(9)外文翻译

合集下载

外文文献翻译(图片版)

外文文献翻译(图片版)

本科毕业论文外文参考文献译文及原文学院经济与贸易学院专业经济学(贸易方向)年级班别2007级 1 班学号3207004154学生姓名欧阳倩指导教师童雪晖2010 年 6 月 3 日目录1 外文文献译文(一)中国银行业的改革和盈利能力(第1、2、4部分) (1)2 外文文献原文(一)CHINA’S BANKING REFORM AND PROFITABILITY(Part 1、2、4) (9)1概述世界银行(1997年)曾声称,中国的金融业是其经济的软肋。

当一国的经济增长的可持续性岌岌可危的时候,金融业的改革一直被认为是提高资金使用效率和消费型经济增长重新走向平衡的必要(Lardy,1998年,Prasad,2007年)。

事实上,不久前,中国的国有银行被视为“技术上破产”,它们的生存需要依靠充裕的国家流动资金。

但是,在银行改革开展以来,最近,强劲的盈利能力已恢复到国有商业银行的水平。

但自从中国的国有银行在不久之前已经走上了改革的道路,它可能过早宣布银行业的改革尚未取得完全的胜利。

此外,其坚实的财务表现虽然强劲,但不可持续增长。

随着经济增长在2008年全球经济衰退得带动下已经开始软化,银行预计将在一个比以前更加困难的经济形势下探索。

本文的目的不是要评价银行业改革对银行业绩的影响,这在一个完整的信贷周期后更好解决。

相反,我们的目标是通过审查改革的进展和银行改革战略,并分析其近期改革后的强劲的财务表现,但是这不能完全从迄今所进行的改革努力分离。

本文有三个部分。

在第二节中,我们回顾了中国的大型国有银行改革的战略,以及其执行情况,这是中国银行业改革的主要目标。

第三节中分析了2007年的财务表现集中在那些在市场上拥有浮动股份的四大国有商业银行:中国工商银行(工商银行),中国建设银行(建行),对中国银行(中银)和交通银行(交通银行)。

引人注目的是中国农业银行,它仍然处于重组上市过程中得适当时候的后期。

第四节总结一个对银行绩效评估。

英文翻译模板

英文翻译模板

江西理工大学应用科学院院毕业设计(论文)外文资料翻译系:信息工程系专业:计算机班级:072班姓名:熊聪聪学号: 5号附件: 1.外文资料翻译译文;2.外文原文。

注:请将该封面与附件装订成册。

基于DirectX和C#的3D游戏引擎编程介绍导言介绍3D游戏引擎设计使用DirectX 9和C#说明了创建一个简单的3D游戏引擎的过程。

在这个过程中,作者演示了琳哈里森通过DirectX 9的鲜明例子说明和软件的许多方面。

纵观本书中,您将开发一个越野赛车游戏带来的大场景,环境影响,并发挥物理管理等功能。

写游戏,你将使用最先进的技术,C#和DirectX和。

NET框架,而且你会超越简单的图形,探索音频,用户输入,人工智能和多人的设计。

第一章:概述这一章看看几种不同类型的游戏引擎,以及游戏和游戏引擎之间的区别。

游戏引擎的设计比游戏本身里的硬编码渲染和游戏逻辑需要更多的考量。

好处是,对底层技术更好的重用性以及总体设计的清晰性。

第二章:用户接口游戏的用户接口提供输出给玩家信息和获取玩家命令的方法。

这一章研究显示信息的几种方式:splash screens,选项屏幕,以及控制台屏幕。

也考虑使用DirectInput获取玩家键盘,鼠标和手柄的输入。

第三章:Hanging Ten :走马观花渲染流水线在深入到三维对象实际渲染之前,最好是对渲染流水线先有个基本的了解。

这一章将带领你走马观花般了解一下固定渲染流水线包括的几个典型步骤。

这包含操作摄像机,以便在游戏中提供视点。

也给出了将会使用在所有渲染对象中的一个基础类。

剔除对象和提高效率的其他技术也会被研究。

这些步骤的实际讲解出现在第四章到第八章。

第四章:基础的3D对象这一章是接下来两章中的第一章,处理游戏中使用的各种类型的对象的渲染。

这些对象包含天空盒,用来提供远景;地形渲染,提供可以在上面移动的表面;简单的对称对象,公告牌;以及粒子系统。

粒子系统是一个非常强大的工具,可以使用在微小对象的动态系统中,包括流动的水,火,烟火和流沙。

外文文献怎么翻译

外文文献怎么翻译

外文文献的翻译方法和技巧在科学研究领域,阅读和理解外文文献是非常重要的,因为这些文献包含了世界各地研究者的最新成果和观点。

然而,由于语言障碍,许多人可能觉得翻译外文文献是一项困难的任务。

本文将介绍一些有效的翻译方法和技巧,帮助读者更好地理解和翻译外文文献。

选择合适的翻译工具在翻译外文文献时,选择合适的工具是非常重要的。

一些常见的翻译工具包括在线翻译网站和翻译App。

这些工具可以帮助读者快速翻译文献,但需要注意的是,这些工具可能存在一定的翻译误差,因此在使用时要注意核对翻译结果。

保持原文的风格和语气在翻译外文文献时,要尽可能保持原文的风格和语气。

这样可以更好地传达原作者的意图和思想。

在翻译过程中,读者可以使用词典等工具帮助理解原文中的专业术语和文化背景,以确保翻译的准确性和通顺性。

注意语法和语法结构另一个翻译外文文献的重要方面是注意语法和语法结构。

外文文献往往使用复杂的句子结构和语法规则,因此在翻译时要保持句子的逻辑和结构。

正确理解原文中的句子结构和语法规则,可以帮助读者更好地翻译文献并消除歧义。

查找背景知识和参考资料翻译外文文献时,有时可能会遇到一些专业术语和概念,读者不熟悉。

在这种情况下,建议读者查找相关背景知识和参考资料,帮助理解原文中的内容。

这样不仅可以提高翻译的准确性,还可以扩展读者的知识面。

结语总的来说,翻译外文文献是一项需要一定技巧和耐心的工作。

通过选择合适的翻译工具、保持原文的风格和语气、注意语法和语法结构、查找背景知识和参考资料,读者可以更好地理解和翻译外文文献。

希望本文介绍的方法和技巧对读者有所帮助。

外文翻译原文

外文翻译原文

Stability of hybrid system limit cycles: application to the compass gait biped RobotIan A. Hiskens'Department of Electrical and Computer EngineeringUniversity of Illinois at Urbana-ChampaignUrbana IL 61801 USAAbstractLimit cycles are common in hybrid systems. However the non-smooth dynamics of such systems makes stability analysis difficult. This paper uses recent extensions of trajectory sensitivity analysis to obtain the characteristic multipliers of non-smooth limit cycles. The stability of a limit cycle is determined by its characteristic multipliers. The concepts are illustrated using a compass gait biped robot example.1 IntroductionHybrid system are characterized by interactions between continuous (smooth) dynamics and discrete events. Such systems are common across a diverse range of application areas. Examples include power systems [l], robotics [2, 3], manufacturing [4] and air-traffic control [5]. In fact, any system where saturation limits are routinely encountered can be thought of as a hybrid system. The limits introduce discrete events which (often) have a significant influence on overall behaviour.Many hybrid systems exhibit periodic behaviour. Discrete events, such as saturation limits, can act to trap the evolving system state within a constrained region of state space. Therefore even when the underlying continuous dynamics are unstable, discrete events may induce a stable limit set. Limit cycles (periodic behaviour) are often created in this way. Other systems, such as robot motion, are naturally periodic.Limit cycles can be stable (attracting), unstable (repelling) or non-stable (saddle). The stability of periodic behaviour is determined by characteristic (or Floquet) multipliers. A periodic solution corresponds to a fixed point of a Poincare map. Stability of the periodic solution is equivalent to stability of the fixed point. The characteristic multipliers are the eigenvalues of the Poincare map linearized about the fixed point. Section 4 reviews the connection between this linearized map and trajectory sensitivities.Poincare maps have been used to analyse the stability of limit cycles in various forms of hybrid systems. However calculation of the underlying trajectory sensitivities has relied upon particular system structures, see for example [7, 8], or numerical differencing, for example [6]. This paper uses a recent generalization of trajectory sensitivity analysis [9] to efficiently detemine the stability of limit cycles in hybrid systems.A hybrid system model is given in Section 2. Section 3 develops the associated variational equations. This is followed in Section 4 by a review of stability analysis of limit cycles. Conclusions and extensions are presented in Section 5.2 ModelDeterministic hybrid systems can be represented by a model that is adapted from a differential-algebraic (DAE) structure. Events are incorporated via impulsive action and switching of algebraic equations, giving the Impulsive Switched (DAIS) modelwheren x R ∈ are dynamic states and my R ∈ are algebraic states;(.)δ is the Dirac delta;(.)u is the unit-step function;,:n mnj f h RR +→;(0)(),:i n mng gR R ±+→; some elements of each(.)gwill usually be identicallyzero, but no elements of the composite g should be identically zero; the()i g± aredefined with the same form as g in (2), resulting in a recursive structure for g;,dey yare selected elements of y that trigger algebraic switching and state reset(impulsive) events respectively;dyandeymay share common elements.The impulse and unit-step terms of the DAIS model can be expressed in alternative forms:Each impulse term of the summation in (1) can be expressed in the state reset formwhere the notation x+denotes the value of x just after the reset event, whilstx-andy-refer to the values of x and y just prior to the event.The contribution of each()i g± in (2) can be expressed aswith (2) becomingThis form is often more intuitive than (2).It can be convenient to establish the partitionswherex -are the continuous dynamic states, for example generator angles, velocities andfluxes;z are discrete dynamic states, such as transformer tap positions and protection relay logic states;λ are parameters such as generator reactances, controller gains and switching times. The partitioning of the differential equations f ensures that away from events,x -evolves according to .(,)x y f x --=, whilst z and λ remain constant. Similarly,the partitioning of the reset equationsjhensures thatx -and λ remain constantat reset events, but the dynamic states z are reset to new values given by(,)jh y x z--+=-. The model can capture complex behaviour, from hysteresis and non-windup limits through to rule-based systems [l]. A more extensive presentation of this model is given in [9].Away from events, system dynamics evolve smoothly according to the familiardifferential-algebraic modelwhere g is composed of(0)gtogether with appropriate choices of()i g- or()i g+ ,depending on the signs of the corresponding elements of yd. At switching events (2),some component equations of g change. To satisfy the new g = 0 equation, algebraic variables y may undergo a step change. Reset events (3) force a discrete change in elements of x. Algebraic variables may also step at a reset event to ensure g= 0 is satisfied with the altered values of x. The flows of and y are defined respectively aswhere x(t) and y(t) satisfy (l),(2), along with initial conditions,3 'Ikajectory SensitivitiesSensitivity of the flowsxφandyφto initial conditionsxare obtained bylinearizing (8),(9) about the nominal trajectory,The time-varying partial derivative matrices given in (12),(13) are known as trajectory sensitiuities, and can be expressed in the alternative formsThe formxx ,xy provides clearer insights into the development of thevariational equations describing the evolution of the sensitivities. The alternative form 0(,)x t x φ, 0(,)yt x φ highlights the connection between the sensitivities and the associated flows. It is shown in Section 4 that these sensitivities underlie the linearization of the Poincare map, and so play a major role in determining the stability of periodic solutions.Away from events, where system dynamics evolve smoothly, trajectory sensitivities 0xx andxy are obtained by differentiating (6),(7) withrespect to 0x.This giveswhere/xf x f≡∂∂, and likewise for the other Jacobian matrices. Note that,,,xyxyf fg gare evaluated along the trajectory, and hence are time varyingmatrices. It is shown in 19, 101 that the numerical solution of this(potentially high order) DAE system can be obtained as a by-product of numerically integrating the original DAE system (6),(7). The extra computational cost is minimal. Initial conditions forxx are obtained from (10) aswhere I is the identity matrix. Initial conditions for 0zy follow directly from(17),Equations (16),(17) describe the evolution of the sensitivitiesxx andxybetween events. However at an event, the sensitivities are generally discontinuous. It is necessary to calculate jump conditions describing the step change inxx andxy . For clarity, consider a single switching/reset event, so the model (1),(2) reduces(effectively) to the formLet ((),()x y ττ) be the point where the trajectory encounters the triggering hypersurface s(x,y) = 0, i.e., the point where an event is initiated. This point is called the junction point and r is the junction time. It is assumed the encounter is transversal.Just prior to event triggering, at time τ-, we haveSimilarly,,y x++are defined for time τ+, just after the event has occurred. It isshown in [9] that the jump conditions for the sensitivitiesxx are given byThe assumption that the trajectory and triggering hypersurface meet transversally ensures a non-zero denominator for 0x τ The sensitivitiesxy . immediatelyafter the event are given byFollowing the event, i.e., for t τ+>, calculation of the sensitivities proceeds according to (16),(17) until the next event is encountered. The jump conditions provide the initial conditions for the post-event calculations.4 Limit Cycle AnalysisStability of limit cycles can be determined using Poincare maps [11, 12]. This section provides a brief review of these concepts, and establishes the connection with trajectory sensitivities.A Poincark map effectively samples the flow of a periodic system once every period. The concept is illustrated in Figure 1. If the limit cycle is stable, oscillations approach the limit cycle over time. The samples provided by the corresponding Poincare map approach a fixed point. A non-stable limit cycle results in divergent oscillations. For such a case the samples of the Poincare map diverge.To define a Poincare map, consider the limit cycle Γshown in Figure 1. Let ∑ be a hyperplane transversal to Γ at*x. The trajectory emanating from*xwill again encounter ∑ at*xafter T seconds, where T is the minimum period of the limit cycle. Due to the continuity of the flowxφwith respect to initial conditions, trajectories starting on ∑ in a neighbourhood of*x. will, in approximately T seconds, intersect ∑ in the vicinity of*x. Hencexφand ∑define a mappingwhere()kT x ττ≈ is the time taken for the trajectory to return to ∑. Complete details can hefound in [11,12]. Stability of the Paincare map (22) is determined by linearizing P at the fixed point*x, i.e.,From the definition of P(z) given by (22), it follows that DP(*x) is closely related to thetrajectory sensitivities***(,)(,)xxT T x x xφφ∂≡∂. In fact, it is shown in [11] thatwhereσ is a vector normal to ∑.The matrix*(,)xT x φis exactly the trajectory sensitivity matrix after one period of the limitcycle, i.e., starting from*xand returning to*x. This matrix is called the Monodromymatrix .It is shown in [11] that for an autonomous system, one eigenvalue of *(,)xT x φ isalways 1, and the corresponding eigenvector lies along **(,)f y x The remaining eigenvalues*(,)xT x φof coincide with the eigenvalues of DP(*x ), and are known as the characteristicmultipliers mi of the periodic solution. The characteristic multipliers are independent of the choice of cross-section ∑ . Therefore, for hybrid systems, it is often convenient to choose ∑ as a triggering hypersurface corresponding to a switching or reset event that occurs along the periodic solution.Because the characteristic multipliers mi are the eigenvalues of the linear map DP(x*), they determine the stability of the Poincarb map P(kx), and hence the stability of the periodic solution.Three cases are of importance: 1. Alli m lie within the unit circle, i.e., 1im<,i ∀.The map is stable, so the periodicsolution is stable. 2. Allim lie outside the unit circle. The periodic solution is unstable.3. Someim lie outside the unit circle. The periodic solution is non-stable.Interestingly, there exists a particular cross-section*∑, such thatwhere *ς∈∑.This cross-section*∑is the hyperplane spanned by the n - 1 eigenvectors of*(,)xT x φthat are not aligned with **(,)f y x . Therefore the vector *σthat is normal to*∑ is the left eigenvector of *(,)xT x φ corresponding to the eigenvalue 1. The hyperplane*∑is invariant under*(,)xT x φ, i.e., **(,)f y x maps vectors *ς∈∑back into*∑.5 ConclusionsHybrid systems frequently exhibit periodic behaviour. However the non-smooth nature of such systems complicates stability analysis. Those complications have been addressed in this paper throughapplication of a generalization of trajectory sensitivity analysis. Deterministic hybrid systems can be represented by a set ofdifferential-algebraic equations, modified to incorporate impulse (state reset) action and constraint switching. The associated variational equations establish jump conditions that describe the evolution of sensitivities through events. These equations provide insights into expansion/contraction effects at events. This is a focus of future research.Standard Poincar6 map results extend naturally to hybrid systems. The Monodromy matrix is obtained by evaluating trajectory sensitivities over one period of the (possibly non-smooth) cyclical behaviour. One eigenvalue of this matrix is always unity. The remaining eigenvalues are the characteristic multipliers of the periodic solution. Stability is ensured if all multipliers lieReferences[l] LA. Hiskens and M.A. Pai, “Hybrid systems view of power system modelling,” in Proceedings of the IEEE International Symposium on Circuits and Systems, Geneva, Switzerland, May 2000.[2] M.H. Raibert, Legged Robots That Balance, MIT Press, Cambridge, MA, 1986.[3] A. Goswami, B. Thuilot, and B. Espiau, “A study of the passive gait of a compass-like biped ro bot: symmetry and chaos,’’ International Journal of Robotics Research, vol. 17, no. 15, 1998.[4] S. Pettersson, “Analysis and design of hybrid systems,” Ph.D. Thesis, Department of Signals and Systems, Chalmers University of Technology, Goteborg, Sweden, 1999.[5] C. Tomlin, G. Pappas, and S. Sastry, “Conflict resolution for air traffic management:A study in multiagent hybrid systems,” IEEE Transactions on Automatic Control, vol. 43, no. 4, pp. 509-521, April 1998.[6] A. Goswami, B. Espiau, and A. Keramane, “Limit cycles in a passive compass gait biped and passivity-mimicking contr ol laws,” Journal of Au tonomous Robots, vol. 4, no. 3, 1997. 171 B.K.H. Wong, H.S.H. Chung, and S.T.S. Lee, ‘Computation of the cycle state-variable sensitivity matrix of PWM DC/DC converters and its applica tion,” IEEE Transactions on Circuit s and Systems I, vol. 47, no. 10, pp. 1542-1548, October 2000.[8] M. Rubensson, B. Lennartsson, and S. Petters son, “Convergence to limit cycles in hybrid systems - an example,” in Prepri nts of 8th International Federation of Automatic Control Symposium on Large Scale Systems: Theo y d Applications, Rio Patras, Greece, 1998, pp. 704-709.[9] I.A. Hiskens and M.A. Pai, “Trajectory sensitivity analysis of hyhrid systems,” IEEE Transactions on Circuits and Systems I, vol. 47, no. 2, pp. 204-220, February 2000.[10]D. Chaniotis, M.A. Pai, and LA. Hiskens, “Sen sitivity analysis of differential-algebraic systems using the GMRES method - Ap plication to power systems,” in Proceedings of the IEEE International Symposium on Circuits and Systems, Sydney, Australia, May 2001.[11]T.S Parker and L.O. Chua, Practical Numerical Algorithms for Chaotic Systems, Springer-Verlag, New York, NY, 1989.[12]R. Seydel, Practical Bifurcation and Stability Analysis, Springer-Verlag. New York, 2nd edition, 1994.。

毕业设计论文 外文文献翻译

毕业设计论文 外文文献翻译

毕业设计(论文)外文参考文献翻译计算机科学与信息工程系系(院)2008 届题目企业即时通Instant Messaging for Enterprises课题类型技术开发课题来源自选学生姓名许帅专业班级 04计算机科学与技术指导老师王占中职称工程师完成日期:2008年4 月 6 日目录I NSTANT M ESSAGING FOR E NTERPRISE (1)1. Tips (1)2. Introduction (1)3. First things first (2)4.The While-Accept loop (4)5. Per-Thread class (6)6. The Client class (7)企业即时通 (9)1.提示 (9)2.简介 (9)3.首先第一件事 (10)4.监听循环 (11)5.单线程类 (13)6.用户端类 (14)Instant Messaging for Enterprise1. TipsIf Java is, in fact, yet another computer programming language, you may question why it is so important and why it is being promoted as a revolutionary step in computer programming. The answer isn’t immediately obvious if you’re coming from a tr aditional programming perspective. Although Java is very useful for solving traditional standalone programming problems, it is also important because it will solve programming problems on the World Wide Web. What is the Web?The Web can seem a bit of a mys tery at first, with all this talk of “surfing,”“presence,” and “home pages.” It’s helpful to step back and see what it really is, but to do this you must understand client/server systems, another aspect of computing that is full of confusing issues. The primary idea of a client/server system is that you have a central repository of information,some kind of data, often in a database。

翻译

翻译

中国石油大学(华东)本科毕业设计(论文)外文翻译学生姓名:姜华学号:06083201专业班级:软件工程2006级2班指导教师:梁玉环2010年6月10日Database ManagementDatabase (sometimes spelled database) is also called an electronic database, referring to any collections of data, or information, that is specially organized for rapid search and retrieval by a computer. Databases are structured to facilitate the storage, retrieval modification and deletion of data in conjunction with various data-processing operations. Database can be stored on magnetic disk or tape, optical disk, or some other secondary storage device.A database consists of a file or a set of files. The information in the these files may be broken down into records, each of which consists of one or more fields are the basic units of data storage, and each field typically contains information pertaining to one aspect or attribute of the entity described by the database. Using keywords and various sorting commands, users can rapidly search, rearrange, group, and select the fields in many records to retrieve or create reports on particular aggregates of data.Database records and files must be organized to allow retrieval of the information. Early system were arranged sequentially (i.e., alphabetically, numerically, or chronologically); the development of direct-access storage devices made possible random access to data via indexes. Queries are the main way users retrieve database information. Typically the user provides a string of characters, and the computer searches the database for a corresponding sequence and provides the source materials in which those characters appear.A user can request, for example, all records in which the content of the field for a person’s last name is the word Smith.The many users of a large database must be able to manipulate the information within it quickly at any given time. Moreover, large business and other organizations tend to build up many independent files containing related and even overlapping data, and their data, processing activities often require the linking of data from several files. Several different types of database management systems have been developed to support these requirements: flat, hierarchical, network, relational, and object-oriented.In flat databases, records are organized according to a simple list of entities; many simple databases for personal computers are flat in structure. The records in hierarchical databases are organized in a treelike structure, with each level of records branching off into a set of smaller categories. Unlike hierarchical databases, which provide single links between sets of records at different levels, network databases create multiple linkages between sets by placing links, or pointers, to one set of records in another; the speed and versatility of network databases have led to their wide use in business. Relational databases are used where associations among files or records cannot be expressed by links; a simple flat list becomes one table, or “relation”, and multiple relations can be mathematically as sociated toyield desired information. Object-oriented databases store and manipulate more complex data structures, called “objects”, which are organized into hierarchical classes that may inherit properties from classes higher in the chain; this database structure is the most flexible and adaptable.The information in many databases consists of natural-language texts of documents; number-oriented database primarily contain information such as statistics, tables, financial data, and raw scientific and technical data. Small databases can be maintained on personal-computer systems and may be used by individuals at home. These and larger databases have become increasingly important in business life. Typical commercial applications include airline reservations, production management, medical records in hospitals, and legal records of insurance companies. The largest databases are usually maintained by governmental agencies, business organizations, and universities. These databases may contain texts of such materials as catalogs of various kinds. Reference databases contain bibliographies or indexes that serve as guides to the location of information in books, periodicals, and other published literature. Thousands of these publicly accessible databases now exist, covering topics ranging from law, medicine, and engineering to news and current events, games, classified advertisements, and instructional courses. Professionals such as scientists, doctors, lawyers, financial analysts, stockbrokers, and researchers of all types increasingly rely on these databases for quick, selective access to large volumes of information.DBMS Structuring TechniquesSequential, direct, and other file processing approaches are used to organize and structure data in single files. But a DBMS is able to integrate data elements from several files to answer specific user inquiries for information. That is, the DBMS is able to structure and tie together the logically related data from several large files.Logical Structures. Identifying these logical relationships is a job of the data administrator. A data definition language is used for this purpose. The DBMS may then employ one of the following logical structuring techniques during storage access, and retrieval operations.List structures. In this logical approach, records are linked together by the use of pointers. A pointer is a data item in one record that identifies the storage location of another logically related record. Records in a customer master file, for example, will contain the name and address of each customer, and each record in this file is identified by an account number. During an accounting period, a customer may buy a number of items on different days. Thus, the company may maintain an invoice file to reflect these transactions. A list structure could be used in this situation to show the unpaid invoices at any given time. Each record in the customer in the invoice file. This invoice record, in turn, would be linked to later invoices for the customer. The last invoice in the chain would be identified by the useof a special character as a pointer.Hierarchical (tree) structures. In this logical approach, data units are structured in multiple levels that graphically resemble an “upside down” tree with the root at the top and the branches formed below. There’s a superior-subordinate relationship in a hierarchical (tree) structure. Below the single-root data component are subordinate elements or nodes, each of which, in turn, “own” one or more other elements (or none). Each element or branch in this structure below the root has only a single owner. Thus, a customer owns an invoice, and the invoice has subordinate items. The branches in a tree structure are not connected.Network Structures. Unlike the tree approach, which does not permit the connection of branches, the network structure permits the connection of the nodes in a multidirectional manner. Thus, each node may have several owners and may, in turn, own any number of other data units. Data management software permits the extraction of the needed information from such a structure by beginning with any record in a file.Relational structures. A relational structure is made up of many tables. The data are stored in the form of “relations” in these tables. For example, relation t ables could be established to link a college course with the instructor of the course, and with the location of the class.To find the name of the instructor and the location of the English class, the course/instructor relation is searched to get the name (“Fitt”), and the course/location relation is a relatively new database structuring approach that’s expected to be widely implemented in the future.Physical Structures. People visualize or structure data in logical ways for their own purposes. Thus, records R1 and R2 may always be logically linked and processed in sequence in one particular application. However, in a computer system it’s quite possible that these records that are logically contiguous in one application are not physically stored together. Rather, the physical structure of the records in media and hardware may depend not only on the I/O and storage devices and techniques used, but also on the different logical relationships that users may assign to the data found in R1and R2. For example, R1 and R2 may be records of credit customers who have shipments send to the same block in the same city every 2 weeks. From the shipping department manager’s perspective, then, R1 and R2 are sequential entries on a geographically organized shipping report. But in the A/R application, the customers represented by R1 and R2 may be identified, and their accounts may be processed, according to their account numbers which are widely separated. In short, then, the physical location of the stored records in many computer-based information systems is invisible to users.Database Management Features of OracleOracle includes many features that make the database easier to manage. We’ve divided the discussion in this section into three categories: Oracle Enterprise Manager, add-on packs,backup and recovery.1. Oracle Enterprise ManagerAs part of every Database Server, Oracle provides the Oracle Enterprise Manager (EM), a database management tool framework with a graphical interface used to manage database users, instances, and features (such as replication) that can provide additional information about the Oracle environment.Prior to the Oracle8i database, the EM software had to be installed on Windows 95/98 or NT-based systems and each repository could be accessed by only a single database manager at a time. Now you can use EM from a browser or load it onto Windows 95/98/2000 or NT-based systems. Multiple database administrators can access the EM repository at the same time. In the EM repository for Oracle9i, the super administrator can define services that should be displayed on other administrators’ consoles, and management regions can be set up.2. Add-on packsSeveral optional add-on packs are available for Oracle, as described in the following sections. In addition to these database-management packs, management packs are available for Oracle Applications and for SAP R/3.(1)standard Management PackThe Standard Management Pack for Oracle provides tools for the management of small Oracle databases (e.g., Oracle Server/Standard Edition). Features include support for performance monitoring of database contention, I/O, load, memory use and instance metrics, session analysis, index tuning, and change investigation and tracking.(2)Diagnostics PackYou can use the Diagnostic Pack to monitor, diagnose, and maintain the health of Enterprise Edition databases, operating systems, and applications. With both historical and real-time analysis, you can automatically avoid problems before they occur. The pack also provides capacity planning features that help you plan and track future system-resource requirements.(3)Tuning PackWith the Tuning Pack, you can optimise system performance by identifying and tuning Enterprise Edition databases and application bottlenecks such as inefficient SQL, poor data design, and the improper use of system resources. The pack can proactively discover tuning opportunities and automatically generate the analysis and required changes to tune the systems.(4)Change Management PackThe Change Management Pack helps eliminate errors and loss of data when upgrading Enterprise Edition databases to support new applications. It impact and complex dependencies associated with application changes and automatically perform databaseupgrades. Users can initiate changes with easy-to-use wizards that teach the systematic steps necessary to upgrade.(5)AvailabilityOracle Enterprise Manager can be used for managing Oracle Standard Edition and/or Enterprise Edition. Additional functionality is provided by separate Diagnostics, Tuning, and Change Management Packs.3. Backup and RecoveryAs every database administrator knows, backing up a database is a rather mundane but necessary task. An improper backup makes recovery difficult, if not impossible. Unfortunately, people often realize the extreme importance of this everyday task only when it is too late –usually after losing business-critical data due to a failure of a related system.The following sections describe some products and techniques for performing database backup operations.(1)Recovery ManagerTypical backups include complete database backups (the most common type), database backups, control file backups, and recovery of the database. Previously, Oracle’s Enterprise Backup Utility (EBU) provided a similar solution on some platforms. However, RMAN, with its Recovery Catalog stored in an Oracle database, provides a much more complete solution. RMAN can automatically locate, back up, restore, and recover databases, control files, and archived redo logs. RMAN for Oracle9i can restart backups and restores and implement recovery window policies when backups expire. The Oracle Enterprise Manager Backup Manager provides a GUI-based interface to RMAN.(2)Incremental backup and recoveryRMAN can perform incremental backups of Enterprise Edition databases. Incremental backups back up only the blocks modified since the last backup of a datafile, tablespace, or database; thus, they’re smaller and faster than complete backups. RMAN can also perform point-in-time recovery, which allows the recovery of data until just prior to a undesirable event.(3)Legato Storage ManagerVarious media-management software vendors support RMAN. Oracle bundles Legato Storage Manager with Oracle to provide media-management services, including the tracking of tape volumes, for up to four devices. RMAN interfaces automatically with the media-management software to request the mounting of tapes as needed for backup and recovery operations.(4)AvailabilityWhile basic recovery facilities are available for both Oracle Standard Edition and Enterprise Edition, incremental backups have typically been limited to Enterprise Edition. Choosing between Oracle and SQL ServerI have to decide between using the Oracle database and WebDB vs. Microsoft SQL Server with Visual Studio. This choice will guide our future Web projects. What are the strong points of each of these combinations and what are the negatives?Lori: Making your decision will depend on what you already have. For instance, if you want to implement a Web-based database application and you are a Windows-only shop, SQL Server and the Visual Studio package would be fine. But the Oracle solution would be better with mixed platforms.There are other things to consider, such as what extras you get and what skills are required. WebDB is a content management and development tool that can be used by content creators, database administrators, and developers without any programming experience. WebDB is a browser-based tool that helps ease content creation and provides monitoring and maintenance tools. This is a good solution for organizations already using Oracle. Oracle also scales better than SQL Server, but you will need to have a competent Oracle administrator on hand.The SQL Sever/Visual Studio approach is more difficult to use and requires an experienced object-oriented programmer or some extensive training. However, you do get a fistful of development tools with Visual Studio: Visual Basic, Visual C++, and Visual InterDev for only $1,619. Plus, you will have to add the cost of the SQL Server, which will run you $1,999 for 10 clients or $3,999 for 25 clients-a less expensive solution than Oracle’s.Oracle also has a package solution that starts at $6,767, depending on the platform selected. The suite includes not only WebDB and Oracle8i but also other tools for development such as the Oracle application server, JDeveloper, and Workplace Templates, and the suite runs on more platforms than the Microsoft solution does. This can be a good solution if you are a start-up or a small to midsize business. Buying these tools in a package is less costly than purchasing them individually.Much depends on your skill level, hardware resources, and budget. I hope this helps in your decision-making.Brooks: I totally agree that this decision depends in large part on what infrastructure and expertise you already have. If the decision is close, you need to figure out who’s going to be doing the work and what your priorities are.These two products have different approaches, and they reflect the different personalities of the two vendors. In general, Oracle products are designed for very professional development efforts by top-notch programmers and project leaders. The learning period is fairly long, and the solution is pricey; but if you stick it out you will ultimately have greater scalability and greater reliability.If your project has tight deadlines and you don’t have the time and/or money to hire a team of very expensive, very experienced developers, you may find that the Oracle solutioni s an easy way to get yourself in trouble. There’s nothing worse than a poorly developed Oracle application.What Microsoft offers is a solution that’s aimed at rapid development and low-cost implementation. The tools are cheaper, the servers you’ll run it on are cheaper, and the developers you need will be cheaper. Choosing SQL Sever and Visual Studio is an excellent way to start fast.Of course, there are trade-offs. The key problem I have with Visual Studio and SQL Server is that you’ll be tied to Microso ft operating systems and Intel hardware. If the day comes when you need to support hundreds of thousands of users, you really don’t have anywhere to go other than buying hundreds of servers, which is a management nightmare.If you go with the Microsoft approach, it sounds like you may not need more than Visual Interdev. If you already know that you’re going to be developing ActiveX components in Visual Basic or Visual C++, that’s warning sign that maybe you should look at the Oracle solution more closely.I want to emphasize that, although these platforms have their relative strengths and weaknesses, if you do it right you can build a world-class application on either one. So if you have an organizational bias toward one of the vendors, by all means go with it. If you’re starting out from scratch, you’re going to have to ask yourself whether your organization leans more toward perfectionism or pragmatism, and realize that both “isms” have their faults.数据库管理数据库(有时拼成Database)也称为电子数据库,是指由计算机特别组织的快速查找和检索的任意的数据或信息集合。

外文翻译--没有培训就难以获利

外文翻译--没有培训就难以获利

本科毕业论文(设计)外文翻译外文题目 No train, no gain 外文出处People Management,2002(9):p41-42_外文作者 Carolyn Cohen原文:No train, no gainCarolyn CohenTraining is one of the key factors in the attracting and retaining staff, and it is often talked about in corporate circles: “What kind of training programs does your organization offer? How much does your organization spend per employee on training? Yes, I enjoyed that training program but it didn’t change how I do things on the job." Training, we’re told, may be one of the reasons why big organizations with lots of resources have an edge over smaller organizations. But even when we buy into the idea that training is a good thing for everyone involved, and we make the decision to allocate resources to it, we often don’t know where to start. We just want to be as sure as we can that we’ll get some return on our investment. Let’s take a look at why we need to offer training in the first place. Then, w e’ll consider what our training should be about, how we should offer it and what we need to do to ensure that the training we do provide has some lasting value.The benefits of trainingTraining can prepare your staff for increased demands due to changes in the way your business operates, technological or market changes or for the commitment you’ve made to a new standard of excellence. The bottom-line advantage to your business is likely to be financial gain as a result of greater productivity. Training can also help improve employee morale, reduce turnover, and enhance a company’s public image——which ultimately aids in business development and in attracting high-quality staff.Most employees will tell you that training helps prepare them for other opportunities such as lateral moves or promotions; learning to do a better job enables them to derive greater satisfaction from it, and keeps them motivated. What it also does——although many don’t voice it——is show them that their organization cares. If combined with other forms of employee development and strategic initiatives such as reward and recognition programs, training may lead to a greater employeecommitment and desire to stay with the organization.Today's U.S. educational system follows an identical structure. Business and the military imitated the public-school system, and the "modern" training hierarchy was born. Now for the bigger question: Is this 500-year-old format really the most effective way to educate and "train" the postmodern Nintendo Generation of foodservice employees? Maybe it's time to train the trainer and let the learners lead. Here are a few strategies:Training starts during hiring.Once a pool of applicants qualifies as a cultural fit for your team, the focus should be to seek individuals who have the right attitudes toward learning and development. Look for people who are open to and who enjoy learning. Factoring this into the hiring process will save you time and differentiate you from the competition by building a better, stronger, smarter team.You are what you cumulatively know. Every 90 days, scrutinize and assess knowledge gaps and talent gaps across your teams. Hire and develop to fill the gaps.Teach the team how to “read." Train your teams on commonly overlooked basic skills, such as how to read a paycheck, a simple P&L or even wine labels.Training is not development. Training is sharing new skills or concepts via a live or electronic facilitator.Development is applying and then improving on the new skills back on the job with a guide or mentor. A trainer can light the fire, and the manager keeps the flame fanned. Every supervisor is constantly training employees by their own actions.All trainers teach, but not all trainers are teachers. Just because you've taught it, doesn't mean that anyone has "caught" it. The majority of foodservice training today overlooks or underemphasizes the critical skills that matter most, such as problem-solving, conflict resolution, creativity, group dynamics, instilling values, team-building and situational leadership.Your core content was not designed by credentialed educators. The truth is that 99.9 percent of foodservice training manuals and curriculum has been written, formatted and rewritten by former servers, bartenders, hosts, managers or concept founders. They may have excelled at their jobs, but most had no formal education onhow brains work or adults learn. An owner or franchisor’s primary motivation relative to training is to cover compliance issues. Why? Because that's what you test and then keep in their file to minimize the risk of future litigation.Doing your own needs assessmentMaybe you don’t need to be convinced that training can create value. Instead, your problem might be in deciding what training your staff needs, and how it should be offered. Training can be an expensive proposition and perhaps you’ve seen too many unsuccessful programs in your day. You many even think it best to turn the entire chore over to a consultant. However, you know your organization better than any consultant does. You know your goals and objective, and what it takes to achieve them, you know your people best, and understand what is involved in their professional fulfillment. It makes sense that you be the primary decision-maker on training content.Training should be a response to a need, to a specific type of problem, not a competitive gesture or a way to jump on the bandwagon with trendy topics. Begin by asking these questions: What would it take for the organization to better meet its goals? What would give us a competitive edge? Why aren’t employees more productive? What do we need to know more about? What do the really successful people have that other people do not? How big the gap between what is should be and what is? The answer to these questions can be found in several different ways: a focused management meeting; small staff meetings; walking around your organization with a notebook and writing down everything you see; talking a look at employee performance appraisals, and talking to your customers.Renew the information you’ve gathered and try to determine in which area training may be the answer to a particular problem. Keep in mind that training works best when one needs knowledge or skill and is fairly motivated to get it. If you find that your organization is full of people who know what they’re doing but lack the enthusiasm to do it well or to improve on the methods they use, perhaps you have a morale problem and the answer may lie in reward and recognition programs rather than training. Similarly, if production is down and turnover is high, maybe the issue ispoor hiring and selection, and again, training won’t resolve it.Once you know that training could well be the answer, try to narrow it down further by dividing your needs into technical, technological and management practice, Technical and technological skills are usually the first ones to be taken care of because, without them, it is really different to get the job done. Do not ignore the importance of management skills. They improve employee morale, help teams function more effectively and help employees develop as they look for new challenges.Ways to offer trainingThere are three basic ways to offer training: your organization can develop and deliver the training material; you can hire an outsider to develop and deliver the material or you can hire an outsider to develop the material but have someone within your organization deliver it . (When a very limited number of people in the organization need a particular type of training, you may consider employing a coach or sending those individuals to a public seminar.) The biggest advantage to developing and delivering your own material is that it is usually the least costly way (out-of-pocket costs) and it is tuned o your unique organizational needs. The primary disadvantage is the possible lack of training expertise among your employees, as well as the time involved.Buying the design and delivery should ensure subject matter accuracy as well as training expertise. However, the extent to which the trainer is willing or able to customize the program to your industry in general, and to your organization in particular, may be a problem.Finally, there’s an alternative that few organizations conside r: the organization makes a list of the required knowledge and skills. The trainer then considers other related principles/topics and creates a training program that includes lecture material, learning exercises, checklists and notes for the instructor. The instructor is a member of the organization who knows first hand what the company struggles with. He or she knows what can be done, what will never work, and so on. He or she also has the credibility, in the eyes of the participants, of someone who has been there and who has succeeded. R elated to this way of offering training is buying an “off the shelf”program. This is a standard package containing lecture notes, exercises and references. The job of customization is up to you.Make your final decision about the best way to offer training by considering available time, expertise, budget, and need for customization.Ensuring the success of trainingYou’ve determined what kind of training you need and have yourself produced a good program or employed an expert to do this; the problem is with what happens next——or to be more precise, what doesn’t happen. The staff attends the training, and enjoys it (you have the evaluation forms to prove it) but nothing really changes back on the job.You may have seen some of the items in the following list, thought they made sense, but never took the time to put them into practice. Make a vow that this time will be different. If you can’t tackle the whole list at once, try half the items this time and the other half when you see things improving.·Be selective in choosing who attends training; create the aura that it is a privilege to be chosen, not something that everyone must do; choose people who need the information and who’ll have the opportunity to use what they have learned very soon, if not immediately, after they attend the session.·Give participants and managers as say in the content of the content of the training; insist that the developer meet with or send a questionnaire to a representative group. ·Insist that managers attend and participate in portions of the training; managers may act as instructors or participants.·Require participants and their managers to discuss(and document) what will be covered in the training and how it will be used in their specific job. This “contract” should be reviewed by both the manager and employee immediately after the training to see if the plan is still realistic and to make necessary changes.· Follow-up must be built into the program and can take on a variety of forms: trainers returning for additional workshops, periodic checks on the contract established before the training, study groups amongst participants, the opportunity to train others. ·Positive reinforcement for what has been transferred to the job and done well isessential. It can make the different between the materials being used or being forgotten.Good training takes time and energy. Look at what has and hasn’t worked in the past. Need some help? By all means, consider a consultant. But don’t make the mistake of handing the entire job to someone outside the organization. While consultants have a lot to offer, don’t deprive your training participants of your own knowledge and skill.译文:没有培训就难以获利卡罗琳科恩员工培训是吸引并留住员工的关键因素之一,是企业界的常谈话题:“你的公司提供怎样的培训?你们公司就培训方面在每个员工身上的花费是多少?是的,我喜欢那样的培训计划,可是这并不能改变在工作上我如何做事。

英文翻译 附原文

英文翻译 附原文

本科毕业设计(论文) 外文翻译(附外文原文)系 ( 院 ):资源与环境工程系课题名称:英文翻译专业(方向):环境工程班级:2004-1班学生:3040106119指导教师:刘辉利副教授日期:2008年4月20使用褐煤(一种低成本吸附剂)从酸性矿物废水中去除和回收金属离子a. 美国, 大学公园, PA 16802, 宾夕法尼亚州立大学, 能源部和Geo 环境工程学.b. 印度第80号邮箱, Mahatma Gandhi ・Marg, Lucknow 226001, 工业毒素学研究中心, 环境化学分部,于2006 年5月6 日网上获得,2006 年4月24 日接受,2006 年3月19 日;校正,2006 年2月15 日接收。

摘要酸性矿物废水(AMD), 是一个长期的重大环境问题,起因于钢硫铁矿的微生物在水和空气氧化作用, 买得起包含毒性金属离子的一种酸性解答。

这项研究的主要宗旨是通过使用褐煤(一种低成本吸附剂)从酸性矿水(AMD)中去除和回收金属离子。

褐煤已被用于酸性矿水排水AMD 的处理。

经研究其能吸附亚铁, 铁, 锰、锌和钙在multi-component 含水系统中。

研究通过在不同的酸碱度里进行以找出最适宜的酸碱度。

模拟工业条件进行酸性矿物废水处理, 所有研究被进行通过单一的并且设定多专栏流动模式。

空的床接触时间(EBCT) 模型被使用为了使吸附剂用量减到最小。

金属离子的回收并且吸附剂的再生成功地达到了使用0.1 M 硝酸不用分解塔器。

关键词:吸附; 重金属; 吸附; 褐煤; 酸性矿物废水处理; 固体废料再利用; 亚铁; 铁; 锰。

文章概述1. 介绍2. 材料和方法2.1. 化学制品、材料和设备3. 吸附步骤3.1. 酸碱度最佳化3.2. 固定床研究3.2.1 单一栏3.2.2 多栏4. 结果和讨论4.1. ZPC 和渗析特征4.2 酸碱度的影响4.3. Multi-component 固定吸附床4.3.1 褐煤使用率4.4. 吸附机制4.5. 解吸附作用研究5. 结论1. 介绍酸性矿物废水(AMD) 是一个严重的环境问题起因于硫化物矿物风化, 譬如硫铁矿(FeS2) 和它的同素异形体矿物(α-FeS) 。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

xxxxxxxxxxxxxxxxxxxxxxxxxxx xxxx本科毕业论文外文资料翻译系别:xxxxxxxxxxxx专业:xxxxxxx姓名:xxxxxxxxxxx学号:xxxxxxxxxxxx xxxxxxxxxxxxxx引言大场金矿是青海省北巴颜喀拉地区“十五”期间发现的大型金矿床,位于青海省玉树藏族自治州曲麻莱县玛多乡北部,大地构造位置处于巴颜喀拉印支期造山带北侧,北以布青山南坡断裂为界与阿尼玛卿缝合带毗邻。

前人将大场金矿的金矿化类型定为造山型金矿床,我们通过大场地区1: 5万矿产地质调查研究后认为,大场金矿可与川西部东北寨金矿、桂西北金牙金矿等类比,金矿化类型为微细粒浸染型金矿.1大场金矿床地质背景大场金矿处于北巴颜喀拉印支燕山期金、锑成矿带,金矿赋矿层位为中三叠世巴颜喀拉山群板岩夹砂岩组,为一套典型的浊积岩,容矿岩石主要为深灰色泥钙质板岩、斑点板岩夹灰色长石砂岩。

金矿体在平面上严格受断裂构造破碎带控制,因而容矿岩石普遍具不同程度的破碎变形,直至部分成为碎裂岩。

断裂构造多沿背斜轴部产生。

矿区热液蚀变发育,其规模和强度决定于构造破碎带规模、性质和岩石能干性。

主要蚀变有硅化、绢云母化、硫化物化,局部有高岭土化、碳酸岩化。

其中黄铁矿化、毒砂矿化、辉锑矿化、绢云母化、硅化与金矿化关系最密切,自矿体中心向外依次是硅化、硫化物化、绢云母化、碳酸岩化、高岭土化。

矿石矿物主要为黄铁矿和毒砂,脉石矿物主要为石英、方解石,载金矿物主要为热液黄铁矿和毒砂,金呈分散状态赋存在两矿物的晶粒内,无明显的集中分布区。

矿床特征元素组合为Hg- As- Sb一Au, Au与Hg,As,Sb,通常成正相关,平面上Sb ,Au异常往往被包于Hg,As异常之内,具低温元素组合特征。

矿床附近石英脉非常发育。

金矿体多呈NW一SE向等间距分布的特征,截止2004年已控制金矿体33条,矿体延伸长度从160一 2700m不等,矿体厚度0.5~17.76m,沿矿体倾向控制斜深187m。

矿石金品位最高110g/t,最低0.8g/t,一般2~9g/t,平均5. 76g/t,通过对矿区24条矿体资源量估算,共获得333+334金资源量81. 4吨,达大型规模。

矿床围岩和矿石中的黄铁矿单矿物的δ34S值介于一7.78%0 -0.66%0之间,平均一4. 97 %0,数值变化范围小,显示地层硫来源。

大场金矿床主要有两种流体:其一是CO2一H20体系流体,其二是NaCI-H20体系的流体。

前者形成于236℃一315℃、低盐度( 2.62-7.48wt d/m NaCI)、富含CO2、有少量CH4和(或)N2组分集中于-58.4℃一57.0℃之间,略低于纯CO2的三相点温度;后者的均一温度有两个峰:一是232℃一275℃、盐度4.86一9. 47 wt d/m NaCI,二是149℃一229℃、盐度2.41一 8.95 wt d/m NaCI。

流体不混溶作用发生于236℃一275℃,经流体不混溶液作用分离出的CO2- H20流体和NaCl- H20流体是主要的金成矿流体。

大场矿区4件黄铁矿样品的206Pb/204Pb,比值为18.3540—18.3795,平均值为18.3625;207Pb/204Pb,为15.5720- 15.5921,平均值为15.5790;208Pb/204为38.2710—38.3183,平均值为38. 2918,是典型的异常铅。

在Zarlman等(1988)铅同位素构造模式图上,上述数据均位于地幔和造山带演化线之间且靠近造山带演化线的一侧集中分布。

大场矿区含绢云母石英脉Ar- Ar法测得成矿年龄为218. 6士3. 2Ma,属印支晚期;含黄铁矿、方铅矿、具孔雀石化的石英脉Pb一Pb法测得成矿年龄为187Ma,属燕山早期,可见其成矿时代为印支晚期燕山早期,与区域造山运动基本吻合。

上述信息表明,大场金矿的成矿元素、硫和脉石组分主要来自地层,成矿溶液为大气降水形成的深层地下水。

浊积岩建造、区域性地热异常和配套断裂系统是成矿最重要的条件。

2成矿条件2.1浊积岩建造为大场金矿的形成提供了成矿物质的来源大场金矿主要赋存在中三叠世巴颜喀拉山群板岩夹砂岩组地层中,主要由细碎屑岩沉积建造组成,是一套厚度巨大的黑色韵律层岩系,具典型的鲍马层序特点,表现为:完整的韵律层从下至上为粗砂(砾)质单元叶粉砂质单元叶泥质单元,普遍含少量的碳质和黄铁矿;砂质单元底部常见沟模、槽模等构造;发育微波状层理;砂岩多为杂砂岩,分选差,磨圆度低;粉砂岩层中发育远洋薄壳特点的双壳化石(Halobia)和遗迹化石高原漫游迹(( Plno-litesm ontanus),具典型深水浊流相特点。

以上事实表明,广泛分布于矿区的细碎屑岩建造是一套形成于深海环境的浊积岩建造。

该套地层岩石微量元素统计结果为:碎裂岩含金最高为33.63x10-9,变化系数210%;粉砂岩12.07x10-9,变化系数400%;板岩9. 46x10-9,变化系数450%,超出地壳丰度值几倍一10倍。

众所周知,Au是一种变价元素,具有与S,O,C,H,As等许多元素结合成简单或复杂络合物的能力,在地球化学行为上,既有亲硫性和亲铁性,又有亲碳性。

以各种络离子形式存在于水体中的金,易于被有机碳或者泥质所吸附。

浊积岩中普遍含有机碳的成分,在沉积过程中碳对金等元素有吸附作用,这必然使金等元素成为浊积岩中的特定或固有组分并导致原始富集,因而往往成为地质历史上的含金建造。

大场金矿的成矿物质来源于围岩,亦就是作为含金地质建造的浊积岩。

2.2区域性地热异常是金矿成矿的热动力条件温度是使金由稳定状态转化为活动状态的重要因素。

一般来讲,温度升高,金的溶解度也随之增大。

微细粒浸染型金矿的成矿,需要一定的热动力条件,以驱动矿源层中的成矿物质运移成矿l4l。

大场地区作为这种热动力的热源主要表现在岩浆活动和构造作用两个方面。

岩浆活动:区内石英脉十分发育,东部出露印支燕山期花岗岩,它们在侵入后的相当长的时间内所产生的热效应,必然导致一定范围内热异常的出现。

大场微细粒浸染型金矿所反映的中低温矿化与岩体和岩脉的某种空间联系,实际就是这种热场的反映。

构造作用:大场金矿区大地构造环境上位于北巴颜喀拉印支期造山带,北临阿尼玛卿晚古生代一早中生带缝合带,自印支晚期后,本区长期处于强挤压状态。

挤压作用导致岩层发生褶皱变形、岩石破碎和位移的过程中,有大量构造动能转化为热能,运动岩块之间的摩擦热甚至可以达到使岩石熔化的程度。

区域高的热流值是挤压造山带的重要特征。

岩浆热和构造热的结合,使得大场地区成为一地热异常区,并具有较高的古地温梯度区内构造破碎带发育的钙化就是地热异常的佐证.2.3配套的断裂系统是矿液运移和矿化定位空间大场微细粒浸染型金矿与断裂破碎带形影相依。

含矿断裂为玛多一甘德深大断裂旁侧的与深大断裂基本呈平行分布的次级断裂,矿化主要富集于断裂构造性质由压扭性转化为张性扩张部位。

由于成矿所需的富集系数特大,为能在大范围内聚集成矿元素,就必须有深切割的断裂存在,以造成和深部的沟通并形成大规模的热液环流系统,这就是矿化与大断裂具有时空联系的原因。

旁侧次级压扭性断裂,能造成良好的屏蔽条件和半封闭环境,温度、压力下降缓慢,有利于交代作用的充分进行和高硫低氧型矿质的形成,在张性空间矿体定位。

综上所述,三叠纪沉积作用所形成的浊积岩建造,是一种含金地质建造,主要以吸附形式存在于其中的金大多为可释放(活性)金,为成矿奠定了丰富的物质基础。

印支晚期开始的强烈构造运动所造成的围压环境下的构造岩浆活动,导致了广泛的热效应和扩容空间效应,为金的活化、转移、聚集创造了有利条件。

外文原文Lead itBig gold mine is north BaYanKaLa region of qinghai province during the period of "15" found large gold deposit, located in qinghai province yushu Tibetan autonomous prefecture song ma ma lai county township north, tectonic position in BaYanKaLa indosinian orogenic belt on the north, north by a cloth green south slope fracture adjacent to nima o qing suture zone.Predecessors of the large gold deposit of gold mineralization type orogenic type gold deposits, we through large area 1: after 50000 mineral geological investigation and study that large field with western northeast sichuan village gold, gold gold northwest guangxi, such as analogy, the gold mineralization types for the microgranular disseminated type gold deposit.A large gold deposit geological backgroundBig game gold deposit in north BaYanKaLa indosinian yanshanian gold, antimony mineralization belt, the gold mine of fu seam for Triassic ba yan kara mountains SLATE clip sandstone group, is a set of typical turbidite, ore rock mainly for dark grey mud calcium feldspar sandstone SLATE, speckled SLATE gray. Gold ore body in the plane strictly controlled by the fault fracture zone, and therefore with different degree of broken ore rock common deformation, until the part be cataclastic rock. Fracture structure more along the anticline axis. Mining area development of hydrothermal alteration, its size and strength is determined by structural fracture zone scale, nature and rock the competent. Major alterations are silicification, sericitization and sulfide materialized, local kaolin, lithification carbonate. Pyritization, poison placer, stibnite, sericitization, silicification and gold mineralization, the most closely, the ore body center outward silicide, vulcanization materialized, sericitization, lithification carbonate, kaolin. Ore minerals are mainlypyrite and arsenopyrite, gangue mineral.Gold ore body is in a SE to NW spacing distribution characteristics, such as control by 2004 has 33 gold orebodies, the ore body stretch length ranging from 160 a 160 m, ore body thickness 0.5 ~ 0.5 m, 187 m along the deep ore body tilted control. Gold ore grade of up to 110 g/t, lowest 0.8 g/t, general 2 ~ 9 g/t, the average 5. 76 g/t, through to the mining area of 24 ore resource estimation, a total of 333 + 334 gold resources in 334. The 4 tons, up to large scale.Pyrite ore deposits in the surrounding rock and ore of single mineral of the delta 34 s value between a 7.78% 0 0-0.66%, the average 4. 97% 0, numerical range is small, shows that formation of sulfur source. Big game there are two main types of gold deposits in the fluid: one is the CO2 fluid H20 system, secondly, NaCI - H20 system of fluid. The former was formed in 236 ℃, 315 ℃,low salinity (2.62-7.48 WTD/mNaCI), rich CO2 and CH4 and (or) a small amount of N2 components concentration between a 57.0 ℃to 58.4 ℃, slightly lower than the triple point temperature of pure CO2; The latter's uniform temperature has two peaks: one is 232 ℃, 275 ℃and salinity 4.86 a 9. 47 WTD/mNaCI, 2 it is 149 ℃, 229 ℃, salinity of 2.41 a 8.95 WTD/m NaCI. Immiscible function of fluid occurred in 236 ℃ 236 ℃, the fluid does not mix solution of CO2 - H20 fluid was isolated and NaCl - H20 fluid is the main ore-forming fluid of gold. Large field mining area 4 pieces of pyrite samples of 206 pb / 204 pb, ratio of 18.3540 to 18.3540, with a mean of 18.3625; 207 pb / 204 pb, 15.5720-15.5921, with a mean of 15.5790; 208 pb / 204 38.2710 38.3183, average of 38, 2918, is a typical anomalous lead. In (1988) such as Zarlman lead isotope structure model, the above data are lies between the mantle and the evolution of orogenic belt line and side concentration distribution near the line of evolution of orogenic belt. Large field mining area with sericite quartz vein Ar - Ar method measured metallogenic age of 218. 6 and 3. 2 ma, belong to the late indosinian; Contain pyrite, galena, quartz vein of the peacock petrochemical Pb a Pb method measured metallogenic age of 187 ma, belong to the early yanshan, visible its metallogenic epoch is the early stage of yanshan movement in the late indosinian orogeny and area.The above information shows that big gold mine of ore-forming elements, sulfur and gangue components mainly comes from stratum, the ore-forming solution for atmospheric precipitation formation of deep groundwater. Turbidite fracture system construction, regional geothermal anomaly and matching is the most important metallogenic conditions.Two metallogenic conditions2.1 turbidite built for large formation of gold deposit provides a source of ore-forming materials.Big gold deposit mainly occurs in the Triassic BaYanKaLa mountains SLATE clip in sandstone formation, mainly composed of fine clastic sedimentary formation, thickness is a huge black rhythmic rock series, with typical BaoMa sequence characteristics, characterized by: the rhythm of complete layer from the bottom of the coarse sand (gravel) mass unit leaf silty unit leaf argillaceous unit, generally contain a small amount of carbon and pyrite; Sandy unit common ditch at the bottom of the die, die structure; Development of microwave bedding; Sandstone are graywacke, poor sorting, grinding roundness is low; Powder sandstone layer in the development of ocean shell characteristics of double hull (Halobia) and trace fossils plateau roaming trace fossils ((Plno - litesm ontanus), typical deepwater turbidite facies characteristics. The above facts show that widely distributed in the mining area of fine clastic rock formation is a set of turbidite rock formed in the deep sea environment construction.The strata rock microelement statistical results as follows: cataclastic rock gold up to 33.63x10-9, variation coefficient of 210%; Siltstone 12.07 x10-9, variation coefficient of 400%; SLATE9. 46 x10-9, variation coefficient 450%, beyond the earth's crust abundance value several times a10 times. As is known to all, Au is a base element, with S, O, C, H, As many elements such As the ability of combined into simple or complex complex, on the geochemical behavior, both close sex and sulfur TieXing, and carbon. In the form of various complex ion present in the water to gold, easy adsorption by organic carbon or muddy. Turbidite in common organic carbon composition, in the process of sedimentary carbon adsorption for gold and other elements, it is bound to make gold elements such as turbidite in specific or inherent components and lead to primitive accumulation, and therefore tend to be with him in the history of geology. Big game gold ore-forming materials come from wall rock, also is as gold geological formation turbidite.2.2 regional geothermal anomaly is the thermodynamic condition of gold m ineralization.Temperature is the transformation of gold from stable state to an important factor of active state. Generally speaking, temperature, degree of the dissolution of gold also will increase. The microgranular disseminated type gold mineralization, needs certain thermodynamic conditions, to drive the source bed of migration of metallogenic l4l into minerals. Large area as the thermodynamic heat source mainly displays in two aspects of magmatism and tectonic action.Magmatic activity: quartz veins in the area are well-developed, eastern outcropped indosinian yanshanian granite, they are after the invasion of the thermal effect produced by a long time, inevitably lead to the emergence of a certain line heating anomaly. Large field of microgranular disseminated type gold deposit is a reflection of the low-temperature mineralized contact some space and dike rock mass, is actually a reflection of this hot field.Structure: large tectonic environment field gold mining area is located in the north BaYanKaLa indosinian orogenic belt, in the north, nima qing was born with suture zone in late Paleozoic early in the morning, since the late indosinian, regional strong compressive state for a long time. Extrusion effect in rock layer is fold deformation, in the process of rock breaking and displacement, kinetic energy is converted into heat energy, a large number of structure movement between rock frictional heat can even reach the level of melt rock. Regional high heat flow value is an important characteristic of extrusion of orogenic belts.Magma heat and heat is the combination of structural, making large area become a geothermal anomaly area, and has high degree of palaeogeothermal ladder tectonic fracture zone in the area of calcification is geothermal anomaly evidence.2.3 the fracture system of form a complete set is ore fluid migration and mineralization locate space.Large field and fractured zone of the microgranular disseminated deposits around together. Ore fracture for deep fault that more than a gander side of deep fault that with basic secondaryfracture distribution is parallel, mineralization mainly occurred in the compression shear fracture properties into extensional expansion area. Because of metallogenic enrichment coefficient of the required and to gather the ore-forming elements in the big scope, it must have a deep cut fracture exists, to make communication and deep and form massive hydrothermal circulation system, this is the mineralization associated with major fault with time and space. Side of secondary compression shear fracture, can cause good shielding conditions and semi-closed environment, temperature, pressure drop is slow, is advantageous to the metasomatism of thorough and high sulfur and low oxygen and the formation of mineral ore body in extensional space positioning. To sum up, the Triassic turbidite rock formed by the deposition of construction, is a kind of gold bearing geological formation, mainly in the form of adsorption exists in most of the gold to be released (active) gold, lay the ground for mineralization.。

相关文档
最新文档