电子信息工程专业客户信息管理系统大学毕业论文外文文献翻译及原文
电子商务信息安全中英文对照外文翻译文献

电子商务信息安全中英文对照外文翻译文献(文档含英文原文和中文翻译)原文:E-commerce Information Security ProblemsⅠ. IntroductionE-commerce (E-Business) is in open networks, including between enterprises (B2B), business and consumers (B2C) commercial transactions, compared with the traditional business model, e-commerce with efficient, convenient, covered wide range of characteristics and benefits. However, e-commerce open this Internet-based data exchange is great its security vulnerabilities, security is a core e-commerce development constraints and key issues.In this paper, the basic ideas and principles of systems engineering, analyzes the current security threats facing e-commerce, in this based on security technology from the perspective of development trend of e-commerce.Ⅱ. E-commerce modelModern e-commerce technology has focused on the establishment and operation of the network of stores. Network in the department stores and real stores no distinction between structure and function, differences in their function and structure to achieve these methods and the way business operate.Web store from the front view is a special kind of WEB server. WEB site of modern multimedia support and a good interactive feature as the basis for the establishment of this virtual store, so customers can, as in a real supermarket pushing a shopping cart to select goods, and finally in the checkout check out. These online stores also constitute the three pillars of software: catalog, shopping cart and customer checkout. Customers use an electronic currency and transaction must store customers and stores are safe and reliable.Behind the store in the network, enterprises must first have a product storage warehouse and administration; second network to sell products by mail or other delivery channels to customers hands; Third, enterprises should also be responsible for product after-sales service, This service may be through networks, may not. Internet transactions are usually a first Pay the bill and getting goods shopping. For customers, convenience is that the goods purchased will be directly delivered to their home, but hard to feel assured that the goods can not be confirmed until the handsreach into their own hands, what it is.Therefore, the credibility of the store network and service quality is actually the key to the success of e-commerce.Ⅲ.the key to development of electronic commerceE-commerce in the telecommunications network to develop. Therefore, the advanced computer network infrastructure and telecommunications policy easing the development of electronic commerce has become a prerequisite. Currently, telecom services, high prices, limited bandwidth, the service is not timely or not reliable and so the development of e-commerce has become a constraint. Speed up the construction of telecommunications infrastructure, to break the telecommunications market monopoly, introduce competition mechanism to ensure fair competition in the telecommunications business, to promote networking, ensure to provide users with low-cost, high-speed, reliable communications services is a good construction target network environment, but also all of the world common task.E-commerce the most prominent problem is to solve the on-line shopping, trading and clearing of security issues, including the establishment of e-commerce trust between all the main issues, namely the establishment of safety certification system (CA) issues; choose safety standards (such as SET , SSL, PKI, etc.) problems; using encryption and decryption method and encryption strength problems. Establishment of security authentication system which is the key.Online trading and traditional face to face or written transactions in different ways, it is transmitted through the network business information and trade activities. The security of online transactions means:Validity: the validity of the contract to ensure online transactions, to prevent system failure, computer viruses, hacker attacks.Confidentiality: the content of the transaction, both transactions account, the password is not recognized by others and stealing.Integrity: to prevent the formation of unilateral transaction information and modify.Therefore, the e-commerce security system should include: secure and reliable communications network to ensure reliable data transmission integrity, prevent viruses, hackers; electronic signatures and other authentication systems; complete data encryption system and so on.Ⅳ.e-commerce security issues facingAs e-commerce network is the computer-based, it inevitably faces a number of security issues.(1) Information leakPerformance in e-commerce for the leakage of business secrets, including two aspects: the parties are dealing transactions by third parties to steal the contents; transaction to the other party to provide documents used illegal use by third parties.(2) AlteredE-commerce information for business performance in the authenticity and integrity issues. Electronic transaction information in the network transmission process may be others to illegally modify, delete or re-changed, so that information about its authenticity and integrity.(3) IdentificationWithout identification, third-party transactions is likely to fake the identity of parties to a deal breaker, damage the reputation of being counterfeit or stolen by one party to the transaction fake results and so on, for identification, the transaction between the two sides can prevent suspicion situation.(4) Computer virusesComputer virus appeared 10 years, a variety of new virus and its variants rapidly increasing, the emergence of the Internet for the spread of the virus has provided the best medium. Many new viruses directly using the network as its transmission, as well as many viruses spread faster through dried networks, frequently causing billions of dollars in economic losses.(5) HackerWith the spread of a variety of application tools, hackers have been popular, and are not in the past; non-computer expert can not be a hacker. Have kicked Yahoo's mafia boy did not receive any special training, only a few attacks to the users to download software and learn how to use the Internet on a big dry.Ⅴ.e-commerce security and safety factorsEnterprise application security is the most worried about e-commerce, and how to protect the security of e-commerce activities, will remain the core of e-commerce research. As a secure e-commerce system, we must first have a safe, reliable communication network, to ensure that transaction information secure and rapidtransmission; second database server to ensure absolute security against hackers break into networks to steal information. E-commerce security technologies include encryption, authentication technology and e-commerce security protocols, firewall technology.(A), encryption technologyTo ensure the security of data and transactions to prevent fraud, to confirm the true identity of transaction parties, e-commerce to adopt encryption technology, encryption technology is through the use of code or password to protect data security. For encrypted data is called plaintext, specifically through the role of a encryption algorithm, the conversion into cipher text, we will express this change as the cipher text is called encryption, the cipher text by the decryption algorithm to form a clear role in the output of this a process known as decryption. Encryption algorithm known as the key parameters used. The longer the key, the key space is large, traverse the key space the more time spent, the less likely cracked.Encryption technology can be divided into two categories: symmetric encryption and asymmetric encryption. Symmetric encryption to the data encryption standard DES (Data Encryption Standard) algorithm is represented. Asymmetric encryption is usually RSA (Rivets Shamir Aleman) algorithm is represented.(B), authenticationCommonly used security authentication technologies: digital signatures, digital certificates, digital time stamp, CA security authentication technology.(C), hacker protection technologyCurrently, hackers have become the biggest e-commerce security threats, thus preventing hacking network security technology has become the main content, by governments and industry are highly valued. Hacking techniques include buffer overflow attacks, Trojans, port scans, IP fraud, network monitoring, password attacks, and denial of service Dos attacks. At present, people have made many effective anti-hacker technologies, including firewalls, intrusion detection, and network security evaluation techniques.Ⅵ.the future security of e-commerceIncreasingly severe security problems, are growing threat to national and global economic security, governments have been based on efforts in the following areas: (1) Strengthen the legislation, refer to the advanced countries have effective legislation, innovative, e-commerce and improve the protection of the laws againstcyber-crime security system.(2) Establishment of relevant institutions, to take practical measures to combat cyber crime. Development of the law, the implementing agencies should also be used for its relevant laws, which must establish an independent oversight body, such as the executing agency to implement the law.(3) Increase investment in network security technology; improve the level of network security technology. E-commerce security law is the prerequisite and basis for development and secure e-commerce security technology is a means of protection. There are many security issues are technical reasons, it should increase the technology resources, and continuously push forward the development of old technologies and developing new security technology.(4) To encourage enterprises to protect themselves against Internet crime against. To avoid attack, companies can not hold things to chance, must attach great importance to system vulnerabilities, in time to find security holes to install the operating system and server patches, and network security detection equipment should be used regularly scan the network monitoring, develop a set of complete security protection system to enable enterprises to form a system and combined with the comprehensive protection system.(5) To strengthen international cooperation to strengthen global efforts to combat cyber crime. As e-commerce knows no borders, no geographical, it is a completely open area, so the action against cyber crime e-commerce will also be global. This will require Governments to strengthen cooperation, can not have "the saying which goes, regardless of others, cream tile" misconception.(6) To strengthen the network of national safety education, pay attention to the cultivation of outstanding computer.Ⅶ. ConclusionE-commerce in China has developed rapidly in recent years, but the security has not yet established. This has an impact on the development of electronic commerce as a barrier.To this end, we must accelerate the construction of the e-commerce security systems. This will be a comprehensive, systematic project involving the whole society. Specifically, we want legal recognition of electronic communications records of the effectiveness of legal protection for electronic commerce; we should strengthen the research on electronic signatures, to protect e-commerce technology; we need to build e-commerce authentication system as soon as possible, to organize protection for electronic commerce. Moreover, for e-commerce features without borders, we shouldalso strengthen international cooperation, so that e-commerce truly plays its role. Only in this way, we can adapt to the timesPromoting China's economic development; also the only way we can in the economic globalization today, to participate in international competition, and thus gain a competitive advantage.Source: Michael Hecker, Tharam S. Dillon, and Elizabeth Chang IEEE Internet Computing prentice hall publishing, 2002电子商务中的信息安全问题一、引言电子商务(E-Business)是发生在开放网络上的包括企业之间(B2B)、企业和消费者之间(B2C)的商业交易,与传统商务模式相比,电子商务具有高效、便捷、覆盖范围广等特点和优点。
电子信息工程专业毕业论文外文翻译中英文对照翻译

本科毕业设计(论文)中英文对照翻译院(系部)电气工程与自动化专业名称电子信息工程年级班级 04级7班学生姓名指导老师Infrared Remote Control SystemAbstractRed outside data correspondence the technique be currently within the scope of world drive extensive usage of a kind of wireless conjunction technique,drive numerous hardware and software platform support. Red outside the transceiver product have cost low, small scaled turn, the baud rate be quick, point to point SSL, be free from electromagnetism thousand Raos etc.characteristics, can realization information at dissimilarity of the product fast, convenience, safely exchange and transmission, at short distance wireless deliver aspect to own very obvious of advantage.Along with red outside the data deliver a technique more and more mature, the cost descend, red outside the transceiver necessarily will get at the short distance communication realm more extensive of application.The purpose that design this system is transmit cu stomer’s operation information with infrared rays for transmit media, then demodulate original signal with receive circuit. It use coding chip to modulate signal and use decoding chip to demodulate signal. The coding chip is PT2262 and decoding chip is PT2272. Both chips are made in Taiwan. Main work principle is that we provide to input the information for the PT2262 with coding keyboard. The input information was coded by PT2262 and loading to high frequent load wave whose frequent is 38 kHz, then modulate infrared transmit dioxide and radiate space outside when it attian enough power. The receive circuit receive the signal and demodulate original information. The original signal was decoded by PT2272, so as to drive some circuit to accomplishcustomer’s o peration demand.Keywords:Infrare dray;Code;Decoding;LM386;Redoutside transceiver1 Introduction1.1 research the background and significanceInfrared Data Communication Technology is the world wide use of a wireless connection technology, by the many hardware and software platforms supported. Is a data through electrical pulses and infrared optical pulse switch between the wireless data transceiver technology.Infrared transceiver products with low cost, small, fast transmission rate, the point-to-point transmission security, not subject to electromagnetic interference and other characteristics that can be achieved between the different products, rapid, convenient and safe exchange and transmission, In short distance wireless transmission have a very distinct advantage.Infrared transceiver products in the portable product of a great role. At present, the world's 150 million piece of equipment used infrared technology in electronic products and industrial equipment. medical equipment and other fields widely used. For example, 95% of the notebook computers on the installation of infrared transceiver interface the majority of the cell phone is also the allocation of infrared transceiver interface. With the exchange of quantitative data, infrared data communications will enable cell phone data transmission more convenient. With infrareddata transmission technology matures, perfect, low costs, Infrared Transceiver in short distance communications will be more widely applied.This chapter first describes the infrared transceiver IC design issues to the background and significance. then briefed the infrared data communications technology features and applications, and infrared transceiver product characteristics, domestic and international situation and development trend of the last under infrared remote transceiver system in practical application to establish a task of design orientation.1.2 Infrared Remote ControlTransceiver SystemInfrared remote control system is divided into single-channel and multi-channel remote control. Only a command signal transmission channel, called single-channel remote control system; with more than two instructions signal transmission channel known as a multi-channel remote control system. Relatively simple single-channel remote control, in general, only a launcher directive Key receivers and only one circuit implementation. While in the receiving circuit to add more stable memory circuits that can be activated commands to launch a number of key, so that the receiver circuit multistable memory circuit repeatedly to change the state, to realize many of the functional control, But such a state of change is the order. If we are to achieve an arbitrary control, resort to the use of multi-channel remote control system. Multi-channel remote control can be realized by the object of arbitrary multi-function remote control. As for the choice of several routes and what control methods, according to the actual situation (such as object, operational requirements and costaccounting, etc.) to decide. General infrared remote transceiver system by infrared remote control transmitter signal coding, infrared remote control signal receivers and decoders (or decoder chip MCU) and the external circuit consisting of three parts. Signal transmitter remote control code used to generate pulses of infrared emission-driven output infrared remote control signal, receiver completion of the remote control signal amplification and detection, plastic and demodulation encoding pulse. Infrared remote control coded pulse is going to obtain a continuous serial binary code, and for most of the infrared transceiver system, This serial code as micro-controller of the remote control input signals from the internal CPU completion of the remote control instruction decoder, on the other infrared remote control transceivers, the designers of electronic products, The internal micro-controller of the remote control decoder directive is not accessible. Therefore, people are using infrared encoder / decoder chip and microcontroller developed various generic infrared remote transceiver system, In various equipment infrared signals between the transceiver.Remote transceiver system generally transmitters and receivers is composed of two parts. Launchers from the general direction keys, coded instructions circuit modulation circuit, driving circuit, firing circuit of several parts. When pressed a key, the directive coding circuit, in the corresponding instructions encoded signal, the encoder signal to the carrier modulation, Driven by the power amplifier circuit after circuit fired from the field after firing instructions coded modulation signals. General receiver by the receiving circuit, the amplifier circuit, demodulation circuits, instruction decoder circuit, driving circuit, circuitimplementation of several parts. Receiving Circuit will launch vehicles have been coded modulation signal receiving instructions from, and to enlarge evacuation demodulation circuit. Demodulation circuit will have the coding modulation signal demodulation, namely, reduction of signal coding. The instruction decoder to the encoder signal decoding, Driven by the final circuit to drive the implementation of various instructions circuit to control the operation.1.3 infrared remote control transceiver product profiles1.3.1 infrared remote control transceiver product structure and typeCurrently infrared transceiver in accordance with the mode of transmission rate and can be divided into four categories : Serial mode, the highest rate of 115.2 Kbps; medium-speed model : the highest rate of 0.567 Mbps and 1.152Mbps; High-speed mode : The maximum rate of 16 Mbps.Also according to the size chip power consumption can be divided into low-power consumption and standard two categories, low-power type normally used 3 V power supply, transmission distance closer to about 0 - 30cm, which is commonly used standard 5V power supply, transmission distance away at least 1m above.1.3.2 infrared remote control transmitters of the status quo at home and abroadInfrared communication technology in the development stage and there are several infrared communication standards, between different standards for infrared equipment can not infrared communication. To have all the infrared equipment to interoperability in 1993 by more than 20 large manufacturers initiated the establishment of an Infrared Data Association (IRDA)unified the infrared communication standards , which is currently widely used in infrared data communication protocols and standards, also known as the IRDA standard.Since 1993 IRDA since the establishment of the Infrared Data Association members have developed to more than 150. IRDA standards of the industry has been widely recognized and supported. Has been developed with the infrared communications equipment have been as many as 100 species. IR module, installed capacity has reached 150 million sets. Although there is also a short distance wireless Bluetooth technology, But in infrared communication technology low cost and broad compatibility advantages, Infrared data communication in the future will still be a very long time inherent short-range wireless data communications fields play an important role.1.3.3 Infrared Transceiver product development trendIn various infrared transceiver products, although the transmission rate, transmission distance and other characteristics, But infrared transceiver products has been towards improving the transmission rate, increase the transmission distance and lower power consumption, expanding launch reception angle of development. In particular, as the technology development and maturity, the means of transmission is moving in the direction of point-to-multipoint. Therefore infrared remote control transceiver products have broader prospects for development.2 Infrared communication of knowledge2.1 infrared ray foundation knowledge2.1.1 infrared outlinedInfrared is actually a kind of electromagnetic wave. From theanalysis of various natural component of the electromagnetic wave reflected spectrum is :-ray, x-ray, ultraviolet, visible, infrared, microwave and radio wave. From the viewpoint of form, and they did not seem to, but if the wavelength in descending order, and we will find him all the only visible light spectrum of the entire 0.38 μm - 0.76μm so long little area, and adjacent to the visible light and infrared (including the far infrared, mid-infrared and near infrared foreign) accounts for the spectrum of 0.76 μm - 1000μm of a major. Which micron wavelength range also includes UV, visible, near infrared, mid-infrared and far-infrared, microwave.From the above analysis shows that infrared is a very rich spectrum resources, it currently has in production, life, military, medical, and other aspects have been widely used, such as infrared heating, medical infrared, infrared communication, infrared camera, infrared remote control, and so on. Infrared remote control is the many applications of infrared part of the current household appliances widely used in TV remote control, VCR remote control, VCD remote control, high-fidelity audio remote control, are used infra-red remote control, It allows the control of these appliances have become very easy.2.1.2 infrared propertiesInfrared lies between visible light and microwave a wave, it is with certain clinical characteristics of the wave. In the near-infrared, visible light and its adjacent, it is visible in certain characteristics, such as straight-line transmission, reflection, refraction, scattering, diffraction, can be certain objects and can be absorbed through the lens of their focusing. In the far-infrared region, owing to its neighboring microwave, it hassome characteristics of microwave, If a strong penetrating power and can run through some opaque substances. Since in any object, natural profession, regardless of whether its own luminescence (referring to visible light), as long as the temperature is above absolute zero (-273 ° C), moment will be kept around to infrared radiation. Only higher temperature of objects strong infrared radiation, low-temperature objects infrared radiation weaker. Therefore infrared feature is the greatest common in nature, it is called thermal radiation called thermal radiation. Infrared cameras, infrared night market pyroelectric infrared detectors and some other missiles aiming at is the use of this characteristic of infrared work.Infrared and visible light compared to another characteristic of a variety of colors. As the longest wavelength of visible light is a wavelength of the shortest times (780 nm-380 nm), So is called an octave. And infrared wavelength is the longest shortest wavelength of a times, and the longest wavelength infrared is the shortest wavelength of 10 times, that is, 10 octave. Therefore, if visible light can be expressed as seven colors, infrared may performance 70 colors, showing the rich colors. Infrared smoke through the good performance, which is also one of its features.Because not visible to the infrared, it has little effect on the environment. By the wave infrared rays than the long wavelength radio waves, infrared remote control will not affect the nearby radio equipment. Another wavelength of less than 1.5μm near infrared light, transparent atmosphere in the visible light transmission characteristics much better than, because it close to the visible edge of the red light, linear transmission, reflection,refraction and absorption material and the physical characteristics very similar to visible light. Therefore, it can be used with similar visible focusing lens and other optical devices. Because infrared remote control is not as remote as the radio through the barrier to control the object's ability to control, so in the design of household appliances infra-red remote control, wireless remote control as unnecessary, each set (transmitters and receivers) have different frequency or remote coding (Otherwise, wall will control or interference with neighbors household appliances), all similar products in the infrared remote control, The same can control the frequency or coding, and no remote control signal "drop." This universal infrared remote control provides a great convenience. Infrared to visible light, is very subtle and confidentiality, therefore, the security, Alert and other security devices have been widely used. Infrared remote control is simple in structure and easy, low-cost, anti-interference capability, high reliability are a number of advantages, is a close-up remote control, especially in indoor remote control optimized manner. 2.1.3 infrared diode characteristicsInfrared is not visible, people here are not aware of. Electronic technology is used infrared light emitting diode (also known as the IR emission diode) to generate infrared. Infrared remote control transceiver is using near-infrared transmission control instructions 0.76μm wavelength of ~ 1. 5μm. Near-infrared remote control as a light source, because there infrared light emitting diodes and infrared receiving device (photodiode. Transistor and PV) and the luminescence peak wavelength of lightby the general 0.8μm ~ 0. 94μm. in the near-infrared band, both of the spectrum is the coincidence to a good match, access to higher transmission efficiency and higher reliability. Commonly used infrared diode, and its shape is similar LED light emitting diodes, Its basic circuit shown in figure 2 -2. The triode plans for the switch, when the base added a driving signal, Transistor saturated conduction infrared LED D is also Wizard Link, issued infrared (near infrared about 0.93 μm). D. The pressure drop of about 1.4 V and the current general for 10-20mA. To adapt to the working voltage of the D loop resistance often as a series of infrared diode current limit resistance.When the circuit diagram of the infrared emission control corresponding to the controlled device, the control of the distance and D is proportional to the transmitting power. In order to increase the distance of infrared control, infrared diode D should work on the pulse state that work is the lifeblood of current. Because pulse light (optical modulation) the effective transmission distance and pulse is proportional to the peak current, only maximize peak current Ip, will increase the infrared distance. Ip increase is a way to reduce the pulse duty cycle, that is compressed pulse width τ some TV infrared remote control, its infrared luminescence of the pulse duty cycle of about 1/4-1/3; Some electrical products infrared remote control, its duty cycle of 1 / 10. Decreasing pulse duty cycle also enable low-power infrared LED distance of the greatly increased. Common infrared light emitting diodes, power is divided into small power (1 mW - 10mW). Chinese power (20mW - 50mW) and power (50mW - 100mW more) three categories. Use different power infrared LED, the allocation shouldbe driven by the corresponding power control. Figure 2 -2 by the reflected infrared light-emitting diodes to make produce optical modulation, Drivers only need to add the control of a certain frequency pulse voltage.Infrared transmitter and receiver in the way the two kinds of straight, and the second is reflective. Luminescence pointed straight pipe and tube receiver placed in a relatively controlled and fired on the two ends, a certain distance away from the middle; Reflective means luminescent tube and pipe parallel with the receiving peacetime, without always receiving tube light, luminescence only in possession of the infrared light reflected from encountered, the receiving tube received from the reflected infrared before work.2.2 infrared communication basic tenets2.2.1 infrared communication PrincipleCommunication is the use of infrared wavelength of 900 nm-infrared waves from 1000 to serve as an information carrier, through infrared technology between the two close communication and confidentiality of information transmitted. Infrared communication system structure include : part launcher, channel, the receiver part.Launcher source letter issued after the binary signal from the high-frequency modulated infrared LED sent, receiving device regard the reception of high-frequency signals from the infrared receiver tube after receiving further demodulation photoelectric conversion of the original information of a mass communication lose way. Afterwards the former Information received after receivingpart of the drive circuit connected to the expected completion of the various functions. To which the modulation coding style pulse width modulation (by changing the pulse width modulated signal PWM) and pulse modulation time (through change the pulse train interval time between the modulation signal PPM) two.2.2.2 infrared communication system elements(1) Launches : Currently there is a infrared wireless digital communications system sources of information including voice, data, images. Its methods of work for the launch of the receiver can be divided into different layout LOS way (Light-of-Sight , intracardiac way), diffuse (diffuse) mode. LOS way directional, it has good channel characteristics such advantages, but the existence of a "shadow" effect. difficult to achieve roaming function. Roaming means the main features of non-directional, and easy to implement roaming function, but its channel quality is better sometimes LOS way. Transmission of signals required for a few of (the sampling was quantified), the general need for baseband modulation, transmission, modulation, sometimes signal source coding, the above-driven signals from photoelectric converter complete optical signal transmission. Infrared wireless digital communications system and its scope of work-for-fired power distribution, the quality of the communication. While using various methods to improve optical transmitter power, the other using spatial diversity, holographic films and so on so diffuse light for the launch of space optical power evenly distributed.(2) Channel : infrared wireless digital communication channel refers to the transmitters and receivers in the space between. Due to natural light and artificial light sources such as light signalsin the context of intervention, and the source - Electrical Equipment, The optical noise and disturbances, infrared wireless digital communications in some occasions, poor quality, At this point needed to channel coding. Infrared wireless communication system, the optical signal reflection, light scattering and background noise and interference effects, Infrared wireless digital channel presence multi-path interference and noise, This is to improve the quality and access for high-speed applications should be addressed. Infrared wireless digital communication channel often used by the major optical components, optical filter, condenser, their role is : plastic, filter, depending on the field transformation, the band division, the lens can be used as launch-ray focusing, the use of optical filters filter out stray light, the use of optical lenses to expand the field of view receiver, able to make use of optical components for the link frequency division multiplexing, etc.. Infrared wireless communication channel optical noise : the natural noise (sunlight) and anthropogenic interference (fluorescent lighting). can be modulated by the transmission technology such as filters and adding to be addressed.(3) receivers : Channel optical signal from the optical receiver partially photoelectric conversion, In order to remove noise and intersymbol interference and other functions. Infrared wireless digital communications system receiver include optical receiver parts and follow-up sampling, filtering, judgment, quantity, balanced and decoding part. Infrared wireless optical receiver often used amplifier, and called for large-bandwidth, high gain, low noise and low noise, frequency response and channelimpulse response matched. To be suppressed by low-frequency noise and human disturbance needs a band-pass filter. To obtain large optical receiver scope and instantaneous field of view, often using spherical optical lens.2.2.3 infrared communications featureWireless communications are a lot of ways, some using infrared communication with the following characteristics :• The high frequency, wave length, and fired the energy concentrated space propagation attenuation coefficient can ensure the effective signal transmission;• infrared is the invisible light, strong confidentiality and use it as an information carrier. device when there is no visual pollution, it does no harm to the human body;• dissemination without limitation, and there is no question of frequency interference with radio-wave pattern, not on the spectrum resources to the relevant authorities for the application and registration, easy to implement;• has a good point, when the transmission equipment and infrared receiver ports line up straight, deviation of not more than about 15 degrees when infrared devices running the best effect;• through infrared or not bypassed and objects, data transmission, optical path can not be blocked;• currently produce and receive infrared signals in the technology is relatively mature, components small size, low cost production of simple, easy to produce and modulation advantages.2.3 infrared communication code based on the knowledgeUsually, infrared remote control transmitters will signal (pulse binary code) modulation at 38 KHz carrier, After buffer amplified sent to the infrared light-emitting diodes, infrared signals into firing away. Pulse binary code in a variety of formats. One of the most commonly used code is PWM (pulse width modulation code) and the PPM code (Pulse Code Modulation). The former said in a pulse width, pulse indicated 0. The latter pulse width, but the width of code-not the same, the codes represent a bit - and the digits represent narrow 0.Remote coding pulse signal (PPM code as an example) are usually guided by the code, the system code, the anti-code system, a feature code, functional anti-code signal components. Guide the code name for the initial code, by the width of 9 ms and the margin width of 4.5 ms to the low-level components (different remote control systems in the low-level high width of a certain distinction), remote coding used to mark the beginning of pulsed signals. System identification code is also called code, which used to indicate the type of remote control system, in order to distinguish other remote-control system, prevent the remote control system malfunction. Functional code is also called scripts, which represents the corresponding control functions, Receiver of the micro-controller functions under the numerical code to complete the various functions operating. Anti-code system and function codes are anti-system code and the functional code against code Anti-code can be joined to the receiver synchronization transmission process leads to errors. In order to improve performance and reduce interference power consumption, The remote control will be coded pulse frequency of 38 KHz (for the cycle of 26.3 ms) of the carrier signal pulse reshuffle system (PAM), and then sent to the bufferamplified infrared LED, the remote control signal transmitter away.Address code and data codes are composed of different pulse width expressed that the two narrow pulse "0"; 2 pulse width "1";a narrow pulse width and pulse expressed an "F" is the code addresses "vacant."Is the first part of a group a group of code, each code synchronization between separated. The plan is to enlarge the second half of a group code : a code from 12 AD (the address code plus data code For example, eight address code plus four data code), each with two AD-Pulse's : Pulse said the two "0"; 2 pulse width "1"; a narrow pulse width and pulse expressed an "F" is the code addresses "vacant."Realize fired at each fired at least four groups code, PT2272 only twice in a row to detect the same address code plus data code data will be the code "1" is driven The data should be output to drive margin and VT terminal for synchronous serial.红外遥控系统摘要红外数据通信技术是目前在世界范围内被广泛使用的一种无线连接技术,被众多的硬件和软件平台所支持。
最新电子信息工程专业英语课文翻译(第3版)

电子信息工程专业英语教程第三版译者:唐亦林p32In 1945 H. W. Bode presented a system for analyzing the stability of feedback systems by using graphical methods. Until this time, feedback analysis was done by multiplication and division, so calculation of transfer functions was a time consuming and laborious task. Remember, engineers did not have calculators or computers until the '70s. Bode presented a log technique that transformed the intensely mathematical process of calculating a feedback system's stability into graphical analysis that was simple and perceptive. Feedback system design was still complicated, but it no longer was an art dominated by a few electrical engineers kept in a small dark room. Any electrical engineer could use Bode's methods find the stability of a feedback circuit, so the application of feedback to machines began to grow. There really wasn't much call for electronic feedback design until computers and transducers become of age.1945年HW伯德提出了一套系统方法,用图形化方法来分析反馈系统的稳定性。
电子信息工程专业外文翻译--客户信息管理系统

外文原文:Database Management Systems A database (sometimes spelled data base) is also called an electronic database , referring to any collection of data, or information, that is specially organized for rapid search and retrieval by a computer. Databases are structured to facilitate the storage, retrieval , modification, and deletion of data in conjunction with various data-processing operations .Databases can be stored on magnetic disk or tape, optical disk, or some other secondary storage device. A database consists of a file or a set of files. The information in these files may be broken down into records, each of which consists of one or more fields. Fields are the basic units of data storage , and each field typically contains information pertaining to one aspect or attribute of the entity described by the database . Using keywords and various sorting commands, users can rapidly search , rearrange, group, and select the fields in many records to retrieve or create reports on particular aggregate of data. Complex data relationships and linkages may be found in all but the simplest databases .The system software package that handles the difficult tasks associated with creating ,accessing, and maintaining database records is called a database management system(DBMS).The programs in a DBMS package establish an interface between the database itself and the users of the database.. (These users may be applications programmers, managers and others with information needs, and various OS programs.) A DBMS can organize, process, and present selected data elements form the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions that aren’t available in regular reports. These questions might initially be vague and/or poorly defined ,but people can “browse” through the database until they have the needed information. In short, the DBMS will “manage” the stored data items and assemble the needed items from the common database in response to the queries of those who aren’t programmers.A database management system (DBMS) is composed of three major parts:(1)a storage subsystem that stores and retrieves data in files;(2) a modeling 7and manipulation subsystem that provides the means with which to organize the dataand to add , delete, maintain, and update the data;(3)and an interface between the DBMS and its users. Several major trends are emerging that enhance the value and usefulness of database management systems; Managers: who require more up-to-data information to make effective decision Customers: who demand increasingly sophisticated information services and more current information about the status of their orders, invoices, and accounts. Users: who find that they can develop custom applications with database systems in a fraction of the time it takes to use traditional programming languages. Organizations : that discover information has a strategic value; they utilize their database systems to gain an edge over their competitors. The Database Model A data model describes a way to structure and manipulate the data in a database. The structural part of the model specifies how data should be represented(such as tree, tables, and so on ).The manipulative part of the model specifies the operation with which to add, delete, display, maintain, print, search, select, sort and update the data. Hierarchical Model The first database management systems used a hierarchical model-that is-they arranged records into a tree structure. Some records are root records and all others have unique parent records. The structure of the tree is designed to reflect the order in which the data will be used that is ,the record at the root of a tree will be accessed first, then records one level below the root ,and so on. The hierarchical model was developed because hierarchical relationships are commonly found in business applications. As you have known, an organization char often describes a hierarchical relationship: top management is at the highest level, middle management at lower levels, and operational employees at the lowest levels. Note that within a strict hierarchy, each level of management may have many employees or levels of employees beneath it, but each employee has only one manager. Hierarchical data are characterized by this one-to-many relationship among data. In the hierarchical approach, each relationship must be explicitly defined when the database is created. Each record in a hierarchical database can contain 8only one key field and only one relationship is allowed between any two fields. This can create a problem because data do not always conform to such a strict hierarchy. Relational Model A major breakthrough in database research occurred in 1970 whenE. F. Codd proposed a fundamentally different approach to database management called relational model ,which uses a table as its data structure. The relational database is the most widely used database structure. Data is organized into related tables. Each table is made up of rows called and columns called fields. Each record contains fields of data about some specific item. For example, in a table containing information on employees, a recordwould contain fields of data such as a person’s last name ,first name ,and street address. Structured query language(SQL)is a query language for manipulating data in a relational database .It is nonprocedural or declarative, in which the user need only specify an English-like description that specifies the operation and the described record or combination of records. A query optimizer translates the description into a procedure to perform the database manipulation. Network Model The network model creates relationships among data through a linked-list structure in which subordinate records can be linked to more than one parent record. This approach combines records with links, which are called pointers. The pointers are addresses that indicate the location of a record. With the network approach, a subordinate record can be linked to a key record and at the same time itself be a key record linked to other sets of subordinate records. The network mode historically has had a performance advantage over other database models. Today , such performance characteristics are only important in high-volume ,high-speed transaction processing such as automatic teller machine networks or airline reservation system. Both hierarchical and network databases are application specific. If a new application is developed ,maintaining the consistency of databases in different applications can be very difficult. For example, suppose a new pension application is developed .The data are the same, but a new database must be created. Object Model The newest approach to database management uses an object model , in which records are represented 9by entities called objects that can both store data and provide methods or procedures to perform specific tasks. The query language used for the object model is the same object-oriented programming language used to develop the database application .This can create problems because there is no simple , uniform query language such asSQL . The object model is relatively new, and only a few examples of object-oriented database exist. It has attracted attention because developers who choose an object-oriented programming language want a database based on an object-oriented model. Distributed Database Similarly , a distributed database is one in which different parts of the database reside on physically separated computers . One goal of distributed databases is the access of information without regard to where the data might be stored. Keeping in mind that once the users and their data are separated , the communication and networking concepts come into play . Distributed databases require software that resides partially in the larger computer. This software bridges the gap between personal and large computers and resolves the problems of incompatible data formats. Ideally, it would make the mainframe databases appear to be large libraries of information, with most of the processing accomplished on the personal computer. A drawback to some distributed systems is that they are often based on what is called a mainframe-entire model , in which the larger host computer is seen as the master and the terminal or personal computer is seen as a slave. There are some advantages to this approach . With databases under centralized control , many of the problems of data integrity that we mentioned earlier are solved . But today’s personal computers, departmental computers, and distributed processing require computers and their applications to communicate with each other on a more equal or peer-to-peer basis. In a database, the client/server model provides the framework for distributing databases. One way to take advantage of many connected computers running database applications is to distribute the application into cooperating parts that are independent of one anther. A client is an end user or computer program that requests resources across a network. A server is a computer running 10software that fulfills those requests across a network . When the resources are data in a database ,the client/server model provides the framework for distributing database.A file serve is software that provides access to files across a network. A dedicated file server is a single computer dedicated to being a file server. This is useful ,for example ,if the files are large and require fast access .In such cases, a minicomputer or mainframe would be used as a file server. A distributed file server spreads the filesaround on individual computers instead of placing them on one dedicated computer. Advantages of the latter server include the ability to store and retrieve files on other computers and the elimination of duplicate files on each computer. A major disadvantage , however, is that individual read/write requests are being moved across the network and problems can arise when updating files. Suppose a user requests a record from a file and changes it while another user requests the same record and changes it too. The solution to this problems called record locking, which means that the first request makes others requests wait until the first request is satisfied . Other users may be able to read the record, but they will not be able to change it . A database server is software that services requests to a database across a network. For example, suppose a user types in a query for data on his or her personal computer . If the application is designed with the client/server model in mind ,the query language part on the personal computer simple sends the query across the network to the database server and requests to be notified when the data are found. Examples of distributed database systems can be found in the engineering world. Sun’s Network Filing System(NFS),for example, is used in computer-aided engineering applications to distribute data among the hard disks in a network of Sun workstation. Distributing databases is an evolutionary step because it is logical that data should exist at the location where they are being used . Departmental computers within a large corporation ,for example, should have data reside locally , yet those data should be accessible by authorized corporate management when they want to consolidate departmental data . DBMS software will protect the security and integrity 11of the database , and the distributed database will appear to its users as no different from the non-distributed database . In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm of most organizations and is used to pump information lifeblood through the arteries of the network. Because of the critical nature of this application, the data server is also the one of the most popular targets for hackers. If a hacker owns this application, he can cause the company’s "heart" to suffer a fatal arrest. Ironically,although most users are now aware of hackers, they still do not realize how susceptible their database servers are to hack attacks. Thus, this article presents a description of the primary methods of attacking database servers (also known as SQL servers) and shows you how to protect yourself from these attacks. You should note this information is not new. Many technical white papers go into great detail about how to perform SQL attacks, and numerous vulnerabilities have been posted to security lists that describe exactly how certain database applications can be exploited. This article was written for the curious non-SQL experts who do not care to know the details, and as a review to those who do use SQL regularly. What Is a SQL Server?A database application is a program that provides clients with access to data. There are many variations of this type of application, ranging from the expensive enterprise-level Microsoft SQL Server to the free and open source mySQL. Regardless of the flavor, most database server applications have several things in common. First, database applications use the same general programming language known as SQL, or Structured Query Language. This language, also known as a fourth-level language due to its simplistic syntax, is at the core of how a client communicates its requests to the server. Using SQL in its simplest form, a programmer can select, add, update, and delete information in a database. However, SQL can also be used to create and design entire databases, perform various functions on the returned information, and even execute other programs. To illustrate how SQL can be used, the following is an example of a simple standard SQL query anda more powerful SQL query: 12 Simple: "Select * fromdbFurniture.tblChair" This returns all information in the table tblChair from the database dbFurniture.Complex: "EXEC master..xp_cmdshell ‘dir c:\’" This short SQL command returns to the client the list of files and folders under the c:\ directory of the SQL server. Note that this example uses an extended stored procedure that is exclusive to MS SQL Server. The second function that database server applications share is that they all require some form of authenticated connection between client and host. Although the SQL language is fairly easy to use, at least in its basic form,any client that wants to perform queries must first provide some form of credentials that will authorize the client; the client also must define the format of the request and response. This connection is defined by several attributes, depending on the relative location of the client and what operating systems are in use. We could spend a whole article discussing various technologies such as DSN connections, DSN-less connections, RDO, ADO, and more, but these subjects are outside the scope of this article. If you want t o learn more about them, a little Google’ing will provide you with more than enough information. However, the following is a list of the more common items included in a connection request. Database source Request type Database User ID Password Before any connection can be made, the client must define what type of database server it is connecting to. This is handled by a software component that provides the client with the instructions needed to create the request in the correct format. In addition to the type of database, the request type can be used to further define how the client’s request will be handled by the server. Next comes the database name and finally the authentication information. All the connection information is important, but by far the weakest link is the authentication information—or lack thereof. In a properly managed server, each database has its own users with specifically designated permissions that control what type of activity they can perform. For example, a user account would be set up as read only for applications that need to only access information. Another account should be used for inserts or updates, and maybe even a third 13account would be used for deletes. This type of account control ensures that any compromised account is limited in functionality. Unfortunately, many database programs are set up with null or easy passwords, which leads to successful hack attacks。
信息管理系统外文资料翻译

毕业设计(论文)外文资料翻译学院:计算机工程学院专业:通信工程姓名:学号:1081302228外文出处:/space.php?uid=7433&do=blog&id=5689(用外文写)附件: 1.外文资料翻译译文;2.外文原文。
注:请将该封面与附件装订成册。
附件1:外文资料翻译译文信息管理系统对于“管理信息系统”并没有一致的定义。
一些作者喜欢用其他术语代替,例如:“信息处理系统”“信息与决策系统”“组织信息系统”,或者干脆将“信息系统”用组织内具有支持操作、管理、决策职能的计算机信息处理系统代替。
这篇文章使用“管理信息系统”一词,是因为它是通俗易懂的,当涉及组织信息系统时也常用“信息系统”代替“管理信息系统”。
一个管理信息系统的定义,通常被理解为:一种集成用户机器系统,为组织提供信息支持运作、管理、决策职能。
该信息系统利用计算机硬件和软件;手工处理程序;模拟分析法计划、控制和决策;和数据库。
事实上,它是一个集成系统并不意味着它是单一的,单块集成结构;相反,它意味着零件适合加入整体设计。
内容定义如下:计算机为主的用户机器系统理论上,管理信息系统可以脱离计算机上而存在,但是计算机的存在可以让管理信息系统可行。
问题不是计算机是否被使用在管理信息系统中,而是信息的使用被计算机化的程度。
用户机器系统的概念暗示了, 一些任务最好由人执行, 其他的最好由机器做。
MIS的使用者是那些负责输入输入数据、指示系统或运用系统信息产品的人。
因为许多问题,用户和计算机建立了一个联合系统,其结果通过一套在计算机和用户之间的相互作用得到。
用户机器的相互作用是由用户连接在计算机上的输入-输出设备(通常是一个视觉显示终端)推动的。
计算机可以使一台个人机器服务于一名用户或者一台大规模的机器为一定数量通过终端由通信线路连接的用户服务。
用户输入-输出设备允许直接输入数据和紧接着输出结果。
例如:一个人使用计算机交互的在金融理财上通过在终端键盘输入提交“如果什么,怎么办?”之类的问题,结果几秒钟后便被显示在屏幕上。
论文电子信息类外文翻译

[3]李炬光.ARM应用系统的开发[M].清华大学出版社,2003,第33-36页(中国)
[4]徐丽娜.神经网络控制[M].电子工业出版社,2003,第33-36页(中国)
[5]郑佩青.数字信号处理[M].清华大学出版社,2008年,第98-198页(中国)
3.3网络应用和测试
在实际应用中,收集的样本数据为272个随机组合的常用的负载类型。首先将200个样品作为测试部分,其余的72个样本则用于评价。在测试过程中系统采用梯度最速下降法,其中:学习因子η= 0.0075,动量因子α= 0.085。经测试结果表明,均方误差为0.118348,相关系数为0.994。以上数据则表明网络识别满足实际应用需求。
2.2多功能电源控制柜
多功能电源控制柜是整个系统的核心部分。它不仅对多用户的电气参数进行实时测量,而且还对负荷具有自动识别,切断危险载荷故障,记录数据和定时等功能。为了便于系统维护,模块化设计部分的应用程序有三个部分构成:包括输入接口板部分,主控板部分和输出接口板部分。
2.2.1输入和输出接口板
输入接口部分有16个模拟信号输入通道。第一个通道为相电压信号输入通道,其余15个通道为负载用户当前的信号通道。每个阶段的15个通道的各相电压和电流信号分别转换为0 ~ 3.3 v的模拟信号,再通过变压器、运算放大器和滤波器电路送入主控板TMS320F2812 ADC模块,以满足TMS320F2812 ADC模块的单极性特性。交流零电平的输入信号提高至1.6 v作为高精度电源参考值。输出接口部分同பைடு நூலகம்5个用户通道的继电器连接在一起。基于负载识别结果信息反馈和管理人员的命令指示,TMS320F2812的输出端口可以直接驱动ULN2804来控制相应的继电器。
电子信息工程外文翻译外文文献英文文献文献翻译

Technology and Application of Fieldbus Control System -------- IntelligentEquipment & Measurement And Control System Based on DeviceNetPromoted by the new technological revolution that automation control technology is tending digitization and internet in the field of automation industry, Shanghai Aton Electric Co., Ltd. developed Intelligent Equipment & Measurement And Control System Based on DeviceNet as a high and new technology industrialization model project. It was a state hi-tech development project of 2000 and was approved by the State Committee of Technology. Shanghai Aton Electric Co., Ltd. constructed production line of intelligent controller of pump and valve, relying on Shanghai Electric (Group) Corporation; constructed measurement and control system FCS R&D center of intelligent controller of pump and valve and built up mass production R&D basis, cooperating with Shanghai Jiaotong University and Shanghai University; constructed FCS remote diagnosis and service center of intelligent controller of pump and valve; constructed FCS training center of intelligent controller of pump and valve; founded mass production R&D basis along with the Rockwell Laboratory of Shanghai Jiaotong University and CIMS Center.1 Summary(1)Fieldbus control system is a system applied to field of production and microcomputerized measurement control equipment to realize both-way multinode serial communications. It is also called low-level control network for open, digital and multiplespot communications.Application: Flow Control System of Manufacturing; Process Control System; Traffic Control & Management; Building Automation. Features: Fieldbus control system is low-level low-bandwidth digital communication and control network in industrial system as well as open system connecting microcomputerized appearance. Intelligent instrument and controller are equal to microcomputer. They make up network with Fieldbus control system as the links to complete digital communication and other tasks.(2)Difference between FCS and DCS,FCS is updated control system after DCS integrated with digital control system and distributing control system. It solves the problem that in traditional DCS, devices made by different manufacturers cannot be connected. They can't realize exchange and operation to organize an network system with wider range of information sharing. It conquers the defect that special closed system for network should be used for communication in DCS to realize various functions of integrated automation. It turns the distributing structure combining concentration with deconcentration in DCS into new-type full distributing structure. Itreleases the control function to the field thoroughly and makes it possible to realize basic control function by means of fieldbus equipment itself. FCS breaks the traditional structure form of control system. The traditional analog control system adopts one-to-one equipment tie-wire and puts up connections respectively according to control loop. FCS adopts intelligent field equipment to place the control module, all input/output modules that used to be in the control chamber of DCS into field equipment. Since field equipment has ability to communicate, the field measuring and transferring instruments can transfer signals to actuating mechanism such as valve directly. Its control function can be fulfilled directly on the spot independent of the computer or control meter in the control chamber, which realizes thorough decentralized control.FCS adopts digital signals to replace analog signals so that multiple signals (including multiple operating parameter values, device status and failure information) can be transferred on a pair of cables. Meanwhile, it can give power supply to several devices. No switched block for analog/digital or digital/analog is needed besides fieldbus.(3) C haracteristics of FCS• Open System;• Interoperability;• replace ability of devices made by different manufacturers.• Intelligentize and Autonomy;• Field equipment completing basic functions of automatic control.• Decentralized System Structure;• Field Adaptability;• Relatively Strong Interference Killing Feature and Safety• Intelligentized local equipment can save investment and quantity of hardware• Saving installation expenses and cables• Saving daily maintenance expenses• Enhancing accuracy and reliability of system• Enhancing initiativeness of system integration for users(4) Development Background and Trend of Fieldbus Control System, With the rapid development of computer and computer network, FCS has been rapidly developed as the interlinked communication network between the field intelligentdevices in the field of process automation, building and traffic etc. Because FCS meets the needs that industrial control system is developing in the way of decentralization, network and intellectualized, it has become the focus of global industrial automation and been universally concerned by the whole world. FCS has causedgreat revolutions on the aspects of system structure and function system for the current production of automation instrument, distributing control system and programmable controller. It is predicted that FCS will be the general trends in a very long time in the future fore sure.2 APPLICATION OF RELAYThe product reliability generally refers to the operating reliability. It is defined as: the ability of accomplishing the specified function under prescribed conditions and in prescribed time. It consists of intrinsic reliability and application reliability. The intrinsic reliability is determined by product designing and manufacturing technique, and the application reliability is concerned with the correct application of users and the services provided by the manufacturer before and after selling. When using relay, the user should pay attention to the following items.2.1 Coil applied voltageIt is best to choose the coil applicative voltage according to the rated voltage in design, or choose the voltage according to the temperature rising curve. Using any coil voltage that is less than the rated voltage will affect the operation of the relay. The coil operating voltage refers to the voltage that is applied between the coil terminals. The voltage value between the two terminals must be guaranteed, especially when using enlargement circuit to energize the coil. Whereas, it will also affect the relay characteristics if the applied voltage exceeds the highest rated voltage. Exorbitant voltage will bring exorbitant coil temperaturerising, especially in high temperature ambient. Exorbitant temperature rising will damage the insulating material and affect the working safety of relay. For magnetic latching relay, energizing (or return) pulse width should not less than 3 times of the operating (or return) time, otherwise, the relay would be left on the middle-position state. When using solid-state components to energize the coil, the components dielectric strength must be above 80V, and the leakage of current must be as little as possible to ensure the relay to release.Energizing power source: Under 110% of the rated current, the adjusting ratio of the power source is less than 10% (or the output impedance is less than 5% of the coil impedance), the wave voltage of the DC power source is less than 5%. The AC wave is sine wave; the waviness coefficient is between 0.95~1.25; wave distortion is within ±10%; the frequency change is within ±1Hz or ±1% of the specified frequency (choosing the bigger value). The output power should not less than coil power consumption.2.2 Transient suppressionAt the moment when the coil power is stopped, peak-inverse voltage that is more than 30 times ofthe coil rated voltage is produced on the coil, which is harmful to the electronic circuit. Generally, the peak-inverse voltage is suppressedby transient suppression (cutting-peak) diode or resistance to limit the peak-inverse voltage within 50V. But the diode in parallel connection will delay3~5 times of the release time. If the request of the release time is high, a suitable resistance in series can be putted with and at one end of the diode.The power supply to relays in parallel connection and series connection, When several relays in parallel connection are supplied, the relay that the peak-inverse voltage is higher will release power to the relays that the peak-inverse voltage is lower. The release time of the relay will delay. So the relays in parallel connection should be controlled separately to eliminate mutual influence.The relays with different coil resistance and power can'bt e used in series, otherwise, the relay that the coil current is higher in the series circuit can'otperate reliably. Only the relays of the same specification can be used in series, but the peak-inverse voltage will be increased and the peak-inverse voltage should be suppressed. Resistance in series can be used to bear the part voltage that exceeds the rated voltage of the coil according to the ratio of the divided voltage.2.2.1 Contact loadThe load applied to the contacts should be accordant to the rated load and characteristics of the contacts. A load that is not applied according to the rated value range will cause problem. The relay that is only suitable for DC load can used in ' t be AC occasions. The relay that can switch 10A load can ' t always reliably operate in low level load (less tha n 10m AX6A) or in dry circuit occasi ons. The relay that can switch single-phase AC power source isn 'atlways suitable to switch two single-phase AC loads that aren 't synchronous; the relay that is onlyiesdpteocisfwitch the load of AC 50Hz(or 60Hz)can't be used to switch AC load of 400Hz.2.2.2 Parallel and series connection of contactsThe contacts used in parallel connection can ' t increase the load current, becausethe operating times of several sets of contacts are absolutely different; that is to say, there is still only a set of contacts switching the increased load. This would damage or weld the contacts and make the contacts can ' t close or open. The parallel connectionof the contacts can decreasehte misplay of “ break ” . But the parallel connection of the contacts would increase the misplay of “ freezing ”. Because the misplay of “bre the main pattern of invalidation of contacts, the parallel connection can increase the reliability and can be used on the pivotal part of equipments. But the applied voltage should not exceed the highest operating voltage of the coil and should not less than 90% of the rated voltage, otherwise, the coil life and the applicative reliability would be damaged. The series connection of the contacts can increasethe load voltage. The amount of the contact sets is equal to the times that the load voltage can be increased.The series connection of contacts can decrease the misplay of “ freezing ”, but it w increase the misplay of “ break ”An. yway, when using redundant technology to increase the operating reliability of contacts, the characteristics and size and the failure mode of load must be considered.2.2.3 Switching speedThe switching speed should not exceed the reciprocal of 10 times of the sum of operating and release time (times/s), otherwise, the contacts can ' t switch on stead Magnetic latching should be used under the pulse width specified in the technique criterion, or the coil may be damaged.3 RVT DISTRIBUTING ELECTRICITY INTEGRATE TEST APPARATUSBasic functionMeasure asupervision:Three mutually electric voltage/electric current/ power factor with a great achievement/ power without a great achievement/electricity with a greatachiverment/electricity/homophonic-wave electric voltage/ homophonic-wave electric/ current Day electric voltage/ electric current biggest and minimum value/fire for the failure Electric voltage over top, the limit/ lack mutually of time homophonic-wave analyzes is up to 13 times.The data is stored for 2 months. The data communicateRS232/485 communicating connect,The way in communicating can adopt the spot communicating or the long range communicating. ,Possible to settle invoke orthe solid hour invokes, responding to the modification and long ranges control of the parameter. Without power compensationTaking physics measuresas the power factor without a great achievement,the power factor with a great achievement and the dull place without power compensation;Y+ the combination method of the △,Y+ the △ connects the line method,Y+ △ , Y, the △ connects the line method. Data managementAccording to WINDOW98 operation terrace, data in communication automatically reports born statement, curve and pillar form diagrams. Circulation of the protectionWhen the charged barbed wire net of mutually electric voltage over press, owe to press, and a super limit hour fast cut off in expiation of capacitor,When the charged barbed wire net lacks mutually or super limit in the preface of zero hour fast cut off in expiation of capacitor. screen manifestationChinese operation interface ,Adopt 128*64 the back light liquid crystal display.The solid hour shows the charged barbed wire net relevant parameter.view manifestation to place the parameter.现场总线控制系统的技术和应用随着新的科学技术革命的出现,在自动化工业领域中,自动控制技术的发展趋向于数字化和网络互联化。
电子信息工程专业毕设 文献翻译 附英文原文

5.3. 时钟独立的显性误差
对于每一个特定的GPS时钟,在每个适用的时间从KF1相位偏差估计值减去 UECC估计值, 去估计其OEIC的相位。 在测量加工, OEIC包含在几部分纳秒内(见 图4)。图4展示了的两种情况下地面工作站时钟S1的OEIC。在蓝线的可见区间和 KF1测距处理显然有别于没有测量的传播间隔。在测量处理期间,KF1估计误差 的观察目标部分包含在几部分纳秒内。OEIC的协方差顺序计算需要每个时间点 的 KF1相位偏差估计误差和UECC估计误差的互协方差矩阵值。 我尚未能计算这
X K 1|K 1 X K 1|K K K 1[ y K 1 y( X K 1|K )]
Hale Waihona Puke (5)5. 难以观察的 GPS 时钟系统
GPS时间是由作战空军(USAF)卡尔曼滤波器处理 GPS伪距测量产生的。 GPS时间是多个GPS时钟的平均相位, 可是, 通过 GPS伪距测量, 每个运行的GPS 时钟的时钟相位是难以观察的,演示如下。GPS导航星的轨道参数是从GPS伪距 观测可观察到的。从GPS伪距测量可以得到USAF(美国空军)卡尔曼滤波器估 计轨道参数和时钟同步参数, 因此以这种方式将状态估计值分为隐式的时钟参数 子集和显式的轨道参数子集。通过应用谢尔曼有关MU函数的定理,演示了这种 分区方式。
4.3.2. 非线性函数 MU
计算 n ×1 矩阵滤波器增益 K K 1 :
T T 1 K K 1 PK 1|K H K 1 [ H K 1 PK 1| K H K 1 R K 1 ]
(4)
滤波器测量更新 n×1 状态估计矩阵 X K 1|K 1 ,观测 yK+1 得
态估计误差协方差方阵(正特征值)
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
外文文献翻译
文献、资料中文题目:客户信息管理系统
文献、资料英文题目:
文献、资料来源:
文献、资料发表(出版)日期:
院(部):
专业:电子信息工程
班级:
姓名:
学号:
指导教师:
翻译日期:2017.02.14
毕业设计(论文)外文文献翻译
(本科学生用)
题目:客户信息管理系统
_
外文文献翻译(译成中文1000字左右):
【主要阅读文献不少于5篇,译文后附注文献信息,包括:作者、书名(或论文题目)、出版社(或刊物名称)、出版时间(或刊号)、页码。提供所译外文资料附件(印刷类含封面、封底、目录、翻译部分的复印件等,网站类的请附网址及原文】
译文
数据库管理系统介绍,数据库database,有时拼作data base,又称为电子数据库,是专门组织起来的一组数据或信息,其目的是为了便于计算机快速查询及检索。数据库的结构是专门设计的,在各种数据处理操作命令的支持下,可以简化数据的存储、检索、修改和删除。数据库可以存储在磁盘、磁带、光盘或其他辅助存储设备上。数据库由一个或一套文件组成 其中的信息可以分解为记录每一记录又包含一个或多个字段或称为域。字段是数据存取的基本单位。数据库用于描述实体,其中的一个字段通常表示与实体的某一属性相关的信息。通过关键字以及各种分类、排序、命令。用户可以对多条记录的字段进行查询,重新整理、分组或选择,以实体对某一类数据的检索,也可以生成报表。所有数据库,中都有复杂的数据关系及其链接。处理与创建,访问以及维护数据库记录有关的复杂任务的系统软件包叫做数据库管理系统DBMS。DBMS软件包中的程序在数据库与其用户间建立接口。这些用户可以是应用程序员,管理员及其他需要信息的人员和各种操作系统程序。DBMS可组织处理和表示从数据库中选出的数据元。该功能使决策者能搜索,探查和查询数据库的内容,从而对在正规报告中没有的,不再出现的且无法预料的问题做出回答。这些问题最初可能是模糊的并且、或者是定义不恰当的,但是人们可以浏览数据库直到获得所需的信息。简言之DBMS将“管理”存储的数据项,并从公共数据库中汇集所需的数据项以回答非程序员的询问。DBMS由3个主要部分组成、1存储子系统:存储和检索文件中的数据,2建模和操作子系统:提供组织数据以及添加、删除、维护、更新数据的方法,3用户和DBMS之间的接口。在提高数据库管理系统的价值和有效性方面正在展现以下一些重要发展趋势,1.管理人员需要最新的信息以做出有效的决策。2.客户需要越来越复杂的信息服务以及更多的有关其订单,发票和账号的当前信息。3.用户发现他们可以使用传统的程序设计语言 在很短的一段时间内用数据库系统开发客户应用程序。4.商业公司发现了信息的战略价值 他们利用数据库系统领先于竞争对手。数据库模型数据库模型描述了在数据库中结构化和操纵数据的方法,模型的结构部分规定了数据如何被描述,例如树、表等,模型的操纵部分规定了数据添加、删除、显示、维护、打印、查找、选择、排序和更新等操作。
分层模型:
第一个数据库管理系统使用的是分层模型,也就是说,将数据记录排列成树形结构。一些记录时根目录,在其他所有记录都有独立的父记录。树形结构的设计反映了数据被使用的顺序,也就是首先访问处于树根位置的记录,接下来是跟下面的记录等等。分层模型的开发是因为分层关系在商业应用中普遍存在,众所周知,一个组织结构图表就描述了一种分层关系,高层管理人员在最高层,中层管理人员在较低的层次,负责具体事务的雇员在最底层。值得注意的是,在一个严格的分层结构体系中,在每个管理层下可能有多个雇员或多个层次的雇员,但每个雇员只有一个管理者。分层结构数据的典型特征是数据之间的一对多关系。在分层方法中 当数据库建立时,每一关系即被明确地定义。在分层数据库中的每一记录只能包含一个关键字段,任意两个字段之间只能有一种关系。由于数据并不总是遵循这种严格的分层关系,所以这样可能会出现一些问题。关系模型在1970年,数据库研究取得了重大突破。E.F.Codd提出了一种截然不同的数据库管理方法,使用表作为数据结构,称之为关系模型.关系数据库是使用最广的数据结构,数据被组织成关系表,每个表由称作记录的行和称作字段的列组成。每个记录包含了专用项目的字段值。例如,在一个包含雇员信息的表中,一个记录包含了像一个人姓名和地址这样的字段的值。结构化查询语言SQL,是一种在关系型数据库中用于处理数据的查询语言。它是非过程化语言或者说是描述性的,用户只须指定一种类似于英语的描述,用来确定操作,记录或描述记录组合。查询优化器将这种描述翻译为过程执行数据库操作。网状模型网状模型在数据之间通过链接表结构创建关系,子记录可以链接到多个父记录。这种将记录和链接捆绑到一起的方法叫做指针,他是指向一个记录存储位置的存储地址。使用网状方法,一个子记录可以链接到一个关键记录,同时 它本身也可以作为一个关键记录。链接到其他一系列子记录。在早期,网状模型比其他模型更有性能优势,但是在今天,这种优势的特点只有在自动柜员机网络,航空预定系统等大容量和高速处理过程中才是最重要的。分层和网状数据库都是专用程序,如果开发一个新的应用程序,那么在不同的应用程序中保持数据库的一致性是非常困难的。例如开发一个退休金程序,需要访问雇员数据,这一数据同时也被工资单程序访问。虽然数据是相同的,但是也必须建立新的数据库。对象模型最新的数据库管理方法是使用对象模型,记录由被称作对象的实体来描述,可以在对象中存储数据,同时提供方法或程序执行特定的任务。对象模型使用的查询语言与开发数据库程序所使用的面向对象的程序设计语言是相同的,因为没有像SQL这样简单统一的查询语言,所以会产生一些问题。对象模型相对较新,仅有少数几个面向对象的数据库实例。它引起了人们的关注 因为选择面向对象程序设计语言的开发人员希望有一个基于在对象模型基础上的数据库。分布式数据库类似的 分布式数据库指的是数据库的各个部分分别存储在物理上相互分开的计算机上。分布式数据库的一个目的是访问数据信息时不必考虑其他位置。注意,一旦用户和数据分开 通信和网络则开始扮演重要角色。分布式数据库需要部分常驻于大型主机上的软件,这些软件在大型机和个人计算机之间建立桥梁,并解决数据格式不兼容的问题。在理想情况下,大型主机上的数据库看起来像是一个大的信息仓库,而大部分处理则在个人计算机上完成。分布式数据库系统的一个缺点是它们常以主机中心模型为基础,在这种模型中,大型主机看起来好像是雇主,而终端和个人计算机看起来好像是奴隶。但是这种方法也有许多优点,由于数据库的集中控制,前面提到的数据完整性和安全性的问题就迎刃而解了。当今的个人计算机,部门级计算机和分布式处理都需要计算机之间以及应用程序之间在相等或对等的基础上相互通信,在数据库中客户机/服务器模型为分布式数据库提供了框架结构。利用相互连接的计算机上运行的数据库应用程序的一种方法是将程序分解为相互独立的部分。客户端是一个最终用户或通过网络申请资源的计算机程序,服务器是一个运行着的计算机软件,存储着那些通过网络传输的申请。当申请的资源是数据库中的数据时,客户机/服务器模型则为分布式数据库提供了框架结构。文件服务器指的是一个通过网络提供文件访问的软件,专门的文件服务器是一台被指定为文件服务器的计算机。这是非常有用的,例如,如果文件比较大而且需要快速访问,在这种情况下,一台微型计算机或大型主机将被用作文件服务器。分布式文件服务器将文件分散到不同的计算机上,而不是将它们集中存放到专门的文件服务器上。后一种文件服务器的优点包括在其他计算机上存储和检索文件的能力,并可以在每一台计算机上消除重复文件。然而,一个重要的缺点是每个读写请求需要在网络上传播,在刷新文件时可能出现问题。假设一个用户申请文件中的一个数据并修改它,同时另外一个用户也申请这个数据并修改它 解决这种问题的方法叫做数据锁定,即第一个申请使其他申请处于等待状态,直到完成第一个申请,其他用户可以读取这个数据,但不能修改。数据库服务器是一个通过网络为数据库申请提供服务的软件,例如,假设某个用户在他的个人计算机上输入了一个数据查询命令,如果应用程序按照客户机/服务器模型设计,那么这个人计算机上的查询语言通过网络传送数据库服务器上,当发现数据时发出通知。在工程界也有许多分布式数据库的例子,如SUN公司的网络文件系统,NFS,被应用到计算机辅助工程应用程序中,将数据分散到由SUN工作站组成的网络上的不同硬盘之间。分布式数据库是革命性的进步,因为把数据存放在被使用位置上是很合乎常理的。例如一个大公司不同部门之间的计算机,应该将数据存储在本地,然而,当被授权的管理人员需要整理部门数据时,数据应该能够被访问。数据库信息系统软件将保护数据库的安全性和完整性,对用户而言,分布式数据库和非分布式数据库看起来没有什么差别。在这个信息时代,数据管理服务器已经成为公司的核心。这一个软件的模块控制整个组织的顺利运行就如同人身体动脉使得鲜血在身体中流通顺畅。因为这个所以就要把好身份申请这一关,数据管理服务器也是黑客最为关心的目标之一。