总体设计说明 (中英文对照)

合集下载

产品设计说明 (中英文对照)

产品设计说明 (中英文对照)

产品设计说明 (中英文对照)自己设计的一款小型电动车,做了个中英文对照的产品设计说明Design instructionsBREAD PPT DESIGNED自己设计的一款小型电动车,做了个中英文对照的产品设计说明01CONTENTSDesign reason02 03Product showDesign description 、 s自己设计的一款小型电动车,做了个中英文对照的产品设计说明Now a lot of city traffic is bad, go out a traffic jam.Drivng is not a good choice, with small transport, is a quite good choice. A bicycle? Electric car is too common, why not let travel fun, Today I introduce a small transport, ti is my designToo large!Look,It is my design. Too common自己设计的一款小型电动车,做了个中英文对照的产品设计说明现在城市的交通越来越差,现在许多城市的交通,面临很多环境问题,开车不是一个好的选择,使用小型代步工具是一个不错的选择,自行车?太平常了,没有一点趣味。

怎样变得有趣,今天我向大家展示一个小型代步工具,是我的设计。

自己设计的一款小型电动车,做了个中英文对照的产品设计说明Product show90% 50% 在此录入说明在此录入说明在此录入说明自己设计的一款小型电动车,做了个中英文对照的产品设计说明Small electric vehicles concept design Conventional thinking, and the wheels in the lower part of the body, much less than the design of the body.But if change an Angle to think, will greatly e_ceeds the wheels body, perhaps can have different sense, follow the design concept, and design such a carHope this simple design, can let the people in for a walk, the more convenient, at the same time give people a lot of fun.自己设计的一款小型电动车,做了个中英文对照的产品设计说明小型电动车概念设计常规思维,轮子都在车身的下部,大大小于车身的设计。

建筑设计方案文本中英翻译.

建筑设计方案文本中英翻译.

I设计文本图名英文翻译一设计说明篇1 设计说明Introduction of design二上位分析篇1 宏观区位分析图Macro location analysis drawing2 微观区位分析图Micro location analysis drawing3 资源分析图Resources analysis drawing4 企业分析图Enterprise analysis drawing5 区位交通分析图Traffic location analysis drawing6 基地现状分析图Existing site analysis plan7 基地高层分析图Highrise analysis drawing8 基地视线分析图Sight line analysis drawing9 山体条件分析图Mountain condition analysis plan10 水体条件分析图Water condition analysis plan 三案例分析篇Case Analysis1 案例分析图Case analysis drawing四城市印象篇Urban Impression1 白天鸟瞰图Aerial View2 夜景鸟瞰图Aerial Night View3 黄昏鸟瞰图Aerial Dusk View4 半鸟瞰图Semi-Aerial View5 局部透视图(白天-夜景-黄昏Partial perspective(day-night-evening 五理念分析篇Concept analysis1 方案构思图Plan Idea diagram2 理念构思图Idea Conceived Diagram3 理念分析图Idea Analysis diagram六规划设计篇1 总体规划平面图Overall planning2 总经济技术指标表General Technological and EconomicIndex3 分地块经济技术指标表Sub Parcel Technological and EconomicIndex分区经济技术指标表Subarea Technological and EconomicIndex4 模型展示图Model exhibition Diagram5 模型分析图Model Analysis Diagram6 功能系统分析图Function System Analysis Diagram7 建筑平面功能分析图Building Plane Function AnalysisDiagram8 建筑空间功能分析图Architecture Space Function Analysis Diagram9 交通系统分析图Traffic System Analysis Diagram10 道路系统分析图Road System Analysis Diagram11 水路系统分析图Water way system Analysis Diagram12 结构系统分析图Structure System Analysis Diagram13 空间结构分析图Space Structure Analysis Diagram14 空间系统分析图Space Structure Analysis Diagram15 开发系统分析图Development system Analysis Diagram16 开发强度示意图Development Intensity Diagram17 消防系统分析图Fire protection system Analysis Diagram18 景观系统分析图Landscape system Analysis Diagram19 空间景观分析图Space Sequence Analysis Diagram20 绿化系统分析图Afforestation system Analysis Diagram21 日照系统分析图Sunshine system Analysis Diagram22 竖向设计分析图Vertical elevation Analysis Plan23 视线系统分析图Sight System Analysis Plan24 地块价值分析图District Value Diagram25 地块价值挖掘分析图26 天际线分析图Skyline Analysis Diagram27 灯光系统分析图Lighting System Analysis Diagram 七建筑设计篇1 首层建筑平面图Ground floor plan2 夹层建筑平面图Mezzanine plan3 二层建筑平面图Second floor plan4 三层建筑平面图Third floor plan5 地下一层平面图Plan for Basement Floor6 地下二层平面图2nd Basement plan7 地下三层平面图3rd Basement plan8 防火分区图Fire Compartmentation Diagram9 建筑立面图Building Elevation drawing10 建筑剖面图Building Section11 户型平面图Layout plan12 材料运用示意图Material Exertion Diagram八建筑意向篇1 户型意向图Housing intention2 建筑意向图Architectural intention九景观意向篇1景观意向图Landscape intention十空间意向篇1 空间意向图Space intention十一场景意向篇1 场景意向图Scene intention* 对于不明确制图图纸的情况,请参考文件最后的图纸导航。

设计理念及说明英文翻译

设计理念及说明英文翻译

设计理念及说明英文翻译Design Philosophy and ExplanationDesign philosophy plays a critical role in shaping the way we approach and create designs. It serves as a guiding principle that drives our decision-making process and influences the final outcome. In this essay, we will explore my personal design philosophy and provide an explanation for its importance.My design philosophy is centered around the principle of simplicity. I firmly believe that simplicity is the ultimate sophistication. In a world filled with complexities and distractions, simplicity cuts through the noise and allows the essence of a design to shine through. By eliminating unnecessary elements and focusing on the core message or function, I strive to create designs that are both aesthetically pleasing and highly effective.One of the reasons why I place such emphasis on simplicity is because it enhances user experience. Users should be able to intuitively understand and interact with a design without any confusion or frustration. Cluttered and complex designs often result in a poor user experience, leading to disengagement and dissatisfaction. On the other hand, simple and intuitive designs enable users to effortlessly navigate and engage with the content, enhancing their overall satisfaction.Moreover, simplicity has a timeless appeal that transcends trends and fads. While styles and preferences may change over time, simplicity remains a universal concept that resonates with people across different cultures and generations. By incorporatingsimplicity into my designs, I aim to create visuals that are not only relevant today but will continue to be relevant in the future.In addition to simplicity, I also prioritize functionality in my design philosophy. A design should not only be visually pleasing but also serve a purpose and fulfill its intended function. I believe that form should follow function and that aesthetic elements should complement the functionality of a design. By combining aesthetics and functionality, I aim to create designs that not only look good but also work effectively.Another aspect of my design philosophy is attention to detail. I believe that every element, no matter how small, contributes to the overall impact of a design. From the choice of colors and typography to the spacing and alignment, every detail matters. By paying attention to the finer details, I strive to create designs that are refined, polished, and visually harmonious.In conclusion, my design philosophy revolves around simplicity, functionality, and attention to detail. By embracing simplicity, I can create designs that are aesthetically pleasing, intuitively understandable, and timeless. Additionally, prioritizing functionality ensures that my designs serve a purpose and fulfill their intended function. Finally, attention to detail allows me to create refined and visually harmonious designs. By adhering to this philosophy, I aim to create impactful and meaningful designs that resonate with users.。

计算机专业毕业设计说明书外文翻译(中英对照)

计算机专业毕业设计说明书外文翻译(中英对照)

Talking about security loopholesRichard S. Kraus reference to the core network security business objective is to protect the sustainability of the system and data security, This two of the main threats come from the worm outbreaks, hacking attacks, denial of service attacks, Trojan horse. Worms, hacker attacks problems and loopholes closely linked to, if there is major security loopholes have emerged, the entire Internet will be faced with a major challenge. While traditional Trojan and little security loopholes, but recently many Trojan are clever use of the IE loophole let you browse the website at unknowingly were on the move.Security loopholes in the definition of a lot, I have here is a popular saying: can be used to stem the "thought" can not do, and are safety-related deficiencies. This shortcoming can be a matter of design, code realization of the problem.Different perspective of security loo phole sIn the classification of a specific procedure is safe from the many loopholes in classification.1. Classification from the user groups:● Public loopholes in the software category. If the loopholes in Windows, IEloophole, and so on.● specialized software loophole. If Oracle loopholes, Apach e, etc. loopholes.2. Data from the perspective include :● could not reasonably be read and read data, including the memory of thedata, documents the data, Users input data, the data in the database, network,data transmission and so on.● designa ted can be written into the designated places (including the localpaper, memory, databases, etc.)● Input data can be implemented (including native implementation,according to Shell code execution, by SQL code execution, etc.)3. From the point of view of the scope of the role are :● Remote loopholes, an attacker could use the network and directly throughthe loopholes in the attack. Such loopholes great harm, an attacker can createa loophole through other people's computers operate. Such loopholes and caneasily lead to worm attacks on Windows.● Local loopholes, the attacker must have the machine premise accesspermissions can be launched to attack the loopholes. Typical of the local authority to upgrade loopholes, loopholes in the Unix system are widespread, allow ordinary users to access the highest administrator privileges.4. Trigger conditions from the point of view can be divided into:● Initiative trigger loopholes, an attacker can take the initiative to use the loopholes in the attack, If direct access to computers.● Passive trigger loopholes must be computer operators can be carried out attacks with the use of the loophole. For example, the attacker made to a mail administrator, with a special jpg image files, if the administrator to open image files will lead to a picture of the software loophole was triggered, thereby system attacks, but if managers do not look at the pictures will not be affected by attacks.5. On an operational perspective can be divided into:● File opera tion type, mainly for the operation of the target file path can be controlled (e.g., parameters, configuration files, environment variables, the symbolic link HEC), this may lead to the following two questions: ◇Content can be written into control, the contents of the documents can be forged. Upgrading or authority to directly alter the important data (such as revising the deposit and lending data), this has many loopholes. If history Oracle TNS LOG document can be designated loopholes, could lead to any person may control the operation of the Oracle computer services;◇information content can be output Print content has been contained to a screen to record readable log files can be generated by the core users reading papers, Such loopholes in the history of the Unix system crontab subsystem seen many times, ordinary users can read the shadow ofprotected documents;● Memory coverage, mainly for memory modules can be specified, writecontent may designate such persons will be able to attack to enforce the code (buffer overflow, format string loopholes, PTrace loopholes, Windows 2000 history of the hardware debugging registers users can write loopholes), or directly alter the memory of secrets data.● logic errors, such wide gaps exist, but very few changes, so it is difficult todiscern, can be broken down as follows : ◇loopholes competitive conditions (usually for the design, typical of Ptrace loopholes, The existence of widespread document timing of competition) ◇wrong tactic, usually in design. If the history of the FreeBSD Smart IO loopholes. ◇Algorithm (usually code or design to achieve), If the history of Microsoft Windows 95/98 sharing password can easily access loopholes. ◇Imperfections of the design, such as TCP / IP protocol of the three-step handshake SYN FLOOD led to a denial of service attack. ◇realize the mistakes (usually no problem for the design, but the presence of coding logic wrong, If history betting system pseudo-random algorithm)● External orders, Typical of external commands can be controlled (via the PATH variable, SHELL importation of special characters, etc.) and SQL injection issues.6. From time series can be divided into:● has long found loopholes: manufacturers already issued a patch or repairmethods many people know already. Such loopholes are usually a lot of people have had to repair macro perspective harm rather small.● recently discovered loophole: manufacturers just made patch or repairmethods, the people still do not know more. Compared to greater danger loopholes, if the worm appeared fool or the use of procedures, so will result in a large number of systems have been attacked.● 0day: not open the loophole in the private transactions. Usually such loopholes to the public will not have any impact, but it will allow an attacker to the targetby aiming precision attacks, harm is very great.Different perspective on the use of the loopholesIf a defect should not be used to stem the "original" can not do what the (safety-related), one would not be called security vulnerability, security loopholes and gaps inevitably closely linked to use.Perspective use of the loopholes is:● Data Perspective: visit had not visited the data, including reading and writing.This is usually an attacker's core purpose, but can cause very serious disaster (such as banking data can be written).● Competence Perspective: Major Powers to bypass or p ermissions. Permissionsare usually in order to obtain the desired data manipulation capabilities.● Usability perspective: access to certain services on the system of controlauthority, this may lead to some important services to stop attacks and lead to a denial of service attack.● Authentication bypass: usually use certification system and the loopholes willnot authorize to access. Authentication is usually bypassed for permissions or direct data access services.● Code execution perspective: mainly procedures for the importation of thecontents as to implement the code, obtain remote system access permissions or local system of higher authority. This angle is SQL injection, memory type games pointer loopholes (buffer overflow, format string, Plastic overflow etc.), the main driving. This angle is usually bypassing the authentication system, permissions, and data preparation for the reading.Loopholes explore methods mustFirst remove security vulnerabilities in software BUG in a subset, all software testing tools have security loopholes to explore practical. Now that the "hackers" used to explore the various loopholes that there are means available to the model are:● fuzz testing (black box testing), by constructing procedures may lead toproblems of structural input data for automatic testing.● FOSS audit (White Box), now have a series of tools that can assist in thedetection of the safety procedures BUG. The most simple is your hands the latest version of the C language compiler.● IDA anti-compilation of the audit (gray box testing), and above the sourceaudit are very similar. The only difference is that many times you can obtain software, but you can not get to the source code audit, But IDA is a very powerful anti-Series platform, let you based on the code (the source code is in fact equivalent) conducted a safety audit.● dynamic tracking, is the record of proceedings under different conditions andthe implementation of all security issues related to the operation (such as file operations), then sequence analysis of these operations if there are problems, it is competitive category loopholes found one of the major ways. Other tracking tainted spread also belongs to this category.● patch, the software manufacturers out of the question usually addressed in thepatch. By comparing the patch before and after the source document (or the anti-coding) to be aware of the specific details of loopholes.More tools with which both relate to a crucial point: Artificial need to find a comprehensive analysis of the flow path coverage. Analysis methods varied analysis and design documents, source code analysis, analysis of the anti-code compilation, dynamic debugging procedures.Grading loopholesloopholes in the inspection harm should close the loopholes and the use of the hazards related Often people are not aware of all the Buffer Overflow Vulnerability loopholes are high-risk. A long-distance loophole example and better delineation:●R emote access can be an OS, application procedures, version information.●open unnecessary or dangerous in the service, remote access to sensitiveinformation systems.● Remote can be restricted for the documents, data reading.●remotely important or res tricted documents, data reading.● may be limited for long-range document, data revisions.● Remote can be restricted for important documents, data changes.● Remote can be conducted without limitation in the important documents, datachanges, or for general service denial of service attacks.● Remotely as a normal user or executing orders for system and network-leveldenial of service attacks.● may be remote management of user identities to the enforcement of the order(limited, it is not easy to use).● can be remote management of user identities to the enforcement of the order(not restricted, accessible).Almost all local loopholes lead to code execution, classified above the 10 points system for:●initiative remote trigger code execution (such a s IE loophole).● passive trigger remote code execution (such as Word gaps / charting softwareloopholes).DEMOa firewall segregation (peacekeeping operation only allows the Department of visits) networks were operating a Unix server; operating systems only root users and users may oracle landing operating system running Apache (nobody authority), Oracle (oracle user rights) services.An attacker's purpose is to amend the Oracle database table billing data. Its possible attacks steps:● 1. Access pea cekeeping operation of the network. Access to a peacekeepingoperation of the IP address in order to visit through the firewall to protect the UNIX server.● 2. Apache services using a Remote Buffer Overflow Vulnerability direct accessto a nobody's competence hell visit.● 3. Using a certain operating system suid procedure of the loophole to upgradetheir competence to root privileges.● 4. Oracle sysdba landing into the database (local landing without a password).● 5. Revised target table data.Over five down for process analysis:●Step 1: Authentication bypass●Step 2: Remote loopholes code execution (native), Authentication bypassing ● Step 3: permissions, authentication bypass● Step 4: Authentication bypass● Step 5: write data安全漏洞杂谈Richard S. Kraus 网络安全的核心目标是保障业务系统的可持续性和数据的安全性,而这两点的主要威胁来自于蠕虫的暴发、黑客的攻击、拒绝服务攻击、木马。

设计说明英文

设计说明英文

设计说明英文Design ExplanationIntroduction:The purpose of this report is to provide a comprehensive explanation of the design choices made for the development of the product. The product in question is a smartwatch that aims to cater to the needs of fitness enthusiasts. The report will outline the design process, its objectives, and our reasons for implementing them, and the challenges we faced and how we overcame them.Design Objectives:The primary objective of the smartwatch is to track and monitor theuser's fitness activities efficiently. We wanted to make sure that the user gets access to accurate data about their activities, and this data is displayed in an easy-to-understand format.Another important objective was to ensure that the smartwatch is user-friendly and easy to navigate. The user interface should be intuitive and visually appealing.Design Process:The design process began with brainstorming sessions where we tried to identify the key features that our smartwatch should possess. After this initial phase, we gathered user feedback about their pain points and what theywould expect from a fitness tracker. Based on this information, we came up with a list of must-have features and features that would be nice to have.The next step was to create wireframes and prototypes of the app's user interface, and we tested it with a focus group for feedback. Based on the feedback, we made changes to the interface to make it more user-friendly and intuitive.After finalizing the user interface, we moved on to the hardware design. We decided to use a circular display for better aesthetics and a more traditional watch look. We also included a heart rate monitor and GPS tracking capabilities to provide the user with accurate data about their activities.Challenges:One of the biggest challenges we faced was improving the battery life of the smartwatch. With our hardware requirements, the battery life was only around 24 hours, which was not enough for a fitness tracker. We overcame this by creating an efficient energy management system that optimized the device's usage based on the user's activities.Another challenge was balancing the aesthetics and functionality of the smartwatch. As mentioned earlier, we wanted to create a traditional watch look, but we also wanted to ensure that the user interface was easy to navigate and understand. To overcome this challenge, we conducted several rounds of user testing until we found the right balance.Conclusion:In conclusion, the design process for the smartwatch involved gathering user feedback, prototyping, and testing to create a user-friendly and efficient device. The objective was to create a fitness tracker that provides accurate data and easy-to-understand visualizations. Our biggest challenge was improving the battery life of the device without compromising on the hardware requirements or aesthetics. We overcame this challenge by creating an efficient energy management system. We also worked to balance the aesthetics and functionality of the device through several rounds of user testing. Overall, we believe that our smartwatch successfully meets the design objectives and provides an excellent user experience.。

总体设计说明书

总体设计说明书

总体设计说明书1.引言1.1编写目的为明确软件需求、安排项目规划与进度、组织软件开发与测试,撰写本文档。

本文档供项目经理、设计人员、开发人员参考。

1.2项目背景a.项目的委托单位:XXXXX开发单位:XXXX主管部门:XXXXXXb.该软件系统与其他1. 本软件系统的名称:校级(公共课)学生成绩管理系统。

2. 该软件系统同其他系统或其他机构的基本的相互来往关系:该系统基于IE浏览器,版本为6.0及以上,支持windows系列平台。

1.3定义定义关键词如下:HTTP -- Hyper Text Transfer Protocol.(超文本传输协议)。

IIS-- Internet 信息服务。

HTML-- Hyper Text Markup Language(超文本标记语言)。

ASP--Active Server PagesODBC--开放数据库连接ADO ――活动存储对象IPO-- input & process & output(输入、处理、输出)CGI――Common GateWay interface (公用网关接口技术)1.4参考资料GB/T 11457:软件工程术语。

GB/T 8566 -1995:计算机软件开发规范。

GB 8567:计算机软件产品开发文件编制指南。

2.任务概述2.1目标已有运行系统,主要任务是消化、理解原有系统,进一步修改、完善。

系统构成图如下:1.数据库模块:2.成绩录入模块:3.打印统计模块:2.2运行环境操作系统:Microsoft Windows 2000 Advanced Server支持环境:IIS 5.0数据库:Microsoft SQL Server 20002.3需求概述校级(公共课)学生成绩管理系统分3个模块:数据库模块、成绩录入模块和统计打印模块。

数据库模块需要实现如建库、增加、插入、删除、修改、合并、查询等基本操作。

成绩录入模块需要实现功能如下:录入方式(顺序、非顺序)自动查错、灵活的输入(权-交互)对特殊情况的标志及处理、统计打印全校补考成绩。

英文总体设计方案模板

英文总体设计方案模板

英文总体设计方案模板Overall Design Proposal TemplateIntroduction:The purpose of this document is to present an overall design proposal for a project. This proposal outlines the design concept, objectives, target audience, and various design elements to be incorporated into the project.Objective:The objective of this project is to create a visually appealing and functional design that effectively communicates the intended message to the target audience. The design should be innovative, modern, and easy to understand, while also reflecting the brand's values and identity.Target Audience:The target audience for this project is young professionals aged 25-35 who are interested in fashion and lifestyle. They are tech-savvy, trendsetters, and value aesthetics and quality. The design should resonate with this audience and capture their attention. Concept:The overall design concept revolves around the theme of minimalism and simplicity. The clean lines, ample white space, and bold typography will create a sleek and contemporary look. This design will create a sense of sophistication and professionalism while still maintaining a modern and approachable feel.Design Elements:1. Colors: The color palette chosen for this project will consist of muted tones such as grey, white, and black, with additional pops of vibrant colors to add visual interest and create a dynamic look.2. Typography: A modern sans-serif font will be used for headings and titles, while a legible serif font will be used for the body text. This combination will create a harmonious and balanced visual hierarchy.3. Layout: The layout will be grid-based to maintain consistency and provide a structured framework. The use of asymmetrical placement and overlapping elements will add depth and create a visually captivating experience.4. Images: High-quality and relevant images will be used throughout the design to enhance the overall aesthetic and convey the desired message. Care will be taken to ensure that the images align with the brand's identity and resonate with the target audience.5. Icons: Consistent and recognizable icons will be used to represent various functions and actions. These icons will be simple and easy to understand, contributing to the overall user-friendliness of the design.Conclusion:In conclusion, this overall design proposal aims to create a visually appealing and functional design that effectively communicates the intended message to the target audience. The minimalist andcontemporary approach will resonate with the young professional audience, while the careful selection of colors, typography, layout, images, and icons will enhance the overall aesthetic and user experience.。

设计说明英语翻译

设计说明英语翻译

设计说明英语翻译Design Specification1. Introduction2. Project OverviewThe project aims to create a web-based application that allows users to track their daily expenses and manage their personal finances. The application will provide features such as expense tracking, budgeting, goal setting, and reporting.3. Functional Requirements3.1 User Registration and Login- Users should be able to create an account by providing their personal information.- Users should be able to log in to their account usingtheir credentials.3.2 Expense Tracking- Users should be able to create new expense records, including the amount, category, and date.- Users should be able to view and edit their existing expense records.- The application should provide options for categorizing expenses, such as groceries, rent, entertainment, etc.3.3 Budgeting- Users should be able to set monthly budgets for different expense categories.- The application should provide visual representations of budget vs actual spending for each category.- Users should receive notifications when they exceed a certain percentage of their budget for a particular category.3.4 Goal Setting- Users should be able to set financial goals, such as saving a specific amount of money or paying off a debt.- The application should provide progress tracking for each goal, showing how much has been achieved.3.5 Reporting- The application should generate reports summarizing the user's expenses, savings, and overall financial health.- Reports should be customizable and exportable in various formats, such as PDF or Excel.4. Technical Requirements4.1 Platform- The application should be web-based, accessible on various devices, including desktop and mobile.4.2 Database- The application should use a relational database to store user information, expense records, budgets, goals, and reports.4.3 User Interface- The user interface should be intuitive and user-friendly, with clear navigation and appropriate feedback messages.- The interface should be responsive and adaptable to different screen sizes.4.4 Security- The application should implement robust security measures to protect user data, including encryption, secure login, and secure transmission of data.4.5 Performance- The database should be optimized for efficient data retrieval to ensure smooth user experience.5. Conclusion。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

目 录 Contents第一部分 文字说明Part One Character Description 第一章Chapter 1 建筑设计说明Architectural Design Description 第二章Chapter 2 结构设计说明Structural Design Description 第三章 Chapter 3 给排水设计说明Mechanical Design Description 第四章 Chapter 4 电气设计说明Electrical Design Description 第五章 Chapter 5 采暖通风设计说明HVAC Design Description第六章 Chapter 6 节能设计说明Energy Saving Design Description第七章 Chapter 7 环境保护Environment Protection第八章消防设计专篇Chapter 8 Special Design Description for Fire Fighting Protection第九章 Chapter 9劳动安全卫生Labor Safety &Sanitation第二部分 扩初设计图纸Part Two Preliminary Design Drawings建筑 Architecture结构 Structure给排水 Mechanical电气 Electric暖通 HVAC第一章建筑设计说明Chapter 1 Architectural Design Description一、设计依据Design Criteria1、政府审批的XXXXXXXX有限公司建设食品研发中心项目建议书的批复, 上海市浦东新区人民政府文件xxxxx号2、XXXXXXX食品有限公司建设食品研发中心新建项目的环评报告批复,上海市浦东新区环境保护局-沪环xxxxxx。

3、业主提供的建筑技术说明。

Building Technical Specification provided by Pillsbury (China) Corp., Ltd. 4、《工业企业总平面设计规范》(GB50187-93)<Design Code of Industrial Corporation Site Planning> (GB50187-93)5、《建筑设计防火规范》(GB50016-2006)<Code of Design on Building Fire Protection and Prevention> (GB50016-2006)6、国家省市有关规范规定Relevant National and Local Regulations7、业主提供的一期工程竣工图As built drawings of Phase I provided by the Proprietor.8、现行工程建设国家和上海市有关建筑设计规范和标准。

Current State and Shanghai Architectural Design Code and Standard of Construction In Force.二、设计原则Design Principles1、认真执行国家经济建设方针、政策和现行的技术标准、规范,遵守国家法律、法规。

The Design Work Will Be Rigidly In Conformity With the State Economic Guidelines, Policies, Current Technical Standards and Abide By the State Laws and Regulations.2、贯彻有关部门对本项目的批文和要求。

Approvals and Requirements From the Government Relating Departments Will Be Implemented During the Design Process.3、充分考虑工程设计中消防、环境保护、劳动安全卫生和生活福利。

Fire Fighting, Environment Protection, Labor Safety &Sanitation and Work Welfare Will Be Fully Taken Into Consideration During Project Design.4、结合发展规划,因地制宜,优化环境、绿化,使之符合绿色工厂的要求。

Take Proper Actions In Accordance With the Local Conditions, Combining the Development Planning, To Optimize the Environment and Finally Ensure the Design Reaches Up To the Requirements Of A Environmentally-friendly Factory.三、设计范围与分工Design Work Scope1、投资方负责该项目的工艺设备、生产布局的设计及造型。

Investor Shoulders the Responsibility of Design and Modeling Of the ProcessEquipments And Production Arrangements2、本公司承担厂区内总图、建筑、结构、构筑物、道路、以及相应的公用工程的设计。

Design Institute Undertakes the Work Including General Layout Of The Plant Area, Architecture, Structure, Structures, Roads, and Other Relating Public Facilities 四、工程概况Project OutlineXXXXXXX食品有限公司建设食品研发中心新建项目位于上海市浦东新区XXXXXXX食品有限公司现有厂区的东北部。

X五、总平面布置Site General Layout1、基础资料 Basic Information(1).气象资料Meteorology Data冬季平均风速:3.1m/sAverage Wind Speed In Winter: 3.1m/s夏季平均风速:3.2m/sAverage Wind Speed In Summer: 3.2m/s冬季主导风向:东北向Main Direction Of The Wind In Winter: Northeast夏季主导风向:东南向Main Direction of the Wind in summer: Southeast冬季室外大气压力:1025.1kPa Outside Air Pressure In Winter: 1025.1kPa夏季室外大气压力:1005.3kPaOutside Air Pressure In Summer: 1005.3kPa上海市冻结深度:0.08mFrozen Depth In Shanghai:0.08M(2)地形图 Topographic Mapping地形图编制单位:上海市测绘院Compiled By: Shanghai Surveying Institute编号: 20120214065Number: 20120214065坐标:上海市平面直角坐标系Coordinates: Rectangular Plane Coordinate System, Shanghai高程:上海市吴淞高程系统Elevation: Wusong Elevation System of, Shanghai2、设计原则Design Principles(1)服从城市总体规划要求,符合国家现行的法律,法规及条文。

Comply With City General Planning Requirements And State Current Laws And Regulations.精品文档(2)满足消防、安全、环保、卫生、绿化等规范要求。

Meet The Requirements Of Fire-fighting, Security, Environmental Protection And Landscaping.(3)满足工艺流程通顺、合理、物流路线短捷方便。

Process Line Shall be coherent, reasonable and logistic distribution lines are briefand convenient..3. 厂区建(构)筑物一览表Table Of All The Buildings In Site报建建筑Buildings ApplyingFor Construction编号Number名称Description建筑面积TotalFloorAreas耐火等级FireProtectionRating生产火灾危险性分类Fire HazardClassificationForProduction占地面积FootprintAreas层数Stories檐高(m)Height备注Notes 06产业研发中心一期R&DCentrePhase IProject7473.35m2二级Class 2民用CivilPurpose1672.00 m223.85m07 配电房PowerDistribution Room77.76 m2二级Class 2丁类Class D70.00m21 5.90m4、依据业主的要求及产品类型,研发中心按多层民用建筑进行设计,耐火等级二级。

According To The Requirements and Products Types, The Food R&D Centre Is Designed To Be In Compliance With Multi-storey Civil Architecture Specifications, And Fire Resistance Rating Is Class II.5、流线组织Transportation Flow LineXXXXXXX食品有限公司食品研发中心位于现有厂区东北部,总平面规划在流线组织方面对人员流线和货物流线进行了有效分隔,以保障人员安全和提高运行效率。

人员流线由现有厂区南侧的主入口进入,沿着厂区南侧和东侧的道路抵达研发中心人员入口。

相关文档
最新文档