證據鏈 的英文怎麼說

中文拼音 [zhèngliàn]
證據鏈 英文
chains of evidence
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ名詞1. (鏈子) chain Ⅱ動詞(用鏈栓住) chain; enchain Ⅲ量詞(計量海洋上距離的長度單位) cable length
  • 證據 : evidence; proof; testimony
  1. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝數、網上鄰居名字列表等數的讀寫操作,從而很方便的根控管規則實現了對網路封包的認操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  2. All these are in order to improve the cash operation efficiency of companies, and build the competition of the sales companies. from the structure, firstly it divides the cash flow process into purchase process, inventory process, and sales process, and analyzes the reason for cbpr ( cash business process reengineering ), and then advances the rules and methods of cbpr ( cash business process reengineering ). secondly, it analyzed the disadvantages of the three tradition processes, and points out the reason in process affecting cash turnover efficiency, and then reengineers cash business process in order to echo on the customers quickly and quicken cash flow

    從論文結構上,本文分析了分銷企業資金流程再造的原因,並提出了資金流程再造的原則與方法,根業務流程的概念將資金流程劃分為采購流程、庫存管理流程和銷售流程,並逐一對各傳統流程的弊端進行了剖析,指出了在流程中影響企業資金周轉效率的原因,並結合分銷企業自身的特點,引入供應管理等先進的管理思想,再造企業資金流程,以達到更快地響應顧客,加快資金流轉的目的,同時分析了影響分銷企業的資金流程再造成功的因素,最後本文又根tcl電器銷售公司的運作模式進一步印了資金業務流程再造的優勢。
  3. This thesis adopts empirical research methods, with changjiang communication navigation bureau as a study object, under the guidance of the public financial theory and with zero - base budget idea and activity - based costing system applied ; it provides the general thought by which we investigate each itemized outlay ration standards using the method of sourcing " the chain of the reason of necessary cost " and provides the idea of distributing the common cost in the light of the actual time of the non - commonweal and commonweal communication, researching the method of investigating the budget ration standards of over - water commonweal communication institutions. the research harvest has important theoretical and practical sense to the over - water commonweal communication institutions when making budget

    本文採用實研究的方法,以長江通信導航局為研究對象,在公共財政理論的指導下,運用零基預算和作業成本法的基本思想,研究了水上公益通信單位預算定額標準的測定方法,通過追溯「必要費用成因」來測定各項費用定額標準和根非公益性通信與公益性通信實際發生時間來分攤共同費用的思想,研究的成果對水上公益通信單位編制預算具有重要的理論和實踐意義。
  4. Thispaperhasstudiedonthedatalinkinterfacetechniqueoftacticalcontrolsystem. firstof all, functional requirement and the important role of data link interface in tactical controlsystem is introduced ; secondly, with object oriented method, the characteristic of uav taskcontrol process is analysed, and then uav task control information model is established, anddata link interface standard of tactical control system is designed based on this model, including message format and transmission mechanism ; thirdly, data link control module isdesigned based on embedded linux operating system and has realized conversion betweendata link standard interface and the private interface of uav data link ; and then, combinationreal time corba middleware and its event channel, data link control modular componenttechnology is studied, and realization scheme is put forward ; finally, demostration is madebased on prototype of tactical controlsystem, which verify the validaty of data link interfacestandardandembeddeddatalinkcontrolmodules

    本文對戰術控制系統中的數介面技術進行研究:分析了數介面在戰術控制系統中的功能需求;採用面向對象的方法,分析無人機任務控制問題,建立了無人機任務控制信息模型,並基於該模型設計了數介面通信協議,包括報文格式和傳輸機制;基於嵌入式linux系統設計了數介面控制模塊,實現了數標準介面與無人機數私有介面之間的相互轉換;結合實時corba中間件及其事件通道,研究了數介面控制模塊組件技術,並給出了實現方案;通過戰術控制原理實驗系統的演示實驗,驗了數介面通信協議和嵌入式數介面控制模塊的有效性。
  5. Hsupa ( high speed uplink packet access ) is the new technique of r6, first in this thesis, the hsupa physical layer is introduced in detail. then base on the physical layer technique characteristic, according to the 3gpp simulation requirements and system simulation requirements, the hsupa downlink and uplink can be constructed by using matlab. then the data channel and control channel can be simulated, so the channels performance can be realized, provide the results can be provided to the system simulation, these ground the future practical applications

    Hsupa ( highspeeduplinkpacketaccess ) ? ?高速上行分組接入就是r6版本中的新技術,本文首先詳細介紹了hsupa物理層的技術特徵,然後以其技術特點為依,按照3gpp的模擬需求和系統級的模擬需求,使用matlab構建hsupa的上下行物理層路,對其數通道和控制通道進行模擬驗,從而了解通道的性能,為系統模擬提供模擬數,為以後的實際應用打下基礎,達到預研的目的。
  6. This paper present the classic backtracking as an example, through comparing, explains backtracking efficiency difference under various data structure ; when database can be expressed in sparseness matrix, then it can be expressed in 4 - way linked list, which improves greatly the efficiency than before

    以一個典型的回溯問題為例,通過對比,說明回溯法在不同數結構下,其時間效率的差異,驗對于可表示成稀疏矩陣的數集,在使用四向表結構時,可以大大提高時間效率。
  7. An improved hard - sphere model predicted rightly the changing trend of the standard partial molar volume of alkyl chain of amino acids with concentration of electrolyte, and confirmed the assumption that the sum of standard partial molar volumes of ch and ch3 groups is twice as many as the standard partial molar volume of ch2 group

    摘要根改進的硬球混合物模型,正確預測了氨基酸分子的烴在電解質水溶液中的標準偏摩爾體積隨電解質濃度的變化關系,並實了「氨基酸分子中ch和ch3基團的標準偏摩爾體積之和是ch2基團標準偏摩爾體積的2倍」這一假定。
  8. Judicial identification refers to a kind of acts of checking evidence, during the course of action , in which an identifier with expertise appointed or invitated by judicial organs after the application of the parties or without the application, with scientific technological methods complying with the provisions of the criminal procedure law, draws a judgment conclusion. [ 1 ] judicial identification serves the acts of investigation, procuratoration, justice and execution and serve their acts of collecting, examing and checking evidence, which is a link in judicial acts

    司法鑒定是在訴訟過程中,對于案件中的某些專門性問題,按訴訟法的規定,經當事人申請,司法機關決定,或司法機關主動決定,指派、聘請具有專門知識的鑒定人,運用科學技術手段,對專門性問題作出判斷結論的一種核實的活動[ 1 ] 。司法鑒定是為偵查、檢察、審判、執行活動服務的,為其收集、審查核實,是司法活動中的一個環節或條。
  9. The american watch, the nickel - plated chain and the square coin, the key ring with the useless but compromising keys to runeberg ' s office, the notebook, a letter which i decided to destroy at once ( and which i did not destroy ), a five shilling piece, two single shillings and some pennies, a red and blue pencil, a handkerchief 一 and a revolver with a single bullet

    那隻美國掛表,鎳製表和那枚四角形的硬幣,拴著魯納伯格住所鑰匙的子,現在已經沒有用處但是能構成,一個筆記本,一封我看后決定立即銷毀但是沒有銷毀的信,假護照,一枚五先令的硬幣,兩個先令和幾個便士,一枝紅藍鉛筆,一塊手帕和裝有一顆子彈的左輪手槍。
  10. First of all, we bring forward the basic project of tadil, which adapts to combined operations. it is suggested to use tdma ( the abbreviation of time division multiple access ) as the working pattern and utilize the concept of mobile ad hoc network to construct the data link network. aiming at the impact of time delay on data link and the characteristic of cooperative combat under the command of director aircraft, this thesis applies a kind of kalman filtering algorithm in polar coordinates to compensate the error of time delay, and then does the transformation of target motion parameters to obtain the current information of target

    本文結合空軍裝備部某「十五」預研課題,圍繞著戰術數、多機協同多目標攻擊、超機動攻擊、空對地攻擊這四個方面展開了一系列的研究工作:本文首先給出了適應三軍聯合作戰的戰術數系統的基本方案,建議採用時分多址的工作模式,並利用移動自組織網路的概念構建數網路,同時針對數傳輸信息的時間延遲特性和指揮機指揮下的多機協同作戰特點,應用一種極坐標系下的卡爾曼濾波演算法對該傳輸延遲誤差進行補償,並在此基礎上進行目標運動參數的轉換,以獲得目標相對于某無人機的當前運動信息,且利用模擬驗了方法的有效性。
  11. Strongbase as well as its suppliers or any third party mentioned in this website shall take no responsibility on any damage including but not limit to profit loss, data loss or damage caused by business interruption, no matter these damages are caused by use or can t use this website, or any linked website or information contained in these websites or not, and also regardless whether there is guarantee, contract, infrigement acts or any other legal basis as well as advice on possible damage of its kind in advance or not

    健隆集團及其供應商或本站中提到的第三方對任何損害概不負責包括但不限於由損失的利潤損失的數或業務中斷而造成的損害,無論這些損害是否由於使用或不能使用本站的結果與本站接的任何網站或者任何這類網站中包含的信息所引起,也不管它們是否有保合同侵權行為或任何其它法律根以及事前已得到這類損害可能發生的忠告。
  12. No evidence has been found that rheumatic fever results from persistence of streptococci or their variants in the patient

    還沒有表明風濕熱是由在病人體內存在的球菌及其變體所引起。
  13. First of all, the paper introduces the overall structure of the mac protocol using the multi - hop communication mode, to fulfill the requirement of wsn in collision avoidance, energy efficiency and scalability to the change in network, bandwidth utilization, latency, throughout and fairness

    協議採用周期性睡醒機制、 rts / cts的握手機制、適應性偵聽以及消息傳輸等機制,在節省能量的總前提下,有效地減少了延遲、避免沖突,保網路流量,與傳統的數路層協議相比,具有明顯的優越性。
  14. Fourthly, we discuss and simulate the transformation method of relative parameters of ground target based on data link. and then we analyze decision algorithm of air - to - ground attack. especially, we educe three dimensional terminal guidance law of air - to - ground missile in the disturbance of wind, and give the simulation result

    本文也研究了空對地攻擊的若干技術,包括對獲得數指揮下地面目標相對于某攻擊機當前時刻相關參數的方法進行了闡述及模擬,並在此基礎上討論了單機對地面多個目標的攻擊決策演算法,同時提出了一種風干擾下空地導彈的三維末制導導引律,且利用數字模擬進行了驗,並指出研究空地導彈導引律時考慮風影響的必要性。
  15. We designed a wireless asymmetric physical layer link model with a direct sequence spread spectrum system as a transmitted reference. uplink and downlink are both one - way links connected by an ip tunneling. uplink is consisted with the narrowband radio data link of the warfighter information networks ( win )

    研究了無線非對稱路,提出了一種用參考法直接序列擴頻( dsss )實現的無線非對稱數傳輸的物理層路模型:利用現有戰斗員信息網電臺的窄帶數作為上行通道,通過ip隧道技術保單向路的連通性。
  16. 1 ) realization of software packet embedded in m - es and md - is respectively to accomplish main function of mdlp, including assignment of tei ( temporary equipment identifier ), establishment of multiple frame operation, framing, flow control and error - free transmission of packets, is detailed. 2 ) a test model is established to evaluate the robustness and stability of mdlp and verify the validity of software packets. 3 ) according to the design of radio modem construction used in m - es, the modules of interface between data terminal equipment and radio modem are achieved to enable transmission of short message and continuous pseudo - random bit stream via rs232 uart

    本文首先概述了蜂窩數字分組數網的結構和空中協議,詳細分析了移動數路協議,並在此基礎上,重點敘述了以下方面的工作: 1 )設計並完成了分別應用於m - es和md - is端無線控制器的兩套程序實現數路層的主要功能,包括分配臨時設備號、建立路、組幀和面向連接的服務保分組正確無誤地傳輸,並進行適當的流控; 2 )建立測試模型測試移動數路協議的可靠性和穩定性,明了程序包的效用; 3 )根cdpd系統無線數機的軟硬體總體設計方案,完成了介面模塊,實現了rs232異步串口通信,使用戶可以根需要發送短消息或連續的偽隨機比特流; 4 )在tms320c54x的軟體、硬體模擬平臺上,建立了cdpd試驗模型,實現了cdpd系統的mdlp基本功能。
  17. Computer forensics demands that problem concerned with computer crime investigation should be treated from the aspects of law and technique : make the most use of and develop the current data obtaining technique and data - analyzing technique, discover data related to computer crime, ensure and relativity between fact and evidence ; quicken law developments, establishment computer evidence " s law position ; obtain the evidence according to the legal procedure, and insure the legitimacy of evidence obtaining ; establish the accurate storing system both from management and from technique, enhancing the investigation and judgment of computer evidence, and ensuring the dependability of computer evidence

    計算機取就需要從法律和技術兩個角度來看待計算機犯罪偵查方面的一些問題:充分運用和發展現有的數獲取技術和數分析技術,發掘與計算機犯罪相關的,確保與犯罪事實的相關性;加快法律建設,確立計算機的法律地位;依照法定程序獲取,確保取得的合法性;建立一個從管理和技術上都可靠的保管,加強對計算機的科學嚴密的審查判斷,保計算機的真實可靠性。
  18. The goal of this thesis is to give a scheme on the application of wireless sensor network system indoor. first of all, we have a deep research on the ‘ telos ’ node, secondly, we build up a stack system structure of wireless sensor network to monitor the temperature of the building intellectively, design and realize the network stack including physical layer, data link layer, network layer and application layer. finally, we debug the software in order to verify the network layer and the application layer

    本文以智能樓宇溫度監測應用為設計目標,以em2420射頻晶元和atme128l單片機為設計載體,在詳細研究telos節點方案基礎上,對面向設計目標的室內無線傳感器網路節點的物理層、數路層、網路層和應用層之間的網路協議棧進行了實現性設計,建立了立足設計目標的無線傳感器網路協議體系,並在avrstudio4 . 11調試環境下對網路層和應用層設計正確性進行了調試驗
  19. The research work presented a large quantity of debris characteristics parameters, and especially made a thorough study on the characteristic description of sediment chain graph ; meanwhile, the sensibility, differentiation and information redundance analyses of the characteristic parameters also supplies the quantitative indexes for the filtration and optimization of the debris characteristic parameters ; in addition, the debris fusion decision recognition method based on the proof fusion theory and the comprehensive debris recognition flow provide reliable recognition arithmetic for debris recognition ; and lastly, the fault fusion diagnosis judging method based on ferro - graph and spectral analysis provides the basic diagnosis method in theory for multi - fault premonitory diagnosis system of aero - engine

    本文研究工作提出了大量磨粒特徵參數,尤其深入研究了沉積譜片的特徵描述問題;同時,特徵參數的敏感性、區分度與冗餘度分析為磨粒特徵參數的篩選優化提供了量化指標;另外,基於融合理論的磨粒統計融合決策識別方法以及磨粒綜合識別流程為磨粒識別提供了可靠的識別演算法;最後,基於光譜和鐵譜信息的磨損故障融合診斷決策方法為發動機多故障徵兆綜合診斷系統提供了基本的診斷理論手段。
  20. Based on the fourth version of x. 509 standard and rfc3281 document, the basic idea of pki and pmi as well as x. 509 attribute certificate are explained. in the second part, attribute certificate authorization mechanism of pmi is investigated using an example, including the modification of pmi role model, the asn. 1 syntax definition of role specification certificate and role assignment certificate, the flow design and analysis of attribute certificate authorization mechanism and the validation verification of certificate chain

    其中包括了對pmi角色模型的改進、角色規范書和角色分配書的asn . 1語法結構定義、書的授權流程設計與分析以及屬性的有效性驗等;最後,本文根書機制授權流程設計了一個簡單的pmi特權處理模型,並對其中的模型組件、系統運作過程和設計中考慮到的若干技術細節分別予以了有益的探討。
分享友人