首页 > 论文期刊知识库 > 相关的文献英文

相关的文献英文

发布时间:

相关的文献英文

YanGuoBin 《discussed shallowly new economy accounting personnel》 quality modern accounting" 2009 (2) LuoHong ZhuKaiXi ."do not do false account" education "with accounting quality accounting friends of 2008(1)

百度搜毕业达人,中英文文献都可以下,很方便

kldshdfuhdsiufhiduyhghdsiuhgiuhdsuihdgiuhuisfdhiuhsdidshuigfidshiugsdhgfuihduifhiudshiufhdiuhigfuhdiogfdsuhiugudhfguisdhigfisdfhfihsaidg[dkavdnxfkghsvofhiughsiuhgiushdkjv hxidkjgviojsaioyahviuhiusfhgiufhdsiughosihdgiushdgihsdfiughiufshiufduhufdsuhfdsuighdfhgishuidhuishiugfduihdfhguiashsfgojkagjiufugkjcdhiufgdhughiauhgiufdh

1234567890

船舶相关的英文文献

船舶辅机学·上册 / 卢士勋,韩厚德编著 - 北京: 科学出版社, 3 285页; 26cm 卢士勋,上海海运学院教授 韩厚德,上海海运学院副教授 ISBN 7-03-004696-X: RMB80 I ①船舶辅机学 II ①卢士勋②韩厚德 III ① 船舶辅机 - 高等学校 - 教材 IV ①U5②5691

我的毕业论文是写主机缸套冷却水温度控制的,你要吗?要的话送给你。还有一篇我同学的,是关于船舶滑油防污染的,要的话也可一起送给你。顺便告诉你,我是集美海院毕业的。

船舶辅机学·上册 / 卢士勋,韩厚德编著 - 北京: 科学出版社, 3 285页; 26cm 卢士勋,上海海运学院教授 韩厚德,上海海运学院副教授 ISBN 7-03-004696-X: RMB80 I ①船舶辅机学 II ①卢士勋②韩厚德 III ① 船舶辅机 - 高等学校 - 教材 IV ①U5②5691 --------------------------------------------------------------------------------藏书分布情况 收藏单位 索取号 登录号 卷期 状态 借阅类型 预约人数 图书室 5691/3905/1 z0003262 可供出借 中文图书 0 去图书馆看吧!

Ship commissioning is the act or ceremony of placing a ship in active service, and may be regarded as a particular application of the general concepts and practices of project The term is most commonly applied to the placing of a warship in active duty with its country's military The ceremonies involved are often rooted in centuries old naval Ship naming and launching endow a ship hull with her identity, but many milestones remain before she is completed and considered ready to be designated a commissioned The engineering plant, weapon and electronic systems, galley, and multitudinous other equipment required to transform the new hull into an operating and habitable warship are installed and The prospective commanding officer, ship's officers, the petty officers, and seamen who will form the crew report for training and intensive familiarization with their new Prior to commissioning, the new ship undergoes sea trials to identify any deficiencies needing The preparation and readiness time between christening-launching and commissioning may be as much as three years for a nuclear powered aircraft carrier to as brief as twenty days for a World War II landing The USS Monitor, of American Civil War fame, was commissioned less than three weeks after [edit]United States NavyCommissioning in the early United States Navy under sail was attended by no An officer designated to command a new ship received orders similar to those issued to Captain Thomas Truxtun in 1798:Sir, I have it in command from the president of the United States, to direct you to repair with all due speed on board the ship Constellation lying at B It is required that no Time be lost in carrying the Ship into deep water, taking on board her Cannon, Ammunition, Water, Provisions & Stores of every kind — completing what work is yet to be done shipping her Complement of Seamen and Marines, and preparing her in every respect for Sea It is the President's express Orders, that you employ the most vigorous Exertions, to accomplish these several Objects and to put your Ship as speedily as possible in a situation to sail at the shortest In Truxtun's time, the prospective commanding officer had responsibility for overseeing construction details, outfitting the ship, and recruiting his When a captain determined that his new ship was ready to take to sea, he mustered the crew on deck, read his orders, broke the national ensign and distinctive commissioning pennant, and caused the watch to be set and the first entry to be made in the Thus, the ship was placed in Commissionings were not public affairs, and unlike christening-and-launching ceremonies, were not recorded by The first specific reference to commissioning located in naval records is a letter of November 6, 1863, from Secretary of the Navy Gideon Welles to all navy yards and The Secretary directed: "Hereafter the commandants of navy yards and stations will inform the Department, by special report of the date when each vessel preparing for sea service at their respective commands, is placed in "Subsequently, various editions of Navy regulations mentioned the act of putting a ship in commission, but details of a commissioning ceremony were not Through custom and usage, however, a fairly standard practice emerged, the essentials of which are outlined in current Navy Officers and crew members of the new ship are assembled on the quarterdeck or other suitable Formal transfer of the ship to the prospective commanding officer is done by the Naval District Commandant or his The transferring officer reads the commissioning directive, the national anthem is played, the ensign is hoisted, and the commissioning pennant The prospective commanding officer reads his orders, assumes command, and the first watch is Craft assigned to Naval Districts and shore bases for local use, such as harbor tugs and floating drydocks, are not usually placed in commission but are instead given an "in service" They do fly the national ensign, but not a commissioning In recent years, commissionings have come to be more public Guests, including the ship's sponsor, are frequently invited to attend, and a prominent individual may deliver a commissioning On May 3, 1975, more than twenty thousand people witnessed the commissioning of USS Nimitz at Norfolk, V The carrier's sponsor, daughter of the late Fleet Admiral Chester Nimitz, was introduced, and the President of the United States was the principal The sponsor traditionally gives the first order to the ship's company: "Man our ship and bring her to life!"Regardless of the type of ship, the brief but impressive commissioning ceremony completes the cycle from christening and launching to bring the ship into full status as a warship of her

计算机相关的英文文献

Computer network virus and precautions With the new network technology and application of the continuous rapid development of the computer network should Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human More inseparable from the lives of the community's reliance on them will keep With With the continuous development of computer technology, the virus has become increasingly complex and senior, the new generation of Computer viruses make full use of certain commonly used operating systems and application software for protection of the weak low Spots have rampant in recent years as the popularity of the Internet in the world, will be attached document containing the virus The situation in the mail has been increasing spread of the virus through the Internet, making the spread of the virus speed Sharp also increased, by an ever-increasing scope of the Therefore, the protection of the security of computer networks will be Will become increasingly A computer virus The definition of computer virus computer virus (Computer Virus) in the "people's republic of China The computer information system security protection regulations "which has been clearly defined, the virus" refers to the preparation or Computer program inserted in the damage or destruction of computer data functions, affecting computer use Self-replication and can a group of computer instructions, or " Second, network virus With the development of network and the Internet, a wider spread, the greater New harm The virus emerged This is the Internet The virus is an emerging concept in the traditional The virus was not classified network virus this concept, because the development of networks, the traditional virus The network also has a number of Today's Internet virus is a broad notion of a As as long as it is carried out using the Internet to spread destruction can be known as network viruses, such as: "Love the back door", "Panda burning " Third, network virus and the distinction between computer virus The original common computer virus is nothing more than the devastating formatted hard drive, delete system With the users documents, databases, The mode of transmission is through nothing but also by virus infection Mutual copy of the software, carrying the virus, such as the use of pirated optical discs, such as infection disk systems The pilot virus and infected executable file virus, in addition to a network virus These are the common characteristics of the virus, but also steal users with remote data, remote control of the other side Computers and other damaged properties, such as Trojan and consumption of funding the operation of the network computer Source collapse of the network server Fourth, the network against virus Network destructive virus, will directly affect the work of the network, ranging from lowering speed video Ring for the efficiency of the network, while in the collapse, undermining the server information to a multi-year work destroyed D Because viruses and other network annually fraud led to economic losses of over 16 billion yuan, But this figure is constantly rising year by The next few years, the size of the market will reach Security 60 billion One antivirus software experts pointed out: "Network avian flu virus even " Such as: "Xiong Cat burning incense "In addition to virus infection through the web site users, the latest virus also through QQ Loopholes in propagating itself through file-sharing networks, the default sharing, weak password systems, U disk and windows Forms bottom of the top mobile hard drives, and other means of While LAN once a computer machine For infection, it can spread through the entire network instant, or even within a very short period of time can be infected Thousands of computers, can lead to serious Symptoms of poisoning in the performance of computers There are Exe files have become a strange pattern, the pattern shown as "Panda Burning incense, "and then System blue screen, restart the frequent, hard drive data destruction, serious entire company All computer LAN will all "Panda burning incense," only more than half a month, a few varieties have high Of more than 50, and the number of its users infected constantly Makes infected, "Panda burn incense" disease The personal drug users has been as high as several million people infected with a few more corporate users is rising Network More on the computer network the greater the harm caused by the V network transmission of the virus Features Infection fast: single machine environment, the virus can only be passed from one computer diskette To another, and in the network can be adopted by the rapid spread of network communication According to measurement Set against a typical PC network use in normal circumstances, once a computer workstation sick Drugs, and will be online within 10 minutes in the several hundreds of all infected Proliferation of a wide range: in the network due to the spread of the virus very quickly and spread to encompass a large area, not only the rapid transmission of all LAN computer, but also through remote workstations virus in一瞬 Inter spread to thousands of miles Dissemination in the form of complex and varied: computer viruses in general through the network " Station server workstation "channels of communication, but in the form of complex and diverse Difficult to completely wipe: the standalone computer virus carriers sometimes can be deleted documents Or low-level formatted drives, and other measures to eliminate the virus completely, and the network once a computer work Clean stations failed to disinfect the entire network can be re-infected by the virus, or even just completed removal The work of a workstation is likely to be on-line by another workstation virus Therefore, Only workstations in addition to killing viruses, and can not solve the virus harm to the network 6, the type of network virus As the network increasingly developed, the type of network virus has been increasing, generally summed up as The following categories: Worm It is the use of the transmission mechanism of replication and dissemination network, the mode of transmission is through the network And e-mail, the prefix is W For example, in recent years the great harm "Nimda" virus is Demodex A worm The virus used Microsoft's Windows operating system, computer flu With this virus, will continue to automatically dial-up Internet access and use information in the document or the address Sharing network spreads, and ultimately undermine the most important user Macro Virus Hong virus is a Storage in the document or template in the Acer computer The prefix Macro, once open such documents, which Acer will be implemented, then the virus would Acer Been enabled transferred to the computer, and in the presence of the Normal From then on, all since The document will be kept moving "infection" that the Hong virus, and if other users opened the flu Documents with the virus, the Hong virus will be transferred to his Destructive procedures virus The prefix destructive virus program is: H The characteristics of this virus is a good in itself Look at the user clicks on icons to temptation, when the user clicks on the virus, the virus will direct users Computer generated If C formatted disk (HformatCf), the killer orders (H CKiller) System virus The prefix system for the virus: Win32, PE, Win95, W32, W95, and so These viruses The characteristics of the general public can be infected with the windows operating system * exe and * dll file, And through these documents for If the CIH Backdoor virus Backdoor virus prefix is B The total of such virus through network - Sowing, opened the back door to the system to the user and potential safety Bundling machine virus Bundled-virus prefix is: B The characteristics of this virus is the virus writers will use Specific procedures will be bundled with a number of applications such as QQ, IE bundled up on the surface It is normal to see the paper, when users run these bundled virus, will run these applications on the surface Procedures, and then tied to the operation of hidden virus, which caused harm to the Such as: baled Tied QQ (BQQPQQBin), the system killer (Bkillsys) Script virus The virus is usually JavaScript scripting code prepared by the malicious code, prefix is usually Spript, with the general nature of advertising, will modify your IE Home, modify registry, and other information, Computer user inconvenience Planting procedures virus virus This virus is of the public will run from the in vivo release of one or several new Under the virus to the system directory, by the release of a new virus If the glaciers are sowing (DBingH2C), MSN striker (DWSmibag) Joke virus The prefix is the virus joke: J Also called prank The characteristics of this virus is itself a nice user clicks on icons to temptation, When the user clicks of this virus, the virus will be made to disrupt the operation scare users, in fact The virus did not destroy any computer Such as: ghost (JGirlghost) Trojan hacking virus Trojan its prefix is: Trojan, hackers virus prefix General for H Public special Sex is through the network or system loopholes into the user's system and hidden, and then leaked to the outside world User information, hackers virus there is a visual interface to the user's computer remotely C Trojans, hackers often paired virus emerging, Trojan horse virus responsible for the invasive power users Brain, and hackers virus will be passed to the Trojan horse virus General Trojan such as QQ News tail Trojan TQQ3344, there are big TLMPSW Virus Form A PSW or anything like PWD general said that the virus has stolen password function, If some hacker programs, such as network枭雄HNC 7, the mode of transmission and network anti-virus Through the above, we can see that e-mail viruses spread Click homepage, users download, Others implant, implant, and other loopholes through five computer transmission, so long as holding these five A thoroughfare, we will be able to live better anti-virus

德国施普林格(Springer-Verlag)是世界上著名的科技出版集团。目前Springer LINK所提供的全文电子期刊共包含439种学术期刊(其中近400种为英文期刊),按学科分为以下11个“在线图书馆”:生命科学、医学、数学、化学、计算机科学、经济、法律、工程学、环境科学、地球科学、物理学与天文学,是科研人员的重要信息源。这个数据库高校图书馆收录的情况不一样,如果你登不了学校图书馆,你可以通过seek68文献馆进入Springer数据库下载你需要的文献,seek68文献馆有免费试用和低付费两种途径。除了这个数据库,还涵盖了许多其他的知名外文数据库。

网络游戏有客户端和服务端之分就网页游戏来讲 客户端技术有flex 和 javascript服务端技术有c++,java,c#,php,python 等选用什么技术一般是看游戏的设计要求和团队人员的技术组成如果你想做网页游戏开发建议你学习flex 网页游戏客户端现在的主流技术就是flex 服务端语言因为项目的不同选用的语言也会有所差别,所以很难说哪个技术是服务端主流技术

给我邮箱随便发个邮件,我给你发过去

相关文献英文翻译

利益相关者(股东)理论是基于商业必须要有明确的价值观这一设想。这要求经营者说清楚,他们共同创造且把核心利益相关者(合伙人,股东等)聚集起来的价值理念是什么。同时,还要求经营者必须明确他们想如何进行商业行为,特别是他们想与利益相关者(合伙人,股东等)建立怎样的关系,来达到他们的预期。这篇文章通过澄清关于利益相关者理论的错误概念和总结出真理和自由(不僵硬)是需要把商业与道德联系起来考虑,来回应Sundaram和Inkpens的文章“重新审视企业目标”。PS:勉强一翻,仅供参考。

%E6%93%BA-lab

Business logisticsLogistics as a business concept evolved in the 1950s due to the increasing complexity of supplying businesses with materials and shipping out products in an increasingly globalized supply chain, leading to a call for experts called supply chain Business logistics can be defined as "having the right item in the right quantity at the right time at the right place for the right price in the right condition to the right customer", and is the science of process and incorporates all industry The goal of logistics work is to manage the fruition of project life cycles, supply chains and resultant In business, logistics may have either internal focus (inbound logistics), or external focus (outbound logistics) covering the flow and storage of materials from point of origin to point of consumption (see supply chain management) The main functions of a qualified logistician include inventory management, purchasing, transportation, warehousing, consultation and the organizing and planning of these Logisticians combine a professional knowledge of each of these functions to coordinate resources in an There are two fundamentally different forms of logistics: one optimizes a steady flow of material through a network of transport links and storage nodes; the other coordinates a sequence of resources to carry out some [edit]Production logisticsThe term production logistics is used to describe logistic processes within an The purpose of production logistics is to ensure that each machine and workstation is being fed with the right product in the right quantity and quality at the right The concern is not the transportation itself, but to streamline and control the flow through value-adding processes and eliminate non–value-adding Production logistics can be applied to existing as well as new Manufacturing in an existing plant is a constantly changing Machines are exchanged and new ones added, which gives the opportunity to improve the production logistics system Production logistics provides the means to achieve customer response and capital Production logistics is becoming more important with decreasing batch In many industries ( mobile phones), a batch size of one is the short-term aim, allowing even a single customer's demand to be fulfilled Track and tracing, which is an essential part of production logistics—due to product safety and product reliability issues—is also gaining importance, especially in the automotive and medical 出处 wikipedia 商务logisticsLogistics作为企业的经营理念,由于越来越多的与材料供应企业和运出的产品在一个日益全球化的供应链,从而呼吁专家呼吁供应链后勤复杂性进化在20世纪50年代。企业物流可以被定义为“有合适的项目,在正确的数量在正确的时间以合适的价格在合适的地方在正确的条件下,以合适的客户” ,并且是过程的科学性和集成了所有行业。后勤工作的目标是管理项目的生命周期,供应链和由此产生的In业务修成正果,物流可能有无论是内部对焦(内部物流) ,或外部对焦(出站物流) ,涵盖从材料的流动和储存原产地到消费点(见供应链管理) 。一个合格的后勤的主要功能包括库存管理,采购,运输,仓储,咨询,这些活动的组织和策划。后勤人员结合每个函数的专业知识,以协调资源的组织。有两种根本不同的物流形式:一种优化的材料通过交通连接和存储节点网络中的稳流;其他资源协调的序列来进行一些项目。 [编辑]生产logisticsThe长期生产物流是用于一个行业内描述物流流程。生产物流的目的是为了确保每一台机器和工作站被喂以正确的产品在正确的时间正确的数量和质量。令人担忧的是不是交通本身,而是通过增值过程,以简化和控制流量,消除非增值的。生产物流可以应用到现有的和新的植物。制造在现有的工厂是一个不断变化的过程。机进行了交换,增加了新的,这给了机会相应地提高了生产物流系统。生产物流提供达到客户的响应和资本Production物流变得越来越重要与减少批量规模的手段。在许多行业(如移动电话) ,其中一个批次大小是短期目标,甚至允许单个客户的需求,有效地达成。跟踪和追踪,这是生产物流,由于产品的安全性和产品的可靠性问题,也越来越重要,特别是在汽车和医疗行业的重要组成部分

计算机相关英文文献

给我邮箱随便发个邮件,我给你发过去

在google中用英文输入你上面的关键字,记得最好不要出现汉字,会出现很多英文搜索结果,一般可以挑出一些有用的东西。

网上搜了几篇比你的要求字数多些,不过正规论文文献字数不会太少的你要的话,hi我,pdf文件《Serve a Network Game Screen》《Design Issues for Peer-to-Peer Massively》《How to Protect Peer-to-Peer Online Games from Cheats》《Network Characteristics for Server Selection》《Security Issues in Online Games》

这个太多了,google或百度英文搜索或者论文网什么的都有

  • 索引序列
  • 相关的文献英文
  • 船舶相关的英文文献
  • 计算机相关的英文文献
  • 相关文献英文翻译
  • 计算机相关英文文献
  • 返回顶部