期刊文献+
共找到286篇文章
< 1 2 15 >
每页显示 20 50 100
Gender Forecast Based on the Information about People Who Violated Traffic Principle 被引量:1
1
作者 Rui Li Guang Sun +5 位作者 Jingyi He Ying Jiang Rui Sun Haixia Li Peng Guo and Jianjun Zhang 《Journal on Internet of Things》 2020年第2期65-73,共9页
User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and opera... User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and operating.However,there are more ways which can reflect the good use of user portrait.Commercial use is the most acceptable use but it also can be used in different industries widely.The goal of this paper is forecasting gender by user portrait and making it useful in transportation safety.It can extract the information from people who violated traffic principle to know the features of them then forecast the gender of these people.Finally,it will analyze the prediction based on characteristics correlation and forecasting results from models which can verify if gender can have an obvious influence on the traffic violation.Also we hope give some advice to drivers and traffic department by doing this research. 展开更多
关键词 User portrait gender forecast feature selection correlation analysis traffic violation
在线阅读 下载PDF
Emergent Gravity, Violated Relativity and Dark Matter
2
作者 Yury F. Pirogov 《Journal of Modern Physics》 2014年第15期1418-1426,共9页
The nonlinear affine Goldstone model of the emergent gravity, built on the nonlinearly realized/ hidden affine symmetry, is concisely revisited. Beyond General Relativity, the explicit violation of general invariance/... The nonlinear affine Goldstone model of the emergent gravity, built on the nonlinearly realized/ hidden affine symmetry, is concisely revisited. Beyond General Relativity, the explicit violation of general invariance/relativity, under preserving general covariance, is exposed. Dependent on a nondynamical affine connection, a generally covariant second-order effective Lagrangian for metric gravity is worked out, with the general relativity violation and the gravitational dark matter serving as the signatures of emergence. 展开更多
关键词 SPONTANEOUS Symmetry BREAKING Nonlinear REALIZATIONS Emergent Gravity General RELATIVITY VIOLATION DARK Matter
在线阅读 下载PDF
What the Null Energy Condition (and When It May Be Violated) Tells Us about Gravitational Wave Frequencies in/for Relic Cosmology?
3
作者 Andrew Beckwith 《Journal of Modern Physics》 2011年第9期977-991,共15页
We introduce a criterion as to the range of HFGW generated by early universe conditions. The 1 to 10 Giga Hertz range is constructed initially starting with what Grupen writes as far as what to expect of GW frequencie... We introduce a criterion as to the range of HFGW generated by early universe conditions. The 1 to 10 Giga Hertz range is constructed initially starting with what Grupen writes as far as what to expect of GW frequencies which can be detected assuming a sensitivity of 7×h^10-27 . From there we examine the implications of an earlier Hubble parameter at the start of inflation, and a phase transition treatment of pre to post Planckian inflation physics via use of inflatons. We close with an analysis of how gravitational constant G may vary with time, the tie in with the NEC condition and how to select a range of relic GW frequencies. The gravitational frequencies in turn may enable resolving a mis match between the datum that the entropy of the center of the galaxy black hole is greater than the entropy of the present four dimensional universe as we can infer and measure. 展开更多
关键词 NULL ENERGY CONDITION VIOLATION of NULL ENERGY CONDITION Cyclic Conformal COSMOLOGY Entropy MULTIVERSE
暂未订购
And If Bell’s Inequality Were Not Violated
4
作者 Olivier Serret 《Journal of Modern Physics》 2014年第14期1360-1369,共10页
It briefly recalls the theory of Bell’s inequality and some experimental measures. Then measurements are processed on one hand according to a property of the wave function, on the other hand according to the sum defi... It briefly recalls the theory of Bell’s inequality and some experimental measures. Then measurements are processed on one hand according to a property of the wave function, on the other hand according to the sum definition. The results of such processed measures are apparently not the same, so Bell’s inequality would not be violated. It is a use of the wave function which implies the violation of the inequality, as it can be seen on the last flowcharts. 展开更多
关键词 Bell’s THEOREM Bell’s INEQUALITY VIOLATION ENTANGLED PHOTONS Quantum SUM Experimental Measures Wave Function
暂未订购
CBBM-WARM:A Workload-Aware Meta-Heuristic for Resource Management in Cloud Computing 被引量:1
5
作者 K Nivitha P Pabitha R Praveen 《China Communications》 2025年第6期255-275,共21页
The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achievi... The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achieving autonomic resource management is identified to be a herculean task due to its huge distributed and heterogeneous environment.Moreover,the cloud network needs to provide autonomic resource management and deliver potential services to the clients by complying with the requirements of Quality-of-Service(QoS)without impacting the Service Level Agreements(SLAs).However,the existing autonomic cloud resource managing frameworks are not capable in handling the resources of the cloud with its dynamic requirements.In this paper,Coot Bird Behavior Model-based Workload Aware Autonomic Resource Management Scheme(CBBM-WARMS)is proposed for handling the dynamic requirements of cloud resources through the estimation of workload that need to be policed by the cloud environment.This CBBM-WARMS initially adopted the algorithm of adaptive density peak clustering for workloads clustering of the cloud.Then,it utilized the fuzzy logic during the process of workload scheduling for achieving the determining the availability of cloud resources.It further used CBBM for potential Virtual Machine(VM)deployment that attributes towards the provision of optimal resources.It is proposed with the capability of achieving optimal QoS with minimized time,energy consumption,SLA cost and SLA violation.The experimental validation of the proposed CBBMWARMS confirms minimized SLA cost of 19.21%and reduced SLA violation rate of 18.74%,better than the compared autonomic cloud resource managing frameworks. 展开更多
关键词 autonomic resource management cloud computing coot bird behavior model SLA violation cost WORKLOAD
在线阅读 下载PDF
Unbiased test of the hyperon CP violation in terms of detector resolution at STCF
6
作者 Ming Xu Liang Liu +2 位作者 Yupeng Pei Xiaorong Zhou Yingchun Zhu 《中国科学技术大学学报》 北大核心 2025年第4期41-47,40,I0002,共9页
The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled h... The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled hyperonantihyperon pairs to be produced at Super Tau-Charm Facility(STCF),the CP asymmetry of hyperon is expected to be tested with a statistical sensitivity of 10^(−4) or even better.To cope with the statistical precision,the systematic effects from various aspects are critical and need to be studied in detail.In this paper,the sensitivity effects on the CP violation parameters associated with the detector resolution,including those of the position and momentum,are studied and discussed in detail.The results provide valuable guidance for the design of STCF detector. 展开更多
关键词 BESIII experiment STCF hyperon CP violation detector resolution unbiased test
在线阅读 下载PDF
Production of the massless dark photon γ associated with the photon γ from charged lepton flavor violating decay processes
7
作者 Si Li Chong-Xing Yue +1 位作者 Xue-Jia Cheng Yang-Yang Bu 《Communications in Theoretical Physics》 2025年第6期129-132,共4页
The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor ... The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor violation(LFV)process l_(i)→l_(j)γγ and di-production from the LFV process l_(i)→l_(j)γγ induced by dipole operators.Comparing the obtained numerical results with the corresponding experimental measurements,we obtain the constraints on the effective couplings of γ with the SM charged leptons.The upper limit of the effective coupling|DLμe|2+|DRμe|2coming from the process μ→e~γγis looser than the processμ→eγ by about one order of magnitude. 展开更多
关键词 massless dark photon lepton flavor violation process effective couplings
原文传递
Bonfire Builders Violated Safety Rules—Reports
8
作者 刘云燕 《当代外语研究》 1999年第12期18-19,共2页
在第12期即将发稿之际我们收到了本篇来稿,本篇和上篇可谓“姊妹篇”,相辅相成。此次不幸所造成的死亡人数已达到12人!事故发生的原因也已基本查明。
关键词 REPORTS Bonfire Builders violated Safety Rules
原文传递
A Study of Triangle Inequality Violations in Social Network Clustering 被引量:1
9
作者 Sanjit Kumar Saha Tapashi Gosswami 《Journal of Computer and Communications》 2024年第1期67-76,共10页
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie... Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters. 展开更多
关键词 CLUSTERING Triangle Inequality Violations Traditional Clustering Graph Clustering
在线阅读 下载PDF
AI-Based Helmet Violation Detection for Traffic Management System
10
作者 Yahia Said YahyaAlassaf +5 位作者 Refka Ghodhbani Yazan Ahmad Alsariera Taoufik Saidani Olfa Ben Rhaiem Mohamad Khaled Makhdoum Manel Hleili 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期733-749,共17页
Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin... Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures. 展开更多
关键词 Non-helmet use detection traffic violation SAFETY deep learning optimized PerspectiveNet
在线阅读 下载PDF
Addressing Japan’s disposal of nuclear-contaminated water from the perspective of international human rights law
11
作者 Yen-Chiang Chang Xiaonan Zhao 《Chinese Journal of Population,Resources and Environment》 2024年第1期1-9,共9页
The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually ente... The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard. 展开更多
关键词 Fukushima nuclearcontaminated water Crimes against humanity Remedy for violations of human rights Right to environment Right to life
在线阅读 下载PDF
The Equation for the CP Violating Phase for Quarks: The Rule for the Sum of Quark Oscillation Probabilities
12
作者 Zoran B. Todorovic 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1835-1865,共31页
By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an... By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an unknown quantity. Quark oscillations occur in spaces that are on the femtometer scale and they are unmeasurable from the point of view of experiments. However, the consequence of those oscillations is the CP violating phase for quarks, which is measured through unitary triangles in Wolfenstein’s parameterization. Through the mathematical model presented in this paper, the equation in Wolfenstein’s parameterization was derived, the root of which is consistent with measurements in today’s quark physics. 展开更多
关键词 QUARKS CKM Matrix PMNS Matrix Wolfenstein Parameterization CP Violation Phase Jarlskog Invariant
在线阅读 下载PDF
Determination of Liability for Violation of “Sexual Autonomy” and Compensation for Mental Damages
13
作者 姚邢 JIANG Lin(Translated) 《The Journal of Human Rights》 2024年第2期347-372,共26页
At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of dispute... At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated. 展开更多
关键词 sexual autonomy personality rights VIOLATIONS liability investigation
原文传递
Fermions: Spin, Hidden Variables, Violation of Bell’s Inequality and Quantum Entanglement
14
作者 Doron Kwiat 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1613-1627,共15页
Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co... Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables. 展开更多
关键词 FERMIONS SPIN Hidden Variables Bell’s Inequality Violation Spin Entanglement
在线阅读 下载PDF
Characteristics and risk of violation behavior of non-motorists at signalized intersections 被引量:6
15
作者 赵星 任刚 +2 位作者 杜轩 王鹏 王卫杰 《Journal of Southeast University(English Edition)》 EI CAS 2011年第4期423-429,共7页
Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaire... Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors. 展开更多
关键词 traffic violation behavior traffic safety non- motorist signal intersection
在线阅读 下载PDF
Study on Game Model of Information Disclosure and Supervision
16
作者 Naiping Zhu Yusheng Kong 《Journal of Modern Accounting and Auditing》 2006年第6期50-55,共6页
In recent years, the infringements of information disclosure are conspicuous in listed companies in China, which has seriously impeded the healthy development of the capital market. In this paper, the results of regul... In recent years, the infringements of information disclosure are conspicuous in listed companies in China, which has seriously impeded the healthy development of the capital market. In this paper, the results of regulations of the infringements by means of the game theory and our findings suggest that we should witness less cases of violations when we intensify own efforts to check up and punish those violations, and lower the return of the infringement. At the same time, we would increase the effect of supervising violated behavior when we strengthen the deterrence. 展开更多
关键词 information disclosure violated behavior supervising effect game analysis
在线阅读 下载PDF
Deviation in Advertising English from a Stylistic Perspective
17
作者 罗敏 《英语广场(学术研究)》 2012年第10期15-17,共3页
Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, na... Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, namely the violation to the norms of a language, frequently appears in advertisements and can meet requirements of the style of advertising English. Due to limited space, this paper focuses on deviation on the phonological, graphological, lexical, grammatical, and semantic level. Analyzing deviation in advertising English can promote readers' aesthetic and appreciative ability and encourage advertisers to create advertisements with more efficiency, novelty, innovation in more effective language. 展开更多
关键词 advertising English deviation STYLISTIC VIOLATION NORM
在线阅读 下载PDF
A Systematic Review of Excessive Speed Monitoring and Control System for Accident Prevention on Cameroon Highways
18
作者 Azeh Gerald Innocent Ndoh Mbue +1 位作者 Ayissi Zacharie Merlin Awa Terence Achiri 《World Journal of Engineering and Technology》 2022年第1期28-39,共12页
Road safety is still an important issue with road accidents among the leading causes of death accounting for more than 1.2 million fatalities and 50 million injuries globally per year. Of these casualties, speeding is... Road safety is still an important issue with road accidents among the leading causes of death accounting for more than 1.2 million fatalities and 50 million injuries globally per year. Of these casualties, speeding is a substantial contributing factor. Nowadays, speed reduction is mainly achieved through speed law enforcement measures. The review is aimed at examining the different enforcement approaches used to control and monitor excessive speeds on highways at large and particularly in Cameroon. A systematic search was performed in Science Direct, Elsevier, google scholar, scientific research, and Springer, ResearchGate, Scopus, and PubMed databases. Furthermore, references of selected articles were reviewed to maximize the rate of articles found. The details of the research articles were generated using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) flow chart. The results show that of 658 retried articles, duplicates of 458 were excluded and 200 were screened. A total of 61 and 40 articles were screened from abstract and full pdf text respectively. Finally, 15 relevant studies were included in the study. The review revealed that the included articles on speed enforcement on the highway were limited to sanctioning defaulters for fine payments. 展开更多
关键词 Excessive Speed Speed Enforcement Billing and Payment violated Vehicle
在线阅读 下载PDF
上一页 1 2 15 下一页 到第
使用帮助 返回顶部