电子信息工程外文翻译-外文文献-英文文献
- 格式:doc
- 大小:75.00 KB
- 文档页数:6
外文文献翻译格式范例本科毕业设计(外文翻译)外文参考文献译文及原文学院信息工程学院专业信息工程(电子信息工程方向)年级班别 2006级(4)班学号 3206003186学生姓名柯思怡指导教师 ______ 田妮莉 _ __2010年6月目录熟悉微软SQL Server (1)1Section A 引言 (1)2Section B 再谈数据库可伸缩性 (4)3Section C 数据库开发的特点 (7)Get Your Arms around Microsoft SQL Server (9)1Section A Introduction to SQL Server 2005 (9)2Section B Database Scalability Revisited (13)3Section C Features for Database Development (17)熟悉微软SQL Server1 Section A 引言SQL Server 2005 是微软SQL生产线上最值得期待的产品。
在经过了上百万个邮件,成百上千的规范说明,以及数十次修订后。
微软承诺SQL Server 2005 是最新的基于Windows数据库应用的数据库开发平台。
这节的内容将指出SQL Server 2005产品的一些的重要特征。
SQL Server 2005几乎覆盖OLTP及OLAP技术的所又内容。
微软公司的这个旗舰数据库产品几乎能覆盖所有的东西。
这个软件在经过五年多的制作后,成为一个与它任何一个前辈产品都完全不同的产品。
本节将介绍整个产品的大部分功能。
当人们去寻求其想要的一些功能和技术时,可以从中提取出重要的和最感新区的内容,包括SQL Server Engine 的一些蜕变的历史,以及各种各样的SQL Server 2005的版本,可伸缩性,有效性,大型数据库的维护以及商业智能等如下:●数据库引擎增强技术。
SQL Server 2005 对数据库引擎进行了许多改进,并引入了新的功能。
电子信息工程电路编程中的AT89C51单片机译文标题电路编程中的AT89C51单片机AT89C51 In-Circuit Programming 原文标题作者Robert W.Sparks等译名国籍美国斯帕克等W.罗伯特Atmel Corporation原文出处摘要本应用说明的是ATMEL公司AT89C51的电路可编程闪存的微控制器。
为在电路可编程AT89C51的应用提出了与应用程序相关的例子,它的修改要求支持在线编程。
这种方法显示在该应用程序中的AT89C51单片机可通过商业电话线远程改编。
本应用笔记中描述的电路,仅支持5伏电压下编程,需要使用一个AT89C51-XX-5。
标准A T89C51的需要12伏电压。
该应用程序的软件可从ATMEL下载。
总论当不在进行程序设计的时候,在电路设计中的AT89C51设计将变得透明化。
在编程期间必须重视EA/VPP这一脚。
在不使用外部程序存储器的应用程序中,这脚可能会永久接到VCC。
应用程序使用的外部程序存储器要求这一脚为低电平才能正常运行。
RST在编程期间必须为高电平。
应该提供一种方法使得电路通入电源以后,使RST代替主要的复位电路起到复位的作用。
在编程过程中,PSEN必须保持低电平,在正常运行期间绝不能使用。
ALE/ PRO在编程过程中输出低电平,在正常运行期间绝不能使用在编程过程中AT89C5I / 端口是用于模式应用程序,地址和数据选择的,可能要该控制器从应用的电路隔离。
如何做到这一点取决于应用程序输入端在编程过程中,控制器必须与应用电路的信号来源隔离。
带有三个输出状态的缓冲区在应用程序之间插入电路和控制器,同时在编程时缓冲区输出三种状态。
一个多路复用器用于信号源之间进行选择,适用于任何一方的应用电路或编程控制器电路的信号输出端如果应用的电路可以允许端口在编程过程中的状态变化,则不需要改变电路。
如果应电路的状态,必须事先在编程过程中的保持不变,可能在控制器和应用电路中插入锁存。
英文原文:Title: Business Applications of Java. Author: Erbschloe, Michael, Business Applications of Java -- Research Starters Business, 2008DataBase: Research Starters - BusinessBusiness Applications of JavaThis article examines the growing use of Java technology in business applications. The history of Java is briefly reviewed along with the impact of open standards on the growth of the World Wide Web. Key components and concepts of the Java programming language are explained including the Java Virtual Machine. Examples of how Java is being used bye-commerce leaders is provided along with an explanation of how Java is used to develop data warehousing, data mining, and industrial automation applications. The concept of metadata modeling and the use of Extendable Markup Language (XML) are also explained.Keywords Application Programming Interfaces (API's); Enterprise JavaBeans (EJB); Extendable Markup Language (XML); HyperText Markup Language (HTML); HyperText Transfer Protocol (HTTP); Java Authentication and Authorization Service (JAAS); Java Cryptography Architecture (JCA); Java Cryptography Extension (JCE); Java Programming Language; Java Virtual Machine (JVM); Java2 Platform, Enterprise Edition (J2EE); Metadata Business Information Systems > Business Applications of JavaOverviewOpen standards have driven the e-business revolution. Networking protocol standards, such as Transmission Control Protocol/Internet Protocol (TCP/IP), HyperText Transfer Protocol (HTTP), and the HyperText Markup Language (HTML) Web standards have enabled universal communication via the Internet and the World Wide Web. As e-business continues to develop, various computing technologies help to drive its evolution.The Java programming language and platform have emerged as major technologies for performing e-business functions. Java programming standards have enabled portability of applications and the reuse of application components across computing platforms. Sun Microsystems' Java Community Process continues to be a strong base for the growth of the Java infrastructure and language standards. This growth of open standards creates new opportunities for designers and developers of applications and services (Smith, 2001).Creation of Java TechnologyJava technology was created as a computer programming tool in a small, secret effort called "the Green Project" at Sun Microsystems in 1991. The Green Team, fully staffed at 13 people and led by James Gosling, locked themselves away in an anonymous office on Sand Hill Road in Menlo Park, cut off from all regular communications with Sun, and worked around the clock for18 months. Their initial conclusion was that at least one significant trend would be the convergence of digitally controlled consumer devices and computers. A device-independent programming language code-named "Oak" was the result.To demonstrate how this new language could power the future of digital devices, the Green Team developed an interactive, handheld home-entertainment device controller targeted at the digital cable television industry. But the idea was too far ahead of its time, and the digital cable television industry wasn't ready for the leap forward that Java technology offered them. As it turns out, the Internet was ready for Java technology, and just in time for its initial public introduction in 1995, the team was able to announce that the Netscape Navigator Internet browser would incorporate Java technology ("Learn about Java," 2007).Applications of JavaJava uses many familiar programming concepts and constructs and allows portability by providing a common interface through an external Java Virtual Machine (JVM). A virtual machine is a self-contained operating environment, created by a software layer that behaves as if it were a separate computer. Benefits of creating virtual machines include better exploitation of powerful computing resources and isolation of applications to prevent cross-corruption and improve security (Matlis, 2006).The JVM allows computing devices with limited processors or memory to handle more advanced applications by calling up software instructions inside the JVM to perform most of the work. This also reduces the size and complexity of Java applications because many of the core functions and processing instructions were built into the JVM. As a result, software developersno longer need to re-create the same application for every operating system. Java also provides security by instructing the application to interact with the virtual machine, which served as a barrier between applications and the core system, effectively protecting systems from malicious code.Among other things, Java is tailor-made for the growing Internet because it makes it easy to develop new, dynamic applications that could make the most of the Internet's power and capabilities. Java is now an open standard, meaning that no single entity controls its development and the tools for writing programs in the language are available to everyone. The power of open standards like Java is the ability to break down barriers and speed up progress.Today, you can find Java technology in networks and devices that range from the Internet and scientific supercomputers to laptops and cell phones, from Wall Street market simulators to home game players and credit cards. There are over 3 million Java developers and now there are several versions of the code. Most large corporations have in-house Java developers. In addition, the majority of key software vendors use Java in their commercial applications (Lazaridis, 2003).ApplicationsJava on the World Wide WebJava has found a place on some of the most popular websites in the world and the uses of Java continues to grow. Java applications not only provide unique user interfaces, they also help to power the backend of websites. Two e-commerce giants that everybody is probably familiar with (eBay and Amazon) have been Java pioneers on the World Wide Web.eBayFounded in 1995, eBay enables e-commerce on a local, national and international basis with an array of Web sites-including the eBay marketplaces, PayPal, Skype, and -that bring together millions of buyers and sellers every day. You can find it on eBay, even if you didn't know it existed. On a typical day, more than 100 million items are listed on eBay in tens of thousands of categories. Recent listings have included a tunnel boring machine from the Chunnel project, a cup of water that once belonged to Elvis, and the Volkswagen that Pope Benedict XVI owned before he moved up to the Popemobile. More than one hundred million items are available at any given time, from the massive to the miniature, the magical to the mundane, on eBay; the world's largest online marketplace.eBay uses Java almost everywhere. To address some security issues, eBay chose Sun Microsystems' Java System Identity Manager as the platform for revamping its identity management system. The task at hand was to provide identity management for more than 12,000 eBay employees and contractors.Now more than a thousand eBay software developers work daily with Java applications. Java's inherent portability allows eBay to move to new hardware to take advantage of new technology, packaging, or pricing, without having to rewrite Java code ("eBay drives explosive growth," 2007).Amazon (a large seller of books, CDs, and other products) has created a Web Service application that enables users to browse their product catalog and place orders. uses a Java application that searches the Amazon catalog for books whose subject matches a user-selected topic. The application displays ten books that match the chosen topic, and shows the author name, book title, list price, Amazon discount price, and the cover icon. The user may optionally view one review per displayed title and make a buying decision (Stearns & Garishakurthi, 2003).Java in Data Warehousing & MiningAlthough many companies currently benefit from data warehousing to support corporate decision making, new business intelligence approaches continue to emerge that can be powered by Java technology. Applications such as data warehousing, data mining, Enterprise Information Portals (EIP's), and Knowledge Management Systems (which can all comprise a businessintelligence application) are able to provide insight into customer retention, purchasing patterns, and even future buying behavior.These applications can not only tell what has happened but why and what may happen given certain business conditions; allowing for "what if" scenarios to be explored. As a result of this information growth, people at all levels inside the enterprise, as well as suppliers, customers, and others in the value chain, are clamoring for subsets of the vast stores of information such as billing, shipping, and inventory information, to help them make business decisions. While collecting and storing vast amounts of data is one thing, utilizing and deploying that data throughout the organization is another.The technical challenges inherent in integrating disparate data formats, platforms, and applications are significant. However, emerging standards such as the Application Programming Interfaces (API's) that comprise the Java platform, as well as Extendable Markup Language (XML) technologies can facilitate the interchange of data and the development of next generation data warehousing and business intelligence applications. While Java technology has been used extensively for client side access and to presentation layer challenges, it is rapidly emerging as a significant tool for developing scaleable server side programs. The Java2 Platform, Enterprise Edition (J2EE) provides the object, transaction, and security support for building such systems.Metadata IssuesOne of the key issues that business intelligence developers must solve is that of incompatible metadata formats. Metadata can be defined as information about data or simply "data about data." In practice, metadata is what most tools, databases, applications, and other information processes use to define, relate, and manipulate data objects within their own environments. It defines the structure and meaning of data objects managed by an application so that the application knows how to process requests or jobs involving those data objects. Developers can use this schema to create views for users. Also, users can browse the schema to better understand the structure and function of the database tables before launching a query.To address the metadata issue, a group of companies (including Unisys, Oracle, IBM, SAS Institute, Hyperion, Inline Software and Sun) have joined to develop the Java Metadata Interface (JMI) API. The JMI API permits the access and manipulation of metadata in Java with standard metadata services. JMI is based on the Meta Object Facility (MOF) specification from the Object Management Group (OMG). The MOF provides a model and a set of interfaces for the creation, storage, access, and interchange of metadata and metamodels (higher-level abstractions of metadata). Metamodel and metadata interchange is done via XML and uses the XML Metadata Interchange (XMI) specification, also from the OMG. JMI leverages Java technology to create an end-to-end data warehousing and business intelligence solutions framework.Enterprise JavaBeansA key tool provided by J2EE is Enterprise JavaBeans (EJB), an architecture for the development of component-based distributed business applications. Applications written using the EJB architecture are scalable, transactional, secure, and multi-user aware. These applications may be written once and then deployed on any server platform that supports J2EE. The EJB architecture makes it easy for developers to write components, since they do not need to understand or deal with complex, system-level details such as thread management, resource pooling, and transaction and security management. This allows for role-based development where component assemblers, platform providers and application assemblers can focus on their area of responsibility further simplifying application development.EJB's in the Travel IndustryA case study from the travel industry helps to illustrate how such applications could function. A travel company amasses a great deal of information about its operations in various applications distributed throughout multiple departments. Flight, hotel, and automobile reservation information is located in a database being accessed by travel agents worldwide. Another application contains information that must be updated with credit and billing historyfrom a financial services company. Data is periodically extracted from the travel reservation system databases to spreadsheets for use in future sales and marketing analysis.Utilizing J2EE, the company could consolidate application development within an EJB container, which can run on a variety of hardware and software platforms allowing existing databases and applications to coexist with newly developed ones. EJBs can be developed to model various data sets important to the travel reservation business including information about customer, hotel, car rental agency, and other attributes.Data Storage & AccessData stored in existing applications can be accessed with specialized connectors. Integration and interoperability of these data sources is further enabled by the metadata repository that contains metamodels of the data contained in the sources, which then can be accessed and interchanged uniformly via the JMI API. These metamodels capture the essential structure and semantics of business components, allowing them to be accessed and queried via the JMI API or to be interchanged via XML. Through all of these processes, the J2EE infrastructure ensures the security and integrity of the data through transaction management and propagation and the underlying security architecture.To consolidate historical information for analysis of sales and marketing trends, a data warehouse is often the best solution. In this example, data can be extracted from the operational systems with a variety of Extract, Transform and Load tools (ETL). The metamodels allow EJBsdesigned for filtering, transformation, and consolidation of data to operate uniformly on datafrom diverse data sources as the bean is able to query the metamodel to identify and extract the pertinent fields. Queries and reports can be run against the data warehouse that contains information from numerous sources in a consistent, enterprise-wide fashion through the use of the JMI API (Mosher & Oh, 2007).Java in Industrial SettingsMany people know Java only as a tool on the World Wide Web that enables sites to perform some of their fancier functions such as interactivity and animation. However, the actual uses for Java are much more widespread. Since Java is an object-oriented language like C++, the time needed for application development is minimal. Java also encourages good software engineering practices with clear separation of interfaces and implementations as well as easy exception handling.In addition, Java's automatic memory management and lack of pointers remove some leading causes of programming errors. Most importantly, application developers do not need to create different versions of the software for different platforms. The advantages available through Java have even found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.Benefits of JavaThe benefits of Java translate across many industries, and some are specific to the control and automation environment. For example, many plant-floor applications use relatively simple equipment; upgrading to PCs would be expensive and undesirable. Java's ability to run on any platform enables the organization to make use of the existing equipment while enhancing the application.IntegrationWith few exceptions, applications running on the factory floor were never intended to exchange information with systems in the executive office, but managers have recently discovered the need for that type of information. Before Java, that often meant bringing together data from systems written on different platforms in different languages at different times. Integration was usually done on a piecemeal basis, resulting in a system that, once it worked, was unique to the two applications it was tying together. Additional integration required developing a brand new system from scratch, raising the cost of integration.Java makes system integration relatively easy. Foxboro Controls Inc., for example, used Java to make its dynamic-performance-monitor software package Internet-ready. This software provides senior executives with strategic information about a plant's operation. The dynamic performance monitor takes data from instruments throughout the plant and performs variousmathematical and statistical calculations on them, resulting in information (usually financial) that a manager can more readily absorb and use.ScalabilityAnother benefit of Java in the industrial environment is its scalability. In a plant, embedded applications such as automated data collection and machine diagnostics provide critical data regarding production-line readiness or operation efficiency. These data form a critical ingredient for applications that examine the health of a production line or run. Users of these devices can take advantage of the benefits of Java without changing or upgrading hardware. For example, operations and maintenance personnel could carry a handheld, wireless, embedded-Java device anywhere in the plant to monitor production status or problems.Even when internal compatibility is not an issue, companies often face difficulties when suppliers with whom they share information have incompatible systems. This becomes more of a problem as supply-chain management takes on a more critical role which requires manufacturers to interact more with offshore suppliers and clients. The greatest efficiency comes when all systems can communicate with each other and share information seamlessly. Since Java is so ubiquitous, it often solves these problems (Paula, 1997).Dynamic Web Page DevelopmentJava has been used by both large and small organizations for a wide variety of applications beyond consumer oriented websites. Sandia, a multiprogram laboratory of the U.S. Department of Energy's National Nuclear Security Administration, has developed a unique Java application. The lab was tasked with developing an enterprise-wide inventory tracking and equipment maintenance system that provides dynamic Web pages. The developers selected Java Studio Enterprise 7 for the project because of its Application Framework technology and Web Graphical User Interface (GUI) components, which allow the system to be indexed by an expandable catalog. The flexibility, scalability, and portability of Java helped to reduce development timeand costs (Garcia, 2004)IssueJava Security for E-Business ApplicationsTo support the expansion of their computing boundaries, businesses have deployed Web application servers (WAS). A WAS differs from a traditional Web server because it provides a more flexible foundation for dynamic transactions and objects, partly through the exploitation of Java technology. Traditional Web servers remain constrained to servicing standard HTTP requests, returning the contents of static HTML pages and images or the output from executed Common Gateway Interface (CGI ) scripts.An administrator can configure a WAS with policies based on security specifications for Java servlets and manage authentication and authorization with Java Authentication andAuthorization Service (JAAS) modules. An authentication and authorization service can bewritten in Java code or interface to an existing authentication or authorization infrastructure. Fora cryptography-based security infrastructure, the security server may exploit the Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE). To present the user with a usable interaction with the WAS environment, the Web server can readily employ a formof "single sign-on" to avoid redundant authentication requests. A single sign-on preserves user authentication across multiple HTTP requests so that the user is not prompted many times for authentication data (i.e., user ID and password).Based on the security policies, JAAS can be employed to handle the authentication process with the identity of the Java client. After successful authentication, the WAS securitycollaborator consults with the security server. The WAS environment authentication requirements can be fairly complex. In a given deployment environment, all applications or solutions may not originate from the same vendor. In addition, these applications may be running on different operating systems. Although Java is often the language of choice for portability between platforms, it needs to marry its security features with those of the containing environment.Authentication & AuthorizationAuthentication and authorization are key elements in any secure information handling system. Since the inception of Java technology, much of the authentication and authorization issues have been with respect to downloadable code running in Web browsers. In many ways, this had been the correct set of issues to address, since the client's system needs to be protected from mobile code obtained from arbitrary sites on the Internet. As Java technology moved from a client-centric Web technology to a server-side scripting and integration technology, it required additional authentication and authorization technologies.The kind of proof required for authentication may depend on the security requirements of a particular computing resource or specific enterprise security policies. To provide such flexibility, the JAAS authentication framework is based on the concept of configurable authenticators. This architecture allows system administrators to configure, or plug in, the appropriate authenticatorsto meet the security requirements of the deployed application. The JAAS architecture also allows applications to remain independent from underlying authentication mechanisms. So, as new authenticators become available or as current authentication services are updated, system administrators can easily replace authenticators without having to modify or recompile existing applications.At the end of a successful authentication, a request is associated with a user in the WAS user registry. After a successful authentication, the WAS consults security policies to determine if the user has the required permissions to complete the requested action on the servlet. This policy canbe enforced using the WAS configuration (declarative security) or by the servlet itself (programmatic security), or a combination of both.The WAS environment pulls together many different technologies to service the enterprise. Because of the heterogeneous nature of the client and server entities, Java technology is a good choice for both administrators and developers. However, to service the diverse security needs of these entities and their tasks, many Java security technologies must be used, not only at a primary level between client and server entities, but also at a secondary level, from served objects. By using a synergistic mix of the various Java security technologies, administrators and developers can make not only their Web application servers secure, but their WAS environments secure as well (Koved, 2001).ConclusionOpen standards have driven the e-business revolution. As e-business continues to develop, various computing technologies help to drive its evolution. The Java programming language and platform have emerged as major technologies for performing e-business functions. Java programming standards have enabled portability of applications and the reuse of application components. Java uses many familiar concepts and constructs and allows portability by providing a common interface through an external Java Virtual Machine (JVM). Today, you can find Java technology in networks and devices that range from the Internet and scientific supercomputers to laptops and cell phones, from Wall Street market simulators to home game players and credit cards.Java has found a place on some of the most popular websites in the world. Java applications not only provide unique user interfaces, they also help to power the backend of websites. While Java technology has been used extensively for client side access and in the presentation layer, it is also emerging as a significant tool for developing scaleable server side programs.Since Java is an object-oriented language like C++, the time needed for application development is minimal. Java also encourages good software engineering practices with clear separation of interfaces and implementations as well as easy exception handling. Java's automatic memory management and lack of pointers remove some leading causes of programming errors. The advantages available through Java have also found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.中文翻译:标题:Java的商业应用。
关于电子信息工程的英语作文English:Electronic information engineering is a discipline that combines electrical engineering and computer science to develop and design electronic devices and systems for the transmission, storage, processing, and access of information. It involves the study of various electronic components, digital systems, communication networks, and computer hardware and software. Electronic information engineering is an increasingly important field as our society becomes more reliant on technology, with applications ranging from telecommunications and radar systems to consumer electronics and healthcare devices. Graduates in this field are equipped with the necessary skills to work in a variety of industries, such as telecommunications, aerospace, automotive, and healthcare, where they can design, develop, and maintain electronic systems and devices.Translated content:电子信息工程是结合电气工程和计算机科学的学科,用于开发和设计用于信息传输、存储、处理和访问的电子设备和系统。
关于电子信息工程的英语作文English: Electronic Information Engineering is a branch of engineering that focuses on the study and application of electronic devices and communication systems in various fields. This field combines principles from electrical engineering and computer science to design, build, and maintain electronic systems that process, transmit, and store information. Electronic Information Engineering plays a crucial role in shaping the technologies we use in our daily lives, such as smartphones, computers, telecommunication networks, and more. Professionals in this field work on developing advanced technologies like artificial intelligence, Internet of Things, and 5G networks to improve communication, automation, and data processing efficiency. With the rapid development of technology, Electronic Information Engineering will continue to evolve and pave the way for innovative solutions to various societal challenges.中文翻译: 电子信息工程是一门工程学的分支,专注于研究和应用电子设备和通信系统在各个领域。
1、外文原文(复印件)A: Fundamentals of Single-chip MicrocomputerTh e si ng le-ch i p mi cr oc om pu ter is t he c ul mi nat i on o f bo th t h e d ev el op me nt o f th e d ig it al com p ut er an d t he int e gr at ed ci rc ui ta r gu ab ly th e t ow m os t s i gn if ic ant i nv en ti on s o f t h e 20t h c en tu ry[1].Th es e to w t ype s o f a rc hi te ct ur e a re fo un d i n s i ng le—ch ip m i cr oc om pu te r。
S o me em pl oy th e s p li t p ro gr am/d at a me mo ry of t he H a rv ar d ar ch it ect u re, sh ow n in Fi g.3-5A—1,ot he r s fo ll ow t hep h il os op hy, wi del y a da pt ed f or ge n er al—pu rp os e c o mp ut er s an dm i cr op ro ce ss or s, of ma ki ng no lo gi c al di st in ct io n be tw ee n p ro gr am a n d da ta m em or y a s i n th e Pr in cet o n ar ch it ec tu re,sh ow n in F ig。
3-5A-2.In g en er al te r ms a s in gl e—ch i p mi cr oc om pu ter isc h ar ac te ri zed b y the i nc or po ra tio n of al l t he uni t s o f a co mp ut er i n to a s in gl e de v i ce,as s ho wn i n F ig3—5A—3。
基于ZigBee无线传感器网络的矿工的位置探测研究张秀萍, 韩广杰, 朱昌平, 窦燕, 陶剑锋河海大学计算机与信息工程学院中国常州E-mail:zhangxiup@ Zhucp315@摘要:随着计算机的飞速发展,通信和网络技术,特别是无线传感器和嵌入式技术的应用,使得无线传感器网络(WSNs)技术在产业领域和我们的日常生活得到了广泛关注。
基于ARM7TDMI-S CPU和ZigBee 的WSNs在提速和优化网络移动节点的应用,丰富的信息采集中,以及在通信中实时时间的协调均有可取之处,具有低功耗连续作业特点,因此它是非常适合用于确定矿工在地下的位置。
本文提出和分划WSN的网络计划及信息处理与通信技术,重点专注于实时协作。
通过传感器准确获得矿工的移动信息。
之后的位置信息传送可靠的监控中心。
不断变化的运行测试结果表明没有信息丢失或者没有未被采集到的信息。
因此,这个计划是稳定和有效的,将在煤矿安全中发挥积极作用,在我看来这正是Zigbee 无线传感器网络的正确特点。
关键词:ZigBee的ARM7TDMI-S内核; CC2420的; 无线传感器网络;矿工位置确定一、简介无线传感器网络(WSNs)是规模大,无线自组织网络。
它是整合计算机通信,网络技术,嵌入式MCU和无线传感器技术,具有感知和沟通能力。
【1】节点有低低成本,小尺寸特点。
其中大部分可以工作区域传播,收集数据,并进行处理数据和通信。
无线传感器节点通常工作在无线电频率(RF)频段。
节点构成一个分层架构现场监测数据的网络。
它通常适用在工业,农业,远程医疗和环境监测。
我们都知道,煤炭生产中的威胁复杂的工作条件,如有毒气体,透水,塌陷,顶板等。
【2】一旦发生事故发生时,它会危及矿工的生命。
因此它是地面人员的当务之急,要明确矿工的确切位置,以便为及时采取措施。
因此为矿工成立一个无线传感器网络监控矿井有很大的应用价值。
二、方案优选矿工的位置监测系统主要技术规范要求归纳如下:(1)定位精度为10米。
中英文对照外文翻译文献(文档含英文原文和中文翻译)【Abstract】Under the network environment the library information resource altogether constructs sharing is refers to all levels of each kind of library basis user to the social information demand, through network use computer, correspondence, electron, multimedia and so on advanced information technology, the high idealization carries on the synthesis cooperation development and the use activity to various collections information resource and the network resources . The market economy swift and violent development, the networking unceasing renewal, the information age arrival, had decided the future library trend of development will be implements the information resource altogether to construct sharing, already achieved the social mutual recognition about this point.This is because:libraries implement the information resource altogether to construct sharing are solve the knowledge information explosion and the collection strength insufficient this contradictory important way..【Key Words】Network; libraries implement: information: construction;work environment the libraryUnder the network environment the library information resource altogether constructs sharing is refers to all levels of each kind of library basis user to the social information demand, through network use computer, correspondence, electron, multimedia and so on advanced information technology, the high idealization carries on the synthesis cooperation development and the use activity to various collections information resource and the network resources.1、 information resource altogether will construct sharing is the future library development and the use information resource way that must be taken.The market economy swift and violent development, the networking unceasing renewal, the information age arrival, had decided the future library trend of development will be implements the information resource altogether to construct sharing, already achieved the social mutual recognition about this point.This is because: 。
中文3595字附录B 外文参考文献Lossless Image Compression with Lossy Image Using AdaptivePrediction and Arithmetic CodingSeishi Taka and Mikio TakagiInstitute of Industrial Science,University of TokyoAbstractLossless gray scale image compression is necessary in many purposes, such as medical image, image database and so on. Lossy image is important as well, because of its high compression ratio. In this paper, we propose a Lossless image compression Scheme using a lossy image generated with PEG-DCT scheme. Our concept is, send a PEG-compressed lossy image primary, then send residual information and reconstruct the original image using both the lossy image and residual information. 3-dimensional adaptive prediction and an adaptive arithmetic coding are used, which fully uses the statistical parameter of distribution of symbol source. The optimal number of neighbor pixels and lossy pixels used for prediction is discussed. The compression ratio is better than previous work and quite close to the originally Lossless algorithm.IntroductionToday there are many studies on image compression, particularly on lossy and very low bit rate compression. For image database, such high compression ratio is Important for storage and also for quick transmission,but to deal with various kinds of users demand, Lossless image transmission is indispensable.In this paper, we propose an effective Lossless compression algorithm for gray image using lossy compressed image. The lossy compression scheme uses the Joint Photographic Experts Group discrete cosine transform (PEG-DCT) algorithm as the lossy coding algorithm.First we search the similar pairs of pixels (conlexts), according to their neighbor pixels. For such pixels which have contexts,we predict their values from the contexts and the neighbors. On the other hand, for each pixel which doesn't have its context pairs, we calculate the edge level according to the difference of adjacent pixel values. For each edge level of pixels, we calculate the predictive coefficients of linear combination under the least square error criterion. Not only the pixels which havealready processed but also the pixels of the lossy image is used for prediction.For every pixel, the difference between predicted value and real value iscalculated, and the difference is converted to anon-negative value before beingencoded, according to their distribution. In entropy coding stage,we use the arithmeticcoding. It is made adaptive,and initialerror distribution is given only by one para meter, which is specific for each edgelevel's statistical distribution. The pixels belonging to the difference edge levels areencoded independently.Experimental results and good performance are shown. Like the otherLPL(L0ssy Plus Lossless) approaches, our compression ratio is less than that oforiginally Lossless scheme,but the difference is slight. Of all things, however, usersget the great merit That they can browse the image before the Losslessdecompression.Many such schemes have been proposed in the literature, but most ofthem treat the lossy image and its Lossless residual as independent symbol source.One of the exceptions is Mem on ’s algorithm[6]. We utilize the lossy datathoroughly,and much better result is obtained.1.1 Pixel estimationNormally the image data is scanned along the scan-line direction.In figure 1.current pixel is processed pixels are .Ordinal pixel estimation method predicts the NFL,value of current pixel usingPI .. .P 4 . Then calculate the prediction error e=-. Normally the linear combinationis used for prediction as follows,where TI . . .T4 are the coefficients. This Figure 1:Current pixel is the extrapolative prediction.processed neighbor pixels=c t p t p t p t p ++++44332211(1)Usually, the zero-order entropy of set {e} is lower than that of set {z}.Therefore,after entropy coding scheme such as Huffman coding[l] or Arithmetic coding[2] orLempel-Ziv coding[3], data size is reduced.Principally, we also use the linear combination like equation (1) for prediction,but the process is more adaptive than normal prediction method. And we use moreneighbor pixels (up to ten), also using the pixels of lossy image and prediction error eis converted to another form before encoding.2.1 Grouping the pixels^x x x ^Each image pixel has different property under certain criterion. From a point of image compression, grouping similar pixels and encode them together causes effectiveresult. For grouping the pixels, we use the Q value:Q=|||||pppp|pp|pp|15141312-+-+-+-(2)Using this Q value, we classify each pixel into several groups according to table 1Table 1:Grouping tableFigure 2: (a)Original image ‘Girl’and (b)JPEG compressed image(qua1ity value=5)Figure 3: (a)Image of Q value, (b)Image of prediction error of simple predictionFigure 3(a)shows the Q value and (b) shows the error of simple prediction.As canbe seen from them, the value Q correlate closely with the prediction error. Therefore the prediction coefficients are calculated independently in each group.2.2 Context searchTable 2 shows each group ’s final zero-order entropy of prediction result of image ‘Girl ’. Obviously,the upper groups are more difficult to be compressed than the lower groups. We use the context-based prediction method to deal with such upper groups.The region where we search the similar area (we denote this “context ”)is shown in figure 4. This is restricted within already processed pixels ’area. The procedure is Described below:1. Scan the area and find points that satisfy70)('>x Q and10|)()(|'<-x Q x Q (3)2. Within such points, find one that minimizes||||-||a -b |-|-||a c a b ''''a c C --+= (4)3. If the C min is smaller than 12, treat it as the context of the current point.Otherwise, return failure (not found).2.3 Prediction2.3.1 Prediction of normal groupsFor each group,we predict the value of a current pixel by linear combination of itsneighbors ’ pixel values. The coefficients are calculated by least square error method. The neighbor pixels used for prediction are shown in figure 5 (Pi ...Pia).Number ofpixels are variable (up to 10pixels), and afterwards we will choose it optimumly. The priority is shown by the suffix number in the figure. The most effective number willbe discussed later.Table 2: Group V .S. Entropy (image ‘Girl ’)Figure 4: Context-search region Figure 5: Pixels used forpredictionHere, some of the lossy pixels (RI. . .&,) got from PEG-compressed image areAlso used. Using these pixels, something like interpolative prediction is achieved.This prediction contributes the reduction of compressed size.2.3.2 Prediction of contextUnder the criterion of condition (3) and (4). a pair of context have thesimilar shapes of height. Therefore, we predict the value 2 from {a ’,b ’, c ‘, z‘, a,b, c}(see figure4). We also use the least square error estimation. The mostdifferent point from prediction of non-context pixels is, not only using the values ofneighbor pixels but also using the closest context. This scheme is effective forcontinuous edges,because nearby an edge there is a sequence of similar lookingpixels.2.4 Error conversionIf each pixel has 8 bits, the prediction error e=-can have the real numberbetween -255 and +255 (roughly). After prediction, e should be expressed as aninteger. One easy way for conversion is, simply round the value off the integer(calculate Le +0.51) and consider it as the 2’s complement 8-bit number.Our conversion algorithm is totally based on Tanigu chi ’s method[5]. After this conversion,we can also get the 8-bit non-negative integer E. First we obtainthe upper and lower bound of the group (max, min).Then, according to the figure 6,convert the actual pixel value into integer. (In this figure, if actual pixel is equal to “ax ’, E = 9.) For each group,we get the maximum and minimum pixel value andconvert the prediction error respectively. This conversion is reversible. f you get thepredicted value and the converted number E (and also upper and lower bound), youcan obtain the actual pixel value from similar numerical line.2.5 Adaptive arithmetic coding2.5.1 Fitting of the distribution of EAccording to the experimental result, the distribution of E(figure7(a)), aftererror conversion, looks very close to the right half of a Gaussian distribution:)2e x p ()2(1222f )(2σπσσx x -= (5)^x xFigure 6: Algorithm of error conversion (example)Figure 7: (a)Distribution of E (image=‘Moon ’), (b)Fitting of Ewhere the variance is 2σ.As this distribution is limited right half, 2σis equal to , where N isthe number of samples. The fitting line (estimated frequency)of E ’s distribution is Calculated )(f 22x N σ.Their graphs are shown in figure 7(b). You can see that using this Gaussian model,the distribution of E is approximated well.2.5.2 Adaptive arithmetic codingThe probability density function of this fitting curve can be expressed by only oneparameter 2σ.This distribution is used to generate the initial distribution table for encoder(and also or decoder), instead of passing the large amount of actual frequency table. For this purpose, arithmetic coding is very suitable. For this purpose, our coderis made adaptive, each symbol from the data stream renews the frequency table. By using 2σand adaptive arithmetic coder,even small amount of data is coded with high coding rate.Experimental ResultsTo generate a lossy image, we adopt the JPEG compression scheme. The reasonis that P E G is the standard scheme for still image compression and users car1 find PEG-tools easily.We use the tools named ‘cjpeg’and ‘djpeg’, which is the products of IndependentP E G Group. To create the P E G image, cjpeg -quality quality-value -optimize filename and to decompress the P E G file, djpegipeg-file is invoked. The option ’-optimize performs optimization of entropy encoding parameters. It usually makes the P E G file a little smaller. ‘djpeg’has the optionTable 3: Effect of context search (N=9, N L 4 , quality=5)‘block smooth’,which performs cross-block smoothing,but from experimental results,it made the compression ratio worse, therefore this option is not used. Parameters which are necessary for decompression are put together and also encoded by adaptive arithmetic coder. Only several percent compression is achieved, but better than doing nothing.3.1 Effect of context searchWe use three test images ‘Girl’, ‘Couple’and ‘Moon’,which are chosen from SIDBA(Standard Image Data Base).For these images, the bit rate of compressing with and without context search is compared. The results are shown in table 3. NL is the number of lossy pixels used for prediction. N is the number of Lossless neighbor pixels.3.2 Effect of the quality value on compression ratioP E G provides a fine tuning factor (quality value),which corresponds to different Qualities of the compressed images. For typical image data, a low quality value such as 20provideshigh compression with poor image fidelity. As the quality value increases the fidelity improves at the expense of compression ratio.Figure 8 shows the bit rate and quality value. As the quality value decreases, the total bit rate decreases,too. Later we use the image quality value of 5,which is enough for understanding the image roughly (see figure 2(b)).Figure 8: Bit rate V.S.Quality value Figure 9: Bit rate V.S. NL (N=10,(N=10, -9,images‘Gir1’) quality=5, image=‘Girl ’)Table 4: Result of bit rate (quality=5, N=9, NL=4)3.3 Effect of using a lossy imageThere might be a doubt that the lossy image looks similar with the original to our eyes, but differs much from a standpoint of pixel-value, therefore it hardly helps the prediction.Figure9 shows the bit rate and the number of lossy pixels used for prediction(NL).From this figure, it is known even the poor image (quality=5) helps the compression ratio considerably.There as on why the bit rate increases gradually where NL is greaterthan 4 is, that additional parameter (coefficients)is necessary for each pixel position. The optimum NL is 4. Moreover we conducted experiments to find the optimum number of N. and obtained9.3.4 Comparison with the other methodsTable 4 shows the result of the compression. Taniguchi’s method[5] is originally Lossless oriented one, therefore the results are slightly better than ours. In our method, N and NL are set optimally.MAW method is proposed by Memon[6]. It also uses a lossy P E G image toreconstruct a Lossless image. Our result is about0.5 bit/pel better than MAW, and 0.03 to 0.12 bid\pel worse than Taniguchi’s method. As the MAW’S result is given only by entropy, the difference of performance from ours might be bigger.ConclusionIn this paper, we proposed the algorithm of Lossless image compression. Unlike other literatures,we have discussed not only the entropy of residual,but how to encode it efficiently and the final size of the compressed product. This provides an attractive option in applications that have need for quick transmission on the one hand and exact Reconstruction on the other. Furthermore,using this lossy image thoroughly, the total bit rate is considerably low.Searching the contexts and using it for prediction is proved to work.We will research more effective way of using context.Our algorithm is applicable for originally Lossless oriented one (not using lossyimage). In some images,we have obtained better results than Taniguchi’s method. We are proceeding the investigation in this standpoint.We are examining if there is a more suitable algorithm for lossy compression other than P E G . And also speculating the more accurate error distribution fitting other than Gaussian model.References[11 D. A. Huffman:“A method for the construction of minimum redundancy codes”,Proceedings of IRE40,pp. 41 1420,1951[2] J. J. Rissanenet al.: “Arithmetic coding”,IBM Journalor Research and Development, 23(2),pp. 188-193,1976[3] J. Ziv and A. Lempel: “A Universal Algorithm for Sequential Data Compression”, IEEE Transactions on Information Theory,IT-23(3), pp. 337-343, May 1997 [4] Paul G. Howard and Jefferey Scott Vitter: “New Methods for Lossless Image Compression Using Arithmetic Coding”, Proceedings of Data Compression Conference ’91,pp. 257-266.199 1[5] Takayuki Taniguchietal.: “Variable-Length-Code-Selective Reversible Predictive Coding for Multi-Level Images”,The Transactions of the Institute of Electronics, Information and Communication Engineers,V ol.J70-B, pp.654-663, Jun. 1987[6] Nasir D. Memon et al.:“Simple method for enhancing the performance of lossy plus Lossless image compression schemes”, Journal of Electronic Imaging 2(3), pp. 245-252, Jul. 1993[71 DmitryA. Novik: “Compression Through Decompression into Browse and Residual Images”, Proceedings of 1993 Space and Earth Science Data Compression Workshop, NASA Conference Publication3191,pp. 7-12, Apr. 1993使用自适应预测和自适应算术编码的有损图像的无损压缩摘要多用无损灰度图像压缩是必要的,如医学图像,图像数据库等。
电子商务信用中英文对照外文翻译文献(文档含英文原文和中文翻译)英文:Towards Enhancing Trust on Chinese E-Commerce Abstract:E-Commerce has been much more popular in western countries where the development of E-Commerce systems has been relatively matured. While the technology and social credit environment are well developed, E-Commerce is relatively new and receives fewer acceptances within commercial industries in China. Building trust has been identified as one of the major concerns in E-Commerce.In this paper, we will develop an computational model, which may be used to improve the trust-building relationship among consumers, retailers and authorities. This model considers a number of factors including direct experiences, customer recommendations, and authority certification, while parties involved in the E-Commerce activities can confidently establish and reliably enhance the trustworthiness.We also conduct a case study on how to improve consumer-retailer trust relationship in an E-Commerce application by the use of the trust model, which is one of functional electronic storefronts with the consideration of trustworthiness in China. In addition, the findings from this research will also be helpful for national policy maker on legislation of Chinese E-Commerce activities.Key Words: Trust, E-Commerce, Trust-building, Computational model, Chinese E-Commerce.I. Introduction“With the rapid development of Internet technology, the landscape of exchanging information and doing business has been com pletely changed”. As a new way of doing business, E-Commerce is increasingly affecting, changing and even replacing the traditional commerce approach. People are increasingly accepting and using E-Commerce than ever before. Without any doubt, many network applications, based on initial Door to Door to B2B, B2C, and C2C models, have a profound influence on the global economy. However most of the development of E-Commerce is primarily achieved within a handful of countries, particularly in countries like US, Japan and some of European countries. Since the advent of the Internet in the late 1990’s in China, various applications can be seen in the following years, which stirred thousands of ambitious young Chinese people to establish their own business on-line with a dream of getting wealthy overnight. Over the past few years, almost 70% of the growth in Internet users from all over the world occurred only in China. However, in terms of E-Commerce development, there is still a gap between China and the developed countries. With the increased popularity of the Internet and the continuous improvement of Internet technologies, the development of E-Commerce has just made an impressive start. What hinder the development of Chinese E-Commerce can be attributed to various problems and barriers. Some of these problems such as payment method, distribution problem, and security issues have been partially alleviated. Unfortunately the consumers’ lack of trust towards E-Retailers has been identified as the biggest barrier that needs to be overcome in long-term.In the paper, we will identify the challenges in developing Chinese E-Commerce and propose a model to cooperate with current E-Commerce system as a mean of enhancing trustworthiness. The paper is organized into 6 sections. Section 2 introduces the current standing of E-Commerce, and then Section 3 briefly reviews the challenges in developing E-Commerce, and examines the “Trust problem”, which is identified as the major obstacle that hinders the spreading of E-Commerce in China. In Section 4, we propose a computational model that can be used to address the trust problem. Section 5 specifically discusses how to apply the model to improve trustworthiness, and gives a case study in Section 6. Section 7 concludes the paper by discussing further directions for improving trust between E-Commerce users.II. Current Chinese E-Commerce Standing(I) Issues in E-CommerceTrust has always been the main concern among most of Chinese E-Commerce companies. On one hand, people are impressed by doing business on-line, but on the other hand they are still worried about using E-Commerce widely. Consequently, a gap appeared between on-line retailers’interest in attracting shoppers to their electronic storefronts and many consumers’ trust in those activities. Nevertheless, researches have shown that the trust problem is not only technical problem, but more of a social problem caused by various reasons. First and foremost, for historical reasons, people may lack of confiden ce with others, therefore it’s quite difficult to puttrust in someone else in the beginning. Secondly, the commercial law and regulation for E-Commerce cannot fully protect the interests of consumers and merchants. Therefore E-Commerce users lack the confidence to take the risk when communicating with an unfamiliar party. Thirdly, the social credit system and payment system in China are still not strong enough when carrying complex E-Commerce transactions, so that on-line business frauds may happen, and harm consumers. Last but not least Internet security and cryptography techniques, which can increase consumers’confidence in on-line activity, are still under development. Due to all these issues, E-Commerce specialists commonly regard that the bottleneck of Chinese E-Commerce is as a trust problem than anything else.(II) Opportunities of Chinese E-CommerceIn 2005, Chinese E-Commerce has been experiencing the upsurge of B2C markets. With the recognition of trust problem, many retailers are experimenting with various trust building strategies to establish trustworthiness towards E-Retailers. Establishing trust between E-Commerce users is a long term process. Apart from more education or training in the long term, we can resort to technology to enhance consumer trust in an unfamiliar E-retailer. One effective method is to participate in third-party assurance programs, which assist consumers in an accessible level of trust they should place in an E-Commerce transaction. In that way, merchants who agree to meet a third party assures standards can either use the assure certified technology, or agree to be bound in some way by the assure procedures or oversight are registered by the assure and permitted to display an identifying logo or assurance seal on their website. Consumers can reveal specific validation of the merchants good-standing with the assure or additional disclosures related to the merchants’ business practices or history. Some theories suggest that trust in an E-retailer can be speci fically defined as consumers’ willingness to accept vulnerability in an on-line transaction based on their positive expectations regarding an E-Retailers future behavior. By evaluating a party’s post behavior and tracking its activities, the party’s futu re behavior can be expected and trust level can be considered so that consumers can make purchasing decision according to the trust level of E-Retailer. In this paper, a third party assurance program that can be cooperated with the current E-Commerce system is proposed. Through tracking E-Retailer ’s activity records, collecting consumer experiences, and recommendations, the computation model is capable of considering the level that consumer can trust an unfamiliar E-Retailer. More detail about the model is described in Section 4.III. Challenges in Developing Chinese E-CommerceChinese E-Markets is undeniably of great potential. E-Markets are not only beneficial for national economy, but also for the global economy, especially since China has entered the World Trade Organization (WTO). However, in terms of developing E-Commerce, there is a gap between China and other developed countries. The primary cause is that the advent of information age has a great impact on the economy of industrialized countrie s, while the social environment and China hasn’t become used to its coming. These can be noticed from various aspects including information infrastructure, barriers of social environment, degree of technologyinnovation, level of awareness, and trustworthiness and so on. Technically, the improvement is obvious, but it’s difficult to catch up in short term for some social problems.(I) Informationization GapCurrent social environment in China is yet to match the rapid informationization. The understanding of the relation and interaction between industrialization and informationization is inadequate. In addition, the importance and urgency of informationization in social and economic development haven’t been fully appreciated. Apart from that, for a long term progress, the awareness and acceptance to informationization are still underway both theoretically and practically.Furthermore, the global information infrastructure are building up, China is not a exception. However, the popularity of informational and electronic facilities in China is still behind the USA, even though 70% of the growth in Internet users occurred in China. That is mainly due to the huge population of China and the imbalanced development of different regions.In terms of the innovation of information technology, China is catching up to the developed countries progressively, although the exploring and utilization of information resources and services are not yet adequate.(II) Social Barriers in E-CommerceIn China, E-Commerce activities are impeded by some social barriers as well. For instance, the law and regulation are not flawless. E-commerce gives a full impetus to social and economic development; in the meantime, it raises some new problems. So we need to address the inadequacy of traditional policy and laws in the new circumstance, and recommend new and effective law and regulation system. E-commerce may cause multi-facet problems, such as legitimacy and authentication of E-currency, E-contract, and E-bill. Taxation is another problem. It includes how to collect business tax and custom; whether new tax and collecting methods are needed for some intangible products (e.g. software, electrical audio and video); how to secure market and prevent monopoly, especially telecommunication monopoly; how to protect privacy and Intellectual Property(IP); how to manage and control export and import of intangible products, and so on.There is a lack of E-Commerce standard. Standardization and legislation is a difficult but important task in developing E-Commerce. For instance, before the E-Signature Standard was invented in China, there was no particular standard to normalize the behaviors on Internet, therefore, it could not setup a standard business environment compatible with international standards, which has a huge impact on integration of individual country and global economy.Another problem associated with E-Commerce is the social credit system and payment system. The present E-Commerce can only be regarded as quasi-E-Commerce. Since the credit system lacks of trust, effective monitoring and payment mechanism. The Internet commodity transaction centers only fulfilled parts of E-Commerce processes, but by no mean to be full processes from pre-purchase to post-purchase. The current distribution system for Chinese E-Commerce is still not satisfied enough. For instance, the delivery of products has yet to be separated frommanufacturing and commercial enterprisers. The incomplete distribution system still responds passively to production and sales departments, where different processing links such as warehousing, transporting and loading functions as independent entities so that the distribution problem has not been solved well at present.In summary, these informationization gaps and social barriers indeed hinder the development of Chinese E-Commerce, but many people consider lack of consumers trust in E-Commerce merchants, technology, social, financial and legal infrastructures of E-Commerce environment as the most concerned issues that affect the development in an individual country, since most traditional cues for assessing trust in physical world are not available on-line.(III)Trust IssueTrust is a catalyst for human cooperation, and it has received considerable attention in the business and social science literature. Lack of trust can result in a waste of time and resources on protecting ourselves against possible harm and thereby clogs up the economy. Consumer’s trust in an E-Retailer can be defined as consumers’willingness to accept vulnerability in an on-line transaction based on their positive expectations in regard with an E-Retailers future behavior. Factors that affect trust in E-Commerce for consumers include security risks, privacy risks, and lack of reliability in E-Commerce processes in general. As pointed by Nielsen, real trust builds through a company’s actual behavior towards its customers over time, and it is seen to be difficult to build and easy to lose. Theoretically, there are three trust-building processes summarized in:1. Knowledge-based trust is described as a form of trust that develops over time as one party learns about intentions, capabilities, and activity experiences. Example can be recommendation, evaluations, and reputations.2. Institutional-based trust relied on the creation of a “trust infrastructure”, of socially recognized third-party intermediaries that certify the trustworthiness of parties in a commercial exchange or actually enforce trustworthy behaviors on the part of one or both partners. Such example is certificate, membership of association.3. Trust transfer happens when one party ascribes trustworthiness to an unfamiliar exchange partner based on that partner’s association with a trusted party.In the ext section, we will describe a computational model, which can be used to facilitate the trust- building process in E-Commerce, particularly for Chinese E-Commerce market.In this paper, we surveyed the E-Commerce activities currently under going in China. We have closely analyzed the gap between the informationization and barriers of Chinese E-Commerce systems. Among the topics of facilitating development of a positive, effective and satisfied E-Commerce system, “trust” is a major issue, which has not received adequate attention in past decades. We have proposed a computational trust model (ERC2G), which can foster a trust relationship between consumers and merchants, and illustrate how to apply the model in a Chinese E-Commerce system. From the case study of EI Computer, we briefly talked about the implementation of E-Commerce systems with the consideration of enhancing trust. However, establishing trust must be a complex process, which involves moreinformation sources, so continuous improving and enhancing the trustworthiness will be the main objective we need to achieve in future work.翻译:提升中国电子商务信用度摘要电子商务在西方国家已经非常流行,并且电子商务系统在这些国家的发展也相对成熟。