期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
合宪性审查中推进宪法解释的策略与方案
1
作者 翟国强 《华东政法大学学报》 CSSCI 北大核心 2024年第6期30-38,共9页
合宪性审查的前提是对所依据的宪法规范进行准确的理解和解释,据此判断审查对象是否违反宪法。因此,解释宪法的含义是合宪性审查的前提。随着合宪性审查工作的积极稳妥有序推进,正在逐渐“显性化”的宪法解释受到理论界高度关注。然而,... 合宪性审查的前提是对所依据的宪法规范进行准确的理解和解释,据此判断审查对象是否违反宪法。因此,解释宪法的含义是合宪性审查的前提。随着合宪性审查工作的积极稳妥有序推进,正在逐渐“显性化”的宪法解释受到理论界高度关注。然而,全面梳理合宪性审查程序中有关宪法问题的论证和说明,可以发现宪法解释的运用还有很大提升空间。应在全面系统总结已有合宪性审查经验的基础上,充分利用现有制度资源,选择合适的宪法解释类型与方法,进一步推进宪法解释的显性化。与此同时,建立全国人大常委会主导的合宪性审查和宪法解释工作的部门协调机制,充分调动其他国家机关实施宪法的积极性,在合宪性审查工作中积极稳妥地推进宪法解释。 展开更多
关键词 合宪性审查 宪法解释 备案审查 学理方案
下载PDF
Clinical Analysis of 10 AIDS Patients with Malignant Lymphoma 被引量:4
2
作者 Gui-ju Gao Di Yang +6 位作者 Ke-ke Lin Jiang Xiao Xin Li Hong-yuan Liang Long Liu Ning Han Hong-xin Zhao 《Clinical oncology and cancer researeh》 CAS CSCD 2012年第2期115-119,共5页
Objective This work summarizes the clinical features and treatment of 10 AIDS patients with malignant lymphoma. Methods A total of 10 AIDS patients with malignant lymphoma seen in Beijing Ditan Hospital since 2009 wer... Objective This work summarizes the clinical features and treatment of 10 AIDS patients with malignant lymphoma. Methods A total of 10 AIDS patients with malignant lymphoma seen in Beijing Ditan Hospital since 2009 were enrolled. Clinical manifestations, pathological examinations, immunity levels, Epstein-Barr virus antibody examinations, complications, treatments, and outcomes were retrospectively analyzed. Results The main clinical manifestations of these patients included intermittent fever in 2 cases, neck masses and fever in 3 cases, auxiliary lymph node enlargement in 2 cases, and abdominal pain and bloating with fever in 3 cases. Up to 7 patients were pathologically diagnosed with diffuse large B cell lymphoma (DLBCL), and 3 patients were pathologically diagnosed with Burkitt's lymphoma. Up to 8 patients had CD4 cell counts below 200/μL, and 2 patients had a level of more than 200/μL. Up to 7 patients were negative for EBV-IgM antibodies and 3 patients were not examined. Six patients underwent different chemotherapy and their prognoses were different. One patient with Burkitt's lymphoma alternatively took CODOXM and IVAC for 3 turns after VP chemotherapy; 1 patient with liver metastasis took R-CHOP 5 times, then changed therapy regimen to R-MINE and MINE. One patient with adrenal DLBCL took CHOP 6 times. Three patients with DLBCL took CHOP 1 or 2 times. Four patients gave up treatment. Various infections and side effects occurred, including bone marrow suppression, gastrointestinal bleeding, and renal dysfunction during chemotherapy. Six patients took HAARI, and 4 did not. Six patients died, whereas 3 patients got improved; and 1 patient was discharged. Conclusions AIDS patients with malignant lymphoma had various clinical manifestations, were immunocompromised, and had multiple metastases when they were admitted; they were already in the interim or late stage of lymphoma. Chemotherapy was not effective, and additional complications occurred. HAART failed to improve patient prognosis, and the overall prognosis was poor. 展开更多
关键词 acquired immunodeficiency syndrome (AIDS) malignant lymphoma CHEMOTHERAPY HAART. prognosis
下载PDF
Adenoid cystic carcinoma in the maxillary gingiva: a case report and immunohistochemical study 被引量:1
3
作者 Chi Zhao Jin-Zhong Liu +1 位作者 Shu-Bin Wang Shi-Chang Wang 《Cancer Biology & Medicine》 SCIE CAS CSCD 2013年第1期52-54,共3页
Gingival adenoid cystic carcinoma (ACC) is a rare malignancy. We describe the diagnosis and treatment of a 43 year- old woman who presented with a persistent oral ulcer for approximately 1 year, and subsequent pain in... Gingival adenoid cystic carcinoma (ACC) is a rare malignancy. We describe the diagnosis and treatment of a 43 year- old woman who presented with a persistent oral ulcer for approximately 1 year, and subsequent pain in the left posterior maxillary region. Clinical examination revealed an ulcer in the left upper molar gingiva, with swelling in the region from the second premolar to the third molar. X-ray images demonstrated the involvement of the maxillary alveolar bone. The histopathological and immunohistochemical features were diagnostic of ACC. ACC is often presented as a gingival lesion; thus, it may easily be neglected by patients. The identification of this tumor using specific pathological analyses prevents misdiagnosis and enables clinicians to determine the appropriate treatment. In this case, no recurrence or distant metastasis was observed after 2 years of follow-up. 展开更多
关键词 GINGIVAL MAXILLA adenoid cystic carcinoma IMMUNOHISTOCHEMISTRY
下载PDF
Research of University Educational Administration System Bottlenecks and Overall Optimization Scheme 被引量:1
4
作者 Lv Shenmin 《International Journal of Technology Management》 2014年第5期74-76,共3页
This paper analyzes of the bottleneck to influence the running efficiency of educational administration system in universities and colleges,and from the system deployment architecture, server configuration, database S... This paper analyzes of the bottleneck to influence the running efficiency of educational administration system in universities and colleges,and from the system deployment architecture, server configuration, database SQL statement optimization and other aspects, it puts forwards the optimization scheme. 展开更多
关键词 UNIVERSITY Educational administration system The bottleneck of the system The optimization scheme
下载PDF
Managing High Volume Data for Network Attack Detection Using Real-Time Flow Filtering
5
作者 Abhrajit Ghosh Yitzchak M. Gottlieb +5 位作者 Aditya Naidu Akshay Vashist Alexander Poylisher Ayumu Kubota Yukiko Sawaya Akira Yamada 《China Communications》 SCIE CSCD 2013年第3期56-66,共11页
In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to hi... In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to high volume data feeds that are common in large Tier-1 ISP networks and providing rich, timely information on observed attacks. It is a software solution that is designed to run on off-the-shelf hardware platforms and incorporates a scalable data processing architecture along with lightweight analysis algorithms that make it suitable for deployment in large networks. RTFF also makes use of state of the art machine learning algorithms to construct attack models that can be used to detect as well as predict attacks. 展开更多
关键词 network security intrusion detection SCALING
下载PDF
Rationality of escalating commitment in information systems project management: An inter-disciplinary perspective
6
作者 Dmitriy V. Chulkov 《Chinese Business Review》 2010年第7期48-57,共10页
Escalation of commitment has been linked to losses in information systems (IS) projects. Understanding the nature and the rationality of escalation allows the firm to promote optimal project management practices. Th... Escalation of commitment has been linked to losses in information systems (IS) projects. Understanding the nature and the rationality of escalation allows the firm to promote optimal project management practices. This study takes an inter-disciplinary approach and draws on research from economics and management to create a model of irrational escalation and a model of rational escalation. The forces that contribute to irrational escalation include the responsibility of the same manager for both the project selection and project continuation decisions that create proneness to self-justification, the potential for negative framing of decision options due to large sunk costs, the proximity of project completion and the presence of organizational inertia. Identifying these irrational escalation factors helps design appropriate de-escalation techniques. The rational escalation model draws on the real option theory and the bandit process theory to identify conditions when project continuation is justified by the value of information and the value of flexibility that the firm receives from continuing the project. 展开更多
关键词 project management project termination escalation of commitment management information systems INCENTIVES
下载PDF
Quantum proxy signature scheme with public verifiability 被引量:6
7
作者 ZHOU JingXian ZHOU YaJian +1 位作者 NIU XinXin YANG YiXian 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第10期1828-1832,共5页
In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be v... In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be verified by a designated person.Therefore, its wide applications are limited. For solving this problem, a new quantum proxy signature scheme using EPR quantumentanglement state and unitary transformation to generate proxy signature is presented. Proxy signer announces his public key whenhe generates the final signature. According to the property of unitary transformation and quantum one-way function, everyone canverify whether the signature is effective or not by the public key. So the quantum proxy signature scheme in our paper can be publicverified. The quantum key distribution and one-time pad encryption algorithm guarantee the unconditional security of this scheme.Analysis results show that this new scheme satisfies strong non-counterfeit and strong non-disavowal. 展开更多
关键词 quantum cryptography proxy signature quantum one-way function public verifiably
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部