User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and opera...User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and operating.However,there are more ways which can reflect the good use of user portrait.Commercial use is the most acceptable use but it also can be used in different industries widely.The goal of this paper is forecasting gender by user portrait and making it useful in transportation safety.It can extract the information from people who violated traffic principle to know the features of them then forecast the gender of these people.Finally,it will analyze the prediction based on characteristics correlation and forecasting results from models which can verify if gender can have an obvious influence on the traffic violation.Also we hope give some advice to drivers and traffic department by doing this research.展开更多
The nonlinear affine Goldstone model of the emergent gravity, built on the nonlinearly realized/ hidden affine symmetry, is concisely revisited. Beyond General Relativity, the explicit violation of general invariance/...The nonlinear affine Goldstone model of the emergent gravity, built on the nonlinearly realized/ hidden affine symmetry, is concisely revisited. Beyond General Relativity, the explicit violation of general invariance/relativity, under preserving general covariance, is exposed. Dependent on a nondynamical affine connection, a generally covariant second-order effective Lagrangian for metric gravity is worked out, with the general relativity violation and the gravitational dark matter serving as the signatures of emergence.展开更多
We introduce a criterion as to the range of HFGW generated by early universe conditions. The 1 to 10 Giga Hertz range is constructed initially starting with what Grupen writes as far as what to expect of GW frequencie...We introduce a criterion as to the range of HFGW generated by early universe conditions. The 1 to 10 Giga Hertz range is constructed initially starting with what Grupen writes as far as what to expect of GW frequencies which can be detected assuming a sensitivity of 7×h^10-27 . From there we examine the implications of an earlier Hubble parameter at the start of inflation, and a phase transition treatment of pre to post Planckian inflation physics via use of inflatons. We close with an analysis of how gravitational constant G may vary with time, the tie in with the NEC condition and how to select a range of relic GW frequencies. The gravitational frequencies in turn may enable resolving a mis match between the datum that the entropy of the center of the galaxy black hole is greater than the entropy of the present four dimensional universe as we can infer and measure.展开更多
It briefly recalls the theory of Bell’s inequality and some experimental measures. Then measurements are processed on one hand according to a property of the wave function, on the other hand according to the sum defi...It briefly recalls the theory of Bell’s inequality and some experimental measures. Then measurements are processed on one hand according to a property of the wave function, on the other hand according to the sum definition. The results of such processed measures are apparently not the same, so Bell’s inequality would not be violated. It is a use of the wave function which implies the violation of the inequality, as it can be seen on the last flowcharts.展开更多
The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achievi...The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achieving autonomic resource management is identified to be a herculean task due to its huge distributed and heterogeneous environment.Moreover,the cloud network needs to provide autonomic resource management and deliver potential services to the clients by complying with the requirements of Quality-of-Service(QoS)without impacting the Service Level Agreements(SLAs).However,the existing autonomic cloud resource managing frameworks are not capable in handling the resources of the cloud with its dynamic requirements.In this paper,Coot Bird Behavior Model-based Workload Aware Autonomic Resource Management Scheme(CBBM-WARMS)is proposed for handling the dynamic requirements of cloud resources through the estimation of workload that need to be policed by the cloud environment.This CBBM-WARMS initially adopted the algorithm of adaptive density peak clustering for workloads clustering of the cloud.Then,it utilized the fuzzy logic during the process of workload scheduling for achieving the determining the availability of cloud resources.It further used CBBM for potential Virtual Machine(VM)deployment that attributes towards the provision of optimal resources.It is proposed with the capability of achieving optimal QoS with minimized time,energy consumption,SLA cost and SLA violation.The experimental validation of the proposed CBBMWARMS confirms minimized SLA cost of 19.21%and reduced SLA violation rate of 18.74%,better than the compared autonomic cloud resource managing frameworks.展开更多
The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled h...The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled hyperonantihyperon pairs to be produced at Super Tau-Charm Facility(STCF),the CP asymmetry of hyperon is expected to be tested with a statistical sensitivity of 10^(−4) or even better.To cope with the statistical precision,the systematic effects from various aspects are critical and need to be studied in detail.In this paper,the sensitivity effects on the CP violation parameters associated with the detector resolution,including those of the position and momentum,are studied and discussed in detail.The results provide valuable guidance for the design of STCF detector.展开更多
The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor ...The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor violation(LFV)process l_(i)→l_(j)γγ and di-production from the LFV process l_(i)→l_(j)γγ induced by dipole operators.Comparing the obtained numerical results with the corresponding experimental measurements,we obtain the constraints on the effective couplings of γ with the SM charged leptons.The upper limit of the effective coupling|DLμe|2+|DRμe|2coming from the process μ→e~γγis looser than the processμ→eγ by about one order of magnitude.展开更多
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie...Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.展开更多
Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin...Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures.展开更多
The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually ente...The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard.展开更多
By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an...By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an unknown quantity. Quark oscillations occur in spaces that are on the femtometer scale and they are unmeasurable from the point of view of experiments. However, the consequence of those oscillations is the CP violating phase for quarks, which is measured through unitary triangles in Wolfenstein’s parameterization. Through the mathematical model presented in this paper, the equation in Wolfenstein’s parameterization was derived, the root of which is consistent with measurements in today’s quark physics.展开更多
At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of dispute...At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated.展开更多
Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co...Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables.展开更多
Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaire...Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors.展开更多
In recent years, the infringements of information disclosure are conspicuous in listed companies in China, which has seriously impeded the healthy development of the capital market. In this paper, the results of regul...In recent years, the infringements of information disclosure are conspicuous in listed companies in China, which has seriously impeded the healthy development of the capital market. In this paper, the results of regulations of the infringements by means of the game theory and our findings suggest that we should witness less cases of violations when we intensify own efforts to check up and punish those violations, and lower the return of the infringement. At the same time, we would increase the effect of supervising violated behavior when we strengthen the deterrence.展开更多
Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, na...Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, namely the violation to the norms of a language, frequently appears in advertisements and can meet requirements of the style of advertising English. Due to limited space, this paper focuses on deviation on the phonological, graphological, lexical, grammatical, and semantic level. Analyzing deviation in advertising English can promote readers' aesthetic and appreciative ability and encourage advertisers to create advertisements with more efficiency, novelty, innovation in more effective language.展开更多
Road safety is still an important issue with road accidents among the leading causes of death accounting for more than 1.2 million fatalities and 50 million injuries globally per year. Of these casualties, speeding is...Road safety is still an important issue with road accidents among the leading causes of death accounting for more than 1.2 million fatalities and 50 million injuries globally per year. Of these casualties, speeding is a substantial contributing factor. Nowadays, speed reduction is mainly achieved through speed law enforcement measures. The review is aimed at examining the different enforcement approaches used to control and monitor excessive speeds on highways at large and particularly in Cameroon. A systematic search was performed in Science Direct, Elsevier, google scholar, scientific research, and Springer, ResearchGate, Scopus, and PubMed databases. Furthermore, references of selected articles were reviewed to maximize the rate of articles found. The details of the research articles were generated using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) flow chart. The results show that of 658 retried articles, duplicates of 458 were excluded and 200 were screened. A total of 61 and 40 articles were screened from abstract and full pdf text respectively. Finally, 15 relevant studies were included in the study. The review revealed that the included articles on speed enforcement on the highway were limited to sanctioning defaulters for fine payments.展开更多
基金This research work is implemented at the 2011 Collaborative Innovation Center for Development and Utilization of Finance and Economics Big Data Property,Universities of Hunan ProvinceHunan Provincial Key Laboratory of Big Data Science and Technology,Finance and Economics+3 种基金Key Laboratory of Information Technology and Security,Hunan Provincial Higher Education.This research is funded by the Open Foundation for the University Innovation Platform in the Hunan Province(Grant No.18K103)Open Project(Grant Nos.20181901CRP03,20181901CRP04,20181901CRP05)Hunan Provincial Education Science 13th Five Year Plan(Grant No.XJK016BXX001)Social Science Foundation of Hunan Province(Grant No.17YBA049).
文摘User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and operating.However,there are more ways which can reflect the good use of user portrait.Commercial use is the most acceptable use but it also can be used in different industries widely.The goal of this paper is forecasting gender by user portrait and making it useful in transportation safety.It can extract the information from people who violated traffic principle to know the features of them then forecast the gender of these people.Finally,it will analyze the prediction based on characteristics correlation and forecasting results from models which can verify if gender can have an obvious influence on the traffic violation.Also we hope give some advice to drivers and traffic department by doing this research.
文摘The nonlinear affine Goldstone model of the emergent gravity, built on the nonlinearly realized/ hidden affine symmetry, is concisely revisited. Beyond General Relativity, the explicit violation of general invariance/relativity, under preserving general covariance, is exposed. Dependent on a nondynamical affine connection, a generally covariant second-order effective Lagrangian for metric gravity is worked out, with the general relativity violation and the gravitational dark matter serving as the signatures of emergence.
文摘We introduce a criterion as to the range of HFGW generated by early universe conditions. The 1 to 10 Giga Hertz range is constructed initially starting with what Grupen writes as far as what to expect of GW frequencies which can be detected assuming a sensitivity of 7×h^10-27 . From there we examine the implications of an earlier Hubble parameter at the start of inflation, and a phase transition treatment of pre to post Planckian inflation physics via use of inflatons. We close with an analysis of how gravitational constant G may vary with time, the tie in with the NEC condition and how to select a range of relic GW frequencies. The gravitational frequencies in turn may enable resolving a mis match between the datum that the entropy of the center of the galaxy black hole is greater than the entropy of the present four dimensional universe as we can infer and measure.
文摘It briefly recalls the theory of Bell’s inequality and some experimental measures. Then measurements are processed on one hand according to a property of the wave function, on the other hand according to the sum definition. The results of such processed measures are apparently not the same, so Bell’s inequality would not be violated. It is a use of the wave function which implies the violation of the inequality, as it can be seen on the last flowcharts.
文摘The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achieving autonomic resource management is identified to be a herculean task due to its huge distributed and heterogeneous environment.Moreover,the cloud network needs to provide autonomic resource management and deliver potential services to the clients by complying with the requirements of Quality-of-Service(QoS)without impacting the Service Level Agreements(SLAs).However,the existing autonomic cloud resource managing frameworks are not capable in handling the resources of the cloud with its dynamic requirements.In this paper,Coot Bird Behavior Model-based Workload Aware Autonomic Resource Management Scheme(CBBM-WARMS)is proposed for handling the dynamic requirements of cloud resources through the estimation of workload that need to be policed by the cloud environment.This CBBM-WARMS initially adopted the algorithm of adaptive density peak clustering for workloads clustering of the cloud.Then,it utilized the fuzzy logic during the process of workload scheduling for achieving the determining the availability of cloud resources.It further used CBBM for potential Virtual Machine(VM)deployment that attributes towards the provision of optimal resources.It is proposed with the capability of achieving optimal QoS with minimized time,energy consumption,SLA cost and SLA violation.The experimental validation of the proposed CBBMWARMS confirms minimized SLA cost of 19.21%and reduced SLA violation rate of 18.74%,better than the compared autonomic cloud resource managing frameworks.
基金supported by the National Key R&D Program of China(2022YFA1602200)the International Partnership Program of the Chinese Academy of Sciences(211134KYSB20200057).
文摘The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled hyperonantihyperon pairs to be produced at Super Tau-Charm Facility(STCF),the CP asymmetry of hyperon is expected to be tested with a statistical sensitivity of 10^(−4) or even better.To cope with the statistical precision,the systematic effects from various aspects are critical and need to be studied in detail.In this paper,the sensitivity effects on the CP violation parameters associated with the detector resolution,including those of the position and momentum,are studied and discussed in detail.The results provide valuable guidance for the design of STCF detector.
基金supported in part by the National Natural Science Foundation of China under Grant Nos.11875157,12147214the Doctoral Start-up Fund of Liaoning Normal University under Grant No.2024BSL018the Universitylevel National Research Project Cultivation Program under Grant No.2024170。
文摘The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor violation(LFV)process l_(i)→l_(j)γγ and di-production from the LFV process l_(i)→l_(j)γγ induced by dipole operators.Comparing the obtained numerical results with the corresponding experimental measurements,we obtain the constraints on the effective couplings of γ with the SM charged leptons.The upper limit of the effective coupling|DLμe|2+|DRμe|2coming from the process μ→e~γγis looser than the processμ→eγ by about one order of magnitude.
文摘Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.
基金funded by the Deanship of Scientific Research at Northern Border University,Arar,Kingdom of Saudi Arabia through Research Group No.(RG-NBU-2022-1234).
文摘Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures.
基金supported by the Major Com-missioned Project of Social Science Planning Fund of Liaoning Prov-ince,China:“Research on Legal Issues of Cross-border Nuclear Dam-age Compensation in the Context of Japan’s Discharge of Nuclear Sewage”[Grant No.L23ZD072].
文摘The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard.
文摘By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an unknown quantity. Quark oscillations occur in spaces that are on the femtometer scale and they are unmeasurable from the point of view of experiments. However, the consequence of those oscillations is the CP violating phase for quarks, which is measured through unitary triangles in Wolfenstein’s parameterization. Through the mathematical model presented in this paper, the equation in Wolfenstein’s parameterization was derived, the root of which is consistent with measurements in today’s quark physics.
文摘At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated.
文摘Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables.
基金The National Key Technology R&D Program during the 11th Five-Year Plan Period(No.2009BAG13A05)the National Natural Science Foundation of China(No.51078086)
文摘Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors.
文摘In recent years, the infringements of information disclosure are conspicuous in listed companies in China, which has seriously impeded the healthy development of the capital market. In this paper, the results of regulations of the infringements by means of the game theory and our findings suggest that we should witness less cases of violations when we intensify own efforts to check up and punish those violations, and lower the return of the infringement. At the same time, we would increase the effect of supervising violated behavior when we strengthen the deterrence.
文摘Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, namely the violation to the norms of a language, frequently appears in advertisements and can meet requirements of the style of advertising English. Due to limited space, this paper focuses on deviation on the phonological, graphological, lexical, grammatical, and semantic level. Analyzing deviation in advertising English can promote readers' aesthetic and appreciative ability and encourage advertisers to create advertisements with more efficiency, novelty, innovation in more effective language.
文摘Road safety is still an important issue with road accidents among the leading causes of death accounting for more than 1.2 million fatalities and 50 million injuries globally per year. Of these casualties, speeding is a substantial contributing factor. Nowadays, speed reduction is mainly achieved through speed law enforcement measures. The review is aimed at examining the different enforcement approaches used to control and monitor excessive speeds on highways at large and particularly in Cameroon. A systematic search was performed in Science Direct, Elsevier, google scholar, scientific research, and Springer, ResearchGate, Scopus, and PubMed databases. Furthermore, references of selected articles were reviewed to maximize the rate of articles found. The details of the research articles were generated using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) flow chart. The results show that of 658 retried articles, duplicates of 458 were excluded and 200 were screened. A total of 61 and 40 articles were screened from abstract and full pdf text respectively. Finally, 15 relevant studies were included in the study. The review revealed that the included articles on speed enforcement on the highway were limited to sanctioning defaulters for fine payments.