期刊文献+
共找到3,127篇文章
< 1 2 157 >
每页显示 20 50 100
R-Parity Violation Effects on b_1 → bχ_1~0 in Minimal SupersymmetricStandard Model
1
作者 ZHANGRen-You MAWen-Gan +2 位作者 JIANGYi HOUHong-Sheng SUNYan-Bin 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第2期257-267,共11页
We investigate in detail the effects of R-parity lepton number violation onthe decay b_1 → bχ_1~0 in the R-parity violating minimal supersymmetric standard model (R_p-MSSM)under the present experimental constraints ... We investigate in detail the effects of R-parity lepton number violation onthe decay b_1 → bχ_1~0 in the R-parity violating minimal supersymmetric standard model (R_p-MSSM)under the present experimental constraints on R_p parameters. In our numerical calculations weconsider two cases of input parameters of the squark and slepton sectors, M_(squark) 【 M_(slepton)and M_(squark) 】 M_(slepton), for comparison. The results show that the relative R-parity violatingcorrection is not very sensitive to the mass of the lightest neutralino bχ_1~0 the degenerateR-parity violating coupling parameter λ′_2 but strongly depends on M_(squark), M_(slepton) tan βand tie degenerate R-parity violating coupling parameter λ′_1. The relative correction is about -4~ 3% and can exceed -6% in some region of parameter space. Therefore, precise experiment analyseson the decay b_1 → bχ_1~0 may provide a probe of the R-parity violation. 展开更多
关键词 minimal supersymmetric standard model r-parity violation
下载PDF
Effects of R-parity Violation on the Charged Higgs Boson Decays
2
作者 SONGYi-Ping LIChong-Sheng LIQiang LIUJian-Jun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第5期873-878,共6页
We calculate one-loop R-parity-violating coupling corrections to theprocesses H~- → τv_τ and H~- → bt. We find that the corrections to the H~- → τv_τ decay modeare generally about 0.1%, and can be negligible. B... We calculate one-loop R-parity-violating coupling corrections to theprocesses H~- → τv_τ and H~- → bt. We find that the corrections to the H~- → τv_τ decay modeare generally about 0.1%, and can be negligible. But the corrections to the H~- → bt decay mode canreach a few percent for the favored parameters. 展开更多
关键词 radiative correction charged Higgs decay r-parity violating SUPERSYMMETRY
下载PDF
AI-Based Helmet Violation Detection for Traffic Management System
3
作者 Yahia Said YahyaAlassaf +5 位作者 Refka Ghodhbani Yazan Ahmad Alsariera Taoufik Saidani Olfa Ben Rhaiem Mohamad Khaled Makhdoum Manel Hleili 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期733-749,共17页
Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin... Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures. 展开更多
关键词 Non-helmet use detection traffic violation SAFETY deep learning optimized PerspectiveNet
下载PDF
Fermions: Spin, Hidden Variables, Violation of Bell’s Inequality and Quantum Entanglement
4
作者 Doron Kwiat 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1613-1627,共15页
Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co... Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables. 展开更多
关键词 FERMIONS SPIN Hidden Variables Bell’s Inequality violation Spin Entanglement
下载PDF
Determination of Liability for Violation of “Sexual Autonomy” and Compensation for Mental Damages
5
作者 姚邢 JIANG Lin(Translated) 《The Journal of Human Rights》 2024年第2期347-372,共26页
At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of dispute... At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated. 展开更多
关键词 sexual autonomy personality rights violationS liability investigation
下载PDF
A Study of Triangle Inequality Violations in Social Network Clustering
6
作者 Sanjit Kumar Saha Tapashi Gosswami 《Journal of Computer and Communications》 2024年第1期67-76,共10页
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie... Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters. 展开更多
关键词 CLUSTERING Triangle Inequality violations Traditional Clustering Graph Clustering
下载PDF
Constraining Lorentz Invariance Violation Using Short Gamma-Ray Bursts
7
作者 Walid Jamil Azzam Ali Mohamed Hasan 《Journal of Applied Mathematics and Physics》 2023年第8期2179-2184,共6页
Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising to... Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising tool for checking and constraining any deviations from Lorentz Invariance due to their huge energies and cosmological distances. Gamma-ray bursts, which are the most intense and powerful explosions in the universe, are traditionally divided into long bursts whose observed duration exceeds 2 s, and short bursts whose observed duration is less than 2 s. In this study, we employ a recent sample of 46 short GRBs to check for any deviation from Lorentz Invariance. We analyze the spectral lag of the bursts in our data sample and check for any redshift dependence in the GRB rest frame, which would indicate a violation of Lorentz Invariance. Our results are consistent, to within 1σ, with no deviation from Lorentz Invariance. 展开更多
关键词 Lorentz Invariance violation Gamma-Ray Bursts Quantum Gravity
下载PDF
b→cτ■ decay in supersymmetry with R-parity violation
8
作者 Dong-Yang Wang Ya-Dong Yang Xing-Bo Yuan 《Chinese Physics C》 SCIE CAS CSCD 2019年第8期46-58,共13页
In past years,several hints of lepton flavor universality(LFU)violation have emerged from the b→ct■,and b→sl+l-data.More recently,the Belle Collaboration has reported the first measurement of the D* longitudinal ... In past years,several hints of lepton flavor universality(LFU)violation have emerged from the b→ct■,and b→sl+l-data.More recently,the Belle Collaboration has reported the first measurement of the D* longitudinal polarization fraction in the B→D*τV decay.Motivated by this intriguing result,along with the recent measurements of RJ/Ψand τ polarization,we present the study of b→ct■ decays in supersymmetry(SUSY)with R-parity violation(RPV).We consider B→D(*)t■,Bc→ηct■,Bc→J/ψt■ and ∧b→∧ct■ modes and focus on the branching ratios,LFU ratios,forward-backward asymmetries,polarizations of daughter hadrons,and the τ lepton.The RPV SUSY was capable of explaining the RD(*) anomalies at the 2σ level,after taking into account various flavor constraints.In the allowed parameter space,the differential branching fractions and LFU ratios are largely enhanced by the SUSY effects,especially in the large dilepton invariant mass region.Moreover,a lower bound B(B+→K+vv)>7.37×10-6 is obtained.These observables could provide testable signatures at the high-luminosity LHC and SuperKEKB,and correlate with direct searches for SUSY. 展开更多
关键词 SUPERSYMMETRY r-parity violation heavy FLAVOR HADRON b-quark semi-leptonic DECAY
原文传递
Single Chargino Production with R-Parity Lepton Number Violation in Photon-Photon Collisions
9
作者 YIN Xi MA Wen-Gan WAN Lang-Hui JIANG Yi HAN Liang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2001年第11期553-562,共10页
We examine the process γγ→ x+ - at photon-photon collider in the minimal supersymmetric standard model with R-parity violation,where all the one-loop diagrams are considered.We mainly discuss the effects of bilinea... We examine the process γγ→ x+ - at photon-photon collider in the minimal supersymmetric standard model with R-parity violation,where all the one-loop diagrams are considered.We mainly discuss the effects of bilinear breaking terms,and conclude that their contributions may be important compared with trilinear terms.Our results show that the events of this process could be detectable at photon-photon colliders,if the values of the parameters are favorable. 展开更多
关键词 r-parity violation single chargino production lepton NUMBER violation photon-photon COLLISION
下载PDF
The Equation for the CP Violating Phase for Quarks: The Rule for the Sum of Quark Oscillation Probabilities
10
作者 Zoran B. Todorovic 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1835-1865,共31页
By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an... By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an unknown quantity. Quark oscillations occur in spaces that are on the femtometer scale and they are unmeasurable from the point of view of experiments. However, the consequence of those oscillations is the CP violating phase for quarks, which is measured through unitary triangles in Wolfenstein’s parameterization. Through the mathematical model presented in this paper, the equation in Wolfenstein’s parameterization was derived, the root of which is consistent with measurements in today’s quark physics. 展开更多
关键词 QUARKS CKM Matrix PMNS Matrix Wolfenstein Parameterization CP violation Phase Jarlskog Invariant
下载PDF
Characteristics and risk of violation behavior of non-motorists at signalized intersections 被引量:6
11
作者 赵星 任刚 +2 位作者 杜轩 王鹏 王卫杰 《Journal of Southeast University(English Edition)》 EI CAS 2011年第4期423-429,共7页
Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaire... Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors. 展开更多
关键词 traffic violation behavior traffic safety non- motorist signal intersection
下载PDF
The Violation of Cooperative Principle and English Teaching
12
作者 张大海 《海外英语》 2013年第21期291-293,共3页
The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvant... The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers. 展开更多
关键词 violation COOPERATIVE PRINCIPLE ENGLISH TEACHING i
下载PDF
On the Causes of the Violation of Cooperative Principle 被引量:1
13
作者 朱毅 刘爱玲 《海外英语》 2015年第19期217-218,共2页
Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to ... Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language. 展开更多
关键词 COOPERATIVE PRINCIPLE violation CAUSES
下载PDF
CONSTRAINT VIOLATION STABILIZATION OF EULER-LAGRANGE EQUATIONS WITH NON-HOLONOMIC CONSTRAINTS 被引量:2
14
作者 ZhaoWeijia PanZhenkuan ChenLiqun 《Acta Mechanica Solida Sinica》 SCIE EI 2004年第1期45-51,共7页
Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised metho... Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised methods can deal with more complicated problems such as those with nonholonomic constraints or redundant constraints, and save the computation time. Finally a numerical simulation of a multibody system is conducted by using the methods given in this paper. 展开更多
关键词 Euler-Lagrange equation nonholonomic constraint constraint violation stabiliza- tion redundant constraint
下载PDF
Frame length optimization for multi-antenna downlink systems based on delay-bound violation probability constraints
15
作者 谭雨凤 李俊超 +1 位作者 夏玮玮 沈连丰 《Journal of Southeast University(English Edition)》 EI CAS 2015年第2期163-169,共7页
A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS... A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS) metrics from the conventional physical-layer channel models, the link-layer models named effective bandwidth and effective capacity are applied to statistically characterize the source traffic patterns and the queuing service dynamics. With these link-layer models, the source traffic process and the channel service process are mapped to certain QoS parameters. The packet delay-bound violation probability constraints are converted into minimum data rate constraints and the optimization problem is thus formulated into simultaneous inequalities. With the assumption of ergodic block-fading channels, the optimal frame lengths of single-user and multiuser systems are calculated respectively by numerical iterative methods. Theoretical analyses and simulation results show that the given delay-bound violation probability constraints are well satisfied with the optimal frame length. 展开更多
关键词 delay-bound violation probability frame lengthoptimization effective bandwidth effective capacity multi-antenna systems quality of service
下载PDF
AN AUTOMATIC CONSTRAINT VIOLATION STABI- LIZATION METHOD FOR DIFFERENTIAL/ ALGEBRAIC EQUATIONS OF MOTION IN MULTIBODY SYSTEM DYNAMICS 被引量:1
16
作者 赵维加 潘振宽 王艺兵 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2000年第1期105-110,共6页
A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional con... A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional constraint violation stabilization method are determined according to the integration time step size and Taylor expansion method automatically. The direct integration method, the traditional constraint violation stabilization method and the new method presented in this paper are compared finally. 展开更多
关键词 dynamics of multibody systems Euler_Lagrange equations constraint violation stabilization
下载PDF
SVR-Miner:Mining Security Validation Rules and Detecting Violations in Large Software 被引量:1
17
作者 梁彬 谢素斌 +2 位作者 石文昌 梁朝晖 陈红 《China Communications》 SCIE CSCD 2011年第4期84-98,共15页
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p... For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently. 展开更多
关键词 static analysis data mining automated validation rules extraction automated violation detection
下载PDF
eμ Production in R-Parity Violating Supersymmetric Model at Hadron Colliders
18
作者 WANG Shao-Ming HAN Liang MA Wen-Gan ZHANG Ren-You JIANG Yi 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第3X期491-501,共11页
We investigate the lepton flavor violating productions pp/pp→eμ + X in the framework of the R-parity violating (RPV) supersymmetric model at the Tevatron and the CERN large hadron collider (LHC). We present the... We investigate the lepton flavor violating productions pp/pp→eμ + X in the framework of the R-parity violating (RPV) supersymmetric model at the Tevatron and the CERN large hadron collider (LHC). We present the total cross sections including the next-to-leading order (NLO) QCD corrections and the contribution from gluon-gluon fusion subprocess. Our numerical results show that the one-loop QCD corrections significantly increase the tree-level cross sections, and the variation of K factor is in the range between 1.28 (1.32) and 1.79 (1.58) at the Tevatron (LHC). We find that the QCD correction from the one-loop gluon-gluon fusion subprocess is remarkable at the LHC and should be taken into account. 展开更多
关键词 r-parity violating supersymmetric model QCD corrections
下载PDF
Investigating the factors affecting traffic violations based on electronic enforcement data:A case study in Shangyu,China 被引量:1
19
作者 Fan Haoxuan Ren Gang +1 位作者 Li Haojie Ma Jingfeng 《Journal of Southeast University(English Edition)》 EI CAS 2021年第2期227-236,共10页
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e... To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety. 展开更多
关键词 traffic violations road traffic safety electronic enforcement data multinomial logistic regression influencing factors
下载PDF
The Top-Charm Associated Production Within the R-Parity Violating Supersymmetric Model in Photon-Proton Collisions
20
作者 HOU Hong-Sheng MA Wen-Gan ZHOU Hong WAN Lang-Hui JIANG Yi 《Communications in Theoretical Physics》 SCIE CAS CSCD 2002年第9期337-346,共10页
The top-charm associated production with the effects from both B- and L-violating interactions in TeVscale photon-proton collisions is investigated in the framework of Rp minimal supersymmetric standard model. Withint... The top-charm associated production with the effects from both B- and L-violating interactions in TeVscale photon-proton collisions is investigated in the framework of Rp minimal supersymmetric standard model. Withinthe bounds on the relevant R-parity violating couplings, the total cross section will reach the order of 10 fb in some partsof the parameter space. 展开更多
关键词 r-parity violation minimal SUPERSYMMETRIC standard model FLAVOR changing NEUTRAL current
下载PDF
上一页 1 2 157 下一页 到第
使用帮助 返回顶部