核實程序 的英文怎麼說

中文拼音 [shíchéng]
核實程序 英文
procedure of verification
  • : 核構詞成分。
  • : Ⅰ形容詞1 (內部完全填滿 沒有空隙) solid 2 (真實; 實在) true; real; honest Ⅱ名詞1 (實際; 事實...
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • 核實 : verify; check
  • 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
  1. View from the economic, political and social backgrounds of present stage, the condition to abolish death penalty is far from being mature, but the system of death penalty in our country is born several defects, so we should strictly restrict the object and accusal that applied to death penalty through legislation and justice, demolish the procedure for judicial review of death penalty, carry out the system of the third instance as the final and add the institution of pardon

    從我國現階段的經濟、政治與人文背景看,廢除死刑的條件尚不成熟,但我國的死刑制度存在不少缺陷,應從立法與司法上對死刑適用的對象,適用的罪名,加以嚴格限制,取消死刑復,對死刑案件行三審終審制度,增設死刑赦免制度。
  2. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:心層的ndis網路驅動、應用層的動態鏈接庫以及用戶應用,這三個模塊之間通過內存共享技術完成對控管規則、封裝數據、網上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管規則現了對網路封包的認證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  3. After that, the process of porting linux to the s3c44b0 is discussed, including building the cross complier, writing the starting code, modifying and configuring of the kernel and realizing the root system

    之後本文詳細介紹了系統現的必要工作,包括交叉編譯環境的建立、啟動現、內的裁剪與移植以及根文件系統的現。
  4. The substantial core sovereignty is supreme while the formalist non - core sovereignty, i. e. the concrete sovereignty power keeps pace with the times

    質性的心主權是至高無上的,而性的非心主權,即具體主權權力是合時代發展的。
  5. Following the verification process, a verification statement or validation statement or assurance statement is produced

    完成核實程序后,必須製作一份聲明或認證聲明或保證聲明。
  6. The sfaa may adjust the level of assistance granted, if necessary, according to the findings of the home visits

    本處會進行核實程序,包括家訪,並會根據調查結果,調整申請人的資助幅度。
  7. Improve the quality of your epr by benchmarking, and assure its credibility by independent verification

    採用評標準,藉此改善環保工作報告的質素,並透過獨立核實程序保證報告內容真可信
  8. Tip 9 - improve the quality of your epr by benchmarking, and assure its credibility by independent verification

    要訣9 -採用評標準,藉此改善環保工作報告的質素,並透過獨立核實程序保證報告內容真可信
  9. To ensure that the verification process conducted for your epr is credible, systematic and of good quality, your department bureau can make use of the

    來規劃監察和評估核實程序,確保核實程序可信有系統而且完善。
  10. A verification statement, sometimes called validation statement, is produced at the end of the exercise and is included at the end of the epr

    核實程序完成後,必須製作一份聲明或認證聲明或保證聲明,于環保工作報告最後頁登載。
  11. The aa1000 assurance standard prepared by accountability provides guidance on how to implement an independent, credible and systematic verification process

    Aa1000 assurance standard乃accountability制定如何推行獨立可信而有系統核實程序的指引。
  12. A service charge of 130 is payable for each subscriber application, where the applicant has requested to complete the identity verification process for the purpose of handing over the pin mailer at a special location nominated by the subscriber and this location is outside the digi - sign offices

    若申請人另外申請加密證書,則需額外支付每一張加密證書港幣30若申請人要求在電證服務辦事處以外地方完成身份核實程序,及送交密碼封函,需就每次申請繳交港幣130 。
  13. Reporting organizations are encouraged to make use of the aa1000 assurance standard i. e. a standard developed by accountability that provides guidance on implementing a credible, systematic verification process to assess, plan, describe and oversee the implementation of the verification process for their eprs

    報告機構可採用aa1000 assurance standard即accountability制定的一套標準,指引如何推行可信而有系統的核實程序,以評估計劃說明及監管環保工作報告的核實程序
  14. The verification process also involves assessing the quality of the epr, particularly in terms of appropriateness of the report s scope, comprehensiveness and relevance of the issues covered, openness in disclosing information, addressing controversial issues and maintaining stakeholder dialogue, effectiveness in performance measurement, assessment and improvement, as well as vision and commitment of the reporting organization

    核實程序亦包括評估環保工作報告的質素其中特別關乎報告內容的范疇全面性和相關性披露資料的公開性回應爭議性事項及與利益相關人士保持聯系表現計算評估和改進的成效,以及報告機構的理想和承諾。
  15. A " matching procedure " is a procedure whereby one set of personal data collected in respect of 10 or more individuals for one or more purposes are compared or verified, by automated means, against another set of personal data collected for a different purpose for the purpose of taking adverse action against any of the individuals

    所謂,是以自動化方法去比較兩套個人資料,每套涉及至少十位人士而兩套資料收集時各有不同目的。這的主旨是個人資料,而的結果可用來對資料當事人採取不利於他的行動。
  16. First of all, this paper introduces the whole design project and interrelated knowledge about non - destructive detection, ultrasonic detection, and phased - array ultrasonic detection then the paper depicts the principle of phased - array focus and abstracts a set of math model and feasible arithmetic on the base of the real parameter of the system. put forward several problems that exist during the course of system development and program. introduce some measures of distinguish that are often used in non - destructive detecting and echo wave crest

    然後在文中以較大的篇幅,描述了相控陣聚焦的原理,並根據該系統的際參數,抽象出一套數學模型和可行的演算法,在此基礎上提出了在系統開發過及編現過中存在的一些問題;介紹了在無損檢測中缺陷的分類和對回波峰常用的識別方法,詳述了系統開發過中使用的其中一種識別方法,即判別是否存在缺陷的演算法,並給出現之的部分;詳述主控如何控制各部分並協調各相關軟體的工作,使整個系統發揮最高效能,並給出主要設計框圖和
  17. Their execution cycles are compared with each other. and the results show that the dpc has prior advantages to the c64 dsp, which, indirectly but effectively, prove that our memory system works very well

    最後,本文使用常見的多媒體對採用多層次存儲系統的dpc以及ti的c64dsp進行了比較測試,結果表明dpc系統性能優于c64dsp ,從另一個側面證了dpc存儲系統的性能。
  18. Whether there is any practicable alternative to the matching procedure

    有關的是否有切可行的交替性措施。
  19. Our verification procedures comprised a review of the report, selection of a representative sample of statements and data and interviews with representatives from archsd

    核實程序包括審該報告的內容、抽查具代表性的報表和數據,及與建築署所有分處的代表人員會面。
  20. The privacy commissioner for personal data is responsible for monitoring and supervising compliance with the provisions of the pd ( p ) o. this is done through a variety of means including the investigation of complaints, the inspection of personal data systems, the issuing of codes of practice, the review of legislation, the approval of matching procedures, the conducting of personal data privacy surveys, publicity campaigns, and international liaison

    具體而言,個人資料私隱專員的職責計有:對個人資料私隱有關的投訴進行調查、視察機構的個人資料系統、發出務守則、檢討相關法例、的申請、進行個人資料私隱意見調查,推行保障私隱的推廣活動,以及與海外擔任類似資料保障職能的人士保持聯絡。
分享友人