非一般性的 的英文怎麼說

中文拼音 [fēibānxìngde]
非一般性的 英文
no ordnary
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : 般構詞成分。
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : 4次方是 The fourth power of 2 is direction
  1. We report a 70 - year - old man who presented with sudden onset of left eye proptosis, ptosis and diplopia after severe vomiting

    摘要創傷眼窩骨膜下出血曾經被報導過,都是因突然間腦靜脈壓上升,或是全身有出血傾向疾病,或鼻竇炎。
  2. It is usually nonconstructive, inelegant, hard to generalize.

    它通常是構造,不優美,難於
  3. During the research of this paper, the author try to find out the institutional evaluationary theory, the transition theory and the reasonable part of policies of the northeast district transition, and make the research rooted in the actuality relatively lagging of the development and transition of the economy in the northeast district. this paper creates the theoretical framework and countermeasures of the integration of internality transition mechanism and institutional evaluationary and aim at the theoretical proposition of the northeast district transition mechanism, fully studies informality restrict mechanism as culture concept, market structure evaluationary mechanism and state - own enterprises in the northeast district, which make the paper innovative and instructive both in theory and in practice

    在本文研究過程中,深入挖掘制度演化理論、經濟轉軌理論以及東北地區轉軌政策合理成分,並且將論文研究深植于東北地區經濟轉軌相對滯后現狀及其原因之中,在此基礎上系統提出了經濟轉軌內在機理制度演化分析框架及其針對東北地區轉軌機理理論命題,完整研究了東北地區文化觀念等正式制度約束機理、東北地區市場結構演化機理和東北地區國有企業改革演化機理。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到威脅,包括授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應控制策略:確定用戶權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;安全防護措施:存取控制、標識和認證、完整控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出個整體解決方案,為其在配置、管理和應用方面提供了基本框架。
  5. Secondly, the neutrality of expectable monetary shocks and unexpectable monetary shocks. thirdly, the shocks of negative and positive monetary supply on real output, that is, the symmetry of monetary nutrality. this dissertation demonstratively proved that above three kinds of monetary shocks all had obvious influences on real output during the sample period from 1993 to 2001, and the money supply does not possess the character of nutrality in stimulating chinese economic growth

    本文實證表明,無論是意義上貨幣供給沖擊,還是其他意義上貨幣供給沖擊(預期到和未預期到貨幣沖擊,以及正向(擴張和負向(緊縮貨幣沖擊) ,在1993 2001年樣本期內,均對實際經濟產出具有明顯影響,說明貨幣在中國經濟增長中不具備中特徵。
  6. First, the dynamic stability of braid composite cylindrical shells with the influences of some main factors is introduced. the general governing equations for the nonlinear dynamic stability is obtained. by the hamilton principle. the creep buckling analysis of braid composite cylindrical shells under axial compression and the dynamic stability under nonconservation force are discussed as emphases. in creep buckling question, by means of theoretical analysis, the instaneous critical load and durable critical load of viscoelastic braid composite cylindrical shell under axial compression are obtained and the numerical example is given

    首先介紹了編織復合材料圓柱殼在幾種主要因素影響下動力穩定問題,用hamilton原理建立動力穩定問題基本方程。然後重點討論了編織復合材料圓柱殼軸壓下蠕變屈曲問題及保守力作用下屈曲問題。對蠕變屈曲問題,通過理論分析來得到了編織復合材料圓柱殼瞬時彈臨界載荷和持久臨界載荷,給出了具體算例。
  7. Specially, the author insists that the shocks from the price of non - monetary assets would be also vital to study the central bank ' s ability about controling monetary supply. so the author would answer these questions respetively according to monetary endogenisis and the price of non - monetary assets. in details, the main contents and results are as follows : ( 1 ) the monetary neutrality from static point of view

    浙江大學博士學位誼文轉型期中國貨幣政策有效及其提升途徑這種分歧除了意義上貨幣中分歧外,對考慮了預期因素貨幣中問題以及不同方向(正或負)貨幣中問題也同樣存在嚴重分歧,而且當前國內外學者對貨幣中分歧也更多集中在後兩者即意義上貨幣中問題。
  8. The essence of judicial decision - making is thta it involves the application of lagal rules and not other less tangible considerations to whatever facts are at hand

    法庭決定精髓在於它是依照(明確)法律準則,而模糊)考慮,來處理所掌握事實(證據) 。
  9. In no event unless required by applicable law or agreed to in writing will any copyright holder, or any other party who modifies and / or conveys the program as permitted above, be liable to you for damages, including any general, special, incidental or consequential damages arising out of the use or inability to use the program ( including but not limited to loss of data or data being rendered inaccurate or losses sustained by you or third parties or a failure of the program to operate with any other programs ), even if such holder or other party has been advised of the possibility of such damages

    受適用法律要求或者書面同意,任何版權所有者,或任何依前述方式修改和/或發布本程序者,對于您因為使用或不能使用本程序所造成、特殊、意外或間接損失,不負任何責任(包括但不限於,資料損失,資料執行不精確,或應由您或第三人承擔損失,或本程序無法與其他程序運作等) ,即便該版權所有者或其他組織已經被告知程序有此類損失可能也是如此。
  10. In no event unless required by applicable law or agreed to in writing will and copyright holder, or any other party who may modify and or redistribute the program as permitted above, be liable to you for damages, including any general, special, incidental or consequential damages arising out of the use or inability to use the program including but not limited to loss of data or data being rendered inaccurate or losses sustained by you or third parties or a failure of the program to operate with any other programs, even if such holder or other party has been advised of the possibility of such damages

    經法律要求或書面同意,任何著作權人或任何可能依前述方式修改與或發布本程序者,對于您因為使用或不能使用本程序所造成特殊意外或間接損失,不負任何責任包括但不限於,資料損失,資料執行不精確,或應由您或第三人承擔損失,或本程序無法與其他程序運作等,即便前述著作權人或其他人已被告知該等損失可能時,也是樣。
  11. In no event unless required by applicable law or agreed to in writing will any copyright holder, or any other party who may modify and / or redistribute the program as permitted above, be liable to you for damages, including any general, special, incidental or consequential damages arising out of the use or inability to use the program ( including but not limited to loss of data or data being rendered inaccurate or losses sustained by you or third parties or a failure of the program to operate with any other programs ), even if such holder or other party has been advised of the possibility of such damages

    經法律要求或書面同意,任何著作權人或任何可能依前述方式修改與?或散布本程式者,對于您因為使用或不能使用本程式所造成、特殊、意外或間接損失,不負任何責任(包括但不限於,資料損失,資料執行不精確,或應由您或第三人承擔損失,或本程式無法與其他程式運作等) ,即便前述著作權人或其他人已被告知該等損失可能時,亦同。
  12. Effective ways to increase employment in the new territories are to create atypical economic activities in the area, such as business park, science park, universities, etc. and to reuse the obsolete industrial buildings there

    增加新界就業機會有效方法有以下各種,如在該處開設非一般性的經濟活動,例如商業園,科學園、大學等,並再使用該處殘舊工業大廈。
  13. If it ' s a fairly common graphics card and you can ' t find the chipset or memory, you should be able to select a generic or older version of the card from the x installation database

    如果它是常共同圖形卡,而且你不能找晶片組或者存儲器,你應該能夠選擇來自x安裝數據庫或比較舊版本。
  14. In general, active mtrps should be treated conservatively ( non - invasive treatments including physical therapy ) prior to the consideration of aggressive therapy ( invasive treatments including injection and surgery )

    而言,在考量以較為侵襲方式(如注射或手術)來治療活動激痛點之前,應該先以較為保守方式(侵襲物理治療)來做治療。
  15. Cannot deny that universities keeping touch with the enterprise the author chose as the research objective, they are mostly the research mou ld university of comprehensiveness. the big and powerful education potential energy that they possesse has the fairly big attraction to enterprises and enterprise staff, and the non - general nature university can be looked over

    不可否認,即便在筆者選定企業,與企業培訓活動中發生聯系多是綜合研究型大學,其所具有強大教育勢能,對于企業和企業員工都擁有相當大吸引力,大學所能望及。
  16. Defines a function ; arguments may be optional and or keywords ; functions are generic which allows for very flexible programming

    定義個函數;參數和/或關鍵字可能是可選;函數是,因而可以進行常靈活編程
  17. The author analyses the present baffle of realization of hypothec by private power and long proceeding as well as high lawsuit expense which includes public and private cost on realization of hypothec by public power in china, indicating that the present situation of realizing hypothec through notarization procedure is unusual and highly expensive, which greatly restrains the economic development in china

    作者分析了目前我國抵押權私力實現困惑,公力實現中漫長訴訟程序和高額訴訟成本,其中包括公共成本和個人成本,並指出用公證程序來實現抵押權和高額費用,以及目前抵押權實現狀況對我國經濟發展制約。
  18. Executing the lifting method to the equivalent programming, we present a strengthened semidefmite relaxation. as predicted by theory and confirmed by numerical experiments the tight semidefinite relaxation gives a better lower bound of circuit bisection than the one that the previous semidefinite relaxation gives

    本文先通過增加約束得到原始問題等價模型,進而對等價模型利用提升技術,提出了個強化半定鬆弛模型;最後,將結果推廣到更具分割問題。
  19. For computing kernel, ooparafea, a complete new integrated fea class library ( including database class library, basic fea class library, digital model class library and so on ) has been built based on the analysis of many former class hierarchies. linear / nonlinear, serial / parallel analysis and sub - strucutre method have been realized in ooparafea

    在深入分析已有研究成果基礎上,論文提出了個獨特而又不失、較為全面、面向對象、基於網路集成限元分析類庫並完成全部程序實現,可利用子結構法,互動式進行線分析,還可通過網路進行遠程同構異構系統平臺下串、并行分散式有限元分析。
  20. Results of studying several non - coplanar coherent structures of. turbulent flow show the variable process of each turbulent coherent structures with different initial locations and interactive law, and are relative closely with their locations

    文中研究了更具共面多個湍流相干結構相互作用,表明了有著不同初始位置各相干結構自身發展和演化過程及其相互作用規律,顯示出與其所在位置直接相關。
分享友人