提出作為證據 的英文怎麼說

中文拼音 [chūzuòwéizhèng]
提出作為證據 英文
tendered in evidence
  • : 提動詞(垂手拿著) carry (in one's hand with the arm down)
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 提出 : put [bring] forward; raise; project; advance; pose; put sth to sb ; suggest; pour; rain; submit; ...
  • 證據 : evidence; proof; testimony
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子單運中的安全隱患的基礎上,歸納其六大安全要素,即系統的可靠性、交易者身份的真實性、數電訊的機密性和完整性、數電訊的合法有效性以及交易者行的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子單的安全認機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero例介紹了數字簽名的技術方式,對有關法律問題了論述;第七章首先論述了電子單對有效性的法律需求,然後結合國內法和國際規則的規定論了數電訊制度產生的必然性;第八章通過對各國立法對電子的法律效力的規定,論述了對電子交易至關重要的數電訊的不可抵賴性。
  2. On the basis of all the conclusions above, the thesis preparatorily advances that there is another factor of link transaction behavior affecting vertical relationship, and gives primary definition of relative concepts. the thesis advances that link transaction behavior can be classified into priority transaction, information informing, risk co - affording. in order to form effective vertical transaction relationship, the transaction parties will positively process link transation behavior, including transforming incontractible variants into contractible variants or analogously contractible variants

    在此基礎上,本論文初步影響縱向關系的因素應該包括關系交易行這一重要變量,並對關系交易行和關系交易行的相關概念初步的定義,初步企業的關系交易行可以分交易優先、信息告知、風險共擔三類,並在此基礎上初步分析其中的機理,並根分析結果,當事人交易的過程是不斷升關系的強度的過程,了形成有效的縱向交易行,當事人會主動進行信息告知等關系交易行,通過把不可寫入合同的變量轉化可以寫入合同或者可實的變量來獲得有效交易。
  3. These two records provide important evidence that the alaska dunlins are wintering in chongming dongtan and fishponds are often used as their foraging ground

    這兩筆記錄供了美國阿拉斯加黑腹濱鷸在崇明東灘越冬的,並同時反映魚塘棲息地對冬候鳥的重要性。
  4. The true enemies of science, argues paul ehrlich of stanford university, a pioneer of environmental studies, are those who question the evidence supporting global warming, the depletion of the ozone layer and other consequences of industrial growth

    環境研究的先驅者,斯坦福大學的保羅?埃利希認,科學的真正的敵人是那些對全球變暖、臭氧層稀薄和工業增長帶來的其他後果的質疑的人。
  5. Anything we said 6 months ago is inadmissible in an argument

    任何6個月以前說過的話,一律廢,不得在爭論中
  6. This thesis based on the development of heilongjiang ' s green foods, through a large amount of collection and arrangement, to analyze the opportunity of development, some objective problems, course and present condition of heilongjiang ' s green food, point out the countermeasure of development of heilongjiang ' s green food. the thesis is divided into five units : unit 1 analyzes the definitions and characters of green foods, standard and signs of green food. the advantage which green food have and the significance of green food ; unit 2 analyzes the development course and present development situation of heilongjiang ' s green food based on analyzing the starter and development situation of our country, heilongjiang ' s green food past ten years, more work goes before in our country ; unit 3 analyzes the questions required dealing with which exists in development of heilongjiang ' s green foods, it indues that think is too late, the scale is too small, the way of sell is late and false is too much more ; unit 4 draws a conclusion that there is nice chance of developing green food in heilongjiang, based on using a large amount of data ; the last unit provides the ways to turn think, stronger big factories, make the sell way is more than before and draw the lay fastly, and provides appropriate countermeasures to develop heilongjiang ' s green food further i n a healthy way

    本文共分五章,第一章在分析了綠色食品的概念與特點的基礎上,對綠色食品的標準與標志進行了界定,並明確規定了綠色食品必須具備的條件,了發展綠色食品的意義;第二章在分析我國綠色食品的起步與發展概況的基礎上,對黑龍江省綠色食品的發展歷程和發展現狀進行了分析,黑龍江省綠色食品產業經過十多年的努力,呈現了全省合力抓綠色食品,健康快速發展的好勢頭,並且許多工都走在全國的前列;第三章從實著手,分析了黑龍江省綠色食品發展中存在思想觀念滯后、品牌雜、經營銷售方式落後、假冒現象多等若干亟待解決的問題;第四章運用大量數,得黑龍江省發展綠色食品的良好機遇,黑龍江省綠色食品的發展供了廣闊的發展空間;第五章針對黑龍江省綠色食品發展中存在的問題了轉變傳統觀念、壯大龍頭企業、抓好市場營銷、加強綠色食品法規的制定等相應的對策,並對黑龍江省綠色食品的進一步的健康發展了新的思路。
  7. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認、完整性控制、密碼技術、防火墻系統、審計和恢復、操系統安全、數庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工一個整體的解決方案,其在配置、管理和應用方面供了基本的框架。
  8. A foreign party who contributes industrial property or proprietary technology shall deliver documentation relating to thereto, including photocopies of the letters patent or trademark registration certificates, statements of validity, technical feature and practical value thereof, the basis for calculating the price, and the agreement signed with the chinese partner on the value thereof, as annexes attached to the joint venture contract

    外國合營者以工業產權或者專有技術資,應當交該工業產權或者專有技術的有關資料、包括專利書或者注冊商標書的復製件、有效狀況及其技術特性、實用價值、價的計算根、與中國合營者簽訂的價協議等有關文件,合營合同的附件。
  9. In recent years, plentiful and substantial fruits achieved by the lb method in simulations of hydraulics, multiphase flows, flows in porous media and heat transfer as well as magnetohydrodynamics, have revealed a broad perspective of application of this method, it will become a powerful competitor to the conventional approaches. in order to absorb the recent achievement in theory and application of the lb method, explore new ways in hydraulic computation to promote the development of practice, some work is car ried out in this thesis, as following : advances in the theory research and application, deductive process of the d2q9 model and some other commonly used models of the lb method are summarized. based on the hydrodynamic and general boundary conditions, a new joint boundary condition is presented, it integrates advantage of the two conditions above and obtains very good results in dealing with all kinds of boundaries of flow fields

    了消化和吸收近年來lb方法在理論和應用方面的新成果,探索在水力計算方面的新途徑以促進lb方法實用化的發展,本文進行了下列研究工:綜述了lb方法在理論研究和實際應用方面的新進展,以及d2q9模型的推導過程和其他一些常用的模型;在水動力邊界條件和通用邊界條件的基礎上了一種新的聯合邊界條件方法,它綜合了上述兩種邊界條件的優點,在流場的各種邊界處理中取得了非常好的效果,經過模塊化的處理以後這種邊界條件具有更好的實用性;針對均勻網格的lb方法計算效率較低的不足,了雙重網格的latticeboltzmann方法,通過二維poiseulle流動、后臺階流動和渠道方槽流動三個算例的模擬,明這種方法能夠明顯地高流場模擬的計算效率;此外,根復雜區域流場的特徵了latticeboltzmann方法的分塊-耦合演算法,利用lb方法的計算特性實現塊與塊之間的數交換,充分利用計算資源高計算效率,通過對「 t 」型、 「十」型和「 x 」型分岔管道流場的模擬,展示了這種演算法的特徵和優點,以及它所具有的應用前景。
  10. In this thesis, the methods of comparison research, the combination of quantitative analysis and qualitative analysis, the combination of positive philosophy and standardized research, the theories of economics and management are used to make systematic and comprehensive analysis. at the same time, using the data that reflects the present situation of the safety and safety management in construction industry, the author analyses the problems existing in the present safety management mode, and then points out the key factor in the new systems of safety management is the agency

    在文章中,者採用了比較研究、定性分析和定量分析相結合、實研究和規范研究相結合的方法,綜合運用國內外專家學者的研究成果,以大量的事實和數,分析了我國建築業安全生產管理的現狀和存在的問題,進而在中國建築行業建立安全生產體系的具體模式和該模式運行機制的關鍵因素? ?即中介機構在安全生產管理體系中所處的地位和重要因素。
  11. " dr. gorbsky ' s results provide elegant proof that the cell cycle must be precisely controlled, " said rodger mcever, vice president of research at the facility. " now he and his lab can work toward developing innovative methods to probe and better understand the complex process of cell division. the research is detailed in the april 13 issue of the journal nature

    該基金會負責研究工的副主席羅傑麥凱維爾說, 「戈爾博斯基博士的研究成果下面這種觀點供了非常有力的,那就是細胞分裂的循環周期必須處于精確控制之下」 , 「現在他及其所在的實驗室可以致力於開發更具創新性的研究方法,以對細胞分裂進行進一步的探索,並使人們能夠更深入詳細地了解細胞分裂的復雜過程」 。
  12. In continental law system countries, burden of proof includes burden of adducing evidence, burden of persuasion. burden of adducing evidence means that the subjects in criminal procedure who initiate trial procedure and require the courts to judge according to their demands or subject whom there is presumption against must adduce adequate " evidence of the fact to prove that the evidence is on the demand of proof. otherwise the subjects will fail in the suit

    筆者認,刑事訴訟明責任,是指在刑事訴訟中引起審判程序啟動並要求法院依其主張裁判或存在對其不利之法律推定的刑事訴訟主體,必須就其主張的對定罪量刑具有決定用的待特定事實或者推翻不利的推定事實足夠,並利用對該事實或或者推翻不利的推定事實加以明到法律規定的程度。
  13. As a result of these, this research consult the scholars ’ research, add up my understanding, defined the quality of work life. according to it, on the basis of reviews of quality of work life studies, we make a tentative research on it. first, we collected the items for the measure by visiting, open questionnaire ; we developed a seven - component construct of quality of work life

    鑒於此,本研究在國內外學者以往研究的基礎上,結合我國企業的實際情況,界定工生活質量的概念,並以此定義,在搜集國內外相關文獻資料的基礎上,採用開放式問卷調查法、訪談法等方法,編制了企業員工工生活質量問卷,並驗了工生活質量的七維結構模型。
  14. The emergence of computer crime has set a new task to our present criminal procedure law, particular in evidence problem, for example, our present criminal procedure law does not include the electronic records, but the law circle has to research on computer data because the electronic record or information can be used as evidence in many circumstances

    計算機犯罪現象的現對我國現行的刑事訴訟法了新的課題,突表現在問題上。如,我國刑事訴訟法中列舉的類型未包括電磁記錄,法學界需要探討計算機存儲的數資料,各種電磁記錄或電磁化的信息在何種條件下可以
  15. In this thesis, the emphasis is the design of the solftware interface and function, the analysis of the tested result of improvement platform, and the contrast of the old platform and the new platform, which can be looked on as a new reference of the new developing direction of hydraulic experimentation

    對改造后的實驗臺測試數進行了定性分析,並驗了有關液壓操和控制的新的思路和途徑;對改造前後實驗臺的性能進行了對比和分析,液壓教學實驗的發展方向供了參考。
  16. Because of the disadvantages in logic, explanation and ideology, the nature of evidence system can not works well in judicial practice. on the other hand, the competence of evidence rules has many advantages in act field, flexibility and ideology, which make the substitution of the former possible

    但是,由於在邏輯上、內涵上以及所代表的思維定式上存在著許多的問題,的屬性制度難以在實踐中發揮實際用,而能力制度則在用的范圍、靈活性和思維方式等方面顯示明顯的優勢,這能力制度代替屬性制度供了可能。
  17. In the first chapter in this dissertation, the possibility and certainty of traditional letter of credit electronicsization have been discussed. in the second chapter, first of all simply introduced the model that electronic letter of credit preceeds. then according to this model, put forward the probably existing safe trouble : the systematic reliability ; secrecy and completeness of data telecommunications ; the social status authenticity of business person and the nature that business action cannot be denied ; the legal effectiveness of the data telecommunications as evidence

    本文第一章論述了傳統信用電子化的可能性與必然性;第二章首先簡單介紹了現在國際上電子信用運做的模式,然後根此運做模式可能存在的安全隱患;系統的可靠性;數電訊的機密性和完整性;交易者身份的真實性及交易行的不可抵賴性;數電訊的合法有效性。
  18. The 1998 nobel prize was shared with two other american scientists, prof. robert f. furchgott and prof. louis j. ignarro, who also contributed to the early evidence that no is a normal biological regulator of blood vessels

    一種訊息分子方面獲頒一九九八年的諾貝爾生理學及醫學獎。他與兩位初步明氧化氮是正常的血管生物調控者的美國科學家? ?羅拔
  19. In mitigation, counsel submit evidence of his client ' s work for charity

    獲減刑,律師了他的委託人慈善機構所做工
  20. What miranda says is that the warning is necessary if the police interrogate a suspect in custody and want to offer something the suspect says into evidence at trial

    米蘭達警告所說的是,警官詢問關押中的嫌疑犯並想將嫌疑犯的供述時才有必要有必要米蘭達警告。
分享友人