计算机外文翻译

计算机外文翻译
计算机外文翻译

MySQL和JSP的Web应用程序JSP开发人员构建Web应用程序时遇到需要强大的数据库连接的特殊问题。MySQL和JSP的Web应用程序解决了构建数据驱动的应用程序JavaServer页面上的发展模式为基础的挑战。 MySQL和JSP的Web应用程序开始一个对JSP数据库开发 - JavaServer页面,JDBC和数据库模式所需的核心技术概述。该书然后概述并提出了互联网商业应用演示,如接收和处理用户输入,设计和实施业务规则,并平衡服务器上的用户负载的概念。通过JDBC(Java数据库连接),开发人员能够与大多数商业数据库如Oracle进行沟通。在MySQL和JSP的Web应用中心提交了一份关于开源工具MySQL和Tomcat的解决方案,使读者一个经济实惠的方式来测试书中的例子的应用程序和试验。

那么JSP是怎么一回事呢?

如果您符合上述要求的,你对这个问题的答案应该已经有一个相当不错的理解。 JSP是所有关于做高度面向对象的网站,可以利用所有的现代软件工程最佳实践。这些做法包括诸如SQL数据库和基于UML设计的东西。这并不是说JSP 是万能的而且使用它会自动将您的网站上的工程艺术的典范。这只是尽可能地用其他任何技术用JSP设计不良网站。这就是为什么,当你详细检查文本的时候,你会看到如何合并最佳方法以及项目得到的压力时候如何避免方便的陷阱。JSP 它本身就是从第一个静态Web服务器开始的一个沿路径循序渐进的步骤,通过CGI移动功能的服务器,最后脚本功能的服务器的第一代。 JSP是一个比Java 引擎能够熟悉网页的的少了一个Java组件的Web服务器。

JSP是由Java servlet发展演变而来的。servlet允许开发人员处理传入使用Java程序能够访问的所有正常的信息,一个共同的网关接口(CGI)程序将Web请求。此外,该servlet可以访问会话持久对象。这是Java的都与一个特定的用户会话,可用于存储请求之间的状态对象。 Servlet编程是一个允许开发人员编写结构良好的模块化的Web应用程序使用面向对象语言的重要一步。它还解决了状态持久性的问题,用户和应用程序执行的一个动作或一系列动作期间让更多的信息驻留在服务器上而且较少的反复在用户和服务器之间传递。Servlet还遭受一大问题。因为他们最终需要输出HTML中,HTML编码必须被嵌入在servlet代码中。导致如下所示的一段代码片段:

Out.println("\n\nThank you for</p><p>Registering\n");

Out.println("");

当你编码很多网页时,这种嵌入式是非常古老非常快的。此外,必须避免所有引号会导致的很多混乱和如果你遗漏了一个反斜杠带来难以发现的错误。最终,一个较好的方法出现。假设你能结合最好的静态HTML页面和servlet的交互能力。其结果是JavaServer页面(在微软方面,结果是活动服务器页面)。JSP 是非常复杂强大的。在接下来的章节中,你会通过这个细节流程,但就目前而言,这里是主要的步骤:

1、接到请求时从使用普通的HTTP请求格式的浏览器。

2、WEB服务器切换到JSP的请求,JSP着眼于找到合适的JSP文件。

3、.jsp文件转换成.Java文件,包含Java代码,将创建一个类,它的名称是从.jsp的文件名而得。

4、JSP然后用javac编译.java文件产生一个.class文件。注意如果一个.class文件已经存在而且比.jsp文件新则可以跳过先前的两步。

5、一个新创建的类实例被实例化,并发送_jspService消息。

6、新的实例看看是否已经有一个被称为user的https://www.360docs.net/doc/d13371550.html,er对象实例在当前连接的用户会话对象的空间存在。如果没有,一个实例被实例化。

7、作为服务stuff.jsp的一部分,user实例将被GetUserName()方法调用。

8、如果JSP处理需要访问数据库中的信息,它将使用JDBC来进行连接和处理SQL请求。

正如你可以看到,巨大的能量是在现有的JSP世界里。开发者可以自由编写大多数看起来像HTML的Web页面,除非到Java标注是要求最喜欢看的HTML。但是,在同一时间,他们可以自由地充分发展充实面向对象的应用程序使用Java 会带来负担的所有功能。他们也得到servlet的所有优点,包括会话持久性。为什么我们需要的数据库?

好,一个原因就是为了让拉里埃里森想到比尔盖茨的时候,他的Oracle有能力保持自己百忧解。更严重的回答是相同的原因也就是驾驶人先按下针对一块湿粘泥:因为把事情记下来是好的。 Web服务器是了不起的创造,但他们是一个有点像白痴专家。请他们为一个网页或运行Java的一段,他们表演的像一个冠军。但开始要求他们记住他们五分钟前做了什么,和他们显露的比一个肥皂剧

里的人物失忆还快。

第一个也是最重要的原因是你使用的数据库是有大量的数据在电子商务交易里,你必须记住并跟踪:

?一个用户的姓名,地址,信用卡和其他信息以前进入了一个注册页面

?帽子的用户可能把以前留下交易放进购物车

?哪些物品有存货,以及它们的价格,描述等等

?订单需要履行,订单已发货,并已待补物品。

现在,你可以存储所有这些信息在服务器上的硬盘平面文件中,但也有你想保存的数据的其他重要属性:

?如果交易部分失败,您希望能够收回交易。

?您希望能够找到Web服务器安全的地方定位数据,这可能是完全在DMZ或外部的防火墙。

?您希望能够如用户数据或产品快速访问数据,即使有数千或上百万数据。

当你添加这些项目的购物清单,只有一个关系数据库才会真正的影响工作效率。

MySQL

许多网站不需要Oracle的历史优势(和价格标签)。 MySQL是一个开源SQL 数据库可供任何人使用,拥有许多(尽管不是全部)的先前数据库的功能,如Oracle。

MySQL是可用于几乎所有的电脑上有相当好的能力是相当轻量级的处理器,安装方便(10分钟,而不像Oracle需要多个小时)。

所以,也许你想知道,有什么收获?没有得到什么,你在MySQL中,使人们把目光转向到Oracle?那么,MySQL是一个不错的小程序包,但它缺少一些东西,不然会是不错的一个完美的世界。

一个主要特点就是MySQL不提供数据库一致性检查。您可以使用您的模式外键的标签,但MySQL会忽略它们。据我所知许多数据库管理员会认为这是一个很糟糕的事情。

外键约束防止你创建数据不一致。例如,假设你有一个像这样的数据库表:CREATE TABLE USER (

USERID INTEGER,

FIRST_NAME V ARCHAR(80),

LAST_NAME V ARCHAR(80));

CREATE TABLE PURCHASE (

USERID FOREIGN KEY USER(USERID),

ITEM INTEGER,

QUANTITY INTEGER);

在诸如Oracle的数据库里,如果你创建了一个在PURCHASE 表ID为3的用户输入数据库,在USER表里可能已经有一个ID为3的用户或错误会发生。同样,如果它在PURCHASE理是作为参考,你就不能从表USER里删除ID为3的用户,MySQL的人们做了一个漂亮慷慨激昂的论点关于在各自的文档进行数据的完整性取决于外键是无论如何都是一个坏主意,但是说服你的这种哲学的DBA是很可能沦为一个宗教辩论,

此外,其他一些功能缺失,如子查询和SELECT INTO。但可能是其他主要功

能,你会漏掉回滚/提交的功能。 MySQL不会执行回滚和为某些特殊类型的表提交,但他们并不全是。同样,MySQL的人提供他们自己的难题为什么MySQL是好的,但能够回滚事务是(在我看来)重要以确保您有可用。

回滚可以在开始做一系列交易之前在数据库设置一个保存点,并能要么回滚到原来的状态或提交在结束时候的改变。例如,当记录一次购买,你需要记录一个针对用户的帐户扣款,并输入到shipping表记录,让你知道后来ship的项目。比方说,第二部分失败。你不会要收取用户,但没有ship的项目。因此,你要回滚到事务开始之前的状态。

因此,MySQL不是一个成熟的数据库产品,至少,还不是。它对于世界上90% 的电子商务网仍然是相当好的,但是,4.0版本在撰写本文时最初的版本,解决了这些问题,包括行级锁定和事务控制数量。

把Tomcat和MySQL的结合

Tomcat和MySQL的结合为你用它来学习、开发和部署JSP应用程序提供了一个强大的、可靠的和免费的平台。而且,最好的是,您开发的代码将使用这个平台很好地运行使用iPlanet和Oracle或WebSphere和SQL Server。

作为一个学习工具,两者的结合几乎是“参考实现“他们(JSP和SQL)各自的协议。因此,当你熟悉了解项目的详细情况时,你不会接到任何恶劣的厂商专有的坏习惯。

此外,你可以享受你正在支持开源软件活动的知识。开放源码软件是根据多个公共许可证的编码,往往是GNU通用公共许可证(GPL)的人免费提供。

为什么支持这项活动是很好的?对于这个问题的答案有两点:一个是技术的和一个政治的。从技术上讲,这是一件好事,因为开源软件往往鼓励如JSP和JDBC开放标准的开发,让您从一个更大的群体里去选择你的工具,而不是被锁定成为一个厂商的专有解决方案。从政治上来说这是一个积极的事,因为它保持政治上的大公司的诚实。 WebLogic和iPlanet必须保持竞争力的和响应,因为他们知道,有一个免费的解决方案在那里,如果他们不这样。而当你使用开源软件,你发送一条消息,你的首要问题是他们的特点和可靠性,如果出现错误,没有一个大公司提起诉讼。

原文出处《MySQL and JSP Web applications》作者:James Turner

MySQL and JSP Web applications

JSP developers encounter unique problems when building web applications that require intense database connectivity. MySQL and JSP Web Applications addresses the challenges of building data-driven applications based on the JavaServer Pages development model. MySQL and JSP Web Applications begins with an overview of the core technologies required for JSP database development--JavaServer Pages, JDBC, and the database schema. The book then outlines and presents an Internet commerce application that demonstrates concepts such as receiving and processing user input, designing and implementing business rules, and balancing the user load on the server. Through the JDBC (Java DataBase Connector), the developer can communicate with most commercial databases, such as Oracle. The solutions presented in MySQL and JSP Web Applications center on the open source tools MySQL and Tomcat, allowing the reader an affordable way to test applications and experiment with the book's examples.

So What Is JSP All About?

If you meet the requirements mentioned, you should already have a pretty good idea what the answer to this question is. JSP is all about doing highly object-oriented Web sites that can leverage all the best practices of modern software engineering. These practices include things such as SQL databases and UML-based design. This isn't to say that JSP is a cure-all and that using it will automatically make your Web site a paragon of engineering art. It's just as possible to design bad Web sites in JSP as with any other technology. That's why, as you go through the text, you will see how to incorporate the best practices and how to avoid the pitfalls of convenience when projects get stressful. JSP itself is an evolutionary step along the path that started with the first static Web servers, moved through CGI-enabled servers, and finally the first generation of script-enabled servers. JSP is less a Web server with a Java component than it is a Java engine that understands the Web.

JSP grew out of Java servlets. Servlets allow the developer to handle the incoming Web requests using a Java program that has access to all the normal information that a Common Gateway Interface (CGI) program would. In addition, the servlet has access to session-persistent objects. These are Java objects that are associated with a specific user session and can be used to store state between requests. Servlet programming was a major step forward in allowing developers to write well-structured modular Web applications using an object-oriented language. It also solved the problem of state persistence, allowing more information to reside on the server during a transaction and less to have to pass back and forth between the user and the server. Servlets still suffered from one major problem. Because they eventually need to spit out HTML, the HTML coding had to be embedded in the servlet code. This led to code fragments like the one shown here:

Out.println("\n\nThank you for</p><p>Registering\n");

Out.println("");

This kind of embedding gets very old very fast when you have to code a lot of pages. In addition, having to escape all of the quotation marks can lead to a lot of confusing and hard-to-find errors if you leave out a backslash. Eventually, a still-better idea emerged. Suppose that you could combine the best of static HTML pages and with the interactive capabilities of servlets. The result was JavaServer Pages (on the Microsoft side, the result was Active Server Pages). As Figure I.1 shows, JSP is a complicated beast. In the next chapter, you'll walk through this flow in detail, but for the moment, here are the major steps:

1. A request comes in from a browser using the normal HTTP request format.

2. The Web server hands off the request to JSP. JSP looks at the filename and finds the appropriate JSP file.

3. The .jsp file is converted into a .java file, containing Java code that will create a class whose name is derived from the .jsp filename.

4. JSP then compiles the .java file using javac to produce a .class file. Note that the

two previous steps are skipped if a .class file already exists and is newer than the .jsp file.

5. An instance of the newly created class is instantiated and sent the _jspService message.

6. The new instance looks to see if there is already an instance of the https://www.360docs.net/doc/d13371550.html,er object called user existing in the session object space for the currently connected user. If not, one is instantiated.

7. As part of servicing stuff.jsp, the user instance is called with the getUserName() method.

8. If the JSP processing requires access to information in a database, it uses JDBC to make the connection and handle the SQL requests.

As you can see, a tremendous amount of power is available in the JSP world. Developers are free to write Web pages that look mostly like HTML, except where callouts to Java are required. But, at the same time, they are free to develop fully fleshed-out object-oriented applications using all the features that Java can bring to bear. They also get all the benefits of servlets, including session persistence.

Why Do We Need Databases?

Well, one reason is so that Larry Ellison of Oracle can afford to keep himself on Prozac when he thinks about Bill Gates. A more serious answer is the same reason that drove man to first press a stick against a piece of wet mud: because it's good to write things down. Web servers are marvelous creatures, but they're a bit like idiot savants. Ask them to serve a Web page or run a piece of Java, and they perform like a champ. But start asking them to remember what they did five minutes ago, and they develop amnesia faster than a character in a soap opera.

The first and most important reason that you use databases is that there's a lot in an e-commerce transaction that you need to remember and track:

?A user's name, address, credit card, and other in formation previously entered on

a registration page

?hat the user might have put into a shopping cart and left from a previous transaction

?What items are in stock, along with their price, description, and so on

?Orders that need to be fulfilled, orders that have been shipped, and items that have been backordered .

Now, you could store all this information in a flat file on the server's hard disk, but there are other important properties that you want to have for this data: ?You want to be able to back out a transaction if part of it fails.

?You want to be able to locate the data somewhere more secure than the Web server, which could be in a DMZ or outside the firewall altogether.

?You want to be able to access data such as user data or products quickl y, even if there are thousands or millions of them.

When you add these items to the shopping list, only a relational database will really do the job effectively.

MySQL

Many sites don't need the battleship strength (and price tag) of Oracle. MySQL is an open-source SQL database available for anyone to use, with many (although not all) of the features of its big brothers, such as Oracle.

MySQL is available for just about any computer that has decent power—it is fairly lightweight on the processor and easy to install (10 minutes, as opposed to multiple hours for Oracle).

So, perhaps you are wondering, what's the catch? What are you not getting in MySQL that makes people turn to Oracle? Well, MySQL is a neat little package, but it is missing some things that would be nice to have in a perfect world.

A major feature that MySQL does not offer is database consistency checking. You can use foreign key tags in your schema, but MySQL cheerfully ignores them. A lot of D

B As I know would consider this a very bad thing.

A foreign key constraint prevents you from creating inconsistent data. For

example, let's suppose that you had a scheme that looked like this:

CREATE TABLE USER (

USERID INTEGER,

FIRST_NAME V ARCHAR(80),

LAST_NAME V ARCHAR(80));

CREATE TABLE PURCHASE (

USERID FOREIGN KEY USER(USERID),

ITEM INTEGER,

QUANTITY INTEGER);

In a database such as Oracle's, if you created an entry in the PURCHASE table with a user ID of 3, there would have to already be a user ID of 3 in the USER table or an error would occur. Similarly, you couldn't delete user 3 from USER if it was referenced in PURCHASE.The MySQL folks make a pretty impassioned argument in their documentation that depending on foreign keys for data integrity is a bad idea anyway, but convincing your DBA of this philosophy is likely to degrade into a religious debate.

In addition, some other features are missing, such as subselects and select into. But probably the other major piece that you will miss is the rollback/commit functionality. MySQL does implement rollback and commit for certain types of tables, but not all of them. Again, the MySQL folks offer their own spin on why this is okay, but being able to roll back transactions is (in my opinion) important enough to make sure that you have it available.

Rollback allows you to set a savepoint on the database before starting to do a series of transactions with it, and be able to either roll back to the original state or commit the changes at the end. For example, when recording a purchase, you need to record a debit against the user's account and enter a record into the shipping table so that you'll know later to ship the item. Let's say that the second part fails. You wouldn't want to charge the user but not ship the item. Thus, you'd want to roll back to the state before the transaction began.

So, MySQL isn't a full-blown production database—at least, not yet. It's still good enough for probably 90% of the e-commerce sites in the world, however. And version 4.0, which is in alpha as of this writing, addresses a number of these concerns,

including row-level locking and transaction control.

Putting Tomcat and MySQL Together

Combining Tomcat and MySQL provides a powerful, reliable, and free platform that you can use to learn, develop, and deploy JSP applications. And, best of all, the code that you develop using this platform will run nicely using iPlanet and Oracle or WebSphere and SQL Server.

As a learning tool the two together are almost "reference implementations" of their respective protocols (JSP and SQL). As a result, you won't pick up any nasty vendor-proprietary bad habits while you're getting up to speed.

In addition, you can enjoy the knowledge that you are supporting the open-source software movement. Open-source software is code that is made freely available under one of several public licenses, frequently the GNU General Public License (GPL).

Why is it good to support this movement? There are two sides to this answer: one technical and one political. Technically, it's a good thing because open-source software tends to encourage the development of open standards such as JSP and JDBC, allowing you to choose your tools from among a larger group rather than being locked into one vendor's proprietary solution. It's a positive thing politically because it keeps the large companies honest. WebLogic and iPlanet have to stay competitive and responsive because they know that there's a free solution out there if they aren't. And when you use open-source software, you are sending a message that your overriding concerns are features and reliability, not having a large company to sue if something goes wrong.

计算机专业毕业设计说明书外文翻译(中英对照)

Talking about security loopholes Richard S. Kraus reference to the core network security business objective is to protect the sustainability of the system and data security, This two of the main threats come from the worm outbreaks, hacking attacks, denial of service attacks, Trojan horse. Worms, hacker attacks problems and loopholes closely linked to, if there is major security loopholes have emerged, the entire Internet will be faced with a major challenge. While traditional Trojan and little security loopholes, but recently many Trojan are clever use of the IE loophole let you browse the website at unknowingly were on the move. Security loopholes in the definition of a lot, I have here is a popular saying: can be used to stem the "thought" can not do, and are safety-related deficiencies. This shortcoming can be a matter of design, code realization of the problem. Different perspective of security loo phole s In the classification of a specific procedure is safe from the many loopholes in classification. 1. Classification from the user groups: ● Public loopholes in the software category. If the loopholes in Windows, IE loophole, and so on. ● specialized software loophole. If Oracle loopholes, Apach e,

计算机专业外文文献及翻译

微软Visual Studio 1微软Visual Studio Visual Studio 是微软公司推出的开发环境,Visual Studio可以用来创建Windows平台下的Windows应用程序和网络应用程序,也可以用来创建网络服务、智能设备应用程序和Office 插件。Visual Studio是一个来自微软的集成开发环境IDE,它可以用来开发由微软视窗,视窗手机,Windows CE、.NET框架、.NET精简框架和微软的Silverlight支持的控制台和图形用户界面的应用程序以及Windows窗体应用程序,网站,Web应用程序和网络服务中的本地代码连同托管代码。 Visual Studio包含一个由智能感知和代码重构支持的代码编辑器。集成的调试工作既作为一个源代码级调试器又可以作为一台机器级调试器。其他内置工具包括一个窗体设计的GUI应用程序,网页设计师,类设计师,数据库架构设计师。它有几乎各个层面的插件增强功能,包括增加对支持源代码控制系统(如Subversion和Visual SourceSafe)并添加新的工具集设计和可视化编辑器,如特定于域的语言或用于其他方面的软件开发生命周期的工具(例如Team Foundation Server的客户端:团队资源管理器)。 Visual Studio支持不同的编程语言的服务方式的语言,它允许代码编辑器和调试器(在不同程度上)支持几乎所有的编程语言,提供了一个语言特定服务的存在。内置的语言中包括C/C + +中(通过Visual C++),https://www.360docs.net/doc/d13371550.html,(通过Visual https://www.360docs.net/doc/d13371550.html,),C#中(通过Visual C#)和F#(作为Visual Studio 2010),为支持其他语言,如M,Python,和Ruby等,可通过安装单独的语言服务。它也支持的 XML/XSLT,HTML/XHTML ,JavaScript和CSS.为特定用户提供服务的Visual Studio也是存在的:微软Visual Basic,Visual J#、Visual C#和Visual C++。 微软提供了“直通车”的Visual Studio 2010组件的Visual Basic和Visual C#和Visual C + +,和Visual Web Developer版本,不需任何费用。Visual Studio 2010、2008年和2005专业版,以及Visual Studio 2005的特定语言版本(Visual Basic、C++、C#、J#),通过微软的下载DreamSpark计划,对学生免费。 2架构 Visual Studio不支持任何编程语言,解决方案或工具本质。相反,它允许插入各种功能。特定的功能是作为一个VS压缩包的代码。安装时,这个功能可以从服务器得到。IDE提供三项服务:SVsSolution,它提供了能够列举的项目和解决方案; SVsUIShell,它提供了窗口和用户界面功能(包括标签,工具栏和工具窗口)和SVsShell,它处理VS压缩包的注册。此外,IDE还可以负责协调和服务之间实现通信。所有的编辑器,设计器,项目类型和其他工具都是VS压缩包存在。Visual Studio 使用COM访问VSPackage。在Visual Studio SDK中还包括了管理软件包框架(MPF),这是一套管理的允许在写的CLI兼容的语言的任何围绕COM的接口。然而,MPF并不提供所有的Visual Studio COM 功能。

计算机网络新技术外文翻译文献

计算机网络新技术外文翻译文献 (文档含中英文对照即英文原文和中文翻译) 译文: 计算机网络新技术 摘要 21世纪是一个信息时代的经济,计算机网络技术是这个时期的代表技术,以非常快的、具创造性得不断地发展,并将深入到人民群众的工作,生活和学习中。因此,控制这种技术看起来似乎具有很重要的意义。现在,我主要是采用新技术的几种网络技术在现实生活的应用。 关键字 因特网数字证书数字银包网格存储 3G

1.前言 互联网满36岁,仍然是一个进展中的工作。36年后在加州大学洛杉矶分校的计算机科学家使用15英尺的灰色电缆连接两台笨重的电脑,测试了一种在网络上新的数据交换的方式,这将最终成为互联网依然是一个在取得进展的工作。 大学的研究人员正在试验如何提高网络容量和速度。编程人员正在设法为网页注入更多的智能。并正在进行重新设计网络以减少垃圾邮件(垃圾邮件)和安全麻烦的工作。 与此同时威胁织机:批评人士警告说,商业,法律和政治压力可能会阻碍一些使互联网发展到今天的创新的类型。 斯蒂芬克罗克和温顿瑟夫属于1969年9月2日研究生加入的加州大学洛杉矶分校斯莱昂兰罗克教授工程实验室的团体,作为位无意义的测试数据两台计算机之间默默流动。到第二年的1月,其他三个“节点”加入到了这个网络。 然后是电子邮箱,几年之后,在七十年代后期一个所谓的核心通信协议即TCP / IP 协议,在80年代域名系统和在1990年万维网-现在的第二个最流行的应用背后电子邮件出现了。互联网的扩大,超出其最初的军事和教育领域延伸到了企业和全球的家庭中。 今天,克罗克仍然为互联网工作,为协作设计更好的工具。作为互联网管理机构的安全委员会主席,他正试图保卫系统的核心处理免受来自外部的威胁。 他认识到,他帮助建立的互联网工作远未完成,而这些改变是在商店,以满足多媒体日益增长的需求。网络供应商现唯一的“最佳努力”是在提供的数据包上。克罗克说,需要有更好的保障,以防止跳过和过滤现在常见的视频。 瑟夫,现在在MCI公司说,他希望他建立了有内置安全的互联网。微软,雅虎和美国在线公司,和其他的一些,目前正在努力改进网络,使邮件发送者可以验证的方式发送以降低使用虚假地址发送垃圾邮件。 瑟夫说,现在正在制定许多功能,是不可能立即解决计算速度慢和互联网管道窄,或

计算机专业外文文献翻译6

外文文献翻译(译成中文2000字左右): As research laboratories become more automated,new problems are arising for laboratory managers.Rarely does a laboratory purchase all of its automation from a single equipment vendor. As a result,managers are forced to spend money training their users on numerous different software packages while purchasing support contracts for each. This suggests a problem of scalability. In the ideal world,managers could use the same software package to control systems of any size; from single instruments such as pipettors or readers to large robotic systems with up to hundreds of instruments. If such a software package existed, managers would only have to train users on one platform and would be able to source software support from a single vendor. If automation software is written to be scalable, it must also be flexible. Having a platform that can control systems of any size is far less valuable if the end user cannot control every device type they need to use. Similarly, if the software cannot connect to the customer’s Laboratory Information Management System (LIMS) database,it is of limited usefulness. The ideal automation software platform must therefore have an open architecture to provide such connectivity. Two strong reasons to automate a laboratory are increased throughput and improved robustness. It does not make sense to purchase high-speed automation if the controlling software does not maximize throughput of the system. The ideal automation software, therefore, would make use of redundant devices in the system to increase throughput. For example, let us assume that a plate-reading step is the slowest task in a given method. It would make that if the system operator connected another identical reader into the system, the controller software should be able to use both readers, cutting the total throughput time of the reading step in half. While resource pooling provides a clear throughput advantage, it can also be used to make the system more robust. For example, if one of the two readers were to experience some sort of error, the controlling software should be smart enough to route all samples to the working reader without taking the entire system offline. Now that one embodiment of an ideal automation control platform has been described let us see how the use of C++ helps achieving this ideal possible. DISCUSSION C++: An Object-Oriented Language Developed in 1983 by BjarneStroustrup of Bell Labs,C++ helped propel the concept of object-oriented programming into the mainstream.The term ‘‘object-oriented programming language’’ is a familiar phrase that has been in use for decades. But what does it mean? And why is it relevant for automation software? Essentially, a language that is object-oriented provides three important programming mechanisms:

无线局域网-计算机毕业论文外文翻译

毕业设计(论文)外文资料翻译 系:信息工程学院 专业:计算机科学与技术 姓名: 学号: 外文出处:Chris Haseman. Android-essential (用外文写) s[M].London:Spring--Verlag,2008 .8-13. 附件: 1.外文资料翻译译文;2.外文原文。 指导教师评语: 签名: 年月日注:请将该封面与附件装订成册。

附件1:外文资料翻译译文 无线局域网 一、为何使用无线局域网络 对于局域网络管理主要工作之一,对于铺设电缆或是检查电缆是否断线这种耗时的工作,很容易令人烦躁,也不容易在短时间内找出断线所在。再者,由于配合企业及应用环境不断的更新与发展,原有的企业网络必须配合重新布局,需要重新安装网络线路,虽然电缆本身并不贵,可是请技术人员来配线的成本很高,尤其是老旧的大楼,配线工程费用就更高了。因此,架设无线局域网络就成为最佳解决方案。 二、什么情形需要无线局域网络 无线局域网络绝不是用来替代有限局域网络,而是用来弥补有线局域网络之不足,以达到网络延伸之目的,下列情形可能须要无线局域网络。 ●无固定工作场所的使用者 ●有线局域网络架设受环境限制 ●作为有线局域网络的备用系统 三、无线局域网络存取技术 目前厂商在设计无线局域网络产品时,有相当多种存取设计方式,大致可分为三大类:窄频微波技术、展频(Spread Spectrum)技术、及红外线(Infrared)技术,每种技术皆有其优缺点、限制及比较,接下来是这些技术方法的详细探讨。 1.技术要求 由于无线局域网需要支持高速、突发的数据业务,在室内使用还需要解决多径衰落以及各子网间串扰等问题。具体来说,无线局域网必须实现以下技术要求: 1)可靠性:无线局域网的系统分组丢失率应该低于10-5,误码率应该低 于10-8。

计算机网络体系结构外文翻译

附录A With the new network technology and application of the continuous rapid development of the computer network should. Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human. More inseparable from the lives of the community's reliance on them will keep growing. In order for computers to communicate, they must speak the same language or protocol. In the early days of networking, networks were disorganized in many ways. Companies developed proprietary network technologies that had great difficulties in exchanging information with other or existing technologies; so network interconnections were very hard to build. To solve this problem, the International Organization for Standardization(ISO)created a network model that helps vendors to create networks compatible with each other. Finding the best software is not easy. A better understanding of what you need and asking the right questions makes it easier. The software should be capable of handling challenges specific to your company. If you operate multiple distribution centers, it may be beneficial to create routes with product originating from more than one depot. Few software providers though, are capable of optimizing routes using multiple depots. The provider should be able to support installation of its product. Make sure to clearly understand what training and software maintenance is offered. Obviously, selecting the right routing/scheduling software is critically important. Unfortunately, some companies are using software that may not be best suited to their operation. Logistics actives with responsibility for approving the software ought to be comfortable they've made the right decision. It is important to realize that not all routing/scheduling software is alike! There questions to ask are:Which operating system is used?How easy is the software to use?Here is a good way to tell. Ask if its graphical user interface(GUI)is flexible. Find out about installation speed - how long does it take?Is the software able to route third party customers with your core business?When was the software originally released and when was it last upgraded? In 1984, ISO released the Open Systems Interconnection(OSI)reference model,

计算机专业外文翻译

专业外文翻译 题目JSP Technology Conspectus and Specialties 系(院)计算机系 专业计算机科学与技术 班级 学生姓名 学号 指导教师 职称讲师 二〇一三年五月十六日

JSP Technology Conspectus and Specialties The JSP (Java Server Pages) technology is used by the Sun micro-system issued by the company to develop dynamic Web application technology. With its easy, cross-platform, in many dynamic Web application programming languages, in a short span of a few years, has formed a complete set of standards, and widely used in electronic commerce, etc. In China, the JSP now also got more extensive attention; get a good development, more and more dynamic website to JSP technology. The related technologies of JSP are briefly introduced. The JSP a simple technology can quickly and with the method of generating Web pages. Use the JSP technology Web page can be easily display dynamic content. The JSP technology are designed to make the construction based on Web applications easier and efficient, and these applications and various Web server, application server, the browser and development tools work together. The JSP technology isn't the only dynamic web technology, also not the first one, in the JSP technology existed before the emergence of several excellent dynamic web technologies, such as CGI, ASP, etc. With the introduction of these technologies under dynamic web technology, the development and the JSP. Technical JSP the development background and development history In web brief history, from a world wide web that most of the network information static on stock transactions evolution to acquisition of an operation and infrastructure. In a variety of applications, may be used for based on Web client, look no restrictions. Based on the browser client applications than traditional based on client/server applications has several advantages. These benefits include almost no limit client access and extremely simplified application deployment and management (to update an application, management personnel only need to change the program on a server, not thousands of installation in client applications). So, the software industry is rapidly to build on the client browser multilayer application. The rapid growth of exquisite based Web application requirements development of

计算机网络外文翻译

附录 一、英文原文: The NetWorks Birth of the Net The Internet has had a relatively brief, but explosive history so far. It grew out of an experiment begun in the 1960's by the U.S. Department of Defense. The DoD wanted to create a computer network that would continue to function in the event of a disaster, such as a nuclear war. If part of the network were damaged or destroyed, the rest of the system still had to work. That network was ARPANET, which linked U.S. scientific and academic researchers. It was the forerunner of today's Internet. In 1985, the National Science Foundation (NSF) created NSFNET, a series of networks for research and education communication. Based on ARPANET protocols, the NSFNET created a national backbone service, provided free to any U.S. research and educational institution. At the same time, regional networks were created to link individual institutions with the national backbone service. NSFNET grew rapidly as people discovered its potential, and as new software applications were created to make access easier. Corporations such as Sprint and MCI began to build their own networks, which they linked to NSFNET. As commercial firms and other regional network providers have taken over the operation of the major Internet arteries, NSF has withdrawn from the backbone business. NSF also coordinated a service called InterNIC, which registered all addresses on the Internet so that data could be routed to the right system. This service has now been taken over by Network Solutions, Inc., in cooperation with NSF. How the Web Works The World Wide Web, the graphical portion of the Internet, is the most popular part of the Internet by far. Once you spend time on the Web,you will begin to feel like there is no limit to what you can discover. The Web allows rich and diverse communication by displaying text, graphics, animation, photos, sound and video. So just what is this miraculous creation? The Web physically consists of your personal computer, web browser software, a connection to an Internet service provider, computers called servers that host digital data and routers and switches to direct the flow of information. The Web is known as a client-server system. Your computer is the client; the remote computers that store electronic files are the servers. Here's how it works: Let's say you want to pay a visit to the the Louvre museum website. First you enter the address or URL of the website in your web browser (more about this shortly). Then your browser requests the web page from the web server that hosts the Louvre's site. The Louvre's server sends the data over the Internet to your computer. Your web

计算机专业外文文献及翻译

计算机专业外文文献及翻译 微软Visual Studio 1微软Visual Studio 是微软公司推出的软软软境~可以用软建来平台下的 Visual Studio Visual StudioWindows 软用程序和软软用程序~也可以用软建软服软、智能软软软用程序和网来网 插件。WindowsOffice Visual 是一自微软的个来集成软软软境;,~可以用软软由它来微StudioIDEinteqrated development environment软软窗~软手机窗~、框架、精软架框和微软的支持的控制台和软Windows https://www.360docs.net/doc/d13371550.html,Silverlight 形用软界面的软用程序以及窗体软用程序~站网~软用程序和软服软网中的本地代软软同托管WindowsWeb 代软。 包含一由个智能感知和代软重构支持的代软软软器。集成的软软工作作软一源代软软软既个Visual Studio 软器又可以作软一台机器软软软器。其他置工具包括一软软内个窗体的软用程序~软软软软~软软软软~网数据软架GUI 构软软软。有乎各软面的件增强功能~包括增加软支持它几个插源代软控制系软;如和SubversionVisual ,添加新的工具集软软和可软化软软器~如并特定于域的软言或用于其他方面的软件软软生命周期SourceSafe 的工具;例如的客软端,软软软源管理器,。Team Foundation Server

支持不同的软程软言的服软方式的软言~允软代软软软器和软软器;在不同程 度上,支持它Visual Studio 几乎所有的软程软言~提供了一软言特定服软的存在。置的软言中包括个内中;通软C/C + +Visual C+,;通软,~,中;通软,,和,;作软+,https://www.360docs.net/doc/d13371550.html,Visual https://www.360docs.net/doc/d13371550.html,CVisual CFVisual Studio ,~软支持其他软言~如和等~可通软安软的软言服软。软也支持装独它的2010M,Python,Ruby 和软特定用软提供服软的也是存在的,微 XML/XSLT,HTML/XHTML ,JavaScriptCSS.Visual Studio软~,、,和。Visual BasicVisual JVisual CVisual C++ 微软提供了“直通软”的软件的和,和~Visual Studio 2010Visual BasicVisual CVisual C + +和版本~不需任何软用。、年和软软版~以及Visual Web DeveloperVisual Studio 201020082005 的特定软言版本;、、,、,,~通软微软的下软Visual Studio 2005Visual BasicC++CJ 软~软生免软。划学DreamSpark 2架构 不支持任何软程软言~解方案或工具本软。相反~允软入各软功能。特定的功决它插Visual Studio 能是作软一个软软包的代软。安软~软功能可以服软器得到。装个从提供三软服软,~VSIDESVsSolution它决提供了能软列软的软目和解方案~提供了口和用软界面功能;包括软软~工具软和工它窗; SVsUIShell 具口,和窗~软理它软软包的注。此外~册软可以软软软软和服软之软软软通信。所有的软软器~SVsShellVSIDE

计算机专业毕业设计论文(C++)外文文献中英文翻译(Object)[1]

外文资料 Object landscapes and lifetimes Technically, OOP is just about abstract data typing, inheritance, and polymorphism, but other issues can be at least as important. The remainder of this section will cover these issues. One of the most important factors is the way objects are created and destroyed. Where is the data for an object and how is the lifetime of the object controlled? There are different philosophies at work here. C++ takes the approach that control of efficiency is the most important issue, so it gives the programmer a choice. For maximum run-time speed, the storage and lifetime can be determined while the program is being written, by placing the objects on the stack (these are sometimes called automatic or scoped variables) or in the static storage area. This places a priority on the speed of storage allocation and release, and control of these can be very valuable in some situations. However, you sacrifice flexibility because you must know the exact quantity, lifetime, and type of objects while you're writing the program. If you are trying to solve a more general problem such as computer-aided design, warehouse management, or air-traffic control, this is too restrictive. The second approach is to create objects dynamically in a pool of memory called the heap. In this approach, you don't know until run-time how many objects you need, what their lifetime is, or what their exact type is. Those are determined at the spur of the moment while the program is running. If you need a new object, you simply make it on the heap at the point that you need it. Because the storage is managed dynamically, at run-time, the amount of time required to allocate storage on the heap is significantly longer than the time to create storage on the stack. (Creating storage on the stack is often a single assembly instruction to move the stack pointer down, and another to move it back up.) The dynamic approach makes the generally logical assumption that objects tend to be complicated, so the extra overhead of finding storage and releasing that storage will not have an important impact on the creation of an object. In addition, the greater flexibility is essential to solve the general

计算机专业的外文文献.pdf

A Rapid Tag Identification Method with Two Slots in RFID Systems Yong Hwan Kim, Sung Soo Kim, Kwang Seon Ahn Department of Computer Engineering, Kyungpook National University Daegu, Korea {hypnus, ninny, gsahn}@knu.ac.kr Abstract—RFID is core technology in the area of ubiquitous compu-ting. Identify the objects begin with the reader’s query to the tag at-tached to the subject. When multiple tags exist in the reader’s inter-rogation zone, these tags simultaneously respond to the reader’s query, resulting in collision. In RFID system, the reader needs the anti-collision algorithm which can quickly identify all the tags in the interrogation zone. This paper proposes tree based Rapid Tag Identi-fication Method with Two Slots(RTIMTS). The proposed algorithm rapidly identifies a tag with the information of Two Slots and MSB(Most Significant Bit). Two Slots resolve the tag collision by receiving the response from the tag to the Slot 0 and 1. The reader can identify two tags at once using MSB of information added to the tag ID. With RTIMTS algorithm, the total time of tag identification can be shortened by decreasing the number of query-responses from the reader. Keywords-RFID; Anti-collision; Two Slots; the number of query-responses. I.I NTRODUCTION RFID(Radio Frequency Identification) is a technology that deciphers or identifies the tag information through a reader (or interrogator) without contact. RFID have become very popular in many service industries, purchasing and distribution logis-tics, industry, manufacturing companies and material flow systems. Automatic Identification procedures exist to provide information about people, animals, goods and products in tran-sit[1][2]. The reader receives required information from the tags by sending and receiving wireless signals with the tag. Since the communication between the readers and the tags shares wire-less channels, there exist collisions. The collisions can be di-vided into the reader collision and the tag collision. The reader collision occurs when multiple readers send request signals to one tag, and the tag receives the wrong request signal due to signal interference between readers. The tag collision occurs when more than two tags simultaneously respond to one reader and the reader cannot identify any tags. This kind of collision makes the reader take long time to identify tags within the read-er’s identification range and impossible to identify even one tag[3][4][5] [6]. Therefore, the collision is a crucial problem that must be re-solved in RFID systems, so many studies to resolve this prob-lem have been carried out as well as are ongoing. This paper focuses on the tag collision problem which occurs in the case where one reader identifies multiple tags. Figure 1 provides schematizations of reader collision and tag collision. This paper proposes the Rapid Tag Identification Method with Two Slots (RTIMTS), for faster tag identification in mul-ti-tag environment where one reader identifies multiple tags. In the transfer paper[7], the proposed algorithm designs the method that it does without the value extracting procedure of even(or odd) parity bit of ID bit(T pb),the number of identified ‘1’s(T1n), the number of remaining ‘1’s(T rn), and the number of collided bit (T cb) with simple it can predict a tagID. Maximum 4 tag IDs can be identified on one round by using Two slots. a) The Reader collision b) The Tag collision Figure 1. The collision problem in RFID System II.T HE R ELATED WORKS A. Query Tree Query Tree(QT) algorithm is a binary tree based anti colli-sion algorithm and has an advantage in easily implementation due to its simple operating mode[8]. QT sets the reader’s query and tag’s response as one round, and identifies tags by iterating the round. In each round, the reader requests prefix to tag’s ID. And when ID matches the prefix, each tag transmits all IDs including prefixes to the reader. At this time, if more than one tag simultaneously responds, the reader cannot recognize tag’s ID, but can recognize that there are currently more than two tags having the prefix. Then the reader adds ‘0’ or ‘1’ to the current prefix and queries the longer prefix to the tags again. When only one tag responds to the reader, it identifies the tag. In other words, the reader adds the prefix by 1 bit until only one tag responds and iterates this process until identifying all the tags within the range. Figure 2 shows the operating process of QT algorithms[10]. Figure 2 shows the process that four tags respond according to the readers’ query. In round 1, 2, 3, and 7, the collision oc-curs because more than two tags respond, and in round 4, 5, 8, and 9, tag can be identified because only one tag responds. The digital coding method applied to QT cannot detect the collision bits. When a collision occurs, the reader adds ‘0’ or ‘1’ to the 2009 Eighth IEEE International Symposium on Network Computing and Applications 978-0-7695-3698-9/09 $25.00 ? 2009 IEEE DOI 10.1109/NCA.2009.21 292

相关文档
最新文档