論證方式 的英文怎麼說

中文拼音 [lúnzhèngfāngshì]
論證方式 英文
way of argumentation
  • : 論名詞(記錄孔子及其門徒的言行的「論語」) the analects of confucius
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : Ⅰ名詞1 (方形; 方體) square 2 [數學] (乘方) involution; power 3 (方向) direction 4 (方面) ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 論證 : 1 (論述過程) demonstration; proof 2 (論述並證明) expound and prove [verify]3 (論據) argumen...
  • 方式 : way; fashion; pattern
  1. This article demonstrates the necessity and feasibility of vocality teaching model for the large class combined with the traits of adult vocality teaching and aeries of exploration on practical teaching

    本文結合成人聲樂教學的特點,從必要性和可行性了聲樂集體課教學模,並進行了教學實踐的探索和一系列反思。
  2. Finally, author have discussed the relationship transformation process of the honghe fault shear mode and block movement, proofed that the eta - type tectonic system was formed in miocene epoch

    了紅河斷裂剪切的轉變過程與巖塊運動的關系,了歹字形構造體系形成於約20ma的中新世時期。
  3. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術,對有關法律問題作了述;第七章首先述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定了數據電訊制度產生的必然性;第八章通過對各國立法對電子據的法律效力的規定,述了對電子交易至關重要的數據電訊的不可抵賴性。
  4. On action form of the civil case of securities fraud

    券欺詐民事案件的訴訟
  5. I pointed out the faultiness of his reasoning and emphasised the deficiency of his knowledge.

    我指出他的論證方式是錯誤的,我強調他的知識是欠缺的。
  6. Succeeding with the aforementioned ill - adapted methodologies is a listing of explanatory metaphysical principles including both natural theology and the dialectical theism in deutscher idealismus advocating god as process ; however, both have been proved insufficient as well

    然後再列舉出開上學的說明法,包括自然神學的上帝存在論證方式與講過程上帝觀的德意志觀念;兩者都被評有所不足。
  7. This dissertation tries to make a comparative study of the guaranty liability in theory and practice and elaborates the author ' s own understanding and explanation of five aspects guaranty liability : existence of guaranty liability, nature of guaranty liability, form of guaranty liability and the form of bearing and invalid guarandy liability.

    本文力求從我國擔保法與國外擔保立法的比較,理與司法實踐結合,對保責任成立、保責任性質、保責任范圍、保與保責任承擔和無效保責任等五個面,粗淺地談談本人對保責任的理解與認識。
  8. In a situation that this imported product demand will also be improved further in the following several years, must optimize system this purchase, transport, load and unload, store, dredge competence of link of transporting etc., introduce the advanced idea and method on the materials supplies of expressway construction abroad, adopting more advanced modern material flow thought on the software, the pitch is provided and deliver to constructing ; develop performance excellent keeping the tank wagon warm with low costs on the hardware ; supply the barge special - purpose and in bulkly ; the special - purpose pitch shipping dock stores pot, etc. to equip, thus propose that the transport way in which our country imports the pitch is chosen, and use the economic technological demonstration method to carry on the demonstration of economic technology to these ways, therefore get our country out of and impor t the imagination of transporting way reform of pitch, propose and purchase and concentrate on and melt, transport in bulk to take the whole province or the whole country this supply platform and accord with international advanced transport suggestion of technology in unison

    在未來幾年這一進口產品需求量還將進一步提高的情況下,必須優化這一體系在采購、運輸、裝卸、貯存、疏運等環節的水平,引進國外在高速公路建設的原材料供應上的先進思想和做法,軟體上採用較先進的現代物流思想,對施工瀝青進行配送;硬體上研製成本低、性能優的保溫槽車;專用散裝供應駁船;專用瀝青裝卸碼頭貯罐等裝備,從而提出我國進口瀝青的運輸選擇,並運用經濟技術法來對這些進行經濟技術面的,由此提出我國進口瀝青運輸改革的設想,提出采購集中化、運輸散裝化這一全省或全國統一供應平臺且符合國際先進運輸技術的建議。
  9. Dong zhong - shu ' theory and its proof method revealed chinese traditional thinking mode ' s integrated features

    董仲舒的「天人合一」說及其子論證方式折射出中國傳統思維的整體性特徵。
  10. For arguments, does the second point comment on the first point in a way that leads to the third point and only the third point

    如採用邏輯論證方式,第二點是否是針對第一點的評意見,並一定會引申到第三點而不致引申到其他地
  11. The characters of his ideas lie in that he absorbed much buddhists ideas, and conceptions, even juxtaposed buddhists with confucians

    他的思想頗具特色的還在於大膽吸收了佛家思想,借用了佛家的論證方式及一些范疇,甚至將佛家人物與儒家人物相提並
  12. The result of the experimentation make clear that the system can achieve identity logging on very well. it is security and expedite. it can completely replace traditional logging on way

    實驗結果表明,整個系統能夠很好地實現電子商務身份,安全性高,並且便、快捷,完全可以取代傳統的身份論證方式
  13. The thesis adopts the progressively demonstration way. the author starts with the analysis of basic conception. then, on the basis of probing into the reason of the false statement in china, puts forward the precautionary measures concretely

    文採用逐層遞進論證方式,筆者從分析基本概念入手,在探討中國券市場虛假陳述的成因的基礎上,具體提出了防範措施。
  14. The software adopts three kind of control mode to start up the data acquisition system, it ensures reliability of the acquisition system. the control system communicates with the shipborne support system adopting broadcast when down and timing when up, and requires return for the remote instructions, so it ensures the communications of the five bouys with the control and acoustic emission vessel. this software is based on assemble language of mcs51, it is held in the eprom in mcu

    控制和通信軟體採用設定採集時間表、外推採集與啟動採集三種控制採集系統,可靠地保了遠程、無人值守浮標在長時間、連續工作情況下數據採集的很高的可靠性;控制和通信軟體採用下行廣播、上行時分的工作哈爾濱工程大學碩士學位實現各浮標與船載分系統間的通信,且無線電遙控指令執行反饋,可靠地保了浮標與船載分系統間的通信。
  15. This paper has studied different thought patterns to the influence of reasoning methods in english - chinese academic writings

    摘要探討了中英語篇思維模差異對英漢學術文寫作中法的影響問題。
  16. The thesis shows its originality in the following aspects : first, it attempts to take a positive mean to explore the cultivation functions of chinese mass media and gives a systematic test of the relation between the perceived reality, media reality and the objective reality ; investigates media effects on the audience and their outlooks, and comes to the conclusion that the length of watching tv is not the leading factor affecting the cultivation effects and it doubts the applicability of the cultivation assumption in china. second, it scans all the tv series shown in different provinces in china, does a sample analysis and outlines the violence on screen in china

    文在如下面具有創新意義:首次嘗試以實探討我國大眾傳媒的涵化(培養)功能,比較系統地檢驗了觀念現實、媒介現實及客觀現實三者之間的關系,考察了媒介現實對受眾觀念的作用,發現收視時長並非影響涵化效果的決定性因素,從而對涵化基本假設在中國的適用性提出質疑;首次對全國省級以上衛視臺黃金時段播出的電視劇進行全面掃描和抽樣分析,勾勒出中國大陸熒屏暴力的基本素描。
  17. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種認技術的基礎上,採用基於數字書的認,實現用戶上網資格審查;針對網路安全審計,重點研究了網路安全審計分散模型以及基於規則庫的審計策略,並針對傳統審計規則庫的缺陷,通過對審計規則進行形化描述,提出了一種基於自然演繹系統架構的動態安全審計策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細述了該模型的定義和推演演算法;通過深入研究非法外聯的關鍵技術和檢測模型,提出了基於路由表查找的c / s架構的非法外聯檢測模型;針對病毒檢測,提出了基於主機的防病毒檢測思想,在客戶端進行病毒防護。
  18. Legal reasoning presents mainly the features as followings : first, the thinking function of legal reasoning is argument reasoning. second, the thinking mode of legal reasoning on the whole belongs to " deductive demonstration mode ". third, the logic structure of legal reasoning is a combination of formal logic reasoning and argument reasoning

    作為法律實踐的法,法律推理主要有以下特點:第一,法律推理的思維功能是辯推理;第二,法律推理的總體思維模屬于「演繹」 ;第三,法律推理的邏輯結構是形邏輯推理與辯推理的綜合運用;第四,法律推理的推理功能表現為一種實踐推理。
  19. The last part of this paper serves as a summary. in one hand, fpga design is different than asic design in essence. fpga prototype verification can not replace the traditional method

    文的最後對全文進行總結:一面, fpga實現和asic實現本質上是不同的, fpga原型系統是asic設計和fpga設計的折中, fpga原型驗不能取代傳統的驗
  20. The collective method also received mixed remarks from another great wall writer, cha liangjing, who concluded that repeated discussions gave the films a certain guarantee of quality and provided good training for budding writers directors. the drawback was the sacrifice of individuality in the name of collectivism

    這種集體討誠然有優點也有缺點,長城另一編劇查良景在一次口述歷史訪問中便有相當中肯的說法:好處是經過反覆討,作品的質素比較有保,對新人也是一個很好的訓練,長城鳳凰便培養了不少編導人才壞處是往往在過程中犧牲了個性,因為藝術講求創新,而集體討卻注重集中
分享友人