第一篇:社交網站_外文翻譯
社交網站
我們定義的社交網絡站點作為基于Web的服務,允許個人:(1)有界系統內構建一個公共或半公共的配置文件。(2)闡明列表中的其他用戶,與他們共享一個連接。
(3)查看和遍歷他們的名單和那些由其他系統內的連接。性質和命名這些連接可能會有所不同,從站點到站點。
雖然我們使用的術語―社交網站‖來形容這種現象,―社交網站‖也出現在公共話語中,經常交替使用這兩個術語。我們選擇不采用―聯網‖的原因有兩個:重點和范圍。―物聯網‖強調關系啟動,往往陌生人之間。雖然網絡是可能在這些網站上,它是不是主要的做法,他們中的許多,也不是有什么區別他們從其他形式的計算機中介傳播(CMC)。
是什么讓獨特的社交網站并不是說他們允許個人見陌生人,而是他們讓使用者能夠表達,使人們看到他們的社交網絡。這可能會導致個人之間的連接,否則不會進行,但往往不是我們的目標,而這些會議之間―的潛在關系‖(Haythornthwaite,2005年)誰分享一些脫機連接頻繁。許多大型SNS網站,參與者不一定―網絡‖或尋找,以滿足新的人,相反,它們是人誰已經擴展社交網絡的一部分,他們的主要溝通。為了強調這一點明確的社會網絡,這些網站作為一個重要的組織特征,我們將它們標記―社交網站‖。
雖然SNS網站已經實施了各種各樣的技術特點,他們的骨干組成可見型材顯示鉸接式的Friends1誰也系統的用戶列表。配置文件是獨特的網頁,人們可以―輸入自己的應運而生‖(松登,2003年,第3頁)。在加入一個SNS,一個人被要求填寫表格,包含了一系列的問題。回答這些問題,這些問題通常包括描述符,如年齡,位置,興趣,和一個―關于我‖一節使用該配置文件。大多數網站還鼓勵用戶上傳的個人資料照片。有些網站允許用戶添加多媒體內容,或修改他們的個人資料的外觀和感覺,以提高他們的檔案。其他,如Facebook,允許用戶添加模塊(―應用程序‖),提高他們的個人資料。
在一個檔案中的知名度不同的網站,并根據用戶的自由裁量權。默認情況下,型材Friendster和Tribe.net被搜索引擎抓取,使他們的人看到,無論是否觀眾有一個帳戶。另外,LinkedIn的控制的基礎上,他或她是否有付費帳戶,觀眾可能會看到什么。像MySpace允許用戶來選擇他們是否希望他們的個人資料,以成為公眾或―朋友只。‖Facebook的一個不同的方法默認情況下,誰是在相同的―網絡‖的一部分用戶可以查看對方的輪廓,除非一個輪廓所有者已決定拒絕那些在其網絡的權限。結構變化的可視性和訪問社交網站區別于對方的主要方式之一。
加入一個社交網絡站點后,會提示用戶識別系統與他們有關系的人在。這些關系的不同而有所不同的標簽對網站熱門詞匯,包括―朋友‖,―聯系人‖和―粉絲‖,大多數SNS網站需要雙向確認的友誼,但有些則沒有。這些單向的關系有時會標示為―粉絲‖或―關注‖,但許多網站稱這些朋友。
―朋友‖一詞是誤導,因為連接并不一定意味著在日常白話感的友誼,人們連接的原因是多種多樣的(博伊德,2006A)。
公共顯示器的連接是SNS網站的重要組成部分。好友列表中包含鏈接到每個朋友的個人資料,使觀眾通過點擊好友列表遍歷網絡圖。在大多數網站,好友列表是可見的人誰被允許查看配置文件,但也有例外。例如,一些MySpace的用戶已經破解隱藏好友顯示他們的個人資料,LinkedIn允許用戶選擇退出顯示其網絡。
大多數SNS網站還提供了一種機制,用戶朋友的個人資料上留下消息。此功能通常涉及離開―的評論,‖雖然網站使用此功能的各種標簽。此外,SNS網站往往有一個私人消息功能類似的webmail。雖然私人消息和評論上流行的主要SNS網站,他們尚未普及。
并非所有的社交網絡網站等開始。
QQ作為中國的即時通訊服務,LunarStorm開始作為一個社區網站,賽我網作為韓國的討論區工具,以及環訊(原Skyblog)的加入SNS功能,是法國前博客服務。
Classmates.com,學校聯營公司在1995年推出的一個目錄,開始支持SNS網站走紅后,鉸接式好友列表。在2005-2006年與SNS的功能和結構,然后再重新啟動,MiGente AsianAvenue,BlackPlanet早期流行的民族社區網站與好友的功能有限。
雖然SNS網站的設計通常是普及,許多吸引同質人群最初,因此它并不少見找到組使用網站分開自己的國籍,年齡,教育程度,或其他因素,通常段的社會(Hargittai,這個問題)即使那是在沒有設計師的意圖。字的口碑策略有吸引力,因為他們結合消費者克服阻力顯著降低成本和快速的交付,尤其是通過技術,如互聯網的前景。不幸的是,目前scantregarding經驗證據的相對有效性口碑營銷提高企業績效隨著時間的推移。這就提出了一個需要研究企業如何測量WOM通信和口碑如何與其他形式的營銷傳播效果。
字的口碑營銷是互聯網上的一個特別突出的特點。互聯網為消費者提供了大量的場地,分享自己的觀點,喜好,或與別人的經驗,以及公司利用口碑營銷的機會。正如一位評論家指出,―折騰了數百萬美元的超級碗廣告,而不是初出茅廬的dot-com公司正試圖通過吸引注意力的營銷策略,如博客和[口碑]運動‖(2006年,惠特曼B3A頁)便宜得多。因此,重要的是要了解是否口碑才是真正有效的,如果是這樣,如何與傳統營銷活動的影響比較。
萬維網發展最快的舞臺之一是所謂的社交網站的空間。社交網站通常由一小群發送了邀請函,以自己的個人網絡的成員加入該網站的創始人發起的。反過來,新的
成員發送邀請到他們的網絡,等等。
因此,邀請函(即口碑推薦)網站獲得新的成員一直是最重要的推動力。隨著社交網站的成熟,他們可能會開始增加他們的傳統營銷工具的使用。因此,在這個階段,管理層可能會開始質疑口碑的相對有效性。
本研究的目的是開發和估計一個模型,捕捉新成員收購,口碑轉介,與傳統營銷活動之間的動態關系。在這樣做,我們提供一些貢獻。
首先,我們之間的第一次直接觀察到的口碑鏈接
吸納新客戶。其次,我們將展示如何配裝有口碑與傳統營銷的措施(例如,增加口碑營銷行動的活動,這反過來又增加了新的成員收購)的直接影響和間接影響。我們經驗證明,我們的數據集,新加入的會員UPS,這些營銷變量之間的內生性。這突出表明,需要考慮到這些間接影響口碑與傳統營銷的效果,以避免偏估計。第三,我們量化和對比口碑和傳統的營銷行動,立即和長期彈性。特別是,我們結轉效果強的口碑在我們的數據文件。最后,我們估計貨幣價值附加到每個口碑推薦,提供一個上限的財政獎勵管理可能會考慮提供口碑推薦。事實上,這種做法的播種或刺激口碑已迅速增長,但這一活動的有效性仍然很難量化(例如,戈德斯和Mayzlin 2004的)。
我們本文的其余部分組織如下:首先,我們總結前人的研究,以幫助的角度,把我們的貢獻。然后,我們描述我們的建模方法。接下來,我們提出了我們的實證分析的數據合作的互聯網社交網站,并提供理論和管理者的影響。特別是,我們發現,口碑推薦強烈影響收購新客戶,并具有比傳統的營銷形式由該公司與3至7天(21天)顯著較長的結轉。我們估計口碑的長期彈性為0.53-約20-30倍,高于傳統營銷的彈性。
Social Network Sites: Definition, History, and Scholarship
danah m.boyd, Nicole B.Ellison
Journal of Computer-Mediated Communication, Volume 13, Issue 1, pages 210–230, October 2007
Social Network Sites: Definition We define social network sites as web-based services that allow individuals to(1)construct a public or semi-public profile within a bounded system,(2)articulate a list of other users with whom they share a connection, and(3)view and traverse their list of connections and those made by others within the system.The nature and nomenclature of these connections may vary from site to site.While we use the term ―social network site‖ to describe this phenomenon, the term ―social networking sites‖ also appears in public discourse, and the two terms are often used interchangeably.We chose not to employ the term ―networking‖ for two reasons: emphasis and scope.―Networking‖ emphasizes relationship initiation, often between strangers.While networking is possible on these sites, it is not the primary practice on many of them, nor is it what differentiates them from other forms of computer-mediated communication(CMC).What makes social network sites unique is not that they allow individuals to meet strangers, but rather that they enable users to articulate and make visible their social networks.This can result in connections between individuals that would not otherwise be made, but that is often not the goal, and these meetings are frequently between ―latent ties‖(Haythornthwaite, 2005)who share some offline connection.On many of the large SNSs, participants are not necessarily ―networking‖ or looking to meet new people;instead, they are primarily communicating with people who are already a part of their extended social network.To emphasize this articulated social network as a critical organizing feature of these sites, we label them ―social network sites.‖
While SNSs have implemented a wide variety of technical features, their backbone consists of visible profiles that display an articulated list of Friends1 who are also users of the system.Profiles are unique pages where one can ―type oneself into being‖(Sundén, 2003, p.3).After joining an SNS, an individual is asked to fill out forms containing a series of questions.The profile is generated using the answers to these questions, which typically include descriptors such as age, location, interests, and an ―about me‖ section.Most sites also encourage users to upload a profile photo.Some sites allow users to enhance their profiles by adding multimedia content or modifying their profile’s look and feel.Others, such as Facebook, allow users to add modules(―Applications‖)that enhance their profile.The visibility of a profile varies by site and according to user discretion.By default, profiles on Friendster and Tribe.net are crawled by search engines, making them visible to anyone, regardless of whether or not the viewer has an account.Alternatively, LinkedIn controls what a viewer may see based on whether she or he has a paid account.Sites like MySpace allow users to choose whether they want their profile to be public or ―Friends only.‖ Facebook takes a different approach—by default, users who are part of the same ―network‖ can view each other’s profiles, unless a profile owner has decided to deny permission to those in their network.Structural variations around visibility and access are one of the primary ways that SNSs differentiate themselves from each other.After joining a social network site, users are prompted to identify others in the system with whom they have a relationship.The label for these relationships differs depending on the site—popular terms include ―Friends,‖―Contacts,‖ and ―Fans.‖ Most SNSs require bi-directional confirmation for Friendship, but some do not.These one-directional ties are sometimes labeled as ―Fans‖ or ―Followers,‖ but many sites call these Friends as well.The term ―Friends‖ can be misleading, because the connection does not necessarily mean friendship in the everyday vernacular sense, and the reasons people connect are varied(boyd, 2006a).The public display of connections is a crucial component of SNSs.The Friends list contains links to each Friend’s profile, enabling viewers to traverse the network graph by clicking through the Friends lists.On most sites, the list of Friends is visible to anyone who is permitted to view the profile, although there are exceptions.For instance, some MySpace users have hacked their profiles to hide the Friends display, and LinkedIn allows users to opt out of displaying their network.Most SNSs also provide a mechanism for users to leave messages on their Friends’ profiles.This feature typically involves leaving ―comments,‖ although sites employ various labels for this feature.In addition, SNSs often have a private messaging feature similar to webmail.While both private messages and comments are popular on most of the major SNSs, they are not universally available.Not all social network sites began as such.QQ started as a Chinese instant messaging service, LunarStorm as a community site, Cyworld as a Korean discussion forum tool, and Skyrock(formerly Skyblog)was a French blogging service before adding SNS features.Classmates.com, a directory of school affiliates launched in 1995, began supporting articulated lists of Friends after SNSs became popular.AsianAvenue, MiGente, and BlackPlanet were early popular ethnic community sites with limited Friends functionality before re-launching in 2005–2006 with SNS features and structure.While SNSs are often designed to be widely accessible, many attract homogeneous populations initially, so it is not uncommon to find groups using sites to segregate themselves by nationality, age, educational level, or other factors that typically segment society(Hargittai, this issue), even if that was not the intention of the designers.Word-of-mouth communication strategies are appealing because they combine the prospect of overcoming consumer resistance with significantly lower costs and fast delivery—especially through technology, such as the Internet.Unfortunately, empirical evidence is currently scantregarding the relative effectiveness of WOM marketing in increasing firm performance over time.This raises the need to study how firms can measure the effects of WOM communications and how WOM compares with other forms of marketing communication.Word-of-mouth marketing is a particularly prominent feature on the Internet.The Internet provides numerous venues for consumers to share their views, preferences, or experiences with others, as well as opportunities for firms to take advantage of WOM marketing.As one commentator stated, ―Instead of tossing away millions of dollars on Superbowl advertisements, fledgling dot-com companies are trying to catch attention through much cheaper marketing strategies such as blogging and [WOM] campaigns‖(Whitman 2006, p.B3A).Thus, it is important to understand whether WOM is truly effective and, if so, how its impact compares with traditional marketing activities.One of the fastest-growing arenas of the World Wide Web is the space of so-called social networking sites.A social networking site is typically initiated by a small group of founders who send out invitations to join the site to the members of their own personal networks.In turn, new members send invitations to their networks, and so on.Thus, invitations(i.e., WOM referrals)have been the foremost driving force for sites to acquire new members.As social networking sites mature, they may begin to increase their use of traditional marketing tools.Therefore, management may begin to question the relative effectiveness of WOM at this stage.The objective of this research is to develop and estimate a model that captures the dynamic relationships among new member acquisition, WOM referrals, and traditional marketing activities.In doing so, we offer several contributions.First, we are among the first to link observed WOM directly to new customer acquisition.Second, we show how toincorporate both the direct effects and the indirect effects of WOM and traditional marketing actions(e.g., a marketing action increases WOM activity, which in turn increases new member acquisition).We empirically demonstrate, for our data set, the endogeneity among new member sign-ups and these marketing variables.This highlights the need to account for these indirect effects to avoid biased estimates for both WOM and traditional marketing effects.Third, we quantify and contrast the immediate and long-term elasticities of WOM and traditional marketing actions.In particular, we document strong carryover effects for WOM in our data.Finally, we attach an estimated monetary value to each WOM referral, providing an upper bound to the financial incentive management might consider offering for WOM referrals.Indeed, the practice of seeding or stimulating WOM has grown rapidly, but quantifying the effectiveness of this activity remains difficult(e.g., Godes and Mayzlin 2004).We organize the remainder of this article as follows: We begin by summarizing previous research to help put our contributions in perspective.We then describe our modeling approach.Next, we present our empirical analysis of the data from a collaborating Internet social networking site and offer implications for theory and managers.In particular, we find that WOM referrals strongly affect new customer acquisitions and have significantly longer carryover than traditional forms of marketing used by the firm(21 days versus 3 to 7 days).We estimate a long-term elasticity for WOM of.53—approximately 20–30 times higher than the elasticities for traditional marketing.
第二篇:網站遠程管理外文翻譯
湖北大學本科畢業論文(設計)外文翻譯
外文翻譯:
淺談網絡中的遠程控制
原文來源:
Rabiner, L.R.;Gold, B.Englewood Cliffs, N.J., Prentice-Hall, Inc., 2009 p.譯文正文:
摘要:在網絡高速發展的今天,隨著計算機應用的普及,遠程控制也逐漸被人們所關注。遠程控制是網絡的一大優勢,在網絡管理、遠程協作、遠程辦公等計算機領域都有著廣泛的應用,它進一步克服了由于地域性的差異而帶來的操作中的不便性,使得網絡的效率得到了更大的發揮。遠程控制可通過多種方法加以實現。關鍵詞:遠程控制;遙控操作;技術應用;實現方法 計算機遠程控制
計算機遠程控制是在網絡上由一臺電腦(主控端Remote/客戶端)遠距離去控制另一臺電腦(被控端Host/J]服務器端)的技術?。這里的遠程不是字面意思的遠距離,而是指通過網絡來對遠端的計算機實施遙控。
遠程控制只是通過網絡來操縱計算機的一種手段而已,只要運用得當,操縱遠程的計算機也就如同你操縱眼前正在使用的計算機一樣沒有任何區別。當操作者使用主控端電腦控制被控端電腦時,就如同坐在被控端電腦的屏幕前一樣,可以啟動被控端電腦的應用程序,可以使用被控端電腦的文件資料,甚至可以利用被控端電腦的外部打印設備和通信設備來進行打印和訪問互聯網。在這個過程中主控端電腦只是將鍵盤和鼠標的指令傳送給遠程電腦,同時將被控端電腦的屏幕畫面通過通信線回傳過來。也就是說,我們控制被控端電腦進行操作似乎是在眼前的電腦上進行的,實質是在遠程的電腦中實現的,不論打開文件,還是上網瀏覽、下載,所有的資料和上網等都是存儲在遠程的被控端電腦中的。
實行遠程控制,實際上就是一個服務器程序(以下簡稱被控程序)和一個客戶程序(以下簡稱主控程序),被控方即為服務器程序,它監聽客戶的請求,并做出處理;主控方即為客戶程序,它連接上服務器后,發出自己的請求,服務器便根據客戶的請求做出不同的響應。遠程控制系統組成如圖1所示。
當今的遠程控制技術支持的網絡方式有:LAN、WAN、撥號方式、互聯網方式。此外,有的遠程控制軟件還支持通過串口、并口、紅外端口來對遠程機進行控制。遠程控制克服了由于地域性的差異而帶來的操作中的不便性,使得網絡的效率得到了更大的發揮。
2遠程控制的技術實現
2.1遠程控制的原理
“只要網絡有通路就可以實現遠程控制”,遠程控制必須通過網絡才能進行。位于本地的、已被安裝了客戶端程序的主控端是操縱指令的發出端,它像一個普通客戶一樣向非本地、安裝了服務器端程序的被控端發出信號,建立并通過一個特殊的遠程服務,使用各種遠程控制功能發送遠程控制命令,控制被控端電腦中的各種應用程序運行,使得被控端按照主控端的 要求進行各種操作,從而實現遠程控制的目的。圖2遠程控制示意圖
湖北大學本科畢業論文(設計)外文翻譯
通過網絡實現的遠程控制示意圖如圖2所示。
2.2遠程控制實現方法
2.2.1 利用微軟Windows XP系統中遠程控制功能
每臺Windows XP電腦都同時包括客戶端和服務器端,也就是說它既可以當成客戶端來連接其他的Windows XP電腦,也可以將自己當成服務器端,讓別的電腦來控制自己。服務器端的系統都是使用Windows XP,而客戶端就可以是Windows XP、Windows 2000或者Windows Me,并且對客戶端沒有語言的限制。用戶可以利用遠程桌面通過網絡對遠程計算機進行控制,控制后可以訪問所有應用程序、文件和網絡資源等。
2.2.2利用一些功能強大的遠程控制軟件。
遠程控制技術發展到今天,產生了許多優秀的遠程控制軟件,有提供多層次安全防護的遠程遙控軟件,還有加速遠程遙控操作軟件,以及更加利于快速文檔傳送的控制軟件。還有如“RemotelyAnywhere”只需在服務器端一次性安裝,客戶端在網絡中不需要再增加任何軟件,就可以直接通過瀏覽器來對服務器進行遠程控制。它不僅僅只是讓客戶端能夠遠程控制服務器的桌面,還可以給多個用戶設置不同的權限,以便讓他們根據授權對服務器的文件管理器、注冊表等項目進行查詢和管理;它允許服務器和客戶端之間傳遞剪貼板,也可實現普通文檔的傳送。另外,一些集遠程控制、數據通信和文件傳輸等功能于一體,具有很高的數據傳輸效率和系統安全保障的遠程控制系統正在被推廣。
2.2.3根據實際需求開發實現遠程控制
自行開發實現遠程控制,涉及主控機和受控機,故采用Client/Server結構。可以用Delphi編程環境分別在兩臺不同的電腦上編制控制和被控制程序,一個為Clientdpr.exe,裝在受控機上;另一個為Serverdpr.exe,裝在主控機上。Serverdpr.exe指定要監視的受控機的IP地址和發送指令給客戶機的Clientdpr.exe,客戶機的Clientdpr.exe得到指令后,接著在本機執行相應指令,將結果返回給主控機。主控方的功能是這樣實現的:讀取命令串一將命令串轉換成數組一清除內存流一指定目標計算機(通過讀取所輸入的IP地址)一將指令碼發送給目標計算機。當主控機將指令發給受控機后,受控機將在本機上調用Windows的應用程序接口API函數以執行所接收的指令。當受控機接收到數據時,便開始執行主控機發送的操作。具體操作是這樣的:讀取控制碼_+識別控制碼一執行相應的過程或API函數以達到相應的功能。結束語
遠程控制雖然可以方便地操縱遠程計算機,給人們帶來很多便利,但它也會由此帶來安全方面的隱患。隨著遠程控制市場的成熟,網絡安全變得越發重要,只有徹底解決這一關鍵問題,才能促進遠程控制真正走向應用。
湖北大學本科畢業論文(設計)外文翻譯
Remote control of network
Abstract: The rapid development of the network today, with the popularization of computer applications, remote control have gradually been of concern to the people.Network remote control is a major advantage in network management, remote collaboration, remote office and other computer fields have a wide range of applications, it further to overcome regional differences in the operation brought the inconvenience, making the network efficiency Given greater play.Remote control can be achieved through a variety of ways.Keywords: remote control;remote operation;technology;Implementation 1 computer remote control
Computer remote control is on the network by a computer(host Remote / Client)remote to control another computer technology.Here is not the literal meaning of the long-distance remote, but rather through the network to the remote computer on the implementation of remote control.Remote control is to manipulate the computer through the network as a means only, if used properly, will control the remote computer as you manipulate the front of the computer being used as there is no difference.When the operator using the host computer control host computer to host computer as if sitting in front of the screen as the computer can start the host application, you can use the host computer documentation, or even Host computer using the external printing device and communications equipment to print and access the Internet.In this process, host computer is just a keyboard and mouse commands sent to the remote computer, while host computer's screen image come through the communication line return.That is, we control the host computer to operate in front of the computer seems to be carried out, in essence, a remote computer to achieve, whether to open the file, or Web browsing, downloading, all the information and the Internet are all Stored in the remote host computer.Implementation of remote control, in fact, a server program(hereinafter referred to as charged program)and a client(hereinafter referred to as master control program), the prosecution is the server program that listens to customer requests, and to deal with it;Master Is the client side, it is connected to the server, to make their request, the server will be made according to customer's request a different response.Remote control system shown in Figure 1.Today's technical support network remote control methods are: LAN, WAN, dial-up Internet way.In addition, some remote control software also supports serial, parallel, infrared port to control a remote machine.Remote control to overcome regional differences in the operation brought the inconvenience, make the network to play a greater efficiency.2 remote control technology 2.1 Principles of remote control
“As long as the network has access to connect remote control ”, remote control must be carried out through the network.At local, has been installed, the host is a client program to issue control instructions side, it is the same as an ordinary customer to non-local, the installation of the host server program signals, and through the establishment of a special Remote service, using a variety of remote control function to send a remote control command, control, host computers running various applications, making the host in accordance with the master's
湖北大學本科畢業論文(設計)外文翻譯
Requirements for various operations, in order to achieve the remote control.Figure 2 Schematic diagram of the remote control
Remote control through the network diagram shown in Figure 2.2.2Implementation of Remote Control 2.2.1 Microsoft Windows XP system using the remote control function
Windows XP computers each include both client and server side, meaning that both can be used as a client to connect to other Windows XP computer, you can also themselves as the server side, so that other computer to control themselves.Server systems are using Windows XP, the client can be Windows XP, Windows 2000 or Windows Me, and the client without language restrictions.Users can use the Remote Desktop computer through the network to the remote control, after controlling for access to all applications, files and network resources.2.2.2 using some powerful remote control software.Remote control technology to today, have a lot of great remote control software, providing multi-level security protection for remote control software, as well as speed up the remote control operating software, and more conducive to the rapid document transmission control software.Also, as “RemotelyAnywhere” just a one-time installation on the server side, the client in the network do not need to add any software to connect directly through the browser on the server for remote control.It is not just the client to remotely control the server's desktop, but also can set different permissions for multiple users so that they are under the authority of the server's file manager, registry, query and manage projects;it allows the server and Clipboard passed between the client can also be transmitted to achieve common document.In addition, some set of remote control, data communications and file transfer and other functions into one, with high data transmission efficiency and system security remote control system is being promoted.2.2.3 Development and implementation of the actual needs of the remote control
Develop their own remote control, involving the host computer and controlled machines, so the use of Client / Server structure.Delphi programming environment can be used separately on two different computers to be controlled preparation of control and procedures, one for Clientdpr.exe, installed in the controlled machine;one for Serverdpr.exe, installed in the main computer on.Serverdpr.exe designated to monitor the controlled machine IP address and send instructions to the client Clientdpr.exe, client Clientdpr.exe get command, and then execute the corresponding instructions in the machine, the results are returned to the host computer.Master side function is implemented as follows: Read command string into a string array of commands to clear the memory of a stream to a specified target computer(by reading the entered IP address)to send the script to a target computer.When the command sent to the host computer controlled machine, the machine will be controlled on the unit's application program interface calls Windows API functions to perform the received command.When the controlled unit receives the data, they begin to send the host computer operation.To do this: Read identification control code _ + implementation of the corresponding control code for a procedure or function to achieve the appropriate API function.3 Conclusion
Although the remote control can easily manipulate the remote computer, to bring a lot of convenience, but it also the resulting security risks.As the market matures remote control, network security becomes more important, only solve this critical issue, to really go for remote
control applications.
第三篇:網站建設技術外文翻譯(精選)
原文:
On site construction technology.Introduction
The development of network technology for today's global information exchange and sharing funding source in the establishment of contacts and provide more channels and possible.Homes will be known world affairs, according few keyboard or a few mouse clicks can be distant friends thousands of miles away exchanges, and online communications, Internet browsing, on-line interactive, e-commerce has become a modern part of people's lives.Internet era, has created the new people's work and lifestyle, the Internet, openness and sharing of information model, breaking the traditional mode of information dissemination many barriers for people with new opportunities.With computers and the advent of the information age, the pace of the advance of human society in gradually accelerated.In recent years the development of web design, fast people occupied.With the development of web design, a colorful online website together one scenic beauty.To design aesthetic and practical web site should be thoroughly master the building techniques.In building site, we analyzed the websites of objectives, contents, functions, structure, the application of more web design technology.2.the definition of website
How definition of websites 2.1
Web site identified the tasks and objectives, the building site is the most important issue.Why people will come to your website? You have a unique service? The first people to your website is to what? They will come back? All these issues must be taken into account when the site definition of the problem.Definition site to, first of all, the entire site must have a clear understanding of what the design should understand in the end, the main purpose of the mission, how to carry out the task of organization and planning.Second, to maintain the high-quality Web site.Many websites in the face of strong competition from high-quality product is the greatest long-term competitive advantage.An excellent Web site should have the following:
(1)users visit Web site is faster.(2)attention to the feedback and updates.To update the content of the website and timely feedback the user's requirements;
(3)Home design to be reasonable.Home to the first impression left by visitors is important, the design must be attractive in order to have a good visual effect.2.2 The contents of the website and function
The content of the web site is to be a new, fast, all three sides.The content of the website, including the type of static, dynamic, functional and things to deal with.Website content is determined in accordance with the nature of the site, in the design of the site, commercial websites, popular science site, company websites, teaching and exchange websites, the content and style are different.We have established websites with the nature of these types of sites are not the same.2.3 The structure website(1)site structure;
(2)definition of navigation;(3)Visual Design;
(4)framework and design pages.3.Site Design and Implementation
With increasing demands on design, high style, high-grade design work before gaining popularity.This also to the designers have put forward higher requirements, from this point of view, the plate design is to meet the requirements of the people should be and Health.The rapid development of science and technology, the Internet into millions of households, also produced a new design space, and a new web design an important part of the field of design.Excellent web design, we must have good creative, so that the audience can be difficult to shift attention long time, produce power.Layout is very important, through text, graphics space portfolio, can best express harmony with the United States.If you want to further understand website design, made separately from other web site's homepage, you need to have more like CSS, javascript, CGI, and other web design technology.In building on the site of the CSS, javascript and other web design technology.CSS 3.1 Application Design website
(1)What is CSS? CSS is a style sheet(stylesheet)technology.Some of them called CSS(Cascading Stylesheet).(2)the combination of CSS and HTML form.Mode 1: The CSS content, as defined in the writing between the labels.Mode 2: CSS will be preserved as a separate text file, and then from labels to call.(3)CSS the web site of examples.The web site pages, and increase the following definition so that the pages show with special effects.3.2 Application Design website javascript
Javascript and the emergence of making information between users is not only a display and browse the relationship, but to achieve a real-time, dynamic, cross-expression.Thus based on the CGI static HTML pages will be to provide dynamic real-time information, and customer response to the operation of the Web pages replaced.javascript scripting is satisfy this demand arising from the language.It's loved by extensive user.Many scripting language it is in a relatively good..A.S.Boranbayev, Optimal Methods for Java Web Services, News of the National Academy of Science of the Republic of Kazakhstan, 5(2007), 38-43.
第四篇:jsp技術網站設計外文翻譯
外文翻譯
工 學 部
專
業 班
級 學
號 姓
名 指導教師 負責教師
工學一部 網絡工程 B741111 B74111104 王雨娉 潘琢金
沈陽航空航天大學北方科技學院
2011年6月沈陽航空航天大學北方科技學院畢業設計(論文)外文翻譯——原文
Combining JSP and Servlets The technology of JSP and Servlet is the most important technology which use Java technology to exploit request of server, and it is also the standard which exploit business application.Java developers prefer to use it for a variety of reasons, one of which is already familiar with the Java language for the development of this technology are easy to learn Java to the other is “a preparation, run everywhere” to bring the concept of Web applications, To achieve a “one-prepared everywhere realized.” And more importantly, if followed some of the principles of good design, it can be said of separating and content to create high-quality, reusable, easy to maintain and modify the application.For example, if the document in HTML embedded Java code too much(script), will lead the developed application is extremely complex, difficult to read, it is not easy reuse, but also for future maintenance and modification will also cause difficulties.In fact, CSDN the JSP / Servlet forum, can often see some questions, the code is very long, can logic is not very clear, a large number of HTML and Java code mixed together.This is the random development of the defects.Early dynamic pages mainly CGI(Common Gateway Interface, public Gateway Interface)technology, you can use different languages of the CGI programs, such as VB, C / C + + or Delphi, and so on.Though the technology of CGI is developed and powerful, because of difficulties in programming, and low efficiency, modify complex shortcomings, 沈陽航空航天大學北方科技學院畢業設計(論文)外文翻譯——原文
it is gradually being replaced by the trend.Of all the new technology, JSP / Servlet with more efficient and easy to program, more powerful, more secure and has a good portability, they have been many people believe that the future is the most dynamic site of the future development of technology.Similar to CGI, Servlet support request / response model.When a customer submit a request to the server, the server presented the request Servlet, Servlet responsible for handling requests and generate a response, and then gave the server, and then from the server sent to the customer.And the CGI is different, Servlet not generate a new process, but with HTTP Server at the same process.It threads through the use of technology, reduce the server costs.Servlet handling of the request process is this: When received from the client's request, calling service methods, the method of Servlet arrival of the first judgement is what type of request(GET / POST / HEAD…), then calls the appropriate treatment(DoGet / doPost / doHead…)and generate a response.Although such a complex, in fact, simply said to Servlet is a Java class.And the general category of the difference is that this type operating in a Servlet container, which can provide session management and targeted life-cycle management.So that when you use the Servlet, you can get all the benefits of the Java platform, including the safety of the management, use JDBC access the database and cross-platform capability.Moreover, Servlet using thread, and can develop more efficient Web applications.JSP technology is a key J2EE technology, it at a higher level of abstraction of a Servlet.沈陽航空航天大學北方科技學院畢業設計(論文)外文翻譯——原文
It allows conventional static and dynamic HTML content generated by combining an HTML page looks like, but as a Servlet to run.There are many commercial application server support JSP technology, such as BEA WebLogic, IBM WebSphere, JRun, and so on.JSP and Servlet use more than simple.If you have a JSP support for Web servers, and a JSP document, you can put it Fangdao any static HTML files can be placed, do not have to compile, do not have to pack, do not have to ClassPath settings, you can visit as ordinary Web It did visit, the server will automatically help you to do other work.JSP document looks like an ordinary static HTML document, but inside contains a number of Java code.It uses.Jsp the suffix, used to tell the server this document in need of special treatment.When we visit a JSP page, the document will first be translated into a JSP engine Java source files, is actually a Servlet, and compiler, and then, like other Servlet, from Servlet engine to handle.Servlet engine of this type loading, handling requests from customers, and the results returned to the customer, as shown below:
Figure 1: Calling the process of JSP pages 沈陽航空航天大學北方科技學院畢業設計(論文)外文翻譯——原文
After another visit this page to the customer, as long as the paper there have been no changes, JSP engine has been loaded directly call the Servlet.If you have already been modified, it will be once again the implementation of the above process, translate, compile and load.In fact, this is the so-called “first person to punishment.” Because when the first visit to the implementation of a series of the above process, so will spend some time after such a visit would not.Java servlets offer a powerful API that provides access to all the information about the request, the session, and the application.combining JSP with servlets lets you clearly separate the application logic from the presentation of the application;in other words, it lets you use the most appropriate component type for the roles of Model, View and Controller.Servlets, Filters, and Listeners
A servlet is a Java class that extends a server with functionality for processing a request and producing a response.It's implemented using the classes and interfaces defined by the Servlet API.The API consists of two packages: the javax.servlet package contains classes and interfaces that are protocol-independent, while the javax.servlet.http package provides HTTP-specific extensions and utility classes.What makes a servlet a servlet is that the class implements an interface named javax.servlet.Servlet, either directly or by extending one of the support classes.This interface defines the methods used by the web container to manage and interact with the 沈陽航空航天大學北方科技學院畢業設計(論文)外文翻譯——原文
servlet.A servlet for processing HTTP requests typically extends the javax.servlet.http.HttpServlet class.This class implements the Servlet interface and provides additional methods suitable for HTTP processing.Servlet Lifecycle The web container manages all aspects of the servlet's lifecycle.It creates an instance of the servlet class when needed, passes requests to the instance for processing, and eventually removes the instance.For an HttpServlet, the container calls the following methods at the appropriate times in the servlet lifecycle.Besides the doGet()and doPost()methods, there are methods corresponding to the other HTTP methods: doDelete(), doHead(), doOptions(), doPut(), and doTrace().Typically you don't implement these methods;the HttpServlet class already takes care of HEAD, OPTIONS, and TRACE requests in a way that's suitable for most servlets, and the DELETE and PUT HTTP methods are rarely used in a web application.It's important to realize that the container creates only one instance of each servlet.This means that the servlet must be thread safe--able to handle multiple requests at the same time, each executing as a separate thread through the servlet code.Without getting lost in details, you satisfy this requirement with regards to instance variables if you modify the referenced objects only in the init()and destroy()methods, and just read them in the request processing methods.沈陽航空航天大學北方科技學院畢業設計(論文)外文翻譯——原文
Compiling and Installing a Servlet To compile a servlet, you must first ensure that you have the JAR file containing all Servlet API classes in the CLASSPATH environment variable.The JAR file is distributed with all web containers.Tomcat includes it in a file called servlet.jar, located in the common/lib directory.On a Windows platform, you include the JAR file in the CLASSPATH..Reading a Request One of the arguments passed to the doGet()and doPost()methods is an object that implements the HttpServletRequest interface.This interface defines methods that provide access to a wealth of information about the request.Generating a Response Besides the request object, the container passes an object that implements the HttpServletResponse interface as an argument to the doGet()and doPost()methods.This interface defines methods for getting a writer or stream for the response body.It also defines methods for setting the response status code and headers.Using Filters and Listeners The servlet specification defines two component types beside servlets: filters and listeners.These two types were introduced in the Servlet 2.3 specification, so if you're using a container that doesn't yet support this version of the specification, I'm afraid you're 沈陽航空航天大學北方科技學院畢業設計(論文)外文翻譯——原文
out of luck.Filters A filter is a component that can intercept a request targeted for a servlet, JSP page, or static page, as well as the response before it's sent to the client.This makes it easy to centralize tasks that apply to all requests, such as access control, logging, and charging for the content or the services offered by the application.A filter has full access to the body and headers of the request and response, so it can also perform various transformations.One example is compressing the response body if the Accept-Language request header indicates that the client can handle a compressed response.A filter can be applied to either a specific servlet or to all requests matching a URL pattern, such as URLs starting with the same path elements or having the same extension.Listeners
Listeners allow your application to react to certain events.Prior to Servlet 2.3, you could handle only session attribute binding events(triggered when an object was added or removed from a session).You could do this by letting the object saved as a sessionattribute(using
the
HttpSession.setAttribute()
method)implement
the HttpSessionBindingListener interface.With the new interfaces introduced in the 2.3 version of the specification, you can create listeners for servlet context and session lifecycle events as well as session activation and passivation events(used by a container that temporarily saves session state to disk or migrates a session to another server).A new 沈陽航空航天大學北方科技學院畢業設計(論文)外文翻譯——原文
session attribute event listener also makes it possible to deal with attribute binding events for all sessions in one place, instead of placing individual listener objects in each session.The new types of listeners follow the standard Java event model.In other words, a listener is a class that implements one or more of the listener interfaces.The interfaces define methods that correspond to events.The listener class is registered with the container when the application starts, and the container then calls the event methods at the appropriate times.Initializing Shared Resources Using a Listener Beans like this typically need to be initialized before they can be used.For instance, they may need a reference to a database or some other external data source and may create an initial information cache in memory to provide fast access even to the first request for data.You can include code for initialization of the shared resources in the servlet and JSP pages that need them, but a more modular approach is to place all this code in one place and let the other parts of the application work on the assumption that the resources are already initialized and available.An application lifecycle listener is a perfect tool for this type of resource initialization.This type of listener implements the javax.servlet.ServletContextListener interface, with methods called by the container when the application starts and when it shuts down.Picking the Right Component Type for Each Task The Project Billboard application introduced is a fairly complex application.Half the 沈陽航空航天大學北方科技學院畢業設計(論文)外文翻譯——原文
pages are pure controller and business logic processing, it accesses a database to authenticate users, and most pages require access control.In real life, it would likely contain even more pages, for instance, pages for access to a shared document archive, time schedules, and a set of pages for administration.As the application evolves, it may become hard to maintain as a pure JSP application.It's easy to forget to include the access control code in new pages.This is clearly an application that can benefit from using a combination of JSP pages and the component types defined by the servlet specification for the MVC roles.Let's look at the main requirements and see how we can map them to appropriate component types: ? Database access should be abstracted, to avoid knowledge of a specific data schema or database engine in more than one part of the application: beans in the role of Model can be used to accomplish this.? The database access beans must be made available to all other parts of the application when it starts: an application lifecycle event listener is the perfect component type for this task.? Only authenticated users must be allowed to use the application: a filter can perform access control to satisfy this requirement.? Request processing is best done with Java code: a servlet, acting as the Controller, fits the bill.? It must be easy to change the presentation: this is where JSP shines, acting as the 沈陽航空航天大學北方科技學院畢業設計(論文)外文翻譯——原文
View.Adding servlets, listeners, and filters to the mix minimizes the need for complex logic in the JSP pages.Placing all this code in Java classes instead makes it possible to use a regular Java compiler and debugger to fix potential problems.Centralized Request Processing Using a Servlet With a servlet as the common entry point for all application requests, you gain control over the page flow of the application.The servlet can decide which type of response to generate depending on the outcome of the requested action, such as returning a common error page for all requests that fail, or different responses depending on the type of client making the request.With the help from some utility classes, it can also provide services such as input validation, I18N preparations, and in general, encourage a more streamlined approach to request handling.When you use a servlet as a Controller, you must deal with the following basic requirements:
? All requests for processing must be passed to the single Controller servlet.? The servlet must be able to distinguish requests for different types of processing.Here are other features you will want support for, even though they may not be requirements for all applications:
? A strategy for extending the application to support new types of processing requests in a flexible manner.沈陽航空航天大學北方科技學院畢業設計(論文)外文翻譯——原文
? A mechanism for changing the page flow of the application without modifying code.Mapping Application Requests to the Servlet The first requirement for using a Controller servlet is that all requests must pass through it.This can be satisfied in many ways.If you have played around a bit with servlets previously, you're probably used to invoking a servlet with a URI that starts with /myApp/servlet.This is a convention introduced by Suns Java Web Server(JWS), the first product to support servlets before the API was standardized.Most servlet containers support this convention today, even though it's not formally defined in the servlet specification.沈陽航空航天大學北方科技學院畢業設計(外文翻譯)
將Servlet和JSP組合使用
Servlet和JSP技術是用Java開發服務器端應用的主要技術,是開發商務應用表示端的標準。Java開發者喜歡使用它有多種原因,其一是對于已經熟悉Java語言的開發者來說這個技術容易學習;其二是Java把“一次編寫,到處運行”的理念帶入到Web應用中,實現了“一次編寫,到處實現”。而且更為重要的是,如果遵循一些良好的設計原則的話,就可以把表示和內容相分離,創造出高質量的、可以復用的、易于維護和修改的應用程序。比方說,在HTML文檔中如果嵌入過多的Java代碼(scriptlet),就會導致開發出來的應用非常復雜、難以閱讀、不容易復用,而且對以后的維護和修改也會造成困難。事實上,在CSDN的JSP/Servlet論壇中,經常可以看到一些提問,代碼很長,可以邏輯卻不是很清晰,大量的HTML和Java代碼混雜在一起,讓人看得一頭霧水。這就是隨意開發的弊端。
早期的動態網頁主要采用CGI(Common Gateway Interface,公共網關接口)技術,你可以使用不同的語言編寫CGI程序,如VB、C/C++或Delphi等。雖然CGI技術發展成熟且功能強大,但由于編程困難、效率低下、修改復雜等缺點,所以有逐漸被取代的趨勢。在所有的新技術中,JSP/Servlet具備更高效、更容易編程、功能更強、更安全和具有良好的可移植性,因而被許多人認為是未來最有發展前途的動態網站技術。
與CGI相似,Servlet支持請求/響應模型。當一個客戶向服務器遞交一個請求時,服務器把請求送給Servlet,Servlet負責處理請求并生成響應,然后送給服務器,再由服務器發送給客戶。與CGI不同的是,Servlet沒有生成新的進程,而是與HTTP Server處于同一進程中。它通過使用線程技術,減小了服務器的開銷。Servlet處理請求的過程是這樣的:當收到來自客戶端的請求后,調用service方法,該方法中Servlet先判斷到來的請求是什么類型的(GET/POST/HEAD?),然后調用相應的處理方法(doGet/doPost/doHead?)并生成響應。
沈陽航空航天大學北方科技學院畢業設計(外文翻譯)別看這么復雜,其實簡單說來Servlet就是一個Java類。與一般類的不同之處是,這個類運行在一個Servlet容器內,可以提供session管理和對象生命周期管理。因而當你使用Servlet的時候,你可以得到Java平臺的所有好處,包括安全性管理、使用JDBC訪問數據庫以及跨平臺的能力。而且,Servlet使用線程,因而可以開發出效率更高的Web應用。
JSP技術是J2EE的一個關鍵技術,它在更高一級的層次上抽象Servlet。它可以讓常規靜態HTML與動態產生的內容相結合,看起來像一個HTML網頁,卻作為Servlet來運行。現在有許多商業應用服務器支持JSP技術,比如BEA WebLogic、IBM WebSphere、JRun等等。使用JSP比用Servlet更簡單。如果你有一個支持JSP的Web服務器,并且有一個JSP文件,你可以把它放倒任何靜態HTML文件可以放置的位置,不用編譯,不用打包,也不用進行ClassPath的設置,就可以像訪問普通網頁那樣訪問它,服務器會自動幫你做好其他的工作。
JSP 文件看起來就像一個普通靜態HTML文件,只不過里面包含了一些Java代碼。它使用.jsp的后綴,用來告訴服務器這個文件需要特殊的處理。當我們訪問一個JSP頁面的時候,這個文件首先會被JSP引擎翻譯為一個Java源文件,其實就是一個Servlet,并進行編譯,然后像其他Servlet一樣,由Servlet引擎來處理。Servlet引擎裝載這個類,處理來自客戶的請求,并把結果返回給客戶,如下圖所示:
圖1: 調用JSP頁面的流程
沈陽航空航天大學北方科技學院畢業設計(外文翻譯)以后再有客戶訪問這個頁面的時候,只要該文件沒有發生過更改,JSP引擎就直接調用已經裝載的Servlet。如果已經做過修改的話,那就會再次執行以上過程,翻譯、編譯并裝載。其實這就是所謂的“第一人懲罰”。因為首次訪問的時候要執行一系列以上的過程,所以會耗費一些時間;以后的訪問就不會這樣了。
Java servlet提供了一種強有力的API,用這個API可以訪問關于請求、會話和應用程序的所有信息。將servlet和JSP頁面組合起來使用,可以把應用程序的邏輯部分和外觀呈現部分清楚地分開;換句話,利用這個方式可以對模型、視圖和控制器這三種角色分別使用最合適的組件類型。Servlet、過濾器和監聽器
Servlet是一種Java類,它使得服務器的功能可擴展至處理請求和生成應答。它是用Servlet API定義的類和接口實現的。API由兩個程序包組成:jvavax.servlet程序包包含獨立于協議的類和接口,而javax.servlet.http程序包則提供HTTP特定的擴展的實用程序類。
Servlet的實質是實現了接口javax.servlet.Servlet的類,實現是直接完成或通過擴展某個支持類來完成的。該接口定義了Web容器用來管理servlet和與之交互的方法。用于處理HTTP請求的servlet一般情況下都會擴展javax.servlet.http.HttpServlet類。該類實現了Servlet接口,并提供了使用HTTP處理的附加方法。Servlet的生命周期
Web容器管理servlet生命周期的所有方面。它根據需要創建servlet類的實例、將請求傳遞給實例進行處理,最終刪除實例。對于HttpServlet來說,容器會在servlet生命周期的適當時間調用方法。
除了doGet()和doPost()方法之外,還有一些對應于其他HTTP方法的方法:doDelete()、doHead()、doOptiongs()、doPut()和doTrace()。一般情況下不用實現這些方法,因為HttpServlet類已經用適用于大多數servlet的方法考慮到了HEAD、OPTIONS和TRACE請求,而且DELETE和PUT這兩種HTTP方法很少用在Web應用程序中。
沈陽航空航天大學北方科技學院畢業設計(外文翻譯)容器只為每個Servlet創建一個實例非常重要。這意味著servlet必須是線程安全的—即,能夠同時處理多個請求,每個處理都通過servlet代碼作為單獨的線程來執行。如果只在init()和destroy()方法中修改參考的對象,而且只在請求處理方法中讀取他們,那么不用喪失任何細節就可以滿足關于實例變量的這個要求。編譯和安裝servlet 要編譯servlet,必須首先確保JAR文件包含著CLASSPATH環境變量中所有Servlet API類。該JAR文件將隨所有的Web容器一起發布。Tomcat中包含了一個名為servlet.jar的JAR文件,位于common/lib目錄中。在Windows平臺中,應在CLASSPATH中包含JAR文件。讀取請求
傳遞到doGet()和doPost()方法的參數之一是實現了HttpServletRequest接口的對象。該接口定義的方法可提供對關于請求的許多信息的訪問。生成應答
除應答對象之外,容器還將實現HttpServletRequest接口的對象作為icanshu傳遞給doGet()和doPost()方法。該接口定義了為應答行為體獲取數序程序或流的方法。它還定義了設置應答狀態代碼和首部的方法。使用過濾器和監聽器
Servlet規范servlet內定義了兩種組件類型:過濾器和監聽器。這兩種類型是在Servlet 2.3規范中引入的,因此,如果你使用的是不支持該版本規范的容器,恐怕就不能繼續學習了。過濾器
過濾器是一種組件,可以解釋對servlet、JSP頁面或靜態頁面的請求以及發送給客戶端之前的應答。這樣可以很容易地將應用于所有請求的任務集中在一起,例如訪問控制、登錄和內容的開銷或應用提供的服務等。過濾器對請求與應答的行為體和首部具有完全訪問權限,因此還可以執行各種轉換。例如,如果Accept-Language請求
沈陽航空航天大學北方科技學院畢業設計(外文翻譯)首部指出客戶端可以處理壓縮的應答,那么過濾器就可以壓縮應答的行為體。
過濾器可以應用在特定servlet上,或匹配某種URL模式的所有請求上,例如以相同的路徑元素開頭或具有相同擴展名的URL。監聽器
監聽器允許應用程序對特定事件做出回應。Servlet 2.3之前,只能處理會話屬性綁定事件(在添加對象或從會話中刪除對象時)。實現監聽器的方式是用保存為會話屬性(使用HttpSession.setAttribute()方法)的對象實現HttpSessionBinding-Listener接口。隨著Servlet規范的2.3版本中新接口的引入,可以為servlet環境和會話生命周期事件以及激活和鈍化事件(容器用來暫時將會話狀態保存在磁盤上或將會話移植到另一個服務器上)創建監聽器。使用新的會話屬性事件監聽器還可以在一個位置上處理所有會話的屬性綁定事件,而不是在每個會話中防止單獨的監聽器對象。
新類型的監聽器遵循的是標準Java事件模型。換句話說,監聽器是實現了一個或多個監聽器接口的類。接口定義的是事件相應的方法。當應用程序啟動是,容易會注冊監聽器類,然后該容器會在合適的事件調用那些事件方法。使用監聽器初始化共享資源
Bean一般都有需要在使用之前進行初始化。例如,它們可能需要對數據庫或某些其他外部數據源的引用,還可能在內存中創建一個初始消息緩存,以便即使是第一個請求數據也可以提供更快的訪問。可以在需要共享資源的servlet和JSP頁面中包含初始化共享資源的代碼,但是更標準的方法是在一個位置放置所有這些代碼,并在假設資源已經初始化和可用的情況下,使應用程序的其他部分可以正常工作。應用程序生命周期監聽器是此類資源初始化的絕好工具。此類監聽器實現了javax.servlet.ServletContextListener接口,當應用程序啟動和關閉時會由容器調用該接口的方法。
為每個任務選擇正確的組件類型
在之前介紹的項目公告牌應用程序是相當復雜的應用程序。頁面的一般都是純粹的控制器和商務邏輯處理,它訪問數據庫以對用戶進行身份驗證,而且多數頁面都需
沈陽航空航天大學北方科技學院畢業設計(外文翻譯)要訪問控制。在現實生活中,它可能會包含更多的頁面,例如,用于訪問共享文檔檔案、事件表的頁面和用于管理的一組頁面等。由于應用程序在不斷地發展變化,因此可能變得很難作為純JSP應用程序來維護。例如,很容易忘記在新頁面中包含訪問控制代碼。
很明顯,這種應用程序可以從使用JSP頁面與組件類型的組合中受益,其中組件類型由用于MVC角色的servlet規范所定義。下面看一下主要的要求,并了解如何將他們映射到適當的組件類型上:
? 數據庫訪問應該是抽象的,從而避免料接應用程序中多個部分的特定數據模式或數據庫引擎:模型角色中的bean可以用來完成這種認知。
? 數據庫訪問bean必須在應用程序啟動時可用于所有其他的部分:應用程序生命周期時間監聽器是用了該任務的完美的組件類型。
? 只有通過驗證的用戶才允許使用應用程序:過濾器可以完成訪問控制以滿足該要求。
? 用Java代碼進行請求處理效果最佳:servlet作為控制器正符合需要。? 必須很容易改編外觀呈現:這正是JSP的反光點,也就是作為視圖。將servlet、監聽器和過濾器混合起來,就將JSP頁面對復雜邏輯的需求降到了最低。將這些代碼放置到Java類中后,就可以使用普通的Java編譯程序和調試程序來修復潛在的問題。
使用servlet集中處理請求
將servlet作為所有應用程序請求的公共入口時,可以獲得對應用程序頁面流的整體控制。Servlet可以根據所請求行為的結果來決定要生成的應答類型,例如,為所有失敗的請求返回公共的錯誤頁面,或者根據發出請求的客戶端返回不同的應答等。在某些使用程序類的幫助下,servlet還可以提供諸如輸入驗證、J18N準備之類的服務,而且通常會鼓勵使用更有效率的方法來請求處理。
當使用servlet作為控制器時,必須處理下列基本要求: ? 所有處理請求必須傳遞到單獨的控制器servlet中。
沈陽航空航天大學北方科技學院畢業設計(外文翻譯)? Servlet必須能夠區分請求,以便進行不同類型的處理。
下面是其他一些你可能希望支持的功能,即使并非所有應用程序都要求: ? 擴展應用程序以便以更靈活的方式支持新類型的請求處理。? 在不修改代碼的情況下改變應用程序頁面流的機制。
當然,你可以自己開發滿足這些要求的servlet,但是已經有開源式servlet了,他們可以滿足所有這些要求,甚至還有更多的功能。將應用程序請求映射到servlet 使用控制器servlet的第一個要求是所有請求必須都經過該servlet。該要求可以通過多種方式來滿足。如果你以前曾經使用過servlet,那么你可能習慣于用以/myApp/servlet開頭的URI來調用servlet。這是由Sun公司的Java Web Server(JWS)所引入的一個約定,JWS是在推出標準API之前第一個支持servlet的產品。今天,大部分servlet容器都支持這個約定,即使servlet規范中并沒有正式的定義。
第五篇:外文翻譯
當今時代是一個自動化時代,交通燈控制等很多行業的設備都與計算機密切相關。因此,一個好的交通燈控制系統,將給道路擁擠,違章控制等方面給予技術革新。隨著大規模集成電路及計算機技術的迅速發展,以及人工智能在控制技術方面的廣泛運用,智能設備有了很大的發展,是現代科技發展的主流方向。本文介紹了一個智能交通的系統的設計。該智能交通燈控制系統可以實現的功能有:對某市區的四個主要交通路口進行控制:個路口有固定的工作周期,并且在道路擁擠時中控制中心能改變其周期:對路口違章的機動車能夠即時拍照,并提取車牌號。在世界范圍內,一個以微電子技術,計算機和通信技術為先導的,一信息技術和信息產業為中心的信息革命方興未艾。而計算機技術怎樣 與實際應用更有效的結合并有效的發揮其作用是科學界最熱門的話題,也是當今計算機應用中空前活躍的領域。本文主要從單片機的應用上來實現十字路口交通燈智能化的管理,用以控制過往車輛的正常運作。
研究交通的目的是為了優化運輸,人流以及貨流。由于道路使用者的不斷增加,現有資源和基礎設施有限,智能交通控制將成為一個非常重要的課題。但是,智能交通控制的應用還存在局限性。例如避免交通擁堵被認為是對環境和經濟都有利的,但改善交通流也可能導致需求增加。交通仿真有幾個不同的模型。在研究中,我們著重于微觀模型,該模型能模仿單獨車輛的行為,從而模仿動態的車輛組。
由于低效率的交通控制,汽車在城市交通中都經歷過長時間的行進。采用先進的傳感器和智能優化算法來優化交通燈控制系統,將會是非常有益的。優化交通燈開關,增加道路容量和流量,可以防止交通堵塞,交通信號燈控制是一個復雜的優化問題和幾種智能算法的融合,如模糊邏輯,進化算法,和聚類算法已經在使用,試圖解決這一問題,本文提出一種基于多代理聚類算法控制交通信號燈。
在我們的方法中,聚類算法與道路使用者的價值函數是用來確定每個交通燈的最優決策的,這項決定是基于所有道路使用者站在交通路口累積投票,通過估計每輛車的好處(或收益)來確定綠燈時間增益值與總時間是有差異的,它希望在它往返的時候等待,如果燈是紅色,或者燈是綠色。等待,直到車輛到達目的地,通過有聚類算法的基礎設施,最后經過監測車的監測。
我們對自己的聚類算法模型和其它使用綠燈模擬器的系統做了比較。綠燈模擬器是一個交通模擬器,監控交通流量統計,如平均等待時間,并測試不同的交通燈控制器。結果表明,在擁擠的交通條件下,聚類控制器性能優于其它所有測試的非自適應控制器,我們也測試理論上的平均等待時間,用以選擇車輛通過市區的道路,并表明,道路使用者采用合作學習的方法可避免交通瓶頸。
本文安排如下:第2部分敘述如何建立交通模型,預測交通情況和控制交通。第3部分是就相關問題得出結論。第4部分說明了現在正在進一步研究的事實,并介紹了我們的新思想。
The times is a automation times nowadays,traffic light waits for much the industey equipment to go hand in hand with the computer under the control of.Therefore,a good traffic light controls system,will give road aspect such as being crowded,controlling against rules to give a technical improvement.With the fact that the large-scale integrated circuit and the computer art promptness develop,as well as artificial intelligence broad in the field of control technique applies,intelligence equipment has had very big development,the main current being that modern science and technology develops direction.The main body of a book is designed having introduccd a intelligence traffic light systematically.The function being intelligence traffic light navar’s turn to be able to come true has:The crossing carries out supervisory control on four main traffic of some downtown area;Every crossing has the fixed duty period,charges centrefor being able to change it’s period and in depending on a road when being crowded;The motro vehicle breaking rules and regulations to the crossing is able to take a photo immediately,abstracts and the vehicle shop sign.Within world range ,one uses the microelectronics technology,the computer and the technology communicating by letter are a guide’s,centering on IT and IT industry information revolution is in the ascendant.But,how,computer art applies more effective union and there is an effect’s brought it’s effect into play with reality is the most popular topic of scientific community,is also that computer applications is hit by the unparalleled active field nowadays.The main body of a book is applied up mainly from slicing machine’s only realizing intellectualized administration of crossroads traffic light,use operation in controlling the vehicular traffic regularity.Transportation research has the goal to optimize transportation flow of people and goods.As the number of road users constantly increases, and resources provided by current infras-tructures are limited, intelligent control of traffic will become a very important issue in thefuture.However, some limitations to the usage of intelligent tra?c control exist.Avoidingtraffic jams for example is thought to be beneficial to both environment and economy, butimproved traffic-flow may also lead to an increase in demand [Levinson, 2003].There are several models for traffic simulation.In our research we focus on microscopicmodels that model the behavior of individual vehicles, and thereby can simulate dynam-ics of groups of vehicles.Research has shown that such models yield realistic behavior[Nagel and Schreckenberg, 1992, Wahle and Schreckenberg, 2001].Cars in urban traffic can experience long travel times due to inefficient traffic light con-trol.Optimal control of traffic lights using sophisticated sensors and intelligent optimizationalgorithms might therefore bevery beneficial.Optimization of traffic light switching increasesroad capacity and traffic flow, and can prevent tra?c congestions.Traffic light control is acomplex optimization problem and several intelligent algorithms, such as fuzzy logic, evo-lutionary algorithms, and reinforcement learning(RL)have already been used in attemptsto solve it.In this paper we describe a model-based, multi-agent reinforcement learningalgorithm for controlling traffic lights.In our approach, reinforcement learning [Sutton and Barto, 1998, Kaelbling et al., 1996]with road-user-based value functions [Wiering, 2000] is used to determine optimal decisionsfor each traffic light.The decision is based on a cumulative vote of all road users standingfor a traffic junction, where each car votes using its estimated advantage(or gain)of settingits light to green.The gain-value is the difference between the total time it expects to waitduring the rest of its trip if the light for which it is currently standing is red, and if it is green.The waiting time until cars arrive at their destination is estimated by monitoring cars flowingthrough the infrastructure and using reinforcement learning(RL)algorithms.We compare the performance of our model-based RL method to that of other controllersusing the Green Light District simulator(GLD).GLD is a traffic simulator that allows usto design arbitrary infrastructures and traffic patterns, monitor traffic flow statistics such asaverage waiting times, and test different traffic light controllers.The experimental resultsshow that in crowded traffic, the RL controllers outperform all other tested non-adaptivecontrollers.We also test the use of the learned average waiting times for choosing routes of cars through the city(co-learning), and show that by using co-learning road users can avoidbottlenecks.