当前位置:文档之家› GSM外文资料翻译

GSM外文资料翻译

GSM外文资料翻译
GSM外文资料翻译

外文资料

Batchu Spandana et al. / International Journal on Computer Science and Engineering (IJCSE) Security Management System for Oilfield Based on GSM

Technology

Batchu Spandana

M.Tech Student, Department of ECE

Sri Vasavi Engg College, Tadepalligudem

Addanki Purna Ramesh

Associate Professor, Department of ECE

Sri Vasavi Engg College, Tadepalliguem.

P.Gopala Reddy

Asst. Professor, Department of ECE

Sri Vasavi Engg College, Tadepalliguem

Abstract:Security Management at the industries mainly during the night times at the oil field is a critical task for the security people. Checking for the oil thefting, power failure, temperature range checking, tilt checking of the tanks, leakage of oil by rotating the pump done by the thieves is a critical task for the security people. improve the security level by implantation of wireless embedded technology will solve this problem. By reducing the manual power, at the site locations, and by improving the security level with the help of GSM based wireless technology which consist of transmitter (GSM modem) at the site location and receiver is the GSM mobile. Information transmitted by the GSM modem at the plant location will be sent to the respective person?s mobile as a text message. Th e security people will take appropriate action according to the problem. For this we are used LPC2148 (ARM7) based microcontroller, which is the current dominant microcontroller in mobile based products and Software development tools as Keil, flash magic for loading hex file into the microcontroller.

Keywords:LPC2148 (ARM7); Embedded …C?; Keil; Flash magic; SIM 300 GSM Mode

I. INTRODUCTION

GSM technology has been used worldwide for almost two decades. At the end of ?rst quarter of 2007 there were 2,278,095,380 GSM subscribers, which represent almost 80.5% of all mobile network subscribers (Wireless Intelligence Organization informa tion?s; Scourias, 1995). With rapid development of national and international economic construction, there is a great demand and

dependent on oil products ex: petroleum in various industries. The international price of oil has been kept at a high level in recent years, so improving production efficiency and wastage due to tilt, over flow occur in valves, to protect oil from thefting on domestic oilfield is urgently needed to be improved. For protect and save oil products for 24 hours need huge human power, even also the implementation of safe management for oilfield is very difficult. We overcome these difficulties, by implementing a perfect scheme using GSM Technology. This system can improve the level of oilfield? security.

GSM is the pan-European cellular mobile standard (Scourias, 1995). Three considered speech coding algorithms are part of this standard. The purpose of these coders is to compress the speech signal before its transmission, reducing the number of bits needed in its digital representation, while keeping an acceptable perceived quality of the decoded output speech signal. Spectrum ef?ciency of the GS M transmission system is increased through the use of DTX (Discontinuous Transmission), switching the transmitter on only during speech activity periods. V AD (V oice Activity Detection) is used to decide upon presence of active speech. To reduce the annoying modulation of the background noise at the receiver (noise contrast effects), CNG (Comfort Noise Generation) is used, inserting a coarse reconstruction of the background noise at the receiver (Scourias, 1995). Additionally, GSM incorporates also non-standard modules such as Echo Cancellation, Noise Reduction, Speech Preemphasis and Automatic Gain Control. As mentioned earlier, there exist three different GSM speech coders, which are referred to as the FR (full rate), HR (half rate) and EFR (enhanced full rate). Their corresponding European telecommunications standards are the GSM 06.10 (1996), GSM 06.20 (1998) and GSM 06.60 (1997). These coders work on a 13 bit uniform PCM speech input signal, sampled at 8 kHz. The input is processed on a frame-by-frame basis, with a frame size of 20 ms (160 samples).

II. SYSTEM STRUCTURE

The security management system for oil field based on GSM Technology design is divided in to two sub systems (1) Transmitting section and (2) Receiving section.

The transmitting system consists of (1) Sensor Unit, (2) LPC2148 (ARM7) Microcontroller, (3) SIM300 GSM Modem. Further the sensor unit is divided into five categories (a) TSOP1738 -IR transmitter and receiver as a tank over flow sensor (b) L7805 as a power failure indication unit (c) Limit switch as a Valve rotation unit (d) Mercury tilt switch as a Tilt sensor (e) LM-35Temperature sensor.

The receiving section consists of GSM based Mobiles. Fig.1shows the Block diagram of the security

management system for oil field based on GSM Technology.

Fig.1 Block diagram of security management system for oil field based on GSM Technology The TSOP1738 -IR transmitter and receiver, L7805, Limit switch, Mercury tilt switch, LM-35 modules are interfaced to I/O ports of the LPC2148 (ARM7) Microcontroller. The LPC 2148 controller continuously monitors the tank level, tilt of the valve, angle of the valve rotation. If any change of parameters occurs at the corresponding modules the controller turns on buzzer, displays the message on LCD display and at the same time the controller activates the GSM Modem and GSM Modem sends the message to the two authorized persons by using GSM based

wireless technology.

Fig.2 Main circuit board without chassis

Fig.3 Main circuit board with chassis

Fig.4 Ir transmitter and receiver

Fig.5 LCD displaying Tilt (Tilt occurred at the position of valve)

Fig.6 LCD displaying Theft

Fig.7 LCD displaying oil over flow

Fig.8 Schematic view

III ALGORITHM

Step1: The user has to initialize the microcontroller and GSM modem.

Step2: Microcontrollers continuously check the conditions one after the other.

Step3: First chek for the power failure condition. If yes send message to mobile as”

power failure”.

Step4: Same message will display on LCD and buzzer sound will also occur.

Step5: If the condition is no, go for the next condition

Step6: Check for the overflow. if the condition is yes send message to mobile as “overflow ” repeat the step4.if condition no repeat step5.

Step7: Check for the. V olve rotation if the condition is yes send message to mobile as “theft alert”. Repeat the step4.if condition no repeat step5.

Step8: Check for tilt. If the condition is yes send message to mobile as “tilt”. Repeat the step4.if condition no repeat step5.

Step9: Check for temperature. . if the condition is yes send temperature value to the mobile and buzzer sound will also occur.

Step10: This process repeats continuously

IV SYSTEM FLOW CHART

V CONCLUSION

The security management system for oilfield adopted GSM technology and Embedded System. It provides better security compared with human and free cost of maintenance. There is possibility for extending security for more parameters.

REFERENCES

[1] Cao Liting,”Distributed Security System for Intell igent Building Based On

Wireless Communication Network”, Proceedings of 2006 IEEE International Conference on Information Acquisition, Weihai, Shandong, China, 177-182

[2] Agranat I D,”Engineering web technologies for embedded applications”, IEEE

Internet Computing, vol.2no.3, 1998

[3] Yougjun Xu, Lingyi Liu, and Peifu Shen,”Low Power Processor Design Wireless

Sensor Network Application”, International Conference on Wireless Communication, Networking and Mobile(WCNM2005), Wuhan Chian, September 23-26,2005

[4] LIU Chong, and XIAO Nanfeng,”Design and implementation of home service

robot and home intelligent security control”, Information of Micro-computer, vol.22, no,pp.212-214,2006

[5] “The specification of chip”, Princeton Technology Corp. http://www. p rinceton.

Com. tw

中文翻译:

Batchu Spandana 等人/国际期刊计算机科学与工程(IJCSE)

基于GSM的油田安全管理技术

Batchu Spandana

M.Tech 学生, 欧洲经委会

斯瓦萨维工程学院, Tadepalligudem

Addanki Purna Ramesh

副教授, 教育部

Sri Vasavi Engg College, Tadepalliguem.

P.Gopala Reddy

副教授, 教育部

斯瓦萨维工程学院, Tadepalliguem

摘要:在工业上,油田夜间安全管理对于安全人员来说是一个关键性的任务。检查油的盗窃,断电,温度范围检查,检查机器的倾斜度,检查小偷通过旋转泵偷取泄露的原油对于安全人员是一个关键的任务。通过植入嵌入式无线技术提高安全水平,会解决这个问题。基于包含现场发射机()和GSM(移动通信模块)移动接收机的无线技术的GSM模块的帮助下提高安全的水平,减少在现场工作的人力。在现场的GSM模块以短信的形式把信息发送到用户的移动接收机上。安全人员能够根据问题采取适当的行动。因此我们选择LPC2148(ARM7)微控制器,这是当前移动产品中应用的主流的单片机微控制器,软件开发工具为Keil,将HEX十六进制程序下载到微控制器中。

关键词:LPC2148(ARM7);嵌入式C;Keil工具;Flash magic工具;SIM 300 GSM 模式

I介绍

GSM技术应用于世界各地大约二十年的时间了,截止到2007年的第一季

度的结束,大约有2278095380手机用户的数量,它代表了几乎80.5%的移动用户网路(无限情报组织信息,Scourias,1995)。随着国家和国际经济的快速发展,在各行各业中对石油产品有大量的需求和生产。在最近几年国际油价持续走高,因此提高生产效率和减少浪费,控制阀门对石油流动,在油田现场对被偷盗石油的保护方面的能力亟待提高。为了24小时保护和保存石油产品需要大量的人力,而且油田的安全管理人员履行起来非常困难。通过应用GSM技术的完美计划,我们解决了这个困难。这个系统能够提高油田的安全水平。GSM是泛欧蜂窝移动通信标准(Scourias,1995),3种被认为同的语音编码算法是这种标准的一部分。那些编码的目的是在传输之前压缩语音信号,减少在数字描述中的字节数,而且保持一种能接受的感知质量的解码输出语音信号。GSM传输系统的电磁波普通过应用DTX技术而得到提升,打开发射器仅在语音活动期间。语音活动检测被用来判断活跃的语音信号。为了减少接收机的噪音效果,应用CNG技术,插入接收机中一个粗糙的噪音。此外,该系统还采用非标准模块如回声消除,降噪,语音预加重和自动增益控制。如前面提到的,还存在三种不同的语音编码,它们被称FR(全速率),HR(半速率)和EFR(增强型全速率)。相应的欧洲电系标准是6.10(1995),6.20(1998)和6.60(1997).这些代码工作在13位的统一语音输入信号,取样在8KHz,输入处理在帧到帧的基础上,一帧大小为20毫秒。

Ⅱ系统结构

这种基于GSM技术的油田安全管理系统设计有两个子系统:(1)传输部分和(2)接收部分。

图.1 基于GSM技术的油田安全管理系统结构框图

传输部分由(1)传感器单元,(2)LPC2148(ARM7)微控制器,(3)SIM300调制解调器。进一步分,传感器单元由五个部分组成(a)TSOP1738 –IR红外发射接收器作为油槽的流量监测传感器,(b)L7805作为断电监测指示单元,(c)限制开关作为阀门转动装置,(d)泵倾斜开关作为倾斜传感器单元,(e)LM-35T作为温度传感器。

接收部分由以GSM为基础的移动接收机组成。图一所示的框图是基于GSM 技术的油田安全管理系统这种TSOP1738 –IR红外发射接收头,L7805,限制开关,泵倾斜开关,LM-35T模块连接到LPC2148 (ARM7)微控制器的I/O上。2148将不断地检测储罐液位,倾斜阀,角阀旋转。如果各个模块参数有任何改变传输到控制器中,控制器模块控制蜂鸣器并在LCD液晶上显示信息,同一时间控制器激活GSM调制解调器和调制解调器通过授权的无线技术发送信息。

图2 无底架的整体电路图

图.3 有底架的整体电路图

图.4 红外发射接收电路

图.5液晶显示泵的参数

图.6 液晶显示”Theft”

图.7 液晶显示流量溢流“overflow“

图.8 整体原理图

Ⅲ算法

第一步:用户初始化单片机和GSM调制解调器。

第二步:控制器连续一个一个扫描检测条件。

第三步:首先判断电源掉电条件,如果是就发送信息“POWER FAILURE”到手机上。

第四步:相同的信息在LCD液晶屏上显示,并且蜂鸣器持续响亮。

第五步:如果条件不满足,继续判断下一个条件

第六步:检测溢流。如果条件判断是发送信息“overflow”到手机。重复步骤四。

如果判断不是,重复步骤五。

第七步:检测阀旋钮,如果判断条件是发送信息“theft alert”到手机。重复步骤四。如果判断不是,重复步骤五。

第八步:检测倾斜。如果判断是发送信息“tilt”到手机。重复步骤四。如果判断不是,重复步骤五。

第九步:检测温度。如果判断条件是发送温度数信息到手机,并且蜂鸣器也会发声。

第十步:连续重复以上过程。

Ⅳ系统流程图

Ⅴ结论

油田的安全管理系统采用了GSM技术和嵌入式系统技术。与人相比更加的安全,并且是免费的维修成本。并且更有可能增加安全参数

参考文献

[1] Cao Liting,“Distributed Security System for Intelligent Building Based On Wireless Communication Network”, Proceedings of 2006 IEEE International Conference on Information Acquisition, Weihai, Shandong, China, 177-182

[2] Agranat I D, “Engineering web technologies for embedded applications”, IEEE Internet Computing, vol.2no.3, 1998

[3] Yougjun Xu, Lingyi Liu, and Peifu Shen,“Low Power Processor Design Wireless Sensor Network Application”, International Conference on Wireless Communication, Networking and Mobile(WCNM2005), Wuhan Chian, September 23-26,2005 [4] LIU Chong, and XIAO Nanfeng,“Design and implementation of home service robot and home intelligent security control”, Information of Micro-computer, vol.22, no,pp.212-214,2006

[5] “The specification of chip”, Princeton Technology Corp. http://www. princeton.

Com. tw

计算机专业外文文献及翻译

微软Visual Studio 1微软Visual Studio Visual Studio 是微软公司推出的开发环境,Visual Studio可以用来创建Windows平台下的Windows应用程序和网络应用程序,也可以用来创建网络服务、智能设备应用程序和Office 插件。Visual Studio是一个来自微软的集成开发环境IDE,它可以用来开发由微软视窗,视窗手机,Windows CE、.NET框架、.NET精简框架和微软的Silverlight支持的控制台和图形用户界面的应用程序以及Windows窗体应用程序,网站,Web应用程序和网络服务中的本地代码连同托管代码。 Visual Studio包含一个由智能感知和代码重构支持的代码编辑器。集成的调试工作既作为一个源代码级调试器又可以作为一台机器级调试器。其他内置工具包括一个窗体设计的GUI应用程序,网页设计师,类设计师,数据库架构设计师。它有几乎各个层面的插件增强功能,包括增加对支持源代码控制系统(如Subversion和Visual SourceSafe)并添加新的工具集设计和可视化编辑器,如特定于域的语言或用于其他方面的软件开发生命周期的工具(例如Team Foundation Server的客户端:团队资源管理器)。 Visual Studio支持不同的编程语言的服务方式的语言,它允许代码编辑器和调试器(在不同程度上)支持几乎所有的编程语言,提供了一个语言特定服务的存在。内置的语言中包括C/C + +中(通过Visual C++),https://www.doczj.com/doc/4c11017744.html,(通过Visual https://www.doczj.com/doc/4c11017744.html,),C#中(通过Visual C#)和F#(作为Visual Studio 2010),为支持其他语言,如M,Python,和Ruby等,可通过安装单独的语言服务。它也支持的 XML/XSLT,HTML/XHTML ,JavaScript和CSS.为特定用户提供服务的Visual Studio也是存在的:微软Visual Basic,Visual J#、Visual C#和Visual C++。 微软提供了“直通车”的Visual Studio 2010组件的Visual Basic和Visual C#和Visual C + +,和Visual Web Developer版本,不需任何费用。Visual Studio 2010、2008年和2005专业版,以及Visual Studio 2005的特定语言版本(Visual Basic、C++、C#、J#),通过微软的下载DreamSpark计划,对学生免费。 2架构 Visual Studio不支持任何编程语言,解决方案或工具本质。相反,它允许插入各种功能。特定的功能是作为一个VS压缩包的代码。安装时,这个功能可以从服务器得到。IDE提供三项服务:SVsSolution,它提供了能够列举的项目和解决方案; SVsUIShell,它提供了窗口和用户界面功能(包括标签,工具栏和工具窗口)和SVsShell,它处理VS压缩包的注册。此外,IDE还可以负责协调和服务之间实现通信。所有的编辑器,设计器,项目类型和其他工具都是VS压缩包存在。Visual Studio 使用COM访问VSPackage。在Visual Studio SDK中还包括了管理软件包框架(MPF),这是一套管理的允许在写的CLI兼容的语言的任何围绕COM的接口。然而,MPF并不提供所有的Visual Studio COM 功能。

外文翻译

Load and Ultimate Moment of Prestressed Concrete Action Under Overload-Cracking Load It has been shown that a variation in the external load acting on a prestressed beam results in a change in the location of the pressure line for beams in the elastic range.This is a fundamental principle of prestressed construction.In a normal prestressed beam,this shift in the location of the pressure line continues at a relatively uniform rate,as the external load is increased,to the point where cracks develop in the tension fiber.After the cracking load has been exceeded,the rate of movement in the pressure line decreases as additional load is applied,and a significant increase in the stress in the prestressing tendon and the resultant concrete force begins to take place.This change in the action of the internal moment continues until all movement of the pressure line ceases.The moment caused by loads that are applied thereafter is offset entirely by a corresponding and proportional change in the internal forces,just as in reinforced-concrete construction.This fact,that the load in the elastic range and the plastic range is carried by actions that are fundamentally different,is very significant and renders strength computations essential for all designs in order to ensure that adequate safety factors exist.This is true even though the stresses in the elastic range may conform to a recognized elastic design criterion. It should be noted that the load deflection curve is close to a straight line up to the cracking load and that the curve becomes progressively more curved as the load is increased above the cracking load.The curvature of the load-deflection curve for loads over the cracking load is due to the change in the basic internal resisting moment action that counteracts the applied loads,as described above,as well as to plastic strains that begin to take place in the steel and the concrete when stressed to high levels. In some structures it may be essential that the flexural members remain crack free even under significant overloads.This may be due to the structures’being exposed to exceptionally corrosive atmospheres during their useful life.In designing prestressed members to be used in special structures of this type,it may be necessary to compute the load that causes cracking of the tensile flange,in order to ensure that adequate safety against cracking is provided by the design.The computation of the moment that will cause cracking is also necessary to ensure compliance with some design criteria. Many tests have demonstrated that the load-deflection curves of prestressed beams are approximately linear up to and slightly in excess of the load that causes the first cracks in the tensile flange.(The linearity is a function of the rate at which the load is applied.)For this reason,normal elastic-design relationships can be used in computing the cracking load by simply determining the load that results in a net tensile stress in the tensile flange(prestress minus the effects of the applied loads)that is equal to the tensile strength of the concrete.It is customary to assume that the flexural tensile strength of the concrete is equal to the modulus of rupture of the

外文文献翻译——参考格式

广东工业大学华立学院 本科毕业设计(论文) 外文参考文献译文及原文 系部经济学部 专业经济学 年级 2007级 班级名称 07经济学6班 学号 16020706001 学生姓名张瑜琴 指导教师陈锶 2011 年05月

目录 1挑战:小额贷款中的进入和商业银行的长期承诺 (1) 2什么商业银行带给小额贷款和什么把他们留在外 (2) 3 商业银行的四个模型进入小额贷款之内 (4) 3.1内在的单位 (4) 3.2财务子公司 (5) 3.3策略的同盟 (5) 3.4服务公司模型 (6) 4 合法的形式和操作的结构比较 (8) 5 服务的个案研究公司模型:厄瓜多尔和Haiti5 (9)

1 挑战:小额贷款中的进入和商业银行的长期承诺 商业银行已经是逐渐重要的运动员在拉丁美洲中的小额贷款服务的发展2到小额贷款市场是小额贷款的好消息客户因为银行能提供他们一完整类型的财务的服务,包括信用,储蓄和以费用为基础的服务。整体而言,它也对小额贷款重要,因为与他们广泛的身体、财务的和人类。如果商业银行变成重的运动员在小额贷款,他们能提供非常强烈的竞争到传统的小额贷款机构。资源,银行能廉宜地发射而且扩张小额贷款服务rela tively。如果商业广告银行在小额贷款中成为严重的运动员,他们能提出非常强烈的竞争给传统的小额贷款机构。然而,小额贷款社区里面有知觉哪一商业银行进入进入小额贷款将会是短命或浅的。举例来说,有知觉哪一商业银行首先可能不搬进小额贷款因为时候建立小额贷款操作到一个有利润的水平超过银行的标准投资时间地平线。或,在进入小额贷款,银行之后可能移动在-上面藉由增加贷款数量销售取利润最大值-或者更坏的事,退出如果他们是不满意与小额贷款的收益性的水平。这些知觉已经被特性加燃料商业银行的情形进入小额贷款和后来的出口之内。在最极端的,一些开业者已经甚至宣布,”降低尺度死!”而且抛弃了与主意合作的商业银行。 在最 signific 看得到的地方,蚂蚁利益商业银行可能带给小额贷款,国际的ACCION 发展发射而且扩张的和一些商业银行的关系小额贷款操作。在这些情形的大部分方面, ACCION 和它的合伙人正在使用方法,已知的当做服务公司模型,表演早答应当做一个能工作的方法克服真正的。 商业银行的障碍进入和穿越建立长命的小额贷款操作一个商业银行 这论文描述如何服务公司模型、住址商业银行中的主要议题进入进小额贷款,监定成功建立的因素动作井小额贷款服务公司,和礼物结果和小额贷款的课servic e 公司用最长的经验,在海地和审判官席 del 的 SOGEBANK│ SOGESOL 初期结果指出那这服务公司模型表现一重要的突破在促成商业银行进入和留在小额贷款。在厄瓜多尔的 Pichincha│ CREDIFE。初期结果指出服务公司模型在促成商业广告中表现一次重要的突破银行进入而且留在小额贷款。

外文资料及其翻译

A Wavelet Based Approach for Fast Detection of Internal Fault in Power Transformers The power transformer is one of the most expensive elements of power system and its protection is an essential part of the overall system protection strategy. The differential protection provides the best protection for power transformer. Its operation principle is based on this point that the differential current during an internal fault is higher than normal condition. But, a large transient current (inrush current) can cause mal-operation of differential relays. Then, studies for the improvement of the transformer protection have focused on discrimination between internal short circuit faults and inrush currents in transformers. The magnetizing inrush current has a large second order harmonic component in comparison to internal faults. Therefore , some transformer protection systems are designed to halt operating during the inrush current by sensing this large second order harmonic. The second harmonic component in the magnetizing inrush currents tend to be relatively small in modern large power transformers because of improvements in the power transformer core materials. Also , it has been seen that the fault current can contain higher second order harmonics than the inrush current due to nonlinear fault resistance, CT saturation .the distributed capacitance in the transmission line, which transformer is connected to, or due to the use of extra high voltage underground cables. Various methods have been suggested for overcoming this protection system mal-operation. This paper presents a wavelet based method for discrimination among inrush current, internal short circuit ,external short circuit and energizing and it is not affected by CT saturation and it is able to detect internal faults while transformer energization. Unlike Artificial Neural Network and Fuzzy logic based algorithms. This approach is not system dependent. The operating time of the scheme is less than 10ms. The Daubechies mother wavelet is used with a sample rate of 5 kHz. Then , the differential currents of the three phases are decomposed into two details and only the second level will be considered by using db5 mother wavelet. Discrete Wavelet Transform The wavelet transform is a powerful tool to extract information from the non-stationary signals simultaneously in both time and frequency domains. The ability of the wavelet transform to focus on short time intervals for high-frequency components and long intervals for low-frequency components improves the analysis

1外文文献翻译原文及译文汇总

华北电力大学科技学院 毕业设计(论文)附件 外文文献翻译 学号:121912020115姓名:彭钰钊 所在系别:动力工程系专业班级:测控技术与仪器12K1指导教师:李冰 原文标题:Infrared Remote Control System Abstract 2016 年 4 月 19 日

红外遥控系统 摘要 红外数据通信技术是目前在世界范围内被广泛使用的一种无线连接技术,被众多的硬件和软件平台所支持。红外收发器产品具有成本低,小型化,传输速率快,点对点安全传输,不受电磁干扰等特点,可以实现信息在不同产品之间快速、方便、安全地交换与传送,在短距离无线传输方面拥有十分明显的优势。红外遥控收发系统的设计在具有很高的实用价值,目前红外收发器产品在可携式产品中的应用潜力很大。全世界约有1亿5千万台设备采用红外技术,在电子产品和工业设备、医疗设备等领域广泛使用。绝大多数笔记本电脑和手机都配置红外收发器接口。随着红外数据传输技术更加成熟、成本下降,红外收发器在短距离通讯领域必将得到更广泛的应用。 本系统的设计目的是用红外线作为传输媒质来传输用户的操作信息并由接收电路解调出原始信号,主要用到编码芯片和解码芯片对信号进行调制与解调,其中编码芯片用的是台湾生产的PT2262,解码芯片是PT2272。主要工作原理是:利用编码键盘可以为PT2262提供的输入信息,PT2262对输入的信息进行编码并加载到38KHZ的载波上并调制红外发射二极管并辐射到空间,然后再由接收系统接收到发射的信号并解调出原始信息,由PT2272对原信号进行解码以驱动相应的电路完成用户的操作要求。 关键字:红外线;编码;解码;LM386;红外收发器。 1 绪论

毕业设计外文翻译资料

外文出处: 《Exploiting Software How to Break Code》By Greg Hoglund, Gary McGraw Publisher : Addison Wesley Pub Date : February 17, 2004 ISBN : 0-201-78695-8 译文标题: JDBC接口技术 译文: JDBC是一种可用于执行SQL语句的JavaAPI(ApplicationProgrammingInterface应用程序设计接口)。它由一些Java语言编写的类和界面组成。JDBC为数据库应用开发人员、数据库前台工具开发人员提供了一种标准的应用程序设计接口,使开发人员可以用纯Java语言编写完整的数据库应用程序。 一、ODBC到JDBC的发展历程 说到JDBC,很容易让人联想到另一个十分熟悉的字眼“ODBC”。它们之间有没有联系呢?如果有,那么它们之间又是怎样的关系呢? ODBC是OpenDatabaseConnectivity的英文简写。它是一种用来在相关或不相关的数据库管理系统(DBMS)中存取数据的,用C语言实现的,标准应用程序数据接口。通过ODBCAPI,应用程序可以存取保存在多种不同数据库管理系统(DBMS)中的数据,而不论每个DBMS使用了何种数据存储格式和编程接口。 1.ODBC的结构模型 ODBC的结构包括四个主要部分:应用程序接口、驱动器管理器、数据库驱动器和数据源。应用程序接口:屏蔽不同的ODBC数据库驱动器之间函数调用的差别,为用户提供统一的SQL编程接口。 驱动器管理器:为应用程序装载数据库驱动器。 数据库驱动器:实现ODBC的函数调用,提供对特定数据源的SQL请求。如果需要,数据库驱动器将修改应用程序的请求,使得请求符合相关的DBMS所支持的文法。 数据源:由用户想要存取的数据以及与它相关的操作系统、DBMS和用于访问DBMS的网络平台组成。 虽然ODBC驱动器管理器的主要目的是加载数据库驱动器,以便ODBC函数调用,但是数据库驱动器本身也执行ODBC函数调用,并与数据库相互配合。因此当应用系统发出调用与数据源进行连接时,数据库驱动器能管理通信协议。当建立起与数据源的连接时,数据库驱动器便能处理应用系统向DBMS发出的请求,对分析或发自数据源的设计进行必要的翻译,并将结果返回给应用系统。 2.JDBC的诞生 自从Java语言于1995年5月正式公布以来,Java风靡全球。出现大量的用java语言编写的程序,其中也包括数据库应用程序。由于没有一个Java语言的API,编程人员不得不在Java程序中加入C语言的ODBC函数调用。这就使很多Java的优秀特性无法充分发挥,比如平台无关性、面向对象特性等。随着越来越多的编程人员对Java语言的日益喜爱,越来越多的公司在Java程序开发上投入的精力日益增加,对java语言接口的访问数据库的API 的要求越来越强烈。也由于ODBC的有其不足之处,比如它并不容易使用,没有面向对象的特性等等,SUN公司决定开发一Java语言为接口的数据库应用程序开发接口。在JDK1.x 版本中,JDBC只是一个可选部件,到了JDK1.1公布时,SQL类包(也就是JDBCAPI)

Web应用程序安全外文翻译参考文献

Web应用程序安全外文翻译参考文献(文档含中英文对照即英文原文和中文翻译) 原文: Basic Security Practices for Web Applications Even if you have limited experience with and knowledge of application security, there are basic measures that you should take to help protect your Web applications. The following sections in this topic provide minimum-security guidelines that apply to all Web applications.General Web Application Security Recommendations;Run Applications with Minimum Privileges ;Know Your Users; Guard Against Malicious User Input;Access Databases Securely;Create Safe Error Messages;Keep Sensitive Information Safely;Use Cookies Securely;Guard Against Denial-of-Service Threats. 1. General Web Application Security Recommendations

毕业设计外文资料翻译译文

附件1:外文资料翻译译文 包装对食品发展的影响 一个消费者对某个产品的第一印象来说包装是至关重要的,包括沟通的可取性,可接受性,健康饮食形象等。食品能够提供广泛的产品和包装组合,传达自己加工的形象感知给消费者,例如新鲜包装/准备,冷藏,冷冻,超高温无菌,消毒(灭菌),烘干产品。 食物的最重要的质量属性之一,是它的味道,其影响人类的感官知觉,即味觉和嗅觉。味道可以很大程度作退化的处理和/或扩展存储。其他质量属性,也可能受到影响,包括颜色,质地和营养成分。食品质量不仅取决于原材料,添加剂,加工和包装的方法,而且其预期的货架寿命(保质期)过程中遇到的分布和储存条件的质量。越来越多的竞争当中,食品生产商,零售商和供应商;和质量审核供应商有显着提高食品质量以及急剧增加包装食品的选择。这些改进也得益于严格的冷藏链中的温度控制和越来越挑剔的消费者。 保质期的一个定义是:在食品加工和包装组合下,在食品的容器和条件,在销售点分布在特定系统的时间能保持令人满意的食味品质。保质期,可以用来作为一个新鲜的概念,促进营销的工具。延期或保质期长的产品,还提供产品的使用时间,方便以及减少浪费食物的风险,消费者和/或零售商。包装产品的质量和保质期的主题是在第3章中详细讨论。 包装为消费者提供有关产品的重要信息,在许多情况下,使用的包装和/或产品,包括事实信息如重量,体积,配料,制造商的细节,营养价值,烹饪和开放的指示,除了法律准则的最小尺寸的文字和数字,有定义的各类产品。消费者寻求更详细的产品信息,同时,许多标签已经成为多语种。标签的可读性是为视障人士的问题,这很可能成为一个对越来越多的老年人口越来越重要的问题。 食物的选择和包装创新的一个主要驱动力是为了方便消费者的需求。这里有许多方便的现代包装所提供的属性,这些措施包括易于接入和开放,处置和处理,产品的知名度,再密封性能,微波加热性,延长保质期等。在英国和其他发达经济体显示出生率下降和快速增长的一个相对富裕的老人人口趋势,伴随着更加苛

外文文献及翻译

文献翻译 原文 Combining JSP and Servlets The technology of JSP and Servlet is the most important technology which use Java technology to exploit request of server, and it is also the standard which exploit business application .Java developers prefer to use it for a variety of reasons, one of which is already familiar with the Java language for the development of this technology are easy to learn Java to the other is "a preparation, run everywhere" to bring the concept of Web applications, To achieve a "one-prepared everywhere realized." And more importantly, if followed some of the principles of good design, it can be said of separating and content to create high-quality, reusable, easy to maintain and modify the application. For example, if the document in HTML embedded Java code too much (script), will lead the developed application is extremely complex, difficult to read, it is not easy reuse, but also for future maintenance and modification will also cause difficulties. In fact, CSDN the JSP / Servlet forum, can often see some questions, the code is very long, can logic is not very clear, a large number of HTML and Java code mixed together. This is the random development of the defects. Early dynamic pages mainly CGI (Common Gateway Interface, public Gateway Interface) technology, you can use different languages of the CGI programs, such as VB, C / C + + or Delphi, and so on. Though the technology of CGI is developed and powerful, because of difficulties in programming, and low efficiency, modify complex shortcomings, it is gradually being replaced by the trend. Of all the new technology, JSP / Servlet with more efficient and easy to program, more powerful, more secure and has a good portability, they have been many people believe that the future is the most dynamic site of the future development of technology. Similar to CGI, Servlet support request / response model. When a customer submit a request to the server, the server presented the request Servlet, Servlet responsible for handling requests and generate a response, and then gave the server, and then from the server sent to

引进外资外文翻译资料

河南科技学院新科学院 2013届本科毕业生论文(设计) 英文文献及翻译 Foreign capital inflows and welfare in an economy with imperfect competition 学生姓名:王艳杰 所在院系:经济系 所学专业:国际经济与贸易 导师姓名:侯黎杰 完成时间:2013年4月15日

Foreign capital inflows and welfare in an economy with imperfect competition Abstract:This paper examines the resource allocational and welfare effects of exogenous inflows of foreign capital in a general-equilibrium model with oligopolistic competition and unemployment. Although the welfare impact for the short run is ambiguous and dependent upon the strength of excess profits and scale economies relative to unemployment in manufacturing, in the long run additional inflows of foreign capital always improve national welfare with capital mobility. Hence, attracting foreign capital remains a sound policy for economies characterized by imperfect competition, scale economies,and regional unemployment. Keywords: International capital mobility; Imperfect competition; Welfare 1.Introduction The welfare effects of exogenous inflows of foreign capital in the presence of trade restrictions have been extensively studied. Brecher and Diaz Alejandro (1977) show that when imports are subject to tariffs, an introduction of fo reign capital inflows accentuates the tariff distortion and hence reduces national welfare if the import-competing sector is relatively capital-intensive. In contrast, Dei (1985) shows that when imports are restricted by quotas,foreign capital inflows in the presence of foreign-owned capital always improve welfare by depressing the rental and so lowering the payments to existing foreign-owned capital. Recently, Neary (1981), using a common framework for both tariffs and quotas, obtains more general results of foreign capital inflows; the welfare effect of such inflows depends crucially on whether foreign-owned capital exists initially in the home country. In addition, Khan (1982) and Grinols (1991) have examined the effects of foreign capital inflows for a generalized Harris-Todaro economy under tariff protection. Khan finds that the result by Brecher and Diaz Alejandro is still valid even in the presence of unemployment, whereas Grinols argues that increased foreign capital need not be detrimental to welfare if the opportunity costs of labor are sufficiently low. Noteworthy is that the models used by these authors are all based upon the premise of perfect competition along with constant returns-to-scale technology. Although perfect competition serves as a useful assumption in crystallizing theoretical insights, it nevertheless fails to depict many of the real-world phenomena. The real-world economy is characterized, to a large extent, by imperfect competition and economies of scale. The policy implications of imperfect competition and economies

大数据外文翻译参考文献综述

大数据外文翻译参考文献综述 (文档含中英文对照即英文原文和中文翻译) 原文: Data Mining and Data Publishing Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with the data modified to mask sensitive information. The key issues were how to modify the data and how to recover the data mining result from the modified data. Privacy-preserving data mining considers the problem of running data mining algorithms on confidential data that is not supposed to be revealed even to the party

running the algorithm. In contrast, privacy-preserving data publishing (PPDP) may not necessarily be tied to a specific data mining task, and the data mining task may be unknown at the time of data publishing. PPDP studies how to transform raw data into a version that is immunized against privacy attacks but that still supports effective data mining tasks. Privacy-preserving for both data mining (PPDM) and data publishing (PPDP) has become increasingly popular because it allows sharing of privacy sensitive data for analysis purposes. One well studied approach is the k-anonymity model [1] which in turn led to other models such as confidence bounding, l-diversity, t-closeness, (α,k)-anonymity, etc. In particular, all known mechanisms try to minimize information loss and such an attempt provides a loophole for attacks. The aim of this paper is to present a survey for most of the common attacks techniques for anonymization-based PPDM & PPDP and explain their effects on Data Privacy. Although data mining is potentially useful, many data holders are reluctant to provide their data for data mining for the fear of violating individual privacy. In recent years, study has been made to ensure that the sensitive information of individuals cannot be identified easily. Anonymity Models, k-anonymization techniques have been the focus of intense research in the last few years. In order to ensure anonymization of data while at the same time minimizing the information

相关主题
文本预览
相关文档 最新文档