排序方式: 共有126条查询结果,搜索用时 15 毫秒
91.
李斐然 《安徽警官职业学院学报》2015,(2)
商业银行的资产业务不断地发展,传统的授信模式也随之发生改变,以往多以房产抵押或者信用为主,现今增加了担保措施和还款来源。应收账款作为还款来源以及担保措施之一也日益凸显重要性,在实际操作中,主要包括应收账款转让和应收账款质押。为了利益最大化,债权人可能重复处理债权,将债权同时用于转让和质押,以获得更多的融资的情形,二者并存时难免会产生冲突。所以,应从应收账款转让与应收账款质押的基础理论出发,分析相关法律关系以及并存现状,从而对确立冲突解决规则提出建议。 相似文献
92.
李垠 《黑龙江省政法管理干部学院学报》2012,(4):65-68
抵押担保是实践中常见的一种防范债权风险,保障交易安全的债权担保方式.由于抵押关系中不转移担保物的实际占有,在同一物上设立多个抵押权成为可能.抵押物变卖时,并存于同一抵押物之上的数个抵押权以什么顺序获偿涉及抵押权能否实现以及能够实现的范围,由此引发了抵押权顺位的问题.我国《担保法》及其司法解释和《物权法》就抵押权顺位的规定均提之甚少,而抵押权的顺位实则蕴涵着抵押权人可能获偿的利益,对抵押权人来说具有重要的意义,同时也影响着抵押物所有人的再融资,所以,对抵押权顺位的研究颇具现实意义. 相似文献
93.
史琦 《山西省政法管理干部学院学报》2011,24(2):61-63
商标侵权如何进行判断,是商标法理论与实践中极其重要的课题,由于我国商标法立法中关于商标侵权判断的规定存在较多争议,司法实践中也遇到各种问题均难以解决,文章就商标侵权的判断核心进行论述,分析了各国立法例,探讨了有关商标侵权判定标准的合理立法模式。 相似文献
94.
95.
Harry Wechsler 《政策研究评论》2012,29(1):63-89
The central position of this article is that validation and interoperability are paramount for the effective and ethical use of biometrics. Illuminating the relevance for policymakers of the science underlying the security and privacy aspects of biometrics, this article calls for adequate and enforceable performance metrics that can be independently corroborated. Accordingly, the article considers biometrics and forensics for the dual challenges of addressing security and privacy using smart identity management. The discussion revolves around the concepts of “personally identifiable information” (PII) and interoperability with emphasis on quantitative performance analysis and validation for uncontrolled operational settings, variable demographics, and distributed and federated operations. Validation metrics includes expected rates of identification/misidentification, precision, and recall. The complementary concepts of identity and anonymity are addressed in terms of expected performance, functionality, law and ethics, forensics, and statistical learning. Biometrics encompasses appearance, behavior, and cognitive state or intent. Modes of deployment and performance evaluation for biometrics are detailed, with operational and adversarial challenges for both security and privacy described in terms of trustworthiness, vulnerabilities, functional creep, and feasibility of safeguards. The article underscores how lack of interoperability is mostly due to overfitting and tuning to well‐controlled settings, so that validation merely confirms “teaching to the test” rather than preparation for real‐world deployment. Most important for validation is reproducibility of results including full information on the experimental design used, that forensic exclusion is allowed, and that scientific methods for performance evaluation are followed. The article concludes with expected developments regarding technology use and advancements that bear on security and privacy, including data streams and video, de‐anonymization and reidentification, social media analytics and cyber security, and smart camera networks and surveillance. 相似文献
96.
关于任务型教学法的几个问题 总被引:1,自引:0,他引:1
姚凤梅 《中国劳动关系学院学报》2004,18(3):88-90
任务教学法是教师通过引导学生完成各种任务来实现教学目标,即用目标语进行有目的交际的教学活动。任务型教学法分为“结构型”、“交际型”和“中间型”三种模式。结合我国外语教学实践,“中间型”模式更适合我国外语教学。 相似文献
97.
Neumann C Champod C Puch-Solis R Egli N Anthonioz A Meuwly D Bromage-Griffiths A 《Journal of forensic sciences》2006,51(6):1255-1266
Recent challenges to fingerprint evidence have brought forward the need for peer-reviewed scientific publications to support the evidential value assessment of fingerprint. This paper proposes some research directions to gather statistical knowledge of the within-source and between-sources variability of configurations of three minutiae on fingermarks and fingerprints. This paper proposes the use of the likelihood ratio (LR) approach to assess the value of fingerprint evidence. The model explores the statistical contribution of configurations of three minutiae using Tippett plots and related measures to assess the quality of the system. Features vectors used for statistical analysis have been obtained following a preprocessing step based on Gabor filtering and image processing to extract minutia position, type, and direction. Spatial relationships have been coded using Delaunay triangulation. The metric, used to assess similarity between two feature vectors is based on an Euclidean distance measure. The within-source variability has been estimated using a sample of 216 fingerprints from four fingers (two donors). Between-sources variability takes advantage of a database of 818 ulnar loops from randomly selected males. The results show that the data-driven approach adopted here is robust. The magnitude of LRs obtained under the prosecution and defense propositions stresses upon the major evidential contribution that small portions of fingermark, containing three minutiae, can provide regardless of its position on the general pattern. 相似文献
98.
99.
100.