Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin...Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures.展开更多
At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of dispute...At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated.展开更多
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie...Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.展开更多
A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional con...A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional constraint violation stabilization method are determined according to the integration time step size and Taylor expansion method automatically. The direct integration method, the traditional constraint violation stabilization method and the new method presented in this paper are compared finally.展开更多
A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS...A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS) metrics from the conventional physical-layer channel models, the link-layer models named effective bandwidth and effective capacity are applied to statistically characterize the source traffic patterns and the queuing service dynamics. With these link-layer models, the source traffic process and the channel service process are mapped to certain QoS parameters. The packet delay-bound violation probability constraints are converted into minimum data rate constraints and the optimization problem is thus formulated into simultaneous inequalities. With the assumption of ergodic block-fading channels, the optimal frame lengths of single-user and multiuser systems are calculated respectively by numerical iterative methods. Theoretical analyses and simulation results show that the given delay-bound violation probability constraints are well satisfied with the optimal frame length.展开更多
Contrary to the approach in judicial practice,Paragraph 1,Article 153,of the Civil Code of the People’s Republic of China,as a rule of invalidity for violating mandatory provisions,does not adopt a dichotomy towards ...Contrary to the approach in judicial practice,Paragraph 1,Article 153,of the Civil Code of the People’s Republic of China,as a rule of invalidity for violating mandatory provisions,does not adopt a dichotomy towards mandatory provisions with effectiveness and administrative characteristics,yet it maintains the legislative philosophy of differentiation.It leaves unspecified whether mandatory provisions that do not explicitly render a juristic act invalid impact the act’s validity,entrusting this determination to the discretion of judges on a case-by-case basis.When judges,under the authority of Paragraph 1,Article 153 of the Civil Code,explore the normative intent of mandatory provisions to assess their effect on the validity of juristic acts,they should engage in legal policy analysis centered on consequence-based argumentation to overcome the limitations of norm typological analysis.This analysis employs a reasoning model predicated on the normative purpose,utilizing a consequencefocused interpretative approach for formulating and arguing propositions of rules applicable to pending cases,thereby arriving at case-specific conclusions.Since the invalidation of juristic acts serves as an auxiliary regulatory tool for the state economy and society,a consequence-oriented interpretation needs to be based on the idea of mutual instrumentalization of public and private laws.This entails predicting the outcomes of negating the validity of a juristic act in industrial regulatory scenarios and assessing these outcomes within the framework of public and private regulatory instruments.展开更多
This paper develops a model that could be used to visualize and predict the violation of restrictions in a given forest. The violation of restriction in this case is assumed to be the difference in areal extent betwee...This paper develops a model that could be used to visualize and predict the violation of restrictions in a given forest. The violation of restriction in this case is assumed to be the difference in areal extent between two forest cover scenes with time;termed “deforestation”. It analyses the relationship in forest cover changes overtime in Ganye Forest Reserve and Glide Cross Country Farm in Adamawa state, Nigeria. Cadastral maps of the forest reserve and farmland were used as the base maps, while the satellite images served as the spatio-temporal data. Landsat ETM+ images of 2003, 2008 and 2013 were used to identify, determine and estimate the violation of restrictions. The result shows that the violation of restrictions could be reliably determined for both the forest reserve and farmland and forecast made in order to predict future occurrence. It also revealed a continuous deforestation in the forest reserve, while in the farmland regeneration of forest stock was noticed. This information is very vital for forest management, planning and decision making in a viable land administration domain.展开更多
The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually ente...The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard.展开更多
Road safety is still an important issue with road accidents among the leading causes of death accounting for more than 1.2 million fatalities and 50 million injuries globally per year. Of these casualties, speeding is...Road safety is still an important issue with road accidents among the leading causes of death accounting for more than 1.2 million fatalities and 50 million injuries globally per year. Of these casualties, speeding is a substantial contributing factor. Nowadays, speed reduction is mainly achieved through speed law enforcement measures. The review is aimed at examining the different enforcement approaches used to control and monitor excessive speeds on highways at large and particularly in Cameroon. A systematic search was performed in Science Direct, Elsevier, google scholar, scientific research, and Springer, ResearchGate, Scopus, and PubMed databases. Furthermore, references of selected articles were reviewed to maximize the rate of articles found. The details of the research articles were generated using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) flow chart. The results show that of 658 retried articles, duplicates of 458 were excluded and 200 were screened. A total of 61 and 40 articles were screened from abstract and full pdf text respectively. Finally, 15 relevant studies were included in the study. The review revealed that the included articles on speed enforcement on the highway were limited to sanctioning defaulters for fine payments.展开更多
This paper purposes an explanation for the recent evidence for the violation of lepton universality in beauty-quark decays at CERN’s Large Hadron Collider. A beauty meson (B<sup>+</sup>) transforms into a...This paper purposes an explanation for the recent evidence for the violation of lepton universality in beauty-quark decays at CERN’s Large Hadron Collider. A beauty meson (B<sup>+</sup>) transforms into a strange meson (K<sup>+</sup>) with the emission of either electron-positron (e<sup>+</sup>e<sup>-</sup>) or muon-antimuon (<span style="white-space:nowrap;"><em>μ</em></span><sup>+</sup><em>μ</em><sup>-</sup>). The ratio (<em>R</em><sub>K</sub>) of branching fractions for B<sup>+ </sup><span style="white-space:nowrap;">→</span> K<sup>+</sup><em>μ</em><sup>+</sup><em>μ</em><sup>- </sup>and B<sup>+</sup><span style="white-space:nowrap;">→</span> K<sup>+</sup>e<sup>+</sup>e<sup>-</sup> decays is measured to be <em>R</em><sub>K</sub> = 0.846 instead of 1 in the violation of lepton universality in the Standard Model. This paper proposes that the violation is derived from the binary isotope mixture of two beauty-quarks, b<sub>7</sub> (4979 MeV mass) and b<sub>8</sub> (143,258 MeV mass) whose masses are calculated from the periodic table of elementary particles. b<sub>7</sub> is the observable B, while b<sub>8</sub> is the hidden B to preserve the generation number symmetry between the three lepton family generations and the three quark family generations in the Standard Model. The preservation of the generation number symmetry forbids b<sub>8</sub> to decay into K<sup>+</sup><em>μ</em><sup>+</sup><em>μ</em><sup>-</sup>. In the transition state involving the virtual particles (<span style="white-space:nowrap;"><em>γ</em></span>, W± and Z<span style="white-space:nowrap;">°</span>) before the decay, b<sub>7</sub> and b<sub>8</sub> emerge to form the binary isotope mixture from B. The rates of emergence as the rates of diffuse in Graham’s law of diffusion are proportional to inverse square root of mass. The rate ratio between b<sub>8</sub>/b<sub>7</sub> is (4979/143,258)<sup>1/2</sup> = 0.1864. Since b<sub>7</sub> decays into K<sup>+</sup>, e<sup>+</sup>e<sup>-</sup>, and <em>μ</em><sup>+</sup><em>μ</em><sup>-</sup>, while b<sub>8</sub> decays into K<sup>+</sup>, e<sup>+</sup>e<sup>-</sup>, and forbidden <em>μ</em><sup>+</sup><em>μ</em><sup>-</sup>, the calculated ratio (RK) of branching fractions for B<sup>+</sup><span style="white-space:nowrap;">→</span> K<sup>+</sup><em>μ</em><sup>+</sup><em>μ</em><sup>-</sup> and B<sup>+</sup><span style="white-space:nowrap;">→</span> K<sup>+</sup>e<sup>+</sup>e<sup>- </sup>is 0.5/(0.1864 × 0.5+ 0.5) = 0.843 in excellent agreement with the observed 0.846. The agreement between the calculated RK and the observed RK confirms the validity of the periodic table of elementary particles which provides the answers for the dominance of matter over antimatter, dark-matter, and the mass hierarchy of elementary particles.展开更多
A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early u...A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early universe Lorentz Violation. The author asserts that the existence of early universe Lorentz violation in turn is assisting in a breakup of primordial black holes. And that also has a tie into Kieffer different time steps as outlined. And the wrap up is given in the final part of this document.展开更多
Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaire...Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors.展开更多
The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvant...The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers.展开更多
Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to ...Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language.展开更多
Projected Runge-Kutta (R-K) methods for constrained Hamiltonian systems are proposed. Dynamic equations of the systems, which are index-3 differential-algebraic equations (DAEs) in the Heisenberg form, are establi...Projected Runge-Kutta (R-K) methods for constrained Hamiltonian systems are proposed. Dynamic equations of the systems, which are index-3 differential-algebraic equations (DAEs) in the Heisenberg form, are established under the framework of Lagrangian multipliers. R-K methods combined with the technique of projections are then used to solve the DAEs. The basic idea of projections is to eliminate the constraint violations at the position, velocity, and acceleration levels, and to preserve the total energy of constrained Hamiltonian systems by correcting variables of the position, velocity, acceleration, and energy. Numerical results confirm the validity and show the high precision of the proposed method in preserving three levels of constraints and total energy compared with results reported in the literature.展开更多
Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised metho...Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised methods can deal with more complicated problems such as those with nonholonomic constraints or redundant constraints, and save the computation time. Finally a numerical simulation of a multibody system is conducted by using the methods given in this paper.展开更多
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p...For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.展开更多
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e...To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.展开更多
It is proved in this paper that there are at least five situations in the interaction theories of microparticle physics that the Lorentz transformations have no invariabilities. 1) In the formula to calculate transiti...It is proved in this paper that there are at least five situations in the interaction theories of microparticle physics that the Lorentz transformations have no invariabilities. 1) In the formula to calculate transition probabilities in particle physics, the so-called invariability factor of phase space d3p/E is not invariable actually under the Lorentz transformations. Only in one-dimensional motion with uy = uz = 0, it is invariable. 2) The propagation function of spinor field in quantum theory of field has no invariability of Lorentz Transformation actually. What appears in the transformation is the sum of Lorentz factors aμνaλμ ≠ δνλ when ν, λ = 1, 4, rather than aμνaλμ = δνλ. But in the current calculation, we take aμνaλμ = δνλ. The confusion of subscript’s position leads to wrong result. 3) Though the motion equations of quantum fields and the interaction Hamiltonian are unchanged under the Lorentz transformation, the motion equation of perturbation which is used to calculate the transition probability in the interaction representation has no invariability. 4) The interactions between bound state’s particles have no Lorentz invariability. In fact, the principle of relativity has no approximation if it holds. 5) The calculation methods of high order perturbations normalization processes in quantum theory of fields violate the invariability of Lorentz transformation. The conclusions above are effective for strong, weak and electromagnetic interactions and so on. Therefore, the principle of relativity does not hold in the micro-particle’s interactions. On the other hand, the invariability principle of light’s speed is still effective. So the formulas of special relativity still hold, but we should consider them with absolute significances.展开更多
基金funded by the Deanship of Scientific Research at Northern Border University,Arar,Kingdom of Saudi Arabia through Research Group No.(RG-NBU-2022-1234).
文摘Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures.
文摘At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated.
文摘Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.
文摘A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional constraint violation stabilization method are determined according to the integration time step size and Taylor expansion method automatically. The direct integration method, the traditional constraint violation stabilization method and the new method presented in this paper are compared finally.
基金The National Science and Technology M ajor Project(No.2012ZX03004005-003)the National Natural Science Foundation of China(No.61171081,61201175)the Research Fund of National M obile Communications Research Laboratory of Southeast University(No.2014A03)
文摘A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS) metrics from the conventional physical-layer channel models, the link-layer models named effective bandwidth and effective capacity are applied to statistically characterize the source traffic patterns and the queuing service dynamics. With these link-layer models, the source traffic process and the channel service process are mapped to certain QoS parameters. The packet delay-bound violation probability constraints are converted into minimum data rate constraints and the optimization problem is thus formulated into simultaneous inequalities. With the assumption of ergodic block-fading channels, the optimal frame lengths of single-user and multiuser systems are calculated respectively by numerical iterative methods. Theoretical analyses and simulation results show that the given delay-bound violation probability constraints are well satisfied with the optimal frame length.
文摘Contrary to the approach in judicial practice,Paragraph 1,Article 153,of the Civil Code of the People’s Republic of China,as a rule of invalidity for violating mandatory provisions,does not adopt a dichotomy towards mandatory provisions with effectiveness and administrative characteristics,yet it maintains the legislative philosophy of differentiation.It leaves unspecified whether mandatory provisions that do not explicitly render a juristic act invalid impact the act’s validity,entrusting this determination to the discretion of judges on a case-by-case basis.When judges,under the authority of Paragraph 1,Article 153 of the Civil Code,explore the normative intent of mandatory provisions to assess their effect on the validity of juristic acts,they should engage in legal policy analysis centered on consequence-based argumentation to overcome the limitations of norm typological analysis.This analysis employs a reasoning model predicated on the normative purpose,utilizing a consequencefocused interpretative approach for formulating and arguing propositions of rules applicable to pending cases,thereby arriving at case-specific conclusions.Since the invalidation of juristic acts serves as an auxiliary regulatory tool for the state economy and society,a consequence-oriented interpretation needs to be based on the idea of mutual instrumentalization of public and private laws.This entails predicting the outcomes of negating the validity of a juristic act in industrial regulatory scenarios and assessing these outcomes within the framework of public and private regulatory instruments.
文摘This paper develops a model that could be used to visualize and predict the violation of restrictions in a given forest. The violation of restriction in this case is assumed to be the difference in areal extent between two forest cover scenes with time;termed “deforestation”. It analyses the relationship in forest cover changes overtime in Ganye Forest Reserve and Glide Cross Country Farm in Adamawa state, Nigeria. Cadastral maps of the forest reserve and farmland were used as the base maps, while the satellite images served as the spatio-temporal data. Landsat ETM+ images of 2003, 2008 and 2013 were used to identify, determine and estimate the violation of restrictions. The result shows that the violation of restrictions could be reliably determined for both the forest reserve and farmland and forecast made in order to predict future occurrence. It also revealed a continuous deforestation in the forest reserve, while in the farmland regeneration of forest stock was noticed. This information is very vital for forest management, planning and decision making in a viable land administration domain.
基金supported by the Major Com-missioned Project of Social Science Planning Fund of Liaoning Prov-ince,China:“Research on Legal Issues of Cross-border Nuclear Dam-age Compensation in the Context of Japan’s Discharge of Nuclear Sewage”[Grant No.L23ZD072].
文摘The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard.
文摘Road safety is still an important issue with road accidents among the leading causes of death accounting for more than 1.2 million fatalities and 50 million injuries globally per year. Of these casualties, speeding is a substantial contributing factor. Nowadays, speed reduction is mainly achieved through speed law enforcement measures. The review is aimed at examining the different enforcement approaches used to control and monitor excessive speeds on highways at large and particularly in Cameroon. A systematic search was performed in Science Direct, Elsevier, google scholar, scientific research, and Springer, ResearchGate, Scopus, and PubMed databases. Furthermore, references of selected articles were reviewed to maximize the rate of articles found. The details of the research articles were generated using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) flow chart. The results show that of 658 retried articles, duplicates of 458 were excluded and 200 were screened. A total of 61 and 40 articles were screened from abstract and full pdf text respectively. Finally, 15 relevant studies were included in the study. The review revealed that the included articles on speed enforcement on the highway were limited to sanctioning defaulters for fine payments.
文摘This paper purposes an explanation for the recent evidence for the violation of lepton universality in beauty-quark decays at CERN’s Large Hadron Collider. A beauty meson (B<sup>+</sup>) transforms into a strange meson (K<sup>+</sup>) with the emission of either electron-positron (e<sup>+</sup>e<sup>-</sup>) or muon-antimuon (<span style="white-space:nowrap;"><em>μ</em></span><sup>+</sup><em>μ</em><sup>-</sup>). The ratio (<em>R</em><sub>K</sub>) of branching fractions for B<sup>+ </sup><span style="white-space:nowrap;">→</span> K<sup>+</sup><em>μ</em><sup>+</sup><em>μ</em><sup>- </sup>and B<sup>+</sup><span style="white-space:nowrap;">→</span> K<sup>+</sup>e<sup>+</sup>e<sup>-</sup> decays is measured to be <em>R</em><sub>K</sub> = 0.846 instead of 1 in the violation of lepton universality in the Standard Model. This paper proposes that the violation is derived from the binary isotope mixture of two beauty-quarks, b<sub>7</sub> (4979 MeV mass) and b<sub>8</sub> (143,258 MeV mass) whose masses are calculated from the periodic table of elementary particles. b<sub>7</sub> is the observable B, while b<sub>8</sub> is the hidden B to preserve the generation number symmetry between the three lepton family generations and the three quark family generations in the Standard Model. The preservation of the generation number symmetry forbids b<sub>8</sub> to decay into K<sup>+</sup><em>μ</em><sup>+</sup><em>μ</em><sup>-</sup>. In the transition state involving the virtual particles (<span style="white-space:nowrap;"><em>γ</em></span>, W± and Z<span style="white-space:nowrap;">°</span>) before the decay, b<sub>7</sub> and b<sub>8</sub> emerge to form the binary isotope mixture from B. The rates of emergence as the rates of diffuse in Graham’s law of diffusion are proportional to inverse square root of mass. The rate ratio between b<sub>8</sub>/b<sub>7</sub> is (4979/143,258)<sup>1/2</sup> = 0.1864. Since b<sub>7</sub> decays into K<sup>+</sup>, e<sup>+</sup>e<sup>-</sup>, and <em>μ</em><sup>+</sup><em>μ</em><sup>-</sup>, while b<sub>8</sub> decays into K<sup>+</sup>, e<sup>+</sup>e<sup>-</sup>, and forbidden <em>μ</em><sup>+</sup><em>μ</em><sup>-</sup>, the calculated ratio (RK) of branching fractions for B<sup>+</sup><span style="white-space:nowrap;">→</span> K<sup>+</sup><em>μ</em><sup>+</sup><em>μ</em><sup>-</sup> and B<sup>+</sup><span style="white-space:nowrap;">→</span> K<sup>+</sup>e<sup>+</sup>e<sup>- </sup>is 0.5/(0.1864 × 0.5+ 0.5) = 0.843 in excellent agreement with the observed 0.846. The agreement between the calculated RK and the observed RK confirms the validity of the periodic table of elementary particles which provides the answers for the dominance of matter over antimatter, dark-matter, and the mass hierarchy of elementary particles.
文摘A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early universe Lorentz Violation. The author asserts that the existence of early universe Lorentz violation in turn is assisting in a breakup of primordial black holes. And that also has a tie into Kieffer different time steps as outlined. And the wrap up is given in the final part of this document.
基金The National Key Technology R&D Program during the 11th Five-Year Plan Period(No.2009BAG13A05)the National Natural Science Foundation of China(No.51078086)
文摘Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors.
文摘The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers.
文摘Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language.
基金Project supported by the National Natural Science Foundation of China(No.11432010)the Doctoral Program Foundation of Education Ministry of China(No.20126102110023)+2 种基金the 111Project of China(No.B07050)the Fundamental Research Funds for the Central Universities(No.310201401JCQ01001)the Innovation Foundation for Doctor Dissertation of Northwestern Polytechnical University(No.CX201517)
文摘Projected Runge-Kutta (R-K) methods for constrained Hamiltonian systems are proposed. Dynamic equations of the systems, which are index-3 differential-algebraic equations (DAEs) in the Heisenberg form, are established under the framework of Lagrangian multipliers. R-K methods combined with the technique of projections are then used to solve the DAEs. The basic idea of projections is to eliminate the constraint violations at the position, velocity, and acceleration levels, and to preserve the total energy of constrained Hamiltonian systems by correcting variables of the position, velocity, acceleration, and energy. Numerical results confirm the validity and show the high precision of the proposed method in preserving three levels of constraints and total energy compared with results reported in the literature.
基金Project supported by the National Natural Science Foundation of China (No. 19902006).
文摘Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised methods can deal with more complicated problems such as those with nonholonomic constraints or redundant constraints, and save the computation time. Finally a numerical simulation of a multibody system is conducted by using the methods given in this paper.
基金National Natural Science Foundation of China under Grant No.60873213,91018008 and 61070192Beijing Science Foundation under Grant No. 4082018Shanghai Key Laboratory of Intelligent Information Processing of China under Grant No. IIPL-09-006
文摘For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.
基金The National Key Research and Development Program of China(No.2019YFB1600200).
文摘To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.
文摘It is proved in this paper that there are at least five situations in the interaction theories of microparticle physics that the Lorentz transformations have no invariabilities. 1) In the formula to calculate transition probabilities in particle physics, the so-called invariability factor of phase space d3p/E is not invariable actually under the Lorentz transformations. Only in one-dimensional motion with uy = uz = 0, it is invariable. 2) The propagation function of spinor field in quantum theory of field has no invariability of Lorentz Transformation actually. What appears in the transformation is the sum of Lorentz factors aμνaλμ ≠ δνλ when ν, λ = 1, 4, rather than aμνaλμ = δνλ. But in the current calculation, we take aμνaλμ = δνλ. The confusion of subscript’s position leads to wrong result. 3) Though the motion equations of quantum fields and the interaction Hamiltonian are unchanged under the Lorentz transformation, the motion equation of perturbation which is used to calculate the transition probability in the interaction representation has no invariability. 4) The interactions between bound state’s particles have no Lorentz invariability. In fact, the principle of relativity has no approximation if it holds. 5) The calculation methods of high order perturbations normalization processes in quantum theory of fields violate the invariability of Lorentz transformation. The conclusions above are effective for strong, weak and electromagnetic interactions and so on. Therefore, the principle of relativity does not hold in the micro-particle’s interactions. On the other hand, the invariability principle of light’s speed is still effective. So the formulas of special relativity still hold, but we should consider them with absolute significances.