非法據用 的英文怎麼說

中文拼音 [fēiyòng]
非法據用 英文
illegal encroachment
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • 非法 : illegal; unlawful; illicit
  1. Initial growths of disturbances are measured by means of hot - wire anemometry. due to the detected signals with low signal to noise ratio, the coherence function is used to eliminate background noise during data reduction

    在擾動增長的初始階段,信號的信噪比常地低,根相關譜分析方,應相干函數,將擾動信號有效地提取出來,測量了初始擾動的增長。
  2. And bulk of non - diagrammatic data is necessity in designing process for producing this table

    本方access來存儲設計過程中的圖形數,並根該數庫生成主要設備和材料量報表。
  3. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應,人們通過計算機網路傳輸數日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應。當前,基於voip技術的各種網路應,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  4. The disinsection measures were carried out in accordance with the existing infection control procedure applying to all vietnamese illegal immigrants who had left vietnam for less than six days

    該些滅蟲措施,是根現時適於所有離開越南少於六日的越南入境者的預防感染程序而進行。
  5. Using fumy cipher, transmission data are kept secret that can prevent others from reading or writing data without permit. it can ensure data security

    為了確保數傳輸的安全性,運流密碼對數進行加密傳輸,防止外來者的攻擊,未經授權進行讀寫操作。
  6. Second, adopting the linearity of oil film of the guide bearings, the transient response of the shafts is computed and analysis by integrating with willson method. because of the uncertain position of the shafts in the guide bearing, the model and solution method of nonlinear transient response of the shafts is discussed

    然後結合willson數值積分,採線性化油膜力,對機組軸系的線性瞬態響應進行了計算分析,根機組軸系在瞬態響應中運動的不確定性,給出了由導軸承油膜力線性所引起的主軸系統的線性瞬態響應的建模及求解方
  7. In recent years, plentiful and substantial fruits achieved by the lb method in simulations of hydraulics, multiphase flows, flows in porous media and heat transfer as well as magnetohydrodynamics, have revealed a broad perspective of application of this method, it will become a powerful competitor to the conventional approaches. in order to absorb the recent achievement in theory and application of the lb method, explore new ways in hydraulic computation to promote the development of practice, some work is car ried out in this thesis, as following : advances in the theory research and application, deductive process of the d2q9 model and some other commonly used models of the lb method are summarized. based on the hydrodynamic and general boundary conditions, a new joint boundary condition is presented, it integrates advantage of the two conditions above and obtains very good results in dealing with all kinds of boundaries of flow fields

    為了消化和吸收近年來lb方在理論和應方面的新成果,探索在水力計算方面的新途徑以促進lb方化的發展,本文進行了下列研究工作:綜述了lb方在理論研究和實際應方面的新進展,以及d2q9模型的推導過程和其他一些常的模型;在水動力邊界條件和通邊界條件的基礎上提出了一種新的聯合邊界條件方,它綜合了上述兩種邊界條件的優點,在流場的各種邊界處理中取得了常好的效果,經過模塊化的處理以後這種邊界條件具有更好的實性;針對均勻網格的lb方計算效率較低的不足,提出了雙重網格的latticeboltzmann方,通過二維poiseulle流動、后臺階流動和渠道方槽流動三個算例的模擬,證明這種方能夠明顯地提高流場模擬的計算效率;此外,根復雜區域流場的特徵提出了latticeboltzmann方的分塊-耦合演算,利lb方的計算特性實現塊與塊之間的數交換,充分利計算資源提高計算效率,通過對「 t 」型、 「十」型和「 x 」型分岔管道流場的模擬,展示了這種演算的特徵和優點,以及它所具有的應前景。
  8. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數調制器完成對計算機輸出的控制信號加密處理,將指令碼載送到一指定頻率點。終端收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利pin二極體的寬帶工作能力以及關斷特性,實現對授權戶或者戶的信號關斷,使之不能正常收視,繳費戶進行開通正常收視,達到控制戶通道的管理。
  9. Chapter one : introduction the author discuses the different definitions of the exclusionary rules, the background of its establishment ( at the early stage there was only the exclusionary rule on evidence obtained with the means violating the 4th amendment of the us constitution ), studies the functions of different branches of the american government in establishing and implementing the rules. finally, the author analyses the connection between the rules and adversary model of criminal justice system

    首先探討了對排除規則若干概念的理解;然後考察了產生排除規則歷史的背景;再闡述了美國政府各部門在排除規則中的作;最後分析了排除規則與對抗制的訴訟模式之關系和美國刑事司排除規則的局限性。
  10. To evaluate the algorithm, a data - mining trial system is designed which uses different algorithms to extract the decision rules in northwind database. by this trial system practical commercial rules can be obtained

    為了對演算進行評價,論文還設計了一個不同演算對羅斯文商貿數庫進行規則提取的試驗系統,利該系統提取了常實的商業規則。
  11. China sustained its record of criminal law enforcement against traffickers over the reporting period, though government data is difficult to verify and appears to conflate trafficking with human smuggling and illegal adoptions

    在本報告的涵蓋期2006年4月2007年3月內,中國仍舊律打擊人口販運活動,但是,政府提供的數難以得到證實而且他們似乎把人口販運、偷渡和收養這些行為混淆在一起了。
  12. In this paper, we use nonparametric regression method in chinese financial time series, we also use both kernel regression after improving cross - validation function and local polynomial estimation of regression under mixing condition to study and analyze the volatility in chinese stock market

    在本文中,我們把參數回歸的方到我國實際的金融時間序列數之中,討論了我國股價指數收益率序列的易變性。而在參數回歸進行估計時,選擇合適的窗寬有著重要的意義。
  13. Criminal procedure. exclusionary rule. a defendant ' s key rights with a criminal case. the miranda rule range

    知識點:排除規則.刑事訴訟中被告的幾項主要權力.米蘭達原則的適范圍
  14. Part four : applying the basic theories about bills, and principles about forgery of bills and the transfer risks, devise remedial methods for those non obligee of bills, who have lost the bill, according to various situation

    第四部分:運基礎理論以及票偽造、風險轉嫁的有關原理,針對不同的票喪失情形,對喪失票直接佔有的各類權利人設計補救方
  15. We got hold of sufficient evidence and he had no other choice but to admit what he did.

    當時我們已掌握到他的犯罪證,加上他冒險循途徑潛逃,心已是昭然若揭,他除了認罪已別無選擇。
  16. As a result of our successful development of this material, we are now able to provide a titanium alloy at low cost that has a good surface skin and is produced not by the conventional diecast wire drawing method but by an original roll method

    從客戶對材料的輕量化,高強度的需求中著手開發可以冷間鍛造的高強度鈦合金,並是以前的漸伸線,而是根特殊的輥壓加工方,利低成本就可以提供表面肌優良的鈦合金材料。
  17. They are points about science development from different aspect. the nonlinear viewpoints of development of science is comparatively full - scale, and overcome one - sideness. it is not only reduced to the nature of science history, but also provides effective reference for making correct policy from now on

    同時,把以前各種看似矛盾的科學發展模式在文章中整合為線性的發展,實際上,那些模式本身沒有對錯之分,只不過是從不同側面對科學發展的看,而線性觀則較為全面,克服了片面性,這樣也還原了科學史的本來面貌,為今後的科學決策提供有效的依
  18. To be successful, the watermark must be unperceivably and permanently embedded into the data : that is, after any distortion process, it can also be extracted to prove ownership, to recognize the identity of a misappropriate ^ to trace the dissemination of the data through the network, or to authenticate the integrity of the data

    成功的水印必須是不可察覺地,永久地嵌入在數中。即使數發生失真,也能夠從中提取出水印,來證明所有權,識別使者的身份,跟蹤數在網上的分佈,或鑒定數的真實可靠性。
  19. We implemented and improved the license management system for the operation of telecommunications services, the network access of telecommunications equipment and the philatelic market, and harshly cracked down on the illegal activities such as the telephone number - associated fraud and unauthorized use of international dedicated lines to operate international telephone services in order to safeguard the state interests and the legitimate rights of the consumers

    我們根市場的需要實行和完善了對經營電信業務、電信設備進網和集郵市場的許可證管理制度;配合有關部門嚴厲打擊盜電信碼號和國際專線經營國際電話業務等違行為,維護國家利益和消費者合權益。
  20. The government investigation has centred on the alleged misuse of at least one third of the 10bn yuan ( $ 1. 2bn ) pension fund to make illegal loans and investments in real estate and other infrastructure deals

    政府對陳調查主要集中他對在上海市100億社會保障金的上,稱至少三分之一的社會保障金涉嫌出借並於房地產投資以及其他交易中。
分享友人