正式檢查 的英文怎麼說

中文拼音 [zhēngshìjiǎnzhā]
正式檢查 英文
formal inspection
  • : 正名詞(正月) the first month of the lunar year; the first moon
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
  • : 查名詞1. [植物學] (山查) hawthorn; haw2. (姓氏) a surname
  • 正式 : formal; official; regular
  • 檢查 : 1 (用心查看) check up; inspect; examine; censor; survey rummage; review; jerque; docimasia 2 (...
  1. 2. practical meteorology : making weather observations ; encoding and decoding of codes in normal use ; manual and computerized plotting of weather charts ; preparation and dissemination of weather bulletins by microcomputers ; principles and exposure requirements of meteorological instruments ; simple fault detection and adjustment of instruments and autographic recorders ; upper - air sounding ; wmo and aftn aeronautical fixed telecommunications network message formats and telecommunications procedures ; handling telephone enquiries

    2 .實用氣象學:天氣觀測編制與翻譯常用電碼以人手及電腦繪畫天氣圖使用微型電腦編排及傳送天氣報告氣象儀器原理及安裝條件儀器及自動記錄器的簡單故障與校高空探測,世界氣象組織及航空專用電信網電報格及電信程序接聽電話詢問。
  2. The park will take enclosed type of management and open service to ingoing enterprises and prohibit any institution or individual inspecting, appraising and charging to the enterprise with any excuses in order to keep the enterprises operate normally

    工業園對入園企業實行「封閉管理、開放服務」 ,杜絕任何機構及個人以任何借口對企業進行、評比、收費等活動,保證企業常的生產經營。
  3. A common mistake and its harm in ct secondary connection of transformer differential protection were analyzed, the correct connection mode was explaned, and how to use the hexagon vector diagram of checking was introduced

    摘要分析了一種常見的變壓器縱差保護電流互感器錯誤接線及其危害,說明了確接線方,並介紹了如何通過作六角圖來縱差保護二次接線的誤。
  4. The paper introduces the origin, development of system of plea bargaining and functions of inquisitor, counsel for the defense, discusses the rationality and limitation of the system, puts forward the applying range of plea bargaining, judge ' s force in normal checkup and affirm the plea bargaining contract, the elementary assuming that counsel and the victim should take part in the plea bargaining

    文章介紹了辯訴交易制度的淵源、發展以及察官、辯護律師、法官在辯訴交易中的作用,探討了辯訴交易制度的合理性和缺陷,提出我國若引進辯訴交易制度應限定適用辯訴交易的案件范圍、法官並確認辯訴協議的效力、辯護律師和被害人應參與辯訴交易的初步設想。
  5. After the users input control tasks in three modes : natural language, electric sheet or flow char, the computer will receive the information of control demands by data mining and knowledge discovery. and then illation is leaded to select the hardware and program the software in the inner of the computer. afterward, control program is transformed in the file format of exiting simulation software by using the simulation interface and is opened in the simulation software

    用戶只需在pc機上以自然語言或繪制控制流程圖、填寫表格的方輸入控制任務,然後在系統內部經過數據挖掘和知識發現分析得到可用控制要求信息,並自動引導推理求解過程進行硬體選型和生成相應的控製程序,最後利用模擬介面,自動將控製程序轉化為現有的控制模擬軟體的文件格,並在控制模擬軟體中,從而用戶可以對生成的控制系統進行模擬,設計的確性。
  6. Usually there is a certain interval between the investigating & prosecuting apparatus instituting a proceeding and the court formally holding a hearing in public prosecution case. during the interval the judge will conduct a series of judicial action, that is to examine the complaint case to decide if it is necessary to open a hearing and also make procedural preparation for the hearing, this procedure is called pre - court examination procedure of public prosecution case

    公訴案件從察機關提起公訴到法院開庭審判之間,通常有一定時間間隔,在此期間,法官一般要進行一系列訴訟活動,主要是對起訴案件進行審,決定是否開庭審判及為開庭審判做程序上的準備,這種程序,稱為公訴案件的庭前審程序。
  7. A full inspection in accordance with paragraph 1 of this standard shall be carried out prior to expiry of the interim certificate to enable issue of the full - term maritime labour certificate

    在臨時證書到期前,應根據本標準第1款進行全面,以便簽發的海事勞工證書。
  8. In response to enquiries by the public on whether the west rail could be opened ahead of schedule, kcrc made some initial response on possible opening dates, and pointed out that a firm opening date would not be fixed until the trial operation and statutory inspections are satisfactorily completed

    九鐵過往曾就公眾對西鐵可否提早通車作出初步回應,表示可能的通車日期,並指出的通車日期必須有待通過圓滿測試及法定,才能予以確定。
  9. Upon registration of such an instrument in the land registry or the relevant new territories land registry, a tenant, purchaser, mortgagee or any other person dealing with the vendor shall not be bound to see or enquire whether the vendor was entitled to determine or rescind this agreement and so far as regards the safety and protection of such tenant, purchaser or mortgagee or any other person, this agreement shall be deemed to have been duly terminated

    在土地注冊處或有關新界土地注冊處注冊該文件后,租客、買主、承押人或任何其他與賣主有交易之人仕無需受約束去視或詢賣主是否有權終止或撤銷本合約,並且關于該類住客、買主或承押人或任何人仕之安全或保護事宜方面,本約須被視為已被終止。
  10. Therefore, the formal semantic study of uml is helpful for the improvement of the clarification, equivalence, consistency, and extendibility of the language, thus offers a powerful theoretical tool for the validity proof, transition of the model and the consistency check of the modeling tools supporting uml

    因此,對uml進行形語義研究,對增進該語言的清晰性、等價性和一致性、可擴展性是十分有幫助的,為模型的確性證明、轉換以及支持uml建模工具的一致性提供了有力的理論工具。
  11. Cschema language has a type system to guarantee the type correctness of the embedded calculation expressions and moreover this type system also generates a security view after type checking a cschema policy

    另外,這個類型系統也為通過的cschema策略產生安全視圖。一個安全視圖是一個沒有包含保護類型的規表達類型。
  12. The ids works by two way, misuse detection and anomaly detection, misuse detection flags an intrusion on intrusion signature, this kind of detecting technic can be realized much more easily, and much more accurate, but it can not find some intrusiones that have been disguised or new kinds of intrusion. the anomaly detection can detect in more wide field, anomaly detection can compare new statistic data with average record, then anomaly record will be found, but it ' s more difficult to set a threshold, if the threshold is too big, some intrusion may be put through, if the threshold is too small, the ids will give more false positive alarm, and the threshold will be different with different people or different period, so the ids just simply show us their suspicious record, the administrator or expert will be in duty to analyze this record and give conclusion, the ids give more alarm than it should, leave us more detection record to analyze, and this is a hard work, we can not distinguish an intrusion or not if we analyze only one record, but we can judge if we find the relation among mass detection evidence. in this article, we try distinguish an intrusion using d - s theory ( proof theory ) instead using manual work, the ids will be more helpful and efficient

    濫用測採用的是特徵測的方法,實現較為簡單,判斷的準確性較高,但是不能判斷一些經過偽裝的入侵或特徵庫中尚未包含的入侵,異常測能夠根據以往記錄的特徵平均值,判斷出異常情況,但是對于異常到什麼程度才視為入侵,這個閥值非常難以確定,閥值設定的太高,有可能漏過真的入侵,如果設定的閥值太低,又會產生較高的誤警率,而且這個閥值因人而異,因時而異,因此現在的入侵測系統把這部分異常記錄以一定的形顯示出來或通知管理人員,交給管理人員去判斷,而這些ids系統難以判斷的記錄,如果對每個證據單獨地進行觀察,可能是難以判斷是否是入侵,而把許多先後證據關聯起來,專家或管理人員根據經驗能夠判斷訪問的合法性,本文試圖引入人工智慧中證據理論的推理策略和示例學習方法,代替人工分析,可以提高效率,降低誤警率,並可以對一個在進行得可疑訪問實現實時測,通過搜索及時判斷,及時阻斷非法訪問,比事後得人工處理更有意義。
  13. I ' m afraid i can ' t, not officially. i haven ' t checked her passport, as it were

    地說,恐怕我不能擔保可以說,我並沒有過她的護照
  14. Checks that the entry matches a pattern defined by a regular expression

    項與則表達定義的模是否匹配。
  15. He had expected that bethune's arrival meant the beginning of an official inquiry into his work.

    他曾以為白求恩的到來意味著正式檢查他的工作。
  16. Types of code review include formal review, peer - based review, and third - party review

    代碼的類型包括正式檢查、基於對等方的以及第三方
  17. A widely distributed software package that supports the formal verification of distributed systems - is an example of temporal logic model checking for hardware verification

    一種支持分散系統的驗證且廣泛發布的軟體包是用於硬體驗證的時態邏輯模型的示例。
  18. A pneumatic tourniquet with a hand pump and an accurate pressure gauge is probably the safest, but a constantly regulated pressure tourniquet is quite satisfactory if it is properly maintained and checked

    具有手動加壓泵及精確氣壓表的充氣止血帶可能是最為安全的,但是只要確保養和,持續調壓止血帶也相當滿意。
  19. Mri scanning, developed in this very building ; the contraceptive pill ; modern infertility treatment ; ultrasound scan for unborn babies ; unlocking the double helix structure of dna ; keyhole surgery ; placing fluoride in the water supply ; the portable defibrillator ; the hepatitis b vaccine ; strained quantum - well lasers which contain the information used in cds, dvds and the internet ; dna fingerprinting. a whole speech could be given that amounted to nothing more than a list of examples

    是在牛津這個地方研究和開發出來的核磁共振掃描、避孕藥、現代不孕癥治療術、胎兒超聲波、解開dna雙螺旋結構之謎、鎖孔外科手術、在供水系統中加氟、便攜心臟除顫器、乙肝疫苗、在cd 、 dvd光盤上存儲信息的應變量子阱激光器、 dna指紋識別技術等。
  20. Sqlj is a convention for embedding those sql statements in java, in a way that allows programming tools to perform translation - time compile - time analysis of sql in java, for syntax checking of sql statements, for type checking to determine that the data exchanged between java and sql have compatible types and proper type conversions, and for schema checking to assure that the sql constructs are well - formed and valid in the database schema where they will be executed

    Sqlj是在java中嵌入這些sql語句的一種約定,它是以某種允許編程工具對java中sql進行編譯時分析的方實現嵌入的,在編譯時會對sql語句進行語法以保證語法的確性,進行類型以確定java和sql之間交換的數據具有兼容的類型和適當的類型轉換,以及進行模以確保sql結構在它們執行時所在的數據庫模中是格良好的、合法的。
分享友人