期刊文献+
共找到301篇文章
< 1 2 16 >
每页显示 20 50 100
ADCP-YOLO:A High-Precision and Lightweight Model for Violation Behavior Detection in Smart Factory Workshops
1
作者 Changjun Zhou Dongfang Chen +1 位作者 Chenyang Shi Taiyong Li 《Computers, Materials & Continua》 2026年第3期1895-1919,共25页
With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and exc... With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and excessive model parameters in worker violation detection,this study proposes ADCP-YOLO,an enhanced lightweight model based on YOLOv8.Here,“ADCP”represents four key improvements:Alterable Kernel Convolution(AKConv),Dilated-Wise Residual(DWR)module,Channel Reconstruction Global Attention Mechanism(CRGAM),and Powerful-IoU loss.These components collaboratively enhance feature extraction,multi-scale perception,and localization accuracy while effectively reducing model complexity and computational cost.Experimental results show that ADCP-YOLO achieves a mAP of 90.6%,surpassing YOLOv8 by 3.0%with a 6.6%reduction in parameters.These findings demonstrate that ADCP-YOLO successfully balances accuracy and efficiency,offering a practical solution for intelligent safety monitoring in smart factory workshops. 展开更多
关键词 YOLO violation behavior detection AKConv CRGAM DWR Powerful-IoU
在线阅读 下载PDF
Conceptual design of the muonium-to-antimuonium conversion experiment(MACE)
2
作者 Ai-Yu Bai Han-Jie Cai +49 位作者 Chang-Lin Chen Si-Yuan Chen Xu-Rong Chen Yu Chen Wei-Bin Cheng Ling-Yun Dai Rui-Rui Fan Li Gong Zi-Hao Guo Yuan He Zhi-Long Hou Yin-Yuan Huang Huan Jia Hao Jiang Han-Tao Jing Xiao-Shen Kang Hai-Bo Li Jin-Cheng Li Yang Li Da-Ming Liu Shu-Lin Liu Gui-Hao Lu Han Miao Yun-Song Ning Jian-Wei Niu Hua-Xing Peng Alexey APetrov Yuan-Shuai Qin Ming-Chen Sun Jian Tang Jing-Yu Tang Ye Tian Rong Wang Xiao-Dong Wang Yi Wang Zhi-Chao Wang Chen Wu Tian-Yu Xing Wei-Zhi Xiong Yu Xu Bao-Jun Yan De-Liang Yao Tao Yu Ye Yuan Yi Yuan Yao Zhang Yongchao Zhang Zhi-Lv Zhang Guang Zhao Shi-Han Zhao 《Nuclear Science and Techniques》 2026年第4期139-187,共49页
The spontaneous conversion of muonium to antimuonium is an interesting charged lepton flavor violation phenomenon that offers a sensitive probe for potential new physics and serves as a tool to constrain the parameter... The spontaneous conversion of muonium to antimuonium is an interesting charged lepton flavor violation phenomenon that offers a sensitive probe for potential new physics and serves as a tool to constrain the parameter space beyond the Standard Model.The Muonium-to-Antimuonium Conversion Experiment(MACE)was designed to utilize a high-intensity muon beam,a Michel electron magnetic spectrometer,a positron transport system,and a positron detection system to either discover or constrain this rare process with a conversion probability of O(10^(-13)).This article presents an overview of the theoretical framework and a detailed description of the experimental design for muonium-to-antimuonium conversion. 展开更多
关键词 MUONIUM Lepton flavor violation Muon beam Drift chamber Microchannel plate Electromagnetic calorimeter
在线阅读 下载PDF
First evidence of CP violation in beauty baryon to charmonium decays
3
作者 《Science Bulletin》 2026年第3期547-557,共11页
A study of the difference in the CP asymmetries between Λ_(b)^(0)→J/ψpπ−and Λ_(b)^(0)→J/ψpK−decays,ΔA_(CP),is performed using proton-proton collision data collected by the LHCb experiment in the years 2015–20... A study of the difference in the CP asymmetries between Λ_(b)^(0)→J/ψpπ−and Λ_(b)^(0)→J/ψpK−decays,ΔA_(CP),is performed using proton-proton collision data collected by the LHCb experiment in the years 2015–2018,corresponding to an integrated luminosity of 6 fb−1.This quantity is measured to be ΔA_(CP)=(4.03±1.18±0.23)%,where the first uncertainty is statistical and the second is systematic.When combined with the previous LHCb result,a value of ΔA_(CP)=(4.31±1.06±0.28)% is obtained,corresponding to a significance of 3.9_(σ) against the CP symmetry hypothesis.Studies of triple-product asymmetries,which provide an additional probe of CP violation,show no significant deviation from CP symmetry. 展开更多
关键词 Flavour physics B physics CP violation Standard Model LHCb experiment Triple-product asymmetries
原文传递
CBBM-WARM:A Workload-Aware Meta-Heuristic for Resource Management in Cloud Computing 被引量:1
4
作者 K Nivitha P Pabitha R Praveen 《China Communications》 2025年第6期255-275,共21页
The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achievi... The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achieving autonomic resource management is identified to be a herculean task due to its huge distributed and heterogeneous environment.Moreover,the cloud network needs to provide autonomic resource management and deliver potential services to the clients by complying with the requirements of Quality-of-Service(QoS)without impacting the Service Level Agreements(SLAs).However,the existing autonomic cloud resource managing frameworks are not capable in handling the resources of the cloud with its dynamic requirements.In this paper,Coot Bird Behavior Model-based Workload Aware Autonomic Resource Management Scheme(CBBM-WARMS)is proposed for handling the dynamic requirements of cloud resources through the estimation of workload that need to be policed by the cloud environment.This CBBM-WARMS initially adopted the algorithm of adaptive density peak clustering for workloads clustering of the cloud.Then,it utilized the fuzzy logic during the process of workload scheduling for achieving the determining the availability of cloud resources.It further used CBBM for potential Virtual Machine(VM)deployment that attributes towards the provision of optimal resources.It is proposed with the capability of achieving optimal QoS with minimized time,energy consumption,SLA cost and SLA violation.The experimental validation of the proposed CBBMWARMS confirms minimized SLA cost of 19.21%and reduced SLA violation rate of 18.74%,better than the compared autonomic cloud resource managing frameworks. 展开更多
关键词 autonomic resource management cloud computing coot bird behavior model SLA violation cost WORKLOAD
在线阅读 下载PDF
Unbiased test of the hyperon CP violation in terms of detector resolution at STCF
5
作者 Ming Xu Liang Liu +2 位作者 Yupeng Pei Xiaorong Zhou Yingchun Zhu 《中国科学技术大学学报》 北大核心 2025年第4期41-47,40,I0002,共9页
The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled h... The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled hyperonantihyperon pairs to be produced at Super Tau-Charm Facility(STCF),the CP asymmetry of hyperon is expected to be tested with a statistical sensitivity of 10^(−4) or even better.To cope with the statistical precision,the systematic effects from various aspects are critical and need to be studied in detail.In this paper,the sensitivity effects on the CP violation parameters associated with the detector resolution,including those of the position and momentum,are studied and discussed in detail.The results provide valuable guidance for the design of STCF detector. 展开更多
关键词 BESIII experiment STCF hyperon CP violation detector resolution unbiased test
在线阅读 下载PDF
A Double-Edged Sword:A Scoping Review of the Mental Health Aspects of Parentification
6
作者 Istvan Berkes Bettina Piko 《International Journal of Mental Health Promotion》 2025年第11期1627-1643,共17页
Objectives:Parentification,a role reversal where children assume age-inappropriate duties in the family,is a significant childhood adversity often linked to disrupted developmental trajectories and poor mental health ... Objectives:Parentification,a role reversal where children assume age-inappropriate duties in the family,is a significant childhood adversity often linked to disrupted developmental trajectories and poor mental health outcomes.Yet the complexity of parentification,influenced by various contextual factors,obscures a comprehensive understanding of its psychological consequences and its mental health aspects.The paper aims to map up-to-date research,synthesize key findings,and identify critical knowledge gaps.Methods:To that end,a systematic search was performed in Scopus,PsycINFO,PubMed,and EBSCO databases,and data was extracted and reviewed by two reviewers.The search yielded 29 studies,including 9 qualitative,1 mixed,and 19 quantitative studies that examined the mental health aspects of parentification,from various countries of origin.Results:Parentification,often arising from contexts like parental illness or substance abuse,is linked to varied mental and physical health outcomes.These outcomes are strongly moderated by the adolescent’s subjective perception of their role and the presence of protective factors like strong sibling relationships.The review also identified a clear pathway for the intergenerational transmission of parentification,where a parent’s own history was found to impact their parenting cognitions.Conclusion:This review concludes that future longitudinal research should move beyond negative or positive outcomes of parentification and investigate the mediating and moderating mechanisms that play a crucial role in the outcomes.Furthermore,the absence of prevalence studies on parentification is a notable limitation,and as a result,the size of the affected population remains unknown.Further research is also needed to identify potential protective factors in various circumstances. 展开更多
关键词 PARENTIFICATION mental health filial responsibilities young caregivers boundaries violation
暂未订购
Deterministic transmission in user-scalable cell-free MIMO-OFDM systems
7
作者 ZHANG Cheng ZHANG Li +1 位作者 MENG Fan HUANG Yongming 《Journal of Southeast University(English Edition)》 2025年第4期430-436,F0003,共8页
This paper proposes a data-and model-driven col-laborative resource scheduling method to maximize the spec-tral efficiency(SE)of cell-free(CF)downlink multiuser multiple-input multiple-output(MIMO)systems,subject to d... This paper proposes a data-and model-driven col-laborative resource scheduling method to maximize the spec-tral efficiency(SE)of cell-free(CF)downlink multiuser multiple-input multiple-output(MIMO)systems,subject to delay violation probability and power constraints.The method integrates the weighted minimum mean square error(WMMSE)algorithm within the safety reinforcement learn-ing(Safety-RL)framework.The original optimization problem is decomposed into two coupled subproblems.The Safety-RL algorithm leverages state features to determine user priority weights and allocate bandwidths,while the WMMSE algorithm calculates the precoding matrix and fur-ther schedules resources based on user priority weights to obtain the reward and costs of Safety-RL.Considering dy-namic user access in CF systems,a distributed algorithm with user scalability is also proposed.Simulation results demonstrate that the proposed approach improves the SE while meeting the different delay violation probability con-straints of users.Furthermore,the distributed algorithm of-fers comparable performance to the fully centralized method while considerably reducing model training overhead,par-ticularly as users dynamically access the system. 展开更多
关键词 delay violation probability constraint CELL-FREE safety reinforcement learning resource scheduling
在线阅读 下载PDF
Dual-field and cross-field nonclassical light generation in a one-^(133)Cs atom cavity QED system
8
作者 Zhiqiang Wen Chen Wang Shougang Zhang 《Communications in Theoretical Physics》 2025年第10期138-146,共9页
Nonclassical light fields exhibit unique quantum characteristics that not only expand the scope of optical research but also provide a solid foundation for advancements in quantum technologies.In this study,we investi... Nonclassical light fields exhibit unique quantum characteristics that not only expand the scope of optical research but also provide a solid foundation for advancements in quantum technologies.In this study,we investigate a system consisting of one-^(133)Cs atom placed in a resonant cavity.Pumped by 459 nm laser light,the system generates cavity modes corresponding to the atomic 7S_(1/2)→6P_(3/2)(1470 nm)and 7S_(1/2)→6P_(1/2)(1359 nm)transitions,which are associated with the clock states of the cesium active optical clock.By analyzing the statistical and dynamical properties of the fields,we systematically explore the nonclassical behavior of the system under varying coupling strengths and cavity decay rates.We identify parameter regions where both individual fields and their cross-correlation exhibit nonclassicality,with the Cauchy-Schwarz(CS)violation coefficient R reaching a maximum of 13.9.This demonstrates the system’s ability to generate highly nonclassical photon pairs,enriching the repertoire of nonclassical light sources. 展开更多
关键词 cavity QED nonclassical photon pairs violation of the Cauchy-Schwarz inequality second-order correlation function
原文传递
Production of the massless dark photon γ associated with the photon γ from charged lepton flavor violating decay processes
9
作者 Si Li Chong-Xing Yue +1 位作者 Xue-Jia Cheng Yang-Yang Bu 《Communications in Theoretical Physics》 2025年第6期129-132,共4页
The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor ... The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor violation(LFV)process l_(i)→l_(j)γγ and di-production from the LFV process l_(i)→l_(j)γγ induced by dipole operators.Comparing the obtained numerical results with the corresponding experimental measurements,we obtain the constraints on the effective couplings of γ with the SM charged leptons.The upper limit of the effective coupling|DLμe|2+|DRμe|2coming from the process μ→e~γγis looser than the processμ→eγ by about one order of magnitude. 展开更多
关键词 massless dark photon lepton flavor violation process effective couplings
原文传递
Characteristics and risk of violation behavior of non-motorists at signalized intersections 被引量:6
10
作者 赵星 任刚 +2 位作者 杜轩 王鹏 王卫杰 《Journal of Southeast University(English Edition)》 EI CAS 2011年第4期423-429,共7页
Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaire... Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors. 展开更多
关键词 traffic violation behavior traffic safety non- motorist signal intersection
在线阅读 下载PDF
Deviation in Advertising English from a Stylistic Perspective
11
作者 罗敏 《英语广场(学术研究)》 2012年第10期15-17,共3页
Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, na... Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, namely the violation to the norms of a language, frequently appears in advertisements and can meet requirements of the style of advertising English. Due to limited space, this paper focuses on deviation on the phonological, graphological, lexical, grammatical, and semantic level. Analyzing deviation in advertising English can promote readers' aesthetic and appreciative ability and encourage advertisers to create advertisements with more efficiency, novelty, innovation in more effective language. 展开更多
关键词 advertising English deviation STYLISTIC VIOLATION NORM
在线阅读 下载PDF
English Euphemism and its Linguistic Analysis from the Cooperative Principle Perspective
12
作者 毕春意 《海外英语》 2014年第10X期229-230,共2页
Euphemism is a common phenomenon in languages.It's a more mild and polite way to say something unpleasant and embarrassing.It's a figure of speech as well as a cultural phenomenon.Euphemism functions to enhanc... Euphemism is a common phenomenon in languages.It's a more mild and polite way to say something unpleasant and embarrassing.It's a figure of speech as well as a cultural phenomenon.Euphemism functions to enhance the effect of communication and maintain harmonious interpersonal relations.With the development of modern society,it has become an indispensable element in people's interactions.Many linguists and scholars have studied this linguistic phenomenon from different angles.Based on their achievements,the author has a tentative analysis of the three kinds of negative effects by using euphemism from the perspective of Cooperative Principle. 展开更多
关键词 ENGLISH EUPHEMISM COOPERATIVE PRINCIPLE VIOLATION
在线阅读 下载PDF
An Analysis of the Verbal Humor in the Movies If You Are The One Ⅰ&Ⅱ from the Perspective of Pragmatics
13
作者 黄瑞 《海外英语》 2011年第5X期281-283,共3页
This study analyzes the the verbal humor in the movie series If You Are The One from the perspective of some pragmatic theories.The findings of the study provide explanations towards generative mechanism of humor,such... This study analyzes the the verbal humor in the movie series If You Are The One from the perspective of some pragmatic theories.The findings of the study provide explanations towards generative mechanism of humor,such as the violation of Cooperative Principle,avoiding face-threatening acts,and particularly,creatively reveal that special use of Politeness Principle can produce a humourous effect,too. 展开更多
关键词 VERBAL humor VIOLATION OVERUSE PRAGMATICS cooperative PRINCIPLE POLITENESS PRINCIPLE
在线阅读 下载PDF
The Violation of Cooperative Principle and English Teaching
14
作者 张大海 《海外英语》 2013年第21期291-293,共3页
The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvant... The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers. 展开更多
关键词 VIOLATION COOPERATIVE PRINCIPLE ENGLISH TEACHING i
在线阅读 下载PDF
A Study on English Euphemisms and Cooperative Principle in Pragmatics
15
作者 孙宏 《疯狂英语(教师版)》 2012年第3期158-161,共4页
As a cultural phenomenon,euphemism is categorized as a linguistic concept as well.Euphemism means speaking with good words or in a pleasant manner.The social functions of euphemism are:substitution of taboo words,stra... As a cultural phenomenon,euphemism is categorized as a linguistic concept as well.Euphemism means speaking with good words or in a pleasant manner.The social functions of euphemism are:substitution of taboo words,strategic use of language,and expression of politeness,humor and satire.Besides,euphemism is closely associated with cooperative principle in pragmatics. 展开更多
关键词 EUPHEMISM FUNCTION TABOO cooperative principle VIOLATION
在线阅读 下载PDF
Frame length optimization for multi-antenna downlink systems based on delay-bound violation probability constraints
16
作者 谭雨凤 李俊超 +1 位作者 夏玮玮 沈连丰 《Journal of Southeast University(English Edition)》 EI CAS 2015年第2期163-169,共7页
A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS... A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS) metrics from the conventional physical-layer channel models, the link-layer models named effective bandwidth and effective capacity are applied to statistically characterize the source traffic patterns and the queuing service dynamics. With these link-layer models, the source traffic process and the channel service process are mapped to certain QoS parameters. The packet delay-bound violation probability constraints are converted into minimum data rate constraints and the optimization problem is thus formulated into simultaneous inequalities. With the assumption of ergodic block-fading channels, the optimal frame lengths of single-user and multiuser systems are calculated respectively by numerical iterative methods. Theoretical analyses and simulation results show that the given delay-bound violation probability constraints are well satisfied with the optimal frame length. 展开更多
关键词 delay-bound violation probability frame lengthoptimization effective bandwidth effective capacity multi-antenna systems quality of service
在线阅读 下载PDF
On the Causes of the Violation of Cooperative Principle 被引量:1
17
作者 朱毅 刘爱玲 《海外英语》 2015年第19期217-218,共2页
Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to ... Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language. 展开更多
关键词 COOPERATIVE PRINCIPLE VIOLATION CAUSES
在线阅读 下载PDF
Thermal entanglement and teleportation in a three-qubit Heisenberg XXZ model with Dzyaloshinski-Moriya anisotropic antisymmetric interaction 被引量:4
18
作者 谢利军 张登玉 +2 位作者 唐世清 詹孝贵 高峰 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第8期3203-3209,共7页
This paper investigates the thermal pairwise entanglement of a three-qubit Heisenberg XXZ chain in the presence of the Dzyaioshinski-Moriya (DM) anisotropic antisymmetric interaction and quantum teleportation when u... This paper investigates the thermal pairwise entanglement of a three-qubit Heisenberg XXZ chain in the presence of the Dzyaioshinski-Moriya (DM) anisotropic antisymmetric interaction and quantum teleportation when using the Heisenberg chain as a channel. The entanglement dependences on the DM interaction and temperature are given in detail. It obtains the relation between the concurrence and average fidelity, and shows that the same concurrence can lead different average fidelities. Moreover, it finds the thermally entangled states which do not violate the Bell inequalities, and can still be used for quantum teleportation. 展开更多
关键词 quantum teleportation CONCURRENCE fidelity Bell inequality violation
原文传递
Projected Runge-Kutta methods for constrained Hamiltonian systems 被引量:4
19
作者 Yi WEI Zichen DENG +1 位作者 Qingjun LI Bo WANG 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2016年第8期1077-1094,共18页
Projected Runge-Kutta (R-K) methods for constrained Hamiltonian systems are proposed. Dynamic equations of the systems, which are index-3 differential-algebraic equations (DAEs) in the Heisenberg form, are establi... Projected Runge-Kutta (R-K) methods for constrained Hamiltonian systems are proposed. Dynamic equations of the systems, which are index-3 differential-algebraic equations (DAEs) in the Heisenberg form, are established under the framework of Lagrangian multipliers. R-K methods combined with the technique of projections are then used to solve the DAEs. The basic idea of projections is to eliminate the constraint violations at the position, velocity, and acceleration levels, and to preserve the total energy of constrained Hamiltonian systems by correcting variables of the position, velocity, acceleration, and energy. Numerical results confirm the validity and show the high precision of the proposed method in preserving three levels of constraints and total energy compared with results reported in the literature. 展开更多
关键词 projected Runge-Kutta (R-K) method differential-algebraic equation(DAE) constrained Hamiltonian system energy and constraint preservation constraint violation
在线阅读 下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部