Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin...Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures.展开更多
Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co...Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables.展开更多
At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of dispute...At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated.展开更多
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie...Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.展开更多
Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising to...Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising tool for checking and constraining any deviations from Lorentz Invariance due to their huge energies and cosmological distances. Gamma-ray bursts, which are the most intense and powerful explosions in the universe, are traditionally divided into long bursts whose observed duration exceeds 2 s, and short bursts whose observed duration is less than 2 s. In this study, we employ a recent sample of 46 short GRBs to check for any deviation from Lorentz Invariance. We analyze the spectral lag of the bursts in our data sample and check for any redshift dependence in the GRB rest frame, which would indicate a violation of Lorentz Invariance. Our results are consistent, to within 1σ, with no deviation from Lorentz Invariance.展开更多
Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaire...Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors.展开更多
We examine the process γγ→ x+ - at photon-photon collider in the minimal supersymmetric standard model with R-parity violation,where all the one-loop diagrams are considered.We mainly discuss the effects of bilinea...We examine the process γγ→ x+ - at photon-photon collider in the minimal supersymmetric standard model with R-parity violation,where all the one-loop diagrams are considered.We mainly discuss the effects of bilinear breaking terms,and conclude that their contributions may be important compared with trilinear terms.Our results show that the events of this process could be detectable at photon-photon colliders,if the values of the parameters are favorable.展开更多
The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvant...The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers.展开更多
A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS...A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS) metrics from the conventional physical-layer channel models, the link-layer models named effective bandwidth and effective capacity are applied to statistically characterize the source traffic patterns and the queuing service dynamics. With these link-layer models, the source traffic process and the channel service process are mapped to certain QoS parameters. The packet delay-bound violation probability constraints are converted into minimum data rate constraints and the optimization problem is thus formulated into simultaneous inequalities. With the assumption of ergodic block-fading channels, the optimal frame lengths of single-user and multiuser systems are calculated respectively by numerical iterative methods. Theoretical analyses and simulation results show that the given delay-bound violation probability constraints are well satisfied with the optimal frame length.展开更多
Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to ...Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language.展开更多
Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised metho...Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised methods can deal with more complicated problems such as those with nonholonomic constraints or redundant constraints, and save the computation time. Finally a numerical simulation of a multibody system is conducted by using the methods given in this paper.展开更多
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p...For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.展开更多
A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional con...A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional constraint violation stabilization method are determined according to the integration time step size and Taylor expansion method automatically. The direct integration method, the traditional constraint violation stabilization method and the new method presented in this paper are compared finally.展开更多
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e...To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.展开更多
The branching ratios and CP violations of the B →Dπ decays, including both the color-allowed and the color-suppressed modes, are investigated in detail within QCD framework by considering all diagrams that lead to t...The branching ratios and CP violations of the B →Dπ decays, including both the color-allowed and the color-suppressed modes, are investigated in detail within QCD framework by considering all diagrams that lead to three effective currents of two quarks. An intrinsic mass scale as a dynamical gluon mass is introduced to treat the infrared divergence caused by the soft collinear approximation in the endpoint regions, and the Cutkosky rule is adopted to deal with a physical-region singularity of the on mass-shell quark propagators. When the dynamical gluon mass μg is regarded as a universal sca/e, it is extracted to be around μg = 440 MeV from one of the well-measured B →Dπ decay modes. The resulting predictions for all branching ratios are in agreement with the current experimental measurements. As these decays have no penguin contributions, there are no direct CP asymmetries. Due to interference between the Cabibbo-suppressed and the Cabibbo-favored amplitudes, mixing-induced CP violations are predicted in the B →D^±π^±↓ decays to be consistent with the experimental data at 1-σ level. More precise measurements will be helpful to extracting weak angle 2β+γ.展开更多
The CP-violating effects to the subprocess gg→H+H-are studied in the mSUGRA scenario at the CERN large hadron collider,by taking into account the experimental bounds of electron and neutron electric dipole moments.Th...The CP-violating effects to the subprocess gg→H+H-are studied in the mSUGRA scenario at the CERN large hadron collider,by taking into account the experimental bounds of electron and neutron electric dipole moments.The CP-violating effects in this process are related to the complex phases ofμand Af in the mSUGRA scenario.In our calculation we consider smallCP phases ofμand Af and neglect the effects of neutral Higgs boson mixing.In this case the CP effects to the process mainly come from the complex couplings of Higgs-squark-squark.We find a strong dependence of charged Higgs boson pair production rate on the complex couplings in the parameter space of minimal supersymmetric standard model.展开更多
Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this res...Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this research focuses on building an efficient spatial data management system using two constraint violation detection methods.An algorithm for constraint violation detection has been derived to maintain the error-free up-to-date spatial database.Results indicate that the developed constraint violation detection(CVD)system is more efficient compared with conventional systems.展开更多
The CP violation in the D system is predicted to be an unobserved level in the Standard Model. In this paper, we describe the method of searching for CP violation decay processes with the coherently produced D^0D^0 me...The CP violation in the D system is predicted to be an unobserved level in the Standard Model. In this paper, we describe the method of searching for CP violation decay processes with the coherently produced D^0D^0 mesons from the ψ(3770) decay. The CP violation decay processes can be searched for at the BES-Ⅲ experiment. The experimental sensitivity for searching for the CP violation can reach about a 10^-4 level with a ψ(3770) data sample of about 20 fb^-1.展开更多
The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to...The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies.展开更多
Considering the time-sequence characteristic and randomness of load and natural resources, ?this paper studies on the distributed generation (DG) impacts on voltage limit violation probability of distribution lines. T...Considering the time-sequence characteristic and randomness of load and natural resources, ?this paper studies on the distributed generation (DG) impacts on voltage limit violation probability of distribution lines. The time-sequence characteristic and randomness of load, wind and photovoltaic (PV) generation are analyzed;the indices and risk levels of voltage limit violation probability of node and distribution line are proposed. By using probabilistic load flow based on semi-invariant method, the impact degrees of voltage limit violation are calculated with different distributed power penetration levels, different seasons, different time periods, different allocation ratio between the wind power and PV power. Voltage limit violation laws of distribution line, which are concluded by IEEE33 bus system simulation, are very helpful to guide the voltage?regulation of distribution line including distributed generation.展开更多
基金funded by the Deanship of Scientific Research at Northern Border University,Arar,Kingdom of Saudi Arabia through Research Group No.(RG-NBU-2022-1234).
文摘Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures.
文摘Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables.
文摘At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated.
文摘Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.
文摘Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising tool for checking and constraining any deviations from Lorentz Invariance due to their huge energies and cosmological distances. Gamma-ray bursts, which are the most intense and powerful explosions in the universe, are traditionally divided into long bursts whose observed duration exceeds 2 s, and short bursts whose observed duration is less than 2 s. In this study, we employ a recent sample of 46 short GRBs to check for any deviation from Lorentz Invariance. We analyze the spectral lag of the bursts in our data sample and check for any redshift dependence in the GRB rest frame, which would indicate a violation of Lorentz Invariance. Our results are consistent, to within 1σ, with no deviation from Lorentz Invariance.
基金The National Key Technology R&D Program during the 11th Five-Year Plan Period(No.2009BAG13A05)the National Natural Science Foundation of China(No.51078086)
文摘Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors.
基金国家自然科学基金,教育部科研项目,the State Commission of Science and Technology of China
文摘We examine the process γγ→ x+ - at photon-photon collider in the minimal supersymmetric standard model with R-parity violation,where all the one-loop diagrams are considered.We mainly discuss the effects of bilinear breaking terms,and conclude that their contributions may be important compared with trilinear terms.Our results show that the events of this process could be detectable at photon-photon colliders,if the values of the parameters are favorable.
文摘The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers.
基金The National Science and Technology M ajor Project(No.2012ZX03004005-003)the National Natural Science Foundation of China(No.61171081,61201175)the Research Fund of National M obile Communications Research Laboratory of Southeast University(No.2014A03)
文摘A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS) metrics from the conventional physical-layer channel models, the link-layer models named effective bandwidth and effective capacity are applied to statistically characterize the source traffic patterns and the queuing service dynamics. With these link-layer models, the source traffic process and the channel service process are mapped to certain QoS parameters. The packet delay-bound violation probability constraints are converted into minimum data rate constraints and the optimization problem is thus formulated into simultaneous inequalities. With the assumption of ergodic block-fading channels, the optimal frame lengths of single-user and multiuser systems are calculated respectively by numerical iterative methods. Theoretical analyses and simulation results show that the given delay-bound violation probability constraints are well satisfied with the optimal frame length.
文摘Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language.
基金Project supported by the National Natural Science Foundation of China (No. 19902006).
文摘Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised methods can deal with more complicated problems such as those with nonholonomic constraints or redundant constraints, and save the computation time. Finally a numerical simulation of a multibody system is conducted by using the methods given in this paper.
基金National Natural Science Foundation of China under Grant No.60873213,91018008 and 61070192Beijing Science Foundation under Grant No. 4082018Shanghai Key Laboratory of Intelligent Information Processing of China under Grant No. IIPL-09-006
文摘For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.
文摘A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional constraint violation stabilization method are determined according to the integration time step size and Taylor expansion method automatically. The direct integration method, the traditional constraint violation stabilization method and the new method presented in this paper are compared finally.
基金The National Key Research and Development Program of China(No.2019YFB1600200).
文摘To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.
基金supported by National Natural Science Foundation of China (NSFC) under Grant Nos.10475105,10491306,and 10675039the Knowledge Innovation Program (PKIP) of the Chinese Academy of Sciences
文摘The branching ratios and CP violations of the B →Dπ decays, including both the color-allowed and the color-suppressed modes, are investigated in detail within QCD framework by considering all diagrams that lead to three effective currents of two quarks. An intrinsic mass scale as a dynamical gluon mass is introduced to treat the infrared divergence caused by the soft collinear approximation in the endpoint regions, and the Cutkosky rule is adopted to deal with a physical-region singularity of the on mass-shell quark propagators. When the dynamical gluon mass μg is regarded as a universal sca/e, it is extracted to be around μg = 440 MeV from one of the well-measured B →Dπ decay modes. The resulting predictions for all branching ratios are in agreement with the current experimental measurements. As these decays have no penguin contributions, there are no direct CP asymmetries. Due to interference between the Cabibbo-suppressed and the Cabibbo-favored amplitudes, mixing-induced CP violations are predicted in the B →D^±π^±↓ decays to be consistent with the experimental data at 1-σ level. More precise measurements will be helpful to extracting weak angle 2β+γ.
基金The project supporled in part by National Natural Science Foundation of China(19875049)a grant from the Education Ministry of China and the State Comnission of Science and Technology of China and the Youth Science Foundation of the University of Science and Techoology of China
文摘The CP-violating effects to the subprocess gg→H+H-are studied in the mSUGRA scenario at the CERN large hadron collider,by taking into account the experimental bounds of electron and neutron electric dipole moments.The CP-violating effects in this process are related to the complex phases ofμand Af in the mSUGRA scenario.In our calculation we consider smallCP phases ofμand Af and neglect the effects of neutral Higgs boson mixing.In this case the CP effects to the process mainly come from the complex couplings of Higgs-squark-squark.We find a strong dependence of charged Higgs boson pair production rate on the complex couplings in the parameter space of minimal supersymmetric standard model.
文摘Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this research focuses on building an efficient spatial data management system using two constraint violation detection methods.An algorithm for constraint violation detection has been derived to maintain the error-free up-to-date spatial database.Results indicate that the developed constraint violation detection(CVD)system is more efficient compared with conventional systems.
基金Project supported by the National Natural Science Foundation of China (Grant Nos 10491300,10225524,10225525,10425523,10625524 and 10521003)the Natural Science Foundation of the Chinese Academy of Sciences (Grant No KJ 95T-03)
文摘The CP violation in the D system is predicted to be an unobserved level in the Standard Model. In this paper, we describe the method of searching for CP violation decay processes with the coherently produced D^0D^0 mesons from the ψ(3770) decay. The CP violation decay processes can be searched for at the BES-Ⅲ experiment. The experimental sensitivity for searching for the CP violation can reach about a 10^-4 level with a ψ(3770) data sample of about 20 fb^-1.
文摘The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies.
文摘Considering the time-sequence characteristic and randomness of load and natural resources, ?this paper studies on the distributed generation (DG) impacts on voltage limit violation probability of distribution lines. The time-sequence characteristic and randomness of load, wind and photovoltaic (PV) generation are analyzed;the indices and risk levels of voltage limit violation probability of node and distribution line are proposed. By using probabilistic load flow based on semi-invariant method, the impact degrees of voltage limit violation are calculated with different distributed power penetration levels, different seasons, different time periods, different allocation ratio between the wind power and PV power. Voltage limit violation laws of distribution line, which are concluded by IEEE33 bus system simulation, are very helpful to guide the voltage?regulation of distribution line including distributed generation.