外文参考文献下载
建筑施工质量管理体系外文翻译参考文献

建筑施工质量管理体系外文翻译参考文献1. GB/T -2016 英文名称:Quality management systems--Requirements《质量管理体系要求》2. GB/T -2016 英文名称:Quality management systems--Guidelines for the application of ISO 9001:2015《质量管理体系应用指南》3. GB -2013 英文名称:Code for construction quality acceptance of building engineering《建筑工程质量验收规范》4. GB -2011 英文名称:Code for acceptance of constructional quality of masonry engineering《砌体工程施工质量验收规范》5. GB -2010 英文名称:Code for design of concrete structures《混凝土结构设计规范》6. GB -2013 英文名称:Standard for building drawing standardization《建筑施工图件编制规范》7. GB -2001 英文名称:Code for acceptance of construction quality of pile foundation engineering《桩基工程施工质量验收规范》8. /T 11-2017 英文名称:Technical specification for concrete structure of tall building《高层建筑混凝土结构技术规范》9. 63-2013 英文名称:Technical specification for strengthening of building structures using carbon fiber reinforced plastics 《建筑结构加固碳纤维布增强复合材料技术规范》10. 81-2002 英文名称:Technical specification for application of sprayed mortar in building construction and acceptance of quality 《建筑喷涂砂浆工程施工及质量验收技术规定》。
英文论文(外文文献)翻译成中文的格式与方法

英文论文(外文文献)翻译成中文的格式与方法英文论文(外文文献)翻译成中文的格式与方法本文关键词:外文,英文,中文,翻译成,文献英文论文(外文文献)翻译成中文的格式与方法本文简介:在撰写毕业设计(论文)或科研论文时,需要参考一些相关外文文献,了解国外的最新研究进展,这就需要我们找到最新最具代表性的外文文献,进行翻译整理,以备论文写作时参考,外文文献中英文文献占绝大多数,因此英文论文准确的翻译成中文就显得尤为重要!一、外文文献从哪里下载1、从知网国际文献总库中找英文论文(外文文献)翻译成中文的格式与方法本文内容:在撰写毕业设计(论文)或科研论文时,需要参考一些相关外文文献,了解国外的最新研究进展,这就需要我们找到最新最具代表性的外文文献,进行翻译整理,以备论文写作时参考,外文文献中英文文献占绝大多数,因此英文论文准确的翻译成中文就显得尤为重要!一、外文文献从哪里下载1、从知网国际文献总库中找,该数据库中包含14,000多家国外出版社的文献,囊括所有专业的英文文献资料。
2、一些免费的外文数据库或网站,为了方便大家查找,编者整理成文档供大家下载:国外免费文献数据库大全下载3、谷歌学术检索工具,检索时设置成只检索英文文献,键入与专业相关的关键词即可检索。
二、英文论文翻译格式与要求翻译的外文文献的字符要求不少于1.5万(或翻译成中文后至少在3000字以上)。
字数达到的文献一篇即可。
翻译的外文文献应主要选自学术期刊、学术会议的文章、有关着作及其他相关材料,应与毕业论文(设计)主题相关,并作为外文参考文献列入毕业论文(设计)的参考文献。
并在每篇中文译文首页用"脚注"形式注明原文作者及出处,中文译文后应附外文原文。
需认真研读和查阅术语完成翻译,不得采用翻译软件翻译。
中文译文的编排结构与原文同,撰写格式参照毕业论文的格式要求。
参考文献不必翻译,直接使用原文的(字体,字号,标点符号等与毕业论文中的参考文献要求同),参考文献的序号应标注在译文中相应的地方。
外文参考文献

[1]G. Einsele a, SK. Chough b, T. Shiki,1996. Depositional events and their records-an introduction[J].Sedimentary Geology, 104:l-9.[2]Kauffman E.G.,Elder W.P. and Sageman B.B..High-resolution correlation: a new tool in chronostratigraphy. In: Einsele et al. (Editor), Cycle and Events in Stratigraphy. Springer-Verlag, Berlin, Heidelberg, 1991,798-819.[3]Bruce C. Heezen, D.B. Ericson, Maurice Ewing.Further evidence for a turbidity current following the 1929 Grand banks earthquake[J].Deep Sea Search.1954,1(4):193-202.[4]Cita and Lucchi.Marine Geology[J].Seismicity and sedimentation.1984, 55(1-2):VII–X.[5]Frank R Ettensohn,Carlton E Brett. Stratigraphic evidence from the Appalachian Basin for continuation of the Taconian orogeny into Early Silurian time[J]. Physics and Chemistry of the Earth.2002,27(1): 279-288.[6]Fabrizio Storti, Paola Vannucchi.Preface[J].Sedimentary Geology.2007,196(1-4):1-3.[7]R. Bernhart Owen;Robin W. Renaut and Michael G. te Miocene lacustrine sedimentation in the Mytilinii Basin, Samos Island, Greece[J].Journal of Paleolimnology.2011,46(1):151-166.[8]DengWeidong, YangBaoguo, WuXiaogen. 1997. Studies of storm deposits in China:a review. Continental Shelf Research, 17(13): 1645-1658.[9]H.N. Bhattacharya, Biplab Bhattacharya, Indranil Chakraborty, Abhijit Chakraborty.Sole marks in storm event beds in the Permo-Carboniferous Talchir Formation, Raniganj Basin, India[J].Sedimentary Geology.2004, 166(3-4):209–222. [10]Shu Degan , Conway Morris S , Zhang Xingliang .A Pikaialike chordate from the Lower Cambrian of China[J]. Nature.1996a,384 : 156 -157.[10]Shu Degan, Conway Morris S, Zhang Xingliang, et al.. A pipiscid-like fossil from the Lower Cambrian of South China[J]. Nature, 1999a,400: 746 -749.[11]Becker L, Poreda R J, Hunt A G, et al . . Impact event at the Permian-Triassicboundary: Evidence from extraterrestrial noble gases in fullerenes[J]. Science, 2001, 291 (5508): 1530-1533.[12]Bambach R K. . Phanerozoic biodiversity mass extinctions[J]. Annu Rev Earth Planet Sci..2006, 34: 127-155.[13]Alvarez L W, Alvarez W, Asaro F, et al.. Extraterrestrial Cause for the Cretaceous-Tertiary Extinction[J]. Science.1980,208: 1095-1108.[14]Wolfgang Stinnesbeck, Gerta Keller, Peter Schulte, Doris Stüben, Zsolt Berner, Utz Kramar, JoséGuadalupe Lopez-Oliva.The Cretaceous–Tertiary (K/T) boundary transition at Coxquihui, state of Veracruz, Mexico: evidence for an early Danian impact event?[J]Journal of South American Earth Sciences .2002,15 (5) :497–509. [15]S. J. Nichols and S. G. Hagemann[16]P. Farrimond, G. Eglinton, S.C. Brassell, H.C. Jenkyns.The Toarcian black shale event in northern Italy[J].Organic Geochemistry.1988,13(4-6):823-832.[17]Röhl, Hans-Joachim;Schmid-Röhl, Annette;Oschmann, Wolfgang;Frimmel, Andreas.Erratum to “The Posidonia Shale (Lower Toarcian) of SW-Germany: an oxygen-depleted ecosystem controlled by sea level and palaeoclimate”[J].Palaeogeography, Palaeoclimatology, Palaeoecology.2001,169(3-4):271.[18]Anthony S. Cohen;Angela L. Coe and David B. Kemp.The Late Palaeocene–Early Eocene and Toarcian (Early Jurassic) carbon isotope excursions: a comparison of their time scales, associated environmental changes, causes and consequences[J].Journal of the Geological Society.2007,164(6):1093-1108.[19]Bryony A. Caswell;Angela L. Coe;Anthony S. Cohen.New range data for marine invertebrate species across the early Toarcian (Early Jurassic) mass extinction[J].Journal of the Geological Society.2009,166(5):859-872.[20]Mattioli[21]Suan[22]Hoffman P F, Li Zhengxiang. A palaeogeographic context for Neoproterozoic glaciation[J]. Palaeogeogrpahy.2009,277: 158-172.[23Ramzi Gharsalli, Taher Zouaghi, Mohamed Soussi, Riadh Chebbi, Sami Khomsi, Mourad Bédir.Seismic sequence stratigraphy of Miocene deposits related to eustatic,tectonic and climatic events, Cap Bon Peninsula, northeastern Tunisia[J].Comptes Rendus Geoscience.2013,345(9-10):401-417.[24]Yuzhu Zhang;Chun Chang Huang;Jiangli Pang;Xiaochun Zha;Yali Zhou;Xiaqing Wang.Holocene palaeoflood events recorded by slackwater deposits along the middle Beiluohe River valley, middle Yellow River basin, China[J].Boreas.2015,44(1):127-138.[25]Keim[26]Hornung[27]David Z. Piper.Rare earth elements in the sedimentary cycle: A summary[J].Chemical Geology.1974,14(4):285-304.[28]Mclennan S M. 1989. Rare earth elements in sedimentary rocks: influence of provenance and sedimentary processes. In: Lipin B R, Mckay G R, eds. Geochemistry and mineralogy of rare earth elements. Reviews in Mineralogy, 21: 169-200.[29]Mclennan S M, Hemming S, McDanial D K, et al.. Geochemical approaches to sedimentation, provenance, and tectonics[J]. Geological Society of American Special Paper.1993,284: 21-40.[30]Bhatia M R..Plate tectonics and geochemical composition of sandstones[J].Journal of Geology, 1991,91:611-629.。
云计算外文翻译参考文献

云计算外文翻译参考文献(文档含中英文对照即英文原文和中文翻译)原文:Technical Issues of Forensic Investigations in Cloud Computing EnvironmentsDominik BirkRuhr-University BochumHorst Goertz Institute for IT SecurityBochum, GermanyRuhr-University BochumHorst Goertz Institute for IT SecurityBochum, GermanyAbstract—Cloud Computing is arguably one of the most discussedinformation technologies today. It presents many promising technological and economical opportunities. However, many customers remain reluctant to move their business IT infrastructure completely to the cloud. One of their main concerns is Cloud Security and the threat of the unknown. Cloud Service Providers(CSP) encourage this perception by not letting their customers see what is behind their virtual curtain. A seldomly discussed, but in this regard highly relevant open issue is the ability to perform digital investigations. This continues to fuel insecurity on the sides of both providers and customers. Cloud Forensics constitutes a new and disruptive challenge for investigators. Due to the decentralized nature of data processing in the cloud, traditional approaches to evidence collection and recovery are no longer practical. This paper focuses on the technical aspects of digital forensics in distributed cloud environments. We contribute by assessing whether it is possible for the customer of cloud computing services to perform a traditional digital investigation from a technical point of view. Furthermore we discuss possible solutions and possible new methodologies helping customers to perform such investigations.I. INTRODUCTIONAlthough the cloud might appear attractive to small as well as to large companies, it does not come along without its own unique problems. Outsourcing sensitive corporate data into the cloud raises concerns regarding the privacy and security of data. Security policies, companies main pillar concerning security, cannot be easily deployed into distributed, virtualized cloud environments. This situation is further complicated by the unknown physical location of the companie’s assets. Normally,if a security incident occurs, the corporate security team wants to be able to perform their own investigation without dependency on third parties. In the cloud, this is not possible anymore: The CSP obtains all the power over the environmentand thus controls the sources of evidence. In the best case, a trusted third party acts as a trustee and guarantees for the trustworthiness of the CSP. Furthermore, the implementation of the technical architecture and circumstances within cloud computing environments bias the way an investigation may be processed. In detail, evidence data has to be interpreted by an investigator in a We would like to thank the reviewers for the helpful comments and Dennis Heinson (Center for Advanced Security Research Darmstadt - CASED) for the profound discussions regarding the legal aspects of cloud forensics. proper manner which is hardly be possible due to the lackof circumstantial information. For auditors, this situation does not change: Questions who accessed specific data and information cannot be answered by the customers, if no corresponding logs are available. With the increasing demand for using the power of the cloud for processing also sensible information and data, enterprises face the issue of Data and Process Provenance in the cloud [10]. Digital provenance, meaning meta-data that describes the ancestry or history of a digital object, is a crucial feature for forensic investigations. In combination with a suitable authentication scheme, it provides information about who created and who modified what kind of data in the cloud. These are crucial aspects for digital investigations in distributed environments such as the cloud. Unfortunately, the aspects of forensic investigations in distributed environment have so far been mostly neglected by the research community. Current discussion centers mostly around security, privacy and data protection issues [35], [9], [12]. The impact of forensic investigations on cloud environments was little noticed albeit mentioned by the authors of [1] in 2009: ”[...] to our knowledge, no research has been published on how cloud computing environments affect digital artifacts,and on acquisition logistics and legal issues related to cloud computing env ironments.” This statement is also confirmed by other authors [34], [36], [40] stressing that further research on incident handling, evidence tracking and accountability in cloud environments has to be done. At the same time, massive investments are being made in cloud technology. Combined with the fact that information technology increasingly transcendents peoples’ private and professional life, thus mirroring more and more of peoples’actions, it becomes apparent that evidence gathered from cloud environments will be of high significance to litigation or criminal proceedings in the future. Within this work, we focus the notion of cloud forensics by addressing the technical issues of forensics in all three major cloud service models and consider cross-disciplinary aspects. Moreover, we address the usability of various sources of evidence for investigative purposes and propose potential solutions to the issues from a practical standpoint. This work should be considered as a surveying discussion of an almost unexplored research area. The paper is organized as follows: We discuss the related work and the fundamental technical background information of digital forensics, cloud computing and the fault model in section II and III. In section IV, we focus on the technical issues of cloud forensics and discuss the potential sources and nature of digital evidence as well as investigations in XaaS environments including thecross-disciplinary aspects. We conclude in section V.II. RELATED WORKVarious works have been published in the field of cloud security and privacy [9], [35], [30] focussing on aspects for protecting data in multi-tenant, virtualized environments. Desired security characteristics for current cloud infrastructures mainly revolve around isolation of multi-tenant platforms [12], security of hypervisors in order to protect virtualized guest systems and secure network infrastructures [32]. Albeit digital provenance, describing the ancestry of digital objects, still remains a challenging issue for cloud environments, several works have already been published in this field [8], [10] contributing to the issues of cloud forensis. Within this context, cryptographic proofs for verifying data integrity mainly in cloud storage offers have been proposed,yet lacking of practical implementations [24], [37], [23]. Traditional computer forensics has already well researched methods for various fields of application [4], [5], [6], [11], [13]. Also the aspects of forensics in virtual systems have been addressed by several works [2], [3], [20] including the notionof virtual introspection [25]. In addition, the NIST already addressed Web Service Forensics [22] which has a huge impact on investigation processes in cloud computing environments. In contrast, the aspects of forensic investigations in cloud environments have mostly been neglected by both the industry and the research community. One of the first papers focusing on this topic was published by Wolthusen [40] after Bebee et al already introduced problems within cloud environments [1]. Wolthusen stressed that there is an inherent strong need for interdisciplinary work linking the requirements and concepts of evidence arising from the legal field to what can be feasibly reconstructed and inferred algorithmically or in an exploratory manner. In 2010, Grobauer et al [36] published a paper discussing the issues of incident response in cloud environments - unfortunately no specific issues and solutions of cloud forensics have been proposed which will be done within this work.III. TECHNICAL BACKGROUNDA. Traditional Digital ForensicsThe notion of Digital Forensics is widely known as the practice of identifying, extracting and considering evidence from digital media. Unfortunately, digital evidence is both fragile and volatile and therefore requires the attention of special personnel and methods in order to ensure that evidence data can be proper isolated and evaluated. Normally, the process of a digital investigation can be separated into three different steps each having its own specificpurpose:1) In the Securing Phase, the major intention is the preservation of evidence for analysis. The data has to be collected in a manner that maximizes its integrity. This is normally done by a bitwise copy of the original media. As can be imagined, this represents a huge problem in the field of cloud computing where you never know exactly where your data is and additionallydo not have access to any physical hardware. However, the snapshot technology, discussed in section IV-B3, provides a powerful tool to freeze system states and thus makes digital investigations, at least in IaaS scenarios, theoretically possible.2) We refer to the Analyzing Phase as the stage in which the data is sifted and combined. It is in this phase that the data from multiple systems or sources is pulled together to create as complete a picture and event reconstruction as possible. Especially in distributed system infrastructures, this means that bits and pieces of data are pulled together for deciphering the real story of what happened and for providing a deeper look into the data.3) Finally, at the end of the examination and analysis of the data, the results of the previous phases will be reprocessed in the Presentation Phase. The report, created in this phase, is a compilation of all the documentation and evidence from the analysis stage. The main intention of such a report is that it contains all results, it is complete and clear to understand. Apparently, the success of these three steps strongly depends on the first stage. If it is not possible to secure the complete set of evidence data, no exhaustive analysis will be possible. However, in real world scenarios often only a subset of the evidence data can be secured by the investigator. In addition, an important definition in the general context of forensics is the notion of a Chain of Custody. This chain clarifies how and where evidence is stored and who takes possession of it. Especially for cases which are brought to court it is crucial that the chain of custody is preserved.B. Cloud ComputingAccording to the NIST [16], cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal CSP interaction. The new raw definition of cloud computing brought several new characteristics such as multi-tenancy, elasticity, pay-as-you-go and reliability. Within this work, the following three models are used: In the Infrastructure asa Service (IaaS) model, the customer is using the virtual machine provided by the CSP for installing his own system on it. The system can be used like any other physical computer with a few limitations. However, the additive customer power over the system comes along with additional security obligations. Platform as a Service (PaaS) offerings provide the capability to deploy application packages created using the virtual development environment supported by the CSP. For the efficiency of software development process this service model can be propellent. In the Software as a Service (SaaS) model, the customer makes use of a service run by the CSP on a cloud infrastructure. In most of the cases this service can be accessed through an API for a thin client interface such as a web browser. Closed-source public SaaS offers such as Amazon S3 and GoogleMail can only be used in the public deployment model leading to further issues concerning security, privacy and the gathering of suitable evidences. Furthermore, two main deployment models, private and public cloud have to be distinguished. Common public clouds are made available to the general public. The corresponding infrastructure is owned by one organization acting as a CSP and offering services to its customers. In contrast, the private cloud is exclusively operated for an organization but may not provide the scalability and agility of public offers. The additional notions of community and hybrid cloud are not exclusively covered within this work. However, independently from the specific model used, the movement of applications and data to the cloud comes along with limited control for the customer about the application itself, the data pushed into the applications and also about the underlying technical infrastructure.C. Fault ModelBe it an account for a SaaS application, a development environment (PaaS) or a virtual image of an IaaS environment, systems in the cloud can be affected by inconsistencies. Hence, for both customer and CSP it is crucial to have the ability to assign faults to the causing party, even in the presence of Byzantine behavior [33]. Generally, inconsistencies can be caused by the following two reasons:1) Maliciously Intended FaultsInternal or external adversaries with specific malicious intentions can cause faults on cloud instances or applications. Economic rivals as well as former employees can be the reason for these faults and state a constant threat to customers and CSP. In this model, also a malicious CSP is included albeit he isassumed to be rare in real world scenarios. Additionally, from the technical point of view, the movement of computing power to a virtualized, multi-tenant environment can pose further threads and risks to the systems. One reason for this is that if a single system or service in the cloud is compromised, all other guest systems and even the host system are at risk. Hence, besides the need for further security measures, precautions for potential forensic investigations have to be taken into consideration.2) Unintentional FaultsInconsistencies in technical systems or processes in the cloud do not have implicitly to be caused by malicious intent. Internal communication errors or human failures can lead to issues in the services offered to the costumer(i.e. loss or modification of data). Although these failures are not caused intentionally, both the CSP and the customer have a strong intention to discover the reasons and deploy corresponding fixes.IV. TECHNICAL ISSUESDigital investigations are about control of forensic evidence data. From the technical standpoint, this data can be available in three different states: at rest, in motion or in execution. Data at rest is represented by allocated disk space. Whether the data is stored in a database or in a specific file format, it allocates disk space. Furthermore, if a file is deleted, the disk space is de-allocated for the operating system but the data is still accessible since the disk space has not been re-allocated and overwritten. This fact is often exploited by investigators which explore these de-allocated disk space on harddisks. In case the data is in motion, data is transferred from one entity to another e.g. a typical file transfer over a network can be seen as a data in motion scenario. Several encapsulated protocols contain the data each leaving specific traces on systems and network devices which can in return be used by investigators. Data can be loaded into memory and executed as a process. In this case, the data is neither at rest or in motion but in execution. On the executing system, process information, machine instruction and allocated/de-allocated data can be analyzed by creating a snapshot of the current system state. In the following sections, we point out the potential sources for evidential data in cloud environments and discuss the technical issues of digital investigations in XaaS environmentsas well as suggest several solutions to these problems.A. Sources and Nature of EvidenceConcerning the technical aspects of forensic investigations, the amount of potential evidence available to the investigator strongly diverges between thedifferent cloud service and deployment models. The virtual machine (VM), hosting in most of the cases the server application, provides several pieces of information that could be used by investigators. On the network level, network components can provide information about possible communication channels between different parties involved. The browser on the client, acting often as the user agent for communicating with the cloud, also contains a lot of information that could be used as evidence in a forensic investigation. Independently from the used model, the following three components could act as sources for potential evidential data.1) Virtual Cloud Instance: The VM within the cloud, where i.e. data is stored or processes are handled, contains potential evidence [2], [3]. In most of the cases, it is the place where an incident happened and hence provides a good starting point for a forensic investigation. The VM instance can be accessed by both, the CSP and the customer who is running the instance. Furthermore, virtual introspection techniques [25] provide access to the runtime state of the VM via the hypervisor and snapshot technology supplies a powerful technique for the customer to freeze specific states of the VM. Therefore, virtual instances can be still running during analysis which leads to the case of live investigations [41] or can be turned off leading to static image analysis. In SaaS and PaaS scenarios, the ability to access the virtual instance for gathering evidential information is highly limited or simply not possible.2) Network Layer: Traditional network forensics is knownas the analysis of network traffic logs for tracing events that have occurred in the past. Since the different ISO/OSI network layers provide several information on protocols and communication between instances within as well as with instances outside the cloud [4], [5], [6], network forensics is theoretically also feasible in cloud environments. However in practice, ordinary CSP currently do not provide any log data from the network components used by the customer’s instances or applications. For instance, in case of a malware infection of an IaaS VM, it will be difficult for the investigator to get any form of routing information and network log datain general which is crucial for further investigative steps. This situation gets even more complicated in case of PaaS or SaaS. So again, the situation of gathering forensic evidence is strongly affected by the support the investigator receives from the customer and the CSP.3) Client System: On the system layer of the client, it completely depends on the used model (IaaS, PaaS, SaaS) if and where potential evidence could beextracted. In most of the scenarios, the user agent (e.g. the web browser) on the client system is the only application that communicates with the service in the cloud. This especially holds for SaaS applications which are used and controlled by the web browser. But also in IaaS scenarios, the administration interface is often controlled via the browser. Hence, in an exhaustive forensic investigation, the evidence data gathered from the browser environment [7] should not be omitted.a) Browser Forensics: Generally, the circumstances leading to an investigation have to be differentiated: In ordinary scenarios, the main goal of an investigation of the web browser is to determine if a user has been victim of a crime. In complex SaaS scenarios with high client-server interaction, this constitutes a difficult task. Additionally, customers strongly make use of third-party extensions [17] which can be abused for malicious purposes. Hence, the investigator might want to look for malicious extensions, searches performed, websites visited, files downloaded, information entered in forms or stored in local HTML5 stores, web-based email contents and persistent browser cookies for gathering potential evidence data. Within this context, it is inevitable to investigate the appearance of malicious JavaScript [18] leading to e.g. unintended AJAX requests and hence modified usage of administration interfaces. Generally, the web browser contains a lot of electronic evidence data that could be used to give an answer to both of the above questions - even if the private mode is switched on [19].B. Investigations in XaaS EnvironmentsTraditional digital forensic methodologies permit investigators to seize equipment and perform detailed analysis on the media and data recovered [11]. In a distributed infrastructure organization like the cloud computing environment, investigators are confronted with an entirely different situation. They have no longer the option of seizing physical data storage. Data and processes of the customer are dispensed over an undisclosed amount of virtual instances, applications and network elements. Hence, it is in question whether preliminary findings of the computer forensic community in the field of digital forensics apparently have to be revised and adapted to the new environment. Within this section, specific issues of investigations in SaaS, PaaS and IaaS environments will be discussed. In addition, cross-disciplinary issues which affect several environments uniformly, will be taken into consideration. We also suggest potential solutions to the mentioned problems.1) SaaS Environments: Especially in the SaaS model, the customer does notobtain any control of the underlying operating infrastructure such as network, servers, operating systems or the application that is used. This means that no deeper view into the system and its underlying infrastructure is provided to the customer. Only limited userspecific application configuration settings can be controlled contributing to the evidences which can be extracted fromthe client (see section IV-A3). In a lot of cases this urges the investigator to rely on high-level logs which are eventually provided by the CSP. Given the case that the CSP does not run any logging application, the customer has no opportunity to create any useful evidence through the installation of any toolkit or logging tool. These circumstances do not allow a valid forensic investigation and lead to the assumption that customers of SaaS offers do not have any chance to analyze potential incidences.a) Data Provenance: The notion of Digital Provenance is known as meta-data that describes the ancestry or history of digital objects. Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud environments, yet it is still a challenging issue today [8]. Albeit data provenance is of high significance also for IaaS and PaaS, it states a huge problem specifically for SaaS-based applications: Current global acting public SaaS CSP offer Single Sign-On (SSO) access control to the set of their services. Unfortunately in case of an account compromise, most of the CSP do not offer any possibility for the customer to figure out which data and information has been accessed by the adversary. For the victim, this situation can have tremendous impact: If sensitive data has been compromised, it is unclear which data has been leaked and which has not been accessed by the adversary. Additionally, data could be modified or deleted by an external adversary or even by the CSP e.g. due to storage reasons. The customer has no ability to proof otherwise. Secure provenance mechanisms for distributed environments can improve this situation but have not been practically implemented by CSP [10]. Suggested Solution: In private SaaS scenarios this situation is improved by the fact that the customer and the CSP are probably under the same authority. Hence, logging and provenance mechanisms could be implemented which contribute to potential investigations. Additionally, the exact location of the servers and the data is known at any time. Public SaaS CSP should offer additional interfaces for the purpose of compliance, forensics, operations and security matters to their customers. Through an API, the customers should have the ability to receive specific information suchas access, error and event logs that could improve their situation in case of aninvestigation. Furthermore, due to the limited ability of receiving forensic information from the server and proofing integrity of stored data in SaaS scenarios, the client has to contribute to this process. This could be achieved by implementing Proofs of Retrievability (POR) in which a verifier (client) is enabled to determine that a prover (server) possesses a file or data object and it can be retrieved unmodified [24]. Provable Data Possession (PDP) techniques [37] could be used to verify that an untrusted server possesses the original data without the need for the client to retrieve it. Although these cryptographic proofs have not been implemented by any CSP, the authors of [23] introduced a new data integrity verification mechanism for SaaS scenarios which could also be used for forensic purposes.2) PaaS Environments: One of the main advantages of the PaaS model is that the developed software application is under the control of the customer and except for some CSP, the source code of the application does not have to leave the local development environment. Given these circumstances, the customer obtains theoretically the power to dictate how the application interacts with other dependencies such as databases, storage entities etc. CSP normally claim this transfer is encrypted but this statement can hardly be verified by the customer. Since the customer has the ability to interact with the platform over a prepared API, system states and specific application logs can be extracted. However potential adversaries, which can compromise the application during runtime, should not be able to alter these log files afterwards. Suggested Solution:Depending on the runtime environment, logging mechanisms could be implemented which automatically sign and encrypt the log information before its transfer to a central logging server under the control of the customer. Additional signing and encrypting could prevent potential eavesdroppers from being able to view and alter log data information on the way to the logging server. Runtime compromise of an PaaS application by adversaries could be monitored by push-only mechanisms for log data presupposing that the needed information to detect such an attack are logged. Increasingly, CSP offering PaaS solutions give developers the ability to collect and store a variety of diagnostics data in a highly configurable way with the help of runtime feature sets [38].3) IaaS Environments: As expected, even virtual instances in the cloud get compromised by adversaries. Hence, the ability to determine how defenses in the virtual environment failed and to what extent the affected systems havebeen compromised is crucial not only for recovering from an incident. Also forensic investigations gain leverage from such information and contribute to resilience against future attacks on the systems. From the forensic point of view, IaaS instances do provide much more evidence data usable for potential forensics than PaaS and SaaS models do. This fact is caused throughthe ability of the customer to install and set up the image for forensic purposes before an incident occurs. Hence, as proposed for PaaS environments, log data and other forensic evidence information could be signed and encrypted before itis transferred to third-party hosts mitigating the chance that a maliciously motivated shutdown process destroys the volatile data. Although, IaaS environments provide plenty of potential evidence, it has to be emphasized that the customer VM is in the end still under the control of the CSP. He controls the hypervisor which is e.g. responsible for enforcing hardware boundaries and routing hardware requests among different VM. Hence, besides the security responsibilities of the hypervisor, he exerts tremendous control over how customer’s VM communicate with the hardware and theoretically can intervene executed processes on the hosted virtual instance through virtual introspection [25]. This could also affect encryption or signing processes executed on the VM and therefore leading to the leakage of the secret key. Although this risk can be disregarded in most of the cases, the impact on the security of high security environments is tremendous.a) Snapshot Analysis: Traditional forensics expect target machines to be powered down to collect an image (dead virtual instance). This situation completely changed with the advent of the snapshot technology which is supported by all popular hypervisors such as Xen, VMware ESX and Hyper-V.A snapshot, also referred to as the forensic image of a VM, providesa powerful tool with which a virtual instance can be clonedby one click including also the running system’s mem ory. Due to the invention of the snapshot technology, systems hosting crucial business processes do not have to be powered down for forensic investigation purposes. The investigator simply creates and loads a snapshot of the target VM for analysis(live virtual instance). This behavior is especially important for scenarios in which a downtime of a system is not feasible or practical due to existing SLA. However the information whether the machine is running or has been properly powered down is crucial [3] for the investigation. Live investigations of running virtual instances become more common providing evidence data that。
外文参考文献(带中文翻译)

外文资料原文涂敏之会计学 8051208076Title:Future of SME finance(c)Background – the environment for SME finance has changedFuture economic recovery will depend on the possibility of Crafts, Trades and SMEs to exploit their potential for growth and employment creation.SMEs make a major contribution to growth and employment in the EU and are at the heart of the Lisbon Strategy, whose main objective is to turn Europe into the most competitive and dynamic knowledge-based economy in the world. However, the ability of SMEs to grow depends highly on their potential to invest in restructuring, innovation and qualification. All of these investments need capital and therefore access to finance.Against this background the consistently repeated complaint of SMEs about their problems regarding access to finance is a highly relevant constraint that endangers the economic recovery of Europe.Changes in the finance sector influence the behavior of credit institutes towards Crafts, Trades and SMEs. Recent and ongoing developments in the banking sector add to the concerns of SMEs and will further endanger their access to finance. The main changes in the banking sector which influence SME finance are:•Globalization and internationalization have increased the competition and the profit orientation in the sector;•worsening of the economic situations in some institutes (burst of the ITC bubble, insolvencies) strengthen the focus on profitability further;•Mergers and restructuring created larger structures and many local branches, which had direct and personalized contacts with small enterprises, were closed;•up-coming implementation of new capital adequacy rules (Basel II) will also change SME business of the credit sector and will increase its administrative costs;•Stricter interpretation of State-Aide Rules by the European Commission eliminates the support of banks by public guarantees; many of the effected banks are very active in SME finance.All these changes result in a higher sensitivity for risks and profits in the financesector.The changes in the finance sector affect the accessibility of SMEs to finance.Higher risk awareness in the credit sector, a stronger focus on profitability and the ongoing restructuring in the finance sector change the framework for SME finance and influence the accessibility of SMEs to finance. The most important changes are: •In order to make the higher risk awareness operational, the credit sector introduces new rating systems and instruments for credit scoring;•Risk assessment of SMEs by banks will force the enterprises to present more and better quality information on their businesses;•Banks will try to pass through their additional costs for implementing and running the new capital regulations (Basel II) to their business clients;•due to the increase of competition on interest rates, the bank sector demands more and higher fees for its services (administration of accounts, payments systems, etc.), which are not only additional costs for SMEs but also limit their liquidity;•Small enterprises will lose their personal relationship with decision-makers in local branches –the credit application process will become more formal and anonymous and will probably lose longer;•the credit sector will lose more and more i ts “public function” to provide access to finance for a wide range of economic actors, which it has in a number of countries, in order to support and facilitate economic growth; the profitability of lending becomes the main focus of private credit institutions.All of these developments will make access to finance for SMEs even more difficult and / or will increase the cost of external finance. Business start-ups and SMEs, which want to enter new markets, may especially suffer from shortages regarding finance. A European Code of Conduct between Banks and SMEs would have allowed at least more transparency in the relations between Banks and SMEs and UEAPME regrets that the bank sector was not able to agree on such a commitment.Towards an encompassing policy approach to improve the access of Crafts, Trades and SMEs to financeAll analyses show that credits and loans will stay the main source of finance for the SME sector in Europe. Access to finance was always a main concern for SMEs, but the recent developments in the finance sector worsen the situation even more.Shortage of finance is already a relevant factor, which hinders economic recovery in Europe. Many SMEs are not able to finance their needs for investment.Therefore, UEAPME expects the new European Commission and the new European Parliament to strengthen their efforts to improve the framework conditions for SME finance. Europe’s Crafts, Trades and SMEs ask for an encompassing policy approach, which includes not only the conditions for SMEs’ access to l ending, but will also strengthen their capacity for internal finance and their access to external risk capital.From UEAPME’s point of view such an encompassing approach should be based on three guiding principles:•Risk-sharing between private investors, financial institutes, SMEs and public sector;•Increase of transparency of SMEs towards their external investors and lenders;•improving the regulatory environment for SME finance.Based on these principles and against the background of the changing environment for SME finance, UEAPME proposes policy measures in the following areas:1. New Capital Requirement Directive: SME friendly implementation of Basel IIDue to intensive lobbying activities, UEAPME, together with other Business Associations in Europe, has achieved some improvements in favour of SMEs regarding the new Basel Agreement on regulatory capital (Basel II). The final agreement from the Basel Committee contains a much more realistic approach toward the real risk situation of SME lending for the finance market and will allow the necessary room for adaptations, which respect the different regional traditions and institutional structures.However, the new regulatory system will influence the relations between Banks and SMEs and it will depend very much on the way it will be implemented into European law, whether Basel II becomes burdensome for SMEs and if it will reduce access to finance for them.The new Capital Accord form the Basel Committee gives the financial market authorities and herewith the European Institutions, a lot of flexibility. In about 70 areas they have room to adapt the Accord to their specific needs when implementing itinto EU law. Some of them will have important effects on the costs and the accessibility of finance for SMEs.UEAPME expects therefore from the new European Commission and the new European Parliament:•The implementation of the new Capital Requirement Directive will be costly for the Finance Sector (up to 30 Billion Euro till 2006) and its clients will have to pay for it. Therefore, the implementation – especially for smaller banks, which are often very active in SME finance –has to be carried out with as little administrative burdensome as possible (reporting obligations, statistics, etc.).•The European Regulators must recognize traditional instruments for collaterals (guarantees, etc.) as far as possible.•The European Commission and later the Member States should take over the recommendations from the European Parliament with regard to granularity, access to retail portfolio, maturity, partial use, adaptation of thresholds, etc., which will ease the burden on SME finance.2. SMEs need transparent rating proceduresDue to higher risk awareness of the finance sector and the needs of Basel II, many SMEs will be confronted for the first time with internal rating procedures or credit scoring systems by their banks. The bank will require more and better quality information from their clients and will assess them in a new way. Both up-coming developments are already causing increasing uncertainty amongst SMEs.In order to reduce this uncertainty and to allow SMEs to understand the principles of the new risk assessment, UEAPME demands transparent rating procedures –rating procedures may not become a “Black Box” for SMEs: •The bank should communicate the relevant criteria affecting the rating of SMEs.•The bank should inform SMEs about its assessment in order to allow SMEs to improve.The negotiations on a European Code of Conduct between Banks and SMEs , which would have included a self-commitment for transparent rating procedures by Banks, failed. Therefore, UEAPME expects from the new European Commission and the new European Parliament support for:•binding rules in the framework of the new Capital Adequacy Directive,which ensure the transparency of rating procedures and credit scoring systems for SMEs;•Elaboration of national Codes of Conduct in order to improve the relations between Banks and SMEs and to support the adaptation of SMEs to the new financial environment.3. SMEs need an extension of credit guarantee systems with a special focus on Micro-LendingBusiness start-ups, the transfer of businesses and innovative fast growth SMEs also depended in the past very often on public support to get access to finance. Increasing risk awareness by banks and the stricter interpretation of State Aid Rules will further increase the need for public support.Already now, there are credit guarantee schemes in many countries on the limit of their capacity and too many investment projects cannot be realized by SMEs.Experiences show that Public money, spent for supporting credit guarantees systems, is a very efficient instrument and has a much higher multiplying effect than other instruments. One Euro form the European Investment Funds can stimulate 30 Euro investments in SMEs (for venture capital funds the relation is only 1:2).Therefore, UEAPME expects the new European Commission and the new European Parliament to support:•The extension of funds for national credit guarantees schemes in the framework of the new Multi-Annual Programmed for Enterprises;•The development of new instruments for securitizations of SME portfolios;•The recognition of existing and well functioning credit guarantees schemes as collateral;•More flexibility within the European Instruments, because of national differences in the situation of SME finance;•The development of credit guarantees schemes in the new Member States;•The development of an SBIC-like scheme in the Member States to close the equity gap (0.2 – 2.5 Mio Euro, according to the expert meeting on PACE on April 27 in Luxemburg).•the development of a financial support scheme to encourage the internalizations of SMEs (currently there is no scheme available at EU level: termination of JOP, fading out of JEV).4. SMEs need company and income taxation systems, whichstrengthen their capacity for self-financingMany EU Member States have company and income taxation systems with negative incentives to build-up capital within the company by re-investing their profits. This is especially true for companies, which have to pay income taxes. Already in the past tax-regimes was one of the reasons for the higher dependence of Europe’s SMEs on bank lending. In future, the result of rating w ill also depend on the amount of capital in the company; the high dependence on lending will influence the access to lending. This is a vicious cycle, which has to be broken.Even though company and income taxation falls under the competence of Member States, UEAPME asks the new European Commission and the new European Parliament to publicly support tax-reforms, which will strengthen the capacity of Crafts, Trades and SME for self-financing. Thereby, a special focus on non-corporate companies is needed.5. Risk Capital – equity financingExternal equity financing does not have a real tradition in the SME sector. On the one hand, small enterprises and family business in general have traditionally not been very open towards external equity financing and are not used to informing transparently about their business.On the other hand, many investors of venture capital and similar forms of equity finance are very reluctant regarding investing their funds in smaller companies, which is more costly than investing bigger amounts in larger companies. Furthermore it is much more difficult to set out of such investments in smaller companies.Even though equity financing will never become the main source of financing for SMEs, it is an important instrument for highly innovative start-ups and fast growing companies and it has therefore to be further developed. UEAPME sees three pillars for such an approach where policy support is needed:Availability of venture capital•The Member States should review their taxation systems in order to create incentives to invest private money in all forms of venture capital.•Guarantee instruments for equity financing should be further developed.Improve the conditions for investing venture capital into SMEs•The development of secondary markets for venture capital investments in SMEs should be supported.•Accounting Standards for SMEs should be revised in order to easetransparent exchange of information between investor and owner-manager.Owner-managers must become more aware about the need for transparency towards investors•SME owners will have to realise that in future access to external finance (venture capital or lending) will depend much more on a transparent and open exchange of information about the situation and the perspectives of their companies.•In order to fulfil the new needs for transparency, SMEs will have to use new information instruments (business plans, financial reporting, etc.) and new management instruments (risk-management, financial management, etc.).外文资料翻译涂敏之会计学 8051208076题目:未来的中小企业融资背景:中小企业融资已经改变未来的经济复苏将取决于能否工艺品,贸易和中小企业利用其潜在的增长和创造就业。
电子信息工程外文翻译参考文献

电子信息工程外文翻译参考文献(文档含中英文对照即英文原文和中文翻译)译文:利用修改后的迈克耳孙干涉仪进行长度测量的初步结果摘要:基于飞秒加速器的装置,该装置建造在上海应用物理研究所(SINAP),最近一个经修改后的远红外迈克耳孙干涉仪通过光学自相关方法,已经被用来测量电子光束的长度。
相比较于之前常规的迈克耳孙干涉仪,我们使用一个空心回射器而不是一个平面反射镜的反射镜。
本文将为大家介绍实验设置和长度测量的结果。
关键词:飞秒线性加速器,长度串,干涉仪,空心回射器1 介绍最近关于电子脉冲压缩的实验产生高峰值电流和亮度飞秒电子串。
关于短束源自于高质量光束的潜在应用要求这方面一起了广泛兴趣。
高质量的核物理加速器,自由电子激光器驱动加速器,下一代线性对撞机,第四代光源都需要短时间光束脉冲。
同时,在进程中对诊断的短电子串的研究也起了重要作用。
有几种已经使用或正在开发的方法去测量短电子串的长度。
这些一般分为两类:频域方法和时域方法。
众所周知,在时域测量长度的方法中使用条纹相机,条纹相机已经证实是限于串长度超过200 fs ,此外,条纹相机昂贵并且测量系统复杂。
相对于时域测量方法,频域测量使用相干过渡辐射(CTR )从金属箔在测量飞秒脉冲的短电子中已经显现出前景。
本文我们首先从短电子串方面给出了基于一代的高强度相干渡越辐射的理论和试验研究,然后讨论该方法基于相干渡越辐射测量束飞秒的长度,并从改进电子实验装置给出了串长度测量的结果。
最后,我们分析了空气湿度对串长度测量的影响,并且阐释了对未来研究的计划。
2 理论背景2.1 相干渡越辐射源自于相对论性电子串辐射如同步加速器辐射跃迁辐射等,本质上有较广的范围,如果辐射的波长短于电子串长度,这个阶段的辐射电子不同于彼此,所以辐射是不连贯的。
另一方面,如果波长较长的串长度,辐射是连贯的并且辐射强度的平方成正比每串数字电子。
光谱强度发出一束N 粒子:11()()(1)()|()|tot I NI N N I f λλλλ=+- (2-1)这里1()I λ是靠单电子辐射的强度,()f λ是串形成因素,这是傅里叶变换的规范化的电子密度分布()S Z 。
毕业设计外文参考文献

[1] 王起江,洪杰.超超临界电站锅炉用新型管材的研制[J].宝钢技术,2008(5):44-53.[2] 王起江,邹凤鸣.T91高压锅炉管的研制与应用[J].发电设备,2005 (1):43-47.[3] Fujio Abe.Bainitic and martensitic creep-resistant steels[J].Solid State andMaterials Science,2004,8:305-311.[4] 马明编译.美国新的超临界机组考虑使用T/P92的原因[J].电力建设,2006,27(11):79-80.[5] 戴平.国产P91钢管道存在的问题及其解决[J].广东电力,2008,21(8):67-69.[6] 田党.关于难变形钢和合金管坯的二辊斜轧穿孔问题[J].钢铁,1998,33(1):33-36.[7] P J Ennis,A Czyrska-Filemonowicz.Recent advances in creep-resistant steelsfor power plant applications [J].Sādhanā,2003,28:709–730.[8] 刘立民,朱洪,刘志国.法国T91、P91钢管性能评定[J].电站系统工程,2002,18(1):63-64.[9] 彭孙鸿.T91钢管在我国的应用前景[J].宝钢技术,1997,6:48-50.[10] H.C. Furtado,L.H. de Almeida,I. Le May.Precipitation in 9Cr–1Mo steel aftercreep deformation[J].Materials Characterization,2007,58:72–77.[11] 蒯春光,彭志方.T/P91钢在450-1200℃区间各相元素的分配特征及相稳定性[J].金属学报,2008,44(8):897-900.[12] 孙智,董小文,张绪平,等.奥氏体化温度对9Cr-1Mo-V-Nb钢组织与性能的影响[J].金属热处理,2001,26(8):12-14.[13] 刘靖,周立新,傅晨光,等.电站锅炉用T91钢热穿孔性能的研究[J].钢管,2002,31(5):9-11.[14] 彭孙鸿,尤夙志,姜明娟,等.热穿孔温度对T91持久强度的影响[J].特殊钢,2001,22(2):10-12.[15] 崔光珠,朱伏先,高德福,等.T91钢高温变形特性研究[J].塑性工程学报,1999,6(2):13-16.[16] 余勇,周晓岚,赵志毅,等.T91变形抗力模型建立及理论轧制压力计算[J].宝钢技术,2006(3):31-34.[17] Polcik P,Sailer T,Blum W,et al.On the microstructural development of thetempered martensitic Cr-steel P91 during long-term creep[J].Materials Science and Engineering,1999,260:252-259.[18] Orlová A,Buršík J,Kucharová K,et al.Microstructural development duringhigh temperature creep of 9% Cr steel[J].Materials Science and Engineering,1998,254:39-48.[19] Sasaki,Terufumi,Kobayashi,et al.Production and properties of seamlessmodified 9Cr-1Mo steel boiler tubes[R].Kaw asaki Steel Technical Report,1991,25(4):78-87.[20] Bendick W,Vaillant JC,Vandenberghe B,et al.Properties and workability ofnew creep strength enhanced steels as known grades 23, 24, 911 and 92[J].International Journal of Pressure Vessels and Piping,2004,476:25-29.[21] 刘江南,王正品,束国刚,等.P91钢的形变强化行为[J].金属热处理,2009,34(1):28-32.[22] Tőkei Z S,Viefhaus H,Grabke H J.Initial stages of oxidation of a9CrMoV-steel: role of segregation and martensite laths[J].Applied Surface Science,2000,165:23-33.[23] Rajendran P S,Sankar P,Khatak H S.Cyclic oxidation of P91 at 1073, 1123 and1173K[J].High Temperature Materials and Processes,2004,23(3):195-204.[24] Ahmed Shibli,Fred Starr.Some aspects of plant and research experience in theuse of new high strength martensitic steel P91[J].International Journal of Pressure Vessels and Piping,2007,84:114-122.[25] J.C. Vaillant,B. Vandenberghe,B. Hahn,et al.T/P23, 24, 911 and 92: Newgrades for advanced coal-fired power plants—Properties and experience [J].International Journal of Pressure Vessels and Piping,2008,85:38-46.[26] Brett SJ.The creep strength of weak thick section modified 9Crforgings[C].Proceedings of Baltica,2001,1:39-45.[27] U.Gampe,P.Seliger.Creep crack growth testing of P91 and P22bends[J].International Journal of Pressure Vessels and Piping,2001,78:859-864.[28] L.Kunz,P.Lukáš.High temperature fatigure and cyclic creep of P91steel[J].European Structural Integrity Society,2002,29:37-44.[29] B.Fournier,M.Sauzay,C.Caës,et al.Creep-fatigue-oxidation interactions ina 9Cr-1Mo martensitic steel[J].International Journal of Pressure Vessels andPiping,2008,85:478-485.[30] 刘洪杰.电站锅炉用P91钢蠕变/疲劳交互作用的试验研究[J].动力工程,2007,27(6):990-995.[31] LIU Jiang-nan,JIE Wang-qi.Application of improved vacuum degassingtechnique to refinement of heat resistant steel P91[J].Trans. Nonferrous Met.Soc. China,2005,15:291-294.[32] 苏俊,张铮,李进.P91高压锅炉管的开发[J].钢管,2008,37(4):33-37.[33] 郭元蓉,吴红.P91无缝钢管国产化研究进展[J].钢管,2008,37(1):22-27.[34] 王起江,邹凤鸣,张瑞,等.宝钢T91高压锅炉管性能试验与研究[J].宝钢技术,2003,(4):46-50.[35] Miyata K,Sawaragi Y.Effect of Mo and W on the phase stability of precipitatesin low Cr heat resistant steels[J].ISIJ,2001,41:281-289.[36] Wachter O,Ennis PJ.Investigation of the properties of the 9% Cr steel of thetype 9Cr-0.5Mo-1.8W-V-Nb with respect to its application as a pipework and boiler steel operation at elevated temperatures[D].Germany,1995.[37] Hättestrand M,Andrén H O.Evaluation of particle size distribution in a 9% Crsteel using EFTEM[J].Micron,2001,32:789-797.[38] Sklenicka V,Kucharova K,Svoboda M,et al.Long-term creep behavior of9-12%Cr power plant steels [J].Mater. Character,2003,51:35-48.[39] Strang A,Foldyna V,Lenert J,et al.Prediction of the long-term creep ruptureproperties of 9-12Cr power plant steels [C].Proceedings of the 6th International Charles Parsons Turbine Conference,Dublin,2003,427-441.[40] Kimura K,Kushima H,Sawaka K.Long-term creep strength prediction of highCr ferritic creep resistant steels based on degradation mechanisms[C].Proceedings of the 6th International Charles Parsons Turbine Conference,Dublin,2003,444-456.[41] 高巍,刘江南,王正品,等.P92钢塑性变形行为[J].西安工业大学学报,2008,28(4):356-359.[42] 田党,张根良,卜玉钦.二辊斜轧穿孔时高合金钢的变形分布和分层缺陷形成机制[J].钢铁,1995,30(1):40-45.[43] 刘新生,赵定国,崔成业.冷轧薄板中分层现象的研究[J].钢铁,2008,43(5):40-43.[44] 崔风平,赵乾,唐愈.铸坯内部缺陷对钢板分层形成的影响[J].中国冶金,2008,18(2):14-18.[45] 唐生斌.板材分层缺陷产生原因分析[J].连铸,2003,4:32-34.[46] 洪小玲,肖荣仁,李端来.GH3030合金锻坯裂纹分析[J].钢铁研究,2002,128(5):11-12.[47] S.A.Sharadzenidze,E.A.Svetlitskii.High Quality Seamless Tubes[J]. Metallurg,1968,11:38-39.[48] 王建文.27SiMn钢管表面龟裂原因分析[J].湖南冶金,2000,5:25-26.[49] 任建国,祁晓英,马学军,等.低合金钢热轧缺陷分析[J].沈阳工业学院学报,1996,15(3):35-37.[50] 卢居桂,安自亮,刘钰.夹杂物引起的石油套管缺陷分析[J].天津冶金,2002,106(1):27-29.[51] 田党.关于锥形辊穿孔机轧辊转速对毛管分层缺陷影响的讨论[J].钢管,2006,35(4):12-16.[52] 王永吉,陈大国,王世英,等.二辊斜轧穿孔轧辊转速对高合金钢毛管质量的影响[J].钢铁,1985,20(2):25-30.[53] 严智.高温合金穿孔工艺的研究[J].特钢技术,1994,2:27-31.[54] 田党.高温合金无缝管材的研制与生产[J].钢管,2002,31(3):1-6.[55] 田党.关于毛管分层缺陷的试验研究[J].轧钢,1997,6:7-10.[56] 田党.高温合金管坯在二辊斜轧穿孔机上的穿孔实践[J].天津冶金,1996,4:25-28.[57] 田党.毛管分层缺陷形成过程的观察和分析[J].天津冶金,1996,1:24-26.[58] 田党.高温合金毛管分层缺陷形成的过程[J].钢管,1992,1:19-22.[59] 卢于逑,王先进.二辊斜轧穿孔中心金属断裂机理和穿孔变形工艺实质[J].钢铁,1980,6:7-15.[60] 卢于逑,王先进.二辊斜轧穿孔圆坯断面的变形分布[J].金属学报,1980,4:470-479.[61] 田党,张根良,卜玉钦.二辊斜轧穿孔时高温合金钢圆坯的变形分布及分层形成机制[J].钢铁,1995,30(1):40-46.[62] 田党,李群.关于锥形辊穿孔机的穿孔原理及应用问题的讨论[J].钢管,2003,32(6):1-4.[63] 赵咏秋,吴秀丽,陈菊芳.0Cr18Ni9Ti热轧荒管分层内裂原因分析[J].物理测试,1999,2:33-35.[64] 张存信,冯晓庭,项炳和,等.不锈钢无缝管加工过程中断裂原因简析[J].钢管,2008,37(3):38-42.[65] 袁桂林,苏殿荣.GCr15钢管环状层裂在二辊斜轧穿孔过程中的发生和发展[J].钢管,1983,3:15-18.[66] 张世文,刘仓理,李庆忠,等.初始应力状态对材料层裂破坏特性影响研究[J].力学学报,2008,40(4):535-542.[67] 侯凤桐.日本住友金属公司新开发的菌式穿孔机[J].钢管技术,1985,2:57-59.[68] Chihiro HAYASHI,Tomio YAMAKAWA.Influences of Feed and Cross Angleon Inside Bore and Lamination Defects in Rotary Piercing for Materials with Poor Hot Workability [J].ISIJ International,1997,37(2):153-160.[69] 嵇国金,彭颖红,阮雪榆.有关金属体积成形中的韧性断裂准则[J].金属成形工艺,1998,16(4):36-37.[70] 郭达人编译.金属材料的断裂及其断口分析[J].国外金属热处理,1996,17(4):25-31.[71] 黄建科,董湘怀.金属成形中韧性断裂准则的细观损伤力学研究进展[J].上海交通大学学报,2006,40(10):1748-1753.[72] Oyane M,Sota T,Okintoto K,et al.Criteria for ductile fractures and theirapplications[J].J Mech Work Tech,1980,4:65-81.[73] 郑长卿,张克实,周利.金属韧性破坏的细观力学及其应用研究[M].北京:国防工业出版社,1995,28-32.[74] Venugopal Rao A,Ramakrishnan N,Krishna Kumar R.A comparativeevaluation of the theoretical failure criteria for workability in cold forging[J].Journal of Materials Processing Technology,2003,142(1):29-42.[75] Komori Kazutake.Effect of ductile fracture criteria on chevron crack formationand evolution in drawing[J].International Journal of Mechanical Sciences,2003,45(1):141-160.[76] Ozturk Fahrettin,Lee Daeyong.Analysis of forming limits using ductile fracturecriteria[J].Journal of Materials Processing Technology,2004,147(3):397-404.[77] Jeong Kim,Sung-Jong Kang,Beom-Soo Kang.A prediction of bursting failurein tube hydroforming processes based on ductile fracture criterion[J].Int J Adv Manuf Technol,2003,22:357-362.[78] 虞松,陈军,阮雪榆.韧性断裂准则的试验与理论研究[J].中国机械工程,2006,17(19):2049-2052.[79] 胡庆安,程侠,邰卫华.金属材料断裂预测损伤破坏准则的应用[J].长安大学学报,2007,27(4):100-102.[80] 俞树荣,严志刚,曹睿,等.有限元软件模拟裂纹扩展的方法探讨[J].甘肃科学学报,2003,15(4):15-21.[81] 陈乃超,田冠玉,郑博.12Cr1MoV短期高温冲击断裂韧性及其参数的研究[J].上海电力学院学报,2008,24(2):178-181.[82] Ken-ichiro Mori,Hidenori Yoshimura,Kozo Osakada.Simplified three-dimensional simulation of rotary piercing of seamless pipe by rigid-plastic finite-element method[J].Journal of Materials Processing Technology,1998,80-81:700-706.[83] Y van Chastel,Aliou Diop,Silvio Fanini,et al.Finite Element Modeling ofTube Piercing and Creation of a Crack[J].Int J Mater Form,2008,Suppl 1:355-358.[84] Hyoung Wook Lee,Geun An Lee,Eung Kim,et al.Prediction of plug tipposition in rotary tube piercing mill using simulation and experiment[J].International Journal of Modern Physics B,2008,22(31-32):5787-5792.[85] S Fanini,A Ghiotti,S Bruschi.Evaluation of Fracture Initiation in theMannesmann Piercing Process[C].The 10th ESAFORM Conference on Material Forming,2007,709-714.[86] Saurabh Dwivedi,Samuel H,Huang Jun Shi,et al.Yield prediction for seamlesstubing processes: a computational intelligence approach[J].Int Adv Manuf Technol,2008,37:314-322.[87] Elisabetta Ceretti,Claudio Glaudio,Aldo Attanasio.3D Simulation andValidation of Tube Piercing Process[C].NUMIFORM 07 Materials and Design: Modling, Simulation and Applications,2007,413-418.[88] Kazutake Komori.Simulation of Mannesmann piercing process by thethree-dimensional rigid-plastic finite-element method[J].International Journal of Mechanical Sciences,2005,47:1838-1853.[89] Hayashi C,Yamakawa T.Influence of feed and cross angle on rotary forgingeffects and redundant shear deformation in rotary piercing process[J].ISIJ International,1997,37:146-152.[90] 曾幼宗.斜轧穿孔工艺的有限元分析[J].钢管,2004,33(3):51-53.[91] 双远华,赖明道,张中元.斜轧穿孔过程金属流动的有限元模拟[J].机械工程学报,2004,40(3):140-144.[92] 双远华,赖明道,张中元.钢管斜轧过程应力应变与温度耦合模拟分析[J].锻压技术,2003(6):36-40.[93] 李胜衹,陈大宏,孙中建,等.二辊斜轧穿孔时圆管坯的变形与应力分布及其发展[J].钢铁研究学报,2000,12(5):26-30.[94] A Ghiotti,S Fanini,S Bruschi,et al.Modeling of the Mannesmanneffect[J].CIRP Annals-Manufacturing Technology,2009,58:255-258.[95] E.I. Panov.Shear Stresses and Their Dependence on Different ProcessParameters in The Helical Rolling of Solid Semifinished Products[J].Metallurgist,2005,49(7-8):280-292.[96] E.I. Panov.Certain Aspects of The Stress-Strain State of Semifinished Productsin Helical Rolling[J].Metallurgist,2003,47(11-12):499-505.[97] E.I. Panov.Effect of thrust and tension on the radial stresses in helical rolling[J].Metallurg,2004,4:50-57.[98] Z. Pater,J. Kazanecki,J. Bartnicki.Three dimensional thermo-mechanicalsimulation of the tube forming process in Diescher’s mill [J].Journal of Materials Processing Technology,2006,177:167-170.[99] 双远华,陈惠琴,赖明道.斜轧管材生产中内部组织有限元模拟和预测[J].中国有色金属学报,2001,11(2):238-242.[100] 双远华,张中元,赖明道.热轧穿孔内部组织控轧的工业性试验研究[J].钢铁,2002,37(6):42-47.[101] J C Prince,R Maroño,F León.Thermomechanical analysis of a piercing mandrel for the production of seamless steel tubes[J].J. Process Mechanical Engineering,2003,217:337-344.[102] W.A.Khudheyer,D.C.Barton,T.Z.Blazynski.A comparison between macroshear redundancy and loading effects in 2- and 3-roll rotary tube cone piercers[J].Journal of Materials Processing Technology,1997,65:191-202.[103] A.N.Nikulin,V.V. Streletskii.Deformation of continuous cast metal during rotary rolling[J].Metallurgist,2005,49(3-4):97-101.[104] Kazutake Komori,Kouta Mizuno.Study on plastic deformation in cone-type rotary piercing process using model piercing mill for modeling clay[J].Journal of Materials Processing Technology,2009,209:4994-5001.[105] 李连诗.钢管塑性变形原理(上册)[M],北京:冶金工业出版社,1985:178-185.[106] 卢于逑.斜轧穿孔过程中应力和变形的分布和中心金属断裂机构的某些特点分析[D].北京:北京钢铁学院,1963.[107] 卢于逑,王先进.二辊斜轧穿孔时圆坯断面的变形分布和发展[J].金属学报,1980,16(4):470-479.[108] 严泽生.现代热轧无缝钢管生产[M].北京:冶金工业出版社,2009:175-195.[109] Takuda H,Mori K,Hatta N.The application of some criteria for ductile fracture to the prediction of the forming limit of sheet metals[J].J Mater Process Technol,1999,95:116-121.[110] Takuda H,Mori K,Fujimoto H,et al.Prediction of the forming limit in bore-expanding of sheet metals using ductile fracture criteria[J].J Mater Process Technol,1999,92-93:433-438.[111] Mori K,Takuda H.Prediction of forming limit in deep drawing of finite element simulation and criterion for ductile fracture[J].Transaction of NAMRI/SME XXIV,1996,143-148.[112] Takuda H,Mori K,Takakura N,et al.Finite element analysis of limit strains in biaxial stretching of sheet metals allowing for ductile fracture[J].Int J Mech Sci,2000,42:785-798.。
钢结构设计外文翻译参考文献

钢结构设计外文翻译参考文献In the United States。
XXX (ASD)。
Plastic Design (PD)。
and Load and Resistance Factor Design (LRFD)。
In ASD。
stress ns are based on first-order elastic analysis。
XXX。
In PD。
first-order plastic hinge analysis is used in structural analysis。
XXX progressive collapse effects are not included in PD。
they are XXX LRFD。
first-order XXX。
and the XXX。
All three design methods require independent checks。
including K factor ns。
In this paper。
XXX structural system and its components are related。
but the current LRFD n of the American Institute of Steel n (AISC) separates them。
In practical ns。
the XXX in the effective length factor。
This is described in the excerpt from the Technical Memorandum on Social Science Research。
Volume 5.Although the maximum internal forces of the structure and the maximum internal forces of the components are interdependent (but not necessarily coexisting)。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
外文原文Introduction to Javaautor:Martin Ngobye.source:Computing Static Slice for Java ProgramsJava is designed to meet the challenges of application development in the context of heterogeneous, network-wide distributed environments. Paramount among these challenges is secure delivery of applications that consume the minimum of system resources, can run on any hardware and software platform, and can be extended dynamically.Java originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop.The design requirements of Java are driven by the nature of the computing environments in which software must be deployed.The massive growth of the Internet and the World-Wide Web leads us to a completely new way of looking at development and distribution of software. To live in the world of electronic commerce and distribution, Java must enable the development of secure, high performance, and highly robust applications on multiple platforms in heterogeneous, distributed networks.Operating on multiple platforms in heterogeneous networks invalidates the traditional schemes of binary distribution, release, upgrade, patch, and so on. To survive in this jungle, Java must be architecture neutral, portable, and dynamically adaptable.The Java system that emerged to meet these needs is simple, so it can be easily programmed by most developers; familiar, so that current developers can easily learnJava; object oriented, to take advantage of modern software development methodologies and to fit into distributed client-server applications; multithreaded, for high performance in applications that need to perform multiple concurrent activities, such as multimedia; and interpreted, for maximum portability and dynamic capabilities.Together, the above requirements comprise quite a collection of buzzwords, so let’s examine some of them and their respective benefits before going on.What’s completely new is the manner in which Java and its run-time system have combined them to produce a flexible and powerful programming system..Developing your applications using Java results in software that is portable across multiple machine architectures, operating systems, and graphical user interfaces, secure, and high performance, With Java, your job as a software developer is much easier—you focus your full attention on the end goal of shipping innovative products on time, based on the solid foundation of Java. The better way to develop software is here, now, brought to you by the Java language platform.Very dynamic languages like Lisp, TCL, and SmallTalk are often used for prototyping. One of the reasons for their success at this is that they are very robust—you don’t have to worry about freeing or corrupting memory.Similarly, programmers can be relatively fearless about dealing with memory when programming in Java, The garbage collecti on system makes the programmer’s job vastly easier; with the burden of memory management taken off the programmer’s shoulders, storage allocation errors go away. Another reason commonly given that languages like Lisp, TCL, and SmallTalk are good for protot yping is that they don’t require you to pin down decisions early on—these languages are semantically rich.Java has exactly the opposite property: it forces you to make explicit choices. Along with these choices come a lot of assistance—you can write method invocations and, if you get something wrong, you get told about it at compile time. You don’t have to worry about method invocation error.The Java beginner must grasp 30 basic conceptsBasic concept1.In OOP the only relations is what the object’s interface, such as the computer seller he leaves alone internal structure of electrical source, but he is only concerned about that whether the power will be supplied to you, also so long as know can or not butis not how and why.All procedures are make up of certain attribute and the behavior object, the different object visit invokes through the function invocation, between the object all intercommunion are invoke through the method invocation, By object data encapsulation, enhances reuse rate very much..2.In OOP the most important thought is class, the class is the template ,is a blueprint, construct an object from a class, namely construct an instance of the class.3. Encapsulation: is that combines the data and the behavior in a package) and hides the data the realization process to the object user, in an object data is called its instance field.4.Through expands a class to obtain a new class is called inheritance, but all classes are constructed by the object super root class of expansion, super root class of as follows can make the introduction.5.Object 3 principal characteristicsBehavior--- explained this object can make what.Tate--- when the object exerts the method object reflection.Dentity--- and other similar behavior objects discrimination symbols.Each object has only indentity and among three characteristics they affect mutually.6. Relations among classes:Use-a:Dependent relationHas-a:Polymerization relationIs-a: inheritor relation -- example:A class has inherited B class, this time A class not only has B class of method, but also has its own method(Individuality exists in general character)7.Structure object use structure:Structure proposing, the structure is one special method, the structure object and to its initialization.Example:A Data class of structure calls DataNew Data () --- structure a new object, also initialize current time.Data happyday=new Data () --- an object evaluates an variable happyday, thus enables this object to be used many times, here be stated the cause variable and the object variable are different.New returns the value is a quotation.Constructor characteristic:The constructor may have 0, one or many parametersThe constructor and the class have the same nameA class may have many constructor. The constructor has not returned valueThe constructor always be together used with the new operator8. Over loading: When many methods have the same name when includes the different parameter, then has the over loading Which method does the compiler have to choose invokes.9.Package : Java allow one or many classes to become together as group, is called package, to organizing duty easily, the standard Java storehouse divides into many packages ng java.Util java, net and so on, the package is layered and all java packages are in java and in a javax package.10. Extendable thought: permit to construct new class on existing classes , when you extend the class which already existed, then you reuse this class of method and the field, at the same time you might add the new method and the field in the new class.11.Expandable class:The expandable class fully manifested is-a to extend the relations The form is:Class (subclass) extends (base class).12. Multi-modality: In java, the object variable is multi-modality But in java does not support multiple extend.13.Dynamic combine: the mechanism of invoking object method mechanism.1) compiler examines object statement type and method name.2) the compiler examines that method invokes parameter type.3) static combine: If the method type is priavte static the final ,compiler can accurately know which method should invoke.4) when the procedure runs and uses dynamic combine to invoke a method, the method edition which then hypothesized machine must invoke x the object actual type which aims at to match.5) dynamic combine: is a very important characteristic, it can cause the procedure to change again may expand but does not need to translate has saved the code.14.Final class:In order to prevent other people derive the new class from yours class, this class is cannot expanded.15.The dynamic invocation spend longer time than the static invocation expenditure.16.Abstract class:Stipulated or many abstract methods class of itself must define is abstract.Example: Public abstract string getDescripition17.In Java each class is be extended by object class.18. equal and toString method in object class .Equal uses in testing an object is whether equal with another object.ToString returns to represent this object the string of character, each class can nearly over loading this method, in order to returns to the current condition the correct expression.(The toString method is a very important method)19.General programming:Any class of type all values all may replace with a object class of variable.20.The array tabulates: The ArrayList dynamic array tabulates, is a class of storehouse, defines in java.In uitl package, but automatic control array size.21.in class and class of object ,getclass method returns to the class type an example, when the procedure start contains can increase in the main method class, hypothesized confidential increase all classes which he needs, each increase class all must increase the class which it needs.22.The class: class might dynamic operate the java code for the compilation the procedure to provide the formidable function reflection, this function was JavaBeans is specially useful, the use reflected Java to be able to support the VB programmer to be familiar with the use the tool.procedure of analysis class ability is called the reflector, in Java to provide this function the package to call ng.The reflect reflection mechanism is extremely formidable.1) when run analysis class ability.2) when run searches observes a class of object.3) realizes the general array operation code.4) provides the method object.But this mechanism mainly aims at the tool but not the application and the procedure.In the reflection mechanism most important part is that permits class that youinspect structure. With to API includes:ng.Reflect.Field returns to the field.Java.Reflect.Method returns to the method.ng.Reflect.Constructor returns to the parameter.Method pointer: Java does not have the method pointer, makes a method address another method, may invoke it in behind, but the interface is the better solution.23. interface: should showing class could do what but not to assign how to do,a class may realize one or many interfaces.24.The interface is not a class, but is to conforms to a interface request class of set of standard.If realizes a interface to need 2 steps:1) the statement class needs to realize assigns the interface.2) provides in the interface all methods definition.Stated a class realizes a interface to need to use the implements key wordsClass actionB implements Comparable its actionb needs to provide the CompareTo method, the interface is not the class, cannot use a new example interface.25.A class only then a super class, but a class can realize many interfaces. In a Java important interface: Cloneable26.The interface and call-back :to programs a commonly used pattern is call-back,in the pattern, you may refer when this class of pattern settled specific time occurs returns to adjusts on the object the method.Example:ActionListener interface monitor.Similar API includes:Java.Swing.JOptionPaneJava.Swing.TimerJava.Awt.Tookit27.Object clone:The clone method is a object protection method, this meant your code cannot simple invoke it.28.Inner class an inner class definition is the definition in another class.The reason is:1) an inner class object can visit founds its object realization, including private data.2) about other classes in the same package in that, inner class can be hided.3) the anonymous inner class may the very convenient definition accent.In 4) uses the category to be possible the extremely convenient compilation event driver.29.Agent class (proxy):1) appointing all codes that interfaces request2) all methods (toString equals) that object class define30.Data type:Java is kind of emphasizing type language, each variable all must be declared its types at first, in java altogether has 8 basic types . four kinds are the long, two kinds are the float, one is the char, being used in the Unicode code char, Boolean.1. java is simpleJava and C + + are very similar, but much simpler. All the high-level programming language features, is not absolutely necessary have been deleted. For example, Java does not overload operator, the title of the document, pre-processing, computing pointer, the structure of the joint, multi-dimensional array, templates and implicit type conversion. If you know a little C, C + + or Pascal, you will soon master Java. Here is a simple procedure JavaHelloWorld:publicclassHelloInternet (publicstaticvoidmain (Stringargv []) (System. out. println ( "HelloIn-ternet!")))2. Java is object-orientedJava is an object-oriented programming language. In addition to the simple types, such as digital and Boolean operators in addition, Java is an object of most. As with any object-oriented languages, Java code also organized by category. Each category provides a definition of the object behavior. Another type of succession can be a kind of behavior. In the category of the root level, often the target category. Java support for the single type of inherited hierarchy. This means that each category can only inherit one other category. Some of the language to allow multiple inheritance, but it may cause confusion and unnecessarily complicated language. For example, imagine that an object would inherit two completely different category. Java also supports the kind ofsummary of the interface. This allows programmers to define the interface methods, and do not have to rush immediately to determine the methods to achieve. A type of interface can be a number of purposes in order to truly multi-inheritance of a number of advantages. The implementation of an object can be any number of interfaces. IDL interface and Java interface very similar. Very easy to set up IDLJ compiler. In other words, Java can be used to create a CORBA object system distributed object system. In the view of many computer systems use IDL interface and CORBA objects, such compatibility is important.3. Java is a type of staticIn a Java program, it is essential to the definition used by the target (number of characters, such as an array) type. This will help programmers quickly found because the procedure when the compiler can detect the type of error. However, Java System objects are also dynamic types. A requirement for the type of dynamic is often possible, so programmers can write the procedures for different types of objects to do different things.4. Is a Java-based compilerWhen running Java programs, which were first compiled into byte code. Byte code is very similar to the machine instructions, so Java program is very efficient. However, the byte code does not specifically for a particular machine, so no need to recompile Java program can be in many different computer implementation. Java source code files were compiled into a category, which is equivalent to process byte code performance. In a Java class file, and an example for all of the variables are in the light of, and for the first time in the implementation of the code be resolved. This makes the code more common and more easily subject to revision, but still high.5. Java is architecture neutralJava language is the same for each computer. For example, simple types are the same: 32-bit integer always, always 64-bit long integers. It is strange, such as C and C + + programming language, and so fashionable it is not the case. As a result of these languages so the definition of freedom, each of the compiler and development environment will be different, so that this process nuisance become a transplant. Java programs can easily gain access to transplants, and there is no need to re-compile.6. Java is a soundJava program can not be caused by the collapse of the computer. Java careful testing of the system memory of each visit, make sure it is legitimate and will not cause any problems. However, even if the Java program may also be wrong. If there is some kind of unexpected things, the process will not collapse, and to abandon the exception. Procedures for such an exception would be found to address them. Traditional computer programs can access the full memory. May (unconsciously) to amend any of the value of memory, which will cause problems. Java program can only access memory to allow them access to those parts of the Java program can not modify it does not seek to change the value.7. Java is a compactAs the Java is designed to run on a small computer, as a programming language for the system is relatively small. It effectively in more than 4MB of RAM to run on PC machine. Java translator occupied by only a few hundred KB. This translator for the Java platform independence and portability is reliable. Due to Java is very small, it is a very small computer memory, such as the Java-based PC, as well as television sets, ovens, telephone and home computer, and so on, it is ideal.8. Java is a multi-threadedJava program can run more than one thread. For example, it can be a thread in a time-consuming to complete the calculation, and other users to interact with the threads of dialogue. Therefore, users do not have to stop working, waiting for the Java computing time-consuming process. In the multi-threaded programming environment, it is often difficult because many things may occur at the same time. However, Java provides easy-to-use features simultaneously, so that the programming easier.。