(完整版)本科生_毕业设计说明书外文文献及翻译_

合集下载

本科毕业设计外文+翻译 2

本科毕业设计外文+翻译 2

Section 3 Design philosophy, design method and earthpressures3.1 Design philosophy3.1.1 GeneralThe design of earth retaining structures requires consideration of the interaction between the ground and the structure. It requires the performance of two sets of calculations:1)a set of equilibrium calculations to determine the overall proportions and the geometry of the structure necessary to achieve equilibrium under the relevant earth pressures and forces;2)structural design calculations to determine the size and properties of thestructural sections necessary to resist the bending moments and shear forces determined from the equilibrium calculations.Both sets of calculations are carried out for specific design situations (see 3.2.2) in accordance with the principles of limit state design. The selected design situations should be sufficientlySevere and varied so as to encompass all reasonable conditions which can be foreseen during the period of construction and the life of the retaining wall.3.1.2 Limit state designThis code of practice adopts the philosophy of limit state design. This philosophy does not impose upon the designer any special requirements as to the manner in which the safety and stability of the retaining wall may be achieved, whether by overall factors of safety, or partial factors of safety, or by other measures. Limit states (see 1.3.13) are classified into:a) ultimate limit states (see 3.1.3);b) serviceability limit states (see 3.1.4).Typical ultimate limit states are depicted in figure 3. Rupture states which are reached before collapse occurs are, for simplicity, also classified and treated as ultimate limit states. Ultimate limit states include:a) instability of the structure or any hart of it, including supports and foundations,considered as a rigid body;b) failure by rupture of the structure or any part of it, including supports and foundations.3.1.3 Ultimate limit states3.1.3.1 GeneralThe following ultimate limit states should be considered. Failure of a retaining wall as a result of:a) instability of the earth mass, e.g. a slip failure, overturning or a rotational failure where the disturbing moments on the structure exceed the restoring moments, a translational failure where the disturbing forces (see 1.3.8) exceed the restoring forces and a bearing failure. Instability of the earth mass aim-involving a slip failure ,may occur where:1)the wall is built on sloping ground which itself is close to limiting equilibrium; or2) the structure is underlain by a significant depth of clay whose undrained strength increases only gradually with depth; or3) the structure is founded on a relatively strong stratum underlain by weaker strata; or4) the structure is underlain by strata within which high pore water pressures may develop from natural or artificial sources.b) failure of structural members including the wall itself in bending or shear;c) excessive deformation of the wall or ground such that adjacent structures or services reach their ultimate limit state.3.1.3.2 analysis methodWhere the mode of failure involves a slip failure the methods of analysis, for stability of slopes, are described in BS 6031 and in BS 8081. Where the mode of failure involves a bearing capacity failure, the calculations should establish an effective width of foundation. The bearing pressures as determined from 4.2.2 should not exceed the ultimate bearing capacity in accordance with BS 8004.Where the mode of failure is by translational movement, with passive resistance excluded, stable equilibrium should be achieved using the design shear strength of the soil in contact with the base of the earth retaining structure.Where the mode of failure involves a rotational or translational movement, the stable equilibrium of the earth retaining structure depends on the mobilization of shear stresses within the soil. The full mobilization of the soil shear strength gives rise to limiting active and passive thrusts. These limiting thrusts act in concert on the structure only at the pointof collapse, i.e. ultimate limit state.3.1.4 Serviceability limit statesThe following serviceability limit states should be considered:a) substantial deformation of the structure;b) substantial movement of the ground.The soil deformations, which accompany the full mobilization of shear strength in the surrounding soil, are large in comparison with the normally acceptable strains in service. Accordingly, for most earth retaining structures the serviceability limit state of displacement will be the governing criterion for a satisfactory equilibrium and not the ultimate limit state of overall stability. However, although it is generally impossible or impractical to calculate displacements directly, serviceability can be sufficiently assured by limiting the proportion of available strength actually mobilized in service; by the method given in 3.2.4 and 3.2.5.The design earth pressures used for serviceability limit state calculations will differ from those used for ultimate limit state calculations only where structures are to be subjected to differing design values of external loads (generally surcharge and live loads) for the ultimate limit state and for the serviceability limit state.3.1.5 Limit states and compatibility of deformationsThe deformation of an earth retaining structure is important because it has a direct effect upon the forces on the structure, the forces from the retained soil and the forces which result when the structure moves against the soil. The structural forces and bending moments due to earth pressures reduce as deformation of the structure increases.The maximum earth pressures on a retaining structure occur during working conditions and the necessary equilibrium calculations (see 3.2.1) are based on the assumption that earth pressures greater than fully active pressure (see 1.3.11) and less than fully passive will act on the retaining structure during service. As ultimate limit state with respect to soil pressures is approached, with sufficient deformation of the structure, the active earth pressure (see 1.3.1) in the retained soil reduces to the fully active pressure and the passive resistance (see 1.3.15) tends to increase to the full available passive resistance (see 1.3.12). The compatibility of deformation of the structure and the corresponding earth pressures isimportant where the form of structure, for example a propped cantilever wall, prevents the occurrence of fully active pressure at the prop. It is alsoparticularly important where the structure behaves as a brittle material and loses strength as deformation increases, such as an unreinforced mass gravity structure or where the soil is liable to strain softening as deformation increases.3.1.6 Design values of parametersThese are applicable at the specified limit states in the specified design situations. All elements of safety and uncertainty should be incorporated into the design values.The selection of design values for soil parametersshould take account of:a) the possibility of unfavorable variations in the values of the parameters;b) the independence or interdependence of the various parameters involved in the calculation;c) the quality of workmanship and level of control specified for the construction.3.1.7 Applied loadsThe design value for the density of fill materials, should be a pessimistic or unfavorable assessment of actual density.For surcharges and live loadings different values may be appropriate for the differing conditions of serviceability and ultimate limit states and for different load combinations. The intention of this code of practice is to determine those earthpressures which will not be exceeded in a limit state, if external loads are correctly predicted. External loads, such as structural dead loads or vehicle surcharge loads may be specified in other codes as nominal or characteristic values. Some of the structural codes, with which this code interfaces, specify different load factors to be applied for serviceability or ultimate limit state the checks and for different load combinations,See 3.2.7 .Design values of loads, derived by factoring or otherwise, are intended, here, to behere most pessimistic or unfavorable loads which should he used in the calculations for the structure. Similarly, when external loads act on the active or retained side of the wall thesesame external loads should be derived in the same way. The soil is then treated as forming part of the whole structural system.3.1.8 Design soil strength (see 1.3.4)Assessment of the design values depends on the required or anticipated life of the structure, but account should be taken also of the short-term conditions which apply during and immediately following the period of construction. Single design values of soil strength should be obtained from a consideration of the representative values for peak and ultimate strength. The value so selected will satisfy, simultaneously, the considerations of ultimate and serviceability limit states. The design value should be the lower of:a) that value of soil strength, on the stress-strain relation leading to peak strength,which is mobilized at soil strains acceptable for serviceability. This can be expressed as the peak strength reduced by a mobilization factor M as given in 3.2.4 or 3.2.5; orb) that value which would be mobilized at collapse, after significant ground movements. This can general be taken t.o be the critical state strength.Design values selected in this way should be checked to ensure that they conform to 3.1.6. Design values should not exceed representative values of the fully softened critical state soil strength.3.1.9 Design earth pressuresThe design values of lateral earth pressure are intended to give an overestimate of the earth pressure on the active or retained side and an underestimate of the earth resistance on the passive side for small deformations of the structure as a whole, in the working state. Earth pressures reduce as fully active conditions are mobilized atpeak soil strength in the retained soil, under deformations larger than can be tolerated for serviceability. As collapse threatens, the retained soil approaches a critical state, in which its strength reduces to that of loose material and the earth pressures consequently tend to increase once more to active values based on critical state strength.The initial presumption should be that the design earth pressure will correspond to that arising from the design soil strength, see 3.1.8. But the mobilized earth pressure in service, for some walls, will exceed these values. This enhanced earth pressure will control thedesign, for example.a) Where clays may swell in the retained soil zone, or be subject to the effects of compaction in layers, larger earth pressures may occur in that zone, causing corresponding resistance from the ground, propping forces, or anchor tensions to increase so as t.o maintain overall equilibrium.b) Where clays may have lateral earth pressures in excess of the assessed values taking account of earth pressures prior to construction and the effects of wall installation and soil excavation or filling, the earth pressure in retained soil zones will be increased to maintain overall equilibrium.c) Where both the wall and backfill are placed on compressible soils, differential settlement due to consolidation may lead to rotation of the wall into the backfill. This increases the earth pressures in the retained zone.d) Where the structure is particularly stiff, for example fully piled box-shapedBridge abutments, higher earth pressures, caused, for example by compaction, may be preserved, notwithstanding that the degree of wall displacement or flexibility required to reduce retained earth pressures to their fully active values in cohesionless materials is only of the order of a rotation of 10-3 radians.In each of these cases, mobilized soil strengths will increase as deformations continue, so the unfavorable earth pressure conditions dill not persist as collapse approaches.The design earth pressures are derived from design soil strengths using the usual methods of plastic analysis, with earth pressure coefficients (see 1.3.9) given in this code of practice being based on Kerisel&Absi(1990). The same design earth pressures are used in the default condition for the design of structural. sections, see 3.2.7.3.2 Design method3.2.1 Equilibrium calculationsIn order to determine the geometry of the retaining wall, for exampal the depth of penetration of an embedded wall (see 1.3.10), equilibrium calculations should be carried out for care formulated design situations. The design fully calculations relate to a free-body diagram of forces and stresses for the whole retaining wall. The design calculations should demonstrate that there is global equilibrium of vertical and horizontal forces, and of moments. Separate calculations should be made for different design situations.The structural geometry of the retaining wall and the equilibrium calculations should be determined from the design earth pressures derived from the design soil strength using the appropriate earth pressure coefficients.Design earth pressures will lead to active and passive pressure diagrams of the type shown in figure 4. The earth pressure distribution should be checked for global equilibrium of the structure. Horizontal forces equilibrium and momentequilibrium will give the prop force in figure 4a and the location of the point of reversed stress conditions near the toe in figure 4b. Vertical forces equilibrium should also be checked.3.2.2 Design situations3.2.2.1 GeneralThe specification of design situations should include the disposition and classification of the various zones of soil and rock and the elements of construction which could be involved in a limit state event. The specification of design situations should follow a consideration of all uncertainties and the risk factors involved, including thefollowing:a) the loads and their combinations, e.g. surcharge and%or external loads on the active or retained side of the wall;b) the geometry of the structure, and the neighbouring soil bodies, representing the worst credible conditions, for example over-excavation during or after construction;c) the material characteristics of the structure, e.g. following corrosion;d) effects due to the environment within which the design is set, such as:-ground water levels, including their variations due to the effects of dewateringpossible flooding or failure of any drainage system;-scour, erosion and excavation, leading to changes in the geometry of the groundsurface;-chemical corrosion;-weathering;-freezing;-the presence of gases emerging from the ground;-other effects of time and environment on thestrength and other properties of materials;e) earthquakes;f) subsidence due to mining or other causes;g) the tolerance of the structure to deformations;h) the effect of the new structure on existing structures or services and the effect of existing structures or services on the new structure;i) for structures resting on or near rock, theconsideration of:-interbedded hard and soft strata;-faults, joints and fissures;-solution cavities such as swallow holes or fissures, filled with soft material, and continuing solution processes.3.2.2.2 Minimum surcharge and minimum unplanned excavationIn checking the stable equilibrium and soil deformation all walls should be designed for a minimum design surcharge loading of 10 kN/m2 and a minimum depth of excavation in front of the wall, which should be:a)not less than 0.5 m; andb)not less than10% of the total height retained for cantilever walls, or the height retained lowest support level for propped or anchored walls.These minimum values should be reviewed for each design and more adverse values adopted in particularly critical or uncertain circumstances. The requirement for an additional or unplanned excavation as a design criterion is to provide for unforeseen and accidental events. Foreseeable excavations suet as service or drainage trenches infront of a retaining wall, which may be required at some stage in the life of the structure, should be treated as a planned excavation. Actual excavation beyond the planned depth is outside the design considerations of this code.3.2.2.3 Water pressure regimeThe water pressure regime used in the design should be the most onerous that is considered to be reasonably possible.3.2.3 Calculations based on total and effective stress parametersThe changes in loading associated with the construction of a retaining wall may result in changes in the strength of the ground in the vicinity of the wall. if"here the mass permeability of the ground is low these changes of strength take place over some time and therefore the design should consider conditions in both the short- and long-term. Which condition will be critical depends on whether the changes in load applied to the soil mass cause an increase or decrease in soil strength. The long-term condition is likely to becritical where the soil mass undergoes a net reduction in load as a result of excavation, such as adjacent to a cantilever wall. Conversely where the soil mass is subject to a net increase in loading, such as beneath the foundation of a gravity or reinforced stem wall at ground level, the short-term condition is likely to be critical for stability. When considering long-term earth pressures and equilibrium, allowance should be made for changes in ground water conditions and pore water pressure regime which may result from the construction of the works or from other agencies.Calculations for long-term conditions require shear strength parameters to be in terms of effective stress and should take account of a range of water pressures based on considerations of possible seepage flow conditions within the earth mass. Effective stress methods can also be used to assess the short-term conditions provided the pore water pressures developed during construction areknown. A total stress method of analysis may be used to assess the short-term conditions in clays and soils of low permeability, but an inherent assumption of this method is that there will be no change in the soil strength as a result of the changes in load caused by the construction. For granular materials and soils of high permeability all excess pore water pressure will dissipate rapidly so that the relevant strength is always the drained strength and the earth pressures and equilibrium calculations are always in terms of effective stresses.3.2.4 Design using total stress parametersThe retaining wall should be designed to be in equilibrium design clay when based on a mobilized undrained strength (design c u) which does not exceed the representative divided by a mobilization undrained strength factor M. The value of M should not be less than 1.5 if wall displacements are required to be less than 0.5 % of wall height.The value of M should be larger than 1.5 for clays which require large strains to mobilize their peak strength.3.2.5 Design using effective stress parametersThe retaining wall should be designed to be in equilibrium mobilizing a soil strength the lesser or:a) the representative peak strength of the soil divided by a factor M =1.2:that is:Mm a x t a n t i v e r e p r e s e n t a d e s i g n t a n ϕϕ'=' (3) Mc c '=' t i v e r e p r e s e n t ade s i g n (4) orb) the representative critical state strength of the soil.This will ensure that for soils which are medium dense or firm the wall displacements in service will be limited to 0.5 % of the wall height. The mobilization factor of 1.2 should be used in conjunction with the front of the wall, the 'unplanned' excavation inminimum surcharge loading and the water pressure regime, see 3.2.2.2 and 3.2.2.3.A more detailed analysis of displacement should be are to be applied or for soft or loose soils. The criteria a) and b), taken together, should provide a sufficient reserve of safety against small unforeseen loads and adverse conditions.In stiff clays subject to cycles of strain, such as through seasonal variation of pore water pressure, the long-term peak strength may deteriorate to the critical state strength. The requirements of a) and b) above are sufficiently cautious to accommodate this possibility.3.2.6 Design values of wall friction, base friction and undrained wall adhesionThese should be derived from the representative strength determined in accordance with2.2.8,using the same mobilization actors as for the adjacent soil.The design value of the friction or adhesion mobilized at an interface with the structure be the lesser of:a) the representative value determined by described in 2.2.8 if such test results are available; orb) 75% of the design shear strength to be mobilized in the soil itself, that is using: ϕδ'⨯= d e s i g n t a n75.0 design tan (5) u w d e s i g n 75.0design c c ⨯= (6)Since for the soil mass:1.2t a n t i v e r e p r e s e n t a d e s i g n t a n ϕϕ'=' (7) this is equivalent to:32 t i v e r e p r e s e n t ad e s i g n ≈'ϕδ (8) similarly, in total stress analysis:5.1 ng after taki ,5.0 tive representa design uw ==M c c (9) The friction or adhesion, which can be mobilized in practice, is generally less than the value deduced on the basis of soil sliding against the relevant surface. It is unlikely for example, that a cantilever wall will remain at constant elevation while the active soil zone subsides creating full downward wall friction on the retained side, and the passive zone heaves creating full upward wall friction on the excavated side. It is more likely that the wall would move vertically with one or other soil zone,reducing friction on that side, and thereby attaining vertical force equilibrium. The 25% reduction in the design shear strength in b) above makes an allowance for this possibility. Further reductions, and even the elimination of wall friction or its reversal, may be necessary when soil structure interaction is taken into account. Wall friction on the retained or active side should be excluded when the wall is capable of penetrating deeper, due to the vertical thrust imparted by inclined anchors on an embedded wall, by structural loads on a basement wall, or where a clay soil may heave due to swelling during outward movement of the wall. Wall friction on the passive side should be excluded when the wall is prevented from sinking but the adjacent soil may fail to heave, due for example to settlement of loose granular soils induced by cyclic loads, or when the wall is free to move upwards with the passive soil zone, as may happen with buried anchor blocks.3.2.7 Design to structural codesThe earth pressures to be used in structural design calculations are the most severe earth pressures determined for serviceability limit state, see 3.1.9. These are the most severe that can credibly occur under the design situations, see 3.2.2. Accordingly the application ofpartial load factors to the bending moments and internal forces derived from these earth pressures, is not normally required. Hacking determined the earth pressures using design the structure increases it should be assumed that loads and design soil strengths, the structural load affects (bending moments, and shears) can be calculated using equilibrium principles in the usual way without applying any further factors. Finally, the material properties and sections should be derived from the load effects according to the structural codes. Reference should be made to the documentary source for the loadings, such as BS 5400:Part 4 for guidance on the respective design values.Structural design calculations based upon ultimate limit state assume that the moments and forces applicable at ultimate larger than limit state are significantly at serviceability limit state. BS8110: Part 1 and Part; BS 5400:Part 4 and BS 5950:Part 1 and Part 5 make this assumption. At ultimate limit state, the earth active or retained side are not pressures on the a maximum.Because the structural forces and bending moments due to earth pressures reduce as deformation of the most severe earth pressures, which are usually determined for the serviceability limit state, also apply to the ultimate limit state structural design calculations. The design at serviceability limit state for flexible structures such as steel or reinforced and prestressed undertaken in a like concrete may be manner to the analysis in 3.1 to 3.4 of BS 8110:Part 2:1985.For gravity mass walls such as masonry structures, which are relatively rigid, the earth pressures on the retained or active side are likely to be higher than the fully active values in the working state. The earth pressures at serviceability and ultimate limit states will be similar, because the displacement criteria will be similar.3.3 Disturbing forces3.3.1 GeneralThe disturbing forces to be taken into account in the equilibrium calculations are the earth pressures on the active or retained side of the wall, together with loads due to the compaction of the fill (if any) behind the wall, surcharge loads, external loads and last, but by no means least, the water pressure.3.3.2 At-rest earth pressuresThe earth pressures which act on retaining walls, or parts of retaining walls, below existing ground, depend on the initial or at-rest state of stress in the ground. For an undisturbed soil at a state of rest, the ratio of the horizontal to vertical stress depends on the type of soil, its geological origin, the temporary loads which may have acted on the surface of the soil and the topography.Soil suction and empirical correlations with in situ tests including static cone and dilatometer. The value of K i depends on the type of soil, its geological history, the loads which may have topography, the temporary acted on the ground surface and changes in ground strain or ground water regime due to natural or artificial causes.Where there has been no lateral strain within the ground, K i can be determinable from equated with K0 the coefficient one-dimensional consolidation and swelling tests conducted in a stress-path triaxial test using appropriate stress cycles. For normally consolidated soils, both granular and cohesive:ϕ'K(10) 1=s i n-For overconsolidated soils, K0is larger and may approach the passive value at shallow depths in a heavily overconsolidated clay, (see for example Lambe and Whitman, quoting Hendron and Wroth 1975).K i is not used directly in earth retaining structure design because the construction process always modifies this initial value. The value of K i is however, important in assessing the degree of deformation which will be induced as the earth pressure tends towards active or passive states. In normally consolidated soil the ground deformation necessary to mobilize the active condition will be small in relation to that required to mobilize the full passive resistance, while in heavily overconsolidated soil the required ground deformation will be of similar magnitude.Additional ground deformation is necessary for the structure to approach a failure condition with the earth pressures moving further towards their limiting active and passive values.Where a stressed support system is employed (e.g.ground anchorage) then the partial mobilization the active state on the retained side is reversed during installation of the system and,in the zone of support, the effective stress ratio in the soil may pass through the。

本科毕业设计的英文资料与中文翻译

本科毕业设计的英文资料与中文翻译

英文资料与中文翻译IEEE 802.11 MEDIUM ACCESS CONTROLThe IEEE 802.11 MAC layer covers three functional areas:reliable data delivery, medium access control, and security. This section covers the first two topics.Reliable Data DeliveryAs with any wireless network, a wireless LAN using the IEEE 802.11 physical and MAC layers is subject to considerable unreliability. Noise, interference, and other propagation effects result in the loss of a significant number of frames. Even with error-correction codes, a number of MAC frames may not successfully be received. This situation can be dealt with by reliability mechanisms at a higher layer. such as TCP. However, timers used for retransmission at higher layers are typically on the order of seconds. It is therefore more efficient to deal with errors at the MAC level. For this purpose, IEEE 802.11 includes a frame exchange protocol. When a station receives a data frame from another station. It returns an acknowledgment (ACK) frame to the source station. This exchange is treated as an atomic unit, not to be interrupted by a transmission from any other station. If the source does not receive an ACK within a short period of time, either because its data frame was damaged or because the returning ACK was damaged, the source retransmits the frame.Thus, the basic data transfer mechanism in IEEE802.11 involves an exchange of two frames. To further enhance reliability, a four-frame exchange may be used. In this scheme, a source first issues a request to send (RTS) frame to the destination. The destination then responds with a clear to send (CTS). After receiving the CTS, the source transmits the data frame, and the destination responds with an ACK. The RTS alerts all stations that are within reception range of the source that an exchange is under way; these stations refrain from transmission in order to avoid a collision between two frames transmitted at the same time. Similarly, the CTS alerts all stations that are within reception range of the destination that an exchange is under way. The RTS/CTS portion of the exchange is a required function of the MAC but may be disabled.Medium Access ControlThe 802.11 working group considered two types of proposals for a MAC algorithm: distributed access protocols, which, like Ethernet, distribute the decision to transmit over all the nodes using a carrier-sense mechanism; and centralized access protocols, which involve regulation of transmission by a centralized decision maker. A distributed access protocol makes sense for an ad hoc network of peer workstations (typically an IBSS) and may also be attractive in other wireless LAN configurations that consist primarily of burst traffic. A centralized access protocol is natural for configurations in which a umber of wireless stations are interconnected with each other and some sort of base station that attaches to a backbone wired LAN: it is especially useful if some of the data is time sensitive or high priority.The end result for 802.11 is a MAC algorithm called DFWMAC (distributed foundation wireless MAC) that provides a distributed access control mechanism with an optional centralized control built on top of that. Figure 14.5 illustrates the architecture. The lower sub-layer of the MAC layer is the distributed coordination function (DCF). DCF uses a contention algorithm to provide access to all traffic. Ordinary asynchronous traffic directly uses DCE. The point coordination function (PCF) is a centralized MAC algorithm used to provide contention-free service. PCF is built on top of DCF and exploits features of DCF to assure access for its users. Let us consider these two sub-layers in turn.MAClayerFigure 14.5 IEEE 802.11 Protocol ArchitectureDistributed Coordination FunctionThe DCF sub-layer makes use of a simple CSMA (carrier sense multiple access) algorithm, which functions as follows. If a station has a MAC frame to transmit, it listens to the medium. If the medium is idle, the station may transmit; otherwise the station must wait until the current transmission is complete before transmitting. The DCF does not include a collision detection function (i.e. CSMA/CD) because collision detection is not practical on a wireless network. The dynamic range of the signals on the medium is very large, so that a transmitting station cannot effectively distinguish incoming weak signals from noise and the effects of its own transmission.To ensure the smooth and fair functioning of this algorithm, DCF includes a set of delays that amounts to a priority scheme. Let us start by considering a single delay known as an inter-frame space (IFS). In fact, there are three different IFS values, but the algorithm is best explained by initially ignoring this detail. Using an IFS, the rules for CSMA access are as follows (Figure 14.6):Figure 14.6 IEEE 802.11 Medium Access Control Logic1. A station with a frame to transmit senses the medium. If the medium is idle. It waits to see if the medium remains idle for a time equal to IFS. If so , the station may transmit immediately.2. If the medium is busy (either because the station initially finds the medium busy or because the medium becomes busy during the IFS idle time), the station defers transmission and continues to monitor the medium until the current transmission is over.3. Once the current transmission is over, the station delays another IFS. If the medium remains idle for this period, then the station backs off a random amount of time and again senses the medium. If the medium is still idle, the station may transmit. During the back-off time, if the medium becomes busy, the back-off timer is halted and resumes when the medium becomes idle.4. If the transmission is unsuccessful, which is determined by the absence of an acknowledgement, then it is assumed that a collision has occurred.To ensure that back-off maintains stability, a technique known as binary exponential back-off is used. A station will attempt to transmit repeatedly in the face of repeated collisions, but after each collision, the mean value of the random delay is doubled up to some maximum value. The binary exponential back-off provides a means of handling a heavy load. Repeated failed attempts to transmit result in longer and longer back-off times, which helps to smooth out the load. Without such a back-off, the following situation could occur. Two or more stations attempt to transmit at the same time, causing a collision. These stations then immediately attempt to retransmit, causing a new collision.The preceding scheme is refined for DCF to provide priority-based access by the simple expedient of using three values for IFS:●SIFS (short IFS):The shortest IFS, used for all immediate responseactions,as explained in the following discussion●PIFS (point coordination function IFS):A mid-length IFS, used by thecentralized controller in the PCF scheme when issuing polls●DIFS (distributed coordination function IFS): The longest IFS, used as aminimum delay for asynchronous frames contending for access Figure 14.7a illustrates the use of these time values. Consider first the SIFS.Any station using SIFS to determine transmission opportunity has, in effect, the highest priority, because it will always gain access in preference to a stationwaiting an amount of time equal to PIFS or DIFS. The SIFS is used in the following circumstances:●Acknowledgment (ACK): When a station receives a frame addressed onlyto itself (not multicast or broadcast) it responds with an ACK frame after, waiting on1y for an SIFS gap. This has two desirable effects. First, because collision detection IS not used, the likelihood of collisions is greater than with CSMA/CD, and the MAC-level ACK provides for efficient collision recovery. Second, the SIFS can be used to provide efficient delivery of an LLC protocol data unit (PDU) that requires multiple MAC frames. In this case, the following scenario occurs. A station with a multi-frame LLC PDU to transmit sends out the MAC frames one at a time. Each frame is acknowledged after SIFS by the recipient. When the source receives an ACK, it immediately (after SIFS) sends the next frame in the sequence. The result is that once a station has contended for the channel, it will maintain control of the channel until it has sent all of the fragments of an LLC PDU.●Clear to Send (CTS):A station can ensure that its data frame will getthrough by first issuing a small. Request to Send (RTS) frame. The station to which this frame is addressed should immediately respond with a CTS frame if it is ready to receive. All other stations receive the RTS and defer using the medium.●Poll response: This is explained in the following discussion of PCF.longer than DIFS(a) Basic access methodasynchronous trafficdefers(b) PCF super-frame constructionFigure 14.7 IEEE 802.11 MAC TimingThe next longest IFS interval is the: PIFS. This is used by the centralized controller in issuing polls and takes precedence over normal contention traffic. However, those frames transmitted using SIFS have precedence over a PCF poll.Finally, the DIFS interval is used for all ordinary asynchronous traffic.Point C00rdination Function PCF is an alternative access method implemented on top of the DCE. The operation consists of polling by the centralized polling master (point coordinator). The point coordinator makes use of PIFS when issuing polls. Because PI FS is smaller than DIFS, the point coordinator call seize the medium and lock out all asynchronous traffic while it issues polls and receives responses.As an extreme, consider the following possible scenario. A wireless network is configured so that a number of stations with time, sensitive traffic are controlled by the point coordinator while remaining traffic contends for access using CSMA. The point coordinator could issue polls in a round—robin fashion to all stations configured for polling. When a poll is issued, the polled station may respond using SIFS. If the point coordinator receives a response, it issues another poll using PIFS. If no response is received during the expected turnaround time, the coordinator issues a poll.If the discipline of the preceding paragraph were implemented, the point coordinator would lock out all asynchronous traffic by repeatedly issuing polls. To prevent this, an interval known as the super-frame is defined. During the first part of this interval, the point coordinator issues polls in a round, robin fashion to all stations configured for polling. The point coordinator then idles for the remainder of the super-frame, allowing a contention period for asynchronous access.Figure l4.7 b illustrates the use of the super-frame. At the beginning of a super-frame, the point coordinator may optionally seize control and issues polls for a give period of time. This interval varies because of the variable frame size issued by responding stations. The remainder of the super-frame is available for contention based access. At the end of the super-frame interval, the point coordinator contends for access to the medium using PIFS. If the medium is idle. the point coordinator gains immediate access and a full super-frame period follows. However, the medium may be busy at the end of a super-frame. In this case, the point coordinator must wait until the medium is idle to gain access: this result in a foreshortened super-frame period for the next cycle.OctetsFC=frame control SC=sequence controlD/I=duration/connection ID FCS=frame check sequence(a ) MAC frameBitsDS=distribution systemMD=more data MF=more fragmentsW=wired equivalent privacy RT=retryO=orderPM=power management (b) Frame control filedFigure 14.8 IEEE 802.11 MAC Frame FormatMAC FrameFigure 14.8a shows the 802.11 frame format when no security features are used. This general format is used for all data and control frames, but not all fields are used in all contexts. The fields are as follows:● Frame Control: Indicates the type of frame and provides contr01information, as explained presently.● Duration/Connection ID: If used as a duration field, indicates the time(in-microseconds) the channel will be allocated for successful transmission of a MAC frame. In some control frames, this field contains an association, or connection, identifier.●Addresses: The number and meaning of the 48-bit address fields dependon context. The transmitter address and receiver address are the MAC addresses of stations joined to the BSS that are transmitting and receiving frames over the wireless LAN. The service set ID (SSID) identifies the wireless LAN over which a frame is transmitted. For an IBSS, the SSID isa random number generated at the time the network is formed. For awireless LAN that is part of a larger configuration the SSID identifies the BSS over which the frame is transmitted: specifically, the SSID is the MAC-level address of the AP for this BSS (Figure 14.4). Finally the source address and destination address are the MAC addresses of stations, wireless or otherwise, that are the ultimate source and destination of this frame. The source address may be identical to the transmitter address and the destination address may be identical to the receiver address.●Sequence Control: Contains a 4-bit fragment number subfield used forfragmentation and reassembly, and a l2-bit sequence number used to number frames sent between a given transmitter and receiver.●Frame Body: Contains an MSDU or a fragment of an MSDU. The MSDUis a LLC protocol data unit or MAC control information.●Frame Check Sequence: A 32-bit cyclic redundancy check. The framecontrol filed, shown in Figure 14.8b, consists of the following fields.●Protocol Version: 802.11 version, current version 0.●Type: Identifies the frame as control, management, or data.●Subtype: Further identifies the function of frame. Table 14.4 defines thevalid combinations of type and subtype.●To DS: The MAC coordination sets this bit to 1 in a frame destined to thedistribution system.●From DS: The MAC coordination sets this bit to 1 in a frame leaving thedistribution system.●More Fragments: Set to 1 if more fragments follow this one.●Retry: Set to 1 if this is a retransmission of a previous frame.●Power Management: Set to]if the transmitting station is in a sleep mode.●More Data: Indicates that a station has additional data to send. Each blockof data may be sent as one frame or a group of fragments in multiple frames.●WEP:Set to 1 if the optional wired equivalent protocol is implemented.WEP is used in the exchange of encryption keys for secure data exchange.This bit also is set if the newer WPA security mechanism is employed, as described in Section 14.6.●Order:Set to 1 in any data frame sent using the Strictly Ordered service,which tells the receiving station that frames must be processed in order. We now look at the various MAC frame types.Control Frames Control frames assist in the reliable delivery of data frames. There are six control frame subtypes:●Power Save-Poll (PS-Poll): This frame is sent by any station to the stationthat includes the AP (access point). Its purpose is to request that the AP transmit a frame that has been buffered for this station while the station was in power saving mode.●Request to Send (RTS):This is the first frame in the four-way frameexchange discussed under the subsection on reliable data delivery at the beginning of Section 14.3.The station sending this message is alerting a potential destination, and all other stations within reception range, that it intends to send a data frame to that destination.●Clear to Send (CTS): This is the second frame in the four-way exchange.It is sent by the destination station to the source station to grant permission to send a data frame.●Acknowledgment:Provides an acknowledgment from the destination tothe source that the immediately preceding data, management, or PS-Poll frame was received correctly.●Contention-Free (CF)-End: Announces the end of a contention-freeperiod that is part of the point coordination function.●CF-End+CF-Ack:Acknowledges the CF-End. This frame ends thecontention-free period and releases stations from the restrictions associated with that period.Data Frames There are eight data frame subtypes, organized into two groups. The first four subtypes define frames that carry upper-level data from the source station to the destination station. The four data-carrying frames are as follows: ●Data: This is the simplest data frame. It may be used in both a contentionperiod and a contention-free period.●Data+CF-Ack: May only be sent during a contention-free period. Inaddition to carrying data, this frame acknowledges previously received data.●Data+CF-Poll: Used by a point coordinator to deliver data to a mobilestation and also to request that the mobile station send a data frame that it may have buffered.●Data+CF-Ack+CF-Poll: Combines the functions of the Data+CF-Ack andData+CF-Poll into a single frame.The remaining four subtypes of data frames do not in fact carry any user data. The Null Function data frame carries no data, polls, or acknowledgments. It is used only to carry the power management bit in the frame control field to the AP, to indicate that the station is changing to a low-power operating state. The remaining three frames (CF-Ack, CF-Poll,CF-Ack+CF-Poll) have the same functionality as the corresponding data frame subtypes in the preceding list (Data+CF-Ack, Data+CF-Poll, Data+CF-Ack+CF-Poll) but withotit the data. Management FramesManagement frames are used to manage communications between stations and APs. The following subtypes are included:●Association Request:Sent by a station to an AP to request an association,with this BSS. This frame includes capability information, such as whether encryption is to be used and whether this station is pollable.●Association Response:Returned by the AP to the station to indicatewhether it is accepting this association request.●Reassociation Request: Sent by a station when it moves from one BSS toanother and needs to make an association with tire AP in the new BSS. The station uses reassociation rather than simply association so that the new AP knows to negotiate with the old AP for the forwarding of data frames.●Reassociation Response:Returned by the AP to the station to indicatewhether it is accepting this reassociation request.●Probe Request: Used by a station to obtain information from anotherstation or AP. This frame is used to locate an IEEE 802.11 BSS.●Probe Response: Response to a probe request.●Beacon: Transmitted periodically to allow mobile stations to locate andidentify a BSS.●Announcement Traffic Indication Message: Sent by a mobile station toalert other mobile stations that may have been in low power mode that this station has frames buffered and waiting to be delivered to the station addressed in this frame.●Dissociation: Used by a station to terminate an association.●Authentication:Multiple authentication frames are used in an exchange toauthenticate one station to another.●Deauthentication:Sent by a station to another station or AP to indicatethat it is terminating secure communications.IEEE802.11 媒体接入控制IEEE 802.11 MAC层覆盖了三个功能区:可靠的数据传送、接入控制以及安全。

山东建筑大学本科毕业设计说明书外文文献及翻译格式模版1.doc

山东建筑大学本科毕业设计说明书外文文献及翻译格式模版1.doc

山东建筑大学本科毕业设计说明书外文文献及翻译格式模版1附件3:(本科毕业论文)文献、资料题目:院(部)专班姓名:张三学号:指导教师:张九光翻译日期:2005.6.30,the National Institute of Standards and Technology (NIST) has been working to develop a new encryption standard to keep government information secure .The organization is in the final stages of an open process of selecting one or more algorithms ,or data-scrambling formulas ,for the new Advanced Encryption Standard (AES) and plans to make adecision by late summer or early fall .The standard is slated to go into effect next year .AES is intended to be a stronger ,more efficient successor to Triple Data Encryption Standard (3DES),which replaced the aging DES ,which was cracked in less than three days in July 1998.“Until we have the AES ,3DES will still offer protection for years to come .So there is no need to immediately switch over ,”says Edward Roback ,acting chief of the computer security division at NIST and chairman of the AES selection committee .“What AES will offer is a more efficient algorithm .It will be a federal standard ,but it will be widely implemented in the IT community .”According to Roback ,efficiency of the proposed algorithms is measured by how fast they can encrypt and decrypt information ,how fast they can present an encryption key and how much information they can encrypt .The AES review committee is also looking at how much space the algorithm takes up on a chip and how much memory it requires .Roback says the selection of a more efficient AES will also result in cost savings and better use of resources .“DES w as designed for hardware implementations ,and we are now living in a world of much more efficient software ,and we have learned an awful lot about the design of algorithms ,”says Roback .“When you start multiplying this with the billions of implementations done daily ,the saving on overhead on the networks will be enormous .”……山东建筑大学毕业设计(或毕业论文,二选一)外文文献及译文- 1 -以确保政府的信息安全。

(完整版)_毕业设计英文翻译_及格式

(完整版)_毕业设计英文翻译_及格式

毕业设计(论文)英文翻译题目专业班级姓名学号指导教师职称200年月日The Restructuring of OrganizationsThroughout the 1990s, mergers and acquisitions a major source of corporate restructuring, affecting millions of workers and their families. This form of restructuring often is accompanied by downsizing. Downsizing is the process of reducing the size of a firm by laying off or retiring workers early. The primary objectives of downsizing are similar in U.S. companies and those in other countries:●cutting cost,●spurring decentralization and speeding up decision making,●cutting bureaucracy and eliminating layers of especially they did five years ago. One consequence of this trend is that today’s managers supervise larger numbers of subordinates who report directly to them. In 1990, only about 20 percent of managers supervise twelve or more people and 54 percent supervised six or fewer.Because of downsizing, first-line managers quality control, resources, and industrial engineering provide guidance and support. First-line managers participate in the production processes and other line activities and coordinate the efforts of the specialists as part of their jobs. At the same time, the workers that first-line managers supervise are less willing to put up with authoritarian management. Employees want their jobs to be more creative, challenging, fun, and satisfying and want to participate in decisions affecting their work. Thus self-managed work teams that bring workers and first-line managers together to make joint decisions to improve the way they do their jobs offer a solution to both supervision and employee expectation problems. When you ’t always the case. Sometimes entire divisions of a firm are simply spun off from the main company to operate on their own as new, autonomous companies. The firm that spun them off may then become one of their most important customers or suppliers. That AT&T “downsized” the old Bell Labs unit, which is now known as Lucent Technologies. Now, rather than - return is free to enter into contracts with companies other than AT&T. this method of downsizing is usually called outsourcing.Outsourcing means letting other organizations perform a needed service andor manufacture needed parts or products. Nike outsources the production of its shoes to low-cost plants in South Korea and China and imports the shoes for distribution in North America. These same plants also ship shoes to Europe and other parts of Asia for distribution. Thus today’s managers face a new challenge: t o plan, organize, lead, and control a company that may as a modular corporation. The modularcorporation is most is most common in three industries: apparel, auto manufacturing, and electronics. The most commonly out-sourced function is production. By out sourcing production, a company can switch supplier best suited to a customer’s needs.Decisions about what to outsource and what to keep in- to contract production to another company is a sound business decision to contract production to another company is a sound business decision, at least for U.S. manufacturers. It appears to the unit cost of production by relieving the company of some overhead, and it frees the company to allocate scarce resources to activities for which the company examples of modular companies are Dell Computer, Nike, Liz Claiborne fashions, and ship designer Cyrix.As organizations downsize and outsource functions, they become flatter and smaller. Unlike the behemoths of the past, the new, smaller firms are less like autonomous fortresses and more like nodes in a net work of complex relationships. This approach, called the network form of organization, involves establishing strategic alliances among several entities.In Japan, cross-ownership and alliances among firms-called keiretsu-both foreign and U.S. auto parts producers. It also owns 49 percent of Hertz, the car rental company that is also a major customer. Other alliances include involvement in several research consortia. In the airline industry, a common type of alliance is between an airline and an airframe manufacture. For example, Delta recently agreed to buy all its aircraft from Boeing. Boeing Airlines. Through these agreements, Boeing guarantees that it will be able to sell specified models of its aircraft and begin to adapt their operations to the models they will be flying in the future. Thus both sides expect to reap benefits from these arrangements for many years.Networks forms of organizations are prevalent in access to the universities and in small, creative organizations. For example, the U.S. biotechnology industry is characterized by network of relationships between new biotechnology firms dedicated to research and new products development and established firms in industries that can use these new products, such as pharmaceuticals. In return for sharing technical information with the larger firms, the smaller firms gain access to their partners’ resources for product testing, marketing, and distribution. Big pharmaceutical firms such as Merk or Eli Lily gain from such partnerships because the smaller firms typically development cycle in the larger firms.Being competitive increasingly requires establishing and managing strategic alliances with other firms. In a strategic alliance, two or more firms agree to cooperate in a venture that is expected to benefit both firms.企业重组整个20世纪90年代中,合并和收购一直是企业重组的主要起源,影响着千百万的工人和他们的家庭。

毕业设计(论文)外文翻译【范本模板】

毕业设计(论文)外文翻译【范本模板】

华南理工大学广州学院本科生毕业设计(论文)翻译英文原文名Review of Vibration Analysis Methods for Gearbox Diagnostics and Prognostics中文译名对变速箱振动分析的诊断和预测方法综述学院汽车工程学院专业班级车辆工程七班学生姓名刘嘉先学生学号201130085184指导教师李利平填写日期2015年3月15日英文原文版出处:Proceedings of the 54th Meeting of the Society for Machinery Failure Prevention Technology, Virginia Beach,V A, May 1-4,2000,p. 623-634译文成绩:指导教师(导师组长)签名:译文:简介特征提取技术在文献中有描述;然而,大多数人似乎掩盖所需的特定的预处理功能。

一些文件没有提供足够的细节重现他们的结果,并没有一个全面的比较传统的功能过渡齿轮箱数据。

常用术语,如“残差信号”,是指在不同的文件不同的技术.试图定义了状态维修社区中的常用术语和建立所需的特定的预处理加工特性。

本文的重点是对所使用的齿轮故障检测功能。

功能分为五个不同的组基于预处理的需要。

论文的第一部分将提供预处理流程的概述和其中每个特性计算的处理方案。

在下一节中,为特征提取技术描述,将更详细地讨论每一个功能。

最后一节将简要概述的宾夕法尼亚州立大学陆军研究实验室的CBM工具箱用于齿轮故障诊断。

特征提取概述许多类型的缺陷或损伤会增加机械振动水平。

这些振动水平,然后由加速度转换为电信号进行数据测量。

原则上,关于受监视的计算机的健康的信息被包含在这个振动签名。

因此,新的或当前振动签名可以与以前的签名进行比较,以确定该元件是否正常行为或显示故障的迹象。

在实践中,这种比较是不能奏效的。

由于大的变型中,签名的直接比较是困难的。

相反,一个涉及从所述振动署名数据特征提取更多有用的技术也可以使用。

本科毕业设计外文文献翻译

本科毕业设计外文文献翻译

(Shear wall st ructural design ofh igh-lev el fr ameworkWu Jiche ngAbstract : In t his pape r the basic c oncepts of man pow er from th e fra me sh ear w all str uc ture, analy sis of the struct ur al des ign of th e c ont ent of t he fr ame she ar wall, in cludi ng the seism ic wa ll she ar spa本科毕业设计外文文献翻译学校代码: 10128学 号:题 目:Shear wall structural design of high-level framework 学生姓名: 学 院:土木工程学院 系 别:建筑工程系 专 业:土木工程专业(建筑工程方向) 班 级:土木08-(5)班 指导教师: (副教授)nratiodesign, and a concretestructure in themost co mmonly usedframe shear wallstructurethedesign of p oints to note.Keywords: concrete; frameshearwall structure;high-risebuildingsThe wall is amodern high-rise buildings is an impo rtant buildingcontent, the size of theframe shear wall must comply with building regulations. The principle is that the largersizebut the thicknessmust besmaller geometric featuresshouldbe presented to the plate,the force is close to cylindrical.The wall shear wa ll structure is a flatcomponent. Itsexposure to the force along the plane level of therole ofshear and moment, must also take intoaccountthe vertical pressure.Operate under thecombined action ofbending moments and axial force andshear forcebythe cantilever deep beam under the action of the force levelto loo kinto the bottom mounted on the basis of. Shearwall isdividedinto a whole walland theassociated shear wall in theactual project,a wholewallfor exampl e, such as generalhousingconstruction in the gableor fish bone structure filmwalls and small openingswall.Coupled Shear walls are connected bythecoupling beam shear wall.Butbecause thegeneralcoupling beamstiffness is less thanthe wall stiffnessof the limbs,so. Walllimb aloneis obvious.The central beam of theinflection pointtopay attentionto thewall pressure than the limits of the limb axis. Will forma shortwide beams,widecolumn wall limbshear wall openings toolarge component atbothen ds with just the domain of variable cross-section ro din the internalforcesunder theactionof many Walllimb inflection point Therefore, the calcula tions and construction shouldAccordingtoapproximate the framestructure to consider.The designof shear walls shouldbe based on the characteristics of avariety ofwall itself,and differentmechanical ch aracteristicsand requirements,wall oftheinternalforcedistribution and failuremodes of specific and comprehensive consideration of the design reinforcement and structural measures. Frame shear wall structure design is to consider the structure of the overall analysis for both directionsofthehorizontal and verticaleffects. Obtain theinternal force is required in accordancewiththe bias or partial pull normal section forcecalculation.The wall structure oftheframe shear wall structural design of the content frame high-rise buildings, in the actual projectintheuse of themost seismic walls have sufficient quantitiesto meet thelimitsof the layer displacement, the location isrelatively flexible. Seismic wall for continuous layout,full-length through.Should bedesigned to avoid the wall mutations in limb length and alignment is notupand down the hole. The sametime.The inside of the hole marginscolumnshould not belessthan300mm inordertoguaranteethelengthof the column as the edgeof the component and constraint edgecomponents.Thebi-direc tional lateral force resisting structural form of vertical andhorizontalwallconnected.Each other as the affinityof the shear wall. For one, two seismic frame she ar walls,even beam highratio should notgreaterthan 5 and a height of not less than400mm.Midline columnand beams,wall midline shouldnotbe greater tha nthe columnwidthof1/4,in order toreduce thetorsional effect of the seismicaction onthecolumn.Otherwisecan be taken tostrengthen thestirrupratio inthe column tomake up.If theshear wall shearspan thanthe big two. Eventhe beamcro ss-height ratiogreaterthan 2.5, then the design pressure of thecut shouldnotmakeabig 0.2. However, if the shearwallshear spanratioof less than two couplingbeams span of less than 2.5, then the shear compres sion ratiois notgreater than 0.15. Theother hand,the bottom ofthe frame shear wallstructure to enhance thedesign should notbe less than200mmand notlessthanstorey 1/16,otherpartsshouldnot be less than 160mm and not less thanstorey 1/20. Aroundthe wall of the frame shear wall structure shouldbe set to the beam or dark beamand the side columntoform a border. Horizontal distributionofshear walls can from the shear effect,this design when building higher longeror framestructure reinforcement should be appropriatelyincreased, especially in the sensitiveparts of the beam position or temperature, stiffnesschange is bestappropriately increased, thenconsideration shouldbe givento the wallverticalreinforcement,because it is mainly from the bending effect, andtake in some multi-storeyshearwall structurereinforcedreinforcement rate -likelessconstrained edgeofthecomponent or components reinforcement of theedge component.References: [1 sad Hayashi,He Yaming. On the shortshear wall high-rise buildingdesign [J].Keyuan, 2008, (O2).高层框架剪力墙结构设计吴继成摘要: 本文从框架剪力墙结构设计的基本概念人手, 分析了框架剪力墙的构造设计内容, 包括抗震墙、剪跨比等的设计, 并出混凝土结构中最常用的框架剪力墙结构设计的注意要点。

大学本科毕业设计--英文原文+中文翻译

大学本科毕业设计--英文原文+中文翻译

Library of C the CNC industrialdeveloped tens of thousands and educational field, he hasNUMERICAL CONTROLNumerical Control technology as it is known today, emerged in the mid 20th century. It can be traced to the year of 1952, the U.S. Air Force, and the names of John Parsons and the Massachusetts Institute of Technology in Cam-bridge, MA, USA. It was not applied in production manu-facturing until the early 1960's. The real boom came in the form of CNC, around the year of 1972, and a decade later with the introduction of affordable micro computers. The history and development of this fascinating technology has been well documented in many publications.In the manufacturing field, and particularly in the area of metal working, Numerical Control technology has caused something of a revolution. Even in the days before comput-ers became standard fixtures in every company and in many homes, the2machine tools equipped with Numerical Control system found their special place in the machine shops. The recent evolution of micro electronics and the never ceasing computer development, including its impact on Numerical Control, has brought significant changes to the manufacturing sector in general and metalworking in-dustry in particular.DEFINITION OF NUMERICAL CONTROLIn various publications and articles, many descriptions have been used during the years, to define what Numerical Control is. It would be pointless to try to find yet another definition, just for the purpose of this handbook. Many of these definitions share the same idea, same basic concept, just use different wording.The majority of all the known definitions can be summed up into a relatively simple statement:Numerical Control can be defined as an operation of machine tools by the means of specifically coded instructions to the machine control systemThe instructions are combinations of the letters of alpha-bet, digits and selected symbols, for example, a decimal point, the percent sign or the parenthesis symbols. All in-structions are written in a logical order and a predetermined form. The collectionNUMERICAL CONTROLof all instructions necessary to ma-chine a part is called an NC Program, CNC Program, or a Part Program. Such a program can be stored for a future use and used repeatedly to achieve identical machining re-sults at any time.♦ NC and CNC TechnologyIn strict adherence to the terminology, there is a differ-ence in the meaning of the abbreviations NC and CNC. The NC stands for the older and original Numerical Control technology, whereby the abbreviation CNC stands for the newer Computerized Numerical Control technology, a modem spin-off of its older relative. However, in practice, CNC is the preferred abbreviation. To clarify the proper us-age of each term, look at the major differences between the NC and the CNC systems.Both systems perform the same tasks, namely manipula-tion of data for the purpose of machining a part. In both cases, the internal design of the control system contains the logical instructions that process the data. At this point the similarity ends. The NC system (as opposed to the CNC system) uses a fixed logical functions, those that are built-in and perma-nently wired within the control unit. These functions can-not be changed by the programmer or the machine opera-tor. Because of the fixed4wiring of the control logic, the NC control system is synonymous with the term 'hardwired'. The system can interpret a part program, but it does not al-low any changes to the program, using the control features. All required changes must be made away from the control, typically in an office environment. Also, the NC system re-quires the compulsory use of punched tapes for input of the program information.The modem CNC system, but not the old NC system, uses an internal micro processor (i.e., a computer). This computer contains memory registers storing a variety of routines that are capable of manipulating logical functions. That means the part programmer or the machine operator can change the program on the control itself (at the ma-chine), with instantaneous results. This flexibility is the greatest advantage of the CNC systems and probably the key element that contributed to such a wide use of the tech-nology in modern manufacturing. The CNC programs and the logical functions are stored on special computer chips, as software instructions, rather than used by the hardware connections, such as wires, that control the logical func-tions. In contrast to the NC system, the CNC system is syn-onymous with the term 'softwired'.NUMERICAL CONTROLWhen describing a particular subject that relates to the numerical control technology, it is customary to use either the term NC or CNC. Keep in mind that NC can also mean CNC in everyday talk, but CNC can never refer to the older technology, described in this handbook under the abbrevia-tion ofNC. The letter 'C 'stands for Computerized, and it is not applicable to the hardwired system. All control systems manufactured today are of the CNC design. Abbreviations such as C&C or C'n 'C are not correct and reflect poorly on anybody that uses them.CONVENTIONAL AMD CNC MACHININGWhat makes the CNC machining superior to the conven-tional methods? Is it superior at all? Where are the main benefits? If the CNC and the conventional machining pro-cesses are compared, a common general approach to ma-chining a part will emerge: Obtain and study the drawingSelect the most suitable machining methodDecide on the setup method (work holding)Select the cutting toolsEstablish speeds and feedsMachine the part6This basic approach is the same for both types of machin-ing. The major difference is in the way how various data are input. A feedrate of 10 inches per minute (10 in/min) is the same in manual or CNC applications, but the method of applying it is not. The same can be said about a coolant - it can be activated by turning a knob, pushing a switch or programming a special code. All these actions will result in a coolant rushing out of a nozzle. In both kinds of machin-ing, a certain amount of knowledge on the part of the user is required. After all, metal working, particularly metal cut-ting, is mainly a skill, but it is also, to a great degree, an art and a profession of large number of people. So is theappli-cation of Computerized Numerical Control. Like any skill or art or profession, mastering it to the last detail is neces-sary to be successful. It takes more than technical knowl-edge to be a CNC machinist or a CNC programmer. Work experience and intuition, and what is sometimes called a 'gut-feel', is a much needed supplement to any skill.In a conventional machining, the machine operator sets up the machine and moves each cutting tool, using one or both hands, to produce the required part. The design of a manual machine tool offers many features that help the process of machining a part -NUMERICAL CONTROLlevers, handles, gears and di-als, to name just a few. The same body motions are re-peated by the operator for every part in the batch. However, the word 'same 'in this context really means'similar 'rather than 'identical'. Humans are not capable to repeat every process exactly the same at all times - that is the job ofma-chines. People cannot work at the same performance level all the time, without a rest. All of us have some good andsome bad moments. The results of these moments, when*applied to machining a part, are difficult to predict. There will be some differences and inconsistencies within each batch of parts. The parts will not always be exactly the same. Maintaining dimensional tolerances and surface fin-ish quality are the most typical problems in conventional machining. Individual machinists may have their own time 'proven' methods, different from those of their fellow col-leagues. Combination of these and other factors create a great amount of mconsistency.The machining under numerical control does away with the majority of inconsistencies. It does not require the same physical involvement as manual machining. Numerically controlled machining does not need any levers or dials or handles, at least8not in the same sense as conventional ma-chining does. Once the part program has been proven, it can be used any number of times over, always returning consistent results. That does not mean there are no limiting factors. The cutting tools do wear out, the material blank in one batch is not identical to the material blank in another batch, the setups may vary, etc. These factors should be considered and compensated for, whenever necessary.The emergence of the numerical control technology does not mean an instant, or even a long term, demise of all man-ual machines. There are times when a traditional machin-ing method is preferable to a computerized method. For ex-ample, a simple one time job may be done more efficiently on a manual machine than a CNC machine. Certain types of machining jobs will benefit from manual or semiauto-matic machining, rather than numerically controlled ma-chining. The CNC machine tools are not meant to replace every manual machine, only to supplement them.In many instances, the decision whether certain machin-ing will be done on a CNC machine or not is based on the number of required parts and nothing else. Although the volume of partsNUMERICAL CONTROLmachined as a batch is always an important criteria, it should never be the only factor. Consideration should also be given to the part complexity, its tolerances, the required quality of surface finish, etc. Often, a single complex part will benefit from CNC machining, while fifty relatively simple parts will not.Keep in mind that numerical control has never machined a single part by itself. Numerical control is only a process or a method that enables a machine tool to be used in a pro-ductive, accurate and consistent way.NUMERICAL CONTROL ADVANTAGESWhat are the main advantages of numerical control?It is important to know which areas of machining will benefit from it and which are better done the conventional way. It is absurd to think that a two horse power CNC mill will win over jobs that are currently done on a twenty times more powerful manual mill. Equally unreasonable are ex-pectations of great improvements in cutting speeds and feedrates over a conventional machine. If the machining and tooling conditions are the same, the cutting time will be very close in both cases.Some of the major areas where the CNC user can and should expect improvement:10Setup time reductionLead time reductionAccuracy and repeatabilityContouring of complex shapesSimplified tooling and work holdingConsistent cutting timeGeneral productivity increaseEach area offers only a potential improvement. Individ-ual users will experience different levels of actual improve-ment, depending on the product manufactured on-site, the CNC machine used, the setup methods, complexity of fixturing, quality of cutting tools, management philosophy and engineering design, experience level of the workforce, individual attitudes, etc.Setup Time ReductionIn many cases, the setup time for a CNC machine can be reduced, sometimes quite dramatically. It is important to realize that setup is a manual operation, greatly dependent on the performance of CNC operator, the type of fixturing and general practices of the machine shop. Setup time is unproductive, but necessary - it is a part of the overhead costs of doing business. To keep the setupNUMERICAL CONTROLtime to a mini-mum should be one of the primary considerations of any machine shop supervisor, programmer and operator. Because of the design of CNC machines, the setup time should not be a major problem. Modular fixturing, standard tooling, fixed locators, automatic tool changing, pallets and other advanced features, make the setup time more efficient than a comparable setup of a conventional machine. With a good knowledge of modern manufacturing, productivity can be increased significantly.The number of parts machined under one setup is also important, in order to assess the cost of a setup time. If a great number of parts is machined in one setup, the setup cost per part can be very insignificant. A very similar re-duction can be achieved by grouping several different oper-ations into a single setup. Even if the setup time is longer, it may be justified when compared to the time required to setup several conventional machines.Lead Time ReductionOnce a part program is written and proven, it is ready to be Bsed again in the future, even at a short notice. Although the lead time for the first run is usually longer, it is virtually nil for any subsequent run. Even if an engineering change of the part design12requires the program to be modi tied, it can be done usually quickly, reducing the lead time.Long lead time, required to design and manufacture sev-eral special fixtures for conventional machines, can often be reduced by preparing a part program and the use of sim-plified fixturing. Accuracy and RepeatabilityThe high degree of accuracy and repeatability of modern CNC machines has been the single major benefit to many users. Whether the part program is stored on a disk or in the computer memory, or even on a tape (the original method), it always remains the same. Any program can be changed at will, but once proven, no changes are usually required any more. A given program can be reused as many times as needed, without losing a single bit of data it contains. True, program has to allow for such changeable factors as tool wear and operating temperatures, it has to be stored safely, but generally very little interference from the CNC pro-grammer or operator will be required. The high accuracy of CNC machines and their repeatability allows high quality parts to be produced consistently time after time. Contouring of Complex ShapesNUMERICAL CONTROLCNC lathes and machining centers are capable of con-touring a variety of shapes. Many CNC users acquired their machines only to be able to handle complex parts. A good examples are CNC applications in the aircraft and automo-tive industries. The use of some form of computerized pro-gramming is virtually mandatory for any three dimensional tool path generation.Complex shapes, such as molds, can be manufactured without the additional expense of making a model for trac-ing. Mirrored parts can be achieved literally at the switch of a button. Storage of programs is a lot simpler than storage of patterns, templates, wooden models, and other pattern making tools.Simplified Tooling and Work HoldingNonstandard and 'homemade' tooling that clutters the benches and drawers around a conventional machine can be eliminated by using standard tooling, specially designed for numerical control applications. Multi-step tools such as pilot drills, step drills, combination tools, counter borers and others are replaced with several individual standard tools. These tools are often cheaper and easier to replace than special and nonstandard tools.Cost-cutting measures have forced many tool suppliers to keep a low or even a nonexistent inventory, increasing the delivery lime14to the customer. Standard, off-the-shelf tooling can usually beob-tained faster then nonstandard tooling.Fixturing and work holding for CNC machines have only one major purpose - to hold the part rigidly and in the same position for all parts within a batch. Fixtures designed for CNC work do not normally require jigs, pilot holes and other hole locating aids.♦ Cutting Time and Productivity IncreaseThe cutting time on the CNC machine is commonly known as the cycle time - and is always consistent. Unlike a conventional machining, where the operator's skill, experi-ence and personal fatigue are subject to changes, the CNC machining is under the control of a computer. The small amount of manual work is restricted to the setup andload-ing and unloading the part. For large batch runs, the high cost of the unproductive time is spread among many parts, making it less significant. The main benefit of a consistent cutting time is for repetitive jobs, where the production scheduling and work allocation to individual machine tools can be done very accurately.The main reason companies often purchase CNCma-chines is strictly economic - it is a serious investment. Also, having a competitive edge is always on the mind of every plant manager. The numerical control teclmology offers excellent means to achieve a significant improvement in the manufacturing productivity and increasing the overall quality of the manufactured parts. Like any means, it has to be used wisely and knowledgeably. When more and more companies use the CNCtechnology, just having a CNC machine does not offer the extra edge anymore. Thecom-panies that get forward are those who know how to use the technology efficiently and practice it to be competitive in the global economy.To reach the goal of a major increase in productivity, it is essential that users understand the fundamental principles on which CNC technology is based. These principles take many forms, for example, understanding the electronic cir-cuitry, complex ladder diagrams, computer logic, metrol-ogy, machine design, machining principles and practices and many others. Each one has to be studied and mastered by the person in charge. In this handbook, the emphasis is on the topics that relate directly to the CNC programming and understanding the most common CNC machine tools, the Machining Centers and the lathes (sometimes also called the Turning Centers). The part quality consideration should be very important to every programmer and ma-chine tool operator and this goal is also reflected in the handbook approach as well as in the numerous examples.TYPES OF CNC MACHINE TOOLSDifferent kinds of CNCmachines cover an extremelylarge variety. Their numbersare rapidly increasing, as thetechnology developmentadvances. It is impossible toiden-tify all the applications,they would make a long list.Here is a brief list of some ofthe groups CNC machines canbe part of: *Mills and Machining centersLathes and Turning CentersDrilling machines CNC machining centers andlathes dominate the number ofinstallations in industry. Thesetwo groups share the marketjust about equally. Someindustries may have a higherneed for one group ofmachines, depending on their □ Boring mills and Profilers □ EDM machines □ Punch presses and Shears □ Flame cutting machines □ Routers □ Water jet and Laser profilers □ Cylindrical grinders □ Welding machines □ Benders, Winding and Spinning machines, etc.needs. One must remember that there are many different kinds of ladies and equally many different kinds ofma-chining centers. However, the programming process for a vertical machine is similar to the one for a horizontalma-chine or a simple CNC mill. Even between differentma-chine groups, there is a great amount of general applica-tions and the programming process is generally the same. For example, a contour milled with an end mill has a lot in common with a contour cut with a wire.♦ Mills and Machining Centers Standard number of axes on a milling machine is three - the X, Y and Z axes. The part set on a milling system is al-ways stationary, mounted on a moving machine table. The cutting tool rotates, it can move up and down (or in and out), but it does not physically follow the tool path.CNC mills - sometimes called CNC milling machines - are usually small, simple machines, without a tool changer or other automatic features. Their power rating is often quite low. In industry, they are used for toolroom work, maintenance purposes, or small part production. They are usuallydesigned for contouring, unlike CNC drills.CNC machining centers are far more popular and effi-cient than drills and mills, mainly for their flexibility. The main benefit the user gets out of a CNC machining center is the ability to group several diverse operations into a single setup. For example, drilling, boring, counter boring, tap-ping, spot facing and contour milling can be incorporated into a single CNC program. In addition, the flexibility is enhanced by automatic tool changing, using pallets to minimize idle time, indexing to a different side of the part, using a rotary movement of additional axes, and a number of other features. CNC machining centers can be equipped with special software that controls the speeds and feeds, the life of the cutting tool, automatic in-process gauging and offset adjustment and other production enhancing and time saving devices.There are two basic designs of a typical CNC machining center. They are the vertical and the horizontal machining centers. The major difference between the two types is the nature of work that can be done on them efficiently. For a vertical CNC machining center, the most suitable type of work are flat parts, either mounted to the fixture on the ta-ble, or held in a vise or a chuck. The work that requires ma-chining on two or more faces m a single setup is more de-sirable to be done on a CNC horizontal machining center. An good example is a pump housing and other cubic-like shapes. Some multi-face machining of small parts can also be done on a CNC vertical machining center equipped with a rotary table.The programming process is the same for both designs, but an additional axis (usually a B axis) is added to the hori-zontal design. This axis is either a simple positioning axis (indexing axis) for the table, or a fully rotary axis for simul-taneous contouring. This handbook concentrates on the CNC vertical ma-chining centers applications, with a special section dealing with the horizontal setup and machining. The program-ming methods are also applicable to the small CNC mills or drilling and/or tapping machines, but the programmer has to consider their restrictions.♦ Lathes and Turning CentersA CNC lathe is usually a machine tool with two axes, the vertical X axis and the horizontal Z axis. The main feature of a lathe that distinguishes it from a mill is that the part is rotating about the machine center line. In addition, the cut-ting tool is normally stationary, mounted in a sliding turret. The cutting tool follows the contour of the programmed tool path. For the CNC lathes with a milling attachment, so called live tooling, the milling tool has its own motor and rotates while the spindle is stationary.The modem lathe design can be horizontal or vertical. Horizontal type is far more common than the vertical type, but both designs have their purpose in manufacturing. Sev-eral different designs exist for either group. For example, a typical CNC lathe of the horizontal group can be designed with a flat bed or a slant bed, as a bar type, chucker type or a universal type. Added to these combinations are many ac-cessories that make a CNC lathe an extremely flexible ma-chine tool. Typically, accessories such as a tailstock, steady rests or follow-up rests, part catchers,pullout-fingers and even a third axis milling attachment are popular compo-nents of the CNC lathe. ?CNC lathe can be veiy versatile - so versatile in fact, that it is often called a CNC TurningCenter. All text and program examples in this handbook use the more traditional term CNC lathe, yet still recogniz-ing all its modern functions.中文翻译:数控正如我们现在所知,数控技术出现于20世纪中叶。

(完整版)本科_毕业设计(论文)外文翻译_格式

(完整版)本科_毕业设计(论文)外文翻译_格式

本科毕业设计(论文)外文翻译译文
学生姓名:李浩
院(系):机械工程学院
专业班级:装备1001
指导教师:李晓红
完成日期: 2014 年 3 月 10日
要求
1、外文翻译是毕业设计(论文)的主要内容之一,必须学生独立完
成。

2、外文翻译译文内容应与学生的专业或毕业设计(论文)内容相关,
不得少于15000印刷符号。

3.外文翻译译文用A4纸打印。

文章标题用3号宋体,章节标题用4
号宋体,正文用小4号宋体,20磅行距;页边距上、下、左、右均为2.5cm,
左侧装订,装订线0.5cm。

按中文翻译在上,外文原文在下的顺序装订。

4、年月日等的填写,用阿拉伯数字书写,要符合《关于出版物上数字用法的试行规定》,如“2005年2月26日”。

5、所有签名必须手写,不得打印。

文献名称(中文)
文献名称(外文)
作者: ***
起止页码:
出版日期(期刊号):
出版单位:(以上文字用小4号宋体,数字、字母用Times New Roman 体)
外文翻译译文:(小4号宋体)。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Computer networking summarizeNetworking can be defined as the linking of people, resources and ideas. Networking occurs via casual encounters, meetings, telephone conversation, and the printed words. Now the computer networking provide beings with new networking capabilities. Computer network are important for services because service tasks are information intensive. During the is transmitted between clients, coworkers, management, funding sources, and policy makers. Tools with rapidly speed up communication will dramatically affect services.Computer network growing explosively. Two decades ago, few people essential part of our infrastructure. Networking is used in every aspect of business, including advertising, production, shipping, planning, bulling, and accounting. Consequently, most corporations in on-line libraries around the world. Federal, state, and local government offices use networks, as do military organizations. In short, computer networks are everywhere.The growth in networking economic impact as well. An entire industry jobs for people with more networking expertise. Companies need workers to plan, acquire, install, operate, and manage the addition computer programming is no longer restricted to individual computers; programmers are expected to design and implement application software that can communicate with software on other computers.Computer networks link computers by communication lines and software protocols, allowing data to be exchanged rapidly and reliably. Traditionally, they split between wide area networks (WANs) and local area networks (LANs). A WAN is a network connected over long-distance telephone lines, and a LAN is a localized network usually in one building or a group of buildings close together. The distinction, computers. Today networks carry e-mail, provide access to public databases, and are beginning to be used for distributed systems. Networks also allow users in one locality to share expensive resources, such as printers and disk-systems.Distributed computer systems are built using networked computers that cooperate to perform tasks. In this environment, each part of the networked system does what it is best at. The of a personal computer or workstation provides a good user interface. The mainframe, on the other the results to the users. In a distributed environment, a user might use in a special language (e. g. Structured Query Language-SQL), to the mainframe, which then parrrses the query, returning the user only the data requested. The user might then use the data. By passing back the user’s PC only the specific information requested, network traffic is reduced. If the whole file were transmitted, the PC would then of one network to access the resources on a different type of network. For example, a gateway could be used to connect a local area network of personal computers to a mainframe computer network. For example, if a company this example, using a bridge makes more sense than joining all thepersonal computers together in one large network because the individual departments only occasionally need to access information on the other network.Computer networking technology can be divided into four major aspects.The first is the data transmission. It explains that at the lowest level electrical signals traveling across wires are used to carry information, and shows be encoded using electrical signals.The second focuses on packet transmission. It explains why computer network use packets, and shows . LANs and WANs discussed above are two basic network.The third covers internetworking—the important idea that allows system, and TCPIP, the protocol technology used in global internet.The fourth explains networking applications. It focuses on , and programs provide services such as electronic mail and Web browsing.Continued growth of the global Internet is one of most interesting and exciting phenomena in networking. A decade ago, the Internet was a research project that involved a few dozen sites. Today, the Internet into a production communication system that reaches millions of people in almost all countries on all continents around the world. In the United States, the Internet connects most corporations, colleges and universities, as well as federal, state, and local government offices. It will soon reach most elementary,junior, and senior addition, many private residences can reach the Internet through a dialup telephone connection. Evidence of the Internet’s impact on society can be seen in advertisements, in magazines and on television, which often contain a reference to an Internet Web site that provide additional information about the advertiser’s products and services.A large organization with diverse networking requirements needs multiple physical networks. More important, if the organization chooses the type network that is best for each task, the organization will network can only communicate with other computers attached to same network. The problem became evident in the 1970s as large organizations began to acquire multiple networks. Each network in the organizations formed an island. In many early installations, each computer attached to a single network and employees employees was given access to multiple svreens and keyboards, and the employee was forced to move form one computer to another to send a massage across the appropriate network. Users are neither satisfied nor productive when they must use a separate computer. Consequently, most modern computer communication syetem allow communication between any two computers analogous to the way a telephone system provides communication between any two telephones. Known as universal service, the concept is a fundamental part of networking. With universal service, a user on any computer in any part of an organization can send messages or data to any other users. Furthermore, a user does not need to change computer systems whenchanging tasks—all information is available to all computers. As a result, users are more productive.The basic component used to commect organization to choose network technologies appropriate for each need, and to use routers to connect all networks into a single internet.The goal of internetworking is universal service across an internet, routers must agree to forward information from a source on one network to a specified destination on another. The task is complex because frame formats and addressing schemes used by underlying networks can differ. As s resulrt, protocol software is needed on computers and routers make universal service possible. Internet protocols overcome differences in frame formats and physical addresses to make communication pissible among networks that use different technologies.In general, internet software provides the appeatrance of a single, seamless communication system to which many computers attach. The syetem offers universal service :each computer is assigned an address, and any computer can send a packet to any other computer. Furthermore, internet protocol software —neither users nor application programs are a ware of the underlying physical networks or the routers that connect them.We say that an internet is a virtual network system because the communication system is an abstraction. That is, although a combination of of a uniform network syetem, no such network exists.Research on internetworking modern networking. In fact,internet techmology . Most large organizations already use internetworking as primary computer communication mechanism. Smaller organizations and individuals are beginning to do so as well. More inportant, the TCPIP technology computers in schools, commercial organications, government, military sites and individuals in almost all countries around the world.电脑网络简述网络可被定义为人、资源和思想的联接。

相关文档
最新文档