The application of generative artificial intelligence(GAI)in the judicial domain represents an innovative approach to achieving digital justice.GAI’s functionalities are primarily exhibited in the enhancement of judi...The application of generative artificial intelligence(GAI)in the judicial domain represents an innovative approach to achieving digital justice.GAI’s functionalities are primarily exhibited in the enhancement of judicial efficiency,improving the accuracy and fairness of adjudications,promoting the uniform application of the law,and enhancing transparency and engagement in judicial processes.However,these advancements are accompanied by potential risks and challenges in technology,adjudication,and ethics.It is thus essential to strengthen privacy protection during the processing and transmission of data,ensure data security and confidentiality,and establish and refine clear legal norms regarding the roles,responsibilities,and legal obligations of GAI in judicial settings.In addition,ethical guidelines that delineate the behavioral boundaries and value orientations of GAI need to be formulated.Collectively,these elements can form a trinary model of technical controls,legal norms,and ethical constraints,to facilitate the modernization and intelligent development of the judicial system.展开更多
With the gradual acceleration of the urbanization process, people put forward higher requirements for municipal highway construction. In the actual construction process, it is particularly important to strengthen the ...With the gradual acceleration of the urbanization process, people put forward higher requirements for municipal highway construction. In the actual construction process, it is particularly important to strengthen the quality control of highway pavement construction, which needs to arouse the attention of relevant personnel. This paper mainly analyzes the key points of construction technology in highway construction, defines the quality control method of highway pavement construction, and provides theoretical reference for highway construction in the future.展开更多
The well-developed coal electricity generation and coal chemical industries have led to huge carbon dioxide(CO_(2))emissions in the northeastern Ordos Basin.The geological storage of CO_(2) in saline aquifers is an ef...The well-developed coal electricity generation and coal chemical industries have led to huge carbon dioxide(CO_(2))emissions in the northeastern Ordos Basin.The geological storage of CO_(2) in saline aquifers is an effective backup way to achieve carbon neutrality.In this case,the potential of saline aquifers for CO_(2) storage serves as a critical basis for subsequent geological storage project.This study calculated the technical control capacities of CO_(2) of the saline aquifers in the fifth member of the Shiqianfeng Formation(the Qian-5 member)based on the statistical analysis of the logging and the drilling and core data from more than 200 wells in the northeastern Ordos Basin,as well as the sedimentary facies,formation lithology,and saline aquifer development patterns of the Qian-5 member.The results show that(1)the reservoirs of saline aquifers in the Qian-5 member,which comprise distributary channel sand bodies of deltaic plains,feature low porosities and permeabilities;(2)The study area hosts three NNE-directed saline aquifer zones,where saline aquifers generally have a single-layer thickness of 3‒8 m and a cumulative thickness of 8‒24 m;(3)The saline aquifers of the Qian-5 member have a total technical control capacity of CO_(2) of 119.25×10^(6) t.With the largest scale and the highest technical control capacity(accounting for 61%of the total technical control capacity),the Jinjie-Yulin saline aquifer zone is an important prospect area for the geological storage of CO_(2) in the saline aquifers of the Qian-5 member in the study area.展开更多
Data Integrity is a critical component of Data lifecycle management. Its importance increases even more in a complex and dynamic landscape. Actions like unauthorized access, unauthorized modifications, data manipulati...Data Integrity is a critical component of Data lifecycle management. Its importance increases even more in a complex and dynamic landscape. Actions like unauthorized access, unauthorized modifications, data manipulations, audit tampering, data backdating, data falsification, phishing and spoofing are no longer restricted to rogue individuals but in fact also prevalent in systematic organizations and states as well. Therefore, data security requires strong data integrity measures and associated technical controls in place. Without proper customized framework in place, organizations are prone to high risk of financial, reputational, revenue losses, bankruptcies, and legal penalties which we shall discuss further throughout this paper. We will also explore some of the improvised and innovative techniques in product development to better tackle the challenges and requirements of data security and integrity.展开更多
Data guarantee is a new atypical guarantee that has arisen in digital society.Its atypicality is manifested in that,absent an agreement to the contrary between the parties,and based on a reasonable presumption regardi...Data guarantee is a new atypical guarantee that has arisen in digital society.Its atypicality is manifested in that,absent an agreement to the contrary between the parties,and based on a reasonable presumption regarding the parties’agreement and transaction expectations,the scope of validity of a data guarantee covers the data and the income generated by it,and the guarantor may,within the scope of a general authorization granted by the secured party,make limited use of the data and its income.In the digital society,the core connotation of value rights has shifted from exchange value to income value,and the income generated by data forms the foundation of guarantee value.The operational model of a data guarantee is as follows:the guarantor creates security based on its data property rights and may continue to use the data and derive income from it;the secured party exercises control over data use permissions and the flow of income.The secured party’s ability to realize its rights is predicated on full technical control over the collateral.In the events specified by law or agreed upon by the parties-such as the debtor’s failure to perform due obligations or other events agreed upon by the parties that jeopardize the security right-the secured party can,through technical control,cut off the guarantor’s continued access to the data and have priority to be satisfied from the data and the income it generates during the security period.展开更多
文摘The application of generative artificial intelligence(GAI)in the judicial domain represents an innovative approach to achieving digital justice.GAI’s functionalities are primarily exhibited in the enhancement of judicial efficiency,improving the accuracy and fairness of adjudications,promoting the uniform application of the law,and enhancing transparency and engagement in judicial processes.However,these advancements are accompanied by potential risks and challenges in technology,adjudication,and ethics.It is thus essential to strengthen privacy protection during the processing and transmission of data,ensure data security and confidentiality,and establish and refine clear legal norms regarding the roles,responsibilities,and legal obligations of GAI in judicial settings.In addition,ethical guidelines that delineate the behavioral boundaries and value orientations of GAI need to be formulated.Collectively,these elements can form a trinary model of technical controls,legal norms,and ethical constraints,to facilitate the modernization and intelligent development of the judicial system.
文摘With the gradual acceleration of the urbanization process, people put forward higher requirements for municipal highway construction. In the actual construction process, it is particularly important to strengthen the quality control of highway pavement construction, which needs to arouse the attention of relevant personnel. This paper mainly analyzes the key points of construction technology in highway construction, defines the quality control method of highway pavement construction, and provides theoretical reference for highway construction in the future.
基金funded by the Top 10 key scientific and technological projects of CHN Energy in 2021 entitled Research and Demonstration of Technology for Carbon Dioxide Capture and Energy Recycling Utilization(GJNYKJ[2021]No.128,No.:GJNY-21-51)the Carbon Neutrality College(Yulin)Northwest University project entitled Design and research of large-scale CCUS cluster construction in Yulin area,Shaanxi Province(YL2022-38-01).
文摘The well-developed coal electricity generation and coal chemical industries have led to huge carbon dioxide(CO_(2))emissions in the northeastern Ordos Basin.The geological storage of CO_(2) in saline aquifers is an effective backup way to achieve carbon neutrality.In this case,the potential of saline aquifers for CO_(2) storage serves as a critical basis for subsequent geological storage project.This study calculated the technical control capacities of CO_(2) of the saline aquifers in the fifth member of the Shiqianfeng Formation(the Qian-5 member)based on the statistical analysis of the logging and the drilling and core data from more than 200 wells in the northeastern Ordos Basin,as well as the sedimentary facies,formation lithology,and saline aquifer development patterns of the Qian-5 member.The results show that(1)the reservoirs of saline aquifers in the Qian-5 member,which comprise distributary channel sand bodies of deltaic plains,feature low porosities and permeabilities;(2)The study area hosts three NNE-directed saline aquifer zones,where saline aquifers generally have a single-layer thickness of 3‒8 m and a cumulative thickness of 8‒24 m;(3)The saline aquifers of the Qian-5 member have a total technical control capacity of CO_(2) of 119.25×10^(6) t.With the largest scale and the highest technical control capacity(accounting for 61%of the total technical control capacity),the Jinjie-Yulin saline aquifer zone is an important prospect area for the geological storage of CO_(2) in the saline aquifers of the Qian-5 member in the study area.
文摘Data Integrity is a critical component of Data lifecycle management. Its importance increases even more in a complex and dynamic landscape. Actions like unauthorized access, unauthorized modifications, data manipulations, audit tampering, data backdating, data falsification, phishing and spoofing are no longer restricted to rogue individuals but in fact also prevalent in systematic organizations and states as well. Therefore, data security requires strong data integrity measures and associated technical controls in place. Without proper customized framework in place, organizations are prone to high risk of financial, reputational, revenue losses, bankruptcies, and legal penalties which we shall discuss further throughout this paper. We will also explore some of the improvised and innovative techniques in product development to better tackle the challenges and requirements of data security and integrity.
基金funded by Research on the Private Law Structure of Personal Data Transactions(23AFX014),a key project under the National Social Science Fund of China.
文摘Data guarantee is a new atypical guarantee that has arisen in digital society.Its atypicality is manifested in that,absent an agreement to the contrary between the parties,and based on a reasonable presumption regarding the parties’agreement and transaction expectations,the scope of validity of a data guarantee covers the data and the income generated by it,and the guarantor may,within the scope of a general authorization granted by the secured party,make limited use of the data and its income.In the digital society,the core connotation of value rights has shifted from exchange value to income value,and the income generated by data forms the foundation of guarantee value.The operational model of a data guarantee is as follows:the guarantor creates security based on its data property rights and may continue to use the data and derive income from it;the secured party exercises control over data use permissions and the flow of income.The secured party’s ability to realize its rights is predicated on full technical control over the collateral.In the events specified by law or agreed upon by the parties-such as the debtor’s failure to perform due obligations or other events agreed upon by the parties that jeopardize the security right-the secured party can,through technical control,cut off the guarantor’s continued access to the data and have priority to be satisfied from the data and the income it generates during the security period.