非偽造的 的英文怎麼說

中文拼音 [fēiwěizàode]
非偽造的 英文
genuine
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ動詞1 (做; 製作) make; build; create; produce 2 (假編) cook up; fabricate; concoct 3 [書面語...
  • : 4次方是 The fourth power of 2 is direction
  1. Neither the bank, its associates, nor any of their directors, officers or employees, shall be liable to the customer for any expenses, loss or damage suffered by or occasioned to the customer by reason of any action taken or omitted to be taken by any one or all of the bank, its associates, their directors, officers, employees or agents pursuant to these conditions or in connection therewith other than as a result of the fraud, wilful default or negligence of the bank, its associates, their directors, officers, employees or agents ; the bank s failure in good faith to honour any stop - payment instructions given by the customer ; the presentation to the bank of any cheque or other payment order which is post - dated ; the bank failing to honour any draft drawn on it by the customer, but the bank shall immediately return such draft to the customer through the normal channels giving the reason for the dishonour ; any loss, damage, destruction or misdelivery of or to the securities howsoever caused unless the same shall result from the negligence of, or theft by, the bank or its associates or any of their directors, officers or employees, in which event the extent of the liability of the bank shall be limited to the market value of such securities at the date of discovery of the loss and even if the bank has been advised of the possibility of such loss or damage ; unauthorised use or forging of any authorised signature as a result of the negligence, wilful default or fraud of the customer ; subject to condition 5. 5, any act or omission, or insolvency of, any person not associated with the bank including, without limitation, a third party nominee or depositary ; viii the collection or deposit or crediting to the custodian accounts of invalid, fraudulent or forged securities or any entry in the custodian accounts which may be made in connection therewith ; any malfunction of, or error in the transmission of information caused by, any electrical or mechanical machine or system or any interception of communication facilities, abnormal operating conditions, labour difficulties, acts of god, or any similar or dissimilar causes beyond the reasonable control of the bank and notwithstanding paragraph, the error, failure, negligence, act or omission of any other person, system, institution or payment infrastructure

    本行其聯系人士其各董事高級人員或雇員均毋須向客戶因以下理由而使客戶蒙受或產生之任何開支損失或虧損負責: i本行其聯系人士其董事高級人員雇員或代理人根據此等條件採取或遺漏採取有關之行動,但由於本行其聯系人士其董事高級人員雇員或代理人之欺詐行為故意失責或疏忽所成者除外ii本行本真誠地未能依約替客戶執行止付指示iii向本行提交任何遠期支票或其他付款指示iv本行未能兌現由客戶開出之匯票,但本行將立即透過正常渠道將該匯票退回客戶,並解釋拒付之理由v無論如何導致之任何證券之損失損毀毀壞或錯誤交付除上述各項乃因本行或其聯系人士或其任何董事高級人員或雇員之疏忽或盜竊所引致,而在該等情況下,本行責任將只限於在發現損失當日該等證券之市值,以及即使本行已獲知該等賠償之可能性vi因客戶之疏忽故意失責或欺詐行為而導致任何授權簽名或不獲授權使用該簽名vii在第5 . 5 a條之規限下,與本行無關者之任何行動或遺漏或無償債能力包括但不限於第三者代名人或寄存處viii代收或存入或貸存於保管人賬戶無效或假冒證券或在保管人賬戶記入可能與此有關之賬項ix任何電子機械或系統失靈或因該等機件或系統產生資料傳送錯誤或任何通訊設施之終斷不正常操作情況勞工問題天災或本行所能合理控制之任何類似或類似原因及x盡管有第ix項,任何其他人系統機構或付款設施錯誤故障疏忽行動或遺漏。
  2. Part four : applying the basic theories about bills, and principles about forgery of bills and the transfer risks, devise remedial methods for those non obligee of bills, who have lost the bill, according to various situation

    第四部分:運用票據基礎理論以及票據、風險轉嫁有關原理,針對不同票據喪失情形,對喪失票據直接佔有各類票據權利人設計補救方法。
  3. This dissertation, which begin from the concept of forfeiture of bills, with the method of comparison, analyzed the orientation of values about forgery of bills in china ' s legal system about bills, and devised a set of remedial methods for those who have lost their bills, especially for those non obligee of bills, who have lost the bill. it fills the gaps of theory of the means of relieving those non obligee of bills, in the studies of laws governing bills

    本文從票據喪失概念入手,通過比較方法,分析了我國票據法律制度在票據方面價值取向,為不同喪失票據佔有者,尤其是喪失票據直接佔有票據權利人設計了一整套補救方法,填補了國內票據法研究中在票據權利人喪失票據后缺乏對票據權利人補救方法研究理論空白。
  4. This paper consists of three parts. in part one, the concept and categories of instruments offence have been discussed ; in part two, the structures of instruments offence have been listed ; in part three, measures have been raised concerning how to attack and prevent instruments offence or crimes in relation to instruments offence. in part one of this paper, the author has firstly defined the concept of instruments offence from the jurisdiction of crime and the nature of instruments offence : instruments offence refers to the activities that violate relevant provisions of instrument law take the illegal ownership make

    結合理論知識,本文還討論了在實務中常見疑難問題,如對使用、變金融票據、使用作廢金融票據中「使用』 』理解;在票據背書欄、變記載內容定性;將、變票據質押后騙取財物行為定性;倒賣、變票據行為定性;法「補記」空白支票行為定性;在空白票據上偷蓋印章行為定性;行為人、變票據后,將其提供給他人使用行為定性以及金融機構內部工作人員參與票據詐騙行為定性等。
  5. The foreigners who fabricate, alter, enter under false name, transfer, and trade with visa and identification paper can be punished by fine 1, 000 to 10, 000 yuan in the meantime, the illegal income will be confiscated and whose original visa or identification paper will be withdrawn ; or punished to detain by 3 to 10 days, and also can be coerced leaving the country within time limit at the same time

    、塗改、冒用、轉讓、買賣簽證、證件外國人,在吊銷或者收繳原簽證、證件並沒收法所得同時,可以處1000元以上、 10000元以下罰款;或者處3日以上、 10日以下拘留,也可以並處限期出境。
  6. This scheme of dividing area makes the network and borders between systems clear, and will help to install the security devices. in dispatch center, security devices such as firewall, physical partition device are installed, and between dispatch centers, encrypting devices will be installed

    具體地說,在同一地點不同安全區之間採用防火墻、隔離裝置等邊界防護設備進行橫向隔離以抵禦法訪問、拒絕服務等類型攻擊,不同地點同一安全區之間採用加密認證等手段,以抵禦數據在野外傳輸時可能遭遇竊聽、、篡改等類型攻擊。
  7. In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown

    本文認為,色度dc系數是魯棒性常好參數,因而選擇色度dc系數作為水印信息載體,同時,採用可變步長選擇部分系數,保證了水印隱形性;在嵌入水印時,本文採用水印信息「網格劃分」 、各子塊獨立嵌入視頻方案,由於水印信息子塊是相對獨立嵌入視頻中每一相對獨立圖組當中,即使某一圖組收到一定破壞,也能夠恢復水印信息,使水印健壯性得到提高;此外,為了提高水印信息安全性,在嵌入水印信息時,根據用戶輸入id號和密碼,利用本文構混沌系統產生混沌序列對水印信息進行變換,同時,對每一水印信息比特嵌入位置也採用了隨機序列進行調整,這樣,未授權用戶不能提取水印信息,也難以擦除其中水印信息,因為嵌入位置是未知
  8. The thesis study on the legislation situation, the legislation evolution of our countries ’ finance crime and the overseas legislation stipulation of the financial crime. the author think the financial criminal legislation of our country must form the coordinated financial criminal legal framework and change the penalty structure that is severe but was lax. the paper analysis the theory basis of on perfecting crime names by studying the illegal activity offend against the criminal law, the crime punishment legal principle and the crime punishment balanced principle, the criminal law modest and restrained principle and the criminal law investment cost and benefit analysis. finally the author puts forward the ideas that additionally build illegal gathers capital crime, merge forge, forges the national negotiable securities crime and forge, forges the stock, the bond of the company

    本論文從研究我國金融犯罪罪名立法現狀、立法沿革及國外金融犯罪罪名立法規定著手,認為我國金融犯罪立法尚待形成協調金融刑事法律體系和改變「厲而不嚴」刑罰結構,並從違法行為犯罪化前提、罪刑法定原則和罪刑均衡原則、刑法謙抑性原則、刑法投入成本?效益分析角度出發,分析金融犯罪罪名完善理論依據,最後從金融犯罪罪名增設、合併、分立、廢除四個角度,提出增設法集資罪,合併、變國家有價證券罪與、變股票、公司、企業債券罪,分立內幕交易罪與泄露內幕信息罪,廢除、變、轉讓金融機構許可證罪立法建議,並分析其可行性。
  9. Mr shkurtaj says he spoke out after being shocked by the discovery of $ 3, 500 in counterfeit american bills, sitting in the undp safe in pyongyang

    什庫爾特耶說發現平壤聯合國開發計劃署保險箱里有3 , 500美元美鈔時,他感到常震驚並在後來揭發此事。
  10. The paper does a systematic and professional research on the group of crimes concerning financial bills which is made up of the crime of forging or altering financial bills, the crime of illegal issuing financial bills, the crime of accepting, paying or guaranteeing illegal financial bills and the crime of fraud by financial bills

    本文將與票據有關四個個罪:、變金融票證罪,法出具金融票證罪,對違法票據承兌、付款、保證罪和票據詐騙罪作為一個罪群進行系統性和專業性研究。
  11. Although there is no the description of " for the purpose of illegal possession " in the fads about the crime, the crime can not be tenable without the purpose. on the other hand, the crime of fraud on letter of credit leaves from common fraud crime, which is a crime for the purpose of illegal possession with direct intent. on some occasion, there is a division of accomplished cffense and unaccomplished offense in crime of fraud on letter of crfdit. the act of counterfeiting a letter of credit and using it afterwards, and the act of using a noneffec tive credit, and the act of defrauding a bank to open a credit or using fraudulent clause in credit somewhat should be punished seriously by our country ' s criminal law

    信用證詐騙罪所侵犯客體是國家對信用證管理制度以及公私財產所有權,其客觀行為表現包括使用、變信用證或者附隨單據、文件進行詐騙活動、使用作廢信用證進行詐騙活動、騙取信用證進行詐騙活動以及以其他方法進行信用證詐騙活動,信用證詐騙罪犯罪主體包括自然人和單位,主觀上屬于直接故意,要求行為人具有法佔有。在司法實踐中,應注意信用證詐騙罪與罪、與彼罪區分認定,以及對罪數形態、共同犯罪和既未遂形態認識。
  12. The signature is proved to be a forgery

    簽字被證明是法模仿
  13. The counterfeiter was so conceited that he put his own picture on the ten - dollar bill

    有個常自負,竟把自己照片印在10美元紙鈔上。
  14. But as pay - per - click advertising has grown into a huge industry, concern has mounted over so - called “ click fraud ” ? bogus clicks that do not come from genuinely interested customers

    但是正當點擊率付費廣告成長為一項巨大產業時,關注點轉向了「點擊欺詐」點擊並來自真正感興趣消費者。
  15. An immigration officer was jailed for 10 years for possessing a false diplomatic passport and conspiring to sell diplomatic passports

    一名入境事務處入境主任,因管有外交護照並法售賣外交護照,被判入獄十年。
  16. Under internet entironment, data stored in database management system may be faced with unauthenticated disclosure, modification, counterfeit, broken, and so on. all these threat destroys the data ' s confidentiality. integrity, availability and facticity

    在internet環境下,數據庫管理系統中存儲機密數據可能被授權泄露,纂改,中斷和等。這破壞了數據保密性,完整性,可用性和真實性。
  17. He gives the bank specimens of his signature, and there is a very firm rule that the bank has no right or authority to pay out a customer ' s money on a cheques on which its customer ' s signature has been forged

    他把自己簽名樣本交給銀行,對此有一條常嚴格規定:銀行沒有任何權利或理由把儲戶錢讓儲戶支票取走。
  18. A vietnamese woman awaiting repatriation in hong kong was sentenced to nine months imprisonment, suspended for 18 months, for producing forged immigration documents to help illegal immigrants find wo

    一名正等候遣返越南船民,串謀入境事務處擔保書俗稱行街紙,協助法入境者在港找尋工作,被判入獄九個月,緩刑十八個月。
  19. They had identified 4 illegal interior decoration workers attempting to gain entry to the large private housing estate with forged hong kong identity cards from may to july 2005. the alert guards called the police right after the illegal workers entered the building and then helped the police arrest the illegal workers and the contractor successfully

    他們於2005年5月至7月,在美孚新37032當值期間,分別3次懷疑4名法勞工使用香港身份證,企圖進入該屋苑內之單位進行裝修工程。
  20. To be sure you are seeing valid results rather than artefacts of the models, you need to take account of all the ways that can happen

    為了確保從模型中得到真實而非偽造的結果,就必須考慮所有可能發生相互關系。
分享友人