文档库 最新最全的文档下载
当前位置:文档库 › 外文原文-罗永慧

外文原文-罗永慧

外文原文-罗永慧
外文原文-罗永慧

Android Technology

1. Android Introduction

Android is a kind of open-source linux-based operating system, mainly used in portable devices. There is not yet a unified Chinese name, the Chinese mainland more people use the "Android" or "Ann-induced." Android operating system was originally developed by Andy Rubin, initially mainly supported mobile phones. Google acquired in 2005 by injection, and the formation of the open development of improved Handset Alliance, and gradually extended to the tablet computers and other fields. Android's main competitor is Apple's iOS and RIM's Blackberry OS. First quarter of 2011, Android's market share for the first time in the world over Symbian, ranking first in the world. February 2012 data, Android accounted for 52.5% share of the global smartphone operating system market, China's market share was 68.4%.

Android system architecture and other operating systems, using a layered architecture. android is divided into four layers, respectively, from the top to the lower layer of the application, the application framework layer, linux system runtime layer and the core layer.

Android is based on Linux as the core of mobile operating platform, operating as an open system, with the rapid development of Android, now allows developers to use multiple programming languages to develop Android applications, rather than previously only Android application development using Java single situation, and thus welcomed by many developers, an open operating system in the true sense.

In Android, developers can use Java as a programming language to develop applications that can also NDK using C / C + + as the programming language to develop applications that can be used SL4A to use various other scripting programming language (eg: python , lua, tcl, php, etc.), as well as others, such as: QT (qt for android), some of the Mono (mono for android) and other well-known programming framework also began to support Android programming, even through MonoDroid, developers can also use C # as programming language to develop applications. In addition, Google also released in 2009 especially for beginners Android Simple language, the language is similar to the Basic language. In the web programming language, JavaScript, ajax, HTML5, jquery, sencha, dojo, mobl, PhoneGap, etc. have been developed to support Android.

2. Applications

Early Android application development, usually through Android SDK uses Java as a programming language to develop applications (Android software development kit) next, but by different software development kit, the programming language used is also different.

For example, developers can Android NDK (Android Native Development Kit) using C language or C + + language as a programming language for developing applications. Meanwhile Google also launched a program for beginners to use Simple language, which is similar to Microsoft's Visual Basic language. In addition, Google has also launched Google App Inventor development tools, development tools that can quickly build applications that facilitate novice developers.

3. Java development

Android supports the use of Java as a programming language to develop applications, while Android's Java development from the interface to function, there are endless variations. Taking into account the efficiency and resource utilization Java virtual machine, redesigned the Google Android's Java, in order to improve efficiency and reduce resource consumption, and thus with different J2ME.

Java Virtual Machine (JVM) specification for a computer device, using different ways (software or hardware) to be achieved. Compile the virtual machine instruction set and instruction set of the microprocessor compiling very similar. Java Virtual Machine includes a bytecode instruction set, a set of registers, a stack, a garbage heap and a storage method domain.

Java Virtual Machine (JVM) is a hypothetical computer can run Java code. Just describe the interpreter ported to the JVM specification based on a specific computer, we can guarantee through any Java code can be compiled to run on the system.

Java virtual machine is an imaginary machine on the actual computer is achieved by software emulation. Java virtual machine has its own imaginary hardware, such as processors, stack, registers, etc., but also has a corresponding instruction.

A very important feature of the Java language is platform independent. The use of the Java virtual machine is the key to achieving this characteristic. The general level language if you want to run on different platforms, at least needs to be compiled into a different object code. The introduction of the Java virtual machine language, Java language does not need to re-compile and run on different platforms. Java language using the Java Virtual Machine mode shielded with concrete platform-related information, making the Java language compiler only generates Java virtual machine running on the object code (bytecode), can be used without modification on multiple platforms operation. In the implementation of the Java Virtual Machine bytecode interpreted bytecode into machine instructions to perform specific platform.

Official google Android virtual machine is produced to facilitate developers using Android environment for development. Allows you to install and run the Android

system simulation on the PC side (on the computer). And can be performed in almost any computer terminal operations can be performed on the phone, you can even connect your computer like a mobile phone, Mobile Assistant is detected, you can simulate all the official version of the Android system, and there are a variety of styles to choose skin and screen . However, due to the need for cross-platform windows computer, so the effect of simulated and virtual machine performance can be no arm machines up and running good.

4. C / C + + development

Android only support the early development of Java as a programming language for developing applications, thus making the other language developers balk. April 2010, Google officially developers released the Android NDK, NDK allows developers to use C / C + + as the programming language for Android develop applications, the first edition of the NDK allows developers to see the C / C + + hope in Android Development .

However, the current version of the NDK, there are many limitations in functionality: NDK does not provide for the application life cycle maintenance; NDK Android system does not provide support for a large number of system events; interactive interface as an application for the UI API , NDK version also does not offer current. But relative to the first edition of NDK, NDK has now made many significant improvements.

Thus, NDK still need to improve and develop, I believe in the future with the development of the NDK, NDK can do more and better.

4.1 hardware abstraction layer

Android's HAL (hardware abstraction layer) is able to provide a closed-source hardware driver module form. HAL's purpose is to put Android framework and the Linux kernel are separated, so Android is not to place undue reliance on Linux kernel, in order to achieve the concept of kernel independent, but also to the development of Android framework can be developed without considering achieved under the premise of the driver. HAL stub is a proxy (proxy) concept, stub is * form. So file exists. Stub to HAL "provide" manipulation functions (operations), obtained by the Android runtime stub of operations to HAL, then these operations callback function. HAL contains a lot of stub (proxy). Runtime Suffice it to say, "type", that module ID, you can obtain the operating functions.

4.2 kernel

Android is running on the Linux kernel, but it is not GNU / Linux. Because in general GNU / Linux in support functions, Android mostly do not support, including Cairo, X11, Alsa, FFmpeg, GTK, Pango and so Glibc been removed. Android Youyi bionic replace Glibc, to replace Skia Cairo, then replace opencore FFmpeg and so on. Android in order to achieve commercial application, you must remove the partially

constrained by a grant GNU GPL, for example, the driver moved to Android userspace, making Linux driver with the Linux kernel completely separate. bionic / libc / kernel / not a standard kernel header files. Android's kernel header is the use of tools generated by the Linux kernel header, the idea is to keep a constant, data structures and macros.

4.3 security permissions mechanism

Android permission itself is a separate operating system. In such operating system, each application has a unique identity of an operation system (Linux user ID and group ID). Each part of the system were also using separate means of identification. Linux is one such application and the application, the application and the system is isolated. System provides more security features by permission mechanism. Permissions can be restricted to a particular process, specific actions, each URI can also limit access to specific data segment.

Android security architecture is the core idea is that in the default settings for all applications no authority for a greater impact on other applications, the operating system or user. This includes reading and writing user privacy data (contacts, or e-mail), other applications to read and write files, or block access to network devices such as standby.

When you install the application, mentioned in the inspection procedures signing authority, and after the user confirms, the package installer application will be given permission. From the user perspective, an Android application usually requires the following permissions: make calls, send SMS or MMS, modify / delete SD card, read the contact information, read the letter bearing the schedule, write the agenda data read phone status or identification code, accurate (based on GPS) location, a blurred (based access) location, creating a Bluetooth connection, full access to the Internet to view the network status, view WiFi, to avoid phone standby modify global system settings, read the sync settings, boot from the start, restart other applications, terminate running applications, setting preferences, applications, vibration control, shooting pictures.

An application should be provided in accordance with their capabilities, requirements, and reasonable access. Users can also analyze the required permissions an app, so simple determination of this application is safe. If an application is a stand-alone with no advertising, no need to download any additional content, it requires access to the network is more suspicious. Edit this paragraph system components.

Android developers are four major components: Activities (Activity): used to represent functions. Service (Service): running in the background and does not provide interface presentation. Broadcast receiver (BroadcastReceiver): means for receiving a broadcast. Content providers (Content Provider): support for multiple applications to store and retrieve data, the equivalent of a database.

4.3.1 Activity

In Android, Activity is the fundamental of all programs, processes all the programs are being run in the Activity, Activity can be regarded as the most frequently

encountered by the developer, which is one of the most basic Android module. Android program in which, Activity generally represents a screen phone screen. If the phone compared to a browser, then Activity is equivalent to a web page. In the Activity which can add some Button, Check box and other controls. Activity can see the concept and the concept is quite similar to the web.

General Android application is composed of multiple Activity composed. You can jump between each other multiple Activity, for example, pressing a button Button, may jump to other Activity. Jump page is somewhat different, Jump Activity among possible return values, for example, from Activity A Jump to Activity B, then the end of the run when the Activity B, there is a return may give Activity A value. Doing so in many cases is quite convenient.

An Activity is an application component that provides a screen, the user can use to interact with in order to complete a task, such as dial-up, take pictures, send email, look at the map. Each activity is given a window, the user interface can be drawn on top. Typically the window to fill the screen, but can also be smaller than the screen and float on top of other windows.

An application is usually composed by a number of activities, they are usually loosely coupled relationships. Typically, an application activity is designated as "main" activity, when you first start the application presented to the user when that activity. Each activity can then start another activity to perform different actions. Each time an activity starts, the previous activity stopped, but the system retains activity in a stack ("back stack"). When a new activity is started, it is pushed onto the stack, get user focus. Back Stack meets simple "last in, first out" principle, so that when the user completes the current activity and then click the back button, it is popped off the stack (and destroyed), and then restore the previous activity.

When an activity because of new activity starts and stops, it was notified of the status change by activity lifecycle callbacks. There are many callbacks may receive an activity, from its own state change - regardless of the system that created it, stop it, restore it, destroy it - and provide opportunities for you to complete each callback fit the state designated job. For example, when stopped, your activity should release any large objects, such as network database connections. When the activity recovery, you can re-acquire the necessary resources and resume the interrupted action. These state transitions are part of the life cycle of activity.

4.3.2 Service

It is similar with the level of Activity, but he can not run their own, only to run in the background, and you can interact with other components. Service is no longer the life cycle of the interface code. Service is a program that can run for a long time, but it does not have a user interface. That's a bit boring, look at an example. Open a music player program, this time if you want to access, then open the Android browser, although this time the browser has entered the program, however, did not stop playing the song, but in the background, followed by a continuing one first playback. In fact,

this player is playing music from the Service control. Of course, this can also play music Service stopped, for example, when a playlist of songs inside the end, or the user stops pressing the shortcut key, etc. music player. Service can be applied and used in multiple occasions, such as when the user starts to play multimedia other Activity program at this time to continue playing in the background, such as changes in the detection of SD card file, and then change the geographic information or records in the background, such as location etc. In short service Well, always hidden in behind the.

Open the Service in two ways:

Context.startService (): Service will experience onCreate -> onStart (if the Service has not yet running, the android first call onCreate () and then call onStart (); If the Service has been run, only call onStart (), so a Service's onStart method may be repeated several times to call); StopService when direct onDestroy, if the caller does not own exit and then call StopService, Service will run in the background. Service after the caller can then start up and shut down by stopService Service. Note that multiple calls Context.startservice () will not be nested (even if there is a corresponding onStart () method is called), it is the same no matter how many times the service is started, once the call Context.stopService () or StopSelf () he will be stopped. Additional information: passed to StartService (Intent object 0 is passed to onStart () method call sequence is:. OnCreate -> onStart (can be called multiple times) -> onDestroy.

Context.bindService (): Service will experience onCreate () -> onBind (), onBind will be returned to the client a IBind interface instance, IBind method allows the client callback services, such as to obtain the status of running or other Service operation. This time the caller (Context, such as Activity) and the Service will be bound together, Context quit, Srevice will call onUnbind -> onDestroyed corresponding exits, the so-called bundled together on a common survival.

4.3.3 registered BroadcastReceiver in two ways:

(1) be registered in the AndroidManifest.xml. This method has a feature even if your application has been closed, but this will still be accepted BroadcastReceiver object out of the broadcast, that is to say, whether you're on or off the application belong to the active state can receive events broadcast; (2) in the code registration broadcasts.

The first, commonly known as static registration, second commonly known as dynamic registration, registered BroadcastReceiver the difference between the two: Dynamic registration flexible than the static registration. Experimental results show: When the static when registering a BroadcastReceiver, whether or not the application is started. Can accept a corresponding broadcast.

Dynamic registration time, if you do not perform unregisterReceiver (); method unregister, with static is the same. However, if the implementation of the method, when later executed, it can not accept the broadcast.

4.3.4 Content Provider

Content Provider is a third-party application data access solutions provided by Android.

In Android, data protection is very strict, in addition to the data on the SD card, held by an application databases, files, and much more, are not allowed direct access to the other. Database on Android which is private, of course, these data include data and database data files and other types of data.

The database can not be set WORLD_READABLE, each database can only create its package access, which means that only the process of creating a database can access it. If you need to transfer data between processes, you can use AIDL / Binder or create a ContentProvider, but not across process / packet boundaries to use the database directly.

A Content Provider class implements a standard set of methods interface, which allows other applications to save or read the various data types of the Content Provider. That is, a program can a Content Provider abstract interface will expose their data to go through to achieve.

Outsiders can not see, they do not see this application which exposed how the data is stored in the application, or file storage or use, or access to the database through the online store, all these are not important, important is that the outside world can be this set of standards and a unified interface and program data to deal with, the program can read the data, you can delete the data of the program.

[English] Mel translation of Chao

Android 2 Advanced Programming (2nd Edition)

关于供应链的毕业论文外文文献翻译及原文

毕业设计(论文)外文文献翻译 文献、资料中文题目:供应链 文献、资料英文题目: 文献、资料来源: 文献、资料发表(出版)日期: 院(部): 专业: 班级: 姓名: 学号: 指导教师: 翻译日期: 2017.02.14

论文翻译 Introduction to supply chain concepts Firms can no longer effectively compete in isolation of their suppliers and other entities in the supply chain. Interest in the concept of supply chain management has steadily increased since the 1980s when companies saw the benefits of collaborative relationships within and beyond their own organization. A number of definitions have been proposed concerning the concept of “the supply chain” and its management. This paper defines the concept of the supply chain and discusses the evolution of supply chain management. The term does not replace supplier partnerships, nor is it a description of the logistics function. Industry groups are now working together to improve the integrative processes of supply chain management and accelerate the benefits available through successful implementation. The competitive importance of linking a fir m’s supply chain strategy to its overall business strategy and some practical guidelines are offered for successful supply chain management. Definition of supply chain Various definitions of a supply chain have been offered in the past several years as the concept has gained popularity. The APICS Dictionary describes the supply chain as: 1 .the processes from the initial raw materials to the ultimate consumption of the finished product linking across supplier user companies; 2 and the functions within and outside a company that enable the value chain to make products and provide services to the customer (Cox et al., 1995). Another source defines supply chain as, the network of entities through which material flows. Those entities may include suppliers, carriers, manufacturing sites, distribution centers, retailers, and customers (Lummus and Alber, 1997). The Supply Chain Council(1997) uses the definition: “The supply chain –a term increasingly used by logistics professionals – encompasses every effort involved in producing and delivering a final product, from the supplier’s supplier to the customer’s customer. Four basic processes – plan, source, make, deliver – broadly define these efforts, which include managing supply and demand, sourcing raw materials and parts, manufacturing an assembly, warehousing and inventory tracking, order entry and order management, distribution across all channels, and delivery to the customer.” Quinn (1997) defines the supply c hain as “all of those activities associated with moving goods from the raw-materials stage through to the end user. This includes sourcing and procurement, production scheduling, order processing, inventory management, transportation, warehousing, and customer service. Importantly, it also embodies the information systems so necessary to monitor all of those activities.” In addition to defining the supply chain, several authors have further defined the concept of supply chain management. As defined by Ellram and Cooper (1993), supply chain management i s “an integrating philosophy to manage the total flow of a distribution channel from supplier to ultimate customer”. Monczka and (1997) state that “inte grated supply chain management is about going from

ASP外文翻译原文

https://www.wendangku.net/doc/af2116396.html, https://www.wendangku.net/doc/af2116396.html, 是一个统一的 Web 开发模型,它包括您使用尽可能少的代码生成企业级 Web 应用程序所必需的各种服务。https://www.wendangku.net/doc/af2116396.html, 作为 .NET Framework 的一部分提供。当您编写 https://www.wendangku.net/doc/af2116396.html, 应用程序的代码时,可以访问 .NET Framework 中的类。您可以使用与公共语言运行库 (CLR) 兼容的任何语言来编写应用程序的代码,这些语言包括 Microsoft Visual Basic、C#、JScript .NET 和 J#。使用这些语言,可以开发利用公共语言运行库、类型安全、继承等方面的优点的https://www.wendangku.net/doc/af2116396.html, 应用程序。 https://www.wendangku.net/doc/af2116396.html, 包括: ?页和控件框架 ?https://www.wendangku.net/doc/af2116396.html, 编译器 ?安全基础结构 ?状态管理功能 ?应用程序配置 ?运行状况监视和性能功能 ?调试支持 ?XML Web services 框架 ?可扩展的宿主环境和应用程序生命周期管理 ?可扩展的设计器环境 https://www.wendangku.net/doc/af2116396.html, 页和控件框架是一种编程框架,它在 Web 服务器上运行,可以动态地生成和呈现 https://www.wendangku.net/doc/af2116396.html, 网页。可以从任何浏览器或客户端设备请求 https://www.wendangku.net/doc/af2116396.html, 网页,https://www.wendangku.net/doc/af2116396.html, 会向请求浏览器呈现标记(例如 HTML)。通常,您可以对多个浏览器使用相同的页,因为 https://www.wendangku.net/doc/af2116396.html, 会为发出请求的浏览器呈现适当的标记。但是,您可以针对诸如 Microsoft Internet Explorer 6 的特定浏览器设计https://www.wendangku.net/doc/af2116396.html, 网页,并利用该浏览器的功能。https://www.wendangku.net/doc/af2116396.html, 支持基于 Web 的设备(如移动电话、手持型计算机和个人数字助理 (PDA))的移动控件。

毕业设计外文翻译附原文

外文翻译 专业机械设计制造及其自动化学生姓名刘链柱 班级机制111 学号1110101102 指导教师葛友华

外文资料名称: Design and performance evaluation of vacuum cleaners using cyclone technology 外文资料出处:Korean J. Chem. Eng., 23(6), (用外文写) 925-930 (2006) 附件: 1.外文资料翻译译文 2.外文原文

应用旋风技术真空吸尘器的设计和性能介绍 吉尔泰金,洪城铱昌,宰瑾李, 刘链柱译 摘要:旋风型分离器技术用于真空吸尘器 - 轴向进流旋风和切向进气道流旋风有效地收集粉尘和降低压力降已被实验研究。优化设计等因素作为集尘效率,压降,并切成尺寸被粒度对应于分级收集的50%的效率进行了研究。颗粒切成大小降低入口面积,体直径,减小涡取景器直径的旋风。切向入口的双流量气旋具有良好的性能考虑的350毫米汞柱的低压降和为1.5μm的质量中位直径在1米3的流量的截止尺寸。一使用切向入口的双流量旋风吸尘器示出了势是一种有效的方法,用于收集在家庭中产生的粉尘。 摘要及关键词:吸尘器; 粉尘; 旋风分离器 引言 我们这个时代的很大一部分都花在了房子,工作场所,或其他建筑,因此,室内空间应该是既舒适情绪和卫生。但室内空气中含有超过室外空气因气密性的二次污染物,毒物,食品气味。这是通过使用产生在建筑中的新材料和设备。真空吸尘器为代表的家电去除有害物质从地板到地毯所用的商用真空吸尘器房子由纸过滤,预过滤器和排气过滤器通过洁净的空气排放到大气中。虽然真空吸尘器是方便在使用中,吸入压力下降说唱空转成比例地清洗的时间,以及纸过滤器也应定期更换,由于压力下降,气味和细菌通过纸过滤器内的残留粉尘。 图1示出了大气气溶胶的粒度分布通常是双峰形,在粗颗粒(>2.0微米)模式为主要的外部来源,如风吹尘,海盐喷雾,火山,从工厂直接排放和车辆废气排放,以及那些在细颗粒模式包括燃烧或光化学反应。表1显示模式,典型的大气航空的直径和质量浓度溶胶被许多研究者测量。精细模式在0.18?0.36 在5.7到25微米尺寸范围微米尺寸范围。质量浓度为2?205微克,可直接在大气气溶胶和 3.85至36.3μg/m3柴油气溶胶。

毕业设计外文翻译原文.

Optimum blank design of an automobile sub-frame Jong-Yop Kim a ,Naksoo Kim a,*,Man-Sung Huh b a Department of Mechanical Engineering,Sogang University,Shinsu-dong 1,Mapo-ku,Seoul 121-742,South Korea b Hwa-shin Corporation,Young-chun,Kyung-buk,770-140,South Korea Received 17July 1998 Abstract A roll-back method is proposed to predict the optimum initial blank shape in the sheet metal forming process.The method takes the difference between the ?nal deformed shape and the target contour shape into account.Based on the method,a computer program composed of a blank design module,an FE-analysis program and a mesh generation module is developed.The roll-back method is applied to the drawing of a square cup with the ˉange of uniform size around its periphery,to con?rm its validity.Good agreement is recognized between the numerical results and the published results for initial blank shape and thickness strain distribution.The optimum blank shapes for two parts of an automobile sub-frame are designed.Both the thickness distribution and the level of punch load are improved with the designed blank.Also,the method is applied to design the weld line in a tailor-welded blank.It is concluded that the roll-back method is an effective and convenient method for an optimum blank shape design.#2000Elsevier Science S.A.All rights reserved. Keywords:Blank design;Sheet metal forming;Finite element method;Roll-back method

本科毕业设计外文翻译(原文)

Real-time interactive optical micromanipulation of a mixture of high- and low-index particles Peter John Rodrigo, Vincent Ricardo Daria and Jesper Glückstad Optics and Plasma Research Department, Ris? National Laboratory, DK-4000 Roskilde, Denmark jesper.gluckstad@risoe.dk http://www.risoe.dk/ofd/competence/ppo.htm Abstract: We demonstrate real-time interactive optical micromanipulation of a colloidal mixture consisting of particles with both lower (n L < n0) and higher (n H > n0) refractive indices than that of the suspending medium (n0). Spherical high- and low-index particles are trapped in the transverse plane by an array of confining optical potentials created by trapping beams with top-hat and annular cross-sectional intensity profiles, respectively. The applied method offers extensive reconfigurability in the spatial distribution and individual geometry of the optical traps. We experimentally demonstrate this unique feature by simultaneously trapping and independently manipulating various sizes of spherical soda lime micro- shells (n L≈ 1.2) and polystyrene micro-beads (n H = 1.57) suspended in water (n0 = 1.33). ?2004 Optical Society of America OCIS codes: (140.7010) Trapping, (170.4520) Optical confinement and manipulation and (230.6120) Spatial Light Modulators. References and links 1. A. Ashkin, “Optical trapping and manipulation of neutral particles using lasers,” Proc. Natl. Acad. Sci. USA 94, 4853-4860 (1997). 2. K. Svoboda and S. M. Block, “Biological applications of optical forces,” Annu. Rev. Biophys. Biomol. Struct. 23, 247-285 (1994). 3. D. G. Grier, “A revolution in optical manipulation,” Nature 424, 810-816 (2003). 4. M. P. MacDonald, G. C. Spalding and K. Dholakia, “Microfluidic sorting in an optical lattice,” Nature 426, 421-424 (2003). 5. J. Glückstad, “Microfluidics: Sorting particles with light,” Nature Materials 3, 9-10 (2004). 6. A. Ashkin, “Acceleration and trapping of particles by radiation-pressure,”Phys. Rev. Lett. 24, 156-159 (1970). 7. A. Ashkin, J. M. Dziedzic, J. E. Bjorkholm and S. Chu, “Observation of a single-beam gradient force optical trap for dielectric particles,” Opt. Lett. 11, 288-290 (1986). 8. K. Sasaki, M. Koshioka, H. Misawa, N. Kitamura, and H. Masuhara, “Optical trapping of a metal particle and a water droplet by a scanning laser beam,” Appl. Phys. Lett. 60, 807-809 (1992). 9. K. T. Gahagan and G. A. Swartzlander, “Trapping of low-index microparticles in an optical vortex,” J. Opt. Soc. Am. B 15, 524-533 (1998). 10. K. T. Gahagan and G. A. Swartzlander, “Simultaneous trapping of low-index and high-index microparticles observed with an optical-vortex trap,” J. Opt. Soc. Am. B 16, 533 (1999). 11. M. P. MacDonald, L. Paterson, W. Sibbett, K. Dholakia, P. Bryant, “Trapping and manipulation of low-index particles in a two-dimensional interferometric optical trap,” Opt. Lett. 26, 863-865 (2001). 12. R. L. Eriksen, V. R. Daria and J. Glückstad, “Fully dynamic multiple-beam optical tweezers,” Opt. Express 10, 597-602 (2002), https://www.wendangku.net/doc/af2116396.html,/abstract.cfm?URI=OPEX-10-14-597. 13. P. J. Rodrigo, R. L. Eriksen, V. R. Daria and J. Glückstad, “Interactive light-driven and parallel manipulation of inhomogeneous particles,” Opt. Express 10, 1550-1556 (2002), https://www.wendangku.net/doc/af2116396.html,/abstract.cfm?URI=OPEX-10-26-1550. 14. V. Daria, P. J. Rodrigo and J. Glückstad, “Dynamic array of dark optical traps,” Appl. Phys. Lett. 84, 323-325 (2004). 15. J. Glückstad and P. C. Mogensen, “Optimal phase contrast in common-path interferometry,” Appl. Opt. 40, 268-282 (2001). 16. S. Maruo, K. Ikuta and H. Korogi, “Submicron manipulation tools driven by light in a liquid,” Appl. Phys. Lett. 82, 133-135 (2003). #3781 - $15.00 US Received 4 February 2004; revised 29 March 2004; accepted 29 March 2004 (C) 2004 OSA 5 April 2004 / Vol. 12, No. 7 / OPTICS EXPRESS 1417

中国的对外贸易外文翻译及原文

外文翻译 原文 Foreign T rade o f China Material Source:W anfang Database Author:Hitomi Iizaka 1.Introduction On December11,2001,China officially joined the World T rade Organization(WTO)and be c a me its143rd member.China’s presence in the worl d economy will continue to grow and deepen.The foreign trade sector plays an important andmultifaceted role in China’s economic development.At the same time, China’s expanded role in the world economy is beneficial t o all its trading partners. Regions that trade with China benefit from cheaper and mor e varieties of imported consumer goods,raw materials and intermediate products.China is also a large and growing export market.While the entry of any major trading nation in the global trading system can create a process of adjustment,the o u t c o me is fundamentally a win-win situation.In this p aper we would like t o provide a survey of the various institutions,laws and characteristics of China’s trade.Among some of the findings, we can highlight thefollowing: ?In2001,total trade to gross domestic pr oduct(GDP)ratio in China is44% ?In2001,47%of Chinese trade is processed trade1 ?In2001,51%of Chinese trade is conduct ed by foreign firms in China2 ?In2001,36%of Chinese exports originate from Gu an gdon g province ?In2001,39%of China’s exports go through Hong Kong to be re-exported elsewhere 2.Evolution of China’s Trade Regime Equally remarkable are the changes in the commodity composition of China’s exports and imports.Table2a shows China’s annu al export volumes of primary goods and manufactured goods over time.In1980,primary goods accounted for 50.3%of China’s exports and manufactured goods accounted for49.7%.Although the share of primary good declines slightly during the first half of1980’s,it remains at50.6%in1985.Since then,exports of manufactured goods have grown at a much

本科生英文文献翻译格式要求

外文文献翻译格式要求: 外文文献翻译是本科生毕业的过程之一,有些格式需要我们注意一下。 (1)摘要,关键词:宋体五号(其中“摘要”和“关键词”为宋体五号加粗),行间距设置为18磅,段前段后间距设置为0.5行,对齐方式选择“两端对齐”方式; 各个关键词之间以分号(;)或者(,)隔开,最后一个关键词后不加标点; (2)正文一级标题:采用黑体小三号加粗,行间距设置为20磅,段前段后间距设置为0.5行,一般采用“1 引言”样式,其中1和“引言”之间用一个空格分开; 正文二级标题:采用黑体小三号,行间距设置为20磅,段前段后间距设置为0.5行,一般采用“2.1 系统原理”样式,其中1和“系统原理”之间用一个空格分开;; 一级标题和二级标题采用“左对齐”方式; (3)正文内容:采用宋体小四号,行间距设置为20磅,段前段后间距设置为0行,首行缩进2字符,正文对齐方式在段落格式设置中选择“两端对齐”,遇正文中有公式的,设置该行(段)行间距为“单倍行距” (4)插图:请设置图片版式为“浮于文字上方”,并勾选“居中”,图片大小根据版面,按比例适当进行缩放,图示说明采用“图 1 主控制器的结构图”样式置于图下,图序与说明以一个空格字符间隔,图示说明采用宋体五号,居中对齐,行间距设置为“单倍行距”,段前段后距设置为0.5行; (5)表格:在表格属性中选择“居中”对齐方式,表格说明采用“表1 两种方法试验数据比较”样式置于表格上方,表序与说明以一个空格字符间隔,表格说明采用宋体五号,居中对齐,行间距设置为“单倍行距”,段前段后距设置为0.5行; (6)参考文献:“参考文献”格式同一级标题格式,参考文献内容采用宋体五号,行间距设置为18磅,段前段后间距设置为0行,对齐方式选择“左对齐”方式,其中出现的标点一律采用英文标点; 以上摘要,关键词,正文,标题及参考文献中出现的英文字符和数字,一律设置为“Times New Roman”字体。 外文文献翻译附于开题报告之后:第一部分为译文,第二部分为外文文献原文,译文与原文均需单独编制页码(底端居中)并注明出处。本附件为封面,封面上不得出现页码。因此,可以将封面、译文和原文分为3节,然后分别对此3节分别添加页码,页码 分节及设置页码方法如下: 1.将光标定位到需要分节的地方,选择“插入”菜单

毕业设计(论文)外文资料翻译〔含原文〕

南京理工大学 毕业设计(论文)外文资料翻译 教学点:南京信息职业技术学院 专业:电子信息工程 姓名:陈洁 学号: 014910253034 外文出处:《 Pci System Architecture 》 (用外文写) 附件: 1.外文资料翻译译文;2.外文原文。 指导教师评语: 该生外文翻译没有基本的语法错误,用词准确,没 有重要误译,忠实原文;译文通顺,条理清楚,数量与 质量上达到了本科水平。 签名: 年月日 注:请将该封面与附件装订成册。

附件1:外文资料翻译译文 64位PCI扩展 1.64位数据传送和64位寻址:独立的能力 PCI规范给出了允许64位总线主设备与64位目标实现64位数据传送的机理。在传送的开始,如果回应目标是一个64位或32位设备,64位总线设备会自动识别。如果它是64位设备,达到8个字节(一个4字)可以在每个数据段中传送。假定是一串0等待状态数据段。在33MHz总线速率上可以每秒264兆字节获取(8字节/传送*33百万传送字/秒),在66MHz总线上可以528M字节/秒获取。如果回应目标是32位设备,总线主设备会自动识别并且在下部4位数据通道上(AD[31::00])引导,所以数据指向或来自目标。 规范也定义了64位存储器寻址功能。此功能只用于寻址驻留在4GB地址边界以上的存储器目标。32位和64位总线主设备都可以实现64位寻址。此外,对64位寻址反映的存储器目标(驻留在4GB地址边界上)可以看作32位或64位目标来实现。 注意64位寻址和64位数据传送功能是两种特性,各自独立并且严格区分开来是非常重要的。一个设备可以支持一种、另一种、都支持或都不支持。 2.64位扩展信号 为了支持64位数据传送功能,PCI总线另有39个引脚。 ●REQ64#被64位总线主设备有效表明它想执行64位数据传送操作。REQ64#与FRAME#信号具有相同的时序和间隔。REQ64#信号必须由系统主板上的上拉电阻来支持。当32位总线主设备进行传送时,REQ64#不能又漂移。 ●ACK64#被目标有效以回应被主设备有效的REQ64#(如果目标支持64位数据传送),ACK64#与DEVSEL#具有相同的时序和间隔(但是直到REQ64#被主设备有效,ACK64#才可被有效)。像REQ64#一样,ACK64#信号线也必须由系统主板上的上拉电阻来支持。当32位设备是传送目标时,ACK64#不能漂移。 ●AD[64::32]包含上部4位地址/数据通道。 ●C/BE#[7::4]包含高4位命令/字节使能信号。 ●PAR64是为上部4个AD通道和上部4位C/BE信号线提供偶校验的奇偶校验位。 以下是几小结详细讨论64位数据传送和寻址功能。 3.在32位插入式连接器上的64位卡

英文翻译与英文原文.陈--

翻译文献:INVESTIGATION ON DYNAMIC PERFORMANCE OF SLIDE UNIT IN MODULAR MACHINE TOOL (对组合机床滑台动态性能的调查报告) 文献作者:Peter Dransfield, 出处:Peter Dransfield, Hydraulic Control System-Design and Analysis of TheirDynamics, Springer-Verlag, 1981 翻译页数:p139—144 英文译文: 对组合机床滑台动态性能的调查报告 【摘要】这一张纸处理调查利用有束缚力的曲线图和状态空间分析法对组合机床滑台的滑动影响和运动平稳性问题进行分析与研究,从而建立了滑台的液压驱动系统一自调背压调速系统的动态数学模型。通过计算机数字仿真系统,分析了滑台产生滑动影响和运动不平稳的原因及主要影响因素。从那些中可以得出那样的结论,如果能合理地设计液压缸和自调背压调压阀的结构尺寸. 本文中所使用的符号如下: s1-流源,即调速阀出口流量; S el—滑台滑动摩擦力 R一滑台等效粘性摩擦系数: I1—滑台与油缸的质量 12—自调背压阀阀心质量 C1、c2—油缸无杆腔及有杆腔的液容; C2—自调背压阀弹簧柔度; R1, R2自调背压阀阻尼孔液阻, R9—自调背压阀阀口液阻 S e2—自调背压阀弹簧的初始预紧力; I4, I5—管路的等效液感 C5、C6—管路的等效液容: R5, R7-管路的等效液阻; V3, V4—油缸无杆腔及有杆腔内容积; P3, P4—油缸无杆腔及有杆腔的压力 F—滑台承受负载, V—滑台运动速度。本文采用功率键合图和状态空间分折法建立系统的运动数学模型,滑台的动态特性可以能得到显著改善。

外文翻译原文

204/JOURNAL OF BRIDGE ENGINEERING/AUGUST1999

JOURNAL OF BRIDGE ENGINEERING /AUGUST 1999/205 ends.The stress state in each cylindrical strip was determined from the total potential energy of a nonlinear arch model using the Rayleigh-Ritz method. It was emphasized that the membrane stresses in the com-pression region of the curved models were less than those predicted by linear theory and that there was an accompanying increase in ?ange resultant force.The maximum web bending stress was shown to occur at 0.20h from the compression ?ange for the simple support stiffness condition and 0.24h for the ?xed condition,where h is the height of the analytical panel.It was noted that 0.20h would be the optimum position for longitudinal stiffeners in curved girders,which is the same as for straight girders based on stability requirements.From the ?xed condition cases it was determined that there was no signi?cant change in the membrane stresses (from free to ?xed)but that there was a signi?cant effect on the web bend-ing stresses.Numerical results were generated for the reduc-tion in effective moment required to produce initial yield in the ?anges based on curvature and web slenderness for a panel aspect ratio of 1.0and a web-to-?ange area ratio of 2.0.From the results,a maximum reduction of about 13%was noted for a /R =0.167and about 8%for a /R =0.10(h /t w =150),both of which would correspond to extreme curvature,where a is the length of the analytical panel (modeling the distance be-tween transverse stiffeners)and R is the radius of curvature.To apply the parametric results to developing design criteria for practical curved girders,the de?ections and web bending stresses that would occur for girders with a curvature corre-sponding to the initial imperfection out-of-?atness limit of D /120was used.It was noted that,for a panel with an aspect ratio of 1.0,this would correspond to a curvature of a /R =0.067.The values of moment reduction using this approach were compared with those presented by Basler (Basler and Thurlimann 1961;Vincent 1969).Numerical results based on this limit were generated,and the following web-slenderness requirement was derived: 2 D 36,500a a =1?8.6?34 (1) ? ??? t R R F w ?y where D =unsupported distance between ?anges;and F y =yield stress in psi. An extension of this work was published a year later,when Culver et al.(1973)checked the accuracy of the isolated elas-tically supported cylindrical strips by treating the panel as a unit two-way shell rather than as individual strips.The ?ange/web boundaries were modeled as ?xed,and the boundaries at the transverse stiffeners were modeled as ?xed and simple.Longitudinal stiffeners were modeled with moments of inertias as multiples of the AASHO (Standard 1969)values for straight https://www.wendangku.net/doc/af2116396.html,ing analytical results obtained for the slenderness required to limit the plate bending stresses in the curved panel to those of a ?at panel with the maximum allowed out-of-?atness (a /R =0.067)and with D /t w =330,the following equa-tion was developed for curved plate girder web slenderness with one longitudinal stiffener: D 46,000a a =1?2.9 ?2.2 (2) ? ? ? t R f R w ?b where the calculated bending stress,f b ,is in psi.It was further concluded that if longitudinal stiffeners are located in both the tension and compression regions,the reduction in D /t w will not be required.For the case of two stiffeners,web bending in both regions is reduced and the web slenderness could be de-signed as a straight girder panel.Eq.(1)is currently used in the ‘‘Load Factor Design’’portion of the Guide Speci?cations ,and (2)is used in the ‘‘Allowable Stress Design’’portion for girders stiffened with one longitudinal stiffener.This work was continued by Mariani et al.(1973),where the optimum trans-verse stiffener rigidity was determined analytically. During almost the same time,Abdel-Sayed (1973)studied the prebuckling and elastic buckling behavior of curved web panels and proposed approximate conservative equations for estimating the critical load under pure normal loading (stress),pure shear,and combined normal and shear loading.The linear theory of shells was used.The panel was simply supported along all four edges with no torsional rigidity of the ?anges provided.The transverse stiffeners were therefore assumed to be rigid in their directions (no strains could be developed along the edges of the panels).The Galerkin method was used to solve the governing differential equations,and minimum eigenvalues of the critical load were calculated and presented for a wide range of loading conditions (bedding,shear,and combined),aspect ratios,and curvatures.For all cases,it was demonstrated that the critical load is higher for curved panels over the comparable ?at panel and increases with an increase in curvature. In 1980,Daniels et al.summarized the Lehigh University ?ve-year experimental research program on the fatigue behav-ior of horizontally curved bridges and concluded that the slen-derness limits suggested by Culver were too severe.Equations for ‘‘Load Factor Design’’and for ‘‘Allowable Stress Design’’were developed (respectively)as D 36,500a =1?4?192(3)? ?t R F w ?y D 23,000a =1?4 ?170 (4) ? ? t R f w ?b The latter equation is currently used in the ‘‘Allowable Stress Design’’portion of the Guide Speci?cations for girders not stiffened longitudinally. Numerous analytical and experimental works on the subject have also been published by Japanese researchers since the end of the CURT project.Mikami and colleagues presented work in Japanese journals (Mikami et al.1980;Mikami and Furunishi 1981)and later in the ASCE Journal of Engineering Mechanics (Mikami and Furunishi 1984)on the nonlinear be-havior of cylindrical web panels under bending and combined bending and shear.They analyzed the cylindrical panels based on Washizu’s (1975)nonlinear theory of shells.The governing nonlinear differential equations were solved numerically by the ?nite-difference method.Simple support boundary condi-tions were assumed along the curved boundaries (top and bot-tom at the ?ange locations)and both simple and ?xed support conditions were used at the straight (vertical)boundaries.The large displacement behavior was demonstrated by Mi-kami and Furunishi for a range of geometric properties.Nu-merical values of the load,de?ection,membrane stress,bend-ing stress,and torsional stress were obtained,but no equations for design use were presented.Signi?cant conclusions include that:(1)the compressive membrane stress in the circumfer-ential direction decreases with an increase in curvature;(2)the panel under combined bending and shear exhibits a lower level of the circumferential membrane stress as compared with the panel under pure bending,and as a result,the bending moment carried by the web panel is reduced;and (3)the plate bending stress under combined bending and shear is larger than that under pure bending.No formulations or recommendations for direct design use were made. Kuranishi and Hiwatashi (1981,1983)used the ?nite-ele-ment method to demonstrate the elastic ?nite displacement be-havior of curved I-girder webs under bending using models with and without ?ange rigidities.Rotation was not allowed (?xed condition)about the vertical axis at the ends of the panel (transverse stiffener locations).Again,the nonlinear distribu-

相关文档