證據的確認 的英文怎麼說

中文拼音 [zhèngdequèrèn]
證據的確認 英文
corrobration of witnesses
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 4次方是 The fourth power of 2 is direction
  • : 形容詞1. (符合事實; 真實) true; reliable; authentic 2. (堅固; 堅定) firm
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • 證據 : evidence; proof; testimony
  • 確認 : affirm; confirm; acknowledge; identification; corroboration
  1. The letter of credit will be valid by banking acceptance of the confirmation of the draft in 90 days from the date of expedition on presentation of documents of expedition in compliance

    當銀行在90天內收到匯票函(即從提交了貨物發出單及相關材料開始計時)信用為有效
  2. No legal proof of this was obtainable, but cowperwood was assumed to be a briber on a giant scale.

    關于這一點找不到任何合法,但是柯帕烏為是大規模行賄人。
  3. There are three stepwise stages of the procedure of the dispute solution, which includes the decision of engineers, the dab and the arbitration. chinese contractors shall take actions to protect their benefits. these actions includes the careful analysis on the claims and the strict managements of contracts, the well understanding of the contracts, especially the terms that exculpatory clause of the employers, then following of the procedure and catching the very chance to bring about claims

    文章指出索賠是國際工程合同中一種具有補償性、非常講究時效和書面歸責方式,承包商可分別基於工程變更、僱主違約、風險因素或合同瑕疵等原因對發包商提出索賠請求,工程師決定、 dab爭端裁決和仲裁是解決索賠爭端三種遞進基本程序,中國承包商應從採取充分論索賠權,準識別索賠機會,熟悉合同文件、嚴格管理合同,充分知僱主免責條款、切實遵守索賠程序等多個方面維護自身利益。
  4. The dfa, after finding the documents complete and in order, indorses the documents to the philippine foreign service post located at or having consular jurisdiction over the student s country of origin or place of residence for issuance of the student visa after ascertaining the student s identity and admissibility in accordance with dfa regulations

    外交部在這些文件完全無誤之後,批準給學生國家或居住地菲律賓外交辦事處或有領事權辦事處,在根外交部規則判定學生身份和資格之後,簽發留學生簽。學生請求在學生國家或居住國之外簽發簽將不予以理睬。
  5. The application of standard time on networks is : using the standard time as audit of technical intendance. get the veracity and authoritative agreement of the technical intendance office

    我們以提供標準時間作為技術監督監測方法,作為時間在網路上一個應用,得到了技術監督局在該方法準性和權威性同。
  6. The legal argumentation is the thought process in which the community of the legal explanation confirms the acceptability ( validity and justice ) of case standard proposition as the judicative result of case by certain basis and reason

    法律論是在司法過程中,法律解釋共同體用一定和理由,作為案件判決結果存在個案規范命題可接受性(合法性與正當性)思維過程。
  7. While we can postulate another black - weasley wedding not documented in any way on the tree, occam ' s razor suggests that arthur is indeed related to the weasley that we do know is on the tree and other evidence suggests that he is that weasley ' s son

    當我們定在族譜中沒有另外一次布萊克? ?韋斯萊聯姻,則根奧卡姆原則(當你有兩個處于競爭地位理論能得出同樣結論,那麼簡單那個更好? ?米赫普注) ,亞瑟與我們在族譜中看到韋斯萊族人有關系,而且其他表明他是那個韋斯萊族人兒子。
  8. In historical works on the year 1812, the french writers are very fond of saying that napoleon was aware of the danger of lengthening out his line, that he sought a decisive engagement, that his marshals advised him to stay at smolensk, and similar statements to show that even at the time the real danger of the campaign was seen. the russian historians are still fonder of declaring that from the beginning of the campaign there existed a plan of scythian warfare by leading napoleon on into the heart of russia. and this plan is ascribed by some writers to pfuhl, by others to some frenchman, and by others to barclay de tolly ; while other writers give the credit of this supposed scheme to the emperor alexander himself, supporting their view by documents, proclamations, and letters, in which such a course of action certainly is hinted at

    在有關一八一二年歷史論著中,法國作者總是喜歡論及與時拿破崙如何感到戰線拉長危險,如何尋覓決戰機會,拿破崙元帥如何勸他在斯摩棱斯克按兵不動,並援引類似一些別明與時就已經意識到戰爭危險性而俄國作者則更喜歡談論,從戰役一開始就有一個引誘拿破崙深入俄國腹地西徐亞人式作戰計劃,這個計劃有人為是普弗爾擬,有人為是某個法國人擬,有人為是托爾擬,有人為是亞歷山大皇帝本人擬,而且引用有筆記方案和書信為,其中實有這種作戰方案暗示。
  9. Investors produce biases systematically in their decision making. debont and thaler believe that overconfidence is one of human being ’ s most stable psychological characteristics and their evidences show that people are overconfident of the probabilities of occurrences of uncertain events in their decision making

    投資者系統性決策偏差比較多, debont和thaler為過度自信是人類最為穩定心理特性,他們列舉了度量顯示人們在做決策時,對不定性事件發生概率估計過于自信。
  10. It ' s reflected in four aspects : teaching target, teaching resources, teaching tactics and teaching assessment. the determination of teaching contents is the emphasis, and the teaching contents is determined by teaching target ; the collection of material ( teaching resources ) is the difficulty - compose a script after making a careful study of the teaching material, then collect the material according to the script ; teaching tactics are embodied by the determination of information form and by the way in which the contents accord with the form so as to get the best result in teaching ; making teaching assessment guarantees the quality of the software. in the early making period, the original model method of system engineering is adopted to produce small experimental courseware and a further revision and improvement are made in consultation with some experts. also an agreement on the demand of the software system is reached. in the later making period, the software is appraised by experts from its stability, serviceability reasonableness of construction, and the scientific nature of contents, then it is put into use as an experiment. finally those who use it are required to fill the teaching feedback table

    教學設計理論是靈魂,它貫穿于整個軟體編制過程,從四個方面來體現:教學目標、教學資源、教學策略、教學評價。教學內容定是重點,根教學目標來定教學內容;素材收集(教學資源)是難點,在鉆研教材基礎上撰寫腳本,根腳本去收集素材;教學策略體現在信息形式定,以及如何使內容與形式協調一致,達到教學最優化效果;而進行教學評價是本軟體質量,在軟體製作初期,採用系統工程論原型模型法,開發出實驗性小課件,在徵求專家意見基礎上進一步修改、完善、軟體系統需求併到達一致理解,在軟體製作後期,再請專家從軟體穩定性、可操作性、結構合理性、內容科學性等方面進行鑒定,最後將軟體作實驗性投入使用,再讓實驗對象填寫教學反饋信息表。
  11. This surety is called the confirmation bias, whereby we seek and find confirmatory evidence in support of already existing beliefs and ignore or reinterpret disconfirmatory evidence

    這種自信稱為偏頗,藉由尋覓實例來支持其既有信念,並對否定採取忽視或重新詮釋態度。
  12. Corrobration of witnesses

    證據的確認
  13. By comparing the different views a conclusion can be drown that electronic documents evidence should have its independent status, forth, the affirmation of its value

    第四部分:電子文件價值。從法律制度、組織機構、管理措施、技術措施四個方面來保電子文件得以實現。
  14. In the part of discussing legal way, not only relative rules of substantive law are introduced, but also the difficulties we may meet in internet cases are analyzed, such as law selecting, subject affirmation, confirming of court jurisdiction and the acquirement of electronic evidence ; the seventh is to analyze the imperfections in current internet copyright protection, three aspects are mainly discussed ; the lack of legislation ( one is no definite rules about database protection in copyright law, the other is the lack of regulations to the applying of technology measure ), the low quality of judges and the poor ability to execute law, the light consciousness of people to internet copyrig ht. and the author puts forward his own improving opinions about it

    在法律途徑中不僅介紹了有關實體法律規定,還對法律適用、主體定、法院管轄權定、電子取得等網路訴訟中可能遇到難題作了論述分析;七是分析了當前網路著作權保護中存在問題,為主要有立法上不足(包括著作權法沒有對數庫保護作出明文規定,以及對技術措施採用缺乏規范兩方面) 、技術和設備上欠缺而導致執法能力低下、人們網路著作權意識淡薄三個方面,並從中提出了自己改進意見。
  15. When mail tracing office receives the completed reply slip and relevant supporting documents, it will process the claim of compensation. according to the universal postal union regulations, the maximum compensation amount is hk $ 320

    當郵件查詢組收到填妥回條及有關明文件后便會處理有關索償個案。根萬國郵政聯盟公約規定,最高賠償額為港幣320元。
  16. This problem results in the confusion of the judges in determining the legality of the evidence in the practice of the civil proceedings, and therefore the different conclusion when determining the same evidence by different judges or courts, which greatly affects the authority of the judiciary. this paper focuses on the practical issues occurred in the content of the authentication, its principle, its standard and the guidelines., it starts from the definition and content of the authentication with respect to the theoretical research in the issues of authentication and the relevant judicial practice in china, first, it makes clear what authentication is, that is, the definition, characteristics and content of the authentication

    這些問題造成民事審判實踐中法官活動混亂,導致不同法官或不同法院對同樣定結論卻不相同,嚴重影響了司法權威性。本文側重於內容、原則、標準、規則中存在具體問題,結合我國關于理論研究及司法審判實踐,從涵義、內容入手,首先明什麼是概念、特徵、內容,然後分析制度價值是什麼
  17. Hybrid machine learning ( hml ) is the latest applying in the field of intelligent information process. it combines the induced learning based - on decision - making tree with the blocking neural network. and it provides a useful intelligent knowledge - based data mining technique

    混合機器學習是在智能信息處理上最新應用,它把以決策樹為基礎歸納學習與模塊化神經網路演算法結合起來,從而提供了一種在知識基礎上進行實和行之有效智能化數挖掘過程,其核心演算法是id3和ftart 。
  18. While the admissibility is appreciated as " admissible qualification " for evidence to be advanced in litigation, the inadmissible evidence should be excluded in the early stage of proceedings as soon as possible

    如果將能力理解為進入訴訟程序「準入資格」 ,這種資格就必須盡可能地在程序開始早期階段進行。
  19. It is necessary to improve the comprehensive capability of judges and standardize the presentation of evidence in order to make sure of the truthfulness of the proof authentication

    要做好這一工作,就要全面提高法官綜合素質,規范出示行為,以保性。
  20. Confirms that a code assembly originates in the global assembly cache as evidence for policy evaluation

    一個代碼程序集在全局程序集緩存( gac )中以策略評估形式產生。
分享友人