网上选课系统设计的关键技术及系统的构建外文翻译大学毕业论文英文文献翻译
- 格式:doc
- 大小:20.00 KB
- 文档页数:8
金融体制、融资约束与投资——来自OECD的实证分析R.SemenovDepartment of Economics,University of Nijmegen,Nijmegen(荷兰内梅亨大学,经济学院)这篇论文考查了OECD的11个国家中现金流量对企业投资的影响.我们发现不同国家之间投资对企业内部可获取资金的敏感性具有显著差异,并且银企之间具有明显的紧密关系的国家的敏感性比银企之间具有公平关系的国家的低.同时,我们发现融资约束与整体金融发展指标不存在关系.我们的结论与资本市场信息和激励问题对企业投资具有重要作用这种观点一致,并且紧密的银企关系会减少这些问题从而增加企业获取外部融资的渠道。
一、引言各个国家的企业在显著不同的金融体制下运行。
金融发展水平的差别(例如,相对GDP的信用额度和相对GDP的相应股票市场的资本化程度),在所有者和管理者关系、企业和债权人的模式中,企业控制的市场活动水平可以很好地被记录.在完美资本市场,对于具有正的净现值投资机会的企业将一直获得资金。
然而,经济理论表明市场摩擦,诸如信息不对称和激励问题会使获得外部资本更加昂贵,并且具有盈利投资机会的企业不一定能够获取所需资本.这表明融资要素,例如内部产生资金数量、新债务和权益的可得性,共同决定了企业的投资决策.现今已经有大量考查外部资金可得性对投资决策的影响的实证资料(可参考,例如Fazzari(1998)、 Hoshi(1991)、 Chapman(1996)、Samuel(1998)).大多数研究结果表明金融变量例如现金流量有助于解释企业的投资水平。
这项研究结果解释表明企业投资受限于外部资金的可得性。
很多模型强调运行正常的金融中介和金融市场有助于改善信息不对称和交易成本,减缓不对称问题,从而促使储蓄资金投着长期和高回报的项目,并且提高资源的有效配置(参看Levine(1997)的评论文章)。
因而我们预期用于更加发达的金融体制的国家的企业将更容易获得外部融资.几位学者已经指出建立企业和金融中介机构可进一步缓解金融市场摩擦。
如何进行大学毕业论文的外文翻译与引用大学毕业论文是学生完成学业的关键性任务之一,而在撰写论文时,外文翻译与引用是不可避免的环节。
如何进行准确、规范的外文翻译与引用,对于提高论文质量和可信度至关重要。
本文将介绍如何进行大学毕业论文的外文翻译与引用,旨在提供参考和指导。
一、外文翻译1. 确定翻译需求:在开始外文翻译工作之前,需要确定哪些外文文献是需要翻译的。
审视毕业论文的需求,明确哪些内容需要外文翻译,并制定相应的计划。
2. 寻找合适的翻译资料:选择合适的翻译资料是确保翻译准确性和可信度的重要一步。
优先选择权威性的外文期刊、学术文献和专业书籍等,确保翻译的内容与自己的研究方向和论文题目相符。
3. 了解翻译要求:在进行外文翻译之前,需要了解论文所在学院或指导教师对翻译的具体要求。
例如,是否要求逐字逐句翻译,还是根据自己的理解进行意译,对参考文献的翻译是否需要加注标注等。
了解翻译要求能够帮助你更好地完成任务。
4. 深入理解原文内容:在翻译时,要充分理解原文的意思,尽量还原作者的原意。
通过阅读原文多次,结合词典或翻译软件可以解决一些困难的词汇或句子。
同时,根据自己的研究目标和论文需求,可以注重翻译原文中的重点部分。
5. 注意语言表达和格式:在翻译中,要注意语言表达的规范性和准确性,并尽量使用学术性和专业性的语言。
此外,还要注意翻译中的格式问题,如文献引用格式、标点符号的使用等。
二、外文引用1. 确定引用需求:在撰写毕业论文过程中,外文引用是支撑自己研究的重要依据。
在选择外文引用时,要结合自己的研究目标,选取有助于论证和支撑自己观点的文献,确保引用的内容与自己的论文主题相契合。
2. 引用格式准确:外文引用需要按照学术规范和论文要求进行,确保引用格式的准确性。
根据不同的学术领域和论文所在学院的要求,选择适合的引用风格,如APA、MLA或Chicago等。
3. 注重引言与解读:在引用他人观点时,要注重引言和解读。
文档从互联网中收集,已重新修正排版,word格式支持编辑,如有帮助欢迎下载支持。
实用文档毕业设计说明书英文文献及中文翻译学专JA V A programming language and JA V A platform The Java programming language and platform have emerged as major technologies for performing e-business functions. Java programming standards have enabled portability of applications and the reuse of application components across computing platforms. Sun Microsystems' Java Community Process continues to be a strong base for the growth of the Java infrastructure and language standards. This growth of open standards creates new opportunities for designers and developers of applications and services .Applications of JavaJava uses many familiar programming concepts and constructs and allows portability by providing a common interface through an external Java Virtual Machine (JVM). A virtual machine is a self-contained operating environment, created by a software layer that behaves as if it were a separate computer. Benefits of creating virtual machines include better exploitation of powerful computing resources and isolation of applications to preventcross-corruption and improve security.The JVM allows computing devices with limited processors or memory to handle more advanced applications by calling up software instructions inside the JVM to perform most of the work. This also reduces the size and complexity of Java applications because many of the core functions and processing instructions were built into the JVM. As a result, software developers no longer need to re-create the same application for every operating system. Java also provides security by instructing the application to interact with the virtual machine, which served as a barrier between applications and the core system, effectively protecting systems from malicious code.Among other things, Java is tailor-made for the growing Internet because it makes it easy to develop new, dynamic applications that could make the most of the Internet's power and capabilities. Java is now an open standard, meaning that no single entity controls its development and the tools for writing programs in the language are available to everyone. The power of open standards like Java is the ability to break down barriers and speed up progress.Today, you can find Java technology in networks and devices that range from the Internet and scientific supercomputers to laptops and cell phones, from Wall Street market simulators to home game players and credit cards. There are over 3 million Java developers and now there are several versions of the code. Most large corporations have in-house Java developers. In addition, the majority of key software vendors use Java in their commercial applications (Lazaridis, 2003).ApplicationsJava on the World Wide WebJava has found a place on some of the most popular websites in the world and the uses of Java continues to grow. Java applications not only provide unique user interfaces, they also help to power the backend of websites. Everybody is probably familiar with eBay and Amazon have been Java pioneers on the World Wide Web.eBayFounded in 1995, eBay enables e-commerce on a local, national and international basis with an array of Web sites.You can find it on eBay, even if you didn't know it existed. On a typical day, more than 100 million items are listed on eBay in tens of thousands of categories. on eBay; the world's largest online marketplace.eBay uses Java almost everywhere. To address some security issues, eBay chose Sun Microsystems' Java System Identity Manager as the platform for revamping its identity management system. The task at hand was to provide identity management for more than 12,000 eBay employees and contractors.Now more than a thousand eBay software developers work daily with Java applications. Java's inherent portability allows eBay to move to new hardware to take advantage of new technology, packaging, or pricing, without having to rewrite Java code.Amazon has created a Web Service application that enables users to browse their product catalog and place orders. uses a Java application that searches the Amazon catalog for books whose subject matches a user-selected topic. The application displays ten books that match the chosen topic, and shows the author name, book title, listprice, Amazon discount price, and the cover icon. The user may optionally view one review per displayed title and make a buying decision.Java in Data Warehousing & MiningAlthough many companies currently benefit from data warehousing to support corporate decision making, new business intelligence approaches continue to emerge that can be powered by Java technology. Applications such as data warehousing, data mining, Enterprise Information Portals and Knowledge Management Systems are able to provide insight into customer retention, purchasing patterns, and even future buying behavior.These applications can not only tell what has happened but why and what may happen given certain business conditions; As a result of this information growth, people at all levels inside the enterprise, as well as suppliers, customers, and others in the value chain, are clamoring for subsets of the vast stores of information to help them make business decisions. While collecting and storing vast amounts of data is one thing, utilizing and deploying that data throughout the organization is another.The technical challenges inherent in integrating disparate data formats, platforms, and applications are significant. However, emerging standards such as the Application Programming Interfaces that comprise the Java platform, as well as Extendable Markup Language technologies can facilitate the interchange of data and the development of next generation data warehousing and business intelligence applications. While Java technology has been used extensively for client side access and to presentation layer challenges, it is rapidly emerging as a significant tool for developing scaleable server side programs. The Java2 Platform, Enterprise Edition (J2EE) provides the object, transaction, and security support for building such systems.Metadata IssuesOne of the key issues that business intelligence developers must solve is that of incompatible metadata formats. Metadata can be defined as information about data or simply "data about data." In practice, metadata is what most tools, databases, applications, and other information processes use to define, relate, and manipulate data objects within their own environments. It defines the structure and meaning of data objects managed by an applicationso that the application knows how to process requests or jobs involving those data objects. Developers can use this schema to create views for users. Also, users can browse the schema to better understand the structure and function of the database tables before launching a query.To address the metadata issue, a group of companies have joined to develop the Java Metadata Interface (JMI) API. The JMI API permits the access and manipulation of metadata in Java with standard metadata services. JMI is based on the Meta Object Facility (MOF) specification from the Object Management Group (OMG). The MOF provides a model and a set of interfaces for the creation, storage, access, Metamodel and metadata interchange is done via XML and uses the XML Metadata Interchange (XMI) specification, also from the OMG. JMI leverages Java technology to create an end-to-end data warehousing and business intelligence solutions framework.Enterprise JavaBeansA key tool provided by J2EE is Enterprise JavaBeans (EJB), an architecture for the development of component-based distributed business applications. Applications written using the EJB architecture are scalable, transactional, secure, and multi-user aware. These applications may be written once and then deployed on any server platform that supportsJ2EE. The EJB architecture makes it easy for developers to write components, since they do not need to understand or deal with complex, system-level details such as thread management, resource pooling, and transaction and security management. This allows for role-based development where component assemblers, platform providers and application assemblers can focus on their area of responsibility further simplifying application development.Data Storage & AccessData stored in existing applications can be accessed with specialized connectors. Integration and interoperability of these data sources is further enabled by the metadata repository that contains metamodels of the data contained in the sources, which then can be accessed and interchanged uniformly via the JMI API. These metamodels capture the essential structure and semantics of business components, allowing them to be accessed and queried via the JMI API or to be interchanged via XML. Through all of these processes, the J2EEinfrastructure ensures the security and integrity of the data through transaction management and propagation and the underlying security architecture.To consolidate historical information for analysis of sales and marketing trends, a data warehouse is often the best solution. In this example, data can be extracted from the operational systems with a variety of Extract, Transform and Load tools (ETL). The metamodels allow EJBs designed for filtering, transformation, and consolidation of data to operate uniformly on data from diverse data sources as the bean is able to query the metamodel to identify and extract the pertinent fields. Queries and reports can be run against the data warehouse that contains information from numerous sources in a consistent, enterprise-wide fashion through the use of the JMI API.Java in Industrial SettingsMany people know Java only as a tool on the World Wide Web that enables sites to perform some of their fancier functions such as interactivity and animation. However, the actual uses for Java are much more widespread. Since Java is an object-oriented language, the time needed for application development is minimal.In addition, Java's automatic memory management and lack of pointers remove some leading causes of programming errors. Most importantly, application developers do not need to create different versions of the software for different platforms. The advantages available through Java have even found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.Benefits of JavaThe benefits of Java translate across many industries, and some are specific to the control and automation environment. Java's ability to run on any platform enables the organization to make use of the existing equipment while enhancing the application.IntegrationWith few exceptions, applications running on the factory floor were never intended to exchange information with systems in the executive office, but managers have recently discovered the need for that type of information. Before Java, that often meant bringingtogether data from systems written on different platforms in different languages at different times. Integration was usually done on a piecemeal basis, once it worked, was unique to the two applications it was tying together. Additional integration required developing a brand new system from scratch, raising the cost of integration.ScalabilityAnother benefit of Java in the industrial environment is its scalability. Even when internal compatibility is not an issue, companies often face difficulties when suppliers with whom they share information have incompatible systems. This becomes more of a problem as supply-chain management takes on a more critical role which requires manufacturers to interact more with offshore suppliers and clients. The greatest efficiency comes when all systems can communicate with each other and share information seamlessly. Since Java is so ubiquitous, it often solves these problems.Dynamic Web Page DevelopmentJava has been used by both large and small organizations for a wide variety of applications beyond consumer oriented websites. Sandia, a multiprogram laboratory of the U.S. Department of Energy's National Nuclear Security Administration, has developed a unique Java application. The lab was tasked with developing an enterprise-wide inventory tracking and equipment maintenance system that provides dynamic Web pages.ConclusionOpen standards have driven the e-business revolution. As e-business continues to develop, various computing technologies help to drive its evolution. The Java programming language and platform have emerged as major technologies for performing e-business functions. the time needed for application development is minimal. Java also encourages good software engineering practices with clear separation of interfaces and implementations as well as easy exception handling. Java's automatic memory management and lack of pointers remove some leading causes of programming errors. The advantages available through Java have also found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.。
译文交通拥堵和城市交通系统的可持续发展摘要:城市化和机动化的快速增长,通常有助于城市交通系统的发展,是经济性,环境性和社会可持续性的体现,但其结果是交通量无情增加,导致交通拥挤。
道路拥挤定价已经提出了很多次,作为一个经济措施缓解城市交通拥挤,但还没有见过在实践中广泛使用,因为道路收费的一些潜在的影响仍然不明。
本文首先回顾可持续运输系统的概念,它应该满足集体经济发展,环境保护和社会正义的目标.然后,根据可持续交通系统的特点,使拥挤收费能够促进经济增长,环境保护和社会正义。
研究结果表明,交通拥堵收费是一个切实有效的方式,可以促进城市交通系统的可持续发展。
一、介绍城市交通是一个在世界各地的大城市迫切关注的话题。
随着中国的城市化和机动化的快速发展,交通拥堵已成为一个越来越严重的问题,造成较大的时间延迟,增加能源消耗和空气污染,减少了道路网络的可靠性.在许多城市,交通挤塞情况被看作是经济发展的障碍.我们可以使用多种方法来解决交通挤塞,包括新的基础设施建设,改善基础设施的维护和操作,并利用现有的基础设施,通过需求管理策略,包括定价机制,更有效地减少运输密度.交通拥堵收费在很久以前就已提出,作为一种有效的措施,来缓解的交通挤塞情况。
交通拥堵收费的原则与目标是通过对选择在高峰拥挤时段的设施的使用实施附加收费,以纾缓拥堵情况.转移非高峰期一些出行路线,远离拥挤的设施或高占用车辆,或完全阻止一些出行,交通拥堵收费计划将在节省时间和降低经营成本的基础上,改善空气中的质量,减少能源消耗和改善过境生产力。
此计划在世界很多国家和地方都有成功的应用。
继在20世纪70年代初和80年代中期挪威与新加坡实行收费环,在2003年2月伦敦金融城推出了面积收费;直至现在,它都是已经开始实施拥挤收费的大都市圈中一个最知名的例子。
然而,交通拥堵收费由于理论和政治的原因未能在实践中广泛使用。
道路收费的一些潜在的影响尚不清楚,和城市发展的拥塞定价可持续性,需要进一步研究。
选课系统英文作文英文:Choosing courses is an important part of college life. As a student, I have experienced the process of selecting courses several times. In my opinion, a good course selection system should have several key features.Firstly, it should be user-friendly. The system should be easy to navigate and understand, with clear instructions and helpful feedback. This will ensure that students can make informed decisions about their course choices.Secondly, the system should be efficient. It should be able to handle a large volume of students and courses without crashing or experiencing delays. This will save students time and frustration, and ensure that they can select the courses they need without any issues.Finally, the system should be flexible. It should allowstudents to make changes to their course selections iftheir circumstances change, such as if they need to drop a course or switch to a different one. This will give students more control over their academic experience and help them to achieve their goals.In my experience, the best course selection systems are those that combine these features. For example, my college uses an online system that is easy to use, efficient, and flexible. I can easily search for courses by subject, time, and instructor, and the system provides me with feedback on my choices. If I need to make changes to my selections, I can do so quickly and easily.Overall, I believe that a good course selection system is essential for a successful college experience. It helps students to make informed decisions, saves them time and frustration, and gives them more control over their academic journey.中文:选课是大学生活中重要的一部分。
本科生毕业设计(论文)外文翻译毕业设计(论文)题目:基于JSP的高校选排课系统的设计与实现外文题目:Overview of JSP Technology译文题目:JSP技术概述学院:软件学院专业:软件工程学生姓名:学生班级:软件工程1102班学生学号:指导教师:Overview of JSP TechnologyAutor: Zambon Giulio/ Sekler MichaelSource: Springer-Verlag New York Inc1.Benefits of JSPJSP pages are translated into servlets. So, fundamentally, any task JSP pages can perform could also be accomplished by servlets. However, this underlying equivalence does not mean that servlets and JSP pages are equally appropriate in all scenarios. The issue is not the power of the technology, it is the convenience, productivity, and maintainability of one or the other. After all, anything you can do on a particular computer platform in the Java programming language you could also do in assembly language. But it still matters which you choose.JSP provides the following benefits over servlets alone: It is easier to write and maintain the HTML. Your static code is ordinary HTML: no extra backslashes, no double quotes, and no lurking Java syntax.You can use standard Web-site development tools. Even HTML tools that know nothing about JSP can be used because they simply ignore the JSP tags.You can divide up your development team. The Java programmers can work on the dynamic code. The Web developers can concentrate on the presentation layer. On large projects, this division is very important. Depending on the size of your team and the complexity of your project, you can enforce a weaker or stronger separation between the static HTML and the dynamic content.Now, this discussion is not to say that you should stop using servlets and use only JSP instead. By no means. Almost all projects will use both. For some requests in your project, you will use servlets. For others, you will use JSP. For still others, you will combine them with the MVC architecture . You want the appropriate tool for the job, and servlets, by themselves, do not complete your toolkit.2. Advantages of JSP Over Competing TechnologiesA number of years ago, Marty was invited to attend a small 20-person industry roundtable discussion on software technology. Sitting in the seat next to Marty was James Gosling, inventor of the Java programming language. Sitting several seats away was a high-level manager from a very large software company in Redmond, Washington. During the discussion, the moderator brought up the subject of Jini, which at that time was a new Java technology. The moderator asked the manager what he thought of it, and the manager responded that it was too early to tell, but that it seemed to be an excellent idea. He went on to say that they would keep an eye on it, and if it seemed to be catching on, they would follow his company's usual "embrace and extend" strategy. At this point, Gosling lightheartedly interjected "You mean disgrace and distend."Now, the grievance that Gosling was airing was that he felt that this company would take technology from other companies and suborn it for their own purposes. But guess what? The shoe is on the other foot here. The Java community did not invent the idea of designing pages as a mixture of static HTML and dynamic code marked with special tags. For example, ColdFusion did it years earlier. Even ASP (a product from the very software company of the aforementioned manager) popularized this approach before JSP came along and decided to jump on the bandwagon. In fact, JSP not only adopted the general idea, it even used many of the same special tags as ASP did..So, the question becomes: why use JSP instead of one of these other technologies? Our first response is that we are not arguing that everyone should. Several of those other technologies are quite good and are reasonable options in some situations. In other situations, however, JSP is clearly better. Here are a few of the reasons.2.1Versus .NET and Active Server Pages (ASP)NET is well-designed technology from Microsoft. is the part that directly competes with servlets and JSP. The advantages of JSP are two fold.First, JSP is portable to multiple operating systems and Web servers; you aren't locked into deploying on Windows and IIS. Although the core .NET platform runs on a few non-Windows platforms, the ASP part does not. You cannot expect to deploy serious applications on multiple servers and operating systems. For some applications, this difference does not matter. Forothers, it matters greatly.Second, for some applications the choice of the underlying language matters greatly. For example, although .NET's C# language is very well designed and is similar to Java, fewer programmers are familiar with either the core C# syntax or the many auxiliary libraries. In addition, many developers still use the original version of ASP. With this version, JSP has a clear advantage for the dynamic code. With JSP, the dynamic part is written in Java, not VBScript or another ASP-specific language, so JSP is more powerful and better suited to complex applications that require reusable components.You could make the same argument when comparing JSP to the previous version of ColdFusion; with JSP you can use Java for the "real code" and are not tied to a particular server product. However, the current release of ColdFusion is within the context of a J2EE server, allowing developers to easily mix ColdFusion and servlet/JSP code.2.2 Versus PHPPHP (a recursive acronym for "PHP: Hypertext Preprocessor") is a free, open-source, HTML-embedded scripting language that is somewhat similar to both ASP and JSP. One advantage of JSP is that the dynamic part is written in Java, which already has an extensive API for networking, database access, distributed objects, and the like, whereas PHP requires learning an entirely new, less widely used language. A second advantage is that JSP is much more widely supported by tool and server vendors than is PHP.2.3 Versus Pure ServletsJSP doesn't provide any capabilities that couldn't, in principle, be accomplished with servlets. In fact, JSP documents are automatically translated into servlets behind the scenes. But it is more convenient to write (and to modify!) regular HTML than to use a zillion println statements to generate the HTML. Plus, by separating the presentation from the content, you can put different people on different tasks: your Web page design experts can build the HTML by using familiar tools and either leave places for your servlet programmers to insert the dynamic content or invoke the dynamic content indirectly by means of XML tags.Does this mean that you can just learn JSP and forget about servlets? Absolutely not! JSPdevelopers need to know servlets for four reasons:JSP pages get translated into servlets. You can't understand how JSP works without understanding servlets.JSP consists of static HTML, special-purpose JSP tags, and Java code. What kind of Java code? Servlet code! You can't write that code if you don't understand servlet programming.Some tasks are better accomplished by servlets than by JSP. JSP is good at generating pages that consist of large sections of fairly well structured HTML or other character data. Servlets are better for generating binary data, building pages with highly variable structure, and performing tasks (such as redirection) that involve little or no output.Some tasks are better accomplished by a combination of servlets and JSP than by either servlets or JSP alone.2.4 ersus JavaScriptJavaScript, which is completely distinct from the Java programming language, is normally used to dynamically generate HTML on the client, building parts of the Web page as the browser loads the document. This is a useful capability and does not normally overlap with the capabilities of JSP (which runs only on the server). JSP pages still include SCRIPT tags for JavaScript, just as normal HTML pages do. In fact, JSP can even be used to dynamically generate the JavaScript that will be sent to the client. So, JavaScript is not a competing technology; it is a complementary one.It is also possible to use JavaScript on the server, most notably on Sun ONE (formerly iPlanet), IIS, and BroadVision servers. However, Java is more powerful, flexible, reliable, and portable.3. Misconceptions About JSPForgetting JSP Is Server-Side Technology,Here are some typical questions Marty has received (most of them repeatedly).Our server is running JDK 1.4. So, how do I put a Swing component in a JSP page?How do I put an image into a JSP page? I do not know the proper Java I/O commands to read image files.Since Tomcat does not support JavaScript,how do I make images that are highlighted when the user moves the mouse over them?Our clients use older browsers that do not understand JSP. What should we do?When our clients use "View Source" in a browser, how can I prevent them from seeing the JSP tags?All of these questions are based upon the assumption that browsers know something about the server-side process. But they do not. Thus:For putting applets with Swing components into Web pages, what matters is the browser's Java version—the server's version is irrelevant. If the browser supports the Java 2 platform, you use the normal APPLET (or Java plug-in) tag and would do so even if you were using non-Java technology on the server.You do not need Java I/O to read image files; you just put the image in the directory for Web resources (i.e., two levels up from WEB-INF/classes) and output a normal IMG tag.You create images that change under the mouse by using client-side JavaScript, referenced with the SCRIPT tag; this does not change just because the server is using JSP.Browsers do not "support" JSP at all—they merely see the output of the JSP page. So, make sure your JSP outputs HTML compatible with the browser, just as you would do with static HTML pages.And, of course you need not do anything to prevent clients from seeing JSP tags; those tags are processed on the server and are not part of the output that is sent to the client.Confusing Translation Time with Request Time,A JSP page is converted into a servlet. The servlet is compiled, loaded into the server's memory, initialized, and executed. But which step happens when? To answer that question, remember two points: The JSP page is translated into a servlet and compiled only the first time it is accessed after having been modified.Loading into memory, initialization, and execution follow the normal rules for servlets.The most frequently misunderstood entries are highlighted. When referring to the table, note that servlets resulting from JSP pages use the _jspService method (called for both GET and POST requests), not doGet or doPost. Also, for initialization, they use the jspInit method, not the init method.JSP page translated into servlet Servlet compiled Servlet loaded into server's memory jspInit called _jspService called.JSP技术概述作者:赞邦.朱利奥/赛克勒.迈克尔出处: 施普林格出版社(纽约公司)1.JSP的好处JSP页面最终会转换成服务程序。
网络设计与规划中英文对照外文翻译文献(文档含英文原文和中文翻译)Service-Oriented Network Architecture (SONA)1.T he challenges facing businessesAlthough a large number of IT capital investment, but many companies have found that most of the critical network resources and information assets remain in the free state. In fact, can not have hundreds of "orphaned" applications and databases communicate with each other is a common business phenomenon.This is partly due to growing internal and external customers, but due to unpredictable demand. Many companies have been forced to rapidly deploy new technologies, often leading to the deployment of a plurality of discrete systems, and thus can not effectively share information across the organization. For example, if you do not create the applications and information together various overlapping networks, sales, customer service or purchasing department will not be able to easily access customer records. Many companies have found that the blind expansion brought them multiple underutilized and irreconcilable separation systems and resources. These disparate systems while also difficult to manage and expensive to administer.2. Intelligent Information Network - The Cisco AdvantageCisco Systems, Inc. ® With the Intelligent Information Network (IIN) program, is helping global IT organizations solve these problems and meet new challenges, such as the deployment of service-oriented architecture, Web services and virtualization. IIN elaborated network in terms of promoting the development of integrated hardware and software, which will enable organizations to better align IT resources with business priorities. By intelligent built into the existing network infrastructure, IIN will help organizations achieve lower infrastructure complexity and cost advantages.3. Power NetworksInnovative IT environment focused on by traditional server-based system to distributenew business applications. However, the network is still transparent connectivity and support IT infrastructure platform for all components. Cisco ® Service-Oriented Network Architecture (SONA), enterprises can optimize applications, processes and resources to achieve greater business benefits. By providing better network capabilities and intelligence, companies can improve the efficiency of network-related activities, as well as more funds for new strategic investments and innovation.Standardization reduces the amount of assets needed to support the same operating costs, thereby improving asset efficiency. Virtualization optimizes the use of assets, physical resources can be divided logically for use in all sectors of the dispersion. Improve the efficiency of the entire network can enhance the flexibility and scalability, and then have a huge impact on business development, customer loyalty and profits - thereby enhancing their competitive advantage.4. Use architecture to succeedCisco SONA framework illustrates how companies should develop into intelligent information network to accelerate applications, business processes and resources, and to IT to provide enterprises with better service.Cisco SONA Cisco and Cisco partner solutions in the industry, services and experience to provide proven, scalable business solutions.Cisco SONA framework illustrates how to build on the full integration of the intelligent network integration system, in order to greatly improve the flexibility and efficiency.Enterprises can deploy this integrated intelligence among the entire network, including data centers, branch offices and campus environments.4-1 Cisco Service-Oriented Network ArchitectureApplication layer business applications collaborative applicationsInteractive Services Layer Application Networking Services Adaptive Management ServicesInfrastructure ServicesNetwork infrastructure virtualizationNetwork infrastructure layer Park branch office data center WAN / MAN teleworkers Client server storageIntelligent Information Network5. Three levels of Cisco SONANetwork infrastructure layer, where all the IT resources on the Internet converged network platformInteractive services layer, the use of network infrastructure, applications and business processes efficient allocation of resourcesApplication layer, contains business applications and collaboration applications, take advantage of the efficiency of interactive servicesIn the network infrastructure layer of Cisco's proven enterprise architecture provides comprehensive design guide that provides a comprehensive, integrated end-system design guidelines for your entire network.In the interactive services layer, Cisco will integrate a full-service intelligent systems to optimize the distribution business and collaboration applications, thereby providing more predictable, more reliable performance, while reducing operating costs.At the application layer, through deep integration with the network fabric, Cisco application networking solutions without having to install the client or change the application, the entire application delivery while maintaining application visibility and security.6. Build business advantage of Cisco SONASimpler, more flexible, integrated infrastructure will provide greater flexibility and adaptability, and thus a lower cost for higher commercial returns. Use Cisco SONA, you will be able to improve overall IT efficiency and utilization, thereby enhancing the effectiveness of IT, we call network multiplicative effect.7. Network amplification effectZoom effect refers to the network to help enterprises enhance the contribution of IT across the enterprise through Cisco SONA. Optimal efficiency and use IT resources will be more low-cost to produce higher impact on the business, so that your network of value-added resources become profitable.Network amplification effect is calculated as follows:Efficiency = Cost ÷ IT assets (IT assets cost + operating costs)Utilization percentage (such as the percentage of available storage being used) assets to total assets used =Effectiveness = Efficiency x usageAsset Effectiveness Network amplifying effect = assets ÷ efficacy when using the Cisco SONA when not in use Cisco SONA8. Investment incomeCisco Advantage Cisco SONA in intelligent systems is not only to improve efficiency and reduce costs. By Cisco SONA, through the power of your network can achieve:Increase in income and opportunityImproved customer relationsImprove business resiliency and flexibilityIncrease productivity and efficiency and reduce costs9. Real-Time DevelopmentBy Cisco SONA toward more intelligent integrated network development, enterprises can be completed in phases: integration, standardization, virtualization and automation. Working with Cisco channel partner or customer groups, you can use the Cisco SONA framework to develop a blueprint for the development of enterprises. With rich experience in Cisco Lifecycle Management Services, a leading position in the field of standardization, mature enterprise architecture and create targeted industry solutions, Cisco account team can help you meet business requirements in real time.10.The development of the Intelligent Information NetworkRole of the network is evolving. Tomorrow's intelligent network will provide more than basic connectivity, bandwidth and application user access services, which will provide end functionality and centralized control, to achieve true enterprise transparency and flexibility.Cisco SONA enables enterprises to extend their existing infrastructure, towards the development of intelligent network to accelerate applications and improve business processes. Cisco provides design, support and financing services to maximize your return on investment.服务导向网络架构(SONA)1.企业面临的挑战尽管投入大量IT资金,但许多企业发现大多数的关键网络资源和信息资产仍处于游离状态。
中英文资料外文翻译网站建设技术1.介绍网络技术的发展,为今天全球性的信息交流与资在建立源共享和交往提供了更多的途径和可能。
足不出户便可以知晓天下大事,按几下键盘或点几下鼠标可以与远在千里之外的朋友交流,网上通信、网上浏览、网上交互、网上电子商务已成为现代人们生活的一部分。
Internet 时代, 造就了人们新的工作和生活方式,其互联性、开放性和共享信息的模式,打破了传统信息传播方式的重重壁垒,为人们带来了新的机遇。
随着计算机和信息时代的到来,人类社会前进的脚步在逐渐加快。
近几年网页设计发展,快得人目不暇接。
随着网页设计技术的发展,丰富多彩的网页成为网上一道亮丽的风景线。
要想设计美观实用的网页就应该深入掌握网站建设技术。
在建立网站时,我们分析了网站建立的目的、内容、功能、结构,应用了更多的网页设计技术。
2、网站的定义2.1 如何定义网站确定网站的任务和目标,是建设网站所面临的最重要的问题。
为什么人们会来到你的网站? 你有独特的服务吗? 人们第一次到你的网站是为了什么? 他们还会再来吗? 这些问题都是定义网站时必须考虑的问题。
要定义网站,首先,必须对整个网站有一个清晰认识,弄清到底要设计什么、主要的目的与任务、如何对任务进行组织与规划。
其次,保持网站的高品质。
在众多网站的激烈竞争中,高品质的产品是长期竞争的最大优势。
一个优秀的网站应具备:(1)用户访问网站的速度要快;(2)注意反馈与更新。
及时更新网站内容、及时反馈用户的要求;(3)首页设计要合理。
首页给访问者留下的第一印象很重要,设计务必精美,以求产生良好的视觉效果。
2.2 网站的内容和功能在网站的内容方面,就是要做到新、快、全三面。
网站内容的类型包括静态的、动态的、功能的和事物处理的。
确定网站的内容是根据网站的性质决定的,在设计政府网站、商业网站、科普性网站、公司介绍网站、教学交流网站等的内容和风格时各有不同。
我们建立的网站同这些类型的网站性质均不相同。
毕业设计(论文)外文文献翻译2017届文献、资料题目:网上选课系统设计的关键技术及系统的构建文献、资料来源:文献、资料发表(出版)日期:院(部):专业:计算机科学与技术班级:姓名:学号:指导教师:翻译日期: 2017.02.14网上选课系统设计的关键技术及系统的构建Key Techniques for Web Course-Choosing System Design andConstructionEric T. Freeman / Elisabeth RobsonO'Reilly Media,Nanyang 473004,China 2008-05, TP311.52.摘要学生选课是学分制管理制度改革的核心。
目前,各企业及高校已经研制出的网上选课系统,或因管理模式不同或因系统通用性不强,使得直接投入使用有相当大的困难,为适应南阳理工学院学分制管理制度的改革需要,自主研发了网上选课系统。
给出了网上选课系统设计的三个关键技术:面向对象、系统安全、数据优化,并利用JSP技术构建了网上选课系统,实现了数据录入、查询检索、报表统计等功能。
为整体认识和解决基于学分制网上选课系统的结构方案设计,解决设计中的各种实际问题提供了技术、方法和手段的支持,也为全面系统地实现学分制教学管理模式的构建奠定了基础。
关键词:Web course-choosing / system design / key techniques / construction引言网上选课是学分制教学管理的重要组成部分,其特点可以概括为培养模式的多样性、学习内容的选择性、学习进程的自主性、学习时间与空间的灵活性等。
灵活性的大量增加严重冲击传统的教学管理模式,手工处理方式已不能适应新的管理模式,各高校都在探索研究适应新的教学管理模式的网上选课系统。
目前各高校自主研发的系统因紧密结合所在院校的教学管理模式,所以软件通用性不高,往往仅适用于所在高校。
毕业设计外文资料翻译题目基于WEB的网上选课系统的设计与实现学院信息科学与工程学院专业网络工程班级学生学号指导教师二〇一二年二月二十五日Key Techniques for Web Course—Choosing SystemDesign and ConstructionAbstract:The Web Course—Choosing is the core that the credit system management reforms ,at present,the Web Course—Choosing system that every enterprises and colleges and universities already develop out,13o sttong or because of the diversity managing a pattern or because of system general availability,can be used being put in use directly having pretty big difficulty.Developed out the Web Course—Choosing adapting to our college credit system requires.In this paper,three key techniques of W eb Co urse~Choosing design were given:O0,system security。
Data optimized.Using JSP technology,the Web Course—Choosing system with the functions of data input,query,statistics was also given.Gave technical and methodology supports for understanding the Web Course—Choosing system structural design,making full use of current practical projects,and solving the practical problems as well as paved the way of implementation of the Web Course—Choosing system based credit support system.Key words:Web course—choosing ;system design;key techniques;construction IntroductionOnline course selection is an important part of teaching management of credit system, its characteristics can be summarized as a training model of diversity, autonomy of selective learning content, learning processes, learning flexibility of time and space. Flexible teaching management mode of a significant increase in impact of traditional, manual approach does not suit the new management mode, all colleges and universities in research to adapt to the new mode of teaching administration of network course selection system.At present, the College developed a system for close connection with the College teaching management mode, so the software versatility is not high, often only apply to colleges and universities. Software versatility of enterprise development was strong, but later maintenance and redevelopment more difficult. Based on the above reasons, Nanyang Institute of technology has developed online course selection system based on teaching management of credit system.1.Analysis of course-choosing system requirements1.1 S tudents on course selection system functional requirements analysisStudents in the courses of the requirements within the time period, log on to the systemas an optional course, by-election, in the course selection process to be able to query the professional teaching program, instructors, such as scientific research, after the end of the course to be able to browse individual curricula, while allowing students access to personal files and all subjects.1.2Teachers ' course-selecting system functional requirements analysisTeachers can use the system, maintain their own research and archival information, other teachers have access to part of the research, to be able to query your course schedule, can query the courses students, to entry the students, to on course score for statistical analysis, inspection under the teaching plan and teaching schedule, and so on.1.3Manager course-selecting system functional requirements analysisManagers use the system to develop the teaching plan, have access to teachingschedule tasks, have access to all courses, students and teachers have access to basic information, to carry out all kinds of statistics, and so on.2. Key technologies for design of network course selection system andmethod2.1 System design process2.1.1 Database designDatabase design is reasonable, is the key to the smooth running of the Office software system. Online course selection through to serious research, teaching and foreign colleges and universities in the province runs the entire process means of tracking the implementation of requirements analysis, design of the e-r model, associate system functions and data structures, and are reflected in the database design process. The system database reference 《education management information standard under》, combination I school actual of Senate teaching management mode for design, while meet relationship database of entity integrity, and reference integrity, and user defined integrity requirements, using main key and outside key implementation data of integrity, using since defined of constraints conditions to reduced entry of complex of and errors rate, using trigger mechanism enhanced reference integrity and control database of changes, using storage process reduced database development personnel workload, improve database implementation speed. Foreground and background common to access a database server systems, taking into account the large amounts of data the system itself (such as students ' basic information basic information basic information, courses, teachers and more than more than 40) and therelationships between data, in accordance with the relational database paradigm of 3NF, as much as possible but without redundant data interdependence.2.1.2Server configurationServer configuration requirements (with PC Server as an example):Operating system: Windows 2003, Linux, and UnixJava runtime environment-Jdk1. 3. 1Application server: Tomcat 4. 0 percentDatabase server: SQL Server 2000, Oracle 8i& Oracle 9i、Mysql3.23 PCServer hardware requirements:CPU: Intel PIII 800 or more (recommended P4 1. 6G)Memory: 512M (recommend 1G)Hard disk: 40G (reference 80G)Problem to focus on addressing the Security Server with the server configuration: (1) using the security features of the operating system, the operating system, such as users, user groups and access rights for strict rules, turn off services that may lead to security vulnerabilities, such as Telnet, FTP, SendMail, etc;(2) in respect of hardware disk array technology, guarantee the security of server-side data.2.1.3 Client developmentDevelopment tools use the most popular Web programming language of JSP and JavaBean and Servlet technologies used in conjunction. Its advantage program page once compiled, dramatically improves program speed, followed by its good cross-platform.2.1.4Commissioning and publishingOnline course selection in three stages, namely normal course, lessons confirmed election results, and a by-election. Trial operation of the System 2003-level undergraduate students, students in the school to fill out course selection form within the required time, selected courses, which lasted a week. Normal course after the end of Dean's Office in the normal course results to remove are not eligible for classes teaching 8 classes in, while another 4 course class class. Students can be viewed on the course-choosing system Web site was removed, fill out the course teaching class list information, confirm the election results. After withdrawal, combined classes allow re-election of the same category of students in other courses. Normal course results when processing is complete, 143 people have a by-election. Dean's Office Manager for by-election results are processed, are still not eligible classes of the class withdrawn(that is no longer offering the course next semester). Students on the course to confirm the results, you can log in course selection system to print their own curricula. Through the trial operation of the system and achieve the goal of college book, since 2004 in the hospital.2.2Design of key technologies and methods2.2.1Object-oriented programming technologyMethod of object-oriented programming is a kind of support software reuse and modular design method of practical programming, its basic idea is to encapsulate and scalability. Packaging to bring software modularity, security, and so on, because there is no data coupling, objects with no action taken as a result of boundary effects, therefore, easier to maintain and modify [. Scalability to leave system interfaces for easy integration with other systems, this system to work with the library, personnel management system management system, scientific management system, theInstitute of financial management systems, Office OA system integration, people of the smooth realization of data export.2.2.2System security technologyInformation security system construction of the first issue, of course-choosingsystem key information (such as student achievement, student information, and so on) safety is essential, must be developed at the design stage of the systemconstruction of reliable security policy. This system from network traffic, serversecurity, database management systems, systems, procedures, computer virusprevention and cure of the five regard provide security:(1) network communications: virtual local area network (VI, AN) services andfirewall technologies. Your WEB server and database server system on Collegecampus virtual subnet, only allow internal users to access, shielded external user access. For network protocol for qualifying, cute as h, p Protocol allows you toaccess, such as FrP, TeNet Protocol implementation.(2) Server security.(3) the database account permissions and database, database view, accountoperations record operating information, concurrency control, trigger actions, such as time tracking, in addition, enables automatic data backup data, and so on.(4) system. a.Designed to dynamically set the user information in your application,access information, illegal may be effective in preventing the program from thesystem the client logs on to the system, and b. Application security control fordatabase operations, will not cause half of the data submitted, or submitted error; c.Data encryption technology, the system user (such as students, teachers, and so on) registered passwords are encrypted to eliminate user Session such as technologygets the password.(5) computer virus prevention: install legitimate antivirus on the server side Withanti-virus and firewall software, ensure that the functioning of the system.2.2.3 Database optimization techniques.(1) SQL statement optimization: SQL statement into the same purpose to be poorperformance the performance of SQL statements. Using artificial intelligence,automatically overriding SQL statements, so as to find the best performance of anequivalent SQL statement.(2) indexed: improving query speed of the system.(3) create views and stored procedures3. Online course system construction3.1 Construction of management systemSystems using Microsoft SQLServer2000 database in the background, foreground mining technology of JSP+JavaBean+Servlet and B/S mode Tomcat5. 0 as a WEB server, Internet course-selecting system features such as data entry, modification, querying, and statistics. Figure 1 is a system function module3.2System function(1) data maintenance functions: you can add, delete or modify data in a database operation, such as, and to deal with emergencies in the course selection process.(2) search function: can be based on user needs, such as students, teachers, and retrieve compliance data in a library.(3) data and statistics: statistical data in the database, and displayed as an icon, which found laws, provide reference for managers.(4) help: to provide users with timely, easy online help service. Figure 2 gives the student the normal course Interface, Figure 3 shows the student's schedule.4. Concluding remark s(1) after the course-choosing system, inputs to leap up in the students first, after four students ' course selection action, constantly modifying system functions, the currentsystem has been improved, and user more human.(2) policy, system security. Throughout the development phase of the system, had a number of discussions around the policy of credit system in College, due to prior implementation and to develop policies, resulting in wide range adjustment system modules, the progress made in the development of the system. (3) course-choosing system data processing algorithms that require further study and discussion. Current system is used in the optimization level and first-come, first-served approach, courses are not guaranteed a fair and just.References:[1] Hu Shijun, Wei-Chun yan, Rui Zhiyuan. Study on the current situation of credit system and its [j]. Gansu technology, 2004,20 (2): 151-153.[2]-SA divisions warmth, Wang Shan. An introduction to database systems [m]. Beijing: higher education press, 2002.[3] Tang Yang, Wei Xiong, Chen Hongcheng. , And so on. Mechanism design and implementation of database triggers [j]. Application of electronic technology. 2005 (2):16-18.[4] Liu De Chung Hom Kok. Principle and application of database system [m]. Wuhan: Hubei people s press. 2003.[5] Guo Haifeng. Yang Guogui. Oracle database performance tuning techniques and implementation [j]. Computer engineering. 2006. 32 (19): 82-94.网上选课系统设计的关键技术及系统的构建摘要:学生选课是学分制管理制度改革的核心。
毕业设计论文化学系毕业论文外文文献翻译中英文英文文献及翻译A chemical compound that is contained in the hands of the problemsfor exampleCatalytic asymmetric carbon-carbon bond formation is one of the most active research areas in organic synthesis In this field the application of chiral ligands in enantioselective addition of diethylzinc to aldehydes has attracted much attention lots of ligands such as chiral amino alcohols amino thiols piperazines quaternary ammonium salts 12-diols oxazaborolidines and transition metal complex with chiral ligands have been empolyed in the asymmetric addition of diethylzinc to aldehydes In this dissertation we report some new chiral ligands and their application in enantioselective addition of diethylzinc to aldehydes1 Synthesis and application of chiral ligands containing sulfur atomSeveral a-hydroxy acids were prepared using the literature method with modifications from the corresponding amino acids valine leucine and phenylalanine Improved yields were obtained by slowly simultaneous addition of three fold excess of sodium nitrite and 1 tnolL H2SO4 In the preparation of a-hydroxy acid methyl esters from a-hydroxy acids following the procedure described by Vigneron a low yield 45 was obtained It was found that much better results yield 82 couldbe obtained by esterifying a-hydroxy acids with methanol-thionyl chlorideThe first attempt to convert S -2-hydroxy-3-methylbutanoic acid methyl ester to the corresponding R-11-diphenyl-2-mercapto-3-methyl-l-butanol is as the following S-2-Hydroxy-3-methylbutanoic acid methyl ester was treated with excess of phenylmagnesium bromide to give S -11-diphenyl-3-methyl-12-butanediol which was then mesylated to obtain S -11-diphenyl-3-methyl-2-methanesulfonyloxy -l-butanol Unfortunately conversion of S-11-diphenyl-3-methyl-2- methanesulfonyloxy -l-butanol to the corresponding thioester by reacting with potassium thioacetate under Sn2 reaction conditions can be achieved neither in DMF at 20-60 nor in refluxing toluene in the presence of 18-crown-6 as catalyst When S -1ll-diphenyl-3-methyl-2- methane sulfonyloxy -l-butanol was refluxed with thioacetic acid in pyridine an optical active epoxide R-22-diphenyl -3-isopropyloxirane was obtained Then we tried to convert S -11-diphenyl-3-methyl-l2-butanediol to the thioester by reacting with PPh3 DEAD and thioacetic acid the Mitsunobu reaction but we failed either probably due to the steric hindrance around the reaction centerThe actually successful synthesis is as described below a-hydroxy acid methyl esters was mesylated and treated with KSCOCH3 in DMF to give thioester this was than treated with phenyl magnesium bromide to gave the target compound B-mercaptoalcohols The enantiomeric excesses ofp-mercaptoalcohols can be determined by 1H NMR as their S -mandeloyl derivatives S -2-amino-3-phenylpropane-l-thiol hydrochloride was synthesized from L-Phenylalanine L-Phenylalanine was reduced to the amino alcohol S -2-amino-3-phenylpropanol Protection of the amino group using tert-butyl pyrocarbonate gave S -2-tert-butoxycarbonylamino-3-phenylpropane-l-ol which was then O-mesylated to give S -2-tert-butoxycarbonylamino-3-phenylpropyl methanesulfonate The mesylate was treated with potassium thioacetate in DMF to give l-acetylthio-2-tert-butoxycarbonylamino-3-phenylpropane The acetyl group was then removed by treating with ammonia in alcohol to gave S -2-tert-butoxycarbonylamino-3-phenyl-propane-l-thiol which was then deprotected with hydrochloric acid to give the desired S-2-amino-3-phenylpropane-1-thiol hydrochlorideThe enantioselective addition of diethylzinc to aldehydes promoted by these sulfur containing chiral ligands produce secondary alcohols in 65-79 Synthesis and application of chiral aminophenolsThree substituted prolinols were prepared from the naturally-occurring L-proline using reported method with modifications And the chiral aminophenols were obtained by heating these prolinols with excess of salicylaldehyde in benzene at refluxThe results of enantioselective adBelow us an illustration forexampleN-Heterocyclic carbenes and L-Azetidine-2-carboxylicacidN-Heterocyclic carbenesN-Heterocyclic carbenes have becomeuniversal ligands in organometallic and inorganic coordination chemistry They not only bind to any transition metal with low or high oxidation states but also to main group elements such as beryllium sulfur and iodine Because of their specific coordination chemistry N-heterocyclic carbenes both stabilize and activate metal centers in quite different key catalytic steps of organic syntheses for example C-H activation C-C C-H C-O and C-N bond formation There is now ample evidence that in the new generation of organometallic catalysts the established ligand class of organophosphanes will be supplemented and in part replaced byN-heterocyclic carbenes Over the past few years this chemistry has become the field of vivid scientific competition and yielded previously unexpected successes in key areas of homogeneous catalysis From the work in numerous academic laboratories and in industry a revolutionary turningpoint in oraganometallic catalysis is emergingIn this thesis Palladium Ⅱ acetate and NN"-bis- 26-diisopropylphenyl dihydro- imidazolium chloride 1 2 mol were used to catalyze the carbonylative coupling of aryl diazonium tetrafluoroborate salts and aryl boronic acids to form aryl ketones Optimal conditions include carbon monoxide 1 atm in 14-dioxane at 100℃ for 5 h Yields for unsymmetrical aryl ketones ranged from 76 to 90 for isolated materials with only minor amounts of biaryl coupling product observed 2-12 THF as solvent gave mixtures of products 14-Dioxane proved to be the superior solvent giving higher yieldsof ketone product together with less biphenyl formation At room temperature and at 0℃ with 1 atm CO biphenyl became the major product Electron-rich diazonium ion substrates gave a reduced yield with increased production of biaryl product Electron-deficient diazonium ions were even better forming ketones in higher yields with less biaryl by-product formed 2-Naphthyldiazonium salt also proved to be an effective substrate givingketones in the excellent range Base on above palladium NHC catalysts aryl diazonium tetrafluoroborates have been coupled with arylboron compounds carbon monoxide and ammonia to give aryl amides in high yields A saturated yV-heterocyclic carbene NHC ligand H2lPr 1 was used with palladium II acetate to give the active catalyst The optimal conditions with 2mol palladium-NHC catalyst were applied with various organoboron compounds and three aryl diazonium tetrafluoroborates to give numerous aryl amides in high yield using pressurized CO in a THF solution saturated with ammonia Factors that affect the distribution of the reaction products have been identified and a mechanism is proposed for this novel four-component coupling reactionNHC-metal complexes are commonly formed from an imidazolium salt using strong base Deprotonation occurs at C2 to give a stable carbene that adds to form a a-complex with the metal Crystals were obtained from the reaction of imidazolium chloride with sodium t- butoxide Nal and palladium II acetate giving a dimeric palladium II iodide NHC complex The structure adopts a flat 4-memberedring u2 -bridged arrangement as seen in a related dehydro NHC complex formed with base We were pleased to find that chloride treated with palladium II acetate without adding base or halide in THF also produced suitable crystals for X-ray anaysis In contrast to the diiodide the palladium-carbenes are now twisted out of plane adopting a non-planar 4-ring core The borylation of aryldiazonium tetrafluoroborates with bis pinacolatoborane was optimized using various NHC ligand complexes formed in situ without adding base NN"-Bis 26-diisopropylphenyl-45-dihydroimidazolium 1 used with palladium acetate in THF proved optimal giving borylated product in 79 isolated yield without forming of bi-aryl side product With K2CO3 and ligand 1 a significant amount of biaryl product 24 was again seen The characterization of the palladium chloride complex by X-ray chrastallography deL-Azetidine-2-carboxylic acidL-Azetidine-2-carboxylic acid also named S -Azetidine-2-carboxylic acid commonly named L-Aze was first isolated in 1955 by Fowden from Convallaria majalis and was the first known example of naturally occurring azetidine As a constrained amino acid S -Azetidine-2-carboxylic acid has found many applications in the modification of peptides conformations and in the area of asymmetric synthesis which include its use in the asymmetric reduction of ketones Michael additions cyclopropanations and Diels-Alder reactions In this dissertation five ways for synthesize S-Azetidine-2-carboxylic acid were studied After comparing all methods theway using L-Aspartic acid as original material for synthesize S-Azetidine-2-carboxylic acid was considered more feasible All mechanisms of the way"s reaction have also been studied At last the application and foreground of S -Azetidine-2-carboxylic acid were viewed The structures of the synthetic products were characterized by ThermalGravity-Differential Thermal Analysis TG-DTA Infrared Spectroscopy IR Mass Spectra MS and 1H Nuclear Magnetic Resonance 1H-NMR Results showed that the structures and performances of the products conformed to the anticipation the yield of each reaction was more than 70 These can conclude that the way using L-Aspartie acid as original material for synthesize S -Azetidine-2-carboxylic acid is practical and effective杂环化合物生成中包含手性等问题如催化形成不对称碳碳键在有机合成中是一个非常活跃的领域在这个领域中利用手性配体诱导的二乙基锌和醛的不对称加成引起化学家的广泛关注许多手性配体如手性氨基醇手性氨基硫醇手性哌嗪手性四季铵盐手性二醇手性恶唑硼烷和过渡金属与手性配体的配合物等被应用于二乙基锌对醛的不对称加成中在本论文中我们报道了一些新型的手性配体的合成及它们应用于二乙基锌对醛的不对称加成的结果1含硫手性配体的合成和应用首先从氨基酸缬氨酸亮氨酸苯丙氨酸出发按照文献合成α-羟基酸并发现用三倍量的亚硝酸钠和稀硫酸同时滴加进行反应能适当提高反应的产率而根据Vigneron等人报道的的方法用浓盐酸催化从α-羟基酸合成α-羟基酸甲酯时只能获得较低的产率改用甲醇-二氯亚砜的酯化方法时能提高该步骤的产率从 S -3-甲基-2-羟基丁酸甲酯合成 R -3-甲基-11-二苯基-2-巯基-1-丁醇经过了以下的尝试 S -3-甲基-2-羟基丁酸甲酯和过量的格氏试剂反应得到 S -3-甲基-11-二苯基-12-丁二醇进行甲磺酰化时位阻较小的羟基被磺酰化生成 S -3-甲基-11-二苯基-2- 甲磺酰氧基 -1-丁醇但无论将 S -3-甲基-11-二苯基-2- 甲磺酰氧基 -1-丁醇和硫代乙酸钾在DMF中反应 20~60℃还是在甲苯中加入18-冠-6作为催化剂加热回流都不能得到目标产物当其与硫代乙酸在吡啶中回流时得到的不是目标产物而是手性环氧化合物 R -3-异丙基-22-二苯基氧杂环丙烷从化合物 S -3-甲基-11-二苯基-12-丁二醇通过Mitsunobu反应合成硫代酯也未获得成功这可能是由于在反应中心处的位阻较大造成的几奥斯塑手村犯体的合成裁其在不对称奋成中肠左用摘要成功合成疏基醇的合成路是将a-轻基酸甲酷甲磺酞化得到相应的磺酞化产物并进行与硫代乙酸钾的亲核取代反应得到硫酷进行格氏反应后得到目标分子p一疏基醇用p一疏基醇与 R 义一一甲氧基苯乙酞氯生成的非对映体经H侧NM吸测试其甲氧基峰面积的积分求得其ee值 3一苯基一氨基丙硫醇盐酸盐从苯丙氨酸合成斗3一苯基一氨基丙醇由L一苯丙氨酸还原制备氨基保护后得到习一3一苯基一2一叔丁氧拨基氨基一1一丙醇甲磺酞化后得到习一3一苯基一2一叔丁氧拨基氨基一1一丙醇甲磺酸酷用硫代乙酸钾取代后得匀一3-苯基一2一叔丁氧拨基氨基一1一丙硫醇乙酸酷氨解得习一3一苯基一2一叔丁氧拨基氨基一1一丙硫醇用盐酸脱保护后得到目标产物扔3一苯基屯一氨基丙硫醇盐酸盐手性含硫配体诱导下的二乙基锌与醛的加成所得产物的产率为65一79值为O井92手性氨基酚的合成和应用首先从天然的L一脯氨酸从文献报道的步骤合成了三种脯氨醇这些手性氨基醇与水杨醛在苯中回流反应得到手性氨基酚手性氨基酚配体诱导下的二乙基锌与醛的加成所得产物的产率为45一98值为0一90手性二茂铁甲基氨基醇的合成和应用首先从天然氨基酸绿氨酸亮氨酸苯丙氨酸和脯氨酸合成相应的氨基醇这些氨基醇与二茂铁甲醛反应生成的NO一缩醛经硼氢化钠还原得到手性二茂铁甲基氨基醇手性二茂铁甲基氨基醇配体诱导下的二乙基锌与醛的加成所得产物的产率为66一97下面我们举例说明一下例如含氮杂环卡宾和L-氮杂环丁烷-2-羧酸含氮杂环卡宾含氮杂环卡宾已广泛应用于有机金属化学和无机配合物化学领域中它们不仅可以很好地与任何氧化态的过渡金属络合还可以与主族元素铍硫等形成配合物由于含氮杂环卡宾不但使金属中心稳定而且还可以活化此金属中心使其在有机合成中例如C-H键的活化C-CC-HC-O和C-N键形成反应中有着十分重要的催化效能现有的证据充分表明在新一代有机金属催化剂中含氮杂环卡宾不但对有机膦类配体有良好的互补作用而且在有些方面取代有机膦配体成为主角近年来含氮杂环卡宾及其配合物已成为非常活跃的研究领域在均相催化这一重要学科中取得了难以想象的成功所以含氮杂环卡宾在均相有机金属催化领域的研究工作很有必要深入地进行下去本文研究了乙酸钯和NN双 26-二异丙基苯基 -45-二氢咪唑氯化物1作为催化剂催化芳基四氟硼酸重氮盐与芳基硼酸的羰基化反应合成了一系列二芳基酮并对反应条件进行了优化使反应在常温常压下进行一个大气压的一氧化碳14-二氧杂环己烷作溶剂100℃反应5h 不同芳基酮的收率达7690仅有微量的联芳烃付产物 212 反应选择性良好当采用四氢呋喃或甲苯作溶剂时得到含较多副产物的混合物由此可以证明14-二氧杂环己烷是该反应最适宜的溶剂在室温或0℃与一个大气压的一氧化碳反应联芳烃变成主产物含供电子取代基的芳基重氮盐常常给出较低收率的二芳基酮而含吸电子取代基的芳基重氮盐却给出更高收率的二芳基酮及较少量的联芳烃付产物实验证明2-萘基重氮盐具有很好的反应活性和选择性总是得到优异的反应结果在此基础上由不同的芳基四氟硼酸重氮盐与芳基硼酸一氧化碳和氨气协同作用以上述含氮杂环卡宾作配体与乙酸钯生成的高活性含氮杂环卡宾钯催化剂催化较高收率地得到了芳基酰胺优化的反应条件是使用2mol的钯-H_2IPr 1五个大气压的一氧化碳以氨气饱和的四氢呋喃作溶剂由不同的有机硼化合物与三种芳基重氮盐的四组份偶联反应同时不仅对生成的多种产物进行了定 L-氮杂环丁烷-2-羧酸L-氮杂环丁烷-2-羧酸又称 S -氮杂环丁烷-2-羧酸简称为L-Aze1955年由Fowden从植物铃兰 Convallaria majalis 中分离得到成为第一个被证实的植物中天然存在的氮杂环丁烷结构作为一种非典型的氨基酸已经发现 S -氮杂环丁烷-2-羧酸可广泛用于对多肽结构的修饰以及诸如不对称的羰基还原Michael 加成环丙烷化和Diels-Alder反应等不对称合成中的多个领域本文通过对 S -氮杂环丁烷-2-羧酸合成路线的研究综述了五种可行的合成路线及方法通过比较选用以L-天冬氨酸为初始原料合成 S -氮杂环丁烷-2-羧酸的路线即通过酯化反应活泼氢保护格氏反应内酰胺化反应还原反应氨基保护氧化反应脱保护等反应来合成 S -氮杂环丁烷-2-羧酸分析了每步反应的机理并对 S -氮杂环丁烷-2-羧酸的应用及前景给予展望通过热分析红外质谱核磁等分析手段对合成的化合物的结构进行表征结果表明所得的产物符合目标产物所合成的化合物的结构性能指标与设计的目标要求一致每步反应的收率都在70%以上可以判定以L-天冬氨酸为初始原料合成 S -氮杂环丁烷的路线方案切实可行。
外文文献翻译(2012届)学生姓名学号********专业班级计算机科学与技术08-5班指导教师微软Visual Studio1微软Visual StudioVisual Studio 是微软公司推出的开发环境,Visual Studio可以用来创建Windows平台下的Windows应用程序和网络应用程序,也可以用来创建网络服务、智能设备应用程序和Office 插件。
Visual Studio是一个来自微软的集成开发环境IDE(inteqrated development environment),它可以用来开发由微软视窗,视窗手机,Windows CE、.NET框架、.NET精简框架和微软的Silverlight支持的控制台和图形用户界面的应用程序以及Windows窗体应用程序,网站,Web应用程序和网络服务中的本地代码连同托管代码。
Visual Studio包含一个由智能感知和代码重构支持的代码编辑器。
集成的调试工作既作为一个源代码级调试器又可以作为一台机器级调试器。
其他内置工具包括一个窗体设计的GUI应用程序,网页设计师,类设计师,数据库架构设计师。
它有几乎各个层面的插件增强功能,包括增加对支持源代码控制系统(如Subversion和Visual SourceSafe)并添加新的工具集设计和可视化编辑器,如特定于域的语言或用于其他方面的软件开发生命周期的工具(例如Team Foundation Server的客户端:团队资源管理器)。
Visual Studio支持不同的编程语言的服务方式的语言,它允许代码编辑器和调试器(在不同程度上)支持几乎所有的编程语言,提供了一个语言特定服务的存在。
内置的语言中包括C/C + +中(通过Visual C++),(通过Visual ),C#中(通过Visual C#)和F#(作为Visual Studio 2010),为支持其他语言,如M,Python,和Ruby等,可通过安装单独的语言服务。
US-China Education Review, ISSN 1548-6613February 2011, Vol. 8, No. 2, 220-232220Potential Use of Course Management Systems in HigherEducation Institutions in JordanMuhannad Al-Shboul The University of Jordan, Amman, JordanGiven the increased adoption of the CMS (course management systems) as an instructional tool, it is important toaddress the potential use of this technology in Jordanian higher education institutions. This study investigates thepotential to use CMS tools in instruction in the academic institutions in Jordan. This study does not seek to evaluatethe current use of computer mediated tools or their features in instruction. Its purpose is to investigate what iscurrently taking place with CMS in higher education settings. Therefore, the study does not seek to determine thevalue that the use of the CMS tools may have contributed to instruction, however, it identifies the level oftechnology integration as well as the level of the technology use in higher education and problems associated withits use among the faculty. This study identifies prevalent faculty attitudes and perceptions toward the potential useof CMS tools in higher education institutions, in general, and in Jordan, in particular.Keywords: course management systems, e-learning, Web-based learning, authoring toolsIntroductionCMS (course management systems) are fairly new software tools that have been used in an educational setting for around a decade. CMS are Internet-based software that manage student enrollment, track student performance, and create and distribute course content electronically. In this way, the CMS allow faculty members to manage their courses and use technology tools in their teaching, as well as enable them to extend the classroom beyond its traditional boundaries of time and space (Warner, 2003). The main purpose of CMS packages is to enable faculty to create course Web sites, that is to place course materials online and manage course activities (Kuriloff, 2001). In short, CMS are tools that faculty can use to create online course content (without knowing programming languages), communicate electronically with students and conduct assessments (Dabbagh, 2001).CMS became widely available in 1997, and their popularity and use have increased dramatically ever since (Rabinowitz & Ullman, 2004). CMS tools (such as blackboard, WebCT, Webboard, moodle and LiveText) have become invaluable tools for teaching with technology and have been widely adopted by many colleges and universities all over the world. In addition, courses that use CMS tools to deliver content are currently being integrated into instruction at a rapid pace (Green, 2002; Nelson, 2003). Three aspects of CMS make them extraordinary tools for ordinary instructors. First, the files are all kept on CMS servers. Second, it is invaluable to instructors that the entire course can be archived for future use. Third, they have the convenience that theMuhannad Al-Shboul, Ph.D., assistant researcher, Computer Center, The University of Jordan.POTENTIAL USE OF COURSE MANAGEMENT SYSTEMS 221users can access the course materials from anywhere at any time (Caplan-Carbin, 2003).One of the main advantages of CMS is that faculty can design asynchronous course activities and communication outside the face-to-face class (Widmayer, 2000). According to Rabinowitz and Ullman (2004), faculty have much to teach and explain to their students, but there is never enough time during a semester to cover all of what they want to cover. For this reason, they indicated that CMS were developed to help the faculty solve the time issue that they encountered during their lectures and assist them in course development and overall management using the Internet.However, “Effective use of CMS tools does not result from the use of the tools but rather from the integration of the tools in teaching” (Nelson, 2003, p. 3). If we are to understand and realize the potential use of such CMS tools in higher education in Jordan from a learning perspective, we must understand the perceptions of both faculty users and non-users of the CMS authoring tools. Consequently, as more courses require the use of CMS tools, as more funding is required to implement and support these classes, and as more time is required to develop and facilitate these courses, it becomes critical to understand why faculty choose to use or not to use these tools for their course support. In other words, we should examine the motivating factors for using CMS tools as well as the inhibiting factors from using CMS tools as perceived by the faculty members.Given the increased adoption of the CMS as instructional tools, it is important to address the potential use of this technology in Jordanian higher education institutions. This study investigates the potential to use CMS tools in instruction in the academic institutions in Jordan. In this regard, it is very important to point out that this study is just a direct reflection of the literature on the level of faculty involvement and the challenges that are associated with using CMS tools in higher education in general. Specifically, this study is considered as a cornerstone for another study, which will be conducted at the mid of September 2010 in one of the public universities in Jordan by the researcher to verify the findings of the reviewed literature as they revealed in this paper.In addition, because Jordan has almost the same academic atmosphere comparing to that of the international one; also, because Jordan is utilizing almost the same CMS and authoring tools, it is important to point out that the findings of this study are not only applied to the international academic institutions, but also applied to the academic institutions in Jordan as well.This study is organized into four parts. Part one introduces the significance of the study and describes the purpose of the study. Part two provides a literature review about the use of CMS in instruction and addresses a brief history of CMS in higher education and the related faculty perspectives. Part three describes what is currently taking place with CMS integration at higher education institutions and discusses what higher education administrations could do to improve the utilization of CMS tools at their campuses. And part four provides the findings of the study, conclusions and recommendations for future studies.Significance of the StudyA major thrust of education is integration of technology into teaching (Nelson, 2003). Technology by itself cannot be effective. Providing the latest technology to learners does not necessarily ensure improved learners’ participation or achievement. Additionally, technology does not necessarily improve instruction. Faculty’s attitude toward technology was found to be an important element in a successful integration of technology (Mitra, Steffensmeier, Lenzmeier, & Massoni, 1999; Nelson, 2003). It is important to investigate the level of technology integration in education, in general, and in Jordan, in particular; specifically, the faculty’s attitudesPOTENTIAL USE OF COURSE MANAGEMENT SYSTEMS222toward the utilization of CMS in their classrooms.In a recent study of technology innovations, Lynch (2002) found that, while 80% of colleges in his study have course management systems available, faculty only use these tools in 20% of courses offered. Why is such a low percentage of faculty members making use of CMS tools in educational settings? “Despite its potential benefits, the effectiveness of computer mediated communication when used to support learning in higher education is very variable, making it important to identify those factors which best predict successful implementations” (Tolmie & Boyle, 2000, p. 138). However, research indicates that one of the problems hindering the use of distance education tools (technology) in higher education is faculty resistance (Berge, 1998). Research is needed to explore the faculty perceptions about the use of CMS tools in instruction in higher education institutions.This study is valuable for the instructional technology leadership, because it establishes a cornerstone for any development training program for faculty technology integration at higher education institutions. Also this study is beneficial to instructional technologists in understanding faculty reluctance when diffusing new instructions or educational packages.The purpose of this study is to identify the issues and concerns of the use of CMS and similar tools in higher education. Specifically, the study, based on the reviewed literature, identifies the faculty’s perceptions about their use of CMS tools, identifies the factors that might be related to faculty use of CMS and investigates what higher education institutions can do to improve the utilization of CMS at their campuses.Research on faculty’s uses of technology in instruction is important, because educators who are comfortable about using technology model positive uses of technology to learners (Chiero, 1997; Kagima, 2001; Taylor, Torrie, Hausafus, & Strasser, 1999). Conducting research on faculty attitudes toward the use of CMS tools in teaching is important, because the findings will help understand technology integration.The importance of the obtained information can assist higher education institutions in determining the educational costs and value in terms of CMS effectiveness regarding the technology integration, because academic institutions spend millions of dollars per year on technology. Also, the obtained data can help in determining what academic institutions can do to improve technology integration (such as CMS) at their campuses. The obtained data can provide information about what academic institutions can do to reduce, minimize or overcome the obstacles to technology integration (such as CMS), because the level of technology integration has become a source of data upon which to evaluate university performance and reputation (Feeney, 2001).Identifying the level of technology integration in higher education and faculty’s attitudes and perceptions toward CMS in higher education may lead to a better understanding of the causes of reluctance to CMS use. This study helps fill in the gap in the current instructional technology knowledge base regarding faculty attitudes and perceptions concerning the use of CMS in higher education, as well as the level of technology integration in higher education.Additionally, the findings from this study assist faculty development directors when developing training programs for the faculty. Faculty training has been found to be an essential factor for successful implementation of new technology in higher education teaching and learning environments (Butler & Sellbom, 2002; Morgan, 2003; Ndahi, 1999).This study does not seek to evaluate the current use of computer mediated tools or their features in instruction. Its purpose is to investigate what is currently taking place with CMS in higher education settings.POTENTIAL USE OF COURSE MANAGEMENT SYSTEMS 223Therefore, the study does not seek to determine the value that the use of the CMS tools may have contributed to instruction; however, it identifies the level of technology integration as well as the level of the technology use in higher education and problems associated with its use among the faculty.Literature ReviewCurrent research indicates that many faculty members choose to integrate CMS tools for a variety of reasons. Some are interested in the convenience factor the tools provide for communication with students, while others are motivated because of administrative pressure. Whatever the reasons, most CMS tools are currently underexploited in teaching (Nelson, 2003).Many college faculty members are using CMS tools to supplement their traditional classroom instruction (Nelson, 2003; Warner, 2003). Clifford, Earp and Reisinger (2003) indicated that data published in Market Data Retrieval’s 2002-2003 Annual Survey of Instructional Technology Trends in Higher Education showed that 91% of colleges and universities reported using some type of CMS in 2002. Most of reviewed research indicated that the primary use of CMS tools is mainly for communication and convenience purposes (Dietz-Uhler & Bishop-Clark, 2001; Grandgenett, 2001; Mitra, Hazen, LaFrance, & Rogan, 1999; Nelson, 2003; Sherry, 1999; Strudler & Wetzel, 1999).Lewallen (1998) found that 100% of faculty surveyed used CMS communication tools in their daily life activities, but only about one-third of the same faculty used these tools in their teaching. Thus, “Some faculty members are simply unable to connect technology use to their teaching” (Nelson, 2003, p. 21). However, to many faculty members, technology use is often viewed as a separate activity and does not require the same forethought as traditionally formatted course tasks (Pierson, 2001). “Attitude toward technology and prior use of technology was found to be an important element” (Nelson, p. 21); therefore, “Faculty who possess a positive attitude about CMS tools are more likely to use them in instruction” (p. 21).“The influence of technology on teaching and learning is becoming more and more evident in educational institutions” (Ndahi, 1999, p. 21). The increasing availability of effective technology justifies investigating the level of faculty involvement, and the challenges that are associated with using these technologies. Some of these technologies are new to many institutions and faculty (Ndahi, 1999). Additionally, when people within an organization plan for using new or existing technology, there are several barriers to their efforts that they are likely to encounter. A consideration of the barriers faced by organizations may help organizational leaders find solutions to reduce or minimize these obstacles (Cho & Berge, 2002).According to Cho and Berge (2002), organizational cultures, norms and strategic planning influence the adoption and deployment of technology. Hence, most of the literature found that the need for faculty development and institutional support (encouragement and incentive) are consistently identified as primary factors influencing the use of new instructional technology at higher education settings (Butler & Sellbom, 2002; Morgan, 2003; Ndahi, 1999).According to Feeney (2001), CMS have been the focus of recent scholarly attention. As integrating technology into higher education becomes an institutional imperative at schools across the US, adoption of digital courses in new CMS becomes both an organizational goal and a source of data upon which to evaluate performance. Furthermore, Feeney (2001) stated that higher education institutions face persistent challenges in the use of technology, with the CMS being the latest technology challenge.POTENTIAL USE OF COURSE MANAGEMENT SYSTEMS224According to the 2003 Campus Computing project, more than 80% of universities and colleges in the US utilized CMS (Morgan, 2003). Harrington, Gordon and Schibik (2004) noted that perhaps no other innovation in higher education has resulted in such rapid and widespread use as the CMS. In the early of mid 1990s, faculty utilized a variety of Web-based tools to supplement course content and curriculum. Many faculty began using email and basic HTML (hypertext markup language) functionality in an attempt to increase interaction and enhance the teaching and learning process.Research indicated that one of the problems hindering the use of CMS in higher education is faculty resistance (Betts, 1998). Despite the expansion of distance education programs and its related technology across the US, many faculties are reluctant to participate in distance education or use its related technology, such as CMS (Olcott & Wright, 1995). Faculty’s reluctance has been linked to internal issues such as a lack of incentives and rewards systems to encourage faculty participation and a lack of an institutional framework to train distance teaching faculty (Lewis, 1985; Verduin & Clark, 1991). Betts (1998) stated that one of the primary factors that influences faculty participation in distance education and its related technology is the effect on faculty workload.According to Harrington et al. (2004), many universities, in an attempt to reduce the load on faculty, hired webmasters and instructional designers to assist faculty in creating more dynamic and learner-friendly instructional related websites. Several higher education institutions and commercial companies foresaw the need for more user-friendly approaches to put course materials on the Web and the need for increased availability to learners via the Internet. These entities began developing systems that would be relatively easy to use, requiring little or no knowledge of programming language (HTML, Java) and with the tools necessary to be useful for instruction. Between 1995 and 1997, several academic and commercial CMS applications were launched in the higher education market.These early CMS had only slight variations in available tools (Gray, 1998, 1999; Katz, 2003). Over time, a core group of tools were available with essentially all CMS. These core components included tools for synchronous and asynchronous communication, content storage and delivery; online quiz and survey tools, gradebooks, whiteboards, digital dropboxes and email communications (Harrington et al., 2004). While the majority of these tools are seen in the most commonly used CMS today, the robustness, flexibility and ease of use have generally all been refined. Furthermore, a vast array of additional components have been added, including mechanisms for just-in-time delivery and integration to front- and back-office administrative computing systems.Hannafin and Savenye (1993) examined some of the reasons why many instructors do not use, and sometimes resist, technology. They found that instructors may have felt threatened by change, so chose to resist it; they stated, “Fear is often cited as a reason for teacher resistance, even preventing some teachers from using any form of technology in the classroom” (p. 27). They also found that little formal effort was made to support instructors who tried to implement new technology. Wolski and Jackson (1999) indicated that there is a need for better representations of why some faculties adopt technology and why some faculties resist it.Katz (2003) reported that the past several years have witnessed the emergence of the CMS as an integral part of higher education’s instructional infrastructure. CMS have “become dominant elements of higher education’s system of educational delivery” (Morgan, 2003, p. 85). Green (1995) reported that 6% of all college courses used Web-based resources to support instruction; then Green (2001) found that 73.2% of the institutionsPOTENTIAL USE OF COURSE MANAGEMENT SYSTEMS 225sampled used CMS. Hence, “College and university campuses have and continue to designate resources to technology integration” (Nelson, 2003, p. 32). However, given the change that is required to integrate CMS tools effectively, timely faculty development, support and learning materials are gaining importance.Ely (2002) indicated that traditional approaches to teaching and learning in postsecondary environments continue to be a dominant force for a number of reasons: (1) professors hesitate to change; (2) some faculty do not have the skills to use information technology and are not especially eager to learn; and (3) there is an institutional reluctance to provide sufficient personnel and financial assistance to facilitate the use of networking. He noted that almost every technological development that has had potential for improving instruction has been confronted with barriers regarding user skill and confidence. Ely (2002) also indicated that potential users may be convinced that the technology has potential for improving learning, but the potential users are often reluctant to acquire the skills for using the new technology.In summary, the reviewed literature identified that the problems facing higher education faculty in integrating technology into their classes need to be addressed to improve the level of technology utilization. Furthermore, the reviewed literature identified that the level of CMS use has increased as faculty perspectives toward such technology have been addressed.Technology Integration in Higher EducationThis section addresses the level of technology integration in higher education and problems associated with its use among the faculty. “Technology is continuing to be a driving force in the delivery of education. Most college and university campuses have and continue to designate resources to technology integration. For faculty members, this is exciting and challenging” (Nelson, 2003, p. 32).While Ely (2002) indicated that “Faculty members at institutions of higher education have usually been late adopters of innovations for teaching and learning” (p. 11), Green (2000) pointed out that more college courses are using more technology resources. Green’s 2000 survey revealed that three-fifths (59.3%) of all college courses now utilize electronic mail, up from 54% in 1999, 44% in 1998 and 20.1% in 1995. Furthermore, the survey revealed that two-fifths (42.7%) of college courses in 2000 used Web resources as a component of the syllabus, up from 10.9% in 1995, 33.1% in 1998 and 38.9% in 1999. Moreover, Green’s 2000 survey revealed that almost one-third (30.7%) of all college courses had a Web page, compared to 28.1% in 1999, 22.5% in 1998 and 9.2% in 1996. Green’s 2000 Campus Computing Survey revealed that almost one-fourth (23.0%) of all college faculty had a personal Web page not linked to a specific class or course, compared to just 19% in 1999.The integration of technology in teaching in higher education has become an important issue (Nelson, 2003). Ely (2002) indicated that technology integration in instruction is one of the current trends in educational technology. In 2000, Green reported that there is a rising use of technology in instruction. The increasing availability of technology in instruction justifies investigating the level of faculty involvement, and the challenges that are associated with using these technologies (Ndahi, 1999).Green (2002) pointed out that courses use technology to deliver content are currently being integrated into instruction at a rapid pace. In the 2003 National Survey of Information Technology in US Higher Education, Green (2003) reported that a third of all college courses are using CMS tools, up from 26.5% in 2002, and 20.6% in 2001, and almost double the level in 2000 (14.7%). His survey data also revealed that over half (51.4%) of thePOTENTIAL USE OF COURSE MANAGEMENT SYSTEMS226respondents’ institutions had a strategic plan for developing CMS tools, compared to 47.5% in 2002.Green also reported that more than four-fifths (82.3%) of the participating institutions in his survey had already established a single product standard for CMS software, up from roughly three-fourths (73.2%) in the 2001 survey and 57.8% in 2000. He indicated that CMS are playing an increasingly significant role in instruction across all sectors. Green concluded that CMS tools have become an important component of the institutional instructional infrastructure: Both the percentage of classes that use CMS resources and the number of institutions that have established a campus standard for a CMS product are on the rise. Hence, as more instruction includes the use of these tools, issues in effective technology use become more important (Nelson, 2003). Investigating the level of faculty involvement and the challenges that are associated with using CMS have become essential issues in higher education.In regards to the challenges to faculty use of technology, Rogers (2003) stated that “Getting a new idea adopted, even when it has obvious advantages, is difficult” (p. 1). According to Rogers, “When new ideas are invented, diffused, and are adopted or rejected” (p. 6), social change occurs with certain consequences. Accordingly, adapting new technological innovation in higher education requires faculty to change their ways of teaching. Such change does not come easily (Schifter, 2000). Walsh (1993) stated, “Implementation of an innovation often requires change in the environment where it is introduced” (p. 52). Wolski and Jackson (1999) noted that adapting new technology, such as CMS, is not that simple. Some users will resist change entirely, with resistance to change in educational organizations being a widely recognized problem in the study of higher education.In this regard, Berge (1998) indicated that one of the problems hindering the use of new technology, such as CMS and distance education technology, in higher education is faculty resistance. Betts (1998) pointed out that research indicates that one of the problems hindering the use of distance education technology in higher education is faculty reluctance. In addition, Ely (2002) indicated that professors at higher education institutions hesitate to change. Rogers (2003) pointed out that anxiety, fear and resistance to change are natural phenomena when diffusing a new innovation, and that the attitudes and perceptions of users play an important role when such diffusion occurs. Marvin et al. (1999) stated about the situation most succinctly, “Faculty attitudes about instructional technology influence the successful implementation of technology in the classroom” (p. 4).“The gap between technology adoption and technology use in teaching has been noted worldwide” (Feeney, 2001, p. 11). Therefore, “Understanding the rate of adoption in any given situation requires analyzing factors that may facilitate the adoption and those that may operate as barriers to adoption” (Butler & Sellbom, 2002, p. 22). Ndahi (1999) indicated that the reasons which faculties are uncomfortable or resistant to using interactive computer-based instruction, such as CMS, in higher education institutions, are not made clear. Morgan (2003) found that some faculties are reluctant to adopt CMS.Holden and Mitchell (1993) indicated that faculty’s attitude is one of the obstacles that higher education institutions face. They stated, “The resistant attitude of faculty to using CMC applications, such as CMS, is an obstacle that will need to be overcome in order to ensure the success of future instructional CMC applications” (p. 36). Walsh (1993) indicated that the rate of adoption of distance education technology, such as CMS, in institutions of higher education, is slow. He also stated that faculty in institutions of higher education, and in particular, the attitudes of the faculty, are critical elements in the diffusion process.On the one hand, some scholars found that: (1) Some faculty are reluctant to adopt CMS, because they believe that the systems reduce their control of instruction and the instructional environment; (2) Training ofPOTENTIAL USE OF COURSE MANAGEMENT SYSTEMS 227faculty plays a key role in successful CMS adoption and use; (3) Strong leadership by campus executives and department chairs plays an important role in shaping and encouraging faculty to use CMS; and (4) The pedagogical impact of using CMS is perceived but difficult to measure.On the other hand, the findings of Ndahi’s (1999), Muilenburg and Berge’s (2001), Butler and Sellbom’s (2002), Anderson’s (2003) and Morgan’s (2003) studies showed that institutional support, encouragement and faculty training are essential factors for successful implementation of new technology in higher education teaching and learning environment. Clark (1993) found that department chairs, who will most influence future adoption and institutionalization of teaching innovations and new programs, were relatively positive in their attitudes toward the use of distance education technology and delivery tools when compared to other tenured and tenure-track university professors or other faculty at two-year colleges. Also, these studies indicated that, to successfully implement new technology in teaching and learning, educational institutions must address these barriers to faculty adoption. They also emphasized the need for further research to investigate faculty perceptions of CMS, to validate their findings and to analyze the utilization of CMS in higher education.Ndahi (1999) examined the extent to which distance learning technology is used by faculty in industrial and technical teacher education programs. He identified the variables or factors that contribute to faculty willingness or unwillingness to use interactive distance learning technology in industrial and technical teacher education programs. He also indicated that the reasons why faculty are uncomfortable or resistant to using interactive computer-based instruction (such as distance learning technology and course management systems) at higher education institutions are not made clear, thus, making it difficult to develop strategies to overcome the resistance if the reasons for instructors’ willingness or unwillingness to use these technologies are not understood. “Therefore, faculty and administration have to work together to identify, examine, and perform solutions so that the goal and mission of the institution, as well as the needs of the students, can be met” (Gammill, 2004, p. 30). However, he found that the most common reasons given by faculty for not using distance learning technology in their teaching are: (1) a lack of institutional encouragement, support and incentives; and (2) a lack of adequate training in the use of technology.Butler and Sellbom (2002) identified the factors that might affect faculty use of modern instructional technology. They identified the factors that faculty believes are important either in facilitating the use or in creating barriers that work against the use of such technology. They indicated that technology use needs more flexible and adaptive organizational cultures, norms and planning. They found that knowing how to utilize technology is the second most important factor in determining faculty use of modern instructional technology. However, they found that a lack of institutional support and a lack of time to learn new technology (workload) are the major factors affecting faculty use of technology.Rogers (2000) examined barriers to technology adoption. She found that barriers to successful technology adoption in education appear to have internal and external sources. Internal barriers may be summarized as “teacher attitude” or “perceptions” about a technology, in addition to a person’s actual competency level with any technology. External sources include the availability and accessibility of hardware and software, the presence of technical personnel and institutional support, and an appropriate and adequate program for staff development and skill building. Barriers that cross internal and external sources are lack of time, funding and the unique culture of the institution. Furthermore, Rogers found that “Attitudes and perceptions of key individuals in the academic institutions may become the major barrier to adopting any technology” (p. 467).。
毕业论文中英文资料外文翻译文献Architecture StructureWe have and the architects must deal with the spatial aspect of activity, physical, and symbolic needs in such a way that overall performance integrity is assured. Hence, he or she well wants to think of evolving a building environment as a total system of interacting and space forming subsystems. Is represents a complex challenge, and to meet it the architect will need a hierarchic design process that provides at least three levels of feedback thinking: schematic, preliminary, and final.Such a hierarchy is necessary if he or she is to avoid being confused , at conceptual stages of design thinking ,by the myriad detail issues that can distract attention from more basic consideration s .In fact , we can say that an architect’s ability to distinguish the more basic form the more detailed issues is essential to his success as a designer .The object of the schematic feed back level is to generate and evaluate overall site-plan, activity-interaction, and building-configuration options .To do so the architect must be able to focus on the interaction of the basic attributes of the site context, the spatial organization, and the symbolism as determinants of physical form. This means that ,in schematic terms ,the architect may first conceive and model a building design as an organizational abstraction of essential performance-space in teractions.Then he or she may explore the overall space-form implications of the abstraction. As an actual building configuration option begins to emerge, it will be modified to include consideration for basic site conditions.At the schematic stage, it would also be helpful if the designer could visualize his or her options for achieving overall structural integrity and consider the constructive feasibility and economic of his or her scheme .But this will require that the architect and/or a consultant be able to conceptualize total-system structural options in terms of elemental detail .Such overall thinking can be easily fed back to improve the space-form scheme.At the preliminary level, the architect’s emphasis will shift to the elaboration of his or her more promising schematic design options .Here the architect’s structural needs will shift toapproximate design of specific subsystem options. At this stage the total structural scheme is developed to a middle level of specificity by focusing on identification and design of major subsystems to the extent that their key geometric, component, and interactive properties are established .Basic subsystem interaction and design conflicts can thus be identified and resolved in the context of total-system objectives. Consultants can play a significant part in this effort; these preliminary-level decisions may also result in feedback that calls for refinement or even major change in schematic concepts.When the designer and the client are satisfied with the feasibility of a design proposal at the preliminary level, it means that the basic problems of overall design are solved and details are not likely to produce major change .The focus shifts again ,and the design process moves into the final level .At this stage the emphasis will be on the detailed development of all subsystem specifics . Here the role of specialists from various fields, including structural engineering, is much larger, since all detail of the preliminary design must be worked out. Decisions made at this level may produce feedback into Level II that will result in changes. However, if Levels I and II are handled with insight, the relationship between the overall decisions, made at the schematic and preliminary levels, and the specifics of the final level should be such that gross redesign is not in question, Rather, the entire process should be one of moving in an evolutionary fashion from creation and refinement (or modification) of the more general properties of a total-system design concept, to the fleshing out of requisite elements and details.To summarize: At Level I, the architect must first establish, in conceptual terms, the overall space-form feasibility of basic schematic options. At this stage, collaboration with specialists can be helpful, but only if in the form of overall thinking. At Level II, the architect must be able to identify the major subsystem requirements implied by the scheme and substantial their interactive feasibility by approximating key component properties .That is, the properties of major subsystems need be worked out only in sufficient depth to very the inherent compatibility of their basic form-related and behavioral interaction . This will mean a somewhat more specific form of collaboration with specialists then that in level I .At level III ,the architect and the specific form of collaboration with specialists then that providing for all of the elemental design specifics required to produce biddable construction documents .Of course this success comes from the development of the Structural Material.1.Reinforced ConcretePlain concrete is formed from a hardened mixture of cement ,water ,fine aggregate, coarse aggregate (crushed stone or gravel),air, and often other admixtures. The plastic mix is placed and consolidated in the formwork, then cured to facilitate the acceleration of the chemical hydration reaction lf the cement/water mix, resulting in hardened concrete. The finished product has high compressive strength, and low resistance to tension, such that its tensile strength is approximately one tenth lf its compressive strength. Consequently, tensile and shear reinforcement in the tensile regions of sections has to be provided to compensate for the weak tension regions in the reinforced concrete element.It is this deviation in the composition of a reinforces concrete section from the homogeneity of standard wood or steel sections that requires a modified approach to the basic principles of structural design. The two components of the heterogeneous reinforced concrete section are to be so arranged and proportioned that optimal use is made of the materials involved. This is possible because concrete can easily be given any desired shape by placing and compacting the wet mixture of the constituent ingredients are properly proportioned, the finished product becomes strong, durable, and, in combination with the reinforcing bars, adaptable for use as main members of any structural system.The techniques necessary for placing concrete depend on the type of member to be cast: that is, whether it is a column, a bean, a wall, a slab, a foundation. a mass columns, or an extension of previously placed and hardened concrete. For beams, columns, and walls, the forms should be well oiled after cleaning them, and the reinforcement should be cleared of rust and other harmful materials. In foundations, the earth should be compacted and thoroughly moistened to about 6 in. in depth to avoid absorption of the moisture present in the wet concrete. Concrete should always be placed in horizontal layers which are compacted by means of high frequency power-driven vibrators of either the immersion or external type, as the case requires, unless it is placed by pumping. It must be kept in mind, however, that over vibration can be harmful since it could cause segregation of the aggregate and bleeding of the concrete.Hydration of the cement takes place in the presence of moisture at temperatures above 50°F. It is necessary to maintain such a condition in order that the chemical hydration reaction can take place. If drying is too rapid, surface cracking takes place. This would result in reduction of concrete strength due to cracking as well as the failure to attain full chemical hydration.It is clear that a large number of parameters have to be dealt with in proportioning a reinforced concrete element, such as geometrical width, depth, area of reinforcement, steel strain, concrete strain, steel stress, and so on. Consequently, trial and adjustment is necessary in the choice ofconcrete sections, with assumptions based on conditions at site, availability of the constituent materials, particular demands of the owners, architectural and headroom requirements, the applicable codes, and environmental reinforced concrete is often a site-constructed composite, in contrast to the standard mill-fabricated beam and column sections in steel structures.A trial section has to be chosen for each critical location in a structural system. The trial section has to be analyzed to determine if its nominal resisting strength is adequate to carry the applied factored load. Since more than one trial is often necessary to arrive at the required section, the first design input step generates into a series of trial-and-adjustment analyses.The trial-and –adjustment procedures for the choice of a concrete section lead to the convergence of analysis and design. Hence every design is an analysis once a trial section is chosen. The availability of handbooks, charts, and personal computers and programs supports this approach as a more efficient, compact, and speedy instructional method compared with the traditional approach of treating the analysis of reinforced concrete separately from pure design.2. EarthworkBecause earthmoving methods and costs change more quickly than those in any other branch of civil engineering, this is a field where there are real opportunities for the enthusiast. In 1935 most of the methods now in use for carrying and excavating earth with rubber-tyred equipment did not exist. Most earth was moved by narrow rail track, now relatively rare, and the main methods of excavation, with face shovel, backacter, or dragline or grab, though they are still widely used are only a few of the many current methods. To keep his knowledge of earthmoving equipment up to date an engineer must therefore spend tine studying modern machines. Generally the only reliable up-to-date information on excavators, loaders and transport is obtainable from the makers.Earthworks or earthmoving means cutting into ground where its surface is too high ( cuts ), and dumping the earth in other places where the surface is too low ( fills). Toreduce earthwork costs, the volume of the fills should be equal to the volume of the cuts and wherever possible the cuts should be placednear to fills of equal volume so as to reduce transport and double handlingof the fill. This work of earthwork design falls on the engineer who lays out the road since it is the layout of the earthwork more than anything else which decides its cheapness. From the available maps ahd levels, the engineering must try to reach as many decisions as possible in the drawing office by drawing cross sections of the earthwork. On the site when further information becomes available he can make changes in jis sections and layout,but the drawing lffice work will not have been lost. It will have helped him to reach the best solution in the shortest time.The cheapest way of moving earth is to take it directly out of the cut and drop it as fill with the same machine. This is not always possible, but when it canbe done it is ideal, being both quick and cheap. Draglines, bulldozers and face shovels an do this. The largest radius is obtained with thedragline,and the largest tonnage of earth is moved by the bulldozer, though only over short distances.The disadvantages of the dragline are that it must dig below itself, it cannot dig with force into compacted material, it cannot dig on steep slopws, and its dumping and digging are not accurate.Face shovels are between bulldozers and draglines, having a larger radius of action than bulldozers but less than draglines. They are anle to dig into a vertical cliff face in a way which would be dangerous tor a bulldozer operator and impossible for a dragline. Each piece of equipment should be level of their tracks and for deep digs in compact material a backacter is most useful, but its dumping radius is considerably less than that of the same escavator fitted with a face shovel.Rubber-tyred bowl scrapers are indispensable for fairly level digging where the distance of transport is too much tor a dragline or face shovel. They can dig the material deeply ( but only below themselves ) to a fairly flat surface, carry it hundreds of meters if need be, then drop it and level it roughly during the dumping. For hard digging it is often found economical to keep a pusher tractor ( wheeled or tracked ) on the digging site, to push each scraper as it returns to dig. As soon as the scraper is full,the pusher tractor returns to the beginning of the dig to heop to help the nest scraper.Bowl scrapers are often extremely powerful machines;many makers build scrapers of 8 cubic meters struck capacity, which carry 10 m ³ heaped. The largest self-propelled scrapers are of 19 m ³struck capacity ( 25 m ³ heaped )and they are driven by a tractor engine of 430 horse-powers.Dumpers are probably the commonest rubber-tyred transport since they can also conveniently be used for carrying concrete or other building materials. Dumpers have the earth container over the front axle on large rubber-tyred wheels, and the container tips forwards on most types, though in articulated dumpers the direction of tip can be widely varied. The smallest dumpers have a capacity of about 0.5 m ³, and the largest standard types are of about 4.5 m ³. Special types include the self-loading dumper of up to 4 m ³ and the articulated type of about 0.5 m ³. The distinction between dumpers and dump trucks must be remembered .dumpers tip forwards and the driver sits behind the load. Dump trucks are heavy, strengthened tipping lorries, the driver travels in front lf the load and the load is dumped behind him, so they are sometimes called rear-dump trucks.3.Safety of StructuresThe principal scope of specifications is to provide general principles and computational methods in order to verify safety of structures. The “ safety factor ”, which according to modern trends is independent of the nature and combination of the materials used, can usually be defined as the ratio between the conditions. This ratio is also proportional to the inverse of the probability ( risk ) of failure of the structure.Failure has to be considered not only as overall collapse of the structure but also asunserviceability or, according to a more precise. Common definition. As the reaching of a “ limit state ” which causes the construction not to accomplish the task it was designed for. Ther e are two categories of limit state :(1)Ultimate limit sate, which corresponds to the highest value of the load-bearing capacity. Examples include local buckling or global instability of the structure; failure of some sections and subsequent transformation of the structure into a mechanism; failure by fatigue; elastic or plastic deformation or creep that cause a substantial change of the geometry of the structure; and sensitivity of the structure to alternating loads, to fire and to explosions.(2)Service limit states, which are functions of the use and durability of the structure. Examples include excessive deformations and displacements without instability; early or excessive cracks; large vibrations; and corrosion.Computational methods used to verify structures with respect to the different safety conditions can be separated into:(1)Deterministic methods, in which the main parameters are considered as nonrandom parameters.(2)Probabilistic methods, in which the main parameters are considered as random parameters.Alternatively, with respect to the different use of factors of safety, computational methods can be separated into:(1)Allowable stress method, in which the stresses computed under maximum loads are compared with the strength of the material reduced by given safety factors.(2)Limit states method, in which the structure may be proportioned on the basis of its maximum strength. This strength, as determined by rational analysis, shall not be less than that required to support a factored load equal to the sum of the factored live load and dead load ( ultimate state ).The stresses corresponding to working ( service ) conditions with unfactored live and dead loads are compared with prescribed values ( service limit state ) . From the four possible combinations of the first two and second two methods, we can obtain some useful computational methods. Generally, two combinations prevail:(1)deterministic methods, which make use of allowable stresses.(2)Probabilistic methods, which make use of limit states.The main advantage of probabilistic approaches is that, at least in theory, it is possible to scientifically take into account all random factors of safety, which are then combined to define the safety factor. probabilistic approaches depend upon :(1) Random distribution of strength of materials with respect to the conditions of fabrication and erection ( scatter of the values of mechanical properties through out the structure );(2) Uncertainty of the geometry of the cross-section sand of the structure ( faults andimperfections due to fabrication and erection of the structure );(3) Uncertainty of the predicted live loads and dead loads acting on the structure;(4)Uncertainty related to the approximation of the computational method used ( deviation of the actual stresses from computed stresses ).Furthermore, probabilistic theories mean that the allowable risk can be based on several factors, such as :(1) Importance of the construction and gravity of the damage by its failure;(2)Number of human lives which can be threatened by this failure;(3)Possibility and/or likelihood of repairing the structure;(4) Predicted life of the structure.All these factors are related to economic and social considerations such as:(1) Initial cost of the construction;(2) Amortization funds for the duration of the construction;(3) Cost of physical and material damage due to the failure of the construction;(4) Adverse impact on society;(5) Moral and psychological views.The definition of all these parameters, for a given safety factor, allows construction at the optimum cost. However, the difficulty of carrying out a complete probabilistic analysis has to be taken into account. For such an analysis the laws of the distribution of the live load and its induced stresses, of the scatter of mechanical properties of materials, and of the geometry of the cross-sections and the structure have to be known. Furthermore, it is difficult to interpret the interaction between the law of distribution of strength and that of stresses because both depend upon the nature of the material, on the cross-sections and upon the load acting on the structure. These practical difficulties can be overcome in two ways. The first is to apply different safety factors to the material and to the loads, without necessarily adopting the probabilistic criterion. The second is an approximate probabilistic method which introduces some simplifying assumptions ( semi-probabilistic methods ) .文献翻译建筑师必须从一种全局的角度出发去处理建筑设计中应该考虑到的实用活动,物质及象征性的需求。
毕业设计(论文)外文文献翻译要求
根据《普通高等学校本科毕业设计(论文)指导》的内容,特对外文文献翻译提出以下要求:
一、翻译的外文文献一般为1~2篇,外文字符要求不少于1.5万(或翻译成中文后至少在3000字以上)。
二、翻译的外文文献应主要选自学术期刊、学术会议的文章、有关著作及其他相关材料,应与毕业论文(设计)主题相关,并作为外文参考文献列入毕业论文(设计)的参考文献。
并在每篇中文译文首页用“脚注”形式注明原文作者及出处,中文译文后应附外文原文。
三、中文译文的基本撰写格式为题目采用小三号黑体字居中打印,正文采用宋体小四号字,行间距一般为固定值20磅,标准字符间距。
页边距为左3cm,右2.5cm,上下各2.5cm,页面统一采用A4纸。
四、封面格式由学校统一制作(注:封面上的“翻译题目”指中文译文的题目,附件1为一篇外文翻译的封面格式,附件二为两篇外文翻译的封面格式),若有两篇外文文献,请按“封面、译文一、外文原文一、译文二、外文原文二”的顺序统一装订。
教务处
20XX年2月27日
杭州电子科技大学
毕业设计(论文)外文文献翻译
毕业设计(论文)题
目
翻译题目
学院
专业
姓名
班级
学号
指导教师
杭州电子科技大学
毕业设计(论文)外文文献翻译
毕业设计(论文)题
目
翻译(1)题目
翻译(2)题目
学院
专业
姓名
班级
学号指导教师。
网上选课系统设计的关键技术及系统的构建外文翻译大学毕业论文英文文献翻译毕业设计(论文)外文文献翻译2017届文献、资料题目:网上选课系统设计的关键技术及系统的构建文献、资料来源:文献、资料发表(出版)日期:院(部):专业:计算机科学与技术班级:姓名:学号:指导教师:翻译日期:2017.02.14网上选课系统设计的关键技术及系统的构建Key Techniques for Web Course-Choosing System Design andConstructionEric T. Freeman / Elisabeth RobsonO'Reilly Media,Nanyang 473004,China 2008-05, TP311.52.摘要学生选课是学分制管理制度改革的核心。
目前,各企业及高校已经研制出的网上选课系统,或因管理模式不同或因系统通用性不强,使得直接投入使用有相当大的困难,为适应南阳理工学院学分制管理制度的改革需要,自主研发了网上选课系统。
给出了网上选课系统设计的三个关键技术:面向对象、系统安全、数据优化,并利用JSP技术构建了网上选课系统,实现了数据录入、查询检索、报表统计等功能。
为整体认识和解决基于学分制网上选课系统的结构方案设计,解决设计中的各种实际问题提供了技术、方法和手段的支持,也为全面系统地实现学分制教学管理模式的构建奠定了基础。
关键词:Web course-choosing / system design / key techniques / construction 引言网上选课是学分制教学管理的重要组成部分,其特点可以概括为培养模式的多样性、学习内容的选择性、学习进程的自主性、学习时间与空间的灵活性等。
灵活性的大量增加严重冲击传统的教学管理模式,手工处理方式已不能适应新的管理模式,各高校都在探索研究适应新的教学管理模式的网上选课系统。
目前各高校自主研发的系统因紧密结合所在院校的教学管理模式,所以软件通用性不高,往往仅适用于所在高校。
石家庄经济学院本科生毕业设计外文文献题目石家庄经济学院本部校园网网络规划设计姓名姬云飞学号************学院信息工程学院专业通信工程指导教师张晨燕Campus Network planning and ConstructionAt present, China's rapid development of the cause of the campus network, to early 2003, almost all colleges have set up their own campus network, and carry out a variety of its services and applications. Campus Network build a rich learning resources to enhance the efficiency of education. But as the number of users increased dramatically increased and the pattern of operations, campus network security is increasingly conspicuous, and the ever threat to the healthy development of the campus network, as an education development of the information industry should not be neglected problem. This paper focuses on the campus network design and the process of building the campus network established the goal of building, campus network technology programme design, information resources construction, application software development, network management and security, the five key issues. The campus network is the infrastructure of importance of school, taking the school teaching, research, managing and outward communicate many roles of etc..The safe condition of the campus net affects the teaching activity of the school directly.Set up in the network of initial stage, the safe problem may still be not outstanding, but along with applied thorough, various data of the campus net would nasty play increment, the safe problem beginning of various each kind perplexes us.The Internet flies to develop soon, to the campus network the teachers and the students' life and studies have already produced the profound influence, the network have already not have no place in our life at. But at enjoy the convenience that high technology bring at the same time, we need to be awake of know, the safe problem of network also become the network application more and more increasingly and seriously huge bar, the situation that the campus network safety hazes already arrived and must unify the management and resolve thoroughly, only good resolve the safe problem of network, the application of the campus network then can be healthy, high speed of development. We should consider the comprehensive usage fire wall and encrypt several measures, such as technique and the anti-virus software...etc. completely, work in coordination, strengthening the management, looking for the balance point of insure the network safety and the network efficiency from it, the safety of the comprehensive exaltation campus network, thus build up rise a set of real in keeping with safe system of the calculator network of the school.The time today's knowledge-based economy and information technology have the development and popularization of Internet in the world have decided the time the network will become the main tool for information. With the development of computer network technology, network has become an important platform for the exchange of information.Internet-based e-learning with time-sensitive, shared, interactive and many of the characteristics of the individual, so it has a traditional teaching model of unmatched advantages. It created a new teaching model, breaking the traditional teaching model at the time and space limitations, the use of advanced teaching methods and teaching methods, greatly improve the teaching efficiency and teaching effectiveness, teaching and learning activities to enable a new level. Do a good jobin the design of the campus network, are among the schools, both internal and external communication between the key and convenient.21st century the size of the campus network and application level are reflected in schools and science teaching and learning environment an important component of the force, so we should make use of existing campus conditions, design a secure, unified campus network. Large Campus Network DesignBusinesses operating large campus networks are increasingly looking for infrastructure upgrades to:(1) Handle high bandwidth applications such as voice, video, and IP multicast Improve backbone capacity for shared Ethernet or FDDI campus backbones(2) Support applications based on Novell IPX, DECNET, AppleTalk, and SNA(3) Offer high availability, performance, & manageability for your company's intranetUse Layer 2, Layer 3, or ATM backbone solutions to expand your large campus network. In typical designs, the buildings or different parts of the campus connect together across a high performance, switched backbone. Network redundancy and high availability is provided at each layer. A high capacity, centralized server farm provides resources to the campus, and when combined with Cisco IOS, network management strategies support QoS, security, troubleshooting, and other common management features from end to end.Medium Campus Network DesignA medium campus consists of one large building or several buildings. Networking for a medium campus is designed for high availability, performance, and manageability. This is also called a 'collapsed backbone' design for medium campus networks. Additional requirements of these designs typically include:(1) High performance and availability for bandwidth applications such as voice, video, and IP multicast(2) Shared Ethernet or FDDI building backbone which is running out of capacity(3) Support for applications based on Novell IPX, DECNET, AppleTalk, and SNA Based on the Cisco AVVID architecture, these intelligent network platforms and products provide the basis for a complete network solution.Small campus networks DesignIn most cases, network redundancy is not the top priority, but cost effectiveness is. Additional requirements of these designs typically include:(1) High performance and availability for bandwidth applications such as voice, video, and IP multicast(2) Shared Ethernet or FDDI building backbone which is running out of capacity(3) Support for applications based on Novell IPX, DECNET, AppleTalk, and SNA校园网的规划与构建目前,我国校园网事业飞速发展,至2003年初,几乎所有的大中专院校都建立了自己的校园网,并在其上开展了多种服务和应用。
外文原文翻译: C#版ASP(动态服务器主页)是一种较新的技术,它已经过几个阶段的发展(进化).它是怎么诞生的呢?在七年前,它作为一种简单的方法来往普通网页里添加动态内容。
自从那时以后,它的发展势头强劲:作为高级网页程序的开发平台,包括:电子商务网站、基于事件驱动的门户网站和你在网上能看到的其他所有东西。
2.0 是ASP的最新版本,而且拥有最让人激动的更新。
在帮助下,在网络编程时,开发者不再把一大堆HTML源码和脚本代码杂乱地放在同一页面上。
你可以完全使用代码和工具(Visual Studio 2005)来创建网页程序。
这些创新的代价仅仅是多学一些东西。
你要学一些高级开发工具(Visual Studio)和工具包(the .NET Framework),而且你需要精通一门编程语言,如C#。
网络发展的演化因特网是在1960年末在试验中诞生的。
它的目标是:建立一个真实的、有弹性的信息网络——可以经受的起若干数量的电脑的崩溃,而不至于阻断其他电脑的正常通信。
经得起潜在的重大灾难(如核武器攻击)。
美国国防部提供了刚开始的研究基金。
最早的因特网局限在教育机构和从事国防的单位。
它因为作为学术研究的一种工具而繁荣,它让全球的研究人员可以彼此共享信息。
到了1990初,伟大的“猫”诞生了,它通过电话线工作,从此,因特网向商业用户打开了大门。
在1993年,第一个HTML浏览器诞生了,标志着因特网革命的到来。
我们很难把最早的网页称为网页序。
第一代的网页看起来更像小册子:主要由固定的H TML页面构成,这些也都需要手动修改。
一个简单的HTML页面有点像一个字处理文档——它包含了格式化的内容,可以在你的电脑上显示,但是并不完成其他任何功能。
上面的就是一个最简单的例子,文档包括头信息和单行文本。
一个HTML文档有两种类型的内容:文本和标记(告诉浏览器如何格式化)。
这些标记很容易辨认,因为它们总是出现在< 和 >之间。
网上选课系统设计的关键技术及系统的构建外文翻译大学毕业论文英文文献翻译毕业设计(论文)外文文献翻译2017届文献、资料题目:网上选课系统设计的关键技术及系统的构建文献、资料来源:文献、资料发表(出版)日期:院(部):专业:计算机科学与技术班级:姓名:学号:指导教师:翻译日期:2017.02.14网上选课系统设计的关键技术及系统的构建Key Techniques for Web Course-Choosing System Design andConstructionEric T. Freeman / Elisabeth RobsonO'Reilly Media,Nanyang 473004,China 2008-05, TP311.52.摘要学生选课是学分制管理制度改革的核心。
目前,各企业及高校已经研制出的网上选课系统,或因管理模式不同或因系统通用性不强,使得直接投入使用有相当大的困难,为适应南阳理工学院学分制管理制度的改革需要,自主研发了网上选课系统。
给出了网上选课系统设计的三个关键技术:面向对象、系统安全、数据优化,并利用JSP技术构建了网上选课系统,实现了数据录入、查询检索、报表统计等功能。
为整体认识和解决基于学分制网上选课系统的结构方案设计,解决设计中的各种实际问题提供了技术、方法和手段的支持,也为全面系统地实现学分制教学管理模式的构建奠定了基础。
关键词:Web course-choosing / system design / key techniques / construction 引言网上选课是学分制教学管理的重要组成部分,其特点可以概括为培养模式的多样性、学习内容的选择性、学习进程的自主性、学习时间与空间的灵活性等。
灵活性的大量增加严重冲击传统的教学管理模式,手工处理方式已不能适应新的管理模式,各高校都在探索研究适应新的教学管理模式的网上选课系统。
目前各高校自主研发的系统因紧密结合所在院校的教学管理模式,所以软件通用性不高,往往仅适用于所在高校。
企业开发的软件通用性虽强,但后期维护及二次开发比较困难。
基于上述原因,南阳理工学院自主研发了基于学分制教务管理的网上选课系统。
1 网上选课系统需求分析1.1 学生用户对选课系统功能需求分析学生要求在规定的选课时间段内,登录系统进行选课、补选,在选课过程中能够查询本专业教学计划、任课教师的科研情况等,选课结束后能够浏览个人课程表等,同时允许学生查阅个人档案及各科成绩。
1.2 教师对选课系统功能需求分析教师能够通过使用该系统,维护自已的科研及档案信息,能够查阅其他教师部分科研情况,能够查询自己的课程安排情况,能够查询所带课程的学生情况,能够对学生成绩进行录入,能够对课程成绩情况进行统计分析,能够查阅专业教学计划及下期教学安排等等。
1.3 管理者对选课系统功能需求分析管理者使用该系统,能够制定各专业教学计划,能够查阅教学任务安排情况,能够查阅全院课表,能够查阅学生及教师的基本情况,能够进行各类统计等等。
2 网上选课系统设计的关键技术与方法2.1 系统设计的过程2.1.1 数据库设计数据库设计是否合理,是软件系统能否顺利运行的关键之处。
网上选课系统通过到省内、外高校认真调研、教学运行全过程追踪等手段实施需求分析,进行E—R模型设计,将系统功能与数据的结构关联起来,并反映在数据库设计过程中。
该系统数据库参照《教育管理信息化标准》,结合我校实际的教务教学管理模式进行设计,同时满足关系数据库的实体完整性、参照完整性、用户定义完整性要求,利用主键和外键实现数据的完整性,利用自定义的约束条件来减少录入的复杂度和出错率,利用触发器机制增强引用完整性和控制数据库的变动,利用存储过程减少数据库开发人员工作量,提高数据库执行速度。
系统的前台与后台共同访问一个数据库服务器,考虑到系统本身大量数据信息(如:学生基本信息、教师基本信息、课程基本信息等40多个)及数据之间的关系,依照关系数据库的3NF范式,尽量做到数据相互依赖但不造成冗余。
2.1.2 服务器配置服务器配置需求(以PC Server为例):操作系统:Windows 2003、Linux、UnixJava运行环境-Jdk1.3.1应用服务器:Tomcat 4.0以上数据库服务器:SQL Server 2000、Oracle 8i&Oracle 9i、Mysql3.23PCServer硬件需求:CPU:Intel PIII 800以上(推荐P4 1.6G)内存:512M 以上(推荐1G)硬盘:40G以上(推荐80G)服务器配置后要着重解决服务器的安全问题:(1)利用操作系统安全功能,对操作系统用户、用户组及访问权限等作严格规定,关掉可能导致安全漏洞的服务,如Telnet、FTP、SendMail等;(2)在硬件方面采用磁盘阵列技术,保证服务器端数据的安全性。
2.1.3 客户端开发开发工具选用目前最为流行的网络编程语言JSP,并结合使用JavaBean 和Servlet技术。
其优点在于程序页面一次性编译,大大提高了程序的访问速度,其次是其具备良好的跨平台性。
2.1.4 试运行及发布网上选课分三个阶段,即正常选课、确认选课结果、退补选课。
该系统在2003级本科生中试运行,学生在学院规定的时间内进行填写选课单、选定课程,历时一周。
正常选课结束后,教务处根据正常选课结果,撤销不符合开班条件的课程教学班8个,同时对另外4个课程教学班进行合班。
学生可以在网上选课系统网站上查看被撤课程、补撤教学班的学生名单等信息,确认选课结果。
撤、合班后允许学生改选同一类别的其它课程教学班。
正常选课结果处理完毕后,有143人进行了补选。
教务处管理人员针对补选结果进行处理,对仍有不符合开班条件的教学班进行撤销(即下学期不再开设该门课程)。
学生对选课结果进行确认,可以登录选课系统打印自己课程表。
通过系统试运行,达到学院预定的目标,自2004年起在全院展开。
2.2 设计的关键技术与方法2.2.1 面向对象程序设计技术面向对象程序设计方法是一种支持模块化设计和软件重用的实际可行的编程方法,它的基本思想是封装和可扩展性。
全封装给软件带来了模块性、安全性等优点,因为基本没有数据耦合,对象间没有因操作而产生的边界效应,所以易于维护和修改[ 。
可扩展性给系统留下接口,便于与其他系统的融合,此系统能够与图书馆管理系统、人事管理系统、科研管理系统、财务管理系统、学院办公OA系统等接轨,顺利实现数据的导人导出。
2.2.2 系统安全技术信息安全问题是系统建设的首要问题,网上选课系统中的一些关键信息(如学生成绩、学籍信息等)的安全是至关重要的,必须在系统建设的设计阶段制定可靠的安全策略。
本系统从网络通讯、服务器安全、数据库管理系统、系统程序、计算机病毒的防治等五个方面提供安全保障:(1)网络通讯:采用虚拟局域网(Ⅵ,AN)服务和防火墙技术。
将系统的WEB服务器与数据库服务器建立在学院的校园虚拟子网内,只允许校内用户访问,屏蔽校外用户访问。
对于网络协议也作限定,如H兀、P协议等允许访问,FrP、TeNet等协议限制执行。
(2)服务器安全。
(3)对数据库帐号、数据库视图、帐号操作权限及数据库的并发控制、触发器记录操作信息、操作时间等进行跟踪,此外,还启用数据自动备份数据等等。
(4)系统程序.a.在应用程序中设计可动态设置用户信息,使用权限信息等,可有效地防止从系统程序的客户端非法登录系统;b.应用程序对数据库的操作均有安全机制控制,不会造成数据提交一半或错误提交;c.采用数据加密技术,把系统用户(如学生、教师等)注册的密码进行加密,杜绝用户通过Session等技术获取密码。
(5)计算机病毒防治:在服务器端安装正版杀毒工具及防火墙软件进行病毒防范,确保系统正常运作。
2.2.3 数据库优化技术。
(1)SQL语句优化:即将性能低下的SQL语句转换成目的相同的性能优异的SQL语句。
使用人工智能技术,自动对SQL语句进行重写,从而找到性能最好的等效SQL语句。
(2)建立索引:提高系统查询速度。
(3)创建视图和存储过程3 网上选课系统的构建3.1 管理系统的构建系统后台采用微软SQLServer2000做数据库,前台B/S模式采JSP+JavaBean+Servlet技术和Tomcat5.0做为WEB服务器,实现网上选课系统的数据录入、修改、查询、统计等功能。
图1为系统的功能模块3.2 系统的功能(1)数据维护功能:可以对数据库中的数据进行增加、删除、修改等操作,并能及时处理选课过程中的突发事件。
(3)数据统计:可以对数据库中的数据进行统计,并以图标的形式显示出来,从而发现规律,为管理者提供参考。
(4)帮助:可以为用户提供及时、方便的在线帮助服务。
图2给出了学生正常选课界面,图3给出了学生的个人课表。
4 结束语(1)网上选课系统构建后,首先在本科生中投入使踊,经过四届学生的选课操作,不断修改系统功能,目前系统功能已经完善,用户操作更加人性化。
(2)政策先行,制度做保障。
在系统整个开发阶段,围绕学院学分制的政策进行了多次讨论,由于政策有事先落实和制定,导致系统模块进行大范围调整,响厂系统的开发进度。
(3)网上选课系统的数据处理算法有待进一步研究和探讨。
目前系统采用的是优选级和先来先服务的办法,不能保证选课的公平、公正。