| 1. | Section 3 examines the civil action pattern and the hermeneutic right 第三部分:民事诉讼模式与释明权。 |
| 2. | Fixed action patterns faps 固定行为型态 |
| 3. | The justice of the system refers to the formal action patterns after being regulated and shaped as well as the justice in the interactional relation structure 制度正义指规范化、定型化了的正式行为方式和交往关系结构的公正性。 |
| 4. | The author believes that internet learning strategy is combination of the action pattern and mental inclination of learning under internet learning environment 作者认为网络学习环境下的学习策略是在网络学习环境下学习者进行学习的活动形式和心理倾向的总称。 |
| 5. | It first analyses the adversary system and the doctrine of function and power and points out that civil action pattern in western countries are of the adversary system 该部分首先对当事人主义,职权主义进行了辨析,认为西方国家的民事诉讼模式均为当事人主义。 |
| 6. | Other scientists have attributed the same behavior to conditioning , to learned responses . certainly reflexes and fixed action patterns can occur without feeling or conscious thought 其他科学家把同样的行为因于条件反射和后天学习的反应。当然没有感情或有意识的想法,反应和固定的动作模式也可以发生。 |
| 7. | It is known as a historical accumulate culture , which has an extremely deep and rich content . culture value has exceeding influence on public opinion , thought pattern , action pattern of leaders 作为一种历史长期沉淀的文化具有极其深刻和丰富的内涵,对公众舆论,思维模式,甚至领导人的行为模式都有深远的影响。 |
| 8. | Through recalling urbanization process and characteristic in chongqing , conducting further analysis between urbanization and economic development , the article put forward regional urbanization model thoughts and its action pattern 本文通过回顾重庆城市化进程及特征,进行城市化相关分析,提出了“区域城市化”模式的总体思路和具体推进方式。 |
| 9. | It is studied to find out that importance of firm strategy in the network economy is transforming from an action pattern of resource allocation to a systemic capability of the firm , a substantial change for role of strategy 研究指出,战略在网络经济中的重要性正在由配置资源的行动模式上升到企业的一种系统能力,这种能力相比于传统经济下企业的战略地位有着非线性的创新优势。 |
| 10. | Then , we can compare the current action pattern with the pattern in the pattern database to find out the known or unknown misuse intrusions and anomaly intrusions . the system model is extensible for adding new intrusion detection agents or new intrusion models . it adopts data mining technology to cut down the dependency of manual encoding and expert experience 这些模式可用来指导系统属性的选择和构造,挖掘生成出有用的系统或者用户的行为模式(正常的或者异常的) ;通过比较当前的系统行为模式和已有的模式规则的相似度来发现已知或者未知的误用入侵和异常入侵活动。 |