system under all operating conditions.Selecting steam driversAfter the number of steam drivers and their services have been established, the utility, or process engineer will estimate the steam consumption for making the steam balance.The standard method of doing this is to use the isentropic expansion of steam correeted for turbine efficiency.Actual steam consumption by a turbine is determined via:SR = (TSR)(bhp)/EHere, SR = actual steam rate, lb/h; TSR = theoretical steam rate, lb/hr/bhp ; bhp = turbine brake horsepower; and E = turbine efficiency.When exhaust steam can be used for process heating, the highest thermodynamic efficiency can be achieved by means of backpressure turbines. Large drivers, which are of high efficiency and require low theoretical steam rates, are normally supplied by the high-pressure header, thus minimizing steam consumption.Small turbines that operate only in emergencies can be allowed to exhaust to atmosphere. Although their water rates are poor, the water lost in short-duration operations may not represent a significant cost. Such turbines obviously play a small role in steam balance planning.Constructing steam balancesAfter the process and steam-turbine demands have been established, the next step is to construct a steam balance for the chemical complex or oil refinery. A sample balance is shown in Fig. 1-4. It shows steam production and consumption, the header systems, letdown stations, and boiler plant. It illustrates a normal (winter) case.It should be emphasized that there is not one balance but a series, representing a variety of operating modes. The object of the balances is to determine the design basis for establishing boiler she, letdown stations and deaerator capacities, boiler feedwater requirements, and steam flows in various parts of the system.The steam balance should cover the following operating modes: normal, all units operating; winter and summer conditions; shutdown of major units; startup of major units; loss of largest condensate source; power failure with flare in service; loss of large process steam generators; and variations in consumption by large steam users.From 50 t0 100 steam balances could be required to adequately cover all the major impacts on the steam system of a large complex.At this point, the general basis of the steam system design should have been developed by the completion of the following work:1. All significant loads have been examined, with particular attention focused on those for which there is relatively little design freedom - i.e., reboilers, sparing steam for process units, large turbines required because of electric power limitation and for shutdown safety.2. Loads have been listed for which the designer has some liberty in selecting drivers. These selections are based on analyses of cost competitiveness.3. Steam pressure and temperature levels have been established.4. The site plan has been reviewed to ascertain where it is not feasible to deliver steam or recover condensate, because piping costs would be excessive.5. Data on the process units are collected according to the pressure level and use of steam - i.e., for the process, condensing drivers and backpressure drivers.6. After Step 5, the system is balanced by trial-and-error calculations or computerized techniques to determine boiler, letdown, deaerator and boiler feedwater requirements.7. Because the possibility of an electric power failure normally imposes one of the major steam requirements, normal operation and the eventuality of such a failure must both be investigated, as a minimum.Checking the design basisAfter the foregoing steps have been completed, the following should be checked:Boiler capacity - Installed boiler capacity would be the maximum calculated (with an allowance of l0-20% for uncertainties in the balance), corrected for the number of boilers operating (and on standby).The balance plays a major role in establishing normal-case boiler specifications, both number and size. Maximum firing typically is based on the emergency case. Normal firing typically establishes the number of boilers required, because each boiler will have to be shut down once a year for the code-required drum inspection. Full-firing levels of the remaining boilers will be set by the normal steam demand. The number of units required (e.g., three 50% units, four 33%units, etc.) in establishing installed boiler capacity is determined from cost studies. It is generally considered double-jeopardy design to assume that a boiler will be out of service during a power failure.Minimum boiler turndown - Most fuel-fired boilers can be operated down to approximately 20% of the maximum continuous rate. The maximum load should not be expected to be below this level.Differences between normal and maximum loads –If the maximum load results from an emergency (such as power failure), consideration should be given to shedding process steam loads under this condition in order to minimize in- stalled boiler capacity. However, the consequences of shedding should be investigated by the process designer and the operating engineers to ensure the safe operation of the entire process.Low-level steam consumption - The key to any steam balance is the disposition of low-level steam. Surplus low-level steam can be reduced only by including more condensing steam turbines in the system, or devising more process applications for it, such as absorption refrigeration for cooling process streams and ranking-cycle systems for generating power. In general, balancing the supply and consumption of low-level steam is a critical factor in the design of the steam system.Quantity of steam at pressure-reducing stations - Because useful work is not recovered from the steam passing through a pressure-reducing station, such flow should be kept at a minimum. In the Fig. 1-5 150/50-psig station, a flow of only 35,000 lb/h was established as normal for this steam balance case (normal, winter). The loss of steam users on the 50-psig systems should be considered, particularly of the large users, because a shutdown of one may demand that the 150/50-psig station close off beyond its controllable limit. If this happened, the 50-psig header would be out of control, and an immediate-pressure buildup in the header wouldbegin, setting off the safety relief valves.The station's full-open capacity should also be checked to ensure that it can make up any 50-psig steam that may be lost through the shutdown of a single large 50-psig source (a turbine sparing a large electric motor, for example}. It would be undesirable for the station to be sized so that it opens more than 80%. In some cases, range ability requirements may dictate two valves (one small and one large).Intermediate pressure level - If large steam users or suppliers may come on stream or go off steam, the normal(day-to-day) operation should be checked. No such change in normal operation should result in a significant upset (e.g.,relief valves set off, or the system pressure control lost).If a large load is lost, the steam supply should be reduced by the letdown-station. If the load suddenly increases, the 600/150-psig station must be able of supplying the additional steam. If steam generated via the process disappears, the station must be capable of making up theload. If150-psig steam is generated unexpectedly, the 600/150-psig station must be able to handle the cutback.The important point here is that where the steam flow could rise t0 700,000 lb/h, this flow should be reduced by a cutback at the 600/150-psig station, not by an increase in the flow to the lower-pressure level, because this steam would have nowhere to go. The normal (600/150-psig) letdown station must be capable of handling some of the negative load swings, even though, overall, this letdown needs to be kept to a minimum.On the other hand, shortages of steam at the 150-psig level can be made up relatively easily via the 600/150-psig station. Such shortages are routinely small in quantity or duration, or both-(startup, purging, electric drive maintenance, process unit shutdown, etc.)High-pressure level - Checking the high-pressure level is generally more straightforward because rate control takes place directly at the boilers. Firing can be increased or lowered to accommodate a shortage or surplus.Typical steam-balance casesThe Fig. 1-4 steam balance represents steady-state condition, winter operation, all process units operating, and no significant unusual demands for steam.An analysis similar to the foregoing might also be required for the normal summertime case, in which a single upset must not jeopardize control but the load may be less (no tank heating, pipe tracing, etc.)The balance representing an emergency (e.g., loss of electric power) is significant. In this case, the pertinent test point is the system's ability to simply weather the upset, not to maintain normal, stable operation. The maximum relief pressure that would develop in any of the headers represents the basis for sizing relief valves. The loss of boiler feed water or condensate return, or both, could result in a major upset, or even a shutdown.Header pressure control during upsetsAt the steady-state conditions associated with the multiplicity of balances, boiler capacity can be adjusted to meet user demands. However, boiler load cannot be changed quickly to accommodate a sharp upset. Response rate is typically limited to 20% of capacity per minute. Therefore, other elements must be relied on to control header pressures during transient conditions.The roles of several such elements in controlling pressures in the three main headers during transient conditions are listed in Table l-3. A control system having these elements will result in a steam system capable of dealing with the transient conditions experienced in moving from one balance point to another.Tracking steam balancesBecause of schedule constraints, steam balances and boiler size are normally established early in the design stage. These determinations are based on assumptions regarding turbine efficiencies, process steam generated in waste-heat furnaces, and other quantities of steam that depend on purchased equipment. Therefore, a sufficient number of steam balances should be tracked through the design period to ensure that the equipment purchased will satisfy the original design concept of the steam system.This tracking represents an excellent application for a utility data-base system and a system linear programming model. During the course of the mechanical design of a large "grass roots" complex, 40 steam balances were continuously updated for changes in steam loads via such an application.Cost tradeoffsTo design an efficient but least-expensive system, the designer ideally develops a total minimum-cost curve – which incorporates all the pertinent costs related to capital expenditures, installation, fuel, utilities, operations and maintenance-and performs a cost study of the final system. However, because the designer is under the constraint of keeping to a project schedule, major, highly expensive equipment must be ordered early in the project, when many key parts of the design puzzle are not available (e.g., a complete load summary, turbine water rates, equipment efficiencies and utility costs).A practical alternative is to rely on comparative-cost estimates, as are conventionally used in assisting with engineering decision points. This approach is particularly useful in making early equipment selections when fine-tuning is not likely to alter decisions, such as regarding the number of boilers required, whether boilers should be shop-fabricated or field-erected, and the practicality of generating steam from waste heat or via cogeneration.The significant elements of a steam-system cost-comparative study are costs for: equipment and installation; ancillaries (i.e., miscellaneous items required to support the equipment,such as additional stacks, upgraded combustion control, more extensive blowdown facilities, etc.); operation(annual); maintenance (annual); and utilities.The first two costs may be obtained from in-house data or from vendors. Operational and maintenance costs can be factored from the capital cost for equipment based on an assessment of the reliability of the purchased equipment.Utility costs are generally the most difficult to establish at an early stage because sources frequently depend on the site of the plant. Some examples of such costs are: purchased fuel gas - $5.35/million Btu, raw water - $0.60/1,000 gal, electricity - $0.07{kWh, and demineralized boiler feedwater -$1.50/1,000 gal. The value of steam at the various pressureLevels can be developed [5J.Let it be further assumed that the emergency balance requires 2,200,000 lb/h of steam (all boilers available). Listed in Table 1 4 are some combinations of boiler installations that meet the design conditions previously stipulated.Table l-4 indicates that any of the several combinations of power-boiler number and size could meet both normal and emergency demand. Therefore, a comparative-cost analysis would be made to assist in making an early decision regarding the number and size of the power boilers.(Table l-4 is based on field-erected, industrial-type boiler Conventional sizing of this type of boiler might range from 100,000 lb/h through 2,000,000 lb/h for each.)An alternative would be the packaged boiler option (although it does not seem practical at this load level. Because it is shop-fabricated, this type of boiler affords a significant saving in terms of field installation cost. Such boilers are available up to a nominal capacity of 100,000 lb/h, with some versions up t0 250,000 lb7h.Selecting turbine water rate i.e., efficiency) represents another major cost concern. Beyond the recognized payout period (e.g., 3 years), the cost of drive steam can be significant in comparison with the equipment capital cost. The typical 30% efficiency ofthe medium-pressure backpressure turbine can be boosted significantly.Driver selections are frequently made with the help of cost-tradeoff studies, unless overriding considerations preclude a drive medium. Electric pump drives are typically recommended on the basis of such studies.Steam tracing has long been the standard way of winterizing piping, not only because of its history of successful performance but also because it is an efficient way to use low-pressure steam.Design consideratonsAs the steam system evolves, the designer identifies steam loads and pressure levels, locates steam loads, checks safety aspects, and prepares cost-tradeoff studies, in order to provide low-cost energy safely, always remaining aware of the physical entity that will arise from the design.How are design concepts translated into a design document? And what basic guidelines will ensure that the physical plant will represent what was intended conceptually?Basic to achieving these ends is the piping and instrument diagram (familiar as the P&ID). Although it is drawn up primarily for the piping designers benefit, it also plays a major role in communicating to the instrumentation designer the process-control strategy, as well as in conveying specialty information to electrical, civil, structural, mechanical and architectural engineers. It is the most important document for representing the specification of the steam。

机械毕业设计英文外文翻译300拉臂式垃圾车设计

机械毕业设计英文外文翻译300拉臂式垃圾车设计

附录AThe Design of Pull Arm Garbage Truck1The introduction of Pull Arm Garbage TruckPull arm garbage truck is equipped with two types of chassis that has a trunk load and unloading functions to pull arm device-specific vehicles. It can be achieved with car trunk the combination and separation, while the bulk of the trunk to achieve self-unloading cargo operations. The model has been widely used in foreign countries, often in the domestic industry as a sanitation refuse collection vehicles. 5 t pull arm garbage truck is one of the commonly used models, compared to 8 t Arm pull over large tonnage trucks, the pull-arm device structure is relatively simple and easy to domestic Manufacturers; And large tonnage often imported pull arm device. Domestic Manufacturers producing 5 t pull the car pulling the boom arm structure of the device, although about the same, but the important structural parameters of the selection and design of different structural arrangement, it will directly affect the car performance]20[.2 Pull the boom structure and principle of the device2.1 The structural characteristics of pull-arm device5 t pull arm garbage truck pulling device consists of pulling the boom arm and pull arm cylinder, the United Moving frame, trunk insurance hook and cylinder, and the frame. La Boom device structural arrangement shown in figure 2, pull telescopic arm is not used right-angle bend structure. the end of the cylinder and pull the piston rod side arm hinged on the hinge pivot B; Another linkage frame front end and hinged at the hinge pivot C, the formation of a rotary arm pullheart. Cylinder head cylinder arm pull side hinged front frame on the hinge pivot A; linkage frame hinged rear axle frame rear hinge pivot D, the formation of linkage rotary frame heart. Insurance linkage trunk rack hook set the hook cylinder and insurance cylinder.2.2 The working principle of the device arm pullPulling garbage truck arm by pulling the device to complete the function of two different dynamic, for boxes and dumping. When the pull device for boom box action, the first cylinder insurance hook action open the trunk insurance hook, trunk lift insurance. Pull lift arm cylinder piston rod elongation from the pull arm, pull arm to pivot around the hinge C clockwise rotation, the hook arm to pull back move. If the frame is equipped with a trunk, the trunk was pushed home ground. When put on the frame, so that the first hook retractor trunk rings, and contraction of the piston rod, pull arm to hinge pivot counter-clockwise rotation axis C, will put on the flat trunk, the insurance cylinder hook action, pull carriages insurance hook fixed to the frame to the trunk.When the pull-arm device dumping action, and action for different box, trunk insurance hook dump in the whole process to ensure that tension in the arm and trunk are not isolated, that is pull arm、the linkage through the trunk rack and trunk link between the insurance as one of the hook, by the deputy rear frame hinge pivot clockwise rotation axis D, lifting carriages lifted until the refuse rubbish. Trunk reset, as long as the retraction of cylinder piston rod pull arm, the pulling arm body still hinge pivot point D is the shaft counterclockwise rotation, until the trunk reset.3 La Boom Selection and design of device structure parameters3.1 Device to pull the boom pivot hinge arrangement and geometryof the main structureDetermined by the following three areas:a. Arm by pulling a dump truck performance, it is 5 t pull the best selection of cars from the arm unloading chassis, the chassis can be selected according to the length of pull arm device to determine frame the total length. To ensure the car to pull arm for changing trunk and dumping action by the force of the chassis reasonable and complete the dumping arm pull action pivot hinge rotation axis D of the location should be arranged in behind the rear spring plate from the chassis rear bearing axis, the spacing is about 0 ~ 100 mm.b. According to the first hinge pivot D arm pull for me the beginning of the selected pivot hinge rotation axis C. In the design and production of the actual process of pulling the car arm in arm had appeared during the pull action although the initial state, pull arm lift carriages, failed to pull arm pivot around the hinge C rotation, but with the linkage frame with the rotation around the hinge pivot point D, which can not get trunk open the beginning of fall; when lifting a certain height, the action of gravity in the trunk, the hinge will pivot C a sudden fall, so pull arm, the linkage frame and carriages suddenly drop, resulting in relatively large; in hit, resulting in extremely unsafe for me a smooth action. To resolve this problem, determine the hinge point C of the axis position is especially important. First the one hand, the horizontal axis of pivot C can not above the level layout of pivot D. In addition, by the hinge can pivot C stress analysis know, the hinge pivot axis of C must be below the level of tension hinge pivot arm cylinder head horizontal axis, while the hook arm pull-start action must be arranged in the vertical axis of the hinge pivot between C and the hinge pivot left foot.c. Important geometrical parameters arm pull a pull arm foot radiusof gyration for pull the oil boom turning radius of the cylinder piston rod end of radius of gyration of the angle between the two radius. From the above points analysis we know that, The smaller of radius. The greater the force needed to pull the smaller cylinder arm. Meet the requirements under the premise of arms-for-me pull-foot turning radius, the smaller the better, La boom cylinder rod side radius of gyration R. The bigger the better as far as possible, so that can pull compact boom, operating small space]21[.3.2 The selection of pull arm cylinder and cylinder installation angle y. The range ofDetermined by the following two aspects:a. By mapping method or analytical method to determine the location of the above the hinge pivot and Pull arm geometry and other components, may initially determine the pull-stroke arm cylinder and installation distance.b. Pull arm cylinder mounting angle of La Boom is the important structural parameters of devices. By the former knowledge, pull the boom box or device for carrying out the process of dumping action, pull the oil boom cylinders have to be overcome trunk (full load) resistance torque generated by gravity, and the lifting crane action start unloading boxes when the moment of resistance is the greatest moment of resistance to overcome, and in Boom began pulling action of the hinge pivot device static friction and inertia moment of resistance Maximum torque. So pull arm cylinder mounting angle y. From the previous analysis we know, when angle larger, the pull arm cylinder smaller maximum thrust required, select the pull arm cylinder bore can be smaller.By pulling in the boom cylinder is installed between the frame andtrunk floor, oil cylinder installation layout space is limited, so the pull arm cylinder mounting angle range is also very limited. Design principles to children as much as possible to install a large angle, choose the right drawing arm oil pulling arm cylinder bore to meet performance requirements for the use of vehicles, without increasing the cost and fuel tank weight, and easy layout. Analysis and comparison of some domestic manufacturers to produce 5 t pull arm ,the actual design and production of cars and trucks pulling arm experience, 5 t pull arm around the installation space vehicles between 250 ~ 300 mm, the general tension arm cylinder mounting angle should be Taken between 3°~5°.附录B拉臂式垃圾车设计1拉臂车概述拉臂式垃圾车是在二类汽车底盘上装有使车箱具有装载和卸载功能的拉臂架装置的专用汽车。

java毕业设计中英文翻译

java毕业设计中英文翻译

java毕业设计中英文翻译篇一:JAVA外文文献+翻译Java and the InternetIf Java is, in fact, yet another computer programming language, you may question why it is so important and why it is being promoted as a revolutionary step in computer programming. The answer isn’t immediately obvious if you’re coming from a traditional programming perspective. Although Java is very useful for solving traditional stand-alone programming problems, it is also important because it will solve programming problems on the World Wide Web.1. Client-side programmingThe Web’s initial server-browser design provided for interactive content, but the interactivity was completely provided by the server. The server produced static pages for the client browser, which would simply interpret and display them. Basic HTML contains simple mechanisms for data gathering: text-entry boxes, check boxes, radio boxes, lists and drop-down lists, as well as a button that can only be programmed to reset the data on the form or “submit” the data on the form backto the server. This submission passes through the Common Gateway Interface (CGI) provided on all Web servers. The text within the submission tells CGI what to do with it. The most common action is to run a program located on the server in a directory that’s typically called “cgi-bin.” (If you watch the address window at the top of your browser when you push a button on a Web page, you can sometimes see “cgi-bin” within all the gobbledygook there.) These programs can be written in most languages. Perl is a common choice because it is designed for text manipulation and is interpreted, so it can be installed on any server regardless of processor or operating system. Many powerful Web sites today are built strictly on CGI, and you can in fact do nearly anything with it. However, Web sites built on CGI programs can rapidly become overly complicated to maintain, and there is also the problem of response time. The response of a CGI program depends on how much data mustbe sent, as well as the load on both the server and the Internet. (On top of this, starting a CGI program tends to be slow.) The initial designers of the Web didnot foresee how rapidly this bandwidth would be exhausted for the kinds of applications people developed. For example, any sort of dynamic graphing is nearly impossible to perform with consistency because a GIF file must be created and moved from the server to the client for each version of the graph. And you’ve no doubt had direct experience with something as simple as validating the data on an input form. You press the submit button on a page; the data is shipped back to the server; the server starts a CGI program that discovers an error, formats an HTML page informing you of the error, and then sends the page back to you; you must then back up a page and try again. Not only is this slow, it’s inelegant.The solution is client-side programming. Most machines that run Web browsers are powerful engines capable of doing vast work, and with the original static HTML approach they are sitting there, just idly waiting for the server to dish up the next page. Client-side programming means that the Web browser is harnessed to do whatever work it can, and the result for the user is a much speedier and more interactive experience atyour Web site.The problem with discussions of client-side programming is that they aren’t very different from discussions of programming in general. The parameters are almost the same, but the platform is different: a Web browser is like a limited operating system. In the end, you must still program, and this accounts for the dizzying array of problems and solutions produced by client-side programming. The rest of this section provides an overview of the issues and approaches in client-side programming.2.Plug-insOne of the most significant steps forward in client-side programming is the development of the plug-in. This is a way for a programmer to add new functionality to the browser by downloading a piece of code that plugs itself into the appropriate spot in the browser. It tells the browser “from now on you can perform this new activity.” (You need to download the plug-in only once.) Some fast and powerful behavior is added to browsers via plug-ins, but writing a plug-in is not a trivial task, and isn’t something you’d wantto do as part of the process of building a particular site. The value of the plug-in for client-side programming is that it allows an expert programmer to develop a new language and add that language to a browser without the permission of the browser manufacturer. Thus, plug-ins provide a “back door”that allows the creation of new client-side programming languages (although not all languages are implemented as plug-ins).3.Scripting languagesPlug-ins resulted in an explosion of scripting languages. With a scripting language you embed the source code for your client-side program directly into the HTML page, and the plug-in that interprets that language is automatically activated while the HTML page is being displayed. Scripting languages tend to be reasonably easy to understand and, because they are simply text that is part of an HTML page, they load very quickly as part of the single server hit required to procure that page. The trade-off is that your code is exposed for everyone to see (and steal). Generally, however, you aren’t doing amazingly sophisticatedthings with scripting languages so this is not too much of a hardship.This points out that the scripting languages used inside Web browsers are really intended to solve specific types of problems, primarily the creation of richer and more interactive graphical user interfaces (GUIs). However, a scripting language might solve 80 percent of the problems encountered in client-side programming. Your problems might very well fit completely within that 80 percent, and since scripting languages can allow easier and faster development, you should probably consider a scripting language before looking at a more involved solution such as Java or ActiveX programming.The most commonly discussed browser scripting languages are JavaScript (which has nothing to do with Java; it’s named that way just to grab some of Java’s marketing momentum), VBScript (which looks like Visual Basic), andTcl/Tk, which comes from the popular cross-platform GUI-building language. There are others out there, and no doubt more in development.JavaScript is probably the most commonly supported. It comes built into both Netscape Navigator and the Microsoft Internet Explorer (IE). In addition, there are probably more JavaScript books available than there are for the other browser languages, and some tools automatically create pages using JavaScript. However, if you’re already fluent in Visual Basic or Tcl/Tk, you’ll be more productive using those scripting languages rather than learning a new one. (You’ll have your hands full dealing with the Web issues already.)4.JavaIf a scripting language can solve 80 percent of the client-side programming problems, what about the other 20 percent—the “really hard stuff?” The most popular solution today is Java. Not only is it a powerful programming language built to be secure, cross-platform, and international, but Java is being continually extended to provide language features and libraries that elegantly handle problems that are difficult in traditional programming languages, such as multithreading, database access, network programming, and distributed computing. Java allowsclient-side programming via the applet.An applet is a mini-program that will run only under a Web browser. The applet is downloaded automatically as part of a Web page (just as, for example, a graphic is automatically downloaded). When the applet is activated it executes a program. This is part of its beauty—it provides you with a way to automatically distribute the client software from the server at the time the user needs the client software, and no sooner. The user gets the latest version of the client software without fail and without difficult reinstallation. Because of the way Java is designed, the programmer needs to create only a single program, and that program automatically works with all computers that have browsers with built-in Java interpreters. (This safely includes the vast majority of machines.) Since Java is a full-fledged programming language, you can do as much work as possible on the client before and after making requests of theserver. For example, you won’t need to send a request form across the Internet to discover that you’ve gotten a date or some other parameter wrong, and yourclient computer can quickly do the work of plotting data instead of waiting for the server to make a plot and ship a graphic image back to you. Not only do you get the immediate win of speed and responsiveness, but the general network traffic and load on servers can be reduced, preventing the entire Internet from slowing down.One advantage a Java applet has over a scripted program is that it’s in compiled form, so the source code isn’t available to the client. On the other hand, a Java applet can be decompiled without too much trouble, but hiding your code is often not an important issue. Two other factors can be important. As you will see later in this book, a compiled Java applet can comprise many modules and take multiple server “hits” (accesses) to download. (In Java 1.1 and higher this is minimized by Java archives, called JAR files, that allow all the required modules to be packaged together and compressed for a single download.) A scripted program will just be integrated into the Web page as part of its text (and will generally be smaller and reduce server hits). This could be important to the responsiveness of your Website. Another factor is the all-important learning curve. Regardless of what you’ve heard, Java is not a trivial language to learn. If you’re a Visual Basic programmer, moving to VBScript will be your fastest solution, and since it will probably solve most typical client/server problems you might be hard pressed to justify learning Java. If you’re experienced with a scripting language you will certainly benefit from looking at JavaScript or VBScript before committing to Java, since they might fit your needs handily and you’ll be more productive sooner.to run its applets withi5.ActiveXTo some degree, the competitor to Java is Microsoft’s ActiveX, although it takes a completely different approach. ActiveX was originally a Windows-only solution, although it is now being developed via an independent consortium to become cross-platform. Effectively, ActiveX says “if your program connects to篇二:JAVA思想外文翻译毕业设计文献来源:Bruce Eckel. Thinking in Java [J]. Pearson Higher Isia Education,XX-2-20.Java编程思想 (Java和因特网)既然Java不过另一种类型的程序设计语言,大家可能会奇怪它为什么值得如此重视,为什么还有这么多的人认为它是计算机程序设计的一个里程碑呢?如果您来自一个传统的程序设计背景,那么答案在刚开始的时候并不是很明显。

毕业设计 英文

毕业设计 英文

毕业设计英文Graduation ProjectIntroduction:The graduation project is an essential part of completing our education. It is a significant milestone in our academic journey and an opportunity to showcase our skills and knowledge in a particular field. In this project, I will outline the details of my chosen graduation project.Objective:The main objective of my graduation project is to design and develop a mobile application that will assist users in managing their personal finance effectively. This application will provide a range of features and tools that will enable users to track their expenses, create budgets, and set savings goals.Project Description:The mobile application will be developed for both iOS and Android platforms, ensuring compatibility with a wide range of devices. The user interface will be intuitive and user-friendly, allowing users to easily navigate through the app's features. The application will require users to create an account to access its functionalities securely.Features:1. Expense Tracking: Users will be able to add their daily expenses and categorize them based on different predefined categories, such as food, transportation, entertainment, etc. The app will display the total expenses, along with a breakdown of expenses by category,enabling users to identify areas for potential cost-cutting.2. Budget Creation: The application will allow users to set monthly budgets for different expense categories. Users will receive notifications when they exceed their budget limits, reminding them to manage their spending efficiently.3. Savings Goals: Users can set savings goals based on their financial targets. The app will track their progress towards achieving these goals, providing visual representations of their savings growth and estimating the time required to reach their objectives.4. Transaction History: Users will have access to a transaction history that will allow them to review their past expenses and monitor their financial activities over time. This feature will provide users with a comprehensive overview of their spending habits.Conclusion:The development of this mobile application will provide users with a useful tool for managing their personal finance. In an increasingly digital world, it is crucial to leverage technology to streamline and optimize our financial management processes. This graduation project will not only enhance my technical skills but also contribute to society by providing a practical solution for individuals to improve their financial well-being.。

大学本科毕业设计--英文原文+中文翻译

大学本科毕业设计--英文原文+中文翻译

Library of C the CNC industrialdeveloped tens of thousands and educational field, he hasNUMERICAL CONTROLNumerical Control technology as it is known today, emerged in the mid 20th century. It can be traced to the year of 1952, the U.S. Air Force, and the names of John Parsons and the Massachusetts Institute of Technology in Cam-bridge, MA, USA. It was not applied in production manu-facturing until the early 1960's. The real boom came in the form of CNC, around the year of 1972, and a decade later with the introduction of affordable micro computers. The history and development of this fascinating technology has been well documented in many publications.In the manufacturing field, and particularly in the area of metal working, Numerical Control technology has caused something of a revolution. Even in the days before comput-ers became standard fixtures in every company and in many homes, the2machine tools equipped with Numerical Control system found their special place in the machine shops. The recent evolution of micro electronics and the never ceasing computer development, including its impact on Numerical Control, has brought significant changes to the manufacturing sector in general and metalworking in-dustry in particular.DEFINITION OF NUMERICAL CONTROLIn various publications and articles, many descriptions have been used during the years, to define what Numerical Control is. It would be pointless to try to find yet another definition, just for the purpose of this handbook. Many of these definitions share the same idea, same basic concept, just use different wording.The majority of all the known definitions can be summed up into a relatively simple statement:Numerical Control can be defined as an operation of machine tools by the means of specifically coded instructions to the machine control systemThe instructions are combinations of the letters of alpha-bet, digits and selected symbols, for example, a decimal point, the percent sign or the parenthesis symbols. All in-structions are written in a logical order and a predetermined form. The collectionNUMERICAL CONTROLof all instructions necessary to ma-chine a part is called an NC Program, CNC Program, or a Part Program. Such a program can be stored for a future use and used repeatedly to achieve identical machining re-sults at any time.♦ NC and CNC TechnologyIn strict adherence to the terminology, there is a differ-ence in the meaning of the abbreviations NC and CNC. The NC stands for the older and original Numerical Control technology, whereby the abbreviation CNC stands for the newer Computerized Numerical Control technology, a modem spin-off of its older relative. However, in practice, CNC is the preferred abbreviation. To clarify the proper us-age of each term, look at the major differences between the NC and the CNC systems.Both systems perform the same tasks, namely manipula-tion of data for the purpose of machining a part. In both cases, the internal design of the control system contains the logical instructions that process the data. At this point the similarity ends. The NC system (as opposed to the CNC system) uses a fixed logical functions, those that are built-in and perma-nently wired within the control unit. These functions can-not be changed by the programmer or the machine opera-tor. Because of the fixed4wiring of the control logic, the NC control system is synonymous with the term 'hardwired'. The system can interpret a part program, but it does not al-low any changes to the program, using the control features. All required changes must be made away from the control, typically in an office environment. Also, the NC system re-quires the compulsory use of punched tapes for input of the program information.The modem CNC system, but not the old NC system, uses an internal micro processor (i.e., a computer). This computer contains memory registers storing a variety of routines that are capable of manipulating logical functions. That means the part programmer or the machine operator can change the program on the control itself (at the ma-chine), with instantaneous results. This flexibility is the greatest advantage of the CNC systems and probably the key element that contributed to such a wide use of the tech-nology in modern manufacturing. The CNC programs and the logical functions are stored on special computer chips, as software instructions, rather than used by the hardware connections, such as wires, that control the logical func-tions. In contrast to the NC system, the CNC system is syn-onymous with the term 'softwired'.NUMERICAL CONTROLWhen describing a particular subject that relates to the numerical control technology, it is customary to use either the term NC or CNC. Keep in mind that NC can also mean CNC in everyday talk, but CNC can never refer to the older technology, described in this handbook under the abbrevia-tion ofNC. The letter 'C 'stands for Computerized, and it is not applicable to the hardwired system. All control systems manufactured today are of the CNC design. Abbreviations such as C&C or C'n 'C are not correct and reflect poorly on anybody that uses them.CONVENTIONAL AMD CNC MACHININGWhat makes the CNC machining superior to the conven-tional methods? Is it superior at all? Where are the main benefits? If the CNC and the conventional machining pro-cesses are compared, a common general approach to ma-chining a part will emerge: Obtain and study the drawingSelect the most suitable machining methodDecide on the setup method (work holding)Select the cutting toolsEstablish speeds and feedsMachine the part6This basic approach is the same for both types of machin-ing. The major difference is in the way how various data are input. A feedrate of 10 inches per minute (10 in/min) is the same in manual or CNC applications, but the method of applying it is not. The same can be said about a coolant - it can be activated by turning a knob, pushing a switch or programming a special code. All these actions will result in a coolant rushing out of a nozzle. In both kinds of machin-ing, a certain amount of knowledge on the part of the user is required. After all, metal working, particularly metal cut-ting, is mainly a skill, but it is also, to a great degree, an art and a profession of large number of people. So is theappli-cation of Computerized Numerical Control. Like any skill or art or profession, mastering it to the last detail is neces-sary to be successful. It takes more than technical knowl-edge to be a CNC machinist or a CNC programmer. Work experience and intuition, and what is sometimes called a 'gut-feel', is a much needed supplement to any skill.In a conventional machining, the machine operator sets up the machine and moves each cutting tool, using one or both hands, to produce the required part. The design of a manual machine tool offers many features that help the process of machining a part -NUMERICAL CONTROLlevers, handles, gears and di-als, to name just a few. The same body motions are re-peated by the operator for every part in the batch. However, the word 'same 'in this context really means'similar 'rather than 'identical'. Humans are not capable to repeat every process exactly the same at all times - that is the job ofma-chines. People cannot work at the same performance level all the time, without a rest. All of us have some good andsome bad moments. The results of these moments, when*applied to machining a part, are difficult to predict. There will be some differences and inconsistencies within each batch of parts. The parts will not always be exactly the same. Maintaining dimensional tolerances and surface fin-ish quality are the most typical problems in conventional machining. Individual machinists may have their own time 'proven' methods, different from those of their fellow col-leagues. Combination of these and other factors create a great amount of mconsistency.The machining under numerical control does away with the majority of inconsistencies. It does not require the same physical involvement as manual machining. Numerically controlled machining does not need any levers or dials or handles, at least8not in the same sense as conventional ma-chining does. Once the part program has been proven, it can be used any number of times over, always returning consistent results. That does not mean there are no limiting factors. The cutting tools do wear out, the material blank in one batch is not identical to the material blank in another batch, the setups may vary, etc. These factors should be considered and compensated for, whenever necessary.The emergence of the numerical control technology does not mean an instant, or even a long term, demise of all man-ual machines. There are times when a traditional machin-ing method is preferable to a computerized method. For ex-ample, a simple one time job may be done more efficiently on a manual machine than a CNC machine. Certain types of machining jobs will benefit from manual or semiauto-matic machining, rather than numerically controlled ma-chining. The CNC machine tools are not meant to replace every manual machine, only to supplement them.In many instances, the decision whether certain machin-ing will be done on a CNC machine or not is based on the number of required parts and nothing else. Although the volume of partsNUMERICAL CONTROLmachined as a batch is always an important criteria, it should never be the only factor. Consideration should also be given to the part complexity, its tolerances, the required quality of surface finish, etc. Often, a single complex part will benefit from CNC machining, while fifty relatively simple parts will not.Keep in mind that numerical control has never machined a single part by itself. Numerical control is only a process or a method that enables a machine tool to be used in a pro-ductive, accurate and consistent way.NUMERICAL CONTROL ADVANTAGESWhat are the main advantages of numerical control?It is important to know which areas of machining will benefit from it and which are better done the conventional way. It is absurd to think that a two horse power CNC mill will win over jobs that are currently done on a twenty times more powerful manual mill. Equally unreasonable are ex-pectations of great improvements in cutting speeds and feedrates over a conventional machine. If the machining and tooling conditions are the same, the cutting time will be very close in both cases.Some of the major areas where the CNC user can and should expect improvement:10Setup time reductionLead time reductionAccuracy and repeatabilityContouring of complex shapesSimplified tooling and work holdingConsistent cutting timeGeneral productivity increaseEach area offers only a potential improvement. Individ-ual users will experience different levels of actual improve-ment, depending on the product manufactured on-site, the CNC machine used, the setup methods, complexity of fixturing, quality of cutting tools, management philosophy and engineering design, experience level of the workforce, individual attitudes, etc.Setup Time ReductionIn many cases, the setup time for a CNC machine can be reduced, sometimes quite dramatically. It is important to realize that setup is a manual operation, greatly dependent on the performance of CNC operator, the type of fixturing and general practices of the machine shop. Setup time is unproductive, but necessary - it is a part of the overhead costs of doing business. To keep the setupNUMERICAL CONTROLtime to a mini-mum should be one of the primary considerations of any machine shop supervisor, programmer and operator. Because of the design of CNC machines, the setup time should not be a major problem. Modular fixturing, standard tooling, fixed locators, automatic tool changing, pallets and other advanced features, make the setup time more efficient than a comparable setup of a conventional machine. With a good knowledge of modern manufacturing, productivity can be increased significantly.The number of parts machined under one setup is also important, in order to assess the cost of a setup time. If a great number of parts is machined in one setup, the setup cost per part can be very insignificant. A very similar re-duction can be achieved by grouping several different oper-ations into a single setup. Even if the setup time is longer, it may be justified when compared to the time required to setup several conventional machines.Lead Time ReductionOnce a part program is written and proven, it is ready to be Bsed again in the future, even at a short notice. Although the lead time for the first run is usually longer, it is virtually nil for any subsequent run. Even if an engineering change of the part design12requires the program to be modi tied, it can be done usually quickly, reducing the lead time.Long lead time, required to design and manufacture sev-eral special fixtures for conventional machines, can often be reduced by preparing a part program and the use of sim-plified fixturing. Accuracy and RepeatabilityThe high degree of accuracy and repeatability of modern CNC machines has been the single major benefit to many users. Whether the part program is stored on a disk or in the computer memory, or even on a tape (the original method), it always remains the same. Any program can be changed at will, but once proven, no changes are usually required any more. A given program can be reused as many times as needed, without losing a single bit of data it contains. True, program has to allow for such changeable factors as tool wear and operating temperatures, it has to be stored safely, but generally very little interference from the CNC pro-grammer or operator will be required. The high accuracy of CNC machines and their repeatability allows high quality parts to be produced consistently time after time. Contouring of Complex ShapesNUMERICAL CONTROLCNC lathes and machining centers are capable of con-touring a variety of shapes. Many CNC users acquired their machines only to be able to handle complex parts. A good examples are CNC applications in the aircraft and automo-tive industries. The use of some form of computerized pro-gramming is virtually mandatory for any three dimensional tool path generation.Complex shapes, such as molds, can be manufactured without the additional expense of making a model for trac-ing. Mirrored parts can be achieved literally at the switch of a button. Storage of programs is a lot simpler than storage of patterns, templates, wooden models, and other pattern making tools.Simplified Tooling and Work HoldingNonstandard and 'homemade' tooling that clutters the benches and drawers around a conventional machine can be eliminated by using standard tooling, specially designed for numerical control applications. Multi-step tools such as pilot drills, step drills, combination tools, counter borers and others are replaced with several individual standard tools. These tools are often cheaper and easier to replace than special and nonstandard tools.Cost-cutting measures have forced many tool suppliers to keep a low or even a nonexistent inventory, increasing the delivery lime14to the customer. Standard, off-the-shelf tooling can usually beob-tained faster then nonstandard tooling.Fixturing and work holding for CNC machines have only one major purpose - to hold the part rigidly and in the same position for all parts within a batch. Fixtures designed for CNC work do not normally require jigs, pilot holes and other hole locating aids.♦ Cutting Time and Productivity IncreaseThe cutting time on the CNC machine is commonly known as the cycle time - and is always consistent. Unlike a conventional machining, where the operator's skill, experi-ence and personal fatigue are subject to changes, the CNC machining is under the control of a computer. The small amount of manual work is restricted to the setup andload-ing and unloading the part. For large batch runs, the high cost of the unproductive time is spread among many parts, making it less significant. The main benefit of a consistent cutting time is for repetitive jobs, where the production scheduling and work allocation to individual machine tools can be done very accurately.The main reason companies often purchase CNCma-chines is strictly economic - it is a serious investment. Also, having a competitive edge is always on the mind of every plant manager. The numerical control teclmology offers excellent means to achieve a significant improvement in the manufacturing productivity and increasing the overall quality of the manufactured parts. Like any means, it has to be used wisely and knowledgeably. When more and more companies use the CNCtechnology, just having a CNC machine does not offer the extra edge anymore. Thecom-panies that get forward are those who know how to use the technology efficiently and practice it to be competitive in the global economy.To reach the goal of a major increase in productivity, it is essential that users understand the fundamental principles on which CNC technology is based. These principles take many forms, for example, understanding the electronic cir-cuitry, complex ladder diagrams, computer logic, metrol-ogy, machine design, machining principles and practices and many others. Each one has to be studied and mastered by the person in charge. In this handbook, the emphasis is on the topics that relate directly to the CNC programming and understanding the most common CNC machine tools, the Machining Centers and the lathes (sometimes also called the Turning Centers). The part quality consideration should be very important to every programmer and ma-chine tool operator and this goal is also reflected in the handbook approach as well as in the numerous examples.TYPES OF CNC MACHINE TOOLSDifferent kinds of CNCmachines cover an extremelylarge variety. Their numbersare rapidly increasing, as thetechnology developmentadvances. It is impossible toiden-tify all the applications,they would make a long list.Here is a brief list of some ofthe groups CNC machines canbe part of: *Mills and Machining centersLathes and Turning CentersDrilling machines CNC machining centers andlathes dominate the number ofinstallations in industry. Thesetwo groups share the marketjust about equally. Someindustries may have a higherneed for one group ofmachines, depending on their □ Boring mills and Profilers □ EDM machines □ Punch presses and Shears □ Flame cutting machines □ Routers □ Water jet and Laser profilers □ Cylindrical grinders □ Welding machines □ Benders, Winding and Spinning machines, etc.needs. One must remember that there are many different kinds of ladies and equally many different kinds ofma-chining centers. However, the programming process for a vertical machine is similar to the one for a horizontalma-chine or a simple CNC mill. Even between differentma-chine groups, there is a great amount of general applica-tions and the programming process is generally the same. For example, a contour milled with an end mill has a lot in common with a contour cut with a wire.♦ Mills and Machining Centers Standard number of axes on a milling machine is three - the X, Y and Z axes. The part set on a milling system is al-ways stationary, mounted on a moving machine table. The cutting tool rotates, it can move up and down (or in and out), but it does not physically follow the tool path.CNC mills - sometimes called CNC milling machines - are usually small, simple machines, without a tool changer or other automatic features. Their power rating is often quite low. In industry, they are used for toolroom work, maintenance purposes, or small part production. They are usuallydesigned for contouring, unlike CNC drills.CNC machining centers are far more popular and effi-cient than drills and mills, mainly for their flexibility. The main benefit the user gets out of a CNC machining center is the ability to group several diverse operations into a single setup. For example, drilling, boring, counter boring, tap-ping, spot facing and contour milling can be incorporated into a single CNC program. In addition, the flexibility is enhanced by automatic tool changing, using pallets to minimize idle time, indexing to a different side of the part, using a rotary movement of additional axes, and a number of other features. CNC machining centers can be equipped with special software that controls the speeds and feeds, the life of the cutting tool, automatic in-process gauging and offset adjustment and other production enhancing and time saving devices.There are two basic designs of a typical CNC machining center. They are the vertical and the horizontal machining centers. The major difference between the two types is the nature of work that can be done on them efficiently. For a vertical CNC machining center, the most suitable type of work are flat parts, either mounted to the fixture on the ta-ble, or held in a vise or a chuck. The work that requires ma-chining on two or more faces m a single setup is more de-sirable to be done on a CNC horizontal machining center. An good example is a pump housing and other cubic-like shapes. Some multi-face machining of small parts can also be done on a CNC vertical machining center equipped with a rotary table.The programming process is the same for both designs, but an additional axis (usually a B axis) is added to the hori-zontal design. This axis is either a simple positioning axis (indexing axis) for the table, or a fully rotary axis for simul-taneous contouring. This handbook concentrates on the CNC vertical ma-chining centers applications, with a special section dealing with the horizontal setup and machining. The program-ming methods are also applicable to the small CNC mills or drilling and/or tapping machines, but the programmer has to consider their restrictions.♦ Lathes and Turning CentersA CNC lathe is usually a machine tool with two axes, the vertical X axis and the horizontal Z axis. The main feature of a lathe that distinguishes it from a mill is that the part is rotating about the machine center line. In addition, the cut-ting tool is normally stationary, mounted in a sliding turret. The cutting tool follows the contour of the programmed tool path. For the CNC lathes with a milling attachment, so called live tooling, the milling tool has its own motor and rotates while the spindle is stationary.The modem lathe design can be horizontal or vertical. Horizontal type is far more common than the vertical type, but both designs have their purpose in manufacturing. Sev-eral different designs exist for either group. For example, a typical CNC lathe of the horizontal group can be designed with a flat bed or a slant bed, as a bar type, chucker type or a universal type. Added to these combinations are many ac-cessories that make a CNC lathe an extremely flexible ma-chine tool. Typically, accessories such as a tailstock, steady rests or follow-up rests, part catchers,pullout-fingers and even a third axis milling attachment are popular compo-nents of the CNC lathe. ?CNC lathe can be veiy versatile - so versatile in fact, that it is often called a CNC TurningCenter. All text and program examples in this handbook use the more traditional term CNC lathe, yet still recogniz-ing all its modern functions.中文翻译:数控正如我们现在所知,数控技术出现于20世纪中叶。

毕业设计_英文翻译

毕业设计_英文翻译

9 Continuous-Time DynamicNeural Networks9 连续时间动态神经网络9.1 Dynamic Neural Network Structures: An Introduction9.2 Hopfield Dynamic Neural Network (DNN) and Its Implementation 9.3 Hopfield Dynamic Neural Networks (DNNs) as Gradient-like Systems9.4 Modifications of Hopfield Dynamic Neural Networks9.5 Other DNN Models9.6 Conditions for Equilibrium Points in DNN9.7 Concluding RemarksProblems9.1动态神经网络结构导论9.2动态的Hopfield神经网络(DNN)及其实现9.3动态的Hopfield神经网络(DNNS)为梯度样系统9.4修改动态的Hopfield神经网络9.5其他DNN模型9.6条件平衡点在DNN9.7结语问题As seen in the previous chapters, a neural network consists of many interconnected simple processing units, called neurons, which form the layered configurations. An individual neuron aggregates its weighed inputs and yields an output through a nonlinear activation function with a threshold. In artificial neural networks there are three types of connections: intralayer, interlayer, and recurrent connections. The intralayer connections, which are also called lateral connections or cross-layer connections, are links between neurons in the same layer of the network. The interlayer connections are links between neurons in different layers. The recurrent connections provide self-feedback links to the neurons. In interlayer connections, the signals are transformed in one of the two ways: either feedforward or feedback.就像在前面的章节中,神经网络由许多互连简单处理单元,称为神经元,形成层状结构。

华南理工大学 毕业设计 外文翻译

华南理工大学  毕业设计 外文翻译

华南理工大学本科毕业设计(论文)翻译班级土木工程三班姓名王剑锋学号 200930132042指导教师骆冠勇填表日期 2013年4月21日中文译名一种用于预测拉森钢板桩弯曲强度的数值模型外文原文名 A numerical model for predicting the bending strength of Larssen steel sheetpiles外文原文版出处Journal of Constructional Steel Research 58 (2002) 1361–1374译文:一种用于预测拉森钢板桩弯曲强度的数值模型R.J. Crawford, M.P. Byfield摘要拉森桩为U形横截面并通过可滑动的接头连接在一起组成码头岸壁,围堰,和其他类型的挡土墙。

由于滑动接头位于桩墙的中心线上,相互连接桩的桩间滑移可能导致桩墙70%的弯曲强度折减。

这种桩间滑移可以通过安装成对的带有卷曲的锁头的桩来部分阻止。

然而,像非卷曲桩一样弯曲强度很难被预测,因为这种联锁桩依然存在桩间滑移。

本文提出了一种用于预测联锁拉森桩弯曲应力以及压应力的数值方法。

通过测试1:6比例大小的铝制拉森桩微缩模型的数据与数值模型计算结果进行比较,结果表明数值模型所预测的应力与实际实验结果接近一致。

同时本数值模型也可用于钢板桩的设计生产,以达到使用最少的材料来达到最大的弯曲强度的目的。

C 2002爱思唯尔股份有限公司保留解释权利关键词:行业规范;组合结构;拉森桩;桩结构;挡土墙;钢结构1.介绍钢板桩被广泛运用于全世界。

工程上经常使用的两种钢板桩是U型拉森钢板桩和Z型钢板桩。

两种类型的钢板桩桩都是利用沿着构件长度方向的锁头连接成有缝的连续墙结构。

根据欧洲标准化委员会引入的欧3标准第五部分,U型钢板桩锁头连接部分的下滑位移的影响不能忽视(见图1 步骤1)。

如果钢板桩单肢的相对滑移严重,则钢板桩的弯曲强度会下降到整体强度的70%,我们将其称为钢板桩模量下降。

电子商务网络安全毕业设计英文原文及翻译-论文[管理资料]

电子商务网络安全毕业设计英文原文及翻译-论文[管理资料]

电子商务网络安全毕业设计英文原文及翻译-论文电子商务网络安全毕业设计英文原文及翻译|计算机专业全套免费毕业设计论文网|任务书|本科毕业设计课题目作品下载附录A---英文原文Web Security Privacy & CommerceThe running battle between hackers and network security professionals has moved beyond the perimeter firewall to hand-to-hand combat at individual Web and corporate servers.And new security weapons have emerged that use ingenious methods to protect Web sites and corporate networks from external and internal security threats.Here are some of the latest tools at your disposal.No exitGillian G-Server doesn’t care how the hacker got in or what changes they may have made to your Web site.Gillian Exit Control technology prevents the world from seeing the consequences of a security breach.Gillian G-Server sits between the Web server and the router or firewall that connects the Web server to the Internet, inspecting every piece of content that goes out. The Exit Control G-Server contains a collection of digital signatures made from authorized Web content during the publication process.Each time the site content producers publish a new or revised object,the G-Server saves a digital backup of the object along with a digital signature.Signatures that don match send up a red flag which triggers the G-Server to immediately replace a bogus page with a secure archived copy of the original,while simultaneously alerting appropriate personnel.Tripwire,Inc. Tripwire for Servers is a similar data and network integrity product.However,Tripwire for Servers takes a different approach ——its software is loaded onto the server that you want to protect.It monitors all file changes,whether they originate from inside or outside the company,and reports back if a change violates predetermined policies.Honeypots or decoysHoneypots are designed to lure and contain an intruder on the network.Honeypots are decoy devices that can divert attacks from production systems and let security administrators study or understand what happening on the network.ManTrap,from Recourse,is a powerful honeypot that deployed next to data servers,if it being used to deflect internal attacks,and located off the firewall in the demilitarized zone (DMZ) if it being used against external threats.The majority of users deploy it internally to get suspicious activity under control.In that scenario,a ManTrap server would be set up to look like a file server that stores intellectual property or business plans.A successful deployment of ManTrap depends on a variety of factors including quality,naming scheme,placement and security policy.For example,deceptive defenses are most effective when deployed in quantities equal to or greater than that of the production system.Honeypots can get expensive which is why companies must pick and choose the critical servers they want to protect.What attracts an attacker to ManTrap is configuring it to make it look more vulnerable than other servers.Once the hacker is on the decoy server,security managers can log the hacker activity and gain insight into what the intruder is trying to accomplish. Fall into the gapAir gap technology provides a physical gap between trusted and untrusted networks, creating an isolated path for moving files between an external server and a company internal network and systems. Vendors include RVT Technologies, Spearhead Technology and Whale Communications.Whale e-Gap Web Shuttle is a nonprogrammable device that switches a memory bank between two computer hosts. The e-Gap Web Shuttle creates an air gap between the Internet and a company back-office systems. Companies might use e-Gap Web Shuttle between an external service running e-commerce applications, such as online banking, and internal databases that might be queried by external users.The e-Gap system consists of the e-Gap appliance that is attached to two PC hosts, one internal and one external. The internal host connects to the company internal network and the external host sits in the DMZ in front of the firewall.All URLs to Web pages are directed to a mock location on the external host. Pages do not actually reside on this host. The external host strips off the protocol headers, extracts only the content of the Secure Sockets Layer (SSL) traffic and passes it to the e-Gap Web Shuttle. The e-Gap Web Shuttle transports the encrypted data to the internal host using a toggling e-disk. The e-Gap internal host decrypts SSL traffic, authenticates the user and filters the URL content. It then passes the URL request to the company production Web server that resides on the back-office network.The fix is inSecurity and vulnerability assessment tools, designed to be used in-house, can detect weaknesses in an organization systems before problems occur and can fix those problems.Retina , from eEye, scans, monitors, alerts and automatically fixes network security vulnerabilities. The product works on Windows NT SP3 or higher and Windows 2000.The software is installed on any machine within the network. The network administrator types in a range of IP addresses to scan and pushes a button. The product scans the network for vulnerabilities, software flaws and policy problems and reports any vulnerabilities.The product “fix it” feature provides network administrator with a description of any found vulnerabilities, information on how to fix it, or access to a fix it button that can repair the vulnerability locally or remotely.Demolishing DoS attacksPerhaps one of the newest categories of security is products that target denial-of-service (DoS) attacks and more. By definition, DoS attacks make computer systems inaccessible by exploiting software bugs or overloading servers or networks so that legitimate users can no longer access those resources. The product category is so new that some products are still in beta test or on the cusp of entering the marketplace. Going after one of the most malicious types of computer vandalism, the DoS attack, are Arbor Networks, of Waltham, Mass.; Mazu Networks, of Cambridge, Mass.; and Asta Networks in Seattle.Mazu’s solution to distributed DoS attacks works via intelligent traffic analysis and filtering across the network. A monitoring device, such as a packet sniffer or packet analyzer, evaluates packets on the network at speeds up to 1G bit/sec. A monitoring device then determines which traffic needs to be filtered out.The good, the bad and the uglyThe good news about all of these new security techniques is that they theoretically offer companies additional layers of security protection, providing better overall security. What this ultimately means to businesses is that additional security mechanisms can succeed where others have failed. Another plus about some of the new products is that they are optimized for a particular application, such as integrity of the Web servers.However, as with any technology, there are pros and cons to consider. In fact, there are some downsides to implementing these new security products. For example: They are all incremental solutions, not replacements.They require a certain amount of expertise.Many vendors are start-ups and there a risk as to how long theyl be around.There a concern, in many IT shops, about adding preventive controls because of associated overhead——a concern that can be easily remedied by investing in additional horsepower.What too much? When does a company run the risk because of having too many products to manage?The bottom line is that security is never a done deal. It a continuing process that a new crop of innovative vendors are making more interesting.Benevolent WormsAlthough the prospect of using virus technology to simplify the task of delivering patches and software updates is tempting, the dangers can outweigh the benefits when the process is too automated. For example, the improved Windows Update feature in Windows XP now allows patches and updates to be downloaded automatically,altho ugh installation is still at the user’s discretion.Trojan horses, worms, and other malicious code forms have proven to be incredibly successful at paralyzing e-mail systems and Internet providers. It is therefore only logical to conceive of ways to use them for productive purposes, much as the Bible exhorts its readers to beat their swords into plowshares and their spears into pruning hooks.Granted, it would be wonderful if IT administrators could distribute patches and software updates to desktops and servers as quickly as an e-mail virus can spread from one machine to the next. But is such a magic wand really a good idea?Well, maybe not exactly. After all, unlike the human immune system, which produces defenses, or antibodies, automatically, the computer must wait for a human to analyze samples of a computer virus, prepare antidotes and vaccines for that specific situation, and only then apply the cure.This observation alone would seem to discredit the idea of a “digital immune system” that the sec urity community has tossed around during the past few years, but there’s an even more important point to consider. Similar to the way that autoimmune diseases turn the body’ s own defenses against itself, so could one turn a viruslike software delivery system against its own computers. Although it would be difficult to monkey with the digital certificates that would conceivably be used to identify trusted patches, it’s not impossible to subvert the certificate issuing system, as Microsoft and VeriSign found to their dismay last March.Ultimately, a viruslike software delivery system would require software publishers to deliberately put a back door into their systems, and few customers will tolerate that practice, even under shrinkwrap licensing terms. Becau se there’s no guarantee thatsuch a tempting target wouldn’t be exploited by hackers, any IT manager deploying such a system would be foolhardy in the extreme.Virus behavior that standpoint go to see from the operate system, is some normal behaviors, and say for the operate system that don't break the law , therefore at kill the virus software to check to kill the virus, usually meeting because operate system of obstruction-" the document was take upped by system and can't change the code at system "," virus the inside to circulate" etc. reason, but can't clean the virus , we at kill the virus of time also want to speak to investigate some techniques, and go to the round over the operate system's obstruction, from success of virus is from the system Speak here of kill the virus method is:Kill the virus with the tool under the safe mode to kill the virus under the pure DOS mode.Why want the pure DOS mode to down kill the virus?Because the virus procedure is under the operate system explain the mode to circulate o, such as:Script virus" new and happiness time", virus etc., they can't circulate in the inside memory, and system also argue all legal procedures but as to it's take in to protect, and guarantee it continue to circulate, prohibition against in the movement procedure right proceed modification, this result ined virus can't quilt the clearance's result for aegis for having under the pure DOS mode, connecting the Windows operate system all don't can quilt circulating, virus more impossible movement, for this reason this hour as to it's checking killing, round over system, attaining cleanly killing the virus.The usage special tool under the safe mode to kill the virusThe each of Windows operate system for edition all contain a safe mode to circulate the way, and here circulate the way bottom can only circulate the most basic procedure, again this mode bottom, you can cancel all of from start the item,avoid the virus's special tool is small and very shrewd, and use it can under the safe mode normal weakness is a result for can aim atting the popular virus of some comparisons, can't attaining completely killing the virus.For attain to kill the clean virus result, we can synthesize to use these two kinds of methods.Kill the virus not equal to defend the virus, and hard work should be protected . Privacy-Protecting techniquesIn this chapter, we will look at some proven techniques to protect your privacy when you use the Internet. Most of these techniques are simple, commonsense rules that you can put into effect immediately-choosing a good service provider, using good password, cleaning up after yourself online, avoiding Spam and junk email, and protecting yourself from identity theft.Choosing a good service providerThe first and most important technique for protecting your privacy is to pick service providers who respect your privacy.Here are some things to consider when you choose an ISP:. Unless you take special measures to obscure the content and destinations of your Internet usage, your ISP can monitor every single web page that you visit, every email message that you send, every email message that you receive, and many others about your Internet usage.. If you have a dialup ISP ,your ISP can also infer when you are at home ,when you go on vacation, and other aspects of your schedule.. If you check your email from work ,your ISP can learn where you work.. Many ISPs routinely monitor the actions of their subscribers for the purposes of testing equipment, learning about their user population, or collecting per-user demographics.. Some ISPs will monitor the web sites that you visit and sell this information for the purpose of increasing their revenue. In some cases, the ISPs clearly state this policy and, in fact ,use the sale of the data as a way of subsidizing the cost of Internet access .Other ISPs silently engage in this practice.. Equipment is now on the market that allows ISPs to monitor the advertisements that are downloaded to your computer and ,in some case, replace the advertisements with different ones. This equipment is also capable of generating detailed user-level statistics.. Some ISPs have strict policies regarding which employees have access to user data and how that data must be protected .Other ISPs have no policies at all.. Many policies that are in use basically say “we can monitor anything that we want.”However,not all ISPs that have these policies actually monitor their users. Picking a Great PasswordPasswords are the simplest from of authentication. Passwords are a secret that you share with the you log in, you type your password to prove to the computer that you are who you claim to be. The computer ensures that the password you type matches the account that you have specified. If they match, you allowed to proceed.Using good passwords for your Internet service is a first line of defense for your privacy. If you pick a password that is easy to guess, then somebody who is targeting you will find it easier to gain access to your personal information. If you use the same password on a variety of different services ,then a person who is able to discover the password for one of your services will be able to access other services.Good Passwords: locked DoorsGood passwords are passwords that are difficult to guess. The best passwords are difficult to guess because they:-Have both uppercase and lowercase letters-Have digits and/or punctuation characters as well as letters-May include some control characters and /of spaces-Are easy to remember, so they do not have to be written down-Are at least seven of eight characters long-Can be typed quickly ,so somebody cannot determine what you type by watching over your shoulderIt is easy to pick a good password. Here are some suggestions:.Take two short words and combine them with a special character or a number, like robot4my or eye-con..Put together an acronym that is special to you, like Notfsw(None of this fancy stuff works),auPEGC(All Unix programmers eat green cheese),orTtl*Hiww(Twinkle,twinkle,little star. How I w onder what…).Cleaning Up After YourselfWhen you use the Internet, you leave traces of the web sites that you visit and the information that you see on your computer. Another person can learn a lot about the web sites that you have visited by examining your computer for these electronic footprints. This process of computer examination is called computer forensics, and it has become a hot area of research in recent years. Special-purpose programs can also examine your computer and either prepare a report, or transmit the report over the Internet to someone else.Although it can be very hard to remove all traces of a web site that you have seen or an email message that you have downloaded, you can do a good job of cleaning up your computer with only a small amount of work. There are also a growing number of programs that can automatically clean up your computer at regular intervals as we will see in the next chapter.Avoiding Spam and Junk EmailUnwanted electronic mail is the number one consumer complaint on the Internet today. A 1999 study by BrightMail,a company that develops antispam technology, found that 84 percent of Internet users had received Spam;42 percent loathed the time it takes to handle Spam;30 percent found it to be a “significant invasion of privacy;”15 percent found it offensive; and ISPs suffered account churn rates as high as percent as a direct result of Spam.Protect Your Email AddressTo send you junk mail, a spammer must have your email address. By understanding how spammers get email addresses, you can keep your mailbox relatively Spam-free: Do not put your email address on your home page, Take your name out of online directories, Do not post to public mailing lists, Do not post to Usenet, Pick an unusual username.附录B---中文翻译网络上的个人和商业安全原文见于,请对照参考。

毕业设计英文翻译

毕业设计英文翻译

外文文献:Estimates of the Operational Reliability of Fire Protection Systems For the past three years,the National Institute of Standards and Technology (NIST) has been working to develop a new encryption standard to keep government information secure.The organization is in the final stages of an open process of selecting one or more algorithms,or data-scrambling formulas,for the new Advanced Encryption Standard (AES) and plans to make adecision by late summer or early fall.The standard is slated to go into effect next year.INTRODUCTIONBackgroundFire protection strategies are designed and installed to perform specific functions. For example, a fire sprinkler system is expected to control or extinguish fires: To accomplish this, the system sprinklers must open, and the required amount of water to achieve control or extinguishment must be delivered to the fire location. A fire detection system is intended to provide sufficient early warning of a fire to permit occupant notification and escape, and in some cases activation of other fire protection features (e.g., special extinguishing systems, smoke management systems). Both system activation (detection) and notification (alarm) must occur to achieve early warning. Construction compartmentation is generally designed to limit the extent of fire spread as well as to maintain the building’s structural integrity as well as tenability along escape routes for some specified period of time. In order to accomplish this, the construction features must be fire “rated” (based on standard tests) and the integrity of the features maintained. The reliability of individual fire protection strategies such as detection, automatic suppression, and construction compartmentation is important input to detailed engineering analyses associated with performance based design.In the context of safety systems, there are several elements of reliability, including both operational andperfornzance reliability. Operational reliability provides a measure of the probability that a fire protection system will operate as intended when needed. Performance reliability is a measure of the adequacy of the feature to successfully perform its intended hnctionunder specific fire exposure conditions. The former is a measure of component or system operability while the latter is a measure of the adequacy of the system design.The scope of this study was limited to evaluation of operational reliability due primarily to the form of the reported data in the literature. In addition to this distinction between operational and performance reliability, the scope focused on unconditional estimates of reliability and failure estimates in terms offail-dangerous outcomes. A discussion of these terms is provided later in the paper.ScopThis paper provides a review of reported operational reliability and performance estimates for (1) fire detection, (2) automatic suppression, and to a limited extent ,(3) construction compartmentation. In general, the reported estimates for fire detection are largely for smoke detectiodfire alarm systems; automatic sprinklers comprise most of the data for automatic suppression, and compartmentation includes compartment fire resistance and enclosure integrity. It should be noted that in some cases the literature did not delineate beyond the general categories of “fire detection” or “automatic suppression,” requiring assumptions regarding the specific type of fire protection system.Several studies reported estimates of reliability for both fire detection and automatic sprinkler system strategies. However, very little information was found detailing reliability estimates for passive fire protection strategies such as compartmentation. A limited statistical based analysis was performed to provide generalized information on the ranges of such estimates and related uncertainties. This latter effort was limited to evaluation of reported data on detection and suppression. Insufficient data were identified on compartmentation reliability to be included. This paper addresses elements of reliability as they relate to fire safety systems. The literature search that was performed for this analysis is reviewed and important findings and data summarized. The data found in the literature that were applicable to sprinkler and smoke detection systems reliability were analyzed, with descriptive estimates of the mean values and 95 percent confidence intervals for the operational reliability of these in situ systems reported.ELEMENTS OF RELIABILITY ANALYSISThere is considerabIe variation in reliability data and associated anaIysesreported in the literature. Basically, reliability is an estimate of the probability that a system or component will operate as designed over some time period. During the useful or expected life of a component, this time period is “reset” each time a component is tested and found to be in working order. Therefore, the more often systems and components are tested and maintained, the more reliable they are. This form of reliability is referred to as unconditional.Unconditional reliability is an estimate of the probability that a system will operate “on demand.” A conditional reliability is an estimate that two events of concern, i.e., a fire and successful operation of a fire safety system occur at the same time.Reliability estimates that do not consider a fire event probability are unconditional estimates.Two other important concepts applied to operational reliability arefuiled-safe andfailed- dangerous.when a fire safety system fails safe, it operates when no fire event has occurred.A common example is the false alarming of a smoke detector. A fire safety system fails dangerous when it does not function during a fire event. In this study, thefailed-dangerous event defines the Operational probability of failure (1-reliability estimate). A sprinkler system not operating during a fire event or an operating system that does not control or extinguish a fire are examples of this type of failure.The overall reliability of a system depends on the reliability of individual components and their corresponding failure rates, the interdependencies of the individual components that compose the system, and the maintenance and testing of components and systems once installed to veri@ operability. All of these factors are of concern in estimating operationaz reliability.Fire safety system performance is also of concern when dealing with the overall concept of reliability. System performance is defined as the ability of a particular system to accomplish the task for which it was designed and installed. For example, the performance of a fire rated separation is based on the construction component’s ability to remain intact and provide fire separation during a fire. The degree to which these components prevent fire spread across their intended boundaries defines system performance.Performance reliability estimates require data on how well systems accomplish their design task under actual fire events or full scale tests. Information on performance reliability could notbe discerned directly from many of the data sources reviewed as part of this effort due to the form of the presented data, and therefore, it is not addressed as a separate effect.The cause of failure for any type of system is typically classified into several general categories: installation errors, design mistakes, manufacturing/equipment defects, lack of maintenance, exceeding design limits, and environmental factors. There are several approaches that can be utilized to minimize the probability of failure. Such methods include (1) design redundancy, (2) active monitoring for faults, (3) providing the simplest system (i.e., the least number of components) to address the hazard, and (4)a well designed inspection, testing, and maintenance program.These reliability engineering concepts are important when evaluating reliability estimates reported in the literature. Depending on the data used in a given analysis, the reliability estimate may relate to one or more of the concepts presented above. The literature review conducted under the scope of this effort addresses these concepts where appropriate. Most of the information that was obtained from the literature in support of this paper were reported in terms of unconditional operationaZ reliability, i.e., in terms of the probability that a fire protection strategy will not faiZ dangerous.LITERATURE REVIEWA literature search was conducted to gather reliability data of all types for fire safety systems relevant to the protection strategies considered: automatic suppression, automatic detection, and compartmentation. The objective of the literature search was to obtain system-specific reliability estimates for the performance of each type of fire safety system as a function of generic occupancy type (e.g., residential, commercial, and institutional).Sources of information included national fire incident database reports, US Department of Defense safety records, industry and occupancy specific studies, insurance industry historical records and inspection reports documented in the open literature, and experimental data. Reports on experimental work and fire testing results were utilized only when fire detection, automatic suppression, or compartmentation strategies were explicitly evaluated. Tests of systems used for qualification, approval, or listing were also reviewed for information on failure modes. Published data from the United Kingdom, Japan, Australia, and New Zealand wereincluded.General StudiesThe Warrington Fire Research study addressed the reliability of fire safety systems and the interaction of their components. A Delphi methodology was used to develop discrete estimates of the reliability of detection and alarm systems, fire suppression systems, automatic smoke control systems, and passive fire protection (e.g., compartmentation).The data obtained from the spray system, another important limitation is that most of the Automatic Sprinkler System records sprinkler accident. In these studies, very limited accident data with reference to the rapid response or a suitable water jet technology. Assess the reliability of the appropriate sprinkler system should be particularly concerned about several factors, including (1) allows coverage within, (2) lower water supply capacity, (3) remote control or alarm systems have great potential in the fire . Based on this, there are other factors related to these technologies (such as maintenance level) can directly affect the operational reliability of these types of Automatic Sprinkler System. In addition, you also need to resolve these problems, the system data, but based on later observations and general housing is generally less likely to maintain normal, some designed to ensure the residence what spray system reliability may be reduced.Fire detection or alarm systemsThe fire district to rely on various types of equipment such as: doors (including fixed equipment), wall, floor / ceiling penetration holes, windows, fire shutter, smoke materials and buildings. When the fire district is considered to be the focus in the fire plan, in the literature, there is little data that the individual components of the operating role in the fire district. The single is mentioned for the building assessment and operational reliability WARRIGTON research and the Australian Fire Engineering Index. These assessments are based entirely on expert judgment. Therefore does not provide more in-depth analysis.Automatic sprinkler systems analysisOn Table 2, the sprinkler system reliability analysis is to analyze according to the type of each live. It should be noted that only one source MILNE, 1959] on the reliability of public buildings and residential housing estimates, and these early data do not provide the reliability of the data of modern residential sprinklers. The distribution histogram of Figure 1 lists the reliability estimates for each housing type. Average and 95% confidence interval limit is suitable for general residential (in the study does not distinguish between commercial buildings, the category of residential buildings and public buildings) and commercial buildings, and is applicable to the building (commercial, public buildings, residential) reliability assessment. These results are shown in Table 4.Commercial buildings and public buildings, reliability assessment, the average of control in other residential type 95% confidence interval. Livable and public buildings in a single point estimate, an increase of some useful things and operational reliability, and also increased the capacity of the database. 18 estimated four separate categories. However, the point on residential and public buildings of the estimates should not be used alone to draw any conclusions.The reliability of commercial buildings, residential and construction is estimated to provide some useful information. Based on the analysis of the sprinkler system can make use of the data is the reliability of operation is estimated at more than 88%, if you do not consider commercial buildings, the reliability of the sprinkler system can reach more than 92%. However, the judge this particular sprinkler system with those mentioned in the assessment system similarity is very important. The reliability of the commercial buildings is in the range 80-98%, 94-98% in the general construction.Fire detection system analysisThe data on estimates of the reliability of fire detection system is comprehensive. This data spans a decade, and every year the Reliability Assessment Report (reflected in Table 3), it is done for the housing of a variety of different uses. Where the analysis is based on the use of the house divided into several building level. After each use housing derived data and then calculate the reliability of each housing estimates. Figure 2 shows the reliability estimates of all smoke detectors on all residential types.These housing types in the average reliability estimates and 95% confidence interval estimate for separate analysis. The results are listed in Table 5, for each type of results are significantly different. Confidence interval from the spray system reliability for a variety ofresidential types of estimated confidence intervals do not overlap. This may make more data for the analysis of the smoke detectors, are listed in Table 5, the reliability of various residential types of smoke detectors is estimated to determine the reason for the difference of non-relevant data beyond the scope of this analysis.Summary and conclusionsThe above analysis can easily be applied to other fire operation of the system reliability assessment. However, it should be noted that the reliability of data in the literature is an important factor. It is noteworthy that the data in content and form of the tremendous changes in the study of reports and studies, which is part of the effort. This study provides a very preliminary attempt to describe the operational reliability of fire protection systems. The survey report requires a lot of data to change the database.The focus of this effort to obtain more specific data, population-wide system can provide a basis for the great improvement of the operational reliability of fire protection system, which led to the interest of design engineers, in addition the performance of this technology for engineers based on the rapid development of design concepts the analysis is also necessary.中文译文:消防系统运行可靠性的估计在过去三年中,(美国)国家标准与技术局(NIST)已在研究开发一种新的加密标准,以确保政府的信息安全。

毕业设计英语翻译

毕业设计英语翻译

2Screw Compressor GeometryTo be able to predict the performance of any type of positive displacement compressor it is necessary to have a facility to estimate the working chamber size and shape at any point in its operating cycle. In the case of screw compressors this implies the need to be able to define the rotor lobe profiles, together with any additional parameters needed for the rotor and housing geometry to be fully specified. A set of subprograms which can compute the lobe profiles and the complete geometry of the working space of a screw machine of almost arbitrary design has been developed. The default version is a new asymmetric profile, called Demonstrator, which can model any realistic combination of numbers of lobes in the main and gate screw rotors. However, any other known or even a completely new profile can be generated, with little or no modification of the code. Such profiles must, of course, satisfy geometrical constraints in order to obtain a realistic solution.螺杆式压缩机的几何结构为了能够预测任何类型的容积式压缩机的性能,在工作周期的任何时候用一个工具来评估工作腔大小和形状是有必要的。

土木工程-毕业设计-论文-外文翻译-中英文对照

土木工程-毕业设计-论文-外文翻译-中英文对照

英文原文:Concrete structure reinforcement designSheyanb oⅠWangchenji aⅡⅠFoundation Engineering Co., Ltd. Heilongjiang DongyuⅡHeilongjiang Province, East Building Foundation Engineering Co., Ltd. CoalAbstract:structure in the long-term natural environment and under the use environment's function, its function is weaken inevitably gradually, our structural engineering's duty not just must finish the building earlier period the project work, but must be able the science appraisal structure damage objective law and the degree, and adopts the effective method guarantee structure the security use, that the structure reinforcement will become an important work. What may foresee will be the 21st century, the human building also by the concrete structure, the steel structure, the bricking-up structure and so on primarily, the present stage I will think us in the structure reinforcement this aspect research should also take this as the main breakthrough direction.Key word:Concrete structure reinforcement bricking-up structure reinforcement steel structure reinforcement1 Concrete structure reinforcementConcrete structure's reinforcement divides into the direct reinforcement and reinforces two kinds indirectly, when the design may act according to the actual condition and the operation requirements choice being suitable method and the necessary technology.1.1the direct reinforcement's general method1)Enlarges the section reinforcement lawAdds the concretes cast-in-place level in the reinforced concrete member in bending compression zone, may increase the section effective height, the expansion cross sectional area, thus enhances the component right section anti-curved, the oblique section anti-cuts ability and the section rigidity, plays the reinforcement reinforcement the role.In the suitable muscle scope, the concretes change curved the component right section supporting capacity increase along with the area of reinforcement and the intensity enhance. In the original component right section ratio of reinforcement not too high situation, increases the main reinforcement area to be possible to propose the plateau component right section anti-curved supporting capacity effectively. Is pulled in the section the area to add the cast-in-place concrete jacket to increase the component section, through new Canada partial and original component joint work, but enhances the component supporting capacity effectively, improvement normal operational performance.Enlarges the section reinforcement law construction craft simply, compatible, and has the mature design and the construction experience; Is suitable in Liang, the board, the column, the wall and the general structure concretes reinforcement; But scene construction's wet operating time is long, to produces has certain influence with the life, and after reinforcing the building clearance has certain reduction.2) Replacement concretes reinforcement lawThis law's merit with enlarges the method of sections to be close, and after reinforcing, does not affect building's clearance, but similar existence construction wet operating time long shortcoming; Is suitable somewhat low or has concretes carrier's and so on serious defect Liang, column in the compression zone concretes intensity reinforcement.3) the caking outsourcing section reinforcement lawOutside the Baotou Steel Factory reinforcement is wraps in the section or the steel plate is reinforced component's outside, outside the Baotou Steel Factory reinforces reinforced concrete Liang to use the wet outsourcing law generally, namely uses the epoxy resinification to be in the milk and so on methods with to reinforce the section the construction commission to cake a whole, after the reinforcement component, because is pulled with the compressed steel cross sectional area large scale enhancement, therefore right section supporting capacity and section rigidity large scale enhancement.This law also said that the wet outside Baotou Steel Factory reinforcement law, the stress is reliable, the construction is simple, the scene work load is small, but is big with the steel quantity, and uses in above not suitably 600C in the non-protection's situation the high temperature place; Is suitable does not allow in the use obviously to increase the original component section size, but requests to sharpen its bearing capacity large scale the concrete structure reinforcement.4) Sticks the steel reinforcement lawOutside the reinforced concrete member in bending sticks the steel reinforcement is (right section is pulled in the component supporting capacity insufficient sector area, right section compression zone or oblique section) the superficial glue steel plate, like this may enhance is reinforced component's supporting capacity, and constructs conveniently.This law construction is fast, the scene not wet work or only has the plastering and so on few wet works, to produces is small with the life influence, and after reinforcing, is not remarkable to the original structure outward appearance and the original clearance affects, but the reinforcement effect is decided to a great extent by the gummy craft and the operational level; Is suitable in the withstanding static function, and is in the normal humidity environment to bend or the tension member reinforcement.5) Glue fibre reinforcement plastic reinforcement lawOutside pastes the textile fiber reinforcement is pastes with the cementing material the fibre reinforcement compound materials in is reinforced the component to pull the region, causes it with to reinforce the section joint work, achieves sharpens the component bearing capacity the goal. Besides has glues the steel plate similar merit, but also has anticorrosive muddy, bears moistly, does not increase the self-weight of structure nearly, durably, the maintenance cost low status merit, but needs special fire protection processing, is suitable in each kind of stress nature concrete structure component and the general construction.This law's good and bad points with enlarge the method of sections to be close; Is suitable reinforcement which is insufficient in the concrete structure component oblique section supporting capacity, or must exert the crosswise binding force to the compressional member the situation.6) Reeling lawThis law's good and bad points with enlarge the method of sections to be close; Is suitable reinforcement which is insufficient in the concrete structure component oblique section supporting capacity, or must exert the crosswise binding force to the compressional member the situation.7) Fang bolt anchor lawThis law is suitable in the concretes intensity rank is the C20~C60 concretes load-bearing member transformation, the reinforcement; It is not suitable for already the above structure which and the light quality structure makes decent seriously. 1.2The indirect reinforcement's general method1)Pre-stressed reinforcement law(1)Thepre-stressed horizontal tension bar reinforces concretes member in bending,because the pre-stressed and increases the exterior load the combined action, in the tension bar has the axial tension, this strength eccentric transmits on the component through the pole end anchor (, when tension bar and Liang board bottom surface close fitting, tension bar can look for tune together with component, this fashion has partial pressures to transmit directly for component bottom surface), has the eccentric compression function in the component, this function has overcome the bending moment which outside the part the load produces, reduced outside the load effect, thus sharpened component's anti-curved ability. At the same time, because the tension bar passes to component's pressure function, the component crack development can alleviate, the control, the oblique section anti-to cut the supporting capacity also along with it enhancement.As a result of the horizontal lifting stem's function, the original component's section stress characteristic by received bends turned the eccentric compression, therefore, after the reinforcement, component's supporting capacity was mainly decided in bends under the condition the original component's supporting capacity 。

毕业设计英文翻译中英文对照版

毕业设计英文翻译中英文对照版

Feasibility assessment of a leading-edge-flutter wind power generator前缘颤振风力发电机的可行性评估Luca Caracoglia卢卡卡拉克格里亚Department of Civil and Environmental Engineering, Northeastern University, 400 Snell Engineering Center, 360 Huntington A venue, Boston, MA 02115, USA美国东北大学土木与环境工程斯内尔工程中心400,亨廷顿大道360,波士顿02115This study addresses the preliminary technical feasibility assessment of a mechanical apparatus for conversion of wind energy. 这项研究涉及的是风能转换的机械设备的初步技术可行性评估。

The proposed device, designated as ‘‘leading-edge-fl utter wind power generator’’, employs aeroelastic dynamic instability of a blade airfoil, torsionally rotating about its leading edge. 这种被推荐的定义为“前缘颤振风力发电机”的设备,采用的气动弹性动态不稳定叶片翼型,通过尖端旋转产生扭矩。

Although the exploitation of aeroelastic phenomena has been proposed by the research community for energy harvesting, this apparatus is compact, simple and marginally susceptible to turbulence and wake effects.虽然气动弹性现象的开发已经有研究界提出可以通过能量采集。

毕业设计英文 翻译(原文)

毕业设计英文 翻译(原文)

编号:毕业设计(论文)外文翻译(原文)院(系):桂林电子科技大学专业:电子信息工程学生姓名: xx学号: xxxxxxxxxxxxx 指导教师单位:桂林电子科技大学姓名: xxxx职称: xx2014年x月xx日Timing on and off power supplyusesThe switching power supply products are widely used in industrial automation and control, military equipment, scientific equipment, LED lighting, industrial equipment,communications equipment,electrical equipment,instrumentation, medical equipment, semiconductor cooling and heating, air purifiers, electronic refrigerator, LCD monitor, LED lighting, communications equipment, audio-visual products, security, computer chassis, digital products and equipment and other fields.IntroductionWith the rapid development of power electronics technology, power electronics equipment and people's work, the relationship of life become increasingly close, and electronic equipment without reliable power, into the 1980s, computer power and the full realization of the switching power supply, the first to complete the computer Power new generation to enter the switching power supply in the 1990s have entered into a variety of electronic, electrical devices, program-controlled switchboards, communications, electronic testing equipment power control equipment, power supply, etc. have been widely used in switching power supply, but also to promote the rapid development of the switching power supply technology .Switching power supply is the use of modern power electronics technology to control the ratio of the switching transistor to turn on and off to maintain a stable output voltage power supply, switching power supply is generally controlled by pulse width modulation (PWM) ICs and switching devices (MOSFET, BJT) composition. Switching power supply and linear power compared to both the cost and growth with the increase of output power, but the two different growth rates. A power point, linear power supply costs, but higher than the switching power supply. With the development of power electronics technology and innovation, making the switching power supply technology to continue to innovate, the turning points of this cost is increasingly move to the low output power side, the switching power supply provides a broad space for development.The direction of its development is the high-frequency switching power supply, high frequency switching power supply miniaturization, and switching power supply into a wider range of application areas, especially in high-tech fields, and promote the miniaturization of high-tech products, light of. In addition, the development and application of the switching power supply in terms of energy conservation, resource conservation and environmental protection are of great significance.classificationModern switching power supply, there are two: one is the DC switching power supply; the other is the AC switching power supply. Introduces only DC switching power supply and its function is poor power quality of the original eco-power (coarse) - such as mains power or battery power, converted to meet the equipment requirements of high-quality DC voltage (Varitronix) . The core of the DC switching power supply DC / DC converter. DC switching power supply classification is dependent on the classification of DC / DC converter. In other words, the classification of the classification of the DC switching power supply and DC/DC converter is the classification of essentially the same, the DC / DC converter is basically a classification of the DC switching power supply.DC /DC converter between the input and output electrical isolation can be divided into two categories: one is isolated called isolated DC/DC converter; the other is not isolated as non-isolated DC / DC converter.Isolated DC / DC converter can also be classified by the number of active power devices. The single tube of DC / DC converter Forward (Forward), Feedback (Feedback) two. The double-barreled double-barreled DC/ DC converter Forward (Double Transistor Forward Converter), twin-tube feedback (Double Transistor Feedback Converter), Push-Pull (Push the Pull Converter) and half-bridge (Half-Bridge Converter) four. Four DC / DC converter is the full-bridge DC / DC converter (Full-Bridge Converter).Non-isolated DC / DC converter, according to the number of active power devices can be divided into single-tube, double pipe, and four three categories. Single tube to a total of six of the DC / DC converter, step-down (Buck) DC / DC converter, step-up (Boost) DC / DC converters, DC / DC converter, boost buck (Buck Boost) device of Cuk the DC / DC converter, the Zeta DC / DC converter and SEPIC, the DC / DC converter. DC / DC converters, the Buck and Boost type DC / DC converter is the basic buck-boost of Cuk, Zeta, SEPIC, type DC / DC converter is derived from a single tube in this six. The twin-tube cascaded double-barreled boost (buck-boost) DC / DC converter DC / DC converter. Four DC / DC converter is used, the full-bridge DC / DC converter (Full-Bridge Converter).Isolated DC / DC converter input and output electrical isolation is usually transformer to achieve the function of the transformer has a transformer, so conducive to the expansion of the converter output range of applications, but also easy to achieve different voltage output , or a variety of the same voltage output.Power switch voltage and current rating, the converter's output power is usually proportional to the number of switch. The more the number of switch, the greater the output power of the DC / DC converter, four type than the two output power is twice as large,single-tube output power of only four 1/4.A combination of non-isolated converters and isolated converters can be a single converter does not have their own characteristics. Energy transmission points, one-way transmission and two-way transmission of two DC / DC converter. DC / DC converter with bi-directional transmission function, either side of the transmission power from the power of lateral load power from the load-lateral side of the transmission power.DC / DC converter can be divided into self-excited and separately controlled. With the positive feedback signal converter to switch to self-sustaining periodic switching converter, called self-excited converter, such as the the Luo Yeer (Royer,) converter is a typical push-pull self-oscillating converter. Controlled DC / DC converter switching device control signal is generated by specialized external control circuit.the switching power supply.People in the field of switching power supply technology side of the development of power electronic devices, while the development of the switching inverter technology, the two promote each other to promote the switching power supply annual growth rate of more than two digits toward the light, small, thin, low-noise, high reliability, the direction of development of anti-jamming. Switching power supply can be divided into AC / DC and DC / DC two categories, AC / AC DC / AC, such as inverters, DC / DC converter is now modular design technology and production processes at home and abroad have already matured and standardization, and has been recognized by the user, but AC / DC modular, its own characteristics make the modular process, encounter more complex technology and manufacturing process. Hereinafter to illustrate the structure and characteristics of the two types of switching power supply.Self-excited: no external signal source can be self-oscillation, completely self-excited to see it as feedback oscillation circuit of a transformer.Separate excitation: entirely dependent on external sustain oscillations, excited used widely in practical applications. According to the excitation signal structure classification; can be divided into pulse-width-modulated and pulse amplitude modulated two pulse width modulated control the width of the signal is frequency, pulse amplitude modulation control signal amplitude between the same effect are the oscillation frequency to maintain within a certain range to achieve the effect of voltage stability. The winding of the transformer can generally be divided into three types, one group is involved in the oscillation of the primary winding, a group of sustained oscillations in the feedback winding, there is a group of load winding. Such as Shanghai is used in household appliances art technological production of switching power supply, 220V AC bridge rectifier, changing to about 300V DC filter added tothe collector of the switch into the transformer for high frequency oscillation, the feedback winding feedback to the base to maintain the circuit oscillating load winding induction signal, the DC voltage by the rectifier, filter, regulator to provide power to the load. Load winding to provide power at the same time, take up the ability to voltage stability, the principle is the voltage output circuit connected to a voltage sampling device to monitor the output voltage changes, and timely feedback to the oscillator circuit to adjust the oscillation frequency, so as to achieve stable voltage purposes, in order to avoid the interference of the circuit, the feedback voltage back to the oscillator circuit with optocoupler isolation.technology developmentsThe high-frequency switching power supply is the direction of its development, high-frequency switching power supply miniaturization, and switching power supply into the broader field of application, especially in high-tech fields, and promote the development and advancement of the switching power supply, an annual more than two-digit growth rate toward the light, small, thin, low noise, high reliability, the direction of the anti-jamming. Switching power supply can be divided into AC / DC and DC / DC two categories, the DC / DC converter is now modular design technology and production processes at home and abroad have already matured and standardized, and has been recognized by the user, but modular AC / DC, because of its own characteristics makes the modular process, encounter more complex technology and manufacturing process. In addition, the development and application of the switching power supply in terms of energy conservation, resource conservation and environmental protection are of great significance.The switching power supply applications in power electronic devices as diodes, IGBT and MOSFET.SCR switching power supply input rectifier circuit and soft start circuit, a small amount of applications, the GTR drive difficult, low switching frequency, gradually replace the IGBT and MOSFET.Direction of development of the switching power supply is a high-frequency, high reliability, low power, low noise, jamming and modular. Small, thin, and the key technology is the high frequency switching power supply light, so foreign major switching power supply manufacturers have committed to synchronize the development of new intelligent components, in particular, is to improve the secondary rectifier loss, and the power of iron Oxygen materials to increase scientific and technological innovation in order to improve the magnetic properties of high frequency and large magnetic flux density (Bs), and capacitor miniaturization is a key technology. SMT technology allows the switching power supply has made considerable progress, the arrangement of the components in the circuit board on bothsides, to ensure that the light of the switching power supply, a small, thin. High-frequency switching power supply is bound to the traditional PWM switching technology innovation, realization of ZVS, ZCS soft-switching technology has become the mainstream technology of the switching power supply, and a substantial increase in the efficiency of the switching power supply. Indicators for high reliability, switching power supply manufacturers in the United States by reducing the operating current, reducing the junction temperature and other measures to reduce the stress of the device, greatly improve the reliability of products.Modularity is the overall trend of switching power supply, distributed power systems can be composed of modular power supply, can be designed to N +1 redundant power system, and the parallel capacity expansion. For this shortcoming of the switching power supply running noise, separate the pursuit of high frequency noise will also increase, while the use of part of the resonant converter circuit technology to achieve high frequency, in theory, but also reduce noise, but some The practical application of the resonant converter technology, there are still technical problems, it is still a lot of work in this field, so that the technology to be practical.Power electronics technology innovation, switching power supply industry has broad prospects for development. To accelerate the pace of development of the switching power supply industry in China, it must take the road of technological innovation, out of joint production and research development path with Chinese characteristics and contribute to the rapid development of China's national economy.Developments and trends of the switching power supply1955 U.S. Royer (Roger) invented the self-oscillating push-pull transistor single-transformer DC-DC converter is the beginning of the high-frequency conversion control circuit 1957 check race Jen, Sen, invented a self-oscillating push-pull dual transformers, 1964, U.S. scientists canceled frequency transformer in series the idea of switching power supply, the power supply to the size and weight of the decline in a fundamental way. 1969 increased due to the pressure of the high-power silicon transistor, diode reverse recovery time shortened and other components to improve, and finally made a 25-kHz switching power supply.At present, the switching power supply to the small, lightweight and high efficiency characteristics are widely used in a variety of computer-oriented terminal equipment, communications equipment, etc. Almost all electronic equipment is indispensable for a rapid development of today's electronic information industry power mode. Bipolar transistor made of 100kHz, 500kHz power MOS-FET made, though already the practical switching power supply is currently available on the market, but its frequency to be further improved. Toimprove the switching frequency, it is necessary to reduce the switching losses, and to reduce the switching losses, the need for high-speed switch components. However, the switching speed will be affected by the distribution of the charge stored in the inductance and capacitance, or diode circuit to produce a surge or noise. This will not only affect the surrounding electronic equipment, but also greatly reduce the reliability of the power supply itself. Which, in order to prevent the switching Kai - closed the voltage surge, RC or LC buffers can be used, and the current surge can be caused by the diode stored charge of amorphous and other core made of magnetic buffer . However, the high frequency more than 1MHz, the resonant circuit to make the switch on the voltage or current through the switch was a sine wave, which can reduce switching losses, but also to control the occurrence of surges. This switch is called the resonant switch. Of this switching power supply is active, you can, in theory, because in this way do not need to greatly improve the switching speed of the switching losses reduced to zero, and the noise is expected to become one of the high-frequency switching power supply The main ways. At present, many countries in the world are committed to several trillion Hz converter utility.the principle of IntroductionThe switching power supply of the process is quite easy to understand, linear power supplies, power transistors operating in the linear mode and linear power, the PWM switching power supply to the power transistor turns on and off state, in both states, on the power transistor V - security product is very small (conduction, low voltage, large current; shutdown, voltage, current) V oltammetric product / power device is power semiconductor devices on the loss.Compared with the linear power supply, the PWM switching power supply more efficient process is achieved by "chopping", that is cut into the amplitude of the input DC voltage equal to the input voltage amplitude of the pulse voltage. The pulse duty cycle is adjusted by the switching power supply controller. Once the input voltage is cut into the AC square wave, its amplitude through the transformer to raise or lower. Number of groups of output voltage can be increased by increasing the number of primary and secondary windings of the transformer. After the last AC waveform after the rectifier filter the DC output voltage.The main purpose of the controller is to maintain the stability of the output voltage, the course of their work is very similar to the linear form of the controller. That is the function blocks of the controller, the voltage reference and error amplifier can be designed the same as the linear regulator. Their difference lies in the error amplifier output (error voltage) in the drive before the power tube to go through a voltage / pulse-width conversion unit.Switching power supply There are two main ways of working: Forward transformand boost transformation. Although they are all part of the layout difference is small, but the course of their work vary greatly, have advantages in specific applications.the circuit schematicThe so-called switching power supply, as the name implies, is a door, a door power through a closed power to stop by, then what is the door, the switching power supply using SCR, some switch, these two component performance is similar, are relying on the base switch control pole (SCR), coupled with the pulse signal to complete the on and off, the pulse signal is half attentive to control the pole voltage increases, the switch or transistor conduction, the filter output voltage of 300V, 220V rectifier conduction, transmitted through the switching transformer secondary through the transformer to the voltage increase or decrease for each circuit work. Oscillation pulse of negative semi-attentive to the power regulator, base, or SCR control voltage lower than the original set voltage power regulator cut-off, 300V power is off, switch the transformer secondary no voltage, then each circuit The required operating voltage, depends on this secondary road rectifier filter capacitor discharge to maintain. Repeat the process until the next pulse cycle is a half weeks when the signal arrival. This switch transformer is called the high-frequency transformer, because the operating frequency is higher than the 50HZ low frequency. Then promote the pulse of the switch or SCR, which requires the oscillator circuit, we know, the transistor has a characteristic, is the base-emitter voltage is 0.65-0.7V is the zoom state, 0.7V These are the saturated hydraulic conductivity state-0.1V-0.3V in the oscillatory state, then the operating point after a good tune, to rely on the deep negative feedback to generate a negative pressure, so that the oscillating tube onset, the frequency of the oscillating tube capacitor charging and discharging of the length of time from the base to determine the oscillation frequency of the output pulse amplitude, and vice versa on the small, which determines the size of the output voltage of the power regulator. Transformer secondary output voltage regulator, usually switching transformer, single around a set of coils, the voltage at its upper end, as the reference voltage after the rectifier filter, then through the optocoupler, this benchmark voltage return to the base of the oscillating tube pole to adjust the level of the oscillation frequency, if the transformer secondary voltage is increased, the sampling coil output voltage increases, the positive feedback voltage obtained through the optocoupler is also increased, this voltage is applied oscillating tube base, so that oscillation frequency is reduced, played a stable secondary output voltage stability, too small do not have to go into detail, nor it is necessary to understand the fine, such a high-power voltage transformer by switching transmission, separated and after the class returned by sampling the voltage from the opto-coupler pass separated after class, so before the mains voltage, and after the classseparation, which is called cold plate, it is safe, transformers before power is independent, which is called switching power supply.the DC / DC conversionDC / DC converter is a fixed DC voltage transformation into a variable DC voltage, also known as the DC chopper. There are two ways of working chopper, one Ts constant pulse width modulation mode, change the ton (General), the second is the frequency modulation, the same ton to change the Ts, (easy to produce interference). Circuit by the following categories:Buck circuit - the step-down chopper, the average output voltage U0 is less than the input voltage Ui, the same polarity.Boost Circuit - step-up chopper, the average output voltage switching power supply schematic U0 is greater than the input voltage Ui, the same polarity.Buck-Boost circuit - buck or boost chopper, the output average voltage U0 is greater than or less than the input voltage Ui, the opposite polarity, the inductance transmission.Cuk circuit - a buck or boost chopper, the output average voltage U0 is greater than or less than the input voltage Ui, the opposite polarity, capacitance transmission.The above-mentioned non-isolated circuit, the isolation circuit forward circuits, feedback circuit, the half-bridge circuit, the full bridge circuit, push-pull circuit. Today's soft-switching technology makes a qualitative leap in the DC / DC the U.S. VICOR company design and manufacture a variety of ECI soft-switching DC / DC converter, the maximum output power 300W, 600W, 800W, etc., the corresponding power density (6.2 , 10,17) W/cm3 efficiency (80-90)%. A the Japanese Nemic Lambda latest using soft-switching technology, high frequency switching power supply module RM Series, its switching frequency (200 to 300) kHz, power density has reached 27W/cm3 with synchronous rectifier (MOSFETs instead of Schottky diodes ), so that the whole circuit efficiency by up to 90%.AC / DC conversionAC / DC conversion will transform AC to DC, the power flow can be bi-directional power flow by the power flow to load known as the "rectification", referred to as "active inverter power flow returned by the load power. AC / DC converter input 50/60Hz AC due must be rectified, filtered, so the volume is relatively large filter capacitor is essential, while experiencing safety standards (such as UL, CCEE, etc.) and EMC Directive restrictions (such as IEC, FCC, CSA) in the AC input side must be added to the EMC filter and use meets the safety standards of the components, thus limiting the miniaturization of the volume of AC / DC power, In addition, due to internal frequency, high voltage, current switching, making the problem difficult to solve EMC also high demands on the internal high-density mountingcircuit design, for the same reason, the high voltage, high current switch makes power supply loss increases, limiting the AC / DC converter modular process, and therefore must be used to power system optimal design method to make it work efficiency to reach a certain level of satisfaction.AC / DC conversion circuit wiring can be divided into half-wave circuit, full-wave circuit. Press the power phase can be divided into single-phase three-phase, multiphase. Can be divided into a quadrant, two quadrant, three quadrants, four-quadrant circuit work quadrant.he selection of the switching power supplySwitching power supply input on the anti-jamming performance, compared to its circuit structure characteristics (multi-level series), the input disturbances, such as surge voltage is difficult to pass on the stability of the output voltage of the technical indicators and linear power have greater advantages, the output voltage stability up to (0.5)%. Switching power supply module as an integrated power electronic devices should be selected。

毕业设计外文翻译英文翻译英文原稿

毕业设计外文翻译英文翻译英文原稿

Harmonic source identification and current separationin distribution systemsYong Zhao a,b,Jianhua Li a,Daozhi Xia a,*a Department of Electrical Engineering Xi’an Jiaotong University, 28 West Xianning Road, Xi’an, Shaanxi 710049, Chinab Fujian Electric Power Dispatch and Telecommunication Center, 264 Wusi Road, Fuzhou, Fujian, 350003, China AbstractTo effectively diminish harmonic distortions, the locations of harmonic sources have to be identified and their currents have to be separated from that absorbed by conventional linear loads connected to the same CCP. In this paper, based on the intrinsic difference between linear and nonlinear loads in their V –I characteristics and by utilizing a new simplified harmonic source model, a new principle for harmonic source identification and harmonic current separation is proposed. By using this method, not only the existence of harmonic source can be determined, but also the contributions of the harmonic source and the linear loads to harmonic voltage distortion can be distinguished. The detailed procedure based on least squares approximation is given. The effectiveness of the approach is illustrated by test results on a composite load.2004 Elsevier Ltd. All rights reserved.Keywords: Distribution system; Harmonic source identification; Harmonic current separation; Least squares approximation1. IntroductionHarmonic distortion has experienced a continuous increase in distribution systems owing to the growing use of nonlinear loads. Many studies have shown that harmonics may cause serious effects on power systems, communication systems, and various apparatus [1–3]. Harmonic voltages at each point on a distribution network are not only determined by the harmonic currents produced by harmonic sources (nonlinear loads), but also related to all linear loads (harmonic current sinks) as well as the structure and parameters of the network. To effectively evaluate and diminish the harmonic distortion in power systems, the locations of harmonic sources have to be identified and the responsibility of the distortion caused by related individual customers has to be separated.As to harmonic source identification, most commonly the negative harmonic power is considered as an essential evidence of existing harmonic source [4–7]. Several approaches aiming at evaluating the contribution of an individual customer can also be found in the literatures. Schemes based on power factor measurement to penalize the customer’s harmonic currents are discussed in Ref. [8]. However, it would be unfair to use economical penalization if we could not distinguish whether the measured harmonic current is from nonlinear load or from linear load.In fact, the intrinsic difference between linear and nonlinear loads lies in their V –I characteristics. Harmonic currents of a linear load are i n linear proportion to its supplyharmonic voltages of the same order 次, whereas the harmonic currents of a nonlinear load are complex nonlinear functions of its supply fundamental 基波and harmonic voltage components of all orders. To successfully identify and isolate harmonic source in an individual customer or several customers connected at same point in the network, the V –I characteristics should be involved and measurement of voltages and currents under several different supply conditions should be carried out.As the existing approaches based on measurements of voltage and current spectrum or harmonic power at a certain instant cannot reflect the V –I characteristics, they may not provide reliable information about the existence and contribution of harmonic sources, which has been substantiated by theoretical analysis or experimental researches [9,10].In this paper, to approximate the nonlinear characteristics and to facilitate the work in harmonic source identification and harmonic current separation, a new simplified harmonic source model is proposed. Then based on the difference between linear and nonlinear loads in their V –I characteristics, and by utilizing the harmonic source model, a new principle for harmonic source identification and harmonic current separation is presented. By using the method, not only the existence of harmonic source can be determined, but also the contributions of the harmonic sources and the linear loads can be separated. Detailed procedure of harmonic source identification and harmonic current separation based on least squares approximation is presented. Finally, test results on a composite load containing linear and nonlinear loads are given to illustrate the effectiveness of the approach.2. New principle for harmonic source identification and current separationConsider a composite load to be studied in a distribution system, which may represent an individual consumer or a group of customers supplied by a common feeder 支路in the system. To identify whether it contains any harmonic source and to separate the harmonic currents generated by the harmonic sources from that absorbed by conventional linear loads in the measured total harmonic currents of the composite load, the following assumptions are made.(a) The supply voltage and the load currents are both periodical waveforms withperiod T; so that they can be expressed by Fourier series as1()s i n (2)h h h v t ht T πθ∞==+ (1)1()sin(2)h h h i t ht πφ∞==+The fundamental frequency and harmonic components can further be presented bycorresponding phasorshr hi h h hr hi h hV jV V I jI I θφ+=∠+=∠ , 1,2,3,...,h n = (2)(b) During the period of identification, the composite load is stationary, i.e. both its composition and circuit parameters of all individual loads keep unchanged.Under the above assumptions, the relationship between the total harmonic currents of the harmonic sources(denoted by subscript N) in the composite load and the supply voltage, i.e. the V –I characteristics, can be described by the following nonlinear equation ()()()N i t f v t = (3)and can also be represented in terms of phasors as()()122122,,,...,,,,,,...,,Nhr r i nr ni Nh Nhi r inr ni I V V V V V I I V V V V V ⎡⎤=⎢⎥⎣⎦ 2,3,...,h n = (4)Note that in Eq. (4), the initial time (reference time) of the voltage waveform has been properly selected such that the phase angle u1 becomes 0 and 10i V =, 11r V V =in Eq. (2)for simplicity.The V –I characteristics of the linear part (denote by subscript L) of the composite load can be represented by its equivalent harmonic admittance Lh Lh Lh Y G jB =+, and the total harmonic currents absorbed by the linear part can be described as,Lhr LhLh hr Lh Lhi LhLh hi I G B V I I B G V -⎡⎤⎡⎤⎡⎤==⎢⎥⎢⎥⎢⎥⎣⎦⎣⎦⎣⎦2,3,...,h n = (5)From Eqs. (4) and (5), the whole harmonic currents absorbed by the composite load can be expressed as()()122122,,,...,,,,,,...,,hr Lhr Nhr r i nr ni h hi Lhi Nhi r inr ni I I I V V V V V I I I I V V V V V ⎡⎤⎡⎤⎡⎤==-⎢⎥⎢⎥⎢⎥⎣⎦⎣⎦⎣⎦ 2,3,...,h n = (6)As the V –I characteristics of harmonic source are nonlinear, Eq. (6) can neither be directly used for harmonic source identification nor for harmonic current separation. To facilitate the work in practice, simplified methods should be involved. The common practice in harmonic studies is to represent nonlinear loads by means of current harmonic sources or equivalent Norton models [11,12]. However, these models are not of enough precision and new simplified model is needed.From the engineering point of view, the variations of hr V and hi V ; ordinarily fall into^3% bound of the rated bus voltage, while the change of V1 is usually less than ^5%. Within such a range of supply voltages, the following simplified linear relation is used in this paper to approximate the harmonic source characteristics, Eq. (4)112222112322,ho h h r r h i i hnr nr hni ni Nh ho h h r r h i i hnr nr hni ni a a V a V a V a V a V I b b V b V b V b V b V ++++++⎡⎤=⎢⎥++++++⎣⎦2,3,...,h n = (7)这个地方不知道是不是原文写错?23h r r b V 其他的都是2The precision and superiority of this simplified model will be illustrated in Section 4 by test results on several kinds of typical harmonic sources.The total harmonic current (Eq. (6)) then becomes112222112222,2,3,...,Lh Lh hr ho h h r r h i i hnr nr hni ni h Lh Lh hi ho h h r r h i i hnr nr hni ni G B V a a V a V a V a V a V I B G V b b V b V b V b V b V h n-++++++⎡⎤⎡⎤⎡⎤=-⎢⎥⎢⎥⎢⎥++++++⎣⎦⎣⎦⎣⎦= (8)It can be seen from the above equations that the harmonic currents of the harmonic sources (nonlinear loads) and the linear loads differ from each other intrinsically in their V –I characteristics. The harmonic current component drawn by the linear loads is uniquely determined by the harmonic voltage component with same order in the supply voltage. On the other hand, the harmonic current component of the nonlinear loads contains not only a term caused by the same order harmonic voltage but also a constant term and the terms caused by fundamental and harmonic voltages of all other orders. This property will be used for identifying the existence of harmonic source sin composite load.As the test results shown in Section 4 demonstrate that the summation of the constant term and the component related to fundamental frequency voltage in the harmonic current of nonlinear loads is dominant whereas other components are negligible, further approximation for Eq. (7) can be made as follows.Let112'012()()nh h hkr kr hki ki k k h Nhnh h hkr kr hki kik k h a a V a V a V I b b V b V b V =≠=≠⎡⎤+++⎢⎥⎢⎥=⎢⎥⎢⎥+++⎢⎥⎢⎥⎣⎦∑∑ hhr hhi hr Nhhhr hhi hi a a V I b b V ⎡⎤⎡⎤''=⎢⎥⎢⎥⎣⎦⎣⎦hhrhhihr Lh Lh Nh hhrhhi hi a a V I I I b b V ''⎡⎤⎡⎤'''=-=⎢⎥⎢⎥''⎣⎦⎣⎦,2,3,...,hhr hhiLh Lh hhrhhi hhr hhi Lh Lh hhr hhi a a G B a a h n b b B G b b ''-⎡⎤⎡⎤⎡⎤=-=⎢⎥⎢⎥⎢⎥''⎣⎦⎣⎦⎣⎦The total harmonic current of the composite load becomes112012(),()2,3,...,nh h hkr kr hki ki k k hhhrhhi hr h Lh NhLhNh n hhrhhi hi h h hkr kr hki kik k h a a V a V a V a a V I I I I I b b V b b V b V b V h n=≠=≠⎡⎤+++⎢⎥⎢⎥''⎡⎤⎡⎤''=-=-=-⎢⎥⎢⎥⎢⎥''⎣⎦⎣⎦⎢⎥+++⎢⎥⎢⎥⎣⎦=∑∑ (9)By neglecting ''Nh I in the harmonic current of nonlinear load and adding it to the harmonic current of linear load, 'Nh I can then be deemed as harmonic current of thenonlinear load while ''Lh I can be taken as harmonic current of the linear load. ''Nh I =0 means the composite load contains no harmonic sources, while ''0NhI ≠signify that harmonic sources may exist in this composite load. As the neglected term ''Nh I is not dominant, it is obviousthat this simplification does not make significant error on the total harmonic current of nonlinear load. However, it makes the possibility or the harmonic source identification and current separation.3. Identification procedureIn order to identify the existence of harmonic sources in a composite load, the parameters in Eq. (9) should be determined primarily, i.e.[]0122hr h h h rh i hhr hhihnr hni C a a a a a a a a ''= []0122hi h h h rh i hhrhhihnr hni C b b b b b b b b ''=For this purpose, measurement of different supply voltages and corresponding harmoniccurrents of the composite load should be repeatedly performed several times in some short period while keeping the composite load stationary. The change of supply voltage can for example be obtained by switching in or out some shunt capacitors, disconnecting a parallel transformer or changing the tap position of transformers with OLTC. Then, the least squares approach can be used to estimate the parameters by the measured voltages and currents. The identification procedure will be explained as follows.(1) Perform the test for m (2m n ≥)times to get measured fundamental frequency andharmonic voltage and current phasors ()()k k h h V θ∠,()()k k hh I φ∠,()1,2,,,1,2,,k m h n == .(2) For 1,2,,k n = ,transfer the phasors corresponding to zero fundamental voltage phase angle ()1(0)k θ=and change them into orthogonal components, i.e.()()11kkr V V = ()10ki V =()()()()()()()()()()11cos sin kkkkk kkkhr h h hihhV V h V V h θθθθ=-=-()()()()()()()()()()11cos sin k kkkk kkkhrhhhihhI I h I I h φθφθ=-=-,2,3,...,h n =(3)Let()()()()()()()()1221Tk k k k k k k k r i hr hi nr ni VV V V V V V V ⎡⎤=⎣⎦ ,()1,2,,k m = ()()()12Tm X V V V ⎡⎤=⎣⎦ ()()()12T m hr hr hr hrW I I I ⎡⎤=⎣⎦()()()12Tm hi hi hihi W I I I ⎡⎤=⎣⎦ Minimize ()()()211hr mk hr k I C V=-∑ and ()()()211him k hi k IC V=-∑, and determine the parametershr C and hi C by least squares approach as [13]:()()11T T hr hr T T hi hiC X X X W C X X X W --== (10)(4) By using Eq. (9), calculate I0Lh; I0Nh with the obtained Chr and Chi; then the existence of harmonic source is identified and the harmonic current is separated.It can be seen that in the course of model construction, harmonic source identification and harmonic current separation, m times changing of supply system operating condition and measuring of harmonic voltage and currents are needed. More accurate the model, more manipulations are necessary.To compromise the needed times of the switching operations and the accuracy of the results, the proposed model for the nonlinear load (Eq. (7)) and the composite load (Eq. (9)) can be further simplified by only considering the dominant terms in Eq. (7), i.e.01111,Nhr h h hhr hhi hr Nh Nhi ho h hhrhhi hi I a a V a a V I I b b V b b V +⎡⎤⎡⎤⎡⎤⎡⎤==+⎢⎥⎢⎥⎢⎥⎢⎥+⎣⎦⎣⎦⎣⎦⎣⎦2,3,,h n = (11) 01111h h Nh ho h a a V I b b V +⎡⎤'=⎢⎥+⎣⎦01111,hr hhrhhi hr h h h LhNh hi hhr hhihi ho h I a a V a a V I I I I b b V b b V ''+⎡⎤⎡⎤⎡⎤⎡⎤''==-=-⎢⎥⎢⎥⎢⎥⎢⎥''+⎣⎦⎣⎦⎣⎦⎣⎦2,3,,h n = (12) In this case, part equations in the previous procedure should be changed as follows[]01hr h h hhrhhi C a a a a ''= []01hi h h hhrhhiC b b b b ''= ()()()1Tk k k hr hi V V V ⎡⎤=⎣⎦ Similarly, 'Nh I and 'Lh I can still be taken as the harmonic current caused by thenonlinear load and the linear load, respectively.4. Experimental validation4.1. Model accuracyTo demonstrate the validity of the proposed harmonic source models, simulations are performed on the following three kind of typical nonlinear loads: a three-phase six-pulse rectifier, a single-phase capacitor-filtered rectifier and an acarc furnace under stationary operating condition.Diagrams of the three-phase six-pulse rectifier and the single-phase capacitor-filtered rectifier are shown in Figs. 1 and 2 [14,15], respectively, the V –I characteristic of the arc furnace is simplified as shown in Fig. 3 [16].The harmonic currents used in the simulation test are precisely calculated from their mathematical model. As to the supply voltage, VekT1 is assumed to be uniformly distributed between 0.95 and 1.05, VekThr and VekThi ek 1; 2;…;m T are uniformly distributed between20.03 and 0.03 with base voltage 10 kV and base power 1 MVFig. 1. Diagram of three-phase six-pulse rectifier.Fig. 2. Diagram of single-phase capacitor-filtered rectifierFig. 3. Approximate V –I characteristics of arc furnace.Three different models including the harmonic current source (constant current) model, the Norton model and the proposed simplified model are simulated and estimated by the least squares approach for comparison.For the three-phase six-pulse rectifier with fundamental currentI=1.7621; the1 parameters in the simplified model for fifth and seventh harmonic currents are listed in Table 1.To compare the accuracy of the three different models, the mean and standard deviations of the errors on Ihr; Ihi and Ih between estimated value and the simulated actual value are calculated for each model. The error comparison of the three models on the three-phase six-pulse rectifier is shown in Table 2, where mhr; mhi and mha denote the mean, and shr; shi and sha represent the standard deviations. Note that I1 and _Ih in Table 2are the current values caused by rated pure sinusoidal supply voltage.Error comparisons on the single-phase capacitor-filtered rectifier and the arc furnace load are listed in Table 3 and 4, respectively.It can be seen from the above test results that the accuracy of the proposed model is different for different nonlinear loads, while for a certain load, the accuracy will decrease as the harmonic order increase. However, the proposed model is always more accurate than other two models.It can also be seen from Table 1 that the componenta50 t a51V1 and b50 t b51V1 are around 20:0074 t0:3939 0:3865 and 0:0263 t 0:0623 0:0886 while the componenta55V5r and b55V5i will not exceed 0:2676 £0:03 0:008 and 0:9675 £0:003 0:029; respectively. The result shows that the fifth harmonic current caused by the summation of constant term and the fundamental voltage is about 10 times of that caused by harmonic voltage with same order, so that the formal is dominant in the harmonic current for the three-phase six-pulse rectifier. The same situation exists for other harmonic orders and other nonlinear loads.4.2. Effectiveness of harmonic source identification and current separationTo show the effectiveness of the proposed harmonic source identification method, simulations are performed on a composite load containing linear load (30%) and nonlinear loads with three-phase six-pulse rectifier (30%),single-phase capacitor-filtered rectifier (20%) and ac arc furnace load (20%).For simplicity, only the errors of third order harmonic current of the linear and nonlinear loads are listed in Table 5, where IN3 denotes the third order harmonic current corresponding to rated pure sinusoidal supply voltage; mN3r ;mN3i;mN3a and mL3r ;mL3i;mL3a are error means of IN3r ; IN3i; IN3 and IL3r ; IL3i; IL3 between the simulated actual value and the estimated value;sN3r ;sN3i;sN3a and sL3r ;sL3i;sL3a are standard deviations.Table 2Table 3It can be seen from Table 5 that the current errors of linear load are less than that of nonlinear loads. This is because the errors of nonlinear load currents are due to both the model error and neglecting the components related to harmonic voltages of the same order, whereas only the later components introduce errors to the linear load currents. Moreover, it can be found that more precise the composite load model is, less error is introduced. However, even by using the very simple model (12), the existence of harmonic sources can be correctly identified and the harmonic current of linear and nonlinear loads can be effectively separated. Table 4Error comparison on the arc furnaceTable 55. ConclusionsIn this paper, from an engineering point of view, firstly anew linear model is presented for representing harmonic sources. On the basis of the intrinsic difference between linear and nonlinear loads in their V –I characteristics, and by using the proposed harmonic source model, a new concise principle for identifying harmonic sources and separating harmonic source currents from that of linear loads is proposed. The detailed modeling and identification procedure is also developed based on the least squares approximation approach. Test results on several kinds of typical harmonic sources reveal that the simplified model is of sufficient precision, and is superior to other existing models. The effectiveness of the harmonic source identification approach is illustrated using a composite nonlinear load.AcknowledgementsThe authors wish to acknowledge the financial support by the National Natural Science Foundation of China for this project, under the Research Program Grant No.59737140. References[1] IEEE Working Group on Power System Harmonics, The effects of power system harmonics on power system equipment and loads. IEEE Trans Power Apparatus Syst 1985;9:2555–63.[2] IEEE Working Group on Power System Harmonics, Power line harmonic effects on communication line interference. IEEE Trans Power Apparatus Syst 1985;104(9):2578–87.[3] IEEE Task Force on the Effects of Harmonics, Effects of harmonic on equipment. IEEE Trans Power Deliv 1993;8(2):681–8.[4] Heydt GT. Identification of harmonic sources by a State Estimation Technique. IEEE Trans Power Deliv 1989;4(1):569–75.[5] Ferach JE, Grady WM, Arapostathis A. An optimal procedure for placing sensors and estimating the locations of harmonic sources in power systems. IEEE Trans Power Deliv 1993;8(3):1303–10.[6] Ma H, Girgis AA. Identification and tracking of harmonic sources in a power system using Kalman filter. IEEE Trans Power Deliv 1996;11(3):1659–65.[7] Hong YY, Chen YC. Application of algorithms and artificial intelligence approach for locating multiple harmonics in distribution systems. IEE Proc.—Gener. Transm. Distrib 1999;146(3):325–9.[8] Mceachern A, Grady WM, Moncerief WA, Heydt GT, McgranaghanM. Revenue and harmonics: an evaluation of someproposed rate structures. IEEE Trans Power Deliv 1995;10(1):474–82.[9] Xu W. Power direction method cannot be used for harmonic sourcedetection. Power Engineering Society Summer Meeting, IEEE; 2000.p. 873–6.[10] Sasdelli R, Peretto L. A VI-based measurement system for sharing the customer and supply responsibility for harmonic distortion. IEEETrans Instrum Meas 1998;47(5):1335–40.[11] Arrillaga J, Bradley DA, Bodger PS. Power system harmonics. NewYork: Wiley; 1985.[12] Thunberg E, Soder L. A Norton approach to distribution networkmodeling for harmonic studies. IEEE Trans Power Deliv 1999;14(1):272–7.[13] Giordano AA, Hsu FM. Least squares estimation with applications todigital signal processing. New York: Wiley; 1985.[14] Xia D, Heydt GT. Harmonic power flow studies. Part I. Formulationand solution. IEEE Trans Power Apparatus Syst 1982;101(6):1257–65.[15] Mansoor A, Grady WM, Thallam RS, Doyle MT, Krein SD, SamotyjMJ. Effect of supply voltage harmonics on the input current of single phase diode bridge rectifier loads. IEEE Trans Power Deliv 1995;10(3):1416–22.[16] Varadan S, Makram EB, Girgis AA. A new time domain voltage source model for an arc furnace using EMTP. IEEE Trans Power Deliv 1996;11(3):1416–22.。

毕业设计英文翻译

毕业设计英文翻译

沈阳工业大学化工装备学院毕业设计(论文)外文翻译毕业设计(论文)题目:含硫氨污水冷却器外文题目:Head processing technology译文题目:封头加工工艺院(系):化工装备学院专业班级:过控0802班学生姓名:孙鹏博指导教师:闫小波2012年3月11日Head processing technology1.welding process1.1welding operationOur factory common welding methods are: manual welding, argon arc welding, submerged arc welding.(1) manual welding is mainly used for carbon steel 3-6mm plate welding.(2) submerged arc welding to more than 8mm carbon steel stainless steel sheet welding mainly.(3)3-6mm stainless steel argon arc welding with welding mainly. Commonly used stainless steel wire ER304and ER316L steel wire, commonly used to J422and J507and J426and J427low-temperature welding consumables. Flux of carbon steel used is the HJ431, stainless steel commonly used is HJ260,.As a result of welding wire flux can be easily affected with damp, stored in the infrared drying machine, flux HJ431and HJ260drying temperature is 250-300℃. Welding wire J422and J350drying temperature were 150℃ and 300 ℃Welding process is completely in accordance with the" welding" execution, sheet thickness determines the welding to welding or double sided arc welding in welding, after the weld seam inspection ( RT X ray ) judgment without pores, cracks and other defects, such as found in the above deficiencies, to the repair, until the filming.1.2 welding operation standard(1) welding procedure card after receiving process, affirm the process card and physical material, quantity, unit number, specifications, size instruction number is consistent, whether there is debris around the wafer, wafer splashes whether clean removal, such as treatment is not clean, will use the grinding clean.(2) there is no welding test plate, groove cutting quality can meet the requirement, material surface without obvious defects, such as abnormal response.(3) according to the" Regulations" welding procedure card check of welding groove type and dimensions correspond to.(4) on each side of groove surface grinding, butt edge offset is not greater than the10% thickness, and not more than1.5mm.(5) point fixed the first weld layer terminal welding length not less than 50mm, arc board specifications should be 150*150mm and a mask having R arc, team rounds should be given within 8 hours of welding, or to use flame to the moisture inside the baking groove.(6) the welder holds" welding" and" welding records" for welding consumables, welding two class library for registration, using flux field volume should not exceed 4 hours, or to continue to back into the oven drying.(7) a, preheating plate thickness not less than 30mm carbon steel, low alloy steel, the preheating temperature of welding process by" card"," standard" provisions of the welding technology.B, preheating range width not less than 4mm and no less than 100mm. C, in the process of welding groove at any time temperature shall not be less than the prescribed temperature.D, when welding temperature is below 0 ℃( arbitrary thickness) must be heated to 15 ℃or above in order to welding.(8) a before welding, welding to welding equipment inspection, examination was normal before welding facilities.According to B,"" the requirements of welding process welding, welding and fill in the recordsC, welding, welding layers shall be in accordance with" welding" requirements, welding shall not be a large current, less layers. (9) removal of the root a, stainless steel cleaning before the root groove sides, within the range of 300mm, splashing paint coating.B, using carbon arc air gouging, should be selected according to the request carbon rod diameter.C, root cleaning, grinding cleaning groove and two side the existence of carburized layer, oxide, slag and other sundries. Grinding width: manual welding, rust, oxide above 20mm, oil30mm above, automatic welding, rust, grease, oxides 25mm50mm groove inner grinding requirements, carbon steel, low alloy steelδn ≤10mm weld, its two ends within the range of 300mm carburized layer must be completely removed, the rest part allows the removal of more than 50%. Other non-ferrous metals must be completely clear. [3]D, root cleaning, composite steel Cr-Mo, manual welding and the thicknessofδn ≥30mm welds shall be examined by PT.(10) during the process of welding defect repair by welding repair welding repair monitor instruction experienced welders as. Repair welding process should eliminate soldering phenomenon, or polished after welding, the following defects must be removed before welding to welding crack,①partial②③pits the stomaA shall not be lower than the parent material, weld.B, there shall be no undercutting.C, without removing the residual high seam. The surface shall not have cracks, pores, crater, undercut and slag inclusions, and may not retain the slag and spatter.D, removal of residual high weld inspection shall not have any defect display PT.E, such as the defects of carbon steel, low-alloy steel repair procedures: a grinding wheel or a carbon arc gouging polishing cleaning→ PT check grinder grinding out the welding groove, welding, PT, stainless steel repair procedures: a grinding wheel or a carbon arc gouging polishing cleaning→PT (δ n≥ 2mm need )→grinder polished to a welding groove welding→ PT examination. [4](12) welded internal rework, repair procedures: location of defect, defect removal→ PT→→removal check welding weld→ PT examination. [5] (13) according to RT film, RT staff and the welders in welding seam together determine the location of defects, including the following requirements when using UT to determine the defect position, the first repairδ n≥ 30mm use UT to determine the location of defects, two or three repairδ n≥ 20mm using UT to determine the defect position, UT positioning by RT after class. The position and depth of defect ( calibration side shall be the depth of defect≤1/2 side).(14) after the welding inspector or monitor by confirmed, in the process card signed your name and object together with transfer to the next process, by the next process responsibility recognition can.2.stamping process2.1stamping operationStamping operation is small head forming an important operation. The same stamping is also head of the cracking, thinning appeared most processsection.2.2punching machine.(1) the master cylinder is mainly used to connect the die head, is the head forming the necessary parts.(2) side cylinder used for pressing die ring, fixing the upper and lower mold ring of head disk. The head in the pressing process is to prevent the crease, as an important part of the drum kit.(3) the overflow valve used for controlling the compressor overall pressure, prevent the wafer during the pressing process of tears. (4) stamping valve in pressure, stamping valve on pressure relief, achieve average pressure effect.In addition, circuit boards, motors, circuit boards, storage tank, operation platform, pedestal are stamping machine components.2.3.3 stamping operation steps(1) first of all to undertake a blanking process card, find a good wafer.(2) the control process card on the technological requirements, put ona set of corresponding die, and with the use of gauges to determine the selected die size and to suppress the wafer size.(3) the wafer is clamped on the upper and lower mold inside the circle, and determine the die head of the center point and the center point of the wafer in a straight line.(4) the operation ring mold and die relative motion, pressure test, according to the control rod rebound to judge the size of the pressure, thereby regulating pressure size.(5) pressure test end, pressed wafer, stamping.2.3the stamping operation standard(1) the control task orders, confirm physical and process card is consistent, according to the process card confirming workpiece number, material, specification, batch number and other factors, at the same time check wafer end there is no crack, burr, polished wafer whether it meets the requirements, whether chamfer, is facing the good, there are special requirements when the problem is found, in time to contact.(2) according to the process card correct selection of die mold surface, inspection, found bruises and serious injury must be polished, but must be clean mold surface corrosion and dirt.(3) according to the technology card size, shape, texture, straight edge higher to suppress.(4) the warm-stamping ( according to requirement sheet property is heated to a certain temperature, and then stamping process ), to prepare a baking gun, gas, oxygen, percussion with head shall prepare the corresponding template, double-sided film to the wafer edge of both sides in a range of about 200-300mm template removal, and clear the film surface. [6] (5) mounted on the lower die, as the case to join the die pad, the wafer inside and outside surface coated with oil, applied range of top to200-300mm, smear should be uniform, the upper and lower mold are evenly coated.(6) the first gold stamping head, hanging out with a model head, check section shape, at the same time, check whether the drum kit, and there is no thinning, and check the surface has no scratch, hoop printing, such as none of the above abnormalities can continue to stamping, head forming, sealing surfaces such as scratches are timely grinding, and confirm the minimum board thickness, confirm whether a scratch, strain, curved peel, orange peel, drum kits, wrinkle, hoop printing etc..(7) such as a head drum kit fold phenomenon should be together with the card with the move to rework process technology.(8) each head should be able to see the instruction, piece number, material, or to transplantation, each product specifications after testing, the process card ( to sign the name ) together to the next process, by the next process validation.3.pressure drum process3.1pressure drum operationPressure drum process and stamping processes are the same steps in the process, stamping process range of φ 159- φ1900mm and pressure drum process is in the range of φ 1600- φ4800mm. And stamping is different pressure drum mostly the head generally forming, eventually forming is completed by spinning, stamping without the special requirements of customers, eventually forming step is not required. φ 1600- φ1900mm heads the two processes is needed.3.2pressure drum machine.(1) the main cylinder is provided with an upper die head is pressed drumexecution as long as part of.(2) supporting seat fixed lower die and upper die head center in a straight line.(3) supporting frame1is provided with a rolling wheel, a position adjusting before and after.(4) supporting frame is provided with a rolling wheel rotating disk II. In addition, there are hydraulic system, the motor, oil pump, oil tank, and a control console.3.3pressure drum machine operation steps(1) first of all to undertake a blanking process card, find a good wafer.(2) the control process card on the technological requirements, put ona set of corresponding die, and with the use of gauges to determine the selected die size and to suppress the wafer size.(3) and stamping machine is different from the original film is not pressure drum center began to suppress, but from the wafer edge, as long as the die and wafer alignment on the line.(4) the pressing process is continuously by controlling the rotation wheel is driven by the rotation of a wafer rotating, according to a certain order to suppress.(5) in after the pressing process, prepared template matching. If a deviation to make further adjustments.3.4pressure drum operation standard(1) die on the quality of the products and the smooth pressure drum forming crucial. Therefore, require that the operator must according to the processing situation of choice for mold and timely adjust shim plate.(2) the operator receives the process card, see process card, according to the process card check objects, to confirm the real instruction, one-piece, material. Number, batch number etc.. According to the choice of mold process card.(3) for EHA, EHB head shapes have adopted the 0.82*D standard selection, for DHB, PSH, MD and other special products according to technology card selection of mold, but in principle according to P*0.82/1.15or P*0.82/1.2 standard selection. [1](4) pressing carefully before inspection wafer quality, no seam wafer end is smooth, there is no gap, surface has no cutting slag and defects.(5) a weld in addition to carefully check the end of the wafer wafer defects, at the same time should be checked for weld seam is higher than that of base metal, weld ends of are welding spatter, weld end grinding smooth, there is no crack notch.(6) two or two or more superimposed when pressed, each slice of the joint surface should be clean, according to the circumstances must entrust welding class, the wafer is welded together to suppress.(7) detection of wafer thickness ( the thickest, most thin, whether and process card, measurement of wafer size and process card.(8) suppression must be removed before the inside and outside surface of all debris, to prevent pitting appeared.(9) for general stainless steel materials ( more than 5mm plate ) using Teflon plate mold and the lower mold dressing on surface polished smooth ( necessary nowadays mold to Teflon plate. ) to ensure the surface quality of the workpiece, while in the process of the pressing need to avoid debris into molds and semi-finished products. [6](10) the pressing process, when the wafer is a R shape, must use the corresponding R model measurement, the pressing process should be considered to adjust the pressure deformation degree.(11) pressing is finished, the measurement of plate thickness, measuring arc length. Check surface quality, check end and weld end is smooth ( necessary to polish out the ceremony ).(12) to check the semi-finished product with process card is on the move to the next process ( and sign the name ) by the next process to confirm acceptance before.4.spinning process4.1spinning operationThe spinning process is pressed after the drum head molding process, mainly for large head R and straight edge formation.4.2spinning machine.(1) forming wheel is connected to the corresponding mold, forming in the head inside, mold top with half formed head R and straight edge is tangent to tangent.(2) supporting wheel is also connected and molded wheel mold, forming in the head outside, and a forming wheel tangent.(3) base for fixing head, and the bottom according to head size before and after moving, the head should be installed so that the center of the base and the head of the center in a straight line.(4) the center rod is used for fixing head, and the center and the center of the base is in a straight line.In addition to the motor, a circuit board, is connected to the shaft, anda control console.4.3spinning procedure(1) to undertake pressure drum process card, according to the card to determine the corresponding head spinning.(2) according to the head of the diameter, select the corresponding upper and lower mold.(3) the clamping head, ensure that the head of the center point and the center of the base point in a straight line.(4) to adjust the molding wheel and the head of tangent, then according to the forming wheel position adjustment roller.(5) in the spinning process to observe the forming roller and the supporting roller relative position, and continue to use the template on the line alignment. Until the R reaches the requirements.4.4spinning operation standard(1) spinning wheel material for steel bearings or ductile iron, mold on the quality of the products and can spin forming closely related, therefore the operator must be processed according to choose suitable mold, at the same time, because of the shape of the mold and the surface condition of the quality of the workpiece has a great influence, therefore, before processing and machining process must on the mold for full inspection.(2) according to the process card requirements, confirm wafer, pressure drum or preload semi-finished instruction number, specifications, quantity of material, compliance, and check the quality of surface and end with no defect, abnormal timely and on the procedures of contact, and in a timely manner(3) check the semi-finished end is smooth, with or without notch, crack, surface has no cutting or welding slag, and shall inspect the weld seam is higher than that of base metal, weld ends whether spatter, weld end grinding smooth, there is no crack. [7](4) pressure drum or to the press after the finished product, must checkfor folding, cracking, crack is not conducive to the spinning processing defects.(5) for stainless steel workpiece, through to the pickling method of decontamination.(6) according to the process card selection of mold, general small arc r size requirements as a basis for selecting the internal wheel. (7) according to the different material, thickness of plate and sheet rebound, selection is slightly smaller than the internal wheel circular arc R.(8) for the special requirements of the product, according to its shape design inside the wheel, confirm the mold surface, good polishing processing.(9) spinning processing, in order to prevent scratching and improve the processing performance, suitable lubricant ( grease ) to prevent process heating head appears on the surface of hot cracks and scratches, can also prolong the service life of die.(10) the spinning process, should be considered a workpiece shaping and timely for pressure adjustment.(11) after the molding process, deal with the size, shape, thickness, surface quality inspections, confirmation.(12) molded product with the card with the transfer process to the next process ( in the process card signed their name ) by the procedures under the inspector or monitor check before.5.groove processThe 5.1groove Essentials(1) groove process is a head of the data ( including circumference, total height) to achieve JB/T4746 standard key process. [1](2) groove is in order and cylinder head connection time, make welding more thoroughly.(3) the main groove cutting process and cutting process tools, is the use of plasma cutting.(4) cutting, according to the card on the technological requirements, determine groove type ( inner groove, outside the mouth, X groove ) and determine the groove angle.(5) the groove before the head splashing agent applicator.(6) groove when the first test slope, then a protractor measuring angle, identified in the tolerance range, after adjustment, the whole slope. The 5.2groove operation standard(1) according to the process card to find real, order confirmation No., specification, material, batch number, quantity and check whether the workpiece has a drum kit, crack, delamination, wrinkle, and whether the loss of a round, found problems in a timely manner to contact, processing, the plate thickness of more than 8mm, is suggested to lose the round groove, the following 6mm, tooling plate pressure is groove.(2) stainless steel head, should be in the groove wall smearing splash front head agent, prevent groove, slag spout to head on the wall. (3) head onto the beveling machine before, first confirm the head weight, based on the weight of suitable sling, sling safety inspection.(4) head onto the groove machine, beveling rotary table adjustment screw rod, with a center adjusting position, rotating table, is aligned to the center.(5) groove, according to technology card height and height tolerance groove height ruler to draw lines, confirm the high line, the slope slope, should first slope flat groove, and then the slope groove.(6) outside the mouth or the inner groove angle should be controlled within ± 2.5 tolerance.(7) groove after, should check the head circumference, height, straight edge, angle, if not qualified to repair process, repair.(8) qualified head will remove and clean the slag grinding head internal slag, together with card transfer to the next process ( and sign their name ) by the next process inspector confirmation can be.6.polishing process6.1 polishing process steps(1) according to the card process requirements, identify the need for polishing head.(2) the head rotating table, determine the level of, the clamping head.(3) polishing from edge to center, or from the center to the edge; according to the diameter size determine the head beam, lower speed and working stage, after moving speed.(4) check the polishing condition, appropriate for rework.The 6.2polishing operation standard(1) according to the process card and materials to confirm the product instruction number, specifications, material, batch number, quantity, and check whether the workpiece has a drum kit, crack, delamination defects, and whether the loss of a round, found problems in a timely manner to contact, processing, check the appearance, to determine the need for manual processing, the polishing before hook head to mark.(2) according to the requirements of the choice of using a polishing, polishing pads, and the necessary auxiliary tool.(3) confirm the head weight, based on the weight of suitable sling, and check whether the safety hanger.(4) the head hanging onto a work table, adjust the center, at the same time to ensure that the head is in the basic level (0-5 deviations ).(5) people in the scene when polishing polishing, attention, especially the left centre, speed fast, or outward from a center left, a little pressure to increase, from the edge to the center of pressure during polishing, to a little decrease in polishing head, thin wall, as the case may be mounted shockproof wheel, at the same time attention to mechanical work has no abnormal.(6) after the completion of inspection head polishing, with or without defect, and the necessary contact.(7) the Polish well head with coated packaging, in the process card signed their names, together with the head and process the card with the circulation storage, and by the next inspection approval.封头加工工艺1.焊接工序1.1 焊接操作我们厂常用的焊接方法有:手工焊、氩弧焊、埋弧焊。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

毕业设计英语翻译【篇一:毕业设计中英文翻译】英文资料翻译题目基于网络信息的自动化控制系别专业班级学生姓名学号指导教师2012年4月con trol based on n etwork andin formatio na automation networking application areas networking is used in all areas of automation. in factory automation, process automati on and buildi ng automati on n etworks perform diverse tasks. likewise, there are dist inct differe nces betwee n tasks performed for applicati ons in differe nt in dustry sectors that all have unique characteristics and con seque ntly vary ing requireme nts. the way devices are conn ected, con figured, and excha nge data also differ.there is no on e-size-fits-all for in dustrial n etworks; rather, buses are optimized foter differe nt characteristics. for example, factory automati on and process automati on are ofte n used in harsh and hazardous en viro nments where a producti on in terrupti on is costly. these requireme nts con trast sig nifica ntly with build ing automati on, for example, where keep ing costs low is a main driving force.factory automatio nfactories with assembly-l ine manu facturi ng, as in the automotive, bottli ng, and mach inery in dustries, are predo minan tly con trolled using discrete logic and sen sors that sense whether or not, for example, a process mach ine has a box standing in front of it. the network types ideal for simple discrete i/o focus on low overhead and small data packets, but they are un suitable for larger, messages like con figurati on download and the like. examples of this network type are seriplex, i nterbus-s, and as-i (as-in terface), which are sometimes called sen sor buses or bit level buses. other more adva need protocols orie nted toward discrete logic in clude device net, con troln et, and profibus (dp and fms applicati on profiles). these buses are sometimes referred to as devicebuses or byte-level buses. factory automati on in volves fast-moving mach inery and therefore requires quicker resp onse than slower processes. traditi on ally, these tasks have bee n han dled by plcs.process automati onprocess plants in industry segments like refining, pulp paper, power, and chemicals are dominated by continuous regulatory con trol. measureme nt is an alog (here meaning scalar values tran smitted digitally), and actuatio n is modulat ing. of course, process industries also use some discrete control and the predo minan tly discrete manu facturi ng in dustries use some modulating. fieldbus on/off valves are already available in the market, as are small remotely moun ted i/o modules for discrete sen sors .in the past, a dcs or sin gle-loop con troller did this.process-related n etwork in clude foun dati on fieldbus, profibus (pa application profile), and hart. all these buses as a category are now typically referred to as fieldbus (without the capital f), though some would argue that one or the other does not bel ong. these three protocols were specifically desig ned for bus-powered field in strume nts with predefi ned parameters and comma nds for asset man ageme nt in formatio n like iden tificati on, diag no stics, materials of con structi on, and fun cti ons for calibratio n and commissi onin g. i n term of size, the n etworks used in in dustrial automati on are con sidered to con stitute local area n etworks (la n) spa nning areas no greater tha n a kilometer or two in diameter and typically confined to a sin gle build ing or a group of build in gs. n etworks that exte nd only a few meters are in sufficie nt, and n etworks that spa n cities or eve n the globe are overkill.field and host tier networkseven within control systems for the process sector there is a n eed for differe nt n etwork characteristics at each tier of the control system hierarchy. at the field and there are instruments such as tran smitters and valve positti oners that have their specific needs, and valve positioners that have their specific n eeds (fig.5-1a-1). whe n fieldbus bega n to evolve, the process in dustry put a large nu mber of requireme nts on the field-level n etwork that were not met by other types of n etworks. many new desig n con sideratio ns n eeded to be take n into acco unt.on the upper tier, data from all the field-level networks have to be marshaled on to a si ngle host-leveln etwork that also serves any tasks the pla nt may have that seem related to factory automatio n.fig.5-1a-1 field level at the field level, the dominant protocols for process instrument are hart, foundation fieldbus h1, and profibus pa.hart is significantly different from the other two in that it is a so-called smart protocol, that is a comb in atio n of digital com muni cati on simulta neously superimposed on a conven tio nal 4-20ma sig nal. as such, the hart protocol has bee n an ideal in termediate solutio n in the tran siti on from an alog. hart is compatible with exist ing an alog recorders, controllers, and indicators while at the same time it makes possible remote configuration and diagnostics using digital com mun icatio n. the hart protocol does allow several devices to be multidropped on a sin gle pair of wires, but this is a capability in freque ntly explored because of the low update speed, typically half a sec ond per device. for a vast majority of in stallati ons hart devices are conn ected point to point, that is, one pair of wires for each device and a han dheld conn ected temporarily from time to time for configuration and maintenance. both foundation fieldbus h1 and profibus pa are completely digital and even use identical wiri ng, follow the iec 61158-2 sta ndard. however, bey ond that there are major differe nces betwee n these two protocols, and depe nding on the desired system architecture one may be more suitable than the other.at the field level, i nstrume nts appear in large qua ntities, ofte n in the hundreds or thousands. the wire run are very long, as the network cable must run from the control room all the way into the field, up towers, and the n branching out to devices scattered throughout the site. because there is a limit to the nu mber of devices that can be multidropped on each n etwork, eve n a medium-sized pla nt may have many n etwork cables running into the field, although substantially fewer than if poi nt-to-poi nt wiri ng was used. the field-level n etworks were therefore desig ned to en able very long wire runs and to allow field devices to take their power from the network. only asin gle pair of wires carries both the device powera s d thedigital com muni cati ons sig nal. this elimi nates the n eed for a separate power cable, thus keep ing the wiri ng simple and in expe nsive.as ano ther measure to keep costs dow n, desig ners chose a moderate field-level n etwork speed so no rmal in strume nt- grade cable could be used in stead of special data cable. no special conn ectors, couplers, or hubs are required either, which makes it possible to use rugged and weatherproof conn ecti ons.the grade of cable used for conven tio nal in strume nt conn ecti ons on most sites is more tha n sufficie nt for fieldbus n etwork ing. as a result, it is possible to reuse that cable when an existing plant is migrated to fieldbus. in hazardous process en vir onments where flammable fluids are prese nt in tri nsic safety is many times the preferred protecti on method. the field-level n etworks were therefore desig ned to allow safety barriers to be in stalled on the bus.because desig ners chose a moderate field-level n etwork speed the devices conn ected to it do not require a great deal of cpu process ing power to han dle the com muni cati on quickly. as a result, they also con sume very little power. because the low power con sumpti on results inlow voltage drop along the wire, it is therefore【篇二:毕业设计英文翻译模板】都信业设系别姓名专业班级学号息工程学院计英文翻译论文标题****学院大气探测、信***处、两个专业填写电子信息*******工程。

相关文档
最新文档