With the globalization of economy and science & technology, high & new technology enterprises have become the point of Chinese economic growth and the important basis for constructing innovative country. By an...With the globalization of economy and science & technology, high & new technology enterprises have become the point of Chinese economic growth and the important basis for constructing innovative country. By analyzing the characteristics of high & new technology superior enterprises and the influential factors, the evaluation index and method based on Grey Relation Analysis are designed. Some high & new technology enterprises in Heilongjiang province are evaluated and application tactics of evaluation system are proposed. This study provides scientific method and basis for government to obtain development state about high & new technology enterprises and design planning and policies of high & new technology industry.展开更多
A local and global context representation learning model for Chinese characters is designed and a Chinese word segmentation method based on character representations is proposed in this paper. First, the proposed Chin...A local and global context representation learning model for Chinese characters is designed and a Chinese word segmentation method based on character representations is proposed in this paper. First, the proposed Chinese character learning model uses the semanties of loeal context and global context to learn the representation of Chinese characters. Then, Chinese word segmentation model is built by a neural network, while the segmentation model is trained with the eharaeter representations as its input features. Finally, experimental results show that Chinese charaeter representations can effectively learn the semantic information. Characters with similar semantics cluster together in the visualize space. Moreover, the proposed Chinese word segmentation model also achieves a pretty good improvement on precision, recall and f-measure.展开更多
The 4th Session of the Twelfth National People's Congress of the People's Republic of China held a plenary meeting on March 16,2016,and adopted the Charity Law of the People's Republic of China,as the first charity...The 4th Session of the Twelfth National People's Congress of the People's Republic of China held a plenary meeting on March 16,2016,and adopted the Charity Law of the People's Republic of China,as the first charity law in China,it shall come into force on September 1,2016,展开更多
Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings ...Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations.展开更多
The nature heritages are the precious legacy of nature with outstanding scientific and aesthetic value. They are quite different from other common ecotourism areas, because of its original and unique system, sensitive...The nature heritages are the precious legacy of nature with outstanding scientific and aesthetic value. They are quite different from other common ecotourism areas, because of its original and unique system, sensitive and vulnerable landscape, and peripheral cultural features. Therefore, the tourism development in the nature heritage sites should be on the premise of ecological security. The evaluation index system of tourism ecological security in nature heritage sites was constructed in this article by AHP and Delphi methods, including nature ecological security, landscape visual security and local culture ecological security, and the security thresholds of indices were also established. In the indices' weights of the evaluation model, the nature ecological security ranked the highest, followed by tourist landscape visual security and culture ecological security, which reflected the influence degree of the limited factor to tourism ecological security. Then, this paper carried out an empirical study of Kanas of Xinjiang Uygur Autonomous Region, China, which has the potential to be the World Nature Heritage. On the basis of the data attained from survey and observation on the spot, as well as questionnaire answered by tourists and local communities, the ecological security status in Kanas was evaluated. The result showed that the status of Kanas tourism ecological security was better, but there had some limiting factors. Lastly, effective measures were put forward to ensure its ecological security.展开更多
In South Africa, the nuclear forensics approach and its functions hosted and managed by Necsa, in support of any nuclear security investigations, start from the incident scene when the nuclear or radioactive material ...In South Africa, the nuclear forensics approach and its functions hosted and managed by Necsa, in support of any nuclear security investigations, start from the incident scene when the nuclear or radioactive material (that is out of regulatory control) is being handled and handed over to Necsa Emergency Control Centre by the South African law enforcement agencies in the presence of NOMS Department official. The main objective of this approach is to increase the credibility status of the chain of custody on the handling of the material during incident (crime) scene management process (for both nuclear forensics and traditional forensic evidence collection) and its transportation from the scene to the suitable storage facility at Necsa. Aspects to be looked into during the response process include interactions between law enforcement agencies, Necsa relevant departments and the National Nuclear Regulator of South Africa. This paper focuses on the entire whole response process and associated prior arrangements, in order to show and provide a set of requirements attached to the material, the scope of critical relevant technical and law enforcement information that to be acquired by all parties involving and participating in the nuclear/radiological incident or event response process before the material is authorized for storage at a suitably qualified Necsa's nuclear forensics, which is dedicated storage facility on Pelindaba site.展开更多
In October 25, 2013, the Standing Committee of the National People's Congress made a decision on revising the "consumer rights protection law" of PRC. The new revised "Chinese Consumer Protection Law" China consu...In October 25, 2013, the Standing Committee of the National People's Congress made a decision on revising the "consumer rights protection law" of PRC. The new revised "Chinese Consumer Protection Law" China consumers will take consumer cooling-off period system as an important consumer right.2 Because it is a new system different from traditional civil law "principle of obeying compacts" , and the theoretical research on the calm period by scholars is still not mature enough. This paper discusses the consumer cooling off period from the theoretical perspective, and its legal origin, and puts forward and demonstrates legal principles and the legal basis the cooling off period system should follow.展开更多
Using the reference hypernetted chain (RHNC) integral equation theory and a rigorous stability analysis method, we investigate the phase behavior of a mixture of hard-sphere dipoles and neutral hard spheres based on...Using the reference hypernetted chain (RHNC) integral equation theory and a rigorous stability analysis method, we investigate the phase behavior of a mixture of hard-sphere dipoles and neutral hard spheres based on the correlations of the homogeneous isotropic phase. Lowering the temperature down to the points where the RHNC equations fail to have a solution, several ttuctuations strongly increase. At low densities our results indicate the onset of / chain formation, which is similar with the pure DHS system. At high densities, the results indicate the appearance of isotropic-to-ferroelectric transitions (small neutral hard spheres concentrations) and demixing transitions (large neutral hard spheres concentrations).展开更多
The nineteenth session of the Standing Committee of the Eleventh National People's Congress in February 25, 2011 approved the "PRC Criminal Law Amendment (eight)", which for the first time added the provision of ...The nineteenth session of the Standing Committee of the Eleventh National People's Congress in February 25, 2011 approved the "PRC Criminal Law Amendment (eight)", which for the first time added the provision of the lenient punishment for the elderly crimes. The provision filled the legislative blank of the criminal responsibility of this special group of the old people in the criminal law of our country. But at the same time, we should also clearly see the deficiencies of the amendment (eight). This paper attempts to sort out the rationality of the lenient application of the punishment on the older people from the aspect of the criminal policy oftemperingjustice with mercy and other aspects, and to construct and perfect the specific legislative proposals that the amendment (eight) puts forward.展开更多
In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super...In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super efficiency. The DEA model of multi-stage super efficiency is established for the commercial bank information security system applications of China's banks using data envelopment analysis (DEA), and then output efficiency, taxation efficiency, and comprehensive efficiency are analyzed by choosing eight banks such as Industrial and Commercial bank of China as sample data, and finally the operating performance of Chinese commercial banks' information security management system is concluded.展开更多
基金Sponsored by the National Natural Science Foundation of China (Grant No.70473020), Postgraduate Innovative Science Research Project, HeilongjiangProvince ( Grant No. YJSCX2005 -222HLJ) and Social Science Research Project of Education Department, Heilongjiang Province ( Grant No.10552028).
文摘With the globalization of economy and science & technology, high & new technology enterprises have become the point of Chinese economic growth and the important basis for constructing innovative country. By analyzing the characteristics of high & new technology superior enterprises and the influential factors, the evaluation index and method based on Grey Relation Analysis are designed. Some high & new technology enterprises in Heilongjiang province are evaluated and application tactics of evaluation system are proposed. This study provides scientific method and basis for government to obtain development state about high & new technology enterprises and design planning and policies of high & new technology industry.
基金Supported by the National Natural Science Foundation of China(No.61303179,U1135005,61175020)
文摘A local and global context representation learning model for Chinese characters is designed and a Chinese word segmentation method based on character representations is proposed in this paper. First, the proposed Chinese character learning model uses the semanties of loeal context and global context to learn the representation of Chinese characters. Then, Chinese word segmentation model is built by a neural network, while the segmentation model is trained with the eharaeter representations as its input features. Finally, experimental results show that Chinese charaeter representations can effectively learn the semantic information. Characters with similar semantics cluster together in the visualize space. Moreover, the proposed Chinese word segmentation model also achieves a pretty good improvement on precision, recall and f-measure.
文摘The 4th Session of the Twelfth National People's Congress of the People's Republic of China held a plenary meeting on March 16,2016,and adopted the Charity Law of the People's Republic of China,as the first charity law in China,it shall come into force on September 1,2016,
基金supported by National Key Technology Support Program(No.2013BAD17B06)Major Program of National Social Science Fund(No.15ZDB154)
文摘Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations.
基金Under the auspices of National Natural Science Foundation of China (No. 40671057)Knowledge Innovation Pro-grams of Chinese Academy of Sciences (No. KZCX3-SW-355)
文摘The nature heritages are the precious legacy of nature with outstanding scientific and aesthetic value. They are quite different from other common ecotourism areas, because of its original and unique system, sensitive and vulnerable landscape, and peripheral cultural features. Therefore, the tourism development in the nature heritage sites should be on the premise of ecological security. The evaluation index system of tourism ecological security in nature heritage sites was constructed in this article by AHP and Delphi methods, including nature ecological security, landscape visual security and local culture ecological security, and the security thresholds of indices were also established. In the indices' weights of the evaluation model, the nature ecological security ranked the highest, followed by tourist landscape visual security and culture ecological security, which reflected the influence degree of the limited factor to tourism ecological security. Then, this paper carried out an empirical study of Kanas of Xinjiang Uygur Autonomous Region, China, which has the potential to be the World Nature Heritage. On the basis of the data attained from survey and observation on the spot, as well as questionnaire answered by tourists and local communities, the ecological security status in Kanas was evaluated. The result showed that the status of Kanas tourism ecological security was better, but there had some limiting factors. Lastly, effective measures were put forward to ensure its ecological security.
文摘In South Africa, the nuclear forensics approach and its functions hosted and managed by Necsa, in support of any nuclear security investigations, start from the incident scene when the nuclear or radioactive material (that is out of regulatory control) is being handled and handed over to Necsa Emergency Control Centre by the South African law enforcement agencies in the presence of NOMS Department official. The main objective of this approach is to increase the credibility status of the chain of custody on the handling of the material during incident (crime) scene management process (for both nuclear forensics and traditional forensic evidence collection) and its transportation from the scene to the suitable storage facility at Necsa. Aspects to be looked into during the response process include interactions between law enforcement agencies, Necsa relevant departments and the National Nuclear Regulator of South Africa. This paper focuses on the entire whole response process and associated prior arrangements, in order to show and provide a set of requirements attached to the material, the scope of critical relevant technical and law enforcement information that to be acquired by all parties involving and participating in the nuclear/radiological incident or event response process before the material is authorized for storage at a suitably qualified Necsa's nuclear forensics, which is dedicated storage facility on Pelindaba site.
文摘In October 25, 2013, the Standing Committee of the National People's Congress made a decision on revising the "consumer rights protection law" of PRC. The new revised "Chinese Consumer Protection Law" China consumers will take consumer cooling-off period system as an important consumer right.2 Because it is a new system different from traditional civil law "principle of obeying compacts" , and the theoretical research on the calm period by scholars is still not mature enough. This paper discusses the consumer cooling off period from the theoretical perspective, and its legal origin, and puts forward and demonstrates legal principles and the legal basis the cooling off period system should follow.
文摘Using the reference hypernetted chain (RHNC) integral equation theory and a rigorous stability analysis method, we investigate the phase behavior of a mixture of hard-sphere dipoles and neutral hard spheres based on the correlations of the homogeneous isotropic phase. Lowering the temperature down to the points where the RHNC equations fail to have a solution, several ttuctuations strongly increase. At low densities our results indicate the onset of / chain formation, which is similar with the pure DHS system. At high densities, the results indicate the appearance of isotropic-to-ferroelectric transitions (small neutral hard spheres concentrations) and demixing transitions (large neutral hard spheres concentrations).
文摘The nineteenth session of the Standing Committee of the Eleventh National People's Congress in February 25, 2011 approved the "PRC Criminal Law Amendment (eight)", which for the first time added the provision of the lenient punishment for the elderly crimes. The provision filled the legislative blank of the criminal responsibility of this special group of the old people in the criminal law of our country. But at the same time, we should also clearly see the deficiencies of the amendment (eight). This paper attempts to sort out the rationality of the lenient application of the punishment on the older people from the aspect of the criminal policy oftemperingjustice with mercy and other aspects, and to construct and perfect the specific legislative proposals that the amendment (eight) puts forward.
文摘In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super efficiency. The DEA model of multi-stage super efficiency is established for the commercial bank information security system applications of China's banks using data envelopment analysis (DEA), and then output efficiency, taxation efficiency, and comprehensive efficiency are analyzed by choosing eight banks such as Industrial and Commercial bank of China as sample data, and finally the operating performance of Chinese commercial banks' information security management system is concluded.