The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually ente...The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard.展开更多
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie...Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.展开更多
Contrary to the approach in judicial practice,Paragraph 1,Article 153,of the Civil Code of the People’s Republic of China,as a rule of invalidity for violating mandatory provisions,does not adopt a dichotomy towards ...Contrary to the approach in judicial practice,Paragraph 1,Article 153,of the Civil Code of the People’s Republic of China,as a rule of invalidity for violating mandatory provisions,does not adopt a dichotomy towards mandatory provisions with effectiveness and administrative characteristics,yet it maintains the legislative philosophy of differentiation.It leaves unspecified whether mandatory provisions that do not explicitly render a juristic act invalid impact the act’s validity,entrusting this determination to the discretion of judges on a case-by-case basis.When judges,under the authority of Paragraph 1,Article 153 of the Civil Code,explore the normative intent of mandatory provisions to assess their effect on the validity of juristic acts,they should engage in legal policy analysis centered on consequence-based argumentation to overcome the limitations of norm typological analysis.This analysis employs a reasoning model predicated on the normative purpose,utilizing a consequencefocused interpretative approach for formulating and arguing propositions of rules applicable to pending cases,thereby arriving at case-specific conclusions.Since the invalidation of juristic acts serves as an auxiliary regulatory tool for the state economy and society,a consequence-oriented interpretation needs to be based on the idea of mutual instrumentalization of public and private laws.This entails predicting the outcomes of negating the validity of a juristic act in industrial regulatory scenarios and assessing these outcomes within the framework of public and private regulatory instruments.展开更多
Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising to...Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising tool for checking and constraining any deviations from Lorentz Invariance due to their huge energies and cosmological distances. Gamma-ray bursts, which are the most intense and powerful explosions in the universe, are traditionally divided into long bursts whose observed duration exceeds 2 s, and short bursts whose observed duration is less than 2 s. In this study, we employ a recent sample of 46 short GRBs to check for any deviation from Lorentz Invariance. We analyze the spectral lag of the bursts in our data sample and check for any redshift dependence in the GRB rest frame, which would indicate a violation of Lorentz Invariance. Our results are consistent, to within 1σ, with no deviation from Lorentz Invariance.展开更多
Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, na...Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, namely the violation to the norms of a language, frequently appears in advertisements and can meet requirements of the style of advertising English. Due to limited space, this paper focuses on deviation on the phonological, graphological, lexical, grammatical, and semantic level. Analyzing deviation in advertising English can promote readers' aesthetic and appreciative ability and encourage advertisers to create advertisements with more efficiency, novelty, innovation in more effective language.展开更多
Euphemism is a common phenomenon in languages.It's a more mild and polite way to say something unpleasant and embarrassing.It's a figure of speech as well as a cultural phenomenon.Euphemism functions to enhanc...Euphemism is a common phenomenon in languages.It's a more mild and polite way to say something unpleasant and embarrassing.It's a figure of speech as well as a cultural phenomenon.Euphemism functions to enhance the effect of communication and maintain harmonious interpersonal relations.With the development of modern society,it has become an indispensable element in people's interactions.Many linguists and scholars have studied this linguistic phenomenon from different angles.Based on their achievements,the author has a tentative analysis of the three kinds of negative effects by using euphemism from the perspective of Cooperative Principle.展开更多
This study analyzes the the verbal humor in the movie series If You Are The One from the perspective of some pragmatic theories.The findings of the study provide explanations towards generative mechanism of humor,such...This study analyzes the the verbal humor in the movie series If You Are The One from the perspective of some pragmatic theories.The findings of the study provide explanations towards generative mechanism of humor,such as the violation of Cooperative Principle,avoiding face-threatening acts,and particularly,creatively reveal that special use of Politeness Principle can produce a humourous effect,too.展开更多
The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvant...The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers.展开更多
As a cultural phenomenon,euphemism is categorized as a linguistic concept as well.Euphemism means speaking with good words or in a pleasant manner.The social functions of euphemism are:substitution of taboo words,stra...As a cultural phenomenon,euphemism is categorized as a linguistic concept as well.Euphemism means speaking with good words or in a pleasant manner.The social functions of euphemism are:substitution of taboo words,strategic use of language,and expression of politeness,humor and satire.Besides,euphemism is closely associated with cooperative principle in pragmatics.展开更多
Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to ...Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language.展开更多
This paper investigates the thermal pairwise entanglement of a three-qubit Heisenberg XXZ chain in the presence of the Dzyaioshinski-Moriya (DM) anisotropic antisymmetric interaction and quantum teleportation when u...This paper investigates the thermal pairwise entanglement of a three-qubit Heisenberg XXZ chain in the presence of the Dzyaioshinski-Moriya (DM) anisotropic antisymmetric interaction and quantum teleportation when using the Heisenberg chain as a channel. The entanglement dependences on the DM interaction and temperature are given in detail. It obtains the relation between the concurrence and average fidelity, and shows that the same concurrence can lead different average fidelities. Moreover, it finds the thermally entangled states which do not violate the Bell inequalities, and can still be used for quantum teleportation.展开更多
Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised metho...Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised methods can deal with more complicated problems such as those with nonholonomic constraints or redundant constraints, and save the computation time. Finally a numerical simulation of a multibody system is conducted by using the methods given in this paper.展开更多
Projected Runge-Kutta (R-K) methods for constrained Hamiltonian systems are proposed. Dynamic equations of the systems, which are index-3 differential-algebraic equations (DAEs) in the Heisenberg form, are establi...Projected Runge-Kutta (R-K) methods for constrained Hamiltonian systems are proposed. Dynamic equations of the systems, which are index-3 differential-algebraic equations (DAEs) in the Heisenberg form, are established under the framework of Lagrangian multipliers. R-K methods combined with the technique of projections are then used to solve the DAEs. The basic idea of projections is to eliminate the constraint violations at the position, velocity, and acceleration levels, and to preserve the total energy of constrained Hamiltonian systems by correcting variables of the position, velocity, acceleration, and energy. Numerical results confirm the validity and show the high precision of the proposed method in preserving three levels of constraints and total energy compared with results reported in the literature.展开更多
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p...For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.展开更多
A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional con...A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional constraint violation stabilization method are determined according to the integration time step size and Taylor expansion method automatically. The direct integration method, the traditional constraint violation stabilization method and the new method presented in this paper are compared finally.展开更多
-The ISO standard 14577 is challenged for its violation of the energy law, its wrong relation of normal force FN with impression depth h, and for its iterative treatments. The solution of this dilemma is the use of sa...-The ISO standard 14577 is challenged for its violation of the energy law, its wrong relation of normal force FN with impression depth h, and for its iterative treatments. The solution of this dilemma is the use of sacrosanct simplest calculation rules for the loading parabola (now FN = kh3/2) giving straight lines for cones, pyramids and wedges. They provide the physical penetration resistance hardness k with dimension [Nm-3/2] and allow for non-iterative calculations with closed formulas, using simple undeniable calculation rules. The physically correct FN versus h3/2 plot is universally valid. It separates out the most common surface effects and reveals gradients. It provides unmatched precision, including reliability checks of experimental data. Regression analysis of FN versus h3/2 plots reveals eventual unsteadiness kink phase-transition onset with the transition-energy. This is shown for all kinds of solid materials, including salts, silicon, organics, polymers, composites, and superalloys. Exothermic and endothermic single and consecutive multiple phase-transitions with their surface dependence are distinguished and the results compared in 5 Tables. The sharp phase-transition onsets and the transition energies provide unprecedented most important materials’ characteristics that are indispensable for safety reasons. ISO ASTM is thus urged to thoroughly revise ISO 14577 and to work out new standards for the mechanically (also thermally) stressed materials. For example, the constancy of the first phase-transition parameters must be controlled, and materials must only be admitted for maximal forces well below the first phase-transition onset. Such onset loads can now be easily calculated. The nevertheless repeated oppositions against the physical analysis of indentations rest on incredibly poor knowledge of basic mathematics, errors that are uncovered. The safety aspects caused by the present unphysical materials’ parameters are discussed.展开更多
Bicycling is an important way for college students and employees to get around campuses. With a rise in bicycling on campuses there comes a rise in bicycle collisions with pedestrians walking to and from classes and w...Bicycling is an important way for college students and employees to get around campuses. With a rise in bicycling on campuses there comes a rise in bicycle collisions with pedestrians walking to and from classes and work. The literature review showed many papers involving bicycle conflict modeling but on roads with motor vehicles. While some aspects of this research can be applied to non-motorized paths, there is a lack of research strictly focusing on only bicycles and pedestrians. This study aims to fill this knowledge gap by developing a model to identify locations on roads and paths (hotspots) on college campuses that are likely to have a bicycle collision and predict the likelihood of a serious bicycle crash on a non-motorized path based on the characteristics of the path. This study identifies those interactions between bicyclists and pedestrians on non-motorized paths on a suburban college campus in Newark, USA. Findings suggest that pedestrian density of a path is a major factor in the maximum speed bicyclists can achieve. The wider the path is, the higher the maximum speed is that a bicyclist can obtain. This is because a wider path width decreases the pedestrian density. The grade of the path has little effect on bicycle speeds. The results of the models were displayed on a GIS map that is visually appealing to a viewer. The paths were color coded based on their level of safety, so it is easy to observe problematic areas of the network. This technique can be applied to the entire campus network of non-motorized paths to study the whole system. This can then be used by planners and designers to identify areas that need upgrading and improve the overall safety of the non-motorized path system.展开更多
Land is the fundamental income sources of farmers. However, farmers stay at disadvantaged statge in the political, economic and social aspects. Their land is exploited and occupied, which facilitates the rapid develop...Land is the fundamental income sources of farmers. However, farmers stay at disadvantaged statge in the political, economic and social aspects. Their land is exploited and occupied, which facilitates the rapid development of economy, as well as brings the gap between the poor and the rich and the inharmonious disputes. The necessity for protecting the land right of farmers under the new situation is expounded, covering the necessity of carrying out the relevant agricultural policies; the necessity of improving rural economic status and narrowing the gap between urban and rural areas; the necessity of reducing land disputes and constructing harmonious society. The violation of farmers' land rights is analyzed from two aspects. The first one is the violation of farmers' land right in land tenure section, which includes the lack of ecological compensation system the lack of contract operation right; the second one is the violation of farmers' land right in land transfer section, including the absence of land requisition system, substandard land contract and land transfer and the limitation of house stead circulation; the third one is the vacant of land development right affects farmers' share of enjoying the added value of land. The countermeasures for protecting farmers' land rights are put forward. The first one is clarify land property; the second one is normalize and perfect land requisition system; the third one is appropriately loosen rural land transfer policies; the fourth one is establish ecological compensation and land development right compensation system.展开更多
Non-iterative analysis of indentation results allows for the detection of phase transitions under load and their transition energy. The closed algebraic equations have been deduced on the basis of the physically found...Non-iterative analysis of indentation results allows for the detection of phase transitions under load and their transition energy. The closed algebraic equations have been deduced on the basis of the physically founded normal force ?depth3/2 relation. The precise transition onset position is obtained by linear regression of the FN = kh3/2 plot, where k is the penetration resistance, which also provides the axis cuts of both polymorphs of first order phase transitions. The phase changes can be endothermic or exothermic. They are normalized per μN or mN normal load. The analyses of indentation loading curves with self-similar diamond indenters are used as validity check of the loading curves, also from calibration standards that exhibit previously undetected phase-transitions and are thus incorrect. The phase-transition energies for fused quartz are determined from the loading curves from instrument provider handbooks. The anisotropic behavior of phase transition energies is studied for the first time. Quartz is a useful test object. The reasons for the packing-dependent differences are discussed on the basis of the local crystal structure under and around the inserting tip.展开更多
User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and opera...User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and operating.However,there are more ways which can reflect the good use of user portrait.Commercial use is the most acceptable use but it also can be used in different industries widely.The goal of this paper is forecasting gender by user portrait and making it useful in transportation safety.It can extract the information from people who violated traffic principle to know the features of them then forecast the gender of these people.Finally,it will analyze the prediction based on characteristics correlation and forecasting results from models which can verify if gender can have an obvious influence on the traffic violation.Also we hope give some advice to drivers and traffic department by doing this research.展开更多
基金supported by the Major Com-missioned Project of Social Science Planning Fund of Liaoning Prov-ince,China:“Research on Legal Issues of Cross-border Nuclear Dam-age Compensation in the Context of Japan’s Discharge of Nuclear Sewage”[Grant No.L23ZD072].
文摘The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard.
文摘Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.
文摘Contrary to the approach in judicial practice,Paragraph 1,Article 153,of the Civil Code of the People’s Republic of China,as a rule of invalidity for violating mandatory provisions,does not adopt a dichotomy towards mandatory provisions with effectiveness and administrative characteristics,yet it maintains the legislative philosophy of differentiation.It leaves unspecified whether mandatory provisions that do not explicitly render a juristic act invalid impact the act’s validity,entrusting this determination to the discretion of judges on a case-by-case basis.When judges,under the authority of Paragraph 1,Article 153 of the Civil Code,explore the normative intent of mandatory provisions to assess their effect on the validity of juristic acts,they should engage in legal policy analysis centered on consequence-based argumentation to overcome the limitations of norm typological analysis.This analysis employs a reasoning model predicated on the normative purpose,utilizing a consequencefocused interpretative approach for formulating and arguing propositions of rules applicable to pending cases,thereby arriving at case-specific conclusions.Since the invalidation of juristic acts serves as an auxiliary regulatory tool for the state economy and society,a consequence-oriented interpretation needs to be based on the idea of mutual instrumentalization of public and private laws.This entails predicting the outcomes of negating the validity of a juristic act in industrial regulatory scenarios and assessing these outcomes within the framework of public and private regulatory instruments.
文摘Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising tool for checking and constraining any deviations from Lorentz Invariance due to their huge energies and cosmological distances. Gamma-ray bursts, which are the most intense and powerful explosions in the universe, are traditionally divided into long bursts whose observed duration exceeds 2 s, and short bursts whose observed duration is less than 2 s. In this study, we employ a recent sample of 46 short GRBs to check for any deviation from Lorentz Invariance. We analyze the spectral lag of the bursts in our data sample and check for any redshift dependence in the GRB rest frame, which would indicate a violation of Lorentz Invariance. Our results are consistent, to within 1σ, with no deviation from Lorentz Invariance.
文摘Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, namely the violation to the norms of a language, frequently appears in advertisements and can meet requirements of the style of advertising English. Due to limited space, this paper focuses on deviation on the phonological, graphological, lexical, grammatical, and semantic level. Analyzing deviation in advertising English can promote readers' aesthetic and appreciative ability and encourage advertisers to create advertisements with more efficiency, novelty, innovation in more effective language.
文摘Euphemism is a common phenomenon in languages.It's a more mild and polite way to say something unpleasant and embarrassing.It's a figure of speech as well as a cultural phenomenon.Euphemism functions to enhance the effect of communication and maintain harmonious interpersonal relations.With the development of modern society,it has become an indispensable element in people's interactions.Many linguists and scholars have studied this linguistic phenomenon from different angles.Based on their achievements,the author has a tentative analysis of the three kinds of negative effects by using euphemism from the perspective of Cooperative Principle.
文摘This study analyzes the the verbal humor in the movie series If You Are The One from the perspective of some pragmatic theories.The findings of the study provide explanations towards generative mechanism of humor,such as the violation of Cooperative Principle,avoiding face-threatening acts,and particularly,creatively reveal that special use of Politeness Principle can produce a humourous effect,too.
文摘The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers.
文摘As a cultural phenomenon,euphemism is categorized as a linguistic concept as well.Euphemism means speaking with good words or in a pleasant manner.The social functions of euphemism are:substitution of taboo words,strategic use of language,and expression of politeness,humor and satire.Besides,euphemism is closely associated with cooperative principle in pragmatics.
文摘Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language.
基金supported by the Natural Science Foundation of Hunan Province (Grant No 06JJ50118)the National Natural Science Foundation of China (Grant Nos 10604053 and 10874013)
文摘This paper investigates the thermal pairwise entanglement of a three-qubit Heisenberg XXZ chain in the presence of the Dzyaioshinski-Moriya (DM) anisotropic antisymmetric interaction and quantum teleportation when using the Heisenberg chain as a channel. The entanglement dependences on the DM interaction and temperature are given in detail. It obtains the relation between the concurrence and average fidelity, and shows that the same concurrence can lead different average fidelities. Moreover, it finds the thermally entangled states which do not violate the Bell inequalities, and can still be used for quantum teleportation.
基金Project supported by the National Natural Science Foundation of China (No. 19902006).
文摘Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised methods can deal with more complicated problems such as those with nonholonomic constraints or redundant constraints, and save the computation time. Finally a numerical simulation of a multibody system is conducted by using the methods given in this paper.
基金Project supported by the National Natural Science Foundation of China(No.11432010)the Doctoral Program Foundation of Education Ministry of China(No.20126102110023)+2 种基金the 111Project of China(No.B07050)the Fundamental Research Funds for the Central Universities(No.310201401JCQ01001)the Innovation Foundation for Doctor Dissertation of Northwestern Polytechnical University(No.CX201517)
文摘Projected Runge-Kutta (R-K) methods for constrained Hamiltonian systems are proposed. Dynamic equations of the systems, which are index-3 differential-algebraic equations (DAEs) in the Heisenberg form, are established under the framework of Lagrangian multipliers. R-K methods combined with the technique of projections are then used to solve the DAEs. The basic idea of projections is to eliminate the constraint violations at the position, velocity, and acceleration levels, and to preserve the total energy of constrained Hamiltonian systems by correcting variables of the position, velocity, acceleration, and energy. Numerical results confirm the validity and show the high precision of the proposed method in preserving three levels of constraints and total energy compared with results reported in the literature.
基金National Natural Science Foundation of China under Grant No.60873213,91018008 and 61070192Beijing Science Foundation under Grant No. 4082018Shanghai Key Laboratory of Intelligent Information Processing of China under Grant No. IIPL-09-006
文摘For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.
文摘A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional constraint violation stabilization method are determined according to the integration time step size and Taylor expansion method automatically. The direct integration method, the traditional constraint violation stabilization method and the new method presented in this paper are compared finally.
文摘-The ISO standard 14577 is challenged for its violation of the energy law, its wrong relation of normal force FN with impression depth h, and for its iterative treatments. The solution of this dilemma is the use of sacrosanct simplest calculation rules for the loading parabola (now FN = kh3/2) giving straight lines for cones, pyramids and wedges. They provide the physical penetration resistance hardness k with dimension [Nm-3/2] and allow for non-iterative calculations with closed formulas, using simple undeniable calculation rules. The physically correct FN versus h3/2 plot is universally valid. It separates out the most common surface effects and reveals gradients. It provides unmatched precision, including reliability checks of experimental data. Regression analysis of FN versus h3/2 plots reveals eventual unsteadiness kink phase-transition onset with the transition-energy. This is shown for all kinds of solid materials, including salts, silicon, organics, polymers, composites, and superalloys. Exothermic and endothermic single and consecutive multiple phase-transitions with their surface dependence are distinguished and the results compared in 5 Tables. The sharp phase-transition onsets and the transition energies provide unprecedented most important materials’ characteristics that are indispensable for safety reasons. ISO ASTM is thus urged to thoroughly revise ISO 14577 and to work out new standards for the mechanically (also thermally) stressed materials. For example, the constancy of the first phase-transition parameters must be controlled, and materials must only be admitted for maximal forces well below the first phase-transition onset. Such onset loads can now be easily calculated. The nevertheless repeated oppositions against the physical analysis of indentations rest on incredibly poor knowledge of basic mathematics, errors that are uncovered. The safety aspects caused by the present unphysical materials’ parameters are discussed.
文摘Bicycling is an important way for college students and employees to get around campuses. With a rise in bicycling on campuses there comes a rise in bicycle collisions with pedestrians walking to and from classes and work. The literature review showed many papers involving bicycle conflict modeling but on roads with motor vehicles. While some aspects of this research can be applied to non-motorized paths, there is a lack of research strictly focusing on only bicycles and pedestrians. This study aims to fill this knowledge gap by developing a model to identify locations on roads and paths (hotspots) on college campuses that are likely to have a bicycle collision and predict the likelihood of a serious bicycle crash on a non-motorized path based on the characteristics of the path. This study identifies those interactions between bicyclists and pedestrians on non-motorized paths on a suburban college campus in Newark, USA. Findings suggest that pedestrian density of a path is a major factor in the maximum speed bicyclists can achieve. The wider the path is, the higher the maximum speed is that a bicyclist can obtain. This is because a wider path width decreases the pedestrian density. The grade of the path has little effect on bicycle speeds. The results of the models were displayed on a GIS map that is visually appealing to a viewer. The paths were color coded based on their level of safety, so it is easy to observe problematic areas of the network. This technique can be applied to the entire campus network of non-motorized paths to study the whole system. This can then be used by planners and designers to identify areas that need upgrading and improve the overall safety of the non-motorized path system.
文摘Land is the fundamental income sources of farmers. However, farmers stay at disadvantaged statge in the political, economic and social aspects. Their land is exploited and occupied, which facilitates the rapid development of economy, as well as brings the gap between the poor and the rich and the inharmonious disputes. The necessity for protecting the land right of farmers under the new situation is expounded, covering the necessity of carrying out the relevant agricultural policies; the necessity of improving rural economic status and narrowing the gap between urban and rural areas; the necessity of reducing land disputes and constructing harmonious society. The violation of farmers' land rights is analyzed from two aspects. The first one is the violation of farmers' land right in land tenure section, which includes the lack of ecological compensation system the lack of contract operation right; the second one is the violation of farmers' land right in land transfer section, including the absence of land requisition system, substandard land contract and land transfer and the limitation of house stead circulation; the third one is the vacant of land development right affects farmers' share of enjoying the added value of land. The countermeasures for protecting farmers' land rights are put forward. The first one is clarify land property; the second one is normalize and perfect land requisition system; the third one is appropriately loosen rural land transfer policies; the fourth one is establish ecological compensation and land development right compensation system.
文摘Non-iterative analysis of indentation results allows for the detection of phase transitions under load and their transition energy. The closed algebraic equations have been deduced on the basis of the physically founded normal force ?depth3/2 relation. The precise transition onset position is obtained by linear regression of the FN = kh3/2 plot, where k is the penetration resistance, which also provides the axis cuts of both polymorphs of first order phase transitions. The phase changes can be endothermic or exothermic. They are normalized per μN or mN normal load. The analyses of indentation loading curves with self-similar diamond indenters are used as validity check of the loading curves, also from calibration standards that exhibit previously undetected phase-transitions and are thus incorrect. The phase-transition energies for fused quartz are determined from the loading curves from instrument provider handbooks. The anisotropic behavior of phase transition energies is studied for the first time. Quartz is a useful test object. The reasons for the packing-dependent differences are discussed on the basis of the local crystal structure under and around the inserting tip.
基金This research work is implemented at the 2011 Collaborative Innovation Center for Development and Utilization of Finance and Economics Big Data Property,Universities of Hunan ProvinceHunan Provincial Key Laboratory of Big Data Science and Technology,Finance and Economics+3 种基金Key Laboratory of Information Technology and Security,Hunan Provincial Higher Education.This research is funded by the Open Foundation for the University Innovation Platform in the Hunan Province(Grant No.18K103)Open Project(Grant Nos.20181901CRP03,20181901CRP04,20181901CRP05)Hunan Provincial Education Science 13th Five Year Plan(Grant No.XJK016BXX001)Social Science Foundation of Hunan Province(Grant No.17YBA049).
文摘User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and operating.However,there are more ways which can reflect the good use of user portrait.Commercial use is the most acceptable use but it also can be used in different industries widely.The goal of this paper is forecasting gender by user portrait and making it useful in transportation safety.It can extract the information from people who violated traffic principle to know the features of them then forecast the gender of these people.Finally,it will analyze the prediction based on characteristics correlation and forecasting results from models which can verify if gender can have an obvious influence on the traffic violation.Also we hope give some advice to drivers and traffic department by doing this research.