最後的證人 的英文怎麼說

中文拼音 [zuìhòudezhèngrén]
最後的證人 英文
the last witness
  • : 副詞(表示某種屬性超過所有同類的人或事物) most; best; worst; first; very; least; above all; -est
  • : 4次方是 The fourth power of 2 is direction
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • 最後 : last; final; ultimate
  • 證人 : evidence; rapper; testation; witness
  1. Then he introduced his two star witnesses-the two tiny shells found alongside the body of maude bauer.

    他引進了他兩個主要--在莫德波爾屍體旁邊找到兩顆小彈殼。
  2. This paper takes mobile engineering department equipment management of daqing petrochemical parent company as an example, and studies the design and application of equipment management system of daqing petrochemical parent company, for the implement of computerizing the equipment entire process management with the equipment management system and completing the synthesis management, the records management, the expense management, the fixed asset management, the specialized management and the information management with the computer system and making in the manual management some qualitative and stochastic ingredients transforming into the quantitative standard management. so it guarantees that we can perform advanced predicting management in the entire process of the matter movement and the value movement of equipment and complete the equipment servicing transition from the compulsory servicing and afterwards servicing to the preventive servicing, improving work quality, efficiency and modernized degree which the equipment manages and assisting enterprise ’ s equipment management decision - making and the whole realization of management goal and enhancing the enterprise ’ s interior equipment utilization and realizing its maximum profit

    本文以大慶石化總廠機動工程部設備管理為例,對大慶石化總廠設備管理系統設計與應用進行研究,旨在通過設備管理系統實現設備全過程管理計算機化,由計算機系統來完成設備綜合管理、檔案管理、費用管理、固定資產管理、專業管理及信息管理,使工管理中一些定性、隨機成分轉變為定量規范管理,保大慶石化總廠對設備物質運動和價值運動全過程實行先進可預知性管理,並逐漸將設備維修從目前以強制性維修及事維修為主過渡到以預防性維修為主,提高設備管理工作質量、效率和現代化程度,輔助企業設備管理工作決策及經營管理目標整體實現,提高大慶石化總廠內部設備利用率及實現其經濟效益。
  3. The statement of the last witness controvert the evidence of the first two

    一個陳述反駁了前兩詞。
  4. After all napoleon had said to him, after those outbursts of wrath, and after the last frigidly uttered words, i will not detain you, general ; you shall receive my letter, balashov felt certain that napoleon would not care to see him again, would avoid indeed seeing again the envoy who had been treated by him with contumely, and had been the eyewitness of his undignified outburst of fury. but to his surprise balashov received through duroc an invitation to dine that day at the emperors table. there were present at dinner, bessires, caulaincourt, and berthier

    在拿破崙對他說了那一切之,在那一陣憤怒發泄並在冷冷地說了如下幾句話之: 「 je ne vous retiens plus , gnral , vous recevrez ma lettre 」我不多耽擱您了,將軍,您會接到我給您們皇帝回信譯者,巴拉瑟夫相信,拿破崙不僅不願再看見他,而且還會盡力迴避他一個受侮辱使者,更主要是,他是拿破崙有失體面沖動行為
  5. As a result, the files that documented many of the era ' s darkest deeds, from blackmail to torture to assassination, have remained closed ? and few of the agents and informers whose reports fattened the folders of the services have ever been identified

    ,記錄那個時代黑暗事件文件,從勒索到虐待到暗殺,仍然被封鎖-參與特工和線很少被實,盡管他們報告充實了秘密組織檔案。
  6. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    ,對系統可能受到威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應控制策略:確定用戶權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個隱私等方面;一般性安全防護措施:存取控制、標識和認、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。,對事故處理和事分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體解決方案,為其在配置、管理和應用方面提供了基本框架。
  7. It is demonstrated by simulations that the control method is efficient and the fully cartesian coordinates is practically efficient. then the inverse kinematics of dual free flying space manipulator are mainly discussed in the third chapter, and the jacobean matrix for dual manipulator space robot is derived by fully cartesian coordinates, a control method for space manipulator based on the resolved motion rate control concept is proposed. then, the computer simulation verifies the effectiveness of the algorithm

    首先,分析了閉環雙臂空間機器捕捉目標物體時運動學關系,給出了以完全笛卡爾坐標表示系統運動jacobi關系;然,以此為基礎研究了空間機器雙臂協調操作分解運動速度控制方法和協調操作問題;應用matlab語言對平面雙臂空間機器系統進行了計算機模擬、模擬,模擬運算實了上述方法有效性。
  8. Then he introduced his two star witnesses - the two tiny shells found alongside the body of maude bauer

    他引進了他兩個主要- -在莫德?波爾屍體旁邊找到兩顆小彈殼。
  9. Anna melchior ' s thoughtful book is not a political programme, though it has huge political implications ; it is a well - argued defence of the most important work that mothers engage in : raising happy, well - balanced children on whose adult emotional maturity society depends

    安娜.梅爾基奧爾深思熟慮著作盡管具有重大政治寓意,但它不是一種政治計劃;它很好地論了這樣觀點:母親工作是養育快樂、健全兒童,而社會仰仗于這些兒童長大成感情成熟程度,因而母親工作為重要。
  10. Information communication security, beijing, china, nov. 11 - 14, 1997, pp. 217 - 222. 11 michels m, p horster. on the risk of discruption in several multiparty signature schemes

    ,我們指出chen等提出方案不能抵抗內部攻擊一個根本原因是在實際應用中,不能保所有簽名者操作「同時」 。
  11. Secondly, the mechanism of fatigue is summarized, the factors and measure of driving fatigue is analyzed and then the mechanism of driving fatigue affecting driving safety is studied based on previous study. finally, the experiment of a block design is schemed according to the difference in driving time, using the human factors and experimental psychology theories and instruments. after the experimental data is analyzed, the mechanism of driving fatigue affecting driving safety is tested and the measure of driving fatigue prevention is suggested

    論文以從事公路客運行業營運駕駛員為研究對象,首先通過問卷和訪談方式調查了營運駕駛員實際工作狀況,總結出營運駕駛員群體特徵;然,從理論角度闡述了疲勞產生機理,分析了駕駛疲勞產生原因及測量方法,並在總結前研究成果基礎上進一步分析了駕駛疲勞對行車安全影響機理;,應用機工程學和實驗心理學理論方法和實驗儀器,按駕駛時間不同設計了區組對比實驗方案,通過對實驗數據匯總分析,驗了駕駛疲勞對行車安全影響機理,並提出了預防疲勞駕駛措施和建議。
  12. The woman was " severely disfigured " by a dog bite in may that made it difficult for her to speak and chew, according to a joint statement from the hospital in amiens and another in the southern city of lyon where dubernard works

    如果這一手術明取得了成功可能要經過數月甚至數年才可定論,手術過程會給那些因燒傷意外事故或因其它傷害事件導致外貌嚴重受損們帶來希望。
  13. He added the state s animal husbandry department would organize the test to determine the paternity of the animal. village elders said the cost of the test would be borne by the villager found to be making the false claim of ownership

    安得拉邦動物管理部門將親自出面負責本次檢測工作具體實施,以便終判定該水牛到底與其它哪頭牛具有父子關系,檢測所需全部費用將由那位明並非該水牛主村民來承擔。
  14. This system is used like this : drawing the part in ug, and planning its process, and then getting step - nc file by the function redeveloped, at last converting step - nc file into control code of fanuc system. the result is satisfying

    本系統使用過程是這樣:在ug繪圖軟體繪制出零件圖,並進行工藝規劃,利用二次開發功能輸出step - nc文件,然使用后處理器轉換,得到fanuc系統數控指令,驗step - nc文件正確性,結果是令滿意
  15. The experimental simulation based on orl face database shows that the method proposed by this paper is effective in object recognition

    以orl臉庫為例,明了基於分形鄰距目標圖像識別方法有效性。
  16. There is support for this interpretation antiquity, especially in the final phase, is practically identical with other major forms of expression of the human wollen during the same period

    晚期羅馬藝術文物提供了這一藝術特點產生,尤其在時期,們有意識地表述了自己對主要形式構想。
  17. Dna fingerprinting is increasingly used in india for investigating murder and rape cases and settling paternity disputes. but officials in andhra pradesh say this is the first time they have heard of farmers in the state using dna fingerprinting - which is based on identification by genetic markers - to determine the paternity of a buffalo

    安得拉邦動物管理部門將親自出面負責本次檢測工作具體實施,以便終判定該水牛到底與其它哪頭牛具有父子關系,檢測所需全部費用將由那位明並非該水牛主村民來承擔。
  18. For one human being to love another human being : that is perhaps the most difficult task that has been entrusted to us, the ultimate task, the final test and proof, the work for which all other work is merely preparation

    一個對另一個愛,這可能是我們所相信世界上困難事,終極工程,考驗和明,沒有預習終作品。
  19. History may prove that in dec. 1944, the germans shot their bolt at the battle of the bulge ; after that, their defeat was just a matter of time

    歷史可以明,德國在1944年12月反攻巴爾吉之戰中使出了力量,從那時起,他們失敗只不過是時間問題而已。
  20. The methodology suggested may not guarantee ultimate success, but the eventual pay - off could well be worth the effort. achieving even partial success will benefit mankind and contribute to creating a better world

    提出方法不一定保成功,但結果非常值得付出努力。即使只獲得部分成功也會使類受益,
分享友人