期刊文献+
共找到286篇文章
< 1 2 15 >
每页显示 20 50 100
A Study of Triangle Inequality Violations in Social Network Clustering 被引量:1
1
作者 Sanjit Kumar Saha Tapashi Gosswami 《Journal of Computer and Communications》 2024年第1期67-76,共10页
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie... Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters. 展开更多
关键词 CLUSTERING Triangle Inequality violations Traditional Clustering Graph Clustering
在线阅读 下载PDF
Investigating the factors affecting traffic violations based on electronic enforcement data:A case study in Shangyu,China 被引量:2
2
作者 Fan Haoxuan Ren Gang +1 位作者 Li Haojie Ma Jingfeng 《Journal of Southeast University(English Edition)》 EI CAS 2021年第2期227-236,共10页
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e... To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety. 展开更多
关键词 traffic violations road traffic safety electronic enforcement data multinomial logistic regression influencing factors
在线阅读 下载PDF
Using Excel to Explore the Effects of Assumption Violations on One-Way Analysis of Variance (ANOVA) Statistical Procedures
3
作者 William Laverty Ivan Kelly 《Open Journal of Statistics》 2019年第4期458-469,共12页
To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violation... To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program. 展开更多
关键词 EXCEL One-Way ANOVA ASSUMPTION violations T-DISTRIBUTION CAUCHY Distribution
暂未订购
How Kieffer Density Matrix Formalism Aids Different Initial Time Steps, Leading to Lorentz Violations, and Breakup of Primordial Black Holes for GW Generation
4
作者 Andrew Beckwith 《Journal of High Energy Physics, Gravitation and Cosmology》 2021年第4期1315-1327,共13页
A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early u... A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early universe Lorentz Violation. The author asserts that the existence of early universe Lorentz violation in turn is assisting in a breakup of primordial black holes. And that also has a tie into Kieffer different time steps as outlined. And the wrap up is given in the final part of this document. 展开更多
关键词 Kieffer Density Matrix Initial Time Lorentz violations Black Holes
在线阅读 下载PDF
SVR-Miner:Mining Security Validation Rules and Detecting Violations in Large Software 被引量:1
5
作者 梁彬 谢素斌 +2 位作者 石文昌 梁朝晖 陈红 《China Communications》 SCIE CSCD 2011年第4期84-98,共15页
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p... For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently. 展开更多
关键词 static analysis data mining automated validation rules extraction automated violation detection
在线阅读 下载PDF
Topo semantic constraint-violations in spatial database
6
作者 凯龙 李香 +1 位作者 刘宏伟 杨孝宗 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第4期506-512,共7页
Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this res... Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this research focuses on building an efficient spatial data management system using two constraint violation detection methods.An algorithm for constraint violation detection has been derived to maintain the error-free up-to-date spatial database.Results indicate that the developed constraint violation detection(CVD)system is more efficient compared with conventional systems. 展开更多
关键词 topo-semantic constraint rule constraint violation spatial object spatial database R-TREE GIS
在线阅读 下载PDF
Adaptive Runtime Monitoring of Service Level Agreement Violations in Cloud Computing
7
作者 Sami Ullah Khan Babar Nazir +3 位作者 Muhammad Hanif Akhtar Ali Sardar Alam Usman Habib 《Computers, Materials & Continua》 SCIE EI 2022年第6期4199-4220,共22页
The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to... The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies. 展开更多
关键词 Energy consumption penalty calculation proactive resource allocation service level agreement(SLA)monitoring SLA violation detection
在线阅读 下载PDF
On Island Constraints and Violations'
8
作者 LIN Hui MENG Fan-mao 《Journal of Literature and Art Studies》 2018年第1期146-152,共7页
There are some grammatical rules of pure syntactic restrictions on grammar rules of operation, a complex one of which is the fronting, i.e., extraction from the island. This paper centers on the "island" that is the... There are some grammatical rules of pure syntactic restrictions on grammar rules of operation, a complex one of which is the fronting, i.e., extraction from the island. This paper centers on the "island" that is the terminology in syntactic theory, and mainly focuses on the definition, the types and the analyses of the "island" 展开更多
关键词 ISLAND TOPICALIZATION CONSTRAINTS VIOLATION
在线阅读 下载PDF
Comparison of Environmental Law Violations and Accounting Abuses by Russian Enterprises
9
作者 Vladimir Glinskiy Michael Alekseev Lyudmila Serga 《Journal of Business Administration Research》 2019年第2期8-12,共5页
Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research ... Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research objective is statistical comparison of environmental law violation against accounting abuses by Russian enterprises.A research hypothesis is put forward that companies,that violated environmental law,prepare financial reporting mostly incorrectly.An exploratory sampling from the economic entities of Russia,that violated environmental law in the course of various activities,was formed.Financial reporting of the sampling companies was analyzed by virtue of the authorial probit regression model,making it possible to reveal accounting misstatements,both overreporting and underreporting.The obtained results make it possible to assess the interrelations between the environmental law violations and financial reporting. 展开更多
关键词 Sustainable development Ecological law VIOLATION FINANCIAL REPORTING misstatements
在线阅读 下载PDF
The Report on Human Rights Violations in the United States in2024(Ⅱ)
10
作者 《Beijing Review》 2025年第38期I0001-I0008,共8页
Asian Americans continue to face systemic discrimination in various aspects.A report released by the Alliance for Justice on May 22,2024,highlighted that for much ofthe 19th and20th centuries,Asian Americans were syst... Asian Americans continue to face systemic discrimination in various aspects.A report released by the Alliance for Justice on May 22,2024,highlighted that for much ofthe 19th and20th centuries,Asian Americans were systematically excluded from many areas of public life.Even today,41 state supreme courts have never had an Asian American judge,despite some ofthese states having significant Asian American populations. 展开更多
关键词 Asian Americans Asian American judges systemic discrimination human rights violations public life asian american state supreme courts
原文传递
The Report on Human Rights Violations in the United States in 2024(Ⅰ)
11
作者 《Beijing Review》 2025年第36期I0001-I0008,共8页
August 2025,Foreword 2024,as an election year in the United States,was a year of special concern that features aggravating political strife and social divide.Such a landscape oflers an opportunity to review the state ... August 2025,Foreword 2024,as an election year in the United States,was a year of special concern that features aggravating political strife and social divide.Such a landscape oflers an opportunity to review the state of human rights in the country in an intensive manner。 展开更多
关键词 political strife social divide human rights violations election year United States review state human rights
原文传递
CP violations and branching ratios for B_(c)^(+)→D_((s))^(+)π^(+)π^(−)(K^(+)K^(−))from interference of the vector mesons in Perturbative QCD
12
作者 Kun Shuai Ye Gang Lü +2 位作者 Na Wang Jian Chai Xin-Heng Guo 《Chinese Physics C》 2025年第9期103-116,共14页
Within the framework of the perturbative QCD approach utilizing k_(T)factorization,we investigated the CP violation and branching ratios in the decay processes of B_(c)^(+)→D_((s))^(+)V(V→π^(+)π^(−))and B_(c)^(+)... Within the framework of the perturbative QCD approach utilizing k_(T)factorization,we investigated the CP violation and branching ratios in the decay processes of B_(c)^(+)→D_((s))^(+)V(V→π^(+)π^(−))and B_(c)^(+)→D_((s))^(+)V(V→K^(+)K^(−)),where V denotes the three vector mesons ρ^(0),ω,and Ф.During the V→π^(+)π^(−) and V→K^(+)K^(−) decay processes,we incorporated the ρ^(0)-ω-Ф mixing mechanism to describe the amplitudes of these quasi-two-body decays.Within the interference region of the three vector particles,we observed distinct changes in both CP violations and branching ratios.Furthermore,our study presents evidence for local CP violations and branching ratios that warrants further experimental investigation. 展开更多
关键词 CP violation B meson heavy flavor physics
原文传递
Electrodynamics with violations of Lorentz and U(1)gauge symmetries and their Hamiltonian structures
13
作者 杨秀鹏 李瀑飞 朱涛 《Chinese Physics C》 SCIE CAS CSCD 2024年第6期45-57,共13页
This study aims to investigate Lorentz/U(1)gauge symmetry-breaking electrodynamics in the framework of the standard-model extension and analyze the Hamiltonian structure for the theory with a specific dimension of Lor... This study aims to investigate Lorentz/U(1)gauge symmetry-breaking electrodynamics in the framework of the standard-model extension and analyze the Hamiltonian structure for the theory with a specific dimension of Lorentz breaking operators.For this purpose,we consider a general quadratic action of the modified electrodynamics with Lorentz/gauge-breaking operators and calculate the number of independent components of the operators at different dimensions in gauge invariance and breaking.With this general action,we then analyze how Lorentz/gauge symmetry-breaking can change the Hamiltonian structure of the theories by considering Lorentz/gauge-breaking operators with dimension as examples.We show that the Lorentz-breaking operators with gauge invariance do not change the classes of the theory constrains and the number of physical degrees of freedom of the standard Maxwell electrodynamics.When U(1)gauge symmetry-breaking operators are present,the theories generally lack a first-class constraint and have one additional physical degree of freedom compared to the standard Maxwell electrodynamics. 展开更多
关键词 standard model extension ELECTRODYNAMICS Lorentz violations
原文传递
CBBM-WARM:A Workload-Aware Meta-Heuristic for Resource Management in Cloud Computing 被引量:1
14
作者 K Nivitha P Pabitha R Praveen 《China Communications》 2025年第6期255-275,共21页
The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achievi... The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achieving autonomic resource management is identified to be a herculean task due to its huge distributed and heterogeneous environment.Moreover,the cloud network needs to provide autonomic resource management and deliver potential services to the clients by complying with the requirements of Quality-of-Service(QoS)without impacting the Service Level Agreements(SLAs).However,the existing autonomic cloud resource managing frameworks are not capable in handling the resources of the cloud with its dynamic requirements.In this paper,Coot Bird Behavior Model-based Workload Aware Autonomic Resource Management Scheme(CBBM-WARMS)is proposed for handling the dynamic requirements of cloud resources through the estimation of workload that need to be policed by the cloud environment.This CBBM-WARMS initially adopted the algorithm of adaptive density peak clustering for workloads clustering of the cloud.Then,it utilized the fuzzy logic during the process of workload scheduling for achieving the determining the availability of cloud resources.It further used CBBM for potential Virtual Machine(VM)deployment that attributes towards the provision of optimal resources.It is proposed with the capability of achieving optimal QoS with minimized time,energy consumption,SLA cost and SLA violation.The experimental validation of the proposed CBBMWARMS confirms minimized SLA cost of 19.21%and reduced SLA violation rate of 18.74%,better than the compared autonomic cloud resource managing frameworks. 展开更多
关键词 autonomic resource management cloud computing coot bird behavior model SLA violation cost WORKLOAD
在线阅读 下载PDF
Unbiased test of the hyperon CP violation in terms of detector resolution at STCF
15
作者 Ming Xu Liang Liu +2 位作者 Yupeng Pei Xiaorong Zhou Yingchun Zhu 《中国科学技术大学学报》 北大核心 2025年第4期41-47,40,I0002,共9页
The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled h... The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled hyperonantihyperon pairs to be produced at Super Tau-Charm Facility(STCF),the CP asymmetry of hyperon is expected to be tested with a statistical sensitivity of 10^(−4) or even better.To cope with the statistical precision,the systematic effects from various aspects are critical and need to be studied in detail.In this paper,the sensitivity effects on the CP violation parameters associated with the detector resolution,including those of the position and momentum,are studied and discussed in detail.The results provide valuable guidance for the design of STCF detector. 展开更多
关键词 BESIII experiment STCF hyperon CP violation detector resolution unbiased test
在线阅读 下载PDF
Testing noncommutative spacetimes and violations of the Pauli Exclusion Principle through underground experiments
16
作者 Andrea Addazi Pierluigi Belli +1 位作者 Rita Bernabei Antonino Marcianò 《Chinese Physics C》 SCIE CAS CSCD 2018年第9期79-86,共8页
We propose to deploy limits that arise from different tests of the Pauli Exclusion Principle: i) to provide theories of quantum gravity with experimental guidance; ii) to distinguish, among the plethora of possible... We propose to deploy limits that arise from different tests of the Pauli Exclusion Principle: i) to provide theories of quantum gravity with experimental guidance; ii) to distinguish, among the plethora of possible models, the ones that are already ruled out by current data; iii) to direct future attempts to be in accordance with experimental constraints. We first review experimental bounds on nuclear processes forbidden by the Pauli Exclusion Principle,which have been derived by several experimental collaborations making use of various detector materials. Distinct features of the experimental devices entail sensitivities on the constraints hitherto achieved that may differ from one another by several orders of magnitude. We show that with choices of these limits, well-known examples of flat noncommutative space-time instantiations of quantum gravity can be heavily constrained, and eventually ruled out.We devote particular attention to the analysis of the κ-Minkowski and θ-Minkowski noncommutative spacetimes.These are deeply connected to some scenarios in string theory, loop quantum gravity, and noncommutative geometry.We emphasize that the severe constraints on these quantum spacetimes, although they cannot rule out theories of top-down quantum gravity to which they are connected in various ways, provide a powerful limitation for those models. Focus on this will be necessary in the future. 展开更多
关键词 non-commutative space-times tests of violations of the Pauli Exclusion Principle theta-Minkowski kappa-Minkowski
原文传递
Production of the massless dark photon γ associated with the photon γ from charged lepton flavor violating decay processes
17
作者 Si Li Chong-Xing Yue +1 位作者 Xue-Jia Cheng Yang-Yang Bu 《Communications in Theoretical Physics》 2025年第6期129-132,共4页
The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor ... The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor violation(LFV)process l_(i)→l_(j)γγ and di-production from the LFV process l_(i)→l_(j)γγ induced by dipole operators.Comparing the obtained numerical results with the corresponding experimental measurements,we obtain the constraints on the effective couplings of γ with the SM charged leptons.The upper limit of the effective coupling|DLμe|2+|DRμe|2coming from the process μ→e~γγis looser than the processμ→eγ by about one order of magnitude. 展开更多
关键词 massless dark photon lepton flavor violation process effective couplings
原文传递
Violations of Chinese Sovereignty Not Allowed
18
《Beijing Review》 2009年第29期17-17,共1页
关键词 violations of Chinese Sovereignty Not Allowed
原文传递
Detailed Rules on the Punishment of the Violations of the Laws and Legislation in Finance
19
《中国外汇》 1999年第3期65-65,共1页
关键词 LAWS Detailed Rules on the Punishment of the violations of the Laws and Legislation in Finance
原文传递
Are academic independent directors punished more severely when they engage in violations? 被引量:5
20
作者 Yi Quan Sihai Li 《China Journal of Accounting Research》 2017年第1期71-86,共16页
We use a sample of Chinese A-share listed companies from 2003 to 2013 to explore the reputation damage and overflow effect of academic independent directors who have received supervisory punishment. We find that when ... We use a sample of Chinese A-share listed companies from 2003 to 2013 to explore the reputation damage and overflow effect of academic independent directors who have received supervisory punishment. We find that when companies violate information disclosure rules, the market punishes academic independent directors more severely than nonacademic independent directors for these violations. Furthermore, companies employing punished academic directors face greater declines in their stock price than companies employing punished nonacademic independent directors during a relatively short window before or after the punishment is announced. The punishment of academic independent directors influences the employment of other scholars in the same field and results in a negative overflow effect. This study provides evidence of the market's differential reactions to independent directors with different backgrounds; the findings reflect the double-edged sword of one individual's reputation on organizations. 展开更多
关键词 Academic independent directors Violation behavior Reputation punishment Overflow effect
原文传递
上一页 1 2 15 下一页 到第
使用帮助 返回顶部