驗證證據 的英文怎麼說

中文拼音 [yànzhèngzhèng]
驗證證據 英文
experimental evidence
  • : 動詞1. (察看; 查考) examine; check; test 2. (產生預期的效果) prove effective; produce the expected result
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 驗證 : test and verify; checking; proving; testing; confirmation; [數學] corroboration; inspection; veri...
  • 證據 : evidence; proof; testimony
  1. The role of pesticides ( eg. paraquat and dieldrin ) as potential risk factors for parkinson ' s disease, a role suggested by both epidemiological statistics and laboratory eidence

    農藥(例如:百草枯、狄氏劑)作為一個潛在的危險因素在帕金森氏病中的作用? ?一個通過流行病統計學和實得到暗示的作用。
  2. Pseudoscience has the following characters : based on an authoritative text rather than observation or empirical investigation ; explain what nonbelievers cannot observe ; they are so vague that people can ' t test them ; rely on ancient myths and legends rather than on physical evidence ; have nonfalsifiable or irrefutable hypothesis, and the like

    偽科學有如下特徵:基於權威而不是觀察或實際調查;解釋一些認為不信則無的現象;觀點模糊,難以;依古代神話和傳說而不是事實;有著難以偽或難以否定的假設前提;等等。
  3. You can use balance2 to verify your data entry since it should match with your current account balance according to your bank, and use " balance " to make sure that you don t overdraw your account since it will take into account any checks you have written that have not yet been cashed

    可以使用balance2來項(因為它應該與當前銀行帳戶余額匹配) ,可以使用" balance "來確保沒有透支帳戶(因為它會考慮您開出的尚未兌現的所有支票) 。
  4. This article provides theory basis and experimental verified datas for making practical encoded bar code labels

    本文研究結果為製作實用型加密條碼標簽提供了理論依和實
  5. Additionally, the lack of consistency in results, dose - response relationship, and evidence from laboratory studies further limits the causal inference

    此外,缺乏一致性的發現、無法呈現劑量反應相關、以及缺乏實等因素,也都限制了電磁場與癌癥間因果關系之推論。
  6. Class will automatically invoke your custom provider to communicate with your authentication data source

    類將自動調用自定義提供程序來與您的身份源進行通信。
  7. Sensitive information includes password and authentication data, or any data you do not want to expose to an unwanted source

    敏感信息包含密碼和身份或不希望公開給不明來源的任何數
  8. Specifying a secure server protects the report definition and authentication data from being intercepted while the report is published

    通過指定安全的服務器,可以在發布報表時保護報表定義和身份,以防他人截獲。
  9. Then, this thesis concerns with the wavelet transform and its application in power system and compare the deficiency vs strongpoint between the fourier transform, short - time fourier transform. this article point out that wavelet transform fit for non - stationary signals analysis and put it into the measurement of voltage sag. based on the comparion of several algorithm of voltage sag measurement in the literature, the thesis put up a new voltage sag measurement algorithm - - - combination of wavlet transform and root - mean - square. the thesis validate the algorithm according to simulation and actual measuring data

    並將小波分析用於電壓凹陷的測量中。在詳細對比了現有文獻上已有的幾種凹陷檢測演算法的基礎上,提出了有效值與小波分析相結合的電壓凹陷測量演算法,文章對小波函數的選取,處理時的去噪,分解尺度的確定等問題進行了詳細的論述,從而實現了本文提出的電壓凹陷定義的測量。根實測數和模擬數,對該演算法進行了明該演算法是可行的。
  10. Asp. net controls access to site information by comparing authenticated credentials, or representations of them, to ntfs file system permissions or to an xml file that lists authorized users, authorized roles groups, or authorized http verbs

    通過將已或它們的表示形式與某些內容進行比較, asp . net可以控制對站點信息的訪問;這些內容可以是ntfs文件系統權限,也可以是列出了已授權用戶、已授權角色(組)或已授權http謂詞的xml文件。
  11. On the other hand, the opening and insecure internet brings up a new task to the rfmdms based on the internet that how to ensure the security of data transporting in many application fields such as the military equipments " maintenance and etc. the security of data transporting on the internet is mainly made up of three aspects : identity authentication, encrypted data transporting and digital signature

    網路數傳輸安全主要解決在網路環境下用戶之間身份、數加密傳輸以及實現數字簽名三個方面問題:用戶身份了通信的源點和目的點的正確性;數加密傳輸保了數在網路的中間節點不會泄露通信秘密;數字簽名可以保發送信息的一方不能對自己發送過的信息進行否認。
  12. Hardware validation data and protocols should be kept at the drug manufacturer ' s facility

    硬體的和文檔應該保存在制藥商的工廠。
  13. I then test the object creation works and verify the contents of the database using dbunit s query facilities

    然後測試對象創建工作,並用dbunit的查詢程序庫的內容。
  14. There is also strong laboratory evidence of m # 111nkeypox

    也有有力的實表明是猴痘。
  15. The material of cement - treated aggregate based on new strength standard has the enough strength and little shrinkage that is helpful to decrease shrinkage crack of cement - treated aggregate and reflective crack of asphalt layer

    經試,根該標準所確定的水泥穩定碎石基層的級配組成、強度均符合要求,且收縮量小,致使其收縮裂縫減少,瀝青面層的反射裂縫也相應減少。
  16. The paper studies the the flux uniformity of the outlet when ventilates at one end of vault in the main workshop of xiluodu underground hydropower station via the method of numerical simulation cfd, puts forward means which can achieve symmetrical ventilation, validates the cfd results credibility by the way of model experiment afterward

    本文採用cfd數值模擬的方法對溪洛渡地下電站主廠房拱頂一端送風的均勻性進行了研究,提出了實現均勻送風的手段,然後用相似模型實進行了,並此提出了均勻送風拱頂與非均勻送風拱頂的網路基元模型。
  17. The proof of the experiment isn ' t in the mumbo jumbo of the calculations

    這個試不是關于計算數字啊,跳躍啊這些東西
  18. The proof of the experiment isn ' t in the mumbo jumbo of the caicuiations

    這個試不是關于計算數字啊,跳躍啊這些東西
  19. Validates the service broker data in the database

    庫中每個索引視圖的內容
  20. The model minimizes the risk of tampering with the authorization data so that servers do not spend more time in verifying the data

    這個模型將篡改授權數的風險降至了最低,因此服務器不用花費大量的時間來了。
分享友人