期刊文献+
共找到290篇文章
< 1 2 15 >
每页显示 20 50 100
Unbiased test of the hyperon CP violation in terms of detector resolution at STCF
1
作者 Ming Xu Liang Liu +2 位作者 Yupeng Pei Xiaorong Zhou Yingchun Zhu 《中国科学技术大学学报》 北大核心 2025年第4期41-47,40,I0002,共9页
The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled h... The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled hyperonantihyperon pairs to be produced at Super Tau-Charm Facility(STCF),the CP asymmetry of hyperon is expected to be tested with a statistical sensitivity of 10^(−4) or even better.To cope with the statistical precision,the systematic effects from various aspects are critical and need to be studied in detail.In this paper,the sensitivity effects on the CP violation parameters associated with the detector resolution,including those of the position and momentum,are studied and discussed in detail.The results provide valuable guidance for the design of STCF detector. 展开更多
关键词 BESIII experiment STCF hyperon CP violation detector resolution unbiased test
在线阅读 下载PDF
Characteristics and risk of violation behavior of non-motorists at signalized intersections 被引量:6
2
作者 赵星 任刚 +2 位作者 杜轩 王鹏 王卫杰 《Journal of Southeast University(English Edition)》 EI CAS 2011年第4期423-429,共7页
Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaire... Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors. 展开更多
关键词 traffic violation behavior traffic safety non- motorist signal intersection
在线阅读 下载PDF
Single Chargino Production with R-Parity Lepton Number Violation in Photon-Photon Collisions
3
作者 YIN Xi MA Wen-Gan WAN Lang-Hui JIANG Yi HAN Liang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2001年第11期553-562,共10页
We examine the process γγ→ x+ - at photon-photon collider in the minimal supersymmetric standard model with R-parity violation,where all the one-loop diagrams are considered.We mainly discuss the effects of bilinea... We examine the process γγ→ x+ - at photon-photon collider in the minimal supersymmetric standard model with R-parity violation,where all the one-loop diagrams are considered.We mainly discuss the effects of bilinear breaking terms,and conclude that their contributions may be important compared with trilinear terms.Our results show that the events of this process could be detectable at photon-photon colliders,if the values of the parameters are favorable. 展开更多
关键词 R-PARITY violation single chargino production lepton NUMBER violation photon-photon COLLISION
在线阅读 下载PDF
The Violation of Cooperative Principle and English Teaching
4
作者 张大海 《海外英语》 2013年第21期291-293,共3页
The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvant... The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers. 展开更多
关键词 violation COOPERATIVE PRINCIPLE ENGLISH TEACHING i
在线阅读 下载PDF
Frame length optimization for multi-antenna downlink systems based on delay-bound violation probability constraints
5
作者 谭雨凤 李俊超 +1 位作者 夏玮玮 沈连丰 《Journal of Southeast University(English Edition)》 EI CAS 2015年第2期163-169,共7页
A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS... A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS) metrics from the conventional physical-layer channel models, the link-layer models named effective bandwidth and effective capacity are applied to statistically characterize the source traffic patterns and the queuing service dynamics. With these link-layer models, the source traffic process and the channel service process are mapped to certain QoS parameters. The packet delay-bound violation probability constraints are converted into minimum data rate constraints and the optimization problem is thus formulated into simultaneous inequalities. With the assumption of ergodic block-fading channels, the optimal frame lengths of single-user and multiuser systems are calculated respectively by numerical iterative methods. Theoretical analyses and simulation results show that the given delay-bound violation probability constraints are well satisfied with the optimal frame length. 展开更多
关键词 delay-bound violation probability frame lengthoptimization effective bandwidth effective capacity multi-antenna systems quality of service
在线阅读 下载PDF
On the Causes of the Violation of Cooperative Principle 被引量:1
6
作者 朱毅 刘爱玲 《海外英语》 2015年第19期217-218,共2页
Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to ... Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language. 展开更多
关键词 COOPERATIVE PRINCIPLE violation CAUSES
在线阅读 下载PDF
CONSTRAINT VIOLATION STABILIZATION OF EULER-LAGRANGE EQUATIONS WITH NON-HOLONOMIC CONSTRAINTS 被引量:2
7
作者 ZhaoWeijia PanZhenkuan ChenLiqun 《Acta Mechanica Solida Sinica》 SCIE EI 2004年第1期45-51,共7页
Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised metho... Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised methods can deal with more complicated problems such as those with nonholonomic constraints or redundant constraints, and save the computation time. Finally a numerical simulation of a multibody system is conducted by using the methods given in this paper. 展开更多
关键词 Euler-Lagrange equation nonholonomic constraint constraint violation stabiliza- tion redundant constraint
在线阅读 下载PDF
Investigating the factors affecting traffic violations based on electronic enforcement data:A case study in Shangyu,China 被引量:2
8
作者 Fan Haoxuan Ren Gang +1 位作者 Li Haojie Ma Jingfeng 《Journal of Southeast University(English Edition)》 EI CAS 2021年第2期227-236,共10页
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e... To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety. 展开更多
关键词 traffic violations road traffic safety electronic enforcement data multinomial logistic regression influencing factors
在线阅读 下载PDF
SVR-Miner:Mining Security Validation Rules and Detecting Violations in Large Software 被引量:1
9
作者 梁彬 谢素斌 +2 位作者 石文昌 梁朝晖 陈红 《China Communications》 SCIE CSCD 2011年第4期84-98,共15页
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p... For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently. 展开更多
关键词 static analysis data mining automated validation rules extraction automated violation detection
在线阅读 下载PDF
AN AUTOMATIC CONSTRAINT VIOLATION STABI- LIZATION METHOD FOR DIFFERENTIAL/ ALGEBRAIC EQUATIONS OF MOTION IN MULTIBODY SYSTEM DYNAMICS 被引量:1
10
作者 赵维加 潘振宽 王艺兵 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2000年第1期105-110,共6页
A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional con... A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional constraint violation stabilization method are determined according to the integration time step size and Taylor expansion method automatically. The direct integration method, the traditional constraint violation stabilization method and the new method presented in this paper are compared finally. 展开更多
关键词 dynamics of multibody systems Euler_Lagrange equations constraint violation stabilization
在线阅读 下载PDF
A Study of Triangle Inequality Violations in Social Network Clustering 被引量:1
11
作者 Sanjit Kumar Saha Tapashi Gosswami 《Journal of Computer and Communications》 2024年第1期67-76,共10页
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie... Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters. 展开更多
关键词 CLUSTERING Triangle Inequality violations Traditional Clustering Graph Clustering
在线阅读 下载PDF
QCD Approach to B→Dπ Decays and CP Violation
12
作者 SU Fang WU Yue-Liang +1 位作者 YANG Ya-Dong ZHUANG Ci 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第3期707-716,共10页
The branching ratios and CP violations of the B →Dπ decays, including both the color-allowed and the color-suppressed modes, are investigated in detail within QCD framework by considering all diagrams that lead to t... The branching ratios and CP violations of the B →Dπ decays, including both the color-allowed and the color-suppressed modes, are investigated in detail within QCD framework by considering all diagrams that lead to three effective currents of two quarks. An intrinsic mass scale as a dynamical gluon mass is introduced to treat the infrared divergence caused by the soft collinear approximation in the endpoint regions, and the Cutkosky rule is adopted to deal with a physical-region singularity of the on mass-shell quark propagators. When the dynamical gluon mass μg is regarded as a universal sca/e, it is extracted to be around μg = 440 MeV from one of the well-measured B →Dπ decay modes. The resulting predictions for all branching ratios are in agreement with the current experimental measurements. As these decays have no penguin contributions, there are no direct CP asymmetries. Due to interference between the Cabibbo-suppressed and the Cabibbo-favored amplitudes, mixing-induced CP violations are predicted in the B →D^±π^±↓ decays to be consistent with the experimental data at 1-σ level. More precise measurements will be helpful to extracting weak angle 2β+γ. 展开更多
关键词 dynamical gluon mass Cutkosky rule B decay CP violation
在线阅读 下载PDF
AI-Based Helmet Violation Detection for Traffic Management System
13
作者 Yahia Said YahyaAlassaf +5 位作者 Refka Ghodhbani Yazan Ahmad Alsariera Taoufik Saidani Olfa Ben Rhaiem Mohamad Khaled Makhdoum Manel Hleili 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期733-749,共17页
Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin... Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures. 展开更多
关键词 Non-helmet use detection traffic violation SAFETY deep learning optimized PerspectiveNet
在线阅读 下载PDF
Charged Higgs Boson Pair Production via Gluon-Gluon Collisions in MSSM with CP Violation
14
作者 JIANG Yi MA Wen-Gan +1 位作者 HAN Liang HOU Hong-Sheng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2001年第7期61-64,共4页
The CP-violating effects to the subprocess gg→H+H-are studied in the mSUGRA scenario at the CERN large hadron collider,by taking into account the experimental bounds of electron and neutron electric dipole moments.Th... The CP-violating effects to the subprocess gg→H+H-are studied in the mSUGRA scenario at the CERN large hadron collider,by taking into account the experimental bounds of electron and neutron electric dipole moments.The CP-violating effects in this process are related to the complex phases ofμand Af in the mSUGRA scenario.In our calculation we consider smallCP phases ofμand Af and neglect the effects of neutral Higgs boson mixing.In this case the CP effects to the process mainly come from the complex couplings of Higgs-squark-squark.We find a strong dependence of charged Higgs boson pair production rate on the complex couplings in the parameter space of minimal supersymmetric standard model. 展开更多
关键词 charged Higgs boson MSSM CP violation
在线阅读 下载PDF
Nonrelativistic quantum effects of the Lorentz symmetry violation on the Morse potential
15
作者 K Bakke H Belich 《Communications in Theoretical Physics》 SCIE CAS CSCD 2023年第5期114-118,共5页
We search for Lorentz symmetry violation effects at low-energy regime by exploring the Dirac equation in(1+1)-dimensions and the possibility of dealing with quantum systems with spherical symmetry.We bring a discussio... We search for Lorentz symmetry violation effects at low-energy regime by exploring the Dirac equation in(1+1)-dimensions and the possibility of dealing with quantum systems with spherical symmetry.We bring a discussion about the influence of the Lorentz symmetry violation effects on the spectrum of molecular vibrations caused by the coupling between a fixed vector field and the derivative of the fermionic field.Further,we discuss the influence of this Lorentz symmetry violation background on the revival time. 展开更多
关键词 Lorentz symmetry violation Morse potential quantum revivals derivative of the fermionic field
原文传递
Topo semantic constraint-violations in spatial database
16
作者 凯龙 李香 +1 位作者 刘宏伟 杨孝宗 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第4期506-512,共7页
Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this res... Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this research focuses on building an efficient spatial data management system using two constraint violation detection methods.An algorithm for constraint violation detection has been derived to maintain the error-free up-to-date spatial database.Results indicate that the developed constraint violation detection(CVD)system is more efficient compared with conventional systems. 展开更多
关键词 topo-semantic constraint rule constraint violation spatial object spatial database R-TREE GIS
在线阅读 下载PDF
The Lepton Flavor Violating Decays of AHin the Littlest Higgs Model with T-Parity Violation
17
作者 韩小芳 王磊 《Communications in Theoretical Physics》 SCIE CAS CSCD 2014年第5期624-628,共5页
The T-parity in the littlest Higgs model can be broken by the anomalous Wess-Zumin-Witten term, which leads that the lightest T-odd gauge boson AH decays into the SM particles. First, we examine some lepton flavor vio... The T-parity in the littlest Higgs model can be broken by the anomalous Wess-Zumin-Witten term, which leads that the lightest T-odd gauge boson AH decays into the SM particles. First, we examine some lepton flavor violating decays of AH, namely AH → τ±μ±, AH→ τ±e±, and AH→ τ±e±. We find that the branching ratios can reach 10-7 for AH → τ±μ±, 10-s for AH → τ±μ±, and 10-s for AH → τ±e± Then, we study the lepton flavor violating plus jets signatures of the heavy charged gauge boson and mirror quarks at the LHC, and find that it is possible to be detected for pp jets, and hardly to be detected for pp → τ±e± (μ±e±) + 4 jets and p p → W H W H → τ±μ±( τ±e±,μ±e±) + 6 jets. 展开更多
关键词 lepton flavor violating decay littlest Higgs model with T-parity violation LHC-
原文传递
Experimental sensitivity on searching for CP violation at BES-Ⅲ
18
作者 赵明刚 荣刚 +1 位作者 马海龙 张达华 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第6期2213-2216,共4页
The CP violation in the D system is predicted to be an unobserved level in the Standard Model. In this paper, we describe the method of searching for CP violation decay processes with the coherently produced D^0D^0 me... The CP violation in the D system is predicted to be an unobserved level in the Standard Model. In this paper, we describe the method of searching for CP violation decay processes with the coherently produced D^0D^0 mesons from the ψ(3770) decay. The CP violation decay processes can be searched for at the BES-Ⅲ experiment. The experimental sensitivity for searching for the CP violation can reach about a 10^-4 level with a ψ(3770) data sample of about 20 fb^-1. 展开更多
关键词 CP violation charm meson BES-Ⅲ
原文传递
Pedestrian Crosswalk Overflow Violation in China:Characteristics and Countermeasure
19
作者 曹宁博 陈永恒 +3 位作者 曲昭伟 赵利英 白乔文 邓晓磊 《Journal of Shanghai Jiaotong university(Science)》 EI 2017年第6期688-696,共9页
The phenomenon that pedestrians do not walk in the crosswalk during pedestrian green is defined as overflow violation, which is illegal but common. Broadly varying crossing positions at far-side cross-section may resu... The phenomenon that pedestrians do not walk in the crosswalk during pedestrian green is defined as overflow violation, which is illegal but common. Broadly varying crossing positions at far-side cross-section may result in widely distributed conflict points with left-turning and right-turning vehicles, which may cause the occurrence of severe conflicts. This paper proposes a model to estimate the overflow pedestrians' crossing positions at the far-side cross-section of signalized crosswalk, which enables us to better understand pedestrian overflow violation behavior and finally facilitate their safety. After analysis, the intersection geometry and destination are determined as the critical factors causing pedestrians to overflow. And then, Weibull distribution is employed to describe the stochastic characteristics of overflow pedestrians' crossing position distribution at the far-side cross-section. A crossing position distribution model which takes the crosswalk length, width and distance between crosswalk and destination into account is developed. The established model is validated by comparing the observed pedestrian crossing positions with the estimated crossing positions. The validation results suggest that the established model is capable of being adopted to estimate the overflow pedestrians' crossing positions at far-side cross-section. Based on the model, countermeasure for overflow violation can be put forward to prevent pedestrians from walking outside the crosswalk. 展开更多
关键词 overflow violation crossing position COUNTERMEASURE signalized crosswalk
原文传递
Robust Expected Violation Criterion for Constrained Robust Design Problems and Its Application in Automotive Lightweight Design
20
作者 ZHANG Si-liang ZHU Ping CHEN Wei 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第3期257-263,共7页
Metamodeling techniques are commonly used to replace expensive computer simulations in robust design problems. Due to the discrepancy between the simulation model and metamodel, a robust solution in the infeasible reg... Metamodeling techniques are commonly used to replace expensive computer simulations in robust design problems. Due to the discrepancy between the simulation model and metamodel, a robust solution in the infeasible region can be found according to the prediction error in constraint responses. In deterministic optimizations, balancing the predicted constraint and metamodeling uncertainty, expected violation (EV) criterion can be used to explore the design space and add samples to adaptively improve the fitting accuracy of the constraint boundary. However in robust design problems, the predicted error of a robust design constraint cannot be represented by the metamodel prediction uncertainty directly. The conventional EV-based sequential sampling method cannot be used in robust design problems. In this paper, by investigating the effect of metamodeling uncertainty on the robust design responses, an extended robust expected violation (REV) function is proposed to improve the prediction accuracy of the robust design constraints. To validate the benefits of the proposed method, a crashworthiness-based lightweight design example, i.e. a highly nonlinear constrained robust design problem, is given. Results show that the proposed method can mitigate the prediction error in robust constraints and ensure the feasibility of the robust solution. 展开更多
关键词 robust design robust expected violation (REV) sequential sampling method automotive lightweight design
原文传递
上一页 1 2 15 下一页 到第
使用帮助 返回顶部