毕业论文英文文献及翻译
毕业论文(设计)外文文献翻译及原文

金融体制、融资约束与投资——来自OECD的实证分析R.SemenovDepartment of Economics,University of Nijmegen,Nijmegen(荷兰内梅亨大学,经济学院)这篇论文考查了OECD的11个国家中现金流量对企业投资的影响.我们发现不同国家之间投资对企业内部可获取资金的敏感性具有显著差异,并且银企之间具有明显的紧密关系的国家的敏感性比银企之间具有公平关系的国家的低.同时,我们发现融资约束与整体金融发展指标不存在关系.我们的结论与资本市场信息和激励问题对企业投资具有重要作用这种观点一致,并且紧密的银企关系会减少这些问题从而增加企业获取外部融资的渠道。
一、引言各个国家的企业在显著不同的金融体制下运行。
金融发展水平的差别(例如,相对GDP的信用额度和相对GDP的相应股票市场的资本化程度),在所有者和管理者关系、企业和债权人的模式中,企业控制的市场活动水平可以很好地被记录.在完美资本市场,对于具有正的净现值投资机会的企业将一直获得资金。
然而,经济理论表明市场摩擦,诸如信息不对称和激励问题会使获得外部资本更加昂贵,并且具有盈利投资机会的企业不一定能够获取所需资本.这表明融资要素,例如内部产生资金数量、新债务和权益的可得性,共同决定了企业的投资决策.现今已经有大量考查外部资金可得性对投资决策的影响的实证资料(可参考,例如Fazzari(1998)、 Hoshi(1991)、 Chapman(1996)、Samuel(1998)).大多数研究结果表明金融变量例如现金流量有助于解释企业的投资水平。
这项研究结果解释表明企业投资受限于外部资金的可得性。
很多模型强调运行正常的金融中介和金融市场有助于改善信息不对称和交易成本,减缓不对称问题,从而促使储蓄资金投着长期和高回报的项目,并且提高资源的有效配置(参看Levine(1997)的评论文章)。
因而我们预期用于更加发达的金融体制的国家的企业将更容易获得外部融资.几位学者已经指出建立企业和金融中介机构可进一步缓解金融市场摩擦。
浙江大学本科毕业论文外文文献翻译

核准通过,归档资料。
未经允许,请勿外传!浙江大学本科毕业论文外文文献翻译The influence of political connections on the firm value of small and medium-sized enterprises in China政治关联在中国对中小型企业价值的影响1摘要中小型企业的价值受很多因素的影响,比如股东、现金流以及政治关联等.这篇文章调查的正是在中国政治关联对中小型企业价值的影响。
通过实验数据来分析政治关联对企业价值效益的影响.结果表明政府关联是关键的因素并且在中国对中小型企业的价值具有负面影响。
2重要内容翻译2。
1引言在商业界,有越来越多关于政治关联的影响的经济研究。
它们发现政治关联能够帮助企业确保有利的规章条件以及成功获得资源,比如能够最终提高企业价值或是提升绩效的银行贷款,这种政治关联的影响在不同的经济条件下呈现不同的效果。
在高腐败和法律制度薄弱的国家,政治关联对企业价值具有决定性因素1的作用.中国由高度集权的计划经济向市场经济转变,政府对市场具有较强的控制作用,而且有大量的上市企业具有政治关联。
中小型企业发展的很迅速,他们已经在全球经济环境中变得越来越重要。
从90年代起, 政治因素对中国的任何规模的企业来说都变得越来越重要,尤其是中小型企业的价值。
和其他的部门相比较,中小型企业只有较小的现金流,不稳定的现金流且高负债率.一方面,中小型企业改变更加灵活;另一方面,中小型企业在由于企业规模以及对银行来说没有可以抵押的资产,在筹资方面较为困难。
企业如何应对微观经济环境和政策去保证正常的企业活动,并且政治关联如何影响企业价值?这篇论文调查政治关联和企业价值之间的联系,并且试图去研究企业是否可以从政治关联中获利提升企业价值。
2.2定义这些中小型企业之所以叫中小型企业,是和管理规模有关。
对这些小企业来说,雇员很少,营业额较低,资金一般由较少的人提供,因此,通常由这些业主直接管理企业。
毕业论文英文参考文献与译文

Inventory managementInventory ControlOn the so-called "inventory control", many people will interpret it as a "storage management", which is actually a big distortion.The traditional narrow view, mainly for warehouse inventory control of materials for inventory, data processing, storage, distribution, etc., through the implementation of anti-corrosion, temperature and humidity control means, to make the custody of the physical inventory to maintain optimum purposes. This is just a form of inventory control, or can be defined as the physical inventory control. How, then, from a broad perspective to understand inventory control? Inventory control should be related to the company's financial and operational objectives, in particular operating cash flow by optimizing the entire demand and supply chain management processes (DSCM), a reasonable set of ERP control strategy, and supported by appropriate information processing tools, tools to achieved in ensuring the timely delivery of the premise, as far as possible to reduce inventory levels, reducing inventory and obsolescence, the risk of devaluation. In this sense, the physical inventory control to achieve financial goals is just a means to control the entire inventory or just a necessary part; from the perspective of organizational functions, physical inventory control, warehouse management is mainly the responsibility of The broad inventory control is the demand and supply chain management, and the whole company's responsibility.Why until now many people's understanding of inventory control, limited physical inventory control? The following two reasons can not be ignored:First, our enterprises do not attach importance to inventory control. Especially those who benefit relatively good business, as long as there is money on the few people to consider the problem of inventory turnover. Inventory control is simply interpreted as warehouse management, unless the time to spend money, it may have been to see the inventory problem, and see the results are often very simple procurement to buy more, or did not do warehouse departments .Second, ERP misleading. Invoicing software is simple audacity to call it ERP, companies on their so-called ERP can reduce the number of inventory, inventory control, seems to rely on their small software can get. Even as SAP, BAAN ERP world, the field ofthese big boys, but also their simple modules inside the warehouse management functionality is defined as "inventory management" or "inventory control." This makes the already not quite understand what our inventory control, but not sure what is inventory control.In fact, from the perspective of broadly understood, inventory control, shouldinclude the following:First, the fundamental purpose of inventory control. We know that the so-called world-class manufacturing, two key assessment indicators (KPI) is, customer satisfaction and inventory turns, inventory turns and this is actually the fundamental objective of inventory control.Second, inventory control means. Increase inventory turns, relying solely on the so-called physical inventory control is not enough, it should be the demand and supply chain management process flow of this large output, and this big warehouse management processes in addition to including this link, the more important The section also includes: forecasting and order processing, production planning and control, materials planning and purchasing control, inventory planning and forecasting in itself, as well as finished products, raw materials, distribution and delivery of the strategy, and even customs management processes.And with the demand and supply chain management processes throughout the process, it is the information flow and capital flow management. In other words, inventory itself is across the entire demand and supply management processes in all aspects of inventory control in order to achieve the fundamental purpose, it must control all aspects of inventory, rather than just manage the physical inventory at hand.Third, inventory control, organizational structure and assessment.Since inventory control is the demand and supply chain management processes, output, inventory control to achieve the fundamental purpose of this process must be compatible with a rational organizational structure. Until now, we can see that many companies have only one purchasing department, purchasing department following pipe warehouse. This is far short of inventory control requirements. From the demand and supply chain management process analysis, we know that purchasing and warehouse management is the executive arm of the typical, and inventory control should focus on prevention, the executive branch is very difficult to "prevent inventory" for the simple reason that they assessment indicatorsin large part to ensure supply (production, customer). How the actual situation, a reasonable demand and supply chain management processes, and thus set the corresponding rational organizational structure and is a question many of our enterprisesto exploreThe role of inventory controlInventory management is an important part of business management. In the production and operation activities, inventory management must ensure that both the production plant for raw materials, spare parts demand, but also directly affect the purchasing, sales of share, sales activities. To make an inventory of corporate liquidity, accelerate cash flow, the security of supply under the premise of minimizing Yaku funds, directly affects the operational efficiency. Ensure the production and operation needs of the premise, so keep inventories at a reasonable level; dynamic inventory control, timely, appropriate proposed order to avoid over storage or out of stock; reduce inventory footprint, lower total cost of inventory; control stock funds used to accelerate cash flow.Problems arising from excessive inventory: increased warehouse space andinventory storage costs, thereby increasing product costs; take a lot of liquidity, resultingin sluggish capital, not only increased the burden of payment of interest, etc., would affect the time value of money and opportunity income; finished products and raw materials caused by physical loss and intangible losses; a large number of enterprise resource idle, affecting their rational allocation and optimization; cover the production, operation of the whole process of the various contradictions and problems, is not conducive to improve the management level.Inventory is too small the resulting problems: service levels caused a decline in the profit impact of marketing and corporate reputation; production system caused by inadequate supply of raw materials or other materials, affecting the normal production process; to shorten lead times, increase the number of orders, so order (production) costs; affect the balance of production and assembly of complete sets.NotesInventory management should particularly consider the following two questions:First, according to sales plans, according to the planned production of the goods circulated in the market, we should consider where, how much storage.Second, starting from the level of service and economic benefits to determine howto ensure inventories and supplementary questions.The two problems with the inventory in the logistics process functions.In general, the inventory function:(1)to prevent interrupted. Received orders to shorten the delivery of goods fromthe time in order to ensure quality service, at the same time to prevent out of stock.(2)to ensure proper inventory levels, saving inventory costs.(3)to reduce logistics costs. Supplement with the appropriate time interval compatible with the reasonable demand of the cargo in order to reduce logistics costs, eliminate or avoid sales fluctuations.(4)ensure the production planning, smooth to eliminate or avoid sales fluctuations.(5)display function.(6)reserve. Mass storage when the price falls, reduce losses, to respond to disasters and other contingencies.About the warehouse (inventory) on what the question, we must consider the number and location. If the distribution center, it should be possible according to customer needs, set at an appropriate place; if it is stored in central places to minimize the complementary principle to the distribution centers, there is no place certain requirements. When the stock base is established, will have to take into account are stored in various locations in what commodities.库存管理库存控制在谈到所谓“库存控制”的时候,很多人将其理解为“仓储管理”,这实际上是个很大的曲解。
毕业设计论文外文文献翻译

毕业设计(论文)外文文献翻译院系:财务与会计学院年级专业:201*级财务管理姓名:学号:132148***附件: 财务风险管理【Abstract】Although financial risk has increased significantly in recent years risk and risk management are not contemporary issues。
The result of increasingly global markets is that risk may originate with events thousands of miles away that have nothing to do with the domestic market。
Information is available instantaneously which means that change and subsequent market reactions occur very quickly。
The economic climate and markets can be affected very quickly by changes in exchange rates interest rates and commodity prices。
Counterparties can rapidly become problematic。
As a result it is important to ensure financial risks are identified and managed appropriately. Preparation is a key component of risk management。
【Key Words】Financial risk,Risk management,YieldsI. Financial risks arising1.1What Is Risk1.1.1The concept of riskRisk provides the basis for opportunity. The terms risk and exposure have subtle differences in their meaning. Risk refers to the probability of loss while exposure is the possibility of loss although they are often used interchangeably。
毕业论文英文翻译文献

毕业论文英文翻译文献随着全球化的发展,英语在全球的运用越来越广泛。
下文是店铺为大家整理的关于毕业论文英文翻译文献的内容,欢迎大家阅读参考! 毕业论文英文翻译文献(一)1. 谢天振主编. 《当代国外翻译理论导读》. 天津:南开大学出版社,2008.2. 包惠南、包昂. 《中国文化与汉英翻译》. 北京:外文出版社, 2004.3. 包惠南. 《文化语境与语言翻译》. 北京:中国对外翻译出版公司. 2001.4. 毕继万. 《世界文化史故事大系——英国卷》. 上海:上海外语教育出版社, 2003.5. 蔡基刚. 《英汉汉英段落翻译与实践》. 上海:复旦大学出版社, 2001.6. 蔡基刚. 《英汉写作对比研究》. 上海:复旦大学出版社, 2001.7. 蔡基刚. 《英语写作与抽象名词表达》. 上海:复旦大学出版社, 2003.8. 曹雪芹、高鄂. 《红楼梦》.9. 陈定安. 《英汉比较与翻译》. 北京:中国对外翻译出版公司, 1991.10. 陈福康. 《中国译学理论史稿》(修订本). 上海:上海外语教育出版社. 2000.11. 陈生保. 《英汉翻译津指》. 北京:中国对外翻译出版公司. 1998.12. 陈廷祐. 《英文汉译技巧》. 北京:外语教学与研究出版社. 2001.13. 陈望道. 《修辞学发凡》. 上海:上海教育出版社, 1979.14. 陈文伯. 《英汉翻译技法与练习》. 北京:世界知识出版社. 1998.15. 陈中绳、吴娟. 《英汉新词新义佳译》. 上海:上海翻译出版公司. 1990.16. 陈忠诚. 《词语翻译丛谈》. 北京:中国对外翻译出版公司, 1983.17. 程希岚. 《修辞学新编》. 吉林:吉林人民出版社, 1984.18. 程镇球. 《翻译论文集》. 北京:外语教学与研究出版社. 2002.19. 程镇球. 《翻译问题探索》. 北京:商务印书馆, 1980.20. 崔刚. 《广告英语》. 北京:北京理工大学出版社, 1993.21. 单其昌. 《汉英翻译技巧》. 北京:外语教学与研究出版社. 1990.22. 单其昌. 《汉英翻译讲评》. 北京:对外贸易教育出版社. 1989.23. 邓炎昌、刘润清. 《语言与文化——英汉语言文化对比》. 北京:外语教学与研究出版社, 1989.24. 丁树德. 《英汉汉英翻译教学综合指导》. 天津:天津大学出版社, 1996.25. 杜承南等,《中国当代翻译百论》. 重庆:重庆大学出版社, 1994.26. 《翻译通讯》编辑部. 《翻译研究论文集(1894-1948)》. 北京:外语教学与研究出版社. 1984.27. 《翻译通讯》编辑部. 《翻译研究论文集(1949-1983)》. 北京:外语教学与研究出版社. 1984. .28. 范勇主编. 《新编汉英翻译教程》. 天津:南开大学出版社. 2006.29. 方梦之、马秉义(编选). 《汉译英实践与技巧》. 北京:旅游教育出版社. 1996.30. 方梦之. 《英语汉译实践与技巧》. 天津:天津科技翻译出版公司. 1994.31. 方梦之主编. 《译学辞典》. 上海:上海外语教育出版社. 2004.32. 冯翠华. 《英语修辞大全》,北京:外语教学与研究出版社, 1995.33. 冯庆华. 《文体与翻译》. 上海:上海外语教育出版社, 2002.34. 冯庆华主编. 《文体翻译论》. 上海:上海外语教育出版社. 2002.35. 冯胜利. 《汉语的韵律、词法与句法》. 北京:北京大学出版社, 1997.36. 冯志杰. 《汉英科技翻译指要》. 北京:中国对外翻译出版公司. 1998.37. 耿占春. 《隐喻》. 北京:东方出版社, 1993.38. 郭建中. 《当代美国翻译理论》. 武汉:湖北教育出版社. 2000.39. 郭建中. 《文化与翻译》. 北京:中国对外翻译出版公司. 2000.40. 何炳威. 《容易误译的英语》. 北京:外语教学与研究出版社. 2002.41. 何刚强. 《现代英汉翻译操作》. 北京:北京大学出版社. 1998.42. 何刚强. 《现代英语表达与汉语对应》. 上海:复旦大学出版社. 1994.43. 何刚强. 《英汉口笔译技艺》. 上海:复旦大学出版社, 2003. 毕业论文英文翻译文献(二)1. 何自然、张达三、杨伟钧等译. 《现代英语语法教程》. 北京:商务印书馆, 1990.2. 何自然. 《语用学概论》. 长沙: 湖南教育出版社, 1988.3. 侯维瑞. 《英语语体》. 上海:上海外语教育出版社, 1988.4. 胡庚申. 《怎样起草与翻译合同协议》. 合肥:中国科技大学出版社, 1993.5. 胡曙中. 《英汉修辞比较研究》. 上海:上海外语教育出版社, 1993.6. 胡晓吉. 《实用英汉对比翻译》. 北京:中国人民大学出版社. 1990.7. 胡燕平,张容建. 《实用英汉翻译类典》. 重庆:重庆出版社, 1997.8. 胡裕树. 《现代汉语》. 上海:上海教育出版社, 1987.9. 胡兆云. 《美学理论视野中的文学翻译研究》(第2版). 北京:现代教育出版社. 2009.10. 胡兆云. 《语言接触与英汉借词研究》. 济南:山东大学出版社. 2001.11. 胡壮麟. 《语篇的衔接与连贯》. 上海:上海外语教育出版社, 1994.12. 胡壮麟. 《语言学教程》. 北京:北京大学出版社, 1988.13. 黄伯荣, 廖序东. 《现代汉语》. 兰州:甘肃人民出版社, 1981.14. 黄国文. 《语篇分析概要》. 长沙:湖南教育出版社, 1988.15. 黄龙. 《翻译技巧指导》. 沈阳:辽宁人民出版社, 1986.16. 黄任. 《英语修辞与写作》. 上海:上海外语教育出版社, 1996.17. 黄雨石. 《英汉文学翻译探索》. 西安:陕西人民出版社. 1988.18. 黄振定. 《翻译学:艺术论与科学论的统一》. 长沙:湖南教育出版社. 1998.19. 黄振定. 《翻译学的语言哲学基础》. 上海:上海交通大学出版社. 2007.20. 黄忠廉. 《变译理论》. 北京:中国对外翻译出版公司. 2002.21. 贾尔斯英译. 《孙子兵法》. 长沙:湖南出版社, 1993.22. 贾文波. 《汉英时文翻译: 政治经济汉译英300句析》. 北京:中国对外翻译出版公司, 1999.23. 贾玉新. 《跨文化交际学》. 上海:上海外语教育出版社, 1997.24. 金隄. 《等效翻译探索》. 北京:中国对外翻译出版公司. 1998.25. 金惠康. 《汉英跨文化交际翻译》. 贵阳:贵州教育出版社. 1998.26. 金惠康. 《跨文华交际翻译》. 北京:中国对外翻译出版公司, 2003.27. 金惠康. 《跨文华交际翻译续编》. 北京:中国对外翻译出版公司, 2004.28. 金立鑫. 《语法的多视角研究》. 上海:上海外语教育出版社, 2000.29. 居祖纯. 《新编汉英语篇翻译》. 北京:清华大学出版社, 2002.30. 柯平. 《对比语言学》. 南京:南京师范大学出版社, 1999.31. 孔慧怡. 《翻译·文学·文化》. 北京:北京大学出版社. 1999.32. 李定坤. 《汉英辞格对比与翻译》. 武汉:华中师范大学出版社, 1994.33. 李国南. 《辞格与词汇》. 上海:上海外语教育出版社, 2002.34. 李国南. 《英汉修辞格对比研究》. 福州:福建人民出版社, 1999.35. 李明编著. 《英汉互动翻译教程》. 武汉:武汉大学出版社. 2006.36. 李瑞华(主编). 《英汉语言文化对比研究》. 上海:上海外语教育出版社. 1996.。
毕业论文的参考文献的英文翻译与整理

毕业论文的参考文献的英文翻译与整理Reference Translation and Organization of Graduation ThesisAbstract:In academic writing, it is essential to include appropriate and accurate references to support the arguments and ideas presented in a research paper. This article focuses on the translation and organization of references in a graduation thesis. The importance of referencing, common challenges in translation, and effective strategies for organizing references will be discussed.1. Introduction1.1 Background1.2 Purpose of the Study2. Importance of Referencing2.1 Credibility and Scholarly Integrity2.2 Acknowledging Intellectual Contributions2.3 Avoiding Plagiarism3. Common Challenges in Translation3.1 Terminology and Technical Vocabulary3.2 Cultural and Contextual Nuances3.3 Translating Non-English References4. Strategies for Translating References4.1 Literal Translation4.2 Paraphrasing4.3 Maintaining Consistency5. Organization of References5.1 Citation Styles5.2 Creating a Reference List5.3 Formatting Guidelines6. Tools and Resources for Reference Translation6.1 Online Translation Tools6.2 Electronic Databases and Libraries6.3 Style Guides and Manuals7. ConclusionReferences (References should be listed in alphabetical order according to the citation style used in the graduation thesis)Please note that the above format is a general example. Depending on the specific requirements of your graduation thesis, you may need to modify the structure and add additional sections.In conclusion, the translation and organization of references in a graduation thesis play a crucial role in maintaining the credibility andintegrity of the research. By accurately translating and properly organizing references, researchers can provide readers with easily accessible information and demonstrate their acknowledgment of the intellectual contributions of others. It is important to be meticulous and consistent in following the chosen citation style to ensure the professional presentation of the references.。
毕业论文英文翻译
毕业论文英文翻译Title: The Impact of Artificial Intelligence on Employment Abstract:This paper explores the impact of artificial intelligence (AI) on employment. The rise of AI technologies has sparked concerns about its potential to replace human jobs. Through an analysis of existing literature and case studies, this study investigates the ways in which AI has affected various industries and job sectors. The findings indicate that while AI has the potential to automate certain tasks and reduce the need for human intervention, it also creates new job opportunities and contributes to economic growth. Additionally, the study highlights the importance of retraining and upskilling workers to adapt to the changing job market. Overall, this research contributes to a better understanding of the complex relationship between AI and employment and provides insights into proactive strategies to address the challenges posed by AI. Introduction:Artificial intelligence has emerged as a powerful technology with the potential to transform various aspects of society, including the workforce. The rapid advancement of AI has raised concerns about potential job losses and increased automation. This study aims to explore the impact of AI on employment and identify strategies to mitigate negative effects. By examining existing literature and case studies, this research provides a comprehensive analysis of AI's influence on different industries and job sectors.Literature Review:The literature offers a wide range of perspectives on the impact ofAI on employment. Some studies suggest that AI will lead to significant job losses in sectors such as manufacturing, transportation, and customer service. They argue that AI technologies, such as autonomous vehicles and chatbots, can perform tasks previously done by humans more efficiently and at a lower cost. On the other hand, other studies argue that AI will create new job opportunities and enhance productivity. For example, the healthcare sector benefits from AI technologies by improving diagnosis accuracy and streamlining administrative processes.Case Studies:This study includes several case studies that examine the impact of AI on specific industries. The manufacturing industry, for instance, has experienced both job losses and job creation due to the introduction of AI. While certain tasks have been automated, new roles related to AI maintenance and programming have emerged. Similarly, the retail industry has witnessed the integration of AI technologies, leading to job displacement in traditional retail jobs but also the creation of new positions in data analysis and online customer support.Mitigation Strategies:To address the challenges posed by AI, strategies should focus on retraining and upskilling the workforce to adapt to the changing job market. Governments and organizations should encourage workers to acquire in-demand skills such as data analysis and AI programming. Additionally, collaboration between academia and industry is crucial to ensure that education and training programs remain relevant and effective. Finally, policies that support jobtransition and income support for displaced workers will help minimize the negative impact of AI on employment. Conclusion:The impact of artificial intelligence on employment is a complex and multifaceted issue. While concerns about job losses are valid, it is important to recognize that AI also creates new job opportunities and contributes to economic growth. By implementing proactive strategies, such as retraining and upskilling, societies can better navigate the changes brought about by AI and ensure a future where humans and machines can coexist harmoniously.。
毕业论文英文文献及翻译
Based on GSM module and AT89C51 connectiondesign and application---From 《GSM principle and its network optimization》chapter one---From 《New single chip microcomputer interface device and technology》chapter sixAbstractThis article through analyzed the GSM module and the monolithic integrated circuit connection design simply introduced the TC35i module commonly used instruction and the coding rule, introduced emphatically the TC35i module and the AT89C51 principle of work, the periphery connection electric circuit, the software control technology, at the same time has produced some TC35i module and the AT89C51 connection application procedure, proposed AT89C51 when receive data should pay attention question, thus designed has the GSM module the data transmission terminal.Key words: GSM network1 Summarize:Along with correspondence technique of development, according to the service function of the NTT DoCoMo net, just to industry control and control from a distance the realm have continuously extension of trend.Is orientation this kind of demand, Siemens company released a new generation wireless correspondence GSM mold piece-TC35i, according to should the short news function of the mold piece, can fast safety credibility realization customer information processing etc. function, special be applicable to control centre and terminal equipments distance very far, or inconvenience adoption wired correspondence lie quality etc. situation, for example the oil well information collect behind of deliver, the long range copy form system, city transportation direction etc. all according to the TC35i mold piece to realization.2 The application of GSM network:GSM is Global System for Mobile Communications acronym, which means Global System for Mobile Communications is the world's leading cellular systems inthe world. GSM is based on narrowband TDMA standard that allows radio frequency in a group call at the same time 8. GSM80 during the rise in Europe, put into use in 1991. The end of 1997, has operations in more than 100 countries, Europe and Asia has become the standard in fact, that by 2001, the world's 162 countries have already built a 400 GSM communications network. But the GSM system capacity is limited, users in the network overload, it had to construct additional network facilities. What is gratifying is that GSM performance in other areas, which in addition to providing a standardized list and signaling systems, but also opened up some of the more intelligent of the business such as international roaming and so on. The convenience of GSM mobile phone is that it provides a smart card, known as SIM cards, and card could be separated, so that the replacement of mobile phone users and custom personal information in this area are facilitated.GSM network to improve after years of development, is now very mature, less blind spots, signal stability, automatic roaming, and the communication distance from the impact of the surrounding environment. GSM short message in particular, flexible and convenient, you can cross-market, inter-provincial and even cross-border transmission, and each send a short message as long as one dime, very reliable and affordable. In addition, the mobile phone SIM card in recent years can apply for 0, some packages use lower cost than fixed. Therefore the use of mobile phone message to achieve alarm, ultra long-range remote control for industrial equipment, transmission of data is a very good choice.GSM module, is a similar mobile communication module, integrates a number of mobile phone functions on a single small circuit board, it can send SMS messages, calls and so on, the module is small, but it has a lot of mobile phone functionality, with its have equal is the core of the mobile phone, and it is in a lot of applications have a wide range of applications, GSM module through the use of AT commands to control it, modules can be connected to computer RS232 serial port, can also be used to carry out single-chip control . Below we cite some typical applications:2.1 mobile phone access control system:GSM Access Control System used to control the electric lock control, if you need to enter, as long as the cell phone call using GSM modules mobile number, will automatically open the door, and only you can set up cell phone numbers to open the door, and no costs.2.2 three billboard over the weather disaster emergency turn off:Over three billboards are constantly flip through the motor to achieve a number of ads displayed, because installed in the outdoors, when there is wind, hail and other weather disasters, billboards could easily be blown bad or damaged card die, when in need of emergency shut down, You can normally closed relay contact to control the power of advertising, when you need to do is send "turn off" control message, the billboard will automatically turn off, and automatically after a certain time delay automatically return to normal job (generally disastrous weather will not continue for a long time) in advance if you want to open a billboard, you can send "Open" control message.2.3 engineering system balance reminders:Some works are safe after the completion of the normal operation after a period of time to settle the balance, if the encounter malicious clients the outstanding purchase price, often installed side very headache, because equipment has been installed, if the loss of a great come back down, particularly in the field customer very costly when the client system can be installed in the GSM module, use it all the way to control system or the way some of the key points, when the customer paid in arrears when the malicious message can turn off some features, forcing customers to pay the purchase price then immediately open message, if you have a smooth recovery of the purchase price can also be the name of system maintenance by the GSM module removed from the client system.2.4 monitoring systems or Web servers and reset the alarm:Monitoring system or web server running after a long period after death may be wrong, this time to power on reset is the only solution at this time through the GSM module can control system power, and set to open automatically after 3 seconds turn off mode, can achieve power reduction, in addition, GSM module in some special application areas also played a very large role, such as: the disappearance of the main power supply, memory errors, fan shutdown, fuel depletion, it was the invasion and other information, are not people the ideal choice for monitoring the engine room.the remote control of home appliances:Through the message can easily achieve the remote control to open rice cookers, water heaters and other appliances by remote control or switch to repair mode can also control the air-conditioning GSM global wireless mobile communication network control alarm host, using the global GSM short message data transmission mode and voice-enabled platform for the completion of intelligent data transmission and remotecontrol alarm, set the host family, shops, office safety, electrical control, remote monitoring, such as Intelligent home functions, because of the global GSM wireless mobile communication network signal coverage area of Canton, and truly realize the low-cost high-quality ultra-long-distance convenient and flexible intelligent wireless control and alarm, to solve the fixed-line telephone or cable broadband network wired alarm limitations. GSM global wireless mobile communications network in popularity all over the world, the GSM global wireless mobile communication network control alarm can be widely used in a single host family, community property, electricity, transportation, petroleum, coal, railway, municipal and public security departments of the security industry prevention devices, data monitoring and remote monitoring system. Wireless Road, with 11 defense areas, 2-way Cable Standoff, different defense area alarm, alarm and message control, separate from a defended position, remote control, home appliance control, linkage to take photographs with the latest alarm center network characteristics.Features:1. Wireless suspects under strict surveillance, no wiring, and ease of installation.2. Cable suspects under strict surveillance, safe and reliable.3. Wireless remote control security / from a defended position, easy to operate.4. Adaptability widely used global-band wireless mobile networks.5. Password settings, confidentiality stronger.6. Alarm, the high-decibel alarm sound to deter thieves.7. Host automatically to six groups of mobile numbers to send SMS alerts. Alarm message and a telephone can be set up8. Host automatically dial the six groups of mobile or fixed telephone warning, start-site monitoring.9. Preset scene alarm and alarm message10. With emergency alarm function, can prevent thieves burglary, detection of gas leaks and smoke fire.11. Communicate electric missing Detect and alarm, to prevent the intentional destruction of the power system and power failure monitoring.12. Communicate after the loss of electricity automatically switch to a back-up battery. 13. Available through GSM network platform and networking alarm center.14. Supported message in Chinese or English instructions.15. Handset intercom mode: Matching intercom calls, and alarm can be two-wayintercom, real-time clear police intelligence to prevent unnecessary alarm.3 The TC35i mold piece introductionCurrently, domestic already beginning usage of the GSM mold piece have a lot, and these of function, method of using difference not big.What this design adoption is a Siemens TC35 the TC35i of the series.On this kind of wireless mold piece function and TC35 and permit, design tightly packed, consumedly contracted the physical volume of customer's product.The TC35i and GSM2/2 and permit,dual-band(GSM900/GSM1800), RS232 the data connect, should mold piece and radio frequency electric circuit and Ji take and integral whole, provide toward the customer standard of AT order connect, is data, speech, short news and fax provide fast, credibility, safety of deliver, convenience customer of application development and design.3.1 The GSM AT instruction introduction that the mold has something to do with SMS in the piec e:The order for provide of the GSM- powered mold piece match GSM07.05 and GSM07.07 norm.In the GSM07.07 definition of the AT Command connect and provided a kind of which GSM AT Instruction TC35i AT89C51move terrace and data terminal equipments of in general use connect;The GSM07.05 made to the short news detailed of provision.At short news mold piece receive network hair of short news, can send out a designation information through a string of, the data terminal equipments can send out toward the GSM mold piece various order.The instruction of GSM AT having something to do with SMS such as List1 to show.The instruction of GSM AT gather, is signed letter, Motorola and HP etc. factory house by Nokia, love to together develop for the GSM system of, among them include control SMS(Short Message Service).3.2 The PDU code rule:Send out short news in common use Text and PDU(Protocol Data Unit, agreement data unit) mode currently.The usage Text mode receive and dispatch a message code simple, realization get up very easy, but the biggest weakness be to can't receive and dispatch Chinese message;But PDU mode not only support Chinese message, also the ability send out English message.The PDU mode receive and dispatch a message can the usage be 3 kinds of to code:7-bit, 8-bit and UCS2 code.7-the bit code to used for send out common of ASCII character list, 8-bitcode Be usually used for sending out data news, UCS2 code used for sending out Unicode character list.General PDU's code is constitute by ABCDEFGHIJKLM 13.A:The address length of the message center, 216 enter to make number(one word stanza)B:The number type of the message center, 216 enter to make number.C:Message center number, B+C length will from the data decisionD:Document head word stanza, 216 enter to make number.E:Information type, 216 enter to make number.F:Drive call number length, 216 enter to make number.G:Drive call number type, 216 enter to make number, take value togetherH:Drive call number, length from data within F decision.I:Agreement marking, 216 enter to make number.J:The data code a project, 216 enter to make number.K:Term of validity, 216 enter to make number. L:Customer data length, 216 enter to make number.M:Customer's data, its length from the data decision in the L.Enactment in J adoption UCS2 code, here is the Unicode character list of Chinese-English.4 the hardware of the TC35i and list slice machine connect a people'selectric circuitThe TC35i mold piece is main to save according to the processor, GSM radio frequency mold piece, power supply mold piece, Shan from the GSM, the ZIF conjunction machine, antenna connect six part constitute.Connect machine with a list slice machine realization electric circuit to connect through a ZIF, should connect read or send out the TC35i mold piece in of data.5 list slice the software of the machine and TC35i connect and controlprinciple8051 one-chip computer have four 8 walk abreast I/O port, call P0, P1, P2 and P3. Each port is 8 accurate two-way mouths, accounts for 32 pins altogether. Every one I/O line can be used as introduction and exported independently. Each port includes a latch (namely special function register ), one exports the driver and a introduction buffer . Make data can latch when outputting, data can buffer when making introduction , but four function of passway these self-same. Expand among the system of memory outside having slice, four port these may serve as accurate two-way mouth of I/O in common use. Expand among the system of memory outsidehaving slice, P2 mouth see high 8 address off; P0 mouth is a two-way bus, send the introduction of 8 low addresses and data / export in timesharingList slice the software of the machine and TC35i connect in fact be list slice the machine pass AT instruction control cellular phone of control technique, first constitution the TC35i mold piece of work mode:AT+CMGF=n, n=0 is a PDU mode;N=1 write an article this mode;Usually the constitution is a PDU mode, under this kind of mode, ability transmission or accept a transparent data.(customer from definition data)AT+CMGR=n in order to read the short news data of the TC35i mold piece, the n is a short news number.AT+CMGL=n in order to list the short news in the TC35i mold piece, n=0 is the short news which read, n=a the short news which have been already read, n=2 short news which sent out, n=3 for have already send out of short news n=4 is all short news.AT+CMGD=the n is the short news which delete the TC35i mold piece and the n is a short news serial number.6 Master routineThe software plait distance pass to write in toward the TC35i dissimilarity of AT instruction ability completion variety function, such as network debarkation, read SIM card top telephone number, send out SMS news and receive SMS news etc..The instruction sign, constant, PDU data...etc. of AT instruction all code form transmission by ASCII;The transmission transparent data have to pair of the TC35i mold piece of work mode constitution is PDU mode;List slice machine toward the TC35i mold piece after send out each instruction have to with return to car sign conduct and actions should instruction of be over, for example list slice the machine send out instruction in"AT+ CMGF=0" toward the cellular phone, its ASCII code sequence is"41 H, 54 H, 2 BH, 42 H, 4 DH, 47 H, 46 H, 3 DH, 30 H, 0 DH", the last word stanza 0 DH is to return to car sign, mean that instruction be over, if have no this to return to car sign, the cellular phone won't identify this instruction.When the AT instruction which receive to an integrity of the TC35i mold piece after, the TC35i mold piece not summary execution should instruction, but first just receive of the ASCII of the AT instruction code sequence all anti- send out;(contain 0 DH)Secondly send out a the ASCII which return to car sign with a carriage return sign to code, namely 0 DH with 0 AH;Then performance should instruction.The list slice machine read the PDU data of the TC35i mold piece, originality data should is 16 enter make number, but read back of data still is an ASCII mean of 16 enter make number.So a word stanza of 16 entered to make number and thenbecame 2 word stanza of ASMII code.But the PDU data data word stanza length within pack part still is actual character list length.But isn't the word stanza which become ASCII code length, this at plait distance should special attention, otherwise receive of data not integrity.The list slice machine is after receiving a PDU data pack data have to its instauration become 16 enter make a data, its calculate way as follows:Establish a for the ASCII code receive, b for the conversion is behind of 16 enter make number.So if a<39 H,b=a-30 H;If a>39 H, b=h-07 H a-30.End pair of in front and back two pieces merger is a word stanza.Concluding remark The usage cellular phone mold piece benefit is at the system integration, the cost be lower.Install correspondence circuit in secluded region etc. difficulty or uneconomical place, engineering service facilities can freedom vivid of constitution, no longer be subjected to geography condition of restriction.In fine, GSM mold piece the price be cheap, application extensive, application the foreground be captivating, pass with cellular phone mold the piece connect can very convenience of design customer demand of the data receive terminal.基于 GSM 模块与 AT89C51 的接口设计及应用的接口设计及应用-----摘自《GSM 原理及其网络优化》第一章-----摘自《新型单片机接口器件与技术》第六章摘要本文通过分析 GSM 模块与单片机的接口设计简单介绍了 TC35i 模块的常用指令及摘编码规则,着重介绍了 TC35i 模块与 AT89C51 的工作原理、外围接口电路、软件控制技术,同时给出了一些 TC35i 模块与 AT89C51 接口的应用程序,提出了 AT89C51 在接收数据时应该注意的问题,从而设计出具有 GSM 模块的数据传输终端。
5000字英文文献翻译
沈阳建筑大学毕业论文外文及翻译原文题目Android Application Fundamentals学院专业班级信息与控制工程学院计算机08-1学生姓名XXX 性别X指导教师XXX 职称XXX年月日外文及翻译英语原文Android Application FundamentalsAndroid applications are written in the Java programming language. The Android SDK tools compile the code—along with any data and resource files—into an Android package, an archive file with an .apk suffix. All the code in a single .apk file is considered to be one application and is the file that Android-powered devices use to install the application.Once installed on a device, each Android application lives in its own security sandbox:●The Android operating system is a multi-user Linux system in which each applicationis a different user.●By default, the system assigns each application a unique Linux user ID (the ID isused only by the system and is unknown to the application). The system setspermissions for all the files in an application so that only the user ID assigned to thatapplication can access them.●Each process has its own virtual machine (VM), so an application's code runs inisolation from other applications.●By default, every application runs in its own Linux process. Android starts theprocess when any of the application's components need to be executed, then shutsdown the process when it's no longer needed or when the system must recovermemory for other applications.In this way, the Android system implements the principle of least privilege. That is, each application, by default, has access only to the components that it requires to do its work and no more. This creates a very secure environment in which an application cannot access parts of the system for which it is not given permission.However, there are ways for an application to share data with other applications and for an application to access system services:●It's possible to arrange for two applications to share the same Linux user ID, in whichcase they are able to access each other's files. To conserve system resources,applications with the same user ID can also arrange to run in the same Linux processand share the same VM (the applications must also be signed with the samecertificate).●An application can request permission to access device data such as the user'scontacts, SMS messages, the mountable storage (SD card), camera, Bluetooth, andmore. All application permissions must be granted by the user at install time.That covers the basics regarding how an Android application exists within the system. The rest of this document introduces you to:●The core framework components that define your application.●The manifest file in which you declare components and required device features foryour application.●Resources that are separate from the application code and allow your application togracefully optimize its behavior for a variety of device configurations.Application ComponentsApplication components are the essential building blocks of an Android application. Each component is a different point through which the system can enter your application. Not all components are actual entry points for the user and some depend on each other, but each one exists as its own entity and plays a specific role—each one is a unique building block that helps define your application's overall behavior.There are four different types of application components. Each type serves a distinct purpose and has a distinct lifecycle that defines how the component is created and destroyed.Here are the four types of application components:ActivitiesAn activity represents a single screen with a user interface. For example, an email application might have one activity that shows a list of new emails, another activity to compose an email, and another activity for reading emails. Although the activities work together to form a cohesive user experience in the email application, each one isindependent of the others. As such, a different application can start any one of these activities (if the email application allows it). For example, a camera application can start the activity in the email application that composes new mail, in order for the user to share a picture.An activity is implemented as a subclass of Activity and you can learn more about it in the Activities developer guide.ServicesA service is a component that runs in the background to perform long-runningoperations or to perform work for remote processes. A service does not provide a user interface. For example, a service might play music in the background while the user is in a different application, or it might fetch data over the network without blocking user interaction with an activity. Another component, such as an activity, can start the service and let it run or bind to it in order to interact with it.A service is implemented as a subclass of Service and you can learn more about it inthe Services developer guide.Content providersA content provider manages a shared set of application data. You can store the data inthe file system, an SQLite database, on the web, or any other persistent storage location your application can access. Through the content provider, other applications can query or even modify the data (if the content provider allows it). For example, the Android system provides a content provider that manages the user's contact information. As such, any application with the proper permissions can query part of the content provider (such as ContactsContract.Data) to read and write information abouta particular person.Content providers are also useful for reading and writing data that is private to your application and not shared. For example, the Note Pad sample application uses a content provider to save notes.A content provider is implemented as a subclass of ContentProvider and mustimplement a standard set of APIs that enable other applications to perform transactions.For more information, see the Content Providers developer guide.Broadcast receiversA broadcast receiver is a component that responds to system-wide broadcastannouncements. Many broadcasts originate from the system—for example, a broadcast announcing that the screen has turned off, the battery is low, or a picture was captured.Applications can also initiate broadcasts—for example, to let other applications know that some data has been downloaded to the device and is available for them to use.Although broadcast receivers don't display a user interface, they may create a status bar notification to alert the user when a broadcast event occurs. More commonly, though, a broadcast receiver is just a "gateway" to other components and is intended to do a very minimal amount of work. For instance, it might initiate a service to perform some work based on the event.A broadcast receiver is implemented as a subclass of BroadcastReceiver and eachbroadcast is delivered as an Intent object. For more information, see the BroadcastReceiver class.A unique aspect of the Android system design is that any application can start another application’s component. For example, if you want the user to capture a photo with the device camera, there's probably another application that does that and your application can use it, instead of developing an activity to capture a photo yourself. You don't need to incorporate or even link to the code from the camera application. Instead, you can simply start the activity in the camera application that captures a photo. When complete, the photo is even returned to your application so you can use it. To the user, it seems as if the camera is actually a part of your application.When the system starts a component, it starts the process for that application (if it's not already running) and instantiates the classes needed for the component. For example, if your application starts the activity in the camera application that captures a photo, that activity runs in the process that belongs to the camera application, not in your application's process. Therefore, unlike applications on most other systems, Android applications don't have a single entry point (there's no main()function, for example).Because the system runs each application in a separate process with file permissions that restrict access to other applications, your application cannot directly activate a component from another application. The Android system, however, can. So, to activate a component in another application, you must deliver a message to the system that specifies your intent to start a particular component. The system then activates the component for you.Activating ComponentsThree of the four component types—activities, services, and broadcast receivers—are activated by an asynchronous message called an intent. Intents bind individual components to each other at runtime (you can think of them as the messengers that request an action from other components), whether the component belongs to your application or another.An intent is created with an Intent object, which defines a message to activate either a specific component or a specific type of component—an intent can be either explicit or implicit, respectively.For activities and services, an intent defines the action to perform (for example, to "view" or "send" something) and may specify the URI of the data to act on (among other things that the component being started might need to know). For example, an intent might convey a request for an activity to show an image or to open a web page. In some cases, you can start an activity to receive a result, in which case, the activity also returns the result in an Intent (for example, you can issue an intent to let the user pick a personal contact and have it returned to you—the return intent includes a URI pointing to the chosen contact).For broadcast receivers, the intent simply defines the announcement being broadcast (for example, a broadcast to indicate the device battery is low includes only a known action string that indicates "battery is low").The other component type, content provider, is not activated by intents. Rather, it is activated when targeted by a request from a ContentResolver. T he content resolver handles all direct transactions with the content provider so that the component that's performing transactions with the provider doesn't need to and instead calls methods onthe ContentResolver object. This leaves a layer of abstraction between the content provider and the component requesting information (for security).There are separate methods for activating each type of component:∙You can start an activity (or give it something new to do) by passingan Intent to startActivity() or startActivityForResult() (when you want the activity to return a result).∙You can start a service (or give new instructions to an ongoing service) by passing an Intent to startService(). Or you can bind to the service by passingan Intent to bindService().∙You can initiate a broadcast by passing an Intent to methodslike sendBroadcast(), sendOrderedBroadcast(), or sendStickyBroadcast().∙You can perform a query to a content provider by calling query() ona ContentResolver.For more information about using intents, see the Intents and Intent Filters document. More information about activating specific components is also provided in the following documents: Activities, Services, BroadcastReceiver and Content Providers.Declaring componentsThe primary task of the manifest is to inform the system about the application's components. For example, a manifest file can declare an activity as follows:In the <application> element, the android:icon attribute points to resources for an icon that identifies the application.In the <activity> element, the android:name at tribute specifies the fu lly qualified class name of the Activity subclass and the android:label attributes specifies a string to use as the user-visible label for the activity.You must declare all application components this way:●<activity>elements for activities●<service> elements for services●<receiver>elements for broadcast receivers●<provider>elements for content providersActivities, services, and content providers that you include in your source but do not declare in the manifest are not visible to the system and, consequently, can never run. However, broadcast receivers can be either declared in the manifest or created dynamically in code (as BroadcastReceiver objects) and registered with the system bycalling registerReceiver().Declaring component capabilitiesAs discussed above, in Activating Components, you can use an Intent to start activities, services, and broadcast receivers. You can do so by explicitly naming the target component (using the component class name) in the intent. However, the real power of intents lies in the concept of intent actions. With intent actions, you simply describe the type of action you want to perform (and optionally, the data upon which you’d like to perform the action) and allow the system to find a component on the device that can perform the action and start it. If there are multiple components that can perform the action described by the intent, then the user selects which one to use.The way the system identifies the components that can respond to an intent is by comparing the intent received to the intent filters provided in the manifest file of other applications on the device.When you declare a component in your application's manifest, you can optionally include intent filters that declare the capabilities of the component so it can respond to intents from other applications. You can declare an intent filter for your component by addingan <intent-filter>element as a child of the component's declaration element.For example, an email application with an activity for composing a new email might declare an intent filter in its manifest entry to respond to "send" intents (in order to send email). An activity in your application can then create an intent with the “send” action (ACTION_SEND), which the s ystem matches to the email application’s “send” activity and launches it when you invoke the intent with startActivity().For more about creating intent filters, see the Intents and Intent Filters document.Declaring application requirementsThere are a variety of devices powered by Android and not all of them provide the same features and capabilities. In order to prevent your application from being installed on devices that lack features needed by your application, it's important that you clearly define a profile for the types of devices your application supports by declaring device and software requirements in your manifest file. Most of these declarations are informational only and the system does not read them, but external services such as Google Play do read them in order to provide filtering for users when they search for applications from their device.For example, if your application requires a camera and uses APIs introduced in Android 2.1 (API Level 7), you should declare these as requirements in your manifest file. That way, devices that do not have a camera and have an Android version lower than 2.1 cannot install your application from Google Play.However, you can also declare that your application uses the camera, but doesnot require it. In that case, your application must perform a check at runtime to determine if the device has a camera and disable any features that use the camera if one is not available.Here are some of the important device characteristics that you should consider as you design and develop your application:Screen size and densityIn order to categorize devices by their screen type, Android defines two characteristics for each device: screen size (the physical dimensions of the screen) and screen density (the physical density of the pixels on the screen, or dpi—dots per inch). To simplify all the different types of screen configurations, the Android system generalizes them intoselect groups that make them easier to target.The screen sizes are: small, normal, large, and extra large.The screen densities are: low density, medium density, high density, and extra highdensity.By default, your application is compatible with all screen sizes and densities, because the Android system makes the appropriate adjustments to your UI layout and imageresources. However, you should create specialized layouts for certain screen sizes and provide specialized images for certain densities, using alternative layout resources, and by declaring in your manifest exactly which screen sizes your application supportswith the <supports-screens> element.For more information, see the Supporting Multiple Screens document.Input configurationsMany devices provide a different type of user input mechanism, such as a hardware keyboard, a trackball, or a five-way navigation pad. If your application requires a particular kind of input hardware, then you should declare it in your manifest with the <uses-configuration> e lement. However, it is rare that an application should require a certain input configuration.Device featuresThere are many hardware and software features that may or may not exist on a given Android-powered device, such as a camera, a light sensor, bluetooth, a certain version of OpenGL, or the fidelity of the touchscreen. You should never assume that a certain feature is available on all Android-powered devices (other than the availability of the standard Android library), so you should declare any features used by your application with the <uses-feature> element.Platform VersionDifferent Android-powered devices often run different versions of the Android platform, such as Android 1.6 or Android 2.3. Each successive version often includes additional APIs not available in the previous version. In order to indicate which set of APIs are available, each platform version specifies an API Level (for example,Android 1.0 is API Level 1 and Android 2.3 is API Level 9). If you use any APIs that were added to the platform after version 1.0, you should declare the minimum API Level in which those APIs were introduced using the <uses-sdk> element.It's important that you declare all such requirements for your application, because, when you distribute your application on Google Play, the store uses these declarations to filter which applications are available on each device. As such, your application should be available only to devices that meet all your application requirements.For more information about how Google Play filters applications based on these (and other) requirements, see the Filters on Google Play document.Application ResourcesAn Android application is composed of more than just code—it requires resources that are separate from the source code, such as images, audio files, and anything relating to the visual presentation of the application. For example, you should define animations, menus, styles, colors, and the layout of activity user interfaces with XML files. Using application resources makes it easy to update various characteristics of your application without modifying code and—by providing sets of alternative resources—enables you to optimize your application for a variety of device configurations (such as different languages and screen sizes).For every resource that you include in your Android project, the SDK build tools define a unique integer ID, which you can use to reference the resource from your application code or from other resources defined in XML. For example, if your application c ontains an image file named logo.png (saved in the res/drawable/ directory), the SDK tools generate a resource ID named R.drawable.logo, which you can use to reference the image and insert it in your user interface.One of the most important aspects of providing resources separate from your source code is the ability for you to provide alternative resources for different device configurations. For example, by defining UI strings in XML, you can translate the strings into other languages and save those strings in separate files. Then, based on a language qualifier that you append to theresource directory's name (such as res/values-fr/for French string values) and the user's language setting, the Android system applies the appropriate language strings to your UI.Android supports many different qualifiers for your alternative resources. The qualifier is a short string that you include in the name of your resource directories in order to define the device configuration for which those resources should be used. As another example, you should often create different layouts for your activities, depending on the device's screen orientation and size. For example, when the device screen is in portrait orientation (tall), you might want a layout with buttons to be vertical, but when the screen is in landscape orientation (wide), the buttons should be aligned horizontally. To change the layout depending on the orientation, you can define two different layouts and apply the appropriate qualifier to each layout's directory name. Then, the system automatically applies the appropriate layout depending on the current device orientation.For more about the different kinds of resources you can include in your application and how to create alternative resources for various device configurations, see the Application Resources developer guide.中文译文安卓应用基础在Java编程语言编写的Android应用程序的Android的SDK工具编译代码以及与任何数据和到一个Android的包,一个归档文件档案资源的.apk后缀,所有的在一个单一的代码.apk文件被认为是一个应用程序,是Android的文件,供电设备来安装应用程序。
毕业论文文献外文翻译----危机管理:预防,诊断和干预文献翻译-中英文文献对照翻译
第1页 共19页中文3572字毕业论文(设计)外文翻译标题:危机管理-预防,诊断和干预一、外文原文标题:标题:Crisis management: prevention, diagnosis and Crisis management: prevention, diagnosis andintervention 原文:原文:The Thepremise of this paper is that crises can be managed much more effectively if the company prepares for them. Therefore, the paper shall review some recent crises, theway they were dealt with, and what can be learned from them. Later, we shall deal with the anatomy of a crisis by looking at some symptoms, and lastly discuss the stages of a crisis andrecommend methods for prevention and intervention. Crisis acknowledgmentAlthough many business leaders will acknowledge thatcrises are a given for virtually every business firm, many of these firms do not take productive steps to address crisis situations. As one survey of Chief Executive officers of Fortune 500 companies discovered, 85 percent said that a crisisin business is inevitable, but only 50 percent of these had taken any productive action in preparing a crisis plan(Augustine, 1995). Companies generally go to great lengths to plan their financial growth and success. But when it comes to crisis management, they often fail to think and prepare for those eventualities that may lead to a company’s total failure.Safety violations, plants in need of repairs, union contracts, management succession, and choosing a brand name, etc. can become crises for which many companies fail to be prepared untilit is too late.The tendency, in general, is to look at the company as a perpetual entity that requires plans for growth. Ignoring the probabilities of disaster is not going to eliminate or delay their occurrences. Strategic planning without inclusion ofcrisis management is like sustaining life without guaranteeinglife. One reason so many companies fail to take steps to proactively plan for crisis events, is that they fail to acknowledge the possibility of a disaster occurring. Like an ostrich with its head in the sand, they simply choose to ignorethe situation, with the hope that by not talking about it, it will not come to pass. Hal Walker, a management consultant, points out “that decisions will be more rational and better received, and the crisis will be of shorter duration, forcompanies who prepare a proactive crisis plan” (Maynard, 1993) .It is said that “there are two kinds of crises: those that thatyou manage, and those that manage you” (Augustine, 1995). Proactive planning helps managers to control and resolve a crisis. Ignoring the possibility of a crisis, on the other hand,could lead to the crisis taking a life of its own. In 1979, theThree-Mile Island nuclear power plant experienced a crisis whenwarning signals indicated nuclear reactors were at risk of a meltdown. The system was equipped with a hundred or more different alarms and they all went off. But for those who shouldhave taken the necessary steps to resolve the situation, therewere no planned instructions as to what should be done first. Hence, the crisis was not acknowledged in the beginning and itbecame a chronic event.In June 1997, Nike faced a crisis for which they had no existi existing frame of reference. A new design on the company’s ng frame of reference. A new design on the company’s Summer Hoop line of basketball shoes - with the word air writtenin flaming letters - had sparked a protest by Muslims, who complained the logo resembled the Arabic word for Allah, or God.The council of American-Islamic Relations threatened aa globalNike boycott. Nike apologized, recalled 38,000 pairs of shoes,and discontinued the line (Brindley, 1997). To create the brand,Nike had spent a considerable amount of time and money, but hadnever put together a general framework or policy to deal with such controversies. To their dismay, and financial loss, Nike officials had no choice but to react to the crisis. This incident has definitely signaled to the company that spending a little more time would have prevented the crisis. Nonetheless,it has taught the company a lesson in strategic crisis management planning.In a business organization, symptoms or signals can alert the strategic planners or executives of an eminent crisis. Slipping market share, losing strategic synergy anddiminishing productivity per man hour, as well as trends, issues and developments in the socio-economic, political and competitive environments, can signal crises, the effects of which can be very detrimental. After all, business failures and bankruptcies are not intended. They do not usually happen overnight. They occur more because of the lack of attention to symptoms than any other factor.Stages of a crisisMost crises do not occur suddenly. The signals can usuallybe picked up and the symptoms checked as they emerge. A company determined to address these issues realizes that the real challenge is not just to recognize crises, but to recognize themin a timely fashion (Darling et al., 1996). A crisis can consistof four different and distinct stages (Fink, 1986). The phasesare: prodromal crisis stage, acute crisis stage, chronic crisisstage and crisis resolution stage.Modern organizations are often called “organic” due tothe fact that they are not immune from the elements of their surrounding environments. Very much like a living organism, organizations can be affected by environmental factors both positively and negatively. But today’s successfulorganizations are characterized by the ability to adapt by recognizing important environmental factors, analyzing them, evaluating the impacts and reacting to them. The art of strategic planning (as it relates to crisis management)involves all of the above activities. The right strategy, in general, provides for preventive measures, and treatment or resolution efforts both proactively and reactively. It wouldbe quite appropriate to examine the first three stages of acrisis before taking up the treatment, resolution or intervention stage.Prodromal crisis stageIn the field of medicine, a prodrome is a symptom of the onset of a disease. It gives a warning signal. In business organizations, the warning lights are always blinking. No matter how successful the organization, a number of issues andtrends may concern the business if proper and timely attentionis paid to them. For example, in 1995, Baring Bank, a UK financial institution which had been in existence since 1763,ample opportunitysuddenly and unexpectedly failed. There wasfor the bank to catch the signals that something bad was on thehorizon, but the company’s efforts to detect that were thwarted by an internal structure that allowed a single employee both to conduct and to oversee his own investment trades, and the breakdown of management oversight and internalcontrol systems (Mitroff et al., 1996). Likewise, looking in retrospect, McDonald’s fast food chain was given the prodromalsymptoms before the elderly lady sued them for the spilling ofa very hot cup of coffee on her lap - an event that resulted in a substantial financial loss and tarnished image of thecompany. Numerous consumers had complained about thetemperature of the coffee. The warning light was on, but the company did not pay attention. It would have been much simplerto pick up the signal, or to check the symptom, than facing the consequences.In another case, Jack in the Box, a fast food chain, had several customers suffer intestinal distress after eating at their restaurants. The prodromal symptom was there, but the company took evasive action. Their initial approach was to lookaround for someone to blame. The lack of attention, the evasiveness and the carelessness angered all the constituent groups, including their customers. The unfortunate deaths thatptoms,occurred as a result of the company’s ignoring thesymand the financial losses that followed, caused the company to realize that it would have been easier to manage the crisis directly in the prodromal stage rather than trying to shift theblame.Acute crisis stageA prodromal stage may be oblique and hard to detect. The examples given above, are obvious prodromal, but no action wasWebster’s New Collegiate Dictionary, an acute stage occursacutewhen a symptom “demands urgent attention.” Whether the acutesymptom emerges suddenly or is a transformation of a prodromalstage, an immediate action is required. Diverting funds and other resources to this emerging situation may cause disequilibrium and disturbance in the whole system. It is onlythose organizations that have already prepared a framework forthese crises that can sustain their normal operations. For example, the US public roads and bridges have for a long time reflected a prodromal stage of crisis awareness by showing cracks and occasionally a collapse. It is perhaps in light of the obsessive decision to balance the Federal budget that reacting to the problem has been delayed and ignored. This situation has entered an acute stage and at the time of this writing, it was reported that a bridge in Maryland had just collapsed.The reason why prodromes are so important to catch is thatit is much easier to manage a crisis in this stage. In the caseof most crises, it is much easier and more reliable to take careof the problem before it becomes acute, before it erupts and causes possible complications (Darling et al., 1996). In andamage. However, the losses are incurred. Intel, the largest producer of computer chips in the USA, had to pay an expensiveprice for initially refusing to recall computer chips that proved unreliable o n on certain calculations. The f irmfirm attempted to play the issue down and later learned its lesson. At an acutestage, when accusations were made that the Pentium Chips were not as fast as they claimed, Intel quickly admitted the problem,apologized for it, and set about fixing it (Mitroff et al., 1996). Chronic crisis stageDuring this stage, the symptoms are quite evident and always present. I t isIt is a period of “make or break.” Being the third stage, chronic problems may prompt the company’s management to once and for all do something about the situation. It may be the beginning of recovery for some firms, and a deathknell for others. For example, the Chrysler Corporation was only marginallysuccessful throughout the 1970s. It was not, however, until the company was nearly bankrupt that amanagement shake-out occurred. The drawback at the chronic stage is that, like in a human patient, the company may get used to “quick fixes” and “band “band--aid”approaches. After all, the ailment, the problem and the crisis have become an integral partoverwhelmed by prodromal and acute problems that no time or attention is paid to the chronic problems, or the managers perceive the situation to be tolerable, thus putting the crisison a back burner.Crisis resolutionCrises could be detected at various stages of their development. Since the existing symptoms may be related todifferent problems or crises, there is a great possibility thatthey may be misinterpreted. Therefore, the people in charge maybelieve they have resolved the problem. However, in practicethe symptom is often neglected. In such situations, the symptomwill offer another chance for resolution when it becomes acute,thereby demanding urgent care. Studies indicate that today anincreasing number of companies are issue-oriented and searchfor symptoms. Nevertheless, the lack of experience in resolvinga situation and/or inappropriate handling of a crisis can leadto a chronic stage. Of course, there is this last opportunityto resolve the crisis at the chronic stage. No attempt to resolve the crisis, or improper resolution, can lead to grim consequences that will ultimately plague the organization or even destroy it.It must be noted that an unsolved crisis may not destroy the company. But, its weakening effects can ripple through the organization and create a host of other complications.Preventive effortsThe heart of the resolution of a crisis is in the preventiveefforts the company has initiated. This step, similar to a humanbody, is actually the least expensive, but quite often the mostoverlooked. Preventive measures deal with sensing potential problems (Gonzales-Herrero and Pratt, 1995). Major internalfunctions of a company such as finance, production, procurement, operations, marketing and human resources are sensitive to thesocio-economic, political-legal, competitive, technological, demographic, global and ethical factors of the external environment. What is imminently more sensible and much more manageable, is to identify the processes necessary forassessing and dealing with future crises as they arise (Jacksonand Schantz, 1993). At the core of this process are appropriate information systems, planning procedures, anddecision-making techniques. A soundly-based information system will scan the environment, gather appropriate data, interpret this data into opportunities and challenges, and provide a concretefoundation for strategies that could function as much to avoid crises as to intervene and resolve them.Preventive efforts, as stated before, require preparations before any crisis symptoms set in. Generally strategic forecasting, contingency planning, issues analysis, and scenario analysis help to provide a framework that could be used in avoiding and encountering crises.出处:出处:Toby TobyJ. Kash and John R. Darling . Crisis management: prevention, diagnosis 179-186二、翻译文章标题:危机管理:预防,诊断和干预译文:本文的前提是,如果该公司做好准备得话,危机可以更有效地进行管理。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
毕业论文英文文献及翻译————————————————————————————————作者:————————————————————————————————日期:Based on GSM module and AT89C51 connectiondesign and application---From 《GSM principle and its network optimization》chapter one---From 《New single chip microcomputer interface device and technology》chapter sixAbstractThis article through analyzed the GSM module and the monolithic integrated circuit connection design simply introduced the TC35i module commonly used instruction and the coding rule, introduced emphatically the TC35i module and the AT89C51 principle of work, the periphery connection electric circuit, the software control technology, at the same time has produced some TC35i module and the AT89C51 connection application procedure, proposed AT89C51 when receive data should pay attention question, thus designed has the GSM module the data transmission terminal.Key words: GSM network1 Summarize:Along with correspondence technique of development, according to the service function of the NTT DoCoMo net, just to industry control and control from a distance the realm have continuously extension of trend.Is orientation this kind of demand, Siemens company released a new generation wireless correspondence GSM mold piece-TC35i, according to should the short news function of the mold piece, can fast safety credibility realization customer information processing etc. function, special be applicable to control centre and terminal equipments distance very far, or inconvenience adoption wired correspondence lie quality etc. situation, for example the oil well information collect behind of deliver, the long range copy form system, city transportation direction etc. all according to the TC35i mold piece to realization.2 The application of GSM network:GSM is Global System for Mobile Communications acronym, which means Global System for Mobile Communications is the world's leading cellular systems inthe world. GSM is based on narrowband TDMA standard that allows radio frequency in a group call at the same time 8. GSM80 during the rise in Europe, put into use in 1991. The end of 1997, has operations in more than 100 countries, Europe and Asia has become the standard in fact, that by 2001, the world's 162 countries have already built a 400 GSM communications network. But the GSM system capacity is limited, users in the network overload, it had to construct additional network facilities. What is gratifying is that GSM performance in other areas, which in addition to providing a standardized list and signaling systems, but also opened up some of the more intelligent of the business such as international roaming and so on. The convenience of GSM mobile phone is that it provides a smart card, known as SIM cards, and card could be separated, so that the replacement of mobile phone users and custom personal information in this area are facilitated.GSM network to improve after years of development, is now very mature, less blind spots, signal stability, automatic roaming, and the communication distance from the impact of the surrounding environment. GSM short message in particular, flexible and convenient, you can cross-market, inter-provincial and even cross-border transmission, and each send a short message as long as one dime, very reliable and affordable. In addition, the mobile phone SIM card in recent years can apply for 0, some packages use lower cost than fixed. Therefore the use of mobile phone message to achieve alarm, ultra long-range remote control for industrial equipment, transmission of data is a very good choice.GSM module, is a similar mobile communication module, integrates a number of mobile phone functions on a single small circuit board, it can send SMS messages, calls and so on, the module is small, but it has a lot of mobile phone functionality, with its have equal is the core of the mobile phone, and it is in a lot of applications have a wide range of applications, GSM module through the use of AT commands to control it, modules can be connected to computer RS232 serial port, can also be used to carry out single-chip control . Below we cite some typical applications:2.1 mobile phone access control system:GSM Access Control System used to control the electric lock control, if you need to enter, as long as the cell phone call using GSM modules mobile number, will automatically open the door, and only you can set up cell phone numbers to open the door, and no costs.2.2 three billboard over the weather disaster emergency turn off:Over three billboards are constantly flip through the motor to achieve a number of ads displayed, because installed in the outdoors, when there is wind, hail and other weather disasters, billboards could easily be blown bad or damaged card die, when in need of emergency shut down, You can normally closed relay contact to control the power of advertising, when you need to do is send "turn off" control message, the billboard will automatically turn off, and automatically after a certain time delay automatically return to normal job (generally disastrous weather will not continue for a long time) in advance if you want to open a billboard, you can send "Open" control message.2.3 engineering system balance reminders:Some works are safe after the completion of the normal operation after a period of time to settle the balance, if the encounter malicious clients the outstanding purchase price, often installed side very headache, because equipment has been installed, if the loss of a great come back down, particularly in the field customer very costly when the client system can be installed in the GSM module, use it all the way to control system or the way some of the key points, when the customer paid in arrears when the malicious message can turn off some features, forcing customers to pay the purchase price then immediately open message, if you have a smooth recovery of the purchase price can also be the name of system maintenance by the GSM module removed from the client system.2.4 monitoring systems or Web servers and reset the alarm:Monitoring system or web server running after a long period after death may be wrong, this time to power on reset is the only solution at this time through the GSM module can control system power, and set to open automatically after 3 seconds turn off mode, can achieve power reduction, in addition, GSM module in some special application areas also played a very large role, such as: the disappearance of the main power supply, memory errors, fan shutdown, fuel depletion, it was the invasion and other information, are not people the ideal choice for monitoring the engine room.2.5 the remote control of home appliances:Through the message can easily achieve the remote control to open rice cookers, water heaters and other appliances by remote control or switch to repair mode can also control the air-conditioning GSM global wireless mobile communication network control alarm host, using the global GSM short message data transmission mode and voice-enabled platform for the completion of intelligent data transmission and remotecontrol alarm, set the host family, shops, office safety, electrical control, remote monitoring, such as Intelligent home functions, because of the global GSM wireless mobile communication network signal coverage area of Canton, and truly realize the low-cost high-quality ultra-long-distance convenient and flexible intelligent wireless control and alarm, to solve the fixed-line telephone or cable broadband network wired alarm limitations. GSM global wireless mobile communications network in popularity all over the world, the GSM global wireless mobile communication network control alarm can be widely used in a single host family, community property, electricity, transportation, petroleum, coal, railway, municipal and public security departments of the security industry prevention devices, data monitoring and remote monitoring system. Wireless Road, with 11 defense areas, 2-way Cable Standoff, different defense area alarm, alarm and message control, separate from a defended position, remote control, home appliance control, linkage to take photographs with the latest alarm center network characteristics.Features:1. Wireless suspects under strict surveillance, no wiring, and ease of installation.2. Cable suspects under strict surveillance, safe and reliable.3. Wireless remote control security / from a defended position, easy to operate.4. Adaptability widely used global-band wireless mobile networks.5. Password settings, confidentiality stronger.6. Alarm, the high-decibel alarm sound to deter thieves.7. Host automatically to six groups of mobile numbers to send SMS alerts. Alarm message and a telephone can be set up8. Host automatically dial the six groups of mobile or fixed telephone warning, start-site monitoring.9. Preset scene alarm and alarm message10. With emergency alarm function, can prevent thieves burglary, detection of gas leaks and smoke fire.11. Communicate electric missing Detect and alarm, to prevent the intentional destruction of the power system and power failure monitoring.12. Communicate after the loss of electricity automatically switch to a back-up battery. 13. Available through GSM network platform and networking alarm center.14. Supported message in Chinese or English instructions.15. Handset intercom mode: Matching intercom calls, and alarm can be two-wayintercom, real-time clear police intelligence to prevent unnecessary alarm.3 The TC35i mold piece introductionCurrently, domestic already beginning usage of the GSM mold piece have a lot, and these of function, method of using difference not big.What this design adoption is a Siemens TC35 the TC35i of the series.On this kind of wireless mold piece function and TC35 and permit, design tightly packed, consumedly contracted the physical volume of customer's product.The TC35i and GSM2/2 and permit,dual-band(GSM900/GSM1800), RS232 the data connect, should mold piece and radio frequency electric circuit and Ji take and integral whole, provide toward the customer standard of AT order connect, is data, speech, short news and fax provide fast, credibility, safety of deliver, convenience customer of application development and design.3.1 The GSM AT instruction introduction that the mold has something to do with SMS in the piec e:The order for provide of the GSM- powered mold piece match GSM07.05 and GSM07.07 norm.In the GSM07.07 definition of the AT Command connect and provided a kind of which GSM AT Instruction TC35i AT89C51move terrace and data terminal equipments of in general use connect;The GSM07.05 made to the short news detailed of provision.At short news mold piece receive network hair of short news, can send out a designation information through a string of, the data terminal equipments can send out toward the GSM mold piece various order.The instruction of GSM AT having something to do with SMS such as List1 to show.The instruction of GSM AT gather, is signed letter, Motorola and HP etc. factory house by Nokia, love to together develop for the GSM system of, among them include control SMS(Short Message Service).3.2 The PDU code rule:Send out short news in common use Text and PDU(Protocol Data Unit, agreement data unit) mode currently.The usage Text mode receive and dispatch a message code simple, realization get up very easy, but the biggest weakness be to can't receive and dispatch Chinese message;But PDU mode not only support Chinese message, also the ability send out English message.The PDU mode receive and dispatch a message can the usage be 3 kinds of to code:7-bit, 8-bit and UCS2 code.7-the bit code to used for send out common of ASCII character list, 8-bitcode Be usually used for sending out data news, UCS2 code used for sending out Unicode character list.General PDU's code is constitute by ABCDEFGHIJKLM 13.A:The address length of the message center, 216 enter to make number(one word stanza)B:The number type of the message center, 216 enter to make number.C:Message center number, B+C length will from the data decisionD:Document head word stanza, 216 enter to make number.E:Information type, 216 enter to make number.F:Drive call number length, 216 enter to make number.G:Drive call number type, 216 enter to make number, take value togetherH:Drive call number, length from data within F decision.I:Agreement marking, 216 enter to make number.J:The data code a project, 216 enter to make number.K:Term of validity, 216 enter to make number. L:Customer data length, 216 enter to make number.M:Customer's data, its length from the data decision in the L.Enactment in J adoption UCS2 code, here is the Unicode character list of Chinese-English.4 the hardware of the TC35i and list slice machine connect a people'selectric circuitThe TC35i mold piece is main to save according to the processor, GSM radio frequency mold piece, power supply mold piece, Shan from the GSM, the ZIF conjunction machine, antenna connect six part constitute.Connect machine with a list slice machine realization electric circuit to connect through a ZIF, should connect read or send out the TC35i mold piece in of data.5 list slice the software of the machine and TC35i connect and controlprinciple8051 one-chip computer have four 8 walk abreast I/O port, call P0, P1, P2 and P3. Each port is 8 accurate two-way mouths, accounts for 32 pins altogether. Every one I/O line can be used as introduction and exported independently. Each port includes a latch (namely special function register ), one exports the driver and a introduction buffer . Make data can latch when outputting, data can buffer when making introduction , but four function of passway these self-same. Expand among the system of memory outside having slice, four port these may serve as accurate two-way mouth of I/O in common use. Expand among the system of memory outsidehaving slice, P2 mouth see high 8 address off; P0 mouth is a two-way bus, send the introduction of 8 low addresses and data / export in timesharingList slice the software of the machine and TC35i connect in fact be list slice the machine pass AT instruction control cellular phone of control technique, first constitution the TC35i mold piece of work mode:AT+CMGF=n, n=0 is a PDU mode;N=1 write an article this mode;Usually the constitution is a PDU mode, under this kind of mode, ability transmission or accept a transparent data.(customer from definition data)AT+CMGR=n in order to read the short news data of the TC35i mold piece, the n is a short news number.AT+CMGL=n in order to list the short news in the TC35i mold piece, n=0 is the short news which read, n=a the short news which have been already read, n=2 short news which sent out, n=3 for have already send out of short news n=4 is all short news.AT+CMGD=the n is the short news which delete the TC35i mold piece and the n is a short news serial number.6 Master routineThe software plait distance pass to write in toward the TC35i dissimilarity of AT instruction ability completion variety function, such as network debarkation, read SIM card top telephone number, send out SMS news and receive SMS news etc..The instruction sign, constant, PDU data...etc. of AT instruction all code form transmission by ASCII;The transmission transparent data have to pair of the TC35i mold piece of work mode constitution is PDU mode;List slice machine toward the TC35i mold piece after send out each instruction have to with return to car sign conduct and actions should instruction of be over, for example list slice the machine send out instruction in"AT+ CMGF=0" toward the cellular phone, its ASCII code sequence is"41 H, 54 H, 2 BH, 42 H, 4 DH, 47 H, 46 H, 3 DH, 30 H, 0 DH", the last word stanza 0 DH is to return to car sign, mean that instruction be over, if have no this to return to car sign, the cellular phone won't identify this instruction.When the AT instruction which receive to an integrity of the TC35i mold piece after, the TC35i mold piece not summary execution should instruction, but first just receive of the ASCII of the AT instruction code sequence all anti- send out;(contain 0 DH)Secondly send out a the ASCII which return to car sign with a carriage return sign to code, namely 0 DH with 0 AH;Then performance should instruction.The list slice machine read the PDU data of the TC35i mold piece, originality data should is 16 enter make number, but read back of data still is an ASCII mean of 16 enter make number.So a word stanza of 16 entered to make number and thenbecame 2 word stanza of ASMII code.But the PDU data data word stanza length within pack part still is actual character list length.But isn't the word stanza which become ASCII code length, this at plait distance should special attention, otherwise receive of data not integrity.The list slice machine is after receiving a PDU data pack data have to its instauration become 16 enter make a data, its calculate way as follows:Establish a for the ASCII code receive, b for the conversion is behind of 16 enter make number.So if a<39 H,b=a-30 H;If a>39 H, b=h-07 H a-30.End pair of in front and back two pieces merger is a word stanza.Concluding remark The usage cellular phone mold piece benefit is at the system integration, the cost be lower.Install correspondence circuit in secluded region etc. difficulty or uneconomical place, engineering service facilities can freedom vivid of constitution, no longer be subjected to geography condition of restriction.In fine, GSM mold piece the price be cheap, application extensive, application the foreground be captivating, pass with cellular phone mold the piece connect can very convenience of design customer demand of the data receive terminal.基于 GSM 模块与 AT89C51 的接口设计及应用的接口设计及应用-----摘自《GSM 原理及其网络优化》第一章-----摘自《新型单片机接口器件与技术》第六章摘要本文通过分析 GSM 模块与单片机的接口设计简单介绍了 TC35i 模块的常用指令及摘编码规则,着重介绍了 TC35i 模块与 AT89C51 的工作原理、外围接口电路、软件控制技术,同时给出了一些 TC35i 模块与 AT89C51 接口的应用程序,提出了 AT89C51 在接收数据时应该注意的问题,从而设计出具有 GSM 模块的数据传输终端。