漏入 的英文怎麼說

中文拼音 [lóu]
漏入 英文
inleakage
  • : Ⅰ動詞1 (從孔或縫中滴下、透出或掉出) leak; drip 2 (泄漏) divulge; disclose; leak 3 (遺漏) le...
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  1. Based on the frequent occurrence of international aerial crimes, the rampancy and cruelty of criminals and the reality of brutal consequence, the essay analyses the features of the crime of aircraft hijacking, the crime of imperiling international civil aerial security and the crime of obstructing international aerial navigation with the component terms from three important international conventions on punishing aerial crimes in order to help people to appreciate the appearance and the essence of typical international aerial crimes deeply, to regard the motion of the crimes and to overwhelm the offence forcefully. based on the core of the legislative status of international civil aerial security, the jurisdiction of the aerial crimes, one emphasis of the article is to clarify concrete clauses on jurisdiction in the three conventions and analyses the important principle of " aut reddere, aut punire ". based on the problems on the jurisdiction of crimes in international society, it quests the implementation of t he principles of jurisdiction, pleading and extradition in the three conventions deeply

    基於目前國際社會航空犯罪時有發生,犯罪分子猖獗狠毒,危害後果十分殘重的現實,本文從國際社會關于懲治航空犯罪的三個重要國際公約(東京、海牙、蒙特利爾公約)中規定的各種航空犯罪的定義手,深展開了對劫持航空器罪、危害航空器飛行安全罪、危害國際民用航空機場安全罪的犯罪特徵及其構成條件的分析,以期幫助人們更深刻認識這些典型的國際航空犯罪的表現及其實質,嚴密注視這些犯罪的動向,對其進行及時有力的打擊;鑒于國際民用航空安全法律地位問題的核心是解決航空犯罪的管轄權問題,本文重點闡釋了三個公約關于管轄的具體規定,並側重分析了「或引渡或起訴」的重要原則;鑒于目前國際社會打擊國際航空犯罪管轄方面存在諸多實際問題,本文對公約規定的管轄、起訴、引渡原則的實現方式作了深探討;鑒于各國在國內立法上對于空中犯罪的懲治、對違約國的制裁、對這類犯罪的預防措施等方面存在一些洞,本文根據目前掌握的一些資料,在獨立思考的基礎上,提出了一些不成熟的看法及建議,以期對國際社會懲治航空犯罪貢獻自己微薄之力。
  2. It is an important part of modern enterprise management, and is the core of the construction enterprises. in order to survive in intensive competition, some construction enterprises establish a more apposite cost system called target cost management ( tcm ) for cost control

    但從實行目標成本管理的效果來看,仍然存在著許多疏和弊端,因此有必要對目標成本管理模式、步驟、環節及方法進行更為深、細致地探討。
  3. The crankcaseventilation system, using a road-draft tube, vented the crankcase vapors and blow-by gas into the atmosphere.

    採用行車抽吸管的曲軸箱通風系統,給曲軸箱內的蒸氣和竄氣體排大氣提供了出口。
  4. Air leakage to the float bowl could result in imbalance of the carburetor.

    空氣漏入浮子室中,會使化油器不穩定。
  5. For the years of assessment 199495 to 199697, the company omitted from the profits tax returns, which were submitted to the ird, the proceeds from the sales in respect of all those cash sales invoices with serial numbers bearing no alphabetic prefix

    該公司在其遞交給稅務局的199495至199697課稅年度利得稅報稅表內,報所有其得自編號前沒有字母的現沽單的銷售收,涉及的數額約為625萬元。
  6. For the years of assessment 1994 95 to 1996 97, the company omitted from the profits tax returns, which were submitted to the ird, the proceeds from the sales in respect of all those cash sales invoices with serial numbers bearing no alphabetic prefix. the amount of omitted sales involved was about 6. 25 million

    該公司在其遞交給稅務局的1994 95至1996 97課稅年度利得稅報稅表內,報所有其得自編號前沒有字母的現沽單的銷售收,涉及的數額約為625萬元。
  7. If funds should be collected level by level before the competent department hands them over to the central treasury at last, the ministry of finance shall supervise the handing over and the financial supervisor ' s office stationed by the ministry of finance in the place shall inspect the collecting and handing over of funds

    各級財政部門要進一步建立和完善有關收的繳庫(含財政預算外資金專戶)制度、繳庫單分送制度,認真履行監督、檢查職責,根據公、檢、法、工商部門行政性收費和罰沒收的執收、執罰和解繳情況,加強催繳和監繳,並建立稽查機制,堵塞洞,做到應收盡收。
  8. Some think of cosmic string. then they soon realize that this will require the total energy from the universe to construct the time machine out of cosmic string and hence is also impossible. that leads to the suggestion by many scientists of the not - yet - proven " chronology protection conjecture ", which says that the laws of physics do not allow time machines to the past

    在科普刊物中,我們間中便會聽說有科學家提出回到過去的方法,但經詳細研究后發現,所有這些方法都有很大的洞,例如有人曾經提出利用黑洞的近親蟲洞作為時光機,但這時光機只是單向:只能進不能離開又有人曾利用宇宙弦作回到過去的工具,后來卻發現需要全宇宙的能量才能建造那時光機,所以也是不可行的。
  9. Network security techniques include router filter, firewalls, intrusion detection, audit, counteroffensive and etc. in these techniques, router filter and firewalls are static security techniques, and others are dynamic security techniques

    目前網路安全技術包括路由器、防火墻、洞防堵、侵檢測、審計和反攻擊等,其中路由器過濾、防火墻、洞防堵屬于靜態安全技術,而侵檢測、審計和反攻擊等屬于動態防護。
  10. Inflate the cuff of the endotracheal tube to check for leaks

    氣體使套囊膨脹,以此來檢查套囊是否氣。
  11. Without a guarantee on the integrity and identity of shared content, a p2p application runs the risk of introducing so many security holes that microsoft outlook - never a good example of security - will look like fort knox by comparison

    沒有對共享內容的完整性和同一性的保證,一個p2p應用就會冒引許多安全洞的風險,以至於microsoft outlook從來不是一個安全的好示例相比之下就會像fort knox一樣。
  12. This kind of investigations have acquired some accomplishments at present, but much of these accomplishments were limited to resolve certain frondose application using certain fixed network model and were far from satisfying the minimizing forecasting faults demands of ids improving. the purpose of this theme is to establish a multi - net - model and make it generally applicable during the arithmetic realization process to content all application demands and thus minimize forecasting faults in the end of this article applying the advanced bp network to the es in ids minimized the false forecasting, further more it discussed the process of using visual c + + to realize these networks

    目前,這方面的研究已有了部分成果,但大多隻局限於應用一種固定的網路模型來解決某一具體的應用,還遠遠不能滿足侵檢測報和誤報率高的問題,本文的研究目的就是要建立一種靈活的網路模型,並在演算法實現過程中使其具有通用性,以滿足各種應用的需要,尤其是使侵檢測的報率和誤報率趨于最小化。
  13. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    侵檢測具有監視分析用戶和系統的行為、審計系統配置和洞、評估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
  14. Cli catv leakage and ingress

    有線電視泄與竄
  15. We can see that the flow has both leakages from it and injection into it.

    我們就可以看到,這個流量既有出的又有注的。
  16. We can see that the flow has both leakages from it and injections into it.

    我們就可以看到,這個流量是既有出的又有注的。
  17. The main way rogue programs get into a system is by exploiting security holes in the operating system

    惡意的程序進系統的主要方法是利用操作系統的安全性洞。
  18. Omission or understatement of income or profits

    報或少報息或利潤
  19. Due to the size of the defect, a fragment of bone is introduced to support the mucosal graft. strength of the repair is verified by increasing intercranial pressure with the valsalva maneuver, and it is seen to be watertight. rapid - setting fibrin glue is applied, and a second layer of mucosa is applied over this

    由於瘺孔較大,置一些骨的碎片以支持填塞物,通過valsalva法咽鼓管吹氣法增加顱內壓可以觀察修補的牢固性,可以看到沒有泄,利用可以快速固定的纖維蛋白膠進行固定,其上鋪上一層粘膜,然後再用膠水進行固定。
  20. We assume that the cables are perfectly insulated and that there is no loss of current to the ground.

    我們假定導線是完全絕緣的,沒有絲毫電流漏入地下。
分享友人