罪識別 的英文怎麼說

中文拼音 [zuìzhìbié]
罪識別 英文
croidentification
  • : Ⅰ名詞1 (犯法的行為) crime; guilt 2 (過失) fault; misconduct; blame; wrongdoing 3 (苦難; 痛苦...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • 識別 : 1 (辯別; 辯認) discriminate; distinguish; discern; tell the difference; spot 2 [計算機] identif...
  1. Facial representation and recognition is one of the key issues in pattern recognition, computer vision, and image understanding fields. it is widely applied to numerous commercial and law areas, such as mug shots retrieval, real - time video surveillance, security system and so on

    人臉的表示和技術是模式、計算機視覺和圖像理解系統的研究熱點之一,在公安和安全部門有著廣泛的應用,例如搜索犯、動態監視、銀行密碼系統等。
  2. In this part, the author mainly elaborates the three main problems easily confused during practice on the criminal pattern, determination of the drug transport drugs and the punishment standard, makes in - depth analysis on differing viewpoints and finally attempts to unify the different understanding and work methods during practice

    在這一部分,筆者主要就運輸毒品的犯形態、共同犯與同時犯的區、運輸毒品不能犯的認定及處罰標準三個實踐中應用較為混亂的問題,結合各種不同的觀點進行了剖析,試圖統一實踐中不同的做法和認
  3. Network forensics is an important extension to present security infrastructure, and is becoming the research focus of forensic investigators and network security researchers. however many challenges still exist in conducting network forensics : the sheer amount of data generated by the network ; the comprehensibility of evidences extracted from collected data ; the efficiency of evidence analysis methods, etc. against above challenges, by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic, the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence. at the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. experimental results show that the system can classify most kinds of events ( 91. 16 ? correct classification rate on average ), provide analyzed and comprehensible information for a forensic expert and automate or semi - automate the process of forensic analysis

    網路取證是對現有網路安全體系的必要擴展,已日益成為研究的重點.但目前在進行網路取證時仍存在很多挑戰:如網路產生的海量數據;從已收集數據中提取的證據的可理解性;證據分析方法的有效性等.針對上述問題,利用模糊決策樹技術強大的學習能力及其分析結果的易理解性,開發了一種基於模糊決策樹的網路取證分析系統,以協助網路取證人員在網路環境下對計算機犯事件進行取證分析.給出了該方法的實驗結果以及與現有方法的對照分析結果.實驗結果表明,該系統可以對大多數網路事件進行(平均正確分類率為91 . 16 ? ) ,能為網路取證人員提供可理解的信息,協助取證人員進行快速高效的證據分析
  4. The government s foresight programme which sets an agenda for future action on science is working out new strategies in flood and coastal defence, exploiting the electromagnetic spectrum ; in cyber - trust and crime prevention, in addiction and drugs, the detection and identification of infectious disease, tackling obesity, sustainable management of energy and mental well - being

    政府的前瞻計劃為科技制定了未來的行動議程。該計劃要制定出有關應對洪水和海岸防護、開發利用電磁頻譜、線上安全機制及犯預防、成癮與毒品、傳染性疾病的檢測與、解決肥胖問題、可持續能源管理以及心理健康的新戰略
  5. But what is not allowed to neglect of is that along the high speed economic developing, especially in the turn of new and old system the economic environment is more complicated. people ' s thought and mind increasingly diversified. so some units " internal control and management have been weak and some new economic crime cases appeared which bring some business enterprise big financial risk and existing risk

    但不容忽視的是,在經濟高速發展的同時,特是在新舊體制轉換過程中,經濟環境趨于復雜,人們的思想意日益多元化,一些單位內部控制薄弱,管理鬆弛的情況逐漸暴露,出現了一些新型的經濟犯案例,給企業帶來巨大的財務風險和生存風險。
  6. And it highlights some core differences between new age and christian thought, particularly regarding the concepts of god, jesus and sin. new age movement

    並且,研究著重強調了「新時代運動」和基督教教義之間的一些本質區,特是在對于上帝耶穌和惡的認方面。
  7. Indeed, it can be difficult to identify new kinds of fraud as criminals become ever more creative

    而事實上,犯欺詐手段不斷番新,要想有效確實很困難。
  8. After discussing the relations and differences between the nature of consciousness of social damage and the consciousness of being against law, the present paper explains its own viewpoint : consciousness of social damage is not the major component of deliberate crime, through the discussion on the consequence led by the condition that consciousness of social damage is the major component of deliberate crime

    本文在了解了社會危害性認的實質與違法認的聯系與區后,通過論述犯故意成立以社會危害性認為構成要件將導致的不利後果闡釋了自己的觀點:社會危害性認不是犯故意的構成要件。
  9. If the behavior were to be judged as intellectual property crime, the man who acts as such shoud have the intention infingement and it woud be possible that he can know the illegality of his behavior. this kind of crime have the following 3characters in the objective area. fistly, the action violate the intellectual property law and regulation, secondly the man utlizes others intellectual property law and regulation without being permmited

    在個客觀方面的特徵的論述中,假冒注冊商標犯中是否是「同一種商品」應從消費者的角度加以判斷;假冒專利中暇冒他人專利」的范圍應該是指未經專利權人許可,為生產、經營目的,用其它產品冒充他人的專利產品,或用其它方法冒充他人的專利方法;在假冒他人注冊商標中,如果假冒他人注冊商標的商品同時又是偽劣產品,則一般構成牽連犯。
  10. The article introduced thoroughly the different theories carried out by domestic lawful circle to the object of this crime and introduced alternatively the related abroad theories. on this basis, the author adopted the matters of analogy to point out that the objects including natural property and lawful property and expounded it deeply, therefore, form a new knowledge to the object of this crime. in the first part, the author discussed systematically the definition, characteristics, standard and classification of the object in embezzlement crime, and introduced emphatically one of the characteristics of the object ? the characteristic of “ other ’ s property ” and the academia ’ s two perspectives : “ the subordinate doctrine ” and “ the independent doctrine ”

    本文採用分類類比的方法,在對侵占對象基礎理論全面分析的基礎上,介紹了世界其他國家對侵占的犯對象的不同認,將侵占的犯對象分為自然屬性和法律屬性兩大部分並做了具體闡述,主要對種類物、違禁品、贓物、遺忘物、埋藏物等作為侵占對象的各種財物在認定犯時所涉及的問題進行了深入地闡述,釐清了侵占與盜竊的界限,分析了侵佔行為與不當得利行為的區
  11. First of all, to the mainland law is fastened that the criminal law a learned man handles the unpack criticizing that fact error some kinds of doctrines have been carried on the profile to that section, to think in the handle identical constitutes in the fact error inner place the important document, legally to accord with the teachings to accord with teachings more rightful than concrete ; be living to handle in the fact error that the difference constitutes between the important document, legally accord with the teachings to accord with teachings more advisable than abstracting. afterwards, doctrine over the combination, elaborate the target error separately. strike error and the causation error handle

    首先,該部分對大陸法系刑法學者處理事實認錯誤的幾種學說進行了簡要的評析,認為在處理同一構成要件內的事實認錯誤上,法定符合說比具體符合說更為合理;在處理不同構成要件間的事實認錯誤上,法定符合說比抽象符合說更為可取。然後,結合以上學說,分闡述了對象錯誤、打擊錯誤和因果關系錯誤的處理原則,並著重翻退了我國刑法學界爭議較大的同一構成要件內的打擊錯誤的處理原則,主張在發生同一構成要件內的打擊錯誤的情況下,行為人應對實際發生的侵害結果承擔故意既遂的責。
  12. Dealing with a concrete problem, we can define the nucleus element by the way of dematel and design an automation analysis system on crime cause of formation analysis. grey forecast model and method are used in crime forecast. we design crime of automation forecast system, base on grey forecast model

    針對一個具體的問題,在眾多的影響因素中採用dematel方法主要因素,從而確定系統的核心因素,並設計出犯成因分析的自動化分析系統;對犯預測採用基於灰色系統理論的灰色預測模型和方法,在建立合理的犯趨勢的灰色預測模型的基礎上,設計出犯預測的自動化預測系統。
  13. The section sums up the main problems and expounds the four focuses : 1. the time for the constitution of the joint crime of kidnapping by force ; 2. the mistakes of the joint crime of kidnapping by force ; 3. the constitution of the discontinuation of the crime for individuals in the joint crime of kidnapping by force ; 4. the criminal liability in the joint crime of kidnapping by force

    本部分集中歸納並論述了綁架在司法實務中與共同犯的認定有關的四個焦點問題: 1 、綁架中成立共同犯的時間界點; 2 、綁架共同犯中的認錯誤; 3 、綁架共同犯中,對個共犯人犯中止的認定; 4 、綁架犯中,共同犯人的刑事責任問題。
  14. As an example, ids monitors and records significant events on a specific computer or from the network examining data and providing an “ after the fact ” forensic ability to identify suspect activity

    比如說, ids監視並記錄某一特定計算機或來自具有調查數據並能提供可疑活動「犯之後」的偵破能力的網路上的重要事件。
  15. The second day centred upon intellectual property crime and the last day targeted financial crime

    至於第二及第三日的主題則分是知產權行及金融行。
  16. Chapter two is about the dematel model and methods of distinguishing and analyzing elements and the application of dematel method used in cause of formation analysis of crime

    第二章論述了因素與分析的dematel模型和方法,探討了dematel方法在犯成因分析中的應用。
  17. How infinite and inexpressible a blessing it is, that the knowledge of god, and of the doctrine of salvation by christ jesus, is so plainly laid down in the word of god ; so easy to be receiv d and understood : that as the bare reading the scripture made me capable of understanding enough of my duty, to carry me directly on to the great work of sincere repentance for my sins, and laying hold of a saviour for life and salvation, to a stated reformation in practice, and obedience to all god s commands, and this without any teacher or instructer ; i mean, humane ; so the same plain instruction sufficiently serv d to the enlightning this savage creature, and bringing him to be such a christian, as i have known few equal to him in my life

    我覺得關于對上帝的認和耶穌救人的道理,在聖經中寫得這樣明明白白,這樣容易接受,容易理解,這對人類實在是一種無限的難以言喻的幸福。因為,僅僅閱讀聖經,就能使自己認到自己的責任,並勇往直前地去擔負起這樣一個重大的任務:真誠地懺悔自己的行,依靠救主耶穌來拯救自己,在實踐中改造自己,服從上帝的一切指示而所有這些認,都是在沒有人的幫助和教導下獲得的這兒的"人" ,我是指自己的同類-人類,而只要自己閱讀聖經就能無師自通。
  18. The objective requisite of the crime. the author explains the objective features of " by his duty ' s convenience ", " utilizing the public fund for his own purpose " and the different purposes of the crime etc, and makes particular probe into the features and requisites of " misappropriating public funds for unit utilization " and " misappropriating public funds in the name of the unit ". the subject of the crime

    關于挪用公款的客觀方面,作者主要論述了「利用職務上的便利」 、 「歸個人使用」及三種不同的用途這些客觀特徵,其中特對「歸個人使用」表現形式中的「個人」與「單位」 , 「以個人名義將公款供其他單位使用」及「個人決定以單位名義將公款供其他單位使用,謀取個人利益」三個問題進行了探討,以期加深人們對該客觀方面的認
  19. In general, the main aspects are the followings : the great stimulation to the terrorists given by the modern propaganda and medium ; ethnic contradiction, racial conflicts and religious problem ; the loose administration on arms and ammunition in so many countries ; hegemonism, especially the state - strategy of some big powers, and the increasing gap between the north and the south. the rich countries become even richer, the poor countries much poor. all these political, economic and ideological problems are the basic reasons of international terrorism

    民族矛盾、種族沖突和宗教問題是當今世界導致恐怖主義犯的最主要原因;當今世界許多國家的恐怖活動猖獗,與其軍火管制方面存在的疏漏是分不開的;大國主義、霸權主義特是一些大國實行的國家戰略以及南北經濟差距的拉大,導致的富國越富,弱國越弱,這些政治、經濟以及意形態等方面的問題,是導致國際恐怖主義犯的根本原因。
  20. The detection of deception is extremely important for ascertaining facts in the police interrogation, for the veracity of suspects " confessions usually decides the proper solution of a case

    嫌疑人供詞的真實性通常決定著案件能否成功破獲,因此,在訊問中嫌疑人是否在撒謊十分重要。
分享友人