文献资料翻译原文

合集下载

毕业论文(设计)外文文献翻译及原文

毕业论文(设计)外文文献翻译及原文

金融体制、融资约束与投资——来自OECD的实证分析R.SemenovDepartment of Economics,University of Nijmegen,Nijmegen(荷兰内梅亨大学,经济学院)这篇论文考查了OECD的11个国家中现金流量对企业投资的影响.我们发现不同国家之间投资对企业内部可获取资金的敏感性具有显著差异,并且银企之间具有明显的紧密关系的国家的敏感性比银企之间具有公平关系的国家的低.同时,我们发现融资约束与整体金融发展指标不存在关系.我们的结论与资本市场信息和激励问题对企业投资具有重要作用这种观点一致,并且紧密的银企关系会减少这些问题从而增加企业获取外部融资的渠道。

一、引言各个国家的企业在显著不同的金融体制下运行。

金融发展水平的差别(例如,相对GDP的信用额度和相对GDP的相应股票市场的资本化程度),在所有者和管理者关系、企业和债权人的模式中,企业控制的市场活动水平可以很好地被记录.在完美资本市场,对于具有正的净现值投资机会的企业将一直获得资金。

然而,经济理论表明市场摩擦,诸如信息不对称和激励问题会使获得外部资本更加昂贵,并且具有盈利投资机会的企业不一定能够获取所需资本.这表明融资要素,例如内部产生资金数量、新债务和权益的可得性,共同决定了企业的投资决策.现今已经有大量考查外部资金可得性对投资决策的影响的实证资料(可参考,例如Fazzari(1998)、 Hoshi(1991)、 Chapman(1996)、Samuel(1998)).大多数研究结果表明金融变量例如现金流量有助于解释企业的投资水平。

这项研究结果解释表明企业投资受限于外部资金的可得性。

很多模型强调运行正常的金融中介和金融市场有助于改善信息不对称和交易成本,减缓不对称问题,从而促使储蓄资金投着长期和高回报的项目,并且提高资源的有效配置(参看Levine(1997)的评论文章)。

因而我们预期用于更加发达的金融体制的国家的企业将更容易获得外部融资.几位学者已经指出建立企业和金融中介机构可进一步缓解金融市场摩擦。

文献翻译 译文+原文

文献翻译 译文+原文

09届本科毕业设计(论文)外文文献翻译学 院: 物理与电子工程学院专 业: 光电信息工程姓 名: 徐 驰学 号: Y05209222 外文出处: Surface & Coatings Technology214(2013)131-137附 件: 1.外文资料翻译译文;2.外文原文。

(用外文写)附件1:外文资料翻译译文气体温度通过PECVD沉积对Si:H薄膜的结构和光电性能的影响摘要气体温度的影响(TG)在等离子体增强化学气相沉积法(PECVD)生长的薄膜的结构和光电特性:H薄膜已使用多种表征技术研究。

气体的温度被确定为制备工艺的优化、结构和光电薄膜的性能改进的一个重要参数。

薄膜的结构性能进行了研究使用原子力显微镜(AFM),傅立叶变换红外光谱(FTIR),拉曼光谱,和电子自旋共振(ESR)。

此外,光谱椭偏仪(SE),在紫外线–可见光区域的光传输的测量和电气测量被用来研究的薄膜的光学和电学性能。

它被发现在Tg的变化可以修改的表面粗糙度,非晶网络秩序,氢键模式和薄膜的密度,并最终提高光学和电学性能。

1.介绍等离子体增强化学气相沉积法(PECVD)是氢化非晶硅薄膜制备一种技术,具有广泛的实际应用的重要材料。

它是用于太阳能电池生产,在夜视系统红外探测器,和薄膜晶体管的平板显示装置。

所有这些应用都是基于其良好的电气和光学特性以及与半导体技术兼容。

然而,根据a-Si的性质,PECVD制备H薄膜需要敏感的沉积条件,如衬底温度,功率密度,气体流量和压力。

许多努力已经花在制备高品质的薄膜具有较低的缺陷密度和较高的结构稳定性的H薄膜。

众所周知,衬底温度的强烈影响的自由基扩散的生长表面上,从而导致这些自由基更容易定位在最佳生长区。

因此,衬底温度一直是研究最多的沉积参数。

至于温度参数在PECVD工艺而言,除了衬底温度,气体温度(Tg)美联储在PECVD反应室在辉光放电是定制的a-Si的性能参数:H薄膜的新工艺。

通信类英文文献及翻译

通信类英文文献及翻译

附录一、英文原文:Detecting Anomaly Traffic using Flow Data in the realVoIP networkI. INTRODUCTIONRecently, many SIP[3]/RTP[4]-based VoIP applications and services have appeared and their penetration ratio is gradually increasing due to the free or cheap call charge and the easy subscription method. Thus, some of the subscribers to the PSTN service tend to change their home telephone services to VoIP products. For example, companies in Korea such as LG Dacom, Samsung Net- works, and KT have begun to deploy SIP/RTP-based VoIP services. It is reported that more than five million users have subscribed the commercial VoIP services and 50% of all the users are joined in 2009 in Korea [1]. According to IDC, it is expected that the number of VoIP users in US will increase to 27 millions in 2009 [2]. Hence, as the VoIP service becomes popular, it is not surprising that a lot of VoIP anomaly traffic has been already known [5]. So, Most commercial service such as VoIP services should provide essential security functions regarding privacy, authentication, integrity and non-repudiation for preventing malicious traffic. Particu- larly, most of current SIP/RTP-based VoIP services supply the minimal security function related with authentication. Though secure transport-layer protocols such as Transport Layer Security (TLS) [6] or Secure RTP (SRTP) [7] have been standardized, they have not been fully implemented anddeployed in current VoIP applications because of the overheads of implementation and performance. Thus, un-encrypted VoIP packets could be easily sniffed and forged, especially in wireless LANs. In spite of authentication,the authentication keys such as MD5 in the SIP header could be maliciously exploited, because SIP is a text-based protocol and unencrypted SIP packets are easily decoded. Therefore, VoIP services are very vulnerable to attacks exploiting SIP and RTP. We aim at proposing a VoIP anomaly traffic detection method using the flow-based traffic measurement archi-tecture. We consider three representative VoIP anomalies called CANCEL, BYE Denial of Service (DoS) and RTP flooding attacks in this paper, because we found that malicious users in wireless LAN could easily perform these attacks in the real VoIP network. For monitoring VoIP packets, we employ the IETF IP Flow Information eXport (IPFIX) [9] standard that is based on NetFlow v9. This traffic measurement method provides a flexible and extensible template structure for various protocols, which is useful for observing SIP/RTP flows [10]. In order to capture and export VoIP packets into IPFIX flows, we define two additional IPFIX templates for SIP and RTP flows. Furthermore, we add four IPFIX fields to observe packets which are necessary to detect VoIP source spoofing attacks in WLANs.II. RELATED WORK[8] proposed a flooding detection method by the Hellinger Distance (HD) concept. In [8], they have pre- sented INVITE, SYN and RTP flooding detection meth-ods. The HD is the difference value between a training data set and a testing data set. The training data set collected traffic over n sampling period of duration Δ testing data set collected traffic next the training data set in the same period. If the HD is close to ‘1’, this testing data set is regarded as anomaly traffic. For using this method, they assumed that initial training data set didnot have any anomaly traffic. Since this method was based on packet counts, it might not easily extended to detect other anomaly traffic except flooding. On the other hand, [11] has proposed a VoIP anomaly traffic detection method using Extended Finite State Machine (EFSM). [11] has suggested INVITE flooding, BYE DoS anomaly traffic and media spamming detection methods. However, the state machine required more memory because it had to maintain each flow. [13] has presented NetFlow-based VoIP anomaly detection methods for INVITE, REGIS-TER, RTP flooding, and REGISTER/INVITE scan. How-ever, the VoIP DoS attacks considered in this paper were not considered. In [14], an IDS approach to detect SIP anomalies was developed, but only simulation results are presented. For monitoring VoIP traffic, SIPFIX [10] has been proposed as an IPFIX extension. The key ideas of the SIPFIX are application-layer inspection and SDP analysis for carrying media session information. Yet, this paper presents only the possibility of applying SIPFIX to DoS anomaly traffic detection and prevention. We described the preliminary idea of detecting VoIP anomaly traffic in [15]. This paper elaborates BYE DoS anomaly traffic and RTP flooding anomaly traffic detec-tion method based on IPFIX. Based on [15], we have considered SIP and RTP anomaly traffic generated in wireless LAN. In this case, it is possible to generate the similiar anomaly traffic with normal VoIP traffic, because attackers can easily extract normal user information from unencrypted VoIP packets. In this paper, we have extended the idea with additional SIP detection methods using information of wireless LAN packets. Furthermore, we have shown the real experiment results at the commercial VoIP network.III. THE VOIP ANOMALY TRAFFIC DETECTION METHOD A. CANCEL DoS Anomaly Traffic DetectionAs the SIP INVITE message is not usually encrypted, attackers could extract fields necessary to reproduce the forged SIP CANCEL message by sniffing SIP INVITE packets, especially in wireless LANs. Thus, we cannot tell the difference between the normal SIP CANCEL message and the replicated one, because the faked CANCEL packet includes the normal fields inferred from the SIP INVITE message. The attacker will perform the SIP CANCEL DoS attack at the same wireless LAN, because the purpose of the SIP CANCEL attack is to prevent the normal call estab-lishment when a victim is waiting for calls. Therefore, as soon as the attacker catches a call invitation message for a victim, it will send a SIP CANCEL message, which makes the call establishment failed. We have generated faked SIP CANCEL message using sniffed a SIP INVITE in SIP header of this CANCEL message is the same as normal SIP CANCEL message, because the attacker can obtain the SIP header field from unencrypted normal SIP message in wireless LAN environment. Therefore it is impossible to detect the CANCEL DoS anomaly traffic using SIP headers, we use the different values of the wireless LAN frame. That is, the sequence number in the frame will tell the difference between a victim host and an attacker. We look into source MAC address and sequence number in the MAC frame including a SIP CANCEL message as shown in Algorithm 1. We compare the source MAC address of SIP CANCEL packets with that of the previously saved SIP INVITE flow. If the source MAC address of a SIP CANCEL flow is changed, it will be highly probable that the CANCEL packet is generated by a unknown user. However, the source MAC address could be spoofed. Regarding source spoofing detection, we employ the method in [12] that uses sequence numbers of frames. We calculate the gap between n-th and (n-1)-th frames. As the sequence number field in a MAC header uses 12 bits, it varies from 0 to 4095. When we find that the sequence number gap between a single SIP flow is greater than the threshold value of N that willbe set from the experiments, we determine that the SIP host address as been spoofed for the anomaly traffic.B. BYE DoS Anomaly Traffic DetectionIn commercial VoIP applications, SIP BYE messages use the same authentication field is included in the SIP IN-VITE message for security and accounting purposes. How-ever, attackers can reproduce BYE DoS packets through sniffing normal SIP INVITE packets in wireless faked SIP BYE message is same with the normal SIP BYE. Therefore, it is difficult to detect the BYE DoS anomaly traffic using only SIP header sniffing SIP INVITE message, the attacker at the same or different subnets could terminate the normal in- progress call, because it could succeed in generating a BYE message to the SIP proxy server. In the SIP BYE attack, it is difficult to distinguish from the normal call termination procedure. That is, we apply the timestamp of RTP traffic for detecting the SIP BYE attack. Generally, after normal call termination, the bi-directional RTP flow is terminated in a bref space of time. However, if the call termination procedure is anomaly, we can observe that a directional RTP media flow is still ongoing, whereas an attacked directional RTP flow is broken. Therefore, in order to detect the SIP BYE attack, we decide that we watch a directional RTP flow for a long time threshold of N sec after SIP BYE message. The threshold of N is also set from the 2 explains the procedure to detect BYE DoS anomal traffic using captured timestamp of the RTP packet. We maintain SIP session information between clients with INVITE and OK messages including the same Call-ID and 4-tuple (source/destination IP Address and port number) of the BYE packet. We set a time threshold value by adding Nsec to the timestamp value of the BYE message. The reason why we use the captured timestamp is that a few RTP packets are observed under second. If RTP traffic is observed after the time threshold, this willbe considered as a BYE DoS attack, because the VoIP session will be terminated with normal BYE messages. C. RTP Anomaly Traffic Detection Algorithm 3 describes an RTP flooding detection method that uses SSRC and sequence numbers of the RTP header. During a single RTP session, typically, the same SSRC value is maintained. If SSRC is changed, it is highly probable that anomaly has occurred. In addition, if there is a big sequence number gap between RTP packets, we determine that anomaly RTP traffic has happened. As inspecting every sequence number for a packet is difficult, we calculate the sequence number gap using the first, last, maximum and minimum sequence numbers. In the RTP header, the sequence number field uses 16 bits from 0 to 65535. When we observe a wide sequence number gap in our algorithm, we consider it as an RTP flooding attack.IV. PERFORMANCE EVALUATIONA. Experiment EnvironmentIn order to detect VoIP anomaly traffic, we established an experimental environment as figure 1. In this envi-ronment, we employed two VoIP phones with wireless LANs, one attacker, a wireless access router and an IPFIX flow collector. For the realistic performance evaluation, we directly used one of the working VoIP networks deployed in Korea where an 11-digit telephone number (070-XXXX-XXXX) has been assigned to a SIP wireless SIP phones supporting , we could make calls to/from the PSTN or cellular phones. In the wireless access router, we used two wireless LAN cards- one is to support the AP service, and the other is to monitor packets. Moreover, in order to observe VoIP packets in the wireless access router, we modified nProbe [16], that is an open IPFIX flow generator, to create and export IPFIX flows related with SIP, RTP, and information. As the IPFIX collector, we have modified libipfix so that it could provide the IPFIX flow decoding function for SIP, RTP, and templates. We used MySQL for the flow DB.B. Experimental ResultsIn order to evaluate our proposed algorithms, we gen-erated 1,946 VoIP calls with two commercial SIP phones and a VoIP anomaly traffic generator. Table I showsour experimental results with precision, recall, and F-score that is the harmonic mean of precision and recall. In CANCEL DoS anomaly traffic detection, our algorithm represented a few false negative cases, which was related with the gap threshold of the sequence number in MAC header. The average of the F-score value for detecting the SIP CANCEL anomaly is %.For BYE anomaly tests, we generated 755 BYE mes-sages including 118 BYE DoS anomalies in the exper-iment. The proposed BYE DoS anomaly traffic detec-tion algorithm found 112 anomalies with the F-score of %. If an RTP flow is terminated before the threshold, we regard the anomaly flow as a normal one. In this algorithm, we extract RTP session information from INVITE and OK or session description messages using the same Call-ID of BYE message. It is possible not to capture those packet, resulting in a few false-negative cases. The RTP flooding anomaly traffic detection experiment for 810 RTP sessions resulted in the F score of 98%.The reason of false-positive cases was related with the sequence number in RTP header. If the sequence number of anomaly traffic is overlapped with the range of the normal traffic, our algorithm will consider it as normal traffic.V. CONCLUSIONSWe have proposed a flow-based anomaly traffic detec-tion method against SIP and RTP-based anomaly traffic in this paper. We presented VoIP anomaly traffic detection methods with flow data on the wireless access router. We used the IETF IPFIX standard to monitor SIP/RTP flows passing through wireless access routers, because its template architecture is easily extensible to several protocols. For this purpose, we defined two new IPFIX templates for SIP and RTP traffic and four new IPFIX fields for traffic. Using these IPFIX flow templates,we proposed CANCEL/BYE DoS and RTP flooding traffic detection algorithms. From experimental results on the working VoIP network in Korea, we showed that our method is able to detect three representative VoIP attacks on SIP phones. In CANCEL/BYE DoS anomaly trafficdetection method, we employed threshold values about time and sequence number gap for classfication of normal and abnormal VoIP packets. This paper has not been mentioned the test result about suitable threshold values. For the future work, we will show the experimental result about evaluation of the threshold values for our detection method.二、英文翻译:交通流数据检测异常在真实的世界中使用的VoIP网络一 .介绍最近,许多SIP[3],[4]基于服务器的VoIP应用和服务出现了,并逐渐增加他们的穿透比及由于自由和廉价的通话费且极易订阅的方法。

外文文献翻译译稿

外文文献翻译译稿

外文文献翻译译稿1可用性和期望值来自Willliam S.Green, Patrick W.Jordan.产品的愉悦:超越可用性根据人机工程学会(HFES)的观点,人机工程学着眼于“发现和共享可用于各种系统和设备设计的、关于人的特点的知识”。

人们通常只是把它作为生物力学和人体测量所关注的内容,实际上它是从更广泛的意义上的一种对人(产品用户)的全面和综合的理解。

HFES从二战中有军方从事的系统分析中发展而来。

其中的三种主要研究的是人体测量、复杂信息的解释和管理,以及在部队和装备调配中应用的系统分析。

系统分析在尺度和复杂性方面跨度很大,大的系统分析有类似于诺曼底登陆准备的大型系统规划,小到去理解如何从合理性和规模的角度才最佳的布置和装备人员。

诺曼底登陆是20世纪最复杂的事件之一。

他要求建立一个在战斗开始之前还不确定的庞大的人员和物资的合理分配系统。

在更小的规模上,装备和军事人物的布置意味着如何去组织、训练和安排战士,最大限度的发挥他们的长处。

士兵必须迅速地接受训练,并且能够有效地使用和维护在二战中发展起来的一系列技术装备。

其中,对于飞行员、潜艇人员和坦克驾驶员有神采的限制。

复杂的新装备的开发要求找到最好的税收、密码便医院、破译人员、雷达和声纳操作员、轰炸机驾驶员和机组人员。

在战后,随着公司及其产品在尺度、领域和复杂性方面的增长,很多系统分析人员在商用领域找到了发展机会。

尽管是战后的发展才导致了1957年人机工程协会(HFES)的建立,但人机研究的起源可以追溯到大批量生产方式的成型阶段,是当时提高生产效率的要求。

随着工作方式从手工生产和农业生产中的转移,新的工厂工作的概念逐步发展起来。

福特的流水生产线和泰勒的效率理论开始对生产的规划和教育产生影响。

即使在家庭生活中,妇女们也开始接受了现代家庭管理理论,并运用这些理论来组织和规划家庭。

在20世纪末,一种涵盖面更广的人机工程正在发展之中。

新的人机工程学是为了适应已经被广泛意识到的对用户行为模式更深入的需求而诞生的,它开始应用定型研究方法,并探索人的情感和认知因素。

外文文献翻译译稿和原文【范本模板】

外文文献翻译译稿和原文【范本模板】

外文文献翻译译稿1卡尔曼滤波的一个典型实例是从一组有限的,包含噪声的,通过对物体位置的观察序列(可能有偏差)预测出物体的位置的坐标及速度。

在很多工程应用(如雷达、计算机视觉)中都可以找到它的身影。

同时,卡尔曼滤波也是控制理论以及控制系统工程中的一个重要课题。

例如,对于雷达来说,人们感兴趣的是其能够跟踪目标.但目标的位置、速度、加速度的测量值往往在任何时候都有噪声。

卡尔曼滤波利用目标的动态信息,设法去掉噪声的影响,得到一个关于目标位置的好的估计.这个估计可以是对当前目标位置的估计(滤波),也可以是对于将来位置的估计(预测),也可以是对过去位置的估计(插值或平滑).命名[编辑]这种滤波方法以它的发明者鲁道夫。

E。

卡尔曼(Rudolph E. Kalman)命名,但是根据文献可知实际上Peter Swerling在更早之前就提出了一种类似的算法。

斯坦利。

施密特(Stanley Schmidt)首次实现了卡尔曼滤波器。

卡尔曼在NASA埃姆斯研究中心访问时,发现他的方法对于解决阿波罗计划的轨道预测很有用,后来阿波罗飞船的导航电脑便使用了这种滤波器。

关于这种滤波器的论文由Swerling(1958)、Kalman (1960)与Kalman and Bucy(1961)发表。

目前,卡尔曼滤波已经有很多不同的实现.卡尔曼最初提出的形式现在一般称为简单卡尔曼滤波器。

除此以外,还有施密特扩展滤波器、信息滤波器以及很多Bierman, Thornton开发的平方根滤波器的变种.也许最常见的卡尔曼滤波器是锁相环,它在收音机、计算机和几乎任何视频或通讯设备中广泛存在。

以下的讨论需要线性代数以及概率论的一般知识。

卡尔曼滤波建立在线性代数和隐马尔可夫模型(hidden Markov model)上.其基本动态系统可以用一个马尔可夫链表示,该马尔可夫链建立在一个被高斯噪声(即正态分布的噪声)干扰的线性算子上的。

系统的状态可以用一个元素为实数的向量表示.随着离散时间的每一个增加,这个线性算子就会作用在当前状态上,产生一个新的状态,并也会带入一些噪声,同时系统的一些已知的控制器的控制信息也会被加入。

文献通考总序原文翻译

文献通考总序原文翻译

文献通考总序原文翻译The total preface of "Wenxian Tongkao" translation:"enxian Tongkao" is a monumental work written by Chinese scholar Gu Yanwu during the late Ming Dynasty. It is a comprehensive study of Chinese history and literature, and is recognized as one of the most important works in Chinese historiography.In the preface of "Wenxian Tongkao" Gu Yanwu discusses the importance of studying history and the necessity of writing a comprehensive record of Chinese literature and history. He believes that by studying the past, one can gain a deeper understanding of the present and make better decisions for the future. Gu Yanwu also emphasizes the need for accuracy and objectivity in historical research, and criticizes the tendency of some scholars to manipulate historical records for personal or political gain.Furthermore, Gu Yanwu emphasizes the importance of studying literature as a means of understanding culture and society. He argues that literature reflects the beliefs, values, and aspirations of a society, and provides valuable insights into human nature and the human condition. Gu Yanwu also emphasizes the need for scholars to approach literature withan open and critical mind, and to consider multiple perspectives when analyzing literary works.Overall, the preface of "Wenxian Tongkao" highlights the importance of studying history and literature, and provides a framework for conducting comprehensive and objective research in these fields. Gu Yanwu"s insights and ideas continue to be influential in the field of Chinese studies, and his work serves as a valuable resource for scholars and researchers interested in Chinese history and literature.。

英文文献原文及对应翻译

英文文献原文及对应翻译

Adsorption char acter istics of copper , lead, zinc and cadmium ions by tourmaline(环境科学学报英文版) 电气石对铜、铅、锌、镉离子的吸附特性JIANG Kan1,*, SUN Tie-heng1,2 , SUN Li-na2, LI Hai-bo2(1. School of Municipal and Environmental Engineering, Harbin Institute of Technology, Harbin 150090, China. jiangkan522@; 2. Key Laboratory of Environmental Engineering of Shenyang University, Shenyang 110041, China)摘要:本文研究了电气石对Cu2+、Pb2+、Zn2+和Cd2+的吸附特性,建立了吸附平衡方程。

研究四种金属离子的吸附等温线以及朗缪尔方程。

结果表明电气石能有效地去除水溶液中的重金属且具有选择性:Pb2+> Cu2+> Cd2+> Zn2+。

电气石对金属离子吸附量随着介质中金属离子的初始浓度的增加而增加。

电气石也可以增加金属溶液的pH值;发现电气石对Cu2+、Pb2+、Zn2+和Cd2+的最大吸附量为78.86、154.08、67.25和66.67mg/g;温度在25-55℃对电气石的吸附量影响很小。

此外研究了Cu2+、Pb2+、Zn2+和Cd2+的竞争吸附。

同时观察到电气石对单一金属离子的吸附能力为Pb>Cu>Zn>Cd,在两种金属系统中抑制支配地位是Pb>Cu,Pb>Zn,Pb>Cd,Cu>Zn,Cu>Cd,和Cd>Zn。

关键字:吸附;重金属含量;朗缪尔等温线;电气石介绍重金属是来自不同行业排出的废水,如电镀,金属表面处理,纺织,蓄电池,矿山,陶瓷,玻璃。

论文外文文献翻译

论文外文文献翻译

论文外文文献翻译以下是一篇700字左右的论文外文文献翻译:原文题目:The Role of Artificial Intelligence in Medical Diagnostics: A Review原文摘要:In recent years, there has been a growing interest in the use of artificial intelligence (AI) in the field of medical diagnostics. AI has the potential to improve the accuracy and efficiency of medical diagnoses, and can assist clinicians in making treatment decisions. This review aims to examine the current state of AI in medical diagnostics, and discuss its advantages and limitations. Several AI techniques, including machine learning, deep learning, and natural language processing, are discussed. The review also examines the ethical and legal considerations associated with the use of AI in medical diagnostics. Overall, AI has shown great promise in improving medical diagnostics, but further research is needed to fully understand its potential benefits and limitations.AI在医学诊断中发挥的作用:一项综述近年来,人工智能(AI)在医学诊断领域的应用引起了越来越多的关注。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

技术文献资料翻译专业艺术设计(环艺方向)学生姓名董海娟班级 BM环艺091学号 0951406113指导教师裴慧芳专业系主任王庆勇发放日期2013年2月23日Introduction to modern hotel designAbstract:Modern hotel is not a simple can imagine space. It not only includes many practical connotation, more gradually become the symbol of people and the whole city culture grade. New hotels are no longer as in the past, only to meet a very simple purpose of have a rest, so more and more hotel operators begin to attach importance to the design. Hotel space design will take you to review the design of the related research and the hot issues, and put forward their views on the hotel design planning.一、The hotel design concept and ideaAt present domestic hotel design concept and idea for the study does not see more, so, in the field of hotel the same is true in the field of architecture. Hotel design, is based on the hardware design of the hotel building, electrical and mechanical, interior decoration, furniture, lighting, lighting design, etc. Hotel space design identity design is set accommodation, catering, entertainment, office, etc. Design of an integrated environment. From the environment can be divided into the indoor environment and outdoor environment; Is divided into from the function of accommodation, catering, entertainment, office, shopping malls and other places; Space and public space and private space, at the same time, the space space also can be divided into closed, semi-closed and open. Hotel design including the location, shape, civil, electrical, decoration and hotel management from six aspects, the hotel design should be accurate according to the hotel overall planning and design. The type of hotel design is a kind of commercial culture, as a cultural venues, transportation centers, office space, medical rehabilitation, is a kind of social demand, that is culture, has its cultural attributes. Successful hotel design is not only meet the needs of its use function, the design is novel, more important is to have the different regional and cultural. Hotel design elements, there are a lot of aspects, the function is the most important, in the same topic space, function and harmonious development of cultural elements, has become a growing trend. Cultural quality is the soul of hotel design. Hotel design scope not only includes the total planning, architecture, landscape,interior decoration, equipment installation, the hardware, also including the function layout, process planning, cultural orientation, business analysis, image planning, these software. Good design must be fully embody the concept of five, namely, humanity, practical, advanced, economical and artistic quality. Agree with "people-oriented" design concept will become an important direction of the development of the modern hotel design. Design concept is based on people-oriented, to the owner. Hotel design and construction of regional culture. Internationally, the design of the hotel in general is divided into the following several aspects: architectural design, structural design, equipment design, interior design. Hotel design is a complicated system engineering, it involves architectural, mechanical and electrical engineering, management science, economics, aesthetics, information engineering, psychology, finance various aspects knowledge, and the hotel itself unique management pattern and so on. Many different style of the hotel operators involved in the mastery of their own hotel design concept, is the pursuit of a unique corporate culture idea, set up their own unique style. Internationally accepted standard of hotel design is divided into the principle and application demand of two parts, and always in constant development. This includes the total planning, construction, equipment, facilities and interior design, including the orientation of culture, management, market research and development.二、China's history, present situation and trend of the hotel design research1.The hotel design history of ChinaAbout the history of Chinese hotel design, different scholars understanding of its classification is not consistent. YanYu think Chinese understanding and the understanding of the hotel design began from more than two decades ago, the original hotel is believed to be a show place of luxury, is the sign of a rich, so the time of the hotel design generally choose high-grade materials such as marble, granite, wool carpet, to create an environment for the nobility and wealth of people yearning, emphasis on environmental effects on people. YanYu the evolution of the design development of the hotel design, summarized to two main line, is a functional space structure from single to satisfy travelers of the accomodation development for today's meet the needs of all kinds of people more and more complex - one can live, work,party, entertainment, leisure, dining, shopping, and various activities, the other one is the hotel's decorative art development, increasingly refined decoration craft, design innovation, from the trival adornment, the concise co-existence, from the character of the show to culture. It is considered that hotel design in China is accompanied with the process of reform and opening up started and developed slowly, can be divided into three periods: the 70 s and 1950 s design does not have its own restaurant, almost few designs but also in the 1950 s Russian classical mixed with symbols of Chinese traditional decoration design style; After the 1980 s, with the rapid development of China's economy, the domestic hotel industry has entered a stage of rapid development. But at the same time, China's hotel design was still in the stage of simple imitation of "follow suit", there is no outstanding personality in terms of color; After the 1990 s, the international hotel group, with its design style diversity trend was to follow, they let people appreciate the design professional, see of the gap between our hotel design in China are in the direction of the specialization. YanYu design from the perspective of the decorative arts appreciation, roughly divided into three stages of development. Early stage: is outside of the hotel management idea and the adornment design completely follow "takes doctrine". Lead author much by Hong Kong or foreign designers. Domestic basic didn't decoration design professionals, design concept is relatively backward, and the finished product is only limited to cad or refined decoration construction drawing design category; High speed development stage: in the early ninety s. The rapid development of economy, to the adornment of the domestic design industry has brought the good opportunity. A large number of elite engaged in architecture and art discipline devoted himself into the wave. Some colleges and universities have also timely set up relevant professional, through the study of advanced foreign technology and art, in nearly a decade of practice process, experience learning, imitation, drain and discard the growth of the journey. Show in front of works, present a is a scene of flowers, to which the wheat from the chaff to evaluate these works is one-sided, it is important at this time for the all-round development of domestic interior decoration design laid a solid talent base. It's historical significance far beyond value to the design work itself; Get to phase: it wasdivided in the 21st century. Objectively speaking, this stage is not complete, more accurate say is ongoing. In the recent five to six years of decoration works, whether in the functional design level and the market concept and management concept of press close to, or in the technical level to use intelligent technology content and the ability to grasp new materials to improve, or artistic style level multicultural flavor and decoration of the four-walled character of the play, all tightly button up the high speed development in the era pulse, and industrial technology development and the emergence of new materials are closely linked.2.The status quo of Chinese hotel designIn modern hotel interview, Wang Yi believes that China has no real sense of the hotel building design education system, and only pay attention to outward appearance design, rather than from the perspective of the user, the function of cohesion within the hotel and use convenience into consideration in the future. Only consider the hotel design enough "class", quite beautiful in all kinds of top grade material to hotel installed on fashionable garment, ignoring the inner functions of cohesion and use of human, ignoring the demand for the long-standing development of the hotel. YanYu think design, hotel design under the influence of the traditional concept of "face", the present trend of one-sided pursuit of "luxury". Yang Zhen thought, most of the hotel design in China is simple "copycat" level. But three experts acknowledge that China's domestic hotel design strength is growing fast. YanYu design think hotel design in China compared with developed countries is still in its infancy. There are many problems and shortcomings. Severely restricted the further development of our country's hotel industry. China hotel design is still in the imitation of foreign original stage, it is difficult to have their own characteristics. Some hotels have realised that imitation is not blindly, introduced a variety of personalized and humanized services, however, underneath the essence has not changed.3.The hotel design trendYanYu to design thought has the following a few big characteristics:de-emphasis dignitaries luxury; Give more space to the toilet; Reduce the amount of restaurant (individual does market hotel except); Compression of public area andoutstanding personalized; Avoid extravagance, advocating simplicity; Hotel construction and renovation of technology costs increase, but the total cost can't break through. Mr Barton, durkheim cuny, introduced the hotel planning and design of new buildings and the environment trend is: the life taste and design; House guest demand design; Safety design, emphasis on the functional requirement of the hotel background design; Has a comprehensive application of hotel design. YanYu design identity barton, Mr Kim, deterioration, and think that the brand effect is also a new trend. New trend is: return to nature, the pursuit of large area of Shared space; Guest room toilet area expanded, decorate luxurious, functional diversification; Pursuit of multi-functional, tend to diversification. Into the "people-oriented" design concept; . Highlight the personalized design; Pay attention to new technology and new equipment applications. Consumption based on the basic theory of economics, the Angle of consumption culture as the guidance, hotel design trend of the current detailed induction and analysis, think that due to the influence of the western developed countries, hotel development has a tendency to convergence with the developed countries, humanized and professional hotel consumption, ecological consumption and green hotel, hotel consumption information and intelligence, consumer culture theme hotel, and consumption of the brand and brand hotel, the hotel consumption characterization and characteristics. Some predict the hotel design will be more to cater to the guests' expectations, everywhere reflect a kind of huma n care; Will pay more attention to the rate of return on investment; Will be more reflect local characteristics; In the trend of diversification nakedness culture grade.三、The influence of the design and management of the hotelGood design show the hotel's elegant fashion and noble quality to bring good business at the same time also let hotel become the focus of concern of the public. Good design through to deduce new ideas and trends, so as to improve the building structure and change the city architecture. It can even active hotel around a region's economy. Family to think, good hotel design can give a guest a novelty, a kind of like mood of The Times, can effectively arouse the guest's consumption desire, to show the quality of maverick style, and have not culture kernel hook model, played apositive role to the promotion of hotel management benefit. Hotel provides guests with not only the overall design style is convenient and comfortable living environment, more important is to provide people with the spirit of enjoyment, increase the hotel's cultural taste. Hotel design style brings good returns for the business, bring a high occupancy rate, attract the guest and improve the room revenue. Rational design layout for the hotel to reduce the manpower and energy costs, and improve the operation efficiency. X full and clear thought, good hotel design by humanized detail processing and upgrade the room comfort level to improve the occupancy rate and enhanced profitability; Good design goes through the huma nized design gimmick with reasonable distribution of funds to extend the life of the hardware is extending project of transformation period, to save investment and enhance profitability. Modern hotel interview, only make design combined with operation, can make more customers loyal to the hotel, to bring more benefits in the hotel. Design and management of the hotel have a symbiotic relationship directly. The authors come to the hotel is designed to meet the demand of mental space of human settlements, which interact with the operation and management, coordination in the whole hotel operation system. Scientific and modern management for hotels in the market competition provides a strong guarantee; Appropriate, suitable hotel design is effective and efficient management operation has played a positive catalytic effect. The two complement each other, in the modern hotel own comprehensive strength competition plays an important role.四、ConclusionWith the continuous development of China's hotel industry, the competition between the hotel is also more and more fierce. A hotel wants to win the guests should be more when the guests enter the hotel the first step to give him leave deep memory, this is very important. Design the success to build a hotel and the environment is very harmonious whole has become a factor decides the success or failure of the hotel management, hotel professional design gradually put into agenda. As China's economy continued rapid development, domestic and international consumer market increasingly mature and expand the development of China's hoteldesign, not only closely to the international development trend, more too, advanced development, from behind./article/i27887524.html。

相关文档
最新文档