證據的有效性 的英文怎麼說
中文拼音 [zhèngjùdeyǒuxiàoxìng]
證據的有效性
英文
competence of evidence- 證 : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
- 據 : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
- 的 : 4次方是 The fourth power of 2 is direction
- 有 : 有副詞[書面語] (表示整數之外再加零數): 30 有 5 thirty-five; 10 有 5年 fifteen years
- 效 : Ⅰ名詞(效果; 功用) effect; efficiency; result Ⅱ動詞1 (仿效) imitate; follow the example of 2 ...
- 性 : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
- 證據 : evidence; proof; testimony
- 有效性 : availability; effectiveness; validity; significance有效性檢查 validity check
- 有效 : effective; valid; efficacious
-
Combined with the foundation research ( avigation science fund 04d52032 ) ” study on cfar detecting expert system base on clutter tracking ”. this paper study the fractal technic and snake algorithm on the application of clutter tracking. it proved that the method was effective by the algorithm which adapt to the real and simulant clutter data
本課題結合航空科學基金「基於雜波跟蹤融合的恆虛警檢測專家系統研究」 ,研究分形技術和snake演算法在雜波跟蹤中應用,設計了相應的演算法,通過分析真實數據和模擬數據驗證了演算法的有效性。The algorithm has been trained and tested on bacillus subtilis promoter dataset by the jackknife method
對實際數據集進行的刀切法測試驗證了演算法的有效性。The legal effects of electronic evidence primarily mean that whether electronic evidence has evidence effect, and the meanings of evidence effect. the legal effects of electronic evidence specially include the evidence position, admissibility of evidence and probative force
所謂電子證據的法律效力主要就是指電子證據是否具有證據效力,以及具有什麼樣的證據效力,具體說主要包括電子證據的證據地位以及電子證據的可采性和證明力問題。Technicans are trying to find out a more reasonable point to describe work state of pump for some reasonless factors of this model, the key technology of developing ads is on adopting a means by using theoretical calculation and curve fitting to build a reasonable pump state graph model, the model " s rationality based relations between pump efficacy and sinking depth is illustrated by restrict programme argumenting
抽油增效輔助決策系統的開發,其關鍵技術在於採用理論計算及曲線擬合的辦法,建立合理的泵況圖模型,通過嚴格的方案論證闡明基於泵效-沉沒度關系的泵況圖模型的合理性。通過實際數據,檢驗模型的有效性。The simulation results further testify the correctness of the model and confirm the feasibility of the system. this paper also includes a velocity apparatus mainly based on doppler velocimeter. in this part the attention has been paid to the comprehensive effect of all kinds of factors that affects the precision of the doppler velocimeter, then a modification method for the original data for velocity computation has been given, as well as detailed formula for modification
本論文中還介紹了一套以多普勒測速儀為核心的測速系統,重點對影響多普勒測速精度的各種因素進行了綜合分析,提出了對測速原始數據進行修正的方法,給出了具體的修正公式,並利用這些公式進行了測速數據修正的計算機模擬,從而驗證了修正的有效性。The processing and graphical representation of aeroelectromagnetic data of over 30000 traverse kilometers demonstrate the effectiveness of the techniques, and the apparent resistivity images obtained reflect characteristics of shallow electric distrbution, thus providing new data for geological mapping
通過對3萬多測線公里航空電磁數據的處理與圖示,證明了方法的有效性,取得的視電阻率圖像反映了各測區淺層電性分佈特徵,為地質填圖提供了新的數據。The method to plan the manufacturing path directly from the measurement points is studied. in chapter five, several software modules are realized including copy milling module, cnc code interpreter, and a three - axis copy milling cnc system is developed. in chapter six, the experiment of copy milling and cnc milling is done, and the results of computer simulation and experiment verified the effectiveness of the method
第六章一方面編制數控加工代碼,在所開發的數控系統上進行數控加工,以驗證數控加工系統的有效性;另一方面,對測量得到的數據,經過仿型系統處理後生成加工路徑,進行仿型加工實驗,以驗證仿型加工演算法和仿型功能實現的有效性。Thispaperhasstudiedonthedatalinkinterfacetechniqueoftacticalcontrolsystem. firstof all, functional requirement and the important role of data link interface in tactical controlsystem is introduced ; secondly, with object oriented method, the characteristic of uav taskcontrol process is analysed, and then uav task control information model is established, anddata link interface standard of tactical control system is designed based on this model, including message format and transmission mechanism ; thirdly, data link control module isdesigned based on embedded linux operating system and has realized conversion betweendata link standard interface and the private interface of uav data link ; and then, combinationreal time corba middleware and its event channel, data link control modular componenttechnology is studied, and realization scheme is put forward ; finally, demostration is madebased on prototype of tactical controlsystem, which verify the validaty of data link interfacestandardandembeddeddatalinkcontrolmodules
本文對戰術控制系統中的數據鏈介面技術進行研究:分析了數據鏈介面在戰術控制系統中的功能需求;採用面向對象的方法,分析無人機任務控制問題,建立了無人機任務控制信息模型,並基於該模型設計了數據鏈介面通信協議,包括報文格式和傳輸機制;基於嵌入式linux系統設計了數據鏈介面控制模塊,實現了數據鏈標準介面與無人機數據鏈私有介面之間的相互轉換;結合實時corba中間件及其事件通道,研究了數據鏈介面控制模塊組件技術,並給出了實現方案;通過戰術控制原理實驗系統的演示實驗,驗證了數據鏈介面通信協議和嵌入式數據鏈介面控制模塊的有效性。Network forensics is an important extension to present security infrastructure, and is becoming the research focus of forensic investigators and network security researchers. however many challenges still exist in conducting network forensics : the sheer amount of data generated by the network ; the comprehensibility of evidences extracted from collected data ; the efficiency of evidence analysis methods, etc. against above challenges, by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic, the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence. at the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. experimental results show that the system can classify most kinds of events ( 91. 16 ? correct classification rate on average ), provide analyzed and comprehensible information for a forensic expert and automate or semi - automate the process of forensic analysis
網路取證是對現有網路安全體系的必要擴展,已日益成為研究的重點.但目前在進行網路取證時仍存在很多挑戰:如網路產生的海量數據;從已收集數據中提取的證據的可理解性;證據分析方法的有效性等.針對上述問題,利用模糊決策樹技術強大的學習能力及其分析結果的易理解性,開發了一種基於模糊決策樹的網路取證分析系統,以協助網路取證人員在網路環境下對計算機犯罪事件進行取證分析.給出了該方法的實驗結果以及與現有方法的對照分析結果.實驗結果表明,該系統可以對大多數網路事件進行識別(平均正確分類率為91 . 16 ? ) ,能為網路取證人員提供可理解的信息,協助取證人員進行快速高效的證據分析First of all, we bring forward the basic project of tadil, which adapts to combined operations. it is suggested to use tdma ( the abbreviation of time division multiple access ) as the working pattern and utilize the concept of mobile ad hoc network to construct the data link network. aiming at the impact of time delay on data link and the characteristic of cooperative combat under the command of director aircraft, this thesis applies a kind of kalman filtering algorithm in polar coordinates to compensate the error of time delay, and then does the transformation of target motion parameters to obtain the current information of target
本文結合空軍裝備部某「十五」預研課題,圍繞著戰術數據鏈、多機協同多目標攻擊、超機動攻擊、空對地攻擊這四個方面展開了一系列的研究工作:本文首先給出了適應三軍聯合作戰的戰術數據鏈系統的基本方案,建議採用時分多址的工作模式,並利用移動自組織網路的概念構建數據鏈網路,同時針對數據鏈傳輸信息的時間延遲特性和指揮機指揮下的多機協同作戰特點,應用一種極坐標系下的卡爾曼濾波演算法對該傳輸延遲誤差進行補償,並在此基礎上進行目標運動參數的轉換,以獲得目標相對于某無人機的當前運動信息,且利用模擬驗證了方法的有效性。The reduction request knowledge of background and meet with standard of data mining. decisive tree algorithm of id3 is used to prove the validity of feature reduction and to generate intrusion detection rules
粗糙集約簡具有扎實數學理論基礎,不需要背景知識,符合數據挖掘的要求。用id3決策樹演算法去印證約簡的有效性和檢測的時間效率並生成檢測規則。Many experiments on the effects with the change of several parameters, such as initial charging current, amplitude and frequency of positive pulses, variety of the amplitude of positive pulses among each charging stages, amplitude and duration of negative pulses, duration between positive and negative pulses, have been performed. the results of analysis and comparison of experimental data verify the validity and feasibility of the fast - charging method. on this basis, a new type of control strategy is advanced
就充電過程中的起始充電電流、正脈沖的幅值、正脈沖的頻率、各充電級之間正脈沖幅值的變化幅度、負脈沖的幅值、負脈沖的持續時間、正負脈沖之間的停歇時間等幾個參數進行了大量的實驗,對實驗數據進行分析和比較,驗證了快速充電方法的有效性和可行性,在此基礎上提出了一種新型快速充電控制策略。Finally, in order to validate our theories and approach, this thesis conducts data lineage tracing experiment with relational query q2 and q12 of tpc benchmark ? h, and compares the tracing performance with the approach of tracing query process presented by doctor cui
為了驗證本文提出的理論和方法,作者對tpc - h測試標準中具有代表性的關系查詢q2和q12進行了數據志跟蹤實驗,驗證了起源集理論和方法的有效性,並與cui博士提出的「基於轉換性質的跟蹤查詢過程的方法」進行了詳細的比較。Starts from analyzing a special gis applications, the paper points out its widely existence in dss and mis, presents a spatial data model based on constructed point set storage and its developed spatial - temporal model, and proves the validity and practicability of the presented models from theory and actual application
本文從分析一類特殊的gis應用出發,指出了該類應用在mis和dss領域的存在性和廣泛性,井針對該類特殊應用提出了基於構造點集的空間數據模型及其時態拓展模型,通過理論分析和實際的應用實踐,證明了該模型的有效性和適應性。In order to improve dynamic performance of the control system in the assembly robot, according to acpmsm ( ac permanent magnet synchronous motor ) vector control model and the control idea about preview control, the paper presents a kind of control strategies that is composite of a primary pid ( proportion integral dif - ferenfial ) with a preview feed - forward compensation, its compensation is equivalent to linear combination of future adjacent difference, the simulation results show that it can not only improve the system tracking performance effectively, but also implement easily
摘要為了提高裝配機器人控制系統的動態性能,依據交流永磁同步電機矢量控制模型,從預見控制的思想出發,提出了一種在原有pid基礎上外加預見前饋補償的控制方法,這種控制方法的前饋補償項取未來幾項目標值一階差值的線形組合,並模擬驗證了該控制方法對提高系統跟蹤性能的有效性和簡單可行性。L3ased on the organization rules of internet data, the distribution laws of hyperlinks and the name rules of url, a algorithm of tvm rebuilding is established, and satisfactory experiment results are obtained by applying this algorithm. furthermore, efforts are made by applying of tvm on browse navigation, web page classification and reinforcement learning algorithm
結合網際網路資源的構建規則、鏈接分佈規律和url命名規則,論文提出了樹藤共生數據模型的重建演算法,實驗結果驗證了樹藤共生模型的有效性與合理性,在此基礎上初步討論了樹藤共生模型在瀏覽導航、網頁分類和reinforcementlearning演算法中的應用。In this dissertation, the numerical computation for the acoustic radiation problem ( arp ) is studied deeply and systematically in the theory, method and the application technique, based on analyzing the situation of the home and abroad on the numerical computation for the acoustic radiation problem. the calculation formulas of the boundary element method ( bem ) for the exterior acoustic radiation problem in the full - space and half - space are deduced, based on the wave propagation theorem ; the arising of the non - unique solutions, which is associated with the application of the boundary integral equation ( bie ) in acoustic radiation problem, is analyzed and proofed ; the improved combined helmholtz integral equation formulation ( ichief ) is presented to overcome the non - uniqueness problem more effectively and reliably ; the determination of the singular integral coefficients on various occasions is analyzed ; the properties and treatments of the singular integrals with different orders axe studied ; the computation program of the cubic spline ichief is developed and its ability to overcome the non - uniqueness problem and feasibility to discrete the surface coarsely with the sufficient calculation precision are examined through examples
第二章在聲波動理論基礎上,詳細地推導出對應于無限域和半無限域的外部振動聲輻射問題的邊界積分方程計算公式;根據fredholm積分理論,對利用邊界積分方程計算振動聲輻射問題過程中解的非唯一性的產生進行了分析和證明;改進了chief法以提高其克服解的非唯一性的有效性和可靠性;對不同條件下奇性系數的計算、強奇性積分的收斂性及其在變量替換時與普通積分的差異性、不同階奇性積分的計算、數值求積分等進行了研究;開發了三次樣條改進chief法計算軟體,並通過算例考核了該方法在特徵波數處克服解的非唯一性的有效性和在保證計算精度的前提下實現剖分粗化以提高計算效率的可行性。By spss, this paper analyzes the validity of the data collected by the questionnaire and the rationality of the variable and sub - variable, testifying part of the hypotheses given by the paper
對于問卷回收整理所得數據,本文採用spss統計分析軟體對數據的有效性、所提出變量及對應子變量的合理性進行分析,並部分驗證了本文所提出的假設。Core system 0 receives, processes and transmits data from monitoring and client terminals, including internet delay management, identity management, data validity, accuracy and reliance management ; internet accident management ( connection interruption, data timeout ) ; emergency data recovery
核心系統- -用於接收,發送及處理來自監控端和客戶端的所有數據,包括:網路延時處理,身份認證,數據的有效性,準確性及可靠性的判斷;意外情況(如:連接中斷,數據超時)的處理;緊急數據恢復等On the effectiveness of administrative executive evidence in technical supervision of quality
質量技術監督行政執法證據的有效性分享友人