外文文献翻译
- 格式:doc
- 大小:12.20 MB
- 文档页数:30
外文文献原稿和译文原稿DATABASEA database may be defined as a collection interrelated data store together with as little redundancy as possible to serve one or more applications in an optimal fashion .the data are stored so that they are independent of programs which use the data .A common and controlled approach is used in adding new data and in modifying and retrieving existing data within the data base .One system is said to contain a collection of database if they are entirely separate in structure .A database may be designed for batch processing , real-time processing ,or in-line processing .A data base system involves application program, DBMS, and database.THE INTRODUCTION TO DATABASE MANAGEMENT SYSTEMSThe term database is often to describe a collection of related files that is organized into an integrated structure that provides different people varied access to the same data. In many cases this resource is located in different files in different departments throughout the organization, often known only to the individuals who work with their specific portion of the total information. In these cases, the potential value of the information goes unrealized because a person in other departments who may need it does not know it or it cannot be accessed efficiently. In an attempt to organize their information resources and provide for timely and efficient access, many companies have implemented databases.A database is a collection of related data. By data, we mean known facts that can be recorded and that have implicit meaning. For example, the names, telephone numbers, and addresses of all the people you know. You may have recorded this data in an indexed address book, or you may have stored it on a diskette using a personalcomputer and software such as DBASE Ⅲor Lotus 1-2-3. This is a collection of related data with an implicit meaning and hence is a database.The above definition of database is quite general. For example, we may consider the collection of words that made up this page of text to be usually more restricted. A database has the following implicit properties:● A database is a logically coherent collection of data with some inherent meaning. A random assortment of data cannot be referred to as a database.● A database is designed, built, and populated with data for a specific purpose. It has an intended group of user and some preconceived applications in which these users are interested.● A database represents some aspect of the real world, sometimes called the miniworld. Changes to the miniworld are reflected in the database.In other words, a database has some source from which data are derived, some degree of interaction with events in the real world, and an audience that is actively interested in the contents of the database.A database management system (DBMS) is composed of three major parts: (1) a storage subsystem that stores and retrieves data in files; (2)a modeling and manipulation subsystem that provides the means with which to organize the data and to add, delete, maintain, and update the data; and (3) an interface between the DBMS and its users. Several major trends are emerging that enhance the value and usefulness of database management systems.●Managers who require more up-to-date information to make effective decisions.●Customers who demand increasingly sophisticated information services and more current information about the status of their orders, invoices, and accounts.●Users who find that they can develop custom applications with database systems in a fraction of the time it takes to use traditional programming languages.●Organizations that discover information has a strategic value; they utilize their database systems to gain an edge over their competitors.A DBMS can organize, process, and present selected data elements from the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions that aren’t available in regular reports. These questions might initially be vague and/or p oorly defined, but people can “browse” through the database until they have the needed information. In short, the DBMS will “mange” the stored data items and assemble the needed items from the common database in response to the queries of those who aren’t programmers. In a file-oriented system, user needing special information may communicate their needs to a programmer, who, when time permits, will write one or more programs to extract the data and prepare the information. The availability of a DBMS, however, offers users a much faster alternative communications path.DATABASE QUERYIf the DBMS provides a way to interactively enter and update the database ,as well as interrogate it ,this capability allows for managing personal database. However, it does not automatically leave an audit trail of actions and does not provide the kinds of controls necessary in a multi-user organization .There controls are only available when a set of application programs is customized for each data entry and updating function.Software for personal computers that perform some of the DBMS functions has been very popular .Individuals for personal information storage and processing intended personal computers for us .Small enterprises, professionals like doctors, architects, engineers, lawyers and so on have also used these machines extensively. By the nature of intended usage ,database system on there machines are except from several of the requirements of full-fledged database systems. Since data sharing is not intended, concurrent operations even less so ,the software can be less complex .Security and integrity maintenance are de-emphasized or absent .as data volumes will be small, performance efficiency is also less important .In fact, the only aspect of a database system that is important is data independence. Data independence ,as stated earlier ,means that application programs and user queries need not recognize physical organization of data on secondary storage. The importance of this aspect , particularly for the personal computer user ,is that this greatly simplifies database usage . The user can store ,access and manipulate data at ahigh level (close to the application)and be totally shielded from the low level (close to the machine )details of data organization.DBMS STRUCTURING TECHNIQUESSpatial data management has been an active area of research in the database field for two decades ,with much of the research being focused on developing data structures for storing and indexing spatial data .however, no commercial database system provides facilities for directly de fining and storing spatial data ,and formulating queries based on research conditions on spatial data.There are two components to data management: history data management and version management .Both have been the subjects of research for over a decade. The troublesome aspect of temporal data management is that the boundary between applications and database systems has not been clearly drawn. Specifically, it is not clear how much of the typical semantics and facilities of temporal data management can and should be directly incorporated in a database system, and how much should be left to applications and users. In this section, we will provide a list of short-term research issues that should be examined to shed light on this fundamental question.The focus of research into history data management has been on defining the semantics of time and time interval, and issues related to understanding the semantics of queries and updates against history data stored in an attribute of a record. Typically, in the context of relational databases ,a temporal attribute is defined to hold a sequence of history data for the attribute. A history data consists of a data item and a time interval for which the data item is valid. A query may then be issued to retrieve history data for a specified time interval for the temporal attribute. The mechanism for supporting temporal attributes is to that for supporting set-valued attributes in a database system, such as UniSQL.In the absence of a support for temporal attributes, application developers who need to model and history data have simply simulated temporal attributes by creating attribute for the time interval ,along with the “temporal” attribute. This of course may result in duplication of records in a table, and more complicated search predicates in queries. The one necessary topic of research in history data management is to quantitatively establish the performance (and even productivity) differences betweenusing a database system that directly supports attributes and using a conventional database system that does not support either the set-valued attributes or temporal attributes.Data security, integrity, and independenceData security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database of the database, called subschemas. For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data.Data integrity refers to the accuracy, correctness, or validity of the data in the database. In a database system, data integrity means safeguarding the data against invalid alteration or destruction. In large on-line database system, data integrity becomes a more severe problem and two additional complications arise. The first has to do with many users accessing the database concurrently. For example, if thousands of travel agents book the same seat on the same flight, the first agent’s booking will be lost. In such cases the technique of locking the record or field provides the means for preventing one user from accessing a record while another user is updating the same record.The second complication relates to hardware, software or human error during the course of processing and involves database transaction which is a group of database modifications treated as a single unit. For example, an agent booking an airline reservation involves several database updates (i.e., adding the passenger’s name and address and updating the seats-available field), which comprise a single transaction. The database transaction is not considered to be completed until all updates have been completed; otherwise, none of the updates will be allowed to take place.An important point about database systems is that the database should exist independently of any of the specific applications. Traditional data processing applications are data dependent.When a DMBS is used, the detailed knowledge of the physical organization of the data does not have to be built into every application program. The application program asks the DBMS for data by field name, for example, a coded representationof “give me customer name and balance due” would be sent to the DBMS. Without a DBMS the programmer must reserve space for the full structure of the record in the program. Any change in data structure requires changes in all the applications programs.Data Base Management System (DBMS)The system software package that handles the difficult tasks associated with creating ,accessing and maintaining data base records is called a data base management system (DBMS). A DBMS will usually be handing multiple data calls concurrently.It must organize its system buffers so that different data operations can be in process together .It provides a data definition language to specify the conceptual schema and most likely ,some of the details regarding the implementation of the conceptual schema by the physical schema.The data definition language is a high-level language, enabling one to describe the conceptual schema in terms of a “data model “.At the present time ,there are four underling structures for database management systems. They are :List structures.Relational structures.Hierarchical (tree) structures.Network structures.Management Information System(MIS)An MIS can be defined as a network of computer-based data processing procedures developed in an organization and integrated as necessary with manual and other procedures for the purpose of providing timely and effective information to support decision making and other necessary management functions.One of the most difficult tasks of the MIS designer is to develop the information flow needed to support decision making .Generally speaking ,much of the information needed by managers who occupy different levels and who have different levels and have different responsibilities is obtained from a collection of exiting information system (or subsystems)Structure Query Language (SQL)SQL is a data base processing language endorsed by the American NationalStandards Institute. It is rapidly becoming the standard query language for accessing data on relational databases .With its simple ,powerful syntax ,SQL represents a great progress in database access for all levels of management and computing professionals.SQL falls into two forms : interactive SQL and embedded SQL. Embedded SQL usage is near to traditional programming in third generation languages .It is the interactive use of SQL that makes it most applicable for the rapid answering of ad hoc queries .With an interactive SQL query you just type in a few lines of SQL and you get the database response immediately on the screen.译文数据库数据库可以被定义为一个相互联系的数据库存储的集合。
南京航空航天大学金城学院毕业设计(论文)外文文献翻译系部经济系专业国际经济与贸易学生姓名陈雅琼学号2011051115指导教师邓晶职称副教授2015年5月Economic policy,tourism trade and productive diversification(Excerpt)Iza Lejárraga,Peter WalkenhorstThe broad lesson that can be inferred from the analysis is that promoting tourism linkages with the productive capabilities of a host country is a multi-faceted approach influenced by a variety of country conditions.Among these,fixed or semi-fixed factors of production,such as land,labor,or capital,seem to have a relatively minor influence.Within the domain of natural endowments,only agricultural capital emerged as significant.This is a result that corresponds to expectations,given that foods and beverages are the primary source of demand in the tourism economy.Hence,investments in agricultural technology may foment linkages with the tourism market.It is also worth mentioning that for significant backward linkages to emerge with local agriculture,a larger scale of tourism may be important. According to the regression results,a strong tourism–agriculture nexus will not necessarily develop at a small scale of tourism demand.It appears that variables related to the entrepreneurial capital of the host economy are of notable explanatory significance.The human development index(HDI), which is used to measure a country's general level of development,is significantly and positively associated with tourism linkages.One plausible explanation for this is that international tourists,who often originate in high-income countries,may feel more comfortable and thus be inclined to consume more in a host country that has a life-style to which they can relate easily.Moreover,it is important to remember that the HDI also captures the relative achievements of countries in the level of health and education of the population.Therefore,a higher HDI reflects a healthier and more educated workforce,and thus,the quality of local entrepreneurship.Related to this point,it is important to underscore that the level of participation of women in the host economy also has a significantly positive effect on linkages.In sum, enhancing local entrepreneurial capital may expand the linkages between tourism and other sectors of the host country.Formal institutions and their regulatory control of the market,proxied by the size of the government and price controls,were not found to have significant effects on linkages formation.Despite the importance of democratic governance,this was not identified as a key determinant either.On the other hand,the significance of informal institutions accords with the clustering dynamics inherent in tourism,in which linkages are formed on the basis of self-enforcing“relations-based”governance.Also,informal structures cost less than formal,rules-driven institutional frameworks for entrepreneurship.Therefore,highly formalized regulations can deter the spontaneous and cost-driven coordination among potential local suppliers and the potential buyers of the tourism economy.One type of formal institutions that does matter is policing and vigilance.As would be expected,the results show that countries with higher incidence of violence or crime are significantly associated with lower levels of tourism linkages.Indeed, the coordination of providers in tourism clusters depends fundamentally on trust among local entrepreneurs and trust can hardly flourish in an environment characterized by social conflict.Equally important,the perception of violence on the part of tourists and hotels will dissuade tourists from venturing beyond the safe boundaries of the“enclave”hotel resort.Finally,hotel managers and other foreign investors in the tourism economy will be less inclined to maintain productive relations with the host economy in the absence of predictability and stability. Therefore,investments in institutions that maintain safety and a perception of safety,in the host economy appear critical for spawning coordination.While all country domains may be playing a role in fostering or hindering linkages, the business environment seems to exert an overriding influence on linkages.After controlling for a country's natural endowments,level of development,and institutional maturity,the business environment on its own explains almost20%of cross-country variations in linkages.In particular,the level of corporate taxes in the host economy is associated with the most significant adverse effect on the formation of linkages,in conformity with the lower-cost motivation underlying tourism-led linkage creation.Also,a widespread usage of internet is alsosignificantly associated with a positive effect in the ability of suppliers to orchestrate coordination in tourism linkages.Moreover,the results suggest that there could be a role for government in improving trade facilitation and reducing transportation costs.Also,maintaining an open trade regime seems to be critical for the emergence of linkages.This underscores the importance of not protecting inefficient economic activities and opening potential products for tourism demand to competition.Although trade barriers may indeed serve to prod investors in the tourism economy to procure domestic goods, they will also hinder the competitiveness of local producers.Shielded from imports, local producers will not have the incentives to meet the international quality standards of the products needed by the tourism economy.Yet,quality expectations, possibly more so than costs,will likely inform the procurement decisions of the tourism economy.Concerning the relative magnitude of the effects of the different domains on linkages,the business environment and trade regulations stand out.The independent contributions of these domains,that is their ability to explain variations in the dependent variable when no controls for other domains are applied,amount to53%and 43%,respectively.The level-of-development domain follows with25%explanatory power,while the domains covering institutions and endowments provide an independent contribution of23%each.The implications of the analysis should be considered in light of its limitations. Causal direction cannot be fully substantiated,because we use a cross-sectional approach due to data limitations.In the absence of time-series for the variables at hand,it is not possible to test for causation.While the explanatory variables concerning natural endowments are exogenous,some of the other explanatory variables could potentially be subject to reverse causality.That said,there do not seem to be a priori strong conceptual reasons that would lead us to believe that the degree of tourism linkages critically affects trade policy,the quality of institutions, and other variables of our model.Moreover,the risk of encountering problems of reverse causality is mitigated by the observation that several longitudinal studies have established a causal relationship that runs from higher levels of economic development Eugenio-Martin et al.(2008)or a better business environment(Barrowclough,2007and Selvanathan et al.,2009)to the development of the tourism sector,rather than the other way around.Finally,the construction of the dependent variable as a ratio of indirect to direct tourism expenditure makes the reverse causality hypothesis less compelling. While it might be expected that an expansion of the tourism sector that increases total revenues and employment opportunities might have an impact on the explanatory variables,it is less evident that a change in the composition of tourism revenues, as implied by a change in the LINK variable,would have such an effect.That said, the confidence in our findings would clearly be further enhanced,if supported by results from future studies based on longitudinal designs.The scientific environmental ethics plays a key role in the recognition of the human—environment interactions.Modern environmental ethics is the philosophical rethinking of modern human race environmental behavior.The development of environmental ethics theory as well as its application in reality.determines the viewpoints of environmental ethics.Sustainable development implies harmony on human-environment interactions and intergeneration responsibility,with emphasis on a harmonious relationship among population,resources,environment and development,so as to lay a sustainable and healthy foundation of resources and environment for future generations.The harmonious society construction in China that is raised by the Chinese central government should be covered by environmental ethics.The connotation of open environmental ethics includes a respect for nature.care for the individual human race.and respect for the development of future generations,which means giving consideration to natural values.individual and human race benefits and welfare across generations.The role of environmental ethics in regional development consists of cognition,criticism,education,inspiration,adjusting,legislation and promoting environmental regulations.The major problems in regional development are extensive resource exploration,fast population growth irrational,industrialstructure.Unfair welfare distribution and the twofold effects of science and technology development.The formulation of environmental ethics that aims at regional sustainable development,can not only harmonize the relationship of population,resource,environment and economic development,but also guide behavior selection,push social and political system transformation.strengthen the legal system,and raise environmental awareness of the public.Human races face severe global challenges in resources,environment,population and poverty.To solve these problems science and technology should be developed on one hand,and human-environment interactions should be adjusted on the other hand.Modem environmental ethics is the philosophical review on modem human race environmental behavior.Environmental ethics can be a view point as the moral perception of the relationship between humankind and nature in general.The keystone of sustainable development is on harmonious human.environment interactions.with an emphasis on sustainable environmental ethics.Environmental ethics and sustainable development are key issues in the study of man.1and system,as well as a precondition to regional development(Zheng,2005a).Though there exists theoretical divergence in different environmental ideologies.some general understandings can also be obtained:human races are the only ethical agents on earth;the essence of the environmental crisis is a cultural and value crisis;future generations have the same right as current generations,especially on survival space;differences should be made between human race and other entities on earth,at the same time they are an undivided union;the capability of the earth is limited.Based on the above general understandings.it is possible to form a more open and sustainable environmental ethics.A more open and sustainable environmental ethics has some special connections.To respect and treat nature friendly means to acknowledge the value and right of nature,that is to say,minimum hurt criterion,basic benefit criterion and fair compensation criterion should be followed.To pay attention to both individuals and mankind should follow justice criterion,equity criterion and cooperation criterion.To have futuregeneration in mind Should follow responsibility criterion,saving criterion,and cautiousness criterion(Wang,2003;Wang,2004a).The conclusion to be drawn from the above is to give attention to both human race and natural value.to both individual and mankind’s benefit。
中英文对照外文翻译(文档含英文原文和中文翻译)原文:Safety Assurance for Challenging Geotechnical Civil Engineering Constructions in Urban AreasAbstractSafety is the most important aspect during design, construction and service time of any structure, especially for challenging projects like high-rise buildings and tunnels in urban areas. A high level design considering the soil-structure interaction, based on a qualified soil investigation is required for a safe and optimised design. Dueto the complexity of geotechnical constructions the safety assurance guaranteed by the 4-eye-principle is essential. The 4-eye-principle consists of an independent peer review by publicly certified experts combined with the observational method. The paper presents the fundamental aspects of safety assurance by the 4-eye-principle. The application is explained on several examples, as deep excavations, complex foundation systems for high-rise buildings and tunnel constructions in urban areas. The experiences made in the planning, design and construction phases are explained and for new inner urban projects recommendations are given.Key words: Natural Asset; Financial Value; Neural Network1.IntroductionA safety design and construction of challenging projects in urban areas is based on the following main aspects:Qualified experts for planning, design and construction;Interaction between architects, structural engineers and geotechnical engineers;Adequate soil investigation;Design of deep foundation systems using the FiniteElement-Method (FEM) in combination with enhanced in-situ load tests for calibrating the soil parameters used in the numerical simulations;Quality assurance by an independent peer review process and the observational method (4-eye-principle).These facts will be explained by large construction projects which are located in difficult soil and groundwater conditions.2.The 4-Eye-PrincipleThe basis for safety assurance is the 4-eye-principle. This 4-eye-principle is a process of an independent peer review as shown in Figure 1. It consists of 3 parts. The investor, the experts for planning and design and the construction company belong to the first division. Planning and design are done accordingto the requirements of the investor and all relevant documents to obtain the building permission are prepared. The building authorities are the second part and are responsible for the buildingpermission which is given to the investor. The thirddivision consists of the publicly certified experts.They are appointed by the building authorities but work as independent experts. They are responsible for the technical supervision of the planning, design and the construction.In order to achieve the license as a publicly certified expert for geotechnical engineering by the building authorities intensive studies of geotechnical engineering in university and large experiences in geotechnical engineering with special knowledge about the soil-structure interaction have to be proven.The independent peer review by publicly certified experts for geotechnical engineering makes sure that all information including the results of the soil investigation consisting of labor field tests and the boundary conditions defined for the geotechnical design are complete and correct.In the case of a defect or collapse the publicly certified expert for geotechnical engineering can be involved as an independent expert to find out the reasons for the defect or damage and to develop a concept for stabilization and reconstruction [1].For all difficult projects an independent peer review is essential for the successful realization of the project.3.Observational MethodThe observational method is practical to projects with difficult boundary conditions for verification of the design during the construction time and, if necessary, during service time. For example in the European Standard Eurocode 7 (EC 7) the effect and the boundary conditions of the observational method are defined.The application of the observational method is recommended for the following types of construction projects [2]:very complicated/complex projects;projects with a distinctive soil-structure-interaction,e.g. mixed shallow and deep foundations, retaining walls for deep excavations, Combined Pile-Raft Foundations (CPRFs);projects with a high and variable water pressure;complex interaction situations consisting of ground,excavation and neighbouring buildings and structures;projects with pore-water pressures reducing the stability;projects on slopes.The observational method is always a combination of the common geotechnical investigations before and during the construction phase together with the theoretical modeling and a plan of contingency actions(Figure 2). Only monitoring to ensure the stability and the service ability of the structure is not sufficient and,according to the standardization, not permitted for this purpose. Overall the observational method is an institutionalized controlling instrument to verify the soil and rock mechanical modeling [3,4].The identification of all potential failure mechanismsis essential for defining the measure concept. The concept has to be designed in that way that all these mechanisms can be observed. The measurements need to beof an adequate accuracy to allow the identification ocritical tendencies. The required accuracy as well as the boundary values need to be identified within the design phase of the observational method . Contingency actions needs to be planned in the design phase of the observational method and depend on the ductility of the systems.The observational method must not be seen as a potential alternative for a comprehensive soil investigation campaign. A comprehensive soil investigation campaignis in any way of essential importance. Additionally the observational method is a tool of quality assurance and allows the verification of the parameters and calculations applied in the design phase. The observational method helps to achieve an economic and save construction [5].4.In-Situ Load TestOn project and site related soil investigations with coredrillings and laboratory tests the soil parameters are determined. Laboratory tests are important and essential for the initial definition of soil mechanical properties of the soil layer, but usually not sufficient for an entire and realistic capture of the complex conditions, caused by theinteraction of subsoil and construction [6].In order to reliably determine the ultimate bearing capacity of piles, load tests need to be carried out [7]. Forpile load tests often very high counter weights or strong anchor systems are necessary. By using the Osterberg method high loads can be reached without install inganchors or counter weights. Hydraulic jacks induce the load in the pile using the pile itself partly as abutment.The results of the field tests allow a calibration of the numerical simulations.The principle scheme of pile load tests is shown in Figure 3.5.Examples for Engineering Practice5.1. Classic Pile Foundation for a High-Rise Building in Frankfurt Clay and LimestoneIn the downtown of Frankfurt am Main, Germany, on aconstruction site of 17,400 m2 the high-rise buildingproject “PalaisQuartier” has been realized (Figure 4). The construction was finished in 2010.The complex consists of several structures with a total of 180,000 m2 floor space, there of 60,000 m2 underground (Figure 5). The project includes the historic building “Thurn-und Taxis-Palais” whose facade has been preserved (Unit A). The office building (Unit B),which is the highest building of the project with a height of 136 m has 34 floors each with a floor space of 1340 m2. The hotel building (Unit C) has a height of 99 m with 24 upper floors. The retail area (Unit D)runs along the total length of the eastern part of the site and consists of eight upper floors with a total height of 43 m.The underground parking garage with five floors spans across the complete project area. With an 8 m high first sublevel, partially with mezzanine floor, and four more sub-levels the foundation depth results to 22 m below ground level. There by excavation bottom is at 80m above sea level (msl). A total of 302 foundation piles(diameter up to 1.86 m, length up to 27 m) reach down to depths of 53.2 m to 70.1 m. above sea level depending on the structural requirements.The pile head of the 543 retaining wall piles (diameter1.5 m, length up to 38 m)were located between 94.1 m and 99.6 m above sea level, the pile base was between 59.8 m and 73.4 m above sea level depending on the structural requirements. As shown in the sectional view(Figure 6), the upper part of the piles is in the Frankfurt Clay and the base of the piles is set in the rocky Frankfurt Limestone.Regarding the large number of piles and the high pile loads a pile load test has been carried out for optimization of the classic pile foundation. Osterberg-Cells(O-Cells) have been installed in two levels in order to assess the influence of pile shaft grouting on the limit skin friction of the piles in the Frankfurt Limestone(Figure 6). The test pile with a total length of 12.9 m and a diameter of 1.68 m consist of three segments and has been installed in the Frankfurt Limestone layer 31.7 m below ground level. The upper pile segment above the upper cell level and the middle pile segment between the two cell levels can be tested independently. In the first phase of the test the upper part was loaded by using the middle and the lower part as abutment. A limit of 24 MN could be reached (Figure 7). The upper segment was lifted about 1.5 cm, the settlement of the middle and lower part was 1.0 cm. The mobilized shaft friction was about 830 kN/m2.Subsequently the upper pile segment was uncoupled by discharging the upper cell level. In the second test phase the middle pile segment was loaded by using the lower segment as abutment. The limit load of the middle segment with shaft grouting was 27.5 MN (Figure 7).The skin friction was 1040 kN/m2, this means 24% higher than without shaft grouting. Based on the results of the pile load test using O-Cells the majority of the 290 foundation piles were made by applying shaft grouting. Due to pile load test the total length of was reduced significantly.5.2. CPRF for a High-Rise Building in Clay MarlIn the scope of the project Mirax Plaza in Kiev, Ukraine,2 high-rise buildings, each of them 192 m (46 storeys)high, a shopping and entertainment mall and an underground parking are under construction (Figure 8). The area of the project is about 294,000 m2 and cuts a 30 m high natural slope.The geotechnical investigations have been executed 70m deep. The soil conditions at the construction site are as follows: fill to a depth of 2 m to 3mquaternary silty sand and sandy silt with a thickness of 5 m to 10 m tertiary silt and sand (Charkow and Poltaw formation) with a thickness of 0 m to 24 m tertiary clayey silt and clay marl of the Kiev and But schak formation with a thickness of about 20 m tertiary fine sand of the But schak formation up to the investigation depthThe ground water level is in a depth of about 2 m below the ground surface. The soil conditions and a cross section of the project are shown in Figure 9.For verification of the shaft and base resistance of the deep foundation elements and for calibration of the numerical simulations pile load tests have been carried out on the construction yard. The piles had a diameter of 0.82 m and a length of about 10 m to 44 m. Using the results of the load tests the back analysis for verification of the FEM simulations was done. The soil properties in accordance with the results of the back analysis were partly 3 times higher than indicated in the geotechnical report. Figure 10 shows the results of the load test No. 2 and the numerical back analysis. Measurement and calculation show a good accordance.The obtained results of the pile load tests and of the executed back analysis were applied in 3-dimensionalFEM-simulations of the foundation for Tower A, taking advantage of the symmetry of the footprint of the building. The overall load of the Tower A is about 2200 MN and the area of the foundation about 2000 m2 (Figure11).The foundation design considers a CPRF with 64 barrettes with 33 m length and a cross section of 2.8 m × 0.8m. The raft of 3 m thickness is located in Kiev Clay Marl at about 10 m depth below the ground surface. The barrettes are penetrating the layer of Kiev Clay Marl reaching the Butschak Sands.The calculated loads on the barrettes were in the range of 22.1 MN to 44.5 MN. The load on the outer barrettes was about 41.2 MN to 44.5 MN which significantly exceeds the loads on the inner barrettes with the maximum value of 30.7 MN. This behavior is typical for a CPRF.The outer deep foundation elements take more loads because of their higher stiffness due to the higher volume of the activated soil. The CPRF coefficient is 0.88 =CPRF . Maximum settlements of about 12 cm werecalculated due to the settlement-relevant load of 85% of the total design load. The pressure under the foundation raft is calculated in the most areas not exceeding 200 kN/m2, at the raft edge the pressure reaches 400 kN/m2.The calculated base pressure of the outer barrettes has anaverage of 5100 kN/m2 and for inner barrettes an average of 4130 kN/m2. The mobilized shaft resistance increases with the depth reaching 180 kN/m2 for outer barrettes and 150 kN/m2 for inner barrettes.During the construction of Mirax Plaza the observational method according to EC 7 is applied. Especially the distribution of the loads between the barrettes and the raft is monitored. For this reason 3 earth pressure devices were installed under the raft and 2 barrettes (most loaded outer barrette and average loaded inner barrette) were instrumented over the length.In the scope of the project Mirax Plaza the new allowable shaft resistance and base resistance were defined for typical soil layers in Kiev. This unique experience will be used for the skyscrapers of new generation in Ukraine.The CPRF of the high-rise building project MiraxPlaza represents the first authorized CPRF in the Ukraine. Using the advanced optimization approaches and taking advantage of the positive effect of CPRF the number of barrettes could be reduced from 120 barrettes with 40 mlength to 64 barrettes with 33 m length. The foundation optimization leads to considerable decrease of the utilized resources (cement, aggregates, water, energy etc.)and cost savings of about 3.3 Million US$.译文:安全保证岩土公民发起挑战工程建设在城市地区摘要安全是最重要的方面在设计、施工和服务时间的任何结构,特别是对具有挑战性的项目,如高层建筑和隧道在城市地区。
Disclosing vulnerability information to a vendor should not be a painful or difficult process for the security researcher or the vendor. Ideally, we should all coexist and work together.In May of 2011, I reported several vulnerabilities affecting the S7-1200, a PLC designed and manufactured by Siemens. There was, for a time following my disclosure, a common misconception perpetrated by Siemens' marketing team, which informed Siemens customers that the attacks and vulnerabilities only affected the Simatic S7-1200.This is clearly untrue. The TCP replay and memory protection authentication bypass vulnerabilities are not specific to one type of PLC, as Siemens initially claimed.The issue is present in several different hardware platforms, as revealed by my own investigations and confirmed in the latest ICS-CERT alert. It was not until further investigation of other PLC models by ICS-CERT and myself was completed that Siemens felt obligated to make public certain information regarding additional affected products. Siemens also attempted to minimize the severity of the initially disclosed vulnerabilities by claiming that the S7-1200 was not used in nuclear power installations, and those higher-end PLCs that are used in such sensitive installations were not affected. That claim also turned out to be false.Myself and many control systems experts, such as Dale Peterson, Bob Radvanovsky, Jake Brodsky, Kevin Finisterre and Kevin Lackey, were immediately skeptical of these claims, and rightly so. Each of these individuals already knew the entire line of S7s were using the same protocols and standards, so it wasn’t long before I started receiving inquiries regarding what exactly was exploitable on the controllers. They all knew that if it were a protocolspecific implementation issue, the attacks would not only affect Siemens PLCs, but many other vendors as well. I imagine we will start seeing a significant number of disclosures relating to insecure use of protocols in the near future.Ralph Langner, Stuxnet expert, posted a comment on Digital Bond regarding the password authentication flaw.“The password mechanism on Siemens S7 controllers is so simple that option 1 can probably be ruled out. And the next bombs that are waiting to be dropped may be much more serious than what we have seen so far. Once that Dillon figures out how to delete OB1, which he might before dinner, and crafts this into a Metasploit module, he will have created a cyber assault weapon. Both Siemens and ICS-CERT know that this is technically possible and what the impact would be. While the vendor has no obligation to act on this, DHS certainly has.” –Ralph Langner.I believe that, especially when related to critical industrial control systems, it is preferable for an independent security researcher to discover product vulnerabilities and create public awareness by responsibly disclosing information to CERTs, rather than for our enemies to find the bugs and use them against us.I am not entirely convinced that a metasploit module should be described as acyber-assault weapon, but it does sound cool! The ruby modules were intended to serve as a proof of concept to assist the vendor in validating the bugs, and subsequently developing a patch. These “cyber-assault weapons” are also helpful to ICS-CERT, helping them validate the severity of the issue so they can keep the public informed. In addition, the modules are now available to the pen testing community to assist companies in testing their own infrastructure.The S7-300 and S7-400 are impacted by the same attacks as the S7-1200 with the exception of one denial of service attack against an integrated web server running on the S7-1200 (see ICS-ALERT-11-186-01.)The S7-300 and S7-400 are recognized by many as Siemens’ “bread and butter” products. It is apparent that they share the same key characteristics, including the use of ISO-TSAP and the same PROFINET communication protocol.One of the attacks that we will cover during the Black Hat presentation is the packet replay attack: SIEMENS-SSA-625789. Siemens refers to this issue as a “security gap”. However, if an attacker can capture a CPU STOP/START command or send a CPU READ/WRITE command to any PLC in the automation network, he can alter the operational logic on the controller or disable any process attached to the device, including, but not limited to, enabling hidden features on the PLC.Here is a quote from Siemens’ first advisory notice regarding some of the vulnerabilities and the replay attack scenario. They were already aware of the weak password authentication mechanism, and yet still recommended the feature as a viable solution to prevent remote exploitation of the controller.The Siemens advisory recommends:“It is not however, possible to replay the recorded data obtained from one controller to other controllers within the same plant or other plants as long as they are configured with unique passwords. The answer to this scenario is that a password protected S7-1200 will, in the future (with the firmware update), no longer respond to recorded frames transmitted to the controller at a later time.”--SIEMENS-SSA-625789.The Siemens marketing department has since changed its tone after I provided the exploit code (free of charge). This code will also be available in the Metasploit framework after ICS-CERT has released its advisories.Siemens CERT and a team of their engineers quickly responded to the replay attack scenario by claiming they had a mitigation effort in place to prevent unauthorized access to the PLC. After speaking with ICS-CERT and Siemens CERT, I quickly discovered the ease with which an attacker could circumvent the access control feature they had recommended to prevent unauthorized access to the controller.It is important to remember that this feature was not intended to prevent remote exploits or replay attacks against the device, it was designed to prevent other engineers or unauthorized third parties from re-programming or tampering with the programmable logic onthe PLC. Based on my observation of the packet replay scenario, it seemed logical that if one were to intercept the packets containing a password they could replay the same packets against any controller with the that password and gain access to the controller. It also became evident that if the controller had no password at all, any controller would accept any commands sent to and from any source, without validating any portion of the packets.Just as we enabled the password protection feature by sending a series of packets to the PLC containing a password, which in turn flips a bit in the PLC's memory to enable a protection flag, we could turn that flag off by sending the same packets back to the PLC.It was also clear to me that because everything sent to the controller by the engineering workstation is in plain text, it would be trivial for an attacker to decode the encoded password hash used to flip the memory protection built into the PLC. ICS-CERT verified and reported that the S7-200, S7-300, S7-400, and S7-1200 are all affected by the same protocol specific security vulnerabilities.Conclusion:We need secure protocols in ICS. The product vendors have the ability to make this a reality.The time has come for experts around the ICS community to come together and make the necessary changes to insure a safer environment for all those affected. That means everyone in the world who lives near or works in a factory or a power plant!When vendors misrepresent vulnerability information, their customers cannot properly assess the risk to their operations. Given Siemens ' public statements, it is hard to imagine the company taking the lead in ICS security. If trust is an important buying criteria, other vendors in this industry, such as GE and Rockwell, have an opportunity to set an example and gain market share in the future.供应商对漏洞信息的披露,不应该成为一个让安全研究人员或供应商痛苦的过程。
Yunnan Ethnic pattern in Packaging DesignAbstract: Art is a folk Mother of the arts,is the source of the new art, From which to draw a strong tradition of high—grade Nutrition。
The persons belonging to national folk arts Ethnic patterns,are folk arts Intraoperative a gem, its development Research,and with the means of modern art,art wind Grid,professional skills combine to form a unique Style and features a modern design There are important applications,this paper focuses on Minority Folk pattern in modern packaging design Meter applications are discussed.Keywords: Yunnan Ethnic. Pattern。
Packaging Design.IntroductionYunnan is a multi-ethnic province, Here multiply survive the Han, Yi, Bai More than twenty families, Zhuang, Miao, Dai, etc。
Nation. Long history of various ethnic groups in Yunnan Province, the source is far Long, creating a rich and colorful Folk art。
外文文献A marketer’s guide to behavioral economicsApirl.2010 • Ned Welch • McKinsey QuarterlyMarketers have been applying behavioral economics-often unknowingly for years. A more systematic approach can unlock significant value.Long before behavioral eco nomics had a name, marketers were using it. “Three for the price of two” offers and extended-payment layaway plans became widespread because they worked—not because marketers had run scientific studies showing that people prefer a supposedly free incentive to an equivalent price discount or that people often behave irrationally when thinking about future consequences. Yet despite marketing’s inadvertent leadership in using principles of behavioral economics, few companies use them in a systematic way. In this article, we highlight four practical techniques that should be part of every marketer’s tool kit.1. Make a product’s cost less painfulIn almost every purchasing decision, consumers have the option to do nothing: they can always save their money for an other day. That’s why the marketer’s task is not just to beat competitors but also to persuade shoppers to part with their money in the first place. According to economic principle, the pain of payment should be identical for every dollar we spend. In marketing practice, however, many factors influence the way consumers value a dollar and how much pain they feel upon spending it.Retailers know that allowing consumers to delay payment can dramatically increase their willingness to buy. One reason delayed payments work is perfectly logical: the time value of money makes future payments less costly than immediate ones. But there is a second, less rational basis for this phenomenon. Payments, like all losses, are viscerally unpleasant. But emotions experienced in the present—now—are especially important. Even small delays in payment can soften the immediate sting of parting with your money and remove an important barrier to purchase.Another way to minimize the pain of payment is to understand the ways “mental a ccounting” affects decision making. Consumers use different mental accounts for money they obtain from different sources rather than treating every dollar they own equally, as economists believe they do, or should. Commonly observed mental accounts include windfall gains, pocket money, income, and savings. Windfall gains and pocket money are usually the easiest for consumers to spend. Income is less easy to relinquish, and savings the most difficult of all.Technology creates new frontiers for harnessing mental accounting to benefit both consumers and marketers. A credit card marketer, for instance, could offer a Web-based or mobile-device application that gives consumers real-time feedback on spending against predefined budget and revenue categories—green, say, for below budget, red for above budget, and so on. The budget-conscious consumer is likely to find value in such accounts (although they are not strictly rational) and to concentrate spending on a card that makes use of them. This would not only incre ase the issuer’s interchange fees andfinancing income but also improve the issuer’s view of its customers’ overall financial situation. Finally, of course, such an application would make a genuine contribution to these consumers’ desire to live within the ir means.2. Harness the power of a default optionThe evidence is overwhelming that presenting one option as a default increases the chance it will be chosen. Defaults—what you get if you don’t actively make a choice—work partly by instilling a perception of ownership before any purchase takes place, because the pleasure we derive from gains is less intense than the pain from equivalent losses. When we’re “given” something by default, it becomes more valued than it would have been otherwise—and we are more loath to part with it.Savvy marketers can harness these principles. An Italian telecom company, for example, increased the acceptance rate of an offer made to customers when they called to cancel their service. Originally, a script informed them that they would receive 100 free calls if they kept their plan. The script was reworded to say, “We have already credited your account with 100 calls—how could you use those?” Many customers did not want to give up free talk time they felt they already owned.Defaults work best when decision makers are too indifferent, confused, or conflicted to consider their options. That principle is particularly relevant in a world that’s increasingly awash with choices—a default eliminates the need to make a decision. The default, however, must also be a good choice for most people. Attempting to mislead customers will ultimately backfire by breeding distrust.3. Don’t overwhelm consumers with choiceWhen a default option isn’t possible, marketers must be wary of generating “ch oice overload,” which makes consumers less likely to purchase. In a classic field experiment, some grocery store shoppers were offered the chance to taste a selection of 24 jams, while others were offered only 6. The greater variety drew more shoppers to sample the jams, but few made a purchase. By contrast, although fewer consumers stopped to taste the 6 jams on offer, sales from this group were more than five times higher.Large in-store assortments work against marketers in at least two ways. First, these choices make consumers work harder to find their preferred option, a potential barrier to purchase. Second, large assortments increase the likelihood that each choice will become imbued with a “negative halo”—a heightened awareness that every option requires you to forgo desirable features available in some other product. Reducing the number of options makes people likelier not only to reach a decision but also to feel more satisfied with their choice.4. Position your preferred option carefullyEconomists assume that everything has a price: your willingness to pay may be higher than mine, but each of us has a maximum price we’d be willing to pay. How marketers position a product, though, can change the equation. Consider the experience of the jewelry sto re owner whose consignment of turquoise jewelry wasn’t selling. Displaying it more prominently didn’t achieve anything, nor did increased efforts by her sales staff. Exasperated, she gave her sales manager instructions to mark the lot down “x½” and departed on a buying trip. On her return, she found that the manager misread the note and had mistakenly doubled the price of the items—and sold the lot.2 In this case,shoppers almost certainly didn’t base their purchases on an absolute maximum price. Instead, t hey made inferences from the price about the jewelry’s quality, which generated a context-specific willingness to pay.The power of this kind of relative positioning explains why marketers sometimes benefit from offering a few clearly inferior options. Eve n if they don’t sell, they may increase sales of slightly better products the store really wants to move. Similarly, many restaurants find that the second-most-expensive bottle of wine is very popular—and so is the second-cheapest. Customers who buy the former feel they are getting something special but not going over the top. Those who buy the latter feel they are getting a bargain but not being cheap. Sony found the same thing with headphones: consumers buy them at a given price if there is a more expensive option—but not if they are the most expensive option on offer.Another way to position choices relates not to the products a company offers but to the way it displays them. Our research suggests, for instance, that ice cream shoppers in grocery stores look at the brand first, flavor second, and price last. Organizing supermarket aisles according to way consumers prefer to buy specific products makes customers both happier and less likely to base their purchase decisions on price—allowing retailers to sell higher-priced, higher-margin products. (This explains why aisles are rarely organized by price.) For thermostats, by contrast, people generally start with price, then function, and finally brand. The merchandise layout should therefore be quite different.Marketers have long been aware that irrationality helps shape consumer behavior. Behavioral economics can make that irrationality more predictable. Understanding exactly how small changes to the details of an offer can influence the way people react to it is crucial to unlocking significant value—often at very low cost.不可或缺的营销四技巧多年来,营销商一直在运用行为经济学,但往往是不自觉地运用。
员工激励理论外文文献及翻译员工激励理论外文文献及翻译One-to-one-management companiesare run -- in a timely inversion of John Adams's ideal -- as organizations of men (and women), not of laws. Nonetheless, a few laws, or at least cultural traits, appear to govern many such organizations. Together those traits create an environment where employees' needs are known, sometimes anticipated, and served, justas customers' needs are known, sometimes anticipated, and served in CRM-focused organizations. What follows is a look at the rules by which one-to-one-management companies operate[2].3.2 It's All in the DetailHow do you build morale and a sense of corporate responsibility? In surprisingly small ways. Standing in the kitchen at Eze Castle Software, CEO Sean McLaughlin watches as one of his programmers sets milk and cookies on a table. It's 2:30 on a Wednesday afternoon. "Hang on, Parvathy," McLaughlin says to the employee as he opens the refrigerator door and pulls out an apple pie. "Put this out, too." When Parvathy is done in the kitchen, she flips some switches, andthe lights flicker all over the fifth floor. Almost instantly, programmers leave their cubicles and make a beeline for thekitchen.Then Parvathy jogs up a staircase and flashes the lights on the sixth floor. Account managers, salespeople, and assorted techies come downstairs and join their colleagues in the kitchen. When they arrive, McLaughlin is at the center of the steadily building crowd, dishing out the pie. Around him conversations spring up between colleagues who work in different departments. The topics range from work to social life to politics. Ten minutes later the lights flash again and it's back to work for the 90 employees in the Boston office of Eze.What's so remarkable about the staff of a developer of securities-trading software with $13 million in revenues taking daily milk-and-cookies breaks? Not much -- until you consider that the practice is part of a cultural shift engineered by the CEO, a shift that has profoundly changed the way he and his employees relate toone another. Perhaps more significant, the changes have affected how employees deal with the myriad little details that keep the six-year-old company grounded.原文请找腾讯3249114六-维^论,文.网Eze's transformation began last year, when McLaughlin realized to his chagrin that his once small and collegial company had -- because of accelerated growth -- begun acting like a large corporation. His employees no longer knew one another, and he himself was increasingly vague about who some of the new faces were. "In the early days I could get to know everyone," saysMcLaughlin.However, the CEO was most annoyed by the fact that his employees -- both old and new -- were beginning to behave with large-company sloppiness rather than with start-up frugality. "Back when we were small, if someone sent a FedEx, we all knew how much that was costing the company," McLaughlin says. He recalls noticing that things were changing when one employee approved paying a contractor $100 a month to water the company's five plants. Then there were rising charges from the company's Internet service provider because of excessive traffic on the corporate T1 line. The cause? Employees were downloading MP3 files to listen to music during the workday. It frustrated McLaughlin that employees weren't taking responsibilityfor their actions and for the ways in which those actions affected the company's bottom line[2].But last summer two things happened that spurred McLaughlin to make some changes.First, the Boston office lost both of its administrative assistants. One assistant quit and the other left a few weeks later. The two had stocked the supply room, sorted the mail, and welcomed visitors. The dual departures wreaked havoc. "The kitchen was out of milk, we didn't have any pens in the supply cabinet, the reception area looked like crap," McLaughlin says.Then came the World Trade Center attacks. Though McLaughlin had long been brooding on how to reverse Eze's fat-cat habits, he had yet to act. He says that 9-11, and the "what are my priorities" thinking it engendered, "created an environment where it was easy for me to initiate a change."The change he had in mind was inspired by a visit to his daughter's kindergarten class. There he saw how the teacher divided the cleanup tasks among the children by posting a rotating "chore wheel." McLaughlin thought the wheel was just the thing to clean up the mess and teach his employees a little corporate responsibility. But he also wanted to institute something that would help improve camaraderie. That's where another kindergarten institution, the milk-and-cookies breaks, came in. "I wanted to build relationships among the employees, to make them feel more company morale," he says.上一页[1] [2] [3] [4] [5] [6] [7] [8] [9] 下一页。
中英文对照外文翻译(文档含英文原文和中文翻译)Bridge research in EuropeA brief outline is given of the development of the European Union, together withthe research platform in Europe. The special case of post-tensioned bridges in the UK is discussed. In order to illustrate the type of European research being undertaken, an example is given from the University of Edinburgh portfolio: relating to the identification of voids in post-tensioned concrete bridges using digital impulse radar.IntroductionThe challenge in any research arena is to harness the findings of different research groups to identify a coherent mass of data, which enables research and practice to be better focused. A particular challenge exists with respect to Europe where language barriers are inevitably very significant. The European Community was formed in the 1960s based upon a political will within continental Europe to avoid the European civil wars, which developed into World War 2 from 1939 to 1945. The strong political motivation formed the original community of which Britain was not a member. Many of the continental countries saw Britain’s interest as being purelyeconomic. The 1970s saw Britain joining what was then the European Economic Community (EEC) and the 1990s has seen the widening of the community to a European Union, EU, with certain political goals together with the objective of a common European currency.Notwithstanding these financial and political developments, civil engineering and bridge engineering in particular have found great difficulty in forming any kind of common thread. Indeed the educational systems for University training are quite different between Britain and the European continental countries. The formation of the EU funding schemes —e.g. Socrates, Brite Euram and other programs have helped significantly. The Socrates scheme is based upon the exchange of students between Universities in different member states. The Brite Euram scheme has involved technical research grants given to consortia of academics and industrial partners within a number of the states—— a Brite Euram bid would normally be led by partners within a number of the statesan industrialist.In terms of dissemination of knowledge, two quite different strands appear to have emerged. The UK and the USA have concentrated primarily upon disseminating basic research in refereed journal publications: ASCE, ICE and other journals. Whereas the continental Europeans have frequently disseminated basic research at conferences where the circulation of the proceedings is restricted.Additionally, language barriers have proved to be very difficult to break down. In countries where English is a strong second language there has been enthusiastic participation in international conferences based within continental Europe —e.g. Germany, Italy, Belgium, The Netherlands and Switzerland. However, countries where English is not a strong second language have been hesitant participants }—e.g. France.European researchExamples of research relating to bridges in Europe can be divided into three types of structure:Masonry arch bridgesBritain has the largest stock of masonry arch bridges. In certain regions of the UK up to 60% of the road bridges are historic stone masonry arch bridges originally constructed for horse drawn traffic. This is less common in other parts of Europe as many of these bridges were destroyed during World War 2.Concrete bridgesA large stock of concrete bridges was constructed during the 1950s, 1960s and 1970s. At the time, these structures were seen as maintenance free. Europe also has a large number of post-tensioned concrete bridges with steel tendon ducts preventing radar inspection. This is a particular problem in France and the UK.Steel bridgesSteel bridges went out of fashion in the UK due to their need for maintenance as perceived in the 1960s and 1970s. However, they have been used for long span and rail bridges, and they are now returning to fashion for motorway widening schemes in the UK.Research activity in EuropeIt gives an indication certain areas of expertise and work being undertaken in Europe, but is by no means exhaustive.In order to illustrate the type of European research being undertaken, an example is given from the University of Edinburgh portfolio. The example relates to the identification of voids in post-tensioned concrete bridges, using digital impulse radar.Post-tensioned concrete rail bridge analysisOve Arup and Partners carried out an inspection and assessment of the superstructure of a 160 m long post-tensioned, segmental railway bridge in Manchester to determine its load-carrying capacity prior to a transfer of ownership, for use in the Metrolink light rail system..Particular attention was paid to the integrity of its post-tensioned steel elements.Physical inspection, non-destructive radar testing and other exploratory methods were used to investigate for possible weaknesses in the bridge.Since the sudden collapse of Ynys-y-Gwas Bridge in Wales, UK in 1985, there has been concern about the long-term integrity of segmental, post-tensioned concrete bridges which may b e prone to ‘brittle’ failure without warning. The corrosion protection of the post-tensioned steel cables, where they pass through joints between the segments, has been identified as a major factor affecting the long-term durability and consequent strength of this type of bridge. The identification of voids in grouted tendon ducts at vulnerable positions is recognized as an important step in the detection of such corrosion.Description of bridgeGeneral arrangementBesses o’ th’ Barn Bridge is a 160 m long, three span, segmental, post-tensionedconcrete railway bridge built in 1969. The main span of 90 m crosses over both the M62 motorway and A665 Bury to Prestwick Road. Minimum headroom is 5.18 m from the A665 and the M62 is cleared by approx 12.5 m.The superstructure consists of a central hollow trapezoidal concrete box section 6.7 m high and 4 m wide. The majority of the south and central spans are constructed using 1.27 m long pre-cast concrete trapezoidal box units, post-tensioned together. This box section supports the in site concrete transverse cantilever slabs at bottom flange level, which carry the rail tracks and ballast.The center and south span sections are of post-tensioned construction. These post-tensioned sections have five types of pre-stressing:1. Longitudinal tendons in grouted ducts within the top and bottom flanges.2. Longitudinal internal draped tendons located alongside the webs. These are deflected at internal diaphragm positions and are encased in in site concrete.3. Longitudinal macalloy bars in the transverse cantilever slabs in the central span .4. Vertical macalloy bars in the 229 mm wide webs to enhance shear capacity.5. Transverse macalloy bars through the bottom flange to support the transverse cantilever slabs.Segmental constructionThe pre-cast segmental system of construction used for the south and center span sections was an alternative method proposed by the contractor. Current thinkingire suggests that such a form of construction can lead to ‘brittle’ failure of the ententire structure without warning due to corrosion of tendons across a construction joint,The original design concept had been for in site concrete construction.Inspection and assessmentInspectionInspection work was undertaken in a number of phases and was linked with the testing required for the structure. The initial inspections recorded a number of visible problems including:Defective waterproofing on the exposed surface of the top flange.Water trapped in the internal space of the hollow box with depths up to 300 mm.Various drainage problems at joints and abutments.Longitudinal cracking of the exposed soffit of the central span.Longitudinal cracking on sides of the top flange of the pre-stressed sections.Widespread sapling on some in site concrete surfaces with exposed rusting reinforcement.AssessmentThe subject of an earlier paper, the objectives of the assessment were:Estimate the present load-carrying capacity.Identify any structural deficiencies in the original design.Determine reasons for existing problems identified by the inspection.Conclusion to the inspection and assessmentFollowing the inspection and the analytical assessment one major element of doubt still existed. This concerned the condition of the embedded pre-stressing wires, strands, cables or bars. For the purpose of structural analysis these elements、had been assumed to be sound. However, due to the very high forces involved,、a risk to the structure, caused by corrosion to these primary elements, was identified.The initial recommendations which completed the first phase of the assessment were:1. Carry out detailed material testing to determine the condition of hidden structural elements, in particularthe grouted post-tensioned steel cables.2. Conduct concrete durability tests.3. Undertake repairs to defective waterproofing and surface defects in concrete.Testing proceduresNon-destructi v e radar testingDuring the first phase investigation at a joint between pre-cast deck segments the observation of a void in a post-tensioned cable duct gave rise to serious concern about corrosion and the integrity of the pre-stress. However, the extent of this problem was extremely difficult to determine. The bridge contains 93 joints with an average of 24 cables passing through each joint, i.e. there were approx. 2200 positions where investigations could be carried out. A typical section through such a joint is that the 24 draped tendons within the spine did not give rise to concern because these were protected by in site concrete poured without joints after the cables had been stressed.As it was clearly impractical to consider physically exposing all tendon/joint intersections, radar was used to investigate a large numbers of tendons and hence locate duct voids within a modest timescale. It was fortunate that the corrugated steel ducts around the tendons were discontinuous through the joints which allowed theradar to detect the tendons and voids. The problem, however, was still highly complex due to the high density of other steel elements which could interfere with the radar signals and the fact that the area of interest was at most 102 mm wide and embedded between 150 mm and 800 mm deep in thick concrete slabs.Trial radar investigations.Three companies were invited to visit the bridge and conduct a trial investigation. One company decided not to proceed. The remaining two were given 2 weeks to mobilize, test and report. Their results were then compared with physical explorations.To make the comparisons, observation holes were drilled vertically downwards into the ducts at a selection of 10 locations which included several where voids were predicted and several where the ducts were predicted to be fully grouted. A 25-mm diameter hole was required in order to facilitate use of the chosen horoscope. The results from the University of Edinburgh yielded an accuracy of around 60%.Main radar sur v ey, horoscope verification of v oids.Having completed a radar survey of the total structure, a baroscopic was then used to investigate all predicted voids and in more than 60% of cases this gave a clear confirmation of the radar findings. In several other cases some evidence of honeycombing in the in site stitch concrete above the duct was found.When viewing voids through the baroscopic, however, it proved impossible to determine their actual size or how far they extended along the tendon ducts although they only appeared to occupy less than the top 25% of the duct diameter. Most of these voids, in fact, were smaller than the diameter of the flexible baroscopic being used (approximately 9 mm) and were seen between the horizontal top surface of the grout and the curved upper limit of the duct. In a very few cases the tops of the pre-stressing strands were visible above the grout but no sign of any trapped water was seen. It was not possible, using the baroscopic, to see whether those cables were corroded.Digital radar testingThe test method involved exciting the joints using radio frequency radar antenna: 1 GHz, 900 MHz and 500 MHz. The highest frequency gives the highest resolution but has shallow depth penetration in the concrete. The lowest frequency gives the greatest depth penetration but yields lower resolution.The data collected on the radar sweeps were recorded on a GSSI SIR System 10.This system involves radar pulsing and recording. The data from the antenna is transformed from an analogue signal to a digital signal using a 16-bit analogue digital converter giving a very high resolution for subsequent data processing. The data is displayed on site on a high-resolution color monitor. Following visual inspection it isthen stored digitally on a 2.3-gigabyte tape for subsequent analysis and signal processing. The tape first of all records a ‘header’ noting the digital radar settings together with the trace number prior to recording the actual data. When the data is played back, one is able to clearly identify all the relevant settings —making for accurate and reliable data reproduction.At particular locations along the traces, the trace was marked using a marker switch on the recording unit or the antenna.All the digital records were subsequently downloaded at the University’s NDT laboratory on to a micro-computer.(The raw data prior to processing consumed 35 megabytes of digital data.) Post-processing was undertaken using sophisticated signal processing software. Techniques available for the analysis include changing the color transform and changing the scales from linear to a skewed distribution in order to highlight、突出certain features. Also, the color transforms could be changed to highlight phase changes. In addition to these color transform facilities, sophisticated horizontal and vertical filtering procedures are available. Using a large screen monitor it is possible to display in split screens the raw data and the transformed processed data. Thus one is able to get an accurate indication of the processing which has taken place. The computer screen displays the time domain calibrations of the reflected signals on the vertical axis.A further facility of the software was the ability to display the individual radar pulses as time domain wiggle plots. This was a particularly valuable feature when looking at individual records in the vicinity of the tendons.Interpretation of findingsA full analysis of findings is given elsewhere, Essentially the digitized radar plots were transformed to color line scans and where double phase shifts were identified in the joints, then voiding was diagnosed.Conclusions1. An outline of the bridge research platform in Europe is given.2. The use of impulse radar has contributed considerably to the level of confidence in the assessment of the Besses o’ th’ Barn Rail Bridge.3. The radar investigations revealed extensive voiding within the post-tensioned cable ducts. However, no sign of corrosion on the stressing wires had been foundexcept for the very first investigation.欧洲桥梁研究欧洲联盟共同的研究平台诞生于欧洲联盟。
论文外文文献翻译以下是一篇700字左右的论文外文文献翻译:原文题目:The Role of Artificial Intelligence in Medical Diagnostics: A Review原文摘要:In recent years, there has been a growing interest in the use of artificial intelligence (AI) in the field of medical diagnostics. AI has the potential to improve the accuracy and efficiency of medical diagnoses, and can assist clinicians in making treatment decisions. This review aims to examine the current state of AI in medical diagnostics, and discuss its advantages and limitations. Several AI techniques, including machine learning, deep learning, and natural language processing, are discussed. The review also examines the ethical and legal considerations associated with the use of AI in medical diagnostics. Overall, AI has shown great promise in improving medical diagnostics, but further research is needed to fully understand its potential benefits and limitations.AI在医学诊断中发挥的作用:一项综述近年来,人工智能(AI)在医学诊断领域的应用引起了越来越多的关注。
毕业论文外文文献翻译要求
一、翻译的外文文献可以是一篇,也可以是两篇,但英文字符要求不少于2万
二、翻译的外文文献应主要选自学术期刊、学术会议的文章、有关著作及其他相关材料,应与毕业论文(设计)主题相关,并在中文译文首页用“脚注”形式注明原文作者及出处,外文原文后应附中文译文。
三、中文译文的基本撰写格式为:
1.题目:采用三号、黑体字、居中打印;
2.正文:采用小四号、宋体字,行间距一般为固定值20磅,标准字符间距。
页边距为左3cm,右2.5cm,上下各2.5cm,页面统一采用A4纸。
四、英文的基本撰写格式为:
1.题目:采用三号、Times New Roman字、加黑、居中打印
2.正文:采用小四号、Times New Roman字。
行间距一般为固定值20磅,标准字符间距。
页边距为左3cm,右2.5cm,上下各2.5cm,页面统一采用A4纸.
3.脚注:五号,Times New Roman,顺序为作者.题目.出处,
五、封面格式由学校统一制作(注:封面上的“翻译题目”指中文译文的题目,封面中文小四号宋体,英文小四号Times New Roman),
六、装订:左侧均匀装订,上下共两个钉,并按“封面、外文原文、译文”的顺序统一装订。
七、忌自行更改表格样式
大连工业大学艺术与信息工程学院
毕业设计(论文)外文文献
外文题目
翻译题目
系别
专业班级
学生姓名
指导教师
大连工业大学艺术与信息工程学院
毕业设计(论文)开题报告
题目名称
系别
专业班级
学生姓名
指导教师
开题报告日期年月日。