Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie...Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.展开更多
To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violation...To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program.展开更多
A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early u...A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early universe Lorentz Violation. The author asserts that the existence of early universe Lorentz violation in turn is assisting in a breakup of primordial black holes. And that also has a tie into Kieffer different time steps as outlined. And the wrap up is given in the final part of this document.展开更多
The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to...The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies.展开更多
Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research ...Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research objective is statistical comparison of environmental law violation against accounting abuses by Russian enterprises.A research hypothesis is put forward that companies,that violated environmental law,prepare financial reporting mostly incorrectly.An exploratory sampling from the economic entities of Russia,that violated environmental law in the course of various activities,was formed.Financial reporting of the sampling companies was analyzed by virtue of the authorial probit regression model,making it possible to reveal accounting misstatements,both overreporting and underreporting.The obtained results make it possible to assess the interrelations between the environmental law violations and financial reporting.展开更多
This study aims to investigate Lorentz/U(1)gauge symmetry-breaking electrodynamics in the framework of the standard-model extension and analyze the Hamiltonian structure for the theory with a specific dimension of Lor...This study aims to investigate Lorentz/U(1)gauge symmetry-breaking electrodynamics in the framework of the standard-model extension and analyze the Hamiltonian structure for the theory with a specific dimension of Lorentz breaking operators.For this purpose,we consider a general quadratic action of the modified electrodynamics with Lorentz/gauge-breaking operators and calculate the number of independent components of the operators at different dimensions in gauge invariance and breaking.With this general action,we then analyze how Lorentz/gauge symmetry-breaking can change the Hamiltonian structure of the theories by considering Lorentz/gauge-breaking operators with dimension as examples.We show that the Lorentz-breaking operators with gauge invariance do not change the classes of the theory constrains and the number of physical degrees of freedom of the standard Maxwell electrodynamics.When U(1)gauge symmetry-breaking operators are present,the theories generally lack a first-class constraint and have one additional physical degree of freedom compared to the standard Maxwell electrodynamics.展开更多
The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually ente...The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard.展开更多
At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of dispute...At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated.展开更多
Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin...Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures.展开更多
We propose to deploy limits that arise from different tests of the Pauli Exclusion Principle: i) to provide theories of quantum gravity with experimental guidance; ii) to distinguish, among the plethora of possible...We propose to deploy limits that arise from different tests of the Pauli Exclusion Principle: i) to provide theories of quantum gravity with experimental guidance; ii) to distinguish, among the plethora of possible models, the ones that are already ruled out by current data; iii) to direct future attempts to be in accordance with experimental constraints. We first review experimental bounds on nuclear processes forbidden by the Pauli Exclusion Principle,which have been derived by several experimental collaborations making use of various detector materials. Distinct features of the experimental devices entail sensitivities on the constraints hitherto achieved that may differ from one another by several orders of magnitude. We show that with choices of these limits, well-known examples of flat noncommutative space-time instantiations of quantum gravity can be heavily constrained, and eventually ruled out.We devote particular attention to the analysis of the κ-Minkowski and θ-Minkowski noncommutative spacetimes.These are deeply connected to some scenarios in string theory, loop quantum gravity, and noncommutative geometry.We emphasize that the severe constraints on these quantum spacetimes, although they cannot rule out theories of top-down quantum gravity to which they are connected in various ways, provide a powerful limitation for those models. Focus on this will be necessary in the future.展开更多
We use a sample of Chinese A-share listed companies from 2003 to 2013 to explore the reputation damage and overflow effect of academic independent directors who have received supervisory punishment. We find that when ...We use a sample of Chinese A-share listed companies from 2003 to 2013 to explore the reputation damage and overflow effect of academic independent directors who have received supervisory punishment. We find that when companies violate information disclosure rules, the market punishes academic independent directors more severely than nonacademic independent directors for these violations. Furthermore, companies employing punished academic directors face greater declines in their stock price than companies employing punished nonacademic independent directors during a relatively short window before or after the punishment is announced. The punishment of academic independent directors influences the employment of other scholars in the same field and results in a negative overflow effect. This study provides evidence of the market's differential reactions to independent directors with different backgrounds; the findings reflect the double-edged sword of one individual's reputation on organizations.展开更多
With the rapid load increase in some countries such as China, power grids are becoming more strongly interconnected, and the differences between peak and valley loads are also increasing. As a result, some bulk power ...With the rapid load increase in some countries such as China, power grids are becoming more strongly interconnected, and the differences between peak and valley loads are also increasing. As a result, some bulk power systems are facing high voltage limit violations during light-load periods. This paper proposes to utilize transmission switching(TS) to eliminate voltage violations. The TS problem is formed as a mixed-integer nonlinear program(MINLP) with AC power flow constraints and binary variables. The proposed MINLP problem is non-deterministic polynomial hard.To efficiently solve the problem, a decomposition approach is developed. This approach decomposes the original problem into a mixedinteger linear programming master problem and an AC optimal power flow slave problem that is used to check the AC feasibility. Prevention of islanding is also taken into consideration to ensure the feasibility of the TS results.The modified IEEE 39-bus and IEEE 57-bus test systems are used to demonstrate the applicability and effectiveness of the proposed method.展开更多
In the framework of the QCD factorization approach,we study the localized CP violations of the B^(-)→K^(-)π^(+)(π)^(-)decay with and without the a_(0)^(0)(980)-f_(0)(980) mixing mechanism and observe that the local...In the framework of the QCD factorization approach,we study the localized CP violations of the B^(-)→K^(-)π^(+)(π)^(-)decay with and without the a_(0)^(0)(980)-f_(0)(980) mixing mechanism and observe that the localized CP violation can be enhanced by this mixing effect when the mass of the π^(+)(π)^(-)pair is in the vicinity of the f_(0)(980) resonance.The corresponding theoretical prediction results are A_(CP)(B^(-)→Kf_(0)→K^(-)π^(+)(π)^(-))=[0.126,0.338](0.232±0.106 with the central value form) and A_(CP)(B^(-)→K^(-)f_(0)(a_0)→K^(-)π^(+)(π)^(-))=[0.230,0.615](0.423±0.193 with the central value form),respectively.Meanwhile,we also calculate the branching fraction of the B^(-)→K^(-)f_(0)(980)→K^(-)π^(+)(π)^(-)decay,which is consistent with the experimental results.We suggest that the a_(0)^(0)(980)-f_(0)(980) mixing mechanism should be considered when theoretically and experimentally studying the CP violation of the B or D meson decays.展开更多
Contrary to the approach in judicial practice,Paragraph 1,Article 153,of the Civil Code of the People’s Republic of China,as a rule of invalidity for violating mandatory provisions,does not adopt a dichotomy towards ...Contrary to the approach in judicial practice,Paragraph 1,Article 153,of the Civil Code of the People’s Republic of China,as a rule of invalidity for violating mandatory provisions,does not adopt a dichotomy towards mandatory provisions with effectiveness and administrative characteristics,yet it maintains the legislative philosophy of differentiation.It leaves unspecified whether mandatory provisions that do not explicitly render a juristic act invalid impact the act’s validity,entrusting this determination to the discretion of judges on a case-by-case basis.When judges,under the authority of Paragraph 1,Article 153 of the Civil Code,explore the normative intent of mandatory provisions to assess their effect on the validity of juristic acts,they should engage in legal policy analysis centered on consequence-based argumentation to overcome the limitations of norm typological analysis.This analysis employs a reasoning model predicated on the normative purpose,utilizing a consequencefocused interpretative approach for formulating and arguing propositions of rules applicable to pending cases,thereby arriving at case-specific conclusions.Since the invalidation of juristic acts serves as an auxiliary regulatory tool for the state economy and society,a consequence-oriented interpretation needs to be based on the idea of mutual instrumentalization of public and private laws.This entails predicting the outcomes of negating the validity of a juristic act in industrial regulatory scenarios and assessing these outcomes within the framework of public and private regulatory instruments.展开更多
Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising to...Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising tool for checking and constraining any deviations from Lorentz Invariance due to their huge energies and cosmological distances. Gamma-ray bursts, which are the most intense and powerful explosions in the universe, are traditionally divided into long bursts whose observed duration exceeds 2 s, and short bursts whose observed duration is less than 2 s. In this study, we employ a recent sample of 46 short GRBs to check for any deviation from Lorentz Invariance. We analyze the spectral lag of the bursts in our data sample and check for any redshift dependence in the GRB rest frame, which would indicate a violation of Lorentz Invariance. Our results are consistent, to within 1σ, with no deviation from Lorentz Invariance.展开更多
Bicycling is an important way for college students and employees to get around campuses. With a rise in bicycling on campuses there comes a rise in bicycle collisions with pedestrians walking to and from classes and w...Bicycling is an important way for college students and employees to get around campuses. With a rise in bicycling on campuses there comes a rise in bicycle collisions with pedestrians walking to and from classes and work. The literature review showed many papers involving bicycle conflict modeling but on roads with motor vehicles. While some aspects of this research can be applied to non-motorized paths, there is a lack of research strictly focusing on only bicycles and pedestrians. This study aims to fill this knowledge gap by developing a model to identify locations on roads and paths (hotspots) on college campuses that are likely to have a bicycle collision and predict the likelihood of a serious bicycle crash on a non-motorized path based on the characteristics of the path. This study identifies those interactions between bicyclists and pedestrians on non-motorized paths on a suburban college campus in Newark, USA. Findings suggest that pedestrian density of a path is a major factor in the maximum speed bicyclists can achieve. The wider the path is, the higher the maximum speed is that a bicyclist can obtain. This is because a wider path width decreases the pedestrian density. The grade of the path has little effect on bicycle speeds. The results of the models were displayed on a GIS map that is visually appealing to a viewer. The paths were color coded based on their level of safety, so it is easy to observe problematic areas of the network. This technique can be applied to the entire campus network of non-motorized paths to study the whole system. This can then be used by planners and designers to identify areas that need upgrading and improve the overall safety of the non-motorized path system.展开更多
Non-iterative analysis of indentation results allows for the detection of phase transitions under load and their transition energy. The closed algebraic equations have been deduced on the basis of the physically found...Non-iterative analysis of indentation results allows for the detection of phase transitions under load and their transition energy. The closed algebraic equations have been deduced on the basis of the physically founded normal force ?depth3/2 relation. The precise transition onset position is obtained by linear regression of the FN = kh3/2 plot, where k is the penetration resistance, which also provides the axis cuts of both polymorphs of first order phase transitions. The phase changes can be endothermic or exothermic. They are normalized per μN or mN normal load. The analyses of indentation loading curves with self-similar diamond indenters are used as validity check of the loading curves, also from calibration standards that exhibit previously undetected phase-transitions and are thus incorrect. The phase-transition energies for fused quartz are determined from the loading curves from instrument provider handbooks. The anisotropic behavior of phase transition energies is studied for the first time. Quartz is a useful test object. The reasons for the packing-dependent differences are discussed on the basis of the local crystal structure under and around the inserting tip.展开更多
There has been a wealth of research that has examined the nature of rework in construction.Progress toward addressing the rework problem has been limited-it still plagues practice,adversely impacting a project’s perf...There has been a wealth of research that has examined the nature of rework in construction.Progress toward addressing the rework problem has been limited-it still plagues practice,adversely impacting a project’s performance.Almost all rework studies have focused on determining its proximal or root causes and therefore have overlooked the conditions that result from its manifestation.In filling this void,this paper draws upon our previous empirical studies,amongst others,to provide a much-needed theoretical framing to understand better why rework occurs,what its consequences are,and how it can be mitigated during construction.The theoretical framing we derive from our review provides construction organizations and their projects with a realization that the journey to mitigating rework begins with creating an error-mastery culture comprising authentic leadership,psychological safety,an errormanagement orientation,and resilience.We suggest that,once an error-mastery culture is established within construction organizations and their projects,they will be better positioned to realize the benefits of the techniques,tools,and technologies espoused to address rework,such as the Last Planner® and building information modeling.We also provide directions for future research and identify implications for practice so that strides toward rework mitigation in construction can be made.展开更多
文摘Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.
文摘To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program.
文摘A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early universe Lorentz Violation. The author asserts that the existence of early universe Lorentz violation in turn is assisting in a breakup of primordial black holes. And that also has a tie into Kieffer different time steps as outlined. And the wrap up is given in the final part of this document.
文摘The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies.
文摘Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research objective is statistical comparison of environmental law violation against accounting abuses by Russian enterprises.A research hypothesis is put forward that companies,that violated environmental law,prepare financial reporting mostly incorrectly.An exploratory sampling from the economic entities of Russia,that violated environmental law in the course of various activities,was formed.Financial reporting of the sampling companies was analyzed by virtue of the authorial probit regression model,making it possible to reveal accounting misstatements,both overreporting and underreporting.The obtained results make it possible to assess the interrelations between the environmental law violations and financial reporting.
基金Supported by the National Key Research and Development Program of China(2020YFC2201503)the Zhejiang Provincial Natural Science Foundation of China(LR21A050001,LY20A050002)+1 种基金the National Natural Science Foundation of China(12275238,11675143)B.-F.Li is supported by the National Natural Science Foundation of China(NNSFC)(12005186)。
文摘This study aims to investigate Lorentz/U(1)gauge symmetry-breaking electrodynamics in the framework of the standard-model extension and analyze the Hamiltonian structure for the theory with a specific dimension of Lorentz breaking operators.For this purpose,we consider a general quadratic action of the modified electrodynamics with Lorentz/gauge-breaking operators and calculate the number of independent components of the operators at different dimensions in gauge invariance and breaking.With this general action,we then analyze how Lorentz/gauge symmetry-breaking can change the Hamiltonian structure of the theories by considering Lorentz/gauge-breaking operators with dimension as examples.We show that the Lorentz-breaking operators with gauge invariance do not change the classes of the theory constrains and the number of physical degrees of freedom of the standard Maxwell electrodynamics.When U(1)gauge symmetry-breaking operators are present,the theories generally lack a first-class constraint and have one additional physical degree of freedom compared to the standard Maxwell electrodynamics.
基金supported by the Major Com-missioned Project of Social Science Planning Fund of Liaoning Prov-ince,China:“Research on Legal Issues of Cross-border Nuclear Dam-age Compensation in the Context of Japan’s Discharge of Nuclear Sewage”[Grant No.L23ZD072].
文摘The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard.
文摘At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated.
基金funded by the Deanship of Scientific Research at Northern Border University,Arar,Kingdom of Saudi Arabia through Research Group No.(RG-NBU-2022-1234).
文摘Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures.
文摘We propose to deploy limits that arise from different tests of the Pauli Exclusion Principle: i) to provide theories of quantum gravity with experimental guidance; ii) to distinguish, among the plethora of possible models, the ones that are already ruled out by current data; iii) to direct future attempts to be in accordance with experimental constraints. We first review experimental bounds on nuclear processes forbidden by the Pauli Exclusion Principle,which have been derived by several experimental collaborations making use of various detector materials. Distinct features of the experimental devices entail sensitivities on the constraints hitherto achieved that may differ from one another by several orders of magnitude. We show that with choices of these limits, well-known examples of flat noncommutative space-time instantiations of quantum gravity can be heavily constrained, and eventually ruled out.We devote particular attention to the analysis of the κ-Minkowski and θ-Minkowski noncommutative spacetimes.These are deeply connected to some scenarios in string theory, loop quantum gravity, and noncommutative geometry.We emphasize that the severe constraints on these quantum spacetimes, although they cannot rule out theories of top-down quantum gravity to which they are connected in various ways, provide a powerful limitation for those models. Focus on this will be necessary in the future.
基金financial support from the National Natural Science Foundation of China(Project Nos.7160219171502174)the Special Funds for the Fundamental Scientific Research of Central Universities of Zhongnan University of Economics and Law
文摘We use a sample of Chinese A-share listed companies from 2003 to 2013 to explore the reputation damage and overflow effect of academic independent directors who have received supervisory punishment. We find that when companies violate information disclosure rules, the market punishes academic independent directors more severely than nonacademic independent directors for these violations. Furthermore, companies employing punished academic directors face greater declines in their stock price than companies employing punished nonacademic independent directors during a relatively short window before or after the punishment is announced. The punishment of academic independent directors influences the employment of other scholars in the same field and results in a negative overflow effect. This study provides evidence of the market's differential reactions to independent directors with different backgrounds; the findings reflect the double-edged sword of one individual's reputation on organizations.
文摘With the rapid load increase in some countries such as China, power grids are becoming more strongly interconnected, and the differences between peak and valley loads are also increasing. As a result, some bulk power systems are facing high voltage limit violations during light-load periods. This paper proposes to utilize transmission switching(TS) to eliminate voltage violations. The TS problem is formed as a mixed-integer nonlinear program(MINLP) with AC power flow constraints and binary variables. The proposed MINLP problem is non-deterministic polynomial hard.To efficiently solve the problem, a decomposition approach is developed. This approach decomposes the original problem into a mixedinteger linear programming master problem and an AC optimal power flow slave problem that is used to check the AC feasibility. Prevention of islanding is also taken into consideration to ensure the feasibility of the TS results.The modified IEEE 39-bus and IEEE 57-bus test systems are used to demonstrate the applicability and effectiveness of the proposed method.
基金Supported by National Natural Science Foundation of China (12105149,11775024 and 11947001)Natural Science Foundation of Zhejiang Province(LQ21A050005)+1 种基金Ningbo Natural Science Foundation (2021J180)the Fundamental Research Funds for the Provincial Universities of Zhejiang Province。
文摘In the framework of the QCD factorization approach,we study the localized CP violations of the B^(-)→K^(-)π^(+)(π)^(-)decay with and without the a_(0)^(0)(980)-f_(0)(980) mixing mechanism and observe that the localized CP violation can be enhanced by this mixing effect when the mass of the π^(+)(π)^(-)pair is in the vicinity of the f_(0)(980) resonance.The corresponding theoretical prediction results are A_(CP)(B^(-)→Kf_(0)→K^(-)π^(+)(π)^(-))=[0.126,0.338](0.232±0.106 with the central value form) and A_(CP)(B^(-)→K^(-)f_(0)(a_0)→K^(-)π^(+)(π)^(-))=[0.230,0.615](0.423±0.193 with the central value form),respectively.Meanwhile,we also calculate the branching fraction of the B^(-)→K^(-)f_(0)(980)→K^(-)π^(+)(π)^(-)decay,which is consistent with the experimental results.We suggest that the a_(0)^(0)(980)-f_(0)(980) mixing mechanism should be considered when theoretically and experimentally studying the CP violation of the B or D meson decays.
文摘Contrary to the approach in judicial practice,Paragraph 1,Article 153,of the Civil Code of the People’s Republic of China,as a rule of invalidity for violating mandatory provisions,does not adopt a dichotomy towards mandatory provisions with effectiveness and administrative characteristics,yet it maintains the legislative philosophy of differentiation.It leaves unspecified whether mandatory provisions that do not explicitly render a juristic act invalid impact the act’s validity,entrusting this determination to the discretion of judges on a case-by-case basis.When judges,under the authority of Paragraph 1,Article 153 of the Civil Code,explore the normative intent of mandatory provisions to assess their effect on the validity of juristic acts,they should engage in legal policy analysis centered on consequence-based argumentation to overcome the limitations of norm typological analysis.This analysis employs a reasoning model predicated on the normative purpose,utilizing a consequencefocused interpretative approach for formulating and arguing propositions of rules applicable to pending cases,thereby arriving at case-specific conclusions.Since the invalidation of juristic acts serves as an auxiliary regulatory tool for the state economy and society,a consequence-oriented interpretation needs to be based on the idea of mutual instrumentalization of public and private laws.This entails predicting the outcomes of negating the validity of a juristic act in industrial regulatory scenarios and assessing these outcomes within the framework of public and private regulatory instruments.
文摘Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising tool for checking and constraining any deviations from Lorentz Invariance due to their huge energies and cosmological distances. Gamma-ray bursts, which are the most intense and powerful explosions in the universe, are traditionally divided into long bursts whose observed duration exceeds 2 s, and short bursts whose observed duration is less than 2 s. In this study, we employ a recent sample of 46 short GRBs to check for any deviation from Lorentz Invariance. We analyze the spectral lag of the bursts in our data sample and check for any redshift dependence in the GRB rest frame, which would indicate a violation of Lorentz Invariance. Our results are consistent, to within 1σ, with no deviation from Lorentz Invariance.
文摘Bicycling is an important way for college students and employees to get around campuses. With a rise in bicycling on campuses there comes a rise in bicycle collisions with pedestrians walking to and from classes and work. The literature review showed many papers involving bicycle conflict modeling but on roads with motor vehicles. While some aspects of this research can be applied to non-motorized paths, there is a lack of research strictly focusing on only bicycles and pedestrians. This study aims to fill this knowledge gap by developing a model to identify locations on roads and paths (hotspots) on college campuses that are likely to have a bicycle collision and predict the likelihood of a serious bicycle crash on a non-motorized path based on the characteristics of the path. This study identifies those interactions between bicyclists and pedestrians on non-motorized paths on a suburban college campus in Newark, USA. Findings suggest that pedestrian density of a path is a major factor in the maximum speed bicyclists can achieve. The wider the path is, the higher the maximum speed is that a bicyclist can obtain. This is because a wider path width decreases the pedestrian density. The grade of the path has little effect on bicycle speeds. The results of the models were displayed on a GIS map that is visually appealing to a viewer. The paths were color coded based on their level of safety, so it is easy to observe problematic areas of the network. This technique can be applied to the entire campus network of non-motorized paths to study the whole system. This can then be used by planners and designers to identify areas that need upgrading and improve the overall safety of the non-motorized path system.
文摘Non-iterative analysis of indentation results allows for the detection of phase transitions under load and their transition energy. The closed algebraic equations have been deduced on the basis of the physically founded normal force ?depth3/2 relation. The precise transition onset position is obtained by linear regression of the FN = kh3/2 plot, where k is the penetration resistance, which also provides the axis cuts of both polymorphs of first order phase transitions. The phase changes can be endothermic or exothermic. They are normalized per μN or mN normal load. The analyses of indentation loading curves with self-similar diamond indenters are used as validity check of the loading curves, also from calibration standards that exhibit previously undetected phase-transitions and are thus incorrect. The phase-transition energies for fused quartz are determined from the loading curves from instrument provider handbooks. The anisotropic behavior of phase transition energies is studied for the first time. Quartz is a useful test object. The reasons for the packing-dependent differences are discussed on the basis of the local crystal structure under and around the inserting tip.
基金financial support of the Australian Research Council (DP210101281)。
文摘There has been a wealth of research that has examined the nature of rework in construction.Progress toward addressing the rework problem has been limited-it still plagues practice,adversely impacting a project’s performance.Almost all rework studies have focused on determining its proximal or root causes and therefore have overlooked the conditions that result from its manifestation.In filling this void,this paper draws upon our previous empirical studies,amongst others,to provide a much-needed theoretical framing to understand better why rework occurs,what its consequences are,and how it can be mitigated during construction.The theoretical framing we derive from our review provides construction organizations and their projects with a realization that the journey to mitigating rework begins with creating an error-mastery culture comprising authentic leadership,psychological safety,an errormanagement orientation,and resilience.We suggest that,once an error-mastery culture is established within construction organizations and their projects,they will be better positioned to realize the benefits of the techniques,tools,and technologies espoused to address rework,such as the Last Planner® and building information modeling.We also provide directions for future research and identify implications for practice so that strides toward rework mitigation in construction can be made.