当前位置:文档之家› 毕业论文文献翻译-如何防范网络金融风险文献翻译-中英文论文对照翻译

毕业论文文献翻译-如何防范网络金融风险文献翻译-中英文论文对照翻译

毕业论文文献翻译-如何防范网络金融风险文献翻译-中英文论文对照翻译
毕业论文文献翻译-如何防范网络金融风险文献翻译-中英文论文对照翻译

如何防范网络金融风险

Kristian Behrens

This article is an excerpt from the "Journal of Economic Geography, "

November 2009 2

First, the definition of network finance How to guard against financial risks network

Network Finance is a computer network for the technical

support of the financial activities and related activities in

general, is a network of information technology and product of the combination of modern finance, but it is not a simple combination of the two, but a financial industry and even all

industries An operating mechanism, is the future of enterprise system development. Narrowly understood, refers to the financial network of financial service providers based on the

host to the Internet or communications network for the media,

through the financial data and business processes embedded

software platform, user interface terminal mode of operation

of the new financial ; from a broad understanding of the concept of network finance their mode of operation also includes matching network of financial institutions, networks and

related financial markets, regulatory and other external environment. Including: e-money, online banking, online payment, network security and network insurance. Second, the network of financial risk

Network mainly engaged in the financial settlement of electronic money a nd electronic virtual financial services, in addition to traditional financial activities which exist in the process of credit risk, liquidity risk, interest rate risk,

currency risk and market risk, from a technical, business and

legal perspective, There are the following specific risks:

1. Technology risk

(1) hacker attacks. The operation of the network must rely on financial transactions, computer and Internet, all transactions are stored in the computer, the transmission of

online information is easy to become a large network of "hacker" attack. In addition, Web a ccess is a form of Internet service, is also a network of financial institutions trading and services platform, but it depends on TCP / IP protocol, there

are many security vulnerabilities. This gives hackers broke

into financial institutions through the network to create the

conditions for the system. Hackers only need to use loopholes

in the system itself, "only need to modify a few settings " you can allow financial institutions to a standstill.

(2) technology selection risk. To carry out financial business networks, they must choose a proven technology solutions to support. Once there is choice, there will be aresult of selection for the same m istakes which led to the risk. One possibility is to choose the technology system and client

terminal software compatibility due to poor speed of information transmission interruption or reduction, another

risk is that of technical alternatives have been eliminated,

resulting in relatively backward technology, the network out

of date, leading to enormous technical and Loss of business opportunities. Financial terms of the network, technology choice may l ose all of the market failure, or even lose the basis for survival.

2. Business risks.

(1) operational risk. Operational risk from the system

reliability, stability and security caused major defects in the possibility of potential loss may come from the negligence of

online financial customers, may also come from the financial

security system network and its products, design flaws and operational errors . Operational risk relates primarily to

authorize the use of online financial accounts, the network of financial risk management systems, networks, financial institutions and the exchange of information among customers, true and false recognition of electronic money.

(2) the risk of market signals. Market risk is due to signal asymmetric information network of financial institutions led

to the face of adverse selection and moral hazard arising from business risks. Such as Internet banking customers can not

identify the risk level of the Internet at a disadvantage,

online customers may use their hidden information and action

to make the network to their advantage at the expense of the

interests of the decision-making banks and leaving because of adverse public comment on Internet Banking Risk of losing customers and sources of funding risks.

(3) credit risk. Reputation risk is the network of financial institutions can not create good customer relations, can not establish their own good reputation, and thus can not

engage in financial business. Once the virtual network of financial institutions to provide financial services can not

achieve the expected level of the public, or adverse reactions in the community, or network security system of financial

institutions have been destroyed to form a network of financial credit risk.

3. Legal risks. The legal risks of financial networks,

mainly from two aspects: First, violation of relevant laws,

regulations and system requirements, and online transactions

failed to comply with the provisions of the relevant rights and obligations. These laws and regulations, including consumer protection laws, financial disclosure system, privacy protection, intellectual property protection law and currency system. Second, the lack of network financial law. China Internet Finance still in its infancy, isstill quite a lack of appropriate laws and regulations. Therefore, using the Internet to provide or receive financial services, signed an

economic contract rights and obligations in the face considerable legal risk, vulnerable to undue disputes, not only increase the cost of online financial transactions, and even

affect the Development of the financial health of the network.

Third, improve the network to prevent and control financial risks

Point of the network of financial risks, involving a wide

range of interests, it is necessary to perfect legal environment, strengthening access management, a sound

regulatory system, adjust the regulatory strategy and other

aspects, a multi-pronged, comprehensive treatment.

1. Improve the legal system.

(1) legislative efforts to increase the network of financial, clear the network of financial rights and obligations of relevant subjects.

(2) to develop rules of fair trade network. In the identification and validation of digital signatures, transactions preservation of evidence, the transaction and

both parties share responsibility for the protection of personal information of consumers to make d etailed provisions to ensure transaction security, digital evidence when d isputes arise and transactions in a real and effective personal Privacy.

2. Enhanced market access management.

(1) The status of the technology infrastructure as one of

the conditions of market access. Financial services applications for operating the network of financial institutions not only a considerable scale of network equipment, but also need to have confirmed the legality of trading partners, to prevent tampering with trading information and prevent information leakage and other aspects of key technologies.

(2) to develop rigorous internal control system. Publicity for the network of financial services, information disclosure, and system design have institutional arrangements, the establishment of a network of financial institutions or a new business, the must have sound risk identification, identification, management, risk cover and disposal programs.

(3) to develop and improve the types of transactions operating procedures. Applications to open accounts for customers, customer authorization statement, the general development of trading procedures, rules to prevent illegal

trading and online financial transaction system against criminal activities.

(4) the implementation of the network type of financial

business management. Development of classification standards, banking and financial services capabilities and the ability to credit rating, thus a variety of services on the network to

carry out the financial restrictions and permits.

3. Improve the regulatory system.

(1) improve the network of financial risk monitoring systems. The establishment of "national (network) Financial

Risk Management Committee."

(2) to strengthen collaborative supervision. "Committee"

of the member units and other relevant regulatory authorities

to share information resources among e ach other and opening up their own i nformation database, and regularly informed of their supervision, promote joint supervision, supervision of financial risks to improve network accuracy and timeliness.

(3) to strengthen international cooperation in financial

supervision network. Meanwhile, the network with international cooperation in financial supervision to strengthen the network of bank borrowing way illegal tax evasion, money l aundering and other acts, the way the use of Internet banking transnational smuggling, illegal arms trafficking activities such as arms and drug trafficking, illegal attack on the use of Internet banking other sites internet bank hackers, and other international

criminal activities a full range of monitoring, the formation

of the network can effectively protect the financial health of the global network operations and is responsible for the supervision of the financial system.

4. Adjust the control strategy.

(1) and improve the modernization level of financial supervision network. In the practice, we should have complete

control of the network of financial institutions to improve the

business operation of the network capacity and the forecast

level of financial risk, and enhance macro-control of the systematic and forward-looking, but also to strengthen financial supervision and standardization of network construction, improve the network of financial supervision

modern and scientific level.

(2) improve the network of financial and non-site inspection of the site content system. On-site inspection should focus on the technical elements to be checked.

(3) the establishment of mandatory information disclosure system. Follow the "open, fair and just" principle, development of financial services than the traditional more stringent information disclosure rules, norms, disclosure of the content, format, frequency and responsibilities and so on, through the

financial statements, disclosureof the online publicity and

other means of financial networks business information.

(4) Innovative forms of regulation. Take full advantage of information superiority, the establishment of real-time tracking and monitoring systems, strengthen monitoring, while also taking on the network "rules, patrol checks," the way the operational status of the network and whether the financial

"irregularities" carry out spot checks found that, in a timely manner to correct or take punitive measures.

5. Building security system.

(1) accelerate research and development with China's own intellectual property rights of advanced information technology. Including computer equipment, communications equipment, system software, encryption algorithms, from the protection of national financial security and national economic security perspective to improve network security.

(2) improving the network operating environment. Computer networks and centers to strengthen the management of the engine room, increase physical security measures for computer input, and enhance computer systems of key technologies and key equipment against attacks, anti-virus capabilities, maintenance of computer hardware security, ensure network banks rely on network hardware The normal operation of the environment safe.

(3) secure access. On the one hand through the network of physical and logical isolation means isolation, and physical

resources to unauthorized users isolated from each other, on

the other hand through the application of the authentication

and grading systems such as login authorization to restrict

access to unauthorized users.

References:

[1] Kun-Li Wen. A Matlab Toolbox for Grey Clustering and FuzzyComprehensive Evaluation[J] .Advances in Engineering Soft-ware, 2008, 39 (1) :137-145 .

[2] Narendra K S, Parthasarathy K. Identification and control of dynamical systems using neural networks .IEEE Transactions on Neural Networks, 1999, 1

(1) :4-27 .

[3] Arnold F Shapiro. The merging of neural networks, fuzzy logic, and genetic algorithms .Insurance: Mathematics and Economics, 2002, 31 (1) :115-131 .

[4] Ghiassi M, Saidane H, Zimbra D K. A dynamic artificial neural network model for forecasting time series events .International Journal of Forecasting, 2005, 21(2) :341-362 .

[5] Shintani M,Linton O. Nonparametric Neural Network Estimationof Lyapunov Exponents and a Direct Test for Chaos[J] .Journal ofEconometrics, 2004, 120 (1) :1-33 .

[6] Eric Fenmore. Making Purchase-Order Financing Work for You .The Secured lender, 2004, 60 (2) :20-24 .

[7] Internet Banking and Technology Risk Management Guidelines,Version3.0 .Monetary Authority of Singapore, .

如何防范网络金融风险

克里斯蒂安贝伦斯教授

本文是摘自于《经济地理杂志》中的一篇文章

2009年11月第2期

一、网络金融的定义

网络金融是对以电脑网络为技术支撑的金融活动和相关活动的

总称,是网络信息技术与现代金融相结合的产物,但它并不是二者的

简单结合,而是一种金融业乃至所有行业的一种运行机制,是未来

企业机制发展的方向。从狭义上理解,网络金融是指以金融服务提供

者的主机为基础,以因特网或者通信网络为媒介,通过内嵌金融数据和业务流程的软件平台,以用户终端为操作界面的新型金融运作模式;从广义上理解,网络金融的概念还包括与其运作模式相配套的网

络金融机构、网络金融市场以及相关的、监管等外部环境。包括:

电子货币、网络银行、网上支付、网络证券及网络保险等。

二、网络金融的风险

网络金融主要经营电子货币和电子结算等虚拟金融业务,因而除了具有传统金融活动过程中存在的信用风险、流动性风险、利率风险、汇率风险和市场风险外,从技术、业务和法律角度分析,还存在以下

特定风险:

1.技术风险

(1)黑客攻击。网络金融交易的运行必须依靠计算机和因特网,所有交易资料都在计算机中存储,网上信息的传递很容易成为众多网络“黑客”的攻击目标。另外, Web访问是Internet服务形式的一种,也是网络金融机构提供交易和服务的平台,然而它所依赖的

TCP/IP协议中存在很多安全漏洞。这就给黑客通过网络闯入金融机构的系统创造了条件。黑客只需要利用系统中本身存在的漏洞,“只需要修改几个设置”就可能让金融机构瘫痪。

(2)技术选择风险。要想开展网络金融业务,就必须选择一种

成熟的技术解决方案来支撑。而一旦存在选择,就同样会存在因选择失误而导致的风险。一种可能是选择的技术系统与客户终端软件的

兼容性差导致的信息传输中断或速度降低,另一种风险就是选择的技术方案已经被淘汰,造成技术相对落后、网络过时,导致巨大的技术和商业机会的损失。对网络金融而言,技术选择失误可能失去全部的市场,甚至失去生存的基础。

2.业务风险。

(1)操作风险。操作风险来源于系统可靠性、稳定性和安全性

的重大缺陷而导致潜在损失的可能性,可能来自网络金融客户的疏

忽,也可能来自网络金融安全系统和其产品的设计缺陷及操作失误。

操作风险主要涉及网络金融账户的授权使用、网络金融的风险管理系统、网络金融机构和客户间的信息交流、真假电子货币识别等。

(2)市场信号风险。市场信号风险是指由于信息非对称导致网

络金融机构面临不利选择和道德风险而引发的业务风险。如由于网络银行无法在网上鉴别客户的风险水平而处于不利地位,网上客户可能利用他们的隐蔽信息和行动做出对自己有利但损害网络银行利益

的决策,以及由于不利的公众评价而使网络银行面临丧失客户和资金来源的风险等。

(3)信誉风险。信誉风险是指网络金融机构无法建立良好的客

户关系,不能树立自身的良好信誉,从而无法从事金融业务。一旦网

络金融机构提供的虚拟金融服务不能达到公众所预期的水平,或者在社会上产生不良反应,或者网络金融机构的安全系统曾经遭到破

坏,就形成了网络金融的信誉风险。

3.法律风险。网络金融的法律风险主要来自两个方面:一是违

反相关法律、规章和制度规定,以及在网上交易中没有遵守有关权利义务的规定。这些法律和规章制度包括消费者权益保护法、财务披露制度、隐私保护法、知识产权保护法和货币发行制度等。二是网络

金融法律的缺乏。中国网络金融还处于起步阶段,相应的法规还相当缺乏。因此,利用网络提供或接受金融服务,签定经济合同在有关

权利与义务等方面面临相当大的法律风险,容易陷入不应有的纠纷之中,不仅增加了网络金融的交易费用,甚至还影响网络金融的健康

发展。

三、完善对网络金融风险的防范和监管

网络金融面临的风险点多、涉及的利益面广,有必要从完善法制环境、加强准入管理、健全监管体制、调整监管策略等方面入手,多

管齐下,综合治理。

1.健全法律制度。

(1)加大网络金融的立法力度,明晰网络金融各相关主体的权

利义务。

(2)制定网络公平交易规则。在数字签名的识别和确认、交易

证据的保存、交易双方当事人责任的分担以及消费者个人信息的保护方面做出详细规定,以保证交易安全、出现纠纷时数字证据的真实有效和交易中的个人隐私。

2.加强市场准入管理。

(1)将技术设施状况作为市场准入的条件之一。申请开办网络

金融业务的金融机构不仅要有相当规模的网络设备,而且还需要有确认交易对象的合法性、防止篡改交易信息以及防止信息泄露等方面的关键技术。

(2)制定严密的内控制度。对网络金融业务的公示、信息披露

和系统设计等要有制度性安排,对网络金融机构的设立或新业务的开展,必须具备完善的风险识别、鉴定、管理、风险弥补和处置方案。

(3)制定、完善各类交易操作规程。对客户申请开立账户、客

户授权的声明、一般交易程序等拟定细则,防止违法交易和侵害网络金融交易系统的违法犯罪活动。

(4)对网络金融业务实行类别管理。制定分类标准,对银行金

融业务能力和资信能力进行分级,从而对网络金融各种业务的开展加以限制和许可。

3.完善监管体制。

(1)健全网络金融风险监管体系。成立“国家(网络)金融风险管理委员会”。

(2)加强协同监管。“委员会”各成员单位和其他相关监管部

门之间实现信息资源共享,相互开放各自的信息资料库,并定期通报各自的监管情况,促进联动监管,提高网络金融风险监管的准确性和时效性。

(3)加强国际间的网络金融监管合作。同时,借助国际间的网

络金融监管合作,加强对借用网络银行方式进行非法避税、洗钱等行为,对利用网络银行方式进行跨国走私、非法贩卖军火武器及贩卖毒品等活动,对利用网络银行非法攻击其他国家网络银行的电脑黑客

网站,以及其他国际犯罪活动进行全方位的监管,形成能有力保障中国网络金融健康运行和对全球网络金融负责的监管体系。

4.调整监管策略。

(1)不断提升网络金融监管的现代化水平。在监管实践中,应

提高全面掌握网络金融机构业务经营情况的能力和对网络金融风险

的预测水平,增强宏观控制的系统性和前瞻性,还要加强网络金融监管规范化建设,提高网络金融监管的现代化、科学化水平。

(2)完善对网络金融的现场和非现场检查内容体系。在现场检

查中要着重对技术要素进行检查。

(3)建立强制信息披露制度。遵循“公开、公平、公正”的原则,制定比传统金融业务更为严格的信息披露规则,规范信息披露的内容、格式、频度及职责等,通过财务报表、网上公示等手段披露有

关网络金融业务的信息。

(4)创新监管方式。充分利用网络信息优势,建立实时跟踪监

测系统,加强监控,同时还可以在网络上采取“制定规则,巡逻抽查”的方式,对网络金融的运行状况及是否“违规”进行抽查,一旦发现,及时纠正或采取处罚措施。

5.构建安全体系。

(1)加快研制和开发具有中国自主知识产权的先进信息技术。

包括各种计算机设备、通讯设备、系统软件、加密算法等,从保护国

家金融安全和国家经济安全的角度提高网络安全性能。

(2)改进网络运行环境。加强计算机网络和中心机房的管理,

加大对计算机物理安全措施的投入,增强计算机系统的关键技术和关键设备的防攻击、防病毒能力,维护计算机硬件安全,保证网络银行

所依赖的网络等硬件环境能够安全正常运转。

(3)实现安全访问。一方面通过网络的物理隔离和逻辑隔离方式,将非法用户与物理资源相互隔离,另一方面通过应用系统的身份验证和分级授权等登录方式,限制非法用户的访问。

参考文献:

毕业设计外文翻译附原文

外文翻译 专业机械设计制造及其自动化学生姓名刘链柱 班级机制111 学号1110101102 指导教师葛友华

外文资料名称: Design and performance evaluation of vacuum cleaners using cyclone technology 外文资料出处:Korean J. Chem. Eng., 23(6), (用外文写) 925-930 (2006) 附件: 1.外文资料翻译译文 2.外文原文

应用旋风技术真空吸尘器的设计和性能介绍 吉尔泰金,洪城铱昌,宰瑾李, 刘链柱译 摘要:旋风型分离器技术用于真空吸尘器 - 轴向进流旋风和切向进气道流旋风有效地收集粉尘和降低压力降已被实验研究。优化设计等因素作为集尘效率,压降,并切成尺寸被粒度对应于分级收集的50%的效率进行了研究。颗粒切成大小降低入口面积,体直径,减小涡取景器直径的旋风。切向入口的双流量气旋具有良好的性能考虑的350毫米汞柱的低压降和为1.5μm的质量中位直径在1米3的流量的截止尺寸。一使用切向入口的双流量旋风吸尘器示出了势是一种有效的方法,用于收集在家庭中产生的粉尘。 摘要及关键词:吸尘器; 粉尘; 旋风分离器 引言 我们这个时代的很大一部分都花在了房子,工作场所,或其他建筑,因此,室内空间应该是既舒适情绪和卫生。但室内空气中含有超过室外空气因气密性的二次污染物,毒物,食品气味。这是通过使用产生在建筑中的新材料和设备。真空吸尘器为代表的家电去除有害物质从地板到地毯所用的商用真空吸尘器房子由纸过滤,预过滤器和排气过滤器通过洁净的空气排放到大气中。虽然真空吸尘器是方便在使用中,吸入压力下降说唱空转成比例地清洗的时间,以及纸过滤器也应定期更换,由于压力下降,气味和细菌通过纸过滤器内的残留粉尘。 图1示出了大气气溶胶的粒度分布通常是双峰形,在粗颗粒(>2.0微米)模式为主要的外部来源,如风吹尘,海盐喷雾,火山,从工厂直接排放和车辆废气排放,以及那些在细颗粒模式包括燃烧或光化学反应。表1显示模式,典型的大气航空的直径和质量浓度溶胶被许多研究者测量。精细模式在0.18?0.36 在5.7到25微米尺寸范围微米尺寸范围。质量浓度为2?205微克,可直接在大气气溶胶和 3.85至36.3μg/m3柴油气溶胶。

毕业论文外文翻译模版

吉林化工学院理学院 毕业论文外文翻译English Title(Times New Roman ,三号) 学生学号:08810219 学生姓名:袁庚文 专业班级:信息与计算科学0802 指导教师:赵瑛 职称副教授 起止日期:2012.2.27~2012.3.14 吉林化工学院 Jilin Institute of Chemical Technology

1 外文翻译的基本内容 应选择与本课题密切相关的外文文献(学术期刊网上的),译成中文,与原文装订在一起并独立成册。在毕业答辩前,同论文一起上交。译文字数不应少于3000个汉字。 2 书写规范 2.1 外文翻译的正文格式 正文版心设置为:上边距:3.5厘米,下边距:2.5厘米,左边距:3.5厘米,右边距:2厘米,页眉:2.5厘米,页脚:2厘米。 中文部分正文选用模板中的样式所定义的“正文”,每段落首行缩进2字;或者手动设置成每段落首行缩进2字,字体:宋体,字号:小四,行距:多倍行距1.3,间距:前段、后段均为0行。 这部分工作模板中已经自动设置为缺省值。 2.2标题格式 特别注意:各级标题的具体形式可参照外文原文确定。 1.第一级标题(如:第1章绪论)选用模板中的样式所定义的“标题1”,居左;或者手动设置成字体:黑体,居左,字号:三号,1.5倍行距,段后11磅,段前为11磅。 2.第二级标题(如:1.2 摘要与关键词)选用模板中的样式所定义的“标题2”,居左;或者手动设置成字体:黑体,居左,字号:四号,1.5倍行距,段后为0,段前0.5行。 3.第三级标题(如:1.2.1 摘要)选用模板中的样式所定义的“标题3”,居左;或者手动设置成字体:黑体,居左,字号:小四,1.5倍行距,段后为0,段前0.5行。 标题和后面文字之间空一格(半角)。 3 图表及公式等的格式说明 图表、公式、参考文献等的格式详见《吉林化工学院本科学生毕业设计说明书(论文)撰写规范及标准模版》中相关的说明。

毕业论文英文参考文献与译文

Inventory management Inventory Control On the so-called "inventory control", many people will interpret it as a "storage management", which is actually a big distortion. The traditional narrow view, mainly for warehouse inventory control of materials for inventory, data processing, storage, distribution, etc., through the implementation of anti-corrosion, temperature and humidity control means, to make the custody of the physical inventory to maintain optimum purposes. This is just a form of inventory control, or can be defined as the physical inventory control. How, then, from a broad perspective to understand inventory control? Inventory control should be related to the company's financial and operational objectives, in particular operating cash flow by optimizing the entire demand and supply chain management processes (DSCM), a reasonable set of ERP control strategy, and supported by appropriate information processing tools, tools to achieved in ensuring the timely delivery of the premise, as far as possible to reduce inventory levels, reducing inventory and obsolescence, the risk of devaluation. In this sense, the physical inventory control to achieve financial goals is just a means to control the entire inventory or just a necessary part; from the perspective of organizational functions, physical inventory control, warehouse management is mainly the responsibility of The broad inventory control is the demand and supply chain management, and the whole company's responsibility. Why until now many people's understanding of inventory control, limited physical inventory control? The following two reasons can not be ignored: First, our enterprises do not attach importance to inventory control. Especially those who benefit relatively good business, as long as there is money on the few people to consider the problem of inventory turnover. Inventory control is simply interpreted as warehouse management, unless the time to spend money, it may have been to see the inventory problem, and see the results are often very simple procurement to buy more, or did not do warehouse departments . Second, ERP misleading. Invoicing software is simple audacity to call it ERP, companies on their so-called ERP can reduce the number of inventory, inventory control, seems to rely on their small software can get. Even as SAP, BAAN ERP world, the field of

java毕业论文外文文献翻译

Advantages of Managed Code Microsoft intermediate language shares with Java byte code the idea that it is a low-level language witha simple syntax , which can be very quickly translated intonative machine code. Having this well-defined universal syntax for code has significant advantages. Platform independence First, it means that the same file containing byte code instructions can be placed on any platform; atruntime the final stage of compilation can then be easily accomplished so that the code will run on thatparticular platform. In other words, by compiling to IL we obtain platform independence for .NET, inmuch the same way as compiling to Java byte code gives Java platform independence. Performance improvement IL is actually a bit more ambitious than Java bytecode. IL is always Just-In-Time compiled (known as JIT), whereas Java byte code was ofteninterpreted. One of the disadvantages of Java was that, on execution, the process of translating from Javabyte code to native executable resulted in a loss of performance. Instead of compiling the entire application in one go (which could lead to a slow start-up time), the JITcompiler simply compiles each portion of code as it is called (just-in-time). When code has been compiled.once, the resultant native executable is stored until the application exits, so that it does not need to berecompiled the next time that portion of code is run. Microsoft argues that this process is more efficientthan compiling the entire application code at the start, because of the likelihood that large portions of anyapplication code will not actually be executed in any given run. Using the JIT compiler, such code willnever be compiled.

毕业论文外文翻译模板

农村社会养老保险的现状、问题与对策研究社会保障对国家安定和经济发展具有重要作用,“城乡二元经济”现象日益凸现,农村社会保障问题客观上成为社会保障体系中极为重要的部分。建立和完善农村社会保障制度关系到农村乃至整个社会的经济发展,并且对我国和谐社会的构建至关重要。我国农村社会保障制度尚不完善,因此有必要加强对农村独立社会保障制度的构建,尤其对农村养老制度的改革,建立健全我国社会保障体系。从户籍制度上看,我国居民养老问题可分为城市居民养老和农村居民养老两部分。对于城市居民我国政府已有比较充足的政策与资金投人,使他们在物质和精神方面都能得到较好地照顾,基本实现了社会化养老。而农村居民的养老问题却日益突出,成为摆在我国政府面前的一个紧迫而又棘手的问题。 一、我国农村社会养老保险的现状 关于农村养老,许多地区还没有建立农村社会养老体系,已建立的地区也存在很多缺陷,运行中出现了很多问题,所以完善农村社会养老保险体系的必要性与紧迫性日益体现出来。 (一)人口老龄化加快 随着城市化步伐的加快和农村劳动力的输出,越来越多的农村青壮年人口进入城市,年龄结构出现“两头大,中间小”的局面。中国农村进入老龄社会的步伐日渐加快。第五次人口普查显示:中国65岁以上的人中农村为5938万,占老龄总人口的67.4%.在这种严峻的现实面前,农村社会养老保险的徘徊显得极其不协调。 (二)农村社会养老保险覆盖面太小 中国拥有世界上数量最多的老年人口,且大多在农村。据统计,未纳入社会保障的农村人口还很多,截止2000年底,全国7400多万农村居民参加了保险,占全部农村居民的11.18%,占成年农村居民的11.59%.另外,据国家统计局统计,我国进城务工者已从改革开放之初的不到200万人增加到2003年的1.14亿人。而基本方案中没有体现出对留在农村的农民和进城务工的农民给予区别对待。进城务工的农民既没被纳入到农村养老保险体系中,也没被纳入到城市养老保险体系中,处于法律保护的空白地带。所以很有必要考虑这个特殊群体的养老保险问题。

毕业论文 外文翻译#(精选.)

毕业论文(设计)外文翻译 题目:中国上市公司偏好股权融资:非制度性因素 系部名称:经济管理系专业班级:会计082班 学生姓名:任民学号: 200880444228 指导教师:冯银波教师职称:讲师 年月日

译文: 中国上市公司偏好股权融资:非制度性因素 国际商业管理杂志 2009.10 摘要:本文把重点集中于中国上市公司的融资活动,运用西方融资理论,从非制度性因素方面,如融资成本、企业资产类型和质量、盈利能力、行业因素、股权结构因素、财务管理水平和社会文化,分析了中国上市公司倾向于股权融资的原因,并得出结论,股权融资偏好是上市公司根据中国融资环境的一种合理的选择。最后,针对公司的股权融资偏好提出了一些简明的建议。 关键词:股权融资,非制度性因素,融资成本 一、前言 中国上市公司偏好于股权融资,根据中国证券报的数据显示,1997年上市公司在资本市场的融资金额为95.87亿美元,其中股票融资的比例是72.5%,,在1998年和1999年比例分别为72.6%和72.3%,另一方面,债券融资的比例分别是17.8%,24.9%和25.1%。在这三年,股票融资的比例,在比中国发达的资本市场中却在下跌。以美国为例,当美国企业需要的资金在资本市场上,于股权融资相比他们宁愿选择债券融资。统计数据显示,从1970年到1985年,美日企业债券融资占了境外融资的91.7%,比股权融资高很多。阎达五等发现,大约中国3/4的上市公司偏好于股权融资。许多研究的学者认为,上市公司按以下顺序进行外部融资:第一个是股票基金,第二个是可转换债券,三是短期债务,最后一个是长期负债。许多研究人员通常分析我国上市公司偏好股权是由于我们国家的经济改革所带来的制度性因素。他们认为,上市公司的融资活动违背了西方古典融资理论只是因为那些制度性原因。例如,优序融资理论认为,当企业需要资金时,他们首先应该转向内部资金(折旧和留存收益),然后再进行债权融资,最后的选择是股票融资。在这篇文章中,笔者认为,这是因为具体的金融环境激活了企业的这种偏好,并结合了非制度性因素和西方金融理论,尝试解释股权融资偏好的原因。

大学毕业论文---软件专业外文文献中英文翻译

软件专业毕业论文外文文献中英文翻译 Object landscapes and lifetimes Tech nically, OOP is just about abstract data typing, in herita nee, and polymorphism, but other issues can be at least as importa nt. The rema in der of this sect ion will cover these issues. One of the most importa nt factors is the way objects are created and destroyed. Where is the data for an object and how is the lifetime of the object con trolled? There are differe nt philosophies at work here. C++ takes the approach that con trol of efficie ncy is the most importa nt issue, so it gives the programmer a choice. For maximum run-time speed, the storage and lifetime can be determined while the program is being written, by placing the objects on the stack (these are sometimes called automatic or scoped variables) or in the static storage area. This places a priority on the speed of storage allocatio n and release, and con trol of these can be very valuable in some situati ons. However, you sacrifice flexibility because you must know the exact qua ntity, lifetime, and type of objects while you're writing the program. If you are trying to solve a more general problem such as computer-aided desig n, warehouse man ageme nt, or air-traffic con trol, this is too restrictive. The sec ond approach is to create objects dyn amically in a pool of memory called the heap. In this approach, you don't know un til run-time how many objects you n eed, what their lifetime is, or what their exact type is. Those are determined at the spur of the moment while the program is runnin g. If you n eed a new object, you simply make it on the heap at the point that you n eed it. Because the storage is man aged dyn amically, at run-time, the amount of time required to allocate storage on the heap is sig ni fica ntly Ion ger tha n the time to create storage on the stack. (Creat ing storage on the stack is ofte n a si ngle assembly in structio n to move the stack poin ter dow n, and ano ther to move it back up.) The dyn amic approach makes the gen erally logical assumpti on that objects tend to be complicated, so the extra overhead of finding storage and releas ing that storage will not have an importa nt impact on the creati on of an object .In additi on, the greater flexibility is esse ntial to solve the gen eral program ming problem. Java uses the sec ond approach, exclusive". Every time you want to create an object, you use the new keyword to build a dyn amic in sta nee of that object. There's ano ther issue, however, and that's the lifetime of an object. With Ian guages that allow objects to be created on the stack, the compiler determines how long the object lasts and can automatically destroy it. However, if you create it on the heap the compiler has no kno wledge of its lifetime. In a Ianguage like C++, you must determine programmatically when to destroy the

毕业论文5000字英文文献翻译

英文翻译 英语原文: . Introducing Classes The only remaining feature we need to understand before solving our bookstore problem is how to write a data structure to represent our transaction data. In C++ we define our own data structure by defining a class. The class mechanism is one of the most important features in C++. In fact, a primary focus of the design of C++ is to make it possible to define class types that behave as naturally as the built-in types themselves. The library types that we've seen already, such as istream and ostream, are all defined as classesthat is,they are not strictly speaking part of the language. Complete understanding of the class mechanism requires mastering a lot of information. Fortunately, it is possible to use a class that someone else has written without knowing how to define a class ourselves. In this section, we'll describe a simple class that we canuse in solving our bookstore problem. We'll implement this class in the subsequent chapters as we learn more about types,expressions, statements, and functionsall of which are used in defining classes. To use a class we need to know three things: What is its name? Where is it defined? What operations does it support? For our bookstore problem, we'll assume that the class is named Sales_item and that it is defined in a header named Sales_item.h. The Sales_item Class The purpose of the Sales_item class is to store an ISBN and keep track of the number of copies sold, the revenue, and average sales price for that book. How these data are stored or computed is not our concern. To use a class, we need not know anything about how it is implemented. Instead, what we need to know is what operations the class provides. As we've seen, when we use library facilities such as IO, we must include the associated headers. Similarly, for our own classes, we must make the definitions associated with the class available to the compiler. We do so in much the same way. Typically, we put the class definition into a file. Any program that wants to use our class must include that file. Conventionally, class types are stored in a file with a name that, like the name of a program source file, has two parts: a file name and a file suffix. Usually the file name is the same as the class defined in the header. The suffix usually is .h, but some programmers use .H, .hpp, or .hxx. Compilers usually aren't picky about header file names, but IDEs sometimes are. We'll assume that our class is defined in a file named Sales_item.h. Operations on Sales_item Objects

毕业设计外文翻译-中文版

本科生毕业设计(论文)外文科技文献译文 译文题目(外文题目)学院(系)Socket网络编程的设计与实现A Design and Implementation of Active Network Socket Programming 机械与能源工程学院 专学业 号 机械设计制造及其自动化 071895 学生姓名李杰林 日期2012年5月27日指导教师签名日期

摘要:编程节点和活跃网络的概念将可编程性引入到通信网络中,并且代码和数据可以在发送过程中进行修改。最近,多个研究小组已经设计和实现了自己的设计平台。每个设计都有其自己的优点和缺点,但是在不同平台之间都存在着互操作性问题。因此,我们引入一个类似网络socket编程的概念。我们建立一组针对应用程序进行编程的简单接口,这组被称为活跃网络Socket编程(ANSP)的接口,将在所有执行环境下工作。因此,ANSP 提供一个类似于“一次性编写,无限制运行”的开放编程模型,它可以工作在所有的可执行环境下。它解决了活跃网络中的异构性,当应用程序需要访问异构网络内的所有地区,在临界点部署特殊服务或监视整个网络的性能时显得相当重要。我们的方案是在现有的环境中,所有应用程序可以很容易地安装上一个薄薄的透明层而不是引入一个新的平台。 关键词:活跃网络;应用程序编程接口;活跃网络socket编程

1 导言 1990年,为了在互联网上引入新的网络协议,克拉克和藤农豪斯[1]提出了一种新的设 计框架。自公布这一标志性文件,活跃网络设计框架[2,3,10]已经慢慢在20世纪90 年代末成形。活跃网络允许程序代码和数据可以同时在互联网上提供积极的网络范式,此外,他们可以在传送到目的地的过程中得到执行和修改。ABone作为一个全球性的骨干网络,开 始进行活跃网络实验。除执行平台的不成熟,商业上活跃网络在互联网上的部署也成为主要障碍。例如,一个供应商可能不乐意让网络路由器运行一些可能影响其预期路由性能的未知程序,。因此,作为替代提出了允许活跃网络在互联网上运作的概念,如欧洲研究课题组提出的应用层活跃网络(ALAN)项目[4]。 在ALAN项目中,活跃服务器系统位于网络的不同地址,并且这些应用程序都可以运行在活跃系统的网络应用层上。另一个潜在的方法是网络服务提供商提供更优质的活跃网络服务类。这个服务类应该提供最优质的服务质量(QOS),并允许路由器对计算机的访问。通过这种方法,网络服务提供商可以创建一个新的收入来源。 对活跃网络的研究已取得稳步进展。由于活跃网络在互联网上推出了可编程性,相应 地应建立供应用程序工作的可执行平台。这些操作系统平台执行环境(EES),其中一些已 被创建,例如,活跃信号协议(ASP)[12]和活跃网络传输系统(ANTS)[11]。因此,不 同的应用程序可以实现对活跃网络概念的测试。 在这些EES 环境下,已经开展了一系列验证活跃网络概念的实验,例如,移动网络[5],网页代理[6],多播路由器[7]。活跃网络引进了很多在网络上兼有灵活性和可扩展性的方案。几个研究小组已经提出了各种可通过路由器进行网络计算的可执行环境。他们的成果和现有基础设施的潜在好处正在被评估[8,9]。不幸的是,他们很少关心互操作性问题,活跃网络由多个执行环境组成,例如,在ABone 中存在三个EES,专为一个EES编写的应用程序不能在其他平台上运行。这就出现了一种资源划分为不同运行环境的问题。此外,总是有一些关键的网络应用需要跨环境运行,如信息收集和关键点部署监测网络的服务。 在本文中,被称为活跃网络Socket编程(ANSP)的框架模型,可以在所有EES下运行。它提供了以下主要目标: ??通过单一编程接口编写应用程序。 由于ANSP提供的编程接口,使得EES的设计与ANSP 独立。这使得未来执行环境的发展和提高更加透明。

电子信息工程专业毕业论文外文翻译中英文对照翻译

本科毕业设计(论文)中英文对照翻译 院(系部)电气工程与自动化 专业名称电子信息工程 年级班级 04级7班 学生姓名 指导老师

Infrared Remote Control System Abstract Red outside data correspondence the technique be currently within the scope of world drive extensive usage of a kind of wireless conjunction technique,drive numerous hardware and software platform support. Red outside the transceiver product have cost low, small scaled turn, the baud rate be quick, point to point SSL, be free from electromagnetism thousand Raos etc.characteristics, can realization information at dissimilarity of the product fast, convenience, safely exchange and transmission, at short distance wireless deliver aspect to own very obvious of advantage.Along with red outside the data deliver a technique more and more mature, the cost descend, red outside the transceiver necessarily will get at the short distance communication realm more extensive of application. The purpose that design this system is transmit cu stomer’s operation information with infrared rays for transmit media, then demodulate original signal with receive circuit. It use coding chip to modulate signal and use decoding chip to demodulate signal. The coding chip is PT2262 and decoding chip is PT2272. Both chips are made in Taiwan. Main work principle is that we provide to input the information for the PT2262 with coding keyboard. The input information was coded by PT2262 and loading to high frequent load wave whose frequent is 38 kHz, then modulate infrared transmit dioxide and radiate space outside when it attian enough power. The receive circuit receive the signal and demodulate original information. The original signal was decoded by PT2272, so as to drive some circuit to accomplish

毕业论文外文翻译模版

长江大学工程技术学院 毕业设计(论文)外文翻译 外 文 题 目 Matlab Based Interactive Simulation Program for 2D Multisegment Mechanical Systems 译 文 题 目 二维多段机械系统基于Matlab 的 交互式仿真程序 系 部 化学工程系 专 业 班 级 化工60801 学 生 姓 名 李泽辉 指 导 教 师 张 铭 辅 导 教 师 张 铭 完 成 日 期 2012.4.15 顶层配置在管路等,要求设备,所有设要求,对调整使案,编是指机确保机组中资料试

外文翻译 二维多段机械系统基于Matlab 的交互式仿真程序 Henryk Josiński, Adam ?witoński, Karol J?drasiak 著;李泽辉 译 摘要:本文介绍了多段机械系统设计原则,代表的是一个模型的一部分的设计系统,然后扩展 形成的几个部分和模型算法的分类与整合的过程,以及简化步骤的过程叫多段系统。本文还介绍了设计过程的二维多段机械系统的数字模型,和使用Matlab 的软件包来实现仿真。本文还讨论测试运行了一个实验,以及几种算法的计算,实现了每个单一步骤的整合。 1 简介 科学家创造了物理模型和数学模型来表示人类在运动中的各种形式。数学模型 使创建数字模型和进行计算机仿真成为可能。模型试验,可以使人们不必真正的实 验就可以虚拟的进行力和力矩的分解。 本文研究的目的是建立一个简单的多段运动模型,以增加模型的连续性和如何 避免不连续为原则。这是创建一个人类运动模型系统的冰山一角。其使用matlab 程 序包创建的数字模型,可以仿真人类运动。 文献中关于这一主题的内容很广泛。运动的模式和力矩的分解在这些文献中都 有涉猎。动态的平面人体运动模型,提出了解决了迭代矩阵的方法。还值得一提的 是这类项目的参考书目,布鲁贝克等人提出了一个模型——人腿模型,这个以人的 物理运动为基础的平面模型仿真了人腿——一个单一的扭簧和冲击碰撞模型。人腿 模型虽然简单,但是它展示人类的步态在水平地面上的运动特征。布鲁贝克等人还 介绍,在人腿模型的双足行走的基础上,从生物力学的角度而言,符合人体步行的 特征。这个模型具有一个躯干,双腿膝盖和脚踝。它能够合理的表现出人多样的步 态风格。一个仿真人类运动的数学模型反应出了人的部分运动状态。 图1. 力的分解 2 力的分解

本科毕业设计外文翻译(原文)

Real-time interactive optical micromanipulation of a mixture of high- and low-index particles Peter John Rodrigo, Vincent Ricardo Daria and Jesper Glückstad Optics and Plasma Research Department, Ris? National Laboratory, DK-4000 Roskilde, Denmark jesper.gluckstad@risoe.dk http://www.risoe.dk/ofd/competence/ppo.htm Abstract: We demonstrate real-time interactive optical micromanipulation of a colloidal mixture consisting of particles with both lower (n L < n0) and higher (n H > n0) refractive indices than that of the suspending medium (n0). Spherical high- and low-index particles are trapped in the transverse plane by an array of confining optical potentials created by trapping beams with top-hat and annular cross-sectional intensity profiles, respectively. The applied method offers extensive reconfigurability in the spatial distribution and individual geometry of the optical traps. We experimentally demonstrate this unique feature by simultaneously trapping and independently manipulating various sizes of spherical soda lime micro- shells (n L≈ 1.2) and polystyrene micro-beads (n H = 1.57) suspended in water (n0 = 1.33). ?2004 Optical Society of America OCIS codes: (140.7010) Trapping, (170.4520) Optical confinement and manipulation and (230.6120) Spatial Light Modulators. References and links 1. A. Ashkin, “Optical trapping and manipulation of neutral particles using lasers,” Proc. Natl. Acad. Sci. USA 94, 4853-4860 (1997). 2. K. Svoboda and S. M. Block, “Biological applications of optical forces,” Annu. Rev. Biophys. Biomol. Struct. 23, 247-285 (1994). 3. D. G. Grier, “A revolution in optical manipulation,” Nature 424, 810-816 (2003). 4. M. P. MacDonald, G. C. Spalding and K. Dholakia, “Microfluidic sorting in an optical lattice,” Nature 426, 421-424 (2003). 5. J. Glückstad, “Microfluidics: Sorting particles with light,” Nature Materials 3, 9-10 (2004). 6. A. Ashkin, “Acceleration and trapping of particles by radiation-pressure,”Phys. Rev. Lett. 24, 156-159 (1970). 7. A. Ashkin, J. M. Dziedzic, J. E. Bjorkholm and S. Chu, “Observation of a single-beam gradient force optical trap for dielectric particles,” Opt. Lett. 11, 288-290 (1986). 8. K. Sasaki, M. Koshioka, H. Misawa, N. Kitamura, and H. Masuhara, “Optical trapping of a metal particle and a water droplet by a scanning laser beam,” Appl. Phys. Lett. 60, 807-809 (1992). 9. K. T. Gahagan and G. A. Swartzlander, “Trapping of low-index microparticles in an optical vortex,” J. Opt. Soc. Am. B 15, 524-533 (1998). 10. K. T. Gahagan and G. A. Swartzlander, “Simultaneous trapping of low-index and high-index microparticles observed with an optical-vortex trap,” J. Opt. Soc. Am. B 16, 533 (1999). 11. M. P. MacDonald, L. Paterson, W. Sibbett, K. Dholakia, P. Bryant, “Trapping and manipulation of low-index particles in a two-dimensional interferometric optical trap,” Opt. Lett. 26, 863-865 (2001). 12. R. L. Eriksen, V. R. Daria and J. Glückstad, “Fully dynamic multiple-beam optical tweezers,” Opt. Express 10, 597-602 (2002), https://www.doczj.com/doc/7814034945.html,/abstract.cfm?URI=OPEX-10-14-597. 13. P. J. Rodrigo, R. L. Eriksen, V. R. Daria and J. Glückstad, “Interactive light-driven and parallel manipulation of inhomogeneous particles,” Opt. Express 10, 1550-1556 (2002), https://www.doczj.com/doc/7814034945.html,/abstract.cfm?URI=OPEX-10-26-1550. 14. V. Daria, P. J. Rodrigo and J. Glückstad, “Dynamic array of dark optical traps,” Appl. Phys. Lett. 84, 323-325 (2004). 15. J. Glückstad and P. C. Mogensen, “Optimal phase contrast in common-path interferometry,” Appl. Opt. 40, 268-282 (2001). 16. S. Maruo, K. Ikuta and H. Korogi, “Submicron manipulation tools driven by light in a liquid,” Appl. Phys. Lett. 82, 133-135 (2003). #3781 - $15.00 US Received 4 February 2004; revised 29 March 2004; accepted 29 March 2004 (C) 2004 OSA 5 April 2004 / Vol. 12, No. 7 / OPTICS EXPRESS 1417

相关主题
文本预览
相关文档 最新文档