證實程序 的英文怎麼說

中文拼音 [zhèngshíchéng]
證實程序 英文
authentication procedure
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : Ⅰ形容詞1 (內部完全填滿 沒有空隙) solid 2 (真實; 實在) true; real; honest Ⅱ名詞1 (實際; 事實...
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • 證實 : 1 (證明其確實) authenticate; corroborate; affirm; demonstrate; confirm; verify 2 [數學] verific...
  • 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
  1. And the deficiencies are pointed out in present researches, such as highway capacity, level - of - service, influence factor of road alignments, etc. from these, it has confirmed that the thesis should be studied from rational analysis, quantitative analysis of level - of - service, impact on capacity of road alignments, setting - up simulation model, etc. the high - accuracy gps dynamic data acquisition appearance is proposed to be used for the first time to carry on the experiment of overtaking on two - lane highways, and experiment scheme is designed according to the driver ' s perceive to judge each overtaking course. based on the experiment data, it can get two important parameters of acceptant gap ? the critical gap of overtakable time headway and returnable time headway through data processing, which can offer the strong support to the research of two - lane highway capacity with qualitative and quantitative analysis. besides, the experiment methods is provided to observe overtaking ratio and to measure the

    研究中首次提出了運用高精度gps動態數據採集儀對雙車道公路上的超車行為進行觀測,設計了根據駕駛員感受度來衡量超車過驗方案,並通過後期數據處理得到了超車過中兩個重要的可接受間隙參數-可超車車頭時距和可回車車頭時距的臨界間隙值,為定性和定量分析雙車道公路通行能力提供有力的數據支持;同時,還提出了觀測超車率的驗方法以及測量加速度干擾的驗方案,統一了計算加速度干擾的時間統計間隔,為雙車道公路的服務水平量化研究奠定基礎;最後還簡單介紹了駕駛員問卷調查法和模擬中模型參數標定和驗的數據採集方法。
  2. In china, under the influence of legal tradition and continental legal system, the evidence system pays more attention to substantive law rather than adjective law. in addition to the unscientific setting of the testimony standard, this evidence system influence the effect and quality of our country " s criminal trial

    在我國,由於受傳統法律思想和大陸法系據制度的影響,重體輕的審判思想積重難返,加之明標準設置缺乏科學性,嚴重影響了我國刑事審判的效率和質量。
  3. Adjudicative facts mean the judgments or presumptions made by the trier of fact about the objective facts concerning the case, on the basis of the evidences, through the procedure

    裁判事是事審理者通過法定,在據的基礎上,對案件涉及的客觀事所作的一種認定或推定。
  4. Also, this paper studies the amendable methods of dynamic numeration model, and bring forward that optimized method can revise finite element model, while validating the construed results of structural mode is almost equal to true values

    本文研究了各種動力計算模型的修正方法,針對有限元,提出了用優化的方法現結構動力有限元模型的修改,通過算例驗,結構模態分析結果更接近於測值。
  5. It is verified with practice that the presented simulation calculation procedure based on the method has good applicative values

    明,採用該方法編制的模擬計算具有很好的際應用價值。
  6. Some classical chaotic systems are used to check formula, the result indicate the values calculated by the programs accord with the theory values

    用某些經典的混沌系統對這些演算法進行了驗,結果表明計算的際值和理論值基本一致。
  7. Class cspart is a program interface provided for windchill system. windchill system can access and modify parts " parameters using this class, so the two systems can keep the integrity of data and realize information integration. two systems form b / w / d - c / s commix scheme

    Cspart類是編碼系統提供給windchill的應用介面,使windchill可以訪問和修改編碼系統某個零件的圖紙參數,保了兩個系統相關零件屬性的一致,現了信息集成。
  8. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動、應用層的動態鏈接庫以及用戶應用,這三個模塊之間通過內存共享技術完成對控管規則、封裝數據、網上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管規則現了對網路封包的認操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  9. It concludes that the realization of creditor ' s subrogation must follow the proceeding procedures ; the debtor is the third party without independent request right ; the object of creditor ' s subrogation is determined by the aim expansion method according to the legislation principle ; the creditor should quote to prove the existence of mature creditor ' s right between the creditor and sub - creditor apart from the quoting to prove the relationship as debtor and debtee ; and it is emphasized that the debtor is liable to cooperate to the quoting to prove the related facts ; the principle for the debtee to exercise the subrogation is the direct one

    認為債權人代位權的現必須經過訴訟;債務人在代位權訴訟中為無獨立請求權的第三人;債權人代位權的客體圍繞立法宗旨採取目的擴張的方法確定;債權人除舉明其與債務人存在債權債務關系外,還要舉明債務人與次債務人存有到期債權,並強調債務人對相關事負有配合舉責任;債權人行使代位權的受償原則為直接受償原則。
  10. Following the verification process, a verification statement or validation statement or assurance statement is produced

    完成核后,必須製作一份核聲明或認聲明或保聲明。
  11. Improve the quality of your epr by benchmarking, and assure its credibility by independent verification

    採用評核標準,藉此改善環保工作報告的質素,並透過獨立核報告內容真可信
  12. Tip 9 - improve the quality of your epr by benchmarking, and assure its credibility by independent verification

    要訣9 -採用評核標準,藉此改善環保工作報告的質素,並透過獨立核報告內容真可信
  13. A verification statement, sometimes called validation statement, is produced at the end of the exercise and is included at the end of the epr

    完成後,必須製作一份核聲明或認聲明或保聲明,于環保工作報告最後頁登載。
  14. A service charge of 130 is payable for each subscriber application, where the applicant has requested to complete the identity verification process for the purpose of handing over the pin mailer at a special location nominated by the subscriber and this location is outside the digi - sign offices

    若申請人另外申請加密書,則需額外支付每一張加密書港幣30若申請人要求在電服務辦事處以外地方完成身份核,及送交密碼封函,需就每次申請繳交港幣130 。
  15. In the process, we import the displacement method " s concept of replacement ahead, that is to say, we replace the unknown vectors with new unknown vectors to prevent the delivering and accumulation of errors. at the same time, we completed the skew bridge calculation procedure, and compared the calculation results with the results by the finite element software ansys, it proved the correctness and practicality of this procedure

    在矩陣傳遞的過中引入位移法中的前進代入的概念,即將未知向量不斷的以新的未知向量替換,以防止誤差的傳遞和積累。本文完成了斜交格子梁橋的內力計算,並將計算結果與採用有限元分析軟體ansys分析計算的結果進行了比較,驗的正確性和用性。
  16. And then chapter makes an analysis of the second substantive criterion of the procedural safeguard purpose which is based on the history of dispute settlement and theory of justice, the maximin rule founded by john rawls. chapter is about the positivist substantive criterion in accordance with the developing of social status

    其次,以羅爾斯的「社會正義理論」和「最大最小原則」為理論基礎,以糾紛解決方式的發展史為事基礎論保障目的論的合理性,分析了質標準之二? ?民事訴訟的目的。
  17. Simulations of microstructure evolution for a flange axle hot forging were given, which effectively tested program feasibilities and played a certain role in guiding prediction on numerical simulation of microstructure evolution during metal hot forging

    通過法蘭軸的熱鍛過中微觀組織演變的例,有效地驗的可行性,對金屬熱鍛過微觀組織預測有一定的指導作用。
  18. It is submitted that the task of burden of proof is to meet the following legal philosophies, namely purposes of substantial law, the atmost closeness to the fact in a judgment, justice of procedures and efficiency of procedures

    提出舉責任分配應盡量現以下幾個價值目標:即體法的宗旨、使裁判最大限度地貼近事公正及效益等價值目標。
  19. The two blocks are developed with the method of object - oriented programming and classes are designed to realize the functions of data input & output, data processing and working drawing. the encapsulate of class achieves the data abstraction and information hiding. at the same time, it makes sure not only the independence of classes also the readability, ability of maintenance and expansibility of the programme

    其中,每個類利用類的封裝機制現了數據的抽象和信息的隱藏,既保了每個類的相對獨立性,又保的的易讀性,易維護性和可擴展性,使本系統成為一個開放體系,為以後的完善和擴展打下基礎。
  20. There is one coding scenario that will pass the compiler but that will result in an unverifiable assembly : calling a virtual function through an object instance using the scope resolution operator

    以下編碼方案可以通過編譯器,但會導致不可驗集:使用范圍解析運算符通過對象例調用虛函數。例如:
分享友人