聊斋志异文化观外文文献翻译中英文参考

聊斋志异文化观外文文献翻译中英文参考
聊斋志异文化观外文文献翻译中英文参考

外文文献翻译

(含:英文原文及中文译文)

文献出处:Hou Jiaying. China Today, Oct2007, Vol. 56 Issue 10, p62-66

英文原文

Good fox, bad fox

In the 2,000 years of Chinese parables, the fox has always been a popular character. For the first time, they appeared before their prototypes.

They were both kind and vicious. They gradually ingested people's souls by pretending to be glamorous and charming young women.

In the Ming Dynasty (1368 - 1644), the famous writer Pu Songling's story about the fox was described in his famous Strange Stories. He modeled them as beautiful creatures, reflecting human loyalty, love, generosity, justice and willingness. The virtue of helping others. In the past three centuries, readers who read Pu Songling's works have already regarded these characters as "fox spirits" rather than "fox spirits".

Ma Ruifang, a Chinese scholar and expert professor, devoted himself to the study of Strange Tales of Liaozhai, and served as a host to interview professors from the University of Chicago. At that time, two professors who studied Pu Songling 'wsork expressed great surprises.

How did the 17th-century Chinese writer create the most famous story

about foxes in the story of

Heng Niang ”, the “ Ghost Mother, ” th

Story ”of the 500 most-known stories in the Chinese society that was deeply rooted in the feudal system at that time. The implicit suggestion

to his wife is that they should use women's tenderness to ensure that

their spouse's passion is permanent, just as lawyers rely on American newspapers and magazines in the 1980s to seek out opposite-sex friends.

The ideal world for women

The plot in “ HengNiang ”is a classic love of husband, wife and mistress. Heng Niang is a kind fox and is also a human wife. She has a neighbor called Hong Daye. Hong Dayi has one wife and one wife. The wife Zhu is far more beautiful than the little one, but she is only slightly older than her grandmother. However, to the surprise of Zhu, it is her husband Hong Kong that loves her. In the same way, Heng Niang 's

husband also has a small sister, who is obviously younger and more beautiful than Heng Niang, but he still loves her wife deeply. When Zhu asked Hengniang why she was like this, Hengniang told her that it was human nature to abandon old things, pursue new things, craving for something that was not available and full of mysteries. At Hengniang's suggestion, Zhu will take a lenient and generous attitude towards her husband and sister-in-law over the next month, allowing them to spend days and nights together. Heng Niang also suggestedthat Chu should change her appearance. In the next month, try not to dress up, wear old clothes, and keep yourself busy with housework. But on the last day of the month, she will put on new clothes, new shoes, design a beautiful hairstyle, and dress herself up. Just as Heng Niang had expected, the light of love returned to the eyes of Hong Daye. When he saw Zhu, and before dusk came, he would knock Zhu's door. However, Zhu still complied with

Hengniang's suggestion, using fatigue as an excuse to gently but firmly rejected him. The next day, she followed the same strategy. On the third day, the sun had not yet landed, and the great cause slipped into her room and waited for darkness. That evening, the couple had spent the happiest night since their wedding. Afterwards, when the great cause asked her if he could spend the evening with her, Zhu expressed opposition and told him that he must wait another three days before allowing him to enter the house again.

Zhu is pleased to tell Hengnian that she has regained her great business success. Heng Niang told Zhu to continue to use the female tricks she taught her becausealthough Zhu is very beautiful, she lacks femininity, so her husband 'psassion is being revived and can only be short-lived. Heng Niang explained that charm includes a woman's lifestyle, various behaviors, such as the way she walks, the way she speaks, and even

her husband's eyes. Heng Niang instructs Zhu on all proper female habits and tells her to practise herself in front of the mirror every day. In this case, of course, Zhu eventually won back the husband's loyal love. The charisma mentioned by Heng Niang was defined by the

famous writer and poet Luo Binwang of the Tang Dynasty (618-907) as

The Charm of Fox ” 1,000 years ago. He created this

wogradvaenidt its

hidden meaning in a prose about Empress Wu Zetian who convicted him.

In any case, the Queen should feel honored, not provoked by this

allusio

n.

Another story about

fox in “ GhostStallion -”Jiaona. This story

praises the sincere friendship and love between man and fox. When a

young scholar, Kong Xueyu, became seriously ill, his friend, a fox,

advised him to let his sister Jiaona cure him. A young woman whose

image and way of doing things is like the grace of a willow, full of

tendernessand dazzling wisdom, appearing around him. Jiao Na did a

surgical operation for Conson and fed an elixir of elixir into his mouth.

This medicine was depleted of her life energy and carefully cultivated.

When Confucius resumed consciousness, he fell in love with the

gentleness, quietness, beauty, and love of this young woman. Therefore,

Confucius requested Jiao Na' sbrother to marry her. However, because

Jiaona was too young to marry, her family made her than her big sister

Song Niang instead of her. Matsugami was as beautiful and kind as

Jiaona, and the couple had lived a happy and

happy life.

A few years later, Kong's friend, fox cousin, told him

that there was

a thunderstorm that would come to their home and that they would all be

destroyed unless Kong Sheng could rescue them. In spite of his own

safety, Kong Xueyi immediately responded to his request. On that stormy night, Kong Shou held a sword and guarded the entrance to the cave where the fox family lived. Suddenly, a black whirlwind circled out of the hole and Jiaona was in the center of the hurricane. Confucius used his sword to make every effort to insert the black wind. In the end, Jiaona fell to the ground and was saved. As Kong' shelp to her, Kong Sheng was attacked by lightning. Afterwards, the storm slowed down and the skies returned clear. The fox family was safe, but Conson was in danger. Jiao

Na sacrificed the last elixir of life that had been made with a thousand years of practice and spit it in his long-lived mouth and once again saved him. With Persian's insistence, the fox family moved to live with him. In order to avoid more disasters, the fox family lived in seclusion in a

quiet courtyard. The gate of the courtyard was only open to Kong Sheng and Song Niang. Several years later, Kong Sheng and Song Niang ' s children

grew up, and he became a grey-haired old man. He maintained close friendship with the fox cousin and the married Jiaona and their family.

Xiao Cui is another lovely fox story. Xiaocui is a very cute and

lively fox, but her appearance is a pretty young lady. One day, her mother took her to the house of a surnamed family to steal. She seemed to want to abandon her daughter. The Wang family is a local family with a face, only one child, and it is a mentally retarded person. He was neither a playmate nor a man willing to marry him, but Xiao Tsui made a good friend with him and married him. Although Wang Jia first liked Xiao Cui, her unruly manner aroused their resentment. They often scolded and reprimanded her, but Xiao Cui quietly accepted this treatment. When

Wang Wang was framed by his political opponents, Xiao Cui used her wisdom to save the whole family in dire straits. Moreover, she also cured her husband's mental illness. However, Xiaocui knew that her parents-in-law could never accept her rebellious attitude toward the feudal system at

that time. She inadvertently discovered that a young woman looked like her and secretly arranged for her to replace him at the king ' s house.

Before secretly leaving, Xiao Cui admitted to her husband that she was actually a fox daughter. Several decadesago, her mother escaped the thunder robbery under Wang's robe. At that time, Wang was sheltering in a

temple. Although Master Wang did not realize that he had given the fox mother help, she felt grateful for the reward she had at that time. It is for this reason that she left Xiaocui in her care.

Evil fox

Rumors are often used to describe foxes. However, such clever and beautiful creatures are often described in ambiguity and humility. There

is such an example in the rumors of "tiger tigers." This is an allegory of swindlers and rogues. It means that they will bend others to boast of

their powerful power. Its origin was a story about the king of the Chu state two thousand years ago. The king asked his minister: "There are rumors that the northern princes are afraid of the Chu Ling Yin Zhao shirt. Is that really it?" His minister answered the king's question through a parable:

The king of the forest tigers eat a When it just captured the fox, the fox told it: "You can't eat me because I have God's instructions and let me be the leader of the beast. If you don't believe me, then go with me through the forest and see if There are other animals that dare to block my path."

The tiger agreed. Sure enough, all the animals fled far when they were close. The tiger does not understand that animals are afraid of it, not foxes, that they dare not eat foxes.

Minister Jiang Yi continued to point out that the king 'tesrritories

cover an area of 2,500 square kilometers, and the military power has reached a million people. All of them are under the command of the

Shojo shirt. The northern princes are undoubtedly afraid of the zhao yi shirts, but his position is as the king 'msilitary power's controller and supreme imperial power. Jiang Yi warned that if the king is forced, his advantage will be weakened. Then the king gradually diluted Zhao's

military power.

The scolded fox

She is the leading actress in the "God List" and is a typical example

of the evil fox. This Ming Dynasty literary work is about the story of the demise of the Shang Dynasty and the rise of the Zhou Dynasty. Yu Wang is the last monarch of Shang Dynasty and also a notorious tyrant. In the common people, he levies exorbitant taxes and exorbitant taxes to build a luxury palace for himself and live a life of levity. During his reign, the 600-year-old Shang Dynasty quickly disintegrated. The warfare of the embarrassment caused the people to lose their livelihoods and make the

rule of the monarchy chaotic. In the "God List", the scorpion's nephew has been described as the culprit of the demise of the Shang Dynasty.

She was a fox and she became beautiful. The image of the woman was sent to the palace to envy the king and overthrow the Shang Dynasty.

Her reward is immortal.

The king of Yu is very carelessabout the national affairs. He has given everything to his uncle. Bichon discovered his true face and urged the king to get rid of her, but it was useless. Not only that, but the king also was very angry with his uncle's reckless behavior and ordered the expulsion of Began. Having realized that the threat to her was greater than that of Gan Qi, he formulated a plan to kill the enemy. She pretended to be sick, and she deluded another king with a beauty, telling him that unless she had a heart to eat, she would die. Bichon was thus killed, but the evil of self-absorbednesssurpassedthat of her enemies. She was addicted to the love of unborn babies, and even encouraged the king to indulge in the gorgeous life of wine. All these have accelerated the demise of the Shang dynasty.

She was eventually arrested and sentenced to death, but all executioners who were sent to execute the order were smitten by her charms and could not execute the order. After a few skilled butchers failed to perform their duties, a magical general ended his own life with his own hands.

One of the main reasons for this novel is to explain why women's charisma is often equated with the evil fox, and why calling a woman fox

is often regarded as an insult.

Although there are all kinds of negative foxes, fox skin has always

中英文文献翻译

毕业设计(论文)外文参考文献及译文 英文题目Component-based Safety Computer of Railway Signal Interlocking System 中文题目模块化安全铁路信号计算机联锁系统 学院自动化与电气工程学院 专业自动控制 姓名葛彦宁 学号 200808746 指导教师贺清 2012年5月30日

Component-based Safety Computer of Railway Signal Interlocking System 1 Introduction Signal Interlocking System is the critical equipment which can guarantee traffic safety and enhance operational efficiency in railway transportation. For a long time, the core control computer adopts in interlocking system is the special customized high-grade safety computer, for example, the SIMIS of Siemens, the EI32 of Nippon Signal, and so on. Along with the rapid development of electronic technology, the customized safety computer is facing severe challenges, for instance, the high development costs, poor usability, weak expansibility and slow technology update. To overcome the flaws of the high-grade special customized computer, the U.S. Department of Defense has put forward the concept:we should adopt commercial standards to replace military norms and standards for meeting consumers’demand [1]. In the meantime, there are several explorations and practices about adopting open system architecture in avionics. The United Stated and Europe have do much research about utilizing cost-effective fault-tolerant computer to replace the dedicated computer in aerospace and other safety-critical fields. In recent years, it is gradually becoming a new trend that the utilization of standardized components in aerospace, industry, transportation and other safety-critical fields. 2 Railways signal interlocking system 2.1 Functions of signal interlocking system The basic function of signal interlocking system is to protect train safety by controlling signal equipments, such as switch points, signals and track units in a station, and it handles routes via a certain interlocking regulation. Since the birth of the railway transportation, signal interlocking system has gone through manual signal, mechanical signal, relay-based interlocking, and the modern computer-based Interlocking System. 2.2 Architecture of signal interlocking system Generally, the Interlocking System has a hierarchical structure. According to the function of equipments, the system can be divided to the function of equipments; the system

文献翻译英文原文

https://www.360docs.net/doc/4e2762844.html,/finance/company/consumer.html Consumer finance company The consumer finance division of the SG group of France has become highly active within India. They plan to offer finance for vehicles and two-wheelers to consumers, aiming to provide close to Rs. 400 billion in India in the next few years of its operations. The SG group is also dealing in stock broking, asset management, investment banking, private banking, information technology and business processing. SG group has ventured into the rapidly growing consumer credit market in India, and have plans to construct a headquarters at Kolkata. The AIG Group has been approved by the RBI to set up a non-banking finance company (NBFC). AIG seeks to introduce its consumer finance and asset management businesses in India. AIG Capital India plans to emphasize credit cards, mortgage financing, consumer durable financing and personal loans. Leading Indian and international concerns like the HSBC, Deutsche Bank, Goldman Sachs, Barclays and HDFC Bank are also waiting to be approved by the Reserve Bank of India to initiate similar operations. AIG is presently involved in insurance and financial services in more than one hundred countries. The affiliates of the AIG Group also provide retirement and asset management services all over the world. Many international companies have been looking at NBFC business because of the growing consumer finance market. Unlike foreign banks, there are no strictures on branch openings for the NBFCs. GE Consumer Finance is a section of General Electric. It is responsible for looking after the retail finance operations. GE Consumer Finance also governs the GE Capital Asia. Outside the United States, GE Consumer Finance performs its operations under the GE Money brand. GE Consumer Finance currently offers financial services in more than fifty countries. The company deals in credit cards, personal finance, mortgages and automobile solutions. It has a client base of more than 118 million customers throughout the world

计算机专业外文文献及翻译

微软Visual Studio 1微软Visual Studio Visual Studio 是微软公司推出的开发环境,Visual Studio可以用来创建Windows平台下的Windows应用程序和网络应用程序,也可以用来创建网络服务、智能设备应用程序和Office 插件。Visual Studio是一个来自微软的集成开发环境IDE,它可以用来开发由微软视窗,视窗手机,Windows CE、.NET框架、.NET精简框架和微软的Silverlight支持的控制台和图形用户界面的应用程序以及Windows窗体应用程序,网站,Web应用程序和网络服务中的本地代码连同托管代码。 Visual Studio包含一个由智能感知和代码重构支持的代码编辑器。集成的调试工作既作为一个源代码级调试器又可以作为一台机器级调试器。其他内置工具包括一个窗体设计的GUI应用程序,网页设计师,类设计师,数据库架构设计师。它有几乎各个层面的插件增强功能,包括增加对支持源代码控制系统(如Subversion和Visual SourceSafe)并添加新的工具集设计和可视化编辑器,如特定于域的语言或用于其他方面的软件开发生命周期的工具(例如Team Foundation Server的客户端:团队资源管理器)。 Visual Studio支持不同的编程语言的服务方式的语言,它允许代码编辑器和调试器(在不同程度上)支持几乎所有的编程语言,提供了一个语言特定服务的存在。内置的语言中包括C/C + +中(通过Visual C++),https://www.360docs.net/doc/4e2762844.html,(通过Visual https://www.360docs.net/doc/4e2762844.html,),C#中(通过Visual C#)和F#(作为Visual Studio 2010),为支持其他语言,如M,Python,和Ruby等,可通过安装单独的语言服务。它也支持的 XML/XSLT,HTML/XHTML ,JavaScript和CSS.为特定用户提供服务的Visual Studio也是存在的:微软Visual Basic,Visual J#、Visual C#和Visual C++。 微软提供了“直通车”的Visual Studio 2010组件的Visual Basic和Visual C#和Visual C + +,和Visual Web Developer版本,不需任何费用。Visual Studio 2010、2008年和2005专业版,以及Visual Studio 2005的特定语言版本(Visual Basic、C++、C#、J#),通过微软的下载DreamSpark计划,对学生免费。 2架构 Visual Studio不支持任何编程语言,解决方案或工具本质。相反,它允许插入各种功能。特定的功能是作为一个VS压缩包的代码。安装时,这个功能可以从服务器得到。IDE提供三项服务:SVsSolution,它提供了能够列举的项目和解决方案; SVsUIShell,它提供了窗口和用户界面功能(包括标签,工具栏和工具窗口)和SVsShell,它处理VS压缩包的注册。此外,IDE还可以负责协调和服务之间实现通信。所有的编辑器,设计器,项目类型和其他工具都是VS压缩包存在。Visual Studio 使用COM访问VSPackage。在Visual Studio SDK中还包括了管理软件包框架(MPF),这是一套管理的允许在写的CLI兼容的语言的任何围绕COM的接口。然而,MPF并不提供所有的Visual Studio COM 功能。

新技术云计算外文文献

云计算——新兴的计算技术 摘要:云计算是涉及通过互联网提供托管服务的总称。这些服务大致分为三类:基础设施即服务(IaaS)、平台即服务(PaaS)和软件即服务(SaaS)。云计算这个名字的灵感来自于云符号经常用来代表在互联网上流程图和图表。这是在继主机计算、个人电脑计算、客户端服务器计算和Web计算之后的第五代计算技术。本文将围绕云计算进行讨论。 关键词:云计算,IaaS(基础设施即服务),PaaS的(平台即服务),SaaS(软件即服务) 1引言 云服务有三个鲜明的特点区别于传统的主机服务模式,它们分别是:云服务的出售通常按分钟或小时收取费用;云服务是有弹性的,一个用户可以在不同的时间拥有可多可少的服务;云服务完全由供应商托管(消费者只需要通过个人电脑和互联网就可以使用)。虚拟化的重大创新、分布式计算的发展,以及高速互联网的建设和经济的衰落,都加速了对云计算的兴趣。 云可以是私有的或公有的。公有云向互联网上的任何人销售(目前,亚马逊的网络服务是最大的公有云服务提供商)。私有云是一个专有网络或数据中心,向一部分人提供托管服务。当服务提供商使用公有云资源来创建自己的私有云,这样的结果被称为虚拟化的私有云。私有云或公共云的云计算目标是提供方便的、可扩展的计算资源和IT服务[1]。 2云计算的优势 云计算具有的优势是什么? (a)最小化的资本开支 (b)位置和设备独立性 答案:供应商的视角:申请厂商更容易吸引新客户。 (a)提供最低成本的方法和配套应用; (b)能够使用商品服务器和存储硬件; 3云计算的障碍 从客户的视角来看,云计算的障碍有: (a)数据安全; (b)很多客户不希望他们的数据迁移到可以信任的“云”上; (c)数据必须进行本地保留; (d)延迟; (e)云可以走多少毫秒; (f)不是实时应用的理想选择; (g)应用程序可用性; (h)无法通过现有的传统应用进行切换; (i)等效的云应用不存在; 总结,并非所有的应用程序都要工作在公共云之上。

J2EE开发框架外文翻译文献

中英文资料外文翻译文献 J2EE开发框架 Java2企业版为中间件领域思想的统一上发挥了很大的作用。比如,J2EE为分布式事务管理、目录服务和消息服务提供了一套标准的编程接口。J2EE的基础——Java2标准版(J2SE) ,成功地为Java提供了一套访问关系数据库的标准。 但是,就像本文中“J2EE缺乏对编程的支持”提到的一样,J2EE这个平台没有能够提供一个令人满意的应用程序编程模型。Sun公司和一些大的应用服务器供应商都想用开发工具来降低J2EE开发的复杂性,但是这些工具没有其他的JA V A 开发工具优秀,后者有先进的重构工具,和.NET平台相比,J2EE的工具支持显得很逊色。 很多J2EE开发工具自动产生的代码像这些工具本身同样复杂。在开源社区很多小型J2EE开发者选择了另外一种开发方式——一些可以降低J2EE开发难度的开发框架,较为流行的比如:Struts, Hibernate, 和Spring Framework,他们当今很多J2EE项目种扮演着重要角色。 为什么要采用框架? 框架是一由一些类组成,正式这些类为应用程序提供了一个可重用的设计――或者我们经常提到的——应用程序种的一层。应用程序代码访问类库从而执行任务,而框架是调用应用程序代码,从而管理程序的流程。这就是经常说道的好莱坞原则:“不要试图联系我们,我们到时候自会通知你。”开发者写的程序在运行时由框架调用。 设计一个在各种未知背景下都可以使用的框架是很有挑战性的。框架很适合在复杂的J2EE开发中使用,它可以为开发者提供一个简单易用的模型。采用一个经过良好设计的开源框架有很多好处:

1、在好的框架下,开发者只需要写一些必须的代码;他们不需要直接接触底层的API。这一点很重要。 2、经过良好设计的框架可以为程序提供清晰的结构并且提高程序的内聚性。好清晰的结构使得其他人可以更容易加入项目。 3、一个容易使用的框架可以通过一些例子和文档为用户提供最佳实践。 4、采用成功的框架的代码比自己的代码容易测试 5、框架只有提供了一些值得使用的功能才会变得流行。J2EE工程只有真正需要框架的时候才会用它,而自己的框架并不是这样,后者是处于统治地位的。 J2EE本身也提供了一些框架。比如,Enterprise Java-Beans (EJB) container 或者Servlet engine,二者都运用了“ 采用了好莱坞原则”这个思想,并采用运行时调用来管理对象。像Struts这些开源web应用框架正式建立在这两个框架的基础上的,本文讨论的重点也是像Struts这样建立在J2EE上的框架,他们为开发者提供了更为简单的模型,和其他的一些好处。 开源框架的出现 很多大型的J2EE项目都用自己的内部框架来隐藏平台的复杂性,直到最近人们才逐渐发现一些在很多项目中都存在的共有的难题,这些难题都可以由一个较为统一的解决方案来解决。而有的框架正好可以充当这些问题的解决方案。现在有种很明显的趋势:与从前的内部框架相比,这些框架将成为这些难题的更加“标准化”的解决方案。 J2EE平台的日益成熟是这些框架流行的一个原因。开发者知道有些地方是J2EE的标准API无能为力的,倚他们的经验来看,要弥补这个缺陷是很困难的。于此同时,一些优秀的开源框架可供使用,它们提供了极为丰富的技术文档,在它们背后还有一个专业的团队做支持,并且一切都是免费的。 Struts 在web应用程序产生的那时就有了开源框架。在1999-2000年,开发者们意识到JSP“Model1”的缺陷,JSP中充斥着请求处理代码和静态数据模板,这意味着你不得不把业务逻辑和复杂的HTML以及其他的标签混到一起。那个时候

英文文献翻译

中等分辨率制备分离的 快速色谱技术 W. Clark Still,* Michael K a h n , and Abhijit Mitra Departm(7nt o/ Chemistry, Columbia Uniuersity,1Veu York, Neu; York 10027 ReceiLied January 26, 1978 我们希望找到一种简单的吸附色谱技术用于有机化合物的常规净化。这种技术是适于传统的有机物大规模制备分离,该技术需使用长柱色谱法。尽管这种技术得到的效果非常好,但是其需要消耗大量的时间,并且由于频带拖尾经常出现低复原率。当分离的样本剂量大于1或者2g时,这些问题显得更加突出。近年来,几种制备系统已经进行了改进,能将分离时间减少到1-3h,并允许各成分的分辨率ΔR f≥(使用薄层色谱分析进行分析)。在这些方法中,在我们的实验室中,媒介压力色谱法1和短柱色谱法2是最成功的。最近,我们发现一种可以将分离速度大幅度提升的技术,可用于反应产物的常规提纯,我们将这种技术称为急骤色谱法。虽然这种技术的分辨率只是中等(ΔR f≥),而且构建这个系统花费非常低,并且能在10-15min内分离重量在的样本。4 急骤色谱法是以空气压力驱动的混合介质压力以及短柱色谱法为基础,专门针对快速分离,介质压力以及短柱色谱已经进行了优化。优化实验是在一组标准条件5下进行的,优化实验使用苯甲醇作为样本,放在一个20mm*5in.的硅胶柱60内,使用Tracor 970紫外检测器监测圆柱的输出。分辨率通过持续时间(r)和峰宽(w,w/2)的比率进行测定的(Figure 1),结果如图2-4所示,图2-4分别放映分辨率随着硅胶颗粒大小、洗脱液流速和样本大小的变化。

数据库外文参考文献及翻译.

数据库外文参考文献及翻译 数据库外文参考文献及翻译数据库管理系统——实施数据完整性一个数据库,只有用户对它特别有信心的时候。这就是为什么服务器必须实施数据完整性规则和商业政策的原因。执行SQL Server的数据完整性的数据库本身,保证了复杂的业务政策得以遵循,以及强制性数据元素之间的关系得到遵守。因为SQL Server的客户机/服务器体系结构允许你使用各种不同的前端应用程序去操纵和从服务器上呈现同样的数据,这把一切必要的完整性约束,安全权限,业务规则编码成每个应用,是非常繁琐的。如果企业的所有政策都在前端应用程序中被编码,那么各种应用程序都将随着每一次业务的政策的改变而改变。即使您试图把业务规则编码为每个客户端应用程序,其应用程序失常的危险性也将依然存在。大多数应用程序都是不能完全信任的,只有当服务器可以作为最后仲裁者,并且服务器不能为一个很差的书面或恶意程序去破坏其完整性而提供一个后门。SQL Server使用了先进的数据完整性功能,如存储过程,声明引用完整性(DRI),数据类型,限制,规则,默认和触发器来执行数据的完整性。所有这些功能在数据库里都有各自的用途;通过这些完整性功能的结合,可以实现您的数据库的灵活性和易于管理,而且还安全。声明数据完整性声明数据完整原文请找腾讯3249114六,维-论'文.网 https://www.360docs.net/doc/4e2762844.html, 定义一个表时指定构成的主键的列。这就是所谓的主键约束。SQL Server使用主键约束以保证所有值的唯一性在指定的列从未侵犯。通过确保这个表有一个主键来实现这个表的实体完整性。有时,在一个表中一个以上的列(或列的组合)可以唯一标志一行,例如,雇员表可能有员工编号( emp_id )列和社会安全号码( soc_sec_num )列,两者的值都被认为是唯一的。这种列经常被称为替代键或候选键。这些项也必须是唯一的。虽然一个表只能有一个主键,但是它可以有多个候选键。 SQL Server的支持多个候选键概念进入唯一性约束。当一列或列的组合被声明是唯一的, SQL Server 会阻止任何行因为违反这个唯一性而进行的添加或更新操作。在没有故指的或者合适的键存在时,指定一个任意的唯一的数字作为主键,往往是最有效的。例如,企业普遍使用的客户号码或账户号码作为唯一识别码或主键。通过允许一个表中的一个列拥有身份属性,SQL Server可以更容易有效地产生唯一数字。您使用的身份属性可以确保每个列中的值是唯一的,并且值将从你指定的起点开始,以你指定的数量进行递增(或递减)。(拥有特定属性的列通常也有一个主键或唯一约束,但这不是必需的。)第二种类型的数据完整性是参照完整性。 SQL Server实现了表和外键约束之间的逻辑关系。外键是一个表中的列或列的组合,连接着另一个表的主键(或着也可能是替代键)。这两个表之间的逻辑关系是关系模型的基础;参照完整性意味着这种关系是从来没有被违反的。例如,一个包括出版商表和标题表的简单的select例子。在标题表中,列title_id (标题编号)是主键。在出版商表,列pub_id (出版者ID )是主键。 titles表还包括一个pub_id列,这不是主键,因为出版商可以发布多个标题。相反, pub_id是一个外键,它对应着出版商表的主键。如果你在定义表的时候声明了这个关系, SQL Server由双方执行它。首先,它确保标题不能进入titles表,或在titles表中现有的pub_id无法被修改,除非有效的出版商ID作为新pub_id出现在出版商表中。其次,它确保在不考虑titles表中对应值的情况下,出版商表中的pub_id的值不做任何改变。以下两种方法可

最新云计算中侧信道攻击的防御-毕业论文外文翻译整理

附录一英文文献 Security against Side Channel Attack in Cloud Computing Bhrugu Sevak Abstract--Cloud computing is a word that delivering hosted service over the internet. Cloud computing has been ideate as the next generation architecture of IT enterprise ecause of it’s provides ubiquitous network, cost reducing, flexibility and scalability to users. Now days with the fast growing of cloud computing technology introduces new more vulnerabilities so security is considered to be one of the most critical aspect in clod computing environment due to the confidential and important information stored in the cloud. As per AMAZONE EC2 service case study it is possible to identify the particular target VM(virtual machine) in internal cloud infrastructure and then placed new VM with targeted VM and extract confidential information from targeted VM on same physical machine called as simple side channel attack. This paper introduces how to avert the side channel attack in cloud computing. This is accomplished by using combination of Virtual firewall appliance and randomly encryption decryption (using concept of confusion diffusion) and provide RAS (Reliability, Availability, and Security) of client’s data or information. Keywords--Cloud computing, side channel attack, Amazon EC2 service case study, virtual firewall appliance, randomly encryption decryption. I. INTRODUCTION Cloud computing is a word that delivering hosted service over the internet.

外文文献及翻译

文献翻译 原文 Combining JSP and Servlets The technology of JSP and Servlet is the most important technology which use Java technology to exploit request of server, and it is also the standard which exploit business application .Java developers prefer to use it for a variety of reasons, one of which is already familiar with the Java language for the development of this technology are easy to learn Java to the other is "a preparation, run everywhere" to bring the concept of Web applications, To achieve a "one-prepared everywhere realized." And more importantly, if followed some of the principles of good design, it can be said of separating and content to create high-quality, reusable, easy to maintain and modify the application. For example, if the document in HTML embedded Java code too much (script), will lead the developed application is extremely complex, difficult to read, it is not easy reuse, but also for future maintenance and modification will also cause difficulties. In fact, CSDN the JSP / Servlet forum, can often see some questions, the code is very long, can logic is not very clear, a large number of HTML and Java code mixed together. This is the random development of the defects. Early dynamic pages mainly CGI (Common Gateway Interface, public Gateway Interface) technology, you can use different languages of the CGI programs, such as VB, C / C + + or Delphi, and so on. Though the technology of CGI is developed and powerful, because of difficulties in programming, and low efficiency, modify complex shortcomings, it is gradually being replaced by the trend. Of all the new technology, JSP / Servlet with more efficient and easy to program, more powerful, more secure and has a good portability, they have been many people believe that the future is the most dynamic site of the future development of technology. Similar to CGI, Servlet support request / response model. When a customer submit a request to the server, the server presented the request Servlet, Servlet responsible for handling requests and generate a response, and then gave the server, and then from the server sent to

英文文献及中文翻译

毕业设计说明书 英文文献及中文翻译 学院:专 2011年6月 电子与计算机科学技术软件工程

https://www.360docs.net/doc/4e2762844.html, Overview https://www.360docs.net/doc/4e2762844.html, is a unified Web development model that includes the services necessary for you to build enterprise-class Web applications with a minimum of https://www.360docs.net/doc/4e2762844.html, is part of https://www.360docs.net/doc/4e2762844.html, Framework,and when coding https://www.360docs.net/doc/4e2762844.html, applications you have access to classes in https://www.360docs.net/doc/4e2762844.html, Framework.You can code your applications in any language compatible with the common language runtime(CLR), including Microsoft Visual Basic and C#.These languages enable you to develop https://www.360docs.net/doc/4e2762844.html, applications that benefit from the common language runtime,type safety, inheritance,and so on. If you want to try https://www.360docs.net/doc/4e2762844.html,,you can install Visual Web Developer Express using the Microsoft Web Platform Installer,which is a free tool that makes it simple to download,install,and service components of the Microsoft Web Platform.These components include Visual Web Developer Express,Internet Information Services (IIS),SQL Server Express,and https://www.360docs.net/doc/4e2762844.html, Framework.All of these are tools that you use to create https://www.360docs.net/doc/4e2762844.html, Web applications.You can also use the Microsoft Web Platform Installer to install open-source https://www.360docs.net/doc/4e2762844.html, and PHP Web applications. Visual Web Developer Visual Web Developer is a full-featured development environment for creating https://www.360docs.net/doc/4e2762844.html, Web applications.Visual Web Developer provides an ideal environment in which to build Web sites and then publish them to a hosting https://www.360docs.net/doc/4e2762844.html,ing the development tools in Visual Web Developer,you can develop https://www.360docs.net/doc/4e2762844.html, Web pages on your own computer.Visual Web Developer includes a local Web server that provides all the features you need to test and debug https://www.360docs.net/doc/4e2762844.html, Web pages,without requiring Internet Information Services(IIS)to be installed. Visual Web Developer provides an ideal environment in which to build Web sites and then publish them to a hosting https://www.360docs.net/doc/4e2762844.html,ing the development tools in Visual Web Developer,you can develop https://www.360docs.net/doc/4e2762844.html, Web pages on your own computer.

仪表板外文文献翻译、中英文翻译、外文翻译

Dashboard From Wikipedia, the free encyclopedia This article is about a control panel placed in the front of the car. For other uses, see Dashboard (disambiguation). The dashboard of a Bentley Continental GTC car A dashboard (also called dash, instrument panel (IP), or fascia) is a control panel located directly ahead of a vehicle's driver, displaying instrumentation and controls for the vehicle's operation. Contents 1.Etymology 2.Dashboard features 3.Padding and safety 4.Fashion in instrumentation 5.See also 6.References Etymology Horse-drawn carriage dashboard Originally, the word dashboard applied to a barrier of wood or leather fixed at the front of a horse-drawn carriage or sleigh to protect the driver from mud or other debris "dashed up" (thrown up) by the horses' hooves.[1] Commonly these boards did not perform any additional function other than providing a convenient handhold for ascending into the driver's seat, or a small clip with which to secure the reins when not in use. When the first "horseless carriages" were constructed in the late 19th century, with engines mounted beneath the driver such as the Daimler Stahlradwagen, the simple dashboard was retained to protect occupants from debris thrown up by the cars' front wheels. However, as car design evolved to position the motor in front of the driver, the dashboard became a panel that protected vehicle occupants from the heat and oil of the engine. With gradually increasing mechanical complexity, this panel formed a convenient location for the placement of gauges and minor controls, and from this evolved the modern instrument panel,

建筑外文文献及翻译

外文原文 , , ,610031 ’s . a . a . , a . —, , ’s ’s . 1. , . , , ’s ’ [1] , . [1] a () , [2] . [3,4] [5] () , ’s , [6]. [7] ’s . , ’s ’s a . 2.’S . , . ’s ’s , ’s . , (1). (…) (1) w ’s ; I ; c , ; s , . 3. 3.1 , . , a , ’s . , a , ’s , . , ’s ’s . 3.2 a : (1)N. 1,2, … N.

(2) w 12… . (3) R 1,2, … (4) Δ ? ? ?others toprojectQ rcer humanresou i k 01 (5) . I t I t . (6) △ I ’s a .( ’t .) (7) (5) t I △ ,( △ ). , – a . (8) (6) (7), I ( = △* △ ). (9) =ηi / * , ηi I ; * I , * =∑=R k ki 1 δ . , . , , . 3.3 , , : = ∑∑==N i i N i Ci 11 ω i i N i i N i c t ??∑∑==1 1 ω (2) ∑∑ ==N i i N i 1 1 ω ) E i R i ki i t - ?? ∑=1 δη i c ? 2F Z 2()i t ? ) E i R i ki i t - ??∑=1 δη (3) () ,(N j i K 3,2,1,=?) (4)

相关文档
最新文档