賴以保護 的英文怎麼說

中文拼音 [làibǎo]
賴以保護 英文
relying on
  • : i 動詞1 (依靠) rely on; depend on 2 (逗留不肯離去) hang on in a place; drag out one s stay in...
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • 賴以 : rely; depend
  1. The protective designs analyze the self - purify approach of nature water body, strengthen the purify function of water body type, improve the water body construction and biome by principle of resuming the water quality, and maintain water quality by the balance capacity of the system

    性設計水質恢復原理為指導,分析自然水體的自凈途徑,強化了水體形式的凈化功能,完善水體結構與生物群落,依系統自身的平衡能力維持水體質量。
  2. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性及交易者行為的不可抵性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立及系統安全法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵性。
  3. Grounded on analysis to the supervisory and regulatory practice in the usa, hong kong, common wealth and some other countries or distracts, the article holds the opinion that, to realize supervision to the deeds of stock market manipulation, the special entity shall be granted comparatively abroad and flexible power to stipulate regulatory rules and executory power that can provide regulators system and means to exert its professional supervision beforehand and its regulation in time. based on the above construe, with a view of the status in quo in our country, the article concludes on possible, approaches and ways for our country to consummate our supervision and regulation of stock market manipulation

    股票市場操縱行為的上述特徵使許多特定行為在不同時期、不同市場不同形態出現,許多操縱行為與合法行為之間的界線不斷變化,基本的證券立法不可能對全部的操縱行為進行詳細規定,必須依監管者發揮其專業監管能力,正確處理投資者利益和維市場有效性之間的,他們在2003年7月初步完成了題為( ( whatw0rksinsecuritieslaws ) ) ( nberw0rkingpaper9882 , july2003 )的研究報告
  4. Stressing the need for everyone to act responsibly to ensure not just their own information security, mr wong said the highly interconnected nature of the information world meant we were dependent to a large extent on each other to assure the security of our data and systems. " for instance, while e - mail is becoming a common and efficient way of communication, it also poses potential threats to all it touches. and a likely tangible consequence to any laxity in our information security could be a costly negative impact on the conduct of our e - business.

    王錫泉強調,每個人都有責任去自己及其他人的資訊安全,現今的資訊世界高度互連,意味我們彼此之間互相倚障我們的數據和系統的安全。他說:例如,電郵雖已逐漸成為普及和有效率的通訊方法,但它同時會對所到之處構成潛在威脅。假如我們對資訊安馬虎了事,便有可能對我們的電子業務運作造成代價不菲的負面影響。
  5. " you are completely mistaken, sir, " said monte cristo coldly, who felt the perfidious manoeuvre of the young man, and understood the bearing of his words ; " you only acquired my protection after the influence and fortune of your father had been ascertained ; for, after all, who procured for me, who had never seen either you or your illustrious father, the pleasure of your acquaintance ? - two of my good friends, lord wilmore and the abb

    「您完全弄錯了,閣下, 」基督山冷冷地說,他從青年的那種無態度上知道了他話里的意思, 「您是在我了解了令尊的權利和財產情況後才獲得我的。我從來不曾見過您或您那顯赫的父親。歸根結蒂究竟是誰使我有幸認識你們的呢?
  6. Firstly, the author pointed out the doctrine of the privity of contract has many flaws which motivate the developing of the contract for the benefit of third party

    同時,它也符合現代社會對第三人信利益的要求,而這些都是在合同相對性原則下所難實現的。
  7. The credit crises of enterprises in china in international markets will results in many problems during the updating processes of flower species and cultivars, because seeds, corms, bulbs, seedlings of many favorable flowers sold in our country come from other countries and we have ignored the protection of knowledge property rights. those enterprises of flower breeding will meet problems with survive, bringing a series of serious effects on the whole flower industry in china because the enterprises suffer from more and more serious punishment due to knowledge property rights. the market proportions of native flowers produced by the enterprises will decrease, resulting in many serious effects on the whole flower industry in china because the enterprises are deficient of the abilities to increase the enrichment of flower species and cultivars and the qu ality of fresh cut flowers

    由於我國花卉種子、種球、種苗對國外進口的高依性和國內對知識產權的普遍忽視,入世后,我國花卉種業在國際花卉界的信用問題將嚴重阻礙花卉業的品種更新進程,越來越嚴厲的侵權處罰,使從事花卉種業的企業可能遭遇到生存危機並對整個花卉業產生連鎖反應;由於國內生產的切花在品種結構和品質方面的缺陷,國內市場上國產切花的份額會受到巨大的沖擊,反過來又對國內種業產生不利的互動反應;由於我國盆景生產的方式及有害生物的問題,綠色壁壘成為我國盆景出口的瓶頸。
  8. And the uk should take practical and cooperative action to fulfill their obligations to protect the environment and tackle climate change

    中英雙方作為世界上的大國,應該切實行動、履行義務,聯合人類生存的環境。
  9. This research mainly utilizes such means as historical analysis, comparative analysis, value analysis and specs analysis etc. started with the origin and development of the protection system of trust, the research launches into a detailed explanation on the value system and specification system two aspects, and such lawmaking will as value orientation, good faith in transaction and trades security infiltrated into the protecting system of trust, which makes it constitute a whole system under the basic principle, then made a systematic, normative research and design of the fulfillment of the protection system of trust

    本文採用了歷史、比較、價值和規范分析等法學方法,從信制度的歷史沿革入手,在信制度中滲入社會本位、交易誠信和交易安全的立法意志,對其價值體系和規范體系兩個層次展開論述,使其在基本理念的統攝下構成了民法的一項重要制度體系。除了引言和結語外,正文部分共分為四章:第一章歷史和比較的法學方法介紹了兩大法系信制度的演變。
  10. Attention technology is mainly divided into attention - obtaining technology, attention - constructing technology and attention - protecting technology. for the first time, this paper introduces attention technology ideas into web - based course design. from the angle of applying attention technology, this paper attempts to solve such problems existing in web - based course design as insufficient appraisal and feedback ; halfway design of interface, navigation and interactive and so on

    該技術被廣泛應用於愈來愈繁榮的網路世界,其技術主要分軟、硬兩個層面:軟技術是指獲取、構造並他人注意力的策略、方法,而硬技術則是指軟技術實現的現代信息技術。
  11. Make sure that all your employees understand why there is a need to protect data, use secure reliable email and internet software, lock draws and cabinets and shred any important documents before throwing them away

    你的所有雇員明白為什麼需要資料、使用值得信的電子郵件及網路軟體、鎖上抽屜和柜子、丟棄任何重要文件之前要先切碎。
  12. Make sure that all your employees understand why there is a need to protect data, use secure and reliable email and internet software, lock draws and cabinets and shred any important documents before throwing them away

    你的所有雇員明白為什麼需要資料、使用值得信的電子郵件及網路軟體、鎖上抽屜和柜子、丟棄任何重要文件之前要先切碎。
  13. When brian power was a boy, there was much that foreigners felt they needed to be protected against : fallout from the end of the qing dynasty, the abdication of the child emperor, pu yi, the proclamation of the republic and all around evidence of drought and famine

    在布恩?鮑爾的孩童時代,外國人覺得應該在諸多方面得到,免受其害:大清王朝壽終正寢帶來的動蕩,幼兒皇帝溥儀的退位,共和政體的宣告成立及乾旱饑荒的餓殍哀鴻。
  14. Sharing nature with children is an environmental education guidebook for teachers of pre - primary children. when pre - primary teachers go through the learning process together with their pupils, they will explore the joy of environmental education and learn how to live sustainably in order to protect the earth the only planet that we and later generations have live on

    與孩子分享大自然是為教導學前兒童的教師而設的環境教育指南,教師與學生一起學習時,不單可發掘環境教育的樂趣,而且也能學習怎樣維持資源生生不息,我們及下一代生存的唯一的地方地球。
  15. He sent peacekeepers to iraq, the boldest venture by japanese troops for half a century, and has worked hard with america to make japan depend less on america ' s military umbrella and shoulder more of the burden of its own defence

    他派遣維和部隊去伊拉克,這是半個世紀來日本軍事上最膽大的冒險,他還與美國艱苦談判使日本更少依美國的軍事傘,承擔更多的自身防務負擔。
  16. Many factors regarding the modifying coefficients of circular and rectangular section are analyzed : ( 1 ) it is theoretically proved that the diffusion coefficient of cl - in concrete is dependent of modifying coefficients ; ( 2 ) through analysis of the results of numerical value calculation, it is discovered that the relation between the modifying coefficients and the thickness of protection layer of concrete is linear, from which the function expression of these two variables is gain ; at the same time, the influence on modifying coefficient of the radius of circular section and the thickness of cl - on the surface of concrete ; based on these, practical calculating method of beginning corrosion time of steel of circular section is set up ; ( 3 ) to rectangular section, the diffusion of cf in concrete is two - dimension diffusion

    討論了影響矩形截面及圓形截面修正系數的因素: ( 1 )從理論上證明了氯離子在混凝土中的擴散系數與修正系數無關; ( 2 )通過圓形截面數值計算結果的分析,發現圓形截面修正系數與層厚度基本成線性關系,並建立了二者之間的聯系;分析了圓形截面半徑、混凝土表面氯離子濃度對修正系數的影響,從而建立了圓形截面鋼筋初始銹蝕時間的實用計算方法; ( 3 )在矩形截面氯離子侵蝕下,混凝土處於二維擴散狀態。本文通過計算分析,證明二維擴散的影響區域從邊角開始向中間逐步擴散,並證明了二維擴散影響區域依于氯離子擴散系數與氯離子擴散時間的乘積。
  17. Chapter two, with the philosophy and the value analytical method, launches a research on the theories foundation of the protection system of trust in the civil law, such as economic premise, legal philosophy and legal value

    第二章是法哲學和價值分析的方法對民法信制度的經濟前提、法哲學基礎及其法律價值進行研究。社會學法學和新自然法學為信制度提供了堅實的法哲學基礎。
  18. Joe cole saw the consultant yesterday who operated on his stress fractured foot. ' he ' s got the protective boot off and is now able to start weight bearing exercises, ' said bryan

    喬.科爾昨天與曾給他做腳部手術的醫生碰面,布恩說: 「他已經不用再穿著性的鞋子了,現在開始他可進行負重的訓練。 」
  19. “ enthusiasm and curiosity ” are two important factors in human being, especially in those supernormal children who possess great imagination and intense curiosity. these characteristics need protection and development through teaching

    「熱情與好奇」是人生存的兩大因素。超常兒童對待新事物有強烈的好奇心和求知慾且富於想象,而這恰恰是創造力發展的基礎- - - -創新素質,也正是需要我們通過教學加和培養的。
  20. It is not right to say generally which relation should be protected. to answer that, the behavior party who caused the appearing fact is to be judged whether he is responsible, and as for the opposite party and the third party, they are to be judged whether they have the reliable interests to protect

    那一個民事法律關系,不能一概而論,對于造成表見事實的行為人來講,要看他是否有歸責性,對于相對人和第三人來講,應當是否有信利益可
分享友人