搜档网
当前位置:搜档网 › 计算机专业外文翻译

计算机专业外文翻译

计算机专业外文翻译
计算机专业外文翻译

计算机专业外文翻译

毕业设计英文翻译作者:XXX

The Delphi Programming Language

The Delphi development environment is based on an object-oriented extension of the

Pascal programming language known as Object Pascal. Most modern programming languages

support object-oriented programming (OOP). OOP languages are based on three fundamental

concepts: encapsulation (usually implemented with classes), inheritance, and polymorphism

(or late binding).

1Classes and Objects

Delphi is based on OOP concepts, and in particular on the definition of new class types.

The use of OOP is partially enforced by the visual development environment, because for

every new form defined at design time, Delphi automatically defines a new class. In addition,

every component visually placed on a form is an object of a class type available in or added to

the system library.

As in most other modern OOP languages (including Java and C#), in Delphi a class-type

variable doesn't provide the storage for the object, but is only a pointer or reference to the

object in memory. Before you use the object, you must allocate memory for it by creating a

new instance or by assigning an existing instance to the variable: var

Obj1, Obj2: TMyClass;

begin // assign a newly created object

Obj1 := TMyClass.Create; // assign to an existing object

Obj2 := ExistingObject;

The call to Create invokes a default constructor available for every class, unless the class

redefines it (as described later). To declare a new class data type in Delphi, with some local

data fields and some methods, use the following syntax:

type

TDate = class

Month, Day, Year: Integer;

procedure SetValue (m, d, y: Integer);

function LeapYear: Boolean;

第 1 页共 13 页

毕业设计英文翻译作者:XXX

end;

2Creating Components Dynamically

To emphasize the fact that Delphi components aren't much different from other objects

(and also to demonstrate the use of the Self keyword), I've written the CreateComps example.

This program has a form with no components and a handler for its OnMouseDown event,

which I've chosen because it receives as a parameter the position of the mouse click (unlike

the OnClick event). I need this information to create a button component in that position. Here

is the method's code:

procedure TForm1.FormMouseDown (Sender: TObject;

Button: TMouseButton; Shift: TShiftState; X, Y: Integer);

Var Btn: TButton;

begin

Btn := TButton.Create (Self);

Btn.Parent := Self;

Btn.Left := X;

Btn.Top := Y;

Btn.Width := Btn.Width + 50;

Btn.Caption := Format ('Button at %d, %d', [X, Y]);

end;

The effect of this code is to create buttons at mouse-click positions, as you can see in the

following figure. In the code, notice in particular the use of the Self keyword as both the

parameter of the Create method (to specify the component's owner) and the value of the

Parent property.

(The output of theexample,which creates Button components at run time

第 2 页共 13 页

毕业设计英文翻译作者:XXX

3Encapsulation

The concept of encapsulation is often indicated by the idea of a "black box." You don't

know about the internals: You only know how to interface with the black box or use it

regardless of its internal structure. The "how to use" portion,

called the class interface, allows

other parts of a program to access and use the objects of that class. However, when you use

the objects, most of their code is hidden. You seldom know what internal data the object has,

and you usually have no way to access the data directly. Of course, you are supposed to use

methods to access the data, which is shielded from unauthorized access. This is the

object-oriented approach to a classical programming concept known as information hiding.

However, in Delphi there is the extra level of hiding, through properties,

4PrivateProtectedand Public

For class-based encapsulation, the Delphi language has three access specifiers: private,

protected, and public. A fourth, published, controls run-time type information (RTTI) and

design-time information, but it gives the same programmatic accessibility as public. Here are

the three classic access specifiers:

, The private directive denotes fields and methods of a class that

are not accessible outside

the unit that declares the class.

, The protected directive is used to indicate methods and fields with limited visibility. Only

the current class and its inherited classes can access protected elements. More precisely,

only the class, subclasses, and any code in the same unit as the class can access protected

members。

, The public directive denotes fields and methods that are freely accessible from any other

portion of a program as well as in the unit in which they are defined.

Generally, the fields of a class should be private and the methods public. However, this

is not always the case. Methods can be private or protected if they are needed only internally

to perform some partial computation or to implement properties. Fields might be declared as

protected so that you can manipulate them in inherited classes, although this isn't considered a

good OOP practice.

5Encapsulating with Properties

第 3 页共 13 页

毕业设计英文翻译作者:XXX

Properties are a very sound OOP mechanism, or a well-thought-out application of the

idea of encapsulation. Essentially, you have a name that completely hides its implementation

details. This allows you to modify the class extensively without affecting the code using it. A

good definition of properties is that of virtual fields. From the perspective of the user of the class that defines them, properties look exactly like fields, because you can generally read or

write their value. For example, you can read the value of the Caption property of a button and

assign it to the Text property of an edit box with the following code:

Edit1.Text:= Button1.Caption;

It looks like you are reading and writing fields. However, properties can be directly

mapped to data, as well as to access methods, for reading and

writing the value. When

properties are mapped to methods, the data they access can be part of the object or outside of

it, and they can produce side effects, such as repainting a control after you change one of its

values. Technically, a property is an identifier that is mapped to data or methods using a read

and a write clause. For example, here is the definition of a Month property for a date class:

property Month: Integer read FMonth write SetMonth;

To access the value of the Month property, the program reads the

value of the private

field FMonth; to change the property value, it calls the method SetMonth (which must be

defined inside the class, of course).

Different combinations are possible (for example, you could also use a method to read

the value or directly change a field in the write directive), but

the use of a method to change

the value of a property is common. Here are two alternative

definitions for the property,

mapped to two access methods or mapped directly to data in both directions:

property Month: Integer read GetMonth write SetMonth;

property Month: Integer read FMonth write FMonth;

Often, the actual data and access methods are private (or protected), whereas the property

is public. For this reason, you must use the property to have access to those methods or data, a

technique that provides both an extended and a simplified version of encapsulation. It is an

extended encapsulation because not only can you change the representation of the data and its

access functions, but you can also add or remove access functions without changing the

calling code. A user only needs to recompile the program using the property.

第 4 页共 13 页

毕业设计英文翻译作者:XXX

6Properties for the TDate Class

As an example, I've added properties for accessing the year, the month, and the day to an

object of the TDate class discussed earlier. These properties are not mapped to specific fields,

but they all map to the single fDate field storing the complete date information. This is why

all the properties have both getter and setter methods:

type

TDate = class

public

property Year: Integer read GetYear write SetYear;

property Month: Integer read GetMonth write SetMonth;

property Day: Integer read GetDay write SetDay;

Each of these methods is easily implemented using functions

available in the DateUtils

unit. Here is the code for two of them (the others are very similar): function TDate.GetYear: Integer;

begin

Result := YearOf (fDate);

end;

procedure TDate.SetYear(const Value: Integer);

begin

fDate := RecodeYear (fDate, Value);

end;

7Advanced Features of Properties

Properties have several advanced features I Here is a short summary

of these more

advanced features:

, The write directive of a property can be omitted, making it a

read-only property. The

compiler will issue an error if you try to change the property value. You can also omit the

read directive and define a write-only property, but that approach doesn't make much sense and is used infrequently.

第 5 页共 13 页

毕业设计英文翻译作者:XXX

, The Delphi IDE gives special treatment to design-time properties, which are declared with the published access specifier and generally displayed in the Object Inspector for the

selected component..

, An alternative is to declare properties, often called run-time only properties, with the public access specifier. These properties can be used in program code.

, You can define array-based properties, which use the typical notation with square

brackets to access an element of a list. The string list–based properties, such as the Lines of a list box, are a typical example of this group.

, Properties have special directives, including stored and defaults, which control the

component streaming system.

8Encapsulation and Forms

One of the key ideas of encapsulation is to reduce the number of global variables used by

a program. A global variable can be accessed from every portion of a program. For this reason,

a change in a global variable affects the whole program. On the other hand, when you change

the representation of a class's field, you only need to change the code of some methods of that

class and nothing else. Therefore, we can say that information hiding refers to encapsulating

changes.

Let me clarify this idea with an example. When you have a program with multiple forms,

you can make some data available to every form by declaring it as a global variable in the

interface portion of the unit of one of the forms:

var

Form1: TForm1;

nClicks: Integer;

This approach works, but the data is connected to the entire program rather than a

specific instance of the form. If you create two forms of the same type, they'll share the data.

If you want every form of the same type to have its own copy of the data, the only solution is

to add it to the form class:

type

TForm1 = class(TForm)

第 6 页共 13 页

毕业设计英文翻译作者:XXX

public

nClicks: Integer;

end;

9Adding Properties to Forms

The previous class uses public data, so for the sake of encapsulation, you should instead

change it to use private data and data-access functions. An even better solution is to add a

property to the form. Every time you want to make some information of a form available to

other forms, you should use a property, for all the reasons discussed in the section

"Encapsulating with Properties." To do so, change the field declaration of the form (in the previous code) by adding the keyword property in front of it, and then press Ctrl+Shift+C to

activate code completion. Delphi will automatically generate all the extra code you need.

properties should also be used in the form classes to encapsulate the access to the

components of a form. For example, if you have a main form with a status bar used to display

some information (and with the SimplePanel property set to True) and you want to modify the

text from a secondary form, you might be tempted to write

Form1.StatusBar1.SimpleText := 'new text';

This is a standard practice in Delphi, but it's not a good one, because it doesn't provide

any encapsulation of the form structure or components. If you have similar code in many

places throughout an application, and you later decide to modify the user interface of the form

(for example, replacing StatusBar with another control or activating multiple panels), you'll

have to fix the code in many places. The alternative is to use a method or, even better, a

property to hide the specific control. This property can be defined as

property StatusText: string read GetText write SetText;

with GetText and SetText methods that read from and write to the SimpleText property

of the status bar (or the caption of one of its panels). In the programs’ other forms, you can

refer to the form's StatusText property; and if the user interface changes, only the setter and

getter methods of the property are affected.

第 7 页共 13 页

毕业设计英文翻译作者:XXX

Delphi开发环境是基于Pascal编程语言Object Pascal的面向对象的一种扩展。大多数现代编程语言都支持面向对象编程(OPP)。OPP语言基于三个基本概念:封装(通

常通过类实现)继承、多态。

1、类与对象

Delphi是基于OPP概念的,特别是在新类类型中。OPP的使用在可视开发环境中得到了增强,这是因为,对于每个在设计时定义的一个新窗体来说,Delphi会自动定义一个新的类。另外,每个可视放置在一个窗体中的组件实际上是一个类型对象,而且该类

可以在系统库中获得,或者被添加到系统库中。

就像大多数开创现代OPP语言(包括Java和C#)中一样,在Delphi中,一个类的类型变量为对象提供存储,而只是在内存中为对象提供一个指针或引用。在使用对象之

前,必须创建一个新的实例或将一个现有的实例分配给变量,以此来为其分配内存:

var

Obj1, Obj2: TMyClass;

begin // assign a newly created object

Obj1 := TMyClass.Create; // assign to an existing object

Obj2 := ExistingObject;

对Create的调用会激活一个默认的构造器,该构造器对每个类都有效,除非某个

类重新定义了它。为了在Delphi中声明一个新的带有一些本地数据字段的和一些方法

的类数据类型,可使用下面的语法:

type

TDate = class

Month, Day, Year: Integer;

procedure SetValue (m, d, y: Integer);

function LeapYear: Boolean;

end;

动态的创建组件

第 8 页共 13 页

毕业设计英文翻译作者:XXX

为了强调Delphi组件与其他对象没有太多的区别的事实(同时说明Self关键字日

使用)的使用方法,笔者编写了一个CreateComps范例。这个程序有一个不带组件的窗体和一个用语其OnMouseDown事件的处理器,之所以选择它是以为它将鼠标单机的位置

作为一个参数接收(与OnClick事件不同)。我们需要这个信息,以便在那个位置创建

有个按钮组件。下面是该方法的代码:

procedure TForm1.FormMouseDown (Sender: TObject;

Button: TMouseButton; Shift: TShiftState; X, Y: Integer);

var

Btn: TButton;

begin

Btn := TButton.Create (Self);

Btn.Parent := Self;

Btn.Left := X;

Btn.Top := Y;

Btn.Width := Btn.Width + 50;

Btn.Caption := Format ('Button at %d, %d', [X, Y]);

end;

这段代码的作用是在鼠标单击的位置创建按钮,正如在下图中看到的那样。在该代

码中,特别要注意Self关键字的使用??同时作为 Create方法的参数(以指定组件的所有者)和Parent属性的值。

CreateCompsr的示例输出,用于在运行时创建按钮组件

封装的概念简单,可以把其想象为一个“黑盒子”。人们并不知道其内部什么:只

能知道牌位与黑例子接口,或使用它而其内部结构。“怎样使用”这部分,称为类的接

口,它允许程序的其他部分访问和使用该类的对象。然而,使用对象时,对象的大部分

第 9 页共 13 页

毕业设计英文翻译作者:XXX

代码都是隐含的。用户很少能知道对象胡哪些内部数据,而且一般没有办法可以直接访

问数据。可以使用对象方法来访问数据,这与非法的访问不同。相对于信息隐含这样一

个经典的编程概念来说,这就是面向对象的方法。然而,然而Delphi中,通过属性会有其他等级的。

对基于类的封装来说,Delphi使用了三个访问标识符: PrivateProtected和Public第四个地Published,控制着运行时的类型信息(RTTI)和设计时信息,但是它提供了和Public相同的程序访问性。这里是三个经典的访问标识符。

a) Private指令专门用于一个类字段和对象方法在声明类的单元外的类不能被访

问。

b) Protected指令用于表示对象方法和字段具有有限的可见性。Protected元素只能被当前类和它的子类访问。更精确地说,只有同一个单元中的类、子类和任何代码可

以访问protected成员。

c) Public指令专门用于表示那些可以被程序代码中的任意部分高谈阔论的数据和

对象方法,当然也包括在定义它们的单元。

一般情况下,一个类的字段应该是专用的,而对象方法则应该是公用的。然而如果

某对象方法只需要在内部完成一些部分或实现属性,那么该方法也可以是专用或受难保

护的。字段可以被声明为受难,这样就可以在子类中对它们进行处理,尽管这并不是一

个好的OPP行为。

属性是一种非常能够有效的OOP机制,或者说非常适合实现封装的思想。从本质上

讲,书信就是用一个名称来完全隐藏它的实现细节,这使得程序员可以任意修改类,而

还会影响使用它的代码。关于什么是属性,有一个较好的定义,亦即属性就是字段。从

定义它们的类的用户角度来看,属性完全就像字段一样,因为拥护可以读取或编写它们

的值。例如,可以用以下代码读取一个按钮的Caption属性值,并将其赋给一个带有下写代码的编辑筐的text属性:

Edit1.Text:=Button1.Caption;

这看起来就像读写字段一样。然而,属性可以直接与数据以及访问对象的方法对应

起来,用于读写数值。当属性对象方法对应时,访问的数据可以是对象或其外部和某部

第 10 页共 13 页

毕业设计英文翻译作者:XXX 分内容,而且它们可以产生附加影响,如在改变了一个属性值后,提亲绘制一个控件。

从技术上讲,一个属性就是对应数据或对象方法(使用一个read或一个子句)的标识符。例如,下面是一个日期类的Month属性的定义:

Property month: Integer read FMonth write SetMonth;

为了访问Month属性的值,该程序语句要读取专用字段FMonth的值,同时为其改变该属性值,它调用了对象方法SetMonth (当然,必须在类的内部定义它)。

不同的组合都是可能的(例如,还可以使用一个对象方法来读取属性值或直接修改

write指令中的一个字段),但使用对象方法修改一个属性的值是很觉的。下面是属性的

两种可替换定义,它们分别对应两个访问方法或在两个方向上直接对应着数据:

property Month: Integer read GetMonth write SetMonth;

property Month: Integer read FMonth write FMonth;

通常,属性是公共的。而实际数据与访问对象方法是专用的(或受保护的),这意

味着必须使用属性访问那些对象方法或数据,这种技术提供了封装的扩展简化版本。它

是一个扩展的封装,不但可以改变数据的表示方法与访问函数,而且还可以添加与删除

访问函数。而还会影响到调用代码。一个用户只重新编译使用属性的程序即可。 6TDate

作为一个范例,我向前面讨论过的TDate类的一个对象中添加用于访问年、月、日

的属性。这些属性参与特定的字段对应着存储完整日期信息的单个TDate字段。这就是所有属性都有getter和setter方法的原因:

type

TDate = class

计算机专业毕业设计说明书外文翻译(中英对照)

Talking about security loopholes Richard S. Kraus reference to the core network security business objective is to protect the sustainability of the system and data security, This two of the main threats come from the worm outbreaks, hacking attacks, denial of service attacks, Trojan horse. Worms, hacker attacks problems and loopholes closely linked to, if there is major security loopholes have emerged, the entire Internet will be faced with a major challenge. While traditional Trojan and little security loopholes, but recently many Trojan are clever use of the IE loophole let you browse the website at unknowingly were on the move. Security loopholes in the definition of a lot, I have here is a popular saying: can be used to stem the "thought" can not do, and are safety-related deficiencies. This shortcoming can be a matter of design, code realization of the problem. Different perspective of security loo phole s In the classification of a specific procedure is safe from the many loopholes in classification. 1. Classification from the user groups: ● Public loopholes in the software category. If the loopholes in Windows, IE loophole, and so on. ● specialized software loophole. If Oracle loopholes, Apach e,

计算机专业外文文献及翻译

微软Visual Studio 1微软Visual Studio Visual Studio 是微软公司推出的开发环境,Visual Studio可以用来创建Windows平台下的Windows应用程序和网络应用程序,也可以用来创建网络服务、智能设备应用程序和Office 插件。Visual Studio是一个来自微软的集成开发环境IDE,它可以用来开发由微软视窗,视窗手机,Windows CE、.NET框架、.NET精简框架和微软的Silverlight支持的控制台和图形用户界面的应用程序以及Windows窗体应用程序,网站,Web应用程序和网络服务中的本地代码连同托管代码。 Visual Studio包含一个由智能感知和代码重构支持的代码编辑器。集成的调试工作既作为一个源代码级调试器又可以作为一台机器级调试器。其他内置工具包括一个窗体设计的GUI应用程序,网页设计师,类设计师,数据库架构设计师。它有几乎各个层面的插件增强功能,包括增加对支持源代码控制系统(如Subversion和Visual SourceSafe)并添加新的工具集设计和可视化编辑器,如特定于域的语言或用于其他方面的软件开发生命周期的工具(例如Team Foundation Server的客户端:团队资源管理器)。 Visual Studio支持不同的编程语言的服务方式的语言,它允许代码编辑器和调试器(在不同程度上)支持几乎所有的编程语言,提供了一个语言特定服务的存在。内置的语言中包括C/C + +中(通过Visual C++),https://www.sodocs.net/doc/70108369.html,(通过Visual https://www.sodocs.net/doc/70108369.html,),C#中(通过Visual C#)和F#(作为Visual Studio 2010),为支持其他语言,如M,Python,和Ruby等,可通过安装单独的语言服务。它也支持的 XML/XSLT,HTML/XHTML ,JavaScript和CSS.为特定用户提供服务的Visual Studio也是存在的:微软Visual Basic,Visual J#、Visual C#和Visual C++。 微软提供了“直通车”的Visual Studio 2010组件的Visual Basic和Visual C#和Visual C + +,和Visual Web Developer版本,不需任何费用。Visual Studio 2010、2008年和2005专业版,以及Visual Studio 2005的特定语言版本(Visual Basic、C++、C#、J#),通过微软的下载DreamSpark计划,对学生免费。 2架构 Visual Studio不支持任何编程语言,解决方案或工具本质。相反,它允许插入各种功能。特定的功能是作为一个VS压缩包的代码。安装时,这个功能可以从服务器得到。IDE提供三项服务:SVsSolution,它提供了能够列举的项目和解决方案; SVsUIShell,它提供了窗口和用户界面功能(包括标签,工具栏和工具窗口)和SVsShell,它处理VS压缩包的注册。此外,IDE还可以负责协调和服务之间实现通信。所有的编辑器,设计器,项目类型和其他工具都是VS压缩包存在。Visual Studio 使用COM访问VSPackage。在Visual Studio SDK中还包括了管理软件包框架(MPF),这是一套管理的允许在写的CLI兼容的语言的任何围绕COM的接口。然而,MPF并不提供所有的Visual Studio COM 功能。

计算机网络安全文献综述

计算机网络安全综述学生姓名:李嘉伟 学号:11209080279 院系:信息工程学院指导教师姓名:夏峰二零一三年十月

[摘要] 随着计算机网络技术的快速发展,网络安全日益成为人们关注的焦点。本文分析了影响网络安全的主要因素及攻击的主要方式,从管理和技术两方面就加强计算机网络安全提出了针对性的建议。 [关键词] 计算机网络;安全;管理;技术;加密;防火墙 一.引言 计算机网络是一个开放和自由的空间,但公开化的网络平台为非法入侵者提供了可乘之机,黑客和反黑客、破坏和反破坏的斗争愈演愈烈,不仅影响了网络稳定运行和用户的正常使用,造成重大经济损失,而且还可能威胁到国家安全。如何更有效地保护重要的信息数据、提高计算机网络的安全性已经成为影响一个国家的政治、经济、军事和人民生活的重大关键问题。本文通过深入分析网络安全面临的挑战及攻击的主要方式,从管理和技术两方面就加强计算机网络安全提出针对性建议。

二.正文 1.影响网络安全的主要因素[1] 计算机网络安全是指“为数据处理系统建立和采取的技术和管理的安全保护,保护计算机硬件、软件数据不因偶然和恶意的原因而遭到破坏、更改和泄漏”。计算机网络所面临的威胁是多方面的,既包括对网络中信息的威胁,也包括对网络中设备的威胁,但归结起来,主要有三点:一是人为的无意失误。如操作员安全配置不当造成系统存在安全漏洞,用户安全意识不强,口令选择不慎,将自己的帐号随意转借他人或与别人共享等都会给网络安全带来威胁。二是人为的恶意攻击。这也是目前计算机网络所面临的最大威胁,比如敌手的攻击和计算机犯罪都属于这种情况,此类攻击又可以分为两种:一种是主动攻击,它以各种方式有选择地破坏信息的有效性和完整性;另一类是被动攻击,它是在不影响网络正常工作的情况下,进行截获、窃取、破译以获得重要机密信息。这两种攻击均可对计算机网络造成极大的危害,并导致机密数据的泄漏。三是网络软件的漏洞和“后门”。任何一款软件都或多或少存在漏洞,这些缺陷和漏洞恰恰就是黑客进行攻击的首选目标。绝大部分网络入侵事件都是因为安全措施不完善,没有及时补上系统漏洞造成的。此外,软件公司的编程人员为便于维护而设置的软件“后门”也是不容忽视的巨大威胁,一旦“后门”洞开,别人就能随意进入系统,后果不堪设想。

计算机专业外文文献翻译6

外文文献翻译(译成中文2000字左右): As research laboratories become more automated,new problems are arising for laboratory managers.Rarely does a laboratory purchase all of its automation from a single equipment vendor. As a result,managers are forced to spend money training their users on numerous different software packages while purchasing support contracts for each. This suggests a problem of scalability. In the ideal world,managers could use the same software package to control systems of any size; from single instruments such as pipettors or readers to large robotic systems with up to hundreds of instruments. If such a software package existed, managers would only have to train users on one platform and would be able to source software support from a single vendor. If automation software is written to be scalable, it must also be flexible. Having a platform that can control systems of any size is far less valuable if the end user cannot control every device type they need to use. Similarly, if the software cannot connect to the customer’s Laboratory Information Management System (LIMS) database,it is of limited usefulness. The ideal automation software platform must therefore have an open architecture to provide such connectivity. Two strong reasons to automate a laboratory are increased throughput and improved robustness. It does not make sense to purchase high-speed automation if the controlling software does not maximize throughput of the system. The ideal automation software, therefore, would make use of redundant devices in the system to increase throughput. For example, let us assume that a plate-reading step is the slowest task in a given method. It would make that if the system operator connected another identical reader into the system, the controller software should be able to use both readers, cutting the total throughput time of the reading step in half. While resource pooling provides a clear throughput advantage, it can also be used to make the system more robust. For example, if one of the two readers were to experience some sort of error, the controlling software should be smart enough to route all samples to the working reader without taking the entire system offline. Now that one embodiment of an ideal automation control platform has been described let us see how the use of C++ helps achieving this ideal possible. DISCUSSION C++: An Object-Oriented Language Developed in 1983 by BjarneStroustrup of Bell Labs,C++ helped propel the concept of object-oriented programming into the mainstream.The term ‘‘object-oriented programming language’’ is a familiar phrase that has been in use for decades. But what does it mean? And why is it relevant for automation software? Essentially, a language that is object-oriented provides three important programming mechanisms:

无线局域网-计算机毕业论文外文翻译

毕业设计(论文)外文资料翻译 系:信息工程学院 专业:计算机科学与技术 姓名: 学号: 外文出处:Chris Haseman. Android-essential (用外文写) s[M].London:Spring--Verlag,2008 .8-13. 附件: 1.外文资料翻译译文;2.外文原文。 指导教师评语: 签名: 年月日注:请将该封面与附件装订成册。

附件1:外文资料翻译译文 无线局域网 一、为何使用无线局域网络 对于局域网络管理主要工作之一,对于铺设电缆或是检查电缆是否断线这种耗时的工作,很容易令人烦躁,也不容易在短时间内找出断线所在。再者,由于配合企业及应用环境不断的更新与发展,原有的企业网络必须配合重新布局,需要重新安装网络线路,虽然电缆本身并不贵,可是请技术人员来配线的成本很高,尤其是老旧的大楼,配线工程费用就更高了。因此,架设无线局域网络就成为最佳解决方案。 二、什么情形需要无线局域网络 无线局域网络绝不是用来替代有限局域网络,而是用来弥补有线局域网络之不足,以达到网络延伸之目的,下列情形可能须要无线局域网络。 ●无固定工作场所的使用者 ●有线局域网络架设受环境限制 ●作为有线局域网络的备用系统 三、无线局域网络存取技术 目前厂商在设计无线局域网络产品时,有相当多种存取设计方式,大致可分为三大类:窄频微波技术、展频(Spread Spectrum)技术、及红外线(Infrared)技术,每种技术皆有其优缺点、限制及比较,接下来是这些技术方法的详细探讨。 1.技术要求 由于无线局域网需要支持高速、突发的数据业务,在室内使用还需要解决多径衰落以及各子网间串扰等问题。具体来说,无线局域网必须实现以下技术要求: 1)可靠性:无线局域网的系统分组丢失率应该低于10-5,误码率应该低 于10-8。

网络安全外文翻译文献

网络安全外文翻译文献 (文档含英文原文和中文翻译) 翻译: 计算机网络安全与防范 1.1引言 计算机技术的飞速发展提供了一定的技术保障,这意味着计算机应用已经渗透到社会的各个领域。在同一时间,巨大的进步和网络技术的普及,社会带来了巨大的经济利润。然而,在破坏和攻击计算机信息系统的方法已经改变了很多的网络环境下,网络安全问题逐渐成为计算机安全的主流。

1.2网络安全 1.2.1计算机网络安全的概念和特点 计算机网络的安全性被认为是一个综合性的课题,由不同的人,包括计算机科学、网络技术、通讯技术、信息安全技术、应用数学、信息理论组成。作为一个系统性的概念,网络的安全性由物理安全、软件安全、信息安全和流通安全组成。从本质上讲,网络安全是指互联网信息安全。一般来说,安全性、集成性、可用性、可控性是关系到网络信息的相关理论和技术,属于计算机网络安全的研究领域。相反,狭隘“网络信息安全”是指网络安全,这是指保护信息秘密和集成,使用窃听、伪装、欺骗和篡夺系统的安全性漏洞等手段,避免非法活动的相关信息的安全性。总之,我们可以保护用户利益和验证用户的隐私。 计算机网络安全有保密性、完整性、真实性、可靠性、可用性、非抵赖性和可控性的特点。 隐私是指网络信息不会被泄露给非授权用户、实体或程序,但是授权的用户除外,例如,电子邮件仅仅是由收件人打开,其他任何人都不允许私自这样做。隐私通过网络信息传输时,需要得到安全保证。积极的解决方案可能会加密管理信息。虽然可以拦截,但它只是没有任何重要意义的乱码。 完整性是指网络信息可以保持不被修改、破坏,并在存储和传输过程中丢失。诚信保证网络的真实性,这意味着如果信息是由第三方或未经授权的人检查,内容仍然是真实的和没有被改变的。因此保持完整性是信息安全的基本要求。 可靠性信息的真实性主要是确认信息所有者和发件人的身份。 可靠性表明该系统能够在规定的时间和条件下完成相关的功能。这是所有的网络信息系统的建立和运作的基本目标。 可用性表明网络信息可被授权实体访问,并根据自己的需求使用。 不可抵赖性要求所有参加者不能否认或推翻成品的操作和在信息传输过程中的承诺。

计算机专业外文翻译

专业外文翻译 题目JSP Technology Conspectus and Specialties 系(院)计算机系 专业计算机科学与技术 班级 学生姓名 学号 指导教师 职称讲师 二〇一三年五月十六日

JSP Technology Conspectus and Specialties The JSP (Java Server Pages) technology is used by the Sun micro-system issued by the company to develop dynamic Web application technology. With its easy, cross-platform, in many dynamic Web application programming languages, in a short span of a few years, has formed a complete set of standards, and widely used in electronic commerce, etc. In China, the JSP now also got more extensive attention; get a good development, more and more dynamic website to JSP technology. The related technologies of JSP are briefly introduced. The JSP a simple technology can quickly and with the method of generating Web pages. Use the JSP technology Web page can be easily display dynamic content. The JSP technology are designed to make the construction based on Web applications easier and efficient, and these applications and various Web server, application server, the browser and development tools work together. The JSP technology isn't the only dynamic web technology, also not the first one, in the JSP technology existed before the emergence of several excellent dynamic web technologies, such as CGI, ASP, etc. With the introduction of these technologies under dynamic web technology, the development and the JSP. Technical JSP the development background and development history In web brief history, from a world wide web that most of the network information static on stock transactions evolution to acquisition of an operation and infrastructure. In a variety of applications, may be used for based on Web client, look no restrictions. Based on the browser client applications than traditional based on client/server applications has several advantages. These benefits include almost no limit client access and extremely simplified application deployment and management (to update an application, management personnel only need to change the program on a server, not thousands of installation in client applications). So, the software industry is rapidly to build on the client browser multilayer application. The rapid growth of exquisite based Web application requirements development of

网络安全中的中英对照

网络安全中的中英对照 Access Control List(ACL)访问控制列表 access token 访问令牌 account lockout 帐号封锁 account policies 记帐策略 accounts 帐号 adapter 适配器 adaptive speed leveling 自适应速率等级调整 Address Resolution Protocol(ARP) 地址解析协议Administrator account 管理员帐号 ARPANET 阿帕网(internet的前身) algorithm 算法 alias 别名 allocation 分配、定位 alias 小应用程序 allocation layer 应用层 API 应用程序编程接口 anlpasswd 一种与Passwd+相似的代理密码检查器 applications 应用程序 ATM 异步传递模式

audio policy 审记策略 auditing 审记、监察 back-end 后端 borde 边界 borde gateway 边界网关 breakabie 可破密的 breach 攻破、违反 cipher 密码 ciphertext 密文 CAlass A domain A类域 CAlass B domain B类域 CAlass C domain C类域 classless addressing 无类地址分配 cleartext 明文 CSNW Netware客户服务 client 客户,客户机 client/server 客户机/服务器 code 代码 COM port COM口(通信端口) CIX 服务提供者 computer name 计算机名

计算机专业外文文献及翻译

计算机专业外文文献及翻译 微软Visual Studio 1微软Visual Studio 是微软公司推出的软软软境~可以用软建来平台下的 Visual Studio Visual StudioWindows 软用程序和软软用程序~也可以用软建软服软、智能软软软用程序和网来网 插件。WindowsOffice Visual 是一自微软的个来集成软软软境;,~可以用软软由它来微StudioIDEinteqrated development environment软软窗~软手机窗~、框架、精软架框和微软的支持的控制台和软Windows https://www.sodocs.net/doc/70108369.html,Silverlight 形用软界面的软用程序以及窗体软用程序~站网~软用程序和软服软网中的本地代软软同托管WindowsWeb 代软。 包含一由个智能感知和代软重构支持的代软软软器。集成的软软工作作软一源代软软软既个Visual Studio 软器又可以作软一台机器软软软器。其他置工具包括一软软内个窗体的软用程序~软软软软~软软软软~网数据软架GUI 构软软软。有乎各软面的件增强功能~包括增加软支持它几个插源代软控制系软;如和SubversionVisual ,添加新的工具集软软和可软化软软器~如并特定于域的软言或用于其他方面的软件软软生命周期SourceSafe 的工具;例如的客软端,软软软源管理器,。Team Foundation Server

支持不同的软程软言的服软方式的软言~允软代软软软器和软软器;在不同程 度上,支持它Visual Studio 几乎所有的软程软言~提供了一软言特定服软的存在。置的软言中包括个内中;通软C/C + +Visual C+,;通软,~,中;通软,,和,;作软+,https://www.sodocs.net/doc/70108369.html,Visual https://www.sodocs.net/doc/70108369.html,CVisual CFVisual Studio ,~软支持其他软言~如和等~可通软安软的软言服软。软也支持装独它的2010M,Python,Ruby 和软特定用软提供服软的也是存在的,微 XML/XSLT,HTML/XHTML ,JavaScriptCSS.Visual Studio软~,、,和。Visual BasicVisual JVisual CVisual C++ 微软提供了“直通软”的软件的和,和~Visual Studio 2010Visual BasicVisual CVisual C + +和版本~不需任何软用。、年和软软版~以及Visual Web DeveloperVisual Studio 201020082005 的特定软言版本;、、,、,,~通软微软的下软Visual Studio 2005Visual BasicC++CJ 软~软生免软。划学DreamSpark 2架构 不支持任何软程软言~解方案或工具本软。相反~允软入各软功能。特定的功决它插Visual Studio 能是作软一个软软包的代软。安软~软功能可以服软器得到。装个从提供三软服软,~VSIDESVsSolution它决提供了能软列软的软目和解方案~提供了口和用软界面功能;包括软软~工具软和工它窗; SVsUIShell 具口,和窗~软理它软软包的注。此外~册软可以软软软软和服软之软软软通信。所有的软软器~SVsShellVSIDE

网络安全外文翻译--APR欺骗检测:一种主动技术手段

外文翻译原文及译文 学院计算机学院 专业计算机科学与技术班级 学号 姓名 指导教师 负责教师 2011年6月

Detecting ARP Spoofing: An Active Technique Vivek Ramachandran and Sukumar Nandi Cisco Systems, Inc., Bangalore India Indian Institute of Technology, Guwahati, Assam, India Abstract. The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man in the middle and session hijacking. The current methods of detection use a passive approach, monitoring the ARP traffic and looking for inconsistencies in the Ethernet to IP address mapping. The main drawback of the passive approach is the time lag between learning and detecting spoofing. This sometimes leads to the attack being discovered long after it has been orchestrated. In this paper, we present an active technique to detect ARP spoofing. We inject ARP request and TCP SYN packets into the network to probe for inconsistencies. This technique is faster, intelligent, scalable and more reliable in detecting attacks than the passive methods. It can also additionally detect the real mapping of MAC to IP addresses to a fair degree of accuracy in the event of an actual attack. 1. Introduction The ARP protocol is one of the most basic but essential protocols for LAN communication. The ARP protocol is used to resolve the MAC address of a host given its IP address. This is done by sending an ARP request packet (broadcasted) on the network. The concerned host now replies back with its MAC address in an ARP reply packet (unicast). In some situations a host might broadcast its own MAC address in a special Gratuitous ARP packet. All hosts maintain an ARP cache where all address mappings

计算机专业的外文文献.pdf

A Rapid Tag Identification Method with Two Slots in RFID Systems Yong Hwan Kim, Sung Soo Kim, Kwang Seon Ahn Department of Computer Engineering, Kyungpook National University Daegu, Korea {hypnus, ninny, gsahn}@knu.ac.kr Abstract—RFID is core technology in the area of ubiquitous compu-ting. Identify the objects begin with the reader’s query to the tag at-tached to the subject. When multiple tags exist in the reader’s inter-rogation zone, these tags simultaneously respond to the reader’s query, resulting in collision. In RFID system, the reader needs the anti-collision algorithm which can quickly identify all the tags in the interrogation zone. This paper proposes tree based Rapid Tag Identi-fication Method with Two Slots(RTIMTS). The proposed algorithm rapidly identifies a tag with the information of Two Slots and MSB(Most Significant Bit). Two Slots resolve the tag collision by receiving the response from the tag to the Slot 0 and 1. The reader can identify two tags at once using MSB of information added to the tag ID. With RTIMTS algorithm, the total time of tag identification can be shortened by decreasing the number of query-responses from the reader. Keywords-RFID; Anti-collision; Two Slots; the number of query-responses. I.I NTRODUCTION RFID(Radio Frequency Identification) is a technology that deciphers or identifies the tag information through a reader (or interrogator) without contact. RFID have become very popular in many service industries, purchasing and distribution logis-tics, industry, manufacturing companies and material flow systems. Automatic Identification procedures exist to provide information about people, animals, goods and products in tran-sit[1][2]. The reader receives required information from the tags by sending and receiving wireless signals with the tag. Since the communication between the readers and the tags shares wire-less channels, there exist collisions. The collisions can be di-vided into the reader collision and the tag collision. The reader collision occurs when multiple readers send request signals to one tag, and the tag receives the wrong request signal due to signal interference between readers. The tag collision occurs when more than two tags simultaneously respond to one reader and the reader cannot identify any tags. This kind of collision makes the reader take long time to identify tags within the read-er’s identification range and impossible to identify even one tag[3][4][5] [6]. Therefore, the collision is a crucial problem that must be re-solved in RFID systems, so many studies to resolve this prob-lem have been carried out as well as are ongoing. This paper focuses on the tag collision problem which occurs in the case where one reader identifies multiple tags. Figure 1 provides schematizations of reader collision and tag collision. This paper proposes the Rapid Tag Identification Method with Two Slots (RTIMTS), for faster tag identification in mul-ti-tag environment where one reader identifies multiple tags. In the transfer paper[7], the proposed algorithm designs the method that it does without the value extracting procedure of even(or odd) parity bit of ID bit(T pb),the number of identified ‘1’s(T1n), the number of remaining ‘1’s(T rn), and the number of collided bit (T cb) with simple it can predict a tagID. Maximum 4 tag IDs can be identified on one round by using Two slots. a) The Reader collision b) The Tag collision Figure 1. The collision problem in RFID System II.T HE R ELATED WORKS A. Query Tree Query Tree(QT) algorithm is a binary tree based anti colli-sion algorithm and has an advantage in easily implementation due to its simple operating mode[8]. QT sets the reader’s query and tag’s response as one round, and identifies tags by iterating the round. In each round, the reader requests prefix to tag’s ID. And when ID matches the prefix, each tag transmits all IDs including prefixes to the reader. At this time, if more than one tag simultaneously responds, the reader cannot recognize tag’s ID, but can recognize that there are currently more than two tags having the prefix. Then the reader adds ‘0’ or ‘1’ to the current prefix and queries the longer prefix to the tags again. When only one tag responds to the reader, it identifies the tag. In other words, the reader adds the prefix by 1 bit until only one tag responds and iterates this process until identifying all the tags within the range. Figure 2 shows the operating process of QT algorithms[10]. Figure 2 shows the process that four tags respond according to the readers’ query. In round 1, 2, 3, and 7, the collision oc-curs because more than two tags respond, and in round 4, 5, 8, and 9, tag can be identified because only one tag responds. The digital coding method applied to QT cannot detect the collision bits. When a collision occurs, the reader adds ‘0’ or ‘1’ to the 2009 Eighth IEEE International Symposium on Network Computing and Applications 978-0-7695-3698-9/09 $25.00 ? 2009 IEEE DOI 10.1109/NCA.2009.21 292

相关主题