密則 的英文怎麼說

中文拼音 []
密則 英文
meas chey
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
  1. Based on the frequent occurrence of international aerial crimes, the rampancy and cruelty of criminals and the reality of brutal consequence, the essay analyses the features of the crime of aircraft hijacking, the crime of imperiling international civil aerial security and the crime of obstructing international aerial navigation with the component terms from three important international conventions on punishing aerial crimes in order to help people to appreciate the appearance and the essence of typical international aerial crimes deeply, to regard the motion of the crimes and to overwhelm the offence forcefully. based on the core of the legislative status of international civil aerial security, the jurisdiction of the aerial crimes, one emphasis of the article is to clarify concrete clauses on jurisdiction in the three conventions and analyses the important principle of " aut reddere, aut punire ". based on the problems on the jurisdiction of crimes in international society, it quests the implementation of t he principles of jurisdiction, pleading and extradition in the three conventions deeply

    基於目前國際社會航空犯罪時有發生,犯罪分子猖獗狠毒,危害後果十分殘重的現實,本文從國際社會關于懲治航空犯罪的三個重要國際公約(東京、海牙、蒙特利爾公約)中規定的各種航空犯罪的定義入手,深入展開了對劫持航空器罪、危害航空器飛行安全罪、危害國際民用航空機場安全罪的犯罪特徵及其構成條件的分析,以期幫助人們更深刻認識這些典型的國際航空犯罪的表現及其實質,嚴注視這些犯罪的動向,對其進行及時有力的打擊;鑒于國際民用航空安全法律地位問題的核心是解決航空犯罪的管轄權問題,本文重點闡釋了三個公約關于管轄的具體規定,並側重分析了「或引渡或起訴」的重要原;鑒于目前國際社會打擊國際航空犯罪管轄方面存在諸多實際問題,本文對公約規定的管轄、起訴、引渡原的實現方式作了深入探討;鑒于各國在國內立法上對于空中犯罪的懲治、對違約國的制裁、對這類犯罪的預防措施等方面存在一些漏洞,本文根據目前掌握的一些資料,在獨立思考的基礎上,提出了一些不成熟的看法及建議,以期對國際社會懲治航空犯罪貢獻自己微薄之力。
  2. Manjushris left handholds a magnificent blue lotus flower in full bloom, on which rests the prajnaparamita sutra great wisdom sutra. the lotus in full bloom represents the promise from manjushri that we can rise from the mud of delusion and afflictive emotions if we follow the teachings of the buddha. then ultimately, through actualizing and meditating on the great wisdom sutra, attain full enlightenment

    ?左手持盛開著的蓮花上方托著般若波羅多經盛開的蓮花象徵著如果眾生能夠依循?的教法將能顯現本有的清靜菩提心而透過修持般若波羅多經我們能證得空性獲得圓滿佛果。
  3. The algorism can be used to all the region of the fingerprint image with good performance, especially to non - regular orientation areas

    該方法在指紋圖像的各種區域都適用,很好的解決了不規區域紋線度的提取問題。
  4. Half of all cars on east anglian roads rejoiced in a pet name compared with just 31 percent of cars in the southeast

    而英國東盎格魯地區有將近一半的車主喜歡用親的愛稱來稱呼自己的汽車。
  5. In the search for site - dependent characters, the different design elements can be identified in the language and ideas of the office ' s landscape architecture : the poetic planning approach ; the reutilization of proven design principles ; the archaeological search for original features of a place ; the concept of the garden as a theme garden ; the concept of the " openly architectonic " ; the concept of " emptiness " ; and the " production line " concept

    在追尋場地特性的過程中,賴納?施特教授及其事務所的規劃思想和設計語言可以歸納為:詩意的規劃方法;已被證實的設計原的再利用;對場所原有特徵的考古學研究的應用;將花園設計成一個主題式花園的概念;直接利用建築結構組織空間的概念; 「空」的概念; 「流水線」的概念。
  6. It ' ll remain a secret unless someone blabs

    除非有人泄漏出去,否這永遠是個秘
  7. We use fuzzy mathematical morphology to remove noise and dust which can lower noise successfully and also make up a loss of intensity caused by fluorescence blench. to acquire the target region, we purpose automatic gridding method based on image segmentation for image with irregular spots, it ' s segmentation through threshold. this method is presented simply and fast

    在網格定位中,本文針對信號點不規的晶元圖像提出了基於圖像分割的自動定位方法? ?閾值分割,該方法簡單快速,但對于光度分佈不均勻的信號點,可能會去掉部分微弱信號,降低了計算的準確性。
  8. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章介紹了電子提單的安全認證機構,第五章介紹了信息加技術以及各國立法對碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  9. Electronics engineers build their models with breadboard circuits, using the laws of physics to determine expected values for various properties and then precision instruments to measure actual values

    電子學工程師通過電路試驗板建造模型,運用物理學法確定不同屬性的期望值,然後使用精儀器來測量出實際值。
  10. True to use an optimized cache key ; otherwise,

    如果使用經過優化的緩存鑰,
  11. Thermodynamical fluctuation of number density of particles in grand canonical ensemble of perfect systems

    理想體系巨正系綜中粒子數度的熱力學漲落
  12. At a definite temperature a mesoscopic circuit isnt in a determinate quantum state instead of in the mixed state ( or statistical state ). using the density matrix of the canonical ensemble, we have deduced the formulate of the quantum fluctuations of both charge and current in a non - dissipative mesoscopic coupled circuit. and the dependences of the quantum fluctuation of the circuit on its temperature have obtained

    在有限溫度下,介觀電路系統實際上並不處在一個確定的量子狀態,而是處在混合態.根據正系綜的度矩陣導出耦合互感電路中電荷和電流的量子漲落,得到了量子漲落與溫度的依賴關系
  13. For the contributors it is cathartic. for voyeurs, it is a chance to feed on the misery and despair ? or even the creativity and mischievousness ? of unknown people

    對吐者,這麼做有宣?滌清的效果;對逛網站的人得到機會,分享他人的喜怒哀樂。
  14. The others seemed like archangels of purity : they changed their clothes in front of me, bathed me when they bathed, sat me on my chamber pot and sat on theirs facing me to relieve themselves of their secrets, their sorrows, their rancors, as if i did not understand, not realizing i knew everything because i tied up the loose ends that they themselves left dangling

    其他人看上去就像純潔的天使長:她們當著我的面更衣,她們洗澡的時候讓我也跟著一起洗,她們讓我坐在我的夜壺上,她們坐在她們的夜壺上,對著我說出她們的秘、她們的憂傷、她們的仇恨,好像我不懂似的,她們不會想到我什麼都知道,因為我把她們說出的零零碎碎,都拼在了一起。
  15. Secretic granules in b cell are fairly big, cores are various. there is fairly big gap between the core and the limiting membrane ; the center of secretic granules in a cell exist compact core and there is no gap between the core and the limiting membrane ; secretic granules in d cell are too much, electron density of granules is lower, and there is no gap between the core and the limiting membrane, what ' s more, fairly big chondriosome can be seen in the cell

    B細胞的分泌顆王曉麗尼羅羅非魚胰島顯微和亞顯微結構的研究13粒較大,芯的形態多樣,電子度差異大,芯與界膜之間常有較大的空隙; a細胞分泌顆粒形態不規,芯的大小不等,界膜與芯之間無空隙; d細胞分泌顆粒較多,芯的電子度較低,界膜與芯之間無空隙,此外,胞質內可見較大的線粒體。
  16. Simulations over coding channel show that the more correct bits we know the better the performance is. the key point of constraint viterbi algorithm is how to provide the reliable constraint condition and make full use of it

    通過在編碼通道模型上的模擬表明,已知正確的約束位越多,分佈的越提高的性能越明顯。
  17. " but what if i am not liberated, " cried he, " and am detained here until my death ? this treasure will be lost. had not government better profit by it

    「假如,偏偏不講公道,我被老關在這間地牢里,假如我死在這兒而不曾告訴過任何人我的秘那個寶藏不是就白白地喪失了嗎? 」
  18. If that request is not encrypted, a hacker could use a network sniffer to steal the passwords of users authenticating including administrative passwords !

    如果該請求沒有加黑客可以使用網路嗅探器來竊取用於身份驗證的用戶碼(包括管理碼! ) 。
  19. Ciphertext is decrypted by submitting the key and the ciphertext to a decryption algorithm

    文的解密則通過將鑰和文提交給一個解演算法來完成。
  20. When the current document is not encrypted, the value of this property is

    如果當前文檔未加該屬性的值為
分享友人