期刊文献+
共找到3,153篇文章
< 1 2 158 >
每页显示 20 50 100
Gender Forecast Based on the Information about People Who Violated Traffic Principle 被引量:1
1
作者 Rui Li Guang Sun +5 位作者 Jingyi He Ying Jiang Rui Sun Haixia Li Peng Guo and Jianjun Zhang 《Journal on Internet of Things》 2020年第2期65-73,共9页
User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and opera... User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and operating.However,there are more ways which can reflect the good use of user portrait.Commercial use is the most acceptable use but it also can be used in different industries widely.The goal of this paper is forecasting gender by user portrait and making it useful in transportation safety.It can extract the information from people who violated traffic principle to know the features of them then forecast the gender of these people.Finally,it will analyze the prediction based on characteristics correlation and forecasting results from models which can verify if gender can have an obvious influence on the traffic violation.Also we hope give some advice to drivers and traffic department by doing this research. 展开更多
关键词 User portrait gender forecast feature selection correlation analysis traffic violation
下载PDF
Emergent Gravity, Violated Relativity and Dark Matter
2
作者 Yury F. Pirogov 《Journal of Modern Physics》 2014年第15期1418-1426,共9页
The nonlinear affine Goldstone model of the emergent gravity, built on the nonlinearly realized/ hidden affine symmetry, is concisely revisited. Beyond General Relativity, the explicit violation of general invariance/... The nonlinear affine Goldstone model of the emergent gravity, built on the nonlinearly realized/ hidden affine symmetry, is concisely revisited. Beyond General Relativity, the explicit violation of general invariance/relativity, under preserving general covariance, is exposed. Dependent on a nondynamical affine connection, a generally covariant second-order effective Lagrangian for metric gravity is worked out, with the general relativity violation and the gravitational dark matter serving as the signatures of emergence. 展开更多
关键词 SPONTANEOUS Symmetry BREAKING Nonlinear REALIZATIONS Emergent Gravity General RELATIVITY violatION DARK Matter
下载PDF
What the Null Energy Condition (and When It May Be Violated) Tells Us about Gravitational Wave Frequencies in/for Relic Cosmology?
3
作者 Andrew Beckwith 《Journal of Modern Physics》 2011年第9期977-991,共15页
We introduce a criterion as to the range of HFGW generated by early universe conditions. The 1 to 10 Giga Hertz range is constructed initially starting with what Grupen writes as far as what to expect of GW frequencie... We introduce a criterion as to the range of HFGW generated by early universe conditions. The 1 to 10 Giga Hertz range is constructed initially starting with what Grupen writes as far as what to expect of GW frequencies which can be detected assuming a sensitivity of 7×h^10-27 . From there we examine the implications of an earlier Hubble parameter at the start of inflation, and a phase transition treatment of pre to post Planckian inflation physics via use of inflatons. We close with an analysis of how gravitational constant G may vary with time, the tie in with the NEC condition and how to select a range of relic GW frequencies. The gravitational frequencies in turn may enable resolving a mis match between the datum that the entropy of the center of the galaxy black hole is greater than the entropy of the present four dimensional universe as we can infer and measure. 展开更多
关键词 NULL ENERGY CONDITION violatION of NULL ENERGY CONDITION Cyclic Conformal COSMOLOGY Entropy MULTIVERSE
下载PDF
And If Bell’s Inequality Were Not Violated
4
作者 Olivier Serret 《Journal of Modern Physics》 2014年第14期1360-1369,共10页
It briefly recalls the theory of Bell’s inequality and some experimental measures. Then measurements are processed on one hand according to a property of the wave function, on the other hand according to the sum defi... It briefly recalls the theory of Bell’s inequality and some experimental measures. Then measurements are processed on one hand according to a property of the wave function, on the other hand according to the sum definition. The results of such processed measures are apparently not the same, so Bell’s inequality would not be violated. It is a use of the wave function which implies the violation of the inequality, as it can be seen on the last flowcharts. 展开更多
关键词 Bell’s THEOREM Bell’s INEQUALITY violatION ENTANGLED PHOTONS Quantum SUM Experimental Measures Wave Function
下载PDF
AI-Based Helmet Violation Detection for Traffic Management System
5
作者 Yahia Said YahyaAlassaf +5 位作者 Refka Ghodhbani Yazan Ahmad Alsariera Taoufik Saidani Olfa Ben Rhaiem Mohamad Khaled Makhdoum Manel Hleili 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期733-749,共17页
Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin... Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures. 展开更多
关键词 Non-helmet use detection traffic violation SAFETY deep learning optimized PerspectiveNet
下载PDF
Fermions: Spin, Hidden Variables, Violation of Bell’s Inequality and Quantum Entanglement
6
作者 Doron Kwiat 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1613-1627,共15页
Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co... Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables. 展开更多
关键词 FERMIONS SPIN Hidden Variables Bell’s Inequality violation Spin Entanglement
下载PDF
The Equation for the CP Violating Phase for Quarks: The Rule for the Sum of Quark Oscillation Probabilities
7
作者 Zoran B. Todorovic 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1835-1865,共31页
By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an... By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an unknown quantity. Quark oscillations occur in spaces that are on the femtometer scale and they are unmeasurable from the point of view of experiments. However, the consequence of those oscillations is the CP violating phase for quarks, which is measured through unitary triangles in Wolfenstein’s parameterization. Through the mathematical model presented in this paper, the equation in Wolfenstein’s parameterization was derived, the root of which is consistent with measurements in today’s quark physics. 展开更多
关键词 QUARKS CKM Matrix PMNS Matrix Wolfenstein Parameterization CP violation Phase Jarlskog Invariant
下载PDF
Determination of Liability for Violation of “Sexual Autonomy” and Compensation for Mental Damages
8
作者 姚邢 JIANG Lin(Translated) 《The Journal of Human Rights》 2024年第2期347-372,共26页
At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of dispute... At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated. 展开更多
关键词 sexual autonomy personality rights violatIONS liability investigation
下载PDF
A Study of Triangle Inequality Violations in Social Network Clustering
9
作者 Sanjit Kumar Saha Tapashi Gosswami 《Journal of Computer and Communications》 2024年第1期67-76,共10页
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie... Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters. 展开更多
关键词 CLUSTERING Triangle Inequality violations Traditional Clustering Graph Clustering
下载PDF
Characteristics and risk of violation behavior of non-motorists at signalized intersections 被引量:6
10
作者 赵星 任刚 +2 位作者 杜轩 王鹏 王卫杰 《Journal of Southeast University(English Edition)》 EI CAS 2011年第4期423-429,共7页
Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaire... Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors. 展开更多
关键词 traffic violation behavior traffic safety non- motorist signal intersection
下载PDF
高校图书馆数字资源违规使用对策设计及其仿真校验
11
作者 李英群 裴雷 +3 位作者 朱静娴 李亚菲 彭星 张晶 《现代情报》 北大核心 2025年第1期18-32,共15页
[目的/意义]高校图书馆数字资源违规使用治理政策涉及多方利益主体博弈,单一维度的分析视角无法从系统层面有效调和并解决这一矛盾冲突。[方法/过程]本文采用演化博弈理论框架,构建数据供应商、高校图书馆和用户的三方演化博弈模型,探... [目的/意义]高校图书馆数字资源违规使用治理政策涉及多方利益主体博弈,单一维度的分析视角无法从系统层面有效调和并解决这一矛盾冲突。[方法/过程]本文采用演化博弈理论框架,构建数据供应商、高校图书馆和用户的三方演化博弈模型,探究各主体的行为模式及其均衡稳定策略。通过构建层次结构模型对参数赋值,以提升仿真分析结果的可靠性和真实性。随后通过MATLAB仿真实验,剖析了各类因素对于演化博弈的影响机制与作用路径,厘清利益对象间的动态交互关系和关联结构。[结果/结论]研究结果显示,该博弈模型呈现出两种不同的演化稳定策略状态,并基于数据资源违规使用的现状,分别从三方博弈主体提出针对性的意见。 展开更多
关键词 高校图书馆 供应商 用户 数字资源 合规使用 违规使用 政策设计 演化博弈 仿真分析
下载PDF
基于Fairmot的交通违法行为算法研究
12
作者 施凯斌 李文书 《软件工程》 2025年第2期1-5,共5页
在监测交通违法行为的检测任务中,传统的人工监控与基础传感器方法因准确性和实时性存在局限而面临挑战。通过引入多目标跟踪技术,可以显著提升检测效率和系统识别的准确性。文章提出了一种针对车辆信息的多目标跟踪算法,使用MAU-DLA34(... 在监测交通违法行为的检测任务中,传统的人工监控与基础传感器方法因准确性和实时性存在局限而面临挑战。通过引入多目标跟踪技术,可以显著提升检测效率和系统识别的准确性。文章提出了一种针对车辆信息的多目标跟踪算法,使用MAU-DLA34(Mixed Attention Unit-Deep Layer Aggregation 34)作为主干网络,替换传统的DLA34主干网络。在处理高密度交通和复杂交互情况下,该算法的表现出色,AP达到73.6%,MOTA为82.9%,IDF1为79.3%,明显优于传统方法和其他深度学习方法,如JDE、DeepSort、CenterTrack等。该算法有效减少了身份切换,确保了对交通参与者的精准且连续跟踪。 展开更多
关键词 多目标跟踪 目标检测 Fairmot 交通违法行为
下载PDF
The Violation of Cooperative Principle and English Teaching
13
作者 张大海 《海外英语》 2013年第21期291-293,共3页
The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvant... The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers. 展开更多
关键词 violatION COOPERATIVE PRINCIPLE ENGLISH TEACHING i
下载PDF
基于三方演化博弈的出租车驾驶人交通违法行为分析
14
作者 林欣蓉 孙久镔 +1 位作者 孙晨飞 汤天培 《物流科技》 2025年第1期101-106,共6页
为了从执法部门和出租车公司两方探索对出租车驾驶人交通违法行为的管理措施,有必要研究执法部门、出租车公司对出租车驾驶人交通违法行为的影响机制。基于演化博弈论,从交通违法和管理的成本收益角度,构建了出租车驾驶人与执法部门、... 为了从执法部门和出租车公司两方探索对出租车驾驶人交通违法行为的管理措施,有必要研究执法部门、出租车公司对出租车驾驶人交通违法行为的影响机制。基于演化博弈论,从交通违法和管理的成本收益角度,构建了出租车驾驶人与执法部门、出租车公司的策略选择演化三方博弈模型。通过模型求解和仿真分析,揭示了不同管理策略下交通违法成本对出租车驾驶人交通违法行为的影响机理。研究结果表明:当执法部门和出租车公司共同管理出租车驾驶人交通违法行为时,能将驾驶人交通违法概率控制在相对最低的水平,且管理投入相对也最低;出租车公司的管理力度对一般状态驾驶人的交通违法行为影响更大,而执法部门的执法力度对临界状态驾驶人的交通违法行为影响更大;相较于现金处罚,驾照分扣减和驾驶资格限制对出租车驾驶人交通违法行为的管理更有效。 展开更多
关键词 交通安全 交通违法行为 演化博弈模型 出租车驾驶人
下载PDF
基于深度学习的校园交通监管系统
15
作者 张书豪 彭睿颖 +3 位作者 高胜炜 田文冰 袁博宇 刘玮玮 《山东理工大学学报(自然科学版)》 CAS 2025年第2期16-21,共6页
针对校园内机动车辆管理混乱和违章行为频发的问题,设计了一个基于YOLOv5和CRNN模型的混合式车辆监控系统。该系统利用YOLOv5目标检测算法和CRNN车牌识别技术,能有效识别超速和违停等违章行为并自动发出预警,实现了对校园车辆的精确检... 针对校园内机动车辆管理混乱和违章行为频发的问题,设计了一个基于YOLOv5和CRNN模型的混合式车辆监控系统。该系统利用YOLOv5目标检测算法和CRNN车牌识别技术,能有效识别超速和违停等违章行为并自动发出预警,实现了对校园车辆的精确检测与管理。在不同校园场景下进行的实验结果表明,本文模型的车辆检测精准率较YOLOv3提高了3.39%,召回率和mAP较其他几种模型也均有显著提升。该监控系统在校园环境中具有较高的应用价值,不仅能够提升校园交通的安全性和管理效率,也能为智能交通系统的发展提供新的技术支持和实践案例。 展开更多
关键词 校园车辆监管系统 车辆识别 YOLOv5 CRNN 交通违章检测
下载PDF
电网登高违章作业轻量级智能检测模型
16
作者 段在鹏 翁培辉 +1 位作者 蓝志宇 邱慧婷 《安全与环境学报》 北大核心 2025年第1期175-183,共9页
电网登高作业众多,登高违章易造成高处坠落等严重事故。构建了轻量化且高精度的登高违章作业检测模型,以实现对不安全行为的高效检出。首先,基于YOLOv8算法框架构建基础网络模型,之后在颈部网络中引入幽灵模块(Ghost module),以构建轻... 电网登高作业众多,登高违章易造成高处坠落等严重事故。构建了轻量化且高精度的登高违章作业检测模型,以实现对不安全行为的高效检出。首先,基于YOLOv8算法框架构建基础网络模型,之后在颈部网络中引入幽灵模块(Ghost module),以构建轻量化模型;其次,在主干网络中引入高效多尺度注意力模块(Efficient Multi-scale Attention module,EMA),在保证轻量化基础上,提高模型精度;最后,基于网络层次分析法和模糊综合评价法,将孤立的不安全行为融合为登高作业综合评价体系。结果表明:相较于基础模型,本模型准确率提高3.3%,召回率提高9.9%,均值平均精度(mean Average Precision,mAP)mAP@50提高8.4%,mAP@50:95提高4.6%;在轻量化方面,参数量降低17.6%,计算量降低11.1%,模型所占存储容量降低16.1%,且漏检情况有所减少。 展开更多
关键词 安全工程 电网登高作业 违章作业 目标检测 幽灵模块 注意力机制
下载PDF
On the Causes of the Violation of Cooperative Principle 被引量:1
17
作者 朱毅 刘爱玲 《海外英语》 2015年第19期217-218,共2页
Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to ... Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language. 展开更多
关键词 COOPERATIVE PRINCIPLE violatION CAUSES
下载PDF
CONSTRAINT VIOLATION STABILIZATION OF EULER-LAGRANGE EQUATIONS WITH NON-HOLONOMIC CONSTRAINTS 被引量:2
18
作者 ZhaoWeijia PanZhenkuan ChenLiqun 《Acta Mechanica Solida Sinica》 SCIE EI 2004年第1期45-51,共7页
Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised metho... Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised methods can deal with more complicated problems such as those with nonholonomic constraints or redundant constraints, and save the computation time. Finally a numerical simulation of a multibody system is conducted by using the methods given in this paper. 展开更多
关键词 Euler-Lagrange equation nonholonomic constraint constraint violation stabiliza- tion redundant constraint
下载PDF
Frame length optimization for multi-antenna downlink systems based on delay-bound violation probability constraints
19
作者 谭雨凤 李俊超 +1 位作者 夏玮玮 沈连丰 《Journal of Southeast University(English Edition)》 EI CAS 2015年第2期163-169,共7页
A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS... A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS) metrics from the conventional physical-layer channel models, the link-layer models named effective bandwidth and effective capacity are applied to statistically characterize the source traffic patterns and the queuing service dynamics. With these link-layer models, the source traffic process and the channel service process are mapped to certain QoS parameters. The packet delay-bound violation probability constraints are converted into minimum data rate constraints and the optimization problem is thus formulated into simultaneous inequalities. With the assumption of ergodic block-fading channels, the optimal frame lengths of single-user and multiuser systems are calculated respectively by numerical iterative methods. Theoretical analyses and simulation results show that the given delay-bound violation probability constraints are well satisfied with the optimal frame length. 展开更多
关键词 delay-bound violation probability frame lengthoptimization effective bandwidth effective capacity multi-antenna systems quality of service
下载PDF
AN AUTOMATIC CONSTRAINT VIOLATION STABI- LIZATION METHOD FOR DIFFERENTIAL/ ALGEBRAIC EQUATIONS OF MOTION IN MULTIBODY SYSTEM DYNAMICS 被引量:1
20
作者 赵维加 潘振宽 王艺兵 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2000年第1期105-110,共6页
A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional con... A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional constraint violation stabilization method are determined according to the integration time step size and Taylor expansion method automatically. The direct integration method, the traditional constraint violation stabilization method and the new method presented in this paper are compared finally. 展开更多
关键词 dynamics of multibody systems Euler_Lagrange equations constraint violation stabilization
下载PDF
上一页 1 2 158 下一页 到第
使用帮助 返回顶部