非一般性的 的英文怎麼說
中文拼音 [fēiyībānxìngde]
非一般性的
英文
no ordnary-
We report a 70 - year - old man who presented with sudden onset of left eye proptosis, ptosis and diplopia after severe vomiting
摘要非創傷性的眼窩骨膜下出血曾經被報導過,一般都是因突然間的腦靜脈壓上升,或是全身性有出血傾向的疾病,或鼻竇炎。It is usually nonconstructive, inelegant, hard to generalize.
它通常是非構造性的,不優美的,難於一般化的。During the research of this paper, the author try to find out the institutional evaluationary theory, the transition theory and the reasonable part of policies of the northeast district transition, and make the research rooted in the actuality relatively lagging of the development and transition of the economy in the northeast district. this paper creates the theoretical framework and countermeasures of the integration of internality transition mechanism and institutional evaluationary and aim at the theoretical proposition of the northeast district transition mechanism, fully studies informality restrict mechanism as culture concept, market structure evaluationary mechanism and state - own enterprises in the northeast district, which make the paper innovative and instructive both in theory and in practice
在本文研究過程中,深入挖掘制度演化理論、經濟轉軌理論以及東北地區轉軌政策的合理成分,並且將論文的研究深植于東北地區經濟轉軌相對滯后的現狀及其原因之中,在此基礎上系統提出了經濟轉軌內在機理的制度演化一般性分析框架及其針對東北地區轉軌機理的理論命題,完整研究了東北地區文化觀念等非正式制度約束機理、東北地區市場結構演化機理和東北地區國有企業改革演化機理。The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。Secondly, the neutrality of expectable monetary shocks and unexpectable monetary shocks. thirdly, the shocks of negative and positive monetary supply on real output, that is, the symmetry of monetary nutrality. this dissertation demonstratively proved that above three kinds of monetary shocks all had obvious influences on real output during the sample period from 1993 to 2001, and the money supply does not possess the character of nutrality in stimulating chinese economic growth
本文的實證表明,無論是一般意義上的貨幣供給沖擊,還是其他非一般意義上的貨幣供給沖擊(預期到的和未預期到的貨幣沖擊,以及正向(擴張性)的和負向(緊縮性)的貨幣沖擊) ,在1993 2001年的樣本期內,均對實際經濟產出具有明顯的影響,說明貨幣在中國經濟增長中不具備中性的特徵。First, the dynamic stability of braid composite cylindrical shells with the influences of some main factors is introduced. the general governing equations for the nonlinear dynamic stability is obtained. by the hamilton principle. the creep buckling analysis of braid composite cylindrical shells under axial compression and the dynamic stability under nonconservation force are discussed as emphases. in creep buckling question, by means of theoretical analysis, the instaneous critical load and durable critical load of viscoelastic braid composite cylindrical shell under axial compression are obtained and the numerical example is given
首先介紹了編織復合材料圓柱殼在幾種主要因素影響下的動力穩定性問題,用hamilton原理建立非線性動力穩定性問題的一般性基本方程。然後重點討論了編織復合材料圓柱殼軸壓下的蠕變屈曲問題及非保守力作用下的屈曲問題。對蠕變屈曲問題,通過理論分析來得到了編織復合材料圓柱殼的瞬時彈性臨界載荷和持久臨界載荷,給出了具體的算例。Specially, the author insists that the shocks from the price of non - monetary assets would be also vital to study the central bank ' s ability about controling monetary supply. so the author would answer these questions respetively according to monetary endogenisis and the price of non - monetary assets. in details, the main contents and results are as follows : ( 1 ) the monetary neutrality from static point of view
浙江大學博士學位誼文轉型期中國貨幣政策的有效性及其提升途徑這種分歧除了一般意義上的貨幣中性分歧外,對考慮了預期因素的貨幣中性問題以及不同方向(正或負)的貨幣中性問題也同樣存在嚴重分歧,而且當前國內外學者對貨幣中性的分歧也更多集中在後兩者即非一般意義上的貨幣中性問題。The essence of judicial decision - making is thta it involves the application of lagal rules and not other less tangible considerations to whatever facts are at hand
法庭決定的精髓在於它是依照(明確的)法律準則,而非模糊的(一般性)考慮,來處理所掌握的事實(證據) 。In no event unless required by applicable law or agreed to in writing will any copyright holder, or any other party who modifies and / or conveys the program as permitted above, be liable to you for damages, including any general, special, incidental or consequential damages arising out of the use or inability to use the program ( including but not limited to loss of data or data being rendered inaccurate or losses sustained by you or third parties or a failure of the program to operate with any other programs ), even if such holder or other party has been advised of the possibility of such damages
除非受適用法律要求或者書面同意,任何版權所有者,或任何依前述方式修改和/或發布本程序者,對于您因為使用或不能使用本程序所造成的一般性、特殊性、意外性或間接性損失,不負任何責任(包括但不限於,資料損失,資料執行不精確,或應由您或第三人承擔的損失,或本程序無法與其他程序運作等) ,即便該版權所有者或其他組織已經被告知程序有此類損失的可能性也是如此。In no event unless required by applicable law or agreed to in writing will and copyright holder, or any other party who may modify and or redistribute the program as permitted above, be liable to you for damages, including any general, special, incidental or consequential damages arising out of the use or inability to use the program including but not limited to loss of data or data being rendered inaccurate or losses sustained by you or third parties or a failure of the program to operate with any other programs, even if such holder or other party has been advised of the possibility of such damages
非經法律要求或書面同意,任何著作權人或任何可能依前述方式修改與或發布本程序者,對于您因為使用或不能使用本程序所造成的一般性特殊性意外性或間接性損失,不負任何責任包括但不限於,資料損失,資料執行不精確,或應由您或第三人承擔的損失,或本程序無法與其他程序運作等,即便前述的著作權人或其他人已被告知該等損失的可能性時,也是一樣。In no event unless required by applicable law or agreed to in writing will any copyright holder, or any other party who may modify and / or redistribute the program as permitted above, be liable to you for damages, including any general, special, incidental or consequential damages arising out of the use or inability to use the program ( including but not limited to loss of data or data being rendered inaccurate or losses sustained by you or third parties or a failure of the program to operate with any other programs ), even if such holder or other party has been advised of the possibility of such damages
非經法律要求或書面同意,任何著作權人或任何可能依前述方式修改與?或散布本程式者,對于您因為使用或不能使用本程式所造成的一般性、特殊性、意外性或間接性損失,不負任何責任(包括但不限於,資料損失,資料執行不精確,或應由您或第三人承擔的損失,或本程式無法與其他程式運作等) ,即便前述的著作權人或其他人已被告知該等損失的可能性時,亦同。Effective ways to increase employment in the new territories are to create atypical economic activities in the area, such as business park, science park, universities, etc. and to reuse the obsolete industrial buildings there
增加新界就業機會的有效方法有以下各種,如在該處開設一些非一般性的經濟活動,例如商業園,科學園、大學等,並再使用該處殘舊的工業大廈。If it ' s a fairly common graphics card and you can ' t find the chipset or memory, you should be able to select a generic or older version of the card from the x installation database
如果它是一個非常共同的圖形卡,而且你不能找晶片組或者存儲器,你應該能夠選擇來自x安裝數據庫的卡的一個一般性或比較舊版本。In general, active mtrps should be treated conservatively ( non - invasive treatments including physical therapy ) prior to the consideration of aggressive therapy ( invasive treatments including injection and surgery )
一般而言,在考量以較為侵襲性的方式(如注射或手術)來治療活動性激痛點之前,應該先以較為保守性的方式(非侵襲性的物理治療)來做治療。Cannot deny that universities keeping touch with the enterprise the author chose as the research objective, they are mostly the research mou ld university of comprehensiveness. the big and powerful education potential energy that they possesse has the fairly big attraction to enterprises and enterprise staff, and the non - general nature university can be looked over
不可否認,即便在筆者選定的企業,與企業培訓活動中發生聯系的多是綜合性的研究型大學,其所具有的強大教育勢能,對于企業和企業員工都擁有相當大的吸引力,非一般性大學所能望及。Defines a function ; arguments may be optional and or keywords ; functions are generic which allows for very flexible programming
定義一個函數;參數和/或關鍵字可能是可選的;函數是一般性的,因而可以進行非常靈活的編程The author analyses the present baffle of realization of hypothec by private power and long proceeding as well as high lawsuit expense which includes public and private cost on realization of hypothec by public power in china, indicating that the present situation of realizing hypothec through notarization procedure is unusual and highly expensive, which greatly restrains the economic development in china
作者分析了目前我國抵押權私力實現的困惑,公力實現中的漫長訴訟程序和高額訴訟成本,其中包括公共成本和個人成本,並指出用公證程序來實現抵押權的非一般性和高額費用,以及目前抵押權實現狀況對我國經濟發展的制約。Executing the lifting method to the equivalent programming, we present a strengthened semidefmite relaxation. as predicted by theory and confirmed by numerical experiments the tight semidefinite relaxation gives a better lower bound of circuit bisection than the one that the previous semidefinite relaxation gives
本文先通過增加非線性約束得到原始問題的等價模型,進而對等價模型利用提升技術,提出了一個強化的半定鬆弛模型;最後,將結果推廣到更具一般性的圖的分割問題。For computing kernel, ooparafea, a complete new integrated fea class library ( including database class library, basic fea class library, digital model class library and so on ) has been built based on the analysis of many former class hierarchies. linear / nonlinear, serial / parallel analysis and sub - strucutre method have been realized in ooparafea
在深入分析已有研究成果的基礎上,論文提出了一個獨特而又不失一般性的、較為全面的、面向對象的、基於網路的集成限元分析類庫並完成全部的程序實現,可利用子結構法,互動式的進行線性、非線性分析,還可通過網路進行遠程同構異構系統平臺下的串、并行分散式有限元分析。Results of studying several non - coplanar coherent structures of. turbulent flow show the variable process of each turbulent coherent structures with different initial locations and interactive law, and are relative closely with their locations
文中研究了更具一般性的非共面多個湍流相干結構的相互作用,表明了有著不同初始位置的各相干結構自身的發展和演化過程及其相互作用規律,顯示出與其所在位置直接相關。分享友人