虹膜识别外文翻译文献

虹膜识别外文翻译文献
虹膜识别外文翻译文献

虹膜识别外文翻译文献

虹膜识别外文翻译文献

(文档含中英文对照即英文原文和中文翻译)

外文:

The first chapter

1.1 The research background of iris recognition

Biometrics is a technology for personal identification using physiological characteristics and behavior characteristics inherent in the human body. Can be used for the biological characteristics of biological recognition, fingerprint, hand type face, iris, retina, pulse, ear etc.. Behavior has the following characteristics: signature, voice, gait, etc.. Based on these characteristics, it has been the development of hand shape recognition, fingerprint recognition, facial recognition, iris recognition, signature recognition and other biometric technology, many techniques have been formed and mature to application of.

Biological recognition technology in a , has a long history, the ancient Egyptians through identification of each part of the body size measure to carry out identity may be the earliest human based on the earliest history of biometrics. But the modern biological recognition technology began in twentieth Century 70 time metaphase, as biometric devices early is relatively expensive, so only a higher security level atomic test, production base.due to declining cost of microprocessor and various electronic components, precision gradually improve, control device of a biological recognition technology has been gradually applied to commerce authorized, such as access control, attendance management, management system, safety certification field etc..

All biometric technology, iris recognition is currently used as a convenient and accurate.

Making twenty-first Century is information technology, network technology of the century, is also the human get rid of traditional technology, more and more freedom of the century. In the information, free for the characteristics of the century, biometric authentication technology, high-tech as the end of the twentieth Century began to flourish, will play a more and more important role in social life, fundamentally change the human way of life . Characteristics of the iris, fingerprint, DNA the body itself, will gradually existing password, key, become people lifestyle, instead of at the same time, personal data to ensure maximum safety, maximize the prevention of various types of crime, economic crime.

Iris recognition technology, because of its unique in terms of acquisition, accuracy and other advantages, will become the mainstream of biometric authentication technology in the future society. Application of safety control, the customs import and export inspection, e-commerce and other fields in the future, is also inevitable in iris recognition technology as the focus. This trend, now in various applications around the world began to appear in the.

1.2 Objective and significance of iris recognition

Iris recognition technology rising in recent years, because of its strong advantages and potential commercial value, driven by some international companies and institutions have invested a lot of manpower, financial resources and energy research. The concept of automatic iris identification is first proposed by Frown, then Daugman for the first time in the algorithm becomes feasible.

The iris is a colored ring in the pupil in the eye of fabric shape, each iris contains a structure like the one and only based on the crown, crystalline, filaments, spots, structure, concave point, ray, wrinkles and fringe characteristic. The iris is different from the retina, retinal is located in the fundus, difficult to image, iris can be seen directly, biometric identification technology can obtain the image of iris fine with camera equipment based on the following basis: Iris fibrous tissue details is rich and complicated, and the formation and embryonic tissue of iris details the occurrence stage of the environment, have great random the. The inherent characteristics of iris tissue is differ from man to man, even identical twins, there is no real possibility of characteristics of the same.

When the iris are fully developed, he changes in people's life and tiny. In the iris outer, with a layer of transparent corneal it is separated from the outside world. So mature iris less susceptible to external damage and change.

These characteristics of the iris has the advantages, the iris image acquisition, the human eye is not in direct contact with CCD, CMOS and other light sensor, uses a non technology acquisition invasion. So, as an important biometric identity verification system, iris recognition by virtue of the iris texture information, stability, uniqueness and non aggressive, more and more attention from both academic and industrial circles.

1.3 Status and application of domestic and foreign research on iris recognition

IDC (International Data Group) statistics show that: by the end of 2003, the global iris recognition technology and related products market capacity will reach the level of $2000000000. Predicted conserved survey China biometric authentication center: in the next 5 years, only in the Chinese, iris recognition in the market amounted to 4000000000 rmb. With the expansion of application of the iris recognition technology, and the application in the electronic commerce domain, this number will expand to hundreds of billions.

The development of iris recognition can be traced back to nineteenth Century 80's.. In 1885, ALPHONSE BERTILLON will use the criminal prison thoughts of the application of biometrics individual in Paris, including biological characteristics for use at the time: the size of the ears, feet in length, iris.

In 1987, ARAN SAFIR and LEONARD FLOM Department of Ophthalmology experts first proposed the concept, the use of automatic iris recognition iris image in 1991, USA Los ala Moss National Laboratory JOHNSON realized an automatic iris recognition system.

In 1993, JOHN DAUGMAN to achieve a high performance automatic iris recognition system.

In 1997, the first patent Chinese iris recognition is approved, the applicant, Wang Jiesheng.

In 2005, the Chinese Academy of Sciences Institute of automation, National Laboratory of pattern recognition, because of outstanding achievement "in recognition of" iris image acquisition and aspects, won the two "National Technology Invention Prize", the highest level represents the development of iris recognition technology in china.

In 2007 November, "requirements for information security technology in iris recognition system" (GB/T20979-2007) national standards promulgated and implemented, the drafting unit: Beijing arithen Information Technology Co., ltd..

Application of safety control, the customs import and export inspection, e-commerce and other fields in the future, is also inevitable in iris recognition technology as the focus. This trend, now in various applications around the world began to appear in the. In foreign countries, iris recognition products have been applied in a wide range.

In February 8, 2002, the British Heathrow Airport began to test an advanced security system, the new system can scan the passenger's eyes, instead of to check passports. It is reported, the pilot scheme for a period of five months, a British Airways and virgin Airlines passengers can participate in this test. The International Air Transport Association interested in the results of this study are, they encourage the Heathrow Airport to test, through the iris boarding passengers to determine its identity as a boarding pass.

Iris recognition system America "Iriscan" developed has been applied in the three business department of Union Bank of American Texas within. Depositors to be left with nothing whatsoever to banking, no bank card password, no more memories trouble. They get money from the A TM, a camera first eye of the user to scan, and then scan the image into digital information and data check, check the user's identity.

America Plumsted school in New Jersey has been in the campus installed device of iris recognition for security control of any school, students and staff are no longer use cards and certificates of any kind, as long as they passed in the iris camera before, their location, identity is system identification, all foreign workers must be iris data logging to enter the campus. At the

same time, through the central login and access control system to carry on the control to enter the scope of activities. After the installation of the system, various campus in violation of rules and infringement, criminal activity is greatly reduced, greatly reducing the campus management difficulty.

In Afghanistan, the United Nations (UN) and the United Nations USA federal agency refugee agency (UNHCR) using iris recognition system identification of refugees, to prevent the same refugee multiple receive relief goods. Use the same system in refugee camps in Pakistan and Afghanistan. A total of more than 2000000 refugees use iris recognition system, this system to a key role for the United Nations for distribution of humanitarian aid from.

In March 18, 2003, Abu Zabi (one of the Arabia and the United Arab Emirates) announced the iris recognition technology for expelled foreigners iris tracking and control system based on the borders opened the world's first set of national level, this system began construction from 2001, its purpose is to prevent all expelled by Abu Zabi tourists and other personnel to enter the Abu Zabi. Without this system in the past, due to the unique characteristics of the surface of the Arabs (Hu Xuduo), and the number of the expulsion of the numerous, customs inspection staff is very difficult to distinguish between what is a deported person. By using this system, illegal immigration, all be avoided, the maximum guarantee of national security.

Kennedy International Airport in New Jersey state (John F. Kennedy International Airport) of the iris recognition system installed on its international flights fourth boarding port, 300 of all 1300 employees have already started to use the system login control. By using this system, all can enter to the apron personnel must be after the system safety certification of personnel. Unauthorized want to break through, the system will automatically take emergency measures to try to force through personnel closed in the guard space. Using this system, the safety grade Kennedy International Airport rose from B+ to A+ grade. The Kennedy International Airport to travel to other parts of the passengers has increased by 18.7%.

Generally speaking, the iris recognition technology has already begun in all walks of life in various forms of application in the world. At the same time, to the application of their units of all had seen and what sorts of social benefits and economic benefits are not see. This trend is to enhance the high speed, the next 10 years will be gradually achieve the comprehensive application of iris recognition in each industry.

In China, due to the Chinese embargo and iris technology itself and the difficulty in domestic cannot develop products. So far, there has not been a real application of iris recognition system. However, many domestic units are expressed using strong intention, especially the "9 · 11" later, security anti terrorism consciousness has become the most concerned problems in the field of aviation, finance. Iris recognition system is a major airline companies, major financial institutions and other security mechanisms (such as aerospace bureau) become the focus of attention of object and other key national security agency. As with the trend of development in the world, iris recognition technology will in the near future in application China set off climax.

The second chapter of introduction of iris recognition technology

2.1 Technology of biological feature recognition based on

2.1.1 Present status and development of biological feature recognition

“9.11" event is an important turning point in the development of biometric identif ication technology in the world, the importance of it makes governments more clearly aware of the biological recognition technology. Traditional identity recognition technologies in the face of

defect anti terrorism has shown, the government began a large-scale investment in the research and application of biometric technology. At the same time, the public understanding of biological recognition technology with "9.11" exposure rate and greatly improve the.

The traditional method of individual identification is the identity of the people with knowledge, identity objects recognition. The so-called identity: knowledge refers to the knowledge and memory system of personal identification, cannot be stolen, and the system is easy to install, but once the identification knowledge stolen or forgotten, the identity of easily being fake or replaced, this method at present in a wide range of applications. For example: the user name and password. The so-called identity items: refers to the person, master items. Although it is stable and reliable, but mainly depend on the outer body, lost or stolen identification items once proof of identity, the identity of easily being fake or replaced, for example: keys, certificates, magnetic card, IC card etc..

Biometric identification technology is related to physical characteristics, someone using prior record of behavior, to confirm whether the facts. Biometric identification technology can be widely used in all fields of society. For example: a customer came into the bank, he did not take bank card, also did not remember the password directly drawing, when he was drawing in the drawing machine, a camera to scan on his eyes, and then quickly and accurately complete the user identification and deal with business. This is the application of the iris recognition system of modern biological identification technology. "".

America "9.11" after the incident, the anti terrorist activity has become the consensus of governments, it is very important to strengthen the security and defense security at the airport, some airports USA can in the crowd out a face, whether he Is it right? Wanted. This is the application of modern technology in biological feature recognition "facial recognition technology".

Compared with the traditional means of identity recognition, biometric identity recognition technology in general has the following advantages:

(1) the security performance is good, not easy to counterfeit or stolen.

(2) carry, whenever and wherever possible, therefore more safety and security and other identification method.

For the biological information of biometric recognition, its basic nature must meet the following three conditions: universality, uniqueness and permanency.

The so-called universality, refers to any individual has the. Uniqueness, is in addition to other than himself, other people did not have any, namely different. The so-called permanent, refers to the character does not change over time, namely, life-long.

Feature selection of organisms with more than three properties, is the first step of biological recognition.

In addition, there are two important indexes in biological recognition technology. The rejection rate and recognition rate. Adjusting the relation of these two values is very important. The reject rate, the so-called false rejection, this value is high, use frequency is low, the error recognition, its value is high, safety is relatively reduced. So in the biological identification of any adjustment, the two index is a can not abandon the process. The choice of range size, related to the biological identification is feasible and available .

And technology of identity recognition based on iris feature now appears, it is the development of biometric identification technology quickly, due to its uniqueness, stability,

convenience and reliability, so the formation of biometric identification technology has the prospects for development.

Generally speaking, the biological recognition system consists of 4 steps. The first step, the image acquisition system of collecting biometric image; the second step, the biological characteristics of image preprocessing (location, normalization, image enhancement and so on); the third step, feature information extraction, converted into digital code; the fourth step, the generation of test code and database template code to compare, make identification。

2.1.2 Currently several large biological feature recognition technology

(1)the fingerprint recognition technology

Fingerprint identification technology originally used in criminal field, after the twentieth Century, fingerprint recognition technology has been accepted by the whole world. At present, around the world have established the fingerprint automatic recognition system of fingerprint database and crime. The criminal investigation understanding opportunity now, fingerprint identification technology has been applied in facilities management requires a high degree of security, as the most traditional, biological feature recognition method is the most mature.

Fingerprint identification is the fingerprint of the rugged finger end positive skin texture. Each fingerprint texture in the pattern, the breakpoint and cross point on each are not identical, is the only, and the same for life. Fingerprint can be broadly divided into two categories: the general features and local features. Overall features can be directly observed with the naked eye grain pattern: ring (loop), arch type (arch), spiral type (whorl), namely we commonly known as the bucket, dustpan, double skip. But those basic pattern classification and recognition is still far from enough. In practical applications, often someone fingerprint extraction nodes (often appear in the interrupt, fingerprint ridge bifurcation or turning) the local feature information, identity authentication. Information features of fingerprint minutiae of up to more than 150, but some details are extremely rare, there are 7 types of nodes: common endpoint (a line end here), bifurcation point (a stripe on the split into two or more lines), bifurcation points (from two parallel lines on this), isolated point (a special short lines, so that it has become a point (a), ring lines split into two, immediately merged into one, a loop formed), short lines (the shorter end but does not become a bit lines). One of the most typical and the most commonly used is the endpoint and bifurcation points, in the automatic fingerprint identification technology, generally only to detect the number of these two types of nodes, and combined with the curvature position, direction and regional lines node, get fingerprint feature only. The quality of fingerprint recognition accuracy and the input fingerprint image has a very important relationship. Due to noise, uneven contact and other reasons, may lead to fingerprint image acquisition has many distortion, deformation. In the analysis of fingerprint, feature a lot of suspicious will produce, flooded the real feature point, so the smoothing, filtering, binarization, thinning, two image processing methods to improve the grain clarity, and delete a lot of noise damage area. Fingerprint image enhancement generally use the following link, normalizing, orientation image estimation, frequency estimation, template, filter.

Fingerprint identification has universality, uniqueness, permanence and high security advantages, the development of the technology to the mature period, the false rejection rate and false acceptance rate of compliance, even on the part of the incomplete fingerprint can also be identified, it is insufficient, because the fingerprint recognition technology originally used in the

field of crime investigation, some people are afraid of "the fingerprint record". In addition, the biological feature identification, the most fundamental is the counterfeiting problem, such as the left finger mark user fingerprint, and these finger mark is used to copy the fingerprint can.

(2)Face recognition technology

Facial recognition technology analyzes face images with computer, extracts effective recognition information from, a technique used to "identify" the identity. Facial recognition technology that is caused by the strong interest to researchers in the early 60's of the twentieth Century, some prior knowledge but early face recognition requires people. Entered in twentieth Century after 90 years, high performance computer, face recognition method is a major breakthrough, to enter the real machine automatic recognition stage.

Compared with fingerprint recognition, iris recognition, face recognition is more direct and friendly, has a broad application prospect in the identification, file management, video retrieval etc.. Now, domestic and foreign had the automatic face recognition system of the product, such as a German company developed Siemens "and visual access control system (FaceV ACS)", for the security access control system, the recognition rate is close to 100%. However, the accuracy of face recognition is easily affected by illumination, pose, expression, occlusion, age and other factors.

Engineering facial recognition technology American DoD has shown that: the image collection and recognition in the constraint conditions of rate can reach more than 95%, but in the non restraint environment, the recognition rate dropped sharply. Therefore, we from the constraint and non restraint environment two approaches to the study of face recognition.

Face recognition in constrained environments, generally focused on 2D facial image recognition still. The main research direction of research methods based on the whole and the research method based on feature analysis.

The overall research approach based on considering the overall attribute of the model, it not only preserves the topology relation between face components, but also retain the component itself, including the commonly used methods: eigenface method, SVD decomposition method, matching method, elastic graph matching method, a hidden Markov model method and neural network analysis of face density contour analysis.

Method based on feature analysis is presented through the local contour information and gray level information, relative ratios of the facial reference point and other face facial feature shape eraser book or category parameters together constitute the feature vector. Based on the feature vectors such as eyes, mouth and other parts and the extraction of.

Facial recognition of unconstrained environment, pose and illumination variations is the main factor affecting recognition. Usually use some special methods to improve the robustness of system identification. Such as the deformation model method, multi angle method, 3D model method, image care method. Among them, 3D face recognition and attention, the 3D face reconstruction, head tracking, three face recognition, facial expression analysis and synthesis of 4 levels. At present, face three face recognition algorithm problem is image data are difficult to obtain, the problem is too large, the mass storage data modeling time.

(3) recognition of hand shape

America aviation brigade Bureau of air pilots at the start of the aircraft, precision instrument to measure the hand shaped pocket by palm feature (finger length, width and thickness of the palm)

recognition is the pilot in the operation, it as a biological feature recognition technology is developing, because must wear the instrument in the hands of large size only use, America, participating enterprises less, the price is higher, all these problems need to be further studied. (4) the voice recognition technology

Speaker recognition is the difference between personal voice to automatically determine whether the person is. Each sound is influenced by their physical, dialect, environment. The advantage of voiceprint recognition without prior registration, with small psychological recognition, and the device is simple, general computer can deal with weak voice; for easy collection, can be used for public communication line monitoring by the state security department's attention. The shortage is the change of tone or ambient noise is changing the sound may, rejection rate, error rate is high.

(5)handwriting recognition technology

Handwriting recognition is one of the personal identification technology. Handwriting itself only static information, to be the same as when it is necessary to consider the static information, also want to consider the order of strokes, pen pressure dynamic information. People in writing may not be exactly the same behavior, it is influenced by physiological, psychological and other factors, there are corresponding points, there are also differences. Therefore, samples and materials can not be 100% identical, there is also the possibility to identify. Handwriting recognition compared with other methods, the users' psychological resistance of small, high successful rate, low price; combining with other handwriting recognition with the existing financial system and to some extent also the attention. But the recognition accuracy is affected by handwriting influence, it is very difficult to automatically identify essential differences and non essential differences.

2.2 Iris recognition technology based on the brief introduction

Biometric identification inevitable rejection and error identification problem. Therefore, in order to improve the matching accuracy, to provide supplementary scheme on many occasions, in order to prevent this from happening, but many professional believes that this issue is not important, compared with the traditional methods, biological feature recognition technology is more safe and reliable.

Some biological feature recognition technology generally need to better signal acquisition device and the computing platform, although some years their prices have declined significantly, but they are still more expensive than traditional means, of course, such expensive also no return, it brings more security.

So far, there is not a single biometric technology can meet the requirements of be the pink of perfection. According to the comparison, based on biometrics we found that, regardless of the accuracy, or from the acquisition and anti fake and permanent, iris recognition and so in own higher advantage in several the identification, iris recognition has become, was studied in most countries and scientific research personnel problems, along with the the development of Computer Science and technology, iris recognition technology has risen to a higher level.

Based on the feature of iris recognition and other image based recognition, there are four main components: and recognition of iris image acquisition, image preprocessing, iris feature extraction, matching.

(1) the acquisition of iris images, the process appears to be very simple, but it is very difficult step. On the one hand because the human eye is a camera, many independent stray light

will want to be in the eyes of the people, so as to be ingested into the iris image; on the other hand, because the iris diameter of only 10 mm, there is a big difference between the different races of iris color. Iris color, white light, texture significantly; and iris yellow people are mostly dark brown, texture is very obvious, in the premise of shielding stray light, using near infrared light source stability, incident angle adjustable light source, in order to obtain 8 grayscale image of high quality.

(2) the iris image preprocessing. Including the localization of the iris image, normalization and enhancement. Iris localization is the removal of acquisition to the eyelids, eyelashes, the whites of the eyes, to find the center and radius of the iris, in order to eliminate the influence of translation, rotation, scaling and other geometric transform for iris recognition, iris image must be to adjust the original to the same size and the corresponding position, because the ring pattern iris feature, decided iris image to the polar coordinate transformation form of the normalized iris image in the collection process, the non-uniform illumination effect to texture analysis results, enhanced generally adopts the method of histogram equalization image, reduce uneven illumination distribution.

(3) and matching method was first proposed by Dr. John Daugman of University of Cambridge to extract iris feature, after many iris recognition technology is the basis to launch, Dr. Daugman Gabor filter is used for iris image coding, an arbitrary iris feature codes and other different iris feature codes to generate uncorrelated this based on characteristics, is a poetic couplet iris feature codes Hamming distance implementation of iris recognition.

With the further development of research and application of iris recognition technology, iris recognition system increasingly high degree of automation, neural network algorithm, the algorithm of fuzzy recognition is gradually applied to the iris recognition.

2.3Summary this chapter

With the rapid development of computer technology and modern science and technology, the biological feature recognition for the technical characteristics of the technology is more accurate, more rapidly, higher security performance aspects of development, this chapter mainly introduces several biometric identification technology based on, such as face recognition, retina identification, note recognition, hand shape recognition technology, focuses on the iris recognition accuracy higher performance, this paper introduces the composition and Research on iris recognition system based on.

Present research status of iris location algorithm

3.1 common location algorithm

Currently has 4 kinds of iris location method of representative: Daugman positioning method, Hough transform method, geometric feature location method and active contour mapping, and point out the advantages and disadvantages of these methods in practical applications.

3.1.1 Hough transform method

Specific process is the first through the edge detection method to get the pupil and iris and iris and sclera edge, the iris is circular, Hough transform is applied to get the radius circle, which divide the iris. Hough transformation goal is to find a transformation from the boundary of the region to the parameter space, with most boundary points satisfy the corresponding parameter to describe the boundary of the region.

Circle positioning Hough transform equation,

()()222r b y a x =-+- (3-1)

Use it to obtain the pupil center and radius, the radius of the iris. The picture may not eliminate the eyelids and eyelashes, so use the radius to segment the iris, often including eyelids and eyelashes. Based on the parabola fitting lid, described as:

()()[]()()[]j j j j j j j j j k y h x a k y h x θθθθsin cos cos sin 2-+-=-+--(3-2) including: parabolic curvature; parabolic vertices, respectively; X for relative rotation

Degree. This can affect the eyelids, eyelashes elimination, keep the other iris information.

Advantages of Hough transform mainly lies in: the noise points in the image is not sensitive, use it to get the effect can effectively eliminate the influence of noise. Disadvantage: the large amount of calculation, memory, the extracted parameters by the parameter space of the quantization interval control.

3.1.2 geometric positioning method

Geometric positioning method is a method of iris localization properties using the iris edge image geometric features and the intersecting chord, the specific process is: first, according to the overall gray distribution information of iris image, extracting the iris inner edge by edge detection operator, and then extract the iris intersecting chord properties to the circle center, finally using Hough transform to extract the iris outer radius. Typically, pupil and iris iris image in the edge is relatively clear, but the sclera and iris boundary relative fuzzy. The iris inner edge, how to find the center is the key problem, find the center, can be combined with the above two kinds of method of iris location, iris localization process.

3.1.3 active contour method

The active contour method for active contour (Snake) is a complex contour extraction and image interpretation technique, the energy function has tiny itself to achieve the object boundaries. The specific process of locating the: first with the method of gray detection of pseudo circle as a point in the pupil of the eye, and then to the point as the center, around which to take several point as the initial Snake, in accordance with the operation mechanism of Snake continuous evolution, the inner boundary of iris is found, then calculate the control point after evolution Snake Snake and the centroid and centroid, locate the iris inner boundary location; finally according to Daugman method to locate the boundary. The initial location of iris inner boundary of the algorithm is the most crucial step. The active contour method compared to the Daugman location advantage is: no edge detection and two values, the initial center of the pupil is not high, more robust. Iris edge map is an iris image. As can be seen from the graph, gray pupil area is very uniform, between the pupil and iris edge gray level difference is relatively large, and the edge between iris and sclera difference is small. From the gray histogram of the iris image can be found, the first peak of the histogram is very obvious. The pupil, iris and sclera according to gray distribution, can think peak corresponds to the pupil. So you can set the threshold to separate the pupil pupil, obtain the radius and the center, and on this basis to the outer radius of the iris. For iris locating system, Daugman and Wildes are the most representative.

Through the analysis of all kinds of positioning algorithm, better effect, the classical method

领导风格外文翻译文献

领导风格外文翻译文献 (文档含中英文对照即英文原文和中文翻译) 原文: 1. Introduction The leadership in organizing a government so far has tended to be only one leadership style for all employees’ abilities, namely instruction leadership style, so it has impacted and caused low-level service performance, [1]. An ofiicer’s leadership is no more than as a power figure, who is highly chained by formal rules. So, there is no possibility for appreciations to occur. The implication which occurs toward human resources of employees is that there is a strong tie with formal rules, so there is no room for employees to take initiatives, innovative actions, and to make significant development. Therefore, the time has come for the single-style bureaucratic leadership style orientation to change into the situational leadership style, a style based on situations and conditions of the subordinate/employees’ abilities. Besides the leadership style, the officer’s motivation also plays an important role in achieving high performance because it is related with :

旅游服务贸易外文翻译文献

旅游服务贸易外文翻译文献(文档含英文原文和中文翻译)

旅游服务贸易的国际竞争力:罗马尼亚的案例 引言 旅游业是唯一的可以为任何发展水平的国家提供贸易机会的服务活动。然而,它也是一个很大程度因为国家的能力和在全球经济中的表现而又有明确的利益分配不均行业,而这又需要提高自己的竞争力。 自20世纪90年代初,罗马尼亚旅游业经历了出口量,生长速率和结构的重大变化。这些不同的波动都影响了罗马尼亚在国际旅游市场上相对的竞争地位并引起了其旅游贸易平衡的变化。同时,新的和更多的错杂的欧式建筑,引起了罗马尼亚的区域旅游竞争力的显著变化。 在此背景下,本文试图提出一个框架,以竞争力和旅游贸易表现之间的关系为重点,来评估罗马尼亚的旅游服务贸易的国际竞争力。 一、国际竞争力视角:国际竞争力之与国际旅游业的相关性 国际竞争力的概念,尽管有争议,难以捉摸,但现在已经得到认可,并继续吸引世界各地的学者和决策者的关注。 到目前为止,为提高国际竞争力已采取措施,都被认为是在经济层面进行的(加瑞利,2003)通常是指一个国家生产的商品和服务,以满足国际市场的考验,并同时保持和增加公民的收入的能力(欧洲委员会,2007)。 由于竞争力最终取决于一国企业在国内和国际的市场成功,所以对竞争力的注意力都集中在企业层面的竞争力上(波特,1990),对于此的普遍理解是指“……该公司保持,并更好的是,扩大其全球市场份额,增加和扩大利润的能力” (克拉克和盖,1998, 经济合作与发展组织,1993)。 因此,虽然广泛流传但是国际竞争力作为与国家经济和其国际贸易相关

的理论基础已经不太在学术文献进行分析。因此,一个国家国际竞争力的性质,效益和局限性仍然含糊不清(科尔德威尔,2000,克鲁格曼,1994, 1996)。 国际竞争力,是指一个国家在货物和服务贸易方面巩固和保持贸易优势相对于世界其他地区的贸易优势。 每当一个国家的经济福利通过贸易流量的增加,或通过从初始平衡状态的贸易条件的改变而增加,他的国际竞争力都会得到提高(科尔德威尔,2000)。 贸易理论表示,经济福利依赖于一个国家有比较优势的货物和服务的生产。这实际上意味着当生产符合一国的比较优势的情况时国际竞争力能得到保障。如果一国能在国际上表现良好并在出口市场竞争成功,这可能就是他们健全的国际竞争力的标志。 因此,在国际上,竞争力定义为一个经济体能够吸引其出口需求和投资供给需求的能力和在所有社会规范内提升公民生活水平的能力。这反过来又取决于宏观和微观经济政策,影响生产的经济生产率要素和经营成本的法规和制度。 一个可用的文献回顾和实证证据支持国际竞争力可以解释为在一定程度上,一个国家的出口能力这一观点(道乐和沃尔夫,1993, 格博格等. 2004)。还有就是,事实上,是出口表现和国际竞争力之间的循环关系。出口是国际竞争力的第一衡量指标。出口情况的改善会导致了一个国家的竞争力提升。这种效果是一个企业的技能,知识,创新和运用新技术并能够在一个成功的商业方式中利用技术机会等的结果。 另一方面,为了在竞争激烈的全球市场努力成功实现出口,一个国家被迫提高竞争力。更具竞争力的国家,它的经济更强大。因此,它更有能力在全球市场竞争,以吸引具有较高的知识,技能,水平人们去购买新技术等,

机械设计设计外文文献翻译、中英文翻译、外文翻译

机械设计 摘要:机器是由机械装置和其它组件组成的。它是一种用来转换或传递能量的装置,例如:发动机、涡轮机、车辆、起重机、印刷机、洗衣机、照相机和摄影机等。许多原则和设计方法不但适用于机器的设计,也适用于非机器的设计。术语中的“机械装置设计”的含义要比“机械设计”的含义更为广泛一些,机械装置设计包括机械设计。在分析运动及设计结构时,要把产品外型以及以后的保养也要考虑在机械设计中。在机械工程领域中,以及其它工程领域中,所有这些都需要机械设备,比如:开关、凸轮、阀门、船舶以及搅拌机等。 关键词:设计流程设计规则机械设计 设计流程 设计开始之前就要想到机器的实际性,现存的机器需要在耐用性、效率、重量、速度,或者成本上得到改善。新的机器必需具有以前机器所能执行的功能。 在设计的初始阶段,应该允许设计人员充分发挥创造性,不要受到任何约束。即使产生了许多不切实际的想法,也会在设计的早期,即在绘制图纸之前被改正掉。只有这样,才不致于阻断创新的思路。通常,还要提出几套设计方案,然后加以比较。很有可能在这个计划最后决定中,使用了某些不在计划之内的一些设想。 一般的当外型特点和组件部分的尺寸特点分析得透彻时,就可以全面的设计和分析。接着还要客观的分析机器性能的优越性,以及它的安全、重量、耐用性,并且竞争力的成本也要考虑在分析结果之内。每一个至关重要的部分要优化它的比例和尺寸,同时也要保持与其它组成部分相协调。 也要选择原材料和处理原材料的方法。通过力学原理来分析和实现这些重要的特性,如那些静态反应的能量和摩擦力的最佳利用,像动力惯性、加速动力和能量;包括弹性材料的强度、应力和刚度等材料的物理特性,以及流体润滑和驱动器的流体力学。设计的过程是重复和合作的过程,无论是正式或非正式的进行,对设计者来说每个阶段都很重要。 最后,以图样为设计的标准,并建立将来的模型。如果它的测试是符合事先要

人工智能专业外文翻译-机器人

译文资料: 机器人 首先我介绍一下机器人产生的背景,机器人技术的发展,它应该说是一个科学技术发展共同的一个综合性的结果,同时,为社会经济发展产生了一个重大影响的一门科学技术,它的发展归功于在第二次世界大战中各国加强了经济的投入,就加强了本国的经济的发展。另一方面它也是生产力发展的需求的必然结果,也是人类自身发展的必然结果,那么随着人类的发展,人们在不断探讨自然过程中,在认识和改造自然过程中,需要能够解放人的一种奴隶。那么这种奴隶就是代替人们去能够从事复杂和繁重的体力劳动,实现人们对不可达世界的认识和改造,这也是人们在科技发展过程中的一个客观需要。 机器人有三个发展阶段,那么也就是说,我们习惯于把机器人分成三类,一种是第一代机器人,那么也叫示教再现型机器人,它是通过一个计算机,来控制一个多自由度的一个机械,通过示教存储程序和信息,工作时把信息读取出来,然后发出指令,这样的话机器人可以重复的根据人当时示教的结果,再现出这种动作,比方说汽车的点焊机器人,它只要把这个点焊的过程示教完以后,它总是重复这样一种工作,它对于外界的环境没有感知,这个力操作力的大小,这个工件存在不存在,焊的好与坏,它并不知道,那么实际上这种从第一代机器人,也就存在它这种缺陷,因此,在20世纪70年代后期,人们开始研究第二代机器人,叫带感觉的机器人,这种带感觉的机器人是类似人在某种功能的感觉,比如说力觉、触觉、滑觉、视觉、听觉和人进行相类比,有了各种各样的感觉,比方说在机器人抓一个物体的时候,它实际上力的大小能感觉出来,它能够通过视觉,能够去感受和识别它的形状、大小、颜色。抓一个鸡蛋,它能通过一个触觉,知道它的力的大小和滑动的情况。第三代机器人,也是我们机器人学中一个理想的所追求的最高级的阶段,叫智能机器人,那么只要告诉它做什么,不用告诉它怎么去做,它就能完成运动,感知思维和人机通讯的这种功能和机能,那么这个目前的发展还是相对的只是在局部有这种智能的概念和含义,但真正完整意义的这种智能机器人实际上并没有存在,而只是随着我们不断的科学技术的发展,智能的概念越来越丰富,它内涵越来越宽。 下面我简单介绍一下我国机器人发展的基本概况。由于我们国家存在很多其

零售企业营销策略中英文对照外文翻译文献

零售企业营销策略中英文对照外文翻译文献(文档含英文原文和中文翻译)

译文: 零售企业的营销策略 Philip Kotlor 今天的零售商为了招徕和挽留顾客,急欲寻找新的营销策略。过去,他们挽留顾客的方法是销售特别的或独特的花色品种,提供比竞争对手更多更好的服务提供商店信用卡是顾客能赊购商品。可是,现在这一切都已变得面目全非了。现在,诸如卡尔文·克连,依佐和李维等全国性品牌,不仅在大多数百货公司及其专营店可以看到,并且也可以在大型综合商场和折扣商店可以买到。全国性品牌的生产商为全力扩大销售量,它们将贴有品牌的商品到处销售。结果是零售商店的面貌越来越相似。 在服务项目上的分工差异在逐渐缩小。许多百货公司削减了服务项目,而许多折扣商店却增加了服务项目。顾客变成了精明的采购员,对价格更加敏感。他们看不出有什么道理要为相同的品牌付出更多的钱,特别是当服务的差别不大或微不足道时。由于银行信用卡越来越被所有的商家接受,他们觉得不必从每个商店赊购商品。 百货商店面对着日益增加的价格的折扣店和专业商店的竞争,准备东山再起。历史上居于市中心的许多商店在郊区购物中心开设分店,那里有宽敞的停车场,购买者来自人口增长较快并且有较高收入的地区。其他一些则对其商店形式进行改变,有些则试用邮购盒电话订货的方法。超级市场面对的是超级商店的竞争,它们开始扩大店面,经营大量的品种繁多的商品和提高设备等级,超级市场还增加了它们的促销预算,大量转向私人品牌,从而增加盈利。 现在,我们讨论零售商在目标市场、产品品种和采办、服务以及商店气氛、定价、促销和销售地点等方面的营销策略。 一、目标市场 零售商最重要的决策时确定目标市场。当确定目标市场并且勾勒出轮廓时,零售商才能对产品分配、商店装饰、广告词和广告媒体、价格水平等作出一致的决定。如沃尔玛的目标市场相当明确:

浅谈华为公司的领导风格

沈阳理工大学应用技术学院题目:浅谈华为公司的领导风格 姓名 院(中心、所)经济管理学院 学号 年级2011级 专业工商管理 考试科目组织行为学 考试时间 考试分数 教师签字

目录 摘要···························································· 1.华为公司领导者的介绍 0 2.任正非的领导风格 0 2.1低调 0 2.2狼性精神 (1) 2.3用毛泽东兵法治商 (1) 2.4危机管理理念 (2) 3.任正非的领导秘诀 (2) 3.1“一法”——《华为基本法》——明确的发展纲领·2 3.2“两制”——规范的HR机制、严密的运营机制 (3) 3.3朴实无华的宣教 (3) 4.结束语 (3) 参考文献: (4) 摘要 领导是管理的重要的职能,领导的水平的高低常常决定着组织的生存死亡。领导的有效性是组织成败的关键。领导者身负组织领导的重任,其思想观念、心理素质和特殊心理机制,不仅影响到个人工作的成效,更影响到其部署和群体作用的发挥乃至整个组织的行为绩效。领导的本质是影响力,即对一个组织、一个群体或一些人的行为与观念是施加影响的过程。领导能力意味着影响着团队中成员的发展、留任和激发成员的能力,具有魅力的领导有能力将其自身的价值观与其下属的相统一,他能够影响其下属视其为了集体的利益而舍弃自身的利益。具有魅力的领导,可以激发团队的成员对于团队的项目的热情、发展其忠诚度,建立成

员们的自信和承诺,领导者将成为影响团队效率的楷模。关键词:领导者;华为公司;任正非;领导风格

1.华为公司领导者的介绍 正所谓“上梁不正下梁歪”,作为一个领导者不能起到楷模作用,那么他的下属也只能成为乌合之众,不能有所作为,领导者的领导风格对下属和团队将产生重要的影响。华为公司的创始人任正非出生在贵州的一个贫困的小村庄,任正非虽然生在农村,但他从小就开始接受教育,可谓“贫贱不能移”,任正非凭借着其才能和智慧以及对知识的孜孜不倦的追究,使他进入一个技术密集型行业。1978年,任正非从部队转业,以2万元注册资本创办了深圳华为技术有限公司,现任华为有限公司的总裁。公司主营电信设备,发展迅猛,成为中国市场GSM设备、交换机产品及接入系统的佼佼者。2000年他被美国《福布斯》杂志评选为中国富豪第三位。个人财产估计为5亿美元。2005年他入选《时代周刊》全球“建设者与巨子”100名排行榜,他是中国唯一入选的企业家。同一档为有美国的苹果电脑公司董事长及首席执行官乔布斯、传媒大亨默多克、俄罗斯石油巨头阿布拉莫维奇、2011年任正非以11亿美元首次进入福布斯富豪榜,排名全球第1056名,中国第92名。在《财富》中文版第七次发布中,位居“中国最具影响力的商界领袖”榜单之首。 2.任正非的领导风格 2.1低调 低调的人做有高度的事业。木秀于林,风必摧之,故老子云:“夫唯不争,故天下莫能与之争”,不争者胜天下。任正非深谙这道理,为人处世一向低调。他对各种采访、会议、评选都躲得远远的,不论是直接有利于华为形象的宣传活动,还是政府的活动,或者令许多商界精英趋之若鹜的媒体盛世,他都统统拒绝。他向华为高层发下死命令:“除非重要客户或合作伙伴,其他活动一律免谈,谁来游说我,我就撤谁的职。”人们几乎没有看过他在电视屏幕上登场亮相,也几乎没有听到过他激情的演讲。任正非一贯的追求是“做事业,做有高度的事业”。唯有练好内功,方可与对手论高下。“桃李不言,下自成蹊”,就是这样,也许唯

服务贸易自由化机制外文文献翻译2014年译文4000字

文献出处:Barattieri A. The mechanism of service trade liberalization[J]. Journal of International Economics, 2014, 92(1): 1-13. (声明:本译文归百度文库所有,完整译文请到百度文库。) 原文 The mechanism of service trade liberalization Barattieri A Abstract In this paper, Service trade liberalization is the key areas of the United States to promote the TPP negotiations, the United States in the negotiations are pushing mechanism of a high standard of service trade liberalization. In this paper the progress of the TPP negotiations and services trade issues important position, on the basis of the acceptance, architecture design, focus on services, regulatory consistency four aspects in the TPP uncovers the "high standards" service trade liberalization mechanism establishment. American "high standards" service trade liberalization mechanism is tailored to the interests of the United States, actually services in the service of the United States. These mechanisms are through to strengthen and promote the TPP platform, forming reversed transmission to other countries. Key words: the TPP; The United States; Service trade liberalization; High standards; Mechanism design America is the first largest exporter global trade in services, and for many years, continues to service trade surplus. Competitive advantage based on service industry and service industry The importance of promoting American exports, jobs and economic growth, the United States in the multilateral, bilateral and regional multiple layers jointly promoting service trade liberalization. In the Uruguay round negotiations, the United States has overcome many obstacles, for the first time to include the Service Trade in multilateral negotiations, contributed to the general Agreement on Trade in services (the Genre - al Agreement on Trade and Service,

财务内部审计风险中英文对照外文翻译文献

中英文对照外文翻译文献 (文档含英文原文和中文翻译) 译文: 浅析内部审计风险的成因及解决途径 摘要 内部审计风险成因包括内部审计机构的独立性不够,内部审计人员的业务不精,内部审计方法的科学性不强,内部审计管理的制度不健全。为了降低内部审计风险,应加强内部审计的法制建设,保证内部审计的独立性,提高内部审计人员的素质,执行科学合理的审计工作程序,正确处理降低风险与经济效益的关系,开

展以风险为导向的风险基础审计。 一、内部审计风险形成的原因 1.内部审计机构的独立性不够内部审计机构是单位内设机构,在单位负责人的领导下开展工作,为单位服务。因此,内部审计的独立性不如社会审计,在审计过程中,不可避免地受本单位的利益制约。内审人员面临的是与单位领导层之间的领导与被领导的关系以及与各科室、部门之间的同事关系,所涉及的人不是领导就是同事,非直接有关也是间接相关, 审计过程及结论然涉及到具体的个人利益,因而审计过程难免受到各类人员干扰。 2.内部审计人员的业务不精审计人员素质的高低是决定审计风险大小的主要因素。审计人员的素质包括从事审计需要的政策法规水平、专业知识、经验、技能、审计职业道德和工作责任。 审计经验是审计人员应有的一种重要技能,审计经验需要实践的积累。我国的内部审计人员中不少人仅熟悉财务会计业务,一些审计人员不了解本单位的经营活动和内部控制,审计经验有限。另外,内部审计人员工作责任和职业道德也是影响审计风险的因素。由于我国内审准则工作规范和职业道德标准方面还有一些空白,许多内审机构和人员缺乏应有的职业规范的约束和指导。总之,目前我国内审人员总体素质偏低,直接影响到内审工作开展的深度和广度。面对当今内审对象的复杂和内容的拓展,内审人员势单力簿,这将直接导致审计风险的产生。 3.内部审计方法的科学性不强 我国内审方法是制度基础审计,随着企业内部经营管理环境复杂化,这种审计模式不适应开展内部管理审计的需要,因为它过分依赖于对企业内部管理控制的测试,本身就蕴藏巨大的风险内部审计一般采用统计抽样方法,由于抽样审计本身是以样本的审查结果来推断总体的特征,因此,样本和总体之间必然会形成一定的误差,形成审计的抽样风险。随着信息化程度提高,被审计单位的会计信息资料会越来越多,差错和虚假的会计资料掺杂其中,失察的可能性也随之加大。虽然统计抽样是建立在坚实的数学理论基础之上,但其本身是允许存在一定的审计风险的。同样,大量的分析性审核也会产生相关风险,使审计风险的构成内容更4.内部审计管理的制度不健全

文献综述_人工智能

人工智能的形成及其发展现状分析 冯海东 (长江大学管理学院荆州434023) 摘要:人工智能的历史并不久远,故将从人工智能的出现、形成、发展现 状及前景几个方面对其进行分析,总结其发展过程中所出现的问题,以及发展现状中的不足之处,分析其今后的发展方向。 关键词:人工智能,发展过程,现状分析,前景。 一.引言 人工智能最早是在1936年被英国的科学家图灵提出,并不为多数人所认知。 当时,他编写了一个下象棋的程序,这就是最早期的人工智能的应用。也有著名的“图灵测试”,这也是最初判断是否是人工智能的方案,因此,图灵被尊称为“人工智能之父”。人工智能从产生到发展经历了一个起伏跌宕的过程,直到目前为止,人工智能的应用技术也不是很成熟,而且存在相当的缺陷。 通过搜集的资料,将详细的介绍人工智能这个领域的具体情况,剖析其面临的挑战和未来的前景。 二.人工智能的发展历程 1. 1956年前的孕育期 (1) 从公元前伟大的哲学家亚里斯多德(Aristotle)到16世纪英国哲学家培根(F. Bacon),他们提出的形式逻辑的三段论、归纳法以及“知识就是力量”的警句,都对人类思维过程的研究产生了重要影响。 (2)17世纪德国数学家莱布尼兹(G..Leibniz)提出了万能符号和推理计算思想,为数理逻辑的产生和发展奠定了基础,播下了现代机器思维设计思想的种子。而19世纪的英国逻辑学家布尔(G. Boole)创立的布尔代数,实现了用符号语言描述人类思维活动的基本推理法则。 (3) 20世纪30年代迅速发展的数学逻辑和关于计算的新思想,使人们在计算机出现之前,就建立了计算与智能关系的概念。被誉为人工智能之父的英国天才的数学家图灵(A. Tur-ing)在1936年提出了一种理想计算机的数学模型,即图灵机之后,1946年就由美国数学家莫克利(J. Mauchly)和埃柯特(J. Echert)研制出了世界上第一台数字计算机,它为人工智能的研究奠定了不可缺少的物质基础。1950年图灵又发表了“计算机与智能”的论文,提出了著名的“图灵测试”,形象地指出什么是人工智能以及机器具有智能的标准,对人工智能的发展产生了极其深远的影响。 (4) 1934年美国神经生理学家麦克洛奇(W. McCulloch) 和匹兹(W. Pitts )建立了第一个神经网络模型,为以后的人工神经网络研究奠定了基础。 2. 1956年至1969年的诞生发育期 (1)1956年夏季,麻省理工学院(MIT)的麦卡锡(J.McCarthy)、明斯基(M. Minshy)、塞尔夫里奇(O. Selfridge)与索罗门夫(R. Solomonff)、 IBM的洛

市场营销_外文翻译_外文文献_英文文献_顾客满意策略与顾客满意

顾客满意策略与顾客满意营销 原文来源:《Marketing Customer Satisfaction 》自20世纪八十年代末以来, 顾客满意战略已日益成为各国企业占有更多的顾客份额, 获得竞争优势的整体经营手段。 一、顾客满意策略是现代企业获得顾客“货币选票”的法宝随着时代的变迁, 社会物质财富的极大充裕, 顾客中的主体———消费者的需求也先后跨越了物质缺乏的时代、追求数量的时代、追求品质的时代, 到了20世纪八十年代末进入了情感消费时代。在我国, 随着经济的高速发展,我们也已迅速跨越了物质缺乏时代、追求数量的时代乃至追求品质的时代, 到今天也逐步迈进情感消费时代。在情感消费时代, 各企业的同类产品早已达到同时、同质、同能、同价, 消费者追求的已不再是质量、功能和价格, 而是舒适、便利、安全、安心、速度、跃动、环保、清洁、愉快、有趣等,消费者日益关注的是产品能否为自己的生活带来活力、充实、舒适、美感和精神文化品位, 以及超越消费者期望值的售前、售中、售后服务和咨询。也就是说, 今天人们所追求的是具有“心的满足感和充实感”的商品, 是高附加值的商品和服务,追求价值观和意识多元化、个性化和无形的满足感的时代已经来临。 与消费者价值追求变化相适应的企业间的竞争, 也由产品竞争、价格竞争、技术竞争、广告竞争、品牌竞争发展到现今的形象竞争、信誉竞争、文化竞争和服务竞争, 即顾客满意竞争。这种竞争是企业在广角度、宽领域的时空范围内展开的高层次、体现综合实力的竞争。它包括组织创新力、技术创新力、管理创新力、产业预见力、产品研发力、员工向心力、服务顾客力、顾客亲和力、同行认同力、社会贡献力、公关传播沟通力、企业文化推动力、环境适应力等等。这些综合形象力和如何合成综合持久的竞争力, 这就是CSft略所要解决的问题。CS寸代,企业不再以“自己为中心”,而是以“顾客为中心”;“顾客为尊”、“顾客满意”不再是流于形式的口号, 而是以实实在在的行动为基础的企业经营的一门新哲学。企业不再以质量达标, 自己满意为经营理念, 而是以顾客满意, 赢得顾客高忠诚度为经营理念。企业经营策略的焦点不再以争取或保持市场占有率为主, 而是以争取顾客满意为经营理念。因此, 营销策略的重心不再放在竞争对手身上而是放在顾客身上, 放在顾客现实的、潜在的需求上。当企业提供的产品和服务达到了顾客事先的期望值, 顾客就基本满意;如果远远超越顾客的期望值, 且远远高于其他同行, 顾客才真正满意;如果企业能不断地或长久地令顾客满意, 顾客就会忠诚。忠诚的顾客不仅会经常性地重复购买, 还会购买企业其它相关的产品或服务;忠诚的顾客不仅会积极向别人推荐他所买的产品, 而且对企业竞争者的促销活动具有免疫能力一个不满意的顾客会将不满意告诉16-20个人, 而每一个被告知者会再传播给12-15个人。这样, 一个不满意者会影响到二、三百人。在互联网普及的今天, 其影响则更大。据美国汽车业的调查, 一个满意者会引发8笔潜在的生意, 其中至少有一笔会成交。而另一项调查表明, 企业每增加5%的忠诚顾客, 利润就会增长25%-95%。一个企业的80%的利润来自20%的忠诚顾客;而获取一个新顾客的成本是维持一个老顾客成本的6倍。所以,美国著名学者唐?佩 珀斯指出: 决定一个企业成功与否的关键不是市场份额, 而是在于顾客份额。 于是, 企业纷纷通过广泛细致的市场调研、与消费者直接接触、顾客信息反馈等方式来了解顾客在各方面的现实需求和潜在需求。依靠对企业满意忠诚的销售、服务人员, 定期、定量地对顾客满意度进行综合测定, 以便准确地把握企业经营中与“顾客满意” 目标的差距及其重点领域, 从而进一步改善企业的经营活动。依靠高亲和力的企业文化、高效率的人文管理和全员共同努力, 不断地向顾客提供高附加值的产品, 高水准的亲情般的服

全球领导力文献综述与分析

全球领导力文献综述与分析 2014年02月25日17:53 来源:《领导科学》(郑州)2012年11(中)期作者:李云飞字号 打印纠错分享推荐浏览量【作者简介】李云飞,天津商业大学F2U合作学院。 一、全球领导力的定义 全球领导力在世界范围内是个热门话题,同传统的领导力一样,始终没有一个被所有人认可的定义。研究全球领导力的专家学者根据各自的经验、不同的文化背景从不同的视角给出了不同的定义。 最初全球领导力的概念是借鉴进而延伸传统的国内领导力而来的(Yeung and Ready,1995),但是学者们很快意识到由于全球竞争的不定性和多种压力,全球领导力远比国内领导力复杂,这种不定性和压力增加了领导者的工作范围(Weber,1998)。Adler(2001)阐明了这个问题:“全球领导力不同于国内领导力,它涉及人与人之间的相互作用和不同文化之间的观念,而不仅仅是指领导者在本国特定的领导风格的有效性,也不是比较不同国家的不同领导方式……” 有些学者是从跨文化视角定义全球领导力的。Dorfman(2003)将全球领导力定义为一种跨越地理和文化边界的影响,并且这种影响不局限于全球化事物,也不局限于个人及其知识、技能和能力,也不局限于组织中的CEO。Carey等(2004)提出,全球领导力能够跨越地理和文化的边界以激发组织成员共同的愿景、促进合作的决策、适应全球变化浪潮、激励和授权多样化的员工队伍。 Mendenhall(2011)对全球领导者和领导力做了广义的界定:全球领导者是指那些通过建立在相互信任基础上的有效沟通而在组织中产生重大正量改变,在跨界利益相关者、外部权力机构的不同来源,以及在当时复杂的地理和文化条件下建立有效的组织结构和程序的领导者。 基于以上不同的定义,笔者认为,全球领导力概念的核心就是多元化,包括文化、人力资源、地理等。不同范畴的多样化增加了领导力环境的复杂性,因此,有效性成为全球领导力的终极目标。 二、研究历史回顾 领导力的研究在国际上可以追溯到1900年,距今已有100多年的历史了。在1900年至1940年期间,领导力研究致力于挖掘领导者独特的素质,最有代表性的是伟人理论,这个理论强调领袖是天生的,而不是制造的。根据Toyne和Nigh(1997)的研究,20世纪五六十年代国际商务的出现促使学者着手研究不同文化背景下的领导力以及不同文化对领导力的影响,然而这些研究并非当时国际商务研究的主流。 20世纪60年代,有些研究商业管理的学者开始关注管理跨国公司的相关问题,他们的研究促使人们对民族文化本质以及这些文化本质的不同对管理不同国家员工带来的影响有了更深刻的理解,这个研究量规被称作“比较管理”。这些学者把人类学文化框架扩展至商业应用领域,起到了开创性作用(Redding 1997;Schollhammer 1969)。

中英金融服务贸易国际竞争力比较研究【文献综述】

毕业论文文献综述 国际经济与贸易 中英金融服务贸易国际竞争力比较研究 金融服务贸易国际竞争力相关理论综述 服务贸易是以服务作为交易标的的一种贸易行为。《服务贸易总协定》(GATS)所界定的国际服务贸易是指以过境交付、境外消费、商业存在和自然人流动这四种形式进行的各国间的服务交易。该定义已成为有一定权威性和指导性的定义为各国接受。 根据《服务贸易总协定》中的服务部门清单,可以将服务贸易分为12类:商业性服务,销售服务,金融服务,娱乐服务,通讯服务,教育服务,卫生服务,运输服务,建筑服务,环境服务,旅游服务和其他服务。而对于金融服务贸易,国内外并没有确切的定义。本文将对金融服务贸易国外及国内有代表性的研究进行综述。 一、GATS与OECD对金融服务贸易的定义 根据GATS的定义,金融服务贸易是指由一成员国的金融服务提供者所提供的任何金融性质的服务。它包括两个部分:所有保险和保险相关的服务、银行和其他金融服务(保险除外),其中其他金融服务指证券和金融信息服务。 经济合作和发展组织(OECD)对金融服务贸易的定义为由金融机构提供服务的收入,或者接受付出的支持,包括得到的和付出的直接投资收益(未分配收益和利息);从其他金融投资得到的和付出的收益(得到的和付出的利息和红利);得到的、付出的手续费和佣金。 可见,经济合作和发展组织对金融服务贸易的界定强调了金融服务贸易交易的提供方,而忽略了金融服务贸易的消费方。金融服务贸易的发展主要是以此换取其他贸易领域的发展,而且金融服务贸易可以促进本国金融业与国际金融业的接轨,从而在国际竞争中促进本国金融业的发展。 二、国外对金融服务贸易相关研究 对于金融服务贸易研究,国外学者从不同角度出发,有不同的看法。 列为恩(1996)认为,各种金融服务可以实现五种基本功能:方便商品和劳务的交易;易于风险管理;加速资源流动;获取信息,评估企业和配置资本;提供公司法人治理。同时,更多的相关文献表示,金融中介可以降低由于信息不对称产生的管理成本(戴蒙德1984;威廉森1987)也可以对规模经济产生积极的效应。 莫施里安(Moshirian 1994)认为,金融服务贸易和制造业类似,一些基本要素赋予了

统计学中英文对照外文翻译文献

中英文对照翻译 (文档含英文原文和中文翻译) Policies for Development of Iron and Steel Industry The iron and steel industry is an important basic industry of the national economy, a supporting industry for realizing the industrialization and an intensive industry in technologies, capital, resources and energy, and its development requires a comprehensive balancing of all kinds of external conditions. China is a big developing country with a comparatively big demand of iron and steel in the economic development for a long time to go. China's production capacity of iron and steel has ranked the first place in the world for many years. However, there is a large gap in terms of the technological level and material consumption of the iron and steel industry compared with the international advanced level, so the focus of development for the future shall be put on technical upgrading and structural adjustment. In order to enhance the whole technical level of the iron and steel industry, promote the structural adjustment, improve the industrial layout, develop a recycling economy, lower the consumption of materials and energy, pay attention to the environmental protection, raise the comprehensive competitive capacity of enterprises, realize the industrial upgrading, and develop the iron and steel industry into an industry with

论文《人工智能》---文献检索结课作业

人工智能 【摘要】:人工智能是一门极富挑战性的科学,但也是一门边沿学科。它属于自然科学和社会科学的交叉。涉及的学科主要有哲学、认知科学、数学、神经生理学、心理学、计算机科学、信息论、控制论、不定性论、仿生学等。人工智能(Artificial Intelligence),英文缩写为AI。它是研究、开发用于模拟、延伸和扩展人的智能的理论、方法、技术及应用系统的一门新的技术科学。人工智能是计算机科学的一个分支,它企图了解智能的实质,并生产出一种新的能以人类智能相似的方式做出反应的智能机器,该领域的研究包括机器人、语言识别、图像识别、自然语言处理和专家系统等1。 【关键词】:人工智能;应用领域;发展方向;人工检索。 1.人工智能描述 人工智能(Artificial Intelligence) ,英文缩写为AI。它是研究、开发用于模拟、延伸和扩展人的智能的理论、方法、技术及应用系统的一门新的技术科学2。人工智能是计 算机科学的一个分支,它企图了解智 能的实质,并生产出一种新的能以人 类智能相似的方式作出反应的智能 机器,该领域的研究包括机器人、语 言识别、图像识别、自然语言处理和 专家系统等。“人工智能”一词最初 是在1956 年Dartmouth学会上提出 的。从那以后,研究者们发展了众多 理论和原理,人工智能的概念也随之扩展。人工智能是一门极富挑战性的科学,从事这项工作的人必须懂得计算机知识,心理学和哲学。人工智能是包括十分广泛的科学,它由不同的领域组成,如机器学习,计算机视觉等等,总的说来,人工智能研究的一个主要目标是使机器能够胜任一些通常需要人类智能才能完成的复杂工作。但不同的时代、不同的人对这种“复杂工作”的理解是不同的。例如繁重的科学和工程计算本来是要人脑来承担的,现在计算机不但能完成这种计算, 而且能够比人脑做得更快、更准确,因之当代人已不再把这种计算看作是“需要人类智能才能完成的复 1.蔡自兴,徐光祐.人工智能及其应用.北京:清华大学出版社,2010 2元慧·议当人工智能的应用领域与发展状态〖J〗.2008

差异化营销策略外文文献翻译

文献出处: Dalman, M. Deniz, and Junhong Min. "Marketing Strategy for Unusual Brand Differentiation: Trivial Attribute Effect." International Journal of Marketing Studies 6.5 (2014): 63-72. 原文 Marketing Strategy for Unusual Brand Differentiation: Trivial Attribute Effect Dalman, M. Deniz & Junhong Min Abstract This research investigates that brand differentiation creating superior values can be achieved not only by adding meaningful attributes but also meaningless attributes, which is called "trivial attribute effect." Two studies provided empirical evidences as following; first, trivial attribute effect creates a strong brand differentiation even after subjects realize that trivial attribute has no value. Second, trivial attribute effect is more pronounced in hedonic service category compared to the utilitarian category. Last, the amount of willingness to pay is higher when trivial attribute is presented and evaluated in joint evaluation mode than separate evaluation mode. Finally, we conclude with discussion and provide suggestions for further research. Keywords: brand differentiation, evaluation mode, service industry, trivial attribute Introduction Problem Definition Perhaps the most important factor for new product success is to create the meaningful brand differentiation that provides customers with superior values beyond what the competitors can offer in the same industry (Porter, 1985). Not surprisingly, more than 50 percent of annual sales in consumer product industries including automobiles, biotechnology, computer software, and pharmaceuticals are attributed to such meaningful brand differentiation by including new or noble attributes (Schilling &Hill, 1998). However, the brand differentiation that increases consumer preference is not only by introducing meaningful attributes but also meaningless attributes. For

相关文档
最新文档