Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co...Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables.展开更多
At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of dispute...At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated.展开更多
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie...Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.展开更多
Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaire...Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors.展开更多
The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvant...The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers.展开更多
Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to ...Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language.展开更多
Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised metho...Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised methods can deal with more complicated problems such as those with nonholonomic constraints or redundant constraints, and save the computation time. Finally a numerical simulation of a multibody system is conducted by using the methods given in this paper.展开更多
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p...For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.展开更多
A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional con...A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional constraint violation stabilization method are determined according to the integration time step size and Taylor expansion method automatically. The direct integration method, the traditional constraint violation stabilization method and the new method presented in this paper are compared finally.展开更多
We calculate one-loop R-parity-violating coupling corrections to theprocesses H~- → τv_τ and H~- → bt. We find that the corrections to the H~- → τv_τ decay modeare generally about 0.1%, and can be negligible. B...We calculate one-loop R-parity-violating coupling corrections to theprocesses H~- → τv_τ and H~- → bt. We find that the corrections to the H~- → τv_τ decay modeare generally about 0.1%, and can be negligible. But the corrections to the H~- → bt decay mode canreach a few percent for the favored parameters.展开更多
The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to...The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies.展开更多
Considering the time-sequence characteristic and randomness of load and natural resources, ?this paper studies on the distributed generation (DG) impacts on voltage limit violation probability of distribution lines. T...Considering the time-sequence characteristic and randomness of load and natural resources, ?this paper studies on the distributed generation (DG) impacts on voltage limit violation probability of distribution lines. The time-sequence characteristic and randomness of load, wind and photovoltaic (PV) generation are analyzed;the indices and risk levels of voltage limit violation probability of node and distribution line are proposed. By using probabilistic load flow based on semi-invariant method, the impact degrees of voltage limit violation are calculated with different distributed power penetration levels, different seasons, different time periods, different allocation ratio between the wind power and PV power. Voltage limit violation laws of distribution line, which are concluded by IEEE33 bus system simulation, are very helpful to guide the voltage?regulation of distribution line including distributed generation.展开更多
We made an on-site investigation about pedestrian violation of traffic signals at a signalized intersection in Xi'an, Shaanxi province, China. Based on it, we studied the impact of pedestrian's waiting time on viola...We made an on-site investigation about pedestrian violation of traffic signals at a signalized intersection in Xi'an, Shaanxi province, China. Based on it, we studied the impact of pedestrian's waiting time on violation decision and the impact of the number of pedestrians in colony on the probability of swarming pedestrians' violation. The result revealed that the probability of pedestrian violation rose with the waiting time for the pedestrians' green signal. Then we developed a Monte Carlo model for simulating mixed vehicles and pedestrians and used the on-site investigation data to validate the model. When traffic volume is fight, the error between the simulated values and the measured ones is 2.67%. When traffic volume is heavy, the error is 3.38%.展开更多
This paper develops a model that could be used to visualize and predict the violation of restrictions in a given forest. The violation of restriction in this case is assumed to be the difference in areal extent betwee...This paper develops a model that could be used to visualize and predict the violation of restrictions in a given forest. The violation of restriction in this case is assumed to be the difference in areal extent between two forest cover scenes with time;termed “deforestation”. It analyses the relationship in forest cover changes overtime in Ganye Forest Reserve and Glide Cross Country Farm in Adamawa state, Nigeria. Cadastral maps of the forest reserve and farmland were used as the base maps, while the satellite images served as the spatio-temporal data. Landsat ETM+ images of 2003, 2008 and 2013 were used to identify, determine and estimate the violation of restrictions. The result shows that the violation of restrictions could be reliably determined for both the forest reserve and farmland and forecast made in order to predict future occurrence. It also revealed a continuous deforestation in the forest reserve, while in the farmland regeneration of forest stock was noticed. This information is very vital for forest management, planning and decision making in a viable land administration domain.展开更多
When Einstein developed the special theory of relativity (STR), he assumed the principle of relativity, i.e. that all inertial frames are equivalent. Einstein thought it was impossible to differentiate inertial frames...When Einstein developed the special theory of relativity (STR), he assumed the principle of relativity, i.e. that all inertial frames are equivalent. Einstein thought it was impossible to differentiate inertial frames into classically stationary frames where light propagates isotropically, and classically moving frames where light propagates anisotropically. However, the author has previously pointed out that classically moving frames have a velocity vector attached, and presented a thought experiment for determining the size of that velocity vector. The author has already shown a violation of the STR, but this paper presents a violation of the STR using different reasoning. More specifically, this paper searches for a coordinate system where light propagates anisotropically. This is done by using the correlation of two photons pair-generated from a photon pair generator. If the existence of such a coordinate system can be ascertained, it will constitute a violation of the STR.展开更多
To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violation...To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program.展开更多
Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research ...Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research objective is statistical comparison of environmental law violation against accounting abuses by Russian enterprises.A research hypothesis is put forward that companies,that violated environmental law,prepare financial reporting mostly incorrectly.An exploratory sampling from the economic entities of Russia,that violated environmental law in the course of various activities,was formed.Financial reporting of the sampling companies was analyzed by virtue of the authorial probit regression model,making it possible to reveal accounting misstatements,both overreporting and underreporting.The obtained results make it possible to assess the interrelations between the environmental law violations and financial reporting.展开更多
Quantum Mechanics formalism remains difficult to understand and sometimes is confusing, especially in the explanation of ERP paradox and of Bell’s inequalities with entanglement photons. So a chart of conversion, in ...Quantum Mechanics formalism remains difficult to understand and sometimes is confusing, especially in the explanation of ERP paradox and of Bell’s inequalities with entanglement photons. So a chart of conversion, in which elements are named differently, is proposed. Next, experiment about Bell’s inequalities violation is described in another way, and we hope a clearer one. Main result is Bell’s inequalities would not be violated! The explanation would come from confusion between the definition of the correlation function S1, and a property S2. And consequently, Einstein, Podolski and Rosen would be right on the local “hidden” variable.展开更多
In 2016 alone, around 4000 people died in crashes involving trucks in the USA, with 21% of these fatalities involving only single-unit trucks. Much research has identified the underlying factors for truck crashes.Howe...In 2016 alone, around 4000 people died in crashes involving trucks in the USA, with 21% of these fatalities involving only single-unit trucks. Much research has identified the underlying factors for truck crashes.However, few studies detected the factors unique to single and multiple crashes, and none have examined these underlying factors to severe truck crashes in conjunction with violation data. The current research assessed all of these factors using two approaches to improve truck safety.The first approach used ordinal logistic regression to investigate the contributory factors that increased the odds of severe single-truck and multiple-vehicle crashes, with involvement of at least one truck. The literature has indicated that past violations can be used to predict future violations and crashes. Therefore, the second approach used risky violations, related to truck crashes, to identify the contributory factors to the risky violations and truck crashes. Driver actions of failure to keep proper lane following too close and driving too fast for conditions accounted for about 40% of all the truck crashes. Therefore, the same violations as the aforementioned driver actions were included in the analysis. Based on ordinal logistic regression, the analysis for the first approach indicated that being under non-normal conditions at the time of crash, driving on dry-road condition and having a distraction in the cabin are some of the factors that increase the odds of severe single-truck crashes. On the other hand,speed compliance, alcohol involvement, and posted speed limits are some of the variables that impacted the severity of multiple-vehicle, truck-involved crashes. With the second approach, the violations related to risky driver actions,which were underlying causes of severe truck crashes, were identified and analysis was run to identify the groups at increased risk of truck-involved crashes. The results of violations indicated that being nonresident, driving offpeak hours, and driving on weekends could increase the risk of truck-involved crashes. This paper offers an insight into the capability of using violation data, in addition to crash data, in identification of possible countermeasures to reduce crash frequency.展开更多
This paper purposes an explanation for the recent evidence for the violation of lepton universality in beauty-quark decays at CERN’s Large Hadron Collider. A beauty meson (B<sup>+</sup>) transforms into a...This paper purposes an explanation for the recent evidence for the violation of lepton universality in beauty-quark decays at CERN’s Large Hadron Collider. A beauty meson (B<sup>+</sup>) transforms into a strange meson (K<sup>+</sup>) with the emission of either electron-positron (e<sup>+</sup>e<sup>-</sup>) or muon-antimuon (<span style="white-space:nowrap;"><em>μ</em></span><sup>+</sup><em>μ</em><sup>-</sup>). The ratio (<em>R</em><sub>K</sub>) of branching fractions for B<sup>+ </sup><span style="white-space:nowrap;">→</span> K<sup>+</sup><em>μ</em><sup>+</sup><em>μ</em><sup>- </sup>and B<sup>+</sup><span style="white-space:nowrap;">→</span> K<sup>+</sup>e<sup>+</sup>e<sup>-</sup> decays is measured to be <em>R</em><sub>K</sub> = 0.846 instead of 1 in the violation of lepton universality in the Standard Model. This paper proposes that the violation is derived from the binary isotope mixture of two beauty-quarks, b<sub>7</sub> (4979 MeV mass) and b<sub>8</sub> (143,258 MeV mass) whose masses are calculated from the periodic table of elementary particles. b<sub>7</sub> is the observable B, while b<sub>8</sub> is the hidden B to preserve the generation number symmetry between the three lepton family generations and the three quark family generations in the Standard Model. The preservation of the generation number symmetry forbids b<sub>8</sub> to decay into K<sup>+</sup><em>μ</em><sup>+</sup><em>μ</em><sup>-</sup>. In the transition state involving the virtual particles (<span style="white-space:nowrap;"><em>γ</em></span>, W± and Z<span style="white-space:nowrap;">°</span>) before the decay, b<sub>7</sub> and b<sub>8</sub> emerge to form the binary isotope mixture from B. The rates of emergence as the rates of diffuse in Graham’s law of diffusion are proportional to inverse square root of mass. The rate ratio between b<sub>8</sub>/b<sub>7</sub> is (4979/143,258)<sup>1/2</sup> = 0.1864. Since b<sub>7</sub> decays into K<sup>+</sup>, e<sup>+</sup>e<sup>-</sup>, and <em>μ</em><sup>+</sup><em>μ</em><sup>-</sup>, while b<sub>8</sub> decays into K<sup>+</sup>, e<sup>+</sup>e<sup>-</sup>, and forbidden <em>μ</em><sup>+</sup><em>μ</em><sup>-</sup>, the calculated ratio (RK) of branching fractions for B<sup>+</sup><span style="white-space:nowrap;">→</span> K<sup>+</sup><em>μ</em><sup>+</sup><em>μ</em><sup>-</sup> and B<sup>+</sup><span style="white-space:nowrap;">→</span> K<sup>+</sup>e<sup>+</sup>e<sup>- </sup>is 0.5/(0.1864 × 0.5+ 0.5) = 0.843 in excellent agreement with the observed 0.846. The agreement between the calculated RK and the observed RK confirms the validity of the periodic table of elementary particles which provides the answers for the dominance of matter over antimatter, dark-matter, and the mass hierarchy of elementary particles.展开更多
文摘Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables.
文摘At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated.
文摘Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.
基金The National Key Technology R&D Program during the 11th Five-Year Plan Period(No.2009BAG13A05)the National Natural Science Foundation of China(No.51078086)
文摘Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors.
文摘The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers.
文摘Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language.
基金Project supported by the National Natural Science Foundation of China (No. 19902006).
文摘Two constraint violation stabilization methods are presented to solve the Euler Lagrange equations of motion of a multibody system with nonholonomic constraints. Compared to the previous works, the newly devised methods can deal with more complicated problems such as those with nonholonomic constraints or redundant constraints, and save the computation time. Finally a numerical simulation of a multibody system is conducted by using the methods given in this paper.
基金National Natural Science Foundation of China under Grant No.60873213,91018008 and 61070192Beijing Science Foundation under Grant No. 4082018Shanghai Key Laboratory of Intelligent Information Processing of China under Grant No. IIPL-09-006
文摘For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.
文摘A new automatic constraint violation stabilization method for numerical integration of Euler_Lagrange equations of motion in dynamics of multibody systems is presented. The parameters α,β used in the traditional constraint violation stabilization method are determined according to the integration time step size and Taylor expansion method automatically. The direct integration method, the traditional constraint violation stabilization method and the new method presented in this paper are compared finally.
文摘We calculate one-loop R-parity-violating coupling corrections to theprocesses H~- → τv_τ and H~- → bt. We find that the corrections to the H~- → τv_τ decay modeare generally about 0.1%, and can be negligible. But the corrections to the H~- → bt decay mode canreach a few percent for the favored parameters.
文摘The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies.
文摘Considering the time-sequence characteristic and randomness of load and natural resources, ?this paper studies on the distributed generation (DG) impacts on voltage limit violation probability of distribution lines. The time-sequence characteristic and randomness of load, wind and photovoltaic (PV) generation are analyzed;the indices and risk levels of voltage limit violation probability of node and distribution line are proposed. By using probabilistic load flow based on semi-invariant method, the impact degrees of voltage limit violation are calculated with different distributed power penetration levels, different seasons, different time periods, different allocation ratio between the wind power and PV power. Voltage limit violation laws of distribution line, which are concluded by IEEE33 bus system simulation, are very helpful to guide the voltage?regulation of distribution line including distributed generation.
基金The National Natural Science Foundation of China (No.60134010)
文摘We made an on-site investigation about pedestrian violation of traffic signals at a signalized intersection in Xi'an, Shaanxi province, China. Based on it, we studied the impact of pedestrian's waiting time on violation decision and the impact of the number of pedestrians in colony on the probability of swarming pedestrians' violation. The result revealed that the probability of pedestrian violation rose with the waiting time for the pedestrians' green signal. Then we developed a Monte Carlo model for simulating mixed vehicles and pedestrians and used the on-site investigation data to validate the model. When traffic volume is fight, the error between the simulated values and the measured ones is 2.67%. When traffic volume is heavy, the error is 3.38%.
文摘This paper develops a model that could be used to visualize and predict the violation of restrictions in a given forest. The violation of restriction in this case is assumed to be the difference in areal extent between two forest cover scenes with time;termed “deforestation”. It analyses the relationship in forest cover changes overtime in Ganye Forest Reserve and Glide Cross Country Farm in Adamawa state, Nigeria. Cadastral maps of the forest reserve and farmland were used as the base maps, while the satellite images served as the spatio-temporal data. Landsat ETM+ images of 2003, 2008 and 2013 were used to identify, determine and estimate the violation of restrictions. The result shows that the violation of restrictions could be reliably determined for both the forest reserve and farmland and forecast made in order to predict future occurrence. It also revealed a continuous deforestation in the forest reserve, while in the farmland regeneration of forest stock was noticed. This information is very vital for forest management, planning and decision making in a viable land administration domain.
文摘When Einstein developed the special theory of relativity (STR), he assumed the principle of relativity, i.e. that all inertial frames are equivalent. Einstein thought it was impossible to differentiate inertial frames into classically stationary frames where light propagates isotropically, and classically moving frames where light propagates anisotropically. However, the author has previously pointed out that classically moving frames have a velocity vector attached, and presented a thought experiment for determining the size of that velocity vector. The author has already shown a violation of the STR, but this paper presents a violation of the STR using different reasoning. More specifically, this paper searches for a coordinate system where light propagates anisotropically. This is done by using the correlation of two photons pair-generated from a photon pair generator. If the existence of such a coordinate system can be ascertained, it will constitute a violation of the STR.
文摘To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program.
文摘Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research objective is statistical comparison of environmental law violation against accounting abuses by Russian enterprises.A research hypothesis is put forward that companies,that violated environmental law,prepare financial reporting mostly incorrectly.An exploratory sampling from the economic entities of Russia,that violated environmental law in the course of various activities,was formed.Financial reporting of the sampling companies was analyzed by virtue of the authorial probit regression model,making it possible to reveal accounting misstatements,both overreporting and underreporting.The obtained results make it possible to assess the interrelations between the environmental law violations and financial reporting.
文摘Quantum Mechanics formalism remains difficult to understand and sometimes is confusing, especially in the explanation of ERP paradox and of Bell’s inequalities with entanglement photons. So a chart of conversion, in which elements are named differently, is proposed. Next, experiment about Bell’s inequalities violation is described in another way, and we hope a clearer one. Main result is Bell’s inequalities would not be violated! The explanation would come from confusion between the definition of the correlation function S1, and a property S2. And consequently, Einstein, Podolski and Rosen would be right on the local “hidden” variable.
文摘In 2016 alone, around 4000 people died in crashes involving trucks in the USA, with 21% of these fatalities involving only single-unit trucks. Much research has identified the underlying factors for truck crashes.However, few studies detected the factors unique to single and multiple crashes, and none have examined these underlying factors to severe truck crashes in conjunction with violation data. The current research assessed all of these factors using two approaches to improve truck safety.The first approach used ordinal logistic regression to investigate the contributory factors that increased the odds of severe single-truck and multiple-vehicle crashes, with involvement of at least one truck. The literature has indicated that past violations can be used to predict future violations and crashes. Therefore, the second approach used risky violations, related to truck crashes, to identify the contributory factors to the risky violations and truck crashes. Driver actions of failure to keep proper lane following too close and driving too fast for conditions accounted for about 40% of all the truck crashes. Therefore, the same violations as the aforementioned driver actions were included in the analysis. Based on ordinal logistic regression, the analysis for the first approach indicated that being under non-normal conditions at the time of crash, driving on dry-road condition and having a distraction in the cabin are some of the factors that increase the odds of severe single-truck crashes. On the other hand,speed compliance, alcohol involvement, and posted speed limits are some of the variables that impacted the severity of multiple-vehicle, truck-involved crashes. With the second approach, the violations related to risky driver actions,which were underlying causes of severe truck crashes, were identified and analysis was run to identify the groups at increased risk of truck-involved crashes. The results of violations indicated that being nonresident, driving offpeak hours, and driving on weekends could increase the risk of truck-involved crashes. This paper offers an insight into the capability of using violation data, in addition to crash data, in identification of possible countermeasures to reduce crash frequency.
文摘This paper purposes an explanation for the recent evidence for the violation of lepton universality in beauty-quark decays at CERN’s Large Hadron Collider. A beauty meson (B<sup>+</sup>) transforms into a strange meson (K<sup>+</sup>) with the emission of either electron-positron (e<sup>+</sup>e<sup>-</sup>) or muon-antimuon (<span style="white-space:nowrap;"><em>μ</em></span><sup>+</sup><em>μ</em><sup>-</sup>). The ratio (<em>R</em><sub>K</sub>) of branching fractions for B<sup>+ </sup><span style="white-space:nowrap;">→</span> K<sup>+</sup><em>μ</em><sup>+</sup><em>μ</em><sup>- </sup>and B<sup>+</sup><span style="white-space:nowrap;">→</span> K<sup>+</sup>e<sup>+</sup>e<sup>-</sup> decays is measured to be <em>R</em><sub>K</sub> = 0.846 instead of 1 in the violation of lepton universality in the Standard Model. This paper proposes that the violation is derived from the binary isotope mixture of two beauty-quarks, b<sub>7</sub> (4979 MeV mass) and b<sub>8</sub> (143,258 MeV mass) whose masses are calculated from the periodic table of elementary particles. b<sub>7</sub> is the observable B, while b<sub>8</sub> is the hidden B to preserve the generation number symmetry between the three lepton family generations and the three quark family generations in the Standard Model. The preservation of the generation number symmetry forbids b<sub>8</sub> to decay into K<sup>+</sup><em>μ</em><sup>+</sup><em>μ</em><sup>-</sup>. In the transition state involving the virtual particles (<span style="white-space:nowrap;"><em>γ</em></span>, W± and Z<span style="white-space:nowrap;">°</span>) before the decay, b<sub>7</sub> and b<sub>8</sub> emerge to form the binary isotope mixture from B. The rates of emergence as the rates of diffuse in Graham’s law of diffusion are proportional to inverse square root of mass. The rate ratio between b<sub>8</sub>/b<sub>7</sub> is (4979/143,258)<sup>1/2</sup> = 0.1864. Since b<sub>7</sub> decays into K<sup>+</sup>, e<sup>+</sup>e<sup>-</sup>, and <em>μ</em><sup>+</sup><em>μ</em><sup>-</sup>, while b<sub>8</sub> decays into K<sup>+</sup>, e<sup>+</sup>e<sup>-</sup>, and forbidden <em>μ</em><sup>+</sup><em>μ</em><sup>-</sup>, the calculated ratio (RK) of branching fractions for B<sup>+</sup><span style="white-space:nowrap;">→</span> K<sup>+</sup><em>μ</em><sup>+</sup><em>μ</em><sup>-</sup> and B<sup>+</sup><span style="white-space:nowrap;">→</span> K<sup>+</sup>e<sup>+</sup>e<sup>- </sup>is 0.5/(0.1864 × 0.5+ 0.5) = 0.843 in excellent agreement with the observed 0.846. The agreement between the calculated RK and the observed RK confirms the validity of the periodic table of elementary particles which provides the answers for the dominance of matter over antimatter, dark-matter, and the mass hierarchy of elementary particles.