邏輯的嚴密性 的英文怎麼說

中文拼音 [luódeyánxìng]
邏輯的嚴密性 英文
logical rigor
  • : Ⅰ動1. (巡察) patrol 2. [書面語] (遮攔) blockⅡ名詞1. (巡察) patrol 2. [書面語] (山溪的邊緣) edge
  • : Ⅰ動詞(編輯; 輯錄) collect; compile; edit Ⅱ名詞(整套書籍、資料的各個部分) part; volume; division
  • : 4次方是 The fourth power of 2 is direction
  • : Ⅰ形容詞1 (嚴密; 緊密) tight; rigorous 2 (嚴厲; 嚴格) strict; severe; stern; rigorous Ⅱ名詞1 ...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 邏輯 : logic
  1. This dissertation takes feuerbachs meticulous logical structure as masterstroke, explains his whole deduction process, which from the conception of civil penalty to the theory of psychological coercion, again from law deterrence to the principle of legally prescribed punishment for a specified crime. and it also states that, feuerbach takes the external behavior for condemnatory object, obviates the intervention of sentiment, abandons moral punishment or moral principles, moreover, excludes judiciary arbitrariness by means of law restriction, besides, emphasizes law deterrence and creates the theory of psychological coercion, and as a result establishes the principle of legally prescribed punishment for a specified crime

    本文以費爾巴哈謹縝結構為主線,梳理了其從市民刑罰概念構築到心理強制說提出、再到確定刑罰法規中法律威懾思想確立直至罪刑法定主義原則整個推論過程,闡釋了費爾巴哈把客觀、外部行為作為處罰對象,排除情操介入,把法律置於可罰絕對根據之中,擯棄道德刑罰或道德原理,通過把法官約束在法律之中方式排斥了法官恣意專斷,又強調法律威懾,創立心理強制說,從而確立了罪刑法定主義刑法思想。
  2. Furthermore, our legal institution for acquisition of listing company also has many shortcomings : its specific rules are not detailed enough, its logic is not strict, its inclination of value often self - contradict, its content is not integrated, the corporation law and securities law have n ' t supported it sufficiently, and the particularity of state - owned capital makes it unsuitable to the international consuetude

    同時,上市公司收購法律制度也很不成熟:微觀層面上具體規則不夠詳盡、可行差,中觀層面上內在、價值取向不清晰、內容不完整,宏觀層面上公司法與證券法體系未能提供足夠制度背景、特殊國有資產關系介入又不符合國際慣常做法。
  3. This course aims not only to lay down a solid basis in mathematics for students to learn further advanced courses of mathematics and other specific courses of their respective science and engineering majors, but also to train and nurture students to master the abstractness, logicality and tightness embodied in mathematics, as to enable students to have the fundamental ability to understand and apply the logic relationship, study and grasp the abstract phenomena, and comprehend and utilize the mathematical rules

    課程不但為學生學習后續數學課程和其他理工專業課程奠定必要數學基礎,而且對學生在數學抽象方面進行一定訓練和熏陶,使他們具有理解和運用關系、研究和領會抽象事物、認識和利用數形規律初步能力。
  4. About theorem, the paper introduces the syntax of ideal, also the first time uses concept of honest ideal to define secrecy goal of protocol and utilizes honest ideal logic to specify secrecy property. at the same time, this paper corrects one not so perfect lemma proving in a literature written by f " abrega, herzog and guttman

    在理論上,本文引入了理想語義,並首次使用了理想概念對安全協議進行定義,同時使用理想命題公式表示安全協議;另外,本文修正了f ' abrega 、 herzog和guttman三人文獻中一個引理證明,原有證明是不完善
  5. Lu xun later period the essay, except the high typicalnature which altogether has with the early essay outside, the strictlogic, vivid vivid, the profound satire, the different current fadinteresting and the language highly concise, accurate, is humorous, mainly is the partial essays because % 26quot ; drills the net % 26quot ; the struggle toneed to write vaguely windingly

    魯迅後期雜文,除與早期雜文所共有高度典型,生動形象,深刻諷刺,不同流俗趣味和語言高度精練、準確、幽默以外,主要是部分雜文因「鉆網」斗爭需要而寫得隱晦曲折。
  6. Lu xun later period the essay, except the high typicalnature which altogether has with the early essay outside, the strictlogic, vivid vivid, the profound satire, the different current fadinteresting and the language highly concise, accurate, is humorous, mainly is the partial essays because " drills the net " the struggle toneed to write vaguely windingly

    魯迅後期雜文,除與早期雜文所共有高度典型,生動形象,深刻諷刺,不同流俗趣味和語言高度精練、準確、幽默以外,主要是部分雜文因「鉆網」斗爭需要而寫得隱晦曲折。
  7. After strict formal analysis with ban logic, the result have proved that the authentication protocol is secure. the improved access control scheme is realized by the mode of single - key - lock - pair. under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method

    作為對原雙向認證訪問控制方案改進,改進后雙向身份認證協議可以很好抵抗中間人攻擊和重放攻擊,經過ban形式分析和論證,結果表明該協議是安全;改進后訪問控制方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案良好動態特外,在不需要訪問權限遞增假設下,實現了用戶對文件多種訪問控制權限,並大大減小了溢出問題發生可能
  8. In present methods of track - to - tack correlation, the false and lost track - to - track correlation have not been taken into account in the complex background with dense targets. so two kinds of methods are proposed to deal with this problem, one of which is the correlation algorithm based on fuzzy synthetic decision and d - s evidence theory, another is based on k - nearest neighbor ( k - nn ) principle and d - s evidence theory. the two methods combine the logic of fuzzy decision and strictness of statistical classification with intelligence of evidential theory successfully

    目前航跡關聯方法在集目標環境下,航跡錯關聯概率和漏關聯概率較大,針對這一問題,本文利用d - s證據理論,提出了基於模糊綜合決策d - s航跡關聯方法和基於k近領域d - s航跡關聯方法,兩種方法成功地將模糊決策和統計模式分類與證據理論智能特相結合,模擬結果說明了兩種方法有效和實用
  9. We select rubin logic to formally analyze the authentication and key exchange protocol designed for this transmission platform utilized, and the analysis result indicates that this authentication and key

    對于傳輸平臺所使用認證和鑰交換協議,本文選擇rubin對其進行形式化分析,分析結果表明該認證和鑰交換協議具有一定
  10. After the analysis and summing up of the post - evaluation theory and method in the general building projects, according to the characteristics and contents of the highway network planning, the paper expounded the goal and meaning of post - evaluation in highway network planning in detail and proposed the framework of the highway network planning post - evaluation theory. then the paper defined the assessment index, assessment standard and assessment method of the post - evaluation of prospective development, scale prediction and construction arrangement in highway network planning post - evaluation by means of before - after contrast and mathematic method such as fuzzy set - value statistics, membership function decided by increment ant gahp etc. thus a set of logical, systematic and applicative highway network planning post - evaluation theory is found. finally according to the reality of highway network development in he nan province and shann xi province, their arterial highway network planning is evaluated with the the ory discussed in this paper, and the rationality and difference of the result is analyzed

    本文在分析和總結一般項目建設后評價理論與方法基礎上,結合公路網規劃具體特點和內容,詳細論述了公路網規劃后評價與含義,提出了公路網規劃后評價總體理論框架;然後,按照前後對比思想,運用模糊集值統計、增量法標定隸屬函數和多人層次分析法等數學手段,分別確定了公路網規劃后評價中發展預測后評價、規模測算后評價和建設實施安排后評價評價指標、評價標準和評價方法,形成、體系完善和操作很強公路網規劃后評價理論;隨后,結合河南與陜西兩省公路網規劃與建設實際,運用本文理論對兩省干線公路網規劃進行后評價,並對評價結果合理及其差異進行了分析。
分享友人