搜档网
当前位置:搜档网 › 抄袭的定义(英文权威)

抄袭的定义(英文权威)

抄袭的定义(英文权威)
抄袭的定义(英文权威)

Defining and Avoiding Plagiarism: The WPA Statement on Best Practices

Download a PDF version of this document.

Plagiarism has always concerned teachers and administrators, who want students’ work to repre sent their own efforts and to reflect the outcomes of their learning. However, with the advent of the Internet and easy access to almost limitless written material on every conceivable topic, suspicion of student plagiarism has begun to affect teachers at all levels, at times diverting them from the work of developing students’ writing, reading, and critical thinking abilities. This statement responds to the growing educational concerns about plagiarism in four ways: by defining plagiarism; by suggesting some of the causes of plagiarism; by proposing a set of responsibilities (for students, teachers, and administrators) to address the problem of plagiarism; and by recommending a set of practices for teaching and learning that can significantly reduce the likelihood of plagiarism. The statement is intended to provide helpful suggestions and clarifications so that instructors, administrators, and students can work together more effectively in support of excellence in teaching and learning. What Is Plagiarism?

In instructional settings, plagiarism is a multifaceted and ethically complex problem. However, if any definition of plagiarism is to be helpful to administrators, faculty, and students, it needs to be as simple and direct as possible within the context for which it is intended.

Definition: In an instructional setting, plagiarism occurs when a writer deliberately uses someone else’s language,ideas, or other original (not common-knowledge) material without acknowledging its source.

This definition applies to texts published in print or on-line, to manuscripts, and to the work of other student writers.

Most current discussions of plagiarism fail to distinguish between:

1.submitting someone else’s text as one’s own or attempting to

blur the line between one’s own ideas or words and those

borrowed from another source, and

2.carelessly or inadequately citing ideas and words borrowed

from another source.

Such discussions conflate plagiarism with the misuse of sources.

Ethical writers make every effort to acknowledge sources fully and appropriately in accordance with the contexts and genres of their writing. A student who attempts (even if clumsily) to identify and credit his or her source, but who misuses a specific citation format or incorrectly uses quotation marks or other forms of identifying material taken from other sources, has not plagiarized. Instead, such a student should be considered to have failed to cite and document sources appropriately.

What are the Causes of Plagiarism and the Failure to Use and Document Sources Appropriately?

Students who are fully aware that their actions constitute plagiarism—for example, copying published information into a paper without source attribution for the purpose of claiming the information as their own, or turning in material written by another student—are guilty of academic misconduct. Although no excuse will lessen the breach of ethical conduct that such behavior represents, understanding why students plagiarize can help teachers to consider how to reduce the opportunities for plagiarism in their classrooms.

?Students may fear failure or fear taking risks in their own work.

?Students may have poor time-management skills or they may plan poorly for the time and effort required for research-based writing, and believe they have no choice but to plagiarize.

?Students may view the course, the assignment, the conventions of academic documentation, or the consequences of cheating as unimportant.

?Teachers may present students with assignments so generic or unparticularized that students may believe they are justified in looking for canned responses.

?Instructors and institutions may fail to report cheating when it does occur, or may not enforce appropriate penalties.

Students are not guilty of plagiarism when they try in good faith to acknowledge others’ work but fail to do so accurately or fully. These failures are largely the result of failures in prior teaching and learning:

students lack the knowledge of and ability to use the conventions of authorial attribution. The following conditions and practices may result in texts that falsely appear to represent plagiarism as we have defined it:

?Students may not know how to integrate the ideas of others and document the sources of those ideas appropriately in their

texts.

?Students will make mistakes as they learn how to integrate others’ words or ideas into their own work because error is a

natural part of learning.

?Students may not know how to take careful and fully documented notes during their research.

?Academicians and scholars may define plagiarism differently or more stringently than have instructors or administrators in

students’ ear lier education or in other writing situations.

?College instructors may assume that students have already learned appropriate academic conventions of research and

documentation.

?College instructors may not support students as they attempt to learn how to research and document sources; instead,

instructors may assign writing that requires research and

expect its appropriate documentation, yet fail to appreciate the difficulty of novice academic writers to execute these tasks

successfully.

?Students from other cultures may not be familiar with the conventions governing attribution and plagiarism in American

colleges and universities.

?In some settings, using other people’s words or ideas as their own is an acceptable practice for writers of certain kinds of texts (for example, organizational documents), making the concepts of plagiarism and documentation less clear cut than academics often acknowledge and thereby confusing students who have

not learned that the conventions of source attribution vary in

different contexts.

What are our Shared Responsibilities?

When assignments are highly generic and not classroom-specific, when there is no instruction on plagiarism and appropriate source attribution, and when students are not led through the iterative processes of writing and revising, teachers often find themselves playing an adversarial role as “plagiarism police” instead of a coaching role as educators. Just as students must live up to their responsibility to behave ethically and honestly as learners, teachers must recognize

that they can encourage or discourage plagiarism not just by policy and admonition, but also in the way they structure assignments and in the processes they use to help students define and gain interest in topics developed for papers and projects.

Students should understand research assignments as opportunities for genuine and rigorous inquiry and learning. Such an understanding involves:

?Assembling and analyzing a set of sources that they have themselves determined are relevant to the issues they are

investigating;

?Acknowledging clearly when and how they are drawing on the ideas or phrasings of others;

?Learning the conventions for citing documents and

acknowledging sources appropriate to the field they are

studying;

?Consulting their instructors when they are unsure about how to acknowledge the contributions of others to their thought and

writing.

Faculty need to design contexts and assignments for learning that encourage students not simply to recycle information but to investigate and analyze its sources. This includes:

?Building support for researched writing (such as the analysis of models, individual/group conferences, or peer review) into

course designs;

?Stating in writing their policies and expectations for documenting sources and avoiding plagiarism;

?Teaching students the conventions for citing documents and acknowledging sources in their field, and allowing students to

practice these skills;

?Avoiding the use of recycled or formulaic assignments that may invite stock or plagiarized responses;

?Engaging students in the process of writing, which produces materials such as notes, drafts, and revisions that are difficult to plagiarize;

?Discussing problems students may encounter in documenting and analyzing sources, and offering strategies for avoiding or

solving those problems;

?Discussing papers suspected of plagiarism with the students who have turned them in, to determine if the papers are the

result of a deliberate intent to deceive;

?Reporting possible cases of plagiarism to appropriate administrators or review boards.

Administrators need to foster a program- or campus-wide climate that values academic honesty. This involves:

?Publicizing policies and expectations for conducting ethical research, as well as procedures for investigating possible cases of academic dishonesty and its penalties;

?Providing support services (for example, writing centers or Web pages) for students who have questions about how to cite

sources;

?Supporting faculty and student discussions of issues concerning academic honesty, research ethics, and plagiarism;

?Recognizing and improving upon working conditions, such as high teacher-student ratios, that reduce opportunities for more individualized instruction and increase the need to handle

papers and assignments too quickly and mechanically;

?Providing faculty development opportunities for instructors to reflect on and, if appropriate, change the ways they work with writing in their courses.

Best Practices

College writing is a process of goal setting, writing, giving and using feedback, revising, and editing. Effective assignments construct specific writing situations and build in ample room for response and revision. There is no guarantee that, if adopted, the strategies listed below will eliminate plagiarism; but in supporting students throughout their research process, these strategies make plagiarism both difficult and unnecessary.

1. Explain Plagiarism and Develop Clear Policies

?Talk about the underlying implications of plagiarism.

Remind students that the goal of research is to engage, through writing, in a purposeful, scholarly discussion of issues that are sometimes passed over in daily life. Understanding,

augmenting, engaging in dialogue with, and challenging the

work of others are part of becoming an effective citizen in a

complex society. Plagiarism does not simply devalue the

institution and the degree it offers; it hurts the inquirer, who

has avoided thinking independently and has lost the

opportunity to participate in broader social conversations.

?Include in your syllabus a policy for using sources, and discuss it in your course. Define a policy that clearly explains the consequences of both plagiarism (such as turning in a paper known to be written by someone else) and the misuse or

inaccurate citation of sources.

?If your university does not already have one, establish an honor code to which all students subscribe; a judicial board to hear plagiarism cases; or a departmental

ombudsperson to hear cases brought between students and instructors.

2. Improve the Design and Sequence of Assignments

?Design assignments that require students to explore a subject in depth. Research questions and assignment topics should be based on principles of inquiry and on the genuine

need to discover something about the topic, and should present that topic to an audience in the form of an exploration or an

argument.

?Start building possible topics early. Good writing reflects a thorough understanding of the topic being addressed or

researched. Giving students time to explore their topics slowly and helping them to narrow their focus from broad ideas to

specific research questions will personalize their research and

provide evidence of their ongoing investigations

?Consider establishing a course theme, and then allow students to define specific questions about that theme so that they become engaged in learning new ideas and

begin to own their research. A course theme (like “literacy”

or “popular culture”) allows students and in structor to develop expertise and to support each other as they read, write, and

engage in their research. Grounding the theme in a local

context (such as the campus, or the neighborhood or city where the campus is located) can provide greater relevance to

students’ lives. Once stu dents have defined a topic within the

course theme, ask them to reflect frequently on their choice of topic: about what they already know about the topic when they begin their research; about what new ideas they are learning

along the way; and about what new subjects for research they are discovering.

?Develop schedules for students that both allow them time to explore and support them as they work toward

defined topics. As researchers learn more about their subjects, they typically discover new, unforeseen questions and interests to explore. However, student researchers do not have unlimited time for their work—at some point, they must choose a focus for their papers. Conferences with students (sometimes held in the library or computer resource center) are invaluable for enabling them to refine their focus and begin their inquiry.

?Support each step of the research process. Students often have little experience planning and conducting research. Using planning guides, in-class activities, and portfolios, instructors

should “stage” students’ work and provide support at each

stage—from invention to drafting, through revision and

polishing. Collecting interim materials (such as annotated

photocopies) helps break the research assignment down into

elements of the research process while providing instructors

with evidence of students’ original work. Building “low-st akes”

writing into the research process, such as reflective progress

reports, allows instructors to coach students more effectively

while monitoring their progress.

?Make the research process, and technology used for it, visible. Ask your students to consider how various

technologies—computers, fax machines, photocopiers,

e-mail—affect the way information is gathered and synthesized, and what effect these technologies may have on plagiarism.

?Attend to conventions of different genres of writing. As people who read and write academic work regularly, instructors are sensitive to differences in conventions across different

disciplines and, sometimes, within disciplines. However,

students might not be as aware of these differences. Plan

activities—like close examinations of academic readings—that

ask students to analyze and reflect on the conventions in

different disciplines.

3. Attend to Sources and the Use of Reading

?Ask students to draw on and document a variety of sources. Build into your assignments additional sources, such as systematic observation, interviews, simple surveys, or other datagathering methods. Incorporating a variety of sources can help students develop ways of gathering, assessing, reading,

and using different kinds of information, and can make for a

livelier, more unique paper.

?Consider conventions. Appropriate use of citations depends on students’ familiarity with the conventions of the genre(s)

they are using for writing. Design activities that help students to become familiar with these conventions and make informed

choices about when and where to employ them.

?Show students how to evaluate their sources. Provide opportunities for students to discuss the quality of the content and context of their sources, through class discussions,

electronic course management programs or Internet chat

spaces, or reflective assignments. Discuss with students how

their sources will enable them to support their argument or

document their research.

?Focus on reading. Successful reading is as important to thoughtful research essays as is successful writing. Develop

reading-related heuristics and activities that will help students to read carefully and to think about how or whether to use that reading in their research projects.

4. Work on Plagiarism Responsibly

?Distinguish between misuse of sources and plagiarism. If students have misused sources, they probably do not

understand how to use them correctly. If this is the case, work with students so that they understand how to incorporate and cite sources correctly. Ask them to rewrite the sections where sources have been misused.

?Ask students for documentation. If a student’s work raises suspicions, talk with him or her about your concerns. Ask

students to show you their in-process work (such as sources,

summaries, and drafts) and walk you through their research

process, describing how it led to the production of their draft. If they are unable to do this, discuss with them the consequences of plagiarism described in your syllabus (and, perhaps, by your institution). If you have talked with a student and want to

pursue your own investigation of his or her work, turn to

sources that the student is likely to have used and look for

evidence of replication.

?Use plagiarism detection services cautiously. Although such services may be tempting, they are not always reliable.

Furthermore, their availability should never be used to justify

the avoidance of responsible teaching methods such as those

described in this document.

5. Take Appropriate Disciplinary Actions

?Pay attention to institutional guidelines. Many institutions have clearly defined procedures for pursuing claims of academic dishonesty. Be sure you have read and understood these before you take any action.

?Consider your goal. If a student has plagiarized, consider what the student should take away from the experience. In

some cases, a failing grade on the paper, a failure in the course, academic probation, or even expulsion might achieve those

goals. In other cases, recreating the entire research process,

from start to finish, might be equally effective.

Council of Writing Program Administrators, January, 2003

毕业论文(英文翻译)排版格式

英文翻译说明 1. 英文翻译文章输成word,5号新罗马(New Times Roman)字体,1.5倍行间距,将来方便打印和一起装订;英文中的图表要重新画,禁止截图。 2. 整篇论文1.5倍行间距,打印时,用B5纸,版面上空2.5cm,下空2cm,左空2.5cm,右空2cm(左装订)。 3. 论文翻译后的摘要用五号宋体,正文小四号宋体、英文和数字用新罗马(New Times Roman)12、参考文献的内容用五号字体。图和表头用五号字体加粗并居中,图和表中的内容用五号字体。论文翻译的作者用五号字体加粗。 论文大标题………小三号黑体、加黑、居中 第二层次的题序和标题………小四号黑体、加黑、居中 第三层次的题序和标题………小四号宋体、加黑、居中 正文……………………………小四号宋体、英文用新罗马12 页码……………………………小五号居中,页码两边不加修饰符 4. 论文中参考文献严格按照下述排版。 专著格式:序号.编著者.书名[M].出版地: 出版社, 年代, 起止页码 期刊论文格式:序号.作者.论文名称[J]. 期刊名称, 年度, 卷(期): 起止页码 学位论文格式:序号.作者.学位论文名称[D]. 发表地: 学位授予单位, 年度 例子: (1).胡千庭, 邹银辉, 文光才等. 瓦斯含量法预测突出危险新技术[J]. 煤炭学报, 2007.32(3): 276-280. (2). 胡千庭. 煤与瓦斯突出的力学作用机理及应用研究[D]. 北京: 中国矿业大学(北京), 2007. (3). 程伟. 煤与瓦斯突出危险性预测及防治技术[M]. 徐州: 中国矿业大学出版社, 2003.

本科论文 3000字外文翻译

附录A 3 Image Enhancement in the Spatial Domain The principal objective of enhancement is to process an image so that the result is more suitable than the original image for a specific application. The word specific is important, because it establishes at the outset than the techniques discussed in this chapter are very much problem oriented. Thus, for example, a method that is quite useful for enhancing X-ray images may not necessarily be the best approach for enhancing pictures of Mars transmitted by a space probe. Regardless of the method used .However, image enhancement is one of the most interesting and visually appealing areas of image processing. Image enhancement approaches fall into two broad categories: spatial domain methods and frequency domain methods. The term spatial domain refers to the image plane itself, and approaches in this category are based on direct manipulation of pixels in an image. Fourier transform of an image. Spatial methods are covered in this chapter, and frequency domain enhancement is discussed in Chapter 4.Enhancement techniques based on various combinations of methods from these two categories are not unusual. We note also that many of the fundamental techniques introduced in this chapter in the context of enhancement are used in subsequent chapters for a variety of other image processing applications. There is no general theory of image enhancement. When an image is processed for visual interpretation, the viewer is the ultimate judge of how well a particular method works. Visual evaluation of image quality is a highly is highly subjective process, thus making the definition of a “good image” an elusive standard by which to compare algorithm performance. When the problem is one of processing images for machine perception, the evaluation task is somewhat easier. For example, in dealing with a character recognition application, and leaving aside other issues such as computational requirements, the best image processing method would be the one yielding the best machine recognition results. However, even in situations when a

java毕业论文外文文献翻译

Advantages of Managed Code Microsoft intermediate language shares with Java byte code the idea that it is a low-level language witha simple syntax , which can be very quickly translated intonative machine code. Having this well-defined universal syntax for code has significant advantages. Platform independence First, it means that the same file containing byte code instructions can be placed on any platform; atruntime the final stage of compilation can then be easily accomplished so that the code will run on thatparticular platform. In other words, by compiling to IL we obtain platform independence for .NET, inmuch the same way as compiling to Java byte code gives Java platform independence. Performance improvement IL is actually a bit more ambitious than Java bytecode. IL is always Just-In-Time compiled (known as JIT), whereas Java byte code was ofteninterpreted. One of the disadvantages of Java was that, on execution, the process of translating from Javabyte code to native executable resulted in a loss of performance. Instead of compiling the entire application in one go (which could lead to a slow start-up time), the JITcompiler simply compiles each portion of code as it is called (just-in-time). When code has been compiled.once, the resultant native executable is stored until the application exits, so that it does not need to berecompiled the next time that portion of code is run. Microsoft argues that this process is more efficientthan compiling the entire application code at the start, because of the likelihood that large portions of anyapplication code will not actually be executed in any given run. Using the JIT compiler, such code willnever be compiled.

毕业论文英文文献翻译 之 中文翻译

译文 学院:土建学院专业:土木工程学号:064&&&&&&&姓名:&&&&&& 指导教师: &&&&&&教授

江苏科技大学 2010年 03 月 28 日 均布荷载作用下挡土墙上的土压力 G. I. Shvetsov UDC 624.131.531.2 在前一篇文章中,我们确定了在只考虑填土自重的试验条件下,作用在挡土墙上的压力。这篇文章是第一篇文章的延续,致力于探索填土在外界均布荷载作用下,在挡土墙上产生的荷载问题,当在使用到先前得到的岩土平衡微分方程时,我们仅仅只改变边界条件,因为在这种情况下我们使用了与初始解决方案相同的原理。我们只提取那些与附加土压力有关的新成果,以及仅定义那些第一次出现的新符号。 在设计中,我们通常把作用在挡土墙上的土压力看作是呈三角形分布的,应力也被假设为是沿着墙体均匀连续分布的,但是实验结果并没有证实这一理论,试验表明表面

的附加应力随墙的高度变化并不均匀,而是从回填土顶部的最大值开始一直减小到其底部的最小值。因而,在M.C.瓦尔跟实验图的纵坐标的最大值超出理论计算值近两倍,最小值达到理论计算值的0.65倍,因为土压力的增加主要是在墙的上部,由此所得出的作用点比计算所得出的要高很多。 F.M.shikhiev 的理论里包含了关于挡土墙均布荷载作用下的二维应力折减问题,但是, 附加应力的分布对挡土墙受超荷载作用的效果问题的影响,并没有经过合适的理论研究。 虽然,不同研究人员所做的无数次试验已经确定,侧壁的扭曲效应更大,随着表面的粗糙程度而变大,随挡土墙的宽度和高度之比。在这篇文章里,我们将尽可能的填补这方面的空白。 在边界条件0q 0,y x ==的基础上,我们可以确定试验中作用在有侧向限制的填土上没有超荷的垂直应力。如果一个外附加应力作用在楔块表面上的强度为x σ,则在这种情况下,我们可以从已知条件得出,当y=0时,x q = x σ,既可以得出方程 ()()1 1 1/2/k x x w w h y h A q f m h A λσξ+-=+ (1) 其中 ,荷载分配的不均匀系数A 1和土的深度有关: ()() 111/1/k k A y h y h -= --- (2) 方程一是通用的,因为对于任意一种荷载分布x σ它都可以计算出任意土层中某一点的应力,因此便足以表明应力在X 轴方向的分布规律。当0=x σ时,方程便简化成相应的没有附加应力的形式,并且,当0=w f 而且0>x σ时,它反映了在考虑了附加应力条件时的二维问题,即: 11k x x h y q A h γσ?? =+- ??? (3) 满布在滑动楔上的均布荷载对我们已经知道的设计系数k ,n,和ξw 的值并没有影响,所以,计算作用在挡土墙上的正应力,切应力和总应力的表达式如下:

毕业论文英文参考文献与译文

Inventory management Inventory Control On the so-called "inventory control", many people will interpret it as a "storage management", which is actually a big distortion. The traditional narrow view, mainly for warehouse inventory control of materials for inventory, data processing, storage, distribution, etc., through the implementation of anti-corrosion, temperature and humidity control means, to make the custody of the physical inventory to maintain optimum purposes. This is just a form of inventory control, or can be defined as the physical inventory control. How, then, from a broad perspective to understand inventory control? Inventory control should be related to the company's financial and operational objectives, in particular operating cash flow by optimizing the entire demand and supply chain management processes (DSCM), a reasonable set of ERP control strategy, and supported by appropriate information processing tools, tools to achieved in ensuring the timely delivery of the premise, as far as possible to reduce inventory levels, reducing inventory and obsolescence, the risk of devaluation. In this sense, the physical inventory control to achieve financial goals is just a means to control the entire inventory or just a necessary part; from the perspective of organizational functions, physical inventory control, warehouse management is mainly the responsibility of The broad inventory control is the demand and supply chain management, and the whole company's responsibility. Why until now many people's understanding of inventory control, limited physical inventory control? The following two reasons can not be ignored: First, our enterprises do not attach importance to inventory control. Especially those who benefit relatively good business, as long as there is money on the few people to consider the problem of inventory turnover. Inventory control is simply interpreted as warehouse management, unless the time to spend money, it may have been to see the inventory problem, and see the results are often very simple procurement to buy more, or did not do warehouse departments . Second, ERP misleading. Invoicing software is simple audacity to call it ERP, companies on their so-called ERP can reduce the number of inventory, inventory control, seems to rely on their small software can get. Even as SAP, BAAN ERP world, the field of

毕业论文5000字英文文献翻译

英文翻译 英语原文: . Introducing Classes The only remaining feature we need to understand before solving our bookstore problem is how to write a data structure to represent our transaction data. In C++ we define our own data structure by defining a class. The class mechanism is one of the most important features in C++. In fact, a primary focus of the design of C++ is to make it possible to define class types that behave as naturally as the built-in types themselves. The library types that we've seen already, such as istream and ostream, are all defined as classesthat is,they are not strictly speaking part of the language. Complete understanding of the class mechanism requires mastering a lot of information. Fortunately, it is possible to use a class that someone else has written without knowing how to define a class ourselves. In this section, we'll describe a simple class that we canuse in solving our bookstore problem. We'll implement this class in the subsequent chapters as we learn more about types,expressions, statements, and functionsall of which are used in defining classes. To use a class we need to know three things: What is its name? Where is it defined? What operations does it support? For our bookstore problem, we'll assume that the class is named Sales_item and that it is defined in a header named Sales_item.h. The Sales_item Class The purpose of the Sales_item class is to store an ISBN and keep track of the number of copies sold, the revenue, and average sales price for that book. How these data are stored or computed is not our concern. To use a class, we need not know anything about how it is implemented. Instead, what we need to know is what operations the class provides. As we've seen, when we use library facilities such as IO, we must include the associated headers. Similarly, for our own classes, we must make the definitions associated with the class available to the compiler. We do so in much the same way. Typically, we put the class definition into a file. Any program that wants to use our class must include that file. Conventionally, class types are stored in a file with a name that, like the name of a program source file, has two parts: a file name and a file suffix. Usually the file name is the same as the class defined in the header. The suffix usually is .h, but some programmers use .H, .hpp, or .hxx. Compilers usually aren't picky about header file names, but IDEs sometimes are. We'll assume that our class is defined in a file named Sales_item.h. Operations on Sales_item Objects

大学毕业论文英文翻译及原文

大学毕业论文英文翻译 中文译文 计算机网络 每个一个世纪都有一种主导地位的技术。18世纪伴随着工业革命的到来的是大型机械系统的时代;19世纪是蒸汽机的时代,而20世纪的发展历程中,关键的技术是信息收集、处理和分发。在其他的发展方面,我们还可以看到:遍布全球的电话网络的建立起来了,无线电广播和电视的出现了,计算机工业诞生了,并且以超乎想象的速度在成长;另外通信卫星也发射上天了。 技术的快速发展的一个直接结果是,这些领域正在快速地融合,信息收集、传输、存储和处理之间的差别正在迅速地消失。对于具有数百个办公室的大型组织来说,尽管这些办公室分布在广阔的地理区域中,但未来期望的情景是,工作人员只要单击一下按钮,就可以查看最远处分部的状态。随着信息收集、处理和分发能力的不断提高,我们对于更加复杂的信息处理技术的需求也增长得更快。 与其他的工业(比如汽车和航空运输业)相比,计算机工业还是非常年轻,尽管如此,计算机技术却在很短的时间内有了惊人的进展。在计算机诞生之初的20年间,计算机系统是高度集中化的,通常位于一个很大的房间中。该房间通常配有玻璃墙,参观的人透过玻璃墙可以欣赏到里边伟大的电子奇迹。中等规模的公司或者大学可能会有一台或者两台计算机,而大型的研究机构最多也就几十台计算机。要在20年内生产出大量同样功能但是体积比邮票还小的计算机,在当时的人们看来纯属科学幻想。 计算机和通信的结合对于计算机系统的组织方式产生了深远的影响。把一台大型的计算机放在一个单独的房间中,然后用户带着他们的处理任务去房间里上机,这种"计算机中心"的概念现在已经完全过时了。由一台计算机来处理整个组织中所有的计算需求,这种老式的模型已经被新的模型所取代,在新的模型下,由大量独立的,但相互连接起来的计算机来共同完成计算任务。这些系统称为计算机网络(computer networks)。如何设计这些网络,并且将这些网络组织起来,这就是本书的主题。 在本书中,我们将使用术语"计算机网络"来表示通过同一种技术相互连接起来的一组自主计算机的集合。如果两台计算机能够交换信息,则称

毕业论文外文翻译模版

长江大学工程技术学院 毕业设计(论文)外文翻译 外 文 题 目 Matlab Based Interactive Simulation Program for 2D Multisegment Mechanical Systems 译 文 题 目 二维多段机械系统基于Matlab 的 交互式仿真程序 系 部 化学工程系 专 业 班 级 化工60801 学 生 姓 名 李泽辉 指 导 教 师 张 铭 辅 导 教 师 张 铭 完 成 日 期 2012.4.15 顶层配置在管路等,要求设备,所有设要求,对调整使案,编是指机确保机组中资料试

外文翻译 二维多段机械系统基于Matlab 的交互式仿真程序 Henryk Josiński, Adam ?witoński, Karol J?drasiak 著;李泽辉 译 摘要:本文介绍了多段机械系统设计原则,代表的是一个模型的一部分的设计系统,然后扩展 形成的几个部分和模型算法的分类与整合的过程,以及简化步骤的过程叫多段系统。本文还介绍了设计过程的二维多段机械系统的数字模型,和使用Matlab 的软件包来实现仿真。本文还讨论测试运行了一个实验,以及几种算法的计算,实现了每个单一步骤的整合。 1 简介 科学家创造了物理模型和数学模型来表示人类在运动中的各种形式。数学模型 使创建数字模型和进行计算机仿真成为可能。模型试验,可以使人们不必真正的实 验就可以虚拟的进行力和力矩的分解。 本文研究的目的是建立一个简单的多段运动模型,以增加模型的连续性和如何 避免不连续为原则。这是创建一个人类运动模型系统的冰山一角。其使用matlab 程 序包创建的数字模型,可以仿真人类运动。 文献中关于这一主题的内容很广泛。运动的模式和力矩的分解在这些文献中都 有涉猎。动态的平面人体运动模型,提出了解决了迭代矩阵的方法。还值得一提的 是这类项目的参考书目,布鲁贝克等人提出了一个模型——人腿模型,这个以人的 物理运动为基础的平面模型仿真了人腿——一个单一的扭簧和冲击碰撞模型。人腿 模型虽然简单,但是它展示人类的步态在水平地面上的运动特征。布鲁贝克等人还 介绍,在人腿模型的双足行走的基础上,从生物力学的角度而言,符合人体步行的 特征。这个模型具有一个躯干,双腿膝盖和脚踝。它能够合理的表现出人多样的步 态风格。一个仿真人类运动的数学模型反应出了人的部分运动状态。 图1. 力的分解 2 力的分解

毕业设计英文文献翻译

青岛大学 毕业论文(设计)科技文献翻译 院系:自动化工程学院控制工程系 专业:自动化 班级:2009级4班 姓名:史发涛 指导教师:于金鹏 2013年4月10日

Providing Integrated Condition Monitoring Solutions for World Class Performance Rockwell Automation is a premier provider of Integrated Condition Monitoring Solutions (ICMS) to all major industry segments. Offering the latest state-of-the art technology in vibration analysis, oil analysis, on-line surveillance and protection systems,remote monitoring, as well as outstanding training and customer support services. Through strategic alliances with major Computerized Maintenance Management Systems (CMMS) providers Rockwell Automation can now provide integrated systems that provide critical machinery information throughout the enterprise. Portable Systems Enpac The Enpac? is a Windows CE based 2-channel high performance data collector and signal analyzer. The Enpac? collects field data, includi ng vibration information and process variables. Enpac? allows easy condition monitoring of equipment found in many process industries such as power generation, petrochemical, pulp and paper, and primary metals.The Enpac? features a built in optical (laser) tachometer, a choice of either a 1/8 or 1/4 VGA resolution screen, ability to store data on standard Type I or Type II PCMCIA cards and on-line contextsensitive HELP, built in to all applications. Online Systems Rockwell Automation offers a complete range of online hardware and software systems designed to meet your machinery protection and condition monitoring needs. When you need to protect your critical machinery assets the 6600 Series machinery protection system provides continuous monitoring. The Enw atch? Online Surveillance System is a cost-effective solution for monitoring the condition of the important machines in your plant.The 6600 Series and Enwatch? systems can be integrated seamlessly with Emonitor Odyssey?or Enshare? machinery information software. This integrated solution will provide you with a complete picture of the condition of your plant. Entrx When you need to understand how your rotating machinery is performing then Entrx is the professional’s tool. Entrx provides the means for reliable and consistent data acquisition for your entire steady state and transient machine operating modes. Entrx data acquisition hardware is fully configurable by the user and is capable of collecting data in both multiplexed and simultaneous / continuous modes. Graphical presentations of your machinery help to provide a visual display of what is happening to your machinery.

毕业论文外文翻译(中英文)

译文 交通拥堵和城市交通系统的可持续发展 摘要:城市化和机动化的快速增长,通常有助于城市交通系统的发展,是经济性,环境性和社会可持续性的体现,但其结果是交通量无情增加,导致交通拥挤。道路拥挤定价已经提出了很多次,作为一个经济措施缓解城市交通拥挤,但还没有见过在实践中广泛使用,因为道路收费的一些潜在的影响仍然不明。本文首先回顾可持续运输系统的概念,它应该满足集体经济发展,环境保护和社会正义的目标。然后,根据可持续交通系统的特点,使拥挤收费能够促进经济增长,环境保护和社会正义。研究结果表明,交通拥堵收费是一个切实有效的方式,可以促进城市交通系统的可持续发展。 一、介绍 城市交通是一个在世界各地的大城市迫切关注的话题。随着中国的城市化和机动化的快速发展,交通拥堵已成为一个越来越严重的问题,造成较大的时间延迟,增加能源消耗和空气污染,减少了道路网络的可靠性。在许多城市,交通挤塞情况被看作是经济发展的障碍。我们可以使用多种方法来解决交通挤塞,包括新的基础设施建设,改善基础设施的维护和操作,并利用现有的基础设施,通过需求管理策略,包括定价机制,更有效地减少运输密度。 交通拥堵收费在很久以前就已提出,作为一种有效的措施,来缓解的交通挤塞情况。交通拥堵收费的原则与目标是通过对选择在高峰拥挤时段的设施的使用实施附加收费,以纾缓拥堵情况。转移非高峰期一些出行路线,远离拥挤的设施或高占用车辆,或完全阻止一些出行,交通拥堵收费计划将在节省时间和降低经营成本的基础上,改善空气中的质量,减少能源消耗和改善过境生产力。此计划在世界很多国家和地方都有成功的应用。继在20世纪70年代初和80年代中期挪威与新加坡实行收费环,在2003年2月伦敦金融城推出了面积收费;直至现在,它都是已经开始实施拥挤收费的大都市圈中一个最知名的例子。 然而,交通拥堵收费由于理论和政治的原因未能在实践中广泛使用。道路收费

本科毕业设计(论文)外文翻译基本规范

本科毕业设计(论文)外文翻译基本规范 一、要求 1、与毕业论文分开单独成文。 2、两篇文献。 二、基本格式 1、文献应以英、美等国家公开发表的文献为主(Journals from English speaking countries)。 2、毕业论文翻译是相对独立的,其中应该包括题目、作者(可以不翻译)、译文的出处(杂志的名称)(5号宋体、写在文稿左上角)、关键词、摘要、前言、正文、总结等几个部分。 3、文献翻译的字体、字号、序号等应与毕业论文格式要求完全一致。 4、文中所有的图表、致谢及参考文献均可以略去,但在文献翻译的末页标注:图表、致谢及参考文献已略去(见原文)。(空一行,字体同正文) 5、原文中出现的专用名词及人名、地名、参考文献可不翻译,并同原文一样在正文中标明出处。 二、毕业论文(设计)外文翻译 (一)毕业论文(设计)外文翻译的内容要求 外文翻译内容必须与所选课题相关,外文原文不少于6000个印刷符号。译文末尾要用外文注明外文原文出处。 原文出处:期刊类文献书写方法:[序号]作者(不超过3人,多者用等或et al表示).题(篇)名[J].刊名(版本),出版年,卷次(期次):起止页次. 原文出处:图书类文献书写方法:[序号]作者.书名[M].版本.出版地:出版者,出版年.起止页次. 原文出处:论文集类文献书写方法:[序号]作者.篇名[A].编著者.论文集名[C]. 出版地:出版者,出版年.起止页次。 要求有外文原文复印件。 (二)毕业论文(设计)外文翻译的撰写与装订的格式规范 第一部分:封面

1.封面格式:见“毕业论文(设计)外文翻译封面”。普通A4纸打印即可。 第二部分:外文翻译主题 1.标题 一级标题,三号字,宋体,顶格,加粗 二级标题,四号字,宋体,顶格,加粗 三级标题,小四号字,宋体,顶格,加粗 2.正文 小四号字,宋体。 第三部分:版面要求 论文开本大小:210mm×297mm(A4纸) 版芯要求:左边距:25mm,右边距:25mm,上边距:30mm,下边距:25mm,页眉边距:23mm,页脚边 距:18mm 字符间距:标准 行距:1.25倍 页眉页角:页眉的奇数页书写—浙江师范大学学士学位论文外文翻译。页眉的偶数页书写—外文翻译 题目。在每页底部居中加页码。(宋体、五号、居中) 装订顺序是:封皮、中文翻译、英文原文复印件。

毕业论文英文文献及翻译

Based on GSM module and AT89C51 connection design and application ---From 《GSM principle and its network optimization》chapter one ---From 《New single chip microcomputer interface device and technology》chapter six Abstract This article through analyzed the GSM module and the monolithic integrated circuit connection design simply introduced the TC35i module commonly used instruction and the coding rule, introduced emphatically the TC35i module and the AT89C51 principle of work, the periphery connection electric circuit, the software control technology, at the same time has produced some TC35i module and the AT89C51 connection application procedure, proposed AT89C51 when receive data should pay attention question, thus designed has the GSM module the data transmission terminal. Key words: GSM network 1 Summarize: Along with correspondence technique of development, according to the service function of the NTT DoCoMo net, just to industry control and control from a distance the realm have continuously extension of trend.Is orientation this kind of demand, Siemens company released a new generation wireless correspondence GSM mold piece-TC35i, according to should the short news function of the mold piece, can fast safety credibility realization customer information processing etc. function, special be applicable to control centre and terminal equipments distance very far,

相关主题