信息系统信息技术毕业论文中英文资料外文翻译文献

信息系统信息技术毕业论文中英文资料外文翻译文献
信息系统信息技术毕业论文中英文资料外文翻译文献

信息系统信息技术

中英文资料外文翻译文献

外文文献翻译

Information Systems Outsourcing Life Cycle And Risks Analysis 1. Introduction

Information systems outsourcing has obtained tremendous attentions in the information technology industry.Although there are a number of reasons for companies to pursuing information systems (IS)outsourcing , the most prominent motivation for IS outsourcing that revealed in the literatures was “cost saving”. Costfactor has been a major decision factors for IS outsourcing.

Other than cost factor, there are other reasons for outsourcing decision.The Outsourcing Institute surveyed outsourcing end-users from their membership in 1998 and found that top 10 reasons companies outsource were:

Reduce and control operating costs,improve company focus,gain access to world-class capabilities,free internal resources for other purposes, resources are not available internally, accelerate reengineering benefits, function difficult to manage/out of control,make capital funds available, share risks, and cash infusion.

Within these top ten outsourcing reasons, there are three items that related to financial concerns, they are operating costs, capital funds available, and cash infusion. Since the phenomenon of wage difference exists in the outsourced countries, it is obvious that outsourcing companies would save remarkable amount of labor cost.According to Gartner, Inc.'s report, world business outsourcing services would grow from $110 billion in 2002 to $173 billion in 2007,a proximately 9.5% annual growth rate.

In addition to cost saving concern, there are other factors that influence outsourcing decision, including the awareness of success and risk factors, the outsourcing risks identification and management,and the project quality management. Outsourcing activities are substantially complicated and outsourcing project usually carries a huge array of risks. Unmanaged outsourcing risks will increase total project cost, devaluate

software quality, delay project completion time, and finally lower the success rate of the outsourcing project.Outsourcing risks have been discovered in areas such as unexpected transition and management costs, switching costs, costly contractual amendments, disputes and litigation, service debasement, cost escalation, loss of organizational competence, hidden service costs,and so on.

Most published outsourcing studies focused on organizational and managerial issues. We believe that IS outsourcing projects embrace various risks and uncertainty that may inhibit the chance of outsourcing success. In addition to service and management related risk issues, we feel that technical issues that restrain the degree of outsourcing success may have been overlooked. These technical issues are project management, software quality, and quality assessment methods that can be used to implement IS outsourcing projects.Unmanaged risks generate loss. We intend to identify the technical risks during outsourcing period, so these technical risks can be properly managed and the cost of outsourcing project can be further reduced. The main purpose of this paper is to identify the different phases of IS outsourcing life cycle, and to discuss the implications of success and risk factors, software quality and project management,and their impacts to the success of IT outsourcing.

Most outsourcing initiatives involve strategic planning and management participation, therefore, the decision process is obviously broad and lengthy. In order to conduct a comprehensive study onto outsourcing project risk analysis, we propose an IS outsourcing life cycle framework to be served as a yardstick. Each IS outsourcing phase is named and all inherited risks are identified in this life cycle framework.Furthermore,we propose to use software qualitymanagement tools and methods in order to enhance the success rate of IS outsourcing project.

ISO 9000 is a series of quality systems standards developed by the International Organization for Standardization (ISO).ISO's quality standards have been adopted by many countries as a major target for quality certification.Other ISO standards such as ISO 9001, ISO 9000-3,ISO 9004-2, and ISO 9004-4 are quality standards that can be applied to the software industry.Currently, ISO is working on ISO 31000, a risk management guidance standard. These ISO quality systems and risk management standards are generic in nature, however, they may not be sufficient for IS outsourcing practice. This paper, therefore,proposes an outsourcing life cycle framework to distinguish related quality and risk management issues during outsourcing practice.

The following sections start with needed theoretical foundations to IS outsourcing,including economic theories, outsourcing contracting theories, and risk theories. The IS outsourcing life cycle framework is then introduced.It continues to discuss the risk implications in precontract,contract, and post-contract phases. ISO standards on quality systems and risk management are discussed and compared in the next section. A conclusion and direction for future study are provided in the last section.

2. Theoretical foundations

2.1. Economic theories related to outsourcing

Although there are a number of reasons for pursuing IS outsourcing,the cost saving

is a main attraction that leads companies to search for outsourcing opportunities. In principle, five outsourcing related economic theories that lay the groundwork of outsourcing practice, theyare:(1)production cost economics,(2)transaction cost theory,(3)resource based theory,(4)competitive advantage, and(5)economies of scale.

Production cost economics was proposed by Williamson, who mentioned that “a firm seeks to maximize its profit also subjects to its production function and market opportunities for selling outputs and buying inputs”. It is clear that produc tion cost economics identifies the phenomenon that a firm may pursue the goal of low-cost production process.

Transaction cost theory was proposed by Coase. Transaction cost theory implies that in an economy, there are many economic activities occurred outside the price systems. Transaction costs in business activities are the time and expense of negotiation, and writing and enforcing contracts between buyers and suppliers .When transaction cost is low because of lower uncertainty, companies are expected to adopt outsourcing.

The focus of resource-based theory is “the heart of the firm centers on deployment and combination of specific inputs rather than on avoidance of opportunities”. Conner suggested that “Firms as seekers of costly-to-copy inputs for production and distribution”.Through resource-based theory, we can infer that “outsourcing decision is to seek external resources or capability for meeting firm's objectives such as cost-saving and capability improving”.

Porter, in his competitive forces model, proposed the concept of competitive advantage. Besanko et al.explicated the term of competitive advantage, through economic concept, as “When a firm(or business unit within a multi-business firm) earns a higher rate of economic profit than the average rate of economic profit of other firms competing within the same market, the firm has a competitive advantage.” Outsourcing decision, therefore, is to seek cost saving that meets the goal of competitive advantage within a firm.

The economies of scale is a theoretical foundation for creating and sustaining the consulting business. Information systems(IS) and information technology(IT) consulting firms, in essence, bear the advantage of economies of scale since their average costs decrease because they offer a mass amount of specialized IS/IT services in the marketplace.

2.2. Economic implication on contracting

An outsourcing contract defines the provision of services and charges that need to be completed in a contracting period between two contracting parties. Since most IS/IT projects are large in scale, a valuable contract should list complete set of tasks and responsibilities that each contracting party needs to perform. The study of contracting becomes essential because a complete contract setting could eliminate possible opportunistic behavior, confusion, and ambiguity between two contracting parties.

Although contracting parties intend to reach a complete contract,in real world, most contracts are incomplete. Incomplete contracts cause not only implementing difficulties

but also resulting in litigation action. Business relationship may easily be ruined by holding incomplete contracts. In order to reach a complete contract, the contracting parties must pay sufficient attention to remove any ambiguity, confusion, and unidentified and immeasurable conditions/ terms from the contract. According to Besanko et al., incomplete contracting stems from the following three factors: bounded rationality, difficulties on specifying or measuring performance, and asymmetric information.

Bounded rationality describes human limitation on information processing, complexity handling, and rational decision-making. An incomplete contract stems from unexpected circumstances that may be ignored during contract negotiation. Most contracts consist of complex product requirements and performance measurements. In reality, it is difficult to specify a set of comprehensive metrics for meeting each party's right and responsibility. Therefore, any vague or open-ended statements in contract will definitely result in an incomplete contract. Lastly, it is possible that each party may not have equal access to all contract-relevant information sources. This situation of asymmetric information results in an unfair negotiation,thus it becomes an incomplete contract.

2.3. Risk in outsource contracting

Risk can be identified as an undesirable event, a probability function,variance of the distribution of outcomes, or expected loss. Risk can be classified into endogenous and exogenous risks. Exogenous risks are“risks over which we have no control and which are not affected by our actions.”. For example, natural disasters such as earthquakes and flood are exogenous risks. Endogenous risks are “risks that are dependent on our a ctions”.We can infer that risks occurring during outsource contracting should belong to such category.

Risk (RE) can be calculated through “a function of the probability of a negative outcome and the importance of the loss due to the occurrence of this outcome:

RE = ΣiP(UOi)≠L(UOi) (1) where P(UOi) is the probability of an undesirable outcome i, and L(UOi) is the loss due to the undesirable outcome i.”.

Software risks can also be analyzed through two characteristics :uncertainty and loss. Pressman suggested that the best way to analyze software risks is to quantify the level of uncertainty and the degree of loss that associated with each kind of risk. His risk content matches to above mentioned Eq.(1).Pressman classified software risks into the following categories: project risks, technical risks, and business risks.

Outsourcing risks stem from various sources. Aubert et al. adopted transaction cost theory and agency theory as the foundation for deriving undesirable events and their associated risk factors.Transaction cost theory has been discussed in the Section 2.2. Agency theory focuses on client's problem while choosing an agent(that is, a service provider), and working relationship building and maintenance, under the restriction of information asymmetry.Various risk factors would be produced if such agent–client relationship becomes crumble.

It is evident that a complete contract could eliminate the risk that caused by an incomplete contract and/or possible opportunistic behavior prompted by any contracting party. Opportunistic behavior is one of the main sources that cause transactional risk. Opportunistic behavior occurs when a transactional partner observes away of saving cost or removing responsibility during contracting period, this company may take action to pursue such opportunity. This type of opportunistic behavior could be encouraged if such contract was not completely specified at the first place.

Outsourcing risks could generate additional unexpected cost to an outsourcing project. In order to conduct a better IS outsourcing project, identifying possible risk factors and implementing matured risk management process could make information systems outsourcing more successful than ever.

https://www.360docs.net/doc/d14377230.html,rmation system outsourcing life cycle

The life cycle concept is originally used to describe a period of one generation of organism in biological system. In essence, the term of life cycle is the description of all activities that a subject is involved in a period from its birth to its end. The life cycle concept has been applied into project management area. A project life cycle, according to Schwalbe, is a collection of project phases such as concept,development, implementation, and close-out. Within the above mentioned four phases, the first two phases center on “planning”activity and the last two phases focus on “delivery the actual work” Of project management.

Similarly, the concept of life cycle can be applied into information systems outsourcing analysis. Information systems outsourcing life cycle describes a sequence of activities to be performed during company's IS outsourcing practice. Hirsch heim and Dibbern once described a client-based IS outsourcing life cycle as: “It starts with the IS outsourcing decision, continues with the outsourcing relationship(life of the contract)and ends with the cancellation or end of the relationship, i.e., the end of the contract. The end of the relationship forces a new outsourcing decision.” It is clear that Hirsch heim and Dibbern viewed “outsourcing relationship” as a determinant in IS outsourcing life cycle.

IS outsourcing life cycle starts with outsourcing need and then ends with contract completion. This life cycle restarts with the search for a new outsourcing contract if needed. An outsourcing company may be satisfied with the same outsourcing vendor if the transaction costs remain low, then a new cycle goes on. Otherwise, a new search for an outsourcing vendor may be started. One of the main goals for seeking outsourcing contract is cost minimization. Transaction cost theory(discussed in the Section 2.1)indicates that company pursuing contract costs money, thus low transaction cost will be the driver of extending IS outsourcing life cycle.

The span of IS outsourcing life cycle embraces a major portion of contracting activities. The whole IS outsourcing life cycle can be divided into three phases(see Fig.1): pre-contract phase, contract phase, and post-contract phase. Pre-contract phase includes activities before a major contract is signed, such as identifying the need for outsourcing, planning and strategic setting, and outsourcing vendor selection. Contract phase starts

while an outsourcing contract is signed and then lasted until the end of contracting period. It includes activities such as contracting process, transitioning process, and outsourcing project execution. Post-contract phase contains those activities to be done after contract expiration, such as outsourcing project assessment, and making decision for the next outsourcing contract.

Fig.1. The IS outsourcing life cycle

When a company intends to outsource its information systems projects to external entities, several activities are involved in information systems outsourcing life cycle. Specifically, they are:

1. Identifying the need for outsourcing:

A firm may face strict external environment such as stern market competition,

competitor's cost saving through outsourcing, or economic downturn that initiates it to consider outsourcing IS projects. In addition to external environment, some internal factors may also lead to outsourcing consideration. These organizational predicaments include the need for technical skills, financial constraint, investors' request, or simply cost saving concern. A firm needs to carefully conduct a study to its internal and external positioning before making an outsourcing decision.

2. Planning and strategic setting:

If a firm identifies a need for IS outsourcing, it needs to make sure that the decision to outsource should meet with company's strategic plan and objectives. Later, this firm needs to integrate outsourcing plan into corporate strategy. Many tasks need to be fulfilled during planning and strategic setting stages, including determining outsourcing goals, objectives, scope, schedule, cost, business model, and processes. A careful outsourcing planning prepares a firm for pursuing a successful outsourcing project.

3. Outsourcing vendor selection:

A firm begins the vendor selection process with the creation of request for information (RFI) and request for proposal (RFP) documents. An outsourcing firm should provide sufficient information about the requirements and expectations for an outsourcing project. After receiving those proposals from vendors, this company needs to select a prospective outsourcing vendor, based on the strategic needs and project requirements.

4. Contracting process:

A contract negotiation process begins after the company selects a probable outsourcing vendor. Contracting process is critical to the success of an outsourcing project since all the aspects of the contract should be specified and covered, including fundamental, managerial, technological, pricing, financial, and legal features. In order to avoid resulting in an incomplete contract, the final contract should be reviewed by two parties' legal consultants.Most importantly, the service level agreements (SLA) must be clearly identified in the contract.

5. Transitioning process:

Transitioning process starts after a company signed an outsourcing contract with a vendor. Transition management is defined as “the detailed, desk-level knowledge transfer and documentation of all relevant tasks, technologies, workflows, people, and function s”.Transitioning process is a complicate phase in IS outsourcing life cycle since it involves many essential workloads before an outsourcing project can be actually implemented. Robinson et al.characterized transition management into the following compone nts:“employee management, communication management, knowledge management, and quality management”. It is apparent that conducting transitioning process needs the capabilities of human resources, communication skill, knowledge transfer, and quality control.

6. Outsourcing project execution:

After transitioning process, it is time for vendor and client to execute their outsourcing project. There are four components within this“contract governance” stage:

project management, relationship management, change management, and risk management. Any items listed in the contract and its service level agreements (SLAs) need to be delivered and implemented as requested. Especially, client and vendor relationships, change requests and records, and risk variables must be carefully managed and administered.

7. Outsourcing project assessment:

During the end of an outsourcing project period, vendor must deliver its final product/service for client's approval. The outsourcing client must assess the quality of product/service that provided by its client. The outsourcing client must measure his/her satisfaction level to the product/service provided by the client. A satisfied assessment and good relationship will guarantee the continuation of the next outsourcing contract.

The results of the previous activity (that is, project assessment) will be the base of determining the next outsourcing contract. A firm evaluates its satisfaction level based on predetermined outsourcing goals and contracting criteria. An outsourcing company also observes outsourcing cost and risks involved in the project. If a firm is satisfied with the current outsourcing vendor, it is likely that a renewable contract could start with the same vendor. Otherwise, a new “precontract phase” woul d restart to search for a new outsourcing vendor.This activity will lead to a new outsourcing life cycle. Fig.1 shows two dotted arrowlines for these two alternatives: the dotted arrow line 3.a.indicates “renewable contract” path and the dotted arrow line 3.b. indicates “a new contract search” path.

Each phase in IS outsourcing life cycle is full of needed activities and processes (see Fig.1). In order to clearly examine the dynamics of risks and outsourcing activities, the following sections provide detailed analyses. The pre-contract phase in IS outsourcing life cycle focuses on the awareness of outsourcing success factors and related risk factors. The contract phase in IS outsourcing life cycle centers on the mechanism of project management and risk management. The post-contract phase in IS outsourcing life cycle concentrates on the need of selecting suitable project quality assessment methods.

4. Actions in pre-contract phase: awareness of success and risk factors

The pre-contract period is the first phase in information systems outsourcing life cycle (see Fig.1). While in this phase, an outsourcing firm should first identify its need for IS outsourcing. After determining the need for IS outsourcing, the firm needs to carefully create an outsourcing plan. This firm must align corporate strategy into its outsourcing plan.

In order to well prepare for corporate IS outsourcing, a firm must understand current market situation, its competitiveness, and economic environment. The next important task to be done is to identify outsourcing success factors, which can be used to serve as the guidance for strategic outsourcing planning. In addition to know success factors,an outsourcing firm must also recognize possible risks involved in IS outsourcing, thus allows a firm to formulate a better outsourcing strategy.

Conclusion and research directions

This paper presents a three-phased IS outsourcing life cycle and its associated risk factors that affect the success of outsourcing projects.Outsourcing life cycle is complicated and complex in nature. Outsourcing companies usually invest a great effort to select suitable service vendors However,many risks exit in vendor selection process. Although outsourcing costs are the major reason for doing outsourcing, the firms are seeking outsourcing success through quality assurance and risk control. This decision path is understandable since the outcome of project risks represents the amount of additional project cost. Therefore, carefully manage the project and its risk factors would save outsourcing companies a tremendous amount of money.

This paper discusses various issues related to outsourcing success, risk factors, quality assessment methods, and project management techniques. The future research may touch alternate risk estimation methodology. For example, risk uncertainty can be used to identify the accuracy of the outsourcing risk estimation. Another possible method to estimate outsourcing risk is through the Total Cost of Ownership(TCO) method. TCO method has been used in IT management for financial portfolio analysis and investment decision making. Since the concept of risk is in essence the cost (of loss) to outsourcing clients, it thus becomes a possible research method to solve outsourcing decision.

Source:D.C. Chou, A.Y. Chou,《Information systems outsourcing life cycle and risks analysis》, Computer Standards & Interfaces (2008), doi:10.1016/j.csi.2008.09.032

信息系统的生命周期和风险分析

1.绪言

信息系统外包在信息技术工业已经获得了巨大的关注。虽然有许多原因让公司推行信息系统(IS)外包,文献中显示IS外包最突出的动机是“节约成本”,成本因素是外包的一个重要的决定因素。

除了成本因素,还有其他一些原因决定了外包。外包研究所1998年从他们的成员中调查了外包最终用户,发现了公司外包的前十个原因:

减少和控制经营成本,改善公司的重点,获得世界一流的能力,将免费的内部资源用于其他目的,使用国内无法得到的资源,获得加速重组的好处,功能难以管理/失去控制,使资本资金可用,分担风险,和现金注入。

在这些外包的十大原因中,有三个涉及财务关注的项目,他们是经营成本,可获得的资本资金,和现金注入。由于在外包的国家中存在工资差别现象,显而易见的是,外包公司将节省大量的劳动力成本。根据Gartner公司的报告,世界商业外包服务在2002年到2007年,将从增长一千百点零亿美元到增长一千七百三十点零亿美元,近9.5%的年增长率。

除了关注节省成本,还有决定外包的其他影响因素,其中包括成功的意识和风险因素,外包的风险识别和管理,项目质量管理。外包活动基本上是复杂的并且外包项目通常带有一个巨大的风险。非托管外包的风险会增加项目总成本,贬值软件的质量,拖延项目的完工时间,最后还有成功率较低的外包项目。外包的风险在某些领域已经发现,如意外转型和管理费用,转换成本,昂贵的合同修正案,争端和诉讼,服务贬低,费用上涨的损失,组织能力,隐藏的服务费用,等等。

大多数关于外包的出版研究侧重于组织和管理问题。我们认为IS外包项目包括各种风险和不确定性,可能会抑制外包成功的机会。除了服务和管理有关的风险问题,我们认为,制约外包成功程度的技术问题可能已被忽视。这些技术问题是项目管理,软件质量,和可以用来推行IS外包项目的质量评估方法。非托管风险产生损失。我们打算在外包期间辨认技术风险,所以这些技术风险能够得到适当的管理并且外包项目的成本效益可以进一步降低。本文的主要目的确定IS外包的生命周期的不同阶段,并且讨论成功的影响和风险因素,软件的质量和项目管理,和它们对IT 外包成功的影响。

大多数外包举措涉及战略规划和管理,因此,决定的过程显然是广泛的和漫长的。为了在外包项目风险分析上进行全面的研究,我们提议将IS外包生命周期框架作为一个尺度。每个IS外包阶段都被命名,并且在这个生命周期的框架中,所有继承风险都被确定了。此外,我们建议使用软件质量管理工具和方法,以提高IS外包项目的成功率。

ISO 9000是由国际标准化组织(ISO)开发的一系列质量体系标准。ISO的质量标准已经作为质量体系认证的主要目标适用于许多国家。其他ISO标准,如ISO 9001认证,ISO 9000-3,ISO 9004-2和ISO 9004-4都是可用于软件产业的质量标准。目前,国际标准化组织正在制定的ISO 31000 ,一个风险管理的指导标准。这些ISO 质量体系和风险管理标准是通用性的,然而,他们可能对IS外包业务不够充足。本文因此提出了一种外包生命周期的框架,以区分在外包业务中的质量和风险管理相关问题。以下各节从IS外包的需要理论基础开始,包括经济理论,外包合同的理论和风险理论,然后介绍了IS外包生命周期的框架。它继续讨论在预约,合同,后合同阶段的风险影响。ISO在质量体系和风险管理上的标准,在下一节中讨论和比较。最后一节提供了结论和未来研究的方向。

2.理论基础

2.1.与外包有关的经济理论

虽然有许多理由推行IS外包,节约成本是导致公司寻求外包机会的一个主要吸引力。从原则上说,奠定外包业务基础的五个外包相关的经济理论是:(1)生产成本经济学,(2)交易成本理论,(3)资源基础理论,(4)竞争优势,和(5)规模经济。生产成本经济学是由威廉姆森提出的,他提到“公司追求利润最大化的同时,为销售和采购的投入产出控制它的生产功能和市场机会。”很显然,生产成本经济学确定了一个公司可能追求低成本的生产过程目标的现象。

交易成本理论是由科斯提出的。交易成本理论意味着,在目前的经济形势下,有许多经济活动发生在价格体系以外。商业活动中的交易成本是时间和谈判的费用,买家和供应商之间起草和执行合同。当交易成本因为较低的不确定性而低时,公司预期采取外包。

资源基础理论的重点是:“企业中心在部署和具体投入组合上的核心,而不是逃避机会。”康纳认为,“公司是生产和分配的昂贵的拷贝投入追求者”。通过资源基础理论,我们可以推断,“决定外包是为了寻求外部资源或能力,以满足公司的目标,如节约成本和提高能力”。

波特在他的竞争力模型中提出了竞争优势的概念,贝赞可等人通过经济的概念阐述了竞争优势的项目,例如“当一个公司(或企业单位,一个多业务公司)获得

了比竞争在同一市场上的其他公司的平均经济利润更高的经济效益,那么该公司具有竞争优势。”外包的决定,因此是为了寻求节约成本,以实现一个具有竞争优势的企业的目标。

规模经济是创造和维持咨询业务的一个理论基础。信息系统(IS)和信息技术(IT)咨询公司,从本质上讲,由于它们在市场上提供了大量IS/IT专业服务,它们的平均费用下降,所以具备规模经济的优势。

2.2.订立合同的经济意义

外包合同确立了在一个合同期双方需要完成的的服务和收费的标准。因为很多IS/IT项目规模大,一个有价值的合同应列出一套完整的每一缔约方必须履行的任务和职责。订约的研究变得十分重要,因为一个完整的合同设置可消除两个缔约方之间的可能机会主义行为,混淆,模棱两可。

虽然缔约各方打算达到一个完整的合同,在现实世界中,大多数合同是不完整的。不完整合同不仅引起执行困难,还造成了诉讼案件。业务上的关系可能因为不完整合同很容易被破坏。为了达到一个完整的合同,缔约各方必须予以足够的重视以消除任何含糊,混乱,与合同中不确定的和不可估量的条件/条款。

依据贝赞可等人的观点,不完整的订约源于以下三个因素:有限理性,困难指定或计量性能和信息不对称。

有限理性描述人类在信息处理,复杂的处理,合理的决策上的限制。一个不完整的合同来自意想不到的情况下,一些事项可能会在合同谈判时被忽略。合同包括复杂的产品要求和性能测量。在现实中,很难指定一套全面的数据,以满足每一方的权利和责任。因此,在合同中任何含糊或没有限度的声明肯定会导致不完整的合同。最后,可能每一方也许无法平等地获得所有与合同有关的信息来源。这种信息不对称的情况导致不公平的谈判,因此,它成为一个不完全契约。

2.3.外包合同的风险

风险可以被确定为不良事件,概率函数,结果的方差分布,或预期损失。风险可分为内在和外在风险。外来风险是“风险是我们无法控制的,是不被我们的行动影响的。”例如,自然灾害(如地震和水灾)是外生风险。内源性风险是“取决于我们的行动的风险”。我们可以推断,发生在外包合同缔约时的风险属于这一类。

风险(RE)可以通过“消极结果的概率函数和结果发生造成损失的重要性”计算出来:

RE= ΣiP(UOi)≠L(UOi) (1) 其中P(UOi)是一个不可取的结果i的概率,i和L(UOi)是由于不良的结果i造成的损失”。

软件风险也可以通过两个特点:不确定性和损失来分析。普雷斯曼建议,分析软件风险的最好的方法是量化不确定性和与各种风险相关的损失程度。他的风险内容符合上述等式(1)。普雷斯曼将软件风险划分为以下类别:项目风险,技术风险和商业风险。

外包风险有各种来源。奥贝特等采用交易成本理论与代理理论作为产生不良事件及其相关危险因素基础,交易成本理论在第2.2节已经讨论了,代理理论选择代理人(即服务提供商)和工作关系的建设和维护的同时,关注客户的问题,在信息不对称的限制下,如果代理和客户之间的关系变得崩溃,那么会产生各种风险因素。

很明显,一个完整的合同可以消除由不完整的合同和/或任何缔约方可能的机会主义行为引起的风险。机会主义行为是导致交易风险的一个主要来源。当交易伙伴注意到了节约成本或消除在合同期间的责任时,机会主义行为产生了。这家公司可能会采取行动,以寻求这样的机会。如合同没有完全指明放在首位,这种类型的机会主义行为受到鼓励。

外包的风险可能会产生外包项目的意想不到的额外成本。为了进行更好的IS外包项目,确定可能的危险因素和执行成熟的风险管理过程,可以使信息系统外包比以往任何时候都更加成功。

3.信息系统外包生命周期

生命周期的概念最初是用来描述生物系统有机体的一代的时期。从本质上讲,生命周期的长度是所有活动主体从出生到结束的描述。生命周期的概念已被应用到项目管理领域。根据施瓦尔贝的观点,一个项目的生命周期是项目阶段的集合,如概念,制定,执行和收尾。在上述四个阶段中,前两个阶段以“规划”活动为中心,最后两个阶段侧重于项目管理的“交付的实际工作”。

同样,生命周期的概念可以应用到信息系统外包分析。信息系统外包生命周期描述了在公司的IS外包实践中将要履行的一系列活动。赫希海姆和迪伯恩曾经描述基于客户端的IS外包生命周期为:“它开始于IS外包决定,继续于外包的关系(合同期),并结束于关系的取消或终止,即合同的结束。关系的结束驱使一个新的外包决定产生。”很显然,赫希海姆和迪伯恩将“外包关系”看成IS外包生命周期的一个决定因素。IS外包生命周期始于外包的需要,然后结束于合同的完成。这个生命周期重新开始于寻找新的外包合同(如果需要的话)。如果交易成本仍然很低,一个外包公司可能对相同的外包供应商很满足,然后一个新的周期开始了。否则,对外包供应商的一个新的搜索可能会开始。寻求外包合同的主要目标之一是成本最小化。交易成本理论(第2.1节中所讨论的)表示,公司施行合同消耗费用,因此低交易成本将是延长IS外包生命周期的驱动力。

外包生命周期的跨度包括承包活动的一个主要部分。整个外包生命周期可分为三个阶段(参见图1):合同前阶段,合同的阶段,后合同阶段。合同签订前阶段包括签订合同前的一些活动,如确定需要外包,规划和战略制定,以及相关的外包服务供应商的选择。合同阶段开始于外包合同的签订然后一直持续到合同期的结束。它包括这些活动,如合同过程,转变过程,以及相关的外包服务项目的执行。后合同阶段包含合同期满后要完成的那些活动,如外包项目评估,并决定在未来的外包合同。

图1. IS 外包生命周期

当一家公司打算向外部实体外包其信息系统项目时,信息系统外包的生命周期包含了一些活动。具体来说,它们是:

1.确定外的需要:

合同签订前阶段:

1.确定外包的必要性

2.规划和战略制定

3.外包供应商的选择

合同阶段: 4.合同过程 5.转变过程

6.外包服务项目的执行 后合同阶段:

7.外包项目评估 1 2 3.a 可再生合同 3.b 新合同搜索

一个公司可能面临严格的外部环境,如斯特恩的市场竞争,竞争对手通过外包节省成本,或经济衰退时启动它考虑外包IS项目。除了外部环境,一些内部因素也可能导致外包审议。这些组织的困境包括技术技能的需要,财政拮据,投资者的要求,或者只是关注节省成本。在做出外包决定之前,一个公司需要对其内部和外部的定位进行仔细地研究。

2.规划和战略制定:

如果公司确定了IS外包的需要,它需要确保外包的决定应当满足公司的战略计划和目标。后来,该公司需要将外包计划纳入公司战略。在规划和战略制定阶段,许多任务需要完成,包括确定外包的目的,目标,范围,进度,成本,商业模式,和进程。详细的外包规划,是为公司奉行一个成功的外包项目而编写的。

3.外包供应商的选择:

一个公司供应商的选择开始于建立信息请求(多态性)和征求建议书(招标)文件。外包公司应该提供关于外包项目要求和期望的足够的信息。在收到来自供应商的这些建议,该公司需要在战略需要和项目要求的基础上选择未来外包供应商。

4.订约过程:

合同谈判进程在该公司选择一个可能的外包供应商后开始。订约过程是成功的关键,因为外包项目合同的所有方面应明确规定,包括基本,管理,技术,价格,金融,法律等功能。为了避免产生不完整的合同,最后合同应通过双方法律咨询的审查。最重要的是,服务水平协议(SLA),必须在合同中明确确定。

5.转换过程:

转换过程在公司同供应商签署了一项外包合同后开始。转换管理被界定为“详细的,台级别的知识转移和所有有关任务、技术、流程、人员和职能的文件”。转换过程是IS外包生命周期中的一个复杂的阶段。罗宾逊等人将转型管理的特点归纳为以下内容:“员工管理,沟通管理,知识管理,和质量管理”。很明显,

进行转换过程需要人力资源的能力,沟通技巧,知识转让,和质量控制。

6.外包项目的执行:

转换过程之后,是供应商和客户端执行其外包项目的时候了。“合同管理”阶段有四个组成部分:项目管理,关系管理,变更管理和风险管理。合同中所列的任何项目和其服务水平协议(SLA)需要交付和按要求执行。特别是,客户和供应商关系,更改请求和记录,风险变数,必须认真加以管理和控制。

7.外包项目评估:

在一个外包项目结束期间,供应商必须根据客户的批准提供其最终产品/服务。外包客户必须评估它的客户所提供的产品/服务质量。外包客户必须衡量他/她对客户端所提供的产品/服务的满意程度。满意的评价和良好的关系,将保证下一外包合同的继续。

前期活动的结果(即项目评估)将是确定下一个外包合同的基准。一个公司根据预定的外包目标和合同标准评价他的满意度水平,外包公司还注意外包成本和包含在该项目中的风险。如果一个公司很满意目前的外包商,很可能同这个外包商开始一个可再生的合同。否则,将重新开始一个新的“预约阶段”来寻找新的外包供应商。这项活动将导致新的外包生命周期。图1为这两个备选方案显示两个虚线箭头:虚线箭头3.a.显示了“可再生合同”路径,虚线箭头3.b.表明“新合同搜索”的路径。

IS外包生命周期的每个阶段都是是完全必要的活动和过程(见图1)。为了明确审查风险和外包活动的动态,以下各节提供了详细的分析。IS外包生命周期合同前阶段的重点是认识外包的成功因素和相关风险因素。IS外包生命周期的合同期以项目管理和风险管理的机制为中心。IS外包生命周期的后合同阶段关注于选择合适的项目质量评估方法的需要。

4.合同前阶段的活动:成功的意识和风险因素

前合同期是信息系统外包生命周期(参见图1)的第一阶段,而在这一阶段,一个外包公司应首先确定其IS外包的需要。在确定IS外包的需要之后,该公司需要仔细地制造一个外包计划,该公司必须将公司战略纳入其外包计划中。

为了为公司的IS外包做好准备,一个企业必须了解当前的市场状况,竞争力,环境和经济环境。下一个要做的重要任务是,识别可以用来作为指导战略外包规划的外包成功因素。除了了解成功因素,一个外包公司还必须认识到IS外包可能涉及的风险,从而使公司以制定更好的外包战略。

5.结论和研究方向

本文提出了一种三阶段IS外包生命周期和其相关的影响外包项目成功的风险因素,外包生命周期本质上是复杂的。外包公司通常投资了很大的努力,以选择合适的服务供应商。然而,许多风险存在于供应商的选择过程。虽然外包费用是外包的主要原因,但是公司正在寻求通过质量保证和风险控制使外包成功。这一决定是可以理解的,因为项目风险的结果代表了多少额外的项目费用。因此,仔细管理项目及其危险因素可节省外包公司庞大的资金。

本文讨论有关外包成功,风险因素,质量评价方法,以及项目管理技术的各种问题。今后的研究可能涉及变换风险估计方法。例如,风险的不确定性可以用来确定外包风险估计的准确性。另一个估计风险的可能方法是通过外包的总拥有成本(总体拥有成本)的方法。总拥有成本方法已作为金融投资分析和投资决策用于IT管理。由于风险概念在本质上就是外包客户的费用(损失),因此,它成为一个可能的研究方法来解决外包的决定。

资料来源:D.C. Chou, A.Y. Chou,Information systems outsourcing life cycle and risks analysis, Computer Standards & Interfaces (2008), doi:10.1016/j.csi.2008.09.032

毕业论文英文参考文献与译文

Inventory management Inventory Control On the so-called "inventory control", many people will interpret it as a "storage management", which is actually a big distortion. The traditional narrow view, mainly for warehouse inventory control of materials for inventory, data processing, storage, distribution, etc., through the implementation of anti-corrosion, temperature and humidity control means, to make the custody of the physical inventory to maintain optimum purposes. This is just a form of inventory control, or can be defined as the physical inventory control. How, then, from a broad perspective to understand inventory control? Inventory control should be related to the company's financial and operational objectives, in particular operating cash flow by optimizing the entire demand and supply chain management processes (DSCM), a reasonable set of ERP control strategy, and supported by appropriate information processing tools, tools to achieved in ensuring the timely delivery of the premise, as far as possible to reduce inventory levels, reducing inventory and obsolescence, the risk of devaluation. In this sense, the physical inventory control to achieve financial goals is just a means to control the entire inventory or just a necessary part; from the perspective of organizational functions, physical inventory control, warehouse management is mainly the responsibility of The broad inventory control is the demand and supply chain management, and the whole company's responsibility. Why until now many people's understanding of inventory control, limited physical inventory control? The following two reasons can not be ignored: First, our enterprises do not attach importance to inventory control. Especially those who benefit relatively good business, as long as there is money on the few people to consider the problem of inventory turnover. Inventory control is simply interpreted as warehouse management, unless the time to spend money, it may have been to see the inventory problem, and see the results are often very simple procurement to buy more, or did not do warehouse departments . Second, ERP misleading. Invoicing software is simple audacity to call it ERP, companies on their so-called ERP can reduce the number of inventory, inventory control, seems to rely on their small software can get. Even as SAP, BAAN ERP world, the field of

概率论毕业论文外文翻译

Statistical hypothesis testing Adriana Albu,Loredana Ungureanu Politehnica University Timisoara,adrianaa@aut.utt.ro Politehnica University Timisoara,loredanau@aut.utt.ro Abstract In this article,we present a Bayesian statistical hypothesis testing inspection, testing theory and the process Mentioned hypothesis testing in the real world and the importance of, and successful test of the Notes. Key words Bayesian hypothesis testing; Bayesian inference;Test of significance Introduction A statistical hypothesis test is a method of making decisions using data, whether from a controlled experiment or an observational study (not controlled). In statistics, a result is called statistically significant if it is unlikely to have occurred by chance alone, according to a pre-determined threshold probability, the significance level. The phrase "test of significance" was coined by Ronald Fisher: "Critical tests of this kind may be called tests of significance, and when such tests are available we may discover whether a second sample is or is not significantly different from the first."[1] Hypothesis testing is sometimes called confirmatory data analysis, in contrast to exploratory data analysis. In frequency probability,these decisions are almost always made using null-hypothesis tests. These are tests that answer the question Assuming that the null hypothesis is true, what is the probability of observing a value for the test statistic that is at [] least as extreme as the value that was actually observed?) 2 More formally, they represent answers to the question, posed before undertaking an experiment,of what outcomes of the experiment would lead to rejection of the null hypothesis for a pre-specified probability of an incorrect rejection. One use of hypothesis testing is deciding whether experimental results contain enough information to cast doubt on conventional wisdom. Statistical hypothesis testing is a key technique of frequentist statistical inference. The Bayesian approach to hypothesis testing is to base rejection of the hypothesis on the posterior probability.[3][4]Other approaches to reaching a decision based on data are available via decision theory and optimal decisions. The critical region of a hypothesis test is the set of all outcomes which cause the null hypothesis to be rejected in favor of the alternative hypothesis. The critical region is usually denoted by the letter C. One-sample tests are appropriate when a sample is being compared to the population from a hypothesis. The population characteristics are known from theory or are calculated from the population.

毕业论文外文文献翻译-数据库管理系统的介绍

数据库管理系统的介绍 Raghu Ramakrishnan1 数据库(database,有时拼作data base)又称为电子数据库,是专门组织起来的一组数据或信息,其目的是为了便于计算机快速查询及检索。数据库的结构是专门设计的,在各种数据处理操作命令的支持下,可以简化数据的存储,检索,修改和删除。数据库可以存储在磁盘,磁带,光盘或其他辅助存储设备上。 数据库由一个或一套文件组成,其中的信息可以分解为记录,每一记录又包含一个或多个字段(或称为域)。字段是数据存取的基本单位。数据库用于描述实体,其中的一个字段通常表示与实体的某一属性相关的信息。通过关键字以及各种分类(排序)命令,用户可以对多条记录的字段进行查询,重新整理,分组或选择,以实体对某一类数据的检索,也可以生成报表。 所有数据库(最简单的除外)中都有复杂的数据关系及其链接。处理与创建,访问以及维护数据库记录有关的复杂任务的系统软件包叫做数据库管理系统(DBMS)。DBMS软件包中的程序在数据库与其用户间建立接口。(这些用户可以是应用程序员,管理员及其他需要信息的人员和各种操作系统程序)。 DBMS可组织,处理和表示从数据库中选出的数据元。该功能使决策者能搜索,探查和查询数据库的内容,从而对在正规报告中没有的,不再出现的且无法预料的问题做出回答。这些问题最初可能是模糊的并且(或者)是定义不恰当的,但是人们可以浏览数据库直到获得所需的信息。简言之,DBMS将“管理”存储的数据项,并从公共数据库中汇集所需的数据项以回答非程序员的询问。 DBMS由3个主要部分组成:(1)存储子系统,用来存储和检索文件中的数据;(2)建模和操作子系统,提供组织数据以及添加,删除,维护,更新数据的方法;(3)用户和DBMS之间的接口。在提高数据库管理系统的价值和有效性方面正在展现以下一些重要发展趋势; 1.管理人员需要最新的信息以做出有效的决策。 2.客户需要越来越复杂的信息服务以及更多的有关其订单,发票和账号的当前信息。 3.用户发现他们可以使用传统的程序设计语言,在很短的一段时间内用数据1Database Management Systems( 3th Edition ),Wiley ,2004, 5-12

电子技术专业英语翻译

基本电路 包括电路模型的元素被称为理想的电路元件。一个理想的电路元件是一个实际的电气元件的数学模型,就像一个电池或一个灯泡。重要的是为理想电路元件在电路模型用来表示实际的电气元件的行为可接受程度的准确性。电路分析,本单位的重点,这些工具,然后应用电路。电路分析基础上的数学方法,是用来预测行为的电路模型和其理想的电路元件。一个所期望的行为之间的比较,从设计规范,和预测的行为,形成电路分析,可能会导致电路模型的改进和理想的电路元件。一旦期望和预测的行为是一致的,可以构建物理原型。 物理原型是一个实际的电气系统,修建从实际电器元件。测量技术是用来确定实际的物理系统,定量的行为。实际的行为相比,从设计规范的行为,从电路分析预测的行为。比较可能会导致在物理样机,电路模型,或两者的改进。最终,这个反复的过程,模型,组件和系统的不断完善,可能会产生较准确地符合设计规范的设计,从而满足需要。 从这样的描述,它是明确的,在设计过程中,电路分析中起着一个非常重要的作用。由于电路分析应用电路模型,执业的工程师尝试使用成熟的电路模型,使设计满足在第一次迭代的设计规范。在这个单元,我们使用20至100年已测试通过机型,你可以认为他们是成熟的。能力模型与实际电力系统理想的电路元件,使电路理论的工程师非常有用的。 说理想电路元件的互连可用于定量预测系统的行为,意味着我们可以用数学方程描述的互连。对于数学方程是有用的,我们必须写他们在衡量的数量方面。在电路的情况下,这些数量是电压和电流。电路分析的研究,包括了解其电压和电流和理解上的电压施加的限制,目前互连的理想元素的每一个理想的电路元件的行为电路分析基础上的电压和电流的变量。电压是每单位电荷,电荷分离所造成的断电和SI单位伏V = DW / DQ。电流是电荷的流动速度和具有的安培SI单位(I= DQ/ DT)。理想的基本电路元件是两个终端组成部分,不能细分,也可以在其终端电压和电流的数学描述。被动签署公约涉及元素,当电流通过元素的参考方向是整个元素的参考电压降的方向端子的电压和电流的表达式使用一个积极的迹象。 功率是单位时间内的能量和平等的端电压和电流的乘积;瓦SI单位。权力的代数符号解释如下: 如果P> 0,电源被传递到电路或电路元件。 如果p<0,权力正在从电路或电路元件中提取。 在这一章中介绍的电路元素是电压源,电流源和电阻器。理想电压源保持一个规定的电压,不论当前的设备。理想电流源保持规定的电流不管了整个设备的电压。电压和电流源是独立的,也就是说,不是任何其他电路的电流或电压的影响;或依赖,就是由一些电路中的电流或电压。一个电阻制约了它的电压和电流成正比彼此。有关的比例常数电压和一个电阻值称为其电阻和欧姆测量。 欧姆定律建立相称的电压和电流的电阻。具体来说,V = IR电阻的电流流动,如果在它两端的电压下降,或V=_IR方向,如果在该电阻的电流流是在它两端的电压上升方向。 通过结合对权力的方程,P = VI,欧姆定律,我们可以判断一个电阻吸收的功率:P = I2R= U2/ R 电路节点和封闭路径。节点是一个点,两个或两个以上的电路元件加入。当只有两个元素连接,形成一个节点,他们表示将在系列。一个闭合的路径是通过连接元件追溯到一个循环,起点和终点在同一节点,只有一次每遇到中间节点。 电路是说,要解决时,两端的电压,并在每个元素的电流已经确定。欧姆定律是一个重要的方程,得出这样的解决方案。 在简单的电路结构,欧姆定律是足以解决两端的电压,目前在每一个元素。然而,对于更复杂的互连,我们需要使用两个更为重要的代数关系,被称为基尔霍夫定律,来解决所有的电压和电流。 基尔霍夫电流定律是: 在电路中的任何一个节点电流的代数和等于零。 基尔霍夫电压定律是: 电路中的任何封闭路径上的电压的代数和等于零。 1.2电路分析技术 到目前为止,我们已经分析应用结合欧姆定律基尔霍夫定律电阻电路相对简单。所有的电路,我们可以使用这种方法,但因为他们而变得结构更为复杂,涉及到越来越多的元素,这种直接的方法很快成为累赘。在这一课中,我们介绍两个电路分析的强大的技术援助:在复杂的电路结构的分析节点电压的方法,并网电流的方

毕业论文外文翻译模版

吉林化工学院理学院 毕业论文外文翻译English Title(Times New Roman ,三号) 学生学号:08810219 学生姓名:袁庚文 专业班级:信息与计算科学0802 指导教师:赵瑛 职称副教授 起止日期:2012.2.27~2012.3.14 吉林化工学院 Jilin Institute of Chemical Technology

1 外文翻译的基本内容 应选择与本课题密切相关的外文文献(学术期刊网上的),译成中文,与原文装订在一起并独立成册。在毕业答辩前,同论文一起上交。译文字数不应少于3000个汉字。 2 书写规范 2.1 外文翻译的正文格式 正文版心设置为:上边距:3.5厘米,下边距:2.5厘米,左边距:3.5厘米,右边距:2厘米,页眉:2.5厘米,页脚:2厘米。 中文部分正文选用模板中的样式所定义的“正文”,每段落首行缩进2字;或者手动设置成每段落首行缩进2字,字体:宋体,字号:小四,行距:多倍行距1.3,间距:前段、后段均为0行。 这部分工作模板中已经自动设置为缺省值。 2.2标题格式 特别注意:各级标题的具体形式可参照外文原文确定。 1.第一级标题(如:第1章绪论)选用模板中的样式所定义的“标题1”,居左;或者手动设置成字体:黑体,居左,字号:三号,1.5倍行距,段后11磅,段前为11磅。 2.第二级标题(如:1.2 摘要与关键词)选用模板中的样式所定义的“标题2”,居左;或者手动设置成字体:黑体,居左,字号:四号,1.5倍行距,段后为0,段前0.5行。 3.第三级标题(如:1.2.1 摘要)选用模板中的样式所定义的“标题3”,居左;或者手动设置成字体:黑体,居左,字号:小四,1.5倍行距,段后为0,段前0.5行。 标题和后面文字之间空一格(半角)。 3 图表及公式等的格式说明 图表、公式、参考文献等的格式详见《吉林化工学院本科学生毕业设计说明书(论文)撰写规范及标准模版》中相关的说明。

房地产信息管理系统的设计与实现 外文翻译

本科毕业设计(论文)外文翻译 译文: ASP ASP介绍 你是否对静态HTML网页感到厌倦呢?你是否想要创建动态网页呢?你是否想 要你的网页能够数据库存储呢?如果你回答:“是”,ASP可能会帮你解决。在2002年5月,微软预计世界上的ASP开发者将超过80万。你可能会有一个疑问什么是ASP。不用着急,等你读完这些,你讲会知道ASP是什么,ASP如何工作以及它能为我们做 什么。你准备好了吗?让我们一起去了解ASP。 什么是ASP? ASP为动态服务器网页。微软在1996年12月推出动态服务器网页,版本是3.0。微软公司的正式定义为:“动态服务器网页是一个开放的、编辑自由的应用环境,你可以将HTML、脚本、可重用的元件来创建动态的以及强大的网络基础业务方案。动态服务器网页服务器端脚本,IIS能够以支持Jscript和VBScript。”(2)。换句话说,ASP是微软技术开发的,能使您可以通过脚本如VBScript Jscript的帮助创建动态网站。微软的网站服务器都支持ASP技术并且是免费的。如果你有Window NT4.0服务器安装,你可以下载IIS(互联网信息服务器)3.0或4.0。如果你正在使用的Windows2000,IIS 5.0是它的一个免费的组件。如果你是Windows95/98,你可以下载(个人网络服务器(PWS),这是比IIS小的一个版本,可以从Windows95/98CD中安装,你也可以从微软的网站上免费下载这些产品。 好了,您已经学会了什么是ASP技术,接下来,您将学习ASP文件。它和HTML文 件相同吗?让我们开始研究它吧。 什么是ASP文件? 一个ASP文件和一个HTML文件非常相似,它包含文本,HTML标签以及脚本,这些都在服务器中,广泛用在ASP网页上的脚本语言有2种,分别是VBScript和Jscript,VBScript与Visual Basic非常相似,而Jscript是微软JavaScript的版本。尽管如此,VBScript是ASP默认的脚本语言。另外,这两种脚本语言,只要你安装了ActiveX脚本引擎,你可以使用任意一个,例如PerlScript。 HTML文件和ASP文件的不同点是ASP文件有“.Asp”扩展名。此外,HTML标签和ASP代码的脚本分隔符也不同。一个脚本分隔符,标志着一个单位的开始和结束。HTML标签以小于号(<)开始(>)结束,而ASP以<%开始,%>结束,两者之间是服务端脚本。

毕业论文外文翻译模板

农村社会养老保险的现状、问题与对策研究社会保障对国家安定和经济发展具有重要作用,“城乡二元经济”现象日益凸现,农村社会保障问题客观上成为社会保障体系中极为重要的部分。建立和完善农村社会保障制度关系到农村乃至整个社会的经济发展,并且对我国和谐社会的构建至关重要。我国农村社会保障制度尚不完善,因此有必要加强对农村独立社会保障制度的构建,尤其对农村养老制度的改革,建立健全我国社会保障体系。从户籍制度上看,我国居民养老问题可分为城市居民养老和农村居民养老两部分。对于城市居民我国政府已有比较充足的政策与资金投人,使他们在物质和精神方面都能得到较好地照顾,基本实现了社会化养老。而农村居民的养老问题却日益突出,成为摆在我国政府面前的一个紧迫而又棘手的问题。 一、我国农村社会养老保险的现状 关于农村养老,许多地区还没有建立农村社会养老体系,已建立的地区也存在很多缺陷,运行中出现了很多问题,所以完善农村社会养老保险体系的必要性与紧迫性日益体现出来。 (一)人口老龄化加快 随着城市化步伐的加快和农村劳动力的输出,越来越多的农村青壮年人口进入城市,年龄结构出现“两头大,中间小”的局面。中国农村进入老龄社会的步伐日渐加快。第五次人口普查显示:中国65岁以上的人中农村为5938万,占老龄总人口的67.4%.在这种严峻的现实面前,农村社会养老保险的徘徊显得极其不协调。 (二)农村社会养老保险覆盖面太小 中国拥有世界上数量最多的老年人口,且大多在农村。据统计,未纳入社会保障的农村人口还很多,截止2000年底,全国7400多万农村居民参加了保险,占全部农村居民的11.18%,占成年农村居民的11.59%.另外,据国家统计局统计,我国进城务工者已从改革开放之初的不到200万人增加到2003年的1.14亿人。而基本方案中没有体现出对留在农村的农民和进城务工的农民给予区别对待。进城务工的农民既没被纳入到农村养老保险体系中,也没被纳入到城市养老保险体系中,处于法律保护的空白地带。所以很有必要考虑这个特殊群体的养老保险问题。

电力电子技术外文翻译

外文翻译 题目:电力电子技术二 A部分 晶闸管 在晶闸管的工作状态,电流从阳极流向阴极。在其关闭状态,晶闸管可以阻止正向 导电,使其不能运行。 可触发晶闸管能使导通状态的正向电流在短时间内使设备处于阻断状态。使正向电压下降到只有导通状态的几伏(通常为1至3伏电压依赖于阻断电压的速度)。 一旦设备开始进行,闸极电流将被隔离。晶闸管不可能被闸关闭,但是可以作为一个二极管。在电路的中,只有当电流处于消极状态,才能使晶闸管处于关闭状态,且电流降为零。在设备运行的时间内,允许闸在运行的控制状态直到器件在可控时间再次进入正向阻断状态。 在逆向偏置电压低于反向击穿电压时,晶闸管有微乎其微的漏电流。通常晶闸管的正向额定电压和反向阻断电压是相同的。晶闸管额定电流是在最大范围指定RMS和它是有能力进行平均电流。同样的对于二极管,晶闸管在分析变流器的结构中可以作为理想的设备。在一个阻性负载电路中的应用中,可以控制运行中的电流瞬间传至源电压的正半周期。当晶闸管尝试逆转源电压变为负值时,其理想化二极管电流立刻变成零。 然而,按照数据表中指定的晶闸管,其反向电流为零。在设备不运行的时间中,电流为零,重要的参数变也为零,这是转弯时间区间从零交叉电流电压的参

考。晶闸管必须保持在反向电压,只有在这个时间,设备才有能力阻止它不是处于正向电压导通状态。 如果一个正向电压应用于晶闸管的这段时间已过,设备可能因为过早地启动并有可能导致设备和电路损害。数据表指定晶闸管通过的反向电压在这段期间和超出这段时间外的一个指定的电压上升率。这段期间有时被称为晶闸管整流电路的周期。 根据使用要求,各种类型的晶闸管是可得到的。在除了电压和电流的额定率,转弯时间,和前方的电压降以及其他必须考虑的特性包括电流导通的上升率和在关闭状态的下降率。 1。控制晶闸管阶段。有时称为晶闸管转换器,这些都是用来要是整顿阶段,如为直流和交流电机驱动器和高压直流输电线路应用的电压和电流的驱动。主要设备要求是在大电压、电流导通状态或低通态压降中。这类型的晶闸管的生产晶圆直径到10厘米,其中平均电流目前大约是4000A,阻断电压为5之7KV。 2。逆变级的晶闸管。这些设计有小关断时间,除了低导通状态电压,虽然在设备导通状态电压值较小,可设定为2500V和1500A。他们的关断时间通常在几微秒范围到100μs之间,取决于其阻断电压的速率和通态压降。 3。光控晶闸管。这些会被一束脉冲光纤触发使其被引导到一个特殊的敏感的晶闸管地区。光化的晶闸管触发,是使用在适当波长的光的对硅产生多余的电子空穴。这些晶闸管的主要用途是应用在高电压,如高压直流系统,有许多晶闸管被应用在转换器阀门上。光控晶闸管已经发现的等级,有4kV的3kA,导通状态电压2V、光触发5毫瓦的功率要求。 还有其它一些晶闸管,如辅助型关断晶闸管(关贸总协定),这些晶闸管其他变化,不对称硅可控(ASCR)和反向进行,晶闸管(RCT)的。这些都是应用。 B部分 功率集成电路 功率集成电路的种类 现代半导体功率控制相当数量的电路驱动,除了电路功率器件本身。这些控制电路通常由微处理器控制,其中包括逻辑电路。这种在同一芯片上包含或作

大学毕业论文---软件专业外文文献中英文翻译

软件专业毕业论文外文文献中英文翻译 Object landscapes and lifetimes Tech nically, OOP is just about abstract data typing, in herita nee, and polymorphism, but other issues can be at least as importa nt. The rema in der of this sect ion will cover these issues. One of the most importa nt factors is the way objects are created and destroyed. Where is the data for an object and how is the lifetime of the object con trolled? There are differe nt philosophies at work here. C++ takes the approach that con trol of efficie ncy is the most importa nt issue, so it gives the programmer a choice. For maximum run-time speed, the storage and lifetime can be determined while the program is being written, by placing the objects on the stack (these are sometimes called automatic or scoped variables) or in the static storage area. This places a priority on the speed of storage allocatio n and release, and con trol of these can be very valuable in some situati ons. However, you sacrifice flexibility because you must know the exact qua ntity, lifetime, and type of objects while you're writing the program. If you are trying to solve a more general problem such as computer-aided desig n, warehouse man ageme nt, or air-traffic con trol, this is too restrictive. The sec ond approach is to create objects dyn amically in a pool of memory called the heap. In this approach, you don't know un til run-time how many objects you n eed, what their lifetime is, or what their exact type is. Those are determined at the spur of the moment while the program is runnin g. If you n eed a new object, you simply make it on the heap at the point that you n eed it. Because the storage is man aged dyn amically, at run-time, the amount of time required to allocate storage on the heap is sig ni fica ntly Ion ger tha n the time to create storage on the stack. (Creat ing storage on the stack is ofte n a si ngle assembly in structio n to move the stack poin ter dow n, and ano ther to move it back up.) The dyn amic approach makes the gen erally logical assumpti on that objects tend to be complicated, so the extra overhead of finding storage and releas ing that storage will not have an importa nt impact on the creati on of an object .In additi on, the greater flexibility is esse ntial to solve the gen eral program ming problem. Java uses the sec ond approach, exclusive". Every time you want to create an object, you use the new keyword to build a dyn amic in sta nee of that object. There's ano ther issue, however, and that's the lifetime of an object. With Ian guages that allow objects to be created on the stack, the compiler determines how long the object lasts and can automatically destroy it. However, if you create it on the heap the compiler has no kno wledge of its lifetime. In a Ianguage like C++, you must determine programmatically when to destroy the

管理信息系统外文翻译

管理信息系统外文翻译-标准化文件发布号:(9456-EUATWK-MWUB-WUNN-INNUL-DDQTY-KII

英文文献翻译 二〇年月日

科技文章摘译 Definition of a Management Information System There is no consensus of the definition of the term "management information system". Some writers prefer alternative terminology such as "information processing system", "information and decision system", "organizational information system", or simply "information system" to refer to the computer-based information processing system which supports the operations, management, and decision-making functions of an organization. This text uses “MIS” because it is descriptive and generally understood; it also frequently uses “information system” instead of “MIS” to refer to an organizational information system. A definition of a management information system, as the term is generally understood, is an integrated, user-machine system for providing information to support operations, management, and decision-making functions in an organization. The system utilizes computer hardware and software; manual procedures; models for analysis planning, control and decision making; and a database. The fact that it is an integrated system does not mean that it is a single, monolithic structure; rather, it means that the parts fit into an overall design. The elements of the definition are highlighted below. 1 Computer-based user-machine system Conceptually, management information can exist without computer, but it is the power of the computer which makes MIS feasible. The question is not whether computers should be used in management information system, but the extent to which information use should be computerized. The concept of a user-machine system implies that some tasks are best performed by humans, while others are best done by machine. The user of an MIS is any person responsible for entering input data, instructing the system, or utilizing the information output of the system. For many problems, the user and the computer form a combined system with results obtained through a set of interactions between the computer and the user. User-machine interaction is facilitated by operation in which the user’s input-output device (usually a visual display terminal) is connected to the computer. The computer can be a personal computer serving only one user or a large computer that

毕业论文 外文翻译#(精选.)

毕业论文(设计)外文翻译 题目:中国上市公司偏好股权融资:非制度性因素 系部名称:经济管理系专业班级:会计082班 学生姓名:任民学号: 200880444228 指导教师:冯银波教师职称:讲师 年月日

译文: 中国上市公司偏好股权融资:非制度性因素 国际商业管理杂志 2009.10 摘要:本文把重点集中于中国上市公司的融资活动,运用西方融资理论,从非制度性因素方面,如融资成本、企业资产类型和质量、盈利能力、行业因素、股权结构因素、财务管理水平和社会文化,分析了中国上市公司倾向于股权融资的原因,并得出结论,股权融资偏好是上市公司根据中国融资环境的一种合理的选择。最后,针对公司的股权融资偏好提出了一些简明的建议。 关键词:股权融资,非制度性因素,融资成本 一、前言 中国上市公司偏好于股权融资,根据中国证券报的数据显示,1997年上市公司在资本市场的融资金额为95.87亿美元,其中股票融资的比例是72.5%,,在1998年和1999年比例分别为72.6%和72.3%,另一方面,债券融资的比例分别是17.8%,24.9%和25.1%。在这三年,股票融资的比例,在比中国发达的资本市场中却在下跌。以美国为例,当美国企业需要的资金在资本市场上,于股权融资相比他们宁愿选择债券融资。统计数据显示,从1970年到1985年,美日企业债券融资占了境外融资的91.7%,比股权融资高很多。阎达五等发现,大约中国3/4的上市公司偏好于股权融资。许多研究的学者认为,上市公司按以下顺序进行外部融资:第一个是股票基金,第二个是可转换债券,三是短期债务,最后一个是长期负债。许多研究人员通常分析我国上市公司偏好股权是由于我们国家的经济改革所带来的制度性因素。他们认为,上市公司的融资活动违背了西方古典融资理论只是因为那些制度性原因。例如,优序融资理论认为,当企业需要资金时,他们首先应该转向内部资金(折旧和留存收益),然后再进行债权融资,最后的选择是股票融资。在这篇文章中,笔者认为,这是因为具体的金融环境激活了企业的这种偏好,并结合了非制度性因素和西方金融理论,尝试解释股权融资偏好的原因。

电动汽车电子技术中英文对照外文翻译文献

(文档含英文原文和中文翻译) 中英文资料外文翻译 原文: As the world energy crisis, and the war and the energy consumption of oil -- and are full of energy, in one day, someday it will disappear without a trace. Oil is not in resources. So in oil consumption must be clean before finding a replacement. With the development of science and technology the progress of

the society, people invented the electric car. Electric cars will become the most ideal of transportation. In the development of world each aspect is fruitful, especially with the automobile electronic technology and computer and rapid development of the information age. The electronic control technology in the car on a wide range of applications, the application of the electronic device, cars, and electronic technology not only to improve and enhance the quality and the traditional automobile electrical performance, but also improve the automobile fuel economy, performance, reliability and emissions purification. Widely used in automobile electronic products not only reduces the cost and reduce the complexity of the maintenance. From the fuel injection engine ignition devices, air control and emission control and fault diagnosis to the body auxiliary devices are generally used in electronic control technology, auto development mainly electromechanical integration. Widely used in automotive electronic control ignition system mainly electronic control fuel injection system, electronic control ignition system, electronic control automatic transmission, electronic control (ABS/ASR) control system,

相关文档
最新文档