外文翻译_计算机科学与技术

外文翻译_计算机科学与技术
外文翻译_计算机科学与技术

毕业设计(论文) 外文文献翻译

专业计算机科学与技术

学生姓名

班级

学号

指导教师

信息工程学院

Mobile Malware and Smart Device Security:Trends, Challenges and Solutions

Abdullahi Arabo and Bernardi Pranggono

The Oxford Internet Institute (OII), Oxford University, Oxford, OX1 3JS, U.K. School of Engineering and Built Environment, Glasgow Caledonian University, Glasgow, G4 0BA, U.K.

Abstract —This work is part of the research to study trends and challenges of cyber security to smart devices in smart homes. We have seen the development and demand for seamless interconnectivity of smart devices to provide various functionality and abilities to users. While these devices provide more features and functionality, they also introduce new risks and threats. Subsequently, current cyber security issues related to smart devices are discussed and analyzed. The paper begins with related background and motivation. We identified mobile malware as one of the main issue in the smart devices’ secur ity. In the near future, mobile smart device users can expect to see a striking increase in malware and notable advancements in malware-related attacks, particularly on the Android platform as the user base has grown exponentially. We discuss and analyzed mobile malware in details and identified challenges and future trends in this area. Then we propose and discuss an integrated security solution for cyber security in smart devices to tackle the issue.

Index — Botnet, cyber security, mobile malware, security framework, smart device security

I. INTRODUCTION

The Internet is one of the most remarkable developments to have happened to mankind in the last 100 years. The development of ubiquitous computing makes things even more interesting as it has given us the possibility to utilise devices and technology in unusual ways. We have seen the development and demand for seamless interconnectivity of smart devices to provide various functionalities and abilities to users. But we also know the vulnerabilities that exist within this ecosystem. However, these vulnerabilities are normally considered for larger infrastructures and little attention has been paid to the cyber security threats from the usage and power of smart devices as a result of the Internet of Things (IoT) technologies. In the IoT vision, every physical object has a virtual component that can produce and consume services. Smart spaces are becoming interconnected with powerful smart devices (smartphones, tablets, etc.). On the other hand, we also have the backbone, the power grid that powers our nations. These two phenomena are coming at the same time. The increased usage of smart meters in our homes or businesses provides an avenue of connectivity as well as

powerful home services or interconnected powerful smart devices. The example of the smart grid also provides the means of controlling and monitoring smart grid infrastructures via the use of portable smart devices.

The vulnerability of the connected home and developments within the energy industry’s new wireless smart grid are exposed to the wrong people; it will inevitably lead to lights out for everyone. This will eventually uncover the multitude of interconnected smart devices in the IoT as a hotbed for cyber-attacks or robot networks (botnets) and a security nightmare for smart space users and possibly for national infrastructures as a whole.

The latest research has reported that on average people own three internet-connected smart devices such as smartphones and tablets. Therefore, as a result of the ubiquity of smart devices, and their evolution as computing platforms, as well as the powerful processors embedded in smart devices, has made them suitable objects for inclusion in a botnet. Botnets of mobile devices (also known as mobile botnets) are a group of compromised smart devices that are remotely controlled by bot-masters via command-and-control (C&C) channels. Mobile botnets have different characteristics in several aspects as compared to PC-based botnets, such as their C&C channels medium.

PC-based botnets are seen as the most common platforms for security attacks, and mobile botnets are seen as less of a threat in comparison to their counterparts. This is so for different reasons, such as limited battery power, resource issues, and Internet access constraints, etc. Therefore, the efforts directed to both the manifestation of operating mobile botnets and corresponding research and development endeavours are not as wide as for PC-based botnets. However, this development could change with the recent surge in popularity and use of smart devices. Smart devices are now widely used by billions of users due to their enhanced computing ability, practicality and efficient Internet access, thanks to advancement in solid-state technologies.

Moreover, smart devices typically contain a large amount of sensitive personal and corporate data and are often used in online payments and other sensitive transactions. The wide spread use of open-source smart device platforms such as Android and third-party applications made available to the public also provides more opportunities and attractions for malware creators. Therefore, for now and the near future smart devices will become one of the most lucrative targets for cybercriminals.

The main focus of this paper is threefold: firstly to highlight the possible threats and vulnerability of smart devices, secondly to analyse the challenges involved in detecting mobile malware in smart devices and finally to propose a general security solution that will facilitate solving or addressing such threats. The rest of the paper is organized as follows. In section II we provide a detailed analysis of the security threats on smart devices and their links with cyber security. We have identified mobile

malware as one of the main issues and we discuss it in more detail in Section III. Section IV provides our proposed security solution that will be able to deter the problems of mobile malware. The paper is concluded in section V.

II. SECURITY THREATS ON SMART DEVICES

The weakest link in any IT security chain is the user. The human factor is the most challenging aspect of mobile device security. Home users generally assume that everything will work just as it should, relying on a device’s default settings without referring to complex technical manuals. Therefore service content providers and hardware vendors need to be aware of their responsibilities in maintaining network security and content management on the devices they provide. Service providers might also have the opportunity to provide add-on security services to complement the weaknesses of the devices.

The issue of cyber security is much closer to the home environment than has been usually understood; hence, the problem of cyber security extends beyond computers it is also a threat to portable devices. Many electronic devices used at home are practically as powerful as a computer - from mobile phones, video consoles, game consoles and car navigation systems. While these devices are portable, provide more features and functionality, they also introduce new risks.

These devices previously considered as secure can be an easy target for assailants. The information stored and managed within such devices and home networks forms part of an individual’s Critical Information Infrastructure (CII) [2] as identified by the POSTnote on cyber security in the UK. For example, an attacker may be able to compromise a smart device with a virus, to access the data on the device. Not only do these activities have implications for personal information, but they could also have serious consequences if corporate information were also stored on the smart device.

The use of mobile devices in healthcare is also more common these days, such as in mobile-health. A typical example is having a health device connected to the home network, which is capable of transmitting data wirelessly to hospitals and other relevant parties. Most of the manufacturers of these devices do not put much effort in trying to make sure that the devices are secure. If these devices are compromised not only will the information and privacy of the user of the device be compromised, but the attacker can even change the settings of the devices, which could lead to harmful consequences. It has been shown that it is possible to hack into a pacemaker and read the details of data stored in the device such as names and medical data without having direct access to the devices simply by standing nearby [3].

Therefore, it is also possible to reconfigure the parameters of the device. This is not only applicable to medical devices, but also to any devices that are used within the home network for any purpose.

According to the Juniper Networks report [4], 76 percent of mobile users depend on their mobile devices to access their most sensitive personal information, such as online banking or personal medical information. This trend is even more noticeable with those who also use their personal mobile devices for business purposes. Nearly nine in ten (89 percent) business users report that they use their mobile device to access sensitive work-related information.

Another more worrying impact is when cybercriminals use the vast resources of the network to turn it into a botnet and launch a cyber-attack on national critical infrastructures. There are some Android applications that when downloaded from a third party market (not the Android market) are capable of accessing the root functionality of devices (“rooted”) and turning them into botnet soldiers without the user’s explicit consent.

People could easily and unwittingly download malware to their smart devices or fall prey to “man-in-the-middle” attacks where cyber-criminals pose as a legitimate body, intercept and harvest sensitive information for malicious use. In 2011, there was a mix of Android applications removed from the Android Market because they contained malware. There were over 50 infected applications - these applications were copies of “legitimate” applications from legitimate publishers that were modified to include two root exploits and a rogue application downloader .

The Juniper Networks Mobile Threat Centre (MTC) reported that in 2011 there was an unparalleled increase in mobile malware attacks, with a 155 percent increase from the previous year across all platforms [5]. It is also reported that Android malware experienced an increase of 3,325 percent in 2011. Notable in these findings is a significant number of malware samples obtained from third-party applications which do not enjoy the benefit or protection Google Play Store scanning techniques. Previously, an Android developer could post an application to the official Android Market and have it available immediately, without inspection or vetting to block pirated or malicious applications.

This increase in malware is mainly due to the combination o f Google Android’s dominant market share in smartphone (68.8 percent in 2012) and the lack of security control over the applications appearing in the various Android application markets. It was reported recently that Google Play store, which has more than 700,000 apps just passed 15 billion downloads. Security firm Fortinet estimated that money-stealing malware has increased exponentially in 2006-2011 as shown in Figure 1. Based on an estimation by Kaspersky Lab, cybercriminals who target smart devices like smartphones earn from $1,000 to $5,000 per day per person. Mobile phone hacking is also getting more attractive with the rise of the Near-Field Communication technology (NFC), which expands the use of smart devices as e-wallet or helps people to read

product information.

In December 2011 alone, Kaspersky Lab discovered more than 1,000 new Trojans targeting smartphones. That is more than all the smartphone viruses spotted during 2003-2010. This trend is continuing; in 2012, the number of cyber-attacks targeting mobile devices increased exponentially during the first quarter, as reported by security firm Trend Micro [6].

Their report identified approximately 5,000 new malicious Android applications in just the first three months of the year, mainly due to the increase of the Android user base. The research also pointed out a marked escalation in the number of active advanced persistent threat (APT) campaigns currently being mounted against companies and governments. APT is a cyber-attack launched by a group of sophisticated, determined, and coordinated attackers who systematically compromise the network of a specific target or entity for a prolonged period. Security researchers see APT in different ways, while some researchers regard APT as different type of attack; others just categorize it as a more organized botnet with more resources behind it.

Malware developments that targets smart home devices have several known monetization factors. Most malwares are aimed at mobile pick pocketing (short message service (SMS) or call fraud) or the ability to charge premium bills via SMS or calls, as illustrated in Figure 2. Some malware are used as part of botnet creations. Malwares like DreamDroid (or DroidDream) [7] have integrated thousands of mobile devices into extensive botnets. Some of the malwares are developed to exploit vulnerabilities on either the operating systems (OS), installed applications, or just to create trouble to user information.

Home devices and general consumer electronics are progressively becoming more advanced and are capable of connecting with other devices over a network. While it may sound unreal, devices such as TVs, digital picture frames, smart meters and e-readers are quite vulnerable and absolutely capable of causing problems on your network. The next few years will provide opportunities for various types of malware developers to explore unlikely methods of achieving their goals. Smartphones are not invulnerable and Macs can get malware, such as the CVE-2012-0507 vulnerability [8].

Luigi Auriemma in [9] has uncovered a vulnerability in a Samsung D6000 high definition (HD) TV that caused it to get stuck in an endless loop of restarts. Auriemma's report followed another denial-of-service (DoS) vulnerability in Sony Bravia TVs uncovered by Gabriel Menezes Nunes [10] which stops users from changing the volume, channels or access any functions.

In the 2012 first quarterly report from Trend Micro [11], it was pointed out that the large diffusion of mobile devices and the increase in awareness of the principal cyber

threats have resulted in an increase in the interest of cybercrime in the mobile sector. Another significant interest is concentrated on the threat in terms of the rapid spread of botnets based on mobile devices, favored by the total almost absence of protection and the difficulty of tracing the agents composing the network. If these exploits are targeted by well-established hacker groups such as Anonymous, it will pose a bigger threat to organizations and smart environments that protect highly sensitive data, targeting companies and individuals for various political and financial reasons.

III. MOBILE MALWARE

One of the major and most common problems in today’s Internet is malware. Among these malware, Botnets are considered as the biggest challenge. Botnets are used to send email spam, carry out distributed denial of services (DDoS) attacks, and for hosting phishing and malware sites. Botnets are slowly moving towards smart devices since those devices are now basically everywhere, powerful enough to run a bot and offer additional gains for a bot-master such as financial gains as discussed earlier. With PC-based botnets, cybercriminals often use zombies within botnets to launch DDoS attacks. Even though there have been no major mobile DDoS incidents, with current trends we can expect to see this in the near future.

Botnets are maintained by malicious actors commonly referred to as “bot-masters” that can access and manage the botnet remotely or via bot proxy servers as illustrated in Error!Reference source not found.. The bots are then programmed and instructed by the bot-master to perform a variety of cyber-attacks, including attacks involving the further distribution and installation of malware on other information systems.

In PC-based botnets, botnet master controllers typically use http requests with normal port 80 to transmit and receive their messages. In mobile-based botnets, the bot-master also uses similar http techniques to distribute their commands but also exploits SMS, Bluetooth, etc. The bot-master exploits operating system and configuration vulnerabilities to compromise smart devices and to install the bot software.

The first mobile malware, known as Cabir, was discovered in 2004 and was also known as the first mobile worm. The first mobile botnet was discovered around July 2009, when a security researcher found SymbOS.Yxes or SymbOS.Exy.C (aka Sexy Space) [12] targeting Symbian devices and using simple HTTP-based Command-and-Control (C&C).

Later the same year, a security researcher discovered Ikee.B [13], which targets jailbroken iPhones using a similar mechanism to SymbOS.Yxes. Geinimi, which is considered to be the first Android botnet, was discovered in China in December 2010. Geinimi also implements similar HTTP-based C&C with the added feature of encrypted communications. Geinimi steals the device’s international mobile equipment

identity (IMEI), international mobile subscriber identity (IMSI), GPS coordinate, SMS, contact list, etc. and forwards it to the bot-master.

Although advanced mobile botnets have not been observed in the main population of smartphones, we believe it is just a matter of time. As shown in [14], mobile botnets are obviously serious threats for both end users and cellular networks. Threats imposed by botnets will continue to increase. As more people use smart devices, it is essential to analyze and explore the mechanisms of mobile botnets and develop security solutions in regard to smart devices.

The use of C&C for a mobile botnet stipulates additional challenges that differentiate it from well-known PC-based botnets. Some of these main challenges include, among others: computational power, seamless connectivity, inter-connectivity with other secure platforms networks, portability and amount of stored sensitive data, and computational power. PC-based botnets also use an IRC-channel as the main C&C communication channel.

The impact of SMS-based C&C, IP-based C&C, and Bluetooth-based C&C has been addressed in detail in [15], while P2P-based C&C mobile botnets are analyzed and discussed in [16].

As a result of the abilities of smart devices in terms of placing i.e. calls, use of SMS and MMS amongst others, the burdens for mobile botnets are very interesting and challenging as it opens the door for easy financial gain for a bot-master. Additionally, since mobile phones interact with operators and other networks, attacks against the critical infrastructure are also possible.

Hence, it is possible to launch sophisticated cyber-attacks on the mobile phone network that will be very hard to prevent.

Detecting and preventing malware is not a trivial task as malware developers adopt and invent new strategies to infiltrate mobile devices. Malware developers employ advanced techniques such as obfuscation and encryption to camouflage the signs of malware and thereby undermine anti-malware software.

Some of the main reasons why mobile malware are an attractive point for viruses and malware developers are:

1.The ubiquity of smart devices such as smartphones in general.

2.The increasing computational powers of smart devices. Whose they are

becoming virtually as powerful as desktop systems.

3.The lack of awareness of the threats and the risk attached to smart devices

from the end-user’s perspective.

4.The growing uses of jailbreak/rooted devices both on iOS and Android

devices.

5.Each smart device really is an expression of the owner. It provides a

means to track the user’s activity, hence serves as a single gateway to our digital identity and activities.

6.Most of the widely used smart devices operate on an open platform such

as Android, which encourages developers and download of applications from both trusted applications markets and third party markets.

IV. POTENTIAL SECURITY SOLUTIONS

Considering the above threats and challenges, a new security solution is essential for cyber security for smart devices in smart homes. More specifically, several key research tasks are required: 1) investigate new secure system architecture for smart devices in smart homes; 2) re-evaluate and enhance security system architecture for smart devices in smart homes.

Android OS has four layers: Linux kernel, libraries (+Android runtime), application solution and applications layers (see Figure 4). So, basically Android runtime is a kind of “glue” between the Linu x kernel and the applications.

Figure 4. Android OS layers

The main security features common to Android involve process and file system isolation; application or code signing; ROM, firmware, and factory restore; and kill switches.

However, the main security issue with Android OS is it relies heavily to the end-user to decide whether an application is safe or not. Even though Google’s just adding one piece of the security layer by scanning an applications in the Google Play, the end users still needs to analyze and make the final decision themselves whether to continue with the installation or not. Until now, the end-users cannot rely on the operating system to protect themselves from malware.

As part of Google’s marketing strategy to gain m arket share as big as possible by offering applications as many as possible, the Android application publishing process makes it easy for developers to develop Android applications, but also provides too much space for malicious application creators.

Malicious applications have successfully infected Android market before, one example being a malware application called droid09 which allowed users to carry out banking transactions. The application needs the user to provide the bank’s details and tricks the user by masquerading a legitimate login of a bank website (phishing).

Malware applications have become more sophisticated these days; they find new ways and techniques to enter the system by exploiting software vulnerabilities or by just tricking the users.

End-user: It is always essential for the end-user to be aware of the security measures of their mobile device. End-users should be aware of at least the following measures:

Install anti-virus and anti-malware solutions to protect the device against malware and viruses. Also ensure to turn on the automatic update. It is been shown that installing anti-virus and anti-malware is very effective to protect mobile devices from malicious applications [5, 6, 17].

?Install a personal firewall to protect mobile device interfaces from direct attack and illegal access. The effectiveness of mobile firewalls to increase a mobile device’s security is shown in [18].

Install only applications from trusted sources that have legitimate contact information and a website. As the current Android Market (Google Play) does not adopt a certification process for applications, it is up to the end-user to make sure he/she only installs trusted applications from trusted developers.

Install only applications from the official and original developer (for example, if you are installing Instagram applications, make sure you download it from Instagram Inc.).

Check the permissions carefully when the application is prompting you during the installation phase. For example, when you install a wallpaper application, do you think it really needs full Internet access?

Ensure your OS and software's always up-to-date with the latest versions and security patches need to be installed.

Install remote locate, track, lock, wipe, backup and restore software to retrieve, protect or restore a lost or stolen mobile device and the personal data on the device.

Only install applications that have a high number of downloads and positive reviews.

Never view sensitive data over public wireless networks which have no passwords or encryption.

Should be alert to anomaly behaviours and activities in their devices.

Should be careful when clicking links on social network sites. Malicious

links on social networks can be a very effective method to spread malware.

Participants tend to trust such networks and are thus willing to click on links that are on “friends’” social networking sites.

Mobile Network Operators (MNOs): MNO also has responsibility to create a more secure environment for their customers. MNOs need to install anti-virus and anti-malware software to scan outgoing and incoming SMS and MMS to the mobile network, as many malwares use SMS/MMS to propagate and contact the bot-master. MNO should also build a global partnership with related agencies such as other MNOs to prevent mobile malware propagation by exchanging information, knowledge, database and expertise.

Apps Developers: Developers also need to take care of the security measures implemented in their application. They should ensure that private data is not being sent via an unencrypted channel; the data must be sent through HTTPS or TLS networks.

Developers should minimize the use of built-in permissions in their applications, for example do not ask for full Internet access permission, INTERNET, unless it is essential for your applications to work properly. Android has about 100 built-in permissions that control operations such as dialing the phone (CALL_PHONE), sending shot message (SEND_SMS), etc.

In Android, there are three main “ security protection levels” fo r permission labels: a “normal” permission is granted to any application that requests it; a “dangerous” permission is only granted after user approval at install-time; and a “signature” permission is only granted to applications signed by the same developer key as the application defining the permission label.

This “signature” protection level is integral in ensuring that third-party applications do not gain access affecting the Android’s trusted computing base (TCB)’s integrity.

Furthermore, applications developers need only collect data which is essential and required for the application otherwise it will be tampered by the attackers. This is also useful to minimize repackaging attacks. Repackaging attacks are a very common approach, in which a malware developer downloads a legitimate application, modifies it to include malicious code and then republishes it to an application market or download site.

It is shown that the repackaging technique is highly effective mainly because it is often difficult for end-users to tell the difference between a legitimate application and its malicious repackaged form. In fact, repackaging was the most prevalent type of social engineering attack used by Android malwaredevelopers in the first two quarters of 2011 [17]. One of the characteristics of Android malware is typically it is specifically developed for a speci fic group of users. It is very unlikely for an Android

user from Russia to be infected by Chinese malware for example. Android malware is typically created by cybercriminals with users in specific countries as their target, which is usually their own compatriot. Market Store: The store needs to vet and rigorously screen new mobile applications before they can be put in the market. Google (Google Play) recently made a significant improvement in their security by screening new applications before they were put in the market. Applications store providers also should consider certification for each application before it can be published in the marketplace. The effectiveness of such certification process is shown in [19]. Applications should be rigorously reviewed to ensure that applications are safe from malicious codes, reliable, perform as expected, and are also free of explicit and offensive material.

V. CONCLUSION

The paper discussed a development of security solution to handle the challenges of cyber security to smart devices in smart homes. The IoT technologies may be able to extend anywhere computing to almost anything, but there are fundamental security issues that need to be properly addressed. In the near future, mobile smart device users can expect to see a striking increase in malware and notable advancements in malware-related attacks, particularly on the Android platform as the user base has grown expone ntially. Today’s users utilize their mobile smart devices for everything from accessing emails to sensitive transactions such as online banking and payments. As users become more dependent on their mobile devices as digital wallets, this creates a very lucrative target for cybercriminals. Mobile smart device users can expect to see a significant malware increase on finance related applications, such as mobile Internet banking. Detecting and preventing malware in mobile device need comprehensive and multi-level approaches. This work is part of ongoing research to design and implement a security model for smart devices in the smart home environment. For the future work we plan to implement and assess the security solution proposed in the test-bed environment which includes a honeynet for mobile malware.

移动恶意软件和智能设备安全:趋势、挑战和解决方案牛津互联网研究所(OII),牛津大学,牛津,英国3js,英国

摘要:这项工作是研究智能设备在智能家庭网络安全的研究趋势和挑战的一部分。我们已经看到,智能设备为用户提供各种功能和能力的无缝互联的发展需求。虽然这些设备提供更多的功能和功能,他们还引入新的风险和威胁。随后,目前的网络安全问题相关的智能设备进行了讨论和分析。本文首先从相关的背景和动机。我们确定了移动恶意软件的主要问题之一,在智能设备的安全。在不久的将来,移动智能设备的用户可以期待看到一个惊人的增加,恶意软件和显着的进步,在恶意软件相关的攻击,特别是在安卓平台作为用户基础已成倍增长。我们讨论和分析移动恶意软件的细节和确定的挑战和未来的趋势,在这方面。然后,我们提出并讨论了一个集成的安全解决方案,在智能设备的网络安全解决问题。

关键词:僵尸网络,网络安全,移动恶意软件,安全框架,智能设备安全

一、引言

在过去的100年里,互联网是人类发生的最显著的发展之一。普适计算的发展使得事情变得更加有趣,因为它给我们提供了利用设备和技术以不寻常的方式的可能性。我们已经看到,为智能设备提供的各种功能和能力给用户无缝互联的发展需求。但我们也知道在这个生态系统中存在的漏洞。然而,这些漏洞通常被认为是较大的基础设施和小的关注已经支付给网络安全的威胁,从使用和智能设备的力量,因为物联网(物联网)技术的结果。在物联网中,每一个实体对象都有一个可以生成和消费服务的虚拟组件。智能空间与强大的智能设备(智能手机、平板电脑等)变得越来越大。另一方面,我们也有脊椎,权力的力量,我们的国家。这2种现象同时出现。智能电表在我们的家庭或企业的增加使用提供了一个连接的途径,以及强大的家庭服务或互联功能强大的智能设备。智能电网的例子也提供了控制和监控智能电网基础设施,通过使用便携式智能设备的装置。

在能源行业的新的无线智能电网连接的家庭和发展的脆弱性暴露于错误的人,这将不可避免地导致了灯,为每个人。这将最终揭开互联智能设备在物联网众多温床的网络攻击或机器人网络(僵尸网络)和智能空间的用户的安全噩梦,可能是国家的基础设施作为一个整体。

最新的研究报告称,平均有三个互联网连接的智能设备,如智能手机和平板电脑[1]。因此,由于智能设备的普及,及其演变为计算平台,以及嵌入式智能设备的功能强大的处理器,使他们在一个僵尸网络包含适用对象。移动设备的僵尸网络(又称移动僵尸网络)是一组妥协,被僵尸大师通过命令和控制远程控制的智能设备(C & C)通道。移动僵尸网络已经在一些方面不同的特性相比,基于PC的僵尸网络,如C和C通道中。

基于PC的僵尸网络被视为安全攻击最常见的平台,和移动僵尸网络被视为他们的同行相比,少了一个威胁。这是因为不同的原因,如电池电力,资源有限的问题,和互联网接入的限制,因此,努力向都体现操作移动僵尸网络和相应的研究和开发工作不是基于PC的僵尸一样宽。然而,这种发展可能会改变最近的

激增,普及和使用的智能设备。智能设备是目前广泛使用的数十亿的用户,由于其增强的计算能力,实用性和有效的互联网接入,由于固态技术的进步。

此外,智能设备通常包含大量的敏感的个人和企业数据,并经常使用在在线支付和其他敏感的交易。广泛使用的开源智能设备平台,如安卓和第三方应用程序提供给公众也提供了更多的机会和吸引力的恶意软件的创造者。因此,现在和未来的智能设备将成为网络罪犯最有利可图的目标。

二:智能设备的安全威胁

任何信息安全链中最薄弱的环节就是用户。人的因素是最具挑战性的移动设备的安全性。家庭用户一般认为,一切都将工作,正如它应该,依靠一个设备的默认设置,而不涉及复杂的技术手册。因此,服务内容供应商和硬件供应商需要知道他们的责任,在维护网络安全和他们所提供的设备的内容管理。服务供应商可能也有机会提供附加的安全服务,以补充设备的弱点。

网络安全的问题是非常接近的家庭环境,而不是通常被理解;因此,网络安全问题的问题超出了计算机,它也是一个威胁到便携式设备。在家中使用的许多电子设备实际上是强大的,作为一台计算机-从移动电话,视频游戏机,游戏机和汽车导航系统。虽然这些设备是便携式的,提供更多的功能和功能,他们还引入新的风险。

这些设备以前被视为安全可以为攻击者的一个容易的目标。信息存储和管理在这样的设备和家庭网络的关键信息基础设施的组成部分(CII)[2]通过对英国网络安全的postnote鉴定。例如,攻击者可能会妥协的智能设备与病毒,访问设备上的数据。这些活动不仅对个人信息有一定的影响,而且在智能设备上还存储了企业信息也会带来严重的后果。

在医疗保健的移动设备的使用也越来越常见的这些天,如在移动健康。典型的例子是有一个连接到家庭网络的健康设备,这是能够无线传输数据的医院和其他相关方。大多数生产这些设备的制造商并没有尽最大努力,以确保设备是安全的。如果这些设备被泄露,不仅会损害设备的用户的信息和隐私,但攻击者甚至可以改变设备的设置,这可能会导致有害的后果。它已被证明,它是可能的侵入心脏起搏器和读的数据存储在设备,如姓名和医疗数据,而不直接通过站在附近[3]的设备直接访问的数据的细节。

因此,它也可以重新配置该设备的参数。这不仅适用于医疗设备,也适用于任何用于任何目的的家庭网络中的设备。

据Juniper报告[4],百分之76移动用户依赖于他们的移动设备访问他们最敏感的个人信息,如网上银行或个人医疗信息。这种趋势更为明显,那些还使用个人移动设备的商业用途。近十的九(百分之89)企业用户报告说,他们使用他们的移动设备访问敏感的工作相关的信息。

另一个令人担忧的影响是当犯罪分子利用网络的巨大资源,把它变成一个僵尸网络发起对国家关键基础设施的网络攻击。有一些安卓应用程序,当从三分之一方市场下载(不安卓市场)是能够访问设备的根功能(“根”),并把他们变

成僵尸网络的士兵没有用户的明确同意。

人们可以很容易地和无意中下载恶意软件到他们的智能设备或落入“人在中间”的攻击,网络罪犯构成合法的身体,拦截和收获的恶意使用敏感信息。在2011,有一个混合的安卓应用程序从安卓市场上删除,因为它们包含恶意软件。有超过50的受感染的应用程序-这些应用程序是“合法的出版商进行了修改,包括两根漏洞和恶意应用程序下载合法的“应用程序的副本。

瞻博网络的移动威胁中心(MTC)报道,2011有移动恶意软件攻击的空前的增长,从跨平台[5]前一年增加百分之155。也有报道称,安卓恶意软件在2011的增长了百分之3325。在这些研究结果是一个显着的恶意软件样本,从第三方应用程序获得的恶意软件样本,不享受谷歌游戏商店的利益或保护。此前,Android开发者可以发布一个应用到官方的Android市场有立即可用,未经检验或审查阻止盗版或恶意应用程序。

这种增加的恶意软件主要是由于谷歌安卓的占主导地位的市场份额在智能手机(百分之68.8,2012)和缺乏安全控制的应用程序出现在不同的安卓应用市场。近日有报道称,谷歌游戏商店,其中有超过700000个应用程序刚刚通过了150亿次下载。安全公司Fortinet公司估计,钱窃取恶意软件已在实际成果如图1所示的成倍增加。根据卡巴斯基实验室估计,网络犯罪分子谁目标智能智能手机收入从1000美元到5000美元每人每天。手机黑客也越来与近场通信技术(NFC)的兴起更具吸引力,从而拓展智能设备作为电子钱包的使用或帮助人们阅读产品信息。

仅在十二月2011时,就发现了1000多个新的木马瞄准智能手机。这是比所有智能手机病毒发现2003-2010年。这一趋势正在持续;2012,针对移动设备的网络攻击的数量在第一季度呈指数上升,如安全公司趋势微[6]。

他们的报告确定了大约5000个新的恶意应用程序在短短的三个月内,主要是由于增加了安卓的用户基础。该研究还指出,目前正被安装在对公司和政府的积极的持续威胁(倾向)活动的数量明显增加。易是由一组复杂的,确定的,和协调的攻击者谁系统地妥协网络的一个特定的目标或实体为一个长期的网络攻击。安全研究人员认为,在不同的方式,而一些研究人员认为倾向于不同类型的攻击,其他人只是把它归类为一个更有组织的僵尸网络背后有更多的资源。

目标智能家庭设备的恶意软件的发展有几个已知的货币化因素。大多数恶意软件都是针对手机扒窃(短消息服务(SMS)或电话诈骗)或能力收取保费账单通过短信或电话,如图2所示。一些恶意软件被用作僵尸网络创作的一部分。恶意软件(或像dreamdroid DroidDream)[7]集成了成千上万的移动设备进行大规模的僵尸网络。一些恶意软件的开发利用在操作系统(OS)的漏洞,安装的应用程序,或者只是制造麻烦的用户信息。

家庭设备和一般消费类电子产品正逐步变得更加先进,并能够与其他设备连接在网络上。虽然这听起来不真实,设备如电视、数码相框、智能仪表和电子阅读器是很脆弱的,绝对能够在你的网络造成的问题。未来几年将提供各种类型的

恶意软件开发者的机会,探索实现他们的目标不可能的方法。智能手机并非无懈可击,Mac可以让恶意软件,如cve-2012-0507脆弱性[8]。

路易吉奥列马在[9]发现在三星d6000高清(HD)电视的一个漏洞,使其陷入无限循环的重新启动。奥列马的报道之后,另一个拒绝服务(DoS)在索尼Bravia电视的加布里埃尔以外,努涅斯[10]阻止用户更改音量发现漏洞,通道或访问任何功能。

在2012个第一季度报告从趋势微[11],有人指出,移动设备的大规模扩散和增加的主要网络威胁的认识,导致在移动领域的网络犯罪的利益的增加。另一个明显的兴趣集中在威胁在基于移动设备的僵尸网络的迅速传播,受到总几乎没有保护和追踪剂组成的网络的难度。如果这些攻击是有针对性的完善的黑客团体,如匿名,它将构成更大的威胁,组织和智能环境,保护高度敏感的数据,针对企业和个人的各种政治和金融原因。

在今天的互联网的主要和最常见的问题之一是恶意软件。在这些恶意软件,僵尸网络被认为是最大的挑战。僵尸网络被用来发送垃圾邮件,进行分布式拒绝服务(DDoS)攻击,和托管网络钓鱼和恶意软件的网站。僵尸网络正在慢慢走向智能设备由于这些设备现在基本上到处都是,强大到足以运行机器人和机器人大师如财务收益,如前面所讨论的提供额外的收益。与基于PC的僵尸网络,网络犯罪分子经常使用的僵尸在僵尸网络发动DDoS攻击。尽管没有大移动DDoS攻击事件,与当前的趋势,我们可以期待在不久的将来看到这。

僵尸网络是由恶意的行为,通常被称为“僵尸大师”,可以访问和管理僵尸网络远程或通过BOT的代理服务器作为说明的错误!未找到引用源。机器人进行编程和僵尸主的指示执行各种网络攻击,包括涉及进一步的分布与其他信息系统的恶意软件的攻击。

在基于PC的僵尸,僵尸网络的主控制器通常使用HTTP请求与正常的80端口来发送和接收消息。在基于移动僵尸网络,僵尸主也采用类似HTTP技术来发布他们的命令还利用短信、蓝牙、等主机器人利用操作系统和配置漏洞危及智能设备和安装工具。

第一移动恶意软件,被称为Cabir病毒,被发现在2004,也被称为第一个移动蠕虫。第一个手机僵尸网络被发现在2009七月,当一名安全研究人员发现symbos。Yxes或symbos。C(又名性感空间)[12]针对Symbian设备和基于命令和控制简单的HTTP(C&C)。

同年晚些时候,一名安全研究人员发现了中国。B [13],以破解的iPhone 使用类似的机制来symbos.yxes。geinimi,这被认为是第一款Android僵尸网络,是在十二月2010在中国发现。geinimi也实现了类似的基于HTTP的C和C 的加密通信的新增功能。geinimi偷设备的国际移动设备识别码(IMEI)、国际移动用户识别码(IMSI)、GPS坐标、短信、联系人列表等,并将它转发给主机器人。

虽然先进的移动僵尸网络,没有智能手机的主要群体的观察,我们相信这只

是时间的问题。移动僵尸网络显然是严重威胁的最终用户和蜂窝网络。由僵尸网络威胁不断增加。随着越来越多的人使用智能设备,它是分析和探索移动僵尸网络的机制,对于智能设备开发安全解决方案。

一种移动僵尸网络C&C的使用规定的额外的挑战,区别于著名的基于PC的僵尸网络。其中一些主要的挑战包括,其中包括:计算能力,无缝连接,与其他安全的平台网络,便携性和存储敏感数据的数量,以及计算能力的相互连接。基于PC的僵尸网络也使用IRC频道为主要与C的沟通渠道。

基于SMS的C和C的影响,基于IP的C和C,和基于蓝牙的C&C已经解决了[15],而基于P2P的C&C移动僵尸网络进行了分析和讨论[16]。

在放置即调用结果的智能设备的能力,使用短信和彩信等,移动僵尸网络的负担是非常有趣和具有挑战性的因为它打开一个BOT掌握简单的财务收益的门。此外,由于移动电话与运营商和其他网络互动,对关键基础设施的攻击也是可能的。

因此,有可能推出复杂的网络攻击的移动电话网络,将非常难以防止。

检测和防止恶意软件是不是一个简单的任务,作为恶意软件开发人员采用和发明新的策略,以渗透移动设备。恶意软件开发者使用如混淆和加密伪装的恶意软件的迹象,技术先进,从而破坏反病毒软件。

一些移动恶意软件是一个有吸引力的点对病毒和恶意软件开发者的主要原因是:

1。智能设备如智能手机一般无处不在。

2、智能设备的计算能力的提高。他们正在成为几乎一样强大的桌面系统。

3,缺乏对智能设备的威胁和风险,从最终用户的角度看。

4。越狱利用增长/根设备是在iOS和Android设备。

5、每一个智能设备确实是一个表达式的所有者。它提供了一种方法来跟踪用户的活动,因此作为一个单一的网关,我们的数字身份和活动。

6,广泛使用的智能设备操作在一个开放的平台,如安卓,它鼓励开发者和下载的应用程序从两个可信应用程序市场和第三方市场。

考虑到上述的威胁和挑战,一个新的安全解决方案是必不可少的智能设备在智能家庭网络安全。更具体地说,几个关键的研究任务是必需的:1)探讨新的安全体系架构的智能设备在智能家庭;2)重新评估和提高智能设备在智能家庭的安全体系架构。

安卓系统有四层:内核、库(安卓运行库)、应用解决方案和应用层(参见图4)。所以,基本上安卓运行时是一种“胶水”的内核和应用程序。

安卓系统的主要安全功能包括进程和文件系统的隔离;应用程序或代码签名;只读存储器、固件和工厂恢复;以及杀死开关。

然而,与安卓系统的主要安全问题是它严重依赖于最终用户来决定应用程序是否安全。即使谷歌只是在谷歌游戏中添加了一个应用程序的安全层,最终用户还是需要分析并做出最终决定自己是否继续安装与否。到现在为止,最终用户不

能依靠操作系统来保护自己免受恶意软件的保护。

作为谷歌营销策略的一部分,以尽可能大的市场占有率尽可能大的应用提供应用程序,安卓应用发布程序使得开发者很容易开发出安卓应用程序,而且还为恶意应用程序的开发者提供了太多的空间。

恶意应用程序已经成功的被感染的Android市场前,例如恶意软件的应用程序称为droid09允许用户进行银行交易。应用程序需要用户提供银行的细节和技巧,用户通过伪装成合法登录银行网站(钓鱼)。

恶意软件的应用程序变得更加复杂,这些天;他们发现利用软件漏洞或者只是欺骗用户进入系统的新技术和方法。

我们提出了一个多层次的综合安全解决方案的移动智能设备如图5所示。

终端用户:对于终端用户来说,要知道他们的移动设备的安全措施是至关重要的。最终用户应注意以下几点措施:

安装反病毒和反恶意软件解决方案,以保护设备免受恶意软件和病毒。还确保打开自动更新。它已被证明,安装反病毒和反恶意软件是非常有效的,以保护移动设备免受恶意应用程序[ 5,6,17 ]。

安装个人防火墙以保护移动设备接口免受直接攻击和非法访问。移动防火墙的有效性,以增加移动设备的安全性在[18]。

安装有合法联系信息和网站的可信来源的应用程序。由于目前安卓市场(谷歌游戏)不采用认证程序的应用程序,它是由最终用户,以确保他/她只安装可信的应用程序从可信的开发者。

在安装过程中,应用程序正在提示您时,请仔细检查权限。例如,当您安装了一个壁纸应用程序,您觉得它真的需要充分的互联网接入吗?

确保您的操作系统和软件的始终是最新的最新版本和安全补丁需要安装。

安装远程定位、跟踪、锁定、擦除、备份和恢复软件来检索、保护或恢复丢失或被盗的移动设备和设备上的个人数据。

只安装有大量下载和正面评论的应用程序。

在没有密码或加密的公共无线网络上,从来没有查看敏感数据。

在他们的设备中应注意异常行为和活动。

在社交网站上点击链接时应该小心。社交网络上的恶意链接可以是一种非常有效的传播恶意软件的方法。与会者倾向于信任这样的网络,从而愿意点击链接“朋友”社交网站。

移动网络运营商(MNO):MnO也有责任去创造一个更安全的环境,为他们的客户。移动运营商需要安装防病毒和反恶意软件扫描收发短信和彩信的移动网络,许多恶意软件使用短信/彩信传播和接触僵尸主。MnO也要建立全球伙伴关系与相关机构如其他MNO通过交换信息,防止手机恶意软件的传播知识,数据库和专业知识。

应用程序开发人员:开发人员还需要注意在应用程序中实现的安全措施。他们应该确保私人数据不通过加密通道发送;数据必须通过HTTPS或TLS网络。

开发者应该尽量减少使用内置的权限在他们的应用程序,例如不要求充分的互联网接入许可,互联网,除非它是必不可少的,你的应用程序工作正常。Android 100内置权限控制操作,如拨打电话(call_phone),发送短消息(send_sms),等。

在安卓,有三个主要的“安全保护级别”的许可标签:一个“正常”的许可被授予任何应用程序的要求,“危险”的权限只授予用户批准后,在安装时间,和“签名”的许可只授予应用程序签署的应用程序定义的权限标签的应用程序。

在确保不影响第三方应用程序访问Android的可信计算基本的“签名”保护水平积分(TCB)的完整性。

此外,应用程序开发人员只需要收集数据,这是必不可少的,并为应用程序的应用程序,否则将被攻击者篡改。这也是减少包装攻击有用。重新包装的攻击是很常见的方法,其中一个恶意软件开发者下载一个合法的应用程序,修改它包含恶意代码,然后将其重新发布到应用市场下载网站。

结果表明,包装技术是非常有效的主要是因为它往往是客户告诉一个合法的应用程序和恶意的包装形式之间的差异很难。事实上,包装是社会工程攻击使用Android的malwaredevelopers在2011 [17]的前两个季度的最普遍的类型。一个Android恶意软件的特征通常是专为一个具体的用户组。这是非常不可能的安卓用户从俄罗斯被感染的中国恶意软件例如。Android恶意软件通常是通过与特定国家的用户网络罪犯创建为目标,这通常是他们自己的同胞。市场商店:商店需要兽医和严格筛选新的移动应用程序之前,他们可以把在市场。谷歌(谷歌游戏)最近通过在市场上投放市场前筛选新的应用程序,在他们的安全性上取得了显著的改善。应用商店供应商还应考虑每一个应用程序之前,它可以在市场上公布的认证。应用程序应严格审查,以确保应用程序是安全的,从恶意代码,可靠的,执行如预期,并没有明确的和进攻的材料。

五、结论

本文讨论了一种开发的安全解决方案来处理智能设备在智能家庭网络安全的挑战。物联网技术可以扩展到任何地方的任何计算,但也有基本的安全问题,需要正确处理。在不久的将来,移动智能设备的用户可以期待看到一个惊人的增加,恶意软件和显着的进步,在恶意软件相关的攻击,特别是在安卓平台作为用户基础已成倍增长。今天的用户利用他们的移动智能设备从访问电子邮件到敏感的交易,如网上银行和付款。随着用户越来越依赖于他们的移动设备作为数字钱包,这造成了网络罪犯非常有利可图的目标。移动智能设备用户可以期待看到一个显著的恶意软件增加对金融相关的应用,如移动互联网金融。检测和防止恶意软件在移动设备需要全面的,多层次的方法。这项工作是正在进行的研究的一部分,设计和实现智能设备在智能家居环境中的安全模型。我们计划实施和评估在试验台环境包括用于移动恶意软件的蜜网提出了安全解决方案的未来工作。

PLC控制下的电梯系统外文文献翻译、中英文翻译、外文翻译

PLC控制下的电梯系统 由继电器组成的顺序控制系统是最早的一种实现电梯控制的方法。但是,进入九十年代,随着科学技术的发展和计算机技术的广泛应用,人们对电梯的安全性、可靠性的要求越来越高,继电器控制的弱点就越来越明显。 电梯继电器控制系统故障率高,大大降低了电梯的可靠性和安全性,经常造成停梯,给乘用人员带来不便和惊忧。且电梯一旦发生冲顶或蹲底,不但会造成电梯机械部件损坏,还可能出现人身事故。 可编程序控制器(PLC)最早是根据顺序逻辑控制的需要而发展起来的,是专门为工业环境应用而设计的数字运算操作的电子装置。鉴于其种种优点,目前,电梯的继电器控制方式己逐渐被PLC控制所代替。同时,由于电机交流变频调速技术的发展,电梯的拖动方式己由原来直流调速逐渐过渡到了交流变频调速。因此,PLC控制技术加变频调速技术己成为现代电梯行业的一个热点。 1. PLC控制电梯的优点 (1)在电梯控制中采用了PLC,用软件实现对电梯运行的自动控制,可靠性大大提高。 (2)去掉了选层器及大部分继电器,控制系统结构简单,外部线路简化。 (3)PLC可实现各种复杂的控制系统,方便地增加或改变控制功能。 (4) PLC可进行故障自动检测与报警显示,提高运行安全性,并便于检修。 (5)用于群控调配和管理,并提高电梯运行效率。 (6)更改控制方案时不需改动硬件接线。 2.电梯变频调速控制的特点 随着电力电子技术、微电子技术和计算机控制技术的飞速发展,交流变频调速技术的发展也十分迅速。电动机交流变频调速技术是当今节电、改善工艺流程以提高产品质量和改善环境、推动技术进步的一种主要手段。变频调速以其优异的调速性能和起制动平稳性能、高效率、高功率因数和节电效果,广泛的适用范围及其它许多优点而被国内外公认为最有发展前途的调速方式 交流变频调速电梯的特点 ⑴能源消耗低 ⑵电路负载低,所需紧急供电装置小 在加速阶段,所需起动电流小于2.5倍的额定电流。且起动电流峰值时间短。由于起动电流大幅度减小,故功耗和供电缆线直径可减小很多。所需的紧急供电

电子信息工程外文翻译外文文献英文文献微处理器

外文资料 所译外文资料: 1. 作者G..Bouwhuis, J.Braat, A.Huijser 2. 书名:Principles of Optical Disk Systems 3. 出版时间:1991年9月 4. 所译章节:Session 2/Chapter9, Session 2/Chapter 11 原文: Microprocessor One of the key inventions in the history of electronics, and in fact one of the most important inventions ever period, was the transistor. As time progressed after the inven ti on of LSI in tegrated circuits, the tech no logy improved and chips became smaller, faster and cheaper. The functions performed by a processor were impleme nted using several differe nt logic chips. In tel was the first compa ny to in corporate all of these logic comp onents into a si ngle chip, this was the first microprocessor. A microprocessor is a complete computati on engine that is fabricated on a sin gle chip. A microprocessor executes a collecti on of machi ne in struct ions that tell the processor what to do. Based on the in struct ions, a microprocessor does three basic things: https://www.360docs.net/doc/d92215529.html,ing the ALU (Arithmetic/Logic Unit), a microprocessor can perform mathematical operatio ns like additi on, subtract ion, multiplicatio n and divisi on; 2.A microprocessor can move data from one memory location to another; 3.A microprocessor can make decisi ons and jump to a new set of in struct ions based on those decisi ons. There may be very sophisticated things that a microprocessor does, but those are its three basic activities. Microprocessor has an address bus that sends an address to memory, a data bus that can send data to memory or receive data from memory, an RD(read) and WR(write) line that lets a clock pulse sequenee the processor and a reset li ne that resets the program coun ter to zero(or whatever) and restarts executi on. And let ' s assume that both the address and data buses are 8 bits wide here. Here are the comp onents of this simple microprocessor: 1. Registers A, B and C are simply latches made out of flip-flops. 2. The address latch is just like registers A, B and C. 3. The program coun ter is a latch with the extra ability to in creme nt by 1 whe n told to do so, and also to reset to zero whe n told to do so. 4. The ALU could be as simple as an 8-bit adder, or it might be able to add, subtract, multiply and divide 8- bit values. Let ' s assume the latter here. 5. The test register is a special latch that can hold values from comparisons performed in the ALU. An ALU can normally compare two numbers send determine if they are equal, if one is greater

土木工程外文翻译

转型衰退时期的土木工程研究 Sergios Lambropoulosa[1], John-Paris Pantouvakisb, Marina Marinellic 摘要 最近的全球经济和金融危机导致许多国家的经济陷入衰退,特别是在欧盟的周边。这些国家目前面临的民用建筑基础设施的公共投资和私人投资显著收缩,导致在民事特别是在民用建筑方向的失业。因此,在所有国家在经济衰退的专业发展对于土木工程应届毕业生来说是努力和资历的不相称的研究,因为他们很少有机会在实践中积累经验和知识,这些逐渐成为过时的经验和知识。在这种情况下,对于技术性大学在国家经济衰退的计划和实施的土木工程研究大纲的一个实质性的改革势在必行。目的是使毕业生拓宽他们的专业活动的范围,提高他们的就业能力。 在本文中,提出了土木工程研究课程的不断扩大,特别是在发展的光毕业生的潜在的项目,计划和投资组合管理。在这个方向上,一个全面的文献回顾,包括ASCE体为第二十一世纪,IPMA的能力的基础知识,建议在其他:显著增加所提供的模块和项目管理在战略管理中添加新的模块,领导行为,配送管理,组织和环境等;提供足够的专业训练五年的大学的研究;并由专业机构促进应届大学生认证。建议通过改革教学大纲为土木工程研究目前由国家技术提供了例证雅典大学。 1引言 土木工程研究(CES)蓬勃发展,是在第二次世界大战后。土木工程师的出现最初是由重建被摧毁的巨大需求所致,目的是更多和更好的社会追求。但是很快,这种演变一个长期的趋势,因为政府为了努力实现经济发展,采取了全世界的凯恩斯主义的理论,即公共基础设施投资作为动力。首先积极的结果导致公民为了更好的生活条件(住房,旅游等)和增加私人投资基础设施而创造机会。这些现象再国家的发展中尤为为明显。虽然前景并不明朗(例如,世界石油危机在70年代),在80年代领先的国家采用新自由主义经济的方法(如里根经济政策),这是最近的金融危机及金融危机造成的后果(即收缩的基础设施投资,在技术部门的高失业率),消除发展前途无限的误区。 技术教育的大学所认可的大量研究土木工程部。旧学校拓展专业并且新的学校建成,并招收许多学生。由于高的职业声望,薪酬,吸引高质量的学校的学生。在工程量的增加和科学技术的发展,导致到极强的专业性,无论是在研究还是工作当中。结构工程师,液压工程师,交通工程师等,都属于土木工程。试图在不同的国家采用专业性的权利,不同的解决方案,,从一个统一的大学学历和广泛的专业化的一般职业许可证。这个问题在许多其他行业成为关键。国际专业协会的专家和机构所确定的国家性检查机构,经过考试后,他们证明不仅是行业的新来者,而且专家通过时间来确定进展情况。尽管在很多情况下,这些证书虽然没有国家接受,他们赞赏和公认的世界。 在试图改革大学研究(不仅在土木工程)更接近市场需求的过程中,欧盟确定了1999博洛尼亚宣言,它引入了一个二能级系统。第一级度(例如,一个三年的学士)是进入

电子技术专业英语翻译

基本电路 包括电路模型的元素被称为理想的电路元件。一个理想的电路元件是一个实际的电气元件的数学模型,就像一个电池或一个灯泡。重要的是为理想电路元件在电路模型用来表示实际的电气元件的行为可接受程度的准确性。电路分析,本单位的重点,这些工具,然后应用电路。电路分析基础上的数学方法,是用来预测行为的电路模型和其理想的电路元件。一个所期望的行为之间的比较,从设计规范,和预测的行为,形成电路分析,可能会导致电路模型的改进和理想的电路元件。一旦期望和预测的行为是一致的,可以构建物理原型。 物理原型是一个实际的电气系统,修建从实际电器元件。测量技术是用来确定实际的物理系统,定量的行为。实际的行为相比,从设计规范的行为,从电路分析预测的行为。比较可能会导致在物理样机,电路模型,或两者的改进。最终,这个反复的过程,模型,组件和系统的不断完善,可能会产生较准确地符合设计规范的设计,从而满足需要。 从这样的描述,它是明确的,在设计过程中,电路分析中起着一个非常重要的作用。由于电路分析应用电路模型,执业的工程师尝试使用成熟的电路模型,使设计满足在第一次迭代的设计规范。在这个单元,我们使用20至100年已测试通过机型,你可以认为他们是成熟的。能力模型与实际电力系统理想的电路元件,使电路理论的工程师非常有用的。 说理想电路元件的互连可用于定量预测系统的行为,意味着我们可以用数学方程描述的互连。对于数学方程是有用的,我们必须写他们在衡量的数量方面。在电路的情况下,这些数量是电压和电流。电路分析的研究,包括了解其电压和电流和理解上的电压施加的限制,目前互连的理想元素的每一个理想的电路元件的行为电路分析基础上的电压和电流的变量。电压是每单位电荷,电荷分离所造成的断电和SI单位伏V = DW / DQ。电流是电荷的流动速度和具有的安培SI单位(I= DQ/ DT)。理想的基本电路元件是两个终端组成部分,不能细分,也可以在其终端电压和电流的数学描述。被动签署公约涉及元素,当电流通过元素的参考方向是整个元素的参考电压降的方向端子的电压和电流的表达式使用一个积极的迹象。 功率是单位时间内的能量和平等的端电压和电流的乘积;瓦SI单位。权力的代数符号解释如下: 如果P> 0,电源被传递到电路或电路元件。 如果p<0,权力正在从电路或电路元件中提取。 在这一章中介绍的电路元素是电压源,电流源和电阻器。理想电压源保持一个规定的电压,不论当前的设备。理想电流源保持规定的电流不管了整个设备的电压。电压和电流源是独立的,也就是说,不是任何其他电路的电流或电压的影响;或依赖,就是由一些电路中的电流或电压。一个电阻制约了它的电压和电流成正比彼此。有关的比例常数电压和一个电阻值称为其电阻和欧姆测量。 欧姆定律建立相称的电压和电流的电阻。具体来说,V = IR电阻的电流流动,如果在它两端的电压下降,或V=_IR方向,如果在该电阻的电流流是在它两端的电压上升方向。 通过结合对权力的方程,P = VI,欧姆定律,我们可以判断一个电阻吸收的功率:P = I2R= U2/ R 电路节点和封闭路径。节点是一个点,两个或两个以上的电路元件加入。当只有两个元素连接,形成一个节点,他们表示将在系列。一个闭合的路径是通过连接元件追溯到一个循环,起点和终点在同一节点,只有一次每遇到中间节点。 电路是说,要解决时,两端的电压,并在每个元素的电流已经确定。欧姆定律是一个重要的方程,得出这样的解决方案。 在简单的电路结构,欧姆定律是足以解决两端的电压,目前在每一个元素。然而,对于更复杂的互连,我们需要使用两个更为重要的代数关系,被称为基尔霍夫定律,来解决所有的电压和电流。 基尔霍夫电流定律是: 在电路中的任何一个节点电流的代数和等于零。 基尔霍夫电压定律是: 电路中的任何封闭路径上的电压的代数和等于零。 1.2电路分析技术 到目前为止,我们已经分析应用结合欧姆定律基尔霍夫定律电阻电路相对简单。所有的电路,我们可以使用这种方法,但因为他们而变得结构更为复杂,涉及到越来越多的元素,这种直接的方法很快成为累赘。在这一课中,我们介绍两个电路分析的强大的技术援助:在复杂的电路结构的分析节点电压的方法,并网电流的方

计算机专业外文文献及翻译

微软Visual Studio 1微软Visual Studio Visual Studio 是微软公司推出的开发环境,Visual Studio可以用来创建Windows平台下的Windows应用程序和网络应用程序,也可以用来创建网络服务、智能设备应用程序和Office 插件。Visual Studio是一个来自微软的集成开发环境IDE,它可以用来开发由微软视窗,视窗手机,Windows CE、.NET框架、.NET精简框架和微软的Silverlight支持的控制台和图形用户界面的应用程序以及Windows窗体应用程序,网站,Web应用程序和网络服务中的本地代码连同托管代码。 Visual Studio包含一个由智能感知和代码重构支持的代码编辑器。集成的调试工作既作为一个源代码级调试器又可以作为一台机器级调试器。其他内置工具包括一个窗体设计的GUI应用程序,网页设计师,类设计师,数据库架构设计师。它有几乎各个层面的插件增强功能,包括增加对支持源代码控制系统(如Subversion和Visual SourceSafe)并添加新的工具集设计和可视化编辑器,如特定于域的语言或用于其他方面的软件开发生命周期的工具(例如Team Foundation Server的客户端:团队资源管理器)。 Visual Studio支持不同的编程语言的服务方式的语言,它允许代码编辑器和调试器(在不同程度上)支持几乎所有的编程语言,提供了一个语言特定服务的存在。内置的语言中包括C/C + +中(通过Visual C++),https://www.360docs.net/doc/d92215529.html,(通过Visual https://www.360docs.net/doc/d92215529.html,),C#中(通过Visual C#)和F#(作为Visual Studio 2010),为支持其他语言,如M,Python,和Ruby等,可通过安装单独的语言服务。它也支持的 XML/XSLT,HTML/XHTML ,JavaScript和CSS.为特定用户提供服务的Visual Studio也是存在的:微软Visual Basic,Visual J#、Visual C#和Visual C++。 微软提供了“直通车”的Visual Studio 2010组件的Visual Basic和Visual C#和Visual C + +,和Visual Web Developer版本,不需任何费用。Visual Studio 2010、2008年和2005专业版,以及Visual Studio 2005的特定语言版本(Visual Basic、C++、C#、J#),通过微软的下载DreamSpark计划,对学生免费。 2架构 Visual Studio不支持任何编程语言,解决方案或工具本质。相反,它允许插入各种功能。特定的功能是作为一个VS压缩包的代码。安装时,这个功能可以从服务器得到。IDE提供三项服务:SVsSolution,它提供了能够列举的项目和解决方案; SVsUIShell,它提供了窗口和用户界面功能(包括标签,工具栏和工具窗口)和SVsShell,它处理VS压缩包的注册。此外,IDE还可以负责协调和服务之间实现通信。所有的编辑器,设计器,项目类型和其他工具都是VS压缩包存在。Visual Studio 使用COM访问VSPackage。在Visual Studio SDK中还包括了管理软件包框架(MPF),这是一套管理的允许在写的CLI兼容的语言的任何围绕COM的接口。然而,MPF并不提供所有的Visual Studio COM 功能。

伺服电机外文文献翻译

伺服电机 1. 伺服电机的定义 伺服电动机又称执行电动机,在自动控制系统中,用作执行元件,把所收到的电信号转换成电动机轴上的角位移或角速度输出。分为直流和交流伺服电动机两大类,其主要特点是,当信号电压为零时无自转现象,转速随着转矩的增加而匀速下降。伺服电机在伺服系统中控制机械元件运转的发动机. 是一种补助马达间接变速装置。伺服电机可使控制速度, 位置精度非常准确。将电压信号转化为转矩和转速以驱动控制对象。转子转速受输入信号控制,并能快速反应,在自动控制系统中作执行元件,且具有机电时间常数小、线性度高、始动电压低等特点。 2. 伺服电机工作原理 1.伺服主要靠脉冲来定位,基本上可以这样理解,伺服电机接收到1 个脉冲,就会旋转1 个脉冲对应的角度,从而实现位移,因为,伺服电机本身具备发出脉冲的功能,所以伺服电机每旋转一个角度,都会发出对应数量的脉冲,这样,和伺服电机接受的脉冲形成了呼应,或者叫闭环,如此一来,系统就会知道发了多少脉冲给伺服电机,同时又收了多少脉冲回来,这样,就能够很精确的控制电机的转动,从而实现精确的定位,可以达到0.001mm有刷电机成本低,结构简单,启动转矩大,调速范围宽,控制容易,需要维护,但维护方便(换碳刷),产生电磁干扰,对环境有要求。无刷电机体积小,重量轻,出力大,响应快,速度高,惯量小,转动平滑,力矩稳定。控制复杂,容易实现智能化,其电子换相方式灵活,可以方波换相或正弦波换相。电机免维护,效率很高,运行温度低,电磁辐射很小,长寿命,可用于各种环境。 2. 交流伺服电机也是无刷电机,分为同步和异步电机,目前运动控制中一般都用同步电机,它的功率范围大,可以做到很大的功率。大惯量,最高转动速度低,且随着功率增大而快速降低。因而适合做低速平稳运行的应用。 3. 永磁交流伺服电动机简介 20 世纪80 年代以来,随着集成电路、电力电子技术和交流可变速驱动技术的发展,永磁交流伺服驱动技术有了突出的发展,各国著名电气厂商相继推出各自的交流伺服电动机和伺服驱动器系列产品并不断完善和更新。交流伺服系统已成为当代高性能伺服系统的主要发展方向,使原来的直流伺服面临被淘汰的危机。90 年代以后,世界各国已经商品化了的交流伺服系统是采用全数字控制的正弦

电子信息工程专业课程翻译中英文对照表

电子信息工程专业课程名称中英文翻译对照 (2009级培养计划)

实践环节翻译 高等数学Advanced Mathematics

大学物理College Physics 线性代数Linear Algebra 复变函数与积分变换Functions of Complex Variable and Integral Transforms 概率论与随机过程Probability and Random Process 物理实验Experiments of College Physics 数理方程Equations of Mathematical Physics 电子信息工程概论Introduction to Electronic and Information Engineering 计算机应用基础Fundamentals of Computer Application 电路原理Principles of Circuit 模拟电子技术基础Fundamentals of Analog Electronics 数字电子技术基础Fundamentals of Digital Electronics C语言程序设计The C Programming Language 信息论基础Fundamentals of Information Theory 信号与线性系统Signals and Linear Systems 微机原理与接口技术Microcomputer Principles and Interface Technology 马克思主义基本原理Fundamentals of Marxism 思想、理论和“三个代表” 重要思想概论 Thoughts of Mao and Deng 中国近现代史纲要Modern Chinese History 思想道德修养与法律基 础 Moral Education & Law Basis 形势与政策Situation and Policy 英语College English 体育Physical Education 当代世界经济与政治Modern Global Economy and Politics 卫生健康教育Health Education 心理健康知识讲座Psychological Health Knowledge Lecture 公共艺术课程Public Arts 文献检索Literature Retrieval 军事理论Military Theory 普通话语音常识及训练Mandarin Knowledge and Training 大学生职业生涯策划 (就业指导) Career Planning (Guidance of Employment ) 专题学术讲座Optional Course Lecture 科技文献写作Sci-tech Document Writing 高频电子线路High-Frequency Electronic Circuits 通信原理Communications Theory 数字信号处理Digital Signal Processing 计算机网络Computer Networks 电磁场与微波技术Electromagnetic Field and Microwave Technology 现代通信技术Modern Communications Technology

土木工程外文翻译.doc

项目成本控制 一、引言 项目是企业形象的窗口和效益的源泉。随着市场竞争日趋激烈,工程质量、文明施工要求不断提高,材料价格波动起伏,以及其他种种不确定因素的影响,使得项目运作处于较为严峻的环境之中。由此可见项目的成本控制是贯穿在工程建设自招投标阶段直到竣工验收的全过程,它是企业全面成本管理的重要环节,必须在组织和控制措施上给于高度的重视,以期达到提高企业经济效益的目的。 二、概述 工程施工项目成本控制,指在项目成本在成本发生和形成过程中,对生产经营所消耗的人力资源、物资资源和费用开支,进行指导、监督、调节和限制,及时预防、发现和纠正偏差从而把各项费用控制在计划成本的预定目标之内,以达到保证企业生产经营效益的目的。 三、施工企业成本控制原则 施工企业的成本控制是以施工项目成本控制为中心,施工项目成本控制原则是企业成本管理的基础和核心,施工企业项目经理部在对项目施工过程进行成本控制时,必须遵循以下基本原则。 3.1 成本最低化原则。施工项目成本控制的根本目的,在于通过成本管理的各种手段,促进不断降低施工项目成本,以达到可能实现最低的目标成本的要求。在实行成本最低化原则时,应注意降低成本的可能性和合理的成本最低化。一方面挖掘各种降低成本的能力,使可能性变为现实;另一方面要从实际出发,制定通过主观努力可能达到合理的最低成本水平。 3.2 全面成本控制原则。全面成本管理是全企业、全员和全过程的管理,亦称“三全”管理。项目成本的全员控制有一个系统的实质性内容,包括各部门、各单位的责任网络和班组经济核算等等,应防止成本控制人人有责,人人不管。项目成本的全过程控制要求成本控制工作要随着项目施工进展的各个阶段连续 进行,既不能疏漏,又不能时紧时松,应使施工项目成本自始至终置于有效的控制之下。 3.3 动态控制原则。施工项目是一次性的,成本控制应强调项目的中间控制,即动态控制。因为施工准备阶段的成本控制只是根据施工组织设计的具体内容确

电力电子技术外文翻译

外文翻译 题目:电力电子技术二 A部分 晶闸管 在晶闸管的工作状态,电流从阳极流向阴极。在其关闭状态,晶闸管可以阻止正向 导电,使其不能运行。 可触发晶闸管能使导通状态的正向电流在短时间内使设备处于阻断状态。使正向电压下降到只有导通状态的几伏(通常为1至3伏电压依赖于阻断电压的速度)。 一旦设备开始进行,闸极电流将被隔离。晶闸管不可能被闸关闭,但是可以作为一个二极管。在电路的中,只有当电流处于消极状态,才能使晶闸管处于关闭状态,且电流降为零。在设备运行的时间内,允许闸在运行的控制状态直到器件在可控时间再次进入正向阻断状态。 在逆向偏置电压低于反向击穿电压时,晶闸管有微乎其微的漏电流。通常晶闸管的正向额定电压和反向阻断电压是相同的。晶闸管额定电流是在最大范围指定RMS和它是有能力进行平均电流。同样的对于二极管,晶闸管在分析变流器的结构中可以作为理想的设备。在一个阻性负载电路中的应用中,可以控制运行中的电流瞬间传至源电压的正半周期。当晶闸管尝试逆转源电压变为负值时,其理想化二极管电流立刻变成零。 然而,按照数据表中指定的晶闸管,其反向电流为零。在设备不运行的时间中,电流为零,重要的参数变也为零,这是转弯时间区间从零交叉电流电压的参

考。晶闸管必须保持在反向电压,只有在这个时间,设备才有能力阻止它不是处于正向电压导通状态。 如果一个正向电压应用于晶闸管的这段时间已过,设备可能因为过早地启动并有可能导致设备和电路损害。数据表指定晶闸管通过的反向电压在这段期间和超出这段时间外的一个指定的电压上升率。这段期间有时被称为晶闸管整流电路的周期。 根据使用要求,各种类型的晶闸管是可得到的。在除了电压和电流的额定率,转弯时间,和前方的电压降以及其他必须考虑的特性包括电流导通的上升率和在关闭状态的下降率。 1。控制晶闸管阶段。有时称为晶闸管转换器,这些都是用来要是整顿阶段,如为直流和交流电机驱动器和高压直流输电线路应用的电压和电流的驱动。主要设备要求是在大电压、电流导通状态或低通态压降中。这类型的晶闸管的生产晶圆直径到10厘米,其中平均电流目前大约是4000A,阻断电压为5之7KV。 2。逆变级的晶闸管。这些设计有小关断时间,除了低导通状态电压,虽然在设备导通状态电压值较小,可设定为2500V和1500A。他们的关断时间通常在几微秒范围到100μs之间,取决于其阻断电压的速率和通态压降。 3。光控晶闸管。这些会被一束脉冲光纤触发使其被引导到一个特殊的敏感的晶闸管地区。光化的晶闸管触发,是使用在适当波长的光的对硅产生多余的电子空穴。这些晶闸管的主要用途是应用在高电压,如高压直流系统,有许多晶闸管被应用在转换器阀门上。光控晶闸管已经发现的等级,有4kV的3kA,导通状态电压2V、光触发5毫瓦的功率要求。 还有其它一些晶闸管,如辅助型关断晶闸管(关贸总协定),这些晶闸管其他变化,不对称硅可控(ASCR)和反向进行,晶闸管(RCT)的。这些都是应用。 B部分 功率集成电路 功率集成电路的种类 现代半导体功率控制相当数量的电路驱动,除了电路功率器件本身。这些控制电路通常由微处理器控制,其中包括逻辑电路。这种在同一芯片上包含或作

计算机科学与技术设计论文外文翻译

本科毕业设计(论文)外文翻译(附外文原文) 系 ( 院 ):信息科学与工程学院 课题名称:学生信息管理系统 专业(方向):计算机科学与技术(应用)

7.1 Enter ActionMappings The Model 2 architecture (see chapter 1) encourages us to use servlets and Java- Server Pages in the same application. Under Model 2, we start by calling a servlet. The servlet handles the business logic and directs control to the appropriate page to complete the response. The web application deployment descriptor (web.xml) lets us map a URL pattern to a servlet. This can be a general pattern, like *.do, or a specific path, like saveRecord.do. Some applications implement Model 2 by mapping a servlet to each business operation. This approach works, but many applications involve dozens or hundreds of business operations. Since servlets are multithreaded, instantiating so manyservlets is not the best use of server resources. Servlets are designed to handle any number of parallel requests. There is no performance benefit in simply creating more and more servlets. The servlet’s primary job is to interact with the container and HTTP. Handling a business operation is something that a servlet could delegate to another component. Struts does this by having the ActionServlet delegate the business operation to an object. Using a servlet to receive a request and route it to a handler is known as the Front Controller pattern [Go3]. Of course, simply delegating the business operation to another component does not solve the problem of mapping URIs [W3C, URI] to business operations. Our only way of communicating with a web browser is through HTTP requests and URIs. Arranging for a URI to trigger a business operation is an essential part of developing a web application. Meanwhile, in practice many business operations are handled in similar ways. Since Java is multithreaded, we could get better use of our server resources if we could use the same Action object to handle similar operations. But for this to work, we might need to pass the object a set of configuration parameters to use with each operation. So what’s the bottom line? To implement Model 2 in an efficient and flexible way, we need to: Enter ActionMappings 195

双闭环直流调速系统外文翻译

对直流电机的速度闭环控制系统的设计 钟国梁 机械与汽车工程学院华南理工大学 中国,广州510640 电子邮件:zhgl2chl@https://www.360docs.net/doc/d92215529.html, 机械与汽车工程学院 华南理工大学 中国,广州510640 江梁中 电子邮件:jianglzh88@https://www.360docs.net/doc/d92215529.html, 该研究是由广州市科技攻关项目赞助(No.2004A10403006)。(赞助信息) 摘要 本文介绍了直流电机的速度控制原理,阐述了速度控制PIC16F877单片机作为主控元件,利用捕捉模块的特点,比较模块和在PIC16F877单片机模数转换模块将触发电路,并给出了程序流程图。系统具有许多优点,包括简单的结构,与主电路同步,稳定的移相和足够的移相范围,10000步控制的角度,对电动机的无级平滑控制,陡脉冲前沿,足够的振幅值,设定脉冲宽度,良好的稳定性和抗干扰性,并且成本低廉,这速度控制具有很好的实用价值,系统可以容易地实现。 关键词:单片机,直流电机的速度控制,控制电路,PI控制算法

1.简介 电力电子技术的迅速发展使直流电机的转速控制逐步从模拟转向数字,目前,广泛采用晶闸管直流调速传动系统设备(如可控硅晶闸管,SCR )在电力拖动控制系统对电机供电已经取代了笨重的F-D 发电机电动机系统,尤其是单片机技术的应用使速度控制直流电机技术进入一个新阶段。在直流调速系统中,有许多各种各样的控制电路。单片机具有高性能,体积小,速度快,优点很多,价格便宜和可靠的稳定性,广泛的应用和强劲的流通,它可以提高控制能力和履行的要求实时控制(快速反应)。控制电路采用模拟或数字电路可以实现单片机。在本文中,我们将介绍一种基于单片机PIC16F877单片机的直流电机速度控制系统的分类。 2.直流电机的调速原理 在图1中,电枢电压a U ,电枢电流a I ,电枢回路总电阻a R ,电机 常数a C 和励磁磁通Φ,根据KVL 方程,电机的转速为 Φ-= a a a a C R I U n a pN C 60= a a a a U R I U ≈- )1(63.0)(84.0)1()1()()1()(10--+-=--+-=k e k e k T k e a k e a k T k T d d d d i l T T Tf Kp a T T Kp a +==+ =10)1(

电子信息工程外文翻译 外文文献 英文文献

电子信息工程电路编程中的AT89C51单片机 译文标题电路编程中的AT89C51单片机 AT89C51 In-Circuit Programming 原文标题 作者Robert W.Sparks等译名国籍美国斯帕克等W.罗伯特 Atmel Corporation 原文出处 摘要本应用说明的是ATMEL公司AT89C51的电路可编程闪存的微控制器。为在电路可编程AT89C51的应用提出了与应用程序相关的例子,它的修改要求支持在线编程。这种方法显示在该应用程序中的AT89C51单片机可通过商业电话线远程改编。本应用笔记中描述的电路,仅支持5伏电压下编程,需要使用一个AT89C51-XX-5。标准A T89C51的需要12伏电压。该应用程序的软件可从ATMEL下载。 总论 当不在进行程序设计的时候,在电路设计中的AT89C51设计将变得透明化。 在编程期间必须重视EA/VPP这一脚。在不使用外部程序存储器的应用程序中,这脚可能会永久接到VCC。应用程序使用的外部程序存储器要求这一脚为低电平才能正常运行。 RST在编程期间必须为高电平。应该提供一种方法使得电路通入电源以后,使RST代替主要的复位电路起到复位的作用。 在编程过程中,PSEN必须保持低电平,在正常运行期间绝不能使用。ALE/ PRO在编程过程中输出低电平,在正常运行期间绝不能使用 在编程过程中AT89C5I / 端口是用于模式应用程序,地址和数据选择的,可能要该控制器从应用的电路隔离。如何做到这一点取决于应用程序 输入端 在编程过程中,控制器必须与应用电路的信号来源隔离。带有三个输出状态的缓冲区在应用程序之间插入电路和控制器,同时在编程时缓冲区输出三种状态。一个多路复用器用于信号源之间进行选择,适用于任何一方的应用电路或编程控制器电路的信号 输出端 如果应用的电路可以允许端口在编程过程中的状态变化,则不需要改变电路。如果应电路的状态,必须事先在编程过程中的保持不变,可能在控制器和应用电路中插入锁存。存在编程期间是可用的,并保存应用程序的电路状态 应用实 如所示应用是AT89C5一个移动的显示情况。此应用程序有在电路重新编程时结果以图表的形式显示的简单能力。文本显示被设计作为其硬件的一部分,不能在无改编况下变化 显示的文本可DI开关选择两种模式之一中进行。在第一种模式的时候,进入个字符从右边显示和快速移动,通过每个元素显示其在最后的装配位置的左侧。 第二个模式,信息在信息窗口中右到左移动显示。这种模式与常常在股票价格的显示所使用的方法类似 输出包括四DL14141段的积分解码器和驱动程序的字母数字显示器。这就生1名显示元素,每个数字0-的显示能力,是大写字母,标点符号和一些字符。可示字符ASCII码范围20H-5F上电复位电路和一6 MH的晶体振荡器完成应用件程序。无论外部程序存储器或外部数据存储器都时可用的

土木工程外文文献翻译

专业资料 学院: 专业:土木工程 姓名: 学号: 外文出处:Structural Systems to resist (用外文写) Lateral loads 附件:1.外文资料翻译译文;2.外文原文。

附件1:外文资料翻译译文 抗侧向荷载的结构体系 常用的结构体系 若已测出荷载量达数千万磅重,那么在高层建筑设计中就没有多少可以进行极其复杂的构思余地了。确实,较好的高层建筑普遍具有构思简单、表现明晰的特点。 这并不是说没有进行宏观构思的余地。实际上,正是因为有了这种宏观的构思,新奇的高层建筑体系才得以发展,可能更重要的是:几年以前才出现的一些新概念在今天的技术中已经变得平常了。 如果忽略一些与建筑材料密切相关的概念不谈,高层建筑里最为常用的结构体系便可分为如下几类: 1.抗弯矩框架。 2.支撑框架,包括偏心支撑框架。 3.剪力墙,包括钢板剪力墙。 4.筒中框架。 5.筒中筒结构。 6.核心交互结构。 7. 框格体系或束筒体系。 特别是由于最近趋向于更复杂的建筑形式,同时也需要增加刚度以抵抗几力和地震力,大多数高层建筑都具有由框架、支撑构架、剪力墙和相关体系相结合而构成的体系。而且,就较高的建筑物而言,大多数都是由交互式构件组成三维陈列。 将这些构件结合起来的方法正是高层建筑设计方法的本质。其结合方式需要在考虑环境、功能和费用后再发展,以便提供促使建筑发展达到新高度的有效结构。这并

不是说富于想象力的结构设计就能够创造出伟大建筑。正相反,有许多例优美的建筑仅得到结构工程师适当的支持就被创造出来了,然而,如果没有天赋甚厚的建筑师的创造力的指导,那么,得以发展的就只能是好的结构,并非是伟大的建筑。无论如何,要想创造出高层建筑真正非凡的设计,两者都需要最好的。 虽然在文献中通常可以见到有关这七种体系的全面性讨论,但是在这里还值得进一步讨论。设计方法的本质贯穿于整个讨论。设计方法的本质贯穿于整个讨论中。 抗弯矩框架 抗弯矩框架也许是低,中高度的建筑中常用的体系,它具有线性水平构件和垂直构件在接头处基本刚接之特点。这种框架用作独立的体系,或者和其他体系结合起来使用,以便提供所需要水平荷载抵抗力。对于较高的高层建筑,可能会发现该本系不宜作为独立体系,这是因为在侧向力的作用下难以调动足够的刚度。 我们可以利用STRESS,STRUDL 或者其他大量合适的计算机程序进行结构分析。所谓的门架法分析或悬臂法分析在当今的技术中无一席之地,由于柱梁节点固有柔性,并且由于初步设计应该力求突出体系的弱点,所以在初析中使用框架的中心距尺寸设计是司空惯的。当然,在设计的后期阶段,实际地评价结点的变形很有必要。 支撑框架 支撑框架实际上刚度比抗弯矩框架强,在高层建筑中也得到更广泛的应用。这种体系以其结点处铰接或则接的线性水平构件、垂直构件和斜撑构件而具特色,它通常与其他体系共同用于较高的建筑,并且作为一种独立的体系用在低、中高度的建筑中。

电动汽车电子技术中英文对照外文翻译文献

(文档含英文原文和中文翻译) 中英文资料外文翻译 原文: As the world energy crisis, and the war and the energy consumption of oil -- and are full of energy, in one day, someday it will disappear without a trace. Oil is not in resources. So in oil consumption must be clean before finding a replacement. With the development of science and technology the progress of

the society, people invented the electric car. Electric cars will become the most ideal of transportation. In the development of world each aspect is fruitful, especially with the automobile electronic technology and computer and rapid development of the information age. The electronic control technology in the car on a wide range of applications, the application of the electronic device, cars, and electronic technology not only to improve and enhance the quality and the traditional automobile electrical performance, but also improve the automobile fuel economy, performance, reliability and emissions purification. Widely used in automobile electronic products not only reduces the cost and reduce the complexity of the maintenance. From the fuel injection engine ignition devices, air control and emission control and fault diagnosis to the body auxiliary devices are generally used in electronic control technology, auto development mainly electromechanical integration. Widely used in automotive electronic control ignition system mainly electronic control fuel injection system, electronic control ignition system, electronic control automatic transmission, electronic control (ABS/ASR) control system,

相关文档
最新文档