河南工业大学毕业设计(论文)外文资料翻译(学生用)
- 格式:doc
- 大小:132.50 KB
- 文档页数:2
1 工程概论1.1 工程专业1.2 工业和技术1.3 现代制造业工程专业1 工程行业是历史上最古老的行业之一。
如果没有在广阔工程领域中应用的那些技术,我们现在的文明绝不会前进。
第一位把岩石凿削成箭和矛的工具匠是现代机械工程师的鼻祖。
那些发现地球上的金属并找到冶炼和使用金属的方法的工匠们是采矿和冶金工程师的先祖。
那些发明了灌溉系统并建造了远古世纪非凡的建筑物的技师是他们那个时代的土木工程师。
2 工程一般被定义为理论科学的实际应用,例如物理和数学。
许多早期的工程设计分支不是基于科学而是经验信息,这些经验信息取决于观察和经历,而不是理论知识。
这是一个倾斜面实际应用的例子,虽然这个概念没有被确切的理解,但是它可以被量化或者数字化的表达出来。
3 从16、17世纪当代初期,量化就已经成为科学知识大爆炸的首要原因之一。
另外一个重要因素是实验法验证理论的发展。
量化包含了把来源于实验的数据和信息转变成确切的数学术语。
这更加强调了数学是现代工程学的语言。
4 从19世纪开始,它的结果的实际而科学的应用已经逐步上升。
机械工程师现在有精确的能力去计算来源于许多不同机构之间错综复杂的相互作用的机械优势。
他拥有能一起工作的既新型又强硬的材料和巨大的新能源。
工业革命开始于使用水和蒸汽一起工作。
从此使用电、汽油和其他能源作动力的机器变得如此广泛以至于它们承担了世界上很大比例的工作。
5 科学知识迅速膨胀的结果之一就是科学和工程专业的数量的增加。
到19世纪末不仅机械、土木、矿业、冶金工程被建立而且更新的化学和电气工程专业出现了。
这种膨胀现象一直持续到现在。
我们现在拥有了核能、石油、航天航空空间以及电气工程等。
每种工程领域之内都有细分。
6 例如,土木工程自身领域之内有如下细分:涉及永久性结构的建筑工程、涉及水或其他液体流动与控制系统的水利工程、涉及供水、净化、排水系统的研究的环境工程。
机械工程主要的细分是工业工程,它涉及的是错综复杂的机械系统,这些系统是工业上的,而非单独的机器。
毕业设计(论文)外文资料翻译附件1 :外文资料翻译译文双闭环直流调速系统的说明一、系统分析与综合1. 系统分析(1)在转速、电流双闭环调速系统中,若要改变电动机的转速,应调节什么参数?改变转速调节器的放大倍数Kn行不行?改变电力电子变换器的放大系数Ks 行不行?改变转速反馈系数行不行?若要改变电动机的堵转电流,应调节系统中的什么参数?答:若要改变电动机的转速,改变转速调节器的放大倍数Kn 和电力电子变换器的放大系数Ks 都不行,稳定时n=Un=Un*,所以只有改变给定值Un*和反馈系数才行。
若要改变电动机的堵转电流,同样只须改变给定值Uim*和反馈系数,因为,稳定时,Uim* = Idm, 从式中可得出。
(2)转速、电流双闭环调速系统稳态运行时,两个调节器的输入偏差电压和输出电压各是多少?答:转速、电流双闭环调速系统稳态运行时,两个调节器的输入偏差电压均是零,由式子n=Un=Un*,n=n0 ; Uim* = Idm, Idm=Idl 。
(3)在转速、电流双闭环调速系统中,两个调节器均采用PI 调节器。
当系统带额定负载运行时,转速反馈线突然断线,系统重新进入稳态后,电流调节器的输入偏差电压Ui 是否为零?为什么?答:当系统带额定负载运行时,转速反馈线突然断线,则Un=0,Un =Un*-Un=Un*, 使Ui 迅速达到Uim ,Ui 0 ,速度n 上升,当系统重新进入稳态后,即Id=Idl ,那么,Ui = Uim*- Idl 0,Ui 也不再变化,转速n也不再变化,但,此时的转速n 比反馈线断线时的转速要大。
(4)为什么用积分控制的调速系统是无静差的?答:在积分调节器的调速系统中,能实现无静差,是由于积分调节器控制特点,即积分的记忆和积累作用。
(5)双环调速系统(PI),负载变化,Idl>Idm, 问双环调速系统ACR和ASR 怎么调节,结果如何?答:当负载变化时,Idl>Idm, 转速迅速下降,电流Id 很快增加到Idm,而达限幅值,速度ASR迅速饱和,ACR一直在限流状态下,形成堵转现象,长时间运行会损坏系统。
毕业设计(论文)外文原文及译文一、外文原文MCUA microcontroller (or MCU) is a computer-on-a-chip. It is a type of microcontroller emphasizing self-sufficiency and cost-effectiveness, in contrast to a general-purpose microprocessor (the kind used in a PC).With the development of technology and control systems in a wide range of applications, as well as equipment to small and intelligent development, as one of the single-chip high-tech for its small size, powerful, low cost, and other advantages of the use of flexible, show a strong vitality. It is generally better compared to the integrated circuit of anti-interference ability, the environmental temperature and humidity have better adaptability, can be stable under the conditions in the industrial. And single-chip widely used in a variety of instruments and meters, so that intelligent instrumentation and improves their measurement speed and measurement accuracy, to strengthen control functions. In short,with the advent of the information age, traditional single- chip inherent structural weaknesses, so that it show a lot of drawbacks. The speed, scale, performance indicators, such as users increasingly difficult to meet the needs of the development of single-chip chipset, upgrades are faced with new challenges.The Description of AT89S52The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K bytes of In-System Programmable Flash memory. The device is manufactured using Atmel's high-density nonvolatile memory technology and is compatible with the industry-standard 80C51 instruction set and pinout. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with In-System Programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-effective solution to many embedded control applications.The AT89S52 provides the following standard features: 8K bytes ofFlash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit timer/counters, a six-vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Power-down mode saves the RAM contents but freezes the oscillator, disabling all other chip functions until the next interrupt or hardware reset.Features• Compatible with MCS-51® Products• 8K Bytes of In-System Programmable (ISP) Flash Memory– Endurance: 1000 Write/Erase Cycles• 4.0V to 5.5V Operating Range• Fully Static Operation: 0 Hz to 33 MHz• Three-level Program Memory Lock• 256 x 8-bit Internal RAM• 32 Programmable I/O Lines• Three 16-bit Timer/Counters• Eight Interrupt Sources• Full Duplex UART Serial Channel• Low-power Idle and Power-down Modes• Interrupt Recovery from Power-down Mode• Watchdog Timer• Dual Data Pointer• Power-off FlagPin DescriptionVCCSupply voltage.GNDGround.Port 0Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high-impedance inputs.Port 0 can also be configured to be the multiplexed low-order address/data bus during accesses to external program and data memory. In this mode, P0 has internal pullups.Port 0 also receives the code bytes during Flash programming and outputs the code bytes during program verification. External pullups are required during program verification.Port 1Port 1 is an 8-bit bidirectional I/O port with internal pullups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are pulled high by the internal pullups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pullups.In addition, P1.0 and P1.1 can be configured to be the timer/counter 2 external count input (P1.0/T2) and the timer/counter 2 trigger input (P1.1/T2EX), respectively.Port 1 also receives the low-order address bytes during Flash programming and verification.Port 2Port 2 is an 8-bit bidirectional I/O port with internal pullups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are pulled high by the internal pullups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pullups.Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that use 16-bit addresses (MOVX @ DPTR). In this application, Port 2 uses strong internal pull-ups when emitting 1s. During accesses to external data memory that use 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register.Port 2 also receives the high-order address bits and some control signals during Flash programming and verification.Port 3Port 3 is an 8-bit bidirectional I/O port with internal pullups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are pulled high by the internal pullups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pullups.Port 3 also serves the functions of various special features of the AT89S52, as shown in the following table.Port 3 also receives some control signals for Flash programming and verification.RSTReset input. A high on this pin for two machine cycles while the oscillator is running resets the device. This pin drives High for 96 oscillator periods after the Watchdog times out. The DISRTO bit in SFR AUXR (address 8EH) can be used to disable this feature. In the default state of bit DISRTO, the RESET HIGH out feature is enabled.ALE/PROGAddress Latch Enable (ALE) is an output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming.In normal operation, ALE is emitted at a constant rate of 1/6 the oscillator frequency and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external data memory.If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode.PSENProgram Store Enable (PSEN) is the read strobe to external program memory. When the AT89S52 is executing code from external program memory, PSENis activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory.EA/VPPExternal Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions.This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming.XTAL1Input to the inverting oscillator amplifier and input to the internal clock operating circuit.XTAL2Output from the inverting oscillator amplifier.Special Function RegistersNote that not all of the addresses are occupied, and unoccupied addresses may not be implemented on the chip. Read accesses to these addresses will in general return random data, and write accesses will have an indeterminate effect.User software should not write 1s to these unlisted locations, since they may be used in future products to invoke new features. In that case, the reset or inactive values of the new bits will always be 0.Timer 2 Registers:Control and status bits are contained in registers T2CON and T2MOD for Timer 2. The register pair (RCAP2H, RCAP2L) are the Capture/Reload registers for Timer 2 in 16-bit capture mode or 16-bit auto-reload mode.Interrupt Registers:The individual interrupt enable bits are in the IE register. Two priorities can be set for each of the six interrupt sources in the IP register.Dual Data Pointer Registers: To facilitate accessing both internal and external data memory, two banks of 16-bit Data Pointer Registers areprovided: DP0 at SFR address locations 82H-83H and DP1 at 84H-85H. Bit DPS = 0 in SFR AUXR1 selects DP0 and DPS = 1 selects DP1. The user should always initialize the DPS bit to the appropriate value before accessing the respective Data Pointer Register.Power Off Flag:The Power Off Flag (POF) is located at bit 4 (PCON.4) in the PCON SFR. POF is set to “1” during power up. It can be set and rest under software control and is not affected by reset.Memory OrganizationMCS-51 devices have a separate address space for Program and Data Memory. Up to 64K bytes each of external Program and Data Memory can be addressed.Program MemoryIf the EA pin is connected to GND, all program fetches are directed to external memory. On the AT89S52, if EA is connected to VCC, program fetches to addresses 0000H through 1FFFH are directed to internal memory and fetches to addresses 2000H through FFFFH are to external memory.Data MemoryThe AT89S52 implements 256 bytes of on-chip RAM. The upper 128 bytes occupy a parallel address space to the Special Function Registers. This means that the upper 128 bytes have the same addresses as the SFR space but are physically separate from SFR space.When an instruction accesses an internal location above address 7FH, the address mode used in the instruction specifies whether the CPU accesses the upper 128 bytes of RAM or the SFR space. Instructions which use direct addressing access of the SFR space. For example, the following direct addressing instruction accesses the SFR at location 0A0H (which is P2).MOV 0A0H, #dataInstructions that use indirect addressing access the upper 128 bytes of RAM. For example, the following indirect addressing instruction, where R0 contains 0A0H, accesses the data byte at address 0A0H, rather than P2 (whose address is 0A0H).MOV @R0, #dataNote that stack operations are examples of indirect addressing, so the upper 128 bytes of data RAM are available as stack space.Timer 0 and 1Timer 0 and Timer 1 in the AT89S52 operate the same way as Timer 0 and Timer 1 in the AT89C51 and AT89C52.Timer 2Timer 2 is a 16-bit Timer/Counter that can operate as either a timer or an event counter. The type of operation is selected by bit C/T2 in the SFR T2CON (shown in Table 2). Timer 2 has three operating modes: capture, auto-reload (up or down counting), and baud rate generator. The modes are selected by bits in T2CON.Timer 2 consists of two 8-bit registers, TH2 and TL2. In the Timer function, the TL2 register is incremented every machine cycle. Since a machine cycle consists of 12 oscillator periods, the count rate is 1/12 of the oscillator frequency.In the Counter function, the register is incremented in response to a1-to-0 transition at its corresponding external input pin, T2. In this function, the external input is sampled during S5P2 of every machine cycle. When the samples show a high in one cycle and a low in the next cycle, the count is incremented. The new count value appears in the register during S3P1 of the cycle following the one in which the transition was detected. Since two machine cycles (24 oscillator periods) are required to recognize a 1-to-0 transition, the maximum count rate is 1/24 of the oscillator frequency. To ensure that a given level is sampled at least once before it changes, the level should be held for at least one full machine cycle.InterruptsThe AT89S52 has a total of six interrupt vectors: two external interrupts (INT0 and INT1), three timer interrupts (Timers 0, 1, and 2), and the serial port interrupt. These interrupts are all shown in Figure 10.Each of these interrupt sources can be individually enabled or disabledby setting or clearing a bit in Special Function Register IE. IE also contains a global disable bit, EA, which disables all interrupts at once.Note that Table 5 shows that bit position IE.6 is unimplemented. In the AT89S52, bit position IE.5 is also unimplemented. User software should not write 1s to these bit positions, since they may be used in future AT89 products. Timer 2 interrupt is generated by the logical OR of bits TF2 and EXF2 in register T2CON. Neither of these flags is cleared by hardware when the service routine is vectored to. In fact, the service routine may have to determine whether it was TF2 or EXF2 that generated the interrupt, and that bit will have to be cleared in software.The Timer 0 and Timer 1 flags, TF0 and TF1, are set at S5P2 of the cycle in which the timers overflow. The values are then polled by the circuitry in the next cycle. However, the Timer 2 flag, TF2, is set at S2P2 and is polled in the same cycle in which the timer overflows.二、译文单片机单片机即微型计算机,是把中央处理器、存储器、定时/计数器、输入输出接口都集成在一块集成电路芯片上的微型计算机。
(Shear wall st ructural design ofh igh-lev el fr ameworkWu Jiche ngAbstract : In t his pape r the basic c oncepts of man pow er from th e fra me sh ear w all str uc ture, analy sis of the struct ur al des ign of th e c ont ent of t he fr ame she ar wall, in cludi ng the seism ic wa ll she ar spa本科毕业设计外文文献翻译学校代码: 10128学 号:题 目:Shear wall structural design of high-level framework 学生姓名: 学 院:土木工程学院 系 别:建筑工程系 专 业:土木工程专业(建筑工程方向) 班 级:土木08-(5)班 指导教师: (副教授)nratiodesign, and a concretestructure in themost co mmonly usedframe shear wallstructurethedesign of p oints to note.Keywords: concrete; frameshearwall structure;high-risebuildingsThe wall is amodern high-rise buildings is an impo rtant buildingcontent, the size of theframe shear wall must comply with building regulations. The principle is that the largersizebut the thicknessmust besmaller geometric featuresshouldbe presented to the plate,the force is close to cylindrical.The wall shear wa ll structure is a flatcomponent. Itsexposure to the force along the plane level of therole ofshear and moment, must also take intoaccountthe vertical pressure.Operate under thecombined action ofbending moments and axial force andshear forcebythe cantilever deep beam under the action of the force levelto loo kinto the bottom mounted on the basis of. Shearwall isdividedinto a whole walland theassociated shear wall in theactual project,a wholewallfor exampl e, such as generalhousingconstruction in the gableor fish bone structure filmwalls and small openingswall.Coupled Shear walls are connected bythecoupling beam shear wall.Butbecause thegeneralcoupling beamstiffness is less thanthe wall stiffnessof the limbs,so. Walllimb aloneis obvious.The central beam of theinflection pointtopay attentionto thewall pressure than the limits of the limb axis. Will forma shortwide beams,widecolumn wall limbshear wall openings toolarge component atbothen ds with just the domain of variable cross-section ro din the internalforcesunder theactionof many Walllimb inflection point Therefore, the calcula tions and construction shouldAccordingtoapproximate the framestructure to consider.The designof shear walls shouldbe based on the characteristics of avariety ofwall itself,and differentmechanical ch aracteristicsand requirements,wall oftheinternalforcedistribution and failuremodes of specific and comprehensive consideration of the design reinforcement and structural measures. Frame shear wall structure design is to consider the structure of the overall analysis for both directionsofthehorizontal and verticaleffects. Obtain theinternal force is required in accordancewiththe bias or partial pull normal section forcecalculation.The wall structure oftheframe shear wall structural design of the content frame high-rise buildings, in the actual projectintheuse of themost seismic walls have sufficient quantitiesto meet thelimitsof the layer displacement, the location isrelatively flexible. Seismic wall for continuous layout,full-length through.Should bedesigned to avoid the wall mutations in limb length and alignment is notupand down the hole. The sametime.The inside of the hole marginscolumnshould not belessthan300mm inordertoguaranteethelengthof the column as the edgeof the component and constraint edgecomponents.Thebi-direc tional lateral force resisting structural form of vertical andhorizontalwallconnected.Each other as the affinityof the shear wall. For one, two seismic frame she ar walls,even beam highratio should notgreaterthan 5 and a height of not less than400mm.Midline columnand beams,wall midline shouldnotbe greater tha nthe columnwidthof1/4,in order toreduce thetorsional effect of the seismicaction onthecolumn.Otherwisecan be taken tostrengthen thestirrupratio inthe column tomake up.If theshear wall shearspan thanthe big two. Eventhe beamcro ss-height ratiogreaterthan 2.5, then the design pressure of thecut shouldnotmakeabig 0.2. However, if the shearwallshear spanratioof less than two couplingbeams span of less than 2.5, then the shear compres sion ratiois notgreater than 0.15. Theother hand,the bottom ofthe frame shear wallstructure to enhance thedesign should notbe less than200mmand notlessthanstorey 1/16,otherpartsshouldnot be less than 160mm and not less thanstorey 1/20. Aroundthe wall of the frame shear wall structure shouldbe set to the beam or dark beamand the side columntoform a border. Horizontal distributionofshear walls can from the shear effect,this design when building higher longeror framestructure reinforcement should be appropriatelyincreased, especially in the sensitiveparts of the beam position or temperature, stiffnesschange is bestappropriately increased, thenconsideration shouldbe givento the wallverticalreinforcement,because it is mainly from the bending effect, andtake in some multi-storeyshearwall structurereinforcedreinforcement rate -likelessconstrained edgeofthecomponent or components reinforcement of theedge component.References: [1 sad Hayashi,He Yaming. On the shortshear wall high-rise buildingdesign [J].Keyuan, 2008, (O2).高层框架剪力墙结构设计吴继成摘要: 本文从框架剪力墙结构设计的基本概念人手, 分析了框架剪力墙的构造设计内容, 包括抗震墙、剪跨比等的设计, 并出混凝土结构中最常用的框架剪力墙结构设计的注意要点。
Computer networking summarizeNetworking can be defined as the linking of people, resources and ideas. Networking occurs via casual encounters, meetings, telephone conversation, and the printed words. Now the computer networking provide beings with new networking capabilities. Computer network are important for services because service tasks are information intensive. During the is transmitted between clients, coworkers, management, funding sources, and policy makers. Tools with rapidly speed up communication will dramatically affect services.Computer network growing explosively. Two decades ago, few people essential part of our infrastructure. Networking is used in every aspect of business, including advertising, production, shipping, planning, bulling, and accounting. Consequently, most corporations in on-line libraries around the world. Federal, state, and local government offices use networks, as do military organizations. In short, computer networks are everywhere.The growth in networking economic impact as well. An entire industry jobs for people with more networking expertise. Companies need workers to plan, acquire, install, operate, and manage the addition computer programming is no longer restricted to individual computers; programmers are expected to design and implement application software that can communicate with software on other computers.Computer networks link computers by communication lines and software protocols, allowing data to be exchanged rapidly and reliably. Traditionally, they split between wide area networks (WANs) and local area networks (LANs). A WAN is a network connected over long-distance telephone lines, and a LAN is a localized network usually in one building or a group of buildings close together. The distinction, computers. Today networks carry e-mail, provide access to public databases, and are beginning to be used for distributed systems. Networks also allow users in one locality to share expensive resources, such as printers and disk-systems.Distributed computer systems are built using networked computers that cooperate to perform tasks. In this environment, each part of the networked system does what it is best at. The of a personal computer or workstation provides a good user interface. The mainframe, on the other the results to the users. In a distributed environment, a user might use in a special language (e. g. Structured Query Language-SQL), to the mainframe, which then parrrses the query, returning the user only the data requested. The user might then use the data. By passing back the user’s PC only the specific information requested, network traffic is reduced. If the whole file were transmitted, the PC would then of one network to access the resources on a different type of network. For example, a gateway could be used to connect a local area network of personal computers to a mainframe computer network. For example, if a company this example, using a bridge makes more sense than joining all thepersonal computers together in one large network because the individual departments only occasionally need to access information on the other network.Computer networking technology can be divided into four major aspects.The first is the data transmission. It explains that at the lowest level electrical signals traveling across wires are used to carry information, and shows be encoded using electrical signals.The second focuses on packet transmission. It explains why computer network use packets, and shows . LANs and WANs discussed above are two basic network.The third covers internetworking—the important idea that allows system, and TCPIP, the protocol technology used in global internet.The fourth explains networking applications. It focuses on , and programs provide services such as electronic mail and Web browsing.Continued growth of the global Internet is one of most interesting and exciting phenomena in networking. A decade ago, the Internet was a research project that involved a few dozen sites. Today, the Internet into a production communication system that reaches millions of people in almost all countries on all continents around the world. In the United States, the Internet connects most corporations, colleges and universities, as well as federal, state, and local government offices. It will soon reach most elementary,junior, and senior addition, many private residences can reach the Internet through a dialup telephone connection. Evidence of the Internet’s impact on society can be seen in advertisements, in magazines and on television, which often contain a reference to an Internet Web site that provide additional information about the advertiser’s products and services.A large organization with diverse networking requirements needs multiple physical networks. More important, if the organization chooses the type network that is best for each task, the organization will network can only communicate with other computers attached to same network. The problem became evident in the 1970s as large organizations began to acquire multiple networks. Each network in the organizations formed an island. In many early installations, each computer attached to a single network and employees employees was given access to multiple svreens and keyboards, and the employee was forced to move form one computer to another to send a massage across the appropriate network. Users are neither satisfied nor productive when they must use a separate computer. Consequently, most modern computer communication syetem allow communication between any two computers analogous to the way a telephone system provides communication between any two telephones. Known as universal service, the concept is a fundamental part of networking. With universal service, a user on any computer in any part of an organization can send messages or data to any other users. Furthermore, a user does not need to change computer systems whenchanging tasks—all information is available to all computers. As a result, users are more productive.The basic component used to commect organization to choose network technologies appropriate for each need, and to use routers to connect all networks into a single internet.The goal of internetworking is universal service across an internet, routers must agree to forward information from a source on one network to a specified destination on another. The task is complex because frame formats and addressing schemes used by underlying networks can differ. As s resulrt, protocol software is needed on computers and routers make universal service possible. Internet protocols overcome differences in frame formats and physical addresses to make communication pissible among networks that use different technologies.In general, internet software provides the appeatrance of a single, seamless communication system to which many computers attach. The syetem offers universal service :each computer is assigned an address, and any computer can send a packet to any other computer. Furthermore, internet protocol software —neither users nor application programs are a ware of the underlying physical networks or the routers that connect them.We say that an internet is a virtual network system because the communication system is an abstraction. That is, although a combination of of a uniform network syetem, no such network exists.Research on internetworking modern networking. In fact,internet techmology . Most large organizations already use internetworking as primary computer communication mechanism. Smaller organizations and individuals are beginning to do so as well. More inportant, the TCPIP technology computers in schools, commercial organications, government, military sites and individuals in almost all countries around the world.电脑网络简述网络可被定义为人、资源和思想的联接。
毕业设计外文资料翻译学院:信息科学与工程学院专业:软件工程姓名: XXXXX学号: XXXXXXXXX外文出处: Think In Java (用外文写)附件: 1.外文资料翻译译文;2.外文原文。
附件1:外文资料翻译译文网络编程历史上的网络编程都倾向于困难、复杂,而且极易出错。
程序员必须掌握与网络有关的大量细节,有时甚至要对硬件有深刻的认识。
一般地,我们需要理解连网协议中不同的“层”(Layer)。
而且对于每个连网库,一般都包含了数量众多的函数,分别涉及信息块的连接、打包和拆包;这些块的来回运输;以及握手等等。
这是一项令人痛苦的工作。
但是,连网本身的概念并不是很难。
我们想获得位于其他地方某台机器上的信息,并把它们移到这儿;或者相反。
这与读写文件非常相似,只是文件存在于远程机器上,而且远程机器有权决定如何处理我们请求或者发送的数据。
Java最出色的一个地方就是它的“无痛苦连网”概念。
有关连网的基层细节已被尽可能地提取出去,并隐藏在JVM以及Java的本机安装系统里进行控制。
我们使用的编程模型是一个文件的模型;事实上,网络连接(一个“套接字”)已被封装到系统对象里,所以可象对其他数据流那样采用同样的方法调用。
除此以外,在我们处理另一个连网问题——同时控制多个网络连接——的时候,Java内建的多线程机制也是十分方便的。
本章将用一系列易懂的例子解释Java的连网支持。
15.1 机器的标识当然,为了分辨来自别处的一台机器,以及为了保证自己连接的是希望的那台机器,必须有一种机制能独一无二地标识出网络内的每台机器。
早期网络只解决了如何在本地网络环境中为机器提供唯一的名字。
但Java面向的是整个因特网,这要求用一种机制对来自世界各地的机器进行标识。
为达到这个目的,我们采用了IP(互联网地址)的概念。
IP以两种形式存在着:(1) 大家最熟悉的DNS(域名服务)形式。
我自己的域名是。
所以假定我在自己的域内有一台名为Opus的计算机,它的域名就可以是。
发展一个微创约束图像识别神经网络摘要:人工神经网络的应用还没有达到的承诺在他们的行政法理论的时期, 已经有许多小型应用, 和技术已被广泛地应用,但还没有真正的自治系统显示,能够真正复杂的学习或复杂的行为。
多次失败的原因将在更早的承诺,原因,因此人工神经网络是不再像从前作为时尚,则是约束,是放在神经网络模型的设计师,拥有固定建筑、动力学和学习规则被应用在方式,来防止除了一小部分的全面最合适的潜力成为的处境。
这里的神经网络模型,论证了生长和活动是为了将有限的设计和使用演化法发展工作系统最适合特定的任务。
网络模型的设计是生产线,广泛生物似是而非的吸收与释放,模块化、激素和行为的模型selfdetection允许行为发展阶段的反馈。
该方法仍在发展,但是有效的工作已经被证实,当应用于一个测试的例子。
constraint-minimisation方法的应用问题的光学字符识别中, 并且开发能力,论证了快速、准确的能力在该地区。
设计开发的系统对模拟相结合的视觉和音频输入, 如何回应这些输入通过音频输出,用来开发反馈机制。
通过这个方法,演化的网络已经成为能模仿音频输入和经过一段时间的训练、正确地回应的视觉输入没有声音提示。
被认为是不可避免的,有些设计规范, 因此约束,是为了发展网络。
问题就在于识别网络组件和设计参数,这是必需的关系,不同形式的系统。
一旦这种已经达到这样一种方式,系统的设计那样灵活是可行的, 然后是由的初始设计使用的定义与健身的能力并做出反应的受体(模仿音频输入输出视觉正确。
该系统的组成及参数,已经被认定为必要的系统包括下列事项:·节点(参数包括节点位置、内部化学物质含量,输入活化和输出激活)·突触(参数包括输入和输出节点识别、接权、类型和内部化学物质含量)·建筑(包括考虑模块化、连接、模块维空间和模块数量)·节点发展(因素包括节点增长和节点播放)·突触的发展(因素包括突触的增长和突触播放)·激素密度(这是受扩散率、密度不均,节点和突触的激素分泌)在这里开发的应用还不利用所有这些的考虑(明确地,节点和突触的增长和去除不进行)。
毕业设计外文资料题目面对对象技术学院信息科学与工程学院专业计算机科学与技术班级计软1202学生刘桂斌学号20121214073指导教师史桂娴,王海燕二〇一六年三月二十日Object Technology2004, Vol.14 (2), pp.20.Object TechnologyTimothy A.BuddAbstract Object technology is a new approach to developing software that allows programmers to create objects, a combination of data and program instructions. This new technology has been steadily developed since the late 1960s and promises to be one of the major ingredients in the response to the ongoing software crisis.Keywords Object technology Optimization1.1 Introduction to OTThere exists a critical technology that is changing the way we conceive, build, use and evolve our computer systems. It is a technology that many companies are adopting to increase their efficiency, reduce costs and adapt to a dynamic marketplace. It is called Object Technology (OT).By allowing the integration of disparate and non compatible source, OT has the potential to precipitate a revolution in information systems design on a par with that caused in computer hardware by the introduction of the computer chip. Yet OT is not a newphenomenon. Development and product releases have been ongoing since its origin many years ago. However, the recent emphasis task of enterprise information technology integration has brought OT into the spotlight.OT promises to provide component-level software objects that can be quickly combined to build new applications that respond to changing business conditions. Once used, objects may be reused in other applications, lowering development costs and speeding up the development process. Because objects communicate by sending messages that can be understood by other objects, large integrated systems are easier to assemble.Each object is responsible for a specific function within either an application or a distributed system. That means that as the business changes, individual object may be easily upgraded, augmented or replaced, leaving the rest of the system untouched. This directly reduces the cost of maintenance and the timing and extendibility of new systems.1.2 OT-based ProductsThe current market for OT-based products can be divided into four major segments: ·Languages and programming tools·Developers’ toolkits·Object-Oriented database·Object-Oriented CASE toolsThe largest segment of the current market for OT-based products is languages andprogramming tools. Products in this area include language compliers for C++, Smalltalk, Common Lisp Object System (CLOS), Eiffel, Ada and Objective-C, as well as extensions to PASCAL and Modula-2.Products in this category are available from a variety of vendors. Increasingly, the trend in this group is to offer the language compliers with associated development tools as part of a complete development environment.Developers’ toolkits account for the next largest part of the OT market. These products are designed to develop a program that enables a developer to easily do one of two things. The first is interfacing an application to distributed environment. The second is developing a graphical screen through a product.By providing developers with higher level description language and reusablecomponents, products in this category give developers an easy and cost effective way to begin producing object-oriented systems.An important component in this category is the relatively new area of end-users tools. This element is important because organizing and analying the increasingly large amounts of data that computer systems are capable of collecting is a key problem.Object-oriented database management systems are one of the most interesting and rapidly growing segments of the OT market. A number of companies, including systems vendors like Digital and HP, and start-ups such as Object Design, Servio, and Objectivity, have all produced products.These products, dubbed ‖Objectbases‖, fill an important need by storing complexobjects as a single entity. The objectbase products allow objects to be stored, retrieved and shared in much the same way as data is stored in a relational database management system. The value of an objectbase, as opposed to a database, is best described as following: ―Object databases offer a better way to store objects because they provide all of the traditional database services without the overhead of disassembling and reassemblingobjects every time they are stored and retrieved. Compared with an object database, storing complex objects in a relational database is tedious at best. It’s like having to disassembling your car each night rather than just putting it into the gar age!‖Over the next few years, a shift from proprietary CASE implementations to those based on the object paradigm can be expected. This area has lagged growth from earlier projections. OT-based CASE tools will have to emerge as a viable product category to address the wide scale development of large systems. This category also include those tools that are methodological in nature.1.3 0bject-oriented ProgrammingObject-oriented programming (OOP) is a new approach to developing software that allows programmers to create objects, a combination of data and program instructions. Traditional programming methods keep data, such as files, independent of the programs that work with the data. Each traditional program, t5herfore, must define how the data will be used for that particular program. This often results in redundant programming code that must be changed every time the structure of the data is changed, such as when a new field is added to a file. With OOP, the program instructions and data are combined into objects that can be used repeatedly by programmers whenever they need them. Specificinstructions, called methods define how the object acts when it is used by a program.With OOP, programmers define classes of objects. Each class contains the methods that are unique to that class. Each class can have one or more subclasses. Each subclass contains the methods of its higher level classes plus whatever methods are unique to the subclass. The OOP capability to pass methods to lower levels is called ―inheritance‖.A specific instance of an object contains all methods from its higher level classes plus any methods that a unique to the object. When an OOP object is sent an instruction to do something, called a message, unlike a traditional program, the message does not have to tell the OOP object exactly what to do. What to do is defined by the methods that the OOP object contains or has inherited.Object—oriented programming can bring many advantages to users. It can bring productivity gains as high as 1000 to 1500 percent instead of the 10 or 15 percent gainsavailable from structured programming methods. It allows large complex systems to be built which are not economically feasible using traditional programming techniques. It allows program modifications to be made more easily. It could mean two different user interfaces within an application, one for the user who likes to type, and another for the users who just want to shout at the terminal.Objects can be viewed as reusable components, and once the programmer has developed a library of these components, he can minimize the amount of new coding required. One user envisions a commercial library of objects which could be purchased byprogrammers and reused for various applications. But creating a library is no simple task because the integrity of the original software design is critical. Reusability can be a mixed blessing for users, too, as a programmers has to be able to find the object he needs. But if productivity is your aim, reusability is worth the risks.The long-term productivity of systems is enhanced by object-oriented programming. Because of the modular nature of the code, programs are more malleable. This is particularly beneficial for applications that will be used for many years, during which company needs may change and make software modifications necessary.Software reliability can be improved by object-oriented programming. Since the objects are repeatedly tested in a variety of applications, bugs are more likely to be found and corrected. Object-oriented programming also has potential benefits in parallel processing. Execution speed under object oriented methods will improve with parallel processing.1.4 Object-oriented DBMSA shift toward object-oriented DBMSs does not have to replace relational DNMS. As its name implies, it is orientation rather than a full-blown DBMS model. As such, it can blend with and build on the relational schema.Object-oriented DBMSs integrate a variety of real-world data types –such as business procedures and policies, graphics, pictures, voice, and an non-tated text. Current relational products are not equipped to handle them efficiently. Data types in RDBMSs are more commonly record-oriented and expressed in numbers and text.Object orientation also makes contributions to application development efficiency.makes the data function, attributes, and relationships an integral part of the object. In this way, objects can be reused and replicated. You can query the data on its functions, attributes, and relationships.By contrast, most RDBMSs demand that the knowledge associated with the data be written into and maintained separately in each application program.Object orientation is going to be available in two forms: one for those who need and want a radical change, and one for those who want some of its advantages without going through a major conversion.The first form of object-oriented DBMS focused largely on the computer-aided design (CAD) market, which needed to store complex data types such as the graphics involved with an aircraft design.The second form is made up of the leading RDBMS vendors who support the concept of integrating object management capabilities whit their current line of relational products. Sybase, Inc, the first vendor to introduce an object-oriented capability,offers Sybase , which enables the user to program a limited number of business procedures along with the data types in a server’s database engine . Any client attempting a transaction that does not conform to these procedures is simply rejected by the database. That capability enables users to shorten the development cycle, since integrity logic and business rules no longer need to be programmed into each application.This approach reduces maintenance costs as well, since any changes in the procedure can be made once at the server level instead of several times within all the affected applications.Last, the server-level procedures increase the system’s performance, since the operations are taking place closer to where the data is actually stored.。
四、毕业设计(论文)的选题1、选题原则如下:(1) 符合本专业培养目标,满足教学基本要求,有利于对学生进行全面训练,有利于巩固、深化和扩大所学知识。
(2) 在基本满足教学要求的前提下,尽可能面向经济建设,结合生产、科研、实验室建设等任务进行,促进产学研结合体制的建立。
(3) 题目以中、小型为主,份量和难度要适当,使学生在规定时间内,经过努力能够完成任务,并在原有的水平和能力上有较大的提高。
(4) 坚持每人一题,教师可将大而难的题目进行分解,使学生毕业设计取得阶段性成果。
2、课题的确定(1) 毕业设计(论文)题目由指导教师提出,在毕业设计开始之前5周填写“毕业设计(论文)题目申请表”一式两份,(2) 由各专业毕业设计题目审查小组对课题是否合格进行全面审查,并由教研室主任签字。
3、课题的落实(1) 各专业应在毕业设计开始之前2周向学生公布题目。
(2) 题目确定后,由指导教师填写“毕业设计(论文)任务书”,经教研室主任审查、签字后,于毕业设计开始之前发送给学生。
(3) 为了保证毕业设计的严肃性,课题落实后一般不再变动。
(4) 各专业毕业设计题目确定后,由教研室汇总并填写“毕业设计(论文)题目落实统计表”一式二份后报学院审批,由学院报教务处。
五、毕业设计(论文)的工作量要求1、工程设计类学生需独立完成不少于3张零号图纸的结构设计图、装配图和零件图,其中应包含一张以上用计算机绘制的具有中等难度的1号图纸,同时至少有折合1号图幅以上的图纸用手工绘制,查阅到15篇以上与课题相关的文献,按要求格式独立撰写不少于12000字的设计说明书。
2、论文类学生需查阅到20篇以上与课题相关的文献,按要求格式独立撰写不少于10000字的论文,文中图表用计算机绘制。
六、毕业设计(论文)的撰写1、内容与要求毕业设计(论文)的内容一般依次由以下部分组成:封面、任务书、中文摘要、英文摘要、目录、(符号说明)、前言、正文、结论、参考文献、致谢、(附录)、外文资料译文、外文原文。