期刊文献+
共找到216篇文章
< 1 2 11 >
每页显示 20 50 100
Addressing Japan’s disposal of nuclear-contaminated water from the perspective of international human rights law
1
作者 Yen-Chiang Chang Xiaonan Zhao 《Chinese Journal of Population,Resources and Environment》 2024年第1期1-9,共9页
The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually ente... The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard. 展开更多
关键词 Fukushima nuclearcontaminated water Crimes against humanity Remedy for violations of human rights Right to environment Right to life
下载PDF
A Study of Triangle Inequality Violations in Social Network Clustering
2
作者 Sanjit Kumar Saha Tapashi Gosswami 《Journal of Computer and Communications》 2024年第1期67-76,共10页
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie... Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters. 展开更多
关键词 CLUSTERING Triangle Inequality Violations Traditional Clustering Graph Clustering
下载PDF
Impact of Mandatory Provisions on the Validity of Juristic Acts: A Path for Legal Policy Analysis
3
作者 Wang Kun 《Contemporary Social Sciences》 2023年第6期1-19,共19页
Contrary to the approach in judicial practice,Paragraph 1,Article 153,of the Civil Code of the People’s Republic of China,as a rule of invalidity for violating mandatory provisions,does not adopt a dichotomy towards ... Contrary to the approach in judicial practice,Paragraph 1,Article 153,of the Civil Code of the People’s Republic of China,as a rule of invalidity for violating mandatory provisions,does not adopt a dichotomy towards mandatory provisions with effectiveness and administrative characteristics,yet it maintains the legislative philosophy of differentiation.It leaves unspecified whether mandatory provisions that do not explicitly render a juristic act invalid impact the act’s validity,entrusting this determination to the discretion of judges on a case-by-case basis.When judges,under the authority of Paragraph 1,Article 153 of the Civil Code,explore the normative intent of mandatory provisions to assess their effect on the validity of juristic acts,they should engage in legal policy analysis centered on consequence-based argumentation to overcome the limitations of norm typological analysis.This analysis employs a reasoning model predicated on the normative purpose,utilizing a consequencefocused interpretative approach for formulating and arguing propositions of rules applicable to pending cases,thereby arriving at case-specific conclusions.Since the invalidation of juristic acts serves as an auxiliary regulatory tool for the state economy and society,a consequence-oriented interpretation needs to be based on the idea of mutual instrumentalization of public and private laws.This entails predicting the outcomes of negating the validity of a juristic act in industrial regulatory scenarios and assessing these outcomes within the framework of public and private regulatory instruments. 展开更多
关键词 rule of invalidity for violating mandatory provisions juristic acts legal policy analysis consequencebased argumentation REGULATION
下载PDF
Constraining Lorentz Invariance Violation Using Short Gamma-Ray Bursts
4
作者 Walid Jamil Azzam Ali Mohamed Hasan 《Journal of Applied Mathematics and Physics》 2023年第8期2179-2184,共6页
Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising to... Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising tool for checking and constraining any deviations from Lorentz Invariance due to their huge energies and cosmological distances. Gamma-ray bursts, which are the most intense and powerful explosions in the universe, are traditionally divided into long bursts whose observed duration exceeds 2 s, and short bursts whose observed duration is less than 2 s. In this study, we employ a recent sample of 46 short GRBs to check for any deviation from Lorentz Invariance. We analyze the spectral lag of the bursts in our data sample and check for any redshift dependence in the GRB rest frame, which would indicate a violation of Lorentz Invariance. Our results are consistent, to within 1σ, with no deviation from Lorentz Invariance. 展开更多
关键词 Lorentz Invariance Violation Gamma-Ray Bursts Quantum Gravity
下载PDF
Deviation in Advertising English from a Stylistic Perspective
5
作者 罗敏 《英语广场(学术研究)》 2012年第10期15-17,共3页
Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, na... Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, namely the violation to the norms of a language, frequently appears in advertisements and can meet requirements of the style of advertising English. Due to limited space, this paper focuses on deviation on the phonological, graphological, lexical, grammatical, and semantic level. Analyzing deviation in advertising English can promote readers' aesthetic and appreciative ability and encourage advertisers to create advertisements with more efficiency, novelty, innovation in more effective language. 展开更多
关键词 advertising English deviation STYLISTIC VIOLATION NORM
下载PDF
English Euphemism and its Linguistic Analysis from the Cooperative Principle Perspective
6
作者 毕春意 《海外英语》 2014年第10X期229-230,共2页
Euphemism is a common phenomenon in languages.It's a more mild and polite way to say something unpleasant and embarrassing.It's a figure of speech as well as a cultural phenomenon.Euphemism functions to enhanc... Euphemism is a common phenomenon in languages.It's a more mild and polite way to say something unpleasant and embarrassing.It's a figure of speech as well as a cultural phenomenon.Euphemism functions to enhance the effect of communication and maintain harmonious interpersonal relations.With the development of modern society,it has become an indispensable element in people's interactions.Many linguists and scholars have studied this linguistic phenomenon from different angles.Based on their achievements,the author has a tentative analysis of the three kinds of negative effects by using euphemism from the perspective of Cooperative Principle. 展开更多
关键词 ENGLISH EUPHEMISM COOPERATIVE PRINCIPLE VIOLATION
下载PDF
An Analysis of the Verbal Humor in the Movies If You Are The One Ⅰ&Ⅱ from the Perspective of Pragmatics
7
作者 黄瑞 《海外英语》 2011年第5X期281-283,共3页
This study analyzes the the verbal humor in the movie series If You Are The One from the perspective of some pragmatic theories.The findings of the study provide explanations towards generative mechanism of humor,such... This study analyzes the the verbal humor in the movie series If You Are The One from the perspective of some pragmatic theories.The findings of the study provide explanations towards generative mechanism of humor,such as the violation of Cooperative Principle,avoiding face-threatening acts,and particularly,creatively reveal that special use of Politeness Principle can produce a humourous effect,too. 展开更多
关键词 VERBAL humor VIOLATION OVERUSE PRAGMATICS cooperative PRINCIPLE POLITENESS PRINCIPLE
下载PDF
The Violation of Cooperative Principle and English Teaching
8
作者 张大海 《海外英语》 2013年第21期291-293,共3页
The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvant... The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers. 展开更多
关键词 VIOLATION COOPERATIVE PRINCIPLE ENGLISH TEACHING i
下载PDF
A Study on English Euphemisms and Cooperative Principle in Pragmatics
9
作者 孙宏 《疯狂英语(教师版)》 2012年第3期158-161,共4页
As a cultural phenomenon,euphemism is categorized as a linguistic concept as well.Euphemism means speaking with good words or in a pleasant manner.The social functions of euphemism are:substitution of taboo words,stra... As a cultural phenomenon,euphemism is categorized as a linguistic concept as well.Euphemism means speaking with good words or in a pleasant manner.The social functions of euphemism are:substitution of taboo words,strategic use of language,and expression of politeness,humor and satire.Besides,euphemism is closely associated with cooperative principle in pragmatics. 展开更多
关键词 EUPHEMISM FUNCTION TABOO cooperative principle VIOLATION
下载PDF
On the Causes of the Violation of Cooperative Principle 被引量:1
10
作者 朱毅 刘爱玲 《海外英语》 2015年第19期217-218,共2页
Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to ... Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language. 展开更多
关键词 COOPERATIVE PRINCIPLE VIOLATION CAUSES
下载PDF
Thermal entanglement and teleportation in a three-qubit Heisenberg XXZ model with Dzyaloshinski-Moriya anisotropic antisymmetric interaction 被引量:4
11
作者 谢利军 张登玉 +2 位作者 唐世清 詹孝贵 高峰 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第8期3203-3209,共7页
This paper investigates the thermal pairwise entanglement of a three-qubit Heisenberg XXZ chain in the presence of the Dzyaioshinski-Moriya (DM) anisotropic antisymmetric interaction and quantum teleportation when u... This paper investigates the thermal pairwise entanglement of a three-qubit Heisenberg XXZ chain in the presence of the Dzyaioshinski-Moriya (DM) anisotropic antisymmetric interaction and quantum teleportation when using the Heisenberg chain as a channel. The entanglement dependences on the DM interaction and temperature are given in detail. It obtains the relation between the concurrence and average fidelity, and shows that the same concurrence can lead different average fidelities. Moreover, it finds the thermally entangled states which do not violate the Bell inequalities, and can still be used for quantum teleportation. 展开更多
关键词 quantum teleportation CONCURRENCE fidelity Bell inequality violation
下载PDF
CONSTRAINT VIOLATION STABILIZATION OF EULER-LAGRANGE EQUATIONS WITH NON-HOLONOMIC CONSTRAINTS 被引量:2
12
作者 ZhaoWeijia PanZhenkuan ChenLiqun 《Acta Mechanica Solida Sinica》 SCIE EI 2004年第1期45-51,共7页
Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised metho... Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised methods can deal with more complicated problems such as those with nonholonomic constraints or redundant constraints, and save the computation time. Finally a numerical simulation of a multibody system is conducted by using the methods given in this paper. 展开更多
关键词 Euler-Lagrange equation nonholonomic constraint constraint violation stabiliza- tion redundant constraint
下载PDF
Projected Runge-Kutta methods for constrained Hamiltonian systems 被引量:2
13
作者 Yi WEI Zichen DENG +1 位作者 Qingjun LI Bo WANG 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2016年第8期1077-1094,共18页
Projected Runge-Kutta (R-K) methods for constrained Hamiltonian systems are proposed. Dynamic equations of the systems, which are index-3 differential-algebraic equations (DAEs) in the Heisenberg form, are establi... Projected Runge-Kutta (R-K) methods for constrained Hamiltonian systems are proposed. Dynamic equations of the systems, which are index-3 differential-algebraic equations (DAEs) in the Heisenberg form, are established under the framework of Lagrangian multipliers. R-K methods combined with the technique of projections are then used to solve the DAEs. The basic idea of projections is to eliminate the constraint violations at the position, velocity, and acceleration levels, and to preserve the total energy of constrained Hamiltonian systems by correcting variables of the position, velocity, acceleration, and energy. Numerical results confirm the validity and show the high precision of the proposed method in preserving three levels of constraints and total energy compared with results reported in the literature. 展开更多
关键词 projected Runge-Kutta (R-K) method differential-algebraic equation(DAE) constrained Hamiltonian system energy and constraint preservation constraint violation
下载PDF
SVR-Miner:一种基于大型软件的安全验证规则挖掘和缺陷检测工具(英文) 被引量:1
14
作者 梁彬 谢素斌 +2 位作者 石文昌 梁朝晖 陈红 《China Communications》 SCIE CSCD 2011年第4期84-98,共15页
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p... For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently. 展开更多
关键词 static analysis data mining automated validation rules extraction automated violation detection
下载PDF
AN AUTOMATIC CONSTRAINT VIOLATION STABI- LIZATION METHOD FOR DIFFERENTIAL/ ALGEBRAIC EQUATIONS OF MOTION IN MULTIBODY SYSTEM DYNAMICS 被引量:1
15
作者 赵维加 潘振宽 王艺兵 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2000年第1期105-110,共6页
A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional con... A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional constraint violation stabilization method are determined according to the integration time step size and Taylor expansion method automatically. The direct integration method, the traditional constraint violation stabilization method and the new method presented in this paper are compared finally. 展开更多
关键词 dynamics of multibody systems Euler_Lagrange equations constraint violation stabilization
下载PDF
Physical Nanoindentation: From Penetration Resistance to Phase-Transition Energies 被引量:3
16
作者 Gerd Kaupp 《Advances in Materials Physics and Chemistry》 2019年第6期103-122,共20页
-The ISO standard 14577 is challenged for its violation of the energy law, its wrong relation of normal force FN with impression depth h, and for its iterative treatments. The solution of this dilemma is the use of sa... -The ISO standard 14577 is challenged for its violation of the energy law, its wrong relation of normal force FN with impression depth h, and for its iterative treatments. The solution of this dilemma is the use of sacrosanct simplest calculation rules for the loading parabola (now FN = kh3/2) giving straight lines for cones, pyramids and wedges. They provide the physical penetration resistance hardness k with dimension [Nm-3/2] and allow for non-iterative calculations with closed formulas, using simple undeniable calculation rules. The physically correct FN versus h3/2 plot is universally valid. It separates out the most common surface effects and reveals gradients. It provides unmatched precision, including reliability checks of experimental data. Regression analysis of FN versus h3/2 plots reveals eventual unsteadiness kink phase-transition onset with the transition-energy. This is shown for all kinds of solid materials, including salts, silicon, organics, polymers, composites, and superalloys. Exothermic and endothermic single and consecutive multiple phase-transitions with their surface dependence are distinguished and the results compared in 5 Tables. The sharp phase-transition onsets and the transition energies provide unprecedented most important materials’ characteristics that are indispensable for safety reasons. ISO ASTM is thus urged to thoroughly revise ISO 14577 and to work out new standards for the mechanically (also thermally) stressed materials. For example, the constancy of the first phase-transition parameters must be controlled, and materials must only be admitted for maximal forces well below the first phase-transition onset. Such onset loads can now be easily calculated. The nevertheless repeated oppositions against the physical analysis of indentations rest on incredibly poor knowledge of basic mathematics, errors that are uncovered. The safety aspects caused by the present unphysical materials’ parameters are discussed. 展开更多
关键词 ENERGY Law VIOLATION ISO-14577 Challenge Calculation Rules for Indentations PHASE-TRANSITION ONSET and ENERGY Multiple Transitions Safety Problems
下载PDF
Modeling Bicycle Conflict on Non-Motorized Paths on Suburban College Campuses 被引量:1
17
作者 Zachary Nerwinski Ardeshir Faghri Mingxin Li 《Journal of Transportation Technologies》 2018年第4期357-375,共19页
Bicycling is an important way for college students and employees to get around campuses. With a rise in bicycling on campuses there comes a rise in bicycle collisions with pedestrians walking to and from classes and w... Bicycling is an important way for college students and employees to get around campuses. With a rise in bicycling on campuses there comes a rise in bicycle collisions with pedestrians walking to and from classes and work. The literature review showed many papers involving bicycle conflict modeling but on roads with motor vehicles. While some aspects of this research can be applied to non-motorized paths, there is a lack of research strictly focusing on only bicycles and pedestrians. This study aims to fill this knowledge gap by developing a model to identify locations on roads and paths (hotspots) on college campuses that are likely to have a bicycle collision and predict the likelihood of a serious bicycle crash on a non-motorized path based on the characteristics of the path. This study identifies those interactions between bicyclists and pedestrians on non-motorized paths on a suburban college campus in Newark, USA. Findings suggest that pedestrian density of a path is a major factor in the maximum speed bicyclists can achieve. The wider the path is, the higher the maximum speed is that a bicyclist can obtain. This is because a wider path width decreases the pedestrian density. The grade of the path has little effect on bicycle speeds. The results of the models were displayed on a GIS map that is visually appealing to a viewer. The paths were color coded based on their level of safety, so it is easy to observe problematic areas of the network. This technique can be applied to the entire campus network of non-motorized paths to study the whole system. This can then be used by planners and designers to identify areas that need upgrading and improve the overall safety of the non-motorized path system. 展开更多
关键词 CONFLICT Safety Non-Motorized Path CYCLIST Violations SUBURBAN COLLEGE Campus
下载PDF
Analysis on Farmers' Land Right Protection 被引量:1
18
作者 WEI Feng-xiu 《Asian Agricultural Research》 2011年第1期134-138,共5页
Land is the fundamental income sources of farmers. However, farmers stay at disadvantaged statge in the political, economic and social aspects. Their land is exploited and occupied, which facilitates the rapid develop... Land is the fundamental income sources of farmers. However, farmers stay at disadvantaged statge in the political, economic and social aspects. Their land is exploited and occupied, which facilitates the rapid development of economy, as well as brings the gap between the poor and the rich and the inharmonious disputes. The necessity for protecting the land right of farmers under the new situation is expounded, covering the necessity of carrying out the relevant agricultural policies; the necessity of improving rural economic status and narrowing the gap between urban and rural areas; the necessity of reducing land disputes and constructing harmonious society. The violation of farmers' land rights is analyzed from two aspects. The first one is the violation of farmers' land right in land tenure section, which includes the lack of ecological compensation system the lack of contract operation right; the second one is the violation of farmers' land right in land transfer section, including the absence of land requisition system, substandard land contract and land transfer and the limitation of house stead circulation; the third one is the vacant of land development right affects farmers' share of enjoying the added value of land. The countermeasures for protecting farmers' land rights are put forward. The first one is clarify land property; the second one is normalize and perfect land requisition system; the third one is appropriately loosen rural land transfer policies; the fourth one is establish ecological compensation and land development right compensation system. 展开更多
关键词 INNOVATION Land system Land rights and interests Land right violation China
下载PDF
Phase-Transition Energies, New Characterization of Solid Materials and Anisotropy 被引量:2
19
作者 Gerd Kaupp 《Advances in Materials Physics and Chemistry》 2019年第4期57-70,共14页
Non-iterative analysis of indentation results allows for the detection of phase transitions under load and their transition energy. The closed algebraic equations have been deduced on the basis of the physically found... Non-iterative analysis of indentation results allows for the detection of phase transitions under load and their transition energy. The closed algebraic equations have been deduced on the basis of the physically founded normal force ?depth3/2 relation. The precise transition onset position is obtained by linear regression of the FN = kh3/2 plot, where k is the penetration resistance, which also provides the axis cuts of both polymorphs of first order phase transitions. The phase changes can be endothermic or exothermic. They are normalized per μN or mN normal load. The analyses of indentation loading curves with self-similar diamond indenters are used as validity check of the loading curves, also from calibration standards that exhibit previously undetected phase-transitions and are thus incorrect. The phase-transition energies for fused quartz are determined from the loading curves from instrument provider handbooks. The anisotropic behavior of phase transition energies is studied for the first time. Quartz is a useful test object. The reasons for the packing-dependent differences are discussed on the basis of the local crystal structure under and around the inserting tip. 展开更多
关键词 Instrumented INDENTATION Loading Curve Phase Transition Onset and ENERGY Iteration-Less Plot PHYSICAL EXPONENT Present ISO Standard ENERGY Law VIOLATIONS PHYSICAL Hardness Error Detections
下载PDF
Gender Forecast Based on the Information about People Who Violated Traffic Principle 被引量:1
20
作者 Rui Li Guang Sun +5 位作者 Jingyi He Ying Jiang Rui Sun Haixia Li Peng Guo and Jianjun Zhang 《Journal on Internet of Things》 2020年第2期65-73,共9页
User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and opera... User portrait has been a booming concept in big data industry in recent years which is a direct way to restore users’information.When it talks about user portrait,it will be connected with precise marketing and operating.However,there are more ways which can reflect the good use of user portrait.Commercial use is the most acceptable use but it also can be used in different industries widely.The goal of this paper is forecasting gender by user portrait and making it useful in transportation safety.It can extract the information from people who violated traffic principle to know the features of them then forecast the gender of these people.Finally,it will analyze the prediction based on characteristics correlation and forecasting results from models which can verify if gender can have an obvious influence on the traffic violation.Also we hope give some advice to drivers and traffic department by doing this research. 展开更多
关键词 User portrait gender forecast feature selection correlation analysis traffic violation
下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部