Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie...Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.展开更多
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e...To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.展开更多
To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violation...To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program.展开更多
A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early u...A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early universe Lorentz Violation. The author asserts that the existence of early universe Lorentz violation in turn is assisting in a breakup of primordial black holes. And that also has a tie into Kieffer different time steps as outlined. And the wrap up is given in the final part of this document.展开更多
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p...For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.展开更多
Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this res...Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this research focuses on building an efficient spatial data management system using two constraint violation detection methods.An algorithm for constraint violation detection has been derived to maintain the error-free up-to-date spatial database.Results indicate that the developed constraint violation detection(CVD)system is more efficient compared with conventional systems.展开更多
The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to...The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies.展开更多
There are some grammatical rules of pure syntactic restrictions on grammar rules of operation, a complex one of which is the fronting, i.e., extraction from the island. This paper centers on the "island" that is the...There are some grammatical rules of pure syntactic restrictions on grammar rules of operation, a complex one of which is the fronting, i.e., extraction from the island. This paper centers on the "island" that is the terminology in syntactic theory, and mainly focuses on the definition, the types and the analyses of the "island"展开更多
Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research ...Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research objective is statistical comparison of environmental law violation against accounting abuses by Russian enterprises.A research hypothesis is put forward that companies,that violated environmental law,prepare financial reporting mostly incorrectly.An exploratory sampling from the economic entities of Russia,that violated environmental law in the course of various activities,was formed.Financial reporting of the sampling companies was analyzed by virtue of the authorial probit regression model,making it possible to reveal accounting misstatements,both overreporting and underreporting.The obtained results make it possible to assess the interrelations between the environmental law violations and financial reporting.展开更多
This study aims to investigate Lorentz/U(1)gauge symmetry-breaking electrodynamics in the framework of the standard-model extension and analyze the Hamiltonian structure for the theory with a specific dimension of Lor...This study aims to investigate Lorentz/U(1)gauge symmetry-breaking electrodynamics in the framework of the standard-model extension and analyze the Hamiltonian structure for the theory with a specific dimension of Lorentz breaking operators.For this purpose,we consider a general quadratic action of the modified electrodynamics with Lorentz/gauge-breaking operators and calculate the number of independent components of the operators at different dimensions in gauge invariance and breaking.With this general action,we then analyze how Lorentz/gauge symmetry-breaking can change the Hamiltonian structure of the theories by considering Lorentz/gauge-breaking operators with dimension as examples.We show that the Lorentz-breaking operators with gauge invariance do not change the classes of the theory constrains and the number of physical degrees of freedom of the standard Maxwell electrodynamics.When U(1)gauge symmetry-breaking operators are present,the theories generally lack a first-class constraint and have one additional physical degree of freedom compared to the standard Maxwell electrodynamics.展开更多
The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually ente...The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard.展开更多
At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of dispute...At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated.展开更多
Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin...Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures.展开更多
By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an...By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an unknown quantity. Quark oscillations occur in spaces that are on the femtometer scale and they are unmeasurable from the point of view of experiments. However, the consequence of those oscillations is the CP violating phase for quarks, which is measured through unitary triangles in Wolfenstein’s parameterization. Through the mathematical model presented in this paper, the equation in Wolfenstein’s parameterization was derived, the root of which is consistent with measurements in today’s quark physics.展开更多
Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co...Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables.展开更多
We propose to deploy limits that arise from different tests of the Pauli Exclusion Principle: i) to provide theories of quantum gravity with experimental guidance; ii) to distinguish, among the plethora of possible...We propose to deploy limits that arise from different tests of the Pauli Exclusion Principle: i) to provide theories of quantum gravity with experimental guidance; ii) to distinguish, among the plethora of possible models, the ones that are already ruled out by current data; iii) to direct future attempts to be in accordance with experimental constraints. We first review experimental bounds on nuclear processes forbidden by the Pauli Exclusion Principle,which have been derived by several experimental collaborations making use of various detector materials. Distinct features of the experimental devices entail sensitivities on the constraints hitherto achieved that may differ from one another by several orders of magnitude. We show that with choices of these limits, well-known examples of flat noncommutative space-time instantiations of quantum gravity can be heavily constrained, and eventually ruled out.We devote particular attention to the analysis of the κ-Minkowski and θ-Minkowski noncommutative spacetimes.These are deeply connected to some scenarios in string theory, loop quantum gravity, and noncommutative geometry.We emphasize that the severe constraints on these quantum spacetimes, although they cannot rule out theories of top-down quantum gravity to which they are connected in various ways, provide a powerful limitation for those models. Focus on this will be necessary in the future.展开更多
We use a sample of Chinese A-share listed companies from 2003 to 2013 to explore the reputation damage and overflow effect of academic independent directors who have received supervisory punishment. We find that when ...We use a sample of Chinese A-share listed companies from 2003 to 2013 to explore the reputation damage and overflow effect of academic independent directors who have received supervisory punishment. We find that when companies violate information disclosure rules, the market punishes academic independent directors more severely than nonacademic independent directors for these violations. Furthermore, companies employing punished academic directors face greater declines in their stock price than companies employing punished nonacademic independent directors during a relatively short window before or after the punishment is announced. The punishment of academic independent directors influences the employment of other scholars in the same field and results in a negative overflow effect. This study provides evidence of the market's differential reactions to independent directors with different backgrounds; the findings reflect the double-edged sword of one individual's reputation on organizations.展开更多
With the rapid load increase in some countries such as China, power grids are becoming more strongly interconnected, and the differences between peak and valley loads are also increasing. As a result, some bulk power ...With the rapid load increase in some countries such as China, power grids are becoming more strongly interconnected, and the differences between peak and valley loads are also increasing. As a result, some bulk power systems are facing high voltage limit violations during light-load periods. This paper proposes to utilize transmission switching(TS) to eliminate voltage violations. The TS problem is formed as a mixed-integer nonlinear program(MINLP) with AC power flow constraints and binary variables. The proposed MINLP problem is non-deterministic polynomial hard.To efficiently solve the problem, a decomposition approach is developed. This approach decomposes the original problem into a mixedinteger linear programming master problem and an AC optimal power flow slave problem that is used to check the AC feasibility. Prevention of islanding is also taken into consideration to ensure the feasibility of the TS results.The modified IEEE 39-bus and IEEE 57-bus test systems are used to demonstrate the applicability and effectiveness of the proposed method.展开更多
文摘Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.
基金The National Key Research and Development Program of China(No.2019YFB1600200).
文摘To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.
文摘To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program.
文摘A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early universe Lorentz Violation. The author asserts that the existence of early universe Lorentz violation in turn is assisting in a breakup of primordial black holes. And that also has a tie into Kieffer different time steps as outlined. And the wrap up is given in the final part of this document.
基金National Natural Science Foundation of China under Grant No.60873213,91018008 and 61070192Beijing Science Foundation under Grant No. 4082018Shanghai Key Laboratory of Intelligent Information Processing of China under Grant No. IIPL-09-006
文摘For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.
文摘Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this research focuses on building an efficient spatial data management system using two constraint violation detection methods.An algorithm for constraint violation detection has been derived to maintain the error-free up-to-date spatial database.Results indicate that the developed constraint violation detection(CVD)system is more efficient compared with conventional systems.
文摘The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies.
文摘There are some grammatical rules of pure syntactic restrictions on grammar rules of operation, a complex one of which is the fronting, i.e., extraction from the island. This paper centers on the "island" that is the terminology in syntactic theory, and mainly focuses on the definition, the types and the analyses of the "island"
文摘Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research objective is statistical comparison of environmental law violation against accounting abuses by Russian enterprises.A research hypothesis is put forward that companies,that violated environmental law,prepare financial reporting mostly incorrectly.An exploratory sampling from the economic entities of Russia,that violated environmental law in the course of various activities,was formed.Financial reporting of the sampling companies was analyzed by virtue of the authorial probit regression model,making it possible to reveal accounting misstatements,both overreporting and underreporting.The obtained results make it possible to assess the interrelations between the environmental law violations and financial reporting.
基金Supported by the National Key Research and Development Program of China(2020YFC2201503)the Zhejiang Provincial Natural Science Foundation of China(LR21A050001,LY20A050002)+1 种基金the National Natural Science Foundation of China(12275238,11675143)B.-F.Li is supported by the National Natural Science Foundation of China(NNSFC)(12005186)。
文摘This study aims to investigate Lorentz/U(1)gauge symmetry-breaking electrodynamics in the framework of the standard-model extension and analyze the Hamiltonian structure for the theory with a specific dimension of Lorentz breaking operators.For this purpose,we consider a general quadratic action of the modified electrodynamics with Lorentz/gauge-breaking operators and calculate the number of independent components of the operators at different dimensions in gauge invariance and breaking.With this general action,we then analyze how Lorentz/gauge symmetry-breaking can change the Hamiltonian structure of the theories by considering Lorentz/gauge-breaking operators with dimension as examples.We show that the Lorentz-breaking operators with gauge invariance do not change the classes of the theory constrains and the number of physical degrees of freedom of the standard Maxwell electrodynamics.When U(1)gauge symmetry-breaking operators are present,the theories generally lack a first-class constraint and have one additional physical degree of freedom compared to the standard Maxwell electrodynamics.
基金supported by the Major Com-missioned Project of Social Science Planning Fund of Liaoning Prov-ince,China:“Research on Legal Issues of Cross-border Nuclear Dam-age Compensation in the Context of Japan’s Discharge of Nuclear Sewage”[Grant No.L23ZD072].
文摘The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard.
文摘At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated.
基金funded by the Deanship of Scientific Research at Northern Border University,Arar,Kingdom of Saudi Arabia through Research Group No.(RG-NBU-2022-1234).
文摘Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures.
文摘By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an unknown quantity. Quark oscillations occur in spaces that are on the femtometer scale and they are unmeasurable from the point of view of experiments. However, the consequence of those oscillations is the CP violating phase for quarks, which is measured through unitary triangles in Wolfenstein’s parameterization. Through the mathematical model presented in this paper, the equation in Wolfenstein’s parameterization was derived, the root of which is consistent with measurements in today’s quark physics.
文摘Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables.
文摘We propose to deploy limits that arise from different tests of the Pauli Exclusion Principle: i) to provide theories of quantum gravity with experimental guidance; ii) to distinguish, among the plethora of possible models, the ones that are already ruled out by current data; iii) to direct future attempts to be in accordance with experimental constraints. We first review experimental bounds on nuclear processes forbidden by the Pauli Exclusion Principle,which have been derived by several experimental collaborations making use of various detector materials. Distinct features of the experimental devices entail sensitivities on the constraints hitherto achieved that may differ from one another by several orders of magnitude. We show that with choices of these limits, well-known examples of flat noncommutative space-time instantiations of quantum gravity can be heavily constrained, and eventually ruled out.We devote particular attention to the analysis of the κ-Minkowski and θ-Minkowski noncommutative spacetimes.These are deeply connected to some scenarios in string theory, loop quantum gravity, and noncommutative geometry.We emphasize that the severe constraints on these quantum spacetimes, although they cannot rule out theories of top-down quantum gravity to which they are connected in various ways, provide a powerful limitation for those models. Focus on this will be necessary in the future.
基金financial support from the National Natural Science Foundation of China(Project Nos.7160219171502174)the Special Funds for the Fundamental Scientific Research of Central Universities of Zhongnan University of Economics and Law
文摘We use a sample of Chinese A-share listed companies from 2003 to 2013 to explore the reputation damage and overflow effect of academic independent directors who have received supervisory punishment. We find that when companies violate information disclosure rules, the market punishes academic independent directors more severely than nonacademic independent directors for these violations. Furthermore, companies employing punished academic directors face greater declines in their stock price than companies employing punished nonacademic independent directors during a relatively short window before or after the punishment is announced. The punishment of academic independent directors influences the employment of other scholars in the same field and results in a negative overflow effect. This study provides evidence of the market's differential reactions to independent directors with different backgrounds; the findings reflect the double-edged sword of one individual's reputation on organizations.
文摘With the rapid load increase in some countries such as China, power grids are becoming more strongly interconnected, and the differences between peak and valley loads are also increasing. As a result, some bulk power systems are facing high voltage limit violations during light-load periods. This paper proposes to utilize transmission switching(TS) to eliminate voltage violations. The TS problem is formed as a mixed-integer nonlinear program(MINLP) with AC power flow constraints and binary variables. The proposed MINLP problem is non-deterministic polynomial hard.To efficiently solve the problem, a decomposition approach is developed. This approach decomposes the original problem into a mixedinteger linear programming master problem and an AC optimal power flow slave problem that is used to check the AC feasibility. Prevention of islanding is also taken into consideration to ensure the feasibility of the TS results.The modified IEEE 39-bus and IEEE 57-bus test systems are used to demonstrate the applicability and effectiveness of the proposed method.