概念分類 的英文怎麼說

中文拼音 [gàiniànfēnlèi]
概念分類 英文
concept classification
  • : Ⅰ名詞1 (大略) general outline 2 (神氣) manner of carrying and conducting oneself; deportment ...
  • : Ⅰ動詞1 (看著文字發出聲音; 讀) read aloud 2 (上學) study; attend school 3 (想念; 考慮) think...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : Ⅰ名1 (許多相似或相同的事物的綜合; 種類) class; category; kind; type 2 (姓氏) a surname Ⅱ動詞...
  • 概念 : concept; conception; notion; idea
  1. The first two methods are very user - friendly for users of all english levels. the root analogy method groups the metaphors according to metaphorical patterns which, on the lexicographical evidence, are important to the cognition of english speakers

    首兩種檢索方法簡單易用,適合任何英語水平人士使用而基本比搜尋則將隱喻以概念分類,有助並非以英語為母語的使用者對該等辭匯在層次上的加深認識,使其更能有效吸收英語辭匯。
  2. It starts with the definition of director, pointing out that director refers to the principal who has the rights to attend directorate meetings, participate in decision - making of company ' s important management affair and delegate the company, including board chairman, vice board chairman, executive director, director, administrative officer and syndic. at the same time, this article takes the legal status of director ( namely the relationship between director and company ) for the basis of establishing director liability. this kind of relationship has many theories such as entrustment, deputing and commission regarding to different legal culture tradition of different countries

    文章從董事的入手,認為董事是指有權出席董事會、參與公司重大經營事務決策、可對外代表公司的負責人,包括董事長、副董事長、執行董事、董事、行政長官、理事等,同時,認為董事的法律地位(即董事與公司的之間的關系)是我們確立董事責任的基礎,而其關系視各國法律文化傳統之不同有信託、代理、委任等諸多學說,都各有其道理,但筆者認為應定位為「法定」更為妥當。
  3. In the beginning of this thesis some basic principal theories, approaches and problems of data mining are introduced, followed by conceptions, categories and general thoughts of popular algorithms about association rule

    本文首先介紹了數據挖掘的基本、存在問題及發展方向。其次介紹了關聯規則析的基本及一些常見的演算法思想,並著重討論了一些經典的關聯規則演算法。
  4. The ga that this paper designed can deal with these problems well because of its simplicity, robustness and high searching efficiency. this paper first describes the conception of access network and passive optical network. then we introduce the architectur of poan

    在簡單介紹了接入網的基本、地位和作用后,析了無源光接入網的基本、工作原理、相關國際標準、典型的網路架構和拓撲結構。
  5. The first part is a brief introduction on franchising. it makes clear the definitions and forms of franchising

    第一部為特許經營述,主要介紹了特許經營的以及發展歷史。
  6. Drawing lessons from such methods that american scientists research the climatic features o f llj, combining c hinese w eather c haracteristics and c onsidering from vertical features of single station wind, we classified chinese southwest llsw, llj and low - level southwest strong wind without kernel in conception

    本文借鑒北美學者研究低空急流氣候特徵時的思想方法,同時結合中國的天氣特點,從單站風的垂直結構特點出發,對中國的西南低層大風、西南風低空急流、無核低層西南大風現象作了概念分類
  7. The imminence of the airport network construction is presented. the concept, classification and forming condition of hub airport, regional airport concept and its essentiality are discussed. suggestion of the national airport system overall planning and layout, including the aim and dimensions of the planning and layout, the structure of the national airport system, the regional airport planning and layout is presented

    指出了建立機場網路的迫切性,注重論述了樞紐機場的、形成條件以及支線機場的、重要性,提出對我國國家機場系統的總體規劃布局的建議,包括規劃布局的目標和規模、國家機場系統的格局、支線機場的規劃布局。
  8. Time service ; concepts, classification, terms and structure of timers

    報時業務.概念分類術語和結構
  9. In this article, we will study the conception, character, classifying, comparing between different crime states, the stopping form, the deadline for pursuing and when to calculate the first day, and finally we will talk about the question how the former code is applicable for this state

    本文擬從繼續犯的、特徵、繼續犯與相關罪數形態的比較、繼續犯的停止形態、繼續犯的追訴時效期限及其起算標準、繼續犯的溯及力問題入手,對繼續犯的相關理論進行研究。繼續犯的有廣義和狹義之
  10. In the thesis, the concept, classification and origin of standards of proof are generalized ; the logical characteristics of proof of china and western are revealed ; logic forms as well as advantage and disadvantage of the proofs of “ probability ”, “ beyond reasonable doubt ” and “ subjective truth ” is demonstrated

    本文述了訴訟證明標準的和淵源;揭示了中西證明標準的邏輯特點;論證了蓋然性、排除合理懷疑、客觀真實等標準的邏輯基礎及其優劣。
  11. By analysis of the concept, expression, classification and solution of the constraints, the method of parametric design for pattern is discussed further with an example of the front of qipao

    結合約束的、表示及其求解的析,並以旗袍前襟為例,對服裝紙樣參數化設計方法作了進一步的探討。
  12. First, this paper introduces the notation, categories and properties of security protocols, and formal methods to verify security protocols and small system model. the emphasis is the research and analysis of the principle of the model checking method. we study the mechanism and syntax of symbolic model checking tool smv, model check the authentication version of needham - schroeder public key protocol and woo and lam ij symmetric key protocol

    文章主要介紹了安全協議的和性質,安全協議的形式化驗證方法,以及小系統模型的原理;重點析和研究了符號化模型檢驗工具smv的原理和語法及其對安全協議進行模型檢驗時的工作機理,而且使用smv對needham - schroeder公鑰協議和wooandlam對稱鑰協議進行了形式化建模與模型檢驗,發現了它們的安全漏洞。
  13. It also shows the two principal methods to measure and evaluate the extent of equity, and summarizes the gains and losses, the success and failure that china has made during the decades of planning economy and socialist market economy. after that, the thesis makes an empirical study on the status of equity and efficiency and their relationship in some other countries in the world. at last, using the experience on the issue of equity and efficiency of other countries for reference, and employing the fundamental principles of marxism " political economics and the general approaches of the western economics, the thesis analyzes and demonstrates the issue of equity and efficiency during the process of modernization in china, and proposes the view that china should realize the sound interaction of equity and efficiency basing itself upon the reality and taking a broad view of the future

    本文採取理論研究與實證析相結合的方法,在搜集和查閱了大量國內外文獻資料的基礎上,詳細介紹了國內外關于效率與公平的和相互關系的認識、主張和觀點,介紹了對公平度進行評價的兩種主要方法,總結了中國幾十年計劃經濟和社會主義市場經濟的得失成敗,並對世界主要國家公平與效率的狀況及其結合狀態進行了深入的實證研究,在借鑒世界各國關于效率與公平問題的實踐和經驗教訓的基礎上,運用馬克思主義政治經濟學的基本原理,借鑒西方經濟學的一般方法對中國現代化進程中效率與公平的問題進行了全面、嚴密的析與論證,提出了社會主義初級階段正確處理公平與效率問題的思路和原則及「立足現實,著眼長遠,實現公平與效率良性互動」觀點。
  14. In modern time, japan had played a leading role in the social transformation, from which china had received a deep influence in its modernization of laws with its original terminology, classification and cases of insurance laws being nothing but a reproduction of japan ' s insurance laws

    由於近代以來日本在轉型過程中的表率作用,中國近代保險法最初的術語、、體例都是日本法的翻版。上述國家的保險法規對中國近代保險法立法取向、編篡體例、等產生了深遠的影響,是近代中國保險立法移植中主要的參考範本。
  15. Cycles. luggage carriers for bicycles. concepts, classification and testing

    自行車.自行車行李架.概念分類和試驗
  16. Chapter i expounds the fundamental theory on the interpretation of treaties, including the definition and classification of the interpretation of treaties, the main doctrines on the interpretation of treaties in international law academic, presents and comments on the relevant provisions regarding the interpretation of treaties of vienna convention on the law of treaties ( 1969 ), analyzes the special significance of the issue of the treaties " interpretation in the wto system, elucidates the system of the interpretation of the wto agreements and analyzes the interrelation between the legislative interpretation and judicial interpretation

    本文主文四章:第一章闡述了關于國際條約解釋的基本理論,包括條約解釋的,國際法學界關于條約解釋的主要學說、學派,對1969年《維也納條約法公約》關于條約解釋的規定作出述評,析了條約解釋問題在wto體制中的特殊重要性,闡述了wto的條約解釋體制,析了wto立法解釋和司法解釋之間的相互關系。
  17. With the coming of information age, more and more people realize the importance of information. useful information hidden in plenty of data needs mining energently. the technology of data mining arises and develops unders such circumstance. the main tast of data mining is to extract or mine the useful information from the data. we can get great amount of data from the computer transaction every day. the data is very useful for us to make decisions on management. the paper concludes and introduces association rule about its concept, sort, model and step for mining the data, measure and some basic algorithm on the basis of the at research. at the same time, we analyse hopfield - network ' smodel, character, energy - function, movement - equation and so on. moreover, to the requirement of the system of information of computer - saling, we have done the following and there are good result. fisrt, considering the weight and constraint, we propose the algorithm for the weighted and constraint association rule

    本文首先對數據挖掘中的關聯規則和神經網路的已有成果作了詳細深入的調研,歸納和整理了關聯規則的、關聯規則挖掘的模型與步驟、關聯規則的度量方法以及一些基本演算法;還歸納和整理了hopfield網路的模型、特徵、能量函數、運動方程等,並在此基礎上,結合電腦賣場信息支持系統提出的需求,做了如下工作,並取得了一定的成果和成效: ( 1 )考慮加權與約束兩種情況,提出了既帶權重又帶約束的關聯規則提取演算法。
  18. This essay is attempt to set forth the ec ' s definition, classification, characteristic development and tendency, mainly analyses the ec ' s impact and influence to the social economic. traditional tax theory and the way of tax management on theory and practice

    本文試從闡述電子商務的、特徵、發展演變及趨勢入手,著重從理論和實踐上析電子商務對社會經濟、對傳統稅收理論及稅收管理方式的沖擊和影響。
  19. The author has demonstrated the concept, classification, components and features of self dealing in light of the knowledge of ethics, economics and relevant laws and put forward some ideas to better the related stipulations in our country ' s corporation law on the basis of studying the valuable legislative experience of foreign countries

    作者利用相關的法律、倫理學和經濟學知識闡述了自我交易的、構成要件及特性,並在考察國外有益立法經驗的基礎之上,對完善我國公司法的相關規定提出了自己的一些看法。
  20. The paper discusses the development of web, browser / server mode conception and the content and mechanism of network security based on web, and also describes the basic conception and system of cipher theory, symmetric - based data encryption standard and advanced encryption standard and asymmetric - based rsa. it presents a detailed design of secrecy net of digital government, and advances a des - and - rsa - based security model of information exchange, which makes use of symmetric cryptographic algorithm to encrypt plaintext, and introduces public - key algorithm rsa to encrypt session key to compose digital envelope and to realize digital signature

    本文論述了web的發展及其browser / server模式,以及基於web的網路安全的內容與機制;闡述了密碼學的基本,對稱密鑰密碼體制des與aes以及公開密鑰密碼體制rsa ;最後,利用一種基於des和rsa的信息交換安全模型,詳細地給出了一個數字政府的保密網系統設計方案。
分享友人