搜档网
当前位置:搜档网 › 毕设RFID外文翻译

毕设RFID外文翻译

毕设RFID外文翻译
毕设RFID外文翻译

毕业设计(论文)

外文翻译

题目

专业计算机科学与技术

班级

学生

指导教师

2012 年

附件1:外文资料翻译译文

当前无线射频识别技术应用略述

摘要

无线射频识别技术可以自动识别多目标并以非接触式方式移动目标。越来越多的零售商、银行、交通管理系统、展览及物流供应商将这项新技术应用于他们的产品和服务。因此,这给RFID技术的研究带来了机遇和挑战。本文简单介绍了RFID系统的组成、原理及RFID技术的特点。本文比较了RFID 与传统条码,然后提供了一个简短的关于目前RFID应用情况的调查报告。

关键词:无线射频识别技术应用物流

一、简 介

无线射频识别(RFID )是一种识别技术。与RFID 技术的前身——条码技术相比,RFID 技术具有很多的优点。但由于其成本高,RFID 技术至今未能广泛应用到各行各业。RFID 技术因其无需视线扫描而具有无可比拟的先进性,它能够降低劳动力水平,提高知名度并改善库存管理。

RFID 技术的普及提供了一项人或物体定位及追踪的解决方案。RFID 定位与跟踪系统根据独特的识别标签、阅读器与物体标签间射频通信的信号强度确定物体的空间位置,主要适用于室内,而GPS 系统是不适合应用于室内的。

RFID 技术是一项基于“无线电频率”的非接触式的自动识别技术,自动识别静态或动态的人和对象。 RFID 标签是一个特殊的微芯片,植入商品中,可以跟踪和管理物理对象,是物流管理信息化和跟踪信息化的重要手段。 RFID 的系统组成部分包括:

(1)标签(应答器):对象植入待确定。

(2)阅读器:可以读或读/写,按结构和技术。正如图1-1,RFID 的工作原理

图1-1 RFID 的工作原理

与计算机通讯 阅读器 电磁波(操作指

令和新的数据)

标签 发出的ID

代码和数据

二、目前RFID技术的研究重点

由于RFID技术日趋成熟且RFID标签价格下降,RFID越来越受到工业界和学术界的关注。通过在物品上贴射频标签,我们就可以跟踪和管理这些对象。这项技术会逐渐取代目前的广泛采用的条码系统。

(一)RFID标签与条码

条码技术广泛采用于商品和对象的识别。我们能够在超市的任何包装产品上找到条码。Zebra公司是领先的条码供应商之一,它为全世界超过一百个国家提供专业数码印刷及自动识别解决方案。二十年前,该公司主要生产标准标签。如今,Zebra 开展RFID业务。从应用角度来看,尤其是在零售业方面,条码和RFID有着相似的市场应用点。RFID技术会取代条码吗?

从概念的角度来看,RFID标签和条码标签也有相似之处。通过提供一种易于识别的取货码,管理便利店商品。两者之间的主要差别是条码技术采用只读方式且必须在阅读器规定的线路上读取。与条码相比,RFID通过无线电传输数据且能够改变存储在RFID标签上的数据。这种远距离的非接触式自动化操作有效减少人力需求。RFID最先进的一点是它可以在同类型的产品中识别个别物品。RFID为供应链所有进程中单一商品提供实时跟踪环境。基于这些功能,RFID技术减少了仓储,配送和库存成本。这直接为企业带来更多的利润,显著提高客户服务质量。

(二)射频标准的发展

企业逐渐认识到RFID产品和服务创造的巨大商机。RFID技术主要在美国,日本,韩国和中国发展。美国食品和药品管理局国际部已经开始推动RFID 技术的发展,沃尔玛就是一个成功的例子。沃尔玛用RFID产品取代条码节省

67亿美元,6亿美元存储成本及5.7亿美元丢失盗窃成本。然而,RFID技术还没有一个单一的全球标准。美国正在建立本国的RFID硬件和应用标准,欧洲标准主要遵循美国的标准。

日本在智能通信和家电领域有深入的研究。日本提出的UID标准目前只应用于本土。日本经济贸易和产业部(METI)正在推动RFID在日本的发展和应用。日本经济贸易产业部的两个主要任务是降低RFID标签成本、促进日本标准全球化。韩国的研究和开发集中在自动化和智能家电方面。

中国政府也意识到了RFID产业价值,并制定自己的RFID 标准。中国因其大规模宽领域的工业而被称为“世界工厂”。因此,中国有潜力发展自己的标准。虽然与上述国家相比中国的RFID行业起步较晚,但其成长迅速,正逐渐成为全球极具竞争力的国家。一些公司如Invengo,正在开发其自主品牌的RFID产品。

(三)目前射频技术的发展

硬件组件对于所有RFID系统而言是共同的,而不同的软件形成不同的RFID应用。硬件方面的主要问题包括:产品小型化、降低成本、大制作等。

一些公司如德国西门子,加快RFID芯片的发展,快速丰富自己的产品以满足用户的需求。目前超高频RFID芯片的集成度已大大增加。

第二代(Gen.2)RFID标签很快取代上一代,并在应用市场占主导份额。富士通首次开发的64 KB内存RFID标签访问速度高、存储量大,已经成功应用于航空业。阅读器的价格不断递减,RFID读取器的功能不断加强而价格却不断递减。最近一年,微软发布了BizTalk Server,这种服务器将RFID技术与微软的产品应用集成。

由于RFID系统成为日常生活的重要部分,敏感且私人信息都可能存储在RFID 标签中。这一安全威胁变得越来越严重,限制了RFID技术的推动和发展。由于RFID标签成本和空间的限制,RFID技术通常不具备高功率的安全

机制。RFID标签是易受攻击的。如果没有适当的安全措施,任何人都可以用RFID读写装置阅读、修改和删除一个RFID标签上的数据。而且RFID标签很容易复制,这对门禁系统而言是一大威胁。

现在,一些安全措施可供应用方面使用。例如,ISO为数据认证颁布的15693标准已经应用于银行卡授权和建设门禁系统。然而,所有的安全措施都有一些缺点,它已成为关于RFID技术的热门研究话题。

三、射频技术的主要应用

RFID技术的应用主要集中在物流、零售业、收费系统、机票、医疗保健,安全和识别系统。

(一)物流

其中最著名的RFID技术的应用之一是供应链管理。RFID标签附在商品上。RFID阅读器跟踪供应链中的物品或零件及所有的物品从产地到销售点。Megatrux是世界100强物流公司之一,其将摩托罗拉公司的RFID计划应用到供应链管理。他们的客户服务得到改善,而成本却大大降低。

RFID技术在产品交付方面很有价值。我们利用贴在物品上的RFID标签跟踪产品从拣货到提交的移交过程和当前位置。RFID技术能够缓解人为失误造成的错误交货,并不要求像条码一样一对一的视线阅读。在识别大批量的货物时,减少了时间并节约阅读标签成本。在2005年,澳大利亚邮政开始在国内邮政服务范围内处理RFID标签信封。联邦快递开始测试RFID技术的应用,用其跟踪包裹的温度、位置、湿度水平和交货状态。

在服装行业,RFID技术应用于生产、分销和零售。RFID系统可以提供库存可视性,加强顾客购物体验。该系统能够知道哪些衣服客户挑选的频率最高,并根据标签提供服装定制广告。美国服饰在其旗下的八个商店运用RFID 系统。该系统每周节省劳动力约60-80小时。日本服装制造商Sankei 在制造过程利用RFID系统跟踪服装并促进网上销售。

(二)零售业

在零售行业,RFID技术通常用于收集客户数据。通过跟踪这些数据,用户可以获得关于产品库存的实时信息。进一步利用数据能够提供更多有用的信息并协助决策。例如,在一家超市,当顾客进入超市时,给每位顾客提供一个互动装置。他们可以利用该装置输入个人信息(年龄、性别、职业等)

并拟定购物清单。然后,该设备向顾客返回建议购物路线、相关产品和折扣信息。当顾客就近选取商品或向自己的购物车放入商品时,先前部署的RFID 阅读器将汇总这些变化。随后,应用软件将分析这些资料,向顾客发送新的建议。数据挖掘和其他器械学习技巧能够发现隐藏的顾客行为、购物习惯、商品与青睐物品之间的关联。

四、结束语

RFID技术具有很多优点,如以高精度、非接触的方式同步采集大量数据等。RFID技术对我们的生活影响越来越大,逐渐取代超市和物流管理中的条码。目前,射频技术最广泛的应用是的访问控制和货物位置追踪。实际上,RFID技术提供个体物品识别和在线多变数据存储的功能。对于这些附加功能,我们要创造一个更好的工具。因此,我们期待新一代的RFID应用纳入智能化。智能化的RFID应用可能带来新的研究和商业机会。此外,它有助于进一步降低成本、提高客户服务,并提供商业模式更新的洞察力。

五、参考文献

[1] Kuo shien Huang and Shun ruing Tang,RFID Application Strategy and Deployment in Bike Renting

System,International Conference on Advanced Communication Technology,PP.660-663,Feb,2008

[2] Landt J.The history of RFID,Potentials,V ol 24,No.4,PP.8.11,Nov.2

[3] Michael K.and MeCathie L.,The Pros and Cons of RFID in Supply Chain Management.International

Conference on Mobile Business,PP.623.629,July 2005.

[4]Allen Nogee, Tags and Chip:Changing the World for Less Then The Pricc of A Cup Of Coffee,In-Stat

/MDE,PP.14,December,2004

[5] http://www.https://www.sodocs.net/doc/e112322122.html,

[6] Christine Gallen,Total RFID Revenue to Exceed$5.6 Billion in 2009,According to ABI research,

https://www.sodocs.net/doc/e112322122.html,/press/1395.

附件2:外文原文(复印件或打印件)

A Brief Survey on Current RFID Applications

Abstract

RFID can automatically identify multi-target and moving target in non-contact method. there are an increasing number of retailers,banks,traffic managements,exhibitions and logistic providers practicing this new technology to their products and services.Therefore,it brings both opportunities and challenges to RFID researchers.This article briefly introduced component, principle and characteristic of the RFID technology..In this paper we compared RFID and the traditional bar code,and then provide a brief survey on RFID applications .

Keywords: RFID Application Logistic

1. Introduction

Radio frequency identification (RFID) is a new identification technology . RFID has a greater number of benefits than its predecessor, the bar code. It is not universally adopted in many industries due to its high cost hitherto. However, RFID is unmatched advanced because it does not require sight scanning, it acts to reduce labor levels, enhances" visibility , and improves inventory management. The popularization of RFID (Radio Frequency Identification) provides a solution of the location/ tracing of human or objects. RFID location and tracing system,measures the space location of object based on unique identification tag and signal intensity of RF communication between reader and tag in object, mainly apply to indoor location, which GPS system is not suitable for .

RFID, a non-contact automatic identification technology based on “Radio Frequency”, automaticall y identify static/moving object/human. RFID tag, a special microchip, implanted in commodity , can trace and manage physical object, is an important means of logistics management informatization and tracing informatization .

The component of RFID system including:

(1) Tag (transponder): implanted in object to be identified.

(2) Reader: can read or write/read, according to the structure and technology . As figure 1, RFID work principle.

Figure 1-1,RFID work principle

Communicate with computer Readere Electromagnetic wave (operation instruction and new data) Tag Emit ID code and data

2. Current Research Focuses of RFID

With the growing maturity of RFID technology and the drop in price of RFID tags,RFID attracts increasing interests from both industry and academic.By attaching RFID tags on objects,one could keep track on and manage those objects.This technology gradually replaces current widely adopted barcode systems.

2. 1.RFID Tag and Bar code

Bar code is widely adopted for goods and object identification.One could find bar code on every packaged item in supermarkets. Zebra Company is one of the leading bar code providers and provides on-demand specialty digital printing and automatic identification solutions in more than 100 countries around the world.About twenty years ago, the company mainly produced the standard labels. Now Zebra also moves to RFID business.From the application point of view, bar code and RFID share a similar market, especially in retail aspect. Will RFID replace bar code?

From conceptual point of view, RFID tag and bar code are also similar.Both of them target to facilitate goods management by providing an easy to fetch identification code.There are two major differences between them,barcode is read-only and must be in line-of-sight from the reader .Comparing with bar code.RFID is able to transmit data by radio frequency and alter data stored on the RFID tag chip.This long range and non-contact operation allows automation to reduce man power requirement.The most important advancement of RFID over barcode is that it allows identification of individual item from a group of same type products.RFID also provides real-time traceability environment for individual item through all process in the supply chain.Owing to these features, RFID reduces the cost for warehouse, distribution and inventory.This directly brings more profit to companies and improves customer service remarkably.

2.2. Development of RFID Standard

Enterprises gradually realize the great business opportunities created by RFID products and services.Major developments of RFID technologies are located at USA,Japan,Korea and China.For examples, Wal-Mart,the international department of the United States,the United States Food and Drug Administration have promoted the development of RFID.A successful example is Wal-Mart.They replaced some barcodes by RFID products which saved US$6.7 billion barcode cost,US$0.6 billion storage cost and US$0.57 billion missing and theft cost.However, RFID does not have a single global standard yet.USA is developing its RFID standard for both hardware and application areas.The RFID standard of European mainly follows the USA standard.

Japan has strong research and product lines on intelligent communication and home appliances.Japanese proposed the UID standard which is adopted in Japan homeland only.Japanese Ministry of Economy ,Trade and Industry(METI) is pushing for the development and applications of RFID in Japan.The two major missions of METI are to reduce the cost of RFID tags and to promote the Japanese standard to worldwide.Korea focuses their RFID research and development on automation and home appliances’ intelligent.

The China government also realizes the industrial value of RFID and is formulating its own RFID standard.China is considered as the “world factory” because of its large scale and wide range of industry. Therefore, China has the potential to develop its own standard. In comparison to aforementioned countries, although China is late in starting its RFID industry, it grows up rapidly and is gradually becoming very competitive in worldwide. Several companies,e.g. Invengo,in China are making progress on the development of their own brands of RFID products.

2.3.Current RFID Technology Development

Hardware components are common to all RFID applications while different software leads to different RFID application, Major issues in RFID hardware

include product miniaturization,cost reduction, large production,etc.Some companies,such as German Siemens, speeded up the development of RFID chips to enrich their products and to meet users’needs.The integration density of current UHF RFID chips has been greatly increased.

The new Generation 2(Gen.2) RFID tags quickly replace old generation tags and have a dominant share on the RFID application market. Fujitsu developed the first RFID tag with 64 KB memory which has been successfully adopted in aviation industry owing to its high access speed and large storage.The price of RFID readers are monotonically decreasing while the capacities of RFID readers are enhancing, in recent year, Microsoft issued the BizTalk Server which integrates the RFID with Microsoft product application.

As RFID systems becoming an important part of everyday life, sensitive and private information may be stored in RFID tag. This security threat becomes more serious and puts a severe limitation to the promotion and deployment of RFID applications.However, owing to the limitation of space and cost of a RFID tag, RFID tag usually does not equip with high power security mechanism.RFID tags are frangible to attack .Without appropriate security , anyone could read,alter and delete data on the RFID tags with a RFID reader/writer.Moreover, RFID tags are easy to clone. This is a big threat to access control system.Now,a number of security measures are available for applications.For example.The ISO standard 15693 for data authentication is adopted in bank card authorizations and building access control systems.However,all security measures have some shortcoming and it has become a hot research topic in RFID.

3.Major RFID Applications

RFID applications focus on logistic,toll system,ticket, healthcare,security and identification systems.

3.1 Logistic

One of the most famous RFID applications is supply chain management. RFID tags are attached to goods. Items or parts in the supply chain and all items are tracked by RFID readers from manufacture to point of sales. Megatrux ,a top l00 logistics company in the world, has applied Motorola RFID plan to its supply chain management. Their customer services have been improved while the costs have been reduced greatly.

RFID also has a great value in product delivery. We could track the handing process and current location of the product from pick up to delivery with RFID tag attached on it. It helps to relieve incorrect delivery owing to human mistakes. It does not require one to one line of sight reading which is required for barcode. This reduce the time and cost of reading tags for a large batch of goods.The Australia Post begun processing RFID-tagged envelops in domestic mail service in 2005.Federal Express runs a pilot test on the application of RFID technology to track packages temperature,location,humidity levels and delivery status.

In apparel industry ,RFID is applied in manufacturing, distribution and retail.RFID system provides inventory visibility and enhances customer shopping experience.The RFID system is able to know which clothes being picked up by customers most frequently and to provide customized advertisement on picked clothes according to the RFID tags.American Apparel applied RFID system to eight of their stores.it helps to save about 60-80 hours per week in labor .Japanese apparel manufacturer Sankei utilizes a RFID system in clothing manufacturing to track clothes during the manufacturing process and facilitate online sales.

3.2 Retail

In retail industry, RFID are usually used to collect customer data.By tracking

those data, one may have a real time visibility on the stocks of products. However, the data could be further utilized to provide more useful information and assist in decision making.For example,in a supermarket,every customer is given an interaction device when entering the supermarket.With the device,they can input personal information(age, gender, occupation, etc) and intended shopping list.Then,the device returns the customer a suggested shopping route,advertisement on related products and discount information.RFID readers deployed will collect those changes when the customers get close to a selected shelf or put some goods in their shopping carts. The application software will then analyze the information to make new suggestions to customers.Data collected for a day could be studied to enhance the validity of suggestion and provide better customer services. Data mining and other machine learning techniques could also be adopted to discover hidden customer behaviors,shopping habits ,association rules among products and favored items.

4.Conclusions

RFID technology has a lot of advantages,such as simultaneous collection of large quantities of data with high accuracy, non-contact, etc.RFID technology has an increasing influence to our lives and gradually replaces bar code in supermarket and logistic management.Most of current RFID applications are for access control and goods location tracking.In fact,RFID provides the function of individual goods identification and online changeable data storage.We should make a better utility to these additional functions. Therefore, we expect that the next generation of RFID applications should incorporate intelligent.Intelligent RFID applications could bring in new research and commercial opportunities. Moreover, it helps to further reduce costs,enhance customer services and could provide insight for updating business models.

REFERENCES

[1] Kuo shien Huang and Shun ruing Tang,RFID Application Strategy and Deployment in Bike Renting

System,International Conference on Advanced Communication Technology,PP.660-663,Feb,2008

[2] Landt J.The history of RFID,Potentials,V ol 24,No.4,PP.8.11,Nov.2

[3] Michael K.and MeCathie L.,The Pros and Cons of RFID in Supply Chain Management.International

Conference on Mobile Business,PP.623.629,uly 2005.

[4]Allen Nogee, Tags and Chip:Changing the World for Less Then The Pricc of A Cup Of Coffee,In-Stat

/MDE,PP.14,December,2004

[5] http://www.https://www.sodocs.net/doc/e112322122.html,

[6] Christine Gallen,Total RFID Revenue to Exceed$5.6 Billion in 2009,According to ABI research,

https://www.sodocs.net/doc/e112322122.html,/press/1395.

毕设外文资料翻译.

理工学院 毕业设计外文资料翻译 专业:计算机科学与技术 姓名:马艳丽 学号: 12L0752218 外文出处:The Design and Implementation of 3D Electronic Map of Campus Based on WEBGIS 附件: 1.外文资料翻译译文;2.外文原文。

附件1:外文资料翻译译文 基于WebGIS的校园三维电子地图的设计与实现 一.导言 如今,数字化和信息化是当今时代的主题。随着信息革命和计算机科学的发展,计算机技术已经渗透到科学的各个领域,并引起了许多革命性的变化,在这些科目,古代制图学也不例外。随着技术和文化的不断进步,地图变化的形式和内容也随之更新。在计算机图形学中,地理信息系统(GIS)不断应用到Web,制作和演示的传统方式经历了巨大的变化,由于先进的信息技术的发展,地图的应用已经大大延长。在这些情况下,绘图将面临广阔的发展前景。电子地图是随之应运而生的产品之一。随着计算机技术,计算机图形学理论,遥感技术,航空摄影测量技术和其他相关技术的飞速发展。用户需要的三维可视化,动态的交互性和展示自己的各种地理相关的数据处理和分析,如此多的关注应支付的研究三维地图。东北石油大学及其周边地区的基础上本文设计并建立三维电子地图。 二.系统设计 基于WebGIS的校园三维电子地图系统的具有普通地图的一般特性。通过按键盘上的箭头键(上,下,左,右),可以使地图向相应的方向移动。通过拖动鼠标,可以查看感兴趣的任何一个地方。使用鼠标滚轮,可以控制地图的大小,根据用户的需求来查看不同缩放级别的地图。在地图的左下角会显示当前鼠标的坐标。在一个div层,我们描绘了一个新建筑物的热点,这层可以根据不同的地图图层的显示,它也可以自动调整。通过点击热点,它可以显示热点的具体信息。也可以输入到查询的信息,根据自己的需要,并得到一些相关的信息。此外,通过点击鼠标,人们可以选择检查的三维地图和卫星地图。 主要功能包括: ?用户信息管理:检查用户名和密码,根据权限设置级别的认证,允许不同权限的用户通过互联网登录系统。 ?位置信息查询:系统可以为用户提供模糊查询和快速定位。

计算机专业毕业设计说明书外文翻译(中英对照)

Talking about security loopholes Richard S. Kraus reference to the core network security business objective is to protect the sustainability of the system and data security, This two of the main threats come from the worm outbreaks, hacking attacks, denial of service attacks, Trojan horse. Worms, hacker attacks problems and loopholes closely linked to, if there is major security loopholes have emerged, the entire Internet will be faced with a major challenge. While traditional Trojan and little security loopholes, but recently many Trojan are clever use of the IE loophole let you browse the website at unknowingly were on the move. Security loopholes in the definition of a lot, I have here is a popular saying: can be used to stem the "thought" can not do, and are safety-related deficiencies. This shortcoming can be a matter of design, code realization of the problem. Different perspective of security loo phole s In the classification of a specific procedure is safe from the many loopholes in classification. 1. Classification from the user groups: ● Public loopholes in the software category. If the loopholes in Windows, IE loophole, and so on. ● specialized software loophole. If Oracle loopholes, Apach e,

计算机网络新技术外文翻译文献

计算机网络新技术外文翻译文献 (文档含中英文对照即英文原文和中文翻译) 译文: 计算机网络新技术 摘要 21世纪是一个信息时代的经济,计算机网络技术是这个时期的代表技术,以非常快的、具创造性得不断地发展,并将深入到人民群众的工作,生活和学习中。因此,控制这种技术看起来似乎具有很重要的意义。现在,我主要是采用新技术的几种网络技术在现实生活的应用。 关键字 因特网数字证书数字银包网格存储 3G

1.前言 互联网满36岁,仍然是一个进展中的工作。36年后在加州大学洛杉矶分校的计算机科学家使用15英尺的灰色电缆连接两台笨重的电脑,测试了一种在网络上新的数据交换的方式,这将最终成为互联网依然是一个在取得进展的工作。 大学的研究人员正在试验如何提高网络容量和速度。编程人员正在设法为网页注入更多的智能。并正在进行重新设计网络以减少垃圾邮件(垃圾邮件)和安全麻烦的工作。 与此同时威胁织机:批评人士警告说,商业,法律和政治压力可能会阻碍一些使互联网发展到今天的创新的类型。 斯蒂芬克罗克和温顿瑟夫属于1969年9月2日研究生加入的加州大学洛杉矶分校斯莱昂兰罗克教授工程实验室的团体,作为位无意义的测试数据两台计算机之间默默流动。到第二年的1月,其他三个“节点”加入到了这个网络。 然后是电子邮箱,几年之后,在七十年代后期一个所谓的核心通信协议即TCP / IP 协议,在80年代域名系统和在1990年万维网-现在的第二个最流行的应用背后电子邮件出现了。互联网的扩大,超出其最初的军事和教育领域延伸到了企业和全球的家庭中。 今天,克罗克仍然为互联网工作,为协作设计更好的工具。作为互联网管理机构的安全委员会主席,他正试图保卫系统的核心处理免受来自外部的威胁。 他认识到,他帮助建立的互联网工作远未完成,而这些改变是在商店,以满足多媒体日益增长的需求。网络供应商现唯一的“最佳努力”是在提供的数据包上。克罗克说,需要有更好的保障,以防止跳过和过滤现在常见的视频。 瑟夫,现在在MCI公司说,他希望他建立了有内置安全的互联网。微软,雅虎和美国在线公司,和其他的一些,目前正在努力改进网络,使邮件发送者可以验证的方式发送以降低使用虚假地址发送垃圾邮件。 瑟夫说,现在正在制定许多功能,是不可能立即解决计算速度慢和互联网管道窄,或

电气专业毕业设计外文翻译

附录1:外文资料翻译 A1.1外文资料题目 26.22 接地故障电路开关 我们目前为止报道的接地方法通常是充分的, 但更加进一步的安全措施在某些情况下是必要的。假设例如, 有人将他的手指伸进灯口(如Fig.26.45示)。虽然金属封入物安全地接地, 但那人仍将受到痛苦的震动。或假设1个120V 的电炉掉入游泳池。发热设备和联络装置将导致电流流入在水池中的危害,即使电路的外壳被安全地接地,现在已经发展为当这样的事件发生时,设备的电源将被切断。如果接地电流超过5mA ,接地开关将在5 ms 内跳掉,这些装置怎么运行的? 如Fig.26.46所示,一台小变流器缠绕上导线 ,第二步是要连接到可能触发开合120 V 线的一台敏感电子探测器。 在正常情况下流过导体的电流W I 与中性点上的电流N I 准切的相等,因此流经核心的净潮流(N W I I -)是零。 结果,在核心没有产生电流,导致的电压F E 为零,并且开关CB 没有动作。 假设如果某人接触了一个终端(图Fig.26.45示),故障电流F I 将直接地从载电线漏到地面,这是可能发生的。如果绝缘材料在马达和它的地面封入物之间断开,故障电流也会被产生。在以下任何情况下,流经CT 的孔的净潮流等于F I 或L I ,不再是零。电流被产生,并且产生了可以控制CB 开关的电压F E 。 由于5 mA 不平衡状态只必须被检测出,变压器的核心一定是非常有渗透性的在低通量密度。 Supermalloy 是最为常用的,因为它有相对渗透性典型地70000在通量密度仅4mT 。 26.23 t I 2是导体迅速发热的因素 它有时发生于导体短期内电流远大于正常值的情况下,R I 2损失非常大并且导体的温度可以在数秒内上升几百度。例如,当发生严重短路时,在保险丝或开关作用之前,会有很大的电流流过导体和电缆。 此外,热量没有时间被消散到周围,因此导体的温度非常迅速地增加。 在这些情况下什么是温度上升? 假设导体有大量m ,电阻R 和热量热容量c 。 而且,假设电流是I ,并且那它流动在t 少于15秒期间。 在导体上引起的热 Rt I Q 2= 从Eq.3.17,在功率一定的情况下我们可以计算导体上升的温度差:

计算机专业外文文献翻译6

外文文献翻译(译成中文2000字左右): As research laboratories become more automated,new problems are arising for laboratory managers.Rarely does a laboratory purchase all of its automation from a single equipment vendor. As a result,managers are forced to spend money training their users on numerous different software packages while purchasing support contracts for each. This suggests a problem of scalability. In the ideal world,managers could use the same software package to control systems of any size; from single instruments such as pipettors or readers to large robotic systems with up to hundreds of instruments. If such a software package existed, managers would only have to train users on one platform and would be able to source software support from a single vendor. If automation software is written to be scalable, it must also be flexible. Having a platform that can control systems of any size is far less valuable if the end user cannot control every device type they need to use. Similarly, if the software cannot connect to the customer’s Laboratory Information Management System (LIMS) database,it is of limited usefulness. The ideal automation software platform must therefore have an open architecture to provide such connectivity. Two strong reasons to automate a laboratory are increased throughput and improved robustness. It does not make sense to purchase high-speed automation if the controlling software does not maximize throughput of the system. The ideal automation software, therefore, would make use of redundant devices in the system to increase throughput. For example, let us assume that a plate-reading step is the slowest task in a given method. It would make that if the system operator connected another identical reader into the system, the controller software should be able to use both readers, cutting the total throughput time of the reading step in half. While resource pooling provides a clear throughput advantage, it can also be used to make the system more robust. For example, if one of the two readers were to experience some sort of error, the controlling software should be smart enough to route all samples to the working reader without taking the entire system offline. Now that one embodiment of an ideal automation control platform has been described let us see how the use of C++ helps achieving this ideal possible. DISCUSSION C++: An Object-Oriented Language Developed in 1983 by BjarneStroustrup of Bell Labs,C++ helped propel the concept of object-oriented programming into the mainstream.The term ‘‘object-oriented programming language’’ is a familiar phrase that has been in use for decades. But what does it mean? And why is it relevant for automation software? Essentially, a language that is object-oriented provides three important programming mechanisms:

计算机网络体系结构外文翻译

附录A With the new network technology and application of the continuous rapid development of the computer network should. Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human. More inseparable from the lives of the community's reliance on them will keep growing. In order for computers to communicate, they must speak the same language or protocol. In the early days of networking, networks were disorganized in many ways. Companies developed proprietary network technologies that had great difficulties in exchanging information with other or existing technologies; so network interconnections were very hard to build. To solve this problem, the International Organization for Standardization(ISO)created a network model that helps vendors to create networks compatible with each other. Finding the best software is not easy. A better understanding of what you need and asking the right questions makes it easier. The software should be capable of handling challenges specific to your company. If you operate multiple distribution centers, it may be beneficial to create routes with product originating from more than one depot. Few software providers though, are capable of optimizing routes using multiple depots. The provider should be able to support installation of its product. Make sure to clearly understand what training and software maintenance is offered. Obviously, selecting the right routing/scheduling software is critically important. Unfortunately, some companies are using software that may not be best suited to their operation. Logistics actives with responsibility for approving the software ought to be comfortable they've made the right decision. It is important to realize that not all routing/scheduling software is alike! There questions to ask are:Which operating system is used?How easy is the software to use?Here is a good way to tell. Ask if its graphical user interface(GUI)is flexible. Find out about installation speed - how long does it take?Is the software able to route third party customers with your core business?When was the software originally released and when was it last upgraded? In 1984, ISO released the Open Systems Interconnection(OSI)reference model,

STC89C52处理芯片-毕业论文外文翻译

中文翻译 STC89C52处理芯片 电气工程的研究和解决方案中心(ceers) 艾哈迈德为吉.波特 首要性能: 与MCS-51单片机产物兼容、8K字节在系统可编程视频存储器、1000次擦拭周期,全静态操作:0Hz~33Hz、三级加密程序存储器,32个可编程I/O接口线、三个16位定时器(计数器),八个中断源、低功能耗空闲和掉电模式、掉电后间断可唤醒,看门狗定时器、双数值指针,掉电标示符。 关键词:单片机,UART串行通道,掉电标示符等 前言 可以说,二十世纪跨越了三个“点”的时代,即电气时代,电子时代和现已进入的电脑时代。不过,这种电脑,通常指的是个人计算机,简称PC机。还有就是把智能赋予各种机械的单片机(亦称微控制器)。顾名思义,这种计算机的最小系统只用了一片集成电路,即可进行简单的运算可控制。因为它体积小,通常都是藏在被控机械的内部里面。它在整个装置中,起着有如人类头脑的作用,他出了毛病,整个装置就会瘫痪。现在,单片机的种类和适用领域已经十分广泛,如智能仪表、实施工控、通讯设备、导航系统、家用电器等。各种产品一旦用上了单片机,就你能起到产品升级换代的功效,常在产品名称前冠以形容词——“智能型”,如智能洗衣机等。接下来就是关于国产STC89C52单片机的一些基本参数。 功能特性描述: STC89C52单片机是一种低功耗、高性能CMOS8位微控制器,具有8K在系统可编程视频播放存贮器使用高密度非易失性存储器技术制造,与工业80C51 产物指令和引脚完全兼容。片上反射速度允许程序存储器在系统可编程,也适用于常规的程序编写器。在其单芯片上,拥有灵敏小巧的八位中央处理器和在线系统可编程反射,这些使用上STC89C52微控制器为众多嵌入式的控制应用系统提供高度矫捷的、更加有用的解决方案。STC89C52微控制器具有以下的标准功效:8K字节的反射速度,256字节的随机存取储存器,32位I/O串口线,看门狗定时器,2个数值指针,三个16 为定时器、计数器,一个6向量2级间断结构,片内晶振及钟表电路。另外,STC89C52可降至0HZ静态逻辑操作,支持两种软件可选择节电模式、间断继续工作。空闲模式下,CPU停止工作,允许RAM、定时器/计数器、串口、间断继续工作。掉电保护体式格局下,RAM内容被生成,振动器被冻结,单片机一切的工作停止,直到下一个间断或者硬件复位为止。8位微型控制器8K字节在系统中可编程FlashSTC89C52.。

电气工程外文翻译

毕业设计(论文)外文资料翻译 学院:电气信息学院 专业:电气工程及其自动化 姓名:郭骥翔 学号: 081001227 外文出处: Adaptive torque control of variable speed wind turbines 附件: 1.外文资料翻译译文;2.外文原文。 指导教师评语: 签名: 年月日(用外文写)

附件1:外文资料翻译译文 多种风力涡轮机的适应性转矩控制 4.5 使用SymDyn进行仿真 所有先前所描述的模拟是使用SimInt来演示的,其中,如前所述,包括唯一的转子角速度自由度,与复杂的仿真工具比,如SymDyn和FAST,他能够更快的运行。然而,为了确认目的,与其他更流行的仿真工具比较SimInt在适应运行上的增益是很有价值的。适应性的增加并不是期望它能够同等的适应每一个仿真工具,因为每个仿真工具都有其独到的涡轮机模型。但是如果每个涡轮机的造型都相同,如同本例,那么在SimInt 和SymDyn中则有着基本相似的适应性增益(CART)。在数据4-10中,这种相似性被明显的显示出来。 SimInt和SymDyn仿真工具都是由零时刻开始,而且大多数参数初值都相同,如M,角速度等。然而,尽管这两个涡轮机模型都设立了最佳转矩控制M*,但是CP表面却有着不同程度的峰值。因此为了使初始过程大致相同,初始Pfavg值应有相同的最大比例,而不是相同的绝对值。在显示标准化M值4-10的上图中,显示了合理的类似数据。但在30到60小时后,仿真工具的适应性增益开始出现分歧。但在此之后,他们再次互相接近,在从模拟开始100小时到模拟结束这段时间,他们保持基本重合。从下图中也可以清楚的观察出,每个仿真工具都在调整他们的增益M,并采集最大输出功率。 尽管SimInt仿真速度差不多是SymDyn仿真速度的五倍,在图4-10中所显示的SymDyn 数据是唯一一个可以验证适应性增益法则的模拟工具。在这个展示了两个模拟工具合理

毕业设计外文翻译

毕业设计(论文) 外文翻译 题目西安市水源工程中的 水电站设计 专业水利水电工程 班级 学生 指导教师 2016年

研究钢弧形闸门的动态稳定性 牛志国 河海大学水利水电工程学院,中国南京,邮编210098 nzg_197901@https://www.sodocs.net/doc/e112322122.html,,niuzhiguo@https://www.sodocs.net/doc/e112322122.html, 李同春 河海大学水利水电工程学院,中国南京,邮编210098 ltchhu@https://www.sodocs.net/doc/e112322122.html, 摘要 由于钢弧形闸门的结构特征和弹力,调查对参数共振的弧形闸门的臂一直是研究领域的热点话题弧形弧形闸门的动力稳定性。在这个论文中,简化空间框架作为分析模型,根据弹性体薄壁结构的扰动方程和梁单元模型和薄壁结构的梁单元模型,动态不稳定区域的弧形闸门可以通过有限元的方法,应用有限元的方法计算动态不稳定性的主要区域的弧形弧形闸门工作。此外,结合物理和数值模型,对识别新方法的参数共振钢弧形闸门提出了调查,本文不仅是重要的改进弧形闸门的参数振动的计算方法,但也为进一步研究弧形弧形闸门结构的动态稳定性打下了坚实的基础。 简介 低举升力,没有门槽,好流型,和操作方便等优点,使钢弧形闸门已经广泛应用于水工建筑物。弧形闸门的结构特点是液压完全作用于弧形闸门,通过门叶和主大梁,所以弧形闸门臂是主要的组件确保弧形闸门安全操作。如果周期性轴向载荷作用于手臂,手臂的不稳定是在一定条件下可能发生。调查指出:在弧形闸门的20次事故中,除了极特殊的破坏情况下,弧形闸门的破坏的原因是弧形闸门臂的不稳定;此外,明显的动态作用下发生破坏。例如:张山闸,位于中国的江苏省,包括36个弧形闸门。当一个弧形闸门打开放水时,门被破坏了,而其他弧形闸门则关闭,受到静态静水压力仍然是一样的,很明显,一个动态的加载是造成的弧形闸门破坏一个主要因素。因此弧形闸门臂的动态不稳定是造成弧形闸门(特别是低水头的弧形闸门)破坏的主要原是毫无疑问。

计算机专业外文翻译

专业外文翻译 题目JSP Technology Conspectus and Specialties 系(院)计算机系 专业计算机科学与技术 班级 学生姓名 学号 指导教师 职称讲师 二〇一三年五月十六日

JSP Technology Conspectus and Specialties The JSP (Java Server Pages) technology is used by the Sun micro-system issued by the company to develop dynamic Web application technology. With its easy, cross-platform, in many dynamic Web application programming languages, in a short span of a few years, has formed a complete set of standards, and widely used in electronic commerce, etc. In China, the JSP now also got more extensive attention; get a good development, more and more dynamic website to JSP technology. The related technologies of JSP are briefly introduced. The JSP a simple technology can quickly and with the method of generating Web pages. Use the JSP technology Web page can be easily display dynamic content. The JSP technology are designed to make the construction based on Web applications easier and efficient, and these applications and various Web server, application server, the browser and development tools work together. The JSP technology isn't the only dynamic web technology, also not the first one, in the JSP technology existed before the emergence of several excellent dynamic web technologies, such as CGI, ASP, etc. With the introduction of these technologies under dynamic web technology, the development and the JSP. Technical JSP the development background and development history In web brief history, from a world wide web that most of the network information static on stock transactions evolution to acquisition of an operation and infrastructure. In a variety of applications, may be used for based on Web client, look no restrictions. Based on the browser client applications than traditional based on client/server applications has several advantages. These benefits include almost no limit client access and extremely simplified application deployment and management (to update an application, management personnel only need to change the program on a server, not thousands of installation in client applications). So, the software industry is rapidly to build on the client browser multilayer application. The rapid growth of exquisite based Web application requirements development of

计算机网络外文翻译

附录 一、英文原文: The NetWorks Birth of the Net The Internet has had a relatively brief, but explosive history so far. It grew out of an experiment begun in the 1960's by the U.S. Department of Defense. The DoD wanted to create a computer network that would continue to function in the event of a disaster, such as a nuclear war. If part of the network were damaged or destroyed, the rest of the system still had to work. That network was ARPANET, which linked U.S. scientific and academic researchers. It was the forerunner of today's Internet. In 1985, the National Science Foundation (NSF) created NSFNET, a series of networks for research and education communication. Based on ARPANET protocols, the NSFNET created a national backbone service, provided free to any U.S. research and educational institution. At the same time, regional networks were created to link individual institutions with the national backbone service. NSFNET grew rapidly as people discovered its potential, and as new software applications were created to make access easier. Corporations such as Sprint and MCI began to build their own networks, which they linked to NSFNET. As commercial firms and other regional network providers have taken over the operation of the major Internet arteries, NSF has withdrawn from the backbone business. NSF also coordinated a service called InterNIC, which registered all addresses on the Internet so that data could be routed to the right system. This service has now been taken over by Network Solutions, Inc., in cooperation with NSF. How the Web Works The World Wide Web, the graphical portion of the Internet, is the most popular part of the Internet by far. Once you spend time on the Web,you will begin to feel like there is no limit to what you can discover. The Web allows rich and diverse communication by displaying text, graphics, animation, photos, sound and video. So just what is this miraculous creation? The Web physically consists of your personal computer, web browser software, a connection to an Internet service provider, computers called servers that host digital data and routers and switches to direct the flow of information. The Web is known as a client-server system. Your computer is the client; the remote computers that store electronic files are the servers. Here's how it works: Let's say you want to pay a visit to the the Louvre museum website. First you enter the address or URL of the website in your web browser (more about this shortly). Then your browser requests the web page from the web server that hosts the Louvre's site. The Louvre's server sends the data over the Internet to your computer. Your web

电气毕业设计外文文献

外文文献: The Intelligent Building One of the benefits of the rapid evolution of information technology has been the development of systems that can measure, evaluate, and respond to change。An enhanced ability to control change has sparked developments in the way we design our physical environment, in particular, the buildings in which we work。As a result, we are witnessing significant growth in the area of "Intelligent Buildings"--buildings that incorporate information technology and communication systems, making them more comfortable, secure, productive, and cost-effective What is an Intelligent Building? An Intelligent Building is one equipped with the telecommunications infrastructure that enables it to continuously respond and adapt to changing conditions, allowing for a more efficient use of resources and increasing the comfort and security of its occupants。An Intelligent Building provides these benefits through automated control systems such as: heating, ventilation, and air-conditioning (HVAC);fire safety;security;and energy/lighting management。For example, in the case of a fire, the fire alarm communicates with the security system to unlock the doors。The security system communicates with the HVAC system to regulate the flow of air to prevent the fire from spreading。 What benefits do Intelligent Buildings offer their owners and occupants? The introduction in the workplace of computers printers photocopiers, and fax machines has increased indoor pollution。Electrical and telecommunications facilities in office buildings are under pressure to satisfy the demands created by the rapid growth of computer and networking technologies。These factors have a definite impact on productivity. New technology can be used to create Intelligent Buildings that address these problems by providing a healthier, more productive, and less energy-intensive work environment。As these are critical factors for business

相关主题