计算机专业与信息管理与信息系统等专业大学外文翻译中英文对照本科学位论文

合集下载

计算机专业毕业设计说明书外文翻译(中英对照)

计算机专业毕业设计说明书外文翻译(中英对照)

Talking about security loopholesRichard S. Kraus reference to the core network security business objective is to protect the sustainability of the system and data security, This two of the main threats come from the worm outbreaks, hacking attacks, denial of service attacks, Trojan horse. Worms, hacker attacks problems and loopholes closely linked to, if there is major security loopholes have emerged, the entire Internet will be faced with a major challenge. While traditional Trojan and little security loopholes, but recently many Trojan are clever use of the IE loophole let you browse the website at unknowingly were on the move.Security loopholes in the definition of a lot, I have here is a popular saying: can be used to stem the "thought" can not do, and are safety-related deficiencies. This shortcoming can be a matter of design, code realization of the problem.Different perspective of security loo phole sIn the classification of a specific procedure is safe from the many loopholes in classification.1. Classification from the user groups:● Public loopholes in the software category. If the loopholes in Windows, IEloophole, and so on.● specialized software loophole. If Oracle loopholes, Apach e, etc. loopholes.2. Data from the perspective include :● could not reasonably be read and read data, including the memory of thedata, documents the data, Users input data, the data in the database, network,data transmission and so on.● designa ted can be written into the designated places (including the localpaper, memory, databases, etc.)● Input data can be implemented (including native implementation,according to Shell code execution, by SQL code execution, etc.)3. From the point of view of the scope of the role are :● Remote loopholes, an attacker could use the network and directly throughthe loopholes in the attack. Such loopholes great harm, an attacker can createa loophole through other people's computers operate. Such loopholes and caneasily lead to worm attacks on Windows.● Local loopholes, the attacker must have the machine premise accesspermissions can be launched to attack the loopholes. Typical of the local authority to upgrade loopholes, loopholes in the Unix system are widespread, allow ordinary users to access the highest administrator privileges.4. Trigger conditions from the point of view can be divided into:● Initiative trigger loopholes, an attacker can take the initiative to use the loopholes in the attack, If direct access to computers.● Passive trigger loopholes must be computer operators can be carried out attacks with the use of the loophole. For example, the attacker made to a mail administrator, with a special jpg image files, if the administrator to open image files will lead to a picture of the software loophole was triggered, thereby system attacks, but if managers do not look at the pictures will not be affected by attacks.5. On an operational perspective can be divided into:● File opera tion type, mainly for the operation of the target file path can be controlled (e.g., parameters, configuration files, environment variables, the symbolic link HEC), this may lead to the following two questions: ◇Content can be written into control, the contents of the documents can be forged. Upgrading or authority to directly alter the important data (such as revising the deposit and lending data), this has many loopholes. If history Oracle TNS LOG document can be designated loopholes, could lead to any person may control the operation of the Oracle computer services;◇information content can be output Print content has been contained to a screen to record readable log files can be generated by the core users reading papers, Such loopholes in the history of the Unix system crontab subsystem seen many times, ordinary users can read the shadow ofprotected documents;● Memory coverage, mainly for memory modules can be specified, writecontent may designate such persons will be able to attack to enforce the code (buffer overflow, format string loopholes, PTrace loopholes, Windows 2000 history of the hardware debugging registers users can write loopholes), or directly alter the memory of secrets data.● logic errors, such wide gaps exist, but very few changes, so it is difficult todiscern, can be broken down as follows : ◇loopholes competitive conditions (usually for the design, typical of Ptrace loopholes, The existence of widespread document timing of competition) ◇wrong tactic, usually in design. If the history of the FreeBSD Smart IO loopholes. ◇Algorithm (usually code or design to achieve), If the history of Microsoft Windows 95/98 sharing password can easily access loopholes. ◇Imperfections of the design, such as TCP / IP protocol of the three-step handshake SYN FLOOD led to a denial of service attack. ◇realize the mistakes (usually no problem for the design, but the presence of coding logic wrong, If history betting system pseudo-random algorithm)● External orders, Typical of external commands can be controlled (via the PATH variable, SHELL importation of special characters, etc.) and SQL injection issues.6. From time series can be divided into:● has long found loopholes: manufacturers already issued a patch or repairmethods many people know already. Such loopholes are usually a lot of people have had to repair macro perspective harm rather small.● recently discovered loophole: manufacturers just made patch or repairmethods, the people still do not know more. Compared to greater danger loopholes, if the worm appeared fool or the use of procedures, so will result in a large number of systems have been attacked.● 0day: not open the loophole in the private transactions. Usually such loopholes to the public will not have any impact, but it will allow an attacker to the targetby aiming precision attacks, harm is very great.Different perspective on the use of the loopholesIf a defect should not be used to stem the "original" can not do what the (safety-related), one would not be called security vulnerability, security loopholes and gaps inevitably closely linked to use.Perspective use of the loopholes is:● Data Perspective: visit had not visited the data, including reading and writing.This is usually an attacker's core purpose, but can cause very serious disaster (such as banking data can be written).● Competence Perspective: Major Powers to bypass or p ermissions. Permissionsare usually in order to obtain the desired data manipulation capabilities.● Usability perspective: access to certain services on the system of controlauthority, this may lead to some important services to stop attacks and lead to a denial of service attack.● Authentication bypass: usually use certification system and the loopholes willnot authorize to access. Authentication is usually bypassed for permissions or direct data access services.● Code execution perspective: mainly procedures for the importation of thecontents as to implement the code, obtain remote system access permissions or local system of higher authority. This angle is SQL injection, memory type games pointer loopholes (buffer overflow, format string, Plastic overflow etc.), the main driving. This angle is usually bypassing the authentication system, permissions, and data preparation for the reading.Loopholes explore methods mustFirst remove security vulnerabilities in software BUG in a subset, all software testing tools have security loopholes to explore practical. Now that the "hackers" used to explore the various loopholes that there are means available to the model are:● fuzz testing (black box testing), by constructing procedures may lead toproblems of structural input data for automatic testing.● FOSS audit (White Box), now have a series of tools that can assist in thedetection of the safety procedures BUG. The most simple is your hands the latest version of the C language compiler.● IDA anti-compilation of the audit (gray box testing), and above the sourceaudit are very similar. The only difference is that many times you can obtain software, but you can not get to the source code audit, But IDA is a very powerful anti-Series platform, let you based on the code (the source code is in fact equivalent) conducted a safety audit.● dynamic tracking, is the record of proceedings under different conditions andthe implementation of all security issues related to the operation (such as file operations), then sequence analysis of these operations if there are problems, it is competitive category loopholes found one of the major ways. Other tracking tainted spread also belongs to this category.● patch, the software manufacturers out of the question usually addressed in thepatch. By comparing the patch before and after the source document (or the anti-coding) to be aware of the specific details of loopholes.More tools with which both relate to a crucial point: Artificial need to find a comprehensive analysis of the flow path coverage. Analysis methods varied analysis and design documents, source code analysis, analysis of the anti-code compilation, dynamic debugging procedures.Grading loopholesloopholes in the inspection harm should close the loopholes and the use of the hazards related Often people are not aware of all the Buffer Overflow Vulnerability loopholes are high-risk. A long-distance loophole example and better delineation:●R emote access can be an OS, application procedures, version information.●open unnecessary or dangerous in the service, remote access to sensitiveinformation systems.● Remote can be restricted for the documents, data reading.●remotely important or res tricted documents, data reading.● may be limited for long-range document, data revisions.● Remote can be restricted for important documents, data changes.● Remote can be conducted without limitation in the important documents, datachanges, or for general service denial of service attacks.● Remotely as a normal user or executing orders for system and network-leveldenial of service attacks.● may be remote management of user identities to the enforcement of the order(limited, it is not easy to use).● can be remote management of user identities to the enforcement of the order(not restricted, accessible).Almost all local loopholes lead to code execution, classified above the 10 points system for:●initiative remote trigger code execution (such a s IE loophole).● passive trigger remote code execution (such as Word gaps / charting softwareloopholes).DEMOa firewall segregation (peacekeeping operation only allows the Department of visits) networks were operating a Unix server; operating systems only root users and users may oracle landing operating system running Apache (nobody authority), Oracle (oracle user rights) services.An attacker's purpose is to amend the Oracle database table billing data. Its possible attacks steps:● 1. Access pea cekeeping operation of the network. Access to a peacekeepingoperation of the IP address in order to visit through the firewall to protect the UNIX server.● 2. Apache services using a Remote Buffer Overflow Vulnerability direct accessto a nobody's competence hell visit.● 3. Using a certain operating system suid procedure of the loophole to upgradetheir competence to root privileges.● 4. Oracle sysdba landing into the database (local landing without a password).● 5. Revised target table data.Over five down for process analysis:●Step 1: Authentication bypass●Step 2: Remote loopholes code execution (native), Authentication bypassing ● Step 3: permissions, authentication bypass● Step 4: Authentication bypass● Step 5: write data安全漏洞杂谈Richard S. Kraus 网络安全的核心目标是保障业务系统的可持续性和数据的安全性,而这两点的主要威胁来自于蠕虫的暴发、黑客的攻击、拒绝服务攻击、木马。

信息管理与信息系统专业管理信息系统大学毕业论文英文文献翻译及原文

信息管理与信息系统专业管理信息系统大学毕业论文英文文献翻译及原文

毕业设计(论文)外文文献翻译文献、资料中文题目:管理信息系统文献、资料英文题目:Management Information System文献、资料来源:文献、资料发表(出版)日期:院(部):专业:信息管理与信息系统班级:姓名:学号:指导教师:翻译日期:外文资料及中文译文外文资料Management Information SystemBy Russ Basiura, Mike BatongbacalIt is the MIS(Management Information System ) that we constantly say that the management information system , and is living to emphasize the administration , and emphasizes that it changes into more and more significantly and more and more is uni versalized in the contemporary community of message . MIS is a fresh branch of learn ing, and it leaped over several territories, and for instance administers scientific knowl edge, system science, operational research, statistic along with calculating machine sc ientific knowledge. Is living on these the branches of learning base, and takes shape th at the message is gathered and the process means, thereby take shape the system that t he crossbar mingles.1. The Management Information System Summary20 centuries, in the wake of the flourishing development of whole world econom y, numerous economists propose the fresh administration theory one by one. Xi Men p ropose the administration and was dependent on idea to message and decision of strat egic importance in the 50’s 20 centuries. The dimension of simultaneous stage is admi tted issuing cybernetics, and he thinks that the administration is a control procedure. I n 1958, Ger. write the lid: “ the administration shall obtain without delay with the low er cost and exact message, completes the better control “. This particular period, the c alculating machine starts being used accountancy work. The data handling term has ri sen.In 1970, Walter T.Kennevan give administration that has raised the only a short while ago information system term to get off a definition: “ either the cover of the boo k shape with the discount, is living appropriately time to director, staff member along with the outside world personnel staff supplies the past and now and message that inte rnal forecasting the approaching relevant business reaches such environment, in order to assist they make a strategic decision”. Is living in this definition to emphasize, yet d oes not emphasize using the pattern, and mention the calculating machine applicationin the way of the message support decision of strategic importance.In 1985, admonishing information system originator, title Buddhist nun Su Da un iversity administration professor Gordon B.Davis give the management information s ystem relatively integrated definition, in immediate future “ administer the informatio n system is one use calculating machine software and hardware resources along with data bank man - the engine system.It be able to supply message support business either organization operation, admi nistration or the decision making function. Comprehensive directions of this definitio nmanagement information system target and meritorious service capacity and com ponent, but also make known the management information system to be living the lev el that attains at that time.1.1 The Developing History of MISThe management information system is living the most primarily phase is counti ng the system, the substance which researched is the regular pattern on face between t he incremental data, it what may separate into the data being mutually related and mor e not being mutually related series, afterwards act as the data conversion to message.The second stage is the data are replaced the system, and it is that the SABRE th at the American airline company put up to in the 50’s 20 centuries subscribes to book t he bank note system that such type stands for. It possess 1008 bank note booking spot s, and may access 600000 traveler keep the minutes and 27000 flight segments record. Its operation is comparatively more complex, and is living whatever one “spot”wholl y to check whether to be the free place up some one flight numbers. Yet through appro ximately attending school up to say, it is only a data and replaces the system, for insta nce it can not let know you with the bank note the selling velocity now when the bank note shall be sell through, thereby takes remedying the step. As a result it also is admi nister information system rudimentary phase.The third phase is the status reports system, and it may separate into manufacture state speech and service state and make known and research the systems such as statu s reports and so on. Its type stands for the production control system that is the IBM c orporation to the for instance manufacture state speech system. As is known to all, the calculating machine corporation that the IBM corporation is the largest on the world, in 1964 it given birth to middle-sized calculating machine IBM360 and causes the cal culating machine level lift a step, yet form that the manufacture administration work.Yet enormously complicatedly dissolve moreover, the calculating machine overtakes 15000 difference components once more, in addition the plant of IBM extends all ove r the American various places to every one components once more like works an elem ent, and the order of difference possess difference components and the difference ele ment, and have to point out that what element what plant what installation gives birth to, hence not merely giving birth to complexly, fitting, installation and transportation wholly fully complex. Have to there be a manufacture status reports system that takes the calculating machine in order to guarantee being underway successfully of manufa cture along with else segment as the base. Hence the same ages IBM establish the syst ematic AAS of well-developed administration it be able to carry on 450 professional work operations. In 1968, the corporation establishes the communalonce more and manufactures informationsystem CMIS and runs and succeeds very much, the past needs 15 weeks work, t hat system merely may be completed in the way of 3 weeks.It is the data handling system that the status reports system still possess one kind of shape , and that it is used for handles the everyday professional work to make know n with manufacture , and stress rests with by the handwork task automation , and lifts the effectiveness with saves the labor power . The data handling system ordinarily ca n not supply decision of strategic importance message.Last phase is the support systems make a strategic decision, and it is the informat ion system being used for supplementary making a strategic decision. That system ma y program and the analysis scheme, and goes over key and the error solve a problem. I ts proper better person-machine dialogue means, may with not particularly the person nel staff who have an intimate knowledge of the calculating machine hold conversatio n. It ordinarily consists of some pattern so as to come into being decision of strategic i mportance message, yet emphasize comprehensive administration meritorious service capacity.1.2 The Application of Management Information SystemThe management information system is used to the most base work, like dump re port form, calculation pay and occurrences in human tubes and so on, and then develo ping up business financial affairs administrations and inventory control and so on indi vidual event operational control , this pertains to the electron data handling ( EDP Dat a Processing ) system . When establish the business data bank, thereby possess the cal culating machine electric network to attain data sharing queen , the slave system conc ept is start off , when the implementation the situation as a whole is made program and the design information system ,attained the administration information system phase . In the wake of calculating machine technique progress and the demand adjust the sy stem of people lift further, people emphasize more furthermore administer the informa tion system phase. Progress and people in the wake of the calculating machine techniq ue lift at the demand adjust the system further, people emphasize more furthermore to administer the information system whether back business higher level to lead makes a strategic decision this meritorious service capacity, still more lay special emphasis on the gathering to the external message of business and integrated data storehouse, mod el library , means storehouse and else artificial intelligence means whether directly to decision of strategic importance person , this is the support system ( DDS ) mission m aking a strategic decision.There is the part application that few business start MIS inner place the limit of t he world at the early days of being living in the 70’s 20 centuries. Up at the moment, MIS is living, and there be the appropriatePopularization rate in every state nation in world, and nearly covered that every p rofession reaches every department.1.3 The Direction of MIS DevelopmentClose 20 curtains; external grand duke takes charge of having arisen3 kinds of alt ernations:A. Paying special attention to the administration being emphasized toestablishing MIS’s system, and causing the administration technique head for the ageing.B. The message is the decision of strategic importance foundation, and MISsupplies the message service in the interest of director at all times.C. Director causes such management program getting in touch with togetherwith the concrete professional work maneuver by means of MIS. not merely big-and-middle-sized business universally establish MIS some small-size business also no t exceptions of self, universally establish the communal data4network, like the electronic mail and electron data exchange and so on, MIS supp lied the well support environment to the application of Intranet’s technique to speedily developing of INTERNET especially in the past few years in the interest of the busin ess.Through international technique development tendency is see, in the 90’s 20 c enturies had arisen some kinds of brand-new administration technique. 1. Business Processes Rebuild (BPR)A business should value correctly time and produce quality, manufacturing cost a nd technical service and so on several section administrations, grip at the moment org anization and the process compose once more,andcompletes that meritorious service c apacity integrationist, operation processization and organization form fluctuation. Sha ll act as the service veer of middle layer management personnel staff the decision of st rategic importance of the director service? 2. Intelligentization Decision Support Syst em (IDSS)The intelligentization decision of strategic importance support system was suffici ently consider demand and the work distinguishing feature of business higher level pe rsonnel staff.3. Lean Production (LP)Application give birth to on time, comprehensive quality control and parallel proj ect that picked amount is given birth to and so on the technique, the utmost product de signcutting down and production cycle, raise produce quality and cuts down the repr oduced goods to reserve, and is living in the manufacture promote corps essence, in or der to meet the demand that client continuously changes. 4. Agile Manufacture (AM)One kind of business administration pattern that possess the vision, such distingu ishing feature is workers and staff members’ quality is high, and the organization simp lifies and the multi-purpose group effectiveness GAO message loading is agile and a nswers client requires swiftly.2. The Effect To The Business Administration of MIS DevelopmentThe effect to the business administration of the management information system development is administered the change to business and business administration of inf ormation system development and come into being and is coming into being the far-re aching effect with.Decision of strategic importance, particularly strategic decision-making may be a ssisted by the administration information system, and its good or bad directly affects li ving and the development up the business. The MIS is impeding the orientation devel opment that the administration means one another unites through quality and ration. T his express to utilize the administration in the calculation with the different mathemati cal model the problem in the quantitative analysis business.The past administer that the problem is difficult to test, but MIS may unite the administration necessaries, and supply the sufficient data, and simulates to produce the t erm in the interest of the administration.In the wake of the development of MIS, much business sit up the decentralized message concentration to establish the information system ministry of directly under d irector, and the chief of information system ministry is ordinarily in the interest of assi stant manager’s grade. After the authority of business is centralized up high-quality ad ministration personnel staff’s hand, as if causing much sections office work decrease, hence someone prophesy, middle layer management shall vanish. In reality, the reappe arance phase employed layer management among the information system queen not m erely not to decrease, on the contrary there being the increase a bit.This is for, although the middle layer management personnel staff getting off exo nerate out through loaded down with trivial details daily routine, yet needs them to an alyses researching work in the way of even more energy, lift further admonishing the decision of strategic importance level. In the wake of the development of MIS, the bus iness continuously adds to the demand of high technique a talented person, but the sca rce thing of capability shall be washed out gradually. This compels people by means o f study and cultivating, and continuously lifts individual’s quality. InThe wake of the news dispatch and electric network and file transmission system development, business staff member is on duty in many being living incomparably eit her the home. Having caused that corporation save the expenses enormously, the work efficiency obviously moves upward American Rank Zeros corporation the office syst em on the net, in the interest of the creativity of raise office personnel staff was produ ced the advantageous term.At the moment many countries are fermenting one kind of more well-developed manufacturing industry strategy, and become quickly manufacturing the business. It c ompletely on the basis of the user requirement organization design together with man ufacture, may carry on the large-scale cooperation in the interest of identical produce by means of the business that the flow was shifted the distinct districts, and by means of the once more programming to the machinery with to the resources and the reorgan ization of personnel staff , constituted a fresh affrication system, and causes that manu facturing cost together with lot nearly have nothing to do with. Quickly manufacturin g the business establishes a whole completely new strategy dependence relation again st consumer, and is able to arouse the structure of production once more revolution.The management information system is towards the self-adoption and Self-learni ng orientation development, the decision procedure of imitation man who is be able tobe better. Some entrepreneurs of the west vainly hope that consummate MIS is encirc les the magic drug to govern the business all kinds of diseases; Yet also someone says, and what it is too many is dependent on the defeat that MIS be able to cause on the ad ministration. It is adaptable each other to comprehend the effect to the business of MI S, and is favor of us to be living in development and the research work, and causes the business organization and administer the better development against MIS of system a nd administration means , and establish more valid MIS.中文翻译巴兹拉·迈克管理信息系统管理信息系统就是我们常说的MIS(Management Information System), 在强调管理,强调信息的现代社会中它变得越来越重要、越来越普及。

计算机专业毕业论文外文翻译

计算机专业毕业论文外文翻译

附录(英文翻译)Rich Client Tutorial Part 1The Rich Client Platform (RCP) is an exciting new way to build Java applications that can compete with native applications on any platform. This tutorial is designed to get you started building RCP applications quickly. It has been updated for Eclipse 3.1.2By Ed Burnette, SASJuly 28, 2004Updated for 3.1.2: February 6, 2006IntroductionTry this experiment: Show Eclipse to some friends or co-workers who haven't seen it before and ask them to guess what language it is written in. Chances are, they'll guess VB, C++, or C#, because those languages are used most often for high quality client side applications. Then watch the look on their faces when you tell them it was created in Java, especially if they are Java programmers.Because of its unique open source license, you can use the technologies that went into Eclipse to create your own commercial quality programs. Before version 3.0, this was possible but difficult, especially when you wanted to heavily customize the menus, layouts, and other user interface elements. That was because the "IDE-ness" of Eclipse was hard-wired into it. Version 3.0 introduced the Rich Client Platform (RCP), which is basically a refactoring of the fundamental parts of Eclipse's UI, allowing it to be used for non-IDE applications. Version 3.1 updated RCP with new capabilities, and, most importantly, new tooling support to make it easier to create than before.If you want to cut to the chase and look at the code for this part you can find it in the accompanying zip file. Otherwise, let's take a look at how to construct an RCP application.Getting startedRCP applications are based on the familiar Eclipse plug-in architecture, (if it's not familiar to you, see the references section). Therefore, you'll need to create a plug-in to be your main program. Eclipse's Plug-in Development Environment (PDE) provides a number of wizards and editors that take some of the drudgery out of the process. PDE is included with the Eclipse SDK download so that is the package you should be using. Here are the steps you should follow to get started.First, bring up Eclipse and select File > New > Project, then expand Plug-in Development and double-click Plug-in Project to bring up the Plug-in Project wizard. On the subsequent pages, enter a Project name such as org.eclipse.ui.tutorials.rcp.part1, indicate you want a Java project, select the version of Eclipse you're targeting (at least 3.1), and enable the option to Create an OSGi bundle manifest. Then click Next >.Beginning in Eclipse 3.1 you will get best results by using the OSGi bundle manifest. In contrast to previous versions, this is now the default.In the next page of the Wizard you can change the Plug-in ID and other parameters. Of particular importance is the question, "Would you like to create a rich client application?". Select Yes. The generated plug-in class is optional but for this example just leave all the other options at their default values. Click Next > to continue.If you get a dialog asking if Eclipse can switch to the Plug-in Development Perspective click Remember my decision and select Yes (this is optional).Starting with Eclipse 3.1, several templates have been provided to make creating an RCP application a breeze. We'll use the simplest one available and see how it works. Make sure the option to Create a plug-in using one of the templates is enabled, then select the Hello RCP template. This isRCP's equivalent of "Hello, world". Click Finish to accept all the defaults and generate the project (see Figure 1). Eclipse will open the Plug-in Manifest Editor. The Plug-in Manifest editor puts a friendly face on the various configuration files that control your RCP application.Figure 1. The Hello World RCP project was created by a PDE wizard.Taking it for a spinTrying out RCP applications used to be somewhat tedious. You had to create a custom launch configuration, enter the right application name, and tweak the plug-ins that were included. Thankfully the PDE keeps track of all this now. All you have to do is click on the Launch an Eclipse Application button in the Plug-in Manifest editor's Overview page. You should see a bare-bones Workbench start up (see Figure 2).Figure 2. By using thetemplates you can be up andrunning anRCPapplication inminutes.Making it aproductIn Eclipse terms a product is everything that goes with your application, including all the other plug-ins it depends on, a command to run the application (called the native launcher), and any branding (icons, etc.) that make your application distinctive. Although as we've just seen you can run a RCP application without defining a product, having one makes it a whole lot easier to run the application outside of Eclipse. This is one of the major innovations that Eclipse 3.1 brought to RCP development.Some of the more complicated RCP templates already come with a product defined, but the Hello RCP template does not so we'll have to make one.In order to create a product, the easiest way is to add a product configuration file to the project. Right click on the plug-in project and select New > Product Configuration. Then enter a file name for this new configuration file, such as part1.product. Leave the other options at their default values. Then click Finish. The Product Configuration editor will open. This editor lets you control exactly what makes up your product including all its plug-ins and branding elements.In the Overview page, select the New... button to create a new product extension. Type in or browse to the defining plug-in(org.eclipse.ui.tutorials.rcp.part1). Enter a Product ID such as product, and for the Product Application selectorg.eclipse.ui.tutorials.rcp.part1.application. Click Finish to define the product. Back in the Overview page, type in a new Product Name, for example RCP Tutorial 1.In Eclipse 3.1.0 if you create the product before filling inthe Product Name you may see an error appear in the Problems view. The error will go away when you Synchronize (see below). This is a known bug that is fixed in newer versions. Always use the latest available maintenance release for the version of Eclipse you're targeting!Now select the Configuration tab and click Add.... Select the plug-in you just created (org.eclipse.ui.tutorials.rcp.part1) and then click on Add Required Plug-ins. Then go back to the Overview page and press Ctrl+S or File > Save to save your work.If your application needs to reference plug-ins that cannot be determined until run time (for example the tomcat plug-in), then add them manually in the Configuration tab.At this point you should test out the product to make sure it runs correctly. In the Testing section of the Overview page, click on Synchronize then click on Launch the product. If all goes well, the application should start up just like before.Plug-ins vs. featuresOn the Overview page you may have noticed an option that says the product configuration is based on either plug-ins or features. The simplest kind of configuration is one based on plug-ins, so that's what this tutorial uses. If your product needs automatic update or Java Web Start support, then eventually you should convert it to use features. But take my advice and get it working without them first.Running it outside of EclipseThe whole point of all this is to be able to deploy and run stand-alone applications without the user having to know anything about the Java and Eclipse code being used under the covers. For a real application you may want to provide a self-contained executable generated by an install program like InstallShield or NSIS. That's really beyond the scope of this article though, so we'll do something simpler.The Eclipse plug-in loader expects things to be in a certain layout so we'll need to create a simplified version of the Eclipse install directory. This directory has to contain the native launcher program, config files,and all the plug-ins required by the product. Thankfully, we've given the PDE enough information that it can put all this together for us now.In the Exporting section of the Product Configuration editor, click the link to Use the Eclipse Product export wizard. Set the root directory to something like RcpTutorial1. Then select the option to deploy into a Directory, and enter a directory path to a temporary (scratch) area such as C:\Deploy. Check the option to Include source code if you're building an open source project. Press Finish to build and export the program.The compiler options for source and class compatibility in the Eclipse Product export wizard will override any options you have specified on your project or global preferences. As part of the Export process, the plug-in is code is recompiled by an Ant script using these options.The application is now ready to run outside Eclipse. When you're done you should have a structure that looks like this in your deployment directory:RcpTutorial1| .eclipseproduct| eclipse.exe| startup.jar+--- configuration| config.ini+--- pluginsmands_3.1.0.jarorg.eclipse.core.expressions_3.1.0.jarorg.eclipse.core.runtime_3.1.2.jarorg.eclipse.help_3.1.0.jarorg.eclipse.jface_3.1.1.jarorg.eclipse.osgi_3.1.2.jarorg.eclipse.swt.win32.win32.x86_3.1.2.jarorg.eclipse.swt_3.1.0.jarorg.eclipse.ui.tutorials.rcp.part1_1.0.0.jarorg.eclipse.ui.workbench_3.1.2.jarorg.eclipse.ui_3.1.2.jarNote that all the plug-ins are deployed as jar files. This is the recommended format starting in Eclipse 3.1. Among other things this saves disk space in the deployed application.Previous versions of this tutorial recommended using a batch file or shell script to invoke your RCP program. It turns out this is a bad idea because you will not be able to fully brand your application later on. For example, you won't be able to add a splash screen. Besides, theexport wizard does not support the batch file approach so just stick with the native launcher.Give it a try! Execute the native launcher (eclipse or eclipse.exe by default) outside Eclipse and watch the application come up. The name of the launcher is controlled by branding options in the product configuration.TroubleshootingError: Launching failed because the org.eclipse.osgi plug-in is not included...You can get this error when testing the product if you've forgotten to list the plug-ins that make up the product. In the Product Configuration editor, select the Configuration tab, and add all your plug-ins plus all the ones they require as instructed above.Compatibility and migrationIf you are migrating a plug-in from version 2.1 to version 3.1 there are number of issues covered in the on-line documentation that you need to be aware of. If you're making the smaller step from 3.0 to 3.1, the number of differences is much smaller. See the References section for more information.One word of advice: be careful not to duplicate any information in both plug-in.xml and MANIFEST.MF. Typically this would not occur unless you are converting an older plug-in that did not use MANIFEST.MF into one that does, and even then only if you are editing the files by hand instead of going through the PDE.ConclusionIn part 1 of this tutorial, we looked at what is necessary to create a bare-bones Rich Client application. The next part will delve into the classes created by the wizards such as the WorkbenchAdvisor class. All the sample code for this part may be found in the accompanying zip file.ReferencesRCP Tutorial Part 2RCP Tutorial Part 3Eclipse Rich Client PlatformRCP Browser example (project org.eclipse.ui.examples.rcp.browser)PDE Does Plug-insHow to Internationalize your Eclipse Plug-inNotes on the Eclipse Plug-in ArchitecturePlug-in Migration Guide: Migrating to 3.1 from 3.0Plug-in Migration Guide: Migrating to 3.0 from 2.1译文:Rich Client教程第一部分The Rich Client Platform (RCP)是一种创建Java应用程序的令人兴奋的新方法,可以和任何平台下的自带应用程序进行竞争。

计算机专业毕业外文翻译原文+封面+中文翻译

计算机专业毕业外文翻译原文+封面+中文翻译

本科毕业论文外文翻译外文译文题目(中文):具体数学:汉诺塔问题学院: 计算机科学与技术专业: 计算机科学与技术学号:学生姓名:指导教师:日期: 二○一二年六月1 Recurrent ProblemsTHIS CHAPTER EXPLORES three sample problems that give a feel for what’s to c ome. They have two traits in common: They’ve all been investigated repeatedly by mathe maticians; and their solutions all use the idea of recurrence, in which the solution to eac h problem depends on the solutions to smaller instances of the same problem.1.1 THE TOWER OF HANOILet’s look first at a neat little puzzle called the Tower of Hanoi,invented by the Fr ench mathematician Edouard Lucas in 1883. We are given a tower of eight disks, initiall y stacked in decreasing size on one of three pegs:The objective is to transfer the entire tower to one of the other pegs, movingonly one disk at a time and never moving a larger one onto a smaller.Lucas furnished his toy with a romantic legend about a much larger Tower of Brah ma, which supposedly has 64 disks of pure gold resting on three diamond needles. At th e beginning of time, he said, God placed these golden disks on the first needle and orda ined that a group of priests should transfer them to the third, according to the rules abov e. The priests reportedly work day and night at their task. When they finish, the Tower will crumble and the world will end.It's not immediately obvious that the puzzle has a solution, but a little thought (or h aving seen the problem before) convinces us that it does. Now the question arises:What' s the best we can do?That is,how many moves are necessary and suff i cient to perfor m the task?The best way to tackle a question like this is to generalize it a bit. The Tower of Brahma has 64 disks and the Tower of Hanoi has 8;let's consider what happens if ther e are TL disks.One advantage of this generalization is that we can scale the problem down even m ore. In fact, we'll see repeatedly in this book that it's advantageous to LOOK AT SMAL L CASES first. It's easy to see how to transfer a tower that contains only one or two di sks. And a small amount of experimentation shows how to transfer a tower of three.The next step in solving the problem is to introduce appropriate notation:NAME ANO CONQUER. Let's say that T n is the minimum number of moves that will t ransfer n disks from one peg to another under Lucas's rules. Then T1is obviously 1 , an d T2= 3.We can also get another piece of data for free, by considering the smallest case of all:Clearly T0= 0,because no moves at all are needed to transfer a tower of n = 0 disks! Smart mathematicians are not ashamed to think small,because general patterns are easier to perceive when the extreme cases are well understood(even when they are trivial).But now let's change our perspective and try to think big;how can we transfer a la rge tower? Experiments with three disks show that the winning idea is to transfer the top two disks to the middle peg, then move the third, then bring the other two onto it. Thi s gives us a clue for transferring n disks in general:We first transfer the n−1 smallest t o a different peg (requiring T n-1moves), then move the largest (requiring one move), and finally transfer the n−1 smallest back onto the largest (req uiring another T n-1moves). Th us we can transfer n disks (for n > 0)in at most 2T n-1+1 moves:T n≤2T n—1+1,for n > 0.This formula uses '≤' instead of '=' because our construction proves only that 2T n—1+1 mo ves suffice; we haven't shown that 2T n—1+1 moves are necessary. A clever person might be able to think of a shortcut.But is there a better way? Actually no. At some point we must move the largest d isk. When we do, the n−1 smallest must be on a single peg, and it has taken at least T moves to put them there. We might move the largest disk more than once, if we're n n−1ot too alert. But after moving the largest disk for the last time, we must trans fr the n−1 smallest disks (which must again be on a single peg)back onto the largest;this too re quires T n−1moves. HenceT n≥ 2T n—1+1,for n > 0.These two inequalities, together with the trivial solution for n = 0, yieldT0=0;T n=2T n—1+1 , for n > 0. (1.1)(Notice that these formulas are consistent with the known values T1= 1 and T2= 3. Our experience with small cases has not only helped us to discover a general formula, it has also provided a convenient way to check that we haven't made a foolish error. Such che cks will be especially valuable when we get into more complicated maneuvers in later ch apters.)A set of equalities like (1.1) is called a recurrence (a. k. a. recurrence relation or r ecursion relation). It gives a boundary value and an equation for the general value in ter ms of earlier ones. Sometimes we refer to the general equation alone as a recurrence, alt hough technically it needs a boundary value to be complete.The recurrence allows us to compute T n for any n we like. But nobody really like to co m pute fro m a recurrence,when n is large;it takes too long. The recurrence only gives indirect, "local" information. A solution to the recurrence would make us much h appier. That is, we'd like a nice, neat, "closed form" for Tn that lets us compute it quic kly,even for large n. With a closed form, we can understand what T n really is.So how do we solve a recurrence? One way is to guess the correct solution,then to prove that our guess is correct. And our best hope for guessing the solution is t o look (again) at small cases. So we compute, successively,T3= 2×3+1= 7; T4= 2×7+1= 15; T5= 2×15+1= 31; T6= 2×31+1= 63.Aha! It certainly looks as ifTn = 2n−1,for n≥0. (1.2)At least this works for n≤6.Mathematical induction is a general way to prove that some statement aboutthe integer n is true for all n≥n0. First we prove the statement when n has its smallest v alue,no; this is called the basis. Then we prove the statement for n > n0,assuming that it has already been proved for all values between n0and n−1, inclusive; this is called th e induction. Such a proof gives infinitely many results with only a finite amount of wo rk.Recurrences are ideally set up for mathematical induction. In our case, for exampl e,(1.2) follows easily from (1.1):The basis is trivial,since T0 = 20−1= 0.And the indu ction follows for n > 0 if we assume that (1.2) holds when n is replaced by n−1:T n= 2T n+1= 2(2n−1−1)+1=2n−1.Hence (1.2) holds for n as well. Good! Our quest for T n has ended successfully.Of course the priests' task hasn't ended;they're still dutifully moving disks,and wil l be for a while, because for n = 64 there are 264−1 moves (about 18 quintillion). Even at the impossible rate of one move per microsecond, they will need more than 5000 cent uries to transfer the Tower of Brahma. Lucas's original puzzle is a bit more practical, It requires 28−1 = 255 moves, which takes about four minutes for the quick of hand.The Tower of Hanoi recurrence is typical of many that arise in applications of all kinds. In finding a closed-form expression for some quantity of interest like T n we go t hrough three stages:1 Look at small cases. This gives us insight into the problem and helps us in stages2 and 3.2 Find and prove a mathematical expression for the quantity of interest.For the Tower of Hanoi, this is the recurrence (1.1) that allows us, given the inc lination,to compute T n for any n.3 Find and prove a closed form for our mathematical expression.For the Tower of Hanoi, this is the recurrence solution (1.2).The third stage is the one we will concentrate on throughout this book. In fact, we'll fre quently skip stages I and 2 entirely, because a mathematical expression will be given tous as a starting point. But even then, we'll be getting into subproblems whose solutions will take us through all three stages.Our analysis of the Tower of Hanoi led to the correct answer, but it r equired an“i nductive leap”;we relied on a lucky guess about the answer. One of the main objectives of this book is to explain how a person can solve recurrences without being clairvoyant. For example, we'll see that recurrence (1.1) can be simplified by adding 1 to both sides of the equations:T0+ 1= 1;T n + 1= 2T n-1+ 2, for n >0.Now if we let U n= T n+1,we haveU0 =1;U n= 2U n-1,for n > 0. (1.3)It doesn't take genius to discover that the solution to this recurrence is just U n= 2n;he nce T n= 2n −1. Even a computer could discover this.Concrete MathematicsR. L. Graham, D. E. Knuth, O. Patashnik《Concrete Mathematics》,1.1 ,The Tower Of HanoiR. L. Graham, D. E. Knuth, O. PatashnikSixth printing, Printed in the United States of America1989 by Addison-Wesley Publishing Company,Reference 1-4 pages具体数学R.L.格雷厄姆,D.E.克努特,O.帕塔希尼克《具体数学》,1.1,汉诺塔R.L.格雷厄姆,D.E.克努特,O.帕塔希尼克第一版第六次印刷于美国,韦斯利出版公司,1989年,引用1-4页1 递归问题本章将通过对三个样本问题的分析来探讨递归的思想。

信息管理与信息系统专业英语作文

信息管理与信息系统专业英语作文

信息管理与信息系统专业英语作文Here's a sample English essay for the Information Management and Information Systems (IMIS) major that meets the given requirements:When it comes to Information Management and Information Systems, things get exciting! It's not just about computers and software, it's about making sense of the vast amount of data we have today. You know, with all this digitalization, we're generating more and more data every day. So, how dowe make use of it? That's where IMIS comes in.In this field, we learn how to organize and analyzedata to extract meaningful insights. It's like having a superpower to see through the chaos and find patterns. Whether it's in business, healthcare, or any other industry, IMIS has its applications. And it's not just about technology; it's about understanding how humans interactwith information and how we can optimize that interaction.One of the coolest things about IMIS is that it'salways evolving. With new technologies coming out every day, we're constantly learning and adapting. It's a field that demands creativity and critical thinking. You have to be able to think outside the box and find innovative solutions to complex problems.And let's not forget about the practical side of it. As an IMIS student, you'll get to work on real-world projects and apply what you learn in the classroom. Whether it's developing a new database system or analyzing customer data to improve a product, you.。

信息管理与信息系统专业英语作文

信息管理与信息系统专业英语作文

信息管理与信息系统专业英语作文英文回答:Information management and information systems (IM/IS) is a rapidly growing field that deals with the collection, organization, storage, and dissemination of information.IM/IS professionals use a variety of techniques and technologies to help businesses and organizations manage their information resources effectively.One of the most important aspects of IM/IS is data management. Data management involves the collection, cleaning, and organization of data in a way that makes it useful for decision-making. IM/IS professionals use a variety of data management tools and techniques to ensure that data is accurate, complete, and timely.Another important aspect of IM/IS is information systems development. Information systems are computer-based systems that allow businesses and organizations to managetheir information resources. IM/IS professionals design, develop, and implement information systems that meet the specific needs of their clients.IM/IS professionals also play a role in information security. Information security is the protection of information from unauthorized access, use, disclosure, disruption, modification, or destruction. IM/IS professionals use a variety of security measures to protect information, including firewalls, encryption, and access control lists.The field of IM/IS is constantly evolving as new technologies emerge. IM/IS professionals must keep up with the latest trends in order to stay competitive. Some of the most recent trends in IM/IS include the use of cloud computing, big data, and artificial intelligence.IM/IS is a challenging and rewarding field that offers a variety of career opportunities. IM/IS professionals can work in a variety of industries, including healthcare, finance, manufacturing, and government.中文回答:信息管理与信息系统。

信息管理与信息系统论文中英文资料外文翻译文献

信息管理与信息系统论文中英文资料外文翻译文献

信息管理与信息系统论文中英文资料外文翻译文献Construction of Network Management Information System of Agricultural Products Supply Chain Based on 3PLsAbstractThe necessity to construct the network management information system of 3PLs agricultural supply chain is analyzed, showing that 3PLs can improve the overall competitive advantage of agricultural supply chain. 3PLs changes the homogeneity management into specialized management of logistics service and achieves the alliance of the subjects at different nodes of agricultural products supply chain. Network management information system structure of agricultural products supply chain based on 3PLs is constructed, including the four layers (the network communication layer, the hardware and software environment layer, the database layer, and the application layer) and 7 function modules (centralized control,transportation process management, material and vehicle scheduling, customer relationship, storage management, customer inquiry, and financial management).Framework for the network management information system of agricultural products supply chain based on 3PLs is put forward. The management of 3PLs mainly includes purchasing management, supplier relationship management, planning management, customer relationship management, storage management and distribution management. Thus, a management system of internal and external integrated agricultural enterprises is obtained. The network management information system of agricultural products supply chain based on 3PLs has realized the effective sharing of enterprise information of agricultural products supply chain at different nodes, establishing a long-term partnership revolving around the 3PLs core enterprise, as well as a supply chain with stable relationship based on the supply chain network system, so as to improve the circulation efficiency of agricultural products, and to explore the sales market for agricultural products.Key words3PLs (third party logistics),Agricultural products supply chain, Network management information system, China3PLs means that production enterprises entrust the logistics activity to the professional logistics service firms in order to concentrate efforts on core business, to keep close contact with logistics enterprise through information system, and to achieve a logistics operation and management mode with full control in logistics. According to the 3PLs requirements forinformation technology, supply chain management information system based on 3PLs is a supply chain management mode with 3PLs enterprises as the core, using EDI technology, GIS/GPS system, B/S mode and other technologies. Integration, processing and application of 3PLs enterprises in supply chain management information system are fully applied in order to reduce the cost of logistics and to improve the service level of logistics.At present, management information technology in China is just at the initial stage. The existing management information system offers insufficient information for the 3PLs enterprises which are engaged in the circulation of agricultural products.Besides, its construction of logistics data processing system is imperfect, having not realized the truly professional 3PLs enterprises for the circulation of agricultural products with information technology. At the same time, 3PLs enterprise for agricultural products has just started in China. And logistics applied in the agricultural supply chain with 3PLs enterprise as the core is time-consuming, inefficient and low-level, which can hardly meet the needs of the rapid development of rural market and social productive forces. Therefore, it is particularly important and urgent to construct a management information system for agricultural products supply chain under the current Internet environment. Problems in the management of the supply chain of agricultural products are analyzed, and a network management information system of agricultural products supply chain based on 3PLs is constructed in order to offer references for the information management in the supply chain of agricultural products in China.1 Necessity of constructing the network management information system of agricultural products supply chain based on 3PLsAgricultural products are seasonal, perishable and vulnerable. With the improvement of income level,consumers have increasingly high requirements for the diversification, personalization, just-in-time nature, and environment protection of agricultural products, which requires faster, more professional,and better organized logistics. At the same time, supply chain of agricultural products has the characteristics of the special purpose of funds, the uncertainty of market, and the unbalanced development of market. Thus, the support of supply chain management information system is needed during the circulation of agricultural products. Construction of market integration,as well as the integration of production, supply and marketing,urgently needs a new management information system of agricultural products, as well as an accompanying legal support system, in order to reduce the cost and to increase the profit for agricultural enterprises. And the application of 3PLs in the supply chain of agricultural products can solve this problem.Therefore, we should give full play to the central hub function of 3PLs enterprises in agricultural products supply chain, increase the input in the informationization of agricultural products supply chain, and promote the construction of logistics operation system and management information system.1 .1 Improving the overall competitive advantage of agricultural products supply chain by 3PLs3PLs is a new logistics organizational form established by modern information technology, as well as a kind of complementary and win-win strategic alliance by signing contract with the party being served. Taking 3PLs as the professional and core enterprise in the production and circulation of agricultural products can help to realize resource consolidation of the construction and organization of the whole supply chain of agricultural products. The specialization of raw materials and the service for product distribution have greatly improved the logistics efficiency of traditional enterprise. At the same time, construction of the management information system ofagricultural products supply chain based on 3PLs has made up for the shortage of information in agricultural market, has improved the efficiency of the flow of agricultural products, has connected all the links in the supply chain into an organic whole in an reasonable and effective way,and has enhanced the overall competitive advantage and economic benefits. 3PLs platform has greatly brought down the production and circulation processes of traditional agricultural enterprises, and has reduced the costs in raw material procurement and product distribution, so as to better adapt to the changes in market demand, to realize the rational distribution of resources, and to improve the overall competitiveness of the supply chain of agricultural products.1 .2 Changing the homogeneity management to specialized operation of logistics service by 3PLsDue to the characteristics of agricultural products, market requirement for logistics varies widely. Since traditional enterprises try to obtain the competitive advantage, there is fierce market competition in commodity circulation. Therefore, behavior of logistics market shows the characteristics of homogeneity and the profit is getting lower and lower. In order to seize the customer, some enterprises even take a loss. 3PLs enterprises share business risk with partners and carry out operation according to the items number, time and cost of customer by integration and utilization of resources. As a means of the supply chain integration of agricultural products, specialized operation of 3PLs can help the stakeholders of supply chain to obtain more demand information of agricultural products, and can reduce the circulation cost of agricultural products.1 .3 Alliance of the subjects in supply chain nodes of agricultural products by 3PLs3PLs stresses the relationship of “mutual complementarity, benefit sharing, information sharing” among the stakeholders in different nodes of supply chain. Development of the agricultural producer, supplier and retailer is limited if they rely only on their own resources. 3PLs enters into the outside service market, integrates the resources through the way of strategic alliances, ensures that the subject focuses its attention on core business, reduces the cost by scale effect, enhances the anti-risk strength, and helps to achieve quick response to market demand by information sharing.At the same time, contract-0riented 3PLs enterprises unify the interests of all subjects in supply chain of agricultural products, emphasize the strategic partnership of both parties,and alleviate market competition of related industries in agricultural markets. Subjects in both downstream and upstream of the supply chain share information and establish long-term partnership with 3PLs enterprises as the core.2 Construction of the network management information system of agricultural supply chain based on 3PLs2.1 Construction of structural system3PLs platform is used to offer network communications and system services to the subjects in agricultural supply chain. Fig. 1 illustrates the structural system of network management information system of agricultural supply chain based on 3PLs.Fig.1 Structural system of network management information system of agricultural supplychain based on 3PLsFig. 1 illustrates that the basic hardware of the system is combined by the network transmission media and network equipment, that is the network communication layer. Hardware facilities, corresponding system software, operation system and netmanager software together constitute the software and hardware environment layer.This layer provides necessary software and hardware facilities for 3PLs enterprises during the data storage and management of agricultural products. Database layer is responsible for the management of data source in agricultural information resources and network systems, and offers data integration to the application layer. 3PLs standard system includes the overall standard, network infrastructure standard, application support standard, application standard, information security standard, and management standard. Safety system of 3PLs includes the security management, security infrastructure, and security service.This system is composed of 7 function modules, such as the centralized control module, transportation process management module, material and vehicle scheduling module, customer relationship module, storage management module, customer query module, and financial management module(Fig. 2),the function of which is to ensure the information fluency and system security of 3PLs enterprises during the operation and integration of resources. These modules have improved the service module of different nodes in agricultural supply chain and have reduced the operation risk of system, so that the system becomes more structured, perfect, and rational.2.2 Framework of management systemBased on the existing research result,the business and module of modern logistics management,and the management information systems,Fig.3 reports the management system of internal and external integrated agricultural enterprises according to the circulation of agricultural products from the manufacturer,supplier,and retail terminal to the consumer.Fig.2 Function modules of 3PLs network management information systemFig.3 The management system of internal and external integrated agricultural enterprises Fig.3 shows the framework of network management information system of agricultural supply chain based on 3PLs. The whole system, running under an open 3PLs, is formed by four layers of network communication layer, software and hardware environment layer, database layer and application layer. In the application layer, 3PLs, as the core of management information system of agricultural supply chain, plays the role of information processing center. It mainly manages the plan, inventory, and other subsystems, supervises subsystem through supplier relationship, conducts information interaction with procurement management subsystem and the supplier, and carries out information interaction with the supplier, producer and consumer through customer relationship management subsystem and sales management subsystem. Besides, 3PLs is also responsible for logistics management and control through the distribution management subsystem. Management of 3PLs mainly includes the 7 modules of purchasing management, supplier relationship management, planning management, customer relationship management, sales management, inventory management and distribution management. Through the effectiveintegration and coordination between 3PLs and the business with partner at the downstream and upstream of agricultural supplier chain, management system of internal and external integrated agricultural enterprises is formed using the logistics information system to realize the integration of logistics and information flow.In general,3PLs enterprise is still in the initial stage in China. Management information system of agricultural supply chain is not perfect, which can not meet the current needs of the rapid development and agricultural products circulation in rural China. Thus, there is an urgent need to build a new mode of agricultural logistics, so as to reduce the process of sales turnover, to lower the production cost of 3PLs enterprises, to improve the circulation efficiency of agricultural products, and to expand the sales market of agricultural products.3 ConclusionDeveloping modern 3PLs is an inevitable trend of market development. Design and development of management information system based on 3PLs can bring spillover benefits to the producer, supplier and retailer of agricultural products.Under the current Internet environment, management information system of agricultural supply chain based on 3PLs must be established based on the specific characteristics of operation mode and the actual business situation of 3PLs enterprises, so as to establish a management information system suitable for a given enterprise. From the perspective of overall integration of resources, the network management information system of agricultural supply chain based on 3PLs established has connected the interests of different nodes in agricultural supply chain into an organic whole, has effectively eliminated the barriers to information flow, and has increased the profits of agriculture-related enterprises and farmers. At the same time, according to the characteristics of agricultural enterprises in China, a rational agricultural products logistics mode of internal and external integrated agricultural enterprise is established, which offers a reference for the management of agricultural supply chain in China.基于第三方物流的农产品供应链网络管理信息系统的建设摘要本文对构建网络农业第三方物流供应链管理信息系统的必要性进行了分析,表明第三方物流可以提高农产品供应链的整体竞争优势。

信息系统中英文对照外文翻译文献

信息系统中英文对照外文翻译文献

中英文对照翻译附录1 外文翻译(原文)Systems Analysis and DesignWorking under control of a stored program, a computer processes data into information. Think about that definition for a minute. Any given computer application involves at least three components: hardware, software, and data. Merely writing a program isn't enough; because the program is but one component in a system.A system is a group of components that work together to accomplish an objective. For example, consider a payroll system. Its objective is paying employees. What components are involved? Each day,employees record their hours worked on time cards. At the end of each week, the time cards are collected and delivered to the computer center, where they are read into a payroll program. As it runs, the program accesses data files. Finally, the paychecks are printed and distributed. For the system to work, people, procedures, input and output media, files, hardware, and software must be carefully coordinated. Note that the program is but one component in a system.Computer-based systems are developed because people need information. Those people, called users, generally know what is required, but may lack the expertise to obtain it. Technical professionals, such as programmers, have the expertise, but may lack training in the user's field. To complicate matters, users and programmers often seem to speak different languages, leading to communication problems. A systems analyst is a professional who translates user needs into technical terms, thus serving as a bridge between users and technical professionals.Like an engineer or an architect, a systems analyst solves problems by combining solid technical skills with insight, imagination, and a touch of art. Generally, the analyst follows a well-defined, methodical process that includes at least the following steps;1.Problem definition2.Analysis3.Design4.Implementation5.MaintenanceAt the end of each step, results are documented and shared with both the user and the programmers. The idea is to catch and correct errors and misunderstandings as early as possible. Perhaps the best way to illustrate the process is through example.Picture a small clothing store that purchases merchandise at wholesale, displays this stock, and sells it to customers at retail. On the one hand, too much stock represents an unnecessary expense. On the other hand, a poor selection discourages shoppers. Ideally, a balance can be achieved: enough, but not too much.Complicating matters is the fact that inventory is constantly changing, with customer purchases depleting stock, and returns and reorders adding to it. [1] The owner would like to track inventory levels and reorder and given item just before the store runs out. For a single item, the task is easy-just count the stock-on-hand. Unfortunately, the store has hundreds of different items, and keeping track of each one is impractical. Perhaps a computer might help.2-1 Problem DefinitionThe first step in the systems analysis and design process is problem definition. The analyst's objective is determining what the user (in this case, the store's owner) needs. Note that, as the process begins, the user possesses the critical information, and the analyst must listen and learn. Few users are technical experts. Most see the computer as a "magic box, "and are not concerned with how it works. At this stage, the analyst has no business even thinking about programs, files, and computer hardware, but must communicate with the user on his or her own term.The idea is to ensure that both the user and the analyst are thinking about the same thing-Thus, a clear, written statement expressing the analyst's understanding of the problem is essential. The user should review and correct this written statement. The time to catch misunderstandings and oversights is now, before time, money and effort are wasted.Often, following a preliminary problem definition, the analyst performs a feasibility study. The study a brief capsule version of the entire systems analysis and design process, attempts to answer three questions:1.Can the problem be solved?2.Can it be salved in the user's environment?3.Can it be solved at a reasonable cost?If the answer to any one of these questions is no, the system should not be developed. Given a good problem definition and a positive feasibility study, the analyst can turn to planning and developing a problem solution.2- 2 AnalysisAs analysis begins, the analyst understands the problem. The next step is determining what must be done to solve it. The user knows what must be done 1 during analysis; this knowledge is extracted and formally documented. Most users think in terms of the functions to be performed and the data elements to be manipulated. The objective is to identify and link these key functions and data elements, yielding a logical system design.Start with the system's basic functions. The key is keeping track of the stock-on-hand for each product in inventory. Inventory changes because customers purchase, exchange, and return products, so the system will have to process customer transactions. The store's owner wants to selectively look at the inventory level for any product in short supply and, if appropriate, order replacement stock, so the system must be able to communicate with management. Finally, following management authorization, the system should generate a reorder ready to send to a supplier.Fig 1Given the system's basic functions, the analyst's next task is gaining a sense of their logical relationship. A good way to start is by describing how data flow between the functions. As the name implies, data flow diagrams are particularly useful for graphically describing these data flows. Four symbols are used (Fig. 1). Data sources and destinations are represented by squares; input data enter the system from a source, and output data flow to a destination. Once in the system, the data are manipulated orchange by processes, represented by round-corner rectangles. A process might be a program, a procedure, or anything else that changes or moves data. Data can be held for later processing in data stores, symbolized by open-ended rectangles. A data store might be a disk file, a tape file, a database, written notes, or even a person's memory. Finally, data flow between sources, destinations, processes, end data stores over data flows, which are represented by arrows.Fig 2Figure 2 shows a preliminary data flow diagram for the inventory system. Start with CUSTOMER. Transactions flow from a customer f into the system, where they are handled by Process transaction. A data store, STOCK, holds data on each item in inventory. Process transaction changes the data to reflect the new transaction. Meanwhile, MANAGEMENT accesses the system through Communicate, evaluating the data in STOCK and, if necessary, requesting a reorder. Once, a reorder is authorized. Generate reorder sends necessary data to the SUPPLIER, who ships the items to the store. Note that, because the reorder represents a change in the inventory level of a particular product or products it is handled as a transaction.The data flow diagram describes the logical system. The next step is tracing the data flows. Start with the destination SUPPLIER. Reorders flow to suppliers; for example, the store might want 25 pairs of jeans. To fill the order, the supplier needs the product description and the reorder quantity. Where do these data elements come from? Since they are output by Generate reorder, they must either be Input to or generated by this process. Data flow into Generate reorder for STOCK; thus, product descriptions and reorder quantities must be stored in STOCK.Other data elements, such as the item purchased and the purchase quantity are generated by CUSTOMER. Still others, for example selling price and reorder point, are generated by or needed by MANAGEMENT. The current stock-on-hand for agiven item is an example of a data element generated by an algorithm in one of the procedures. Step by step, methodically, the analyst identifies the data elements to be input to .stored by, manipulated by, generated by, or output by the system.To keep track of the data elements, the analyst might list each one in a data dictionary. A simple data dictionary can be set up on index cards, but computerized data dictionaries have become increasingly popular. The data dictionary, a collection of data describing and defining the data, is useful throughout the systems analysis and design process, and is often used to build a database during the implementation stage.The idea of analysis is to define the system's major functions and data elements methodically. Remember that the objective is translating user needs into technical terms. Since the system starts with the user, the first step is defining the user's needs. Users think in terms of functions and data. They do not visualize programs, or files, or hardware .and during this initial, crucial analysis stage it is essential that the analyst think like a user, not like a programmer.Data flow diagrams and data dictionaries are useful tools. They provide a format for recording key information about the proposed system. Also, they jog the analyst's memory) for example, if the analyst doesn't have sufficient information to complete a data dictionary entry, he or she has probably missed something. Perhaps most importantly, the data flow diagram and the data dictionary document the analyst's understanding of the system requirements. By reviewing these documents, the user can correct misunderstandings or oversights. Finally, they represent an excellent starting point the next step, design.2-3 DesignAs we enter the design stage, we know what the system must do, and thus can begin thinking about how to do it. The objective is to develop a strategy for solving the problem. At this stage, we are not interested in writing code or in defining precise data structures; instead, we want to identify, at a black box level, necessary programs, files, procedures, and other components.The data flow diagram defines the system's necessary functions; how might they be implemented? One possibility is writing one program for each process. Another is combining two or more processes in a single program; there are dozens of alternative solutions. Let's focus on one option and document it.A system flowchart uses symbols to represent programs, procedures, hardware devices, and the other components of a physical system (Fig. 3). Our flowchart (.Fig.4) shows that transaction data enter the system through a terminal, are processed by a data collection program, and then are stored on an inventory file. Eventually, the inventory file is processed by a Report and reorder program. Through it, management manipulates the data and authorizes reorders.Fig. 4 on a system flowchart, symbols represent programs, procedures, hardware devices, and the other components of a physical system.Fig 3Look at the system flowchart. It identifies several hardware components, including a computer, a disk drive, a data entry terminal, a printer, and a display terminal. Two programs are needed; Process transaction and Report and reorder. In add ition to the hardware and the programs, we’ll need data structures for the inventory file and for data flaws between the I/O devices and the software. Note that this system flowchart illustrates one possible solution; a good analyst will develop several feasible alternatives before choosing one.Fig 4The flowchart maps the system, highlighting its major physical components. Since the data link the components, the next task is defining the data structures. Consider, for example, the inventory file. It contains all the data elements from the data store STOCK. The data elements are listed in the data dictionary. Using them, the file's data structure can be planned,How should the file be organized? That depends on how it will be accessed. For example, in some applications, data are processed at regular, predictable intervals. Typically, the data are collected over time and processed together, as a batch. If batch processing is acceptable, a sequential file organization is probably best.It is not always possible to wait until a batch of transactions is collected, however. For example, consider an air defense early warning system. If an unidentified aircraft is spotted it must be identified immediately the idea of waiting until 5 _ 00 p.m. because "that's when the air defense program is run" is absurd. Instead, because of the need for quick response, each transaction must be processed as it occurs. Generally such transaction processing systems call for direct access file.Our inventory system has two programs. One processes transactions. A direct access inventory file seems a reasonable choice. The other allows management to study inventory data occasionally; batch processing would certainly do. Should the inventory file be organized sequentially or directly? Faced with such a choice a good analyst considers both options. One possible system might accept transactions and process them as they occur. As an alternative, sales slips might be collected throughout the day and processed as a batch after the store closes. In the first system, the two programs would deal with direct access files; in the second system, they would be linked to sequential files. A program to process direct access data is different from a program to process sequential data. The data drive the system. The choice of a data structure determines the program’s structure. Note that the program is defined and planned in the context of the system.2- 4 ImplementationOnce the system's major components have been identified .we can begin to develop them. Our system includes two programs, several pieces of equipment, and a number of data structures. During implementation, each program is planned and written using the techniques described in Chapter 7. Files are created, and theircontents checked. New hardware is purchased, installed, and tested. Additionally, operating procedures are written and evaluated. Once all the component parts are ready, the system is tested. Assuming the user is satisfied, the finished system is released.2- 5 MaintenanceMaintenance begins after the system is released. As people use it, they will suggest minor improvements and enhancements. Occasionally, bugs slip through debug and testing, and removing them is another maintenance task. Finally, conditions change, and a program must be updated; for example, if the government passes a low changing the procedure for collecting income taxes, the payroll program must be modified. Maintenance continues for the life of a system, and its cost can easily match or exceed the original development cost. Good planning, solid documentation, and well-structured programs can help to minimize maintenance cost.附录2 外文翻译(译文)系统的分析与设计在存储程序的控制下,计算机把数据处理成信息。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

武汉纺织大学管理学院2012届毕业生英文翻译(2011—2012学年第 2 学期)材料:英文原稿、中文打印稿──────────────────────专业:信息管理与信息系统────────────班级:────────────姓名:────────────指导教师:───────────序号:2012年 5月17 日外文资料As information technology advances, various management systems have emerged to change the daily lives of the more coherent, to the extent possible, the use of network resources can be significantly reasonable reduction of manual management inconvenience and waste of time.Accelerating the modernization of the 21st century, the continuous improvement of the scientific and cultural levels, the rapid growth of the number of students will inevitably increase the pressure information management students, the inefficient manual retrieval completely incompatible with the community\'s needs. The Student Information Management Systemis an information management one kind within system, currently information technique continuously of development, the network technique has already been applied in us extensively nearby of every trade, there is the network technical development, each high schools all make use of a calculator to manage to do to learn, the school is operated by handicraft before of the whole tedious affairs all got fast and solve high-efficiencily, especially student result management the system had in the school very big function, all can be more convenient, fast for the student and the teacher coming saying and understand accurately with management everyone noodles information.AbstractIt is a very heavy and baldness job of managing a bulky database by manpower. The disadvantage, such as great capacity of work, low efficiency and long period, exist in data inputting, demanding and modification. So the computer management system will bring us a quite change.Because there are so many students in the school, the data of students' information is huge, it makes the management of the information become a complicated and tedious work. This system aims at the school, passing by practically of demand analysis, adopt mighty VB6.0 to develop the student information management system. The whole system design process follow the principle of simple operation, beautiful and vivid interface and practical request. The student information management system including the function of system management, basic information management, study management, prize andpunishment management , print statement and so on. Through the proof of using, the student information management system which this text designed can satisfy the school to manage the demand of the aspect to students' information. The thesis introduced the background of development, the functions demanded and the process of design. The thesis mainly explained the point of the system design, the thought of design, the difficult technique and the solutions. The student managed the creation of the system to reduce the inconvenience on the manpower consumedly, let the whole student the data management is more science reasonable.The place that this system has most the special features is the backstage database to unify the management to student's information.That system mainly is divided into the system management, student profession management, student file management, school fees management, course management, result management and print the statement.The interface of the system is to make use of the vb software creation of, above few molds pieces are all make use of the vb to control a the piece binds to settle of method to carry out the conjunction toward the backstage database, the backstage database probably is divided into following few formses:Professional information form, the charges category form, student the job form, student the information form, political feature form of student, the customer logs on the form The system used Client/Server structure design, the system is in the data from one server and a number of Taiwan formed LAN workstations. Users can check the competence of different systems in different users submit personal data, background database you can quickly given the mandate to see to the content.Marks management is a important work of school,the original manual management have many insufficiencies,the reasons that,students' population are multitudinous in school,and each student's information are too complex,thus the work load are extremely big,the statistics and the inquiry have beeninconvenient.Therefore,how to solve these insufficiencies,let the marks management to be more convenient and quickly,have a higher efficiency,and become a key question.More and more are also urgent along with school automationthe marksmanagement when science and technology rapid development,therefore is essential to develop the software system of marks register to assist the school teaching management.So that can improve the marks management,enhance the efficiency of management.“We cut nature up, organize it into concepts, and ascribe significances as we do, largely because we are parties to an agreement that holds throughout our speech community and is codified in the patterns of our language …we cannot talk at all except by subscribing to the organization and classification of data which the agreement decrees.” Benjamin Lee Whorf (1897-1941)The genesis of the computer revolution was in a machine. The genesis of our programming languages thus tends to look like that machine.But computers are not so much machines as they are mind amplification tools (“bicycles for the mind,”as Steve Jobs is fond of saying) and a different kind of expressive medium. As a result, the tools are beginning to look less like machines and more like parts of our minds, and also like other forms of expression such as writing, painting, sculpture, animation, and filmmaking. Object-oriented programming (OOP) is part of this movement toward using the computer as an expressive medium.This chapter will introduce you to the basic concepts of OOP, including an overview of development methods. This chapter, and this book, assumes that you have some programming experience, although not necessarily in C. If you think you need more preparation in programming before tackling this book, you should work through the Thinking in C multimedia seminar, downloadable from .This chapter is background and supplementary material. Many people do not feel comfortable wading into object-oriented programming without understanding the big picture first. Thus, there are many concepts that are introduced here to give you a solid overview of OOP. However, other people may not get the big picture concepts until they’ve seen some of the mechanics first; these people may become boggeddown and lost without some code to get their hands on. If you’r e part of this latter group and are eager to get to the specifics of the language, feel free to jump past this chapter—skipping it at t his point will not prevent you from writing programs or learning the language. However, you will want to come back here eventually to fill in your knowledge so you can understand why objects are important and how to design with them.All programming languages provide abstractions. It can be argued that the complexity of the problems you’re able to solve is directly related to the kind and quality of abstraction. By “kind”I mean, “What is it that you are abstracting?”Assembly language is a small abstraction of the underlying machine. Many so-called “imperative”languages that followed (such as FORTRAN, BASIC, and C) were abstractions of assembly language. These languages are big improvements over assembly language, but their primary abstraction still requires you to think in terms of the structure of the computer rather than the structure of the problem you are trying to solve. The programmer must establish the association between the machine model (in the “solution space,”which is the place where you’re implementing that solution, such as a computer) and the model of the problem that is actually being solved (in the 16 Thinking in Java Bruce EckelThe object-oriented approach goes a step further by providing tools for the programmer to represent elements in the problem space. This representation is general enough that the programmer is not constrained to any particular type of problem. We refer to the elements in the problem space and their representations in the solution space as “objects.” (You will also need other objects that don’t have problem-space analogs.) The idea is that the program is allowed to adapt itself to the lingo of the problem by adding new types of objects, so when you read the code describing the solution, you’re reading words that also express the problem. This is a more flexible and powerful language abstraction than what we’ve had before.1 Thus, OOP allows you to describe the problem in terms of the problem, rather than in terms of the computer where the solution will run. There’s still a connection back to the computer:Each object looks quite a bit like a little computer—it has a state, and it has operations that you can ask it to perform. However, this doesn’t seem like such a bad analogy to objects in the real world—they all have characteristics and behaviors.Java is making possible the rapid development of versatile programs for communicating and collaborating on the Internet. We're not just talking word processors and spreadsheets here, but also applications to handle sales, customer service, accounting, databases, and human resources--the meat and potatoes of corporate computing. Java is also making possible a controversial new class of cheap machines called network computers,or NCs,which SUN,IBM, Oracle, Apple, and others hope will proliferate in corporations and our homes.The way Java works is simple, Unlike ordinary software applications, which take up megabytes on the hard disk of your PC,Java applications,or"applets",are little programs that reside on the network in centralized servers,the network that delivers them to your machine only when you need them to your machine only when you need them.Because the applets are so much smaller than conventional programs, they don't take forever to download.Say you want to check out the sales results from the southwest region. You'll use your Internet browser to find the corporate Internet website that dishes up financial data and, with a mouse click or two, ask for the numbers.The server will zap you not only the data, but also the sales-analysis applet you need to display it. The numbers will pop up on your screen in a Java spreadsheet, so you can noodle around with them immediately rather than hassle with importing them to your own spreadsheet program。

相关文档
最新文档