則賴 的英文怎麼說

中文拼音 [lài]
則賴 英文
noriyori
  • : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
  • : i 動詞1 (依靠) rely on; depend on 2 (逗留不肯離去) hang on in a place; drag out one s stay in...
  1. By two ways, this paper debates the theory of fracture detection : on one hand by the way of edge detection in image processing ; on the other hand by time series analysis. the detection by time series analysis is more antinoise than edge detection in image processing. edge detection theory in image processing mainly includes correlation data, fuzzy edge detection, entropy operator edge detection and gradient edge detection

    圖像處理中的邊緣檢測的方法主要包括相干數據體法、模糊邊緣檢測法、基於熵運算元的邊緣檢測法、梯度邊緣檢測法;其中模糊邊緣檢測法比較依于參數的選擇,其渡越點兩邊的像素區別明顯;熵運算元的檢測方法是檢測的圖像邊緣比較光滑,連通性好;梯度檢測法可以使用不同的運算元核,演算法比較簡單;相干數據體對于總體的大的裂縫的分佈具有比較奸的反應。
  2. In the search for site - dependent characters, the different design elements can be identified in the language and ideas of the office ' s landscape architecture : the poetic planning approach ; the reutilization of proven design principles ; the archaeological search for original features of a place ; the concept of the garden as a theme garden ; the concept of the " openly architectonic " ; the concept of " emptiness " ; and the " production line " concept

    在追尋場地特性的過程中,納?施密特教授及其事務所的規劃思想和設計語言可以歸納為:詩意的規劃方法;已被證實的設計原的再利用;對場所原有特徵的考古學研究的應用;將花園設計成一個主題式花園的概念;直接利用建築結構組織空間的概念; 「空」的概念; 「流水線」的概念。
  3. Subjective aspect, argumentum the traffic cause trouble abearance is human two kind negligence circumstance scilicet the negligence of the fault the gist and overconfident negligence, versus judge the human foresight in abearance ability, criminal negligence the inside how the human diligentia in abearance onus problem adduced own notion, combining versus the abroad of mutually in reliance on " the axiom proceeded the rating. in the objective aspects, argumentum three components of the traffic cause trouble sin and the scope of the atmospher e terms of the road accident occurrence. in the aspect of object, point out the traffic cause trouble the object of the sin is a transportation safety

    主觀方面,論證了交通肇事行為人主觀上的兩種過失情形即疏忽大意的過失和過于自信的過失,對怎樣判斷行為人的預見能力、過失犯罪中行為人的注意義務問題進行了探討,並對國外的「相互信」原進行了評價。客觀方面,論述了交通肇事罪客觀上的四個構成要件和交通事故發生的范圍問題。在客體方面,指出了交通肇事罪侵犯的客體是交通運輸安全。
  4. With an eye on long - term development and creating larger values for the customers, according to the rule of " reputation first, quality first, customer first ", with comprehensive design - tracking individual service, satisfying the different customers ' requirements, we have won broad customers ' sincere auspice and trust

    立足長遠發展,為客戶創造更大價值,全員以"信譽第一、質量第一、顧客至上"為準,全面推行限時跟蹤設計的個性服務,滿足不同客戶需求,贏得了廣大客戶的由衷支持和信
  5. This is a basic law of interdependence.

    這些一條相互依的法
  6. As the cyclin dependent kinase, cdc2 may act at multiple levels during mitosis to repress ribosome biogenesis, which lead the biosynthesis to a relative silent phase, when the most of cell ' s energy expenditure is used in chromosome condensation, breakdown of the nuclear envelope, and formation of the mitotic spindle

    作為cyclin依激酶, cdc2的激酶活性在很大程度上抑制了細胞的合成代謝,使細胞的蛋白合成進入了一個相對的靜止期,而細胞主要的能量被應用於細胞分裂時的染色體的濃縮、核膜的降解、紡錘體的形成等。
  7. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵性。
  8. At a definite temperature a mesoscopic circuit isnt in a determinate quantum state instead of in the mixed state ( or statistical state ). using the density matrix of the canonical ensemble, we have deduced the formulate of the quantum fluctuations of both charge and current in a non - dissipative mesoscopic coupled circuit. and the dependences of the quantum fluctuation of the circuit on its temperature have obtained

    在有限溫度下,介觀電路系統實際上並不處在一個確定的量子狀態,而是處在混合態.根據正系綜的密度矩陣導出耦合互感電路中電荷和電流的量子漲落,得到了量子漲落與溫度的依關系
  9. The development of a multicellular organism results from the selective expression of genes and the maturation of proteins is dependent on molecular chaperons

    多細胞生物體發育的實質是基因的選擇表達性,表達蛋白的成熟于分子伴侶的協助。
  10. We still do ; living in a world in which undeclared aggression, war, hypocrisy, chicanery, anarchy and impending immolation are part of our daily lives, we all want a code to live by

    如今,不宣而戰的侵略、戰爭、虛偽、詐騙、無政府狀態以及即將臨頭的毀滅成了我們日常生活的一部分,我們都希望有一個以生存的行為準
  11. The setting up of this post has been very smooth with the support of cwm nethersole fund and chan king yee family fund. the further development of the " pastoral programme ", however, could be possible only with the full support of the christian community

    該職位獲世界傳道會那打素基金及陳敬儀女士紀念基金資助得以設立,長期需倚教會及各界人士捐款支持,使教牧事工部可進一步發展。
  12. But there are much incredulity and reprobation, whose focus is suspicious of villagers " ability to democratize. but douglas north ' s path dependence theory gives those thoughts an expositive pattern. based on that theory, as an original system choice, the villager autonomy determines

    對此,諾斯的制度變遷路徑依理論提供了一個解釋的框架:村民自治這一初始制度形式的選擇決定了制度變遷以後可能選擇的路徑,而制度的報酬遞增機制是該制度進行自我強化的基礎。
  13. If behavior person cheats content lending money to be used at prodigal illegal perhaps activity and cannot repay as scheduled, and of behavior of depend on zhang, this free returns ability and perhaps cheat content lending money, show behavior person has the objective of detinue, diddle property number is larger, ought to with punish of crime of fraud

    假如行為人騙借錢物用於揮霍或者非法活動而不能如期償還,並有賬行為的,或者本無償還能力而騙借錢物的,表明行為人具有非法佔有的目的,騙取財物數額較大的,應當以詐騙罪論處。
  14. The distinctive feature of the principle is that it makes reasons count

    這一原的獨特之處就在於它倚於人類理性。
  15. The answer is positive, because the donors have been endowed the right of withdrawal ( revocation ) according to the stipulation explicitly in modern contract law in china. however, does that meant donors haven ’ t any responsibility for the loss of donee ? if donor should undertake some responsibility, what kind of responsibility it is

    本文以現行《合同法》第十一章「贈與合同」中贈與人的任意撤銷權與受贈人的信利益沖突為切入點提出問題,介紹兩大法系代表性的兩種解決方案,即以富勒為代表的「信」和以耶林為代表的「締約過失規」 。
  16. Firstly the patterns of the multifingered hands are detailed, eight patterns are defined. the classical bayes method is used in the classification of pre - grasp of multiple fingers based on three patterns which are grasping, holding and pinching. based on the eight pre - grasp patterns, bp neural network is applied in the classification of the pre - grasp of multifingered hands and gets a good effect. the method solves the shortcoming input sample relying on the propobility density and simplified the un - insititution characters extraction. in this paper, support vector machine ( svm ) and binary - tree with clustering is applied in the classification. this method can solve the slow speed and effect with fewness sample in the classification, achieving a good effect. in this papper, we extract the characters of the regulation object with geometry characters and extact the unregulation object with the image analysis

    此法解決了輸入樣本依物體的概率密度的特點,簡化了分類特徵提取的不直觀性。本文還採用了支持向量機( svm )和聚類二叉樹相結合的方法對機器人手預抓取八類模式進行分類,解決了預抓取模式分類訓練速度過慢以及在分類中樣本數量偏少而影響分類效果的問題,得到了較高的正確率。本文對預抓取幾何形狀規的物體採用直接提取其幾何特徵,對于預抓取幾何形狀不規的物體採用圖像分析的方法進行特徵提取。
  17. More generally, men seem to rely more on their grey matter for their iq, whereas women rely more on their white matter

    大體上說男性的iq依靠灰質,而女性更多依于白質。
  18. The legal quality of a rule does not depend on whether it is infringed.

    一條規的法律性質不依於它是否被違反。
  19. While their 3 ) charisma springs from their 4 ) legendary american roots, their commercial strength rests on 5 ) innovation and 6 ) interpretation in the hands of jeanswear makers around the world

    雖然牛仔褲的超凡魅力發源自其富有傳奇性的美國老家,它們的商業力量于全球各地的牛仔服裝製作商們的革新與詮釋。
  20. Wittgenstein have roughly two steps for anti - private language argument, the first step rely on anti - ostensive definition, and the second step is crux of argument, and rely on distinguishing private language and public language

    摘要維特根斯坦的反私人語言論證分兩個步驟來進行,第一步依于反直指定義,而關鍵性的第二步以對私人語言與公共語言的區分為前提。
分享友人