Example sentences of "[det] system have [be] " in BNC.

  Next page
No Sentence
1 Some systems have been developed along such lines that enable non-zero probabilities to be ascribed to individual predictions .
2 I was told at the time that this system had been adopted because it was impossible to fit a mechanical servo as fitted to the Series III without major surgery ,
3 Well I think they 're helping us erm possibly if this system had been started a few years ago , then possibly flats complex , would n't have got the bad reputation it has today .
4 Bt strains have traditionally been classified by serotyping , but this system has been unable to cope with the vast number of new strains discovered recently .
5 Typically the means of issuing commands using this system has been via a window-icon-mouse-pop-up menu ( WIMP ) display , where the mouse is used to point at icons or menus in windows ( which are subsets of the screen working area ) .
6 Already this system has been extensively used in the USA where , increasingly , the Medicare system is reimbursing hospitals on the basis of a price per DRG .
7 This system has been implemented on several super-computers , since it provides scope for instruction overlapping ( described in 8.2 ) .
8 This system has been developed with the marketing capability as a fundamental principle . ’
9 This system has been in operation for three months now so the staff are gradually becoming more settled .
10 This system has been evolving for centuries , first for bourgeoisies all over the world , then spreading to the working classes in the First World , and slowly but surely penetrating to all those with disposable income everywhere .
11 While the Scottish Wildlife Trust has for some time had a system for identifying second tier biological sites , primarily as a conservation mechanism , no such system has been created for geological or geomorphological sites , until now .
12 Britain is a late runner in the modern tramway stakes , although such systems have been operating successfully for years in Continental cities .
13 Since then , scores of such systems have been devised , using disparate parts of the body as units of measurement , including the head , face , foot , forearm , index finger , nose and spinal column .
14 Since then , scores of such systems have been devised , using disparate parts of the body as units of measurement , including the head , face , foot , forearm , index finger , nose and spinal column .
15 The emphasis in such systems has been to concentrate on the representation , organisation and use of linguistic knowledge as encapsulated and expressed by linguistic rules and procedures .
16 As will be demonstrated , these systems have been designed to be operated by users with little or no experience of computing .
17 Traditionally the conception and design of these systems have been conducted in a hierarchised way , separated from users and the place of work .
18 Newson ( 1979 ) has argued that process studies in geomorphology seek to quantify three systems ; the mechanical sediment system , the chemical system , and the hydrological system , and it is notable that progress towards the quantification of these systems has been achieved by greater cooperation of physical geographers with scientists in other disciplines and in response to requirements of engineers and planners for resource information .
19 The use of linguistic information in these systems has been extremely limited — at best these systems perform lexical checking to determine whether the input forms a valid word .
20 The aim of the majority of these systems has been language understanding .
21 Since the possibility of full grammatical coverage is not feasible many systems have been created that are targeted to a specific application domain .
22 As we shall see , the latter system has been modified in recent years , but the basic principle upon which the ‘ pool ’ rests remains unchanged , namely that the cost of public sector higher education must be shared among all the local authorities .
23 No matter how securely the front door might be barred with entry codes and passwords , American operators , holding the key to the secret back door , could break into the PROMIS systems operated by Cyprus , Egypt , Syria , Pakistan , Turkey , Kuwait , Israel , Jordan , Iran and Iraq whenever they wished , access the data stored there and get out again without arousing the slightest suspicion that the security of those systems had been breached — an incalculable advantage , not only in collecting and verifying intelligence data from those countries , but also in assessing the actual , as opposed to the professed , level of cooperation extended by their governments . )
24 That system had been bypassed .
25 That system had been intended for some time .
26 Brief descriptions of each system have been provided , together with some of the criticisms of their practicality .
  Next page