搜档网
当前位置:搜档网 › 计算机专业的外文文献.pdf

计算机专业的外文文献.pdf

计算机专业的外文文献.pdf
计算机专业的外文文献.pdf

A Rapid Tag Identification Method with Two

Slots in RFID Systems

Yong Hwan Kim, Sung Soo Kim, Kwang Seon Ahn

Department of Computer Engineering, Kyungpook National University

Daegu, Korea

{hypnus, ninny, gsahn}@knu.ac.kr

Abstract—RFID is core technology in the area of ubiquitous compu-ting. Identify the objects begin with the reader’s query to the tag at-tached to the subject. When multiple tags exist in the reader’s inter-rogation zone, these tags simultaneously respond to the reader’s query, resulting in collision. In RFID system, the reader needs the anti-collision algorithm which can quickly identify all the tags in the interrogation zone. This paper proposes tree based Rapid Tag Identi-fication Method with Two Slots(RTIMTS). The proposed algorithm rapidly identifies a tag with the information of Two Slots and MSB(Most Significant Bit). Two Slots resolve the tag collision by receiving the response from the tag to the Slot 0 and 1. The reader can identify two tags at once using MSB of information added to the tag ID. With RTIMTS algorithm, the total time of tag identification can be shortened by decreasing the number of query-responses from the reader.

Keywords-RFID; Anti-collision; Two Slots; the number of query-responses.

I.I NTRODUCTION

RFID(Radio Frequency Identification) is a technology that deciphers or identifies the tag information through a reader (or interrogator) without contact. RFID have become very popular in many service industries, purchasing and distribution logis-tics, industry, manufacturing companies and material flow systems. Automatic Identification procedures exist to provide information about people, animals, goods and products in tran-sit[1][2].

The reader receives required information from the tags by sending and receiving wireless signals with the tag. Since the communication between the readers and the tags shares wire-less channels, there exist collisions. The collisions can be di-vided into the reader collision and the tag collision. The reader collision occurs when multiple readers send request signals to one tag, and the tag receives the wrong request signal due to signal interference between readers. The tag collision occurs when more than two tags simultaneously respond to one reader and the reader cannot identify any tags. This kind of collision makes the reader take long time to identify tags within the read-er’s identification range and impossible to identify even one tag[3][4][5] [6].

Therefore, the collision is a crucial problem that must be re-solved in RFID systems, so many studies to resolve this prob-lem have been carried out as well as are ongoing. This paper focuses on the tag collision problem which occurs in the case where one reader identifies multiple tags. Figure 1 provides schematizations of reader collision and tag collision.

This paper proposes the Rapid Tag Identification Method with Two Slots (RTIMTS), for faster tag identification in mul-ti-tag environment where one reader identifies multiple tags. In the transfer paper[7], the proposed algorithm designs the method that it does without the value extracting procedure of even(or odd) parity bit of ID bit(T pb),the number of identified ‘1’s(T1n), the number of remaining ‘1’s(T rn), and the number of collided bit (T cb) with simple it can predict a tagID. Maximum 4 tag IDs can

be identified on one round by using Two slots.

a) The Reader collision b) The Tag collision

Figure 1. The collision problem in RFID System

II.T HE R ELATED WORKS

A. Query Tree

Query Tree(QT) algorithm is a binary tree based anti colli-sion algorithm and has an advantage in easily implementation due to its simple operating mode[8]. QT sets the reader’s query and tag’s response as one round, and identifies tags by iterating the round. In each round, the reader requests prefix to tag’s ID. And when ID matches the prefix, each tag transmits all IDs including prefixes to the reader. At this time, if more than one tag simultaneously responds, the reader cannot recognize tag’s ID, but can recognize that there are currently more than two tags having the prefix. Then the reader adds ‘0’ or ‘1’ to the current prefix and queries the longer prefix to the tags again. When only one tag responds to the reader, it identifies the tag. In other words, the reader adds the prefix by 1 bit until only one tag responds and iterates this process until identifying all the tags within the range. Figure 2 shows the operating process of QT algorithms[10].

Figure 2 shows the process that four tags respond according to the readers’ query. In round 1, 2, 3, and 7, the collision oc-curs because more than two tags respond, and in round 4, 5, 8, and 9, tag can be identified because only one tag responds. The digital coding method applied to QT cannot detect the collision

bits. When a collision occurs, the reader adds ‘0’ or ‘1’ to the

2009 Eighth IEEE International Symposium on Network Computing and Applications 978-0-7695-3698-9/09 $25.00 ? 2009 IEEE

DOI 10.1109/NCA.2009.21

292

current prefix and queries this prefix to the tags. While having a merit of the simple realization, this generates an idle cycle which has no response like a round 6 [10].

Figure 2. The operating process of Query Tree alogrithm

B. Query Tree with Collision-Bit Positioning

The tag identification process of the Query Tree with colli-sion-Bit Positioning(QT-CBP) algorithm is as follows[9]. If a collision occurs, the reader detects the location of the collided bits and gets the number of the collided bits. If one collision is generated, a reader establishes ‘0’ and ‘1’ for a collided bit and it saves them into memory. If more than two collisions are gen-erated, a reader will create a new query prefix by appending ‘0’ and ‘1’ to queries to a head of location bit where the collisions are generated. And, it saves then into next stack. If a tag doesn't respond, a reader won’t move. Until all tags are identified, the above protocol is reiterated[11].

The QT-CBP uses a stack differently that the QT uses a queue, and when one bit collision is generated, a reader identi-fies as two tags are existing. If tag ID has a collision conti-nuously, The QT-CBP will identify this in the same way with the QT, so it has to be improved[11].

Figure 3 shows the process of identifying four tag IDs. In the step 3, a collision was generated, however, it detected that a collision was generated on the bit 2 of tag ID. So, it added ‘0’ and ‘1’ to the bit 2 respectively and it identifies two tag IDs. In the step 1 and 2, query prefix is created [11].

Figure 3. The operating process of Collision-Bit Positioning alogrithm

C. Collision Tracking using Manchester Code

In the proposed algorithm, the reader must know the posi-tion and the number of collided bits. This can be resolved by using Manchester coding, which defines the value of a bit by

the change in level within a bit window. So, the state where the level doesn’t change doesn’t exist. If such state is tracked, it can be identified as a collision[1]. Figure 4 shows that the colli-sion can be tracked by an individual bit window with Manches-ter coding.

Figure 4. Manchester code tracing a collision to an individual bit

In Figure 4, when the identification code of tag 1 is 10011111, and the identification code of tag2 is 10111011, two tags transmit their ID to the reader on the reader’s request. In case of the bits (bit 3 and bit 6) where two tags have different levels, like in Figure 4, the ‘no transition’ state continues in one bit block because positive and negative transitions cancel each other out. This state is not permissible in the Manchester cod-ing system and leads to an error, which is identified as a colli-sion. It is thus possible to track a collision to an individual bit when Manchester coding is applied.

III. R APID T AG I DENTIFICATION M ETHOD WITH T WO S LOTS This section proposes the RTIMTS algorithm that can quickly identify multiple tags in the reader’s interrogation zone. Contrary to the existing algorithm which arbitrates for only one tag to respond at the specific point while identifying tags, the proposed algorithm identifies tags using a characteris-tic that a collision occurs between the tags. In other words, the RTIMTS algorithm predicts the tag ID by analyzing the num-ber of collided bits, the information of MSB(Most Significant Bit) and Two Slots. Also, it prevents collision as tags, which have the ID matching to the value of [prefix] corresponding to the reader’s request command, respond their ID from the [pre-fix]+2th bit in Two Slots using the [prefix]+1th bit of ID. The next section explains all the necessary details for the RTIMTS algorithm to operate and the way the RTIMTS algorithm oper-ates, while showing the example in which tags are identified by the RTIMTS algorithm.

A. MSB information

The RTIMTS algorithm identifies the tag using the Serial number which is identified by the collision tracking informa-tion by bit and the bit information of MSB inside tag ID. Figure 5 shows the structure of tag ID for the proposed algorithm.

⊕⊕⊕

Figure 5. Structure of tag ID

In the RTIMTS algorithm, the tag ID consists of MSB and Serial Number. The serial number is the part to store ID num-ber assigned to the tag, while MSB stores the XORed values of all the bits in the Serial Number. The reader predicts multiple tags using the MSB information and the collision tracking in-formation by each bit. The total length of tag ID is the existing Serial Number length + one bit of MSB. For example, if the Serial Number length is 6 bit, the total length of tag ID is 7bit. The tag ID used in the proposed algorithm has following cha-racteristics.

?The MSB is always identified at the first part of the tag identification process. Because the reader’s identification

process always proceeds from the highest bit to the lowest

one of the tag’s ID.

?After the reader identifies the MSB of the tag, the tags responding to the reader’s request in the following

identification process have the characteristics of being

divided into two groups according to the XORed val-

ue(‘1’ or ‘0’) of all the bits in the Serial Number.

?The tags with matching [prefix] value of the reader re-ply on the Two Slots using the [prefix] + 1th bit of

their tag ID. At this time, if there are two collision bits,

the reader predicts two tags using the MSB information.

B.Prediction Method

When the number of collisions is two, two cases where it is possible to predict according to the MSB information, are as followings.

?Prediction 1

In the case where the XORed value of a bit is ‘0’, the

reader predicts (‘0’, ‘0’) and (‘1’, ‘1’) in two collided bits.

?Prediction 2

In the case where the XORed value of a bit is ‘1’, the

reader predicts (‘0’, ‘1’) and (‘1’, ‘0’) in two collided bits.

C.The Reader’s Request command and Tag’s Responds

Figure 6. Flow Chart of the RTIMTS

Figure 6 shows a flowchart of the RTIMTS algorithm. The reader always pops the prefix from the stack to send the request command to tags. The tags that match the prefix respond their ID in the corresponding Slot from the [prefix]+2th bit accord-ing to the value of [prefix]+1th bit.

An anti-collision resolution in the proposed algorithm works by grouping tags using Two Slots. Therefore, the tag in which the [prefix]+1th bit of its ID is ‘0’ replies in Slot 0, while the tag in which the [prefix]+1th bit of its ID is ‘1’ replies in Slot 1. After receiving the responses from tags, the reader se-quentially processes Slots from Slot 0.

The possibility of prediction is checked using the proposed algorithm. When one tag replies in one Slot, the tag is identi-fied. And if there are two collisions because the two tags will reply in one Slot and the MSB information of tag ID is known, the reader can predicts the two tags. If it is impossible to pre-dict, two prefixes, in which ‘0’ and ‘1’ are added to the first collided bit, will be pushed onto the stack before proceeding to the next step. And then identifies all the tag in which a collision occurs with the iteration of above process.

D.An example of RTIMTS

Figure 7 shows that the way the requests of the reader and the responses of the tags process in the RTIMTS algorithm.

Figure 7. Example of the RTIMTS

In the 1st iteration, the reader sends a request to tags with empty string(€) as a factor. Since the € is considered to match with every prefix, all the tags respond their ID in the corres-ponding Slot from the [prefix]+2th bit according to the value of [prefix]+1th bit.

In Slot 1, the reader can identify tag 1 and tag 4 using the MSB information like the section III.B. The reader received the response signal, “11010X1X0”, from tags, the XORed value of a bit is 1 ⊕ 1 ⊕ 0 ⊕ 1 ⊕ 0 ⊕ 1⊕ 0 = 0. This case corresponds to Prediction 1, and ‘0’, ‘0’ and ‘1’, ‘1’ can be predicted in two collided bits. Therefore, two tags, “10100100” and

“10101110”, are identified. With the proposed algorithm, the

tag identification time can be shortened by predicting the tag using the MSB information anti-collision in the cases of two collisions and using Two Slots

In the 2nd iteration, if the reader transmits “01” as the pre-fix value of a request, tag 2 and tag 3 that match prefix respond the ID in the corresponding Slot from the [prefix]+2th bit. In this case, two tags can be identified because only one tag rep-lies in the corresponding Slot.

IV.P ERFORMANCE E VALUATION

In this section, we evaluate the performance of the pro-posed algorithm in this paper. In the evaluation, we compared with the average number of query-responses of readers and tags of the QT algorithm, the QT-CBP algorithm, and the Anti Col-lision algorithm using Parity Bit(ACPB) algorithm[7] that were

proposed before by planning a simulation program with C# language.

In the simulation program, the users can control the length of tag ID, number of tags and allocation of the tag ID. Tag ID lengths of 8 bit were used in the experiments. In each experi-ment, we used random assignment method and sequential as-signment method. We measured the number of query-responses between the reader and tags by changing the number of tags. Since less number of query-responses between the reader and tags represents that the reader can identify the tags faster, we regards the number of query-responses as time in the perfor-mance evaluation.

Figure 8 shows the cases that 8 bit IDs are allocated to ran-dom assignment and sequential assignment. As shown in Fig-ure 8 a) and 8 b), the proposed algorithm shows better perfor-mance than other algorithms even if the number of tags in-creases.

The results show that in the random assignment of 8 bit tag IDs experiments; the proposed algorithm has overall 79% less query iterations than the QT, 53% less than the QT-CBP, and 50% less than the ACPB. In case of the sequential assignment, the number of query iterations was reduced by about 82% compared to the QT, by about 50% compared to the QT-CBP and the ACPB.

a) 8bit random assignment

b) 8 bit sequential assignment

Figure 8. 8 bit random assignment and sequential assignment

V.C ONCLUSION

In RFID system, the tag collision problem occurs in multi-tag environment where multiple tags are identified. The anti-collision algorithm is necessary to arbitrate the collision and to identify all the tags faster.

Added MSB can predict two bit patterns when two colli-sions occur. When the reader sends the request to tags with prefix as a factor, the only tags having the ID whose prefixes match the received prefix, respond. There tags can resolve the collision problem by selecting a Slot using the information of prefix+1th bit.

R EFERENCES

[1]K. Finkenzeller, RFID Hand Book: Fundamentals and Applications in Contactless

Smart Card and Identification, Second Edition, John Wiley & Sons Ltd, 2003. [2]P. H. Cole, “Fundamentals in RFID part1,” Korean RFID course, 2006, Available

at:https://www.sodocs.net/doc/1718611210.html,.au/education/FundamentalsInRfidPart1.pdf. [3]S. Sarma, D. Brock, and D. Engels, "Radio Frequency Identification and the

Electronic Product Code," IEEE Micro, vol. 21, no. 6, pp. 50-54, November 2001.

[4] D. W. Engels and S. E. Sarma, “The Reader Collision Problem,” In Proceedings of

IEEE International Conference on SMC 02, 2002.

[5]J. Waldrop, D. W. Engels, and S. E. Sarma, “Colorwave: An Anticollision

Algorithm for the Reader Collision,” In proceedings of IEEE ICC 03, 2003. [6]J. Myung, and W. Lee, "Adaptive Binary Splitting: A RFID Tag Collision

Arbitration Protocol for Tag Identification," ACM MoNET 06, vol. 11, no.5, pp.

711-722, 2006.

[7]S. S. Kim, Y. H. Kim, S. J. Lee, and K. S. Ahn, "An Improved Anti Collision

Algorithm using Parity Bit in RFID System," Seventh IEEE International Symposium on NCA 08, pp. 224-227, 2008.

[8] C. Law, K. Lee, and K. Y. Siu, “Efficient Memoryless protocol for Tag

Identification”, In Proceedings of the 4th international workshop on DIALM 00, ACM, pp. 75-84, 2000.

[9]H. Lee, J. Kim, “QT-CBP : A New RFID Tag Anticollision Algorithm Using

Collision Bit Positioning”, EUC 06, LNCS, Springer Vol. 4097, pp. 591-600, 2006.

[10]Y. H. Kim, S. S. Kim, S. J. Lee, and K. S. Ahn, " An Anti-Collision Algorithm

without Idle Cycle using 4-ary Tree in RFID System," ICUIMC 09, ACM, pp.

642-646, 2009.

[11]Y. T. Kim, S. J. Lee, and K. S. Ahn, " An Efficient Anti-Collision Protocol Using

Bit Change Sensing Unit in RFID System," The 14th IEEE International Conference on RTCSA 08, pp. 81-88, 2008.

计算机专业VB类通用外文翻译及文献.

Visual Basic language and arithmetic The United States launched the Microsoft Visual Basic (may be referred to VB, is the latest version of the current VB 2008 Beta2 (VB9 Chinese version. Visual meaning the visual, visible, referring to the development of operating systems like windows graphical user interface (Graphic User Interface, GUI method, it does not need to prepare a large number code to describe the appearance of the interface elements and location, as long as the pre - The establishment of good drag and drop objects on the screen corresponding to the location. Basic is actually an abbreviation of the phrase; this phrase is Beginners all-purpose symbolic instruction code, the Chinese meaning "to the initial directive GM symbol code language." Visual Basic learning, Professional Edition and Enterprise Edition versions to meet the different needs of the development. Study and apply to the ordinary version of the majority of learners and the use of Visual Basic development of the general staff of Windows applications, but; professional version for computer professional development of staff, including the study of functional version of the full content control and Internet development tools such as advanced features ,Enterprise contain not only all the professional version of the content, there are automated tools such as Component Manager, professional programmers to make the development of a powerful group essence of distributed applications. Visual Basic Section 1 the summary of Visual Basic Microsoft Visual Basic,( abbreviate VB as tool the most of application program one of under Windows operating platform. No matter beginner or professional developer, VB has all offered a whole set of tools to them, Development application program that it can

外文翻译 外文文献 英文文献 胜任力模型研究

Research on Competency Model:A Literature Review and Empirical Studies Abstract Western countries have applied competency models to addressing problems existed in their administrative and managerial systems since 1970s,and the findings is positine and promising. However, competency model hasn’t been introduced to China until 1990s and it is still unknown and mysterious to many Chinese managers. This paper aims to uncover the mysterious veil of competency model in order to broaden the horizon of Chinese managers and boost China's human resource development as well as management. Keywords:Competency,Competency Models,Empirical Studies of Competency Models It has been more than 30 years since competency model was utilized to human resource management.In western countries,competency model first displayed its effectiveness in government administration, meanwhile many multinationals and their branch companies applied the competency model to their daily business management and their business was a great success. As the notion of competency is gradually come to light and accepted by people all around the world,more and more enterprises have been trying to build their own competency model under the help of professional consultant firms. As a result,competency model has gradually been a very fashionable phrase in the field of management and quite a few enterprises are thus benefited from it. In recent years, competency model has become a hot spot in the Chinese academia as well as big-,middle- and small-sized enterprises alike,many relevant writings and books have also been translated and published. However, competency and competency model are still mysterious to many Chinese scholars, business managers as well as government administrators. Purpose and Significance of the Study The purpose of the study aims to make a critical literature review of the competency model,clarify some confusion related to it and explore its application. The following questions are employed to guide this study:What is competency? What is competency model? What are the theoretical and empirical findings related to competency model? The study illustrates how we could take advantage of competency model in our harmonious society building. On one hand,the study will delineate competency and competency model in order to clarify confusions related to it since it is still strange and mysterious to many Chinese managers and administrators;on the other hand,the

平面设计中英文对照外文翻译文献

(文档含英文原文和中文翻译) 中英文翻译 平面设计 任何时期平面设计可以参照一些艺术和专业学科侧重于视觉传达和介绍。采用多种方式相结合,创造和符号,图像和语句创建一个代表性的想法和信息。平面设计师可以使用印刷,视觉艺术和排版技术产生的最终结果。平面设计常常提到的进程,其中沟通是创造和产品设计。 共同使用的平面设计包括杂志,广告,产品包装和网页设计。例如,可能包括产品包装的标志或其他艺术作品,举办文字和纯粹的设计元素,如形状和颜色统一件。组成的一个最重要的特点,尤其是平面设计在使用前现有材料或不同的元素。 平面设计涵盖了人类历史上诸多领域,在此漫长的历史和在相对最近爆炸视觉传达中的第20和21世纪,人们有时是模糊的区别和重叠的广告艺术,平面设计和美术。毕竟,他们有着许多相同的内容,理论,原则,做法和语言,有时同样的客人或客户。广告艺术的最终目标是出售的商品和服务。在平面

设计,“其实质是使以信息,形成以思想,言论和感觉的经验”。 在唐朝( 618-906 )之间的第4和第7世纪的木块被切断打印纺织品和后重现佛典。阿藏印在868是已知最早的印刷书籍。 在19世纪后期欧洲,尤其是在英国,平面设计开始以独立的运动从美术中分离出来。蒙德里安称为父亲的图形设计。他是一个很好的艺术家,但是他在现代广告中利用现代电网系统在广告、印刷和网络布局网格。 于1849年,在大不列颠亨利科尔成为的主要力量之一在设计教育界,该国政府通告设计在杂志设计和制造的重要性。他组织了大型的展览作为庆祝现代工业技术和维多利亚式的设计。 从1892年至1896年威廉?莫里斯凯尔姆斯科特出版社出版的书籍的一些最重要的平面设计产品和工艺美术运动,并提出了一个非常赚钱的商机就是出版伟大文本论的图书并以高价出售给富人。莫里斯证明了市场的存在使平面设计在他们自己拥有的权利,并帮助开拓者从生产和美术分离设计。这历史相对论是,然而,重要的,因为它为第一次重大的反应对于十九世纪的陈旧的平面设计。莫里斯的工作,以及与其他私营新闻运动,直接影响新艺术风格和间接负责20世纪初非专业性平面设计的事态发展。 谁创造了最初的“平面设计”似乎存在争议。这被归因于英国的设计师和大学教授Richard Guyatt,但另一消息来源于20世纪初美国图书设计师William Addison Dwiggins。 伦敦地铁的标志设计是爱德华约翰斯顿于1916年设计的一个经典的现代而且使用了系统字体设计。 在20世纪20年代,苏联的建构主义应用于“智能生产”在不同领域的生产。个性化的运动艺术在俄罗斯大革命是没有价值的,从而走向以创造物体的功利为目的。他们设计的建筑、剧院集、海报、面料、服装、家具、徽标、菜单等。 Jan Tschichold 在他的1928年书中编纂了新的现代印刷原则,他后来否认他在这本书的法西斯主义哲学主张,但它仍然是非常有影响力。 Tschichold ,包豪斯印刷专家如赫伯特拜耳和拉斯洛莫霍伊一纳吉,和El Lissitzky 是平面设计之父都被我们今天所知。 他们首创的生产技术和文体设备,主要用于整个二十世纪。随后的几年看到平面设计在现代风格获得广泛的接受和应用。第二次世界大战结束后,美国经济的建立更需要平面设计,主要是广告和包装等。移居国外的德国包豪斯设计学院于1937年到芝加哥带来了“大规模生产”极简到美国;引发野火的“现代”建筑和设计。值得注意的名称世纪中叶现代设计包括阿德里安Frutiger ,设计师和Frutiger字体大学;保兰德,从20世纪30年代后期,直到他去世于1996年,采取的原则和适用包豪斯他们受欢迎的广告和标志设计,帮助创造一个独特的办法,美国的欧洲简约而成为一个主要的先驱。平面设计称为企业形象;约瑟夫米勒,罗克曼,设计的海报严重尚未获取1950年代和1960年代时代典型。 从道路标志到技术图表,从备忘录到参考手册,增强了平面设计的知识转让。可读性增强了文字的视觉效果。 设计还可以通过理念或有效的视觉传播帮助销售产品。将它应用到产品和公司识别系统的要素像标志、颜色和文字。连同这些被定义为品牌。品牌已日益成为重要的提供的服务范围,许多平面设计师,企业形象和条件往往是同时交替使用。

人力资源管理外文文献翻译

文献信息: 文献标题:Challenges and opportunities affecting the future of human resource management(影响人力资源管理未来的挑战和机遇) 国外作者:Dianna L. Stone,Diana L. Deadrick 文献出处:《Human Resource Management Review》, 2015, 25(2):139-145 字数统计:英文3725单词,21193字符;中文6933汉字 外文文献: Challenges and opportunities affecting the future of human resource management Abstract Today, the field of Human Resource Management (HR) is experiencing numerous pressures for change. Shifts in the economy, globalization, domestic diversity, and technology have created new demands for organizations, and propelled the field in some completely new directions. However, we believe that these challenges also create numerous opportunities for HR and organizations as a whole. Thus, the primary purposes of this article are to examine some of the challenges and opportunities that should influence the future of HR. We also consider implications for future research and practice in the field. Keywords: Future of human resource management, Globalization, Knowledge economy Diversity, Technology 1.Change from a manufacturing to a service or knowledge economy One of the major challenges influencing the future of HR processes is the change from a manufacturing to a service or knowledgebased economy. This new economy is characterized by a decline in manufacturing and a growth in service or knowledge as the core of the economic base. A service economy can be defined as a system based on buying and selling of services or providing something for others (Oxford

计算机专业外文文献及翻译

微软Visual Studio 1微软Visual Studio Visual Studio 是微软公司推出的开发环境,Visual Studio可以用来创建Windows平台下的Windows应用程序和网络应用程序,也可以用来创建网络服务、智能设备应用程序和Office 插件。Visual Studio是一个来自微软的集成开发环境IDE,它可以用来开发由微软视窗,视窗手机,Windows CE、.NET框架、.NET精简框架和微软的Silverlight支持的控制台和图形用户界面的应用程序以及Windows窗体应用程序,网站,Web应用程序和网络服务中的本地代码连同托管代码。 Visual Studio包含一个由智能感知和代码重构支持的代码编辑器。集成的调试工作既作为一个源代码级调试器又可以作为一台机器级调试器。其他内置工具包括一个窗体设计的GUI应用程序,网页设计师,类设计师,数据库架构设计师。它有几乎各个层面的插件增强功能,包括增加对支持源代码控制系统(如Subversion和Visual SourceSafe)并添加新的工具集设计和可视化编辑器,如特定于域的语言或用于其他方面的软件开发生命周期的工具(例如Team Foundation Server的客户端:团队资源管理器)。 Visual Studio支持不同的编程语言的服务方式的语言,它允许代码编辑器和调试器(在不同程度上)支持几乎所有的编程语言,提供了一个语言特定服务的存在。内置的语言中包括C/C + +中(通过Visual C++),https://www.sodocs.net/doc/1718611210.html,(通过Visual https://www.sodocs.net/doc/1718611210.html,),C#中(通过Visual C#)和F#(作为Visual Studio 2010),为支持其他语言,如M,Python,和Ruby等,可通过安装单独的语言服务。它也支持的 XML/XSLT,HTML/XHTML ,JavaScript和CSS.为特定用户提供服务的Visual Studio也是存在的:微软Visual Basic,Visual J#、Visual C#和Visual C++。 微软提供了“直通车”的Visual Studio 2010组件的Visual Basic和Visual C#和Visual C + +,和Visual Web Developer版本,不需任何费用。Visual Studio 2010、2008年和2005专业版,以及Visual Studio 2005的特定语言版本(Visual Basic、C++、C#、J#),通过微软的下载DreamSpark计划,对学生免费。 2架构 Visual Studio不支持任何编程语言,解决方案或工具本质。相反,它允许插入各种功能。特定的功能是作为一个VS压缩包的代码。安装时,这个功能可以从服务器得到。IDE提供三项服务:SVsSolution,它提供了能够列举的项目和解决方案; SVsUIShell,它提供了窗口和用户界面功能(包括标签,工具栏和工具窗口)和SVsShell,它处理VS压缩包的注册。此外,IDE还可以负责协调和服务之间实现通信。所有的编辑器,设计器,项目类型和其他工具都是VS压缩包存在。Visual Studio 使用COM访问VSPackage。在Visual Studio SDK中还包括了管理软件包框架(MPF),这是一套管理的允许在写的CLI兼容的语言的任何围绕COM的接口。然而,MPF并不提供所有的Visual Studio COM 功能。

论文外文文献翻译3000字左右

南京航空航天大学金城学院 毕业设计(论文)外文文献翻译 系部经济系 专业国际经济与贸易 学生姓名陈雅琼学号2011051115 指导教师邓晶职称副教授 2015年5月

Economic policy,tourism trade and productive diversification (Excerpt) Iza Lejárraga,Peter Walkenhorst The broad lesson that can be inferred from the analysis is that promoting tourism linkages with the productive capabilities of a host country is a multi-faceted approach influenced by a variety of country conditions.Among these,fixed or semi-fixed factors of production,such as land,labor,or capital,seem to have a relatively minor influence.Within the domain of natural endowments,only agricultural capital emerged as significant.This is a result that corresponds to expectations,given that foods and beverages are the primary source of demand in the tourism economy.Hence,investments in agricultural technology may foment linkages with the tourism market.It is also worth mentioning that for significant backward linkages to emerge with local agriculture,a larger scale of tourism may be important. According to the regression results,a strong tourism–agriculture nexus will not necessarily develop at a small scale of tourism demand. It appears that variables related to the entrepreneurial capital of the host economy are of notable explanatory significance.The human development index(HDI), which is used to measure a country's general level of development,is significantly and positively associated with tourism linkages.One plausible explanation for this is that international tourists,who often originate in high-income countries,may feel more comfortable and thus be inclined to consume more in a host country that has a life-style to which they can relate easily.Moreover,it is important to remember that the HDI also captures the relative achievements of countries in the level of health and education of the population.Therefore,a higher HDI reflects a healthier and more educated workforce,and thus,the quality of local entrepreneurship.Related to this point,it is important to underscore that the level of participation of women in the host economy also has a significantly positive effect on linkages.In sum, enhancing local entrepreneurial capital may expand the linkages between tourism and other sectors of the host country.

英文文献及中文翻译

毕业设计说明书 英文文献及中文翻译 学院:专 2011年6月 电子与计算机科学技术软件工程

https://www.sodocs.net/doc/1718611210.html, Overview https://www.sodocs.net/doc/1718611210.html, is a unified Web development model that includes the services necessary for you to build enterprise-class Web applications with a minimum of https://www.sodocs.net/doc/1718611210.html, is part of https://www.sodocs.net/doc/1718611210.html, Framework,and when coding https://www.sodocs.net/doc/1718611210.html, applications you have access to classes in https://www.sodocs.net/doc/1718611210.html, Framework.You can code your applications in any language compatible with the common language runtime(CLR), including Microsoft Visual Basic and C#.These languages enable you to develop https://www.sodocs.net/doc/1718611210.html, applications that benefit from the common language runtime,type safety, inheritance,and so on. If you want to try https://www.sodocs.net/doc/1718611210.html,,you can install Visual Web Developer Express using the Microsoft Web Platform Installer,which is a free tool that makes it simple to download,install,and service components of the Microsoft Web Platform.These components include Visual Web Developer Express,Internet Information Services (IIS),SQL Server Express,and https://www.sodocs.net/doc/1718611210.html, Framework.All of these are tools that you use to create https://www.sodocs.net/doc/1718611210.html, Web applications.You can also use the Microsoft Web Platform Installer to install open-source https://www.sodocs.net/doc/1718611210.html, and PHP Web applications. Visual Web Developer Visual Web Developer is a full-featured development environment for creating https://www.sodocs.net/doc/1718611210.html, Web applications.Visual Web Developer provides an ideal environment in which to build Web sites and then publish them to a hosting https://www.sodocs.net/doc/1718611210.html,ing the development tools in Visual Web Developer,you can develop https://www.sodocs.net/doc/1718611210.html, Web pages on your own computer.Visual Web Developer includes a local Web server that provides all the features you need to test and debug https://www.sodocs.net/doc/1718611210.html, Web pages,without requiring Internet Information Services(IIS)to be installed. Visual Web Developer provides an ideal environment in which to build Web sites and then publish them to a hosting https://www.sodocs.net/doc/1718611210.html,ing the development tools in Visual Web Developer,you can develop https://www.sodocs.net/doc/1718611210.html, Web pages on your own computer.

客户关系管理外文文献翻译(2017)

XXX学院 毕业设计(论文)外文资料翻译 学院:计算机与软件工程学院 专业:计算机科学技术(软件工程方向) 姓名: 学号: 外文出处:GoyKakus.THE RESEARCH OFCUSTOMER RELATIONSHIP MANAGEMENT STRATEGY [J]. International Journal of Management Research & Review, 2017, 1(9): 624-635. 附件: 1.外文资料翻译译文;2.外文原文。 注:请将该封面与附件装订成册。

附件1:外文资料翻译译文 客户关系管理战略研究 Goy Kakus 摘要 客户关系管理解决方案,通过为你提供客户业务数据来帮助你提供客户想要的服务或产品,提供更好的客户服务、交叉销售和更有效的销售,达成交易,保留现有客户并更好地理解你的客户是谁。本文探讨了客户关系管理模型在获得、保持与发展策略方面的优势。然而,我们对其定义和意义还存在一些困惑。本文通过考察关系营销和其他学科方面的相关文献,解释了客户关系管理的概念基础,从而对客户关系管理的知识作出了贡献。 关键词:客户关系管理模型, 客户关系管理的博弈改变者与关键策略 引言 CRM 是客户关系管理的简称。它的特征在于公司与客户的沟通,无论是销售还是服务相关的。客户关系管理这一术语经常用来解释企业客户关系,客户关系管理系统也以同样的方式被用来处理商业联系, 赢得客户,达成合同和赢得销售。 客户关系管理通常被考虑作为一个业务策略,从而使企业能够: *了解客户 *通过更好的客户体验留住客户 *吸引新客户 *赢得新客户和达成合同 *提高盈利 *减少客户管理成本 *通过服务台等工具软件,电子邮件组织者和不同类型的企业应用程序,企业业务经常寻求个性化的在线体验。 设计精良的客户关系管理包括以下特征: 1.客户关系管理是一种以顾客为中心并以客户投入为基础的服务响应,一对一的解决客户的必需品, 买家和卖家服务中心直接在线互动,帮助客户解决他

英文文献及翻译(计算机专业)

NET-BASED TASK MANAGEMENT SYSTEM Hector Garcia-Molina, Jeffrey D. Ullman, Jennifer Wisdom ABSTRACT In net-based collaborative design environment, design resources become more and more varied and complex. Besides com mon in formatio n man ageme nt systems, desig n resources can be orga ni zed in connection with desig n activities. A set of activities and resources linked by logic relations can form a task. A task has at least one objective and can be broken down into smaller ones. So a design project can be separated in to many subtasks formi ng a hierarchical structure. Task Management System (TMS) is designed to break down these tasks and assig n certa in resources to its task no des. As a result of decompositi on. al1 desig n resources and activities could be man aged via this system. KEY WORDS : Collaborative Design, Task Management System (TMS), Task Decompositi on, In formati on Man ageme nt System 1 Introduction Along with the rapid upgrade of request for adva need desig n methods, more and more desig n tool appeared to support new desig n methods and forms. Desig n in a web en vir onment with multi-part ners being invo Ived requires a more powerful and efficie nt man ageme nt system .Desig n part ners can be located everywhere over the n et with their own organizations. They could be mutually independent experts or teams of tens of employees. This article discussesa task man ageme nt system (TMS) which man ages desig n activities and resources by break ing dow n desig n objectives and re-orga nizing desig n resources in conn ecti on with the activities. Compari ng with com mon information management systems (IMS) like product data management system and docume nt man ageme nt system, TMS can man age the whole desig n process. It has two tiers which make it much more flexible in structure. The lower tier con sists of traditi onal com mon IMSS and the upper one fulfills logic activity management through controlling a tree-like structure, allocating design resources and

外文文献翻译助手

五分钟搞定5000字-外文文献翻译 在科研过程中阅读翻译外文文献是一个非常重要的环节,许多领域高水平的文献都是外文文献,借鉴一些外文文献翻译的经验是非常必要的。由于特殊原因我翻译外文文献的机会比较多,慢慢地就发现了外文文献翻译过程中的三大利器:Google“翻译”频道、金山词霸(完整版本)和CNKI“翻译助手"。 具体操作过程如下: 1.先打开金山词霸自动取词功能,然后阅读文献; 2.遇到无法理解的长句时,可以交给Google处理,处理后的结果猛一看,不堪入目,可是经过大脑的再处理后句子的意思基本就明了了; 3.如果通过Google仍然无法理解,感觉就是不同,那肯定是对其中某个“常用单词”理解有误,因为某些单词看似很简单,但是在文献中有特殊的意思,这时就可以通过CNKI的“翻译助手”来查询相关单词的意思,由于CNKI的单词意思都是来源与大量的文献,所以它的吻合率很高。 另外,在翻译过程中最好以“段落”或者“长句”作为翻译的基本单位,这样才不会造成“只见树木,不见森林”的误导。 注: 1、Google翻译:https://www.sodocs.net/doc/1718611210.html,/language_tools google,众所周知,谷歌里面的英文文献和资料还算是比较详实的。我利用它是这样的。一方面可以用它查询英文论文,当然这方面的帖子很多,大家可以搜索,在此不赘述。回到我自己说的翻译上来。下面给大家举个例子来说明如何用吧 比如说“电磁感应透明效应”这个词汇你不知道他怎么翻译, 首先你可以在CNKI里查中文的,根据它们的关键词中英文对照来做,一般比较准确。

在此主要是说在google里怎么知道这个翻译意思。大家应该都有词典吧,按中国人的办法,把一个一个词分着查出来,敲到google里,你的这种翻译一般不太准,当然你需要验证是否准确了,这下看着吧,把你的那支离破碎的翻译在google里搜索,你能看到许多相关的文献或资料,大家都不是笨蛋,看看,也就能找到最精确的翻译了,纯西式的!我就是这么用的。 2、CNKI翻译:https://www.sodocs.net/doc/1718611210.html, CNKI翻译助手,这个网站不需要介绍太多,可能有些人也知道的。主要说说它的有点,你进去看看就能发现:搜索的肯定是专业词汇,而且它翻译结果下面有文章与之对应(因为它是CNKI检索提供的,它的翻译是从文献里抽出来的),很实用的一个网站。估计别的写文章的人不是傻子吧,它们的东西我们可以直接拿来用,当然省事了。网址告诉大家,有兴趣的进去看看,你们就会发现其乐无穷!还是很值得用的。https://www.sodocs.net/doc/1718611210.html, 3、网路版金山词霸(不到1M):https://www.sodocs.net/doc/1718611210.html,/6946901637944806 翻译时的速度: 这里我谈的是电子版和打印版的翻译速度,按个人翻译速度看,打印版的快些,因为看电子版本一是费眼睛,二是如果我们用电脑,可能还经常时不时玩点游戏,或者整点别的,导致最终SPPEED变慢,再之电脑上一些词典(金山词霸等)在专业翻译方面也不是特别好,所以翻译效果不佳。在此本人建议大家购买清华大学编写的好像是国防工业出版社的那本《英汉科学技术词典》,基本上挺好用。再加上网站如:google CNKI翻译助手,这样我们的翻译速度会提高不少。 具体翻译时的一些技巧(主要是写论文和看论文方面) 大家大概都应预先清楚明白自己专业方向的国内牛人,在这里我强烈建议大家仔

英文文献及中文翻译撰写格式

关于毕业设计说明书(论文)英文文献及中文翻译撰写格式 为提高我校毕业生毕业设计说明书(毕业论文)的撰写质量,做到毕业设计说明书(毕业论文)在内容和格式上的统一和规范,特规定如下: 一、装订顺序 论文(设计说明书)英文文献及中文翻译内容一般应由3个部分组成,严格按以下顺序装订。 1、封面 2、中文翻译 3、英文文献(原文) 二、书写格式要求 1、毕业设计(论文)英文文献及中文翻译分毕业设计说明书英文文献及中文翻译和毕业论文英文文献及中文翻译两种,所有出现相关字样之处请根据具体情况选择“毕业设计说明书” 或“毕业论文”字样。 2、毕业设计说明书(毕业论文)英文文献及中文翻译中的中文翻译用Word 软件编辑,英文文献用原文,一律打印在A4幅面白纸上,单面打印。 3、毕业设计说明书(毕业论文)英文文献及中文翻译的上边距:30mm;下边距:25mm;左边距:3Omm;右边距:2Omm;行间距1.5倍行距。 4、中文翻译页眉的文字为“中北大学2019届毕业设计说明书” 或“中北大学××××届毕业论文”,用小四号黑体字,页眉线的上边距为25mm;页脚的下边距为18mm。 5、中文翻译正文用小四号宋体,每章的大标题用小三号黑体,加粗,留出上下间距为:段前0.5行,段后0.5行;二级标题用小四号黑体,加粗;其余小标题用小四号黑体,不加粗。 6、文中的图、表、附注、公式一律采用阿拉伯数字分章编号。如图1.2,表2.3,附注3.2或式4.3。 7、图表应认真设计和绘制,不得徒手勾画。表格与插图中的文字一律用5号宋体。

每一插图和表格应有明确简短的图表名,图名置于图之下,表名置于表之上,图表号与图表名之间空一格。插图和表格应安排在正文中第一次提及该图表的文字的下方。当插图或表格不能安排在该页时,应安排在该页的下一页。 图表居中放置,表尽量采用三线表。每个表应尽量放在一页内,如有困难,要加“续表X.X”字样,并有标题栏。 图、表中若有附注时,附注各项的序号一律用阿拉伯数字加圆括号顺序排,如:注①。附注写在图、表的下方。 文中公式的编号用圆括号括起写在右边行末顶格,其间不加虚线。 8、文中所用的物理量和单位及符号一律采用国家标准,可参见国家标准《量和单位》(GB3100~3102-93)。 9、文中章节编号可参照《中华人民共和国国家标准文献著录总则》。

相关主题