證據的有效性 的英文怎麼說

中文拼音 [zhèngdeyǒuxiàoxìng]
證據的有效性 英文
competence of evidence
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 4次方是 The fourth power of 2 is direction
  • : 有副詞[書面語] (表示整數之外再加零數): 30 有 5 thirty-five; 10 有 5年 fifteen years
  • : Ⅰ名詞(效果; 功用) effect; efficiency; result Ⅱ動詞1 (仿效) imitate; follow the example of 2 ...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 證據 : evidence; proof; testimony
  • 有效性 : availability; effectiveness; validity; significance有效性檢查 validity check
  • 有效 : effective; valid; efficacious
  1. Combined with the foundation research ( avigation science fund 04d52032 ) ” study on cfar detecting expert system base on clutter tracking ”. this paper study the fractal technic and snake algorithm on the application of clutter tracking. it proved that the method was effective by the algorithm which adapt to the real and simulant clutter data

    本課題結合航空科學基金「基於雜波跟蹤融合恆虛警檢測專家系統研究」 ,研究分形技術和snake演算法在雜波跟蹤中應用,設計了相應演算法,通過分析真實數和模擬數了演算法
  2. The algorithm has been trained and tested on bacillus subtilis promoter dataset by the jackknife method

    對實際數集進行刀切法測試驗了演算法
  3. The legal effects of electronic evidence primarily mean that whether electronic evidence has evidence effect, and the meanings of evidence effect. the legal effects of electronic evidence specially include the evidence position, admissibility of evidence and probative force

    所謂電子法律力主要就是指電子是否具力,以及具什麼樣力,具體說主要包括電子地位以及電子可采明力問題。
  4. Technicans are trying to find out a more reasonable point to describe work state of pump for some reasonless factors of this model, the key technology of developing ads is on adopting a means by using theoretical calculation and curve fitting to build a reasonable pump state graph model, the model " s rationality based relations between pump efficacy and sinking depth is illustrated by restrict programme argumenting

    抽油增輔助決策系統開發,其關鍵技術在於採用理論計算及曲線擬合辦法,建立合理泵況圖模型,通過嚴格方案論闡明基於泵-沉沒度關系泵況圖模型合理。通過實際數,檢驗模型
  5. The simulation results further testify the correctness of the model and confirm the feasibility of the system. this paper also includes a velocity apparatus mainly based on doppler velocimeter. in this part the attention has been paid to the comprehensive effect of all kinds of factors that affects the precision of the doppler velocimeter, then a modification method for the original data for velocity computation has been given, as well as detailed formula for modification

    本論文中還介紹了一套以多普勒測速儀為核心測速系統,重點對影響多普勒測速精度各種因素進行了綜合分析,提出了對測速原始數進行修正方法,給出了具體修正公式,並利用這些公式進行了測速數修正計算機模擬,從而驗了修正
  6. The processing and graphical representation of aeroelectromagnetic data of over 30000 traverse kilometers demonstrate the effectiveness of the techniques, and the apparent resistivity images obtained reflect characteristics of shallow electric distrbution, thus providing new data for geological mapping

    通過對3萬多測線公里航空電磁數處理與圖示,明了方法,取得視電阻率圖像反映了各測區淺層電分佈特徵,為地質填圖提供了新
  7. The method to plan the manufacturing path directly from the measurement points is studied. in chapter five, several software modules are realized including copy milling module, cnc code interpreter, and a three - axis copy milling cnc system is developed. in chapter six, the experiment of copy milling and cnc milling is done, and the results of computer simulation and experiment verified the effectiveness of the method

    第六章一方面編制數控加工代碼,在所開發數控系統上進行數控加工,以驗數控加工系統;另一方面,對測量得到,經過仿型系統處理後生成加工路徑,進行仿型加工實驗,以驗仿型加工演算法和仿型功能實現
  8. Thispaperhasstudiedonthedatalinkinterfacetechniqueoftacticalcontrolsystem. firstof all, functional requirement and the important role of data link interface in tactical controlsystem is introduced ; secondly, with object oriented method, the characteristic of uav taskcontrol process is analysed, and then uav task control information model is established, anddata link interface standard of tactical control system is designed based on this model, including message format and transmission mechanism ; thirdly, data link control module isdesigned based on embedded linux operating system and has realized conversion betweendata link standard interface and the private interface of uav data link ; and then, combinationreal time corba middleware and its event channel, data link control modular componenttechnology is studied, and realization scheme is put forward ; finally, demostration is madebased on prototype of tactical controlsystem, which verify the validaty of data link interfacestandardandembeddeddatalinkcontrolmodules

    本文對戰術控制系統中鏈介面技術進行研究:分析了數鏈介面在戰術控制系統中功能需求;採用面向對象方法,分析無人機任務控制問題,建立了無人機任務控制信息模型,並基於該模型設計了數鏈介面通信協議,包括報文格式和傳輸機制;基於嵌入式linux系統設計了數鏈介面控制模塊,實現了數鏈標準介面與無人機數鏈私介面之間相互轉換;結合實時corba中間件及其事件通道,研究了數鏈介面控制模塊組件技術,並給出了實現方案;通過戰術控制原理實驗系統演示實驗,驗了數鏈介面通信協議和嵌入式數鏈介面控制模塊
  9. Network forensics is an important extension to present security infrastructure, and is becoming the research focus of forensic investigators and network security researchers. however many challenges still exist in conducting network forensics : the sheer amount of data generated by the network ; the comprehensibility of evidences extracted from collected data ; the efficiency of evidence analysis methods, etc. against above challenges, by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic, the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence. at the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. experimental results show that the system can classify most kinds of events ( 91. 16 ? correct classification rate on average ), provide analyzed and comprehensible information for a forensic expert and automate or semi - automate the process of forensic analysis

    網路取是對現網路安全體系必要擴展,已日益成為研究重點.但目前在進行網路取時仍存在很多挑戰:如網路產生海量數;從已收集數中提取可理解;分析方法等.針對上述問題,利用模糊決策樹技術強大學習能力及其分析結果易理解,開發了一種基於模糊決策樹網路取分析系統,以協助網路取人員在網路環境下對計算機犯罪事件進行取分析.給出了該方法實驗結果以及與現方法對照分析結果.實驗結果表明,該系統可以對大多數網路事件進行識別(平均正確分類率為91 . 16 ? ) ,能為網路取人員提供可理解信息,協助取人員進行快速高分析
  10. First of all, we bring forward the basic project of tadil, which adapts to combined operations. it is suggested to use tdma ( the abbreviation of time division multiple access ) as the working pattern and utilize the concept of mobile ad hoc network to construct the data link network. aiming at the impact of time delay on data link and the characteristic of cooperative combat under the command of director aircraft, this thesis applies a kind of kalman filtering algorithm in polar coordinates to compensate the error of time delay, and then does the transformation of target motion parameters to obtain the current information of target

    本文結合空軍裝備部某「十五」預研課題,圍繞著戰術數鏈、多機協同多目標攻擊、超機動攻擊、空對地攻擊這四個方面展開了一系列研究工作:本文首先給出了適應三軍聯合作戰戰術數鏈系統基本方案,建議採用時分多址工作模式,並利用移動自組織網路概念構建數鏈網路,同時針對數鏈傳輸信息時間延遲特和指揮機指揮下多機協同作戰特點,應用一種極坐標系下卡爾曼濾波演算法對該傳輸延遲誤差進行補償,並在此基礎上進行目標運動參數轉換,以獲得目標相對于某無人機當前運動信息,且利用模擬驗了方法
  11. The reduction request knowledge of background and meet with standard of data mining. decisive tree algorithm of id3 is used to prove the validity of feature reduction and to generate intrusion detection rules

    粗糙集約簡具扎實數學理論基礎,不需要背景知識,符合數挖掘要求。用id3決策樹演算法去印約簡和檢測時間率並生成檢測規則。
  12. Many experiments on the effects with the change of several parameters, such as initial charging current, amplitude and frequency of positive pulses, variety of the amplitude of positive pulses among each charging stages, amplitude and duration of negative pulses, duration between positive and negative pulses, have been performed. the results of analysis and comparison of experimental data verify the validity and feasibility of the fast - charging method. on this basis, a new type of control strategy is advanced

    就充電過程中起始充電電流、正脈沖幅值、正脈沖頻率、各充電級之間正脈沖幅值變化幅度、負脈沖幅值、負脈沖持續時間、正負脈沖之間停歇時間等幾個參數進行了大量實驗,對實驗數進行分析和比較,驗了快速充電方法和可行,在此基礎上提出了一種新型快速充電控制策略。
  13. Finally, in order to validate our theories and approach, this thesis conducts data lineage tracing experiment with relational query q2 and q12 of tpc benchmark ? h, and compares the tracing performance with the approach of tracing query process presented by doctor cui

    為了驗本文提出理論和方法,作者對tpc - h測試標準中具代表關系查詢q2和q12進行了數志跟蹤實驗,驗了起源集理論和方法,並與cui博士提出「基於轉換跟蹤查詢過程方法」進行了詳細比較。
  14. Starts from analyzing a special gis applications, the paper points out its widely existence in dss and mis, presents a spatial data model based on constructed point set storage and its developed spatial - temporal model, and proves the validity and practicability of the presented models from theory and actual application

    本文從分析一類特殊gis應用出發,指出了該類應用在mis和dss領域存在和廣泛,井針對該類特殊應用提出了基於構造點集空間數模型及其時態拓展模型,通過理論分析和實際應用實踐,明了該模型和適應
  15. In order to improve dynamic performance of the control system in the assembly robot, according to acpmsm ( ac permanent magnet synchronous motor ) vector control model and the control idea about preview control, the paper presents a kind of control strategies that is composite of a primary pid ( proportion integral dif - ferenfial ) with a preview feed - forward compensation, its compensation is equivalent to linear combination of future adjacent difference, the simulation results show that it can not only improve the system tracking performance effectively, but also implement easily

    摘要為了提高裝配機器人控制系統動態能,依交流永磁同步電機矢量控制模型,從預見控制思想出發,提出了一種在原pid基礎上外加預見前饋補償控制方法,這種控制方法前饋補償項取未來幾項目標值一階差值線形組合,並模擬驗了該控制方法對提高系統跟蹤和簡單可行
  16. L3ased on the organization rules of internet data, the distribution laws of hyperlinks and the name rules of url, a algorithm of tvm rebuilding is established, and satisfactory experiment results are obtained by applying this algorithm. furthermore, efforts are made by applying of tvm on browse navigation, web page classification and reinforcement learning algorithm

    結合網際網路資源構建規則、鏈接分佈規律和url命名規則,論文提出了樹藤共生數模型重建演算法,實驗結果驗了樹藤共生模型與合理,在此基礎上初步討論了樹藤共生模型在瀏覽導航、網頁分類和reinforcementlearning演算法中應用。
  17. In this dissertation, the numerical computation for the acoustic radiation problem ( arp ) is studied deeply and systematically in the theory, method and the application technique, based on analyzing the situation of the home and abroad on the numerical computation for the acoustic radiation problem. the calculation formulas of the boundary element method ( bem ) for the exterior acoustic radiation problem in the full - space and half - space are deduced, based on the wave propagation theorem ; the arising of the non - unique solutions, which is associated with the application of the boundary integral equation ( bie ) in acoustic radiation problem, is analyzed and proofed ; the improved combined helmholtz integral equation formulation ( ichief ) is presented to overcome the non - uniqueness problem more effectively and reliably ; the determination of the singular integral coefficients on various occasions is analyzed ; the properties and treatments of the singular integrals with different orders axe studied ; the computation program of the cubic spline ichief is developed and its ability to overcome the non - uniqueness problem and feasibility to discrete the surface coarsely with the sufficient calculation precision are examined through examples

    第二章在聲波動理論基礎上,詳細地推導出對應于無限域和半無限域外部振動聲輻射問題邊界積分方程計算公式;根fredholm積分理論,對利用邊界積分方程計算振動聲輻射問題過程中解非唯一產生進行了分析和明;改進了chief法以提高其克服解非唯一和可靠;對不同條件下奇系數計算、強奇積分收斂及其在變量替換時與普通積分差異、不同階奇積分計算、數值求積分等進行了研究;開發了三次樣條改進chief法計算軟體,並通過算例考核了該方法在特徵波數處克服解非唯一和在保計算精度前提下實現剖分粗化以提高計算可行
  18. By spss, this paper analyzes the validity of the data collected by the questionnaire and the rationality of the variable and sub - variable, testifying part of the hypotheses given by the paper

    對于問卷回收整理所得數,本文採用spss統計分析軟體對數、所提出變量及對應子變量合理進行分析,並部分驗了本文所提出假設。
  19. Core system 0 receives, processes and transmits data from monitoring and client terminals, including internet delay management, identity management, data validity, accuracy and reliance management ; internet accident management ( connection interruption, data timeout ) ; emergency data recovery

    核心系統- -用於接收,發送及處理來自監控端和客戶端,包括:網路延時處理,身份認,數,準確及可靠判斷;意外情況(如:連接中斷,數超時)處理;緊急數恢復等
  20. On the effectiveness of administrative executive evidence in technical supervision of quality

    質量技術監督行政執法證據的有效性
分享友人