期刊文献+
共找到3,114篇文章
< 1 2 156 >
每页显示 20 50 100
Fermions: Spin, Hidden Variables, Violation of Bell’s Inequality and Quantum Entanglement
1
作者 Doron Kwiat 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1613-1627,共15页
Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co... Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables. 展开更多
关键词 FERMIONS SPIN Hidden Variables Bell’s Inequality violation Spin Entanglement
下载PDF
Determination of Liability for Violation of “Sexual Autonomy” and Compensation for Mental Damages
2
作者 姚邢 JIANG Lin(Translated) 《The Journal of Human Rights》 2024年第2期347-372,共26页
At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of dispute... At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated. 展开更多
关键词 sexual autonomy personality rights violationS liability investigation
下载PDF
A Study of Triangle Inequality Violations in Social Network Clustering
3
作者 Sanjit Kumar Saha Tapashi Gosswami 《Journal of Computer and Communications》 2024年第1期67-76,共10页
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie... Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters. 展开更多
关键词 CLUSTERING Triangle Inequality violations Traditional Clustering Graph Clustering
下载PDF
The Equation for the CP Violating Phase for Quarks: The Rule for the Sum of Quark Oscillation Probabilities
4
作者 Zoran B. Todorovic 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1835-1865,共31页
By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an... By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an unknown quantity. Quark oscillations occur in spaces that are on the femtometer scale and they are unmeasurable from the point of view of experiments. However, the consequence of those oscillations is the CP violating phase for quarks, which is measured through unitary triangles in Wolfenstein’s parameterization. Through the mathematical model presented in this paper, the equation in Wolfenstein’s parameterization was derived, the root of which is consistent with measurements in today’s quark physics. 展开更多
关键词 QUARKS CKM Matrix PMNS Matrix Wolfenstein Parameterization CP violation Phase Jarlskog Invariant
下载PDF
Addressing Japan’s disposal of nuclear-contaminated water from the perspective of international human rights law
5
作者 Yen-Chiang Chang Xiaonan Zhao 《Chinese Journal of Population,Resources and Environment》 2024年第1期1-9,共9页
The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually ente... The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard. 展开更多
关键词 Fukushima nuclearcontaminated water Crimes against humanity Remedy for violations of human rights Right to environment Right to life
下载PDF
Analysis of Distribution Generation Influences on the Vol-tage Limit Violation Probability of Distribution Line
6
作者 Lu Zhang Wei Tang +1 位作者 Muke Bai Pengwei Cong 《Energy and Power Engineering》 2013年第4期756-762,共7页
Considering the time-sequence characteristic and randomness of load and natural resources, ?this paper studies on the distributed generation (DG) impacts on voltage limit violation probability of distribution lines. T... Considering the time-sequence characteristic and randomness of load and natural resources, ?this paper studies on the distributed generation (DG) impacts on voltage limit violation probability of distribution lines. The time-sequence characteristic and randomness of load, wind and photovoltaic (PV) generation are analyzed;the indices and risk levels of voltage limit violation probability of node and distribution line are proposed. By using probabilistic load flow based on semi-invariant method, the impact degrees of voltage limit violation are calculated with different distributed power penetration levels, different seasons, different time periods, different allocation ratio between the wind power and PV power. Voltage limit violation laws of distribution line, which are concluded by IEEE33 bus system simulation, are very helpful to guide the voltage?regulation of distribution line including distributed generation. 展开更多
关键词 DISTRIbutION Generation DISTRIbutION Line Voltage LIMIT violation PROBABILITY Time-sequence Characteristic RANDOMNESS
下载PDF
Characteristics and risk of violation behavior of non-motorists at signalized intersections 被引量:6
7
作者 赵星 任刚 +2 位作者 杜轩 王鹏 王卫杰 《Journal of Southeast University(English Edition)》 EI CAS 2011年第4期423-429,共7页
Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaire... Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors. 展开更多
关键词 traffic violation behavior traffic safety non- motorist signal intersection
下载PDF
The Violation of Cooperative Principle and English Teaching
8
作者 张大海 《海外英语》 2013年第21期291-293,共3页
The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvant... The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers. 展开更多
关键词 violation COOPERATIVE PRINCIPLE ENGLISH TEACHING i
下载PDF
On the Causes of the Violation of Cooperative Principle 被引量:1
9
作者 朱毅 刘爱玲 《海外英语》 2015年第19期217-218,共2页
Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to ... Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language. 展开更多
关键词 COOPERATIVE PRINCIPLE violation CAUSES
下载PDF
CONSTRAINT VIOLATION STABILIZATION OF EULER-LAGRANGE EQUATIONS WITH NON-HOLONOMIC CONSTRAINTS 被引量:2
10
作者 ZhaoWeijia PanZhenkuan ChenLiqun 《Acta Mechanica Solida Sinica》 SCIE EI 2004年第1期45-51,共7页
Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised metho... Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised methods can deal with more complicated problems such as those with nonholonomic constraints or redundant constraints, and save the computation time. Finally a numerical simulation of a multibody system is conducted by using the methods given in this paper. 展开更多
关键词 Euler-Lagrange equation nonholonomic constraint constraint violation stabiliza- tion redundant constraint
下载PDF
AN AUTOMATIC CONSTRAINT VIOLATION STABI- LIZATION METHOD FOR DIFFERENTIAL/ ALGEBRAIC EQUATIONS OF MOTION IN MULTIBODY SYSTEM DYNAMICS 被引量:1
11
作者 赵维加 潘振宽 王艺兵 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2000年第1期105-110,共6页
A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional con... A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional constraint violation stabilization method are determined according to the integration time step size and Taylor expansion method automatically. The direct integration method, the traditional constraint violation stabilization method and the new method presented in this paper are compared finally. 展开更多
关键词 dynamics of multibody systems Euler_Lagrange equations constraint violation stabilization
下载PDF
SVR-Miner:Mining Security Validation Rules and Detecting Violations in Large Software 被引量:1
12
作者 梁彬 谢素斌 +2 位作者 石文昌 梁朝晖 陈红 《China Communications》 SCIE CSCD 2011年第4期84-98,共15页
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p... For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently. 展开更多
关键词 static analysis data mining automated validation rules extraction automated violation detection
下载PDF
Impact of Mandatory Provisions on the Validity of Juristic Acts: A Path for Legal Policy Analysis
13
作者 Wang Kun 《Contemporary Social Sciences》 2023年第6期1-19,共19页
Contrary to the approach in judicial practice,Paragraph 1,Article 153,of the Civil Code of the People’s Republic of China,as a rule of invalidity for violating mandatory provisions,does not adopt a dichotomy towards ... Contrary to the approach in judicial practice,Paragraph 1,Article 153,of the Civil Code of the People’s Republic of China,as a rule of invalidity for violating mandatory provisions,does not adopt a dichotomy towards mandatory provisions with effectiveness and administrative characteristics,yet it maintains the legislative philosophy of differentiation.It leaves unspecified whether mandatory provisions that do not explicitly render a juristic act invalid impact the act’s validity,entrusting this determination to the discretion of judges on a case-by-case basis.When judges,under the authority of Paragraph 1,Article 153 of the Civil Code,explore the normative intent of mandatory provisions to assess their effect on the validity of juristic acts,they should engage in legal policy analysis centered on consequence-based argumentation to overcome the limitations of norm typological analysis.This analysis employs a reasoning model predicated on the normative purpose,utilizing a consequencefocused interpretative approach for formulating and arguing propositions of rules applicable to pending cases,thereby arriving at case-specific conclusions.Since the invalidation of juristic acts serves as an auxiliary regulatory tool for the state economy and society,a consequence-oriented interpretation needs to be based on the idea of mutual instrumentalization of public and private laws.This entails predicting the outcomes of negating the validity of a juristic act in industrial regulatory scenarios and assessing these outcomes within the framework of public and private regulatory instruments. 展开更多
关键词 rule of invalidity for violating mandatory provisions juristic acts legal policy analysis consequencebased argumentation REGULATION
下载PDF
AI-Based Helmet Violation Detection for Traffic Management System
14
作者 Yahia Said YahyaAlassaf +5 位作者 Refka Ghodhbani Yazan Ahmad Alsariera Taoufik Saidani Olfa Ben Rhaiem Mohamad Khaled Makhdoum Manel Hleili 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期733-749,共17页
Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin... Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures. 展开更多
关键词 Non-helmet use detection traffic violation SAFETY deep learning optimized PerspectiveNet
下载PDF
Response of Nitrous Oxide Flux to Addition of Anecic Earthworms to an Agricultural Field
15
作者 José A. Amador Edward J. Avizinis 《Open Journal of Soil Science》 2013年第2期100-106,共7页
The burrowing and feeding activities of earthworms may have a strong effect on the flux of N2O from agricultural soils. As such, shifts to agricultural management practices that increase the number of earthworms requi... The burrowing and feeding activities of earthworms may have a strong effect on the flux of N2O from agricultural soils. As such, shifts to agricultural management practices that increase the number of earthworms require an understanding of the role of earthworms in N2O dynamics. We conducted a field experiment to examine the effects of addition of anecic earthworms (Lumbricus terrestris) on N2O flux in a field previously planted with corn (Zea mays) in southern Rhode Island, USA. Plots were amended with (15NH4)2SO4 and either 0 (CTL) or 48 L. terrestris m-2 (EW). The flux of N2O, 15N2O and 15N2 was measured over 28 days between October and November 2008. The EW treatment had a significantly higher flux of N2O and 15N2O 1 - 3 days after 15NH4 addition. No treatment effects were observed on 15N2 flux. The addition of earthworms significantly increased (Day 1) and decreased (Day 12) the mole fraction of N2O relative to the CTL. Our results suggest that anecic earthworm additions can increase N2O flux from inorganic fertilizer N amendments, but the effects appear to short-lived. 展开更多
关键词 Lumbricus terrestris anecic Earthworms FERTILIZER Nitrogen Nitrous OXIDE FLUX DENITRIFICATION
下载PDF
Modelling the Violation of Restrictions Pertaining to Deforestation in a Given Land Right
16
作者 Anthony G. Tumba Shahidah Bte Mohd Ariff 《Journal of Environmental Protection》 2015年第11期1219-1235,共17页
This paper develops a model that could be used to visualize and predict the violation of restrictions in a given forest. The violation of restriction in this case is assumed to be the difference in areal extent betwee... This paper develops a model that could be used to visualize and predict the violation of restrictions in a given forest. The violation of restriction in this case is assumed to be the difference in areal extent between two forest cover scenes with time;termed “deforestation”. It analyses the relationship in forest cover changes overtime in Ganye Forest Reserve and Glide Cross Country Farm in Adamawa state, Nigeria. Cadastral maps of the forest reserve and farmland were used as the base maps, while the satellite images served as the spatio-temporal data. Landsat ETM+ images of 2003, 2008 and 2013 were used to identify, determine and estimate the violation of restrictions. The result shows that the violation of restrictions could be reliably determined for both the forest reserve and farmland and forecast made in order to predict future occurrence. It also revealed a continuous deforestation in the forest reserve, while in the farmland regeneration of forest stock was noticed. This information is very vital for forest management, planning and decision making in a viable land administration domain. 展开更多
关键词 violation of Restrictions DEFORESTATION MODEL LAND RIGHT
下载PDF
Using Excel to Explore the Effects of Assumption Violations on One-Way Analysis of Variance (ANOVA) Statistical Procedures
17
作者 William Laverty Ivan Kelly 《Open Journal of Statistics》 2019年第4期458-469,共12页
To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violation... To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program. 展开更多
关键词 EXCEL One-Way ANOVA ASSUMPTION violationS T-DISTRIbutION CAUCHY Distribution
下载PDF
Estimation of Probability of Swarming Pedestrians' Violation at Signalized Intersections in Developing Cities
18
作者 李迎峰 史忠科 周致纳 《Journal of Southwest Jiaotong University(English Edition)》 2009年第1期80-85,共6页
We made an on-site investigation about pedestrian violation of traffic signals at a signalized intersection in Xi'an, Shaanxi province, China. Based on it, we studied the impact of pedestrian's waiting time on viola... We made an on-site investigation about pedestrian violation of traffic signals at a signalized intersection in Xi'an, Shaanxi province, China. Based on it, we studied the impact of pedestrian's waiting time on violation decision and the impact of the number of pedestrians in colony on the probability of swarming pedestrians' violation. The result revealed that the probability of pedestrian violation rose with the waiting time for the pedestrians' green signal. Then we developed a Monte Carlo model for simulating mixed vehicles and pedestrians and used the on-site investigation data to validate the model. When traffic volume is fight, the error between the simulated values and the measured ones is 2.67%. When traffic volume is heavy, the error is 3.38%. 展开更多
关键词 Pedestrian violation Population effect Signalized intersection Developing cities Monte Carlo method
下载PDF
Effects of R-parity Violation on the Charged Higgs Boson Decays
19
作者 SONGYi-Ping LIChong-Sheng LIQiang LIUJian-Jun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第5期873-878,共6页
We calculate one-loop R-parity-violating coupling corrections to theprocesses H~- → τv_τ and H~- → bt. We find that the corrections to the H~- → τv_τ decay modeare generally about 0.1%, and can be negligible. B... We calculate one-loop R-parity-violating coupling corrections to theprocesses H~- → τv_τ and H~- → bt. We find that the corrections to the H~- → τv_τ decay modeare generally about 0.1%, and can be negligible. But the corrections to the H~- → bt decay mode canreach a few percent for the favored parameters. 展开更多
关键词 radiative correction charged Higgs decay R-parity violating SUPERSYMMETRY
下载PDF
Symmetry Violation of Time Reversal in Third Order Vertex Angle Renormalization Process of Electromagnetic Interaction
20
作者 Xiaochun Mei 《Journal of Modern Physics》 2012年第1期43-47,共5页
According to the current understanding, electromagnetic interaction is invariable under time reversal. However, the proof of time reversal symmetry in quantum theory of field has not considered the effects of high ord... According to the current understanding, electromagnetic interaction is invariable under time reversal. However, the proof of time reversal symmetry in quantum theory of field has not considered the effects of high order perturbation normalizations. It is proved in the paper that when the renormalization effect of third order vertex angles process is taken into account, the symmetry of time reversal will be violated in electromagnetic interaction process. Because the magnitude order of symmetry violation is about 10–5, but the precision of current experiments on time reversal in particle physics is about 10–3, this kind of symmetry violation can not be found. The result reveals the micro-origin of asymmetry of time reversal and can be used to solve the famous irreversibility paradox in the evolution processes of macro- material systems. 展开更多
关键词 Quantum Theory of Field SYMMETRY Time Reversal T violationS Normalization Vertex Angle PROCESS
下载PDF
上一页 1 2 156 下一页 到第
使用帮助 返回顶部