软件工程专业毕业设计外文文献翻译
- 格式:doc
- 大小:59.50 KB
- 文档页数:21
TranslationUnit-1III. (1) 由于计算机与信息系统的结合以及复杂的图形用户界面而产生的新技术对软件工程师提出了新的要求。
(2) 不同类型系统和使用这些系统的不同类型组织的广泛的多样性,意味着我们需要软件开发方法的多样性。
…………………. 第8页翻译III. (1) 当芯片设计者为微处理器开发各种各样的指令集的同时,他们增加了越来越复杂的指令,每个指令的执行都需要若干时钟周期。
………………………..第13页翻译Unit-2III. (1) 对于详细说明软件需求中的困难,根本原因源于其涉及客户、最终用户、以及软件开发人员的有关三方.。
第22页翻译III. (1) 正如我们所知,指示一台计算机如何执行一项任务的指令被称为计算机程序。
(2) 这类软件包含大量数据——不像数据库软件,数据库软件销售时不带任何数据。
…………………………….第27页翻译Unit-3III. (1) 为了即使在风险存在的情况下能够达到项目目标,需要适当的风险管理。
(2) 通过适当的监控,这些情况能够被识别,从而可以相应地改变计划。
………………………………….第38页翻译III. (1) 不过,主要区别在于,多用户操作系统排定在一个集中式计算机上的处理请求,而网络操作系统仅仅是将数据和程序路由到每个用户的本地计算机,实际处理是发生在每个用户的本地计算机上。
……………………….第42页翻译Unit-4III. (1) 详细进度安排只有在实际的人员分配已经完成之后才进行,因为任务分配需要团队成员能力的相关信息。
(2) 小组目标由全体成员的一致同意来设定,并且每位成员的提议可用于重要决定。
…………………………………………….第52页翻译III. (1) 以太网是一种可用于几乎所有类型的计算机,描述数据如何能够在计算机与通常在近距离的其它网络设备之间以包的形式发送的局域网技术。
…………………第58页翻译Unit-5III. (1) 以数据结构为中心的设计(例如,Jackson方法,Warnier-Orr方法)从程序操作的数据结构着手,而不是从其实现的功能着手。
大连东软信息学院
毕业设计(论文)外文资料及译文
系所:
专业:
班级:
姓名:
学号:
大连东软信息学院
Dalian Neusoft University of Information
外文资料和译文格式要求
一、装订要求
1、外文资料原文(复印或打印)在前、译文在后、最后为指导教师评定成绩。
2、译文必须采用计算机输入、打印。
3、A4幅面打印,于左侧装订。
二、撰写要求
1、外文文献内容与所选课题相关。
2、译文汉字字数不少于4000字。
三、格式要求
1、译文字号:中文小四号宋体,英文小四号“Times New Roman”字型,全文统一,首行缩进2个中文字符,1.5倍行距。
2、译文页码:页码用阿拉伯数字连续编页,字体采用“Times New Roman”字体,字号小五,页底居中。
3、译文页眉:眉体使用单线,页眉说明五号宋体,居中“大连东软信息学院本科毕业设计(论文)译文”。
大连东软信息学院毕业设计(论文)译文
-1-。
毕业设计(论文)外文资料翻译系:计算机系专业:计算机科学与技术姓名:学号:外文出处:Ghosh,D..Java Object-oriented(用外文写)programming[J]. IEEE Transactionson SoftwareEngineering,2009, 13(3):42-45.附件: 1.外文资料翻译译文;2.外文原文。
注:请将该封面与附件装订成册。
附件1:外文资料翻译译文Java的面向对象编程——面向对象编程和它的关键技术—继承和多态性软件的重用可以节省程序开发时间。
它鼓励重复使用已经调试好的高质量的软件,从而减少系统运行后可能出现的问题。
这些都是令人振奋的可能性。
多态性允许我们用统一的风格编写程序,来处理多种已存在的类和特定的相关类。
利用多态性我们可以方便地向系统中添加新的功能。
继承和多态对于解决软件的复杂性是一种有效可行的技术。
当创建一个新的类时,而不用完整的写出新的实例变量和实例方法,程序员会指定新的类继承已定义的超类的实例变量和实例方法。
这个新的类被称为一个子类。
每个子类本身将来亦可有新的子类,而其本身将成为父类。
一个类的直接父类就是该类所直接继承的类(通过关键字extends继承)。
一个间接超类是通过从两级或更多级以上的类继承而来的。
例如,从类JApplet(包javax.swing 中)扩展来的类Applet(包java.applet)。
一个类单一的从一个父类继承而来。
Java 不支持多重继承(而C++可以),但它支持接口的概念。
接口可以使Java实现许多通过多重继承才能实现的优点而没有关联的问题。
我们将在本章讨论的接口的详细内容。
我们会给出创建和使用接口的一般规律和具体实例。
一个子类通常添加自己的实例变量和自己的实例方法,因此子类通常比父类大。
一个子类比它的父类更具体并且代表一组更小、更专业的对象。
通过单一继承,子类在开始时拥有父类的所有特性。
继承性真正的力量在于它可以在定义子类时增加或取代从超类中继承来的特征。
淮阴工学院毕业设计说明书(论文)作者: ** 学号:10813013**学院: 计算机工程专业: 计算机科学与技术题目: 专家系统指导者:(姓名) (专业技术职务)评阅者:(姓名) (专业技术职务)年月毕业设计说明书(论文)中文摘要系统介绍:专家系统是一种计算机程序,是计算机科学的一个分支主要研究人工智能。
人工智能的科学目标是能让计算机程序展示智能行为。
它关注象征性的推理或推理的概念和方法,以及如何使用知识将这些理论放入一台机器内。
当然,长期的智能包含了很多认知技能,包括解决问题,学习,理解语言的能力,人工智能能解决所有的这些问题。
但大多数已经取得的进展,已经取得了该问题的解决。
人工智能程序到达专家级解决问题的能力在任务地区将承担的知识有关的具体任务是所谓的知识或专家系统。
通常,长期的专家系统是保留程序的基础知识,包含人类专家的知识。
和教科书或非专家知识的对比,往往,专家系统和基于知识的系统公司同义。
两者合计,他们代表了人工智能应用最广泛的类型。
在专家系统捕获人类智力活动的区域被称为任务域。
域是指正在执行任务的区域,任务是指一些以目标位向导,解决问题的活动。
典型的任务是诊断,规则,调度,配置和设计。
专家系统被称为知识工程及其从业人员被称为知识的工程师。
知识工程师必须确保计算机的所有知识需要解决一个问题。
知识工程师必须选择一个或多个形式,代表所需的知识为符号模式在计算机的内存——也就是说,他(或她)必须选择一种知识表示。
他还必须确保计算机可以使用的知识有效地选择从一个几个推理方法。
实践知识工程描述。
我们首先描述了专家系统的组成部分。
专家系统的组成:每一个专家系统由两个主要部分组成:知识库和推理或推论,发动机专家系统的知识库包含事实和启发式知识。
事实性知识是任务域被广泛共享,通常在教科书或期刊,并共同商定后,在特定领域的那些知识渊博的知识启发式知识是不太严格,更多体验,更多的判断性能的知识。
在事实性知识,启发式知识很少被讨论,主要是个人主义。
附录Software Engineering-A PRACTITIONER’S APPROACHWritten by Roger S. Pressman, Ph.D. (P.340-P.343)13.3DESIGN PRINCIPLESSoftware design is both a process and a model. The design process is a sequence ofsteps that enable the designer to describe all aspects of the software to be built. It is important to note, however, that the design process is not simply a cookbook. Creative skill, past experience, a sense of what makes “good” software, and an overallcommitment to quality are critical success factors for a competent design.The design model is the equivalent of an architect’s plans for a house. It begins by representing the totality of the thing to be built (e.g., a three-dimensional renderingof the house) and slowly refines the thing to provide guidance for constructing eachdetail (e.g., the plumbing layout). Similarly, the design model that is created for softwareprovides a variety of different views of the computer software.Basic design principles enable the software engineer to navigate the design process.Davis suggests a setof principles for software design, which have beenadapted and extended in the following list:• The design process should not suffer from “tunnel vision.” A gooddesigner should consider alternative approaches, judging each based on therequirements of the the resources available to do the job, and thedesign concepts presented in Section • The design should be traceable to the analysis model. Because a singleelement of the design model often traces to multiple requirements, it is necessaryto have a means for tracking how requirements have been satisfied bythe design model.• The design should not reinvent the wheel. Systems are constructed usinga set of design patterns, many of which have likely been encountered before.These patterns should always be chosen as an alternative to reinvention.Time is short and resources are limited! Design time should be invested inrepresenting truly new ideas and integrating those patterns that already exist.• The design should “minimize the intellectual distance”between the software and the problem as it exists in the real world.That is, the structure of the software design should (whenever possible)mimic the structure of the problem domain.• The design should exhibit uniformity and integration. A design is uniformif it appears that one person developed the entire thing. Rules of styleand format should be defined for a design team before design work begins. Adesign is integrated if care is taken in defining interfaces between designComponents.• The design should be structured to accommodate change. The designconcepts discussed in the next section enable a design to achieve this principle.• The design should be structured to degrade gently, even when aberrantdata, events, or operating conditions are encountered. Welldesignedsoftware should never “bomb.” It should be designed toaccommodate unusual circumstances, and if it must terminate processing, doso in a graceful manner.• Design is not coding, coding is not design. Even when detailed proceduraldesigns are created for program components, the level of abstraction ofthe design model is higher than source code. The only design decisions madeat the coding level address the small implementation details that enable theprocedural design to be coded.• The design should be assessed for quality as it is being created, notafter the fact.A variety of design concepts (Section 13.4) and design measures(Chapters 19 and 24) are available to assist the designer in assessing quality.• The design should be reviewed to minimize conceptual (semantic)errors. There is sometimes a tendency to focus on minutiae when the design isreviewed, missing the forest for the trees. A design team should ensure thatmajor conceptual elements of the design (omissions, ambiguity, inconsistency)have been addressed before worrying about the syntax of the design model.When these design principles are properly applied, the software engineer creates a designthat exhibits both external and internal quality factors . External quality factors are those properties of the software that can be readily observed by users (e.g., speed,reliability, correctness, usability).Internal quality factors are of importance to softwareengineers. They lead to a high-quality design from the technical perspective. To achieveinternal quality factors, the designer must understand basic design concepts.13.4 DESIGN CONCEPTSA set of fundamental software design concepts has evolved over the past four decades.Although the degree of interest in each concept has varied over the years, each hasstood the test of time. Each provides the software designer with a foundation fromwhich more sophisticated design methods can be applied. Each helps the softwareengineer to answer the following questions:• What criteria can be used to partition software into individual components?• How is function or data structure detail separated from a conceptual representationof the software?• What uniform criteria define the technical quality of a software design?M. A. Jackson once said: "The beginning of wisdom for a [software engineer] is torecognize the difference between getting a program to work, and getting it right". Fundamental software design concepts provide the necessary frameworkfor "getting it right."13.4.1 AbstractionWhen we consider a modular solution to any problem, many levels of abstraction canbe posed. At the highest level of abstraction, a solution is stated in broad terms usingthe language of the problem environment. At lower levels of abstraction, a more proceduralorientation is taken. Problem-oriented terminology is coupled with implementation-oriented terminology in an effort to state a solution. Finally, at the lowestlevel of abstraction, the solution is stated in a manner that can be directly implemented.Wasserman provides a useful definition:The psychological notion of "abstraction" permits one to concentrate on a problem atsome level of generalization without regard to irrelevant low level details; use of abstractionalso permits one to work with concepts and terms that are familiar in the problem environmentwithout having to transform them to an unfamiliar structure . . .Each step in the software process is a refinement in the level of abstraction of the software solution. During system engineering, software is allocated as an element ofa computer-based system. During software requirements analysis, the software solutionis stated in terms "that are familiar in the problem environment." As we movethrough the design process, the level of abstraction is reduced. Finally, the lowestlevel of abstraction is reached when source code is generated.As we move through different levels of abstraction, we work to create proceduraland data abstractions. A procedural abstraction is a named sequence of instructionsthat has a specific and limited function. An example of a procedural abstraction wouldbe the word open for a door. Open implies a long sequence of procedural steps (e.g.,walk to the door, reach out and grasp knob, turn knob and pull door, step away frommoving door, etc.).A data abstraction is a named collection of data that describes a data objectChapter12). In the context of the procedural abstraction open, we can define a data abstractioncalled door. Like any data object, the data abstraction for door would encompassa set of attributes that describe the door (e.g., door type, swing direction, peningmechanism, weight, dimensions). It follows that the procedural abstraction open wouldmake use of information contained in the attributes of the data abstraction door.Many modern programming languages provide mechanisms for creating abstractdata types. For example, the Ada package is a programming language mechanismthat provides support for both data and procedural abstraction. The original abstractdata type is used as a template or generic data structure from which other data structurescan be instantiated.Control abstraction is the third form of abstraction used in software design. Likeprocedural and data abstraction, control abstraction implies a program control mechanismwithout specifying internal details. An example of a control abstraction is the synchronization semaphore used to coordinate activities in an operating system.The concept of the control abstraction is discussed briefly in Chapter 14.13.4.2 RefinementStepwise refinement is a top-down design strategy originally proposed by Niklaus Wirth. A program is developed by successively refining levels of procedural detail.A hierarchy is developed by decomposing a macroscopic statement of function (aprocedural abstraction) in a stepwise fashion until programming language statementsare reached. An overview of the concept is provided by Wirth: In each step (of the refinement), one or several instructions of the given program are decomposedinto more detailed instructions. This successive decomposition or refinement of specificationsterminates when all instructions are expressed in terms of any underlying computeror programming language . . . As tasks are refined, so the data may have to be refined,decomposed, or structured, and it is natural to refine the program and the data specificationsin parallel.Every refinement step implies some design decisions. It is important that . . . the programmerbe aware of the underlying criteria (for design decisions) and of the existence ofalternative solutions . . .The process of program refinement proposed by Wirth is analogous to the process of refinement and partitioning that is used during requirements analysis. The differenceis in the level of implementation detail that is considered, not the approach.Refinement is actually a process of elaboration.We begin with a statement offunction(or description of information) that is defined at a high level of abstraction. Thatis, the statement describes function or information conceptually but provides no informationabout the internal workings of the function or the internal structure of theinformation. Refinement causes the designer to elaborate on the original statement,providing more and more detail as each successive refinement (elaboration) occurs.Abstraction and refinement are complementary concepts. Abstraction enables adesigner to specify procedure and data and yet suppress low-level details. Refinementhelps the designer to reveal low-level details as design progresses. Both conceptsaid the designer in creating a complete design model as the design evolves.《软件工程-实践者的研究方法》Roger S. Pressman博士(340页-343页)13.3 设计原则软件设计是一个过程也是一个模型。
成都东软学院外文资料和译文格式要求一、译文必须采用计算机输入、打印,幅面A4。
外文资料原文(复印或打印)在前,译文在后,于左侧装订。
二、具体要求1、至少翻译一篇内容与所选课题相关的外文文献。
2、译文汉字字数不少于4000字。
3、正文格式要求:宋体五号字。
译文格式参见《译文格式要求》,宋体五号字,单倍行距。
纸张纸张为A4纸,页边距上2.54cm、下2.54cm、左3.17cm、右3.17cm。
装订外文资料原文(复印或打印)在前,译文在后封面封面的专业、班级、姓名、学号等信息要全部填写正确。
封面指导教师必须为讲师以上职称,若助教则需要配备一名讲师协助指导。
讲师在前,助教在后。
指导教师姓名后面空一个中文空格,加职称。
页眉页眉说明宋体小五,左端“XX学院毕业设计(论文)”,右端“译文”。
页眉中的学院名称要与封面学院名称一致。
字数本科4000字。
附:外文资料和译文封面、空白页成都东软学院外文资料和译文专业:软件工程移动互联网应用开发班级:2班姓名:罗荣昆学号:12310420216指导教师:2015年 12月 8日Android page layoutUsing XML-Based LayoutsW hile it is technically possible to create and attach widgets to our activity purely through Java code, the way we did in Chapter 4, the more common approach is to use an XML-based layout file. Dynamic instantiation of widgets is reserved for more complicated scenarios, where the widgets are not known at compile-time (e g., populating a column of radio buttons based on data retrieved off the Internet).With that in mind, it’s time to break out the XML and learn how to lay out Android activities that way.What Is an XML-Based Layout?As the name suggests, an XML-based layout is a specification of widgets’ relationships to each other—and to their containers (more on this in Chapter 7)—encoded in XML format. Specifi cally, Android considers XML-based layouts to be resources, and as such layout files are stored in the res/layout directory inside your Android project.Each XML file contains a tree of elements specifying a layout of widgets and their containers that make up one view hierarchy. The attributes of the XML elements are properties, describing how a widget should look or how a container should behave. For example, if a Button element has an attribute value of android:textStyle = "bold", that means that the text appearing on the face of the button should be rendered in a boldface font style.Android’s SDK ships with a tool (aapt) which uses the layouts. This tool should be automatically invoked by your Android tool chain (e.g., Eclipse, Ant’s build.xml). Of particular importance to you as a developer is that aapt generates the R.java source file within your project, allowing you to access layouts and widgets within those layouts directly from your Java code. Why Use XML-Based Layouts?Most everything you do using XML layout files can be achieved through Java code. For example, you could use setTypeface() to have a button render its textin bold, instead of using a property in an XML layout. Since XML layouts are yet another file for you to keep track of, we need good reasons for using such files.Perhaps the biggest reason is to assist in the creation of tools for view definition, such as a GUI builder in an IDE like Eclipse or a dedicated Android GUI designer like DroidDraw1. Such GUI builders could, in principle, generate Java code instead of XML. The challenge is re-reading the UI definition to support edits—that is far simpler if the data is in a structured format like XML than in a programming language. Moreover, keeping generated XML definitions separated from hand-written Java code makes it less likely that somebody’s custom-crafted source will get clobbered by accident when the generated bits get re-generated. XML forms a nice middle ground between something that is easy for tool-writers to use and easy for programmers to work with by hand as needed.Also, XML as a GUI definition format is becoming more commonplace. Microsoft’s XAML2, Adobe’s Flex3, and Mozilla’s XUL4 all take a similar approach to that of Android: put layout details in an XML file and put programming smarts in source files (e.g., JavaScript for XUL). Many less-well-known GUI frameworks, such as ZK5, also use XML for view definition. While “following the herd” is not necessarily the best policy, it does have the advantage of helping to ease the transition into Android from any other XML-centered view description language. OK, So What Does It Look Like?Here is the Button from the previous chapter’s sample application, converted into an XMLlayout file, found in the Layouts/NowRedux sample project. This code sample along with all others in this chapter can be found in the Source Code area of .<?xml version="1.0" encoding="utf-8"?><Button xmlns:android="/apk/res/android"android:id="@+id/button"android:text=""android:layout_width="fill_parent"android:layout_height="fill_parent"/>The class name of the widget—Button—forms the name of the XML element. Since Button is an Android-supplied widget, we can just use the bare class name. If you create your own widgets as subclasses of android.view.View, you would need to provide a full package declara tion as well.The root element needs to declare the Android XML namespace:xmlns:android="/apk/res/android"All other elements will be children of the root and will inherit that namespace declaration.Because we want to reference this button from our Java code, we need to give it an identifier via the android:id attribute. We will cover this concept in greater detail later in this chapter.The remaining attributes are properties of this Button instance:• android:text indicates the initial text to be displayed on the button face (in this case, an empty string)• android:layout_width and android:layout_height tell Android to have the button’swidth and height fill the “parent”, in this case the entire screen—these attributes will be covered in greater detail in Chapter 7.Since this single widget is the only content in our activity, we only need this single element. Complex UIs will require a whole tree of elements, representing the widgets and containers that control their positioning. All the remaining chapters of this book will use the XML layout form whenever practical, so there are dozens of other examples of more complex layouts for you to peruse from Chapter 7 onward.What’s with the @ Signs?Many widgets and containers only need to appear in the XML layout file and do not need to be referenced in your Java code. For example, a static label (TextView) frequently only needs to be in the layout file to indicate where it should appear. These sorts of elements in the XML file do not need to have the android:id attribute to give them a name.Anything you do want to use in your Java source, though, needs an android:id.The convention is to use @+id/... as the id value, where the ... represents your locally unique name for the widget in question. In the XML layout example in the preceding section, @+id/button is the identifier for the Button widget.Android provides a few special android:id values, of the form @android:id/.... We will see some of these in various chapters of this book, such as Chapters 8 and 10.We Attach These to the Java How?Given that you have painstakingly set up the widgets and containers in an XML layout filenamed main.xml stored in res/layout, all you need is one statement in your activity’s onCreate() callback to use that layout:setContentView(yout.main);This is the same setContentView() we used earlier, passing it an instance of a View subclass (in that case, a Button). The Android-built view, constructed from our layout, is accessed from that code-generated R class. All of the layouts are accessible under yout, keyed by the base name of the layout file—main.xml results in yout.main.To access our identified widgets, use findViewById(), passing in the numeric identifier of the widget in question. That numeric identifier was generated by Android in the R class asR.id.something (where something is the specific widget you are seeking). Those widgets are simply subclasses of View, just like the Button instance we created in Chapter 4.The Rest of the StoryIn the original Now demo, the button’s face would show the current time, which would reflect when the button was last pushed (or when the activity was first shown, if the button had not yet been pushed).Most of that logic still works, even in this revised demo (NowRedux). However,rather than instantiating the Button in our activity’s onCreate() callback, we can reference the one from the XML layout:package youts;import android.app.Activity;import android.os.Bundle;import android.view.View;import android.widget.Button; import java.util.Date;public class NowRedux extends Activity implements View.OnClickListener { Button btn;@Overridepublic void onCreate(Bundle icicle) { super.onCreate(icicle);setContentView(yout.main);btn=(Button)findViewById(R.id.button);btn.setOnClickListener(this);upd ateTime();}public void onClick(View view) { updateTime();}private void updateTime() {btn.setText(new Date().toString()); }}The first difference is that rather than setting the content view to be a view we created in Java code, we set it to reference the XML layout (setContentView(yout.main)). The R.java source file will be updated when we rebuild this project to include a reference to our layout file (stored as main.xml in our project’s res/l ayout directory).The other difference is that we need to get our hands on our Button instance, for which we use the findViewById() call. Since we identified our button as @+id/button, we can reference the button’s identifier as R.id.button. Now, with the Button instance in hand, we can set the callback and set the label as needed.As you can see in Figure 5-1, the results look the same as with the originalNow demo.Figure 5-1. The NowRedux sample activity Employing Basic WidgetsE very GUI toolkit has some basic widgets: fields, labels, buttons, etc. Android’s toolkit is no different in scope, and the basic widgets will provide a good introduction as to how widgets work in Android activities.Assigning LabelsThe simplest widget is the label, referred to in Android as a TextView. Like in most GUI toolkits, labels are bits of text not editable directly by users. Typically, they are used to identify adjacent widgets (e.g., a “Name:” label before a field where one fills in a name).In Java, you can create a label by creating a TextView instance. More commonly, though, you will create labels in XML layout files by adding a TextView element to the layout, with an android:text property to set the value of the label itself. If you need to swap labels based on certain criteria, such as internationalization, you may wish to use a resource reference in the XML instead, as will be described in Chapter 9. TextView has numerous other properties of relevance for labels, such as:• android:typeface to set the typeface to use for the label (e.g., monospace) • android:textStyle to indicate that the typeface should be made bold (bold), italic (italic),or bold and italic (bold_italic)• android:textColor to set the color of the label’s text, in RGB hex format (e.g., #FF0000 for red)For example, in the Basic/Label project, you will find the following layout file:<?xml version="1.0" encoding="utf-8"?><TextView xmlns:android=/apk/res/androidandroid:layout_width="fill_parent"android:layout_height="wrap_content"android:text="You were expecting something profound?" />As you can see in Figure 6-1, just that layout alone, with the stub Java source provided by Android’s p roject builder (e.g., activityCreator), gives you the application.Figure 6-1. The LabelDemo sample applicationButton, Button, Who’s Got the Button?We’ve already seen the use of the Button widget in Chapters 4 and 5. As it turns out, Button is a subclass of TextView, so everything discussed in the preceding section in terms of formatting the face of the button still holds. Fleeting ImagesAndroid has two widgets to help you embed images in your activities: ImageView and ImageButton. As the names suggest, they are image-based analogues to TextView and Button, respectively.Each widget takes an android:src attribute (in an XML layout) to specify what picture to use. These usually reference a drawable resource, described in greater detail in the chapter on resources. You can also set the image content based on a Uri from a content provider via setImageURI().ImageButton, a subclass of ImageView, mixes in the standard Button behaviors, for responding to clicks and whatnot.For example, take a peek at the main.xml layout from the Basic/ImageView sample project which is found along with all other code samples at : <?xml version="1.0" encoding="utf-8"?><ImageView xmlns:android=/apk/res/androidandroid:id="@+id/icon"android:layout_width="fill_parent"android:layout_height="fill_parent"android:adjustViewBounds="true"android:src="@drawable/molecule" />The result, just using the code-generated activity, is shown in Figure 6-2.Figure 6-2. The ImageViewDemo sample applicationFields of Green. Or Other Colors.Along with buttons and labels, fields are the third “anchor” of most GUI toolkits. In Android, they are implemented via the EditText widget, which is a subclass of the TextView used for labels.Along with the standard TextView properties (e.g., android:textStyle), EditText has many others that will be useful for you in constructing fields, including:• android:autoText, to control if the fie ld should provide automatic spelling assistance• android:capitalize, to control if the field should automatically capitalize the first letter of entered text (e.g., first name, city) • android:digits, to configure the field to accept only certain digi ts • android:singleLine, to control if the field is for single-line input or multiple-line input (e.g., does <Enter> move you to the next widget or add a newline?)Beyond those, you can configure fields to use specialized input methods, such asandroid:numeric for numeric-only input, android:password for shrouded password input,and android:phoneNumber for entering in phone numbers. If you want to create your own input method scheme (e.g., postal codes, Social Security numbers), you need to create your own implementation of the InputMethod interface, then configure the field to use it via android: inputMethod.For example, from the Basic/Field project, here is an XML layout file showing an EditText:<?xml version="1.0" encoding="utf-8"?><EditTextxmlns:android=/apk/res/androidandroid:id="@+id/field"android:layout_width="fill_parent"android:layout_height="fill_parent"android:singleLine="false" />Note that android:singleLine is false, so users will be able to enter in several lines of text. For this project, the FieldDemo.java file populates the input field with some prose:package monsware.android.basic;import android.app.Activity;import android.os.Bundle;import android.widget.EditText;public class FieldDemo extends Activity { @Overridepublic void onCreate(Bundle icicle) { super.onCreate(icicle);setContentView(yout.main);EditText fld=(EditText)findViewById(R.id.field);fld.setText("Licensed under the Apache License, Version 2.0 " + "(the \"License\"); you may not use this file " + "except in compliance with the License. You may " + "obtain a copy of the License at " +"/licenses/LICENSE-2.0");}}The result, once built and installed into the emulator, is shown in Figure 6-3.Figure 6-3. The FieldDemo sample applicationNote Android’s emulator only allows one application in the launcher per unique Java package. Since all the demos in this chapter share the monsware.android.basic package, you will only see one of these demos in your emulator’s launcher at any one time.Another flavor of field is one that offers auto-completion, to help users supply a value without typing in the whole text. That is provided in Android as the AutoCompleteTextView widget and is discussed in Chapter 8.Just Another Box to CheckThe classic checkbox has two states: checked and unchecked. Clicking the checkbox toggles between those states to indicate a choice (e.g., “Ad d rush delivery to my order”). In Android, there is a CheckBox widget to meet this need. It has TextView as an ancestor, so you can use TextView properties likeandroid:textColor to format the widget. Within Java, you can invoke: • isChecked() to determi ne if the checkbox has been checked• setChecked() to force the checkbox into a checked or unchecked state • toggle() to toggle the checkbox as if the user checked itAlso, you can register a listener object (in this case, an instance of OnCheckedChangeListener) to be notified when the state of the checkbox changes.For example, from the Basic/CheckBox project, here is a simple checkbox layout:<?xml version="1.0" encoding="utf-8"?><CheckBox xmlns:android="/apk/res/android"android:id="@+id/check"android:layout_width="wrap_content"android:layout_height="wrap_content"android:text="This checkbox is: unchecked" />The corresponding CheckBoxDemo.java retrieves and configures the behavior of the checkbox:public class CheckBoxDemo extends Activityimplements CompoundButton.OnCheckedChangeListener { CheckBox cb;@Overridepublic void onCreate(Bundle icicle) { super.onCreate(icicle);setContentView(yout.main);cb=(CheckBox)findViewById(R.id.check);cb.setOnCheckedChangeListener(this);}public void onCheckedChanged(CompoundButton buttonView,boolean isChecked) {if (isChecked) {cb.setText("This checkbox is: checked");}else {cb.setText("This checkbox is: unchecked");}}}Note that the activity serves as its own listener for checkbox state changes since it imple ments the OnCheckedChangeListener interface (via cb.setOnCheckedChangeListener(this)). The callback for the listener is onCheckedChanged(), which receives the checkbox whose state has changed and what the new state is. In this case, we update the text of the checkbox to reflect what the actual box contains.The result? Clicking the checkbox immediately updates its text, as you can see in Figures 6-4 and 6-5.Figure 6-4. The CheckBoxDemo sample application, with the checkbox uncheckedFigure 6-5. The same application, now with the checkbox checkedTurn the Radio UpAs with other implementations of radio buttons in other toolkits, Android’s radio buttons are two-state, like checkboxes, but can be grouped such that only one radio button in the group can be checked at any time.Like CheckBox, RadioButton inherits from CompoundButton, which in turn inherits fromTextView. Hence, all the standard TextView properties for font face, style, color, etc., are available for controlling the look of radio buttons. Similarly, you can call isChecked() on a RadioButton to see if it is selected, toggle() to select it, and so on, like you can with a CheckBox.Most times, you will want to put your RadioButton widgets inside of aRadioGroup. The RadioGroup indicates a set of radio buttons whose state is tied, meaning only one button out of the group can be selected at any time. If you assign an android:id to your RadioGroup in your XML layout, you can access the group from your Java code and invoke:• check() to check a specific radio button via its ID (e.g., group.check(R.id.radio1))• clearCheck() to clear all radio buttons, so none in the group are checked• getCheckedRadioButtonId() to get the ID of the currently-checked radio button (or -1 if none are checked)For example, from the Basic/RadioButton sample application, here is an XML layout showing a RadioGroup wrapping a set of RadioButton widgets: <?xml version="1.0" encoding="utf-8"?> <RadioGroupxmlns:android=/apk/res/androidandroid:orientation="vertical"android:layout_width="fill_parent"android:layout_height="fill_parent" ><RadioButton android:id="@+id/radio1"android:layout_width="wrap_content"android:layout_height="wrap_content"android:text="Rock" /><RadioButton android:id="@+id/radio2"android:layout_width="wrap_content"android:layout_height="wrap_content"android:text="Scissors" /><RadioButton android:id="@+id/radio3"android:layout_width="wrap_content"android:layout_height="wrap_content"android:text="Paper" /></RadioGroup>Figure 6-6 shows the result using the stock Android-generated Java forthe project and this layout.Figure 6-6. The RadioButtonDemo sample application Note that the radio button group is initially set to be completely unchecked at the outset. To pre-set one of the radio buttons to be checked, use either setChecked() on the RadioButton or check() on the RadioGroup from within your onCreate() callback in your activity.It’s Quite a ViewAll widgets, including the ones previously shown, extend View, and as such give all widgets an array of useful properties and methods beyond those already described.Useful PropertiesSome of the properties on View most likely to be used include:• Controls the focus sequence:• android:nextFocusDown• android:nextFocusLeft• android:nextFocusRight• android:nextFocusUp• android:visibility, which controls wheth er the widget is initially visible• android:background, which typically provides an RGB color value (e.g., #00FF00 for green) to serve as the background for the widgetUseful MethodsYou can toggle whether or not a widget is enabled via setEnabled() and see if it is enabled via isEnabled(). One common use pattern for this is to disable some widgets based on a CheckBox or RadioButton selection.You can give a widget focus via requestFocus() and see if it is focused via isFocused(). You might use this in concert with disabling widgets as previously mentioned, to ensure the proper widget has the focus once your disabling operation is complete.To help navigate the tree of widgets and containers that make up an activity’s overall view, you can use:• get Parent() to find the parent widget or container• findViewById() to find a child widget with a certain ID• getRootView() to get the root of the tree (e.g., what you provided to the activity via setContentView())Android 页面布局使用XML进行布局虽然纯粹通过Java代码在activity上创建和添加部件,在技术上是可行的,我们在第4章中做的一样,更常见的方法是使用一种基于XML的布局文件。
毕业论文外文翻译要求
外国文献翻译是撰写毕业论文的重要环节之一,下面是一份要求700字的毕业论文外文翻译要求:
1. 翻译时间: 需在规定时间内完成翻译任务,以确保毕业论文
后续工作的顺利进行。
2. 原文准确性: 翻译必须准确无误,不得对原文进行任何删节、增补或变动。
3. 语言流畅度: 翻译应当具有良好的语言流畅度,不得过于生
硬或呆板。
4. 专业术语准确性: 翻译时要确保专业术语的准确性,避免词
义的混淆。
5. 语法错误及标点符号: 翻译应符合英文的语法规范,避免语
法错误和标点符号的错误使用。
6. 翻译风格: 翻译应当符合学术论文的要求,措辞恰当,语气
客观中立。
7. 格式要求: 翻译部分应与论文正文的格式一致,包括字体、
字号、行间距等。
8. 校对: 完成翻译后,需要进行一次仔细的校对工作,确保翻
译的正确性。
9. 原文附录: 翻译部分要同时附上原文,以便审查人员对翻译的准确性进行核对。
10. 翻译文档: 翻译文档要以电子文档的形式提交,确保方便审查人员查看。
以上要求旨在保证翻译的质量和准确性,对于撰写毕业论文非常重要。
翻译过程中,建议使用专业的翻译工具,如翻译记忆软件、专业词典等,以提高翻译的效率和准确性。
同时,积极与导师和专业领域的人进行交流和讨论,以解决翻译中的问题和困惑。
外文原文ANALYSIS OF DATABASE PROGRAMMING IN VB VB (Visual Basic) is a visualization programming environment that Microsoft Corporation promotes based on the Basic language.It is simple and easy to study.It has formidable function so that many computer amateurs really like it.A lot of application softwares all use VB as the software development platform.When we use VB to develop the application software,how to use the database and carry on the management of the database is concerned by all exploiters.VB has provided many tools and methods for database programming.What method is used to visit the database depends on users’different demands,a simple analysis of the VB database programming is explained as followings.1.DAO TechnologyBy using Microsoft company’s Jet Database Engine (Jet database engine),DAO (Data Access Object) the technology mainly provides visit to ISAM (smooth index search method) type database,such as the realization of the visit to database like FoxPro,Access, Dbase.1.1 Use Data ControlsData controls are produced by using “Data” button in the toolbox.It has 3 basic attributes:Connect,Database Name and RecordSource.Connect attribute specifys the database type that data controls visit,the default database is the Access database.The value of the Database Name attribute is the database filename which contains the complete path.The Record Source attribute is the recordset that we visit,also can be tables or SQL sentences.If we will visit table stud of database file teacher mdb of TEMP folder under D plate,then Data controls’s Connect attribute is null,and the Database Name attribute is “D: \temp \ teacher mdb”,the value of the Record Source attribute is “stud”.This can accomplish the binding between Data controls and database records. Through the methods of Data controls like Add new,Update,Delete, Move last,we can visit the database as every request.When we browse the content in database,Data controlls is used frequently with DBGrid,it provides data inquiry in grid way.1.2 Use DAO Object StorehouseThe model of the DAO object storehouse is mainly using hierarchical structure, Dentine is the object in the topmost story,below it are two object sets,Errors and workspace, under the workspace object,is the Databases set.When the applicationprocedure quotes the DAO object storehouse,it produces only a Dentine object,and produces a default automatical working space object named workspace.When not mentioned,all database operations are all work in workspace(0),which is a default work area.But we must pay attention:The Jet engine will not starts automatically after VB has been loaded. Only when we choose References in the menu of Project can we select Microsoft DAO 3.5 Object Library to use.We create databases with the method “Create Database” in DAO,use “CreateTable” method to bulid tables,use the “Open Database ” to open the database ,use “Open recordset”method to open recordset,use Add new,Update,Delete,Move first,Edit methods to realize each kind of operations about tables.2.RDO TechnologyRDO provides a connection to related ODBC data pool.When we need to visit other databases like SQL Server,Oracle,especially to establish the customer/server application procedure,we may use the long range data controls RDC (Remote Data Control) and long range data objects RDO (Remote Data Control) to realize the visit to the database through the ODBC driver.By using ODBC to visit some database we must first install the corresponding drivers,like establish a data pool,through assigned data pool to visit corresponding database.To establish the ODBC data pool is open the window of “the control panel”, double-clicks the icon of ODBC executive program,single-click “Add” butt on to create the data pool of the opening ODBC data pool supervisor dialog box,and choose corresponding database.2.1 Use RDC ControlsSimilar to the use of DATA Controls, we use Data source name attributes to assign the data source name that controls bind,and we use SQL attributes to assign the recordset, The difference is that,we have to use the SQL sentences to assign the SQL attribute in RDC Controls . When we browse the database we may find it is used with DBGrid frequently.2.2 Use RDO Object StorehouseBefore we use RDO object,we should choose References in the menu of Project, click”Microsoft Remote Data Object 2.0”,then we can continue.The step we use RDO to visit the ODBC data pool is:(1) Set a RDO environment object.(2) Open an ODBC data pool with the method of Open connection.(3) Establish a result object with the method of Open Result set.(4) Use assigned method to operate the records of resultset.After founds the as this result collection object,is similar with the DAO object storehouse use,may through transfer method realizations and so on its Add new,Update, Delete visit to assign the data pool each kind of request.3.ADO TechnologyADO (ActiveX Data Objects) is the latest data access technology of Microsoft,It uses data accessing connection UDA (Universal Data Access),to standard all datas as a kind of data pool,through the filtration of OLEDB connection,transforms as a kind of general data format in the same way,enables the application procedure to visit this kind of datas.OLEDB is an underlying level of the data accessing connection,with it we may visit kinds of data pools,including traditional related databases,as well as electronic mail system and self-definition commercial object.3.1 Use ADO ControlsSingle-click the Components command in the menu of the Project,select “Microsoft ADO Data Control in the Components dialog box 6.0 (OLE DB)”,we may add ADO controls to the box of controls.We set the OLEDB Provider and assigned database file by setting the Connection string attribute of ADO,and we set the Record Source attribute as record source that ADO connected.Similar to DAO and RDO, with it, we are able to visit all kinds of database fastly.3.2 Use The ADO Object StorehouseSingle click the References orders in the Project menu, select “Microsoft ActiveX Data Objects 2.0 Library” in the References dialog box, you may add ADO object.Old object models, like DAO and RDO, are look like levels,a lower data object like Recordset is the sub-object of higher level objects like Environment and the Queried. But ADO is actually different, it defined a group of plane top object, the most importantADO objects are Connection, Recordset and Command.The Connection object is used to establish the connection of application procedure and the data pool.The Command object is used in defining a SQL sentence, a memory process or other commands that operates the datas.Recordset object preserves recordsets after executions.By using alternative means of the recordset object, we can modify,delete and inquire the recordset.4 ConclusionsVB provides many methods to accomplish the operation to the database, in which DAO mainly finish the visit to ISAM database, RDO provides connection to the ODBC data pool, both RDO and DAO have developed as matured technology.Before VB 6.0 ,the main technology is about database visit, however,the Active Data Objects(ADO) ,as new generation of database interface which is promoted by Microsoft, is designed to work with new data accessing level OLEDB, so that it provides general data accessing (Universal Data Access), it provides quite a lot advantages to the programmers, including easy use, the familiar contact surface, high velocity ,as well as the lower memory. As a result of above reasons, ADO will gradually replace other data accessing connections, and will becomes the fundamental mode of the VB of visit database.中文译文VB的数据库编程分析VB(Visual Basic)是微软公司推出的基于Basic语言的可视化编程环境,以其简单易学、功能强大而倍受广大电脑爱好者的青睐。
毕业设计外文翻译范例引言在大学生的学习生涯中,毕业设计是一项重要的任务。
它是对学生在大学期间所学知识的综合运用,也是对学生能力的一次全面考核。
外文翻译作为毕业设计的一部分,对于提高学生的英语水平和跨文化交流能力有着重要的作用。
本文将探讨毕业设计外文翻译的重要性、挑战以及解决方法。
毕业设计外文翻译的重要性外文翻译在毕业设计中具有重要的地位和作用。
首先,外文翻译可以帮助学生扩大知识面,并且了解国际上的研究动态和前沿技术。
通过翻译外文文献,学生可以学习到最新的研究成果和方法,为毕业设计提供参考和借鉴。
其次,外文翻译能够提高学生的英语水平。
通过翻译外文文献,学生可以锻炼自己的听、说、读、写能力,提高对英语的理解和应用能力。
在全球化的背景下,具备良好的英语能力对于学生的就业和未来发展具有重要意义。
最后,外文翻译可以培养学生的跨文化交流能力。
在进行外文翻译的过程中,学生需要了解不同文化背景下的表达方式和思维方式,从而更好地与其他文化背景的人进行沟通和交流。
这对于提高学生的跨文化合作能力和全球视野具有重要意义。
毕业设计外文翻译的挑战尽管毕业设计外文翻译具有重要的作用,但也面临一些挑战。
首先,外文翻译需要学生具备良好的英语水平和专业知识。
许多外文文献使用专业术语和复杂的句式,对学生的英语能力和专业知识提出了较高的要求。
同时,外文翻译还要求学生具备良好的分析能力和逻辑思维能力,能够准确理解和表达文献中的内容。
其次,外文翻译需要花费大量的时间和精力。
翻译一篇外文文献需要学生仔细阅读和理解原文,然后进行翻译和校对。
这个过程需要反复推敲和修正,耗费了学生大量的时间和精力。
在繁重的学业任务中,学生可能面临时间不足的问题,影响翻译质量和效率。
最后,外文翻译还可能面临文化差异和语言障碍。
不同的语言和文化有着不同的表达方式和思维方式,学生需要充分理解和融入到原文的语言和文化中,才能进行准确和恰当的翻译。
这对学生的跨文化交流能力提出了较高的要求。
外文原文Modern database managementThe database is become more and more huge, more and more complicated.Database already no longer only saving tradition up simple data type,such as character list, numeral, date etc., of structure, and return saving data type of the structure complications,such as audio frequency, video frequency, portrait, and mix with text file etc.;The need that increase increasingly that turn the processing to the business intelligence also just cause excesssive inflation of the data warehouse even lost control, the database therefore becomes to add more huge.The database of today is much more than only a saving data, return saving function in the process of the data.The saving process that the database management system control, trigger the machine, customer from the definition function etc. has become new contents within the database management.The database management system is was used for more situation, erupt to flick more functions.The database was place in compare the more diverse terrace before up, such as the large machine, medium-sized machine, work station, personal computer even handheld PC in.At the same time, expand continuously appliedly along with the electronic commerce, more and more databases and Internet connect with each other.The database management therefore became to add complications more.The all these put forward the new request towards being engaged in the modern database managing person of the database management.The work mode of the database management system(DBMS)Accept the data of the applied procedure claim and handle the claim.Become the dataclaim(deluxe instruction) conversion of the customer the complicated machine code(the low class instruction) realization to databaseOf operation, from to database of in operation accept the search result, logarithms according to as a result carry on the processing(format conversion), placeManage the result returns to the customer.Main function of the data management systemThe definition function of the database.The DBMS provides the mode DDL(the data of the description concept mode definition language) definition database Of x-rated structure, two classes reflect elephant, the integrity of the definition data control, keep secret the restrict etc. control.Therefore, in the DBMS Medium should include the DDL to edit and translate the procedure.The database manipulates the function.The DBMS provides the DML(the data manipulates the language) to carry out the logarithms according to of operation.Basic data The operation have two type:Inspect(search) and renewal.(include to put the person and delete, renew)Therefore, in the DBMS should Include the DML edits and translate the procedure or explains the procedure.According to the Class of the language, the DML can be divided into the process DML and non- processes again Sex DML is two kinds of.The protection function of the database.The protection of DBMS to database mainly passes four aspect realizations:1, the instauration of the database.. At the database was break or the data inaccuracy, the system contain a database of ability recover the right appearance.2, number Erupt the control according to the database.At several customer at the same time to same piece according to carry on the operation, the system should can take into the control Prevent from break data in the DB.3, complete sex control of data.In the assurance database the accuracy of the data and the language righteousness and have.Effect, prevent°from any logarithms according to result in the operation of the mistake.4, the data safety control.Prevent°from the customer of have not yet the authorization,Data within the access database, to avoid the data to reveal, change or break.The maintenance function of the database.This part includes the data of the database to carry the person and convert, turn to keep, the database reshuffle.And the function supervision etc. function.Data dictionary.It deposit the database of the x-rated structure definition to be called the number in the database system.According to the dictionary(DD).All wanting to pass to the operations of the database DD then can carry out.Still deposit the hour of the database movement in the DD of Statistics the information, for example record piece, interview number of times etc..The top is the function that the general DBMS have, usually at big, medium-sized compute the function of DBMS of the on board realization stronger and more whole, the function of DBMS carry out on the microcomputer is weaker.The DBMS the mold piece constitute . Observe from a structure of mold, the DBMS is constitute by the two greatest parts:Search the processor and saving management machines.Search the processor contain four main compositions:The DDL edits and translate the machine, the DML edits and translate the machine, person the type DML prepares to edit and translate the machine and searchesCirculate the core procedure.The saving management machine contain four main compositions:Legal power and complete sex management machine, the business management machine, document management machine and the buffer area management machine.A, Internet to the influence that database manage.At the contemporary, the application of the Internet is omnipresent, the influence that rarely have the business activity to be free from the Internet technique to fly to develop soon.Really, the electronic commerce and traditional business activities compare its property to have already taken place the very big change;The successful electronic commerce should always be on-line, all-weather, at any time wait for providing the service for the customer.The all these none is not the foundation that the establishment is managing the system with allied strong database of Internet on.The traditional database managing person is responsible for the movement, function of database only excellent to turn, and guarantee to carry out it as far as possible high can use bine withInternet, increased the job of the modern database managing person and the difficulty that it work doubtless.The first mission that they face shortens the database to stop using the period(downtime) with maximum limit.Stop using to expect to is divided into the plan to stop using outside with plan inside stop using.Plan the outside stops using to include hardware breakdown, the procedure mistake or virus etc.s;Plan inside stop using to then include the software upgrade, database modification and usually maintenance.The industry analyst calculate plan outside stop using to expect to be up to 80% is from the application software of the mistake of the breakdown and factitiousness is output, the breakdown of the hardware and the breakup of the operate systems combine to seldom see.This kind of stops using to expect to be take place in more multifariously to input the business by mistake, not the importation document or parameters that criticize the processing operation and use the mistake fittinglies circulate the procedure etc. situation next.These problems can pass to use the daily record and softwares to develop the relevant project that the company provide to be resolve;Adopt the high-speed business instauration project, may make break down at not affect the database and can use sex premise under can expel.Stop using to compare outside with the plan, plan inside stop using to take place more multifarious, can use sex influence to the database larger, as a result even need to get the database managing person's attention.The on-line database management should shorten to stop using the period as far as possible and had better avoid it take place.For example usually the database carries on the reorganization need the pause movement;But to on-line database, make use of the new technique and can reorganize the data to a mirror elephant to copy, exchange again to copy after complete, make database kept on-line always, avoided stop using the period occurrence.These new techniques still include the on-line backup of the database and add to carry.Sometimes still need the system parameter of modify the on-line database;Usually, must re- start the system after changing these parameters, but in the electronic commerce activity, this can't accept.Now applies the new technique, need not the heavy system of , reborn address space and can immediately complete the modification toward the system parameter.Another important method that shortens to stop using to expect is the automation that the database supports usually.For example, the change watch structure is not an easy work, usually causing the extension of stop using the period.Apply the database modification tool of the automation, can at not produce the big interference under carry on to the relation database to modify arbitrarily.This kind of tool can produce the script of oneself.This kind of automation avoided the occurrence of the mistake, shortenning to stop using the period, raised the on-line database and can use sex biggest.While stopping using to expect and can'ting avoid, should complete the mission to shorten by make an effort to stop using the period as soon as possible.The possibly applied speed is quickest and come amiss the minimal technique, for example, when come from the third square's instauration, add to carry and reorganize the technique if consume the traditionaldatabase to complete the same work only need time of 1/3-1/2, then can consider to transplant this technique.Stopping using to expect allly not can avoid, for example the breakdown of the saving chip or the disk actuator.The occurrence that hardware break down can't predict.Pass the saving or automatic backup of redundancy may avoid some breakdowns result in of lose, but hard remove this kind of occurrence of problem completely.At this time, the beard adopts the instauration tool possibly, shortenning to stop using the period against time.Stop using unique problem that expect not modern database managing person's face.They still request to control the Java.Java main advantage is it can transplant sex, can make the procedure that the developer plait write circulate but did not need the characteristic of consider the hardware or operate system on any terrace.The Java is suitable for to create the dynamic state with the alternant page of Web.Executive procedure of Java on the Web, be called the applets, can download to combine the au to carry out automatically.Java still a kind of not be depend on in the Web of, can used for all-purpose plait distance language that develops the general applied procedure.Along with the Internet applied increasingly extensive, the Java will spread more.In recent years the Java is on the application of increase to almost carry on synchronously with the growth of the electronic commerce e the Web of the Java development application procedure, all is related with the interview of the database generally.So be the database the managing person must control Java basic knowledge at least.Most database managing persons all participated the database to apply the design of the procedure or adjust to try.Develop the company successfully before push the software product toward market always insure all procedure codes to get the full test and valuation.The test valuation insured the efficiency, result and applicabilities of the procedure.Most experts think the database application procedure the problem take place in the movement contain 70-80% write because of the SQL not appropriate cause with the logic mistake.Converting into the merchandise to go forward to go the valuation in the procedure is wise.If a database managing person does not understand the Java, then can't participate the procedure to adjust to try with excellent turn the match of the applied procedure and the relation database.The Java is popular of another a reason is it can strengthen the applied procedure and can use sex.The plait write the good procedure of Java to need to be edit and translate, but edit and translate the machine output's is not pure and can carry out the code, but byte code of Java.The byte code of Java is explained the performance by the Virtual Machine of Java, the different terrace have each from of Virtual Machine of Java.The code of Java can be the application a part of the procedure to circulate, can't to apply the procedure creation influence because the variety of the code of Java.Exactly by this kind of, the Java strengthenned the applied procedure and can use sex.In addition, the Java simplified the complicated renewal process of applied procedure, and make applied procedure of customer/ server in the dynamic state chain connects thedocument(DLL) to release and manage to become to be easy to carry on.Because the procedure of Java needs the solid hour to explain and then can carry out, its speed want to be slow doubtless in edit and translate a procedure.The adoption edits and translate the machine technique(JIT) or the high performance Javas to edit and translate the performance speed that the machine(HPJ) can raise the procedure of Java immediately.Applied technique of JIT, the byte code can edit and translate for the machine code first in the terrace that make selection, this movement that can accelerate the procedure of Java.But the technique of JIT is still a kind of explain the process, so slow in edit and translate a speed of procedure.The applied HPJ edit and translate the machine and can convert byte code real machine code, explain the depletion of the byte code while avoiding circulate.But the JIT or HPJs didn't°yet get the complete support of Java.The modern database managing person returns the beard how the understanding use the interview database of Java.Have the JDBC and SQLJ two kinds of methods with the Java interview database.The JDBC is the applied plait distance of the Java interview relation database to connect, similar in ODBC, include a series of type and connect.Any persons who acquaint with the applied plait distance and ODBC can very quickly master the JDBC.The JDBC provided the SQL interview relation database of the dynamic e the JDBC for the applied procedure that a kind of terrace weave to write, can be apply in other terraces.The JDBC of the adoption exactitude drives the procedure, application the procedure should can transplant.The SQLJ provided for the Java inside the SQL of the static state that plant.Translate the machine must use the processing Java procedure of SQLJ.To DB2 governor, this like prepare to edit and translate the procedure of COBOL.All databases provide the company with same in general use translation machine of the plan adoption.Translate the machine to separate the SQL language sentence and make it excellent to turn into the mold piece that database request from the code of Java.Also can increase the code of Java to adjust to use to the SQL by act for in the procedure of Java.Now the whole procedure can edit and translate for the byte code, and pass to bind to settle for the born pack of SQL.Should basis concrete circumstance choice adoption JDBC or SQLJ.The SQLJ can pass the efficiency that the SQL of the usage static state strengthens the procedure performance, this may have the important meaning to Java.The procedure of SQL that SQLJ is similar to transplant, the JDBC is similar then in adjust to connect a people's procedure with the class.The developer the other party method acquaints with the degree is also a factor that need to be consider.The applied Java is before develop, database the managing person must control the Java, and comprehend the JDBD and SQLJ differentiations.Two, the process management of the database.In addition to develop save, the core functions such as management and the interview data etc., the modern database management system still provided the additional function, integrating theprocess logic.The process logic of the typical model includes the saving process and triggers the machine, customer from the definition function, they manage the system with database to combine very close.The managing person of the database needs to carry on the management, design to these new functions, operation.Sometimes database the managing person also undertakes the mission of code these objects, but this always is not the best solution.The saving process can be think is a database management system in live procedure.The saving process transfered applied procedure code from customer's work station database server.A process with saving SQL can include several SQL language sentences.Change the quantity and conditions through an usage, can use the saving process to build up the very huge but complicated search, with the very complicated way renewal database.The saving process performance speed is quick, and after carrying out for the first time, they passed by in the database excellent turn and edit and translate to keep to save slowly in the high speed keep both in, be the customer sends out the performance again saving process of claim, can direct from the high speed saves slowly in the performance, the province went to excellent turn and edit and translate the stage, save to carry out a great deal of time of the process, and reduced the network the correspondence quantity.Trigger the machine is saving to manage the process that affairs in the system drive in the database, belonging to the particular form.Trigger the machine can be see make is deluxe form of the rule or engagement that writes with the process logic.It can't be adjusted to use or carry out directly, but the result that be the behavior is managed the system by the database to carry out automatically of.Once some on triggering the machine to is establish, always at satisfy the renewal and insert, delete etc. the condition of the occurrence carry out.Customer from the definition function is the commutability standard of, inside place of the procedure of the SQL function performance.The customer provides from the definition function according to the result that a series input the value, can the elephant is any inside place of function of SQL is similar to be used for SQL language sentence in.Saving process, trigger the machine, customer are similar to be managed the system control by the database like other database objects of form, index...etc. from the definition function.But they are processes rather than avowal, so again different from the latter have.These object whether the physics ground halts to stay to manage in the database in the system, managing the dissimilarity but the dissimilarity of the system according to the database.But they were always register to manage the system in the database, and keep with it of connection.The main reason of the applied process logic replies for the sake of the exaltation with sex.Their manies of commutability apply the repetition in the procedure code, halting to stay in same position of the database server.This may make lately applied procedure of development of workload has the decrease, and kept coherent sex of the applied procedure.If all apply to many operations of database the process logicrather than several codes of repetition segment, then can insure to operate each time all at carry out the same code.Saving process, trigger the machine, customer from the definition function the function that etc. provide is important doubtless, but they alsoed give management bring the difficulty.The managing person need know when and how carry on the test to them.The management data object is the managing person's basic mission, but can't the expectation data and database the expert will adjust to try out the C, COBOL even the function and the procedure that the SQL plait write.Although many companies request the database, the managing person is the expert of SQL also, usually they are really not so.But the modern database managing person must adapt the management to the process logic, this request has the knowledge of the both side of the database and the plait distance, although don't request to participate to weave the distance, shoulds lead the evaluation to the code at least to combine the usage toward the database process logic to carry on the management.《Modern database management》Prentice Hall; 6 edition,2002中文翻译JSP相关技术Sun公司的Java Servlet平台直接解决了CGI程序的两个主要缺点。
外文翻译:Software and software engineering ----the software appearance and enumeratesAs the decade of the 1980s began, a front page story in business week magazine trumpeted the following headline:” software: the new driving force.”software had come of age—it had become a topic for management concern. during the mid-1980s,a cover story in foreune lamented “A Growing Gap in Software,”and at the close of the decade, business week warned managers about”the Software Trap—Automate or else.”As the 1990s dawned , a feature story in Newsweek asked ”Can We Trust Our Software? ”and The wall street journal related a major software company’s travails with a front page article entitled “Creating New Software Was an Agonizing Task …” these headlines, and many others like them, were a harbinger of a new understanding of the importance of computer software ---- the opportunities that it offers and the dangers that it poses.Software has now surpassed hardware as the key to the success of many computer-based systems. Whether a computer is used to run a business, control a product, or enable a system , software is the factor that differentiates . The completeness and timeliness of information provided by software (and related databases) differentiate one company from its competitors. The design and “human friendliness” of a software product differentiate it from competing products with an otherwise similar function .The intelligence and function provided by embedded software often differentiate two similar industrial or consumer products. It is software that can make the difference.During the first three decades of the computing era, the primary challenge was to develop computer hardware that reduced the cost of processing and storing data .Throughout the decade of the 1980s,advances in microelectronics resulted in more computing power at increasingly lower cost. Today, the problem is different .The primary challenge during the 1990s is to improve thequality ( and reduce the cost ) of computer-based solutions- solutions that are implemented with software.The power of a 1980s-era mainframe computer is available now on a desk top. The awesome processing and storage capabilities of modern hardware represent computing potential. Software is the mechanism that enables us to harness and tap this potential.The context in which software has been developed is closely coupled to almost five decades of computer system evolution. Better hardware performance, smaller size and lower cost have precipitated more sophisticated computer-based syst ems. We’re moved form vacuum tube processors to microelectronic devices that are capable of processing 200 million connections per second .In popular books on “the computer revolution,”Osborne characterized a “new industrial revolution,” Toffer called the advent of microelectronics part of “the third wave of change” in human history , and Naisbitt predicted that the transformation from an industrial society to an “information society” will have a profound impact on our lives. Feigenbaum and McCorduck suggested that information and knowledge will be the focal point for power in the twenty-first century, and Stoll argued that the “ electronic community” created by networks and software is the key to knowledge interchange throughout the world . As the 1990s began , Toffler described a “power shift” in which old power structures( governmental, educational, industrial, economic, and military) will disintegrate as computers and software lead to a “democratization of knowledge.”Figure 1-1 depicts the evolution of software within the context of. computer-based system application areas. During the early years of computer system development, hardware underwent continual change while software was viewed by many as an afterthought. Computer programming was a "seat-of-the-pants" art for which few systematic methods existed. Software development was virtually unmanaged--until schedules slipped or costs began to escalate. During this period, abatch orientation was used for most systems. Notable exceptions were interactive systems such as the early American Airlines reservation system and real-time defense-orientedsystems such as SAGE. For the most part, however, hardware was dedicated to the union of, a single program that in turn was dedicated to a specific application.Evolution of softwareDuring the early years, general-purpose hardware became commonplace. Software, on the other hand, was custom-designed for each application and had a relatively limited distribution. Product software(i.e., programs developed to be sold to one or more customers) was in its infancy . Most software was developed and ultimately used by the same person or organization. You wrote it, you got it running , and if it failed, you fixed it. Because job mobility was low , managers could rest assured that you’d be there when bugs were encountered.Because of this personalized software environment, design was an implicit process performed in one’s head, and action was often nonexistent. During the early years we learned much about the implementation of computer-based systems, but relatively little about computer system engineering .In fairness , however , we must acknowledge the many outstanding computer-based systems that were developed during this era. Some of these remain in use today and provide landmark achievements that continue to justify admiration.The second era of computer system evolution (Figure 1.1) spanned the decade from themid-1960s to the late 1970s. Multiprogramming and multiuse systems introduced new concepts of human-machine interaction. Interactive techniques opened a new world of applications and new levels of hardware and software sophistication . Real-time systems could collect, analyze, and transform data form multiple sources , thereby controlling processes and producing output in milliseconds rather than minutes . Advances in on-line storage led to the first generation of database management systems.The second era was also characterized by the use of product software and the advent of "software houses." Software was developed for widespread distribution in a multidisciplinary market. Programs for mainframes and minicomputers were distributed to hundreds and sometimesthousands of users. Entrepreneurs from industry, government, and academia broke away to "develop the ultimate software package" and earn a bundle of money.As the number of computer-based systems grew, libraries of computer software began to expand. In-house development projects produced tens of thousands of program source statements. Software products purchased from the outside added hundreds of thousands of new statements. A dark cloud appeared on the horizon. All of these programs--all of these source statements-had to be corrected when faults were detected, modified as user requirements changed, or adapted to new hardware that was purchased. These activities were collectively called software maintenance. Effort spent on software maintenance began to absorb resources at an alarming rate.Worse yet, the personalized nature of many programs made them virtually unmentionable. A "software crisis" loomed on the horizon.The third era of computer system evolution began in the mid-1970s and continues today. The distributed system--multiple computers, each performing functions concurrently and communicating with one another- greatly increased the complexity of computer-based systems. Global and local area networks, high-bandwidth digital communications, and increasing demands for 'instantaneous' data access put heavy demands on software developers.The third era has also been characterized by the advent and widespread use of microprocessors, personal computers, and powerful desk-top workstations. The microprocessor has spawned a wide array of intelligent products-from automobiles to microwave ovens, from industrial robots to blood serum diagnostic equipment. In many cases, software technology is being integrated into products by technical staff who understand hardware but are often novices in software development.The personal computer has been the catalyst for the growth of many software companies. While the software companies of the second era sold hundreds or thousands of copies of their programs, the software companies of the third era sell tens and even hundreds of thousands of copies. Personal computer hardware is rapidly becoming a commodity, while software provides the differentiating characteristic. In fact, as the rate of personal computer sales growth flattened during the mid-1980s, software-product sales continued to grow. Many people in industry and at home spent more money on software than they did to purchase the computer on which the software would run.The fourth era in computer software is just beginning. Object-oriented technologies (Chapters 8 and 12) are rapidly displacing more conventional software development approaches in many application areas. Authors such as Feigenbaum and McCorduck [FEI83] and Allman [ALL89] predict that "fifth-generation" computers, radically different computing architectures, and their related software will have a profound impact on the balance of political and industrial power throughout the world. Already, "fourth-generation" techniques for software development (discussed later in this chapter) are changing the manner in which some segments of the software community build computer programs. Expert systems and artificial intelligence software has finally moved from the laboratory into practical application for wide-ranging problems in the real world. Artificial neural network software has opened exciting possibilities for pattern recognition and human-like information processing abilities.As we move into the fourth era, the problems associated with computer software continue to intensify:Hardware sophistication has outpaced our ability to build software to tap hardware's potential.Our ability to build new programs cannot keep pace with the demand for new programs.Our ability to maintain existing programs is threatened by poor design and inadequate resources.In response to these problems, software engineering practices--the topic to which this book is dedicated--are being adopted throughout the industry.An Industry PerspectiveIn the early days of computing, computer-based systems were developed usinghardware-oriented management. Project managers focused on hardware because it was the single largest budget item for system development. To control hardware costs, managers instituted formal controls and technical standards. They demanded thorough analysis and design before something was built. They measured the process to determine where improvements could be made. Stated simply, they applied the controls, methods, and tools that we recognize as hardware engineering. Sadly, software was often little more than an afterthought.In the early days, programming was viewed as an "art form." Few formal methods existed and fewer people used them. The programmer often learned his or her craft by trial and error. The jargon and challenges of building computer software created a mystique that few managers cared to penetrate. The software world was virtually undisciplined--and many practitioners of the clay loved it!Today, the distribution of costs for the development of computer-based systems has changed dramatically. Software, rather than hardware, is often the largest single cost item. For the past decade managers and many technical practitioners have asked the following questions: Why does it take so long to get programs finished?Why are costs so high?Why can't we find all errors before we give the software to our customers?Why do we have difficulty in measuring progress as software is being developed?These, and many other’ questions, are a manifestation of the concern about software and the manner in which it is developed--a concern that has tend to the adoption of software engineering practices.译文:软件和软件工程——软件的出现及列举在二十世纪八十年代的前十年开始的时候, 在商业周刊杂志里一个头版故事大声宣扬以下标题:“软件,我们新的驱动力!”软件带来了一个时代------它成为了一个大家关心的主题。
一、外文翻译的方法及相关查找方向一、关于材料范围:毕业论文中的外文翻译材料,能与论文主题一致最好,若实在找不到切题的原材料,找与论文主题相关的材料亦可。
如毕业论文题目是《我国工伤事故认定的法律实证分析》,外文材料可以是关于工伤、社会保险、劳工法(劳动法)方面的;毕业论文题目是《从“有偿新闻”看我国的新闻立法》,外文材料可以是新闻法、民法方面的;毕业论文题目是《沈家本的“参考古今、博稽中外”的修律思想》,外文材料可以是有关中国法制史、法律思想史的方面的。
特别注意:1、翻译材料首先必须是法律、法学方面的。
2、中文译文已出版发表过的材料不要选。
诸如梅因《古代法》、贝卡利亚《论犯罪与刑罚》等,此外,网上有中外文对照的不要选。
因为这时的翻译要么是抄袭,要么是吃力不讨好。
3、篇幅在3000单词左右。
二、到哪里去找所要的外文原文?可尝试以下途径:1、直接找外文报刊和教材。
如China Daily,21st Century,Times等报纸(有法律法制专栏或法律法学文章);“美国法精要影印本”(多卷本的系列版物,中国法律出版社出版);各类外文版专业教材;各类“法律英语”教材(教材本身应没有中文译文)等等。
上述文献并不难获得。
2、到图书馆获取。
到图书馆外文图书阅览室或外文报刊阅览室查找相关图书或报刊,再确定所要翻译的部分,最后复印下来。
可以先在电脑中输入关键词(最好用law,act,jurisprudence,proceeding等外延较广的词)进行检索。
最好是多请教在阅览室值班的老师,对于学生,他们是文献专家。
3、到网上获取。
方式特多:可在各大搜索引擎(baidu,google等)中用关键词检索;可在相关网站中获得:如各法律法学专业网站,国外各大学法学院网站(如),等等。
可在著名外文文献数据中获得。
这些数据库有综合性外文文献数据库,如“Springerlink外文期刊全文”、“Kluwer Online 全文数据库”、“Wiley外文电子期刊”、“EBSCOhost期刊全文数据库”;有外文法律专业文献数据库,如“westlaw数据库”。
本科毕业论文外文文献及译文文献、资料题目: Zero Inventory Approach 文献、资料来源: The IUP Journal of SupplyChain Management文献、资料发表(出版)日期: 2012.06院(部):软件学院专业:软件工程班级:姓名:学号:指导教师:翻译日期:2016.5外文文献:Zero Inventory ApproachManaging optimal inventory in the supply chain is critical for an enterprise. The ability to increase inventory turns and the use of best inventory practices will reduce inventory costs across the supply chain. Moving towards zero inventory will result in effective inventory management in the business process. Inventory Optimization Solutions can be implemented easily using inventory optimization software. With Radio Frequency Identification (RFID) technology, inventory can be updated in real time without product movement, scanning or human involvement. Companies have to adopt best practices to optimize operational processes and lower their cost structure through inventory strategies.IntroductionWith supply chain planning and latest software, companies are managing their inventory in the best possible manner, keeping inventory holdings to the minimum without sacrificing the customer service needs. The zero inventory concept has been around since the 1980s. It tries to reduce inventory to a minimum and enhances profit margins by reducing the need for warehousing and expenses related to it.The concept of a supply chain is to have items flowing from one stage of supply to the next, both within the business and outside, in a seamless fashion. Any stock in the system is caused by either delay between the processes (demand, distribution, transfer, recording and production) or by the variation in the flow. Eliminating/reducing stock can be achieved by: linking processes, making the same throughput rate on processes, locating processes near each other and coordinating flows. Recent advanced software has made zero inventory strategy executable."Inventory optimization is an emerging practical approach to balancing investment and service-level goals over a very large assortment of Stock-Keeping Units (SKUS). In contrast to traditional ‘one-at-a-time’ marginal stock level setting, inventory optimization simultaneously determines all SKU stock levels to fulfill total service and investment constraints or objectives".Inventory optimization techniques provide a new logic to drive the system with information systems. To effectively manage inventory, businesses must also optimize thecosts of buying, holding, producing, moving and selling inventory.The objective of inventory optimization is to sustain minimal levels of inventory while providing the maximum possible levels of service. Supply Chain Design and Optimization (SCDO) is an inventory optimization solution which helps companies satisfy customer demands while balancing limitations on supply and the need for operational efficiency. Inventory optimization focuses on modeling uncertainty and variability and minimizing the risks they impose on the supply chain.Inventory optimization can help resolve total supply chain cost options like:•In-house manufacturing vs. contract manufacturing;•Domestic vs. off shore;•New supplier's cost vs. current suppliers' cost.Companies can benefit from inventory optimization, provided they control their supply chain processes and the complexity of supply chain. In case the supply chain is very complex, besides inventory optimization, network design has to be used to reap the benefits fully. This paper covers various inventory models that are available and then describes the technologies like Radio Frequency Identification (RFID) and networking used for the optimization of inventory. The paper also describes the software solutions available for achieving the same. It concludes by giving a few examples where inventory optimization has been successfully implemented.Inventory ModelsHexagon ModelThe hexagon model was developed due to the need to structure day-to-day work, reduce headcount and other inventory costs and improve customer satisfaction.In the first phase, operation strategies were established in alignment with inte-rnal customers. Later, continuous improvement plans and business continuity pl-ans were added. The five strategies used were: forecasting future consumption,setting financial targets to minimize inventory costs, preparing daily reports to monitor inventory operational performance,studying critical success indicators to track the accomplishments, to form inventory strategic objectives and inventor-y health and operating strategies. The hexagon model is a combination of two triangular structures (Figure 1).The upper triangle focuses on the soft management of human resources, customer orientation and supplier relations; the lower focuses on the execution of inventory plans with their success criteria, continuous improvement methodology and business continuity plans.The inventory indicators are: total inventory value, availability of spares, days of inventory, cost of inventory, cost saving and cash saving output expen-diture and quality improvement. The hexagon model combines the elements of the people involved in managing inventory with operational excellence (Figur2).Managing inventory with operational excellence was achieved by reducing the number of employees in the material department, changing the mix of people skills such as introducing engineering into the department structure and reducing the cost of ownership of the material department to the operation that it supports.Normally, this is implemented with reduction in headcount of material department, having less people with engineering skills in the department. Operation results include, improvement in raw material supply line quality indicators, competitive days of inventory and improved and stabilized spares availability. And the financial results include, increase in cost savings and reduced cost of inventory. It can be established by outsourcing some of the inventory functions as required. The level of efficiency of the inventory managed can be measured to a specific risk level, changing requirements or changes in the environment. Just-In-Time (JIT)Just-in-time (JIT) inventory system is a concept developed by the Japanese, wherein, the suppliers deliver the materials to the factory JIT for their processing, eliminating the need for storage and retrieval. The rate of output and the rate of supply of inputs are synchronized, to manage a zero inventory.The main benefits of JIT are: set up times are significantly reduced in the factory, the flow of goods from warehouse to shelves improves, employees who possess multiple skills are utilized more efficiently, better consistency of scheduling and consistency of employee work hours, increased emphasis on supplier relationships and continuous round the clock supplies keeping workers productive and businesses focused on turnover.And though a JIT system might even be a necessity, given the inventory demands of certain business types, its many advantages are realized only when some significant risks likedelays in movement of goods over long distances are mitigated.Vendor-Managed Inventory (VMI)Vendor-Managed Inventory (VMI) is a planning and management system in which the vendor is responsible for maintaining the customer’s inventory levels. VMI is defined as a process or mechanism where the supplier creates the purchase orders based on the demand information. VMI is a combination of e-commerce, software and people. It has resulted in the dramatic reduction of inventory across the supply chain. VMI is categorized in the real world as collaboration, automation and cost transference.The main objectives of VMI are better, cheaper and faster transactions. In order to establish the VMI process,management commitment,data synchronization,setting up agreements,data exchange, ordering, invoice matching and measurement have to be undertaken.The benefits of VMI to an organization are reduction in inventory besides reduction of stock-outs and increase in customer satisfaction. Accurate information which is required for optimizing the supply chain is facilitated by efficient transfer of information. The concept of VMI would be successful only when there is trust between the organization and its suppliers as all the demand information is available to the suppliers which can be revealed to the competitors. VMI optimizes inventory in supply chain and reduces stock-outs by proper planning and centralized forecasting.Consignment ModelConsignment inventory model is an extension of VMI where the vendor places inventory at the custome r’s location while retaining ownership of the inventory.The consignment inventory model works best in the case of new and unproven products where there is a high degree of demand uncertainty, highly expensive products and service parts for critical equipment. The types of consignment inventory ownership transfer models are: pay as sold during a pre-defined period, ownership changes after a pre-defined period, and order to order consignment.The issues that the VMI and consignment inventory model encounter are cost of developing VMI system, invoicing problems, cash flow problems, Electronic Data Interchange (EDI) problems and obsolete stock.Enabling PracticesThe decision makers have to make prudent decisions on future course of action of a project relating to the following variables: Forecasting and Inventory Management,Inventory Management practices,Inventory Planning,Optimal purchase, Multichannel Inventory, Moving towards zero inventory.To improve inventory management for better forecasting, the 14 best practices that will most likely benefit business the most are:•Synchronize promotions;•Revamp the organizational structure;•Take a longer view of item planning;•Enforce vendor compliance;•Track key inventory metrics;•Select the right systems;•Master the art of master scheduling;•Adhere to exception reporting;•Identify lost demands;•Plan by assortment;•Track inbound receipts;•Create coverage reports;•Balance under stock/overstock; and•Optimize SKUs.This will leverage the retailer’s ability to buy larger quantities across all channels while buying only what is required for a specified period in order to manage risk in a better way. In most multichannel companies, inventory is the largest asset on the balance sheet, which means that their profitability will be determined to a large degree by the way they plan, forecast, and manage inventory (Curt Barry, 2007). They can follow some steps like creating a strategy, integrating planning and forecasting, equipping with the best-laid plans and building strong vendor relationships and effective liquidation.Moving Towards Zero InventoryAt the fore is the development and widespread adoption of nimble, sophisticated software systems such as Manufacturing Resource Planning (MRP II), Enterprise Resource Planning(ERP), and Advanced Planning and Scheduling (APS) systems, as well as dedicated supply chain management software systems. These systems offer manufacturers greater functionality. To implement ‘Zero Stock’ system, companies need to have a good information system to handle customer orders, sub-contractor orders, product inventory and all issues related to production. If the company has no IT infrastructure, it will need to build it from the scratch.A good information system can help managers to get accurate data and make strategic decisions. IT infrastructure is not a cost, but an investment. A company can use RFID method, network inventory and other software tools for inventory optimization.Radio Frequency Identification (RFID)RFID is an automatic identification method, which relies on storing and remotely retrieving data using devices called RFID tags or transponders.RFID use in enterprise supply chain management increases the efficiency of inventory tracking and management. RFID application develops asset utilization by tracking reusable assets and provides visibility, improves quality control by tagging raw material, work-in-progress, and finished goods inventory, improves production execution and supply chain performance by providing accurate, timely and detailed information to enterprise resource planning and manufacturing execution system.The status of inventory can be obtained automatically by using RFID. There are many benefits of using RFID such as reduced inventory, reduced time, reduced errors, accessibility increase, high security, etc.Network InventoryA Network Inventory Management System (NIMS) tracks movement of items across the system and thus can locate malfunctioning equipment/process and provide information required to diagnose and correct problem areas. It also determines where capacity is to be added, calculates impact of market conditions, assesses impact of new products and the impact of a new customer. NIMS is very important when the complexity of a supply chain is high. It determines the manufacturing and distribution strategies for the future. It should take into consideration production, location, inventory and transportation.The NIMS software, including asset configuration information and change management, is an essential component of robust network management architecture.NIMS provideinformation that administrators can use to improve network management performance and help develop effective network asset control processes.A network inventory solution manages network resource information for multiple network technologies as well as multiple vendors in one common accurate database. It is an extremely useful tool for improving several operation processes, such as resource trouble management, service assurance, network planning and provisioning, field maintenance and spare parts management.The NIMS software, including asset configuration information and change management, is an essential component of strong network management architecture. In addition, software tools that provide planning, design and life cycle management for network assets should prominently appear on enterprise radar screens.Inventory Optimization Softwarei2 Inventory Optimizationi2 solutions enable customers to realize top and bottom-line benefits through the use of superior inventory management practices. i2 Inventory Optimization can help companies monitor, manage, and optimize strategies to decide—what to make, what to buy and from whom, what inventories to carry, where, in what form and how much—across the supply chain. It enables customers to learn and continuously improve inventory management policies and processes, strategic analysis and optimization.Product-oriented industry can install i2 Inventory Optimization and develop supply chain. Through this, the company can reduce inventory levels and overall logistics costs. It can also get higher service level performance, greater customer satisfaction, improved asset utilization, accelerated inventory turns, better product availability, reduced risk, and more precise and comprehensive supply chain visibility.Oracle Inventory OptimizationOracle Inventory Optimization considers the demand, supply, constraints and variability in extended supply chain to optimize strategic inventory investment decisions. It allows retailers to provide higher service levels to customers at a lower total cost. Oracle Inventory Optimization is part of the Oracle e-Business Suite, an integrated set of applications that are engineered to work together.Oracle Inventory Optimization provides solutions when demandand supply are in ambiguity. It provides graphic representation of the plan. It calculates cost and risk.MRO SoftwareMRO Software (now a part of IBM's Tivoli software business) announced a marketing alliance with inventory optimization specialists Xtivity to enhance the service offering of inventory management solutions for MRO Software customers. MRO offers Xtivity's Inventory Optimizer (XIO) service as an extension of its asset and service management solutions.Structured Query Language (SQL)Successful implementation of an inventory optimization solution requires significant effort and can pose certain risks to companies implementing such solutions. Structured Query Language (SQL) can be used on a common ERP platform. An optimal inventory policy can be determined by using it. Along with it, other metrics such as projected inventory levels, projected backlogs and their confidence bands can also be calculated. The only drawback of this method is that it may not be possible to obtain quick real-time results because of architectural and algorithmic complexity. However, potential scenarios can be analyzed in anticipation of results stored prior to user requests.Some ExamplesToyota’s Practice in IndiaToyota, a quality conscious company working towards zero inventory has selected Mitsui and Transport Corporation of India Ltd. (TCI) for their entire logistic solutions encompassing planning, transportation, warehousing, distribution and MIS and related documentation. Infrastructure is a bottleneck that continues to dog economic growth in India. Transystem renders services like procurement, consolidation and transportation of original equipment manufacturer's parts, through milk run operations from various suppliers all over India on a JIT basis, transportation of Complete Built-up Units (CBU) from plant to all dealers in the country and operation of CBU yards, coordination and transportation of Knock Down (KD) parts from port of entry to manufacturing plant, transportation of aftermarket parts to dealers by road and air to Toyota Kirloskar Motors Pvt. Ltd.Wal-MartWal-Mart is the largest retailer in the United States, with an estimated 20% of the retail grocery and consumables business, as well as the largest toy seller in the US, with an estimated 22% share of the toy market. Wal-Mart also operates in Argentina, Brazil, Canada, Japan, Mexico, Puerto Rico and UK.Wal-Mart keeps close track of the inventories by extensively adopting vendor-managed inventory to streamline the flow of goods from manufacturer to the store shelf. This results in more turns and therefore fewer inventories.Wal-Mart is an early adopter of RFID to monitor the movement of stocks in different stages of supply chain. The company keeps tabs on all of its merchandize by outfitting its products with RFID.Wal-Mart has indicated recently that it is moving towards the aggressive theoretical zero inventory model.Chordus Inc.Chordus Inc. has the largest division of office furniture in USA. It has advanced logistics and a model of zero inventory. It has Internet-based system for distribution network with real-time updates and low costs. Chordus determined that only SAP R/3 could accommodate this cutting-edge operational model for its network of 150 dealer-owned franchises in 44 states supported by five nationwide Distribution Centers (DCs) and a fleet of 65 delivery trucks. Small Scale Cycle Industry Around LudhianaIn and around Ludhiana, there are many small bicycle units, which are not organized.They have a sharp focus on financial and raw material management enjoying a low employee turnover. They have been practicing zero inventory models which became popular in Japan only much later. Raw material is brought into the unit in the morning, processed during the day and by evening the finished product is passed on to the next unit. Thus, the chain continues till the ultimate finished product is manufactured. In this way, the bicycles used to be produced in Ludhiana at half the production cost of TI Cycles. Even the large manufacturers of cycles, like Hero cycles, Atlas cycles and Avon cycles are reported to maintain only one week's inventory.ConclusionInventory managers are faced with high service-level requirements and many SKUsappreciate the complexity of inventory optimization, as well as the explicit control that is needed over total investment in warehousing, moving and logistics. Inventory optimization can provide both an enormous performance improvement for the supply chain and ongoing continuous improvements over competitors. The company achieves the stability needed to have enough stock to meet unpredictable demands without wasteful allocation of capital. Having the right amount of stock in the right place at the right time improves customer satisfaction, market share and bottom line. Certainly, the organizations that are able to take inventory optimization to the enterprise level will reap greater benefits. Zero inventory may be wishful thinking, but embracing new technologies and processes to manage one's inventory more efficiently could move one much closer to that ideal.中文译文:零库存方法对于一个企业来说,在供应链中优化库存管理是至关重要的。
专业硕士学位论文电子邮件信息挖掘系统的设计与实现The Design and Implementation of E-mail Information Mining System作者:xx导师:xxxx2014年5月学位论文版权使用授权书本学位论文作者完全了解xx有关保留、使用学位论文的规定。
特授权xx可以将学位论文的全部或部分内容编入有关数据库进行检索,提供阅览服务,并采用影印、缩印或扫描等复制手段保存、汇编以供查阅和借阅。
同意学校向国家有关部门或机构送交论文的复印件和磁盘。
学校可以为存在馆际合作关系的兄弟高校用户提供文献传递服务和交换服务。
(保密的学位论文在解密后适用本授权说明)学位论文作者签名:导师签名:签字日期:年月日签字日期:年月日中图分类号:TP311.5 UDC:004.41学校代码:10004密级:公开xx专业硕士学位论文电子邮件信息挖掘系统的设计与实现The Design and Implementation of E-mailInformation Mining System作者姓名:xx 学号:12126082 导师姓名:xx 职称:教授工程领域:软件工程学位级别:硕士xx2014年5月致谢本论文的工作是在我的导师xx教授的悉心指导下完成的,两年来林老师严谨的治学态度和科学的工作方法给了我极大的帮助和影响。
在此衷心感谢林老师一直以来对我的关心和指导,值此论文完成之际,谨向林老师表达我真诚的感激和崇高的敬意。
林老师悉心指导我完成了实验室的科研工作,在学习上和生活上都给予了我很大的关心和帮助,对于我的科研工作和论文都提出了许多的宝贵意见,在此表示衷心的感谢。
感谢在我论文写作过程中给以我许多帮助的朋友们。
师兄蒋睿在繁忙学习和工作中抽出时间就我遇到的难题展开大量讨论,使我的研究工作可以顺利进行,非常感谢你。
在工作及撰写论文期间,彭玉瑶、张云光等同学对我论文的研究工作给予了热情帮助,在此向他们表达我的感激之情。
摘要本系统的设计过程是用来实现书籍借阅、归还以及对读者、书籍信息的管理。
系统则是利用计算机的功能实现书籍管理的系统化和自动化,使管理工作大大减轻,其方便友好的图形界面,简便的操作,完善的数据库管理,帮助操作人员更好地完成工作。
系统采用Java技术,选择Eclipse作为开发工具,选择了MySQL作为后台数据库管理系统,利用软件工程的知识,并结合面向对象方法进行系统分析和设计。
系统就是针对书籍借阅信息管理而开发的。
系统大体上分为六个模块,包括系统管理、图书信息管理、读者信息管理、借阅信息管理、查询信息管理及关于系统六个模块。
该系统能实现图书信息、读者信息以及借阅信息的各种处理。
在本文的第一章是系统的前言,介绍系统的开发环境及相应开发工具,第二章至第五章分别是系统的可行性分析,需求分析、总体设计、数据库设计,这些都是对系统进行设计、开发的基础。
第六章则是系统的详细设计和编码,以实现系统的功能,第七章软件测试和维护,第八章是性能分析,这些都是本系统的重要部分。
第九章是整个文章的总结。
关键字:书籍借阅;数据库;Java技术AbstractTo borrow books management system design process is used to borrow books, return books, and manage books information . System is the use of computers in the realization of systematic and automation management books, which made management greatly reduced, their convenience and friendly graphic interface, easy operation, comprehensive database management, to help operators better completion.The system uses Java technology, and choose Eclipse as a development tool, MySQL as a background database management system, and using software engineering knowledge, combined with object-oriented methods for system analysis and design.The system was aimed at develop borrowing books and information management .The whole system is divided into six modules, including systems management, book information management, readers information management, borrow information management , Inquiries and system introduce on the six modules. The system can manage book information, reader information, and borrow information.In this paper, the first chapter is the foreword, introduction of the system development environment and the corresponding development tools, Chapter 2 to 5 are the feasibility analysis, requirement analysis, system design, database design, These are the system design, development foundation. Chapter 6 is the detailed design to achieve the function of the system, Chapter 7 is software testing and maintenance , the chapter 8 is performance analysis, these are the important part of the system. Chapter 9 is the entire article summing up.Keywords : Borrow books; Database; Java Technology目录第1章前言 (1)问题的提出 (1)系统特点 (1)Java介绍 (2)MySQL介绍 (3)Eclipse介绍 (3)第2章可行性分析 (4)可行性分析概述 (4)系统的可行性分析 (4)第3章需求分析 (6)需求分析的任务 (6)系统功能要求 (6)系统流程图 (7)系统功能分析 (7)数据流图 (8)数据字典 (9)第4章总体设计 (12)系统模块设计 (12)系统功能模块图 (13)第5章数据库设计 (16)数据库的概念模式设计 (16)系统E-R图 (17)数据库的逻辑设计 (20)设计原理介绍 (20)建立逻辑设计结果 (20)数据库的物理结构设计 (21)第6章详细设计 (24)子系统设计 (24)菜单设计 (24)模块设计 (25)登录系统的界面设计 (25)系统参数设置的界面设计 (26)读者信息录入的界面设计 (27)读者信息编辑的界面设计 (28)借阅书籍信息的界面设计 (28)书籍归还与借阅的界面设计 (29)书籍信息查询的界面设计 (29)第7章系统测试和维护 (30)软件测试 (30) (31) (32)第8章性能分析 (33)性能分析 (33)优点 (33)缺点 (33)第9章总结 (34)参考文献 (35)致谢 (36)附录 (37)第1章前言1.1问题的提出在现代化的今天,随着信息技术的迅速发展和教育的不断普及,计算机的应用得以广阔的发展,传统的管理统计方式在处理庞大的信息量时显得极不适应,因此人们对于计算机来辅助协调和管理工作的需求正在逐步提高。
本科学生毕业设计论文外文翻译随着全球化的不断深入,跨国交流以及文化交融已成为一种趋势,许多本科学生在毕业设计过程中需要进行对外文献的翻译,以获得更广泛的学术视野和研究资源。
在本文中,将探讨本科学生毕业设计论文外文翻译的意义、挑战以及一些有效的翻译技巧。
首先,进行外文翻译对于本科学生毕业设计论文具有重要意义。
通过翻译外文献,本科学生可以了解最新的研究动态和学术观点,为自己的毕业设计论文提供更全面的支持和理论基础。
外文翻译还可以帮助本科生扩大学术交流和合作的范围,与国内外学者进行对话和合作。
此外,通过翻译外文献,本科生可以提高自己的英语水平和翻译能力,为今后的学术研究和职业发展打下坚实的基础。
然而,进行本科学生毕业设计论文外文翻译也面临一些挑战。
首先是语言障碍,即翻译过程中可能遇到的词汇、语法和语言结构上的困难。
为了克服这些困难,本科生可以利用在线翻译工具和词典进行辅助翻译,并结合自身的英语学习经验和语言能力进行适当的调整和校对。
其次是理解困难,即外文献中的专业术语、理论框架和思维方式对于本科生来说可能较为陌生和复杂。
为了解决这个问题,本科生可以利用学校图书馆和互联网资源,查阅相关的学术文献和背景资料,尽量深入理解外文献的内容和学术价值。
另外,做好翻译前的准备工作也非常重要,包括阅读源文献的摘要,了解文章的主旨和结构,这样可以更好地把握外文献的核心内容和论点。
接下来,探讨一些有效的翻译技巧,帮助本科学生顺利完成毕业设计论文的外文翻译。
首先是遵循翻译规范和要求,包括准确传达作者的意图,保持语句的一致性和通顺性,避免翻译中的主观色彩。
其次是注重上下文的理解和翻译,即通过分析上下文信息、推测词义并结合专业背景知识,正确理解和翻译整个句子或段落的含义。
此外,学会合理使用同义词和近义词,选用相应的词汇来表达源文献中的概念和观点,保证翻译的准确性和一致性。
最后,进行适当的校对和修订工作,确保翻译的结果与原文内容一致,语言流畅自然,并减少语法错误和表达不准确的问题。
软件工程专业毕业设计外文文献翻译A HISTORICAL PERSPECTIVEFrom the earliest days of computers, storing and manipulating data have been a major application focus. The first general-purpose DBMS was designed by Charles Bachman at General Electric in the early 1960s and was called the Integrated Data Store. It formed the basis for the network data model, which was standardized by the Conference on Data Systems Languages (CODASYL) and strongly influenced database systems through the 1960s. Bachman was the first recipient of A CM’s Turing Award (the computer science equivalent of a Nobel prize) for work in the database area; he received the award in 1973. In the late 1960s, IBM developed the Information Management System (IMS) DBMS, used even today in many major installations. IMS formed the basis for an alternative data representation framework called the hierarchical data model. The SABRE system for making airline reservations was jointly developed by American Airlines and IBM around the same time, and it allowed several people to access the same data through computer network. Interestingly, today the same SABRE system is used to power popular Web-based travel services such as Travelocity!In 1970, Edgar Codd, at IBM’s San Jose Research Laboratory, proposed a new datarepresentation framework called the relational data model. This proved to be a watershed in the development of database systems: itsparked rapid development of several DBMSs based on the relational model, along with a rich body of theoretical results that placed the field on a firm foundation. Codd won the 1981 Turing Award for his seminal work. Database systems matured as an academic discipline, and the popularityof relational DBMSs changed the commercial landscape. Their benefits were widely recognized, and the use of DBMSs for managing corporate data became standard practice.In the 1980s, the relational model consolidated its position as the dominant DBMS paradigm, and database systems continued to gain widespread use. The SQL query language for relational databases, developed as part of IBM’s System R project, is now the standard query language.SQL was standardized in the late 1980s, and the current standard,SQL-92, was adopted by the American National Standards Institute (ANSI) and 1International Standards Organization (ISO). Arguably, the mostwidely used form of concurrent programming is the concurrent executionof database programs (called transactions). Users write programs as if they are to be run by themselves, and the responsibility for running them concurrently is given to the DBMS. James Gray won the 1999 Turing award for his contributions to the field of transaction management in a DBMS.In the late 1980s and the 1990s, advances have been made in manyareas of database systems. Considerable research has been carried outinto more powerful query languages and richer data models, and there has been a big emphasis on supporting complex analysis of data from all parts of an enterprise. Several vendors (e.g., IBM’s DB2, Oracle 8, Informix UDS) have extended theirsystems with the ability to store new data types such as images and text, and with the ability to ask more complex queries. Specialized systems have been developed by numerous vendors for creating data warehouses, consolidating data from several databases, and for carrying out specialized analysis.An interesting phenomenon is the emergence of several enterprise resource planning(ERP) andmanagement resource planning (MRP) packages, which add a substantial layer ofapplication-oriented features on top of a DBMS. Widely used packages include systems from Baan, Oracle, PeopleSoft, SAP, and Siebel. These packages identify a set of common tasks (e.g., inventory management, human resources planning, financial analysis) encountered by a large number of organizations and provide a general application layer to carry out these tasks. The data is stored in a relational DBMS, and the application layer can be customized to different companies, leading to lower Introduction to Database Systems overall costs for the companies, compared to the cost of building the application layer from scratch. Most significantly, perhaps, DBMSs have entered the Internet Age. While the first generation of Web sites stored their data exclusively inoperating systems files, the use of a DBMS to store data that is accessed through a Web browser is becoming widespread. Queries are generated through Web-accessible forms and answers are formatted using a markup language such as HTML, in order to be easily displayed in a browser. All the database vendors are adding features to their DBMS aimed at making it more suitable for deployment over the Internet. Database management continues to gain importance as more and more datais brought on-line, and made ever more accessible 2through computer networking. Today the field is being driven by exciting visions such as multimedia databases, interactive video,digital libraries, a host of scientific projects such as the human genome mapping effort and NASA’s Earth Observation System project, and the desire ofcompanies to consolidate their decision-making processes and mine their data repositories for useful information about their businesses. Commercially, database manage- ment systems represent one of the largest and most vigorous market segments. Thusthes- tudy of database systems could prove to be richly rewarding in more ways than one!INTRODUCTION TO PHYSICAL DATABASE DESIGNLike all other aspects of database design, physical design must be guided by the nature of the data and its intended use. In particular, it is important to understand the typical workload that the database must support; the workload consists of a mix of queries and updates. Users also have certain requirements about how fast certain queries or updatesmust run or how many transactions must be processed per second. The workload description and users’ performance requirements are the basis on which a number of decisions have to be made during physical database design.To create a good physical database design and to tune the system for performance in response to evolving user requirements, the designer needs to understand the workings of a DBMS, especially the indexing and query processing techniques supported by the DBMS. If the database is expected to be accessed concurrently by many users, or is a distributed database, the task becomes more complicated, and other features of a DBMS come into play.DATABASE WORKLOADSThe key to good physical design is arriving at an accurate description of the expected workload. A workload description includes the following elements:1. A list of queries and their frequencies, as a fraction of all queries and updates.2. A list of updates and their frequencies.33. Performance goals for each type of query and update.For each query in the workload, we must identify:Which relations are accessed.Which attributes are retained (in the SELECT clause).Which attributes have selection or join conditions expressed on them (in the WHERE clause) and how selective these conditions are likely to be. Similarly, for each update in the workload, we must identify: Which attributes have selection or join conditions expressed on them (in the WHERE clause) and how selective these conditions are likely to be.The type of update (INSERT, DELETE, or UPDATE) and the updated relation. For UPDATE commands, the fields that are modified by the update.Remember that queries and updates typically have parameters, for example, a debit or credit operation involves a particular account number. The values of these parameters determine selectivity ofselection and join conditions.Updates have a query component that is used to find the target tuples. This component can benefit from a good physical design and the presence of indexes. On the other hand, updates typically require additional work to maintain indexes on the attributes that they modify. Thus, while queries can only benefit from the presence of an index, an index may either speed up or slow down a given update. Designers should keep this trade-offer in mind when creating indexes.NEED FOR DATABASE TUNINGAccurate, detailed workload information may be hard to come by while doing the initial design of the system. Consequently, tuning a database after it has been designed and deployed is important—we must refine theinitial design in the light of actual usage patterns to obtain the best possible performance.The distinction between database design and database tuning is somewhat arbitrary. We could consider the design process to be over once an initial conceptual schema is designed and a set of indexing and clustering decisions is made. Any subsequent changes 4to the conceptual schema or the indexes, say, would then be regarded as a tuning activity. Alternatively, we could consider some refinementof the conceptual schema (and physical design decisions affected by this refinement) to be part of the physical design process.Where we draw the line between design and tuning is not very important.OVERVIEW OF DATABASE TUNINGAfter the initial phase of database design, actual use of the database provides a valuable source of detailed information that can be used to refine the initial design. Many of the original assumptionsabout the expected workload can be replaced by observed usage patterns; in general, some of the initial workload specification will be validated, and some of it will turn out to be wrong. Initial guesses about the size of data can be replaced with actual statistics from the system catalogs (although this information will keep changing as the system evolves). Careful monitoring of queries can reveal unexpected problems; for example, the optimizer may not be using some indexes as intended to produce good plans.Continued database tuning is important to get the best possible performance.TUNING THE CONCEPTUAL SCHEMAIn the course of database design, we may realize that our current choice of relation schemas does not enable us meet our performance objectives for the given workload with any (feasible) set of physical design choices. If so, we may have to redesign our conceptual schema (and re-examinephysical design decisions that are affected by the changes that we make).We may realize that a redesign is necessary during the initialdesign process or later, after the system has been in use for a while. Once a database has been designed and populated with data, changing the conceptual schema requires a significant effort in terms of mapping the contents of relations that are affected. Nonetheless, it may sometimes be necessary to revise the conceptual schema in light of experience with the system. We now 5consider the issues involved in conceptual schema (re)design fromthe point of view of performance.Several options must be considered while tuning the conceptual schema:We may decide to settle for a 3NF design instead of a BCNF design.If there are two ways to decompose a given schema into 3NF or BCNF, our choice should be guided by the workload.Sometimes we might decide to further decompose a relation that is already in BCNF. In other situations we might denormalize. That is, we might choose to replace a collection of relations obtained by a decomposition from a larger relation with the original (larger) relation, even though it suffers from some redundancy problems. Alternatively, we might choose to add some fields to certain relations to speed up some important queries, even if this leads to a redundant storage of some information (and consequently, a schema that is in neither 3NF nor BCNF).This discussion of normalization has concentrated on the techniqueof decomposition, which amounts to vertical partitioning of a relation. Another technique to consider is horizontal partitioning of a relation, which would lead to our having two relations with identical schemas.Note that we are not talking about physically partitioning the cuples ofa single relation; rather, we want to create two distinct relations (possibly with different constraints and indexes on each).Incidentally, when we redesign the conceptual schema, especially ifwe are tuning an existing database schema, it is worth considering whether we should create views to mask these changes from users for whom the original schema is more natural.TUNING QUERIES AND VIEWSIf we notice that a query is running much slower than we expected,we have to examine the query carefully to end the problem. Somerewriting of the query, perhaps in conjunction with some index tuning,can often ?x the problem. Similar tuning may be called for if queries on some view run slower than expected.When tuning a query, the first thing to verify is that the system is using the plan that 6you expect it to use. It may be that the system is not finding the best plan for a variety of reasons. Some common situations that are not handled efficiently by many optimizers follow:A selection condition involving null values.Selection conditions involving arithmetic or string expressions or conditions using the or connective. For example, if we have a condition E.age = 2*D.age in the WHERE clause, the optimizer may correctly utilize an available index on E.age but fail to utilize an available index on D.age. Replacing the condition by E.age/2=D.age would reverse the situation.Inability to recognize a sophisticated plan such as an index-only scan for an aggregation query involving a GROUP BY clause.If the optimizer is not smart enough to and the best plan (using access methods and evaluationstrategies supported by the DBMS), some systems allow users to guide the choice of a plan by providing hints to the optimizer; for example, users might be able to force the use of a particular index or choose the join order and join method. A user who wishes to guide optimization in this manner should have a thorough understanding of both optimization and the capabilities of the given DBMS.(8)OTHER TOPICSMOBILE DATABASESThe availability of portable computers and wireless communications has created a new breed of nomadic database users. At one level these users are simply accessing a database through a network, which is similar to distributed DBMSs. At another level the network as well as data and user characteristics now have several novel properties, which affect basic assumptions in many components of a DBMS, including the query engine, transaction manager, and recovery manager.Users are connected through a wireless link whose bandwidth is ten times less than Ethernet and 100 times less than ATM networks. Communication costs are therefore significantly higher in proportion to I/O and CPU costs.Users’ lo cations are constantly changing, and mobile computers have a limited battery life. Therefore, the true communication costs is connection time and battery usage in addition to bytes transferred, and change constantly depending on location. Data is 7frequently replicated to minimize the cost of accessing it from different locations.As a user moves around, data could be accessed from multiple database servers within a single transaction. The likelihood of losing connections is also much greater than in a traditional network. Centralized transaction management may therefore be impractical, especially if some data is resident at the mobile computers. We may infact have to give up on ACID transactions and develop alternativenotions of consistency for user programs. MAIN MEMORY DATABASES The price of main memory is now low enough that we can buy enough main memory to hold the entire database for many applications; with 64-bit addressing, modern CPUs also have very large address spaces. Some commercial systems now have several gigabytes of main memory. This shift prompts a reexamination of some basic DBMS design decisions, since disk accesses no longer dominate processing time for a memory-resident database:Main memory does not survive system crashes, and so we still have to implement logging and recovery to ensure transaction atomicity and durability. Log records must be written to stable storage at commit time, and this process could become a bottleneck. To minimize this problem, rather than commit each transaction as it completes, we can collect completed transactions and commit them in batches; this is called group commit. Recovery algorithms can also be optimized since pages rarely have to be written out to make room for other pages.The implementation of in-memory operations has to be optimized carefully since disk accesses are no longer the limiting factor for performance.A new criterion must be considered while optimizing queries, namely the amount of space required to execute a plan. It is important to minimize the space overhead because exceeding available physical memory would lead to swapping pages to disk (through the operating system’svirtual memory mechanisms), greatly slowing down execution.Page-oriented data structures become less important (since pages are no longer the unit of data retrieval), and clustering is not important (since the cost of accessing any region of main memoryis uniform).8(一)从历史的角度回顾从数据库的早期开始,存储和操纵数据就一直是主要的应用焦点。