概念完整性 的英文怎麼說

中文拼音 [gàiniànwánzhěngxìng]
概念完整性 英文
conceptual integrity
  • : Ⅰ名詞1 (大略) general outline 2 (神氣) manner of carrying and conducting oneself; deportment ...
  • : Ⅰ動詞1 (看著文字發出聲音; 讀) read aloud 2 (上學) study; attend school 3 (想念; 考慮) think...
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 概念 : concept; conception; notion; idea
  • 完整性 : integrity; integrality; wholeness; completeness; perfection
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠、交易者身份的真實、數據電訊的機密、數據電訊的合法有效以及交易者行為的不可抵賴。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴
  2. In regard to product, it is with the traditional cut flowers, stem the flower compare the body now of is a kind of all new and special flower to appreciate, implantation concept, the product emphasizes what the whole development process of the flower bring people that joy and achieves feeling more, outstanding the flower is been embryonic by the seed and grow up gradually to bloom, result a kind of life contain hope and people to fine life of look forward to and pursue, come to an implantation concept and appreciate result thus of perfect combine. in the meantime, the structure and the features design of the product also body the contriver doesn t have mental strategy now : agile, convenience, environmental protection, make it attain real pocketsized result because of controling the plant physical volume, the full body was now the characteristic of the pet flower

    就產品本身而言,它與傳統的切花乾花相比所體現的是一種全新獨特的花卉觀賞培植,產品更加強調花卉的個培養過程所給人們帶來的那份喜悅與成就感,突出了花卉由種子萌芽漸漸成長到開花結果所蘊涵的一種人生希望與人們對美好生活的嚮往與追求,從而達到了培植與觀賞效果的美結合。同時,產品的結構及外型設計也體現發明者的別具匠心:輕巧方便環保,由於控制了植株體積,使其達到真正的袖珍效果,充分體現了寵物花卉的特
  3. The definitions of intrinsical linear nonholonomic constrain and intrinsical nonlinear nonholonomic constrain are put forward in this paper. the nonholonomic systems are divided into intrinsical linear nonholonomic system and intrinsical nonlinear nonholonomic system

    本文首次提出了本質線約束和本質非線約束的,並將非系統區分為本質線和本質非線兩種不同的情況。
  4. A conceptual approach including measurements of materials at rest ( step 1 ), measurements using a large rotating drum ( step 2 ) or a particle - flec ( step 2 ) and measurements at a workplace ( step 4 ) has been used to characterize the release of microbial components ( bacteria, fungi, actinomycetes, endotoxin or enzymes ) and particles from straw, wood chips or fungal cultures of different ages on gypsum boards

    一套的方法,包括物質在靜止時(步驟一) 、使用大轉動滾筒時(步驟二)或微粒逸散時(步驟二) ,和工作場所(步驟四)進行量測,以描述由麥稈、木頭碎片或不同年份的石膏板上的真菌菌落所釋放的微生物組成(細菌、真菌、放線菌、內毒素或酵素)和微粒特
  5. To achieve conceptual integrity, deemphasize control mechanisms in favor of

    要獲得上的,請降低控制機制的重要,這有利於:
  6. The first chapter surveys the state - of - the - art of intrusion detection and the related problems. the second chapter provides the details of intrusion detection techniques, in particularly, it introduces two concepts ( network - based ids ( nids ) and host - based ids ( hids ) ), and the distributed ids. besides, this chapter proposes three intrusion detection methods ( misuse detection, anomaly detection and integrality test ), and discusses the applications of the artificial neural network technology 、 expert system technology 、 and pattern reasoning technology in the ids

    第二章討論入侵檢測技術基礎,介紹了基於網路的入侵檢測系統( ndis )和基於主機的入侵檢測系統( hdis )的,對分散式入侵檢測系統也進行了相關介紹;討論了三種入侵檢測辦法,包括誤用檢測( misusedetection ) 、異常檢測( anomalydetection )和檢測,介紹了人工神經網路技術、專家系統技術以及模式推理技術在ids中的應用。
  7. Three - dimensionally braided structural composites have distinct structure that is fully integrated, continuously spatial fiber - network impregnated with ductile material. the new innovative materials have not plies as conventional composites have, and put an end once and all to low interlaminar strength showing in laminate materials. because of their enhanced stiffness and strength in the thickness direction, near - net - shape design and manufacturing, superior damage tolerance and specified aerospace function, the braided composites are gaining more and more attention of industry and academia

    三維編織結構復合材料是體、連續、多向的紡線(纖維束)的網路,充填以延材料,這類新材料已失去通常復合材料的層合板,由此,層合板復合材料層間脆弱的致命弱點在編織結構復合材料中得到克服,所以編織結構復合材料具有高的強度和剛度(包括在厚度方向) ,接近實際形狀的製造,高的沖擊韌、高的損傷阻抗,和按實際設計要求的特定的航空航天方面的使用功能,因而廣泛地受到工業界和學術界的關注。
  8. In this thesis, some work has been done : fisrtly, based on the thorough investigation of the mechanism project, combining concept diagram, the literal description and the formula analysis together for programing motion of the robot ; secondly, according to soil mechanics principle and pressuremeter theories, the model which reflect the interaction force between robot and soil are founded ; thirdly, proceed the analysis and solution ; using virtual prototyping software - adams to optimize the mechanism model and analyze the mechanics ; furthermore compared the analysis calculation result of the above both side, we verify the possibility that the robot dig hole and move in soil ; finally, construction model is consummated based on the optimized result, the mechanism motion and the simulation animation of whole harmonious motion is fulfilled by three dimension simulation software - 3dmax

    論文的主要工作有:首先,在對機構方案進行了深入研究的基礎上,以圖標表示、文字描述和公式分析相結合的研究方法對機器人進行了運動規劃;其次,根據土力學原理和旁壓理論建立了機器人在土質環境下的受力模型並進行了分析求解;然後,藉助于虛擬樣機軟體adams對機構模型進行優化和力學分析;除此之外,通過對上述兩方面分析計算結果的比較,驗證了該機器人在土質環境下拱洞和蠕動爬行的可行;最後,在優化結果基礎上進一步善了結構模型,通過三維模擬軟體3dmax實現了機構運動和體協調運動動畫的模擬。
  9. The legislation in all over the world nations and the original of priority right has important reference meanings for our legislation. the author thought the priority right should stipulate in the part of the real right of pledge in the real law. it provides full reason for the legislation in the article

    本文從我國優先權的立法現狀入手,分析了我國建立優先權制度的必要,同時還考察了其他國家和地區優先權的立法例,結合我國實際,提出將優先權在基本法和特別法分別規定的立法構想,這樣既不對現有特別優先權的立法造成較大程度的破壞,亦可在基本法中對優先權制度的質等予以詳盡規范,為我國優先權制度的構建提供了較為的理論體系。
  10. The author points that the rule of law in ordinary sense is the rule of formal rational law, complete conception of the rule of law not only contains corresponding " formality " but also corresponding " substance ". it is deficient to divide the conception of the rule of law in " formal " and " substantive " conceptions of the rule of law

    通過分析眾多學者對法治問題的論述,認為我們通常所稱的「法治」 -實際是指形式理法之治,的「法治」既包括相應的「形式」又包括相應的「實質」 ,將「法治」劃分成形式法治與實質法治不夠妥當, 「實質法治」這一提法本身是有問題的。
  11. After reviewing the emergence and development of critical medical anthropology, which has gradually taken shape and assumed significant st8tus in social studies since 1970s, and elaborating its kernel concept under its theoretic system, this paper points out that, within the anthropological framework it ' s of great significance to solve the problems existing in the current medical system with a critical view, and that against the political and economical globalization nowadays, the establishment of a complete system of pluralized cultural criticism will help us better understand medical treatment and medicare

    摘要回顧20世紀70年代以來逐步形成,並在現實社會問題研究中越來越彰顯重要的批判醫學人類學的產生和發展,並解釋了在批判醫學人類學理論體系下的其核心,指出:在人類學的框架內,用批判的眼光解決醫療體制中所存在的問題是非常有意義的;在政治經濟發展全球化的今天,致力於建立一個多元文化批判的體系可以促使人們更深刻地了解醫療和醫療護理。
  12. On - line monitoring of hvcb is the precondition of predicting maintenance, is the key element of reliable run, and is the important supplement to the traditional off - line preventive maintenance in fact, the faults are made by hvcb, no matter in number or in times, is over 60 % of total faults so it has determinative importance for improving the reliability of power supply and this can greatly decrease the capital waste used by - dating overhaul in this paper, the inspecting way of hvcb mechanism characteristic is discussed the concept of sub - circuit protector is presented, the scheme that we offered has been combined with sub - circuit integrality monitoring theory, to ensure that it has the two functions as a whole according the shut - off times at rated short circuit given by hvcb manufacturer, the electricity longevity loss can be calculated in each operation, and the remained longevity can be forecast too an indirect way for calculating main touch ' s temperature by using breaker shell temperature, air circumference temperature and breaker ' s heat resistance is improved in this paper, and main touch resistance can be calculated if providing the load current msp430, a new single chip microcomputer made by ti company, is engaged to develop the hardware system of the on - line monitoring device, and special problem brought by the lower supply voltage range of this chip is considered fully

    高壓斷路器所造成的事故無論是在次數,還是在事故所造成的停電時間上都占據總量60以上。因此,及時了解斷路器的工作狀態對提高供電可靠有決定意義;並可以大大減少盲目定期檢修帶來的資金浪費。本文論述了斷路器機械特參數監測方法;提出了二次迴路保護器的,並將跳、合閘線圈監視和二次迴路保護結合起來,給出具有監視功能的二次迴路保護器實現方案;根據斷路器生產廠家提供的斷路器額定短路電流分斷次數,計算每次分閘對應的觸頭電壽命損耗,預測觸頭電壽命;提出根據斷路器殼體溫度和斷路器周圍空氣溫度結合斷路器熱阻來計算斷路器主觸頭穩態溫升的方法,並根據此時的負荷電流間接計算主觸頭迴路的電阻;在硬體電路設計上,採用美國ti公司最新推出的一種功能強大的單片機msp430 ,並充分考慮該晶元的適用電壓范圍給設計帶來的特殊問題;在通信模塊的設計中,解決了不同工作電壓晶元之間的介面問題,並給出了直接聯接的接線方案。
  13. The concept of safety integrity level ( sil ), safety lifecycle, the qualitative and quantitative methods of the safety integrity level selection, and how to determine the required sil are discussed

    摘要討論安全水平的、安全生命周期、安全水平選擇的定、定量方法,介紹如何遵照功能安全的國際標準進行安全水平選擇。
  14. Topics include : relational databases, sql ( structured query language ) ; types, relations, relational algebra, integrity, view ; functional dependency theory, normalization, semantic modeling, entity - relationship modeling, conceptual database design ; concurrency control, security ; database and web connectivity, xml

    主題包括:關聯式資料庫、 sql (結構查詢語言) ;資料類型、關聯、關聯式代數、、景觀表;功能依附理論、正規化、語義塑模、實體關聯塑模、資料庫設計;同時操作控制、安全;資料庫與網頁連結、 xml (可擴展標示語言) 。
  15. The thesis breaks through the limitation of the conception of the productivity on researching the social economy state of marxism, demonstrates that marx ' s conception of research the social economy with the aspect of the method of productivity, and proclaim the materialism and the practices in the theoiy ; and the thesis breaks through the monospecific research of the historical formation on the connotation of the theory of social economy state of marxism ; and the thesis managed to study the marxism with integrated analysis on the historical view and the constitute of the theoiy, and also shows that the marxism is scientific and completed ; the thesis breaks through the monospecificity research and analyzed the layer level of the marxism and shows the adaptation and the copiosity of the theory

    二、突破了把馬克思社會經濟形態拘於生產關系的研究局限,論證了馬克思從生產方式即生產力與生產關系的對立統一的層面闡述社會經濟形態的思想,也由此表明馬克思這一理論的唯物、實踐;突破了對馬克思社會經濟形態理論內涵進行單一的歷史發展過程的研究局限,從社會經濟形態的縱向歷史和橫向構成兩個角度的綜合分析上來理解和把握馬克思的思想,也由此表明馬克思這一理論的科學;突破了單一的層面的研究局限,創新地分析了馬克思關于社會經濟形態的層次論,也由此表明馬克思這一理論的豐富、適應
  16. The system designed the security, the data integrality, the feasibility of verifying, the simplicity of operation. i applied the concept of advanced role controls, regulated easily

    系統在安全、數武漢理工大學碩士學位論文據、校驗可行、操作簡便等方面進行了詳細的設計,在權限控制上採用了先進的角色控制,更易於管理。
  17. My article integrated the characteristic of the present relay protective settings calculation on the basis of comprehensive analysis with the present technology and management system, introducing the adaptive concept. its purpose is that the relay protective settings of all the components or lines in the network can uphold protective integrality following the change no matter however the network changes. after programming an integrated relay protective settings calculation and management system for power plant, the validity and practicability of adaptive relay protective settings theory is proved

    本文結合目前繼電保護定值定的特點,在對現有技術進行廣泛分析的基礎上,在繼電保護定值計算和管理中引入了自適應的,它的目的是無論電力網路如何的發生變化,網路里所有元件(線路)的繼電保護定值等能通過計算和管理適應這種變化而保持系統內保護的
  18. Author intruduced the conception of trigger and its application in manufacture manage system, one is to enduce the hository data, logged all the modifing process of inportant tables, so we can know who modified the data in which time, the other is to maintain the consistency and integrity of correlation tables

    介紹了觸發器的及其在生產管理系統的中的主要應用,一是實現歷史數據的導出,記錄了系統對重要庫表的所有修改過程,從而在發生數據錯誤時可追溯到責任人;二是實現相關庫表的一致維護,保證數據的
  19. The way to build a soa with high conceptual integrity is to have excellent information flows from the customer to the development team, and between the upstream and downstream processes of the development team

    構建在上具有高度的soa的方法是從客戶到開發團隊以及開發團隊的上游流程和下游流程之間都有良好的信息流。
  20. Abstract : the paper proposes the notion of the complete configuration of unidirectional actuator system to evaluate the control capability of the actuator system and ascribe it to the existence of positive solutions of linear equations. several characteristics and the schemes to determine the completeness are also provided

    文摘:提出了配置,用來表徵單向執行器系統控製作用的生成能力.並且將配置歸結為線方程組正解的存在問題,給出了配置矩陣的若干質和判別條件及其相應的判別步驟
分享友人