LexisNexis Capsule Summary - Civil Procedure
中西方建筑文化差异中英文版
汇报人:XX
2024-01-24
• introduction • The History and Cultural Background of
Chinese and Western Architecture • The architectural styles and characteristics of
both Eastern and Western cultures • Differences in building materials and
structures between the East and the West
• The spatial layout and functional differences between Chinese and Western architecture
04
The Integration and Innovation of Eastern and Western Architectural Cultures
02
The History and Cultural Background of Chinese and Western Architecture
Pursuing personalization and artistry: Modern architectural design pursues the expression of personalization and artistry, showcasing the designer's creativity through unique shapes, colors, and materials.
Modern and Contemporary Architecture
民航旅客隐私数据动态分级脱敏处理方法
doi:10.3969/j.issn.1003-3114.2023.02.019引用格式:马龙,薛晨蕾,张乐.民航旅客隐私数据动态分级脱敏处理方法[J].无线电通信技术,2023,49(2):338-344.[MA Long,XUE Chenlei,ZHANG Le.Dynamic Hierarchical Desensitization Method of Civil Aviation Passenger Privacy Data [J].Radio Communications Technology,2023,49(2):338-344.]民航旅客隐私数据动态分级脱敏处理方法马㊀龙,薛晨蕾,张㊀乐(西安航空学院民航学院,陕西西安710077)摘㊀要:针对民航旅客个人隐私数据使用前脱敏时间长与复现应用差的问题,首先,根据网络信息安全技术,剖析了民航旅客隐私数据脱敏情景和动态角色分级控制问题,分别构建了动态角色分级控制模型和新型保留格式的隐私数据加密模型,实现了民航旅客隐私数据访问控制与加密处理的抽象化;其次,利用混合格式加密方法,提出了民航旅客隐私数据动态分级脱敏处理算法,解决了动态角色访问控制的分级脱敏处理问题;最后,通过10000条民航旅客的隐私数据验证了民航旅客隐私数据动态分级脱敏处理算法的性能,并将基本保留格式加密方法㊁混合格式加密方法和动态角色分级加密方法进行比较㊂结果表明,利用逆推变形关联剔除方法产生的重复率约为17%,这易于推导出原始敏感数据,而利用混合格式加密方法的重复率为20%,说明在逆推变形关联剔除方法的基础上进一步加密处理后的脱敏效果较好,强化了旅客隐私数据的深度保密性,且处理旅客敏感数据的时间较少,该算法具有较高的安全性和可靠性㊂关键词:民航旅客;隐私数据;分级控制;动态脱敏中图分类号:TN92㊀㊀㊀文献标志码:A㊀㊀㊀开放科学(资源服务)标识码(OSID):文章编号:1003-3114(2023)02-0338-07收稿日期:2022-12-30基金项目:陕西省科技厅软科学计划项目(2021KRM154);陕西省教育科学 十四五 规划项目(SGH21Y0251);西安航空学院校级自然科学专项基金(205012016);西安航空学院校级高等教育研究项目(2021GJ1006)Foundation Item :Soft Science Research Project of Science and Technology Department of Shaanxi Province (2021KRM154);Shaanxi Education ScienceFourteenth Five Year Plan Project (SGH21Y0251);Natural Science Special Fund Project of Xi an Aeronautics Institute (205012016);Higher Educa-tion Research Project of Xi an Aeronautics Institute (2021GJ1006)Dynamic Hierarchical Desensitization Method of Civil AviationPassenger Privacy DataMA Long,XUE Chenlei,ZHANG Le(School of Civil Aviation,Xi a n Aeronautical Institute,Xi a n 710077,China)Abstract :The problem of was caused by long desensitization time before used and poor reproduction of civil aviation passenger s personal privacy data.A solution was proposed.Firstly,the desensitization scenario of civil aviation passenger privacy data and the dynamic role hierarchical control problems were analyzed,depending on network information security technology.A dynamic role hierar-chical control model and the new reserved format privacy data encryption model was constructed respectively,for realizing the abstrac-tion of civil aviation passenger privacy data access control and encryption processing.Secondly,a dynamic hierarchical desensitization algorithm for civil aviation passenger privacy data was proposed using a hybrid format encryption method.And the hierarchical desensi-tization problem of dynamic role access control was solved.Finally,the performance of the dynamic hierarchical desensitization algorithm for civil aviation passenger privacy data was verified by privacy data of 10000civil aviation passengers.The basic reserved format en-cryption method,the mixed format encryption method and the dynamic role hierarchical encryption method were compared.Results showed that the repetition rate generated by the inverse deformation association elimination method was about 17%,the original sensitive data was still derived.The repetition rate of the mixed format encryption method was about 20%,which showed that the desensitization effect after further encryption processing based on the inverse deformation association elimination method was better.Also the depth con-fidentiality of passenger privacy data was strengthened,and the time to process passenger sensitive data was less.The algorithm has high security and reliability.Keywords :civil aviation passenger;privacy data;hierarchical control;dynamic desensitization0㊀引言民航旅客隐私数据是为旅客订座业务和货运业务需求提供的重要数据源,这些数据在企业应用系统之间频繁传输,由此会造成旅客隐私泄漏问题,势必使隐私敏感数据脱敏处理成为关键技术㊂目前,关于隐私数据脱敏处理方法的研究较多,例如,学者顾兆军等主要以敏感字段消除和关联处理为主,提出保留格式加密的数据关联模型,解决数据泄漏风险和实用问题[1];丁建立针对企业内部人员恶意或无意泄漏旅客隐私信息的问题,利用泛化加密方法,保障旅客信息安全[2];寇蒋恒在分析了民航信息系统数据库中的关键数据上,对敏感字段进行脱敏处理[3];然而这些研究成果无法反映企业人员角色动态变化要求和旅客隐私数据应用意图的辨识,由此众多研究成果以访问控制作为有效方法来解决隐私数据保护[4-8],但这些研究措施会使隐私数据共享应用和按需访问不足的问题㊂因此,如何将企业人员角色访问控制分级处理方法与混合格式加密方法进行协同应用,设计敏感数据脱敏情景下的隐私数据处理的深度研究成果较少㊂基于此,通过提出符合企业环境动态变化和旅客隐私数据使用意图辨识的加密处理方法,为解决民航旅客隐私数据供需双方透明化使用和高效处理敏感数据脱敏提供实用的参考和推广作用㊂1㊀提出问题1.1㊀脱敏数据的情景民航旅客个人隐私敏感数据构成结构复杂,且个人隐私信息在订座和货运等多种业务系统中频繁传输和复现应用,这样不可避免会出现旅客隐私数据的传输泄漏和复现使用困难问题,造成旅客隐私数据脱敏处理环境发生着显著变化,隐私数据脱敏方法和脱敏效果不理想㊂通常,民航旅客的隐私信息属性因业务需求而发生着不同的变化,但主要包括姓名㊁身份证号码㊁电话号码㊁订座信息和航班舱位信息等,特别是参考‘信息安全技术个人信息安全规范“GB/T35273-2020[9],个人隐私数据主要以相对敏感和不敏感的数据构成,其中,敏感的数据主要包括了旅客的姓名信息㊁身份证号码信息㊁电话号码㊁支付信息等,并将这些旅客隐私敏感数据作为脱敏处理的原始数据,其他信息按照特性差异的不同规则进行分级处理,如表1所示㊂根据表1的产生规则可以看出,不同类型的隐私数据的处理规则是不同的,这些隐私数据会衍生出其他隐私数据的子属性,由此必须采用不同的保留格式加密算法,见表2所示㊂表1㊀隐私敏感数据的产生规则Tab.1㊀Generated rule of privacy sensitive data敏感属性名称含义产生规则数据类型Passenger Name姓名姓+名Varchar(30) Passenger ID身份证号地址码(6)+出生日期(8)+顺序码(3)+校验码(1)Varchar(18) Telephone number电话号码网络识别号(3)+地区编号(4)+用户号码(4)Varchar(11) Payment method支付方式网银/微信/支付宝+账号+密码Varchar(19) Frequent Traveler Card No.常旅客卡号2位字母+9/12位数字Varchar(14) Ticket No.客票号3位机场代码+10位票号Varchar(13) Flight Number航班号航空公司两字代码+4位数字Varchar(30)表2㊀隐私敏感数据的子属性脱敏算法Tab.2㊀Sub-attribute desensitization algorithm for private sensitive data属性脱敏处理子属性相关脱敏算法姓名全部脱敏FF3身份证号出生日期字段的第11~14位IFX电话号码地区编号子属性FF1支付方式银行卡账号的第7~15位FF1航班号全部脱敏FF3出发机场全部脱敏FF3到达机场全部脱敏FF31.2㊀动态访问控制问题传统民航企业对旅客的隐私敏感数据的访问控制存在泛化制约问题,导致旅客的敏感数据访问受限或使用困难,主要表现为三方面:①未考虑业务人员的权限变化与业务需求数据的实时匹配问题,导致旅客隐私敏感数据的访问受限和应用难度增加;②未考虑旅客隐私数据分级分类访问控制方法,导致隐私敏感数据访问控制僵化处理;③未考虑隐私敏感数据提供者的授权选择,导致旅客无法确定个人隐私敏感数据的真实用途㊂2㊀民航旅客隐私数据的脱敏模型2.1㊀多重角色访问控制模型2.1.1分级访问控制模型理论为了从动态环境变化角度对民航旅客隐私敏感数据进行按需访问和变更权限问题,文献[10]研究了基于时间特性的角色访问控制模型,解决了网络用户的动态访问管理问题㊂由此,根据访问角色的分级控制策略,文中以企业业务人员访问权限动态变化来制定的隐私保护策略为主,利用授权控制服务器控制访问角色的权限等级和需求数据保护级别,按照访问请求者的权限等级给予隐私敏感数据量的控制㊂隐私数据授权访问控制,如图1所示㊂图1㊀隐私数据交互式访问模型Fig.1㊀Interactive access model for private data2.1.2访问角色动态分级处理模型根据访问控制交互控制过程,提出民航旅客隐私敏感数据访问角色动态分级处理模型,完成旅客隐私数据访问请求㊁访问角色识别㊁访问控制策略实施和访问信息授权决策应用的全过程交互式实施管理㊂如图2所示㊂图2㊀民航旅客隐私数据访问角色动态分级处理模型Fig.2㊀Dynamic hierarchical processed control model of privacy data for civil aviation passenger for access role㊀㊀①服务器端:民航旅客隐私数据处理服务器端是由授权㊁访问控制和数据库系统构成㊂按照授权等级分类访问常规信息数据库和隐私信息数据库,并根据业务人员环境变化动态变更访问级别,并向旅客端发起二次访问请求㊂②旅客端:民航旅客隐私数据主要源于旅客个人信息,而这些信息包含了常规信息和隐私信息,该端口主要为旅客提供友好的界面,便于旅客有选择地提供个人信息,同时,利用企业人员访问级别控制策略,通过服务器端向旅客发起二次访问请求,向旅客个人信息访问提供接口变换,动态访问不同需求条件下的旅客隐私数据㊂2.2㊀民航旅客隐私数据逆推变形关联剔除加密模型㊀㊀为了在民航企业旅客服务系统中能够正常应用旅客的隐私敏感数据,提出了民航旅客隐私数据逆推变形关联剔除加密模型,如图3所示㊂该模型在旅客隐私数据明文中增加关联属性剔除模块,对原始数据进行编码处理,形成整数型编码,对整数编码进行保留格式加密后,经过逆推变形处理后,解码处理形成旅客隐私数据的密文格式,建立旅客隐私数据的明文数据与加密数据的一对一关系,利用密钥复现原始属性信息,便于航空公司业务系统使用旅客隐私数据开展订座㊁值机和货运等销售业务㊂关于模型中涉及的基本理论可参考文献[1-2,11]㊂图3㊀逆推变形关联剔除加密模型Fig.3㊀Encryption model of inverse deformationassociation rejection根据图3的加密模型原理,主要是将民航旅客原始隐私数据中可能关联推断出隐私数据的关键属性进行剔除和遮掩操作,形成一种模糊的整数编码字符串,例如,一位民航旅客的身份证号码为passengerID ,经过逆推变形关联剔除加密后的身份证号码passengerIDᶄ,则参考表1定义的规则为r ,r :passengerID ɪ610118∗∗∗∗∗∗∗∗210∗,610118∗∗∗∗∗∗∗∗2102éëêêùûúú⇒passengerIDᶄ=610118∗∗∗∗∗∗∗∗2102㊂可以发现逆推变形关联剔除加密后的旅客身份证号码的中间部分完全模糊,无法真正辨识该身份证号码的全部内容,进而保护了民航旅客的重要隐私数据,而且通过该身份证号码的首尾部分数据,利用密钥可以快速复现身份证号码的原始信息,实现旅客隐私数据的实用性和高保真度㊂综合考虑表1的隐私敏感数据的产生规则,对旅客隐私数据的不同属性的加密过程如下[11]:①旅客姓名属性:旅客姓名是最为明显的信息,且会存在重名现象,在旅客服务系统中应用意义较小,需求全部脱敏处理;②身份证号码:对身份证号码中的前6位地区码保留,中间8位信息全部脱敏处理,后面3位顺序码全脱敏处理,最后1位校验码是从8~17位码推算处理;③旅客电话号码:对前3位电话运营商的网络识别号全部进行保留处理,对中间4~11位的各个地区号和用户个人编号进行保留格式加密处理;④支付方式:对前6位的支付方式进行保留处理,对7~11位的银行卡账号进行全脱敏处理,并推算出最后1位的校验位;⑤航班号:对前2位由航空公司二字代码构成的编码保留处理,对中间2位构成的各地区管理局编码和航班终点站管理局编码实施全保留处理,利用逆推变形关联法,可以推导计算出最后1位的去回程编码,并可得知航班的出发和到达机场位置㊂3㊀民航旅客隐私数据的脱敏算法根据第2节民航旅客隐私数据的脱敏分级处理理论和逆推变形关联剔除加密模型以及不同属性的加密过程,选取符合民航旅客个人隐私信息的脱敏算法,于是根据Dworkin 在2016年提出的具有代表性的单一保留格式加密(Format Preserving Encryp-tion,FPE)算法[12],即FF1和FF3,与Long 在2019年提出了混合格式的加密模型[13],这3种算法均使用了Feistel 网络结构[14],为此,考虑到FPE 和IPX 算法原理的相似性,提出适合单一格式和变长格式的混合保留格式加密算法,具体步骤如下[11]:步骤1㊀参数初始化[11],确定待加密隐私数据中全部属性X 的长度n ;给定变长属性信息的调整因子T ,定义轮值函数F K (n ,T ,i ,B )㊂步骤2㊀隐私数据中的部分属性加密[11];通过编码映射和关联剔除关系,将待加密的旅客隐私属性信息X 的转换到整数域中对应的数字m 1,获得逆推变形的Xᶄ,计算整数保留格式数据Y =⌊Xᶄ/2」,将Xᶄ分为左右两部分元组,计算L =Xᶄ[1,2, ,Y ]和R =Xᶄ[Y +1,Y +2, ,n ],将L 和R 作为Feistel 网络的输入值,经过20轮的计算,逆推变形后的Lᶄ和Rᶄ,获得旅客隐私信息密文Z =Lᶄ Rᶄ㊂步骤3㊀旅客隐私属性信息解密[11];根据输入的密文Z ,获得旅客隐私信息的明文结果㊂4㊀实验计算与结果分析4.1㊀实验环境为了验证在民航旅客隐私数据脱敏情景下的角色分级控制模型和混合格式隐私数据加密方法,必备的实验环境为[11]:Windows10企业版操纵系统,处理为Inter (R )Core (TM )i7-3520M CPU @2.90GHz,内存32GB㊂软件环境为:仿真软件为Matlab2018Ra,数据库系统为SQLite,使用classpath.txt 文件,实现Matlab 软件与数据库接口的连接㊂4.2㊀数据来源为了验证民航旅客隐私数据脱敏方法的处理效果,同时,综合考虑角色分级控制策略的影响,以旅客姓名㊁身份证号码㊁电话号码㊁支付方式㊁航班号等10000条实验数据,并涵盖了民航企业旅客服务系统所需的5种敏感属性数据,经过加密处理结果如表3所示㊂表3㊀民航旅客信息数据(以#号隐去部分数据)Tab.3㊀Information data of civil aviation passenger(part of data is hidden with#)序号姓名身份证号电话号码支付方式常旅客卡号航班号1罗##4206011948########138######85622577#########1689CA27#######49CZ5221 2曲##5126531931########186######52622188#########7090CA27#######20ZH2487 3王##5120651931########139######69622188#########5200CA33#######34FZ5208 4李##5223211948########138######25622126#########1883CA33#######23FM9620︙︙︙︙︙︙︙10000程##5201021942########131######79622577#########1883CA27#######81CZ56054.3㊀仿真应用结果分析4.3.1仿真结果分析1)单一格式保留加密处理结果利用数据库系统中的SQLite技术,运用结构化查询语言,对表5的基本数据进行查询,采用的基本查询语句是:Select旅客姓名㊁身份证号码㊁电话号码㊁支付方式㊁航班号from表3,运用逆推变形关联剔除加密算法对民航旅客隐私数据进行加密,结果如表4所示㊂表4㊀基本保留格式加密处理结果Tab.4㊀Encryption processing results of basic reserved format序号姓名身份证号电话号码支付方式常旅客卡号航班号1龒蹏敳420601194802287195138****91856225770921348421689CA273510856949CZ0996 2綦絲窳512653193106095323186****12526221885624678337090CA277688340220ZH3806 3甕辭篳512065193106497202139****30696221888755649635200CA335725659834FZ6731 4纞蝡螷522321194802179201138****89256221266532768551883CA337045328823FM4438︙︙︙︙︙︙︙10000膥戅5201021942052365817131****43796225770921664501883CA277815448681CZ7407㊀㊀由表4的处理结果可知,利用Dworkin提出的FF1和FF3单一格式加密算法,虽然对民航旅客隐私敏感数据处理后依旧保留原始数据中关键的信息,但是身份证号码中1~4位的出生年月还是完全相同,这是因为利用保留格式加密算法处理的旅客隐私数据明文与密文存在一对一联系,访问者获得旅客身份证号码后,在网络传输过程中攻击者可以逆推出完整的旅客隐私数据㊂2)混合格式加密处理结果为了弥补单一格式加密处理后的数据泄露问题,对旅客隐私数据进行分级加密处理,如表5所示㊂表5㊀出生年月元组脱敏处理结果Tab.5㊀Results of desensitization for tuple of birth序号身份证号基本保留格式加密数据逆推变形关联剔除数据混合格式加密数据14206011948########4206011948022871954206011849####519742060118490228####25126531931########5126531931060953235126531319####353251265313190609#### 35120651931########5120651931064972025120651139####702751206511390649#### 45223211948########5223211948021792015223211849####190252232118490217####︙︙︙︙︙100005201021942########52010219420523658175201021249####718552010212490523####㊀㊀从表5中1~4条的处理结果可以看出,旅客隐私数据中出生年份为 1948 和 1931 ,经过逆推变形后转变为 1849 和 1139 ,但是利用变长格式加密后,身份证号码最后4位成为密文信息,避免逆推后无法复现原始数据泄露的风险,提高了旅客隐私明文数据的保护效果㊂4.3.2隐私数据脱敏重复率效果分析为了客观判断逆推变形关联剔除加密模型和变长格式的混合保留格式加密算法的量化应用效果,以 1931 年为例,分别从1000㊁3000㊁5000和10000条元组中,选取身份证号码中的7~19位属性[11],利用文献[4]中计算脱敏重复率方法,比较了3种隐私数据脱敏方法的应用效果,如图4所示㊂图4㊀民航旅客敏感属性脱敏重复率效果Fig.4㊀Effect of desensitization repetition rate of sensitiveattributes of civil aviation passengers从图4的收敛曲线可知,使用3种加密方法分别对出生年份 1931 的重复率进行量化处理后,第1种方法加密后的重复率较低,无法很好地建立旅客隐私明文数据与密文数据的逻辑关系,而利用后2种方法加密后的重复率较高,保证利用密钥可以解密出隐私明文数据的真实内容,增强了隐私数据的复现应用效果㊂图5㊀民航旅客敏感数据处理时间比较Fig.5㊀Comparison of sensitive data processing time ofcivil aviation passengers从图5的收敛曲线可以发现,民航企业业务人员访问旅客隐私敏感数据量的增加与3种加密方法处理后的时间增加同时出现显著的递增关系,这是因为采用角色访问控制分级处理方法和混合格式加密算法后,业务需求访问请求和服务器处理时间都在增加,且隐私数据格式加密和解密处理时间增加,说明提出的分级访问控制和脱敏处理方法有着明显的实用价值㊂5 结束语民航旅客隐私数据的使用需要综合考虑应用需求㊁访问权限和复现重用的要求,经过角色访问控制分级处理方法和混合格式加密算法的系统性分析,并使用大量的实验数据进行仿真验证,为民航企业服务之需的旅客隐私数据脱敏处理提供理论方法和实用技术,但该方法还是会随着隐私数据访问量的增加而呈现明显的线性增长趋势,且隐私数据复现后的语义会发生变化,为了进一步解决上述方法的不足,还需要从多重语义分析和规则密钥方面展开深入研究,为民航企业应用系统的研发提供理论方向㊂参考文献[1]㊀顾兆军,蔡畅,王明.基于改进保留格式加密的民航旅客数据脱敏方法[J].信息网络安全,2021,21(5):39-47.[2]㊀丁建立,陈盼.基于泛化FPE 加密的民航旅客信息动态脱敏方法研究[J].信息网络安全,2021,21(2):45-52.[3]㊀寇蒋恒,何明星,陈爱良,等.民用机场航班信息系统数据脱敏[J].西华大学学报(自然科学版),2019,38(6):49-56.[4]㊀徐菲,何泾沙,徐晶,等.保护用户隐私的访问控制模型[J].北京工业大学学报,2012,38(3):406-409.[5]㊀ALLEN A L.Allen s Privacy Law and Society [M ].Eagan:Thomson West Publishers,2007.[6]㊀WILLIAMS M D.Privacy Management,the Law and Glo-bal Business Strategies:A Case for Privacy Driven Design[C]ʊProceedings of 2009International Conference onComputational Science and Engineerin,AI Magazine CSE2009.Vancouver:IEEE Computer Society Press,2009:60-67.[7]㊀霍成义.面向数据提供者的隐私保护访问控制模型[J].无线电工程,2014,44(2):5-8.[8]㊀HUNG P C K.Towards a Privacy Access Control Modelfor e-Healthcare Services[C]ʊThird Annual Conferenceon Privacy,Security and Trust.New Brunswick:DBLP,2005:12-14.[9]㊀全国信息安全标准化技术委员会.信息安全技术个人信息安全规范:GB/T35273-202[S].北京:中国标准出版社,2020.[10]黄建,卿斯汉,温红子.带时间特性的角色访问控制[J].软件学报,2003(11):1944-1954. [11]马龙,张兴,薛晨蕾,等.民航旅客隐私数据自适应分级控制与动态脱敏方法[J].中国科技信息,2023(2):117-121.[12]DWORKIN M.NIST Special Publication800-38G,Rec-ommendation for Block Cipher Modes of Operation:Meth-ods for Format-Preserving Encryption[EB/OL].[2022-12-20].http:ʊ/10.6028/NIST.SP.800-38G. [13]LONG C F,XIAO H.Construction of Big Data Hyper-chaotic Mixed Encryption Model for Mobile Network Pri-vacy[C]ʊ2019International Conference on VirtualReality and Intelligent Systems(ICVRIS).Jishou:IEEE,2019:90-93.[14]刘哲理,贾春福,李经纬.保留格式加密模型研究[J].通信学报,2011,32(6):184-190.作者简介:㊀㊀马㊀龙㊀西安航空学院副教授㊂主要研究方向:隐私信息安全㊁网络信息安全㊁航空应急救援物资优化管理等㊂㊀㊀薛晨蕾㊀西安航空学院讲师㊂主要研究方向:隐私信息安全㊁网络信息安全㊁交通运输规划管理等㊂㊀㊀张㊀乐㊀西安航空学院讲师㊂主要研究方向:民航隐私信息安全㊁民航隐私法规㊁民航信息系统等㊂。
LexisNexis Capsule Summary - Torts
[Note: Numbers in brackets refer to the printed pages ofUnderstanding Torts by John L. Diamond, Lawrence Levine,and M. Stuart Madden where the topic is discussed.]LexisNexis Capsule SummaryTortsAuthors' Note: Unless otherwise indicated, all references to Restatement sections refer to Restatement (Second) of Torts.PART A. INTENTIONAL TORTS AND PRIVILEGESChapter 1INTENTIONAL INTERFERENCES WITH PERSONS OR PROPERTY§ 1.01 Intent [3-7][A] Overview and DefinitionIntentional torts share the requirement that the defendant intentionally commit the elements that define the tort. Most contemporary courts adhere to the Restatement definition, which defines intent to mean either that the defendant desires or is substantially certain the elements of the tort will occur. [See Restatement § 8A; Garratt v. Dailey, 279 P.2d 1091 (Wash. 1955).][B] Transferred IntentUnder the transferred intent doctrine, accepted by many courts, intent can be transferred between five torts (battery, assault, false imprisonment, trespass to chattel, and trespass to land) and different victims within these five torts. For example, if A intends to assault B, but accidentally commits battery against B or another party C, A is liable for the battery. [See, e.g., Alteiri v. Colasso, 362 A.2d 798 (Conn. 1975).]The Restatement does not adopt the doctrine generally, but does endorse transferred intent between assault and battery. [See Restatement §§ 13, 21.][C] The Mistake DoctrineUnder the mistake doctrine, if a defendant intends to do acts which would constitute a tort, it is no defense that the defendant mistakes, even reasonably, the identity of the property or person he acts upon or believes incorrectly there is a privilege. If, for example, A shoots B‟s dog, reasonably believing it is a wolf, A is liable to B, assuming B has not wrongfully induced the mistake. [See, e.g., Ranson v. Kitner, 31 Ill. App. 241 (1888).] Courts have applied the mistake doctrine to a variety of intentional torts. Nevertheless, in many instances actors benefit from specific privileges, such as self-defense, whichprotects the defendant from liability for reasonable mistakes, notwithstanding the mistake doctrine.[D] Insanity and InfancyUnlike in criminal law, neither insanity nor infancy is a defense for an intentional tort. [See, e.g., McGuire v. Almy, 8 N.E. 2d 760 (Mass. 1937).] However, intent is subjective and requires that the defendant actually desires or be substantially certain the elements of the tort will occur. Consequently, if the defendant is extremely mentally impaired or very young, she may not actually possess the requisite intent.§ 1.02 Battery [7-10][A] Overview and DefinitionBattery occurs when the defendant‟s acts intentionally cause harmful or offensive contact with the victim‟s person. [See Restatement §§ 13, 16, 18.] Accidental contact, by contrast, must be analyzed under negligence or strict liability.[B] Intent RequirementWhile battery requires intent, the prevailing tort definition does not require an intent to harm. It is only necessary that the defendant intend to cause either harmful or offensive contact. [See, e.g., Vosburg v. Putney, 50 N.W. 403 (Wis. 1891).] The transferred intent doctrine is applicable to battery. [See § 1.01 [B], supra.][C] Harmful or Offensive ContactBattery encompasses either harmful or offensive contact. Even trivial offensive contact can constitute a battery.[D] CausationThe defendant's voluntary action must be the direct or indirect legal cause of the harmful or offensive contact. However, defendant need not herself actually contact the victim.§ 1.03 Assault [10-15][A] OverviewThe ancient tort of assault represents the still controversial recognition that pure psychological injury should be compensable. [See I de S et Ux v. W de S, Y.B. Lib.Ass., fol. 99, pl. 60 (1348).][B] DefinitionAssault occurs when the defendant's acts intentionally cause the victim's reasonable apprehension of immediate harmful or offensive contact. The Restatement, unlike many courts, deletes the requirement that apprehension be “reasonable”. [See Restatement §§ 21, 27. See also, e.g., Castro v. Loral 1199, National Health & Human Service Employees Union, 964 F. Supp. 719 (1997).][1] Intent RequirementAssault is an intentional tort. The defendant must desire or be substantially certain that her action will cause the apprehension of immediate harmful or offensive contact. The transferred intent doctrine is applicable to assault. [See § 1.01 [B], supra.][2] ApprehensionThe victim must perceive that harmful or offensive contact is about to happen to him. [See, e.g., Western Union Telegraph Co. v. Hill, 150 So. 709 (Ala. Ct. App. 1933).][3] Imminent Harmful or Offensive ContactFor assault to be actionable the victim's apprehension must be of imminent harmful or offensive contact. [See, e.g., Stump v. Wal-Mart Stores, Inc., 942 F. Supp. 347 (E.D. Ky. 1996).][4] Fear versus ApprehensionThe Restatement and several court decisions distinguish between "fear” and “apprehension.” The requisite apprehension of imminent contact need not produce fear in the victim. [See Restatement § 24 cmt. b.][5] Conditional AssaultAn assault made conditional on the victim's noncompliance with an unlawful demand still constitutes an assault, even if the victim is confident no assault will actually occur if the victim complies with the unlawful request.§ 1.04 False Imprisonment [15-20][A] Overview and DefinitionIn false imprisonment, the defendant unlawfully acts to intentionally cause confinement or restraint of the victim within a bounded area. Accidental confinement is not included and must be addressed under negligence or strict liability. [See Restatement §§ 35-45A.] The transferred intent doctrine is applicable to false imprisonment. [See § 1.01 [B], supra.][B] Bounded AreaThe victim must be confined within an area bounded in all directions. The bounded area can be, however, a large area, even an entire city. [See, e.g., Allen v. Fromme, 126 N.Y.S. 520 (1910).][C] Means of Confinement or RestraintFor false imprisonment to exist, the victim must be confined or restrained. [See, e.g., Dupler v. Seubert, 230 N.W. 2d 626 (Wis. 1975).] The confinement may be accomplished by (1) physical barriers; (2) force or threat of immediate force against the victim, the victim's family or others in her immediate presence, or the victim's property; (3) omission where the defendant has a legal duty to act; or (4) improper assertion of legal authority.The improper assertion of legal authority can unlawfully restrain a victim. This form of false imprisonment constitutes false arrest. The victim must submit to the arrest for it to constitute imprisonment. The arrest is improper if the actor imposing confinement is not privileged under the circumstances. [See Restatement § 41.][D] Consciousness of ConfinementFalse imprisonment requires that the victim be conscious of the confinement at the timeof imprisonment. [See, e.g., Parvi v. City of Kingston, 362 N.E. 2d 960 (N.Y. 1977).] The Restatement § 42 modifies this requirement and would find liability for false imprisonment, even when the victim is not aware of the confinement, if the victim is harmed by the confinement. Contrary to the Restatement, some authorities hold a child can be subject to false imprisonment even if the child was neither aware of the confinement nor harmed. [See Kajtazi v. Kajtazi, 488 F. Supp. 15 (E.D. N.Y. 1978).]§ 1.05 Trespass to Chattel and Conversion [20-24][A] OverviewTrespass to chattel and conversion are two separate intentional torts that protect personal property from wrongful interference. The two torts, which overlap in part, are derived from different historical origins. In many, but not all instances, both torts may be applicable.[B] Definition of Trespass to ChattelTrespass to chattel is the intentional interference with the right of possession of personal property. The defendant's acts must intentionally damage the chattel, deprive the possessor of its use for a substantial period of time, or totally dispossess the chattel from the victim. [See Restatement §§ 217, 218.]Trespass to chattel does not require that the defendant act in bad faith or intend to interfere with the rights of others. It is sufficient that the actor intends to damage or possess a chattel which in fact is properly possessed by another. [See, e.g., Ranson v. Kitner, 31 Ill. App. 241 (1888).]Historically, the doctrine of transferred intent has been applied to trespass to chattel (unlike conversion). [See § 1.01 [B], supra.][C] Definition of ConversionThe Restatement § 222A defines conversion as “an intentional exercise of dominion and control over a chattel which so seriously interferes with the right of another to control it that the actor may justly be required to pay the other the full value of the chattel.” [See, e.g., Moore v. Regents of the University of California, 793 P.2d 479 (Cal. 1990).]Only very serious harm to the property or other serious interference with the right of control constitutes conversion. Damage or interference which is less serious may still constitute trespass to chattel.Purchasing stolen property, even if the purchaser was acting in good faith and was not aware the seller did not have title, constitutes conversion by both the seller and innocent buyer.§ 1.06 Intentional Infliction of Mental Distress [24-32][A] DefinitionIntentional infliction of mental distress exists when the defendant, by extreme and outrageous conduct, intentionally or recklessly causes the victim severe mental distress. Most states no longer require that the victim suffer physical manifestations of the mental distress. [See, e.g., State Rubbish Collectors Ass'n v. Siliznoff, 240 P.2d 282 (Cal. 1952).] The Restatement defines extreme and outrageous conduct as behavior which is “beyond all possible bounds of decency and to be regarded as atrocious, and utterly intolerable in a civilized community.” [Restat ement § 46 cmt. d.] The vulnerability of the victim and the relationship of the defendant to the victim can be critical.[B] Constitutional LimitsIn Hustler Magazine v. Falwell, 485 U.S. 46 (1988), the United States Supreme Court held unconstitutional the determination that a parody “advertisement” in Hustler magazine could result in liability under intentional infliction of emotional distress. The majority held that a public figure could not recover without proving such statements were made with New York Times malice, i.e., with “knowledge or reckless disregard toward the truth or falsity” of the assertion. [See New York Times v. Sullivan, 376 U.S. 254(1964).] As the parody was never asserted to be truthful, and as it would not reasonably be interpreted as truthful by an ordinary reader, the court found there could be no liability.[C] Intent or Recklessness to Cause Severe Mental DistressFor recovery under intentional infliction of emotional distress, the plaintiff must prove that the defendant intended to cause severe emotional distress or acted with reckless disregard as to whether the victim would suffer severe distress. Although characterized as an “intentional” tort, recklessness, in addition to intent, generally suffices for liabil ity. [See Restatement § 46 cmt. i.][D] Third Party RecoveryIntentional infliction of mental distress is not one of the five historic intentional torts that transfers intent between these torts and between victims. [See § 1.01 [B], supra.]Courts have usually awarded a third-party victim recovery only if, in addition to proving the elements of the tort, she is (1) a close relative of the primary victim; (2) present at the scene of the outrageous conduct against the primary victim; and (3) the defendant knows the close relative is present. [See Taylor v. Vallelunga, 339 P.2d 910 (Cal. Ct. App. 1959).] The Restatement is somewhat less restrictive, requiring only that a primary victim's immediate family members be present and can prove the elements of the tort. Non-relatives who satisfy the elements of the tort can also recover under the Restatement if they are present and suffer physical manifestation of severe distress. [Restatement § 46 cmt. 1.] The Restatement's more permissive requirements have not received general explicit judicial acceptance.[E] Exception for Common Carriers and InnkeepersCommon carriers and innkeepers are liable for intentional gross insults which cause patrons to suffer mental distress. [See, e.g., Slocum v. Food Fair Stores of Florida, 100 So. 2d 396 (Fla. 1958).] There is no requirement the defendant behave in an extreme or outrageous manner or that the victim suffer extreme distress.Chapter 2PRIVILEGES TO INTENTIONAL TORTS§ 2.01 Consent [34-38][A] OverviewConsent is a defense to intentional tort liability. If the asserted victim gives permission, what would otherwise be tortious is instead privileged. [See Restatement § 892.][B] Express and Implied Manifestations of ConsentAn individual can convey consent expressly in words or through pictorial gestures. Alternatively, an individual can imply consent. Consent is implied when, under the circumstances, the conduct of the individual reasonably conveys consent. [See, e.g., O’Brien v. Cunard S.S. Co., 28 N.E. 266 (Mass. 1891).][C] Consent by LawConsent can also be implied by law. Generally courts recognize by law consent to emergency medical treatment by health professionals when a victim is unconscious and unable to provide consent.[D] Invalidating Manifestations of Consent[1] IncapacityBoth express and implied manifestations can be held invalid. An individual can be held to lack capacity to consent. A child, depending on her age, may consent only to less significant matters.An individual without sufficient mental capacity due to insanity or retardation may not legally consent. Incapacity can also be the result of drug ingestion (including alcohol). [See, e.g., Bailey v. Belinfante, 218 S.E. 2d 289 (Ga. Ct. App. 1975).][2] Action Beyond Scope of ConsentConsent is also invalidated if the action goes beyond the consent manifested. What constitutes the dimensions of the consent can often be a different issue of fact. [See, e.g., Hackbart v. Cincinnati Bengals, Inc., 601 F.2d 516 (10th Cir. 1979).]Since medical treatment requires consent, the determination of the effective actual consent is critical in this context. A medical procedure without the patient's consent can constitute a battery. [See, e.g., Mohr v. Williams, 104 N.W. 12 (Minn. 1905).] The failure to inform the patient of risks when procuring consent is now, however, usually treated under negligence.[3] FraudConsent is invalid if it is induced by fraud that misrepresents an essential aspect of the interaction.[4] DuressConsent procured under physical threat is invalid. However, as a general rule, economic pressure, while coercive, does not negate consent.[5] IllegalityThe traditional majority rule holds that a person cannot consent to a criminal act; the consent is always invalid. Taking the minority position, the Restatement holds that a person can consent to a criminal act for purposes of tort liability. The consent is still valid except where the criminal law is specifically designed to protect members of the victim's class. [See Restatement §§ 60, 61.]§ 2.02 Self-Defense [38-40][A] Overview and DefinitionSelf-defense constitutes a defense which can justify and therefore negate intentional tort liable. In essence, reasonable force can be used where one reasonably believes that such force is necessary to protect oneself from immediate harm. [See Restatement § 63.][B] The Threat Must be ImmediateSelf-defense must be in response to an immediate threat of harm.[C] The Victim's Response Must be ReasonableSelf-defense is only justified if the individual reasonably believes that force is necessary to avoid an unlawful attack. [See Drabek v. Sabley, 142 N.W.2d 798 (Wis. 1966).] The belief need not be correct, however.Force intended to inflict death or serious bodily injury is only justified if the individual reasonably believes she would suffer serious bodily injury or death from the attack.[D] The Obligation to Retreat From Deadly ForceThere is general agreement that there is no obligation to retreat from force not threatening death or serious bodily injury.There is disagreement among jurisdictions whether retreat is required where self-defense would require the use of force intended to inflict serious bodily injury or death. The traditional and still majority common law position does not require retreat, assuming the threatened individual has the legal right to be present or to proceed.The minority position, endorsed by the Restatement § 70, requires retreat where serious bodily injury or death would otherwise be required in self-defense. The minority position would not, however, require retreat from the victim's dwelling.§ 2.03 Defense of Others [40-41][A] OverviewA person can use reasonable force to protect a third person from immediate unlawful physical harm.The modern trend and now majority view holds there is a privilege to use reasonable force to protect a third party whenever the actor reasonably believes a third party is entitled to exercise self-defense. [See Restatement § 76.]§ 2.04 Defense and Recovery of Property [41-44][A] OverviewAn individual is privileged to use reasonable force to prevent a tort against her real or personal property. However, unlike self-defense, a reasonable mistake will not excuse force that is directed against an innocent party. [See Restatement § 77.][B] Reasonable ForceOnly reasonable force can be exercised in protection of property. Force intended to inflict death or serious bodily injury is never reasonable to protect merely property.Even slight force is unreasonable in defense of property if it is excessive. Consequently, if a verbal request would suffice, no force is justified.[C] Force Against an Innocent PartyForce in defense of property is only a defense when it is actually directed at a wrongdoer.A reasonable mistake that an individual has wrongfully interfered with property is not an excuse.[D] Defense of HabitationThe modern view is that the use of deadly force or force likely to cause serious bodily harm is not justified unless the intruder threatens the occupants' safety, by committing orintending to commit a dangerous felony on the property. [See Tennessee v. Garner, 471 U.S. 1 (1985).] Additionally, the homeowner may not eject a non-threatening trespasser or invited guest when doing so would subject that person to serious physical harm.The traditional common law view, still reflected in the Restatement, but increasingly discredited, would authorize the use of deadly force when needed to prevent mere intrusion into a dwelling. [See Restatement § 143 and caveat.][E] Mechanical DevicesIntentional mechanical infliction of deadly force, such as by the use of spring guns, is not privileged unless, in fact, such force was justified to defend oneself or another from deadly force. [See, e.g., Katko v. Briney, 183 N.W.2d 657, 659 (Iowa 1971).]Barbed wire fences and similar deterrents to enter land unlawfully are not generally perceived as intended to inflict death or serious bodily injury but are often designed only to deter entry. Whether liability ensues depends on whether the method of protecting the property under the circumstances was negligent.[F] Recovery of Personal PropertyAn individual may use reasonable force to recover property when in “hot pursuit” of the wrongdoer.The individual acts at her peril, however. If force is directed at an innocent party, privileged to possess the chattel, or against one acting out of a bona fide claim of right, whether or not such right is ultimately vindicated by the courts, the actor is liable even if the mistake was reasonable. [See Restatement §§ 101-104.]Many states have adopted a merchant's privilege, which allows stores to use reasonable force to detain a person for reasonable periods to investigate possible theft. [See Bonkowski v. Arlan's Department Store, 162 N.W.2d 347 (Mich. Ct. App. 1968).] The merchant's privilege generally allows reasonable mistake, so an innocent customer cannot recover against the store, provided the store acted reasonably.§ 2.05 Necessity [44-46][A] Overview and DefinitionNecessity is a defense which allows the defendant to interfere with the property interests of an innocent party in order to avoid a greater injury. The defendant is justified in her behavior because the action minimizes the overall loss. The defense is divided into two categories: public and private necessity.[B] Public NecessityPublic necessity exists when the defendant appropriates or injures a private property interest to protect the community. Public necessity is a complete defense. [See, e.g., Surocco v. Geary, 3 Cal. 70 (1853).][C] Private NecessityPrivate necessity exists when the individual appropriates or injures a private property interest to protect a private interest valued greater than the appropriated or injured property. [See, e.g., Vincent v. Lake Erie Transportation Co., 124 N.W. 221 (Minn. 1910).] Private necessity is an incomplete defense: the defendant is privileged to interfere with another's property, but is liable for the damage.[D] Personal Injury or DeathAn unresolved issue is whether necessity should ever justify inflicting intentional injury or even death. Some historical precedents would so authorize. [See, e.g., United States v. Holmes, 26 F. Cas. 360 (C.C.E.D. Pa. 1842).] The Restatement takes no position. [See §§ 199 and 262.]PART B. NEGLIGENCEChapter 3THE NEGLIGENCE CONCEPT AND THE REASONABLE PERSONSTANDARD OF CARE§ 3.01 Overview [49-50]To recover for negligence, the plaintiff must establish each of the following elements by a preponderance of the evidence (that is, by more than 50%) to establish a prima facie case: duty, standard of care, breach of duty, cause-in-fact, proximate cause (scope of liability) and damages.§ 3.02 Historical Development [50-51]Pre-negligence tort liability was based on a rather rigid writ system. The two writs most relevant to tort liability were “trespass” and “trespass on the case” (or “case”). The writ of trespass, for which liability was strict, came to cover direct and immediate harms. Plaintiffs who suffered indirect harms were required to prove some fault on the part of the defendant to recover under the writ of case. Beginning in the mid-1800s, American courts began to reject the writ system, replacing it with an approach focusing on specific torts such as negligence. Negligence has become the predominant basis for torts liability. § 3.03 Standard of Care [51]The standard of care is the level of conduct demanded of a person so as to avoid liability for negligence. Failure to meet this standard is characterized as breach of duty.§ 3.04 The Reasonable Person [51-64]The most common standard of care in negligence law commands the defendant to act as would a reasonably prudent person in the same or similar circumstances. If the defendant does so, she is protected from negligence liability. Failure to do so constitutes unreasonable conduct and, hence, breach of duty. The reasonable person standard is an objective standard that compares the defendant's conduct to the external standard of a reasonable person. Thus, the law imposes on each person of society an obligation to conform to the objective reasonableness standard. There is much debate about the fairness of this objective standard.Debate centers around the extent to which there is flexibility in this objective standard.[A] The Characteristics of the Reasonable PersonThe reasonable person possesses those attributes that a jury decides represent the community norms. The reasonable person is no real person nor any member of the jury. While the reasonable person's qualities are those the jury determines are the expected attributes of those in the community, the reasonable person cannot be expected to beinfallible. Further, the objective standard assumes that the reasonable person possesses the general experience of the community. It is the knowledge and understanding generally held by members of the community that is relevant.[B] Flexibility in the Reasonable Person StandardUsing the standard of the reasonable person under the same or similar circumstances, flexibility can be added through the “circumstances” part of the analysis. Ultimately, in most jurisdictions, a jury will be permitted to consider the physical conditions of the defendant and that the defendant was acting under emergency conditions. Most other characteristics, such as mental conditions or inexperience, are not taken into account.[1] EmergencyNearly all states permit the jury to consider in its determination of the defendant's reasonableness evidence that the defendant was acting under emergency conditions not of the defendant's making. The fact that the defendant was acting in an emergency does not necessarily exculpate the defendant from liability.[2] Physical ConditionsAs a general principle, because they are easily measured and perceived as tangible, the defendant's own physical qualities may be taken into account by the jury in the breach determination. Just because the party's physical condition is taken into account does not mean that she will be exonerated, however, as sometimes the physical condition of the party requires the use of greater care.[3] Mental ConditionsMost courts treat mental conditions as wholly irrelevant for purposes of negligence liability. The insane are held to a standard of sanity and people with cognitive disabilities are held to a level of normal intelligence.[4] The Effect of Superior Abilities, Skill or KnowledgeThe standard of care does not change for those with superior skills although the defendant's special skills may affect the jury's breach determination. The reasonable person standard sets the minimum of community expectations, and those able to provide more are expected to do so.[C] Gender Bias in the Reasonable Person StandardMost courts hav e replaced the “reasonable man” with a “reasonable person,” believing that this word change manages to remedy the male bias of the standard and the exclusion of women from the standard. Many feminist scholars disagree that a simple word change brings about an end to gender bias in the standard. Ultimately, the debate about theproper standard will continue, with some advocating a gender-inclusive standard and others arguing for a standard that focuses on the unique experiences of women.§ 3.05 The Child Standard of Care [64-66]Most jurisdictions hold children to a variation of a standard that compares their conduct to other reasonable children of the same age, experience, and intelligence under like circumstances. While it is objective in that it compares the child to an external standard of other children, it is far more subjective than the adult reasonable person standard as it allows the jury to consider the child's specific qualities such as experience and intelligence.[A] Adult ActivitiesMany jurisdictions have concluded that children should not be entitled to special treatment when they are engaged in adult or inherently dangerous activities, such as driving a car.§ 3.06 Degrees of Negligence [66]The notion of “highest” degrees of care m akes little sense. Such language cannot be justified in light of a standard of care requiring the defendant to act as a reasonable person under the same or similar circumstances. A defendant is negligent because of the failure to exercise reasonable care, and the amount of due care required of a defendant will vary with the circumstances.。
留学美国推介:斯克里普斯研究所
留学美国推介:斯克里普斯研究所
斯克里普斯研究所成立于1924年,是美国最大的私立非营利性生物医学研究机构,基础生物科学的研究领域一直处于世界领先水平,其研究的基础生物科学是医学研究中至关重要的一部分,它主要是探寻生命中最根本的进程。
在短短的三个十年,研究所建立了长期的跟踪记录了,并为改善人类的卫生状况作出了重大贡献。
斯克里普斯研究所基础研究含盖免疫学,分子和细胞生物学,化学,神经科学,自身免疫性疾病,心血管病学,病毒学和合成疫苗的发展。
TSRI在这些学科领域的研究均获得国际上的公认,其中以在生物分子的基本机构和设计方式的研究方面表现尤为突出,是少数几个世界领先的中心之一。
根据美国新闻与世界报道在2007年进行的排名,斯克里普斯研究学院在美国最好的生物科学研究院中排名第7位,在最好的化学研究院中排名第6位。
斯克里普斯研究所拥有多个研究中心和项目,包括综合性分子生物学中心(CIMBio),哈罗德?多里斯(Harold L. Dorris)神经研究所,海伦?多里斯(Helen L. Dorris)儿童及青少年精神疾病研究所,儿童期疾病和慢性病研究所,分子隔离中心,国际艾滋病疫苗研究机构(IAVI)设在TSRI的中和抗体中心,皮尔森(Pearson)酒精成瘾研究中心,斯克利普斯应用科学研究所,斯卡格(The Skaggs)化学生物学研究所,医学蠕虫研究所(WIRM)等。
斯克里普斯研究所强调建立基本的认识,在生物科学领域,为应用的医疗和物资的发现;追求基本的科学进步,通过跨学科的项目和合作,以及教育和培训研究人员准备,以满足科技革命的挑战对下一世纪。
Procedia Computer Science
Unlocking the promise of mobile value-added services byapplying new collaborative business models Original ResearchArticleTechnological Forecasting and Social Change , Volume 77, Issue 4, May 2010, Pages 678-693Peng-Ting Chen, Joe Z. Cheng Show preview | Related articles | Related reference work articlesPurchase $ 41.95 602 Software performance simulation strategies for high-level embedded system design Original ResearchArticlePerformance Evaluation , Volume 67, Issue 8, August2010, Pages 717-739Zhonglei Wang, Andreas Herkersdorf Close preview | Related articles |Related reference work articlesAbstract | Figures/Tables | ReferencesAbstractAs most embedded applications are realized in software, softwareperformance estimation is a very important issue in embedded system design.In the last decades, instruction set simulators (ISSs) have become anessential part of an embedded software design process. However, ISSs areeither slow or very difficult to develop. With the advent of multiprocessorsystems and their ever-increasing complexity, the software simulation strategybased on ISSs is no longer efficient enough for exploring the large designspace of multiprocessor systems in early design phases. Motivated by thelimitations of ISSs, a lot of recent research activities focused on softwaresimulation strategies based on native execution. In this article, we firstintroduce some existing software performance simulation strategies as well asour own approach for source level simulation, called SciSim , and provide adiscussion about their benefits and limitations. The main contribution of thisarticle is to introduce a new software performance simulation approach, callediSciSim (intermediate Source code instrumentation based Simulation), whichachieves high estimation accuracy, high simulation speed and lowPurchase $ 41.95implementation complexity. All these advantages make iSciSim well-suited for system level design. To show the benefits of the proposed approach, we present a quantitative comparison between iSciSim and the other discussed techniques, using a set of benchmarks.Article Outline1. Introduction2. Software performance simulation strategies2.1. Instruction set simulators2.2. Binary (Assembly) level simulation2.3. Source level simulation2.4. IR level simulation3. The SciSim approach for source level simulation3.1. Source code instrumentation3.2. Simulation3.3. Advantages and limitations of SciSim4. The iSciSim approach for performance simulation of compiler-optimized embedded software4.1. Intermediate source code generation4.2. Intermediate source code instrumentation4.2.1. Machine code extraction and mapping list construction4.2.2. Basic block list construction4.2.3. Static timing analysis4.2.4. Back-annotation of timing information4.3. Simulation4.3.1. Dynamic timing analysis4.3.2. Hardware and software co-simulation in SystemC5. Experimental results5.1. Source code vs. ISC5.2. Benchmarking SW simulation strategies 5.3. Dynamic cache simulation5.4. Simulation in SystemC6. Discussions and conclusions AcknowledgementsReferencesVitae603Computer anxiety and ICT integration in English classesamong Iranian EFL teachers Original Research ArticleProcedia Computer Science, Volume 3, 2011, Pages 203-209Mehrak Rahimi, Samaneh YadollahiClose preview | PDF (190 K) | Related articles | Related reference work articlesAbstract | ReferencesAbstractThe purpose of this study was to determine Iranian EFL teachers’ level of computeranxiety and its relationship with ICT integration into English classes and teachers’ personalcharacteristics. Data were collected from 254 Iranian EFL teachers by Computer AnxietyRating Scale, ICT integration rating scale, and a personal information questionnaire. Theresults indicated a positive relationship between computer anxiety and age; however,computer anxiety, gender, and experience of teaching were not found to be related. Aninverse correlation was found between computer anxiety and ICT integration. While ICTintegration correlated negatively with age and years of teaching experience, it was notfound to be related to gender.604An environmental decision support system for spatialassessment and selective remediation OriginalResearch ArticleEnvironmental Modelling & Software, Volume 26, Issue 6,June 2011, Pages 751-760Purchase$ 19.95Robert N. Stewart, S. Thomas Purucker Close preview | Related articles | Related reference work articles Abstract | Figures/Tables | ReferencesAbstractSpatial Analysis and Decision Assistance (SADA) is a Windows freewareprogram that incorporates spatial assessment tools for effective environmentalremediation. The software integrates modules for GIS, visualization,geospatial analysis, statistical analysis, human health and ecological riskassessment, cost/benefit analysis, sampling design, and decision support.SADA began as a simple tool for integrating risk assessment with spatialmodeling tools. It has since evolved into a freeware product primarily targetedfor spatial site investigation and soil remediation design, though itsapplications have extended into many diverse environmental disciplines thatemphasize the spatial distribution of data. Because of the variety of algorithmsincorporated, the user interface is engineered in a consistent and scalablemanner to expose additional functionality without a burdensome increase incomplexity. The scalable environment permits it to be used for both applicationand research goals, especially investigating spatial aspects important forestimating environmental exposures and designing efficient remedial designs.The result is a mature infrastructure with considerable environmental decisionsupport capabilities. We provide an overview of SADA’s central functions anddiscuss how the problem of integrating diverse models in a tractable mannerwas addressed.Article OutlineNomenclature1. Introduction2. Methods2.1. Sample design2.2. Data management and exploratory data analysis2.3. Spatial autocorrelation2.4. Spatial models3. Results 3.1. Scalable interfacing and decision support3.2. Risk assessment3.2.1. Human health risk3.2.2. Ecological risk3.3. Selective remedial design4. Discussion and ConclusionAcknowledgementsReferencesResearch highlights ► SADA is mature software for data visualization, processing, analysis, and modeling. ► User interface balances functional scalability and decision support. ► Widely used due to free availability and shallow learning curve . ► Integration of spatial estimation and risk tools allows for rich decision support. 605 CoDBT: A multi-source dynamic binary translator using hardware –software collaborativetechniques Original Research ArticleJournal of Systems Architecture , Volume 56, Issue 10,October 2010, Pages 500-508Haibing Guan, Bo Liu, Zhengwei Qi, Yindong Yang,Hongbo Yang, Alei LiangShow preview | Related articles | Related reference work articles Purchase $ 31.50606 An analysis of third-party logistics performance and service provision Original Research ArticleTransportation Research Part E: Logistics andTransportation Review , Volume 47, Issue 4, July 2011, Pages 547-570Chiung-Lin Liu, Andrew C. Lyons Purchase$ 41.95Show preview | Related articles | Related reference work articles 607 Intelligent QoS management for multimedia services support in wireless mobile ad hoc networks OriginalResearch ArticleComputer Networks , Volume 54, Issue 10, 1 July 2010, Pages 1692-1706Lyes Khoukhi, Soumaya Cherkaoui Show preview | Related articles | Related reference work articlesPurchase $ 31.50 608 Limit to improvement: Myth or reality?: Empirical analysis of historical improvement on threetechnologies influential in the evolution ofcivilization Original Research ArticleTechnological Forecasting and Social Change ,Volume 77,Issue 5, June 2010, Pages 712-729 Yu Sang Chang, Seung Jin Baek Show preview| Supplementary content| Related articles | Relatedreference work articlesPurchase $ 41.95 609An enhanced concept map approach to improving children’s storytelling ability Original Research ArticleComputers & Education , Volume 56, Issue 3, April 2011, Pages 873-884Chen-Chung Liu, Holly S.L. Chen, Ju-Ling Shih, Guo-Ting Huang, Baw-Jhiune Liu Show preview | Related articles | Related reference work articlesPurchase $ 24.95610Human –computer interaction: A stable discipline, a nascent science, and the growth of the longtail Original Research ArticleInteracting with Computers , Volume 22, Issue 1, January 2010,Pages 13-27Alan Dix Show preview | Related articles | Related reference work articlesPurchase$ 31.50 611Post-agility: What follows a decade of agility? Original Research ArticleInformation and Software Technology , Volume 53, Issue 5,May 2011, Pages 543-555Richard Baskerville, Jan Pries-Heje, Sabine MadsenShow preview | Related articles | Related reference work articlesPurchase $ 19.95612Confidentiality checking an object-oriented class hierarchy Original Research ArticleNetwork Security , Volume 2010, Issue 3, March 2010, Pages 16-20S. Chandra, R.A KhanShow preview | Related articles | Related reference work articlesPurchase $ 41.95 613 European national news Computer Law & Security Review , Volume 26, Issue 5, September 2010, Pages 558-563 Mark Turner Show preview | Related articles | Related reference work articlesPurchase $ 41.95 614 System engineering approach in the EU Test Blanket Systems Design Integration Original Research ArticleFusion Engineering and Design , In Press, CorrectedProof , Available online 23 February 2011D. Panayotov, P. Sardain, L.V. Boccaccini, J.-F. Salavy, F.Cismondi, L. Jourd’Heuil Show preview | Related articles | Related reference work articlesPurchase $ 27.95 615A knowledge engineering approach to developing mindtools for context-aware ubiquitouslearning Original Research ArticleComputers & Education, Volume 54, Issue 1, January 2010, Pages 289-297Hui-Chun Chu, Gwo-Jen Hwang, Chin-Chung Tsai Show preview | Related articles |Related reference work articles Purchase $ 24.95616“Hi Father”, “Hi Mother”: A multimodal analysis of a significant, identity changing phone call mediated onTV Original Research Article Journal of Pragmatics, Volume 42, Issue 2, February 2010,Pages 426-442Pirkko Raudaskoski Show preview | Related articles | Related reference work articlesPurchase $ 19.95 617Iterative Bayesian fuzzy clustering toward flexible icon-based assistive software for the disabled OriginalResearch ArticleInformation Sciences , Volume 180, Issue 3, 1 February 2010, Pages 325-340Purchase$ 37.95Sang Wan Lee, Yong Soo Kim, Kwang-Hyun Park,Zeungnam BienShow preview | Related articles | Related reference work articles 618 A framework of composable access control features: Preserving separation of access control concerns from models to code Original Research ArticleComputers & Security , Volume 29, Issue 3, May 2010, Pages 350-379Jaime A. Pavlich-Mariscal, Steven A. Demurjian, LaurentD. MichelShow preview | Related articles | Related reference work articlesPurchase $ 31.50 619 Needs, affect, and interactive products – Facets ofuser experience Original Research ArticleInteracting with Computers , Volume 22, Issue 5, September 2010, Pages 353-362Marc Hassenzahl, Sarah Diefenbach, Anja Göritz Show preview | Related articles | Related reference work articlesPurchase $ 31.50 620 An IT perspective on integrated environmental modelling: The SIAT case Original Research ArticleEcological Modelling , Volume 221, Issue 18, 10 September 2010,Pages 2167-2176P.J.F.M. Verweij, M.J.R. Knapen, W.P. de Winter, J.J.F. Wien, J.A. te Roller, S. Sieber, J.M.L. JansenShow preview | Related articles | Related reference work articlesPurchase $ 31.50。
维泰克2客户信-clsi折点性能参数补充说明书
VITEK 2客户信编号: CSN 4757-2尊敬的生物梅里埃用户:2020年7月, 生物梅里埃发布了客户信CSN-4757通知VITEK®2用户梅里埃已经完成了气单胞菌和弧菌多个抗生素CLSI折点的验证工作。
如果您在2020年7月收到通知后已经更新了折点, 我们抱歉地通知您当时发布的客户信表2性能参数部分存在笔误。
此次客户信的表2已经进行了更新,为便于识别,更新部分用黄色高亮显示。
该客户信其它部分同此前版本保持一致。
该评估使终端用户可以在VITEK® 2软件中应用CLSI折点。
表1中的CLSI折点都已经成功验证,均满足可接受标准,可用于患者或其它菌株测试,某些情况下需要增加一些限制信息.为了应用这些折点,需要在AES中创建自定义参数。
请参考VITEK® 2软件用户手册(修改折点部分)中的详细信息。
这些折点会被整合进未来新版本VITEK® 2软件Global CLSI-based参数集。
表2提供了应用CLSI折点下这些抗菌药物的性能参数信息。
之前出版的VITEK® 2文档尚未公布这些性能参数信息。
假如您选择实施这些CLSI折点,请留存该客户信。
附录1:举例如何创建高级报告工具(BIOART)规则,用于管理该客户信5-8页中的局限。
做为我们持续改善项目的一部分,梅里埃致力于提升产品质量,功能和易用性。
感谢您选择使用VITEK® 2系统,如果您有任何问题,请随时联系您当地的生物梅里埃代表。
此致敬礼梅里埃诊断产品(上海)有限公司2022年5月10日bioMérieux (Shanghai) Company Limited/梅里埃诊断产品(上海)有限公司表1:使用更新后的CLSI折点,表格中抗菌药物性能满足要求bioMérieux (Shanghai) Company Limited/梅里埃诊断产品(上海)有限公司*以下抗生素/细菌组合的结果存在局限,需要屏蔽报告。
Academic Universe (Lexis-Nexis) 说明书
2.商業類資料:包括報紙、期刊相關商業新聞、公司圖一、LexisNexis Academic Universe 主頁面貳、 檢索功能與技巧說圖一、LexisNexis Academic Universe 主頁面各類資料庫檢索技巧與說明快速資料主題索引項目:包括新聞、商業、法律、醫藥及參考資料新聞個案檢索 快速檢索 指導性新聞檢索公司資訊,可選擇全部美國公司、美國公營公司、美國私人公司或國際公司報告步驟一:新聞類型選擇【步驟一:選擇新聞類型】讀者可從下拉式選擇各類型新聞;Example: Select General News【步驟二:】此步驟將跟隨步驟一,例如讀者選出General News,則步驟二即會出現相對的選Select Major Papers【步驟三:輸入檢索詞彙】Input your search terms into the boxes provided.You do not need to enclose phrases within quotation marks. Combine the term you are searching with the field of the documentwhere you want the term to appear.Example:Enter computer software. Select Headline from the drop-down menu.Abstracts, Policy Papers, Time Incorporated Publications, or Ethnic News.Kansas News Sources。
斯仑贝谢所有测井曲线英文名称解释
斯仑贝谢所有测井曲线英文名称解释OCEAN DRILLING PROGRAMACRONYMS USED FOR WIRELINE SCHLUMBERGER TOOLS ACT Aluminum Clay ToolAMS Auxiliary Measurement SondeAPS Accelerator Porosity SondeARI Azimuthal Resistivity ImagerASI Array Sonic ImagerBGKT Vertical Seismic Profile ToolBHC Borehole Compensated Sonic ToolBHTV Borehole TeleviewerCBL Casing Bond LogCNT Compensated Neutron ToolDIT Dual Induction ToolDLL Dual LaterologDSI Dipole Sonic ImagerFMS Formation MicroScannerGHMT Geologic High Resolution Magnetic ToolGPIT General Purpose Inclinometer ToolGR Natural Gamma RayGST Induced Gamma Ray Spectrometry ToolHLDS Hostile Environment Lithodensity SondeHLDT Hostile Environment Lithodensity ToolHNGS Hostile Environment Gamma Ray SondeLDT Lithodensity ToolLSS Long Spacing Sonic ToolMCD Mechanical Caliper DeviceNGT Natural Gamma Ray Spectrometry ToolNMRT Nuclear Resonance Magnetic ToolQSST Inline Checkshot ToolSDT Digital Sonic ToolSGT Scintillation Gamma Ray ToolSUMT Susceptibility Magnetic ToolUBI Ultrasonic Borehole ImagerVSI Vertical Seismic ImagerWST Well Seismic ToolWST-3 3-Components Well Seismic ToolOCEAN DRILLING PROGRAMACRONYMS USED FOR LWD SCHLUMBERGER TOOLSADN Azimuthal Density-NeutronCDN Compensated Density-NeutronCDR Compensated Dual ResistivityISONIC Ideal Sonic-While-DrillingNMR Nuclear Magnetic ResonanceRAB Resistivity-at-the-BitOCEAN DRILLING PROGRAMACRONYMS USED FOR NON-SCHLUMBERGER SPECIALTY TOOLSMCS Multichannel Sonic ToolMGT Multisensor Gamma ToolSST Shear Sonic ToolTAP Temperature-Acceleration-Pressure ToolTLT Temperature Logging ToolOCEAN DRILLING PROGRAMACRONYMS AND UNITS USED FOR WIRELINE SCHLUMBERGER LOGSAFEC APS Far Detector Counts (cps)ANEC APS Near Detector Counts (cps)AX Acceleration X Axis (ft/s2)AY Acceleration Y Axis (ft/s2)AZ Acceleration Z Axis (ft/s2)AZIM Constant Azimuth for Deviation Correction (deg)APLC APS Near/Array Limestone Porosity Corrected (%)C1 FMS Caliper 1 (in)C2 FMS Caliper 2 (in)CALI Caliper (in)CFEC Corrected Far Epithermal Counts (cps)CFTC Corrected Far Thermal Counts (cps)CGR Computed (Th+K) Gamma Ray (API units)CHR2 Peak Coherence, Receiver Array, Upper DipoleCHRP Compressional Peak Coherence, Receiver Array, P&SCHRS Shear Peak Coherence, Receiver Array, P&SCHTP Compressional Peak Coherence, Transmitter Array, P&SCHTS Shear Peak Coherence, Transmitter Array, P&SCNEC Corrected Near Epithermal Counts (cps)CNTC Corrected Near Thermal Counts (cps)CS Cable Speed (m/hr)CVEL Compressional Velocity (km/s)DATN Discriminated Attenuation (db/m)DBI Discriminated Bond IndexDEVI Hole Deviation (degrees)DF Drilling Force (lbf)DIFF Difference Between MEAN and MEDIAN in Delta-Time Proc. (microsec/ft) DRH HLDS Bulk Density Correction (g/cm3)DRHO Bulk Density Correction (g/cm3)DT Short Spacing Delta-Time (10'-8' spacing; microsec/ft)DT1 Delta-Time Shear, Lower Dipole (microsec/ft)DT2 Delta-Time Shear, Upper Dipole (microsec/ft)DT4P Delta- Time Compressional, P&S (microsec/ft)DT4S Delta- Time Shear, P&S (microsec/ft))DT1R Delta- Time Shear, Receiver Array, Lower Dipole (microsec/ft)DT2R Delta- Time Shear, Receiver Array, Upper Dipole (microsec/ft)DT1T Delta-Time Shear, Transmitter Array, Lower Dipole (microsec/ft)DT2T Delta-Time Shear, Transmitter Array, Upper Dipole (microsec/ft)DTCO Delta- Time Compressional (microsec/ft)DTL Long Spacing Delta-Time (12'-10' spacing; microsec/ft)DTLF Long Spacing Delta-Time (12'-10' spacing; microsec/ft)DTLN Short Spacing Delta-Time (10'-8' spacing; microsec/ftDTRP Delta-Time Compressional, Receiver Array, P&S (microsec/ft)DTRS Delta-Time Shear, Receiver Array, P&S (microsec/ft)DTSM Delta-Time Shear (microsec/ft)DTST Delta-Time Stoneley (microsec/ft)DTTP Delta-Time Compressional, Transmitter Array, P&S (microsec/ft)DTTS Delta-Time Shear, Transmitter Array, P&S (microsec/ft)ECGR Environmentally Corrected Gamma Ray (API units)EHGR Environmentally Corrected High Resolution Gamma Ray (API units) ENPH Epithermal Neutron Porosity (%)ENRA Epithermal Neutron RatioETIM Elapsed Time (sec)FINC Magnetic Field Inclination (degrees)FNOR Magnetic Field Total Moment (oersted)FX Magnetic Field on X Axis (oersted)FY Magnetic Field on Y Axis (oersted)FZ Magnetic Field on Z Axis (oersted)GR Natural Gamma Ray (API units)HALC High Res. Near/Array Limestone Porosity Corrected (%)HAZI Hole Azimuth (degrees)HBDC High Res. Bulk Density Correction (g/cm3)HBHK HNGS Borehole Potassium (%)HCFT High Resolution Corrected Far Thermal Counts (cps)HCGR HNGS Computed Gamma Ray (API units)HCNT High Resolution Corrected Near Thermal Counts (cps)HDEB High Res. Enhanced Bulk Density (g/cm3)HDRH High Resolution Density Correction (g/cm3)HFEC High Res. Far Detector Counts (cps)HFK HNGS Formation Potassium (%)HFLC High Res. Near/Far Limestone Porosity Corrected (%)HEGR Environmentally Corrected High Resolution Natural Gamma Ray (API units) HGR High Resolution Natural Gamma Ray (API units)HLCA High Res. Caliper (inHLEF High Res. Long-spaced Photoelectric Effect (barns/e-)HNEC High Res. Near Detector Counts (cps)HNPO High Resolution Enhanced Thermal Nutron Porosity (%)HNRH High Resolution Bulk Density (g/cm3)HPEF High Resolution Photoelectric Effect (barns/e-)HRHO High Resolution Bulk Density (g/cm3)HROM High Res. Corrected Bulk Density (g/cm3)HSGR HNGS Standard (total) Gamma Ray (API units)HSIG High Res. Formation Capture Cross Section (capture units) HSTO High Res. Computed Standoff (in)HTHO HNGS Thorium (ppm)HTNP High Resolution Thermal Neutron Porosity (%)HURA HNGS Uranium (ppm)IDPH Phasor Deep Induction (ohmm)IIR Iron Indicator Ratio [CFE/(CCA+CSI)]ILD Deep Resistivity (ohmm)ILM Medium Resistivity (ohmm)IMPH Phasor Medium Induction (ohmm)ITT Integrated Transit Time (s)LCAL HLDS Caliper (in)LIR Lithology Indicator Ratio [CSI/(CCA+CSI)]LLD Laterolog Deep (ohmm)LLS Laterolog Shallow (ohmm)LTT1 Transit Time (10'; microsec)LTT2 Transit Time (8'; microsec)LTT3 Transit Time (12'; microsec)LTT4 Transit Time (10'; microsec)MAGB Earth's Magnetic Field (nTes)MAGC Earth Conductivity (ppm)MAGS Magnetic Susceptibility (ppm)MEDIAN Median Delta-T Recomputed (microsec/ft)MEAN Mean Delta-T Recomputed (microsec/ft)NATN Near Pseudo-Attenuation (db/m)NMST Magnetometer Temperature (degC)NMSV Magnetometer Signal Level (V)NPHI Neutron Porosity (%)NRHB LDS Bulk Density (g/cm3)P1AZ Pad 1 Azimuth (degrees)PEF Photoelectric Effect (barns/e-)PEFL LDS Long-spaced Photoelectric Effect (barns/e-)PIR Porosity Indicator Ratio [CHY/(CCA+CSI)]POTA Potassium (%)RB Pad 1 Relative Bearing (degrees)RHL LDS Long-spaced Bulk Density (g/cm3)RHOB Bulk Density (g/cm3)RHOM HLDS Corrected Bulk Density (g/cm3)RMGS Low Resolution Susceptibility (ppm)SFLU Spherically Focused Log (ohmm)SGR Total Gamma Ray (API units)SIGF APS Formation Capture Cross Section (capture units)SP Spontaneous Potential (mV)STOF APS Computed Standoff (in)SURT Receiver Coil Temperature (degC)SVEL Shear Velocity (km/s)SXRT NMRS differential Temperature (degC)TENS Tension (lb)THOR Thorium (ppm)TNRA Thermal Neutron RatioTT1 Transit Time (10' spacing; microsec)TT2 Transit Time (8' spacing; microsec)TT3 Transit Time (12' spacing; microsec)TT4 Transit Time (10' spacing; microsec)URAN Uranium (ppm)V4P Compressional Velocity, from DT4P (P&S; km/s)V4S Shear Velocity, from DT4S (P&S; km/s)VELP Compressional Velocity (processed from waveforms; km/s)VELS Shear Velocity (processed from waveforms; km/s)VP1 Compressional Velocity, from DT, DTLN, or MEAN (km/s)VP2 Compressional Velocity, from DTL, DTLF, or MEDIAN (km/s)VCO Compressional Velocity, from DTCO (km/s)VS Shear Velocity, from DTSM (km/s)VST Stonely Velocity, from DTST km/s)VS1 Shear Velocity, from DT1 (Lower Dipole; km/s)VS2 Shear Velocity, from DT2 (Upper Dipole; km/s)VRP Compressional Velocity, from DTRP (Receiver Array, P&S; km/s) VRS Shear Velocity, from DTRS (Receiver Array, P&S; km/s)VS1R Shear Velocity, from DT1R (Receiver Array, Lower Dipole; km/s) VS2R Shear Velocity, from DT2R (Receiver Array, Upper Dipole; km/s) VS1T Shear Velocity, from DT1T (Transmitter Array, Lower Dipole; km/s) VS2T Shear Velocity, from DT2T (Transmitter Array, Upper Dipole; km/s) VTP Compressional Velocity, from DTTP (Transmitter Array, P&S; km/s) VTS Shear Velocity, from DTTS (Transmitter Array, P&S; km/s)#POINTS Number of Transmitter-Receiver Pairs Used in Sonic Processing W1NG NGT Window 1 counts (cps)W2NG NGT Window 2 counts (cps)W3NG NGT Window 3 counts (cps)W4NG NGT Window 4 counts (cps)W5NG NGT Window 5 counts (cps)OCEAN DRILLING PROGRAMACRONYMS AND UNITS USED FOR LWD SCHLUMBERGER LOGSAT1F Attenuation Resistivity (1 ft resolution; ohmm)AT3F Attenuation Resistivity (3 ft resolution; ohmm)AT4F Attenuation Resistivity (4 ft resolution; ohmm)AT5F Attenuation Resistivity (5 ft resolution; ohmm)ATR Attenuation Resistivity (deep; ohmm)BFV Bound Fluid Volume (%)B1TM RAB Shallow Resistivity Time after Bit (s)B2TM RAB Medium Resistivity Time after Bit (s)B3TM RAB Deep Resistivity Time after Bit (s)BDAV Deep Resistivity Average (ohmm)BMAV Medium Resistivity Average (ohmm)BSAV Shallow Resistivity Average (ohmm)CGR Computed (Th+K) Gamma Ray (API units)DCAL Differential Caliper (in)DROR Correction for CDN rotational density (g/cm3).DRRT Correction for ADN rotational density (g/cm3).DTAB AND or CDN Density Time after Bit (hr)FFV Free Fluid Volume (%)GR Gamma Ray (API Units)GR7 Sum Gamma Ray Windows GRW7+GRW8+GRW9-Equivalent to Wireline NGT window 5 (cps) GRW3 Gamma Ray Window 3 counts (cps)-Equivalent to Wireline NGT window 1GRW4 Gamma Ray Window 4 counts (cps)-Equivalent to Wireline NGT window 2GRW5 Gamma Ray Window 5 counts (cps)-Equivalent to Wireline NGT window 3GRW6 Gamma Ray Window 6 counts (cps)-Equivalent to Wireline NGT window 4GRW7 Gamma Ray Window 7 counts (cps)GRW8 Gamma Ray Window 8 counts (cps)GRW9 Gamma Ray Window 9 counts (cps)GTIM CDR Gamma Ray Time after Bit (s)GRTK RAB Gamma Ray Time after Bit (s)HEF1 Far He Bank 1 counts (cps)HEF2 Far He Bank 2 counts (cps)HEF3 Far He Bank 3 counts (cps)HEF4 Far He Bank 4 counts (cps)HEN1 Near He Bank 1 counts (cps)HEN2 Near He Bank 2 counts (cps)HEN3 Near He Bank 3 counts (cps)HEN4 Near He Bank 4 counts (cps)MRP Magnetic Resonance PorosityNTAB ADN or CDN Neutron Time after Bit (hr)PEF Photoelectric Effect (barns/e-)POTA Potassium (%) ROPE Rate of Penetration (ft/hr)PS1F Phase Shift Resistivity (1 ft resolution; ohmm)PS2F Phase Shift Resistivity (2 ft resolution; ohmm)PS3F Phase Shift Resistivity (3 ft resolution; ohmm)PS5F Phase Shift Resistivity (5 ft resolution; ohmm)PSR Phase Shift Resistivity (shallow; ohmm)RBIT Bit Resistivity (ohmm)RBTM RAB Resistivity Time After Bit (s)RING Ring Resistivity (ohmm)ROMT Max. Density Total (g/cm3) from rotational processing ROP Rate of Penetration (m/hr)ROP1 Rate of Penetration, average over last 1 ft (m/hr).ROP5 Rate of Penetration, average over last 5 ft (m/hr)ROPE Rate of Penetration, averaged over last 5 ft (ft/hr)RPM RAB Tool Rotation Speed (rpm)RTIM CDR or RAB Resistivity Time after Bit (hr)SGR Total Gamma Ray (API units)T2 T2 Distribution (%)T2LM T2 Logarithmic Mean (ms)THOR Thorium (ppm)TNPH Thermal Neutron Porosity (%)TNRA Thermal RatioURAN Uranium (ppm)OCEAN DRILLING PROGRAMADDITIONAL ACRONYMS AND UNITS(PROCESSED LOGS FROM GEOCHEMICAL TOOL STRING)AL2O3 Computed Al2O3 (dry weight %)AL2O3MIN Computed Al2O3 Standard Deviation (dry weight %) AL2O3MAX Computed Al2O3 Standard Deviation (dry weight %) CAO Computed CaO (dry weight %)CAOMIN Computed CaO Standard Deviation (dry weight %) CAOMAX Computed CaO Standard Deviation (dry weight %) CACO3 Computed CaCO3 (dry weight %)CACO3MIN Computed CaCO3 Standard Deviation (dry weight %) CACO3MAX Computed CaCO3 Standard Deviation (dry weight %) CCA Calcium Yield (decimal fraction)CCHL Chlorine Yield (decimal fraction)CFE Iron Yield (decimal fraction)CGD Gadolinium Yield (decimal fraction)CHY Hydrogen Yield (decimal fraction)CK Potassium Yield (decimal fraction)CSI Silicon Yield (decimal fraction)CSIG Capture Cross Section (capture units)CSUL Sulfur Yield (decimal fraction)CTB Background Yield (decimal fraction)CTI Titanium Yield (decimal fraction)FACT Quality Control CurveFEO Computed FeO (dry weight %)FEOMIN Computed FeO Standard Deviation (dry weight %) FEOMAX Computed FeO Standard Deviation (dry weight %) FEO* Computed FeO* (dry weight %)FEO*MIN Computed FeO* Standard Deviation (dry weight %) FEO*MAX Computed FeO* Standard Deviation (dry weight %) FE2O3 Computed Fe2O3 (dry weight %)FE2O3MIN Computed Fe2O3 Standard Deviation (dry weight %) FE2O3MAX Computed Fe2O3 Standard Deviation (dry weight %) GD Computed Gadolinium (dry weight %)GDMIN Computed Gadolinium Standard Deviation (dry weight %) GDMAX Computed Gadolinium Standard Deviation (dry weight %) K2O Computed K2O (dry weight %)K2OMIN Computed K2O Standard Deviation (dry weight %)K2OMAX Computed K2O Standard Deviation (dry weight %) MGO Computed MgO (dry weight %)MGOMIN Computed MgO Standard Deviation (dry weight %) MGOMAX Computed MgO Standard Deviation (dry weight %)S Computed Sulfur (dry weight %)SMIN Computed Sulfur Standard Deviation (dry weight %) SMAX Computed Sulfur Standard Deviation (dry weight %)SIO2 Computed SiO2 (dry weight %)SIO2MIN Computed SiO2 Standard Deviation (dry weight %) SIO2MAX Computed SiO2 Standard Deviation (dry weight %) THORMIN Computed Thorium Standard Deviation (ppm) THORMAX Computed Thorium Standard Deviation (ppm)TIO2 Computed TiO2 (dry weight %)TIO2MIN Computed TiO2 Standard Deviation (dry weight %) TIO2MAX Computed TiO2 Standard Deviation (dry weight %) URANMIN Computed Uranium Standard Deviation (ppm) URANMAX Computed Uranium Standard Deviation (ppm) VARCA Variable CaCO3/CaO calcium carbonate/oxide factor。
艾迪玛克 CAP1200 双频无线AP 用户手册说明书
Powerful Mainstream Solution For Modern BusinessesCAP1200KEY FEATURES•802.11AC Dual -Band High Speed: IEEE 802.11ac concurrent dual-band with 1200Mbps wireless speed. •Easy Installation: Ceiling-mount & T-rail mount design with easy installation kit.•Compact & Durable Housing: Ultra slim design with UL94-5VB flame-retardant plastic housing.•Designed for High Density Usage: Supports up to 100* users simultaneously, ideal for crowded environments and BYOD (Bring Your Own Device) workplaces.•Multiple SSIDs for Security Management: Supports up to 32 SSIDs (16 x 2.4GHz & 16 x 5GHz) ideal for multiple departments, user groups, customers or guests.•Fast Roaming: Roams smoothly between APs without lag or interruption, ensuring top performance for video and voice streaming applications.•Wide Coverage & High Sensitivity: Adjustable RF output power and high receiver sensitivity for wide coverage across large spaces.•Seamless Mobility: 1.5x greater coverage than typical APs for blanket coverage to ensure seamless connectivity for Wi-Fi devices across enterprise environments.•Power over Ethernet: Supports IEEE 802.3af PoE as well as included power adapter.•Built -In RADIUS Server: With management for up to 256 user accounts.•Business Environments : Mainstream choice for SMBs. Suitable for a wide range of commercial applications such as offices, hotels, meeting rooms, schools, campuses, resorts, retail and others.•Central Management: Edimax Pro Network Management Suite (NMS) for easy and Intuitive web-based central management. AP built-in with NMS supports AP array architecture.2 x 2 AC Dual-Band Ceiling-Mount PoE Access PointThe CAP1200 is a powerful wireless solution designed to meet the needs of modern mainstream businesses with the latest IEEE 802.11ac technology for wireless speeds up to 1200Mbps. Industrial-grade performance and build quality combined with user-friendly operation, super-fast wireless speed, an extensive feature set and a practical, ceiling-mount design make an ideal dual-band solution for enterprise environments.For businesses that demand security, flexibility and speed – the Edimax Pro series has a wide range of potentialapplications from office environments to schools, campuses, hotels and hospitals. High-density capacity for up to 100* simultaneous users is ideal for BYOD workplaces or other environments with a high volume of users and wireless devices. Multiple SSIDs can be configured for different departments or user groups and a built-in RADIUS server provides additional verification with a scalable AP array architecture for central management of multiple access points. Fast roaming for seamless transitions between access points, Power over Ethernet support (PoE) and an intuitive web-based management interface providesflexibility for deployment and extensive management options for company MIS departments and network administrators.When performance and security are critical for yourbusiness, you need products that are engineered for your industry. The Edimax Pro series is designed to help your business and provide the connectivity that you rely on every day, with safety and effectiveness guaranteed.*The maximum users in 2.4GHz is depends on the interference condition of the environment.SSID 1Finance Dept.SSID 2Sales Dept.SSID 3Guest RoomSSID 4 VoIPWide Coverage & Multiple SSIDsBYOD Solution & High Density NetworkingFast RoamingHotels Offices Schools HospitalsEasy Installation KitCeiling mount and T-rail mount with bracket.2.4GHz2D Radiation Pattern@ Vertical 5GHz2D Radiation Pattern@ Vertical 2.4GHz2D Radiation Pattern@ Horizontal 5GHz2D Radiation Pattern@ Horizontal2.4GHz 5GHzConcurrent Dual-BandCentral Network Management: NMSWork with Edimax Pro NMS (Network Management Suite)* web-based wireless network management software. Company MIS administrators can plan and manage Edimax Pro access points’ powerful functionalityaccording to their office space using an easy, remote web-based interface which includes a dashboard, map view, traffic statistics and wireless client list for network-wide remote administration. RADIUS settings, WLAN group settings, access control, guest network settings and firmware upgrades can all be managed centrally from a single location to reduce network downtime, aid troubleshooting and optimize network performance.Graphical zone plans with Google Maps integration and setup wizards are also available for expanding and managing large networks with multiple access points, with custom floor plans, visual overviews and easy drag-and-drop icons for quick access to key performance and monitoring information.*NMS is built-in with Edimax Pro CAP, WAP series & OAP1750 access point.Hardware LAN Interface Giga x 1PoE 802.3af (Supports 802.3at)Antenna Type: 4 x Built-In PIFA (2 x 2.4GHz, 2 x 5GHz) /Gain: 2.82dBi (2.4GHz), 4dBi (5GHz) Max.Power DC: 12V / 1A802.3af (PoE Injector Optional)Dimensions 17.6 (D) x 3.2 (H) cmWeight305.7g PowerConsumption (Full Loading) 11W Mounting Ceiling Reset Y LED Indicator1. Power LED2. Diag LEDEnvironmental Conditions Operating Temperature: 0°C (32°F) to 40°C (104°F) Storage Temperature: -20°C (-4°F) to 60°C (140°F)Operating Humidity: 90% or Less Storage Humidity: 90% or LessPower Saving 802.3az Internal Buzzer YHousing UL94-5VB Flammability RatingOthers Kensington Security Slot & Ceiling/Wall Mount HolesWireless Standard 802.11 a/b/g/n/ac Concurrent Dual-BandNo. of Radios 2 Receiver Sensitivity ≤ -95dBm Certification CE/FCC 802.11 r/k Fast Roaming 5GHz OnlyNumber of SSIDs 16 (2.4GHz) + 16 (5GHz)Performance Maximum Data Speed300 + 867MbpsConcurrent Clients Up to 100 (50* (2.4GHz) + 50 (5GHz))Security Encryption WEP / WPA / WPA2Wireless L2 Isolation Y Station Isolation Y IEEE 802.1x Authenticator Y EAP Authentication PEAP Hidden SSID Y MAC Address Filter Y Wireless STA Y Rogue APDetection (w/NMS) YSoftware Wireless Mode AP / WDS AP / WDS Bridge802.1q VLAN Y (VID = 1-4095)Spanning Tree RSTP QoSWMM (802.11e) Max Associated Station No. Pass-Through IPv6 and VPN (PPTP, L2TP/IPsec)DSCP (802.1p) Y Multicast Rate up to 54MbpsYMaximum performance, actual data rates, and coverage will vary depending on network conditions and environmental factors. Product specifications and design are subject to change without notice.Copyright © 2017 Edimax Technology Co. Ltd. All rights reserved.SPECIFICATIONS2 x 2 AC Dual-Band Ceiling-Mount PoE Access PointRF SpecificationsFrequency Band •Radio Ⅰ: 802.11b/g/n 2.412~2.484(GHz) •Radio Ⅱ: 802.11a/n/ac 5.18~5.24(GHz), 5.745~5.825(GHz)(The supported frequency band is restricted by local regulations.)Operation Channels •2.4GHz : US/Canada 1-11 / Europe 1-13 / Japan 1-14 •5GHz : Country dependent for the following ranges: US/Canada:Band 1:36, 40, 44, 48; 5.180~5.240(GHz) Band 2: 52、56、60、64;5.260~5.320(GHz)Band 3: 100、104、108、112、116、120、124、128、132、136、140;5.500~5700(GHz)Band 4:149, 153, 157, 161, 165; 5.745~5.825(GHz) Europe:Band 1:36, 40, 44, 48; 5.180~5.240(GHz) Band 2: 52、56、60、64;5.260~5.320(GHz)Band 3: 100、104、108、112、116、120、124、128、132、136、140; 5.500~5700(GHz) Transmit Power (CE: 20dBm or lower, FCC:23dBm or lower)802.11b 23dBm@1Mbps 23dBm@2Mbps ************* 23dBm@11Mbps 802.11g 23dBm@6Mbps 23dBm@9Mbps 23dBm@12Mbps 23dBm@18Mbps 23dBm@24Mbps 22dBm@36Mbps 20dBm@48Mbps 19dBm@54Mbps 802.11gn (2.4G) 26dBm@MCS0/MCS8 25dBm@MCS1/MCS9 25dBm@MCS2/MCS10 25dBm@MCS3/MCS11 24dBm@MCS4/MCS12 23dBm@MCS5/MCS13 22dBm@MCS6/MCS14 22dBm@MCS7/MCS15 802.11a 23dBm@6Mbps 23dBm@9Mbps 23dBm@12Mbps 23dBm@18Mbps 23dBm@24Mbps 22dBm@36Mbps 20dBm@48Mbps 19dBm@54Mbps 802.11an(5G) 26dBm@MCS0/MCS8 25dBm@MCS1/MCS9 25dBm@MCS2/MCS10 24dBm@MCS3/MCS11 24dBm@MCS4/MCS12 23dBm@MCS5/MCS13 22dBm@MCS6/MCS14 21dBm@MCS7/MCS15 802.11ac 26dBm@MCS0 25dBm@MCS1 25dBm@MCS2 24dBm@MCS324dBm@MCS4 23dBm@MCS5 22dBm@MCS6 21dBm@MCS7 19dBm@MCS8 18dBm@MCS9Receiver Sensitivity802.11b ≤-95dBm@1Mbps ≤-90dBm@11Mbps 802.11g ≤-91dBm@6Mbps ≤-75dBm@54Mbps 802.11gn (2.4G) ≤-93dBm@MCS0 ≤-73dBm@MCS7 ≤-90dBm@MCS8 ≤-70dBm@MCS15 802.11a ≤-89dBm@6Mbp ≤-72dBm@54Mbps 802.11an(5G) ≤-92dBm@MCS0 ≤-71dBm@MCS7 ≤-89dBm@MCS8 ≤-68dBm@MCS15 802.11ac ≤ -86dBm@MCS0 ≤ -61dBm@MCS9≤ -83dBm@MCS10 ≤ -58dBm@MCS19ManagementDeploymentStandalone (AP mode)Master AP mode: Can manage 8 Edimax Pro APs with NMSManaged AP mode : Be managed by AP Controller (APC500), Edimax Pro Master AP with NMS softwareConfiguration HTTP/HTTPS SNMP v1, v2c, v3 CLI (Telnet, SSH)RADIUS Server Built-In Auto-Channel Y Private MIB YPackage Contents Access Point AC1200 Ceiling Mount PoE Access Point Mounting Bracket Ceiling-Mount & T-rail Mount Bracket Kit Power Adapter 12V / 1A Power Adapter CableEthernet CableCD / QuickInstallation Guide CD (User Manual & Multi-Language Quick Installation Guide) / Printed English Quick Installation Guide Accessories Optional GP-101IT IEEE802.3at PoE Injector*The maximum users in 2.4GHz is depends on the interference condition of the environment.。
开启片剂完整性的窗户(中英文对照)
开启片剂完整性的窗户日本东芝公司,剑桥大学摘要:由日本东芝公司和剑桥大学合作成立的公司向《医药技术》解释了FDA支持的技术如何在不损坏片剂的情况下测定其完整性。
太赫脉冲成像的一个应用是检查肠溶制剂的完整性,以确保它们在到达肠溶之前不会溶解。
关键词:片剂完整性,太赫脉冲成像。
能够检测片剂的结构完整性和化学成分而无需将它们打碎的一种技术,已经通过了概念验证阶段,正在进行法规申请。
由英国私募Teraview公司研发并且以太赫光(介于无线电波和光波之间)为基础。
该成像技术为配方研发和质量控制中的湿溶出试验提供了一个更好的选择。
该技术还可以缩短新产品的研发时间,并且根据厂商的情况,随时间推移甚至可能发展成为一个用于制药生产线的实时片剂检测系统。
TPI技术通过发射太赫射线绘制出片剂和涂层厚度的三维差异图谱,在有结构或化学变化时太赫射线被反射回。
反射脉冲的时间延迟累加成该片剂的三维图像。
该系统使用太赫发射极,采用一个机器臂捡起片剂并且使其通过太赫光束,用一个扫描仪收集反射光并且建成三维图像(见图)。
技术研发太赫技术发源于二十世纪九十年代中期13本东芝公司位于英国的东芝欧洲研究中心,该中心与剑桥大学的物理学系有着密切的联系。
日本东芝公司当时正在研究新一代的半导体,研究的副产品是发现了这些半导体实际上是太赫光非常好的发射源和检测器。
二十世纪九十年代后期,日本东芝公司授权研究小组寻求该技术可能的应用,包括成像和化学传感光谱学,并与葛兰素史克和辉瑞以及其它公司建立了关系,以探讨其在制药业的应用。
虽然早期的结果表明该技术有前景,但日本东芝公司却不愿深入研究下去,原因是此应用与日本东芝公司在消费电子行业的任何业务兴趣都没有交叉。
这一决定的结果是研究中心的首席执行官DonArnone和剑桥桥大学物理学系的教授Michael Pepper先生于2001年成立了Teraview公司一作为研究中心的子公司。
TPI imaga 2000是第一个商品化太赫成像系统,该系统经优化用于成品片剂及其核心完整性和性能的无破坏检测。
欧洲星(Eurostar)和欧罗菲斯(Flex)系列的绿色吸附剂及其他建筑材料清单说明书
611 Eurostar Lino Plus
Very low VOC emission
linoleum adhesive
414 Euroflex Lino plus
Linoleum adhesive with a high initial
grab
640 Eurostar Special
Very low VOC emission PVC adhesive
3
3
3
(permanent
3
3
bond option)
3
(permanent
3
3
bond option)
Whilst Forbo Flooring UK Limited does its best to ensure that the contents of this Adhesive Guide are correct and accurate at the time of publication, to the fullest extent permitted by law, Forbo Flooring UK Limited makes no, and expressly disclaims all, guarantees of any kind, express or implied in respect of the information, content, materials or products displayed in this Adhesive Guide and does not represent that the information is accurate, complete or current and you are advised to visit our website at for up-to-date details or corrections to such contents.
UPSIT翻译(中英文对照)-Development of UPSIT(201405)
本文描述了首个标准化“刮—嗅”式嗅觉测试方法的建立。在开展的五个实验中,招募的受试者累计超过1600名。在实验1中,对50种微囊气体就其强烈度、愉悦度、刺激度、冷暖度和熟悉度五种类型的感知进行评分,并对两种释放气味的方式进行了比较。在实验2中,基于实验1的结果及其他数据建立检测方法,并将其施用于大量的受试者。采用多元回归分析,结果表明测试得分同受试者的性别、种族背景、以及吸烟行为存在显著的关联性。测试平均得分随年龄的衰老而降低,在60至70岁之间降幅达到最大。这些与年龄相关的变化与韦氏记忆量表评分不存在相关联性。在所有的年龄段中,女性的表现均优于男性。在实验3中,测试结果表明这种检测能有效的区分已知嗅觉障碍(例如,KaUmann综合征;柯萨可夫氏综合征)和正常对照组的受试者,并能可靠地识别出伪装嗅觉完全缺失的人员。在实验4中,建立了重测信度(6个月时间间隔;r = 0.918,p<0.001)。在实验5中,检测结果表明了阈值与气味识别的关联性(r = -0.794,p<0.001)。现在这种自我测试的方式使得快速而准确地评估一般嗅觉功能成为可能,无论是在实验室、还是诊所,甚至是通过邮寄的方式,无需复杂的设备和占用空间来存储的化学品。
LCCI Complete Sample Assessment Material说明书
Paper ReferencePearson LCCIComplete the details below in block capitals.Candidate nameCentre Code Candidate NumberCandidate ID NumberTotal Marks*P57444A0112*Turn overASE20089 Sample assessment material for first teachingfrom September 2013Time: 3 hoursYou do not need any other materials.Instructions• Use black ink or ball-point pen– pencil can only be used for graphs, charts, diagrams etc.• Fill in the boxes at the top of this page with your name, candidate number,centre code and your candidate ID number.• Answer all questions.• Answer the questions in the spaces provided– there may be more space than you need.Information• The total mark for this paper is 100.• There are 5 questions in this question paper.• The marks for each question are shown in brackets.– use this as a guide as to how much time to spend on each question.• You may use an English or bilingual dictionary.Advice• Read each question carefully before you start to answer it.• Try to answer every question• Check your answers if you have time at the end.P57444A©2017 Pearson Education Ltd.1/Certificate in Advertising (VRQ)Level 3*P57444A0212*2SECTION AAnswer ALL questions. Write your answers in the spaces provided.1The House of Kayad plans to launch a major advertising campaign to encourage people to purchase a new perfume, called ‘Unforgettable’. The company has decidedto use a full-page colour advertisement to appear in women’s weekly magazines.The target audience is likely to consist of wealthy young women, aged between 18and 35. The company wants the perfume to be portrayed as being exotic, yet alsoclassic, to appeal to the more sophisticated consumer.The magazine advertisement should give readers the opportunity to experience thefragrance by applying for a free sample of the perfume. This can be done by visitingthe company’s website, and completing the applicationform.(a) Write all the copy, incorporating the entire wording for the full-page colouradvertisement to appear in suitable magazines for the ‘Unforgettable’ campaign.The advertisement should also include information on how to obtain the freeperfume sample.(10) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... ....................................................................................................................................................................................................................................................................................*P57444A0312*Turn over3 (b) Prepare separately the creative layout for the advertisement you have written, ready for the printer. You should indicate how headlines, sub-headlines, copy and any graphic elements, such as logotypes will be displayed. You must also indicate the fonts and type-sizes that are to be used.(10)........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................(Total for Question 1 = 20 marks)*P57444A0412*42 You have recently been employed as the advertising executive at Troid Ltd.,a company that manufactures branded laundry and cleaning products. Over the pasttwo years the company has made significantly lower profits than in previous years,mainly due to an economic recession.Your first task in your new role is to manage the promotional launch of the company’snew household cleaning powder. You are planning to implement an integratedmarketing communications approach. However, your colleagues have informed youthat there may not be enough money in the budget to do this as the company usesthe residual method in determining the advertising budget.The company appears to have never carried out any advertising planning. Therefore,you decide to raise this issue with Martin Green, who is the marketing manager.Write an email toMartinGreen,(*********************)inwhichyou:(a) explain the importance of advertising planning(4)(b) describe the information that you would include in the media strategy and tacticssection of an advertising plan(4)(c) discuss whether the residual method of setting an advertising budget is aneffective method to use in Troid’s current situation(4)(d) describe the role of the media department when preparing an advertisingcampaign for the new household cleaning powder. The campaign will use bothtraditional and new media.(6)(Candidates are awarded 2 marks for correct email format.)........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................*P57444A0512*Turn over5 ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................(Total for Question 2 = 20 marks)*P57444A0612*63 Burden is a new non-profit retail organisation for homeless people. It has openeda number of shops selling new products such as cane furniture from Thailandand Vietnam. The new managing director has previous practical experience ofusing advertising agencies. However, her experience is from having worked in thecommercial sector.The organisation needs advice on how to promote itself and advertise its servicesfor the first advertising campaign. You work as a consultant and have been asked toadvise the managing director.(a) Explain how advertising can be used by non-profit organisations, such as Burden.(10)........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ (b) Explain how current trends in shopping habits have changed the way manyretailers now advertise.(6)........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................*P57444A0712*Turn over7 (c) (i) Explain what is meant by pretesting advertising campaigns.(2)........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ (ii) State two reasons why Burden should pre-test their advertising campaign.(2)........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................(Total for Question 3 = 20 marks)4 (a) Explain how each of the following, obtained from media research, can be used to improve the effectiveness of advertising when using a printed medium. (i) Coverage (2)........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ (ii) Frequency (2)........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ (b) Describe the information obtained from media research that would be helpful to an advertiser when selecting a radio station for a campaign.(8)................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................。
数学基础课支撑土木类专业拔尖人才培养与创新实践
Creative Education Studies 创新教育研究, 2023, 11(4), 766-771 Published Online April 2023 in Hans. https:///journal/ces https:///10.12677/ces.2023.114118数学基础课支撑土木类专业拔尖人才培养与 创新实践刘 超1,2*,王旭东1,邵珠山1,何春辉21西安建筑科技大学理学院,陕西 西安 2西安建筑科技大学土木工程学院,陕西 西安收稿日期:2023年3月2日;录用日期:2023年4月12日;发布日期:2023年4月21日摘 要数学基础课是土木类专业学生必修的一门公共基础课,对于培养其逻辑思维、抽象能力、创新意识和解决实际问题的能力具有重要作用。
文章分析了当前数学基础课在土木类专业拔尖人才培养中存在的问题和挑战,提出了改革和优化数学基础课教学内容、方法、模式和评价机制的建议,同时提出一系列有效的创新实践的方法,以期提高数学基础课教学质量和效果,为土木类专业拔尖人才培养与创新实践提供坚实的理论支撑。
关键词数学基础课,土木类专业,拔尖人才,创新实践Basic Mathematics Courses to Support the Cultivation of Top Talents and Innovative Practices in Civil EngineeringChao Liu 1,2*, Xudong Wang 1, Zhushan Shao 1, Chunhui He 21College of Science, Xi’an University of Architecture and Technology, Xi’an Shaanxi 2College of Civil Engineering, Xi’an University of Architecture and Technology, Xi’an Shaanxi Received: Mar. 2nd , 2023; accepted: Apr. 12th , 2023; published: Apr. 21st , 2023AbstractThe basic mathematics course is a compulsory public foundation course for civil engineering stu-*通讯作者。
【CLECSS1610】
【CLECSS1610】首先,非常感谢CLECSS在求学路上对我的帮助和支持。
一年LLM的时间转瞬即逝,但回想起来又很充实,经历了许多。
这一年对我来说是一个开眼界的过程,积攒了很多经验,都还没细细咀嚼。
要小结这一年就读体验的话,也不知道该怎么下笔。
简单写几点感受,希望能为大家作参考。
一、学在哈佛哈佛法学院的课程,有包括course、seminar、reading group、clinic等在内的不同类型。
老师的教学风格各有千秋,每门课都能有独特的体验。
像合同法、民事诉讼法、侵权法等基础学科,老师大多采用苏格拉底式教学法。
我在宪法课上对这一教学方式深有体会。
这门课上只要被老师叫到,起码要经过七八个来回的拷问才能脱身。
这样深入的纠问,往往能问出新观点,发展出新问题。
到热烈时,也会有很多同学按捺不住,举手参与到讨论中。
有时,同学之中会根据一个问题衍生出对立的两个派别,此时老师便顺势来个辩论会,让双方的观点来个酣畅淋漓的交锋。
Seminar的课堂规模比较小,一个老师二十几个学生围坐在一起,像研讨会一样,每节课就一个主题畅所欲言。
我很喜欢Seminar的形式,因为课堂人数少,每个人都有充分的表现机会,参与感很强。
Workshop偏向实践性教学,典型代表是哈佛法学院的王牌课程Negotiation Workshop。
这门课的强度非常大,但是确实锻炼个人的能力。
每节课布置一个案例,让同学们两两进行模拟谈判,在练习与反馈的往复中,可以逐渐认识到自己在谈判过程甚至在人际交往之中的问题,然后在更多的练习中尝试着改变。
Clinic就是法律诊所了,学生可以参与真实的案子,真正地在实践中学习。
哈佛的法律诊所有三十多个,主题各式各样,包括人权、移民难民、监狱法律援助、体育法、环境法、劳动法等等。
很多同学在Clinic中完成了纽约bar所要求的50小时的pro bono。
也有很投入的同学,JD 三年共完成了一千多个小时的pro bono。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
LexisNexis Capsule SummaryCivil ProcedureChapter 1STATE AND FEDERAL COURT SYSTEMS§ 1.01 Federal Judicial System(1) Federal district courts are courts of original jurisdiction.District courts, like all federal courts, are also courts of limited subject matter jurisdiction, in that statutes authorize them to hear only certain kinds of cases, namely those based on federal questions or diversity of parties.(2) Circuit Courts are courts of appellate jurisdiction as they are authorized only to review decisions on appeal from district courts,certain specialized federal courts or federal administrative agencies. There are thirteen federal circuit courts; twelve for each one of the geographic circuits and one designated as the Federal Circuit which hears appeals from various specialized federal courts. Appeals from many of the administrative agencies go to the Court of Appeals for the D.C. Circuit.(3) United States Supreme Court has original jurisdiction over cases affecting ambassadors and in which states are parties. Its appellate jurisdiction over all other types of cases is largely discretionary. The Court‘s rules list the following factors as relevant in granting certiorari:∙inter-circuit conflicts∙conflicts between the courts of appeals and state courts of last resort∙interstate conflicts on federal questions∙conflicts with Supreme Court decisions on federal questions∙important and unsettled federal questions∙Other federal rulings calling for the exercise of the Supreme Court‘s power of supervision.§ 1.02 State Judicial SystemsState judicial systems typically include:(1) A variety of courts of limited subject matter jurisdiction,authorized to hear specific types of cases, e.g., traffic, landlord-tenant, small claims or probate.(2) A court of original and general jurisdiction that hears all claims not exclusively vested in courts of limited jurisdiction, such as state claims and nonexclusive federal question claims that also could have been brought in federal district courts. State courts of general jurisdiction often exist at the county level. Such courts vary in their designations, e.g., Superior Court in the District of Columbia, Circuit Court in Virginia, and Supreme Court in New York.1In some states courts of general jurisdiction also possess appellate jurisdiction over cases originally tried in courts of limited jurisdiction. Appellate review in such cases is de novo; little or no deference is paid the lower court decision because of restrictions on its jurisdiction and, in many cases, on its procedures.(3) An intermediate appellate layer, generally available only in more populous states. In some jurisdictions, the decision of the intermediate appellate court is final for the most fact-bound and routine kinds of cases, such as domestic relations and non-capital criminal cases, subject perhaps to discretionary appeal for constitutional questions.(4) A court of appellate jurisdiction, variously called the Supreme Court, the Court of Appeals, or, in Massachusetts, the Supreme Judicial Court. Where a state provides for an intermediate appellate court, the existence of such allows the highest state court to exercise considerable discretion in selecting cases for further review. Appeal from the intermediate appellate court to the highest court is predominantly by permission, with exceptions for a small number of important cases selected by the legislatures, suchas administrative law cases involving governmental parties or capital criminal cases. Finally, the United States Supreme Court has the authority to review state court rulingson the meaning and application of federal law, although in practice the Court seldom exercises this authority.§ 1.03 Selecting the Court in Which to Bring SuitThe following factors influence the parties‘ choice of forum for litigating a given matter:(1) there must be sufficient contacts between the defendant and the forum state to exercise personal jurisdiction over the defendant (see Chapter 2);(2) the court must possess subject matter jurisdiction over the controversy (see Chapter 4);(3) where a case is originally brought in state court but may be subject to the jurisdiction of the federal court as well, the defendant will consider opportunities for removal to federal court (see Chapter 2);(4) concerns of judicial efficiency and convenience of parties and witnesses will influence the appropriate venue within a specific court system in which to try the case (see Chapter 5);(5) various tactical factors such as: reputation of judges presiding in specific courts, court calendars, and procedural differences influencing, for example, availabilityof a jury trial, required level of agreement for verdicts, applicable rules of evidence or availability of appellate review (see Chapters 12, 13);2(6) client characteristics;(7) where suit can be brought in more than one jurisdiction, differences in substantive law will be evaluated so that the law most favorable to a party‘s claim may be applied (see Chapter 6).3Chapter 2PERSONAL JURISDICTION§ 2.01 Personal Jurisdiction Based on Citizenship, Consent and Waiver[1] Suit in the Defendant’s Home StateA defendant is subject to the personal jurisdiction of his/her/its home state. ―Home state‖ may be defined:(1) for individuals by residence, citizenship and domicile.In Milliken v. Meyer, 311 U.S 457 (1940), the Supreme Court upheld the validity of personal jurisdiction based on domicile even though the defendant was absent from the state at the time.(2)for corporations by the state of incorporation or where the corporation conducts its principal operations.[2] ConsentA defendant may consent to the court‘s personal jurisdiction in advance of suit, and such consent, if expressly made, functions to cure any jurisdictional defects that might otherwise exist. Examples of express consent include:(1) forum-selection clauses in contracts [see Carnival Cruise Lines, Inc. v. Shute, 499 U.S. 585 (1991), in which the Court upheld a clause printed on the back of the plaintiff‘s steam ship ticket]; and(2) consent documents filed by foreign corporations with state authorities as a condition for doing business in the forum.[3] WaiverWhen a nonresident defendant objects to a state‘s personal jurisdiction over him/her on due process grounds, he/she must preserve such objection or risk waiving it. Waiver need not be express. It is enough that a party act in a way which is incompatible with the party‘s argument that the forum lacks a basis for asserting personal jurisdiction overhim/her.Defendant will waive his/her challenge to personal jurisdiction if he/she either fails to include it in a motion to dismiss made on other grounds, or fails to otherwise raise the matter by motion or pleading.Today, most states, as well as the federal system, no longer require a defendant to make a special appearance for the purpose of contesting jurisdiction, separate and apart from any4other grounds on the merits of the case. Defendant does not prejudice his/her motion to dismiss by joining with it other grounds for dismissal.§ 2.02 When Parties Cannot be Served Within the Forum StateIn the seminal case of Pennoyer v. Neff, 95 U.S. 714 (1877), the Supreme Court held that due process prevented suit against nonresident defendants who could only be found and served elsewhere.Pennoyer involved a default judgment entered by an Oregon state court against Neff for attorn ey‘s fees. Neff was neither a citizen of Oregon nor had he been served there, although he did own property in the state. Neff‘s Oregon property was seized and sold by the sheriff to Pennoyer in order to satisfy the judgment. Subsequently, Neff sued Pennoyer in federal court for recovery of his property.Concluding that Oregon could not exercise personal jurisdiction over Neff in an action to determine personal liability, the Court invalidated the default judgment and resulting sheriff‘s sale. The Court held that if a state court attempts to exercise personal jurisdiction over a defendant, the defendant ―must be brought within its jurisdiction by service of process within the State, or his voluntary appearance.‖§ 2.03 Minimum Contacts with Forum State[1] International ShoeIn International Shoe Co. v. Washington, 326 U.S. 310 (1945), the Supreme Court articulated a new test of determining whether personal jurisdiction exists over a nonresident defendant who cannot be found and served within the forum state: whether the defendant has certain minimum contacts with the forum state, such that the maintenance of the suit does not offend ‗traditional notions of fair play and substantial justice.‘ ‖The facts of International Shoe are as follows: International Shoe Company was incorporated in Delaware and had its principal place of business in Missouri. The company employed Washington residents to solicit orders there, who reported directly to the company‘s main office in Missouri. The state of Washington sued International Shoe to collect unemployment compensation tax upon salaries defendant had paid to its Washington employees, and International Shoe challenged personal jurisdiction in Washington. The Supreme Court affirmed Washington‘s exercise of personal jurisdiction over International Shoe, finding sufficient contacts with the state to do so. International Shoe identified two types of contacts a nonresident defendant could have with the forum:(1) those related to the controversy (specific jurisdiction); and5(2) those unrelated to the controversy that are of such a nature as to justify suit against defendant in the current controversy (general jurisdiction).[2] Contacts Related to the Controversy[a] Single or Isolated ActivitiesIn International Shoe, the Supreme Court noted that a corporation‘s ―single or isolated items of activities in a state . . . are not enough to subject it to suit on causes of action unconnected with the activities there‖; in McGee v. International Life Ins. Co., 355 U.S. 220 (1957), the Court addressed the issue of whether a “single or isolated activities” related to the controversy could support personal jurisdiction. The Court answered in the affirmative.McGee, as the beneficiary of her deceased son‘s life insurance policy, sued defendant International Life in California. Defendant was served by mail in Texas, its corporate home. International Life declined to appear in the case and plaintiff obtained a default judgment in California, which she attempted to enforce in Texas. International Life collaterally attacked the judgment, arguing that California did not have personal jurisdiction.Despite the fact that the defendant conducted virtually no business in California, with the only California poli cy in force being the decedent‘s, the Court nonetheless held that California had validly exercised jurisdiction over the defendant. The Court emphasized the fact that the contract sued upon had a substantial connection to the forum state, as well as Calif ornia‟s strong interest in protecting its citizens.[b] Sufficient Related Contacts FoundBurger King Corp. v. Rudzewicz [471 U.S. 462 (1985)] demonstrated that not all of the defendant‘s contacts related to the controversy must be within the forum. Through negotiation with Burger King‘s regional office in Michigan, Rudzewicz and another Michigan defendant obtained a franchise in that state. Defendants failed to make payments, and Burger King brought a federal diversity suit on the franchise agreement in Florida, its headquarters and place of incorporation.The Supreme Court concluded that personal jurisdiction over Rudzewicz was constitutional, finding that there were enough Florida contacts related to the controversy to satisfy the test. Defendants at times dealt directly with Burger King‘s Miami headquarters; they contracted with Burger King to have Florida law govern the franchise agreement;and they promised to send their franchise payments to BurgerKing‘s Florida address. Under the circumstances, the Court refused to attach importance to the fact that Rudzewicz had not been in the forum state.6[c] Insufficient Related Contacts FoundIn World-Wide Volkswagen v. Woodson, 444 U.S. 286, 297 (1980), the Court further refined the minimum con tacts test, stating that ―critical to due process analysis . . . is that the defendant‘s conduct and connection with the forum State as such that he should reasonably anticipate being haled into court there.‖In this case, the plaintiffs purchased an Audi from defendant retailer Seaway Volkswagen in New York. Thereafter, while traveling across country in the automobile, they were involved in a collision in Oklahoma, and the gas tank ignited, seriously injuring the plaintiffs. Plaintiffs brought suit in an Oklahoma state court against manufacturer Audi, importer Volkswagen of America, World-Wide Volkswagen and Seaway.Noting that the only connection of the defendants with Oklahoma was that an automobile sold in New York to New York residents became involved in an accident in Oklahoma, the Court held that Oklahoma courts were without minimum contacts necessary to assert personal jurisdiction. Defendants did not sell cars, advertise, or carry on any other activity in the state. Thus, the Court reasoned that the conduct of the retailer and wholesaler was not such as to cause them to anticipate being sued in Oklahoma.[3] Contacts Unrelated to the ControversyWhen a non-resident defendant cannot be found and served within the forum, and when the cause of action arises outside of the forum, exercise of personal jurisdiction over the defendant requires contacts with the forum state that are “systematic and continuous.”[Perkins v. Benguet Consolidated Mining Co., 342 U.S. 437 (1952)]. Such standard was met in Perkins, an action arising out of out-of-state activities, where the defendant maintained an office and conducted business in the forum state. However, in Helicopteros Nacionales de Columbia, S.A. v. Hall, 466 U.S. 408 (1984), the mere fact that the nonresident defendant made regular purchases in the forum state was not held sufficient to justify personal jurisdiction in a case not related to such purchases.[4] Combining Related and Unrelated Forum ContactsKeeton v. Hustler Magazine, 465 U.S. 770 (1984), presented the situation where a nonresident defendant has contacts with the forum state that are both related and unrelated to the controversy. Keeton sued Hustler Magazine in federal court in New Hampshire for libel. Hustler Magazine had circulated in New Hampshire copies of the magazine alleged to have libeled plaintiff (related contacts), and it had circulated other issues there in a continuous and systematic fashion (unrelated contacts).While there is some question whether either defendant‘s related or unrelated contacts would have alone been sufficient to support personal jurisdiction, the Court found that the aggregate of defendant‘s contacts with the forum were proved sufficient.7[5] “Notions of Fair Play and Substantial Justice”In Asahi Metal Industry Co. v. Superior Court, 480 U.S. 102 (1987), the Court interpreted the standard from International Shoe that ―maintenance of the suit does not offend‗traditional notions of fair play and substantial justice.‘ ‖The plaintiff sued in California over a serious accident there, allegedly caused by failure of the rear tire of plaintiff‘s motorcycle. The plaintiff sued the Taiwanese tire manufacturer, which to bring Asahi, a Japanese concern and manufacturer of the tire‘s valve assembly, into the case on a theory of indemnification.The Court held that California‘s attempt to assert personal jurisdiction over the foreign defendant was unreasonable on balance. The Court found the interests of the plaintiff and the forum s tate to be ―slight,‖ and Asahi‘s burden from defending in California―severe.‖§ 2.04 State Long-Arm StatutesIn response to International Shoe and its progeny, most states have enacted long-arm statutes, authorizing out-of-state service on defendants who otherwise could not be served. Long-arm statutes vary greatly from state to state, but there are three basic types:(1) conferring jurisdiction to the full extent permitted by the Fourteenth Amendment right to due process(sometimes called ―blanket‖ or ―limits of due process‖);(2) listing specific instances under which the state can exercise jurisdiction (sometimes called ―enumerated‖ or ―laundry list‖); a nd(3) an intermediate type listing specific instances but authorizing court discretion in interpreting the instances.§ 2.05 Transient JurisdictionTransient jurisdiction is based on service within the forum of a nonresident defendant passing through the state, and has been upheld by the Supreme Court in Burnham v. Superior Court, 495 U.S. 604 (1990).§ 2.06 Quasi In Rem Jurisdiction[1] General RuleQuasi in rem jurisdiction is another method for exercising jurisdiction over a defendant, albeit in a limited manner, based on the defendant‘s property located within the forum. Quasi in rem jurisdiction can be used to adjudicate personal obligations, not merely rights8in the res. However, it binds the defendant only with respect to his interest in the res upon which jurisdiction is based, and thus, the value of a quasi in rem judgment cannot exceed the value of the res.[2]Extension of Minimum Contacts Test to Quasi in Rem JurisdictionQuasi in rem jurisdiction has essentially become obsolete as a result of the Supreme Court‘s decision in Shaffer v. Heitner, 433 U.S. 186 (1977), in which it extended the minimum contacts test to quasi in rem cases.In Shaffer, the plaintiff brought a shareholder derivative suit against officers and directors of the Greyhound Corp., a Delaware corporation, and its subsidiary, Greyhound, Inc. The defendants neither resided in Delaware nor were served there, and the alleged wrongful acts occurred outside Delaware. However, plaintiff asserted quasi in rem jurisdiction over the defendants, each of whom held stock in Greyhound, relying on a Delaware statute which conferred quasi in rem jurisdiction over stock issued by corporations chartered there. The Court found such grounds insufficient and stated that all a ssertions of state court jurisdiction must be based on “minimum contacts.” The test was not satisfied here where the defendant‘s in-state property was ―completely unrelated to the plaintiff‘s cause of action. Significantly, the Court held that “the presen ce of the property alone would not support the State‟s jurisdiction.”In another quasi in rem case arising out of an automobile accident [Rush v. Savchuk, 444 U.S. 320 (1980)], the Court struck down the Seider doctrine which provided that service within the forum on a nonresident driver‘s insurer conferred quasi in rem jurisdiction, with the res being the insurer‘s duty to de fend and indemnify the nonresident defendant. Exercise of jurisdiction over the defendant here was found to be was improper, as he had no other contacts with the forum state.§ 2.07 In Rem JurisdictionDistinct from personal and quasi in rem jurisdiction – both of which support claims against a defendant for personal obligations –in rem jurisdiction focuses on property within the forum and can only be used to adjudicate claims regarding such property. In rem jurisdiction may also attach to ―status‖ suc h as marital status in a divorce action.§ 2.08 Jurisdictional ChallengesA defendant may challenge the court‘s personal jurisdiction in two ways:[1] Direct AttackA direct attack involves the defendant‘s participation in the lawsuit in order to att empt to prevent the court from reaching the merits of the case.The jurisdictional challenge may be joined with other arguments in support of dismissal. However,direct attack forces the9defendant to forfeit part of the protection secured by due process as he experiences the increased burden of defending in a distant and inconvenient forum as soon as he begins participating in the case.[2] Collateral AttackA defendant who objects to a court‘s personal jurisdiction over him/her and defaults in an action may subsequently bring a collateral attack against the judgment. However, if the defendant participated in the case without objecting to the court‘s personal jurisdiction, he/she cures any defect by waiver. If the defendant did challenge the court‘s p ersonal jurisdiction in the first case, he/she is precluded from relitigating the question in the judgment-enforcement proceeding.10Chapter 3NOTICE REQUIREMENTS§ 3.01 Due ProcessThe Due Process Clauses (found in the Fifth Amendment and the Fourteenth Amendment) of the United States Constitution deny effect to adjudications unless the parties to be bound were given prior notice and an opportunity to participate. Notice that satisfies due process may be found from proper service of process or other recognized alternatives. Process usually consists of a summons directing defendant to respond or appear in court on penalty of default. Service is the formal means by which process is delivered to a defendant.§ 3.02 Procedure for Service of ProcessRule 4 of the Federal Rules of Civil Procedure (FRCP 4) sets forth the methods for effectuating service in federal trials. Specific procedures are outlined for various parties: individuals, infants and incompetents, corporations and associations, foreign, federal, state and local governments, as well as individuals in foreign countries.In federal actions, a plaintiff may serve process upon an individual, corporation or association by:(1) delivering the summons and complaint to the individual personally;(2) leaving the summons and complaint at the individual's dwelling house or usual place of abode with a person of suitable age and discretion then residing therein;(3) delivering the summons and complaint to an agent authorized by appointment or by law to receive service of process.However, FRCP 4(d)(2) provides incentives for a defendant to agree to waive formal service and instead accept service by mail. Upon notice of the commencement of the action and a request for waiver of service from the plaintiff, a defendant who so agrees is granted an extended time within which to answer – 60 days instead of the 20 days granted when process is formally served. FRCP 4imposes upon the defendant ―a du ty to avoid unnecessary costs of serving the summons,‖ and therefore, failure to accept process by mail subjects the defendant to liability for costs of service as well as attorney‘s fees incurred in any motion to collect the costs of service.§ 3.03 Feasibility of Individual NoticeAlternative means of notice, such as newspaper publication, may satisfy due process where individual notice is impracticable and the party seeking to bypass individual notice can demonstrate that (1) the suit is in the interest of the absentees, (2) they will be11adequately represented by one before the court, and (3) the value of their individual interests is not too great. Where the identities and parties can be reasonably ascertained, however, individual notice is required. [Mullane v. Central Hanover Bank & Trust Co., 339 U.S. 306 (1950)]12Chapter 4SUBJECT MATTER JURISDICTION§ 4.01 Subject Matter Jurisdiction[1] DefinedSubject matter jurisdiction refers to a court‘s authority to decide a particular kind of controversy. Subject matter jurisdiction can be concurrent — shared between several different kinds of courts — or exclusive, restricted to a particular kind of court.[2] Scope of Federal Subject Matter JurisdictionThe United States Constitution sets out the permissible scope of the judicial power of federal courts in Article III, § 2. It lists the following types of federal subject matter jurisdiction:∙cases ―arising under‖ the Constitution, laws of the United States, and treaties (federal question jurisdiction);∙cases affecting ambassadors and other official representatives of foreign sovereigns;∙admiralty and maritime cases;∙controversies to which the United States is a party;∙controversies between states and between a state and citizens of another state;∙cases between citizens of different states (diversity jurisdiction);∙cases between citizens of the same state claiming lands under grants of different states;∙cases between a state or its citizens and foreign states and their citizens or subjects (alienage jurisdiction).Article III vests the Supreme Court with original jurisdiction of cases affecting ambassadors and other foreign officials and those to which a state is a party, and such appellate jurisdiction as Congress may create. Article III vests no jurisdiction directly in lower federal courts but authorizes Congress to create and endow them with subject matter jurisdiction.Congress has never vested lower federal courts with as much subject matter jurisdiction as Article III permits. Today, the main sources of federal jurisdiction are federal question jurisdiction and diversity jurisdiction, usually concurrent with state court jurisdiction.§ 4.02 Federal Question JurisdictionIn order to establish federal question jurisdiction, a ―right or immunity created by the Constitution or the law of the United States must be an element, and an essential one, of the plaintiff‘s cause of action‖ [Gully v. First National Bank, 299 U.S 109, 112 (1936)]. Even where a cause of action arises under state law, a federal court may have jurisdiction13if it appears that the right to relief rests on the construction or application of a federal law [Smith v. Kansas City Title & Trust Co., 255 U.S. 180 (1921)]. However, the mere presence of a federal issue in a state-created cause of action does not automatically confer federal question jurisdiction. Its availability depends in part on ―an evaluation of the nature of the federal interest at stak e‖:whether it is sufficiently important to require a federal trial forum [Merrell Dow Pharmaceuticals, Inc. v. Thompson, 478 U.S. 806 (1986)].A plaintiff cannot invoke the original jurisdiction of the federal courts either by anticipating a federal defense or otherwise importing a federal question into his complaint that is not essential to his case.§ 4.03 Diversity Jurisdiction[1] General RuleUnder the federal diversity jurisdiction statute, 28 U.S.C. § 1332, a federal court has subject matter jurisdiction over a matter where:(1) there is complete diversity among the parties such that no plaintiff shares citizenship with any defendant; and(2) the amount in controversy exceeds $75,000.Limited exceptions to the complete diversity requirement apply where specifically created by Congress, e.g., in interpleader actions, only two adverse claimants need be of diverse citizenship. [28 U.S.C. § 1335(a)(1)][2] Limitations on Diversity JurisdictionDeferring to state courts, federal courts have traditionally declined to exercise jurisdiction in the following types of cases, even when the parties satisfy the requirements for diversity jurisdiction:∙certain in rem cases.∙probate cases.∙domestic relations cases.Additionally, courts are obliged by statute to deny jurisdiction which has been―improperly or collusively made.‖[3] CitizenshipCitizenship for diversity purposes requires a party to be a citizen of both the United States and of a state.14Individuals– The courts have equated the state citizenship of natural persons with domicile in a state. Domicile is created by the concurrent establishment of physical residence in a state and an intent to remain there indefinitely.Although a person can have more than one residence at one time, he can have only one domicile at a time. Corporations– The diversity statute deems a corporation to be the citizen of ―any State by which it has been incorporated and of the state where it has its principal place of business.‖Unincorporated associations– Unincorporated associations, such as partnerships and labor unions, take the citizenship of each member.[4] Amount in Controversy[a] “Legal Certainty Test”The present amount in controversy is $75,000, exclusive of interest and costs. Jurisdictional amount is ordinarily computed from the plaintiff‘s viewpoint without regard to possible defenses, and pl aintiff‘s good faith pleading controls unless the court concludes to ―a legal certainty‖ that he cannot recover the pleaded amount.[b] Aggregating Multiple ClaimsIndividual claims that do not alone satisfy the jurisdictional amount may be aggregated in the following circumstances:∙plaintiff asserts multiple claims against a single defendant, whether or not they are transactionally related.∙plaintiff joins several defendants to the same claim pursuant to FRCP 20 if the several defendants have a common undivided interest or title in the claim.∙several plaintiffs join in the same claim against one or more defendants pursuant to FRCP 20 when the several plaintiffs have a common undivided interest or title in the claim.§ 4.05 Removal JurisdictionA defendant may, pursuant to 28 U.S.C. § 1441,remove a civil action pending in a state court to a federal court if the federal would have had original jurisdiction over the plaintiff‟s claim. The assertion of a defense or counter-claim based on federal law does not convert a non-federal case into a federal one.Diversity cases are removable only if none of the defendants is a citizen of the state in which the action is pending. [28 U.S.C. § 1441(b)]When a federal court already has jurisdiction over a claim based on a federal question, it has discretion to remove separate and independent state-law claims in order adjudicate15。