搜查合法 的英文怎麼說

中文拼音 [sōuzhā]
搜查合法 英文
legality of search
  • : 動詞1. (尋找) collect; gather2. (搜查) search; ransack
  • : 查名詞1. [植物學] (山查) hawthorn; haw2. (姓氏) a surname
  • : 合量詞(容量單位) ge, a unit of dry measure for grain (=1 decilitre)
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 搜查 : search; ransack; rummage; seek
  1. Firstly, the connected end sets of the relay lines are got using the breadth first search algorithm and the connected relationship of wiring terms is got in the electrical circuit diagram according to different cad block structure of different element type. secondly, the appropriate specification of the relay element is chosen by using the equinoctial graph algorithm, and the panel layout diagram is generated automatically by the combining automatic layout and manual intervention. finally, the optimized path algorithm which passes each vertex in the completed non - directional graph once and only once is put forward, this algorithm and the prim minimum spanning tree algrotithm can generate the inner panel wiring diagram and terminal wiring diagram automatically

    首先,採用廣度優先索演算找電氣原理圖中的連通導線端點集,並根據不同類型的繼電元件對應的cad圖塊結構的不同,得到電氣原理圖中元件接線端子之間的連接關系;其次,根據二分圖匹配演算為電氣原理圖中繼電元件選擇適的型號和規格,並採用人工干預和自動布置相結的方完成屏面布置圖的自動生成;最後,提出了完全無向圖中經過每個頂點一次且僅一次的優化路徑演算,利用該演算和經過預處理的prim最小生成樹演算自動生成屏內安裝接線圖和端子接線圖。
  2. The fourth amendment forbids unreasonable searches and seizures

    美國憲第四修正案禁止不理的和抓捕。
  3. Acting on the intelligence gathered by the organized crime and triad bureau ( octb ) of the hong kong police, the immigration and customs enforcement agency of los angeles, the united states, intercepted a container from hong kong in the early morning on february 24 this year

    根據香港警方有組織罪案及三會調集的情報,美國洛杉磯移民及海關執局于本年二月二十四日清晨截獲一個來自香港的貨櫃。
  4. As a result of these, this research consult the scholars ’ research, add up my understanding, defined the quality of work life. according to it, on the basis of reviews of quality of work life studies, we make a tentative research on it. first, we collected the items for the measure by visiting, open questionnaire ; we developed a seven - component construct of quality of work life

    鑒於此,本研究在國內外學者以往研究的基礎上,結我國企業的實際情況,界定工作生活質量的概念,並以此定義為依據,在集國內外相關文獻資料的基礎上,採用開放式問卷調、訪談等方,編制了企業員工工作生活質量問卷,提出並驗證了工作生活質量的七維結構模型。
  5. The methods of rra and pra were used in the evaluation study, and the reserch methods consist of secondary data collection, individual interview, group interview, questionnaire survey, scoring and ranking, and case study

    本研究主要以快速農村評估( rra )和參與式農村評估( pra )理論框架為指導,結案例研究,對糖廠10月份開榨配套技術進行研究。具體研究方包括二手資料集、個體訪談、小組訪談、問卷調、打分排序和案例調等。
  6. Based on the background above - mentioned, for enhancing the level of management on sar which is an international commonweal, this paper analyses the situation of guangzhou salvage, and research the management and assessment of sar. first, it explicate the meaning of sar and its main methods of scientific management, using the historical rescue data of 28 years of guangzhou salvage, and made analyses and forecast on the salvage by kinds of methods. second, with the aid of fussy comprehensive assessment, it made concrete analyses and evaluations on the rescue scope and rescue ability by expert investigation, statistics and analyses. it complete scientific deployment of the professional rescue establishment

    正基於上述背景,為提高海上救這個不以盈利為目標的國際性公益事業的管理水平,本文以廣州海上救助打撈局海上救問題為對象,研究海上救管理及其能力評價,首先,闡述了海上救及其管理的主要方,以廣州救撈局28年的歷史數據為基礎,用多種預測方對海上救進行分析和預測;其次,通過專家調、統計和分析,通過模糊綜評判方對所轄救水域和救能力進行具體的分析和評價,完成了專業救設施的科學部署;最後,為改進完善救撈體系,進一步提高救能力闡述了建議。
  7. . . he ' ll give us a righteous warrant

    . . .那他就會給我們個
  8. He ' ll give us a righteous warrant

    .那他就會給我們個
  9. General method of similar sequence mining based on time series is to transform time series into discrete character series and cluster them into different sets, then compute the euclidean distance between querying series and these sets to measure their similarity

    摘要時間序列數據庫中相似子序列的索,常用滑動窗口、分形插值逼近等方將時間序列分割成各子序列,線性擬各分段子序列,計算詢序列與各子序列的歐氏距離,滿足距離閾值條件的為相似子序列。
  10. Hotel completed, the tourism bureau under the direct jurisdiction of a separate self - financing enterprise. hotel management model based on the jinjiang star hotel management model, and in the establishment, management personnel deployed at all levels took to beijing hotel training

    本文通過作者對正明錦江酒店的實地調研究,集大量的現場資料和報告,一切從實際出發,採用調研究,文獻資料綜和比較分析
  11. Desk is one of the most significant software developed by the center for information security and cryptography " cisc " of the department of computer science of the university of hong kong. it was originated from one of the collaboration projects between cisc and the hong kong police force and was first launched in 2001. desk is a multilingual software the supports english, traditional chinese, simplified chinese and japanese

    數鑒多種語言鑒證軟體可協助執人員尋審獲取及分析電腦文件檔案,於2001年首次由香港警務處及香港大學資訊保安及密碼學研究中心作研發,軟體經不斷改良后,被本地及海外政府部門和大學採用,為香港大學計算機科學系之資訊保安及密碼學研究中心其中一項研發之重要軟體。
  12. Ways and methods of searching information of traditional chinese medicine on internet are described in five aspects, such as the websites of traditional chinese medicine, home pages of traditional chinese medicine colleges, biomedical information networks, medical search engines and directories, and other searching engines and information networks

    摘要本文從五個方面概述了在因特網上找中醫藥信息資源的途徑,包括從中醫藥學專業網址中找,從中醫院校的主頁上找,從生物醫學信息網路中找,利用醫學索引擎與目錄找,利用通用檢索工具和綜性網路找,並簡單介紹了使用方
  13. It also shows the two principal methods to measure and evaluate the extent of equity, and summarizes the gains and losses, the success and failure that china has made during the decades of planning economy and socialist market economy. after that, the thesis makes an empirical study on the status of equity and efficiency and their relationship in some other countries in the world. at last, using the experience on the issue of equity and efficiency of other countries for reference, and employing the fundamental principles of marxism " political economics and the general approaches of the western economics, the thesis analyzes and demonstrates the issue of equity and efficiency during the process of modernization in china, and proposes the view that china should realize the sound interaction of equity and efficiency basing itself upon the reality and taking a broad view of the future

    本文採取理論研究與實證分析相結的方,在集和閱了大量國內外文獻資料的基礎上,詳細介紹了國內外關于效率與公平的概念、分類和相互關系的認識、主張和觀點,介紹了對公平度進行評價的兩種主要方,總結了中國幾十年計劃經濟和社會主義市場經濟的得失成敗,並對世界主要國家公平與效率的狀況及其結狀態進行了深入的實證研究,在借鑒世界各國關于效率與公平問題的實踐和經驗教訓的基礎上,運用馬克思主義政治經濟學的基本原理,借鑒西方經濟學的一般方對中國現代化進程中效率與公平的問題進行了全面、嚴密的分析與論證,提出了社會主義初級階段正確處理公平與效率問題的思路和原則及「立足現實,著眼長遠,實現公平與效率良性互動」觀點。
  14. The ids works by two way, misuse detection and anomaly detection, misuse detection flags an intrusion on intrusion signature, this kind of detecting technic can be realized much more easily, and much more accurate, but it can not find some intrusiones that have been disguised or new kinds of intrusion. the anomaly detection can detect in more wide field, anomaly detection can compare new statistic data with average record, then anomaly record will be found, but it ' s more difficult to set a threshold, if the threshold is too big, some intrusion may be put through, if the threshold is too small, the ids will give more false positive alarm, and the threshold will be different with different people or different period, so the ids just simply show us their suspicious record, the administrator or expert will be in duty to analyze this record and give conclusion, the ids give more alarm than it should, leave us more detection record to analyze, and this is a hard work, we can not distinguish an intrusion or not if we analyze only one record, but we can judge if we find the relation among mass detection evidence. in this article, we try distinguish an intrusion using d - s theory ( proof theory ) instead using manual work, the ids will be more helpful and efficient

    濫用檢測採用的是特徵檢測的方,實現較為簡單,判斷的準確性較高,但是不能判斷一些經過偽裝的入侵或特徵庫中尚未包含的入侵,異常檢測能夠根據以往記錄的特徵平均值,判斷出異常情況,但是對于異常到什麼程度才視為入侵,這個閥值非常難以確定,閥值設定的太高,有可能漏過真正的入侵,如果設定的閥值太低,又會產生較高的誤警率,而且這個閥值因人而異,因時而異,因此現在的入侵檢測系統把這部分異常記錄以一定的形式顯示出來或通知管理人員,交給管理人員去判斷,而這些ids系統難以判斷的記錄,如果對每個證據單獨地進行觀察,可能是難以判斷是否是入侵,而把許多先後證據關聯起來,專家或管理人員根據經驗能夠判斷訪問的性,本文試圖引入人工智慧中證據理論的推理策略和示例學習方,代替人工檢分析,可以提高效率,降低誤警率,並可以對一個正在進行得可疑訪問實現實時檢測,通過索及時判斷,及時阻斷非訪問,比事後得人工處理更有意義。
  15. The district anti - triad squad of mong kok, which took up the investigation, raided the office at about 2. 30 pm today and arrested the five men, aged between 20 and 30, for criminal intimidation and unlawful detention. they are still being detained for further questioning

    旺角警區反三會行動組接手調后,今日下午二時三十分突擊該公司,並拘捕五名年齡介乎二十至三十歲的男子,他們涉嫌刑事恐嚇及非禁錮。
  16. In practice, occasions when in vestigative organs misuse the power of investigation and encroach on the legal interests of the criminal suspects and other interested people often arise when the organs are implementing acts of investigation, for example, extorting a confession by torture in interrogating the suspects, or taking evidence by violence in inquire the witnesses

    而從實踐看,偵機關濫用偵權,侵犯犯罪嫌疑人和其它利害關系人權益的情形,往往就是出現在偵機關實施偵行為的時侯,如在訊問犯罪嫌疑人時刑訊逼供,在詢問證人時暴力取證,進行非、扣押等等。
  17. Reviewing the history of virtual community and educational virtual community by exploring a great deal of literature and synthesizing the present developmental condition of virtual instructional research in the world, this thesis probes into the process of coming into being and developing of virtual instructional research. on the basis of literature search, synthesis, analysis, the paper selects three representative cases and then analyzes them carefully. by combing the outcome of a questionnaire, this paper deduces the character and function of virtual instructional research

    本研究首先通過文獻閱的方,從虛擬社區及教育虛擬社區的歷史發展入手,並綜國內外虛擬教研活動的現狀調,探討虛擬教研活動的產生與發展;其次,通過文獻索、歸納、分析,選擇國內開展虛擬教研活動的三個典型個案,開展訪談,進行深入的解剖,結調問卷的分析,揭示了當前我國中小學虛擬教研活動的四大特點和四項主要功能,並從兩個方面對虛擬教研活動的組織管理方式進行了探討:虛擬教研活動相比常規教研活動而言,其特點是: ( 1 )教研活動的主體發生變化; ( 2 )教研活動的環境發生變化; ( 3 )教研活動的內容與目標發生變化; ( 4 )組織方式的變化。
  18. Instead, iraq planned to use the declaration, overwhelm us and to overwhelm the inspectors with useless information about iraq ' s permitted weapons so that we would not have time to pursue iraq ' s prohibited weapons

    相反,伊拉克計劃利用他們的報告來說服我們,使核人員只能得到伊拉克武器的一些無用信息,使我們沒有時間來尋伊拉克的違禁武器。
  19. For information about how client and server search time - outs work with query paging in the directory, see the documentation of the search methods for the provider for active directory

    有關客戶端和服務器索超時設置如何與目錄中詢分頁配使用的信息,請參見有關active directory提供程序的索方的文檔。
  20. In the last few months, my department worked closely with the airport authority ( aa ), airlines, tenant restricted area operators, the aviation security company ( avesco ) and various government law enforcement agencies to implement increased security measures at hkia, including secondary search of passengers and their carry - on bags, increasing vigilance, patrol and guarding, etc. security directives were issued to prohibit the carriage of knives or bladed items into the airport restricted area and the aircraft cabin

    在過去數月以來,民航處與機場管理局(機管局) 、各航空公司、租戶專用禁區經營者、機場保安有限公司(機場保安公司)和政府各執機構緊密作,加強香港國際機場的保安措施,其中包括對乘客和他們的攜身行李執行第二次,加強戒備、巡邏和守衛等行動。我們亦發出了保安指令,禁止乘客攜帶刀或有刀刃的物品進入機場禁區和機艙范圍。
分享友人