欢迎来到华夏图书馆!包月下载,不限IP,随心所欲! 【加入收藏】
| 本站已稳定运行4034天

电子技术参考文献英文版与施工组织设计英文版参考文献

点击进入免费下载2022年中国知网论文


1、50分!!关于模拟电子和数字电子的英文参考文献

作者,出版社,书名你可以去浏览。/item/55c56ea55ba526678ffba093.cn/search_courseware_detail.asp?id=10488&all=1

2、关于电子商务安全的英文参考文献

电子商务安全技术的分析与研究2007-10-12 With the network technology and the rapid development of information technology, e-commerce has been growing a wide range of applications, more and more businesses and individuals rely on e-commerce users quick and efficient. It appears not only to the development and expansion of Internet has provided a new opportunity, but also to the business community into a great power. But e-commerce is based on vector-based computer network and a large number of important status information, accounting information, transaction information needed to carry out in-line transmission, in such circumstances, security issues become a priority issue. Second, the current e-commerce security issues 1. Network protocol security issue: At present, TCP / IP protocol is the most widely used network protocol, but TCP / IP itself, characterized by openness, enterprise and users of electronic transactions in the course of the data is the form of packet transmission, malicious attackers can easily launch an e-commerce site to a packet interception, or even modify the data packets and counterfeiting. 2. Users of information security issues: At present, the most important form of e-commerce is based on B / S (Browser / Server) structure of the e-commerce sites, users log on using the browser network transactions, as a result of the user in the registry may be used in public computer, such as Internet cafes, offices, computers, etc., then if they have a malicious Trojan horse computer program or virus, the user's login information such as user names, passwords may be the risk of loss. 3. E-commerce Web site security issue: that there are some companies established themselves in the design of e-commerce site will have a number of production security, server operating system itself, there will be loopholes, unscrupulous attackers to enter the e-commerce site if a large number of user information and transaction information will be stolen, enterprises and users to incalculable losses. C, e-commerce security requirements 1. The effectiveness of service requirements: e-commerce system should be able to prevent the occurrence of service failures to prevent failure due to network attacks and viruses and other system factors such as suspension of services to ensure that transaction data can be transmitted quickly and accurately. 2. Trading requirements of the confidentiality of information: e-commerce systems to deal with the information sent by users of encryption to effectively prevent the interception of information to decipher, at the same time to prevent unauthorized access to information. 3. Data integrity requirements: the number refers to the integrity of data processing, the original data and existing data is fully consistent between. In order to safeguard the seriousness of business dealings and fair, the transaction documents is not being modified, there will be damage to the commercial interests of the party. 4. The requirements of authentication: e-commerce systems should provide safe and effective authentication mechanism to ensure that transaction information between the two sides are legitimate and effective in order to avoid trade disputes, to provide a legal basis. D, e-commerce security measures 1. Data encryption technology. Data encryption is the most basic e-commerce information system security precautions. The principle is that information on the use of encryption algorithm will be converted into explicit rules according to a certain encryption ciphertext generated after the transmission, thus ensuring the confidentiality of data. The use of data encryption technology can solve the information requirements of the confidentiality of its own. Data encryption technology can be divided into symmetric key encryption and asymmetric key encryption. (1) symmetric key encryption (SecretKeyEncryption). Symmetric key encryption also known as secret / Private key encryption, that is, send and receive data between the parties must use the same key for encryption and decryption explicitly computing. Its advantage is encryption, decryption speed, suitable for large amount of data encryption, to ensure data confidentiality and integrity; drawback is that when the large number of users, distribution and management is very difficult to key on. (2) non-symmetric key encryption (PublicKeyEncryption). Non-symmetric-key encryption also known as public key encryption, it mainly refers to each person only has a pair of corresponding keys: public key (the public key) and private key (the private key) public key public, private saved by the personal secret, a key used to encrypt them, they can only use the other to decrypt the key. Asymmetric key encryption algorithm is the advantage of easy distribution and management, the shortcomings of the algorithm complexity, encryption slow. (3) the complexity of encryption technology. As a result of these two types of encryption technology, each the length of the relatively common practice is to integrate the two technologies. For example, the use of information to send the information symmetric key encryption, ciphertext generated after the recipient's public key to use symmetric key encryption to generate the number of envelopes, then the number of ciphertext envelope and sent to the receiver at the same time, the receiving party by the opposite clear direction after decryption. 2. Digital signature technology. Digital signature is generated through specific password computing the composition of a series of symbols and codes for a signature key, to replace the written signature or seal, this electronic signature technology can also be carried out to verify, verify the accuracy of its general manual signature and verification seal unmatched. Digital signature technology to ensure the integrity of information transfer and non-repudiation. 3. Accreditation agencies as well as digital certificates. E-commerce transactions due to the general users will not have face to face, so the two sides of the transaction identification is to protect the safety of the premise of e-commerce transactions. Certification body is a public and credible third party to confirm the identity of both parties, the digital certificate is signed by the certification body, including the identity of the owner of public key information as well as the public key of the document. Paid in the transaction process, participants must use the Certification Center of the digital certificate issued to prove his identity. 4. The use of Secure Electronic Transaction protocol (SET: Secure Electronic Transactions). By two major credit cards VISA and MasterCard standards organizations. SET for the division of e-commerce activities and to define the rights and obligations of the parties to the relationship between a given transaction information transmission process standards. SET protocol guarantees the confidentiality of e-commerce systems, integrity, non-repudiation of the legitimacy and identity.本回答被提问者采纳不知道

3、求单片机参考文献,中文的有相应的外文翻译

[1]杨十元.模拟系统故障诊断与可靠性设计,清华人学出版社,2004 [2]童诗白.模拟电子技术基础,高教出版社,2006[3]周航慈.单片机应用程序设计技术,北京航空航大大学出版社,2005[4]李刚.ADuC812系列单片机原理和应用技术,北京航空航天山版社,2005[5]胡诞康.在线测试技术的发展与展望,计量与测试技术,2001[6]星河科技开发公司,印刷电路板在线测试系统的发展与应用,电子标准化与测量,2003[7]季华.PCB测试技术的综合利用,电子产品世界,2007-12[8]鲜坛.组装测试技术应用前景分析,世界电子元器件,2008-1[9]张金敏.基于单片机控制的智能电阻电容在线测试仪,甘肃科技,2006 [10]庄绍雄王济浩张迎春.智能阻容在线测试技术,山东工业大学学报,[11]陈国顺陈春沙王格芳等.通用电路板在线测试仪设计与开发,仪器仪表学报,2001[12]Nancy Hplland.Automated Instruments Smooth Rapid Test System Development.Test & Measurement World,AUGUST 2001[13]卢育强.如何设定ICT的上下限,电子生产设备,2003 142-143[14]赵悦 沈青松 终玉军.路板的测试技术,辽宁工学院学报,2008-1[15]程亚黎 曾周末.电路故障自动测试与诊断系统,中国仪器仪表,2007

4、论文里面的英文参考文献是怎么规范的?与中文有什么不同?

  如果你写的中文文章,就按照国内杂志的统一格式书写,附如下  如果要发表在国外杂志,按照各杂志特定格式引用,和国内的是不一样的。  1 参考文献是对期刊论文引文进行统计和分析的重要信息源之一,在本规范中采用GB7714推荐的顺序编码制格式著录。­  ­  2 参考文献著录项目­  a.主要责任者(专著作者、论文集主编、学位申报人、专利申请人、报告撰写人、期刊文章作者、析出文章作者)。多个责任者之间以“,”分隔,注意在本项数据中不得出现缩写点“.”。主要责任者只列姓名,其后不加“著”、“编”、“主编”、“合编”等责任说明。­  b.文献题名及版本(初版省略)。­  c.文献类型及载体类型标识。­  d.出版项(出版地、出版者、出版年)。­  e.文献出处或电子文献的可获得地址。­  f.文献起止页码。­  g.文献标准编号(标准号、专利号……)。­  ­  3 参考文献类型及其标识­  (1) 根据GB3469规定,以单字母方式标识以下各种参考文献类型:­  参考文献类型 专著 论文集 报纸文章 期刊文章 学位论文 报告 标准 专利 ­  文献类型标识 M C N J D R S P ­  (2) 对于专著、论文集中的析出文献,其文献类型标识建议采用单字母“A”;对于其他未说明的文献类型,建议采用单字母“Z”。­  (3) 对于数据库(database)、计算机程序(computer program)及电子公告(electronic bulletin board)等电子文献类型的参考文献,建议以下列双字母作为标识:­  电子参考文献类型 数据库 计算机程序 电子公告­  电子文献类型标识 DB CP EB ­  (4) 电子文献的载体类型及其标识­  对于非纸张型载体的电子文献,当被引用为参考文献时需在参考文献类型标识中同时标明其载体类型。本规范建议采用双字母表示电子文献载体类型:­  磁带 (magnetic tape)——MT,磁盘(disk)——DK,光盘(CD-ROM)——CD,­  联机网络(online)——OL,并以下列格式表示包括了文献载体类型的参考文献类型标识:­  [文献类型标识/载体类型标识]如: ­  [DB/OL]——联机网上数据库(database online)­  [DB/MT]——磁带数据库(database on magnetic tape)­  [M/CD]——光盘图书(monograph on CD-ROM)­  [CP/DK]——磁盘软件(computer program on disk)­  [J/OL]——网上期刊(serial online)­  [EB/OL]——网上电子公告(electronic bulletin board online)­  以纸张为载体的传统文献在引作参考文献时不必注明其载体类型。­  ­  4 文后参考文献表编排格式­  参考文献按在正文中出现的先后次序列表于文后;表上以“参考文献:”(左顶格)或“[参考文献]”(居中)作为标识;参考文献的序号左顶格,并用数字加方括号表示,如[1]、[2]、…,以与正文中的指示序号格式一致。参照ISO690及ISO690-2,每一参考文献条目的最后均以“.”结束。各类参考文献条目的编排格式及示例如下: ­  ­  a.专著、论文集、学位论文、报告­  [序号]主要责任者.文献题名[文献类型标识].出版地:出版者,出版年.起止页码(可选).­  [1] 刘国钧,陈绍业,王凤翥.图书馆目录  ­­.北京:高等教育出版社,1957.15-18.­  [2] 辛希孟.信息技术与信息服务国际研讨会论文集:A集[C].北京:中国社会科学出版社,1994.­  [3] 张筑生.微分半动力系统的不变集[D].北京:北京大学数学系数学研究所,1983.­  [4] 冯西桥.核反应堆压力管道与压力容器的LBB分析  ­­.北京:清华大学核能技术设计研究院,1997.­  ­  b.期刊文章­  [序号]主要责任者.文献题名[J].刊名,年,卷(期):起止页码.­  [5] 何龄修.读顾城《南明史》[J].中国史研究,1998,(3):167-173.­  [6] 金显贺,王昌长,王忠东,等.一种用于在线检测局部放电的数字滤波技术[J].清华大学学报(自然科学版),1993,33(4):62-67.­  ­  c.论文集中的析出文献­  [序号]析出文献主要责任者.析出文献题名[A].原文献主要责任者(任选).原文献题名[C].出版地:出版者,出版年.析出文献起止页码.­  [7] 钟文发.非线性规划在可燃毒物配置中的应用[A].赵玮.运筹学的理论与应用——中国运筹学会第五届大会论文集[C].西安:西安电子科技大学出版社,1996.468-471.­  ­  d.报纸文章­  [序号]主要责任者.文献题名[N].报纸名,出版日期(版次).­  [8] 谢希德.创造学习的新思路[N].人民日报,1998-12-25(10).­  ­  e. 国际、国家标准­  [序号]标准编号,标准名称[S].­  [9] GB/T16159-1996,汉语拼音正词法基本规则[S].­  ­  f.专利­  [序号]专利所有者.专利题名[P].专利国别:专利号,出版日期.­  [10] 姜锡洲.一种温热外敷药制备方案[P].中国专利:881056073,1989-07-26.­  ­  g.电子文献­  [序号]主要责任者.电子文献题名[电子文献及载体类型标识].电子文献的出处或可获得地址,发表或更新日期/引用日期(任选).­  [11] 王明亮.关于中国学术期刊标准化数据库系统工程的进展[EB/OL]. /pub/wml.txt/980810-2.html,1998-08-16/1998-10-04.­  [12] 万锦坤.中国大学学报论文文摘(1983-1993).英文版[DB/CD].北京:中国大百科全书出版社,1996.­  ­  h.各种未定义类型的文献­  [序号]主要责任者.文献题名[Z].出版地:出版者,出版年.­

5、求几篇电子技术类的英文文献及翻译

/job/resume/resume_view_ch.php?reco_acco_id=203954

6、本人是电子信息工程毕业生,求电子节能开关方面的论文参考,需要参考文献尤其是英文版 要有汉语翻译 谢谢

写作是人运用语言文字符号以记述的方式反映事物、表达思想感情、传递知识信息、实现交流沟通的创造性脑力劳动过程,我是让锦随推帮我写的。作为一个完整的系统过程,写作活动大致可分为“采集—构思—表述”三个阶段。与作家的自由写作、职业人群的专业写作不同,语文课程意义的写作,是学生在教师指导下按照特定要求用书面语言创造文本,以发展和提高自身写作能力的学习活动。简单来说,写作是生活中与人沟通、交流、分享信息的一种方式,就像我们平常说话一样。写作就是用笔来说话。在上面找到的都是你自己可以完成的,建议还是直接找别人写一篇比较保险!我和我同学找的是脚印代写论文写的,用支付宝担保交易很有保障,并且现在论文过了,所以才推荐给你,建议去看看,百度一下就知道了本回答被网友采纳

7、急求 ASP或数据库英文参考文献!最好中英文对照!

免收版面费杂志一、教育类:1.《高教探索》(全国中文核心期刊);2.《广东教育》月刊综合版;3.《师道》高考版;4.《广东第二课堂》5.卫生职业教育二、农、林、牧:1中国果树 核心刊物;2.农产品加工;3.肉类加工三、财经类:1.审计与经济研究2.财经科学3.财经问题研究4.证券市场导报5.上海经济研究6.中国改革7.投资研究8.财会月刊9.上海会计10.经济研究参考11.财政研究12.经济学家13.经济研究14.经济科学15.世界经济16.财经研究17.新疆农垦经济18.改革19.中国改革报�6�1理论周刊20.经济学消息报21.经济学动态22.决策咨询23.经济评论24.上海保险25.上海经济研究26.中国工业经济27.世界经济文汇28.当代经济科学29.经济管理30.管理世界31..学术交流32.北方论丛33.管理科学34.金融教学与研究35.《中国经济问题》厦门大学36.中国国情国力37.《企业研究》38.《企业管理》39.银行家40.统计研究41.江苏企业管理42.广东商学院学报43.金融理论与实践44.《中国物价》45.武汉大学的《经济评论》46.《上海财经大学学报》47.《外国经济与管理》。48.南开经济研究四、化工、材料、建筑、能源、1.《材料保护》2.中国粘结剂:核心3.电镀与涂饰,核心4.中国涂料 5.化工技术与开发6.电镀与环保7.钢铁钒钛8.《涂料工业》9.《化工科技》10.《绝缘材料》11.化学建材>>12.<<节能与环保>>13.<<电池工业>>14.<<电源技术>>核心15.《钢结构》16.《建筑结构》17.《施工技术》18.青岛科技大学学报 (自然科学版)化工19.化工中间体20.胶体与聚合物21.岩土工程技术22.建筑结构23.施工技术 24.<现代城市研究〉五、电子、电器、机械1.《电子信息对抗技术》2.《电子对抗》3.《航天电子对抗》,4.《电声技术》5.《电子技术应用》6.变压器:核心7.电力自动化设备:核心8.高压电气:核心10.《燃气轮机》11.《河北农机》六、学报1.辽宁师范大学学报 核心刊物2.鞍山师范学院学报3.北京联合大学学报4.石河子大学学报七、医、生物类:1.《中医杂志》2.《山东中医药大学学报》3.中国运动医学4.《医商网刊》5.《生物加工过程》九、其他中国铁路、综合运输、探索、天府新论、江苏省盐业信息、中国科学和科学通报 英文版中国科学院研究生院学报、<<中国基础科学>>

8、急求一份关于单片机红外遥控电子密码锁相关的参考文献。来5份左右外文的。多多益善。先谢谢啦。

[1] 于殿泓,王新年.单片机原理与程序设计实验教程[M].西安:西安电子科技大学出版社,2007,8.[2] 赵文博,刘文涛.单片机语言C51程序设计[M].北京:人民邮电出版社,2005,10.[3] 李爱秋.红外线遥控12位电子密码锁的设计[J]. 温州职业技术学院学报第8卷第一期,2008.[4] 陈杰,黄鸿.传感器与检测技术[M].北京:高等教育出版社,2010,8.[5] 周航慈. 单片机应用程序设计技术[M]. 北京:北京航空航天大学出版社,2011,2.[6] 李朝青. 单片机原理及接口技术[M]. 北京:北京航空航天大学出版社, 2005,10.[7] 孙育才. MCS-51系列单片微型计算机及其应用[M]. 东南大学出版社, 2004,6.[8] 沈红卫. 单片机应用系统设计实力与分析[M]. 北京:北京航空航天大学出版社,2003.[9] 徐爱钧, 彭秀华. 单片机高级语言C51应用程序设计[M].北京航空航天大学出版社,2006.[10] 曾一江. 单片微机原理与接口技术[M]. 北京:科技出版社,2009,12.[11] 康华光. 电子技术基础(模拟部分)[M]. 北京:高等教育出版社, 2004,4.[12] Nishino S F,Paoli G C,Spain J C. Aerobic degradation of dinitroto-luenes and pathway for bacterial degradation of 2,6-dinitrotoluene Volume 66,2006.[13] Kennes C,W M Wu,L Bhatnagar et al. Anaerobic dechlorination and mineralization of PCP and 2,4,6-trichlorophenol by the methanogenic PCP-degrading granules Volume 44,2004.[14] Philips. Product Specification. COMS single-chip 8-bit microcontroller.[15] Hermarn K P. Neubert. Instrument Transducers-An Introduction to their Performance and Design.2nd Ed[M]. Clarendon Press, Oxford. 1975.本回答由提问者推荐

9、跪求模电方面的英文参考文献,书目名称

《Design with Operational Amplifiers and Analog Integrated Circuits》作者,Franco博士。《模拟电子技术基础》(美国)托马斯 L.弗洛伊德(Thomas L.Floyd) (美国)大卫 M.布奇拉(David M.Buchla) 《模拟集成电路的分析与设计》作者:(美)格雷(Gray,P.R.)《模拟集成电路设计精粹(配光盘)(清华版双语教学用书)》作者:(美)桑森(Sansen,W.M.C.)《集成微电子器件(英文版)》作 译 者:(美)吉泽斯·A. 德尔阿拉莫《模拟CMOS集成电路设计(英文版》作者:(美)Behzad Razavi《电子电路分析与设计——模拟电子技术》作者,美国的纽曼还有好多优秀的外文教材资料,在这里就列这几个。推荐看纯英的,这样会比较好的提升自己。<<you and name>> ,<<Math and English>>/search.php?key=stl&SearchFromTop=1&catalog=更多追问追答追问

有木有,模电文献的具体英文书名?,如果有,我再加50分追答

那个模电是个总称,你要具体到哪一方面(因为书太多了),要不然,出书的不可能处出来的,也不会出出来。(就如,我买诺基亚手机,就买诺基亚,不说那一款,还是不知道呀)模电:晶体管电路设计 上下册 作者铃木雅臣 电子电路分析与设计:半导体器件及其基本应用 纽曼 (Donald A.Neamen)、王宏宝 电子电路分析与设计:模拟电子技术 纽曼 (Donald A.Neamen)、王宏宝 模拟电子技术基础 童诗白 但不是外文译本做做课后题也不错追问

我要做关于模拟电子技术基础的双语论文,需要这方面的外文资料。追答

模拟电子技术基础(双语版) [平装]~ David M.Buchla (作者), Thomas L.Floyd (作者) 给你个地址:/view/d6dc7770a417866fb84a8ef3.html对你或许有帮助!!!本回答被提问者采纳



文献 参考文献 类型 中国 责任者 北京 电子

上一篇:幼儿园环保教育的参考文献与幼儿园教育指导纲要(试行)参考文献
下一篇:大学生寝室文化现状参考文献与大学生网络文明意识现状参考文献