互依行為 的英文怎麼說

中文拼音 [hángwéi]
互依行為 英文
interdependent behavior
  • : 代詞(相互;彼此) each other; mutual
  • : Ⅰ動詞1 (依靠; 依仗) depend on; rely on 2 (依從; 同意) comply with; listen to; yield to Ⅱ介詞...
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • 行為 : action; behaviour; conduct; deed
  1. In term of the control mechanism between tp and te, possibly, this special control method will provide the control theory some spark. based on the research and conclusion of the frog visual behavior, in term of the control mechanism among the tp, te and endbrain area, the author has done a detailed system analysis and use the computer 3d to simulate the frog vision behavior. this kind of visual behavior model could be taken as a good reference to study the formation of the vision and its characteristics

    文中通過對青蛙視覺數據的細致整理和總結,根據丘腦-前頂蓋( tp ) ~ 1 、頂蓋~ 2和端腦區域里神經元集團之間的相作用機制並結合具體的視覺,做了詳細的系統分析,並在此基礎上,使用計算機3d技術對青蛙視覺了模擬,這種直觀的視覺模型能夠我們進一步研究視覺的形成和特點提供良好的據和借鑒。
  2. The guidance principles of the sanction and prevention on the international environmental crimes go through the legislation, administration of laws, and any other extrajudicial activity, which are the principles of directive functions to strike and prevent this kind of crimes

    並認三者相聯系,相存,從始自終貫穿于國際環境犯罪的打擊和預防動之中,對國際社會打擊和預防環境犯罪的具體對策起著指導性作用。
  3. It relies on trust, and a good memory for favours given and received, but is otherwise not much different from simultaneous collaboration ( such as a wolf pack hunting ) in that the benefit exceeds the cost for all parties involved

    這種形式下的賴的是相信任,對自己所施與和得到的好處有個好的記憶,但是這與即時協作沒有多少的區別(如在狩獵中運用狼群戰術) ,原因是個人的既得利益是高於所有參與人所做出的施捨。
  4. Part iii : the author in this part probes into the relation between criminal target and criminal act, the relation between criminal target and criminal object and the relation between criminal target and criminal consequence. the author thinks that every criminal act has criminal target. it is necessary to distinguish criminal target from criminal object

    第三部分:本部分通過對犯罪對象和犯罪、犯罪客體以及犯罪結果關系的探討,認一切犯罪都有犯罪對象、犯罪和犯罪對象相賴、相規定,不存在無犯罪對象的犯罪
  5. Abstract : by studying the dwelling behaviour and dwelling functlon space, we emphasize the logic relationship among area, function and comfort and the reasonal expansion of dwelling function during the process of the dwelling area added, distribute and add area reasonably

    文摘:該文通過對居住和住宅功能空間的研究,強調住宅面積、功能和舒適之間相託的關系,以及在住宅面積增長過程中住宅功能合理拓展和居住需求層次的滿足次序,合理分配和增加住宅面積。
  6. Public security and procuratorial organs should place a case on file for investigation of the illegal and criminal act of collusion with each other and transportation of fake and low - quality commodities across the border by various means, strike relentless blows at people violating the law or criminals sabotaging the management order of the frontier and local trade

    五、公安、檢察機關對相勾結、以各種方式販運假冒偽劣商品出境的違法犯罪法及時立案偵察,法嚴厲打擊破壞邊地貿易經營秩序的違法犯罪分子。
  7. Finally, regression analysis reveals that internet addiction is influenced by several factors either directly or indirectly. it is the result of interaction of user ' s cognition, behavior, and personality. personality, social support, and motives of internet use influence internet addiction by act on subjective dependence on the internet, loneliness and the use of particular internet service

    回歸分析表明,網路成癌受多種因素的直接或間接影響,是認知、、人格、社會等諸多因素相作用的結果,其中,人格因素、社會支持、網路使用動機主要通過作用於個體對網路的主觀賴感、孤獨感及特定的網路使用(聊天室使用和玩網上游戲)對網路成痛產生間接影響。
  8. The new requirements for applications in material surface engineering urge a new type of hipib apparatus, for instance, the generation of medium - power - density ion beam, high - stability ion beams and long - lifetime ion source etc. therefore, characterization of high power ion diode - magnetically insulated ion diode ( mid ), the key issue for the technique development, is considered in this dissertation. the investigations of hipib generation and its mechanisms have been carried out in a temp - 6 hipib apparatus, in order to optimize the configuration of ion diode and its ion beam parameters for materials surface treatments

    針對強流脈沖離子束( hipib )技術研發的關鍵環節?高功率離子二極體(磁絕緣離子二極體)的工作特性,在temp - 6型hipib裝置上開展了hipib產生及其形成機理的實驗研究,確定了優化的離子二極體結構和輻照工藝參數;通過hipib輻照金屬材料燒蝕的系統研究,揭示了燒蝕表面形貌的形成規律,徹底弄清hipib與材料相作用機理提供了實驗據。
  9. The main connotation of japans enterprise culture lies in the following aspects : continuously innovating the managing concepts and product design in accordance with the variation of market ; reflecting the enterprise spirit, ideal and business ethics through the employees unified consciousness and habitual behavior ; enhancing the implementation of the rules and regulations in the enterprise by establishing interdependent relationship between the enterprise and its employees ; merging the enterprise culture into the national culture to draw nutrition and meanwhile, exhibit its own characteristics

    摘要日本企業文化的主要內涵是管理理念和產品製造設想隨市場變化而持續創新;企業精神、理念、經營道德等主要通過員工的統一意識和習慣來體現;企業與員工建立相存的關系促使企業管理制度的執力得以增強;企業文化在建設過程中融入民族文化氛圍並汲取營養、彰顯其個性。
  10. Undergraduates " learning adaptability is a kind of ability characteristic which means that undergraduates can adjust their own learning motivation and behavior initiatively according to the diversified learning condition inside and outside and their own require of learning in order to improve learning ability, harmonize learning psychology and behavior with diversified learning condition, acquire remarkable learning achievement

    大學生學習適應性指大學生據學習內外條件的變化及自身學習需要,主動調整自己的學習動力與,使自身的學習心理和與不斷變化的學習條件相協調,取得良好學習成就的能力特徵。
  11. This mainly shows as follows : the enterprise and the enterprise are in arrears with each other seriously ; the financial distortion of enterprise ; the enterprise escapes and abolishes the bank debt ; the enterprise manufactures and sell the fake ; the enterprise is in arrears with the salary ; issue false manage information ' s, etc. those are something with the unripe market economic system of our country, the lagging of thought morals construction, there training weak of law, the factor having something to do with standard, the difficulty of safeguarding the consumer rights and the unstandard government behavior

    所謂企業誠信經營是指企業照國家法律規定、市場規則和商業道德規范,在經營管理和市場營運中確立和執的自律性理念和。人無信不立,企業無信則衰。可是,目前我國企業經營誠信缺失問題卻相當嚴重,這主要表現在:企業與企業之間相拖欠嚴重;企業財務失真;企業逃廢銀債務;企業制假售假;企業拖欠工資;發布虛假經營信息等方面。
  12. According to the theory of instrument law, the abstract of instrument embodies its effect centrally in the inter - separate relationship between the fundamental relationship of instrument and the legal relationship of instrument, that is, the legal relationship is independent of the fundamental relationship and wo n ' t produce, change, or eliminate its restriction on the parties whether the fundamental relationship is existent or legal or not, while the production, changing and elimination of rights and duties depends on the act on instruments and other statuary facts

    二、票據無因性的效力該部分主要論述了票據無因性的法律效力問題。根據票據法理論,票據無因性的法律效力集中地體現票據關系和票據實質關系相分離的關系:票據關系獨立於實質關系,不以實質關系的存廢及是否合法而對票據當事人產生、變更或消滅其約束力,票據債權債務的產生、變更及消滅僅賴于票據及其他法定事實。
  13. The acts have the characters of relativity, mutual dependence and double purposes, which distinguish themselves from the acts in civil law

    訴訟的連續性、相賴性、時空限定性以及目的二重性是其與實體相區別的特徵。
  14. In order to solve this problem, a new mechanism of cooperative coevolution with local interaction for collective complex cooperation behaviors is proposed based on system theory and nonlinear science theory

    針對這一問題,據系統論和非線性科學理論,構造了一種引入局部交的群體復雜協作協同進化機制。
  15. In the part of theoretical analysis, the thesis first defines the concepts related to family business, discusses the interaction between kinship and economic relations and the mutual benefits between the economic behavior and social relations by focusing on the origin of the family business, and documents the economic value of the kinship that the family business has to depend on in the first place

    在基本理論框架部分,本文首先對家族企業及相關概念進理論梳理和界定,從家族企業產生的本源來探討親族關系與經濟關系如何相利用,家族的經濟與社會關系之間如何惠,從而進一步揭示出家族企業最先要賴的親族關系的經濟價值。
  16. The interdependent individuals within the system function as the standard to categorize the system ' s structure, with suppliers and demanders of social in security fund grouped into individuals with different economic status

    把尋找其內部相賴的主體作劃分系統結構的標準,將社會保障基金的需求方與供給方分別劃分處于各種經濟地位的不同主體。
  17. Thirdly, according to some relevant theories of new policy economics, the article explains the characteristics and their forming reasons of the employment changing by cost - income analyses respectively form the government, enterprises and employees " sides. this is the further micro - analysis, belonging to the inside operation studying in the model. fourthly, this article indicates that the social security system is the sequent supporting system, which is an essential outside condition required by the employment policies " changing

    在以上內容的基礎之上,文章以諾斯的相關理論分析據,從更微觀的層面多角度觀察和分析了就業制度變遷的三方主體在變遷中的動機及動,分別從政府、企業和職工三者的角度進成本?收益比較,揭示了國企就業制度變遷的特點及其形成原因。
  18. The curve of dynamic modulus versus the conductive filler volume percent showed that the dynamic modulus of the composites changed with increase of the filler volume percent and exhibited a transition phenomenon. it is believed that these results mentioned above were related to the filler dispersion and the interaction between filler and polymer

    通過研究動態流變對導電填料含量的賴性,發現導電填料含量增浙江大學碩士學位論文加,體系的動態模量存在一轉變現象,被認與顆粒在聚合物中的分散、填料與聚合物間相作用密切相關。
  19. These findings indicate that background factors, psychological characteristics and genetic variation in nicotinic cholinergic receptors contribute independently or interactively to smoking initiation and to severity of nicotine dependence in young women

    這些研究結果表明:背景因素、心理特徵,以及煙堿性膽堿能受體的遺傳變異均獨立或相影響地作用於年輕女性的開始吸煙,作用於尼古丁賴度。
  20. The most used technique is the encryption decipher technology, others include the identity authentication, firewall technology, router security, intrusion detection, emergency responds and restores technical, the honeypot technology and so on. while these technologies is under development, some of them is only single function, mutually independent, and difficult for the system administration. they cannot be trusted completely as the solutions to network intrusion behavior which emerges one after another increasly in the reality

    目前,解決網路安全問題的主要技術手段有加密解密技術、身份認證、防火墻技術、安全路由器、入侵檢測、應急響應與恢復技術、蜜罐技術等,這些技術在發展的同時,也存在著功能單一,相獨立,難于系統管理的不足,不能應對現實中層出不窮的網路入侵,所以單純靠這些技術不可能滿足全部的安全要求。
分享友人