外文文献翻译
- 格式:doc
- 大小:12.20 MB
- 文档页数:30
外文文献原稿和译文原稿DATABASEA database may be defined as a collection interrelated data store together with as little redundancy as possible to serve one or more applications in an optimal fashion .the data are stored so that they are independent of programs which use the data .A common and controlled approach is used in adding new data and in modifying and retrieving existing data within the data base .One system is said to contain a collection of database if they are entirely separate in structure .A database may be designed for batch processing , real-time processing ,or in-line processing .A data base system involves application program, DBMS, and database.THE INTRODUCTION TO DATABASE MANAGEMENT SYSTEMSThe term database is often to describe a collection of related files that is organized into an integrated structure that provides different people varied access to the same data. In many cases this resource is located in different files in different departments throughout the organization, often known only to the individuals who work with their specific portion of the total information. In these cases, the potential value of the information goes unrealized because a person in other departments who may need it does not know it or it cannot be accessed efficiently. In an attempt to organize their information resources and provide for timely and efficient access, many companies have implemented databases.A database is a collection of related data. By data, we mean known facts that can be recorded and that have implicit meaning. For example, the names, telephone numbers, and addresses of all the people you know. You may have recorded this data in an indexed address book, or you may have stored it on a diskette using a personalcomputer and software such as DBASE Ⅲor Lotus 1-2-3. This is a collection of related data with an implicit meaning and hence is a database.The above definition of database is quite general. For example, we may consider the collection of words that made up this page of text to be usually more restricted. A database has the following implicit properties:● A database is a logically coherent collection of data with some inherent meaning. A random assortment of data cannot be referred to as a database.● A database is designed, built, and populated with data for a specific purpose. It has an intended group of user and some preconceived applications in which these users are interested.● A database represents some aspect of the real world, sometimes called the miniworld. Changes to the miniworld are reflected in the database.In other words, a database has some source from which data are derived, some degree of interaction with events in the real world, and an audience that is actively interested in the contents of the database.A database management system (DBMS) is composed of three major parts: (1) a storage subsystem that stores and retrieves data in files; (2)a modeling and manipulation subsystem that provides the means with which to organize the data and to add, delete, maintain, and update the data; and (3) an interface between the DBMS and its users. Several major trends are emerging that enhance the value and usefulness of database management systems.●Managers who require more up-to-date information to make effective decisions.●Customers who demand increasingly sophisticated information services and more current information about the status of their orders, invoices, and accounts.●Users who find that they can develop custom applications with database systems in a fraction of the time it takes to use traditional programming languages.●Organizations that discover information has a strategic value; they utilize their database systems to gain an edge over their competitors.A DBMS can organize, process, and present selected data elements from the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions that aren’t available in regular reports. These questions might initially be vague and/or p oorly defined, but people can “browse” through the database until they have the needed information. In short, the DBMS will “mange” the stored data items and assemble the needed items from the common database in response to the queries of those who aren’t programmers. In a file-oriented system, user needing special information may communicate their needs to a programmer, who, when time permits, will write one or more programs to extract the data and prepare the information. The availability of a DBMS, however, offers users a much faster alternative communications path.DATABASE QUERYIf the DBMS provides a way to interactively enter and update the database ,as well as interrogate it ,this capability allows for managing personal database. However, it does not automatically leave an audit trail of actions and does not provide the kinds of controls necessary in a multi-user organization .There controls are only available when a set of application programs is customized for each data entry and updating function.Software for personal computers that perform some of the DBMS functions has been very popular .Individuals for personal information storage and processing intended personal computers for us .Small enterprises, professionals like doctors, architects, engineers, lawyers and so on have also used these machines extensively. By the nature of intended usage ,database system on there machines are except from several of the requirements of full-fledged database systems. Since data sharing is not intended, concurrent operations even less so ,the software can be less complex .Security and integrity maintenance are de-emphasized or absent .as data volumes will be small, performance efficiency is also less important .In fact, the only aspect of a database system that is important is data independence. Data independence ,as stated earlier ,means that application programs and user queries need not recognize physical organization of data on secondary storage. The importance of this aspect , particularly for the personal computer user ,is that this greatly simplifies database usage . The user can store ,access and manipulate data at ahigh level (close to the application)and be totally shielded from the low level (close to the machine )details of data organization.DBMS STRUCTURING TECHNIQUESSpatial data management has been an active area of research in the database field for two decades ,with much of the research being focused on developing data structures for storing and indexing spatial data .however, no commercial database system provides facilities for directly de fining and storing spatial data ,and formulating queries based on research conditions on spatial data.There are two components to data management: history data management and version management .Both have been the subjects of research for over a decade. The troublesome aspect of temporal data management is that the boundary between applications and database systems has not been clearly drawn. Specifically, it is not clear how much of the typical semantics and facilities of temporal data management can and should be directly incorporated in a database system, and how much should be left to applications and users. In this section, we will provide a list of short-term research issues that should be examined to shed light on this fundamental question.The focus of research into history data management has been on defining the semantics of time and time interval, and issues related to understanding the semantics of queries and updates against history data stored in an attribute of a record. Typically, in the context of relational databases ,a temporal attribute is defined to hold a sequence of history data for the attribute. A history data consists of a data item and a time interval for which the data item is valid. A query may then be issued to retrieve history data for a specified time interval for the temporal attribute. The mechanism for supporting temporal attributes is to that for supporting set-valued attributes in a database system, such as UniSQL.In the absence of a support for temporal attributes, application developers who need to model and history data have simply simulated temporal attributes by creating attribute for the time interval ,along with the “temporal” attribute. This of course may result in duplication of records in a table, and more complicated search predicates in queries. The one necessary topic of research in history data management is to quantitatively establish the performance (and even productivity) differences betweenusing a database system that directly supports attributes and using a conventional database system that does not support either the set-valued attributes or temporal attributes.Data security, integrity, and independenceData security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database of the database, called subschemas. For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data.Data integrity refers to the accuracy, correctness, or validity of the data in the database. In a database system, data integrity means safeguarding the data against invalid alteration or destruction. In large on-line database system, data integrity becomes a more severe problem and two additional complications arise. The first has to do with many users accessing the database concurrently. For example, if thousands of travel agents book the same seat on the same flight, the first agent’s booking will be lost. In such cases the technique of locking the record or field provides the means for preventing one user from accessing a record while another user is updating the same record.The second complication relates to hardware, software or human error during the course of processing and involves database transaction which is a group of database modifications treated as a single unit. For example, an agent booking an airline reservation involves several database updates (i.e., adding the passenger’s name and address and updating the seats-available field), which comprise a single transaction. The database transaction is not considered to be completed until all updates have been completed; otherwise, none of the updates will be allowed to take place.An important point about database systems is that the database should exist independently of any of the specific applications. Traditional data processing applications are data dependent.When a DMBS is used, the detailed knowledge of the physical organization of the data does not have to be built into every application program. The application program asks the DBMS for data by field name, for example, a coded representationof “give me customer name and balance due” would be sent to the DBMS. Without a DBMS the programmer must reserve space for the full structure of the record in the program. Any change in data structure requires changes in all the applications programs.Data Base Management System (DBMS)The system software package that handles the difficult tasks associated with creating ,accessing and maintaining data base records is called a data base management system (DBMS). A DBMS will usually be handing multiple data calls concurrently.It must organize its system buffers so that different data operations can be in process together .It provides a data definition language to specify the conceptual schema and most likely ,some of the details regarding the implementation of the conceptual schema by the physical schema.The data definition language is a high-level language, enabling one to describe the conceptual schema in terms of a “data model “.At the present time ,there are four underling structures for database management systems. They are :List structures.Relational structures.Hierarchical (tree) structures.Network structures.Management Information System(MIS)An MIS can be defined as a network of computer-based data processing procedures developed in an organization and integrated as necessary with manual and other procedures for the purpose of providing timely and effective information to support decision making and other necessary management functions.One of the most difficult tasks of the MIS designer is to develop the information flow needed to support decision making .Generally speaking ,much of the information needed by managers who occupy different levels and who have different levels and have different responsibilities is obtained from a collection of exiting information system (or subsystems)Structure Query Language (SQL)SQL is a data base processing language endorsed by the American NationalStandards Institute. It is rapidly becoming the standard query language for accessing data on relational databases .With its simple ,powerful syntax ,SQL represents a great progress in database access for all levels of management and computing professionals.SQL falls into two forms : interactive SQL and embedded SQL. Embedded SQL usage is near to traditional programming in third generation languages .It is the interactive use of SQL that makes it most applicable for the rapid answering of ad hoc queries .With an interactive SQL query you just type in a few lines of SQL and you get the database response immediately on the screen.译文数据库数据库可以被定义为一个相互联系的数据库存储的集合。
南京航空航天大学金城学院毕业设计(论文)外文文献翻译系部经济系专业国际经济与贸易学生姓名陈雅琼学号2011051115指导教师邓晶职称副教授2015年5月Economic policy,tourism trade and productive diversification(Excerpt)Iza Lejárraga,Peter WalkenhorstThe broad lesson that can be inferred from the analysis is that promoting tourism linkages with the productive capabilities of a host country is a multi-faceted approach influenced by a variety of country conditions.Among these,fixed or semi-fixed factors of production,such as land,labor,or capital,seem to have a relatively minor influence.Within the domain of natural endowments,only agricultural capital emerged as significant.This is a result that corresponds to expectations,given that foods and beverages are the primary source of demand in the tourism economy.Hence,investments in agricultural technology may foment linkages with the tourism market.It is also worth mentioning that for significant backward linkages to emerge with local agriculture,a larger scale of tourism may be important. According to the regression results,a strong tourism–agriculture nexus will not necessarily develop at a small scale of tourism demand.It appears that variables related to the entrepreneurial capital of the host economy are of notable explanatory significance.The human development index(HDI), which is used to measure a country's general level of development,is significantly and positively associated with tourism linkages.One plausible explanation for this is that international tourists,who often originate in high-income countries,may feel more comfortable and thus be inclined to consume more in a host country that has a life-style to which they can relate easily.Moreover,it is important to remember that the HDI also captures the relative achievements of countries in the level of health and education of the population.Therefore,a higher HDI reflects a healthier and more educated workforce,and thus,the quality of local entrepreneurship.Related to this point,it is important to underscore that the level of participation of women in the host economy also has a significantly positive effect on linkages.In sum, enhancing local entrepreneurial capital may expand the linkages between tourism and other sectors of the host country.Formal institutions and their regulatory control of the market,proxied by the size of the government and price controls,were not found to have significant effects on linkages formation.Despite the importance of democratic governance,this was not identified as a key determinant either.On the other hand,the significance of informal institutions accords with the clustering dynamics inherent in tourism,in which linkages are formed on the basis of self-enforcing“relations-based”governance.Also,informal structures cost less than formal,rules-driven institutional frameworks for entrepreneurship.Therefore,highly formalized regulations can deter the spontaneous and cost-driven coordination among potential local suppliers and the potential buyers of the tourism economy.One type of formal institutions that does matter is policing and vigilance.As would be expected,the results show that countries with higher incidence of violence or crime are significantly associated with lower levels of tourism linkages.Indeed, the coordination of providers in tourism clusters depends fundamentally on trust among local entrepreneurs and trust can hardly flourish in an environment characterized by social conflict.Equally important,the perception of violence on the part of tourists and hotels will dissuade tourists from venturing beyond the safe boundaries of the“enclave”hotel resort.Finally,hotel managers and other foreign investors in the tourism economy will be less inclined to maintain productive relations with the host economy in the absence of predictability and stability. Therefore,investments in institutions that maintain safety and a perception of safety,in the host economy appear critical for spawning coordination.While all country domains may be playing a role in fostering or hindering linkages, the business environment seems to exert an overriding influence on linkages.After controlling for a country's natural endowments,level of development,and institutional maturity,the business environment on its own explains almost20%of cross-country variations in linkages.In particular,the level of corporate taxes in the host economy is associated with the most significant adverse effect on the formation of linkages,in conformity with the lower-cost motivation underlying tourism-led linkage creation.Also,a widespread usage of internet is alsosignificantly associated with a positive effect in the ability of suppliers to orchestrate coordination in tourism linkages.Moreover,the results suggest that there could be a role for government in improving trade facilitation and reducing transportation costs.Also,maintaining an open trade regime seems to be critical for the emergence of linkages.This underscores the importance of not protecting inefficient economic activities and opening potential products for tourism demand to competition.Although trade barriers may indeed serve to prod investors in the tourism economy to procure domestic goods, they will also hinder the competitiveness of local producers.Shielded from imports, local producers will not have the incentives to meet the international quality standards of the products needed by the tourism economy.Yet,quality expectations, possibly more so than costs,will likely inform the procurement decisions of the tourism economy.Concerning the relative magnitude of the effects of the different domains on linkages,the business environment and trade regulations stand out.The independent contributions of these domains,that is their ability to explain variations in the dependent variable when no controls for other domains are applied,amount to53%and 43%,respectively.The level-of-development domain follows with25%explanatory power,while the domains covering institutions and endowments provide an independent contribution of23%each.The implications of the analysis should be considered in light of its limitations. Causal direction cannot be fully substantiated,because we use a cross-sectional approach due to data limitations.In the absence of time-series for the variables at hand,it is not possible to test for causation.While the explanatory variables concerning natural endowments are exogenous,some of the other explanatory variables could potentially be subject to reverse causality.That said,there do not seem to be a priori strong conceptual reasons that would lead us to believe that the degree of tourism linkages critically affects trade policy,the quality of institutions, and other variables of our model.Moreover,the risk of encountering problems of reverse causality is mitigated by the observation that several longitudinal studies have established a causal relationship that runs from higher levels of economic development Eugenio-Martin et al.(2008)or a better business environment(Barrowclough,2007and Selvanathan et al.,2009)to the development of the tourism sector,rather than the other way around.Finally,the construction of the dependent variable as a ratio of indirect to direct tourism expenditure makes the reverse causality hypothesis less compelling. While it might be expected that an expansion of the tourism sector that increases total revenues and employment opportunities might have an impact on the explanatory variables,it is less evident that a change in the composition of tourism revenues, as implied by a change in the LINK variable,would have such an effect.That said, the confidence in our findings would clearly be further enhanced,if supported by results from future studies based on longitudinal designs.The scientific environmental ethics plays a key role in the recognition of the human—environment interactions.Modern environmental ethics is the philosophical rethinking of modern human race environmental behavior.The development of environmental ethics theory as well as its application in reality.determines the viewpoints of environmental ethics.Sustainable development implies harmony on human-environment interactions and intergeneration responsibility,with emphasis on a harmonious relationship among population,resources,environment and development,so as to lay a sustainable and healthy foundation of resources and environment for future generations.The harmonious society construction in China that is raised by the Chinese central government should be covered by environmental ethics.The connotation of open environmental ethics includes a respect for nature.care for the individual human race.and respect for the development of future generations,which means giving consideration to natural values.individual and human race benefits and welfare across generations.The role of environmental ethics in regional development consists of cognition,criticism,education,inspiration,adjusting,legislation and promoting environmental regulations.The major problems in regional development are extensive resource exploration,fast population growth irrational,industrialstructure.Unfair welfare distribution and the twofold effects of science and technology development.The formulation of environmental ethics that aims at regional sustainable development,can not only harmonize the relationship of population,resource,environment and economic development,but also guide behavior selection,push social and political system transformation.strengthen the legal system,and raise environmental awareness of the public.Human races face severe global challenges in resources,environment,population and poverty.To solve these problems science and technology should be developed on one hand,and human-environment interactions should be adjusted on the other hand.Modem environmental ethics is the philosophical review on modem human race environmental behavior.Environmental ethics can be a view point as the moral perception of the relationship between humankind and nature in general.The keystone of sustainable development is on harmonious human.environment interactions.with an emphasis on sustainable environmental ethics.Environmental ethics and sustainable development are key issues in the study of man.1and system,as well as a precondition to regional development(Zheng,2005a).Though there exists theoretical divergence in different environmental ideologies.some general understandings can also be obtained:human races are the only ethical agents on earth;the essence of the environmental crisis is a cultural and value crisis;future generations have the same right as current generations,especially on survival space;differences should be made between human race and other entities on earth,at the same time they are an undivided union;the capability of the earth is limited.Based on the above general understandings.it is possible to form a more open and sustainable environmental ethics.A more open and sustainable environmental ethics has some special connections.To respect and treat nature friendly means to acknowledge the value and right of nature,that is to say,minimum hurt criterion,basic benefit criterion and fair compensation criterion should be followed.To pay attention to both individuals and mankind should follow justice criterion,equity criterion and cooperation criterion.To have futuregeneration in mind Should follow responsibility criterion,saving criterion,and cautiousness criterion(Wang,2003;Wang,2004a).The conclusion to be drawn from the above is to give attention to both human race and natural value.to both individual and mankind’s benefit。
中英文对照外文翻译(文档含英文原文和中文翻译)原文:Safety Assurance for Challenging Geotechnical Civil Engineering Constructions in Urban AreasAbstractSafety is the most important aspect during design, construction and service time of any structure, especially for challenging projects like high-rise buildings and tunnels in urban areas. A high level design considering the soil-structure interaction, based on a qualified soil investigation is required for a safe and optimised design. Dueto the complexity of geotechnical constructions the safety assurance guaranteed by the 4-eye-principle is essential. The 4-eye-principle consists of an independent peer review by publicly certified experts combined with the observational method. The paper presents the fundamental aspects of safety assurance by the 4-eye-principle. The application is explained on several examples, as deep excavations, complex foundation systems for high-rise buildings and tunnel constructions in urban areas. The experiences made in the planning, design and construction phases are explained and for new inner urban projects recommendations are given.Key words: Natural Asset; Financial Value; Neural Network1.IntroductionA safety design and construction of challenging projects in urban areas is based on the following main aspects:Qualified experts for planning, design and construction;Interaction between architects, structural engineers and geotechnical engineers;Adequate soil investigation;Design of deep foundation systems using the FiniteElement-Method (FEM) in combination with enhanced in-situ load tests for calibrating the soil parameters used in the numerical simulations;Quality assurance by an independent peer review process and the observational method (4-eye-principle).These facts will be explained by large construction projects which are located in difficult soil and groundwater conditions.2.The 4-Eye-PrincipleThe basis for safety assurance is the 4-eye-principle. This 4-eye-principle is a process of an independent peer review as shown in Figure 1. It consists of 3 parts. The investor, the experts for planning and design and the construction company belong to the first division. Planning and design are done accordingto the requirements of the investor and all relevant documents to obtain the building permission are prepared. The building authorities are the second part and are responsible for the buildingpermission which is given to the investor. The thirddivision consists of the publicly certified experts.They are appointed by the building authorities but work as independent experts. They are responsible for the technical supervision of the planning, design and the construction.In order to achieve the license as a publicly certified expert for geotechnical engineering by the building authorities intensive studies of geotechnical engineering in university and large experiences in geotechnical engineering with special knowledge about the soil-structure interaction have to be proven.The independent peer review by publicly certified experts for geotechnical engineering makes sure that all information including the results of the soil investigation consisting of labor field tests and the boundary conditions defined for the geotechnical design are complete and correct.In the case of a defect or collapse the publicly certified expert for geotechnical engineering can be involved as an independent expert to find out the reasons for the defect or damage and to develop a concept for stabilization and reconstruction [1].For all difficult projects an independent peer review is essential for the successful realization of the project.3.Observational MethodThe observational method is practical to projects with difficult boundary conditions for verification of the design during the construction time and, if necessary, during service time. For example in the European Standard Eurocode 7 (EC 7) the effect and the boundary conditions of the observational method are defined.The application of the observational method is recommended for the following types of construction projects [2]:very complicated/complex projects;projects with a distinctive soil-structure-interaction,e.g. mixed shallow and deep foundations, retaining walls for deep excavations, Combined Pile-Raft Foundations (CPRFs);projects with a high and variable water pressure;complex interaction situations consisting of ground,excavation and neighbouring buildings and structures;projects with pore-water pressures reducing the stability;projects on slopes.The observational method is always a combination of the common geotechnical investigations before and during the construction phase together with the theoretical modeling and a plan of contingency actions(Figure 2). Only monitoring to ensure the stability and the service ability of the structure is not sufficient and,according to the standardization, not permitted for this purpose. Overall the observational method is an institutionalized controlling instrument to verify the soil and rock mechanical modeling [3,4].The identification of all potential failure mechanismsis essential for defining the measure concept. The concept has to be designed in that way that all these mechanisms can be observed. The measurements need to beof an adequate accuracy to allow the identification ocritical tendencies. The required accuracy as well as the boundary values need to be identified within the design phase of the observational method . Contingency actions needs to be planned in the design phase of the observational method and depend on the ductility of the systems.The observational method must not be seen as a potential alternative for a comprehensive soil investigation campaign. A comprehensive soil investigation campaignis in any way of essential importance. Additionally the observational method is a tool of quality assurance and allows the verification of the parameters and calculations applied in the design phase. The observational method helps to achieve an economic and save construction [5].4.In-Situ Load TestOn project and site related soil investigations with coredrillings and laboratory tests the soil parameters are determined. Laboratory tests are important and essential for the initial definition of soil mechanical properties of the soil layer, but usually not sufficient for an entire and realistic capture of the complex conditions, caused by theinteraction of subsoil and construction [6].In order to reliably determine the ultimate bearing capacity of piles, load tests need to be carried out [7]. Forpile load tests often very high counter weights or strong anchor systems are necessary. By using the Osterberg method high loads can be reached without install inganchors or counter weights. Hydraulic jacks induce the load in the pile using the pile itself partly as abutment.The results of the field tests allow a calibration of the numerical simulations.The principle scheme of pile load tests is shown in Figure 3.5.Examples for Engineering Practice5.1. Classic Pile Foundation for a High-Rise Building in Frankfurt Clay and LimestoneIn the downtown of Frankfurt am Main, Germany, on aconstruction site of 17,400 m2 the high-rise buildingproject “PalaisQuartier” has been realized (Figure 4). The construction was finished in 2010.The complex consists of several structures with a total of 180,000 m2 floor space, there of 60,000 m2 underground (Figure 5). The project includes the historic building “Thurn-und Taxis-Palais” whose facade has been preserved (Unit A). The office building (Unit B),which is the highest building of the project with a height of 136 m has 34 floors each with a floor space of 1340 m2. The hotel building (Unit C) has a height of 99 m with 24 upper floors. The retail area (Unit D)runs along the total length of the eastern part of the site and consists of eight upper floors with a total height of 43 m.The underground parking garage with five floors spans across the complete project area. With an 8 m high first sublevel, partially with mezzanine floor, and four more sub-levels the foundation depth results to 22 m below ground level. There by excavation bottom is at 80m above sea level (msl). A total of 302 foundation piles(diameter up to 1.86 m, length up to 27 m) reach down to depths of 53.2 m to 70.1 m. above sea level depending on the structural requirements.The pile head of the 543 retaining wall piles (diameter1.5 m, length up to 38 m)were located between 94.1 m and 99.6 m above sea level, the pile base was between 59.8 m and 73.4 m above sea level depending on the structural requirements. As shown in the sectional view(Figure 6), the upper part of the piles is in the Frankfurt Clay and the base of the piles is set in the rocky Frankfurt Limestone.Regarding the large number of piles and the high pile loads a pile load test has been carried out for optimization of the classic pile foundation. Osterberg-Cells(O-Cells) have been installed in two levels in order to assess the influence of pile shaft grouting on the limit skin friction of the piles in the Frankfurt Limestone(Figure 6). The test pile with a total length of 12.9 m and a diameter of 1.68 m consist of three segments and has been installed in the Frankfurt Limestone layer 31.7 m below ground level. The upper pile segment above the upper cell level and the middle pile segment between the two cell levels can be tested independently. In the first phase of the test the upper part was loaded by using the middle and the lower part as abutment. A limit of 24 MN could be reached (Figure 7). The upper segment was lifted about 1.5 cm, the settlement of the middle and lower part was 1.0 cm. The mobilized shaft friction was about 830 kN/m2.Subsequently the upper pile segment was uncoupled by discharging the upper cell level. In the second test phase the middle pile segment was loaded by using the lower segment as abutment. The limit load of the middle segment with shaft grouting was 27.5 MN (Figure 7).The skin friction was 1040 kN/m2, this means 24% higher than without shaft grouting. Based on the results of the pile load test using O-Cells the majority of the 290 foundation piles were made by applying shaft grouting. Due to pile load test the total length of was reduced significantly.5.2. CPRF for a High-Rise Building in Clay MarlIn the scope of the project Mirax Plaza in Kiev, Ukraine,2 high-rise buildings, each of them 192 m (46 storeys)high, a shopping and entertainment mall and an underground parking are under construction (Figure 8). The area of the project is about 294,000 m2 and cuts a 30 m high natural slope.The geotechnical investigations have been executed 70m deep. The soil conditions at the construction site are as follows: fill to a depth of 2 m to 3mquaternary silty sand and sandy silt with a thickness of 5 m to 10 m tertiary silt and sand (Charkow and Poltaw formation) with a thickness of 0 m to 24 m tertiary clayey silt and clay marl of the Kiev and But schak formation with a thickness of about 20 m tertiary fine sand of the But schak formation up to the investigation depthThe ground water level is in a depth of about 2 m below the ground surface. The soil conditions and a cross section of the project are shown in Figure 9.For verification of the shaft and base resistance of the deep foundation elements and for calibration of the numerical simulations pile load tests have been carried out on the construction yard. The piles had a diameter of 0.82 m and a length of about 10 m to 44 m. Using the results of the load tests the back analysis for verification of the FEM simulations was done. The soil properties in accordance with the results of the back analysis were partly 3 times higher than indicated in the geotechnical report. Figure 10 shows the results of the load test No. 2 and the numerical back analysis. Measurement and calculation show a good accordance.The obtained results of the pile load tests and of the executed back analysis were applied in 3-dimensionalFEM-simulations of the foundation for Tower A, taking advantage of the symmetry of the footprint of the building. The overall load of the Tower A is about 2200 MN and the area of the foundation about 2000 m2 (Figure11).The foundation design considers a CPRF with 64 barrettes with 33 m length and a cross section of 2.8 m × 0.8m. The raft of 3 m thickness is located in Kiev Clay Marl at about 10 m depth below the ground surface. The barrettes are penetrating the layer of Kiev Clay Marl reaching the Butschak Sands.The calculated loads on the barrettes were in the range of 22.1 MN to 44.5 MN. The load on the outer barrettes was about 41.2 MN to 44.5 MN which significantly exceeds the loads on the inner barrettes with the maximum value of 30.7 MN. This behavior is typical for a CPRF.The outer deep foundation elements take more loads because of their higher stiffness due to the higher volume of the activated soil. The CPRF coefficient is 0.88 =CPRF . Maximum settlements of about 12 cm werecalculated due to the settlement-relevant load of 85% of the total design load. The pressure under the foundation raft is calculated in the most areas not exceeding 200 kN/m2, at the raft edge the pressure reaches 400 kN/m2.The calculated base pressure of the outer barrettes has anaverage of 5100 kN/m2 and for inner barrettes an average of 4130 kN/m2. The mobilized shaft resistance increases with the depth reaching 180 kN/m2 for outer barrettes and 150 kN/m2 for inner barrettes.During the construction of Mirax Plaza the observational method according to EC 7 is applied. Especially the distribution of the loads between the barrettes and the raft is monitored. For this reason 3 earth pressure devices were installed under the raft and 2 barrettes (most loaded outer barrette and average loaded inner barrette) were instrumented over the length.In the scope of the project Mirax Plaza the new allowable shaft resistance and base resistance were defined for typical soil layers in Kiev. This unique experience will be used for the skyscrapers of new generation in Ukraine.The CPRF of the high-rise building project MiraxPlaza represents the first authorized CPRF in the Ukraine. Using the advanced optimization approaches and taking advantage of the positive effect of CPRF the number of barrettes could be reduced from 120 barrettes with 40 mlength to 64 barrettes with 33 m length. The foundation optimization leads to considerable decrease of the utilized resources (cement, aggregates, water, energy etc.)and cost savings of about 3.3 Million US$.译文:安全保证岩土公民发起挑战工程建设在城市地区摘要安全是最重要的方面在设计、施工和服务时间的任何结构,特别是对具有挑战性的项目,如高层建筑和隧道在城市地区。
Disclosing vulnerability information to a vendor should not be a painful or difficult process for the security researcher or the vendor. Ideally, we should all coexist and work together.In May of 2011, I reported several vulnerabilities affecting the S7-1200, a PLC designed and manufactured by Siemens. There was, for a time following my disclosure, a common misconception perpetrated by Siemens' marketing team, which informed Siemens customers that the attacks and vulnerabilities only affected the Simatic S7-1200.This is clearly untrue. The TCP replay and memory protection authentication bypass vulnerabilities are not specific to one type of PLC, as Siemens initially claimed.The issue is present in several different hardware platforms, as revealed by my own investigations and confirmed in the latest ICS-CERT alert. It was not until further investigation of other PLC models by ICS-CERT and myself was completed that Siemens felt obligated to make public certain information regarding additional affected products. Siemens also attempted to minimize the severity of the initially disclosed vulnerabilities by claiming that the S7-1200 was not used in nuclear power installations, and those higher-end PLCs that are used in such sensitive installations were not affected. That claim also turned out to be false.Myself and many control systems experts, such as Dale Peterson, Bob Radvanovsky, Jake Brodsky, Kevin Finisterre and Kevin Lackey, were immediately skeptical of these claims, and rightly so. Each of these individuals already knew the entire line of S7s were using the same protocols and standards, so it wasn’t long before I started receiving inquiries regarding what exactly was exploitable on the controllers. They all knew that if it were a protocolspecific implementation issue, the attacks would not only affect Siemens PLCs, but many other vendors as well. I imagine we will start seeing a significant number of disclosures relating to insecure use of protocols in the near future.Ralph Langner, Stuxnet expert, posted a comment on Digital Bond regarding the password authentication flaw.“The password mechanism on Siemens S7 controllers is so simple that option 1 can probably be ruled out. And the next bombs that are waiting to be dropped may be much more serious than what we have seen so far. Once that Dillon figures out how to delete OB1, which he might before dinner, and crafts this into a Metasploit module, he will have created a cyber assault weapon. Both Siemens and ICS-CERT know that this is technically possible and what the impact would be. While the vendor has no obligation to act on this, DHS certainly has.” –Ralph Langner.I believe that, especially when related to critical industrial control systems, it is preferable for an independent security researcher to discover product vulnerabilities and create public awareness by responsibly disclosing information to CERTs, rather than for our enemies to find the bugs and use them against us.I am not entirely convinced that a metasploit module should be described as acyber-assault weapon, but it does sound cool! The ruby modules were intended to serve as a proof of concept to assist the vendor in validating the bugs, and subsequently developing a patch. These “cyber-assault weapons” are also helpful to ICS-CERT, helping them validate the severity of the issue so they can keep the public informed. In addition, the modules are now available to the pen testing community to assist companies in testing their own infrastructure.The S7-300 and S7-400 are impacted by the same attacks as the S7-1200 with the exception of one denial of service attack against an integrated web server running on the S7-1200 (see ICS-ALERT-11-186-01.)The S7-300 and S7-400 are recognized by many as Siemens’ “bread and butter” products. It is apparent that they share the same key characteristics, including the use of ISO-TSAP and the same PROFINET communication protocol.One of the attacks that we will cover during the Black Hat presentation is the packet replay attack: SIEMENS-SSA-625789. Siemens refers to this issue as a “security gap”. However, if an attacker can capture a CPU STOP/START command or send a CPU READ/WRITE command to any PLC in the automation network, he can alter the operational logic on the controller or disable any process attached to the device, including, but not limited to, enabling hidden features on the PLC.Here is a quote from Siemens’ first advisory notice regarding some of the vulnerabilities and the replay attack scenario. They were already aware of the weak password authentication mechanism, and yet still recommended the feature as a viable solution to prevent remote exploitation of the controller.The Siemens advisory recommends:“It is not however, possible to replay the recorded data obtained from one controller to other controllers within the same plant or other plants as long as they are configured with unique passwords. The answer to this scenario is that a password protected S7-1200 will, in the future (with the firmware update), no longer respond to recorded frames transmitted to the controller at a later time.”--SIEMENS-SSA-625789.The Siemens marketing department has since changed its tone after I provided the exploit code (free of charge). This code will also be available in the Metasploit framework after ICS-CERT has released its advisories.Siemens CERT and a team of their engineers quickly responded to the replay attack scenario by claiming they had a mitigation effort in place to prevent unauthorized access to the PLC. After speaking with ICS-CERT and Siemens CERT, I quickly discovered the ease with which an attacker could circumvent the access control feature they had recommended to prevent unauthorized access to the controller.It is important to remember that this feature was not intended to prevent remote exploits or replay attacks against the device, it was designed to prevent other engineers or unauthorized third parties from re-programming or tampering with the programmable logic onthe PLC. Based on my observation of the packet replay scenario, it seemed logical that if one were to intercept the packets containing a password they could replay the same packets against any controller with the that password and gain access to the controller. It also became evident that if the controller had no password at all, any controller would accept any commands sent to and from any source, without validating any portion of the packets.Just as we enabled the password protection feature by sending a series of packets to the PLC containing a password, which in turn flips a bit in the PLC's memory to enable a protection flag, we could turn that flag off by sending the same packets back to the PLC.It was also clear to me that because everything sent to the controller by the engineering workstation is in plain text, it would be trivial for an attacker to decode the encoded password hash used to flip the memory protection built into the PLC. ICS-CERT verified and reported that the S7-200, S7-300, S7-400, and S7-1200 are all affected by the same protocol specific security vulnerabilities.Conclusion:We need secure protocols in ICS. The product vendors have the ability to make this a reality.The time has come for experts around the ICS community to come together and make the necessary changes to insure a safer environment for all those affected. That means everyone in the world who lives near or works in a factory or a power plant!When vendors misrepresent vulnerability information, their customers cannot properly assess the risk to their operations. Given Siemens ' public statements, it is hard to imagine the company taking the lead in ICS security. If trust is an important buying criteria, other vendors in this industry, such as GE and Rockwell, have an opportunity to set an example and gain market share in the future.供应商对漏洞信息的披露,不应该成为一个让安全研究人员或供应商痛苦的过程。
Yunnan Ethnic pattern in Packaging DesignAbstract: Art is a folk Mother of the arts,is the source of the new art, From which to draw a strong tradition of high—grade Nutrition。
The persons belonging to national folk arts Ethnic patterns,are folk arts Intraoperative a gem, its development Research,and with the means of modern art,art wind Grid,professional skills combine to form a unique Style and features a modern design There are important applications,this paper focuses on Minority Folk pattern in modern packaging design Meter applications are discussed.Keywords: Yunnan Ethnic. Pattern。
Packaging Design.IntroductionYunnan is a multi-ethnic province, Here multiply survive the Han, Yi, Bai More than twenty families, Zhuang, Miao, Dai, etc。
Nation. Long history of various ethnic groups in Yunnan Province, the source is far Long, creating a rich and colorful Folk art。
外文文献A marketer’s guide to behavioral economicsApirl.2010 • Ned Welch • McKinsey QuarterlyMarketers have been applying behavioral economics-often unknowingly for years. A more systematic approach can unlock significant value.Long before behavioral eco nomics had a name, marketers were using it. “Three for the price of two” offers and extended-payment layaway plans became widespread because they worked—not because marketers had run scientific studies showing that people prefer a supposedly free incentive to an equivalent price discount or that people often behave irrationally when thinking about future consequences. Yet despite marketing’s inadvertent leadership in using principles of behavioral economics, few companies use them in a systematic way. In this article, we highlight four practical techniques that should be part of every marketer’s tool kit.1. Make a product’s cost less painfulIn almost every purchasing decision, consumers have the option to do nothing: they can always save their money for an other day. That’s why the marketer’s task is not just to beat competitors but also to persuade shoppers to part with their money in the first place. According to economic principle, the pain of payment should be identical for every dollar we spend. In marketing practice, however, many factors influence the way consumers value a dollar and how much pain they feel upon spending it.Retailers know that allowing consumers to delay payment can dramatically increase their willingness to buy. One reason delayed payments work is perfectly logical: the time value of money makes future payments less costly than immediate ones. But there is a second, less rational basis for this phenomenon. Payments, like all losses, are viscerally unpleasant. But emotions experienced in the present—now—are especially important. Even small delays in payment can soften the immediate sting of parting with your money and remove an important barrier to purchase.Another way to minimize the pain of payment is to understand the ways “mental a ccounting” affects decision making. Consumers use different mental accounts for money they obtain from different sources rather than treating every dollar they own equally, as economists believe they do, or should. Commonly observed mental accounts include windfall gains, pocket money, income, and savings. Windfall gains and pocket money are usually the easiest for consumers to spend. Income is less easy to relinquish, and savings the most difficult of all.Technology creates new frontiers for harnessing mental accounting to benefit both consumers and marketers. A credit card marketer, for instance, could offer a Web-based or mobile-device application that gives consumers real-time feedback on spending against predefined budget and revenue categories—green, say, for below budget, red for above budget, and so on. The budget-conscious consumer is likely to find value in such accounts (although they are not strictly rational) and to concentrate spending on a card that makes use of them. This would not only incre ase the issuer’s interchange fees andfinancing income but also improve the issuer’s view of its customers’ overall financial situation. Finally, of course, such an application would make a genuine contribution to these consumers’ desire to live within the ir means.2. Harness the power of a default optionThe evidence is overwhelming that presenting one option as a default increases the chance it will be chosen. Defaults—what you get if you don’t actively make a choice—work partly by instilling a perception of ownership before any purchase takes place, because the pleasure we derive from gains is less intense than the pain from equivalent losses. When we’re “given” something by default, it becomes more valued than it would have been otherwise—and we are more loath to part with it.Savvy marketers can harness these principles. An Italian telecom company, for example, increased the acceptance rate of an offer made to customers when they called to cancel their service. Originally, a script informed them that they would receive 100 free calls if they kept their plan. The script was reworded to say, “We have already credited your account with 100 calls—how could you use those?” Many customers did not want to give up free talk time they felt they already owned.Defaults work best when decision makers are too indifferent, confused, or conflicted to consider their options. That principle is particularly relevant in a world that’s increasingly awash with choices—a default eliminates the need to make a decision. The default, however, must also be a good choice for most people. Attempting to mislead customers will ultimately backfire by breeding distrust.3. Don’t overwhelm consumers with choiceWhen a default option isn’t possible, marketers must be wary of generating “ch oice overload,” which makes consumers less likely to purchase. In a classic field experiment, some grocery store shoppers were offered the chance to taste a selection of 24 jams, while others were offered only 6. The greater variety drew more shoppers to sample the jams, but few made a purchase. By contrast, although fewer consumers stopped to taste the 6 jams on offer, sales from this group were more than five times higher.Large in-store assortments work against marketers in at least two ways. First, these choices make consumers work harder to find their preferred option, a potential barrier to purchase. Second, large assortments increase the likelihood that each choice will become imbued with a “negative halo”—a heightened awareness that every option requires you to forgo desirable features available in some other product. Reducing the number of options makes people likelier not only to reach a decision but also to feel more satisfied with their choice.4. Position your preferred option carefullyEconomists assume that everything has a price: your willingness to pay may be higher than mine, but each of us has a maximum price we’d be willing to pay. How marketers position a product, though, can change the equation. Consider the experience of the jewelry sto re owner whose consignment of turquoise jewelry wasn’t selling. Displaying it more prominently didn’t achieve anything, nor did increased efforts by her sales staff. Exasperated, she gave her sales manager instructions to mark the lot down “x½” and departed on a buying trip. On her return, she found that the manager misread the note and had mistakenly doubled the price of the items—and sold the lot.2 In this case,shoppers almost certainly didn’t base their purchases on an absolute maximum price. Instead, t hey made inferences from the price about the jewelry’s quality, which generated a context-specific willingness to pay.The power of this kind of relative positioning explains why marketers sometimes benefit from offering a few clearly inferior options. Eve n if they don’t sell, they may increase sales of slightly better products the store really wants to move. Similarly, many restaurants find that the second-most-expensive bottle of wine is very popular—and so is the second-cheapest. Customers who buy the former feel they are getting something special but not going over the top. Those who buy the latter feel they are getting a bargain but not being cheap. Sony found the same thing with headphones: consumers buy them at a given price if there is a more expensive option—but not if they are the most expensive option on offer.Another way to position choices relates not to the products a company offers but to the way it displays them. Our research suggests, for instance, that ice cream shoppers in grocery stores look at the brand first, flavor second, and price last. Organizing supermarket aisles according to way consumers prefer to buy specific products makes customers both happier and less likely to base their purchase decisions on price—allowing retailers to sell higher-priced, higher-margin products. (This explains why aisles are rarely organized by price.) For thermostats, by contrast, people generally start with price, then function, and finally brand. The merchandise layout should therefore be quite different.Marketers have long been aware that irrationality helps shape consumer behavior. Behavioral economics can make that irrationality more predictable. Understanding exactly how small changes to the details of an offer can influence the way people react to it is crucial to unlocking significant value—often at very low cost.不可或缺的营销四技巧多年来,营销商一直在运用行为经济学,但往往是不自觉地运用。
员工激励理论外文文献及翻译员工激励理论外文文献及翻译One-to-one-management companiesare run -- in a timely inversion of John Adams's ideal -- as organizations of men (and women), not of laws. Nonetheless, a few laws, or at least cultural traits, appear to govern many such organizations. Together those traits create an environment where employees' needs are known, sometimes anticipated, and served, justas customers' needs are known, sometimes anticipated, and served in CRM-focused organizations. What follows is a look at the rules by which one-to-one-management companies operate[2].3.2 It's All in the DetailHow do you build morale and a sense of corporate responsibility? In surprisingly small ways. Standing in the kitchen at Eze Castle Software, CEO Sean McLaughlin watches as one of his programmers sets milk and cookies on a table. It's 2:30 on a Wednesday afternoon. "Hang on, Parvathy," McLaughlin says to the employee as he opens the refrigerator door and pulls out an apple pie. "Put this out, too." When Parvathy is done in the kitchen, she flips some switches, andthe lights flicker all over the fifth floor. Almost instantly, programmers leave their cubicles and make a beeline for thekitchen.Then Parvathy jogs up a staircase and flashes the lights on the sixth floor. Account managers, salespeople, and assorted techies come downstairs and join their colleagues in the kitchen. When they arrive, McLaughlin is at the center of the steadily building crowd, dishing out the pie. Around him conversations spring up between colleagues who work in different departments. The topics range from work to social life to politics. Ten minutes later the lights flash again and it's back to work for the 90 employees in the Boston office of Eze.What's so remarkable about the staff of a developer of securities-trading software with $13 million in revenues taking daily milk-and-cookies breaks? Not much -- until you consider that the practice is part of a cultural shift engineered by the CEO, a shift that has profoundly changed the way he and his employees relate toone another. Perhaps more significant, the changes have affected how employees deal with the myriad little details that keep the six-year-old company grounded.原文请找腾讯3249114六-维^论,文.网Eze's transformation began last year, when McLaughlin realized to his chagrin that his once small and collegial company had -- because of accelerated growth -- begun acting like a large corporation. His employees no longer knew one another, and he himself was increasingly vague about who some of the new faces were. "In the early days I could get to know everyone," saysMcLaughlin.However, the CEO was most annoyed by the fact that his employees -- both old and new -- were beginning to behave with large-company sloppiness rather than with start-up frugality. "Back when we were small, if someone sent a FedEx, we all knew how much that was costing the company," McLaughlin says. He recalls noticing that things were changing when one employee approved paying a contractor $100 a month to water the company's five plants. Then there were rising charges from the company's Internet service provider because of excessive traffic on the corporate T1 line. The cause? Employees were downloading MP3 files to listen to music during the workday. It frustrated McLaughlin that employees weren't taking responsibilityfor their actions and for the ways in which those actions affected the company's bottom line[2].But last summer two things happened that spurred McLaughlin to make some changes.First, the Boston office lost both of its administrative assistants. One assistant quit and the other left a few weeks later. The two had stocked the supply room, sorted the mail, and welcomed visitors. The dual departures wreaked havoc. "The kitchen was out of milk, we didn't have any pens in the supply cabinet, the reception area looked like crap," McLaughlin says.Then came the World Trade Center attacks. Though McLaughlin had long been brooding on how to reverse Eze's fat-cat habits, he had yet to act. He says that 9-11, and the "what are my priorities" thinking it engendered, "created an environment where it was easy for me to initiate a change."The change he had in mind was inspired by a visit to his daughter's kindergarten class. There he saw how the teacher divided the cleanup tasks among the children by posting a rotating "chore wheel." McLaughlin thought the wheel was just the thing to clean up the mess and teach his employees a little corporate responsibility. But he also wanted to institute something that would help improve camaraderie. That's where another kindergarten institution, the milk-and-cookies breaks, came in. "I wanted to build relationships among the employees, to make them feel more company morale," he says.上一页[1] [2] [3] [4] [5] [6] [7] [8] [9] 下一页。
中英文对照外文翻译(文档含英文原文和中文翻译)Bridge research in EuropeA brief outline is given of the development of the European Union, together withthe research platform in Europe. The special case of post-tensioned bridges in the UK is discussed. In order to illustrate the type of European research being undertaken, an example is given from the University of Edinburgh portfolio: relating to the identification of voids in post-tensioned concrete bridges using digital impulse radar.IntroductionThe challenge in any research arena is to harness the findings of different research groups to identify a coherent mass of data, which enables research and practice to be better focused. A particular challenge exists with respect to Europe where language barriers are inevitably very significant. The European Community was formed in the 1960s based upon a political will within continental Europe to avoid the European civil wars, which developed into World War 2 from 1939 to 1945. The strong political motivation formed the original community of which Britain was not a member. Many of the continental countries saw Britain’s interest as being purelyeconomic. The 1970s saw Britain joining what was then the European Economic Community (EEC) and the 1990s has seen the widening of the community to a European Union, EU, with certain political goals together with the objective of a common European currency.Notwithstanding these financial and political developments, civil engineering and bridge engineering in particular have found great difficulty in forming any kind of common thread. Indeed the educational systems for University training are quite different between Britain and the European continental countries. The formation of the EU funding schemes —e.g. Socrates, Brite Euram and other programs have helped significantly. The Socrates scheme is based upon the exchange of students between Universities in different member states. The Brite Euram scheme has involved technical research grants given to consortia of academics and industrial partners within a number of the states—— a Brite Euram bid would normally be led by partners within a number of the statesan industrialist.In terms of dissemination of knowledge, two quite different strands appear to have emerged. The UK and the USA have concentrated primarily upon disseminating basic research in refereed journal publications: ASCE, ICE and other journals. Whereas the continental Europeans have frequently disseminated basic research at conferences where the circulation of the proceedings is restricted.Additionally, language barriers have proved to be very difficult to break down. In countries where English is a strong second language there has been enthusiastic participation in international conferences based within continental Europe —e.g. Germany, Italy, Belgium, The Netherlands and Switzerland. However, countries where English is not a strong second language have been hesitant participants }—e.g. France.European researchExamples of research relating to bridges in Europe can be divided into three types of structure:Masonry arch bridgesBritain has the largest stock of masonry arch bridges. In certain regions of the UK up to 60% of the road bridges are historic stone masonry arch bridges originally constructed for horse drawn traffic. This is less common in other parts of Europe as many of these bridges were destroyed during World War 2.Concrete bridgesA large stock of concrete bridges was constructed during the 1950s, 1960s and 1970s. At the time, these structures were seen as maintenance free. Europe also has a large number of post-tensioned concrete bridges with steel tendon ducts preventing radar inspection. This is a particular problem in France and the UK.Steel bridgesSteel bridges went out of fashion in the UK due to their need for maintenance as perceived in the 1960s and 1970s. However, they have been used for long span and rail bridges, and they are now returning to fashion for motorway widening schemes in the UK.Research activity in EuropeIt gives an indication certain areas of expertise and work being undertaken in Europe, but is by no means exhaustive.In order to illustrate the type of European research being undertaken, an example is given from the University of Edinburgh portfolio. The example relates to the identification of voids in post-tensioned concrete bridges, using digital impulse radar.Post-tensioned concrete rail bridge analysisOve Arup and Partners carried out an inspection and assessment of the superstructure of a 160 m long post-tensioned, segmental railway bridge in Manchester to determine its load-carrying capacity prior to a transfer of ownership, for use in the Metrolink light rail system..Particular attention was paid to the integrity of its post-tensioned steel elements.Physical inspection, non-destructive radar testing and other exploratory methods were used to investigate for possible weaknesses in the bridge.Since the sudden collapse of Ynys-y-Gwas Bridge in Wales, UK in 1985, there has been concern about the long-term integrity of segmental, post-tensioned concrete bridges which may b e prone to ‘brittle’ failure without warning. The corrosion protection of the post-tensioned steel cables, where they pass through joints between the segments, has been identified as a major factor affecting the long-term durability and consequent strength of this type of bridge. The identification of voids in grouted tendon ducts at vulnerable positions is recognized as an important step in the detection of such corrosion.Description of bridgeGeneral arrangementBesses o’ th’ Barn Bridge is a 160 m long, three span, segmental, post-tensionedconcrete railway bridge built in 1969. The main span of 90 m crosses over both the M62 motorway and A665 Bury to Prestwick Road. Minimum headroom is 5.18 m from the A665 and the M62 is cleared by approx 12.5 m.The superstructure consists of a central hollow trapezoidal concrete box section 6.7 m high and 4 m wide. The majority of the south and central spans are constructed using 1.27 m long pre-cast concrete trapezoidal box units, post-tensioned together. This box section supports the in site concrete transverse cantilever slabs at bottom flange level, which carry the rail tracks and ballast.The center and south span sections are of post-tensioned construction. These post-tensioned sections have five types of pre-stressing:1. Longitudinal tendons in grouted ducts within the top and bottom flanges.2. Longitudinal internal draped tendons located alongside the webs. These are deflected at internal diaphragm positions and are encased in in site concrete.3. Longitudinal macalloy bars in the transverse cantilever slabs in the central span .4. Vertical macalloy bars in the 229 mm wide webs to enhance shear capacity.5. Transverse macalloy bars through the bottom flange to support the transverse cantilever slabs.Segmental constructionThe pre-cast segmental system of construction used for the south and center span sections was an alternative method proposed by the contractor. Current thinkingire suggests that such a form of construction can lead to ‘brittle’ failure of the ententire structure without warning due to corrosion of tendons across a construction joint,The original design concept had been for in site concrete construction.Inspection and assessmentInspectionInspection work was undertaken in a number of phases and was linked with the testing required for the structure. The initial inspections recorded a number of visible problems including:Defective waterproofing on the exposed surface of the top flange.Water trapped in the internal space of the hollow box with depths up to 300 mm.Various drainage problems at joints and abutments.Longitudinal cracking of the exposed soffit of the central span.Longitudinal cracking on sides of the top flange of the pre-stressed sections.Widespread sapling on some in site concrete surfaces with exposed rusting reinforcement.AssessmentThe subject of an earlier paper, the objectives of the assessment were:Estimate the present load-carrying capacity.Identify any structural deficiencies in the original design.Determine reasons for existing problems identified by the inspection.Conclusion to the inspection and assessmentFollowing the inspection and the analytical assessment one major element of doubt still existed. This concerned the condition of the embedded pre-stressing wires, strands, cables or bars. For the purpose of structural analysis these elements、had been assumed to be sound. However, due to the very high forces involved,、a risk to the structure, caused by corrosion to these primary elements, was identified.The initial recommendations which completed the first phase of the assessment were:1. Carry out detailed material testing to determine the condition of hidden structural elements, in particularthe grouted post-tensioned steel cables.2. Conduct concrete durability tests.3. Undertake repairs to defective waterproofing and surface defects in concrete.Testing proceduresNon-destructi v e radar testingDuring the first phase investigation at a joint between pre-cast deck segments the observation of a void in a post-tensioned cable duct gave rise to serious concern about corrosion and the integrity of the pre-stress. However, the extent of this problem was extremely difficult to determine. The bridge contains 93 joints with an average of 24 cables passing through each joint, i.e. there were approx. 2200 positions where investigations could be carried out. A typical section through such a joint is that the 24 draped tendons within the spine did not give rise to concern because these were protected by in site concrete poured without joints after the cables had been stressed.As it was clearly impractical to consider physically exposing all tendon/joint intersections, radar was used to investigate a large numbers of tendons and hence locate duct voids within a modest timescale. It was fortunate that the corrugated steel ducts around the tendons were discontinuous through the joints which allowed theradar to detect the tendons and voids. The problem, however, was still highly complex due to the high density of other steel elements which could interfere with the radar signals and the fact that the area of interest was at most 102 mm wide and embedded between 150 mm and 800 mm deep in thick concrete slabs.Trial radar investigations.Three companies were invited to visit the bridge and conduct a trial investigation. One company decided not to proceed. The remaining two were given 2 weeks to mobilize, test and report. Their results were then compared with physical explorations.To make the comparisons, observation holes were drilled vertically downwards into the ducts at a selection of 10 locations which included several where voids were predicted and several where the ducts were predicted to be fully grouted. A 25-mm diameter hole was required in order to facilitate use of the chosen horoscope. The results from the University of Edinburgh yielded an accuracy of around 60%.Main radar sur v ey, horoscope verification of v oids.Having completed a radar survey of the total structure, a baroscopic was then used to investigate all predicted voids and in more than 60% of cases this gave a clear confirmation of the radar findings. In several other cases some evidence of honeycombing in the in site stitch concrete above the duct was found.When viewing voids through the baroscopic, however, it proved impossible to determine their actual size or how far they extended along the tendon ducts although they only appeared to occupy less than the top 25% of the duct diameter. Most of these voids, in fact, were smaller than the diameter of the flexible baroscopic being used (approximately 9 mm) and were seen between the horizontal top surface of the grout and the curved upper limit of the duct. In a very few cases the tops of the pre-stressing strands were visible above the grout but no sign of any trapped water was seen. It was not possible, using the baroscopic, to see whether those cables were corroded.Digital radar testingThe test method involved exciting the joints using radio frequency radar antenna: 1 GHz, 900 MHz and 500 MHz. The highest frequency gives the highest resolution but has shallow depth penetration in the concrete. The lowest frequency gives the greatest depth penetration but yields lower resolution.The data collected on the radar sweeps were recorded on a GSSI SIR System 10.This system involves radar pulsing and recording. The data from the antenna is transformed from an analogue signal to a digital signal using a 16-bit analogue digital converter giving a very high resolution for subsequent data processing. The data is displayed on site on a high-resolution color monitor. Following visual inspection it isthen stored digitally on a 2.3-gigabyte tape for subsequent analysis and signal processing. The tape first of all records a ‘header’ noting the digital radar settings together with the trace number prior to recording the actual data. When the data is played back, one is able to clearly identify all the relevant settings —making for accurate and reliable data reproduction.At particular locations along the traces, the trace was marked using a marker switch on the recording unit or the antenna.All the digital records were subsequently downloaded at the University’s NDT laboratory on to a micro-computer.(The raw data prior to processing consumed 35 megabytes of digital data.) Post-processing was undertaken using sophisticated signal processing software. Techniques available for the analysis include changing the color transform and changing the scales from linear to a skewed distribution in order to highlight、突出certain features. Also, the color transforms could be changed to highlight phase changes. In addition to these color transform facilities, sophisticated horizontal and vertical filtering procedures are available. Using a large screen monitor it is possible to display in split screens the raw data and the transformed processed data. Thus one is able to get an accurate indication of the processing which has taken place. The computer screen displays the time domain calibrations of the reflected signals on the vertical axis.A further facility of the software was the ability to display the individual radar pulses as time domain wiggle plots. This was a particularly valuable feature when looking at individual records in the vicinity of the tendons.Interpretation of findingsA full analysis of findings is given elsewhere, Essentially the digitized radar plots were transformed to color line scans and where double phase shifts were identified in the joints, then voiding was diagnosed.Conclusions1. An outline of the bridge research platform in Europe is given.2. The use of impulse radar has contributed considerably to the level of confidence in the assessment of the Besses o’ th’ Barn Rail Bridge.3. The radar investigations revealed extensive voiding within the post-tensioned cable ducts. However, no sign of corrosion on the stressing wires had been foundexcept for the very first investigation.欧洲桥梁研究欧洲联盟共同的研究平台诞生于欧洲联盟。
论文外文文献翻译以下是一篇700字左右的论文外文文献翻译:原文题目:The Role of Artificial Intelligence in Medical Diagnostics: A Review原文摘要:In recent years, there has been a growing interest in the use of artificial intelligence (AI) in the field of medical diagnostics. AI has the potential to improve the accuracy and efficiency of medical diagnoses, and can assist clinicians in making treatment decisions. This review aims to examine the current state of AI in medical diagnostics, and discuss its advantages and limitations. Several AI techniques, including machine learning, deep learning, and natural language processing, are discussed. The review also examines the ethical and legal considerations associated with the use of AI in medical diagnostics. Overall, AI has shown great promise in improving medical diagnostics, but further research is needed to fully understand its potential benefits and limitations.AI在医学诊断中发挥的作用:一项综述近年来,人工智能(AI)在医学诊断领域的应用引起了越来越多的关注。
毕业论文外文文献翻译要求
一、翻译的外文文献可以是一篇,也可以是两篇,但英文字符要求不少于2万
二、翻译的外文文献应主要选自学术期刊、学术会议的文章、有关著作及其他相关材料,应与毕业论文(设计)主题相关,并在中文译文首页用“脚注”形式注明原文作者及出处,外文原文后应附中文译文。
三、中文译文的基本撰写格式为:
1.题目:采用三号、黑体字、居中打印;
2.正文:采用小四号、宋体字,行间距一般为固定值20磅,标准字符间距。
页边距为左3cm,右2.5cm,上下各2.5cm,页面统一采用A4纸。
四、英文的基本撰写格式为:
1.题目:采用三号、Times New Roman字、加黑、居中打印
2.正文:采用小四号、Times New Roman字。
行间距一般为固定值20磅,标准字符间距。
页边距为左3cm,右2.5cm,上下各2.5cm,页面统一采用A4纸.
3.脚注:五号,Times New Roman,顺序为作者.题目.出处,
五、封面格式由学校统一制作(注:封面上的“翻译题目”指中文译文的题目,封面中文小四号宋体,英文小四号Times New Roman),
六、装订:左侧均匀装订,上下共两个钉,并按“封面、外文原文、译文”的顺序统一装订。
七、忌自行更改表格样式
大连工业大学艺术与信息工程学院
毕业设计(论文)外文文献
外文题目
翻译题目
系别
专业班级
学生姓名
指导教师
大连工业大学艺术与信息工程学院
毕业设计(论文)开题报告
题目名称
系别
专业班级
学生姓名
指导教师
开题报告日期年月日。
外文文献翻译方法与技巧
翻译外文文献可以为学术研究提供重要的支持,以下是一些翻译方法和技巧:
精读原文
在翻译外文文献之前,先要精读原文并理解文本内容和结构,这可以帮助翻译者确定文本的主题和重点。
同时,熟悉文本的语言风格和词汇也非常重要,可以帮助翻译者更好地理解并翻译文本。
注重语言风格
不同的外文文献可能有着不同的语言风格和表达方式,翻译者应该注重语言风格的翻译,尽可能地保持原文的表达方式和文化背景,同时也要注意译文的可读性。
注意文化差异
在翻译外文文献时,注意文化差异也是非常重要的。
不同的国家和地区有着不同的文化背景和惯,翻译者应该根据文本的背景和主题灵活运用词汇、表达方式和文化隐喻等,让译文更符合文化差异和读者的惯。
使用辅助工具
在翻译外文文献时,辅助工具可以帮助翻译者提高翻译效率和准确率。
例如,使用翻译软件可以帮助翻译者快速翻译大量文本,但需要注意软件翻译的准确性和语言风格是否符合需求。
查看参考文献
在翻译外文文献时,参考文献可以为翻译者提供重要的帮助。
翻译者可以查看相关的研究文献和资料,了解行业和学术领域的相关术语和表达方式,提高翻译的准确性和专业性。
总之,翻译外文文献需要翻译者具有良好的语言能力和专业知识,同时秉承着精读原文、注重语言风格、注意文化差异、使用辅
助工具和查看参考文献的翻译方法和技巧,才能提高翻译质量和效率。
论文外文文献翻译流程翻译外文文献是在研究论文撰写过程中非常重要的一步。
下面是一个大致的翻译外文文献的流程:1. 确定翻译的目标和目的。
首先要确定你为什么要翻译这篇文献,是为了理解相关研究领域的最新发现,还是为了引用该文献来支持你的论点。
确立明确的目标可以帮助你更好地理解文献内容并选择合适的翻译方法。
2. 阅读原文。
在开始翻译之前,先通读一遍原文,了解文章的整体内容和结构。
如果你对该领域有一定了解,那么在阅读原文时你可以更好地理解其中的专业术语和概念。
3. 逐句翻译。
在翻译开始之前,先确定翻译的起点。
可以从文章的开头开始逐句翻译,或者从你感兴趣的部分开始翻译。
将原文中的每一句话进行逐字逐句地翻译成中文。
4. 查阅专业词典和研究资料。
在翻译过程中,遇到生词、专业术语或者特殊短语时,可以查阅相关的专业词典、学术论文和翻译资源来帮助你理解和翻译。
5. 确保正确理解作者的意图。
在翻译过程中要尽量保持原文的完整性和准确性,不要对原文的意义进行任意解释或省略。
尽量将作者的论点和观点准确地传递到中文文献中。
6. 做好注释和解释。
在翻译的过程中,有时难免会遇到一些难以理解的地方,这时可以做好注释和解释。
在翻译后的文献中,在原文的附近或者文末加上对该部分内容的注释和解释,以帮助读者更好地理解原文的意义。
7. 校对和润色文献。
在完成初步翻译后,可以进行校对和润色。
检查翻译的准确性、流畅性和连贯性,并进行必要的调整和修改。
还可以请教其他同行或专业人士来帮助你校对和提出建议。
8. 引用文献。
在翻译文献的过程中,注意保留原文的引用和出处信息,避免侵权和误传。
在引用原文时,尽量保持原文的原貌,可以用引号或斜体表示原文。
总之,翻译外文文献是一项需要耐心和细致的工作,需要充分理解原文的意义和目的,并准确地传递到目标语言中。
通过这个流程,希望能够帮助你更好地进行外文文献的翻译工作。
经营分析与估值克雷沙·G.帕利普保罗·M.希利摘自书籍“Business Analysis and Valuation”第五版第一章节1.简介本章的目的是勾勒出一个全面的财务报表分析框架。
因为财务报表提供给公共企业经济活动最广泛使用的数据,投资者和其他利益相关者依靠财务报告评估计划企业和管理绩效率。
各种各样的问题可以通过财务状况及经营分析解决,如下面的示例所示:一位证券分析师可能会对问:“我的公司有多好?这家公司是否符合我的期望?如果没有,为什么不呢?鉴于我对公司当前和未来业绩的评估,该公司的股票价值是多少?”一位信贷员可能需要问:“这家公司贷款给这家公司有什么贷款?公司管理其流动性如何?公司的经营风险是什么?公司的融资和股利政策所产生的附加风险是什么?“一位管理顾问可能会问:“公司经营的行业结构是什么?该策略通过在工业各个企业追求的是什么?不同企业在行业中的相对表现是什么?”公司经理可能会问:“我的公司是正确的估值的投资者吗?是我们在通信程序中有足够的投资者来促进这一过程?”财务报表分析是一项有价值的活动,当管理者在一个公司的战略和各种体制因素完成后,他们不可能完全披露这些信息。
在这一设置中,外部分析师试图通过分析财务报表数据来创建“中端信息”,从而获得有价值的关于该公司目前业绩和未来前景的展望。
了解财务报表分析所做的贡献,这是很重要的理解在资本市场的运作,财务报告的作用,形成财务报表制度的力量。
因此,我们首先简要说明这些力量,然后我们讨论的步骤,分析师必须执行,以提取信息的财务报表,并提供有价值的预测。
2.从经营活动到财务报表企业管理者负责从公司的环境中获取物理和财务资源,并利用它们为公司的投资者创造价值。
当公司在资本成本的超额投资时,就创造了价值。
管理者制定经营战略,实现这一目标,并通过业务活动实施。
企业的经营活动受其经济环境和经营战略的影响。
经济环境包括企业的产业、投入和产出的市场,以及公司经营的规章制度。
毕业设计(论文)外文文献翻译专业计算机科学与技术学生姓名班级学号指导教师信息工程学院1、外文文献The History of the InternetThe Beginning - ARPAnetThe Internet started as a project by the US government. The object of the project was to create a means of communications between long distance points, in the event of a nation wide emergency or, more specifically, nuclear war. The project was called ARPAnet, and it is what the Internet started as. Funded specifically for military communication, the engineers responsible for ARPANet "Internet."By definition, an 'Internet' is four or more computers connected by a network.ARPAnet achieved its network by using a protocol called TCPIP. The basics around this protocol was that if information sent over a network failed to get through on one route, it would find another route to work with, as well as establishing a means for one computer to "talk" to another computer, regardless of whether it was a PC or a Macintosh.By the 80's ARPAnet, just years away from becoming the more well known Internet, its network. By the year 1984, it its network.In 1986 ARPAnet (supposedly) shut down, but only the organizationshutdown, and the existing networks still existed between the more than 1000 computers. It shut down due to a failied link up with NSF, who wanted to connect its 5 countywide super computers into ARPAnet.With the funding of NSF, new 1988. By that time, there were 28,174 computers on the (by then decided) Internet. In 1989 there were 80,000 computers on it. By 1989, there were.Another network was built to support the incredible number of people joining. It was constructed in 1992.Today - The InternetToday, the Internet the line' to experience the wealth of information of the Internet. Millions of people now use the Internet, and it's predicted that by the year 2003 every single person on the planet will our time and era, and is evolving so quickly its virtual Internet environments.The Internet is not a 'thing' itself. The Internet cannot just "crash." It functions the same way as the telephone system, only there is no Internet company that runs the Internet.The Internet is a collection of millioins of computers that are all connected to each other, or office network, only it thing about . How does a computer in Houston know a computer in Tokyo to view a webpage?Internet communication, communication among computers connected to the Internet, is based on a language. This language is called TCPIP. TCPIP establishes a language for a computer to access and transmit data over the Internet system.But TCPIP assumes that there is a physical connecetion between one computer and another. This is not usually the case. There would that is requireed is established by way of modems,phonelines, and other modem cable connections (like cable modems or DSL). Modems on computers read and transmit data over established lines,which could be phonelines or data lines. The actual .To explain this better, let's look at Internet Service Provider (ISP). The ISP might in turn be connected to another ISP, or a straight connection into the Internet backbone.2. The user launches a web browser like Netscape or Internet Explorer and types in an internet location to go to.3. Here's where the tricky part comes in. First, the computer sends data about it's data request to a router. A router is a very of routers in the world make what is called a "backbone," on which all the data on the Internet is transferred. The backbone presently operates at a speed of several gigabytes per-second. Such a speed compared to a normal modem is like comparing the to the ice-cube.Routers similarly to envelopes. So, when the request for the webpage goes through, it uses TCPIP protocols to tell the router what to do with the data, where it's going, and overall where the user wants to go.4. The router sends these packets to other routers, eventually leading to the target computer. It's like whisper down the lane (only the information remains intact).5. When the information reaches the target web server, the webserver then begins to send the web page back. A webserver is the computer wherethe webpage is stored that is running a program that packets, sent through routers, and arrive at the users computer where the user can view the webpage once it is assembled.The packets which contain the data also contain special information that lets routers and other computers know the right order.With millions of web pages, and millions of users, using the Internet is not always easy for a beginning user, especially for someone who is not entirely comfortale with using computers. Below you can find tips tricks and services of the Internet.Before you access webpages, you must the software they usually give to customers; you. The fact that you are viewing this page means that you be found at and MSIE can be found atThe fact that you're reading this right now means that you of instructions (like if it remark made by new web-users.Sometimes websites error on a website is not the user's fault, of course.A 404 error means that the page you tried to go to does not exist. This could be because the site is still being constructed and the page created yet, or because the site author made a typo in the page. There's nothing much to do about a 404 error except for e-mailing the site administrator (of the page you wanted to go to) an telling the Javascript code of a website. Not all websites utilize Javascript, but many do. Javascript is different from Java, and most browsers now support Javascript. If you are using an old version of a web browser (Netscape 3.0 for example), you might get Javascript errors because sites utilize Javascript versions that yourbrowser does not support. So, you can try getting a newer version of your web browser.E-mail stands for Electronic Mail, and that's what it is. E-mail enables people to send letters, and even files and pictures to each other.To use e-mail, you must e-mail client, which is just like a personal post office, since it retrieves and stores e-mail.Secondly, you must e-mail account. Most Internet Service Providers provide free e-mail account(s) for free. Some services offer free e-mail, like Hotmail, and Geocities.After configuring your e-mail client with your POP3 and SMTP server address (your e-mail provider will give you that information), you are ready to receive mail.An attachment is a file sent in a letter. If someone sends you an attachment and you don't know who it is, don't run the file, ever. It could be a virus or some other kind of nasty programs. You can't get a virus just by reading e-mail, you'll put a text graphic, your business information, anything you want.Imagine that a computer on the Internet is an island in the sea. The sea is filled with millions of islands. This is the Internet. Imagine an island communicates with other island by sending ships to other islands and receiving ships. The island the Internet a network (or the Internet). This method is similar to the islandocean symbolism above.Telnet refers to accessing ports on a server directly with a text connection. Almost every kind of Internet function, like accessing web pages,"chatting," and e-mailing is done over a Telnet connection.Telnetting requires a Telnet client. A telnet program comes with the Windows system, so Windows users can access telnet by typing in "telnet" (without the "'s) in the run dialog. Linux , chat daemon) can be accessed via telnet, although they are not usually meant to be accessed in such a manner. For instance, it is possible to connect directly to a mail server and check your mail by interfacing with the e-mail server software, but it's easier to use an e-mail client (of course).There are millions of WebPages that come from all over the world, yet database of websites. For instance, if you wanted to find a website on dogs, you'd search for "dog" or "dogs" or "dog information." Here are a few search-engines.1. Altavista (3. Excite ( possibly find. This means that a search engine can literally map out as much of the Internet as it's own time and speed allows for.An indexed collection uses Yahoo's site. You can click on Computers & the Internet. Then you can click on Hardware. Then you can click on Modems, etc., and along the way through sections, there are sites available which relate to what section you're in.Metasearch searches many search engines at the same time, finding the top choices from about 10 search engines, making searching a lot more effective.Once you are able to use search engines, you can effectively find the pages you want.With the arrival of networking and multi user systems, security on the mind of system developers and system operators. Since the dawn ofAT&T and its phone network, known by many, . Why should you be careful while making purchases via a website? Let's look at to a webpage. Looks safe, right? Not necessarily. As the user submits the information, it is being streamed through a series of computers that make up the Internet backbone. The information is in little chunks, in packages called packets. Here's the problem: While the information is being transferred through this big backbone, what is preventing a ". There are methods of enforcing security, like password protection, an most importantly, encryption.Encryption means scrambling data into a code that can only be unscrambled on the "other end." Browser's like Netscape Communicator and Internet Explorer feature encryption support for making on-line transfers. Some encryptions work better than others. The most advanced encryption system is called DES (Data Encryption Standard), and it was adopted by the US Defense Department because it was deemed so difficult to 'crack' that they considered it a security risk if it would fall into another countries to unlock an entire document. The problem is, there are 75 trillion possible keys to use, so it is a3. Excite () - Web spider & Indexed4. Lycos () - Web spider & Indexed5. Metasearch () - Multiple search网络蜘蛛是一种搜索引擎使用的程序,它随着可能找到的任何链接从一个网页到另一个网页。
食品包装外文翻译文献(含:英文原文及中文译文)英文原文Scheme for industrialized production of steamed breadSteamed bread in our country people's daily lives in the main position, is the traditional popular staple food. According to statistics, the amount of flour used to bread flour accounted for about 40% of the total. At present, the production condition of steamed bread is not suitable for people's living rhythm and nutrition and health requirements. In recent years, although the production environment of steamed bread has improved, but still remain in the workshop type stage. Steamed bread production of process appears simple, but includes the formulation of raw materials, fermentation method, process selection, quality factors, hobbies, evaluation of multiple subject, relate to biotechnology, cereal chemistry, fermentation science, food engineering, mechanics and other multi application discipline techniques. Because our country wheaten food for a long time in family workshops processing mode based, coupled with flour staple food of the diversity and complexity of wheat varieties, traditional staple food processing by experience, for a long time domestic research based on staple food process is relatively weak. Steamed bread industrialized production of steamed bread, the process should be simple,continuous, fast and efficient. Therefore, after the fermentation process, then neutralizing the forming. Process is as follows: Flour + water + yeast and fermentation < doped mixing > forming a shaping a discharge a Xing hair a steaming a product cooling packaging.Staple food steamed bread industry will drive the industrialization of other Chinese traditional pasta, promote related industries the development of as traditional staple food, steamed bread, dumplings, noodles, as the main raw materials are flour, in mechanism research and application research have many similarities and differences. Such as easy to aging, easy to mildew and other issues in the flour food ubiquitous, is caused by flour food shelf life is short, not easy to store the main reason that restrict the circulation radius of flour food. To capture the steamed bread aging resistance, mildew key technologies, to solve dumplings, noodles and other food related issues, many varieties of Chinese traditional food industry of have a strong reference, for the comprehensive development of nearly 200 billion yuan of the industrialization of staple food market has a positive role in promoting. Also the staple food industrialization involves the national economy of our country the first, the second and third industry, the industrial chain relates to grow wheat, flour processing, food processing, food service industry, mechanical design and processing, testing equipment, such as related industries, driven by industry, the scientific and technologicallevel of the related industries, relevant industry labor productivity and international competitiveness of the market existing production equipment steamed bread simply copy the handmade process to improve. However, due to the surface and mechanical stirring strength is greater, forming the spiral extrusion would seriously undermine the strength of dough, the dough in the machining process temperature rise too higher defect is the steamed bread machine processing beyond the main reason for the comprehensive quality of bread by hand. Steamed Buns is also involved in biotechnology, cereal chemistry, fermentation, food engineering, mechanics and other application technology.At present, as the unique Chinese characteristics of traditional food safety and health, China has introduced the world's interest in steamed bread. In recent years, Europe and the United States food companies and research institutions have set off a boom in the study of Chinese steamed bread.Industry of Chinese steamed bread is in the workshop and intensive chemical plant to the industrialization and industrialization development is an important transition period, the scientific research community and the industry is bound to see tremendous market potential in the future, thereby increasing the intensity of the use of scientific research investment and high technology, especially in the use of modern science and technology discovery and maintenance of traditional craft productionof the unique flavor of bread at the same time, will gradually raise the production automation and mechanization. Because the way to rely on a large number of artificial production can not adapt to the growing tension of human resources in China, but also does not meet the requirements of safety and health of consumers. Through the implementation of the promotion of staple food steamed bread industrialization projects, will lead a batch of products of good quality, high technology content, strong market competitiveness of enterprises are booming, gradually replace the workshops and other backward processing methods, further improve the industrial concentration and the core competitiveness.Development of steamed bread machine relates to food engineering, fermentation theory, mechanical design, multi applied science and technology, and requires a lot of food based on research results do support. Therefore Engineering Center has established a special flour food machinery research, by the technology personnel and mechanical design personnel together, in the development of steamed bread in the process of the equipment, engineering center make full use of the accumulated over the years the scientific research in wheat, flour, flour food, in the in-depth study of traditional handmade bread and surface, forming, baking, steaming process principle of system based on, according to scientific industrialization production process requirements for mechanical design, the hand-made steamed bread shaping method is successfully simulatedby using intelligent bionics technology. And on this basis for a series of technical innovationWheat flour is the main raw material for the production of steamed bread, and the protein content of the steamed bread production process and the quality of steamed bread have a great impact. Rheological measurement showed that the content of wet gluten flour in the production of 39.7% or so steamed bread is better. This process of dough, good quality, good air, moderate strength, surface color Steamed Buns white, thin silk. The internal structure is small and flexible honeycomb layers. With high gluten content of flour production, although the volume of steamed bread, but the fermentation time is long, the surface of the finished product surface color, there are blisters. The volume is smaller than 60% Steamed Buns gluten content in wheat flour, the internal honeycomb structure is rough, poor flavor.Plays an important role in the process of production of steamed bread fermentation of steamed bread production process of fermentation, fermentation quality will directly affect the steamed bread quality and nutrient composition, fermentation is using the yeast flour sugar and other nutrients alcohol fermentation to produce CO2 and alcohol, the dough swelling loose and flexible. With the dough fermentation, lactic acid and acetic acid, such as lactic acid and acetic acid, can also be produced by lactic acid and acetic acid. Alcohol and acid can be combined into estersof aromatic substances, aromatic flavor. Therefore, alcohol, organic acids and esters are important substances Steamed Buns produce wine, sweet dough. If the fermentation time is long, also can form aldehyde, ketone and so on carbonyl compound, they are also the important flavor substance. The temperature, humidity, time and the protein content of flour should be controlled strictly in the process of dough fermentation.Double roller spiral forming Steamed Buns used rub finish forming machine. Its working principle is by motor starting will and good fermentation of dough into surface feed bucket inner feeder cast will shape the dough into a packing auger, and the introduction of dough extruding mouth rotary cutting knife cut into uniform size of dough, and turn into a twin roll type forming groove. Fermentation under the screw driven rapidly knead the dough into feed hopper, feeder cast will shape the dough into a packing auger, and launched crowded mouth rotary rubbing to form a smooth surface spherical dough blank. If you need a different shape, a specially designed auxiliary device to achieve the weight of billet surface by an adjusting device set. The double roller forming machine theory error, leave some blank dough spin marks affect the quality of the finished appearance. And set up a plastic machine to be eliminated. The spherical twist ratio of height to diameter greater than the green cylinder, and then become the steaming process thoroughly smooth spherical. The production of key equipment Steamed BunsOne is to solve the problem of labor intensity, the two is to ensure product hygiene, three are automatically arranged accurately, to avoid sticking to the skin. Dial plate discharge machine.The plate-type discharge machine feeds the formed dough to the discharge machine at a certain distance from the conveyor belt. The upper part of the discharge machine is provided with a rotating carboxylate plate, and the direction of rotation of the plate is perpendicular to the direction of movement of the conveyor belt. Whenever a certain number of boring heads pass through the conveyor belt, the dial plate moves once and a predetermined number of boring heads are dialed into the locators located under the conveyor belt. With the natural drop of the steamed bread and the arrangement of the discharge port, a certain number of steamed breads are arranged neatly on the tray or main conveyor belt with a certain clearance, and the next process is performed. The number of steamers dialed by the dial plate is based on the output of the production line. set up. Zhu Keqing, the industrialized production technology of the traditional staple steamer, completely synchronizes the movement of the dial plate with the conveyor belt speed. Both must be connected by a transmission system. This discharge machine, structureSimple and convenient for the layout of the production line.Automatic discharge machine. The discharge principle of this kind of discharge machine is to use the self weight of the hammer to guide theraw blank into a fixed positioning device through an intermittent placement guide to achieve automatic alignment. The machine is mainly composed of three parts: guide, fixed positioning device and main transmission mechanism. After the boring head has been formed, the feeding port fed into the guide is lifted by the conveyor belt, and the guide is a raceway that can rotate flexibly. One is to control the rolling drop of the boring head and the other is to accurately realize the rotation at a certain angle, and ensure that the outlet of the boring head is opposite to the hole arranged on the plane of the positioning device. The function of the fixed positioning device is to change the position of the blank to achieve discharge. The arrayed blanks fall onto the tray or conveyor belt and run forward to the next process.Steaming is the two key processes that determine the final quality of steamed bread. The production process combines the two processes together in a single positioning situation, and the bursting and steaming are controlled and implemented according to the specified process conditions and requirements. The purpose of bursting is to make the dough continue to expand more evenly, and the volume after the curl increases compared to the original. There are two forms of bursting process, one is a batch layout and the other is a continuous layout. The batch type arrangement uses a special boring tray. After arranging the boring heads, the rakes are sent together with the pallet trucks and sentinto the masher to be steamed. The continuous method is to link the bursting and steaming process with a set of mechanisms and complete the steaming under the appropriate process conditions. Continuous production We have developed two devices. One is a tunnel type and the other is a cascade type. Tunnel type device. The tunnel type device consists of a power source, a chain, a sprocket, a carriage and a guide rail. This kind of conveying device feeds the dough at one end of the steamer, ensures the steam process conditions in the steam chamber, and matures when the hammer is output from the other end. At the turning point of the device, the breadboard automatically falls off due to the white weight, and the conveyor belt enters the finished product warehouse. This device has a simple structure, convenient maintenance, and high reliability. However, it has a large floor area and relatively low thermal efficiency. The return trip cannot be used. It has brought some difficulties to the promotion of the production line.Stacked device. The stacking device ensures the structure is simple and the action is realized. The conveyor belt is composed of multiple pallets. A long and a short two pins are projected from both ends of each pallet. The long pins are hinged on the two chains and the short pins are covered with rollers. In the horizontal movement state, the chain drives the carriage, the short pins have supporting rails, and all the carriages are in a plane. During cornering, the long axis moves in a circular motionwith the wheel, and the short axis enters an arc-shaped track to perform a circular motion synchronously, and the dragging plate realizes a translational transition at the turning point, which ensures that the position of the hammer head when turning. When the steamed bread is steamed and the short axis support rail is removed at the outlet position for a certain distance, the weight loss will be reversed along the long axis to disengage the steamed bread.Shantou factory production must be adapted to local conditions, the scale is moderate, and the output and variety must take into account the market demand. In terms of equipment, we should focus on the development of multi-functional continuous cooking machines and single machines with complete functions to produce taro products of different flavors and varieties.中文译文工业化生产馒头的方案馒头在我国人民日常生活中占主要地位,是传统的大众主食。
附件C:译文 构建智能城市应用生态系统
城市正变得越来越智能化,但是需要一个能够处理和管理低水平复杂事物的处理单元。在这篇文章中,作者讨论了构建智能应用生态系统(SCALE)处理块以及相关的挑战。 最近智能城市模式的出现和成功导致其广泛应用在城市中及其它所支持的全球生态系统。领导牵头的国际计划,比如IBM智慧地球计划(www.ibm.com/smarterplanet),麻省理工学院(MIT)智能城市群(http://cities.media.mit.edu),三一学院的智能和可持续研究(www.tcd.ie/research/themes/smartsustainable-cities),以及维也纳的公会Urbanes Energie undMobilitätssystem(URBEM;http://urbem.tuwien.ac.at),越来越多的城市的核心正变得越来越智能。各种领域比如公共设施,工业和政府(当然包括城市建筑)的智能城市产生大量的数据,产生复杂的相互作用,并导致复杂性不断增加。 在智能城市领域,管理者不仅需要管理数十亿的传感器和新兴领域的物联网设备(物联网),而且还要能够基于在复杂系统下的大量数据做出明智的决定。这导致许多的挑战,从管理和支配数十亿计的设备、流程和数据生成管理的能力以及有效的提供资源分析,到隐私和安全的诸多问题。为了管理这个复杂且不断变化的系统,这里我们介绍循环智能城市的概念,使管理者和使用者一起来管理这个新兴的复杂系统。图1显示这个理想的循环智能系统—一个在概念层面上解决了上述挑战的反应系统。 为了启用这个抽象的概念且真正的从众受益,我们需要创建能够处理和管理所有地级复杂性的基础底层。这应该像是一个现代计算机操作系统,通过提供相同的抽象底层资源和管理任务,但是需要更大的规模和额外的抽象资源。因此,在这里,我们介绍一个智能城市操作系统的特定基础(SOS),能够应用更大的智能城市应用生态系统(SCALE)。这种智能城市应用生态系统让持股人和城市居民创建智能城市的应用领域,关注他们想要知道什么,解除他们在这种领域的技术中所面临的麻烦和障碍。 方法