电子信息工程外文翻译-外文文献-英文文献

合集下载

最新外文文献翻译格式范例

最新外文文献翻译格式范例

外文文献翻译格式范例本科毕业设计(外文翻译)外文参考文献译文及原文学院信息工程学院专业信息工程(电子信息工程方向)年级班别 2006级(4)班学号 3206003186学生姓名柯思怡指导教师 ______ 田妮莉 _ __2010年6月目录熟悉微软SQL Server (1)1Section A 引言 (1)2Section B 再谈数据库可伸缩性 (4)3Section C 数据库开发的特点 (7)Get Your Arms around Microsoft SQL Server (9)1Section A Introduction to SQL Server 2005 (9)2Section B Database Scalability Revisited (13)3Section C Features for Database Development (17)熟悉微软SQL Server1 Section A 引言SQL Server 2005 是微软SQL生产线上最值得期待的产品。

在经过了上百万个邮件,成百上千的规范说明,以及数十次修订后。

微软承诺SQL Server 2005 是最新的基于Windows数据库应用的数据库开发平台。

这节的内容将指出SQL Server 2005产品的一些的重要特征。

SQL Server 2005几乎覆盖OLTP及OLAP技术的所又内容。

微软公司的这个旗舰数据库产品几乎能覆盖所有的东西。

这个软件在经过五年多的制作后,成为一个与它任何一个前辈产品都完全不同的产品。

本节将介绍整个产品的大部分功能。

当人们去寻求其想要的一些功能和技术时,可以从中提取出重要的和最感新区的内容,包括SQL Server Engine 的一些蜕变的历史,以及各种各样的SQL Server 2005的版本,可伸缩性,有效性,大型数据库的维护以及商业智能等如下:●数据库引擎增强技术。

SQL Server 2005 对数据库引擎进行了许多改进,并引入了新的功能。

电子信息工程外文翻译 外文文献 英文文献

电子信息工程外文翻译 外文文献 英文文献

电子信息工程电路编程中的AT89C51单片机译文标题电路编程中的AT89C51单片机AT89C51 In-Circuit Programming 原文标题作者Robert W.Sparks等译名国籍美国斯帕克等W.罗伯特Atmel Corporation原文出处摘要本应用说明的是ATMEL公司AT89C51的电路可编程闪存的微控制器。

为在电路可编程AT89C51的应用提出了与应用程序相关的例子,它的修改要求支持在线编程。

这种方法显示在该应用程序中的AT89C51单片机可通过商业电话线远程改编。

本应用笔记中描述的电路,仅支持5伏电压下编程,需要使用一个AT89C51-XX-5。

标准A T89C51的需要12伏电压。

该应用程序的软件可从ATMEL下载。

总论当不在进行程序设计的时候,在电路设计中的AT89C51设计将变得透明化。

在编程期间必须重视EA/VPP这一脚。

在不使用外部程序存储器的应用程序中,这脚可能会永久接到VCC。

应用程序使用的外部程序存储器要求这一脚为低电平才能正常运行。

RST在编程期间必须为高电平。

应该提供一种方法使得电路通入电源以后,使RST代替主要的复位电路起到复位的作用。

在编程过程中,PSEN必须保持低电平,在正常运行期间绝不能使用。

ALE/ PRO在编程过程中输出低电平,在正常运行期间绝不能使用在编程过程中AT89C5I / 端口是用于模式应用程序,地址和数据选择的,可能要该控制器从应用的电路隔离。

如何做到这一点取决于应用程序输入端在编程过程中,控制器必须与应用电路的信号来源隔离。

带有三个输出状态的缓冲区在应用程序之间插入电路和控制器,同时在编程时缓冲区输出三种状态。

一个多路复用器用于信号源之间进行选择,适用于任何一方的应用电路或编程控制器电路的信号输出端如果应用的电路可以允许端口在编程过程中的状态变化,则不需要改变电路。

如果应电路的状态,必须事先在编程过程中的保持不变,可能在控制器和应用电路中插入锁存。

计算机java外文翻译外文文献英文文献

计算机java外文翻译外文文献英文文献

英文原文:Title: Business Applications of Java. Author: Erbschloe, Michael, Business Applications of Java -- Research Starters Business, 2008DataBase: Research Starters - BusinessBusiness Applications of JavaThis article examines the growing use of Java technology in business applications. The history of Java is briefly reviewed along with the impact of open standards on the growth of the World Wide Web. Key components and concepts of the Java programming language are explained including the Java Virtual Machine. Examples of how Java is being used bye-commerce leaders is provided along with an explanation of how Java is used to develop data warehousing, data mining, and industrial automation applications. The concept of metadata modeling and the use of Extendable Markup Language (XML) are also explained.Keywords Application Programming Interfaces (API's); Enterprise JavaBeans (EJB); Extendable Markup Language (XML); HyperText Markup Language (HTML); HyperText Transfer Protocol (HTTP); Java Authentication and Authorization Service (JAAS); Java Cryptography Architecture (JCA); Java Cryptography Extension (JCE); Java Programming Language; Java Virtual Machine (JVM); Java2 Platform, Enterprise Edition (J2EE); Metadata Business Information Systems > Business Applications of JavaOverviewOpen standards have driven the e-business revolution. Networking protocol standards, such as Transmission Control Protocol/Internet Protocol (TCP/IP), HyperText Transfer Protocol (HTTP), and the HyperText Markup Language (HTML) Web standards have enabled universal communication via the Internet and the World Wide Web. As e-business continues to develop, various computing technologies help to drive its evolution.The Java programming language and platform have emerged as major technologies for performing e-business functions. Java programming standards have enabled portability of applications and the reuse of application components across computing platforms. Sun Microsystems' Java Community Process continues to be a strong base for the growth of the Java infrastructure and language standards. This growth of open standards creates new opportunities for designers and developers of applications and services (Smith, 2001).Creation of Java TechnologyJava technology was created as a computer programming tool in a small, secret effort called "the Green Project" at Sun Microsystems in 1991. The Green Team, fully staffed at 13 people and led by James Gosling, locked themselves away in an anonymous office on Sand Hill Road in Menlo Park, cut off from all regular communications with Sun, and worked around the clock for18 months. Their initial conclusion was that at least one significant trend would be the convergence of digitally controlled consumer devices and computers. A device-independent programming language code-named "Oak" was the result.To demonstrate how this new language could power the future of digital devices, the Green Team developed an interactive, handheld home-entertainment device controller targeted at the digital cable television industry. But the idea was too far ahead of its time, and the digital cable television industry wasn't ready for the leap forward that Java technology offered them. As it turns out, the Internet was ready for Java technology, and just in time for its initial public introduction in 1995, the team was able to announce that the Netscape Navigator Internet browser would incorporate Java technology ("Learn about Java," 2007).Applications of JavaJava uses many familiar programming concepts and constructs and allows portability by providing a common interface through an external Java Virtual Machine (JVM). A virtual machine is a self-contained operating environment, created by a software layer that behaves as if it were a separate computer. Benefits of creating virtual machines include better exploitation of powerful computing resources and isolation of applications to prevent cross-corruption and improve security (Matlis, 2006).The JVM allows computing devices with limited processors or memory to handle more advanced applications by calling up software instructions inside the JVM to perform most of the work. This also reduces the size and complexity of Java applications because many of the core functions and processing instructions were built into the JVM. As a result, software developersno longer need to re-create the same application for every operating system. Java also provides security by instructing the application to interact with the virtual machine, which served as a barrier between applications and the core system, effectively protecting systems from malicious code.Among other things, Java is tailor-made for the growing Internet because it makes it easy to develop new, dynamic applications that could make the most of the Internet's power and capabilities. Java is now an open standard, meaning that no single entity controls its development and the tools for writing programs in the language are available to everyone. The power of open standards like Java is the ability to break down barriers and speed up progress.Today, you can find Java technology in networks and devices that range from the Internet and scientific supercomputers to laptops and cell phones, from Wall Street market simulators to home game players and credit cards. There are over 3 million Java developers and now there are several versions of the code. Most large corporations have in-house Java developers. In addition, the majority of key software vendors use Java in their commercial applications (Lazaridis, 2003).ApplicationsJava on the World Wide WebJava has found a place on some of the most popular websites in the world and the uses of Java continues to grow. Java applications not only provide unique user interfaces, they also help to power the backend of websites. Two e-commerce giants that everybody is probably familiar with (eBay and Amazon) have been Java pioneers on the World Wide Web.eBayFounded in 1995, eBay enables e-commerce on a local, national and international basis with an array of Web sites-including the eBay marketplaces, PayPal, Skype, and -that bring together millions of buyers and sellers every day. You can find it on eBay, even if you didn't know it existed. On a typical day, more than 100 million items are listed on eBay in tens of thousands of categories. Recent listings have included a tunnel boring machine from the Chunnel project, a cup of water that once belonged to Elvis, and the Volkswagen that Pope Benedict XVI owned before he moved up to the Popemobile. More than one hundred million items are available at any given time, from the massive to the miniature, the magical to the mundane, on eBay; the world's largest online marketplace.eBay uses Java almost everywhere. To address some security issues, eBay chose Sun Microsystems' Java System Identity Manager as the platform for revamping its identity management system. The task at hand was to provide identity management for more than 12,000 eBay employees and contractors.Now more than a thousand eBay software developers work daily with Java applications. Java's inherent portability allows eBay to move to new hardware to take advantage of new technology, packaging, or pricing, without having to rewrite Java code ("eBay drives explosive growth," 2007).Amazon (a large seller of books, CDs, and other products) has created a Web Service application that enables users to browse their product catalog and place orders. uses a Java application that searches the Amazon catalog for books whose subject matches a user-selected topic. The application displays ten books that match the chosen topic, and shows the author name, book title, list price, Amazon discount price, and the cover icon. The user may optionally view one review per displayed title and make a buying decision (Stearns & Garishakurthi, 2003).Java in Data Warehousing & MiningAlthough many companies currently benefit from data warehousing to support corporate decision making, new business intelligence approaches continue to emerge that can be powered by Java technology. Applications such as data warehousing, data mining, Enterprise Information Portals (EIP's), and Knowledge Management Systems (which can all comprise a businessintelligence application) are able to provide insight into customer retention, purchasing patterns, and even future buying behavior.These applications can not only tell what has happened but why and what may happen given certain business conditions; allowing for "what if" scenarios to be explored. As a result of this information growth, people at all levels inside the enterprise, as well as suppliers, customers, and others in the value chain, are clamoring for subsets of the vast stores of information such as billing, shipping, and inventory information, to help them make business decisions. While collecting and storing vast amounts of data is one thing, utilizing and deploying that data throughout the organization is another.The technical challenges inherent in integrating disparate data formats, platforms, and applications are significant. However, emerging standards such as the Application Programming Interfaces (API's) that comprise the Java platform, as well as Extendable Markup Language (XML) technologies can facilitate the interchange of data and the development of next generation data warehousing and business intelligence applications. While Java technology has been used extensively for client side access and to presentation layer challenges, it is rapidly emerging as a significant tool for developing scaleable server side programs. The Java2 Platform, Enterprise Edition (J2EE) provides the object, transaction, and security support for building such systems.Metadata IssuesOne of the key issues that business intelligence developers must solve is that of incompatible metadata formats. Metadata can be defined as information about data or simply "data about data." In practice, metadata is what most tools, databases, applications, and other information processes use to define, relate, and manipulate data objects within their own environments. It defines the structure and meaning of data objects managed by an application so that the application knows how to process requests or jobs involving those data objects. Developers can use this schema to create views for users. Also, users can browse the schema to better understand the structure and function of the database tables before launching a query.To address the metadata issue, a group of companies (including Unisys, Oracle, IBM, SAS Institute, Hyperion, Inline Software and Sun) have joined to develop the Java Metadata Interface (JMI) API. The JMI API permits the access and manipulation of metadata in Java with standard metadata services. JMI is based on the Meta Object Facility (MOF) specification from the Object Management Group (OMG). The MOF provides a model and a set of interfaces for the creation, storage, access, and interchange of metadata and metamodels (higher-level abstractions of metadata). Metamodel and metadata interchange is done via XML and uses the XML Metadata Interchange (XMI) specification, also from the OMG. JMI leverages Java technology to create an end-to-end data warehousing and business intelligence solutions framework.Enterprise JavaBeansA key tool provided by J2EE is Enterprise JavaBeans (EJB), an architecture for the development of component-based distributed business applications. Applications written using the EJB architecture are scalable, transactional, secure, and multi-user aware. These applications may be written once and then deployed on any server platform that supports J2EE. The EJB architecture makes it easy for developers to write components, since they do not need to understand or deal with complex, system-level details such as thread management, resource pooling, and transaction and security management. This allows for role-based development where component assemblers, platform providers and application assemblers can focus on their area of responsibility further simplifying application development.EJB's in the Travel IndustryA case study from the travel industry helps to illustrate how such applications could function. A travel company amasses a great deal of information about its operations in various applications distributed throughout multiple departments. Flight, hotel, and automobile reservation information is located in a database being accessed by travel agents worldwide. Another application contains information that must be updated with credit and billing historyfrom a financial services company. Data is periodically extracted from the travel reservation system databases to spreadsheets for use in future sales and marketing analysis.Utilizing J2EE, the company could consolidate application development within an EJB container, which can run on a variety of hardware and software platforms allowing existing databases and applications to coexist with newly developed ones. EJBs can be developed to model various data sets important to the travel reservation business including information about customer, hotel, car rental agency, and other attributes.Data Storage & AccessData stored in existing applications can be accessed with specialized connectors. Integration and interoperability of these data sources is further enabled by the metadata repository that contains metamodels of the data contained in the sources, which then can be accessed and interchanged uniformly via the JMI API. These metamodels capture the essential structure and semantics of business components, allowing them to be accessed and queried via the JMI API or to be interchanged via XML. Through all of these processes, the J2EE infrastructure ensures the security and integrity of the data through transaction management and propagation and the underlying security architecture.To consolidate historical information for analysis of sales and marketing trends, a data warehouse is often the best solution. In this example, data can be extracted from the operational systems with a variety of Extract, Transform and Load tools (ETL). The metamodels allow EJBsdesigned for filtering, transformation, and consolidation of data to operate uniformly on datafrom diverse data sources as the bean is able to query the metamodel to identify and extract the pertinent fields. Queries and reports can be run against the data warehouse that contains information from numerous sources in a consistent, enterprise-wide fashion through the use of the JMI API (Mosher & Oh, 2007).Java in Industrial SettingsMany people know Java only as a tool on the World Wide Web that enables sites to perform some of their fancier functions such as interactivity and animation. However, the actual uses for Java are much more widespread. Since Java is an object-oriented language like C++, the time needed for application development is minimal. Java also encourages good software engineering practices with clear separation of interfaces and implementations as well as easy exception handling.In addition, Java's automatic memory management and lack of pointers remove some leading causes of programming errors. Most importantly, application developers do not need to create different versions of the software for different platforms. The advantages available through Java have even found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.Benefits of JavaThe benefits of Java translate across many industries, and some are specific to the control and automation environment. For example, many plant-floor applications use relatively simple equipment; upgrading to PCs would be expensive and undesirable. Java's ability to run on any platform enables the organization to make use of the existing equipment while enhancing the application.IntegrationWith few exceptions, applications running on the factory floor were never intended to exchange information with systems in the executive office, but managers have recently discovered the need for that type of information. Before Java, that often meant bringing together data from systems written on different platforms in different languages at different times. Integration was usually done on a piecemeal basis, resulting in a system that, once it worked, was unique to the two applications it was tying together. Additional integration required developing a brand new system from scratch, raising the cost of integration.Java makes system integration relatively easy. Foxboro Controls Inc., for example, used Java to make its dynamic-performance-monitor software package Internet-ready. This software provides senior executives with strategic information about a plant's operation. The dynamic performance monitor takes data from instruments throughout the plant and performs variousmathematical and statistical calculations on them, resulting in information (usually financial) that a manager can more readily absorb and use.ScalabilityAnother benefit of Java in the industrial environment is its scalability. In a plant, embedded applications such as automated data collection and machine diagnostics provide critical data regarding production-line readiness or operation efficiency. These data form a critical ingredient for applications that examine the health of a production line or run. Users of these devices can take advantage of the benefits of Java without changing or upgrading hardware. For example, operations and maintenance personnel could carry a handheld, wireless, embedded-Java device anywhere in the plant to monitor production status or problems.Even when internal compatibility is not an issue, companies often face difficulties when suppliers with whom they share information have incompatible systems. This becomes more of a problem as supply-chain management takes on a more critical role which requires manufacturers to interact more with offshore suppliers and clients. The greatest efficiency comes when all systems can communicate with each other and share information seamlessly. Since Java is so ubiquitous, it often solves these problems (Paula, 1997).Dynamic Web Page DevelopmentJava has been used by both large and small organizations for a wide variety of applications beyond consumer oriented websites. Sandia, a multiprogram laboratory of the U.S. Department of Energy's National Nuclear Security Administration, has developed a unique Java application. The lab was tasked with developing an enterprise-wide inventory tracking and equipment maintenance system that provides dynamic Web pages. The developers selected Java Studio Enterprise 7 for the project because of its Application Framework technology and Web Graphical User Interface (GUI) components, which allow the system to be indexed by an expandable catalog. The flexibility, scalability, and portability of Java helped to reduce development timeand costs (Garcia, 2004)IssueJava Security for E-Business ApplicationsTo support the expansion of their computing boundaries, businesses have deployed Web application servers (WAS). A WAS differs from a traditional Web server because it provides a more flexible foundation for dynamic transactions and objects, partly through the exploitation of Java technology. Traditional Web servers remain constrained to servicing standard HTTP requests, returning the contents of static HTML pages and images or the output from executed Common Gateway Interface (CGI ) scripts.An administrator can configure a WAS with policies based on security specifications for Java servlets and manage authentication and authorization with Java Authentication andAuthorization Service (JAAS) modules. An authentication and authorization service can bewritten in Java code or interface to an existing authentication or authorization infrastructure. Fora cryptography-based security infrastructure, the security server may exploit the Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE). To present the user with a usable interaction with the WAS environment, the Web server can readily employ a formof "single sign-on" to avoid redundant authentication requests. A single sign-on preserves user authentication across multiple HTTP requests so that the user is not prompted many times for authentication data (i.e., user ID and password).Based on the security policies, JAAS can be employed to handle the authentication process with the identity of the Java client. After successful authentication, the WAS securitycollaborator consults with the security server. The WAS environment authentication requirements can be fairly complex. In a given deployment environment, all applications or solutions may not originate from the same vendor. In addition, these applications may be running on different operating systems. Although Java is often the language of choice for portability between platforms, it needs to marry its security features with those of the containing environment.Authentication & AuthorizationAuthentication and authorization are key elements in any secure information handling system. Since the inception of Java technology, much of the authentication and authorization issues have been with respect to downloadable code running in Web browsers. In many ways, this had been the correct set of issues to address, since the client's system needs to be protected from mobile code obtained from arbitrary sites on the Internet. As Java technology moved from a client-centric Web technology to a server-side scripting and integration technology, it required additional authentication and authorization technologies.The kind of proof required for authentication may depend on the security requirements of a particular computing resource or specific enterprise security policies. To provide such flexibility, the JAAS authentication framework is based on the concept of configurable authenticators. This architecture allows system administrators to configure, or plug in, the appropriate authenticatorsto meet the security requirements of the deployed application. The JAAS architecture also allows applications to remain independent from underlying authentication mechanisms. So, as new authenticators become available or as current authentication services are updated, system administrators can easily replace authenticators without having to modify or recompile existing applications.At the end of a successful authentication, a request is associated with a user in the WAS user registry. After a successful authentication, the WAS consults security policies to determine if the user has the required permissions to complete the requested action on the servlet. This policy canbe enforced using the WAS configuration (declarative security) or by the servlet itself (programmatic security), or a combination of both.The WAS environment pulls together many different technologies to service the enterprise. Because of the heterogeneous nature of the client and server entities, Java technology is a good choice for both administrators and developers. However, to service the diverse security needs of these entities and their tasks, many Java security technologies must be used, not only at a primary level between client and server entities, but also at a secondary level, from served objects. By using a synergistic mix of the various Java security technologies, administrators and developers can make not only their Web application servers secure, but their WAS environments secure as well (Koved, 2001).ConclusionOpen standards have driven the e-business revolution. As e-business continues to develop, various computing technologies help to drive its evolution. The Java programming language and platform have emerged as major technologies for performing e-business functions. Java programming standards have enabled portability of applications and the reuse of application components. Java uses many familiar concepts and constructs and allows portability by providing a common interface through an external Java Virtual Machine (JVM). Today, you can find Java technology in networks and devices that range from the Internet and scientific supercomputers to laptops and cell phones, from Wall Street market simulators to home game players and credit cards.Java has found a place on some of the most popular websites in the world. Java applications not only provide unique user interfaces, they also help to power the backend of websites. While Java technology has been used extensively for client side access and in the presentation layer, it is also emerging as a significant tool for developing scaleable server side programs.Since Java is an object-oriented language like C++, the time needed for application development is minimal. Java also encourages good software engineering practices with clear separation of interfaces and implementations as well as easy exception handling. Java's automatic memory management and lack of pointers remove some leading causes of programming errors. The advantages available through Java have also found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.中文翻译:标题:Java的商业应用。

关于电子信息工程的英语作文

关于电子信息工程的英语作文

关于电子信息工程的英语作文English:Electronic information engineering is a discipline that combines electrical engineering and computer science to develop and design electronic devices and systems for the transmission, storage, processing, and access of information. It involves the study of various electronic components, digital systems, communication networks, and computer hardware and software. Electronic information engineering is an increasingly important field as our society becomes more reliant on technology, with applications ranging from telecommunications and radar systems to consumer electronics and healthcare devices. Graduates in this field are equipped with the necessary skills to work in a variety of industries, such as telecommunications, aerospace, automotive, and healthcare, where they can design, develop, and maintain electronic systems and devices.Translated content:电子信息工程是结合电气工程和计算机科学的学科,用于开发和设计用于信息传输、存储、处理和访问的电子设备和系统。

关于电子信息工程的英语作文

关于电子信息工程的英语作文

关于电子信息工程的英语作文English: Electronic Information Engineering is a branch of engineering that focuses on the study and application of electronic devices and communication systems in various fields. This field combines principles from electrical engineering and computer science to design, build, and maintain electronic systems that process, transmit, and store information. Electronic Information Engineering plays a crucial role in shaping the technologies we use in our daily lives, such as smartphones, computers, telecommunication networks, and more. Professionals in this field work on developing advanced technologies like artificial intelligence, Internet of Things, and 5G networks to improve communication, automation, and data processing efficiency. With the rapid development of technology, Electronic Information Engineering will continue to evolve and pave the way for innovative solutions to various societal challenges.中文翻译: 电子信息工程是一门工程学的分支,专注于研究和应用电子设备和通信系统在各个领域。

自动化专业-外文文献-英文文献-外文翻译-plc方面

自动化专业-外文文献-英文文献-外文翻译-plc方面

1、外文原文(复印件)A: Fundamentals of Single-chip MicrocomputerTh e si ng le-ch i p mi cr oc om pu ter is t he c ul mi nat i on o f bo th t h e d ev el op me nt o f th e d ig it al com p ut er an d t he int e gr at ed ci rc ui ta r gu ab ly th e t ow m os t s i gn if ic ant i nv en ti on s o f t h e 20t h c en tu ry[1].Th es e to w t ype s o f a rc hi te ct ur e a re fo un d i n s i ng le—ch ip m i cr oc om pu te r。

S o me em pl oy th e s p li t p ro gr am/d at a me mo ry of t he H a rv ar d ar ch it ect u re, sh ow n in Fi g.3-5A—1,ot he r s fo ll ow t hep h il os op hy, wi del y a da pt ed f or ge n er al—pu rp os e c o mp ut er s an dm i cr op ro ce ss or s, of ma ki ng no lo gi c al di st in ct io n be tw ee n p ro gr am a n d da ta m em or y a s i n th e Pr in cet o n ar ch it ec tu re,sh ow n in F ig。

3-5A-2.In g en er al te r ms a s in gl e—ch i p mi cr oc om pu ter isc h ar ac te ri zed b y the i nc or po ra tio n of al l t he uni t s o f a co mp ut er i n to a s in gl e de v i ce,as s ho wn i n F ig3—5A—3。

电子信息及自动化 外文翻译 外文文献 英文文献 基于ZigBee无线传感器网络的矿工的位置探测研究

电子信息及自动化 外文翻译 外文文献 英文文献 基于ZigBee无线传感器网络的矿工的位置探测研究

基于ZigBee无线传感器网络的矿工的位置探测研究张秀萍, 韩广杰, 朱昌平, 窦燕, 陶剑锋河海大学计算机与信息工程学院中国常州E-mail:zhangxiup@ Zhucp315@摘要:随着计算机的飞速发展,通信和网络技术,特别是无线传感器和嵌入式技术的应用,使得无线传感器网络(WSNs)技术在产业领域和我们的日常生活得到了广泛关注。

基于ARM7TDMI-S CPU和ZigBee 的WSNs在提速和优化网络移动节点的应用,丰富的信息采集中,以及在通信中实时时间的协调均有可取之处,具有低功耗连续作业特点,因此它是非常适合用于确定矿工在地下的位置。

本文提出和分划WSN的网络计划及信息处理与通信技术,重点专注于实时协作。

通过传感器准确获得矿工的移动信息。

之后的位置信息传送可靠的监控中心。

不断变化的运行测试结果表明没有信息丢失或者没有未被采集到的信息。

因此,这个计划是稳定和有效的,将在煤矿安全中发挥积极作用,在我看来这正是Zigbee 无线传感器网络的正确特点。

关键词:ZigBee的ARM7TDMI-S内核; CC2420的; 无线传感器网络;矿工位置确定一、简介无线传感器网络(WSNs)是规模大,无线自组织网络。

它是整合计算机通信,网络技术,嵌入式MCU和无线传感器技术,具有感知和沟通能力。

【1】节点有低低成本,小尺寸特点。

其中大部分可以工作区域传播,收集数据,并进行处理数据和通信。

无线传感器节点通常工作在无线电频率(RF)频段。

节点构成一个分层架构现场监测数据的网络。

它通常适用在工业,农业,远程医疗和环境监测。

我们都知道,煤炭生产中的威胁复杂的工作条件,如有毒气体,透水,塌陷,顶板等。

【2】一旦发生事故发生时,它会危及矿工的生命。

因此它是地面人员的当务之急,要明确矿工的确切位置,以便为及时采取措施。

因此为矿工成立一个无线传感器网络监控矿井有很大的应用价值。

二、方案优选矿工的位置监测系统主要技术规范要求归纳如下:(1)定位精度为10米。

信息与计算科学中英文对照外文翻译文献

信息与计算科学中英文对照外文翻译文献

中英文对照外文翻译文献(文档含英文原文和中文翻译)【Abstract】Under the network environment the library information resource altogether constructs sharing is refers to all levels of each kind of library basis user to the social information demand, through network use computer, correspondence, electron, multimedia and so on advanced information technology, the high idealization carries on the synthesis cooperation development and the use activity to various collections information resource and the network resources . The market economy swift and violent development, the networking unceasing renewal, the information age arrival, had decided the future library trend of development will be implements the information resource altogether to construct sharing, already achieved the social mutual recognition about this point.This is because:libraries implement the information resource altogether to construct sharing are solve the knowledge information explosion and the collection strength insufficient this contradictory important way..【Key Words】Network; libraries implement: information: construction;work environment the libraryUnder the network environment the library information resource altogether constructs sharing is refers to all levels of each kind of library basis user to the social information demand, through network use computer, correspondence, electron, multimedia and so on advanced information technology, the high idealization carries on the synthesis cooperation development and the use activity to various collections information resource and the network resources.1、 information resource altogether will construct sharing is the future library development and the use information resource way that must be taken.The market economy swift and violent development, the networking unceasing renewal, the information age arrival, had decided the future library trend of development will be implements the information resource altogether to construct sharing, already achieved the social mutual recognition about this point.This is because: 。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
由编程器生成的最小的四位地址是与 DIP 转换的数据在控制器的端口多路复用的 请注意,加在开关上的四个电阻在基本应用中并不是必须的,因为 AT89C51 的端口上提供 一个内部上拉电阻。 在应用程序的正常运作时,控制器端口 0,1 个分别在显示器上提供数据和控制信号。在 编程和程序验证时,编程受端口 0 和端口 2 的一部分控制。程序设计器连接端口 0 和 1,没有 缓冲,因为,在不活动时,它的存在不影响应用程序的正常运作。 透明锁存器被加在了控制器的两个端口之间做输入控制。锁存持有的显示控制信号在编程 过程中不反应,从而消除端口 0 和 2 由于程序控制器的活动造成操作失误。显示数据输入是不 能被孤立的,因为数据应用到输入被忽略时,控制信号无效。 AT89C51 单片机复位电路,输入多路复用器和输出锁存器是由程序控制器生成一个单一的 信号来控制的。在编程过程中,复位键生效,多路开关信号输入,以及冻结显示锁存控制线。 为确保控制线显示在已知的状态前锁定,AT89C51 的外部中断是用来允许程序控制器在复 位之前向应用程序发出信号。应用程序固件响应中断显示一条消息,关闭显示控制线。 编程后,当复位生效,当锁存可视控制器端口输出高电平。由于显示控制输入不为高电平, 直到新的程序写入显示器内部不被打乱。虽然这个应用程序是没有必要的,它可能在某些应用 中必须指出,在编程过程中不会扰乱外围电路的状态。 程序控制器 程序控制器(图 3)生成的地址,数据和控制信号,对嵌入到程序中的 AT89C51 有重要作 用。 程序控制器电路由一个 AT89C51 和一个 RS - 232 电平转换器组成。该控制器运行在 11.0592 兆 HZ,此频率允许串口运行在一个标准波特率下。一个 MAXIM MAX232 线路驱动器/接收器 产生 RS - 232 水平,而只需要 5 伏的电源系统。 程序控制器所产生的信号许多只需直接连接到 AT89C51,无需缓冲。这些信号,在不活动 时,不再是三种状态,但被接高电平。AT89C51 的端口 1,2,3 内部有大约 3000 欧姆的上拉 电阻,因为端口 0 没有内部上拉电阻,所以外部 10 千欧姆的上拉电阻已经加上允许适当的程 序认证模式操作。示例应用程序在这种环境下可正常运行。如果有需要的应用程序兼容性,程 序发出的信号可能在类似 74xx125 三态缓冲缓冲区内缓冲。 AT89C51 的程序不使用外部程序或数据存储器,这需要牺牲所需要的 I / O 引脚。这就要 求程序代码和 I / O 缓冲区保持足够小以适合片上存储器。 商业电话线远程编程 编程器和前面描述的显示应用是与通过调制解调器连接在远程站点电话线相连的。使用链 接调制解调器的个人电脑,用户可以上传包含一个新的消息的程序,这个信息被变成进了嵌入 到应用程序的 AT89C51 中。当编程完成后,应用程序执行新的程序,它显示新信息。 本地配置 测试配置的本地配置包括一台 IBM 个人电脑级的计算机连接到与 Hayes 兼容的,普罗米修 斯 1200 波特的调制解调器。选择此调制解调器,因为它是廉价可得。更快的调制解调器如果 需要的话可使用更快速的调制解调器,尽管一旦该文件的传输时间低于 1 分钟,进一步削减的 传输时间不会进一步降低连接时间费用。更高的传输速度的可能优势是在某些高速调制解调器 内的自动错误检测和纠正。 Procomm Plus 版本 2.01,是一个商业数据通信软件包,用于配置调制解调器,建立通讯设 置参数,并建立与远程调制解调器的链接。 Procomm Plus 包括所谓的宏语言方面,它允许用
电子信息工程 电路编程中的 AT89C51 单片机
译文标题
电路编程中的 AT89C51 单片机
ቤተ መጻሕፍቲ ባይዱ原文标题
AT89C51 In-Circuit Programming
作 者 Robert W.Sparks 等 译 名 罗伯特 W.斯帕克等 国 籍 美国
原文出处 Atmel Corporation
摘要 本应用说明的是 ATMEL 公司 AT89C51 的电路可编程闪存的微控制器。为在电路可编程 AT89C51 的应用提出了与应用程序相关的例子,它的修改要求支持在线编程。这种方法显示 在该应用程序中的 AT89C51 单片机可通过商业电话线远程改编。本应用笔记中描述的电路, 仅支持 5 伏电压下编程,需要使用一个 AT89C51-XX-5。标准 AT89C51 的需要 12 伏电压。该 应用程序的软件可从 ATMEL 下载。 总论 当不在进行程序设计的时候,在电路设计中的 AT89C51 设计将变得透明化。 在编程期间必须重视 EA/VPP 这一脚。在不使用外部程序存储器的应用程序中,这脚可能 会永久接到 VCC。应用程序使用的外部程序存储器要求这一脚为低电平才能正常运行。 RST 在编程期间必须为高电平。应该提供一种方法使得电路通入电源以后,使 RST 代替 主要的复位电路起到复位的作用 。 在编程过程中,PSEN 必须保持低电平,在正常运行期间绝不能使用。 ALE/ PROG 在编程过程中输出低电平,在正常运行期间绝不能使用。 在编程过程中,AT89C51 的 I / O 端口是用于模式应用程序,地址和数据选择的,可能需 要该控制器从应用的电路隔离。如何做到这一点取决于应用程序。 输入端口 在编程过程中,控制器必须与应用电路的信号来源隔离。带有三个输出状态的缓冲区会 在应用程序之间插入电路和控制器,同时在编程时缓冲区输出三种状态。一个多路复用器可 用于信号源之间进行选择,适用于任何一方的应用电路或编程控制器电路的信号。 输出端口 如果应用的电路可以允许端口在编程过程中的状态变化,则不需要改变电路。如果应用 电路的状态,必须事先在编程过程中的保持不变,可能在控制器和应用电路中插入锁存。锁 存在编程期间是可用的,并保存应用程序的电路状态。 应用实例 如图 1 所示应用是该 AT89C51 一个移动的显示情况。此应用程序有在电路重新编程时将 结果以图表的形式显示的简单能力。文本显示被设计作为其硬件的一部分,不能在无改编情 况下变化。 显示的文本可在 4 位 DIP 开关选择两种模式之一中进行。在第一种模式的时候,进入一 个字符从右边显示和快速移动,通过每个元素显示其在最后的装配位置的左侧。在 第二个模式,信息在信息窗口中右到左移动显示。这种模式与常常在股票价格的显示器 所使用的方法类似。 输出包括四个 DL1414T,4 位 17 段的积分解码器和驱动程序的字母数字显示器。这就产 生了 16 名显示元素,每个数字有 0-9 的显示能力,是大写字母,标点符号和一些字符。可显 示字符的 ASCII 码,范围为 20H-5FH。上电复位电路和一个 6 MHz 的晶体振荡器完成应用软 件程序。无论外部程序存储器或外部数据存储器都时可用的。 支持应用程序的修改 图 2 显示了修改内部电路程序的应用。 据推测,编程器在休眠时,既不会驱动,也不会加载应用程序。由于应用程序不使用外部
第1页共5页
程序存储器,EA/VPP 脚接 VCC 电源。复位电路被两种转换器改变状态,此转换器允许编程时 RST 接高电平。在基本应用时未使用的 PSEN 和 ALE/ PROG,是被程序员直接控制的。
编程器的编程需要获得所有数据表中记录的 AT89C51 的 I / O 端口。编程器是与那些应用 程序未使用的控制器的引脚相连的,而这些应用程序的引脚需要最低有效位的四所产生的地址 是可获得的,如下段所述。
相关文档
最新文档