提交單據給 的英文怎麼說

中文拼音 [jiāodāngěi]
提交單據給 英文
presentation of documents be made to
  • : 提動詞(垂手拿著) carry (in one's hand with the arm down)
  • : Ⅰ動詞1 (把事物轉移給有關方面) hand over; give up; deliver 2 (到某一時辰或季節) reach (a cert...
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 給Ⅰ動詞1 (送對方某物; 使對方得到) give; grant 2 (用在動詞后 表示交與 付出) pass; pay 3 (叫; ...
  • 提交 : submit (a problem, etc. ) to; refer to
  1. Answer : have the following kinds : ( one ) the licence of goods of imports and exports that foreign trade management department signs and issue and the other approval document that the country provides ; ( 2 ) shipping order or sheet of pick up the goods, carry sheet ( card of the custom sheet that check and after checking actual goods, discharged chapter give back is built to give on freight bill declare at customs person by with extract or shipping goods ) ; ( 3 ) bill ; ( 4 ) case is single portion ( bulk goods or onefold breed and content can avoid a shipment with the identical content that pack hand in ) ; ( 5 ) decrease duty, duty - free or the proof file of exempt from examinations

    答:有以下幾種: (一)對外貿易治理部門簽發的進出口貨物許可證和國家規定的其他批準文件; (二)、裝貨或運(海關核查證和查驗實際貨物后,在貨運上加蓋放行章發還報關人憑以取或裝運貨物) ; (三)發票一份; (四)裝箱一份(散裝貨物或一品種且包裝內容一致的件裝貨物可免) ; (五)減稅、免稅或免驗的證實文件。
  2. The seller must exercise all due diligence to send forward the documents, and it shall be his duty to tender them, with all due dispatch.

    賣方應竭盡全力發送各種,並有責任按時買方。
  3. Shows a decision point, " validation successful ? ", two data format conversion tasks, local data repositories to store customer orders for later use in the process, and a process loop to select and forward orders to the correct manufacturing plant

    顯示了一個決策點, 「驗證成功? 「 ,兩個數格式轉換任務,以供流程后來使用的本地數倉庫來存儲客戶訂,以及一個流程環來選擇並且將訂正確的生產廠商。
  4. If documents presented under this credit are found to be discrepant, we shall give notice of refusal and shall hold documents at your disposal subject to the following condition : if we have not received your disposal instructions for the discrepant documents prior to receipt of the applicant ' s waiver of discrepancies, we may release the document to the applicant without notice to you

    如果本信用證項下發現有不符點,我行將根以下條款發出拒付通知並持等候你方處理:若我行在收到開證申請人寬容不符點要求之前沒有收到你方的處理指示,我行將放開證申請人而不再通知你方。
  5. We hereby undertake that the documents shall be honoured on due presentation of drawn strictly in terms of this credit. upon receipts of origianl shipping documents we shall arrange remittance of proceeds in usd dollar, as per instructions of negotiating bank certifying that the documents are in order and drawn strictly in terms of this letter of credit

    我們(開證行)承諾將兌付和信用證條款嚴格一致的.一旦收到議付行的議付並在面函上註明"完全嚴格按照信用證要求繕制,為相符" ,我們會按照議付行的指示,立即將款項(收益)以美金匯指定銀行
  6. The ids works by two way, misuse detection and anomaly detection, misuse detection flags an intrusion on intrusion signature, this kind of detecting technic can be realized much more easily, and much more accurate, but it can not find some intrusiones that have been disguised or new kinds of intrusion. the anomaly detection can detect in more wide field, anomaly detection can compare new statistic data with average record, then anomaly record will be found, but it ' s more difficult to set a threshold, if the threshold is too big, some intrusion may be put through, if the threshold is too small, the ids will give more false positive alarm, and the threshold will be different with different people or different period, so the ids just simply show us their suspicious record, the administrator or expert will be in duty to analyze this record and give conclusion, the ids give more alarm than it should, leave us more detection record to analyze, and this is a hard work, we can not distinguish an intrusion or not if we analyze only one record, but we can judge if we find the relation among mass detection evidence. in this article, we try distinguish an intrusion using d - s theory ( proof theory ) instead using manual work, the ids will be more helpful and efficient

    濫用檢測採用的是特徵檢測的方法,實現較為簡,判斷的準確性較高,但是不能判斷一些經過偽裝的入侵或特徵庫中尚未包含的入侵,異常檢測能夠根以往記錄的特徵平均值,判斷出異常情況,但是對于異常到什麼程度才視為入侵,這個閥值非常難以確定,閥值設定的太高,有可能漏過真正的入侵,如果設定的閥值太低,又會產生較高的誤警率,而且這個閥值因人而異,因時而異,因此現在的入侵檢測系統把這部分異常記錄以一定的形式顯示出來或通知管理人員,管理人員去判斷,而這些ids系統難以判斷的記錄,如果對每個證獨地進行觀察,可能是難以判斷是否是入侵,而把許多先後證關聯起來,專家或管理人員根經驗能夠判斷訪問的合法性,本文試圖引入人工智慧中證理論的推理策略和示例學習方法,代替人工檢查分析,可以高效率,降低誤警率,並可以對一個正在進行得可疑訪問實現實時檢測,通過搜索及時判斷,及時阻斷非法訪問,比事後得人工處理更有意義。
  7. However, according to the bifurcated approach to problems of causation, the scope of damages that defined by the " cause in fact " is provided with the probability of enlargement infinitely and uncertainty, so it is necessary to restrict the scope of damages by some legal means within the meaning of techniques of law. meantime, it is unfair that the risk of transaction is only undertaked by the defaulting party, so it is necessary to make use of some legal means to delimit the reasonable damages for the defaulting party

    首先,筆者出:根全部賠償原則,違約方應賠償因其違約行為合同債權人造成的所有損害,而借用國外學者關于因果關系二分法的觀點,該「事實上的因果關系」所劃定的損害賠償范圍具有無限擴大的可能性和不確定性,因此從法技術講,就有必須要利用一些法律手段對該賠償范圍予以限界;同時,易活動本身固有的風險由合同違約方承擔也是不公平的,因此也有必要利用一些法律手段為違約方劃定一個合理的賠償責任范圍。
  8. For presentation of decuments to us under this transferred credit, we will take this as being instructed by the second beneficiary to present the documents, either with substiution of documents by the first beneficiary or not, to the issuing bank for payment

    對于此轉讓證的我們,我們將視為第二受益人的,或者第一受益人替換部分,或不,直接寄到開證行議付。
  9. Firstly in this part, computer simulation methodology based on the baecher model for generating network of discrete fractures was presented, which includes the follow details : probability distributions of fracture density, orientation, trace length, size, and aperture and estimation of their statistical parameters ; stochastic models of fracture network ; monte - carlo ' s simulation method ; numerical simulation procedure and technicality. then, boundary element method was used to calculate flow through the generated fractured network. assuming single fracture as a two - dimension inexpressible isotropic porous media, boundary element method equations for flow in single fracture and then in fracture network were derived using the weighted residual method

    出了離散裂隙網路模型所依的基本假定;發展了基於baecher模型的離散裂隙網路計算機隨機生成技術:詳細地推導了裂隙滲流和多裂隙相網路滲流的邊界元法公式,發展了離散裂隙網路中穩態滲流的邊界元數值技術,並且討論了相關的具體數值技術細節,如角點的處理方法,元的自動剖分等:描述了混合邊界元?管流模擬方法及其數值實現;研究了裂隙網路的簡化方法,並針對裂隙網路邊界元法的特點出了一種改進的分塊三角分解法。
  10. The seller issues a draft, to which the shipping documents are attached, forwards the draft to a bank in his place ( i. e., the remitting bank ), make an application for collection and entrusts the remitting bank to collect the purchase price from the buyer through its correspondent bank abroad ( i. e., the collecting bank )

    由賣方開具匯票並隨附,把它當地銀行(托收銀行以托銀行)並出托收申請,委託該行通過它在進口地的代理行(代收銀行) ,代向進口人收款。
  11. One additional copy of invoice is required to be presented together with the documents for issuing bank ' s retention. usd10 will bededucted if extra copy of ioice not presented

    這是說我們時,除了信用證前面說的發票份數外,還要一份額外的發票復印件通知行嗎?
  12. When submitting the final statement, the contractor shall submit a written discharge which confirms that the total of the final statement represents full and final settlementof all moneys due to the contractor under or in connection with the contract

    最終報表時,承包商應一份書面結清,確認最終報表的總額為根或參照合同應支付他的所有款項的全部和最終的結算額。
  13. In the case of documents payable in a currency other than of the country of payment ( foreign currency ), the presenting bank must, unless otherwise instructed in the collection instruction, release the documents to the drawee against payment in the designed foreign currency only if such foreign currency can immediately remitted in accordance with the instructions given in the collection instruction

    如果是以付款地國家以外的貨幣(外匯)付款,除托收指示中另用規定外,示行必須憑指定的外匯的付款,付款人,只要該外匯是按托收指示規定能夠立即匯出。
  14. The main thought is to introduce lcc managing subsystem in the general data - mining system architecture. the mining results, that is lcc, which were provided to the users directly in the past, are stored in the lcc database through which the users can carry on various operations and management. a consistent view of lcc is formed so as to improve the efficiency of sharing and mining cluster sowntown

    其主要思想是在一般的數挖掘體系結構中引入lcc管理子系統,即將原來的直接用戶的挖掘結果lcc保存在元庫中,用戶利用關系數庫成熟的介面技術可以方便地構造lcc訪問介面,通過介面完成對lcc的各種操作管理,達到在不同挖掘系統之間共享lcc的目的。
  15. To tender ( or surrender ) the shipping documents : the collecting bank or the holder of the shipping documents hands over them to the drawee

    代收行或持票把裝船受票人叫做
  16. Presentation of documents must be made to the issuing bank or the confirming bank, if any, or any other nominated bank

    必須開證行或保兌行(如有)或其它任何指定銀行。
  17. An extra copy of the commercial invoice and transport document must be presented for transferring bank ' s retention and disposal if not presented, a fee of usd10. 00 will be deducted from payment proceeds

    額外的發票和運輸副件必須轉讓銀行進行(這里應該是對方的開證行)保存並且處理,如果不將會。 。 。 。
  18. In the case of documents payable in the currency of the country of payment ( local currency ), the presenting bank must, unless otherwise instructed in the collection instruction, release the documents to the drawee against payment in local currency only if such currency is immediately available for disposal in the manner specified in the collection instruction

    如果是以付款地國家的貨幣(當地貨幣)付款,除托收指示另有規定外,示行必須憑當地貨幣的付款,付款人,只要該種貨幣按托收指示規定的方式能夠隨時處理。
  19. For the data interchange of different enterprise, we define an equivalent architecture of b2b ' s data interchange. the mostly work of data interchange is given to the data interchange system between the two enterprises, then construct a frame which is generic, easy to expand and maintenance. use the technology about the oriented object and component to improve the reusability and the extensibility of the data interchange system in order to fit the disunity of the standard

    而對于企業之間的數換,可以採用一種簡對等式的體系結構,這種體系結構把數換的大部分工作都丁進行數換雙方企業的數換系統,然後建立了一個通用的,易於擴展與維擴的軟體框架,並通過面向對象和構件技術高數換系統的可復用性與可擴充性來適應這種標準不統一的現狀。
  20. As the application of distributed computing is used much more widely , distributed database becomes a significant part of information management it avoids a lot of disadvantages of conventional centralized database , and is applicable to many situations distributed database is a set of data which is the unity logic , but in fact these data is located on different sites it is of high availability , easy expansibility , high concurrency , high efficiency and etc in distributed system , data redundancy is a method to improve the speed of query and the availability of system distributed query should shield the lower level details of data redundancy from end users , distributed transaction should ensure data from disaccord this paper introduces basic conceptions of distributed database firstly , discusses distributed transaction and concurrent control , describes the development prototype mysql ’ s characters , architecture and executive mechanism , then shows the skeleton model of dpsql and exposes the strategy and algorithm of distributed query and distributed transaction , at last analyzes the extra expenses and response delay of distributed processes this paper exposes the implementation mechanism of distributed query and distributed transaction emphatically distributed query uses the strategy of “ read one , write a11 ” s0 in such a system if user ’ s requests are read - - only for the most part and the distribution of data redundancy is plausible , efficiency is very high distributed transaction uses two - 。 phase commit protocol to ensure the consistency of global data , which has less communication overhead

    分散式查詢需要向用戶屏蔽數冗餘分散的底層細節,分散式事務處理要保證全局數完整,這都是傳統集中式數庫不曾面臨的問題。本文首先介紹了分散式數庫的概念性問題;接著討論了分散式事務涉及的定義及演算法;然後描述了dpsql的原型mysql的特性、結構和執行機制;繼而出了dpsql的梗概模型,闡述了實現分散式查詢和分散式事務處理的策略及演算法;最後分析了進行分散式處理系統增加的額外開銷和客戶端的額外響應延遲。本文重點描述了分散式查詢和分散式事務處理的實現機制,分散式查詢採用」讀一個寫全部」的本地優先策略,在讀操作頻繁的系統中,只要庫的分佈合理,機效率極高,幾乎無任何附加開銷和延遲,而以整個系統的角度看來,吞吐量就更是優于機系統;分散式事務處理採用兩階段協議,通信次數較少並能確實保證副本一致。
分享友人