提出作為證據 的英文怎麼說
中文拼音 [dīchūzuòwéizhèngjù]
提出作為證據
英文
tendered in evidence- 提 : 提動詞(垂手拿著) carry (in one's hand with the arm down)
- 證 : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
- 據 : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
- 提出 : put [bring] forward; raise; project; advance; pose; put sth to sb ; suggest; pour; rain; submit; ...
- 證據 : evidence; proof; testimony
-
The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。On the basis of all the conclusions above, the thesis preparatorily advances that there is another factor of link transaction behavior affecting vertical relationship, and gives primary definition of relative concepts. the thesis advances that link transaction behavior can be classified into priority transaction, information informing, risk co - affording. in order to form effective vertical transaction relationship, the transaction parties will positively process link transation behavior, including transforming incontractible variants into contractible variants or analogously contractible variants
在此基礎上,本論文初步提出影響縱向關系的因素應該包括關系交易行為這一重要變量,並對關系交易行為和關系交易行為的相關概念作出初步的定義,初步提出企業的關系交易行為可以分為交易優先、信息告知、風險共擔三類,並在此基礎上初步分析其中的機理,並根據分析結果提出,當事人交易的過程是不斷提升關系的強度的過程,為了形成有效的縱向交易行為,當事人會主動進行信息告知等關系交易行為,通過把不可寫入合同的變量轉化為可以寫入合同或者可證實的變量來獲得有效交易。These two records provide important evidence that the alaska dunlins are wintering in chongming dongtan and fishponds are often used as their foraging ground
這兩筆記錄提供了美國阿拉斯加黑腹濱鷸在崇明東灘越冬的證據,並同時反映出魚塘作為棲息地對冬候鳥的重要性。The true enemies of science, argues paul ehrlich of stanford university, a pioneer of environmental studies, are those who question the evidence supporting global warming, the depletion of the ozone layer and other consequences of industrial growth
作為環境研究的先驅者,斯坦福大學的保羅?埃利希認為,科學的真正的敵人是那些對全球變暖、臭氧層稀薄和工業增長帶來的其他後果的證據提出質疑的人。Anything we said 6 months ago is inadmissible in an argument
任何6個月以前說過的話,一律作廢,不得在爭論中作為證據提出。This thesis based on the development of heilongjiang ' s green foods, through a large amount of collection and arrangement, to analyze the opportunity of development, some objective problems, course and present condition of heilongjiang ' s green food, point out the countermeasure of development of heilongjiang ' s green food. the thesis is divided into five units : unit 1 analyzes the definitions and characters of green foods, standard and signs of green food. the advantage which green food have and the significance of green food ; unit 2 analyzes the development course and present development situation of heilongjiang ' s green food based on analyzing the starter and development situation of our country, heilongjiang ' s green food past ten years, more work goes before in our country ; unit 3 analyzes the questions required dealing with which exists in development of heilongjiang ' s green foods, it indues that think is too late, the scale is too small, the way of sell is late and false is too much more ; unit 4 draws a conclusion that there is nice chance of developing green food in heilongjiang, based on using a large amount of data ; the last unit provides the ways to turn think, stronger big factories, make the sell way is more than before and draw the lay fastly, and provides appropriate countermeasures to develop heilongjiang ' s green food further i n a healthy way
本文共分五章,第一章在分析了綠色食品的概念與特點的基礎上,對綠色食品的標準與標志進行了界定,並明確規定了綠色食品必須具備的條件,提出了發展綠色食品的意義;第二章在分析我國綠色食品的起步與發展概況的基礎上,對黑龍江省綠色食品的發展歷程和發展現狀進行了分析,黑龍江省綠色食品產業經過十多年的努力,呈現了全省合力抓綠色食品,健康快速發展的好勢頭,並且許多工作都走在全國的前列;第三章從實證著手,分析了黑龍江省綠色食品發展中存在思想觀念滯后、品牌雜、經營銷售方式落後、假冒現象多等若干亟待解決的問題;第四章運用大量數據,得出黑龍江省發展綠色食品的良好機遇,為黑龍江省綠色食品的發展提供了廣闊的發展空間;第五章針對黑龍江省綠色食品發展中存在的問題提出了轉變傳統觀念、壯大龍頭企業、抓好市場營銷、加強綠色食品法規的制定等相應的對策,並對黑龍江省綠色食品的進一步的健康發展提出了新的思路。The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。A foreign party who contributes industrial property or proprietary technology shall deliver documentation relating to thereto, including photocopies of the letters patent or trademark registration certificates, statements of validity, technical feature and practical value thereof, the basis for calculating the price, and the agreement signed with the chinese partner on the value thereof, as annexes attached to the joint venture contract
外國合營者以工業產權或者專有技術作為出資,應當提交該工業產權或者專有技術的有關資料、包括專利證書或者注冊商標證書的復製件、有效狀況及其技術特性、實用價值、作價的計算根據、與中國合營者簽訂的作價協議等有關文件,作為合營合同的附件。In recent years, plentiful and substantial fruits achieved by the lb method in simulations of hydraulics, multiphase flows, flows in porous media and heat transfer as well as magnetohydrodynamics, have revealed a broad perspective of application of this method, it will become a powerful competitor to the conventional approaches. in order to absorb the recent achievement in theory and application of the lb method, explore new ways in hydraulic computation to promote the development of practice, some work is car ried out in this thesis, as following : advances in the theory research and application, deductive process of the d2q9 model and some other commonly used models of the lb method are summarized. based on the hydrodynamic and general boundary conditions, a new joint boundary condition is presented, it integrates advantage of the two conditions above and obtains very good results in dealing with all kinds of boundaries of flow fields
為了消化和吸收近年來lb方法在理論和應用方面的新成果,探索在水力計算方面的新途徑以促進lb方法實用化的發展,本文進行了下列研究工作:綜述了lb方法在理論研究和實際應用方面的新進展,以及d2q9模型的推導過程和其他一些常用的模型;在水動力邊界條件和通用邊界條件的基礎上提出了一種新的聯合邊界條件方法,它綜合了上述兩種邊界條件的優點,在流場的各種邊界處理中取得了非常好的效果,經過模塊化的處理以後這種邊界條件具有更好的實用性;針對均勻網格的lb方法計算效率較低的不足,提出了雙重網格的latticeboltzmann方法,通過二維poiseulle流動、后臺階流動和渠道方槽流動三個算例的模擬,證明這種方法能夠明顯地提高流場模擬的計算效率;此外,根據復雜區域流場的特徵提出了latticeboltzmann方法的分塊-耦合演算法,利用lb方法的計算特性實現塊與塊之間的數據交換,充分利用計算資源提高計算效率,通過對「 t 」型、 「十」型和「 x 」型分岔管道流場的模擬,展示了這種演算法的特徵和優點,以及它所具有的應用前景。In this thesis, the methods of comparison research, the combination of quantitative analysis and qualitative analysis, the combination of positive philosophy and standardized research, the theories of economics and management are used to make systematic and comprehensive analysis. at the same time, using the data that reflects the present situation of the safety and safety management in construction industry, the author analyses the problems existing in the present safety management mode, and then points out the key factor in the new systems of safety management is the agency
在文章中,作者採用了比較研究、定性分析和定量分析相結合、實證研究和規范研究相結合的方法,綜合運用國內外專家學者的研究成果,以大量的事實和數據為依據,分析了我國建築業安全生產管理的現狀和存在的問題,進而提出在中國建築行業建立安全生產體系的具體模式和該模式運行機制的關鍵因素? ?即中介機構在安全生產管理體系中所處的地位和重要因素。" dr. gorbsky ' s results provide elegant proof that the cell cycle must be precisely controlled, " said rodger mcever, vice president of research at the facility. " now he and his lab can work toward developing innovative methods to probe and better understand the complex process of cell division. the research is detailed in the april 13 issue of the journal nature
該基金會負責研究工作的副主席羅傑麥凱維爾說, 「戈爾博斯基博士的研究成果為下面這種觀點提供了非常有力的證據,那就是細胞分裂的循環周期必須處于精確控制之下」 , 「現在他及其所在的實驗室可以致力於開發出更具創新性的研究方法,以對細胞分裂進行進一步的探索,並使人們能夠更為深入詳細地了解細胞分裂的復雜過程」 。In continental law system countries, burden of proof includes burden of adducing evidence, burden of persuasion. burden of adducing evidence means that the subjects in criminal procedure who initiate trial procedure and require the courts to judge according to their demands or subject whom there is presumption against must adduce adequate " evidence of the fact to prove that the evidence is on the demand of proof. otherwise the subjects will fail in the suit
筆者認為,刑事訴訟證明責任,是指在刑事訴訟中引起審判程序啟動並要求法院依其主張裁判或存在對其不利之法律推定的刑事訴訟主體,必須就其主張的對定罪量刑具有決定作用的待證特定事實或者為推翻不利的推定事實提出足夠證據,並利用證據對該事實或或者為推翻不利的推定事實加以證明到法律規定的程度。As a result of these, this research consult the scholars ’ research, add up my understanding, defined the quality of work life. according to it, on the basis of reviews of quality of work life studies, we make a tentative research on it. first, we collected the items for the measure by visiting, open questionnaire ; we developed a seven - component construct of quality of work life
鑒於此,本研究在國內外學者以往研究的基礎上,結合我國企業的實際情況,界定工作生活質量的概念,並以此定義為依據,在搜集國內外相關文獻資料的基礎上,採用開放式問卷調查法、訪談法等方法,編制了企業員工工作生活質量問卷,提出並驗證了工作生活質量的七維結構模型。The emergence of computer crime has set a new task to our present criminal procedure law, particular in evidence problem, for example, our present criminal procedure law does not include the electronic records, but the law circle has to research on computer data because the electronic record or information can be used as evidence in many circumstances
計算機犯罪現象的出現對我國現行的刑事訴訟法提出了新的課題,突出表現在證據問題上。如,我國刑事訴訟法中列舉的證據類型未包括電磁記錄,法學界需要探討計算機存儲的數據資料,各種電磁記錄或電磁化的信息在何種條件下可以作為證據。In this thesis, the emphasis is the design of the solftware interface and function, the analysis of the tested result of improvement platform, and the contrast of the old platform and the new platform, which can be looked on as a new reference of the new developing direction of hydraulic experimentation
對改造后的實驗臺測試數據進行了定性分析,提出並驗證了有關液壓操作和控制的新的思路和途徑;對改造前後實驗臺的性能進行了對比和分析,為液壓教學實驗的發展方向提供了參考。Because of the disadvantages in logic, explanation and ideology, the nature of evidence system can not works well in judicial practice. on the other hand, the competence of evidence rules has many advantages in act field, flexibility and ideology, which make the substitution of the former possible
但是,由於在邏輯上、內涵上以及所代表的思維定式上存在著許多的問題,證據的屬性制度難以在實踐中發揮實際作用,而證據能力制度則在作用的范圍、靈活性和思維方式等方面顯示出明顯的優勢,這為證據能力制度代替證據屬性制度提供了可能。In the first chapter in this dissertation, the possibility and certainty of traditional letter of credit electronicsization have been discussed. in the second chapter, first of all simply introduced the model that electronic letter of credit preceeds. then according to this model, put forward the probably existing safe trouble : the systematic reliability ; secrecy and completeness of data telecommunications ; the social status authenticity of business person and the nature that business action cannot be denied ; the legal effectiveness of the data telecommunications as evidence
本文第一章論述了傳統信用證電子化的可能性與必然性;第二章首先簡單介紹了現在國際上電子信用證運做的模式,然後根據此運做模式提出可能存在的安全隱患;系統的可靠性;數據電訊的機密性和完整性;交易者身份的真實性及交易行為的不可抵賴性;數據電訊作為證據的合法有效性。The 1998 nobel prize was shared with two other american scientists, prof. robert f. furchgott and prof. louis j. ignarro, who also contributed to the early evidence that no is a normal biological regulator of blood vessels
酸作為一種訊息分子方面獲頒一九九八年的諾貝爾生理學及醫學獎。他與兩位提出初步證據證明氧化氮是正常的血管生物調控者的美國科學家? ?羅拔In mitigation, counsel submit evidence of his client ' s work for charity
為獲減刑,律師提出了他的委託人為慈善機構所做工作的證據。What miranda says is that the warning is necessary if the police interrogate a suspect in custody and want to offer something the suspect says into evidence at trial
米蘭達警告所說的是,警官詢問關押中的嫌疑犯並想將嫌疑犯的供述作為證據時才有必要有必要提出米蘭達警告。分享友人