HAO Huizhen cannot forget the joy she felt winning her first lawsuit dealing with a transnational marriage case. The court decided that Hao’s litigant voluntarily offered his ex-wife ¥5,000. The first trial was anno...HAO Huizhen cannot forget the joy she felt winning her first lawsuit dealing with a transnational marriage case. The court decided that Hao’s litigant voluntarily offered his ex-wife ¥5,000. The first trial was announced effective because the defendant didn’t lodge an appeal. Hao carefully researched the economic conditions of both sides and collected 18 pieces of evidence. Based on this evidence, she put forth a 15,000-character statement for the plaintiff which won the decision of the court. The plaintiff, a man from another country, did not have to pay his estranged wife ¥300,000 she had demanded. Settling this first transnational marriage court case increased Hao’s confidence in herself. As a result,展开更多
Since the publication of Hemingway’s“Indian Camp”in 1924,many scholars has considered Doctor Adams to be insensitive,cold-hearted,ethically immoral.Some others labeled him as a racist and a sexist.After a scrupulou...Since the publication of Hemingway’s“Indian Camp”in 1924,many scholars has considered Doctor Adams to be insensitive,cold-hearted,ethically immoral.Some others labeled him as a racist and a sexist.After a scrupulous and strenuous close reading together with extensive reviewing and analyzing of relevant references,the author of this paper finds that Uncle George has always been misinterpreted over the time.This paper aims to point out the misunderstanding,misinterpretation or even distortion in the previous researches,in an attempt to defend for Doctor Adams and put the record straight.展开更多
An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to pro...An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%, drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP1200.展开更多
LIU Jie still remembers the challenges she faced in the fight against the AIDS epidemic during her stint as a medical volunteer in Nigeria six years ago. Ironically, it was not the lack of medicine or funding that was...LIU Jie still remembers the challenges she faced in the fight against the AIDS epidemic during her stint as a medical volunteer in Nigeria six years ago. Ironically, it was not the lack of medicine or funding that was the biggest hurdle, but the difficulty in effectively delivering the treatment drugs and services.展开更多
The significance of modern power grids is acknowledged every time there is a major threat. This paper proposes the novel approaches to aid power system planner to improve power grid resilience by making appropriate ha...The significance of modern power grids is acknowledged every time there is a major threat. This paper proposes the novel approaches to aid power system planner to improve power grid resilience by making appropriate hardening strategies against man-made attack or natural hazards. The vulnerability indices are introduced, which return the most vulnerable component in the system based on a tri-level defender-attacker-operator(DAO) interdiction problem which solves iteratively. The output of DAO is the set of hardening strategies that optimally allocated along the network to mitigate the impact of the worst-case damages. By repeating DAO problem based on the proposed algorithm, the various crafted attack is imposed on the system, and the defender's behavior demonstrates how an element is vulnerable to threats. The WSCC 9-bus, IEEE 24-bus, and IEEE 118-bus systems are employed to evaluate the model performance.The counter-intuitive results are proven by the proposed robust hardening strategy, which shows how the hardening strategy should be allocated to improve power network resilience against threats.展开更多
A much-anticipated law protecting homeowners’ rights is on the horizon Television audiences around the country were shocked on November 21,2009,when national broadcaster China Central Television showed clips of two f...A much-anticipated law protecting homeowners’ rights is on the horizon Television audiences around the country were shocked on November 21,2009,when national broadcaster China Central Television showed clips of two families violently fighting lawenforcement officials who were evicting them from their homes.展开更多
Defending the many with the few" is an effectivetraining method to enhance the defensive ability of the whole team. The results of this study indicated that through the system of two-on-three, three-on-four and f...Defending the many with the few" is an effectivetraining method to enhance the defensive ability of the whole team. The results of this study indicated that through the system of two-on-three, three-on-four and four -on-five and intensified training, players could impove themselves in a short period in collective abilitys and consciousness, such as choosing position, adjusting position, coordinating defence and shifting defence. And team ability and style could thus be trained.展开更多
In the field of law, particularly in the area of legal proceedings and other types of dispute settlement, judicial organs can achieve the best allocation of judicial resources by summary handling of the simple cases, ...In the field of law, particularly in the area of legal proceedings and other types of dispute settlement, judicial organs can achieve the best allocation of judicial resources by summary handling of the simple cases, which are in the majority, and optimizing the complex ones, which are in the minority. Summary handling of the simple majority means reducing the marginal cost of judicial activities in accord with the principle of simplifying procedures but not rights while improving judicial effectiveness and promoting judicial justice in a way predicated on protecting the fundamental rights of legal actors. According to quantitative analysis based on trials in which the defendant entered a plea of guilty, there is still plenty of room to optimize the resource allocation mechanism in the field of criminal justice. Implementing the summary procedure confirmed in the 2012 Criminal Procedure Law requires that the judicial organs guarantee defendants who have pleaded guilty the right to a lawyer. It also requires the improvement of judicial efficiency at the stages of investigation, bringing a case, and trial. Only by doing so can we scientifically allocate criminal justice resources overall and effectively promote judicial justice.展开更多
A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pu...A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pursuer is the defender,while the evader is the attacker.The objective of the pursuer is to minimise the cost functional,while the evader has two objectives:to maximise the cost functional and to keep a given terminal state inequality constraint.The open-loop saddle point solution of this game is obtained in the case where the transfer functions of the controllers for the defender and the attacker are of arbitrary orders.展开更多
文摘HAO Huizhen cannot forget the joy she felt winning her first lawsuit dealing with a transnational marriage case. The court decided that Hao’s litigant voluntarily offered his ex-wife ¥5,000. The first trial was announced effective because the defendant didn’t lodge an appeal. Hao carefully researched the economic conditions of both sides and collected 18 pieces of evidence. Based on this evidence, she put forth a 15,000-character statement for the plaintiff which won the decision of the court. The plaintiff, a man from another country, did not have to pay his estranged wife ¥300,000 she had demanded. Settling this first transnational marriage court case increased Hao’s confidence in herself. As a result,
文摘Since the publication of Hemingway’s“Indian Camp”in 1924,many scholars has considered Doctor Adams to be insensitive,cold-hearted,ethically immoral.Some others labeled him as a racist and a sexist.After a scrupulous and strenuous close reading together with extensive reviewing and analyzing of relevant references,the author of this paper finds that Uncle George has always been misinterpreted over the time.This paper aims to point out the misunderstanding,misinterpretation or even distortion in the previous researches,in an attempt to defend for Doctor Adams and put the record straight.
基金Supported by the National High Technology Research and Development Program of China (863 Program)(No.2003AA142080, 2005AA775060)the National Natural Sicence Foundation of China(No.60203004)National Basic Research Program of China (973Program) (No.2003CB314805)the National Outstanding Youth Foundation (No.60325102)
文摘An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%, drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP1200.
文摘LIU Jie still remembers the challenges she faced in the fight against the AIDS epidemic during her stint as a medical volunteer in Nigeria six years ago. Ironically, it was not the lack of medicine or funding that was the biggest hurdle, but the difficulty in effectively delivering the treatment drugs and services.
文摘The significance of modern power grids is acknowledged every time there is a major threat. This paper proposes the novel approaches to aid power system planner to improve power grid resilience by making appropriate hardening strategies against man-made attack or natural hazards. The vulnerability indices are introduced, which return the most vulnerable component in the system based on a tri-level defender-attacker-operator(DAO) interdiction problem which solves iteratively. The output of DAO is the set of hardening strategies that optimally allocated along the network to mitigate the impact of the worst-case damages. By repeating DAO problem based on the proposed algorithm, the various crafted attack is imposed on the system, and the defender's behavior demonstrates how an element is vulnerable to threats. The WSCC 9-bus, IEEE 24-bus, and IEEE 118-bus systems are employed to evaluate the model performance.The counter-intuitive results are proven by the proposed robust hardening strategy, which shows how the hardening strategy should be allocated to improve power network resilience against threats.
文摘A much-anticipated law protecting homeowners’ rights is on the horizon Television audiences around the country were shocked on November 21,2009,when national broadcaster China Central Television showed clips of two families violently fighting lawenforcement officials who were evicting them from their homes.
文摘Defending the many with the few" is an effectivetraining method to enhance the defensive ability of the whole team. The results of this study indicated that through the system of two-on-three, three-on-four and four -on-five and intensified training, players could impove themselves in a short period in collective abilitys and consciousness, such as choosing position, adjusting position, coordinating defence and shifting defence. And team ability and style could thus be trained.
文摘In the field of law, particularly in the area of legal proceedings and other types of dispute settlement, judicial organs can achieve the best allocation of judicial resources by summary handling of the simple cases, which are in the majority, and optimizing the complex ones, which are in the minority. Summary handling of the simple majority means reducing the marginal cost of judicial activities in accord with the principle of simplifying procedures but not rights while improving judicial effectiveness and promoting judicial justice in a way predicated on protecting the fundamental rights of legal actors. According to quantitative analysis based on trials in which the defendant entered a plea of guilty, there is still plenty of room to optimize the resource allocation mechanism in the field of criminal justice. Implementing the summary procedure confirmed in the 2012 Criminal Procedure Law requires that the judicial organs guarantee defendants who have pleaded guilty the right to a lawyer. It also requires the improvement of judicial efficiency at the stages of investigation, bringing a case, and trial. Only by doing so can we scientifically allocate criminal justice resources overall and effectively promote judicial justice.
文摘A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pursuer is the defender,while the evader is the attacker.The objective of the pursuer is to minimise the cost functional,while the evader has two objectives:to maximise the cost functional and to keep a given terminal state inequality constraint.The open-loop saddle point solution of this game is obtained in the case where the transfer functions of the controllers for the defender and the attacker are of arbitrary orders.