Examples of using Verification methods in English and their translations into Russian
{-}
-
Official
-
Colloquial
Review your settings and add multiple verification methods.
The IMS uses four complementary verification methods, utilizing the most modern technology available.
The PPWT, in her view, also is not optimal because it lacks verification methods.
Iv Possible synergies between verification methods to increase cost-effectiveness.
Clarification of the use of the term"digital signature" in contrast to other verification methods and.
Key words: metrological support, verification methods, X-ray computed micro tomography system, standardization.
The end-to-end service will provide information on available protection systems and corresponding verification methods.
Since its inception, MINUGUA has aimed to adapt its verification methods to the particular needs of indigenous people.
The CGE noted, however, lack of consistency regarding the scope of the assurance engagement varies from report to report, and verification methods.
The procedures behind environmental law are based on verification methods: photography, surveillance and geological monitoring.
Modern verification methods and their main problems in application in the chosen subject area were analyzed.
Monitoring is a data intensive exercise carried out using different verification methods and differing from project to project.
I will stop here concerning verification so thatI do not get into the details of the argument on these four verification methods.
Ix Collateral measures; confidencebuilding measures;effective verification methods in relation to appropriate disarmament measures, acceptable to all parties concerned;
The sooner this Protocol is broadly accepted,the sooner the benefits of more effective verification and more cost-efficient verification methods will be felt.
If the risk profile of the customer and transaction are high,additional verification methods are applied simplified Customer Due Diligence(CDD) vs. enhanced Customer Due Diligence CDD.
Advice on the development of registration result forms and in cases where results were contested,including interpretation of the electoral law and verification methods.
In its review of missile inspection practices, UNMOVIC has been refining its verification methods and approaches, based on the Commission's experience and lessons learned.
However, recruiting agents had not received any instructions or child protection training prior to the 2012 recruitment campaign,and age verification methods used were flawed.
Analysis could be undertaken of the capability of existing andpossible new verification methods to detect significant, deliberate non-compliance or a pattern of non-compliance with obligations.
Other verification methods, such as the evaluation of documents and records and interviews with staff, are also important, but could be influenced by deception efforts.
As there are no internationally accepted standards for providing assurance on social reports, verification methods are defined on a case-by-case basis.
For unclassified forms of fissile material, the verification methods should be similar to those applied under IAEA non-proliferation safeguards in non-nuclear-weapon States.
The international community duly recognized the need to strengthen the biological weapons Convention,since it lacked legally binding verification methods to ensure compliance with its provisions.
Depending on the project maturity engineers apply different verification methods and, in particular, methods for developing reference models, which are used to check the design correctness.
The regional approach is seen as having the advantage that it can take account of the situation prevailing in a given area andthat it permits adjustment with regard to such matters as verification methods and confidence-building measures.
Linux driver verification is a large application area for software verification methods, in particular, for functional, safety, and security verification. .
At any rate, verification methods have been developed by the IAEA to determine certain attributes of fissile material inside containers(an agreed isotopic range) without the inspectors seeing the material itself.
Coastal zone habitat(coral reef, mangroves, etc) intact in marine protected areas and productive seascapes measured in hectares as recorded by remote sensing and, where possible,supported by visual or other verification methods.
Some retailers andcompanies use verification methods such as unique barcodes, coupon ID numbers, holographic seals, and watermarked paper as protection from unauthorized copying or use.