WorldWideScience

Sample records for safety violations submitted

  1. Risk assessment of safety violations for coal mines

    Energy Technology Data Exchange (ETDEWEB)

    Megan Orsulaka; Vladislav Kecojevicb; Larry Graysona; Antonio Nietoa [Pennsylvania State University, University Park, PA (United States). Dept of Energy and Mineral Engineering

    2010-09-15

    This article presents an application of a risk assessment approach in characterising the risks associated with safety violations in underground bituminous mines in Pennsylvania using the Mine Safety and Health Administration (MSHA) citation database. The MSHA database on citations provides an opportunity to assess risks in mines through scrutiny of violations of mandatory safety standards. In this study, quantitative risk assessment is performed, which allows determination of the frequency of occurrence of safety violations (through associated citations) as well as the consequences of them in terms of penalty assessments. Focus is on establishing risk matrices on citation experiences of mines, which can give early indication of emerging potentially serious problems. The resulting frequency, consequence and risk rankings present valuable tools for prioritising resource allocations, determining control strategies, and could potentially contribute to more proactive prevention of incidents and injuries.

  2. Wages, wage violations, and pesticide safety experienced by migrant farmworkers in North Carolina.

    Science.gov (United States)

    Robinson, Erin; Nguyen, Ha T; Isom, Scott; Quandt, Sara A; Grzywacz, Joseph G; Chen, Haiying; Arcury, Thomas A

    2011-01-01

    Farmworkers have the potential to receive wages that fail to meet minimum wage standards. This analysis describes wages and minimum wage violations among farmworkers, and it determines associations of wage violations with personal characteristics and pesticide safety regulation violations. Data are from a cross-sectional survey of 300 eastern North Carolina farmworkers conducted in June through August, 2009. Most farmworkers (90.0%) were paid by the hour, but 11.7 percent received piece-rate pay. Wage violations were prevalent among farmworkers: 18.3 percent of all farmworkers, 45.3 percent of farmworkers without H-2A visas, and 3.6 percent of farmworkers with H-2A visas experienced wage violations. Most farmworkers experienced numerous pesticide safety violations. Personal characteristics were not associated with wage violations among farmworkers without H-2A visas, but some pesticide safety violations were associated with wage violations. The association of violations indicates that some growers generally violate regulations. Greater enforcement of all regulations is needed.

  3. The Impact of Coworkers’ Safety Violations on an Individual Worker: A Social Contagion Effect within the Construction Crew

    Science.gov (United States)

    Zhang, Shoujian; Su, Yikun

    2018-01-01

    This research developed and tested a model of the social contagion effect of coworkers’ safety violations on individual workers within construction crews. Both situational and routine safety violations were considered in this model. Empirical data were collected from 345 construction workers in China using a detailed questionnaire. The results showed that both types of safety violations made by coworkers were significantly related to individuals’ perceived social support and production pressure. Individuals’ attitudinal ambivalence toward safety compliance mediated the relationships between perceived social support and production pressure and both types of individuals’ safety violations. However, safety motivation only mediated the effects of perceived social support and production pressure on individuals’ situational safety violations. Further, this research supported the differences between situational and routine safety violations. Specifically, we found that individuals were more likely to imitate coworkers’ routine safety violations than their situational safety violations. Coworkers’ situational safety violations had an indirect effect on individuals’ situational safety violations mainly through perceived social support and safety motivation. By contrast, coworkers’ routine safety violations had an indirect effect on individuals’ routine safety violations mainly through perceived production pressure and attitudinal ambivalence. Finally, the theoretical and practical implications, research limitations, and future directions were discussed. PMID:29673149

  4. The Impact of Coworkers' Safety Violations on an Individual Worker: A Social Contagion Effect within the Construction Crew.

    Science.gov (United States)

    Liang, Huakang; Lin, Ken-Yu; Zhang, Shoujian; Su, Yikun

    2018-04-17

    This research developed and tested a model of the social contagion effect of coworkers’ safety violations on individual workers within construction crews. Both situational and routine safety violations were considered in this model. Empirical data were collected from 345 construction workers in China using a detailed questionnaire. The results showed that both types of safety violations made by coworkers were significantly related to individuals’ perceived social support and production pressure. Individuals’ attitudinal ambivalence toward safety compliance mediated the relationships between perceived social support and production pressure and both types of individuals’ safety violations. However, safety motivation only mediated the effects of perceived social support and production pressure on individuals’ situational safety violations. Further, this research supported the differences between situational and routine safety violations. Specifically, we found that individuals were more likely to imitate coworkers’ routine safety violations than their situational safety violations. Coworkers’ situational safety violations had an indirect effect on individuals’ situational safety violations mainly through perceived social support and safety motivation. By contrast, coworkers’ routine safety violations had an indirect effect on individuals’ routine safety violations mainly through perceived production pressure and attitudinal ambivalence. Finally, the theoretical and practical implications, research limitations, and future directions were discussed.

  5. The impact of masculinity on safety oversights, safety priority and safety violations in two male-dominated occupations

    DEFF Research Database (Denmark)

    Nielsen, Kent; Hansen, Claus D.; Bloksgaard, Lotte

    2015-01-01

    Background Although men have a higher risk of occupational injuries than women the role of masculinity for organizational safety outcomes has only rarely been the object of research. Aim The current study investigated the association between masculinity and safety oversights, safety priority......-related context factors (safety leadership, commitment of the safety representative, and safety involvement) and three safety-related outcome factors (safety violations, safety oversights and safety priority) were administered twice 12 months apart to Danish ambulance workers (n = 1157) and slaughterhouse workers...

  6. Toward the modelling of safety violations in healthcare systems.

    Science.gov (United States)

    Catchpole, Ken

    2013-09-01

    When frontline staff do not adhere to policies, protocols, or checklists, managers often regard these violations as indicating poor practice or even negligence. More often than not, however, these policy and protocol violations reflect the efforts of well intentioned professionals to carry out their work efficiently in the face of systems poorly designed to meet the diverse demands of patient care. Thus, non-compliance with institutional policies and protocols often signals a systems problem, rather than a people problem, and can be influenced among other things by training, competing goals, context, process, location, case complexity, individual beliefs, the direct or indirect influence of others, job pressure, flexibility, rule definition, and clinician-centred design. Three candidates are considered for developing a model of safety behaviour and decision making. The dynamic safety model helps to understand the relationship between systems designs and human performance. The theory of planned behaviour suggests that intention is a function of attitudes, social norms and perceived behavioural control. The naturalistic decision making paradigm posits that decisions are based on a wider view of multiple patients, expertise, systems complexity, behavioural intention, individual beliefs and current understanding of the system. Understanding and predicting behavioural safety decisions could help us to encourage compliance to current processes and to design better interventions.

  7. Inspection Frequency, Sociodemographic Factors, and Food Safety Violations in Chain and Nonchain Restaurants, Philadelphia, Pennsylvania, 2013-2014.

    Science.gov (United States)

    Leinwand, Sarah E; Glanz, Karen; Keenan, Brendan T; Branas, Charles C

    We explored how restaurant inspection frequency and restaurant neighborhood sociodemographic characteristics are related to food safety inspection outcomes in chain and nonchain restaurants to better understand external factors that may influence inspection outcomes. We categorized the results of restaurant inspections in Philadelphia, Pennsylvania, in 2013 and 2014 by restaurant type (chain or nonchain), inspection frequency (1, 2, or ≥3 per 2-year study period), and violation type (total number of violations, foodborne-illness risk factor violation, or good retail practice violation). We collected 2013 US Census block group sociodemographic data for each restaurant neighborhood. We used nested mixed-effects regression analyses to determine the association between restaurant inspection frequency and inspection violations, as well as between inspection violations and restaurant neighborhood sociodemographic variables, stratified by restaurant type. Compared with nonchain restaurants, chain restaurants had significantly fewer total violations per inspection (mean [SD]: 6.5 [4.6] vs 9.6 [6.8] violations, P chain restaurants. For nonchain restaurants, a higher proportion of black residents in a restaurant neighborhood was associated with 0.6 ( P food safety inspection frequency, based on whether or not restaurants are part of chains, could reduce the frequency of violations, particularly in restaurants with the most violations.

  8. 76 FR 11187 - Examinations of Work Areas in Underground Coal Mines for Violations of Mandatory Health or Safety...

    Science.gov (United States)

    2011-03-01

    ... DEPARTMENT OF LABOR Mine Safety and Health Administration 30 CFR Part 75 RIN 1219-AB75 Examinations of Work Areas in Underground Coal Mines for Violations of Mandatory Health or Safety Standards... rule addressing Examinations of Work Areas in Underground Coal Mines for Violations of Mandatory Health...

  9. Safety of protocol violations in acute stroke tPA administration.

    Science.gov (United States)

    Lyerly, Michael J; Albright, Karen C; Boehme, Amelia K; Bavarsad Shahripour, Reza; Houston, James T; Rawal, Pawan V; Kapoor, Niren; Alvi, Muhammad; Sisson, April; Alexandrov, Anne W; Alexandrov, Andrei V

    2014-01-01

    Intravenous (IV) tissue plasminogen activator remains the only approved therapy for acute ischemic stroke (AIS) in the United States; however, less than 10% of patients receive treatment. This is partially because of the large number of contraindications, narrow treatment window, and physician reluctance to deviate from these criteria. We retrospectively analyzed consecutive patients who received IV thrombolysis at our stroke center for National Institute of Neurological Disorders and Stroke (NINDS) protocol violations and rates of symptomatic intracerebral hemorrhage (sICH). Other outcome variables included systemic hemorrhage, modified Rankin Scale at discharge, and discharge disposition. A total of 212 patients were identified in our stroke registry between 2009 and 2011 and included in the analysis. Protocol violations occurred in 76 patients (36%). The most common violations were thrombolysis beyond 3 hours (26%), aggressive blood pressure management (15%), elevated prothrombin time (PT) or partial thromboplastin time (PTT) (6.6%), minor or resolving deficits (4.2%), unclear time of onset (3.9%), and stroke within 3 months (3%). There were no significant differences in any of the safety outcomes or discharge disposition between patients with or without protocol violations. Controlling for age, National Institutes of Health Stroke Scale on admission, and glucose on admission, there was no significant increase in sICH (odds ratio: 3.8; 95% confidence interval: .37-38.72) in the patients who had protocol violations. Despite more than one third of patients receiving thrombolysis with protocol violations, overall rates of hemorrhage remained low and did not differ from those who did not have violations. Our data support the need to expand access to thrombolysis in AIS patients. Published by Elsevier Inc.

  10. Responsibility for the Violation of Ecological Safety Requirements

    Science.gov (United States)

    Selivanovskaya, J. I.; Gilmutdinova, I.

    2018-01-01

    The article deals with the problems of responsibility for the violation of ecological safety requirements from the point of view of sustainable development of the state. Such types of responsibility as property, disciplinary, financial, administrative and criminal responsibility in the area are analysed. Suggestions on the improvement of legislation are put forward. Among other things it is suggested to introduce criminal sanctions against legal bodies (enterprises) for ecological crimes with punishments in the form of fines, suspension or discontinuation of activities.

  11. Strategies to reduce safety violations for working from heights in construction companies: study protocol for a randomized controlled trial.

    Science.gov (United States)

    van der Molen, Henk F; Frings-Dresen, Monique H W

    2014-05-31

    Safety measures should be applied to reduce work-related fatal and non-fatal fall injuries. However, according to the labor inspectorate, more than 80% of Dutch construction sites violate safety regulations for working from heights. To increase compliance with safety regulations, employers and workers have to select, implement and monitor safety measures. To facilitate this behavioral change, stimulating knowledge awareness and personalized feedback are frequently advocated behavior change techniques. For this study, two behavior change strategies have been developed in addition to the announcement of safety inspections by the labor inspectorate. These strategies consist of 1) face-to-face contacts with safety consultants and 2) direct mail with access to internet facilities. The objective of this study is to evaluate the effectiveness of these two strategies on the safety violations for working from heights, the process and the cost measures. This study is a block randomized intervention trial in 27 cities to establish the effects of the face-to-face guidance strategy (N = 9), a direct mailing strategy (N = 9) and a control condition of no guidance (N = 9) on safety violations to record by labor inspectors after three months. A process evaluation for both strategies will be performed to determine program implementation (reach, dose delivered and dose received), satisfaction, knowledge and perceived safety behavior. A cost analysis will be performed to establish the financial costs for both strategies. The present study is in accordance with the CONSORT statement. This study increases insight into performing practice-based randomized controlled trials. The outcome will help to evaluate the effect of two guidance strategies on safety violations. If these strategies are effective, implementation of these strategies through the national institute of safety and health or labor inspectorate can take place to guide construction companies in complying with

  12. 14 CFR 193.5 - How may I submit safety or security information and have it protected from disclosure?

    Science.gov (United States)

    2010-01-01

    ... SUBMITTED INFORMATION § 193.5 How may I submit safety or security information and have it protected from... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false How may I submit safety or security information and have it protected from disclosure? 193.5 Section 193.5 Aeronautics and Space FEDERAL AVIATION...

  13. 77 FR 20700 - Examinations of Work Areas in Underground Coal Mines for Violations of Mandatory Health or Safety...

    Science.gov (United States)

    2012-04-06

    ... DEPARTMENT OF LABOR Mine Safety and Health Administration 30 CFR Part 75 RIN 1219-AB75 Examinations of Work Areas in Underground Coal Mines for Violations of Mandatory Health or Safety Standards AGENCY: Mine Safety and Health Administration, Labor. ACTION: Final rule. SUMMARY: The Mine Safety and...

  14. 77 FR 43721 - Examinations of Work Areas in Underground Coal Mines for Violations of Mandatory Health or Safety...

    Science.gov (United States)

    2012-07-26

    ... DEPARTMENT OF LABOR Mine Safety and Health Administration 30 CFR Part 75 RIN 1219-AB75 Examinations of Work Areas in Underground Coal Mines for Violations of Mandatory Health or Safety Standards AGENCY: Mine Safety and Health Administration, Labor. ACTION: Notice of OMB approval of information...

  15. 76 FR 18467 - Pattern of Violations

    Science.gov (United States)

    2011-04-04

    ... Eastern Daylight Savings Time on April 18, 2011. ADDRESSES: Submit comments by any of the following... proposed rule addressing Pattern of Violations (POV). This extension gives commenters additional time to...

  16. Strategies to reduce safety violations for working from heights in construction companies: study protocol for a randomized controlled trial

    NARCIS (Netherlands)

    van der Molen, Henk F.; Frings-Dresen, Monique H. W.

    2014-01-01

    Safety measures should be applied to reduce work-related fatal and non-fatal fall injuries. However, according to the labor inspectorate, more than 80% of Dutch construction sites violate safety regulations for working from heights. To increase compliance with safety regulations, employers and

  17. Effects of safety climate on safety norm violations: exploring the mediating role of attitudinal ambivalence toward personal protective equipment.

    Science.gov (United States)

    Cavazza, Nicoletta; Serpe, Alessandra

    2009-01-01

    Research on the role of organizational and psychosocial factors in influencing risk behaviors and the likelihood of injury at work showed that safety climate also has great impact on workers' behavior. However, the mechanisms through which this impact operates are still partially unclear. In order to explore the role that attitudinal ambivalence toward wearing PPE might play in mediating the impact of safety climate on safety norm violations, a questionnaire was administered to 345 Italian workers. Three dimensions of safety climate (i.e., company safety concern, senior managers' safety concern, supervisors' attitudes towards safety) were found to be positively associated with the individual ambivalence level, whereas the fourth one (i.e., work pressure) was negatively correlated with it. In turn, low levels of ambivalence were associated with a lower tendency to break the safety norms, even though the perception of a good safety climate also maintained a direct effect on unsafe behaviors. Designers of training program for the prevention of work related injuries must pay great attention to the psycho-social factors (such as the effects of the safety climate perception by employees on their attitudes and behaviors), and include specific contents into the prevention programs in order to improve workers compliance with safety norms.

  18. 75 FR 33614 - Adequacy Status of the Submitted 2009 PM2.5

    Science.gov (United States)

    2010-06-14

    ... that transportation activities will not produce new air quality violations, worsen existing violations... the Submitted 2009 PM 2.5 Motor Vehicle Emission Budgets for Transportation Conformity Purposes for..., PM 2.5 nonattainment areas to be adequate for transportation conformity purposes. The transportation...

  19. National evaluation of strategies to reduce safety violations for working from heights in construction companies: results from a randomized controlled trial.

    Science.gov (United States)

    van der Molen, Henk F; den Herder, Aalt; Warning, Jan; Frings-Dresen, Monique H W

    2016-01-09

    The objective of this study is to evaluate the effectiveness of a face-to-face strategy and a direct mail strategy on safety violations while working from heights among construction companies compared to a control condition. Construction companies with workers at risk for fall injuries were eligible for this three-armed randomized controlled trial. In total, 27 cities were randomly assigned to intervention groups-where eligible companies were given either a face-to-face guidance strategy or a direct mailing strategy with access to internet facilities-or to a control group. The primary outcomes were the number and type of safety violations recorded by labor inspectors after three months. A process evaluation for both strategies was performed to determine reach, program implementation, satisfaction, knowledge and perceived safety behavior. A cost analysis was performed to establish the financial costs for each intervention strategy. Analyses were done by intention to treat. In total, 41% (n = 88) of the companies eligible for the face-to-face intervention participated and 73% (n = 69) for direct mail. Intervention materials were delivered to 69 % (face-to-face group) and 100 % (direct mail group); completion of intervention activities within companies was low. Satisfaction, increase in knowledge, and safety behavior did not differ between the intervention groups. Costs for personal advice were 28% higher than for direct mail. Ultimately, nine intervention companies were captured in the 288 worksite measurements performed by the labor inspectorate. No statistical differences in mean number of safety violations (1.8-2.4) or penalties (72%-100%) were found between the intervention and control groups based on all worksite inspections. No conclusions about the effect of face-to-face and direct mail strategies on safety violations could be drawn due to the limited number of intervention companies captured in the primary outcome measurements. The costs for a face

  20. The role of OSHA violations in serious workplace accidents.

    Science.gov (United States)

    Mendeloff, J

    1984-05-01

    California accident investigations for 1976 show that violations of the Occupational Safety and Health Administration's safety standards were a contributing factor in 13% to 19% of the 645 deaths reported to the workers' compensation program during that year. However, a panel of safety engineers judged that only about 50% of these violations could have been detected if an inspector had visited the day before the accident. These findings indicate that the potential gains from stronger enforcement of current standards are limited but not insignificant. The likelihood that a violation contributed to a serious accident varied considerably among accident types, industries, and size classes of plants. These findings can be used to increase the efficiency and effectiveness of the OSHA program by means of better targeting of inspections and accident investigations, more intelligent assessment of which violations should be penalized most heavily, and the provision of information to employers and workers about which violations are most consequential.

  1. 75 FR 56558 - Proposed Information Collection Request Submitted for Public Comment and Recommendations; Safety...

    Science.gov (United States)

    2010-09-16

    .... Safety defects found on compressed-air receivers and other unfired pressure vessels have caused injuries....14100, 56/57.13015, 56/57.13030, and 56/57.18002. DATES: All comments must be received by midnight... rule title and may be submitted to MSHA by any of the following methods: (1) Electronic mail: zzMSHA...

  2. Prototype Rail Crossing Violation Warning Application Project Report.

    Science.gov (United States)

    2017-09-05

    This report is the Project Report for the Rail Crossing Violation Warning (RCVW) safety application developed for the project on Rail Crossing Violation Warning Application and Infrastructure Connection, providing a means for equipped connected vehic...

  3. Safety behavior: Job demands, job resources, and perceived management commitment to safety.

    Science.gov (United States)

    Hansez, Isabelle; Chmiel, Nik

    2010-07-01

    The job demands-resources model posits that job demands and resources influence outcomes through job strain and work engagement processes. We test whether the model can be extended to effort-related "routine" safety violations and "situational" safety violations provoked by the organization. In addition we test more directly the involvement of job strain than previous studies which have used burnout measures. Structural equation modeling provided, for the first time, evidence of predicted relationships between job strain and "routine" violations and work engagement with "routine" and "situational" violations, thereby supporting the extension of the job demands-resources model to safety behaviors. In addition our results showed that a key safety-specific construct 'perceived management commitment to safety' added to the explanatory power of the job demands-resources model. A predicted path from job resources to perceived management commitment to safety was highly significant, supporting the view that job resources can influence safety behavior through both general motivational involvement in work (work engagement) and through safety-specific processes.

  4. National evaluation of strategies to reduce safety violations for working from heights in construction companies: results from a randomized controlled trial

    NARCIS (Netherlands)

    van der Molen, Henk F.; den Herder, Aalt; Warning, Jan; Frings-Dresen, Monique H. W.

    2016-01-01

    The objective of this study is to evaluate the effectiveness of a face-to-face strategy and a direct mail strategy on safety violations while working from heights among construction companies compared to a control condition. Construction companies with workers at risk for fall injuries were eligible

  5. Upgrade in the CNSNS of the determination process about the importance for the impact evaluation to the safety of defaults or violations in the national nuclear facilities

    International Nuclear Information System (INIS)

    Espinosa V, J. M.; Jauregui Ch, V.

    2014-10-01

    Inside the process of Impact Evaluation to the Safety of the Direccion General Adjunta de Seguridad Nuclear of the Comision Nacional de Seguridad Nuclear y Salvaguardias (CNSNS) the Significance Determination Process (SDP) is used, developed by the United States Nuclear Regulatory Commission (US NRC), to evaluate the violations or defaults to the regulatory framework and to determine its importance to the risk by means of a fixed color: Green (Very low impact to the safety), White (Low impact to moderate to the safety), Yellow (Substantial impact to the safety) or Red (High impact to the safety). All this inside the seven safety foundations of the Reactor Oversight Process: Initiator Events, Mitigation Systems, Integrity of the Barriers, Preparation for Emergencies, Occupational Radiological Safety, Radiological Safety of the Public and Physical Safety. At present the US NRC has developed a new version of the SDP, which presents changes in its structure and the opportunity of carrying out informed evaluations in risk, with more detail about the violations or defaults that happen in different areas. The CNSNS carries out the adaptation of this last version of the SDP in order to have an updated tool for the violations and defaults characterization to the regulatory framework happened in the nuclear power plant of Laguna Verde. In this article is mentioned the legal framework that confers the CNSNS the attributions to impose urgency measures and administrative sanctions to its licensees, also is established the definition of the different colors that the SDP contemplates in function of the increased risk (ΔCdf), a description of the SDP objectives and the elements that conform it is presented, in the same way some examples to illustrate its application are raised. Finally, the steps to continue for their implementation are mentioned. (Author)

  6. 77 FR 24415 - Inflation Adjustment of the Aggravated Maximum Civil Monetary Penalty for a Violation of a...

    Science.gov (United States)

    2012-04-24

    ... Adjustment of the Aggravated Maximum Civil Monetary Penalty for a Violation of a Federal Railroad Safety Law...'') raised the maximum civil penalties available under the railroad safety laws and made individuals liable..., the RSIA raised the maximum civil penalties for violations of the Federal rail safety laws...

  7. Case study on the quality of tenders submitted by Occupational Health and Safety Professionals in the South African built environment

    CSIR Research Space (South Africa)

    Mphahlele, C

    2017-08-01

    Full Text Available Purpose of this paper: The purpose of the paper is to provide an overview of the current state of tenders submitted by Occupational Health and Safety (OHS) professionals in terms of functionality criteria. Design/methodology/approach: The research...

  8. Redefining commercial vehicle permitting and credentialing violations.

    Science.gov (United States)

    2015-08-01

    The objective of this study was to analyze enforcement and adjudication of common commercial vehicle tax, credentialing, and safety offenses. This study examined violations of the International Fuel Tax Agreement and the Kentucky Intrastate Tax, Kent...

  9. An analysis of violations of Osha's (1987) occupational exposure to benzene standard.

    Science.gov (United States)

    Williams, Pamela R D

    2014-01-01

    The Occupational Safety and Health Administration (OSHA), which was formed by the Occupational Safety and Health Act of 1970 (OSH Act), establishes enforceable health and safety standards in the workplace and issues violations and penalties for non-compliance with these standards. The purpose of the current study was to evaluate the number and type of violations of the OSHA (1987) Occupational Exposure to Benzene Standard. Violations of the OSHA Hazard Communication Standard (HCS), particularly those that may pertain to specific provisions of the benzene standard, were also assessed. All analyses were based on OSHA inspection data that have been collected since the early 1970s and that are publicly available from the U.S. Department of Labor enforcement website. Analysis of these data shows that fewer than a thousand OSHA violations of the benzene standard have been issued over the last 25+ years. The results for benzene are in contrast to those for some other toxic and hazardous substances that are regulated by OSHA, such as blood-borne pathogens, lead, and asbestos, for which there have been issued tens of thousands of OSHA violations. The number of benzene standard violations also varies by time period, standard provision, industry sector, and other factors. In particular, the greatest number of benzene standard violations occurred during the late 1980s to early/mid 1990s, soon after the 1987 final benzene rule was promulgated. The majority of benzene standard violations also pertain to noncompliance with specific provisions and subprovisions of the standard dealing with initial exposure monitoring requirements, the communication of hazards to employees, and medical surveillance programs. Only a small fraction of HCS violations are attributed, at least in part, to potential benzene hazards in the workplace. In addition, most benzene standard violations are associated with specific industries within the manufacturing sector where benzene or benzene

  10. 75 FR 57597 - Revised Proposal for Revisions to the Schedules of Civil Penalties for a Violation of a Federal...

    Science.gov (United States)

    2010-09-21

    ... Revisions to the Schedules of Civil Penalties for a Violation of a Federal Railroad Safety Law or Federal... railroad safety laws and regulations are necessary because many of FRA's civil penalties have not been..., et al. Revised Proposal for Revisions to the Schedules of Civil Penalties for a Violation of a...

  11. Algorithm for detecting violations of traffic rules based on computer vision approaches

    Directory of Open Access Journals (Sweden)

    Ibadov Samir

    2017-01-01

    Full Text Available We propose a new algorithm for automatic detect violations of traffic rules for improving the people safety on the unregulated pedestrian crossing. The algorithm uses multi-step proceedings. They are zebra detection, cars detection, and pedestrian detection. For car detection, we use faster R-CNN deep learning tool. The algorithm shows promising results in the detection violations of traffic rules.

  12. Brain Injury Safety Tips and Prevention

    Science.gov (United States)

    ... submit" name="commit" type="submit" value="Submit" /> Brain Injury Safety Tips and Prevention Recommend on Facebook ... not grass or dirt. More HEADS UP Video: Brain Injury Safety and Prevention frame support disabled and/ ...

  13. NRC Information No. 90-01: Importance of proper response to self-identified violations by licensees

    International Nuclear Information System (INIS)

    Cunningham, R.E.

    1992-01-01

    NRC expects a high standard of compliance by its licensees and requires that licensees provide NRC accurate and complete information and that required records will also be complete and accurate in all material respects. Licensees should be aware of the importance placed by NRC on licensee programs for self detection, correction and reporting of violations or errors related to regulatory requirements. The General Statement of Policy and Procedures for NRC Enforcement Actions in Appendix C to 10 CFR Part 2 underscores the importance of licensees responding promptly and properly to self-identified violations in two ways. It is suggested that when a licensee identifies a violation involving an NRC-required record, the licensee should make a dated notation indicating identification, either on the record itself or other appropriate documentation retrievable for NRC review. The record with the self-identified violation noted should not be altered in any way to mask the correction. The licensee should determine the cause of the violation, correct the root cause of the violation, and document such findings in an appropriate manner. Licensees should also assure that if a report of the violation is required, the report is submitted to NRC in a timely manner. These actions will be considered by NRC in making any enforcement decision, and generally lead to lesser or no civil penalty

  14. Human-vehicle embodiment when predictability is violated.

    Science.gov (United States)

    Tanida, Koji; Paolini, Marco; Silveira, Sarita

    2017-09-01

    Embodiment in human-vehicle interaction is higher for perceived safety than for perceived risk. When operational anticipations are violated, experiencing a vehicle as body-extension is negatively correlated with operational effort as indicated by neural activation in the motor system. © 2017 The Institute of Psychology, Chinese Academy of Sciences and John Wiley & Sons Australia, Ltd.

  15. CP violation

    CERN Document Server

    1989-01-01

    Contents: CP Phenomenology: Introduction to CP Violation (C Jarlskog); CP-Violation in the K 0 -K 0 -System (K Kleinknecht); The Quark Mixing Matrix, Charm Decays and B Decays (S Stone); The Question of CP Noninvariance - As Seen through the Eyes of Neutral Beauty (I I Bigi et al.); In Search of CP Noninvariance in Heavy Quark Systems (L-L Chau); CP Violation at High Energy e + e - Colliders (J Bernabéu & M B Gavela); CP Violation in the Standard Model with Four Families (A Datta & E A Paschos); CP Effects When Neutrinos are their Own Antiparticles (B Kayser); On Spontaneous CP Violation Trigg

  16. 9 CFR 355.27 - Reports of violations of regulations.

    Science.gov (United States)

    2010-01-01

    ... INSPECTION AND CERTIFICATION CERTIFIED PRODUCTS FOR DOGS, CATS, AND OTHER CARNIVORA; INSPECTION... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Reports of violations of regulations. 355.27 Section 355.27 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF...

  17. CP Violation course

    CERN Multimedia

    CERN. Geneva HR-RFA

    2006-01-01

    The lecture introduces the concepts and phenomena of matter-antimatter symmetry violation, so-called "CP" violation. The lecture is organized in four courses, the first being devoted to a historical overview and an introduction into fundamental discrete symmetries. The second course introduces the most compelling CP-violating phenomena, and presents the first experimental discovery of CP violation in the neutral kaon system. The third course discusses how CP violation is beautifully incorporated into the Standard Model of particle interactions, and how modern B-meson "factories" provide precise tests of this picture. Finally, the fourth and last course introduces CP violation and the genesis of our matter world.

  18. From hadronic parity violation to electron parity-violating experiments

    International Nuclear Information System (INIS)

    Oers, Willem T.H. van

    2010-01-01

    The weak interaction is manifested in parity-violating observables. With the weak interaction extremely well known parity-violating measurements in hadronic systems can be used to deduce strong interaction effects in those systems. Parity-violating analyzing powers in electron-proton scattering have led to determining the strange quark contributions to the charge and magnetization distributions of the nucleon. Parity-violating electron-proton and electron-electron scattering can also be performed to test the predictions of the Standard Model in the 'running' of the electroweak mixing angle or sin 2 θ W .

  19. 29 CFR 1903.18 - Failure to correct a violation for which a citation has been issued.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 5 2010-07-01 2010-07-01 false Failure to correct a violation for which a citation has... SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR INSPECTIONS, CITATIONS AND PROPOSED PENALTIES § 1903.18 Failure to correct a violation for which a citation has been issued. (a) If an inspection...

  20. Searches for Prompt R-Parity-Violating Supersymmetry at the LHC

    International Nuclear Information System (INIS)

    Redelbach, Andreas

    2015-01-01

    Searches for supersymmetry (SUSY) at the LHC frequently assume the conservation of R-parity in their design, optimization, and interpretation. In the case that R-parity is not conserved, constraints on SUSY particle masses tend to be weakened with respect to R-parity-conserving models. We review the current status of searches for R-parity-violating (RPV) supersymmetry models at the ATLAS and CMS experiments, limited to 8 TeV search results published or submitted for publication as of the end of March 2015. All forms of renormalisable RPV terms leading to prompt signatures have been considered in the set of analyses under review. Discussing results for searches for prompt R-parity-violating SUSY signatures summarizes the main constraints for various RPV models from LHC Run I and also defines the basis for promising signal regions to be optimized for Run II. In addition to identifying highly constrained regions from existing searches, also gaps in the coverage of the parameter space of RPV SUSY are outlined

  1. Effect of a manager training and certification program on food safety and hygiene in food service operations.

    Science.gov (United States)

    Kassa, Hailu; Silverman, Gary S; Baroudi, Karim

    2010-05-06

    Food safety is an important public health issue in the U.S. Eating at restaurants and other food service facilities increasingly has been associated with food borne disease outbreaks. Food safety training and certification of food mangers has been used as a method for reducing food safety violations at food service facilities. However, the literature is inconclusive about the effectiveness of such training programs for improving food safety and protecting consumer health. The purpose of this study was to examine the effect of food manger training on reducing food safety violations. We examined food inspection reports from the Toledo/Lucas County Health Department (Ohio) from March 2005 through February 2006 and compared food hygiene violations between food service facilities with certified and without certified food managers. We also examined the impact on food safety of a food service facility being part of a larger group of facilities.Restaurants with trained and certified food managers had significantly fewer critical food safety violations but more non-critical violations than restaurants without certified personnel. Institutional food service facilities had significantly fewer violations than restaurants, and the number of violations did not differ as a function of certification. Similarly, restaurants with many outlets had significantly fewer violations than restaurants with fewer outlets, and training was not associated with lower numbers of violations from restaurants with many outlets. The value of having certified personnel was only observed in independent restaurants and those with few branches. This information may be useful in indicating where food safety problems are most likely to occur. Furthermore, we recommend that those characteristics of institutional and chain restaurants that result in fewer violations should be identified in future research, and efforts made to apply this knowledge at the level of individual restaurants.

  2. Elements to evaluate the intention in the non-compliance s or violations to the regulatory framework in the national nuclear facilities

    International Nuclear Information System (INIS)

    Espinosa V, J. M.; Gonzalez V, J. A.

    2013-10-01

    Inside the impact evaluation process to the safety of non-compliance s or violations, developed and implanted by the Comision Nacional de Seguridad Nuclear y Salvaguardias (CNSNS), the Guide for the Impact Evaluation to the Safety in the National Nuclear Facilities by Non-compliance s or Violations to the Regulatory Framework was developed, which indicates that in the determination of the severity (graveness level) of a non-compliance or violation, four factors are evaluated: real and potential consequences to the safety, the impact to the regulator process and the intention. The non-compliance s or intentional violations are of particular interest, since the development of the regulatory activities of the CNSNS considers that the personnel of the licensees, as well as their contractors, will act and will communicate with integrity and honesty. The CNSNS cannot tolerate intentional non-compliance s, for what this violations type can be considered of a level of more graveness that the subjacent non-compliance. To determine the severity of a violation that involves intention, the CNSNS also took in consideration factors as the position and the personnel's responsibilities involved in the violation, the graveness level of the non-compliance in itself, the offender's intention and the possible gain that would produce the non-compliance, if exists, either economic or of another nature. The CNSNS hopes the licensees take significant corrective actions in response to non-compliance s or intentional violations, these corrective actions should correspond to the violation graveness with the purpose of generating a dissuasive effect in the organizations of the licensees. The present article involves the legal framework that confers the CNSNS the attributions to impose administrative sanctions to its licensees, establishes the definition of the CNSNS about what constitutes a non-compliance or intentional violation and finally indicates the intention types (deliberate or

  3. Relationship Between Driving-violation Behaviours and Risk Perception in Motorcycle Accidents

    Directory of Open Access Journals (Sweden)

    Andy S.K. Cheng

    2015-06-01

    Conclusion: This study could assist occupational-therapy practitioners involved in driving rehabilitation and training to identify strategies to deal with drivers' violation behaviours and risk perception. It could also provide evidence-based recommendations for drivers' education, driving-safety campaigns, or even licensing policies.

  4. T-violating effects in neutron physics and CP-violation in gauge models

    International Nuclear Information System (INIS)

    Herczeg, P.

    1987-01-01

    Discussed in this paper is the subject of T-violation in the transmission of polarized neutrons through polarized and oriented targets. Considered is the possible size of the T-violating effects both from a phenomenological point of view, and also in gauge models with CP-violation. A brief discussion of T-violating effects in β-decay is included

  5. CP violation in B decay

    OpenAIRE

    Yamamoto, Hitoshi

    2001-01-01

    We review the physics of CP violation in B decays. After introducing the CKM matrix and how it causes CP violation, we cover three types of CP violation that can occur in B decays: CP violation in mixing, CP violation by mixing-decay interference, and CP violation in decay.

  6. 45-day safety screen results and final report for tank 241-C-202, auger samples 95-Aug-026 and 95-Aug-027

    International Nuclear Information System (INIS)

    Baldwin, J.H.

    1995-01-01

    Two auger samples from tank 241-C-202 (C-202) were received at the 222-S Laboratories and underwent safety screening analysis, consisting of differential scanning calorimetry (DSC), thermogravimetric analysis (TGA), and total alpha activity. Two samples were submitted for energetics determination by DSC. Within the triplicate analyses of each sample, one of the results for energetics exceeded the notification limit. The sample and duplicate analyses for both augers exceeded the notification limit for TGA. As required by the Tank Characterization Plan, the appropriate notifications were made within 24 hours of official confirmation that the limits were violated

  7. 48 CFR 2803.104-10 - Violations or possible violations.

    Science.gov (United States)

    2010-10-01

    ... General IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 2803.104-10 Violations... action to be taken. The types of actions that would normally be taken when a violation has occurred that...

  8. Adolescent occupational fatalities in North Carolina (1990-2008): an investigation of child labor and OSHA violations and enforcement.

    Science.gov (United States)

    Rauscher, Kimberly; Runyan, Carol

    2012-01-01

    This study investigated adolescent worker fatalities involving violations of the child labor laws and/or Occupational Safety and Health Administration (OSHA) standards, as well as the enforcement activity involved in each case. Medical examiner records were used to identify work-related deaths among adolescents ages 11-17 between 1990 and 2008 and child labor violations. Investigations from state and federal Departments of Labor (DOL) were used to determine inspection activity, identify OSHA violations, and confirm child labor violations. Fifty-two percent of cases involved one or more child labor violations. Nine cases were investigated by either the U.S. or North Carolina DOL; among them, four had child labor violations. Eleven cases were investigated by the North Carolina DOL and all involved OSHA violations. Significant child labor and OSHA violations exist in adolescent worker fatalities in North Carolina, and gaps exist in enforcement at both the federal and state level, signaling needed improvements in the protection of adolescent workers.

  9. The procedures used to review safety analysis reports for packagings submitted to the US Department of Energy for certification

    International Nuclear Information System (INIS)

    Popper, G.F.; Raske, D.T.; Turula, P.

    1988-01-01

    This paper presents an overview of the procedures used at the Argonne National Laboratory (ANL) to review Safety Analysis Reports for Packagings (SARPs) submitted to the US Department of Energy (DOE) for issuance of a Certificate of Compliance. Prior to certification and shipment of a packaging for the transport of radioactive materials, a SARP must be prepared describing the design, contents, analyses, testing, and safety features of the packaging. The SARP must be reviewed to ensure that the specific packaging meets all DOE orders and federal regulations for safe transport. The ANL SARP review group provides an independent review and evaluation function for the DOE to ensure that the packaging meets all the prescribed requirements. This review involves many disciplines and includes evaluating the general information, drawings, construction details, operating procedures, maintenance and test programs, and the quality assurance plan for compliance with requirements. 14 refs., 6 figs

  10. Ethical violations in the clinical setting: the hidden curriculum learning experience of Pakistani nurses.

    Science.gov (United States)

    Jafree, Sara Rizvi; Zakar, Rubeena; Fischer, Florian; Zakar, Muhammad Zakria

    2015-03-19

    The importance of the hidden curriculum is recognised as a practical training ground for the absorption of medical ethics by healthcare professionals. Pakistan's healthcare sector is hampered by the exclusion of ethics from medical and nursing education curricula and the absence of monitoring of ethical violations in the clinical setting. Nurses have significant knowledge of the hidden curriculum taught during clinical practice, due to long working hours in the clinic and front-line interaction with patients and other practitioners. The means of inquiry for this study was qualitative, with 20 interviews and four focus group discussions used to identify nurses' clinical experiences of ethical violations. Content analysis was used to discover sub-categories of ethical violations, as perceived by nurses, within four pre-defined categories of nursing codes of ethics: 1) professional guidelines and integrity, 2) patient informed consent, 3) patient rights, and 4) co-worker coordination for competency, learning and patient safety. Ten sub-categories of ethical violations were found: nursing students being used as adjunct staff, nurses having to face frequent violence in the hospital setting, patient reluctance to receive treatment from nurses, the near-absence of consent taken from patients for most non-surgical medical procedures, the absence of patient consent taking for receiving treatment from student nurses, the practice of patient discrimination on the basis of a patient's socio-demographic status, nurses withdrawing treatment out of fear for their safety, a non-learning culture and, finally, blame-shifting and non-reportage of errors. Immediate and urgent attention is required to reduce ethical violations in the healthcare sector in Pakistan through collaborative efforts by the government, the healthcare sector, and ethics regulatory bodies. Also, changes in socio-cultural values in hospital organisation, public awareness of how to conveniently report ethical

  11. The blameworthiness of health and safety rule violations

    NARCIS (Netherlands)

    P. Mascini (Peter)

    2006-01-01

    textabstractMan-made disasters usually lead to the tightening of safety regulations, because rule breaking is seen as a major cause of them. This reaction is based on the presumptions that the safety rules are good and that the rule-breakers are wrong. The reasons the personnel of a coke factory

  12. The Blameworthiness of Health and Safety Rule Violations

    NARCIS (Netherlands)

    P. Mascini (Peter)

    2005-01-01

    textabstractMan-made disasters usually lead to the tightening of safety regulations, because rule breaking is seen as a major cause of them. This reaction is based on the assumptions that the safety rules are good and that the rule-breakers are wrong. The reasons the personnel of a coke factory

  13. 48 CFR 903.104-7 - Violations or possible violations.

    Science.gov (United States)

    2010-10-01

    ... violation or possible violation of subsections 27 (a), (b), (c) or (d) of the Office of Federal Procurement... disclosure of proprietary or source selection information is the Assistant General Counsel for Procurement...) and (2) for Headquarters activities is the Agency Ethics Official (Designated Agency Ethics Official...

  14. CP violation and modular symmetries

    International Nuclear Information System (INIS)

    Dent, Thomas

    2001-01-01

    We reconsider the origin of CP violation in fundamental theory. Existing string models of spontaneous CP violation make ambiguous predictions, due to the arbitrariness of CP transformation and the apparent noninvariance of the results under duality. We find a modular CP invariance condition, applicable to any predictive model of spontaneous CP violation, which circumvents these problems; it strongly constrains CP violation by heterotic string moduli. The dilaton is also evaluated as a source of CP violation, but is likely experimentally excluded. We consider the prospects for explaining CP violation in strongly coupled strings and brane worlds

  15. CP violation

    Indian Academy of Sciences (India)

    We have just entered a period during which we expect considerable progress toward understanding CP violation. Here we review what we have learnt so far, and what is to be expected in the near future. To do this we cover the foundation of CP violation at a level which can be understood by physicists who are not working ...

  16. Seat belt, DWI, and other traffic violations among recent immigrants in Florida and Tennessee.

    Science.gov (United States)

    2013-05-01

    Phase I of this project identified two States, Florida and Tennessee, that maintain information on drivers traffic violations and residency status. : Phase II analyzed State databases to examine seat belt nonuse, DWI, and other traffic safety viol...

  17. CP violation

    CERN Multimedia

    CERN. Geneva

    1999-01-01

    In the first two lectures, CP violation in the K system is pedagogically reviewed: its manifestations in the neutral K meson systems, in rare K meson decays and in decays of charged K mesons, and results from classical and current experiments, are discussed. In the third lecture, CP Violation in the B system and the forthcoming experimental tests will be discussed.

  18. Is CP violation maximal

    International Nuclear Information System (INIS)

    Gronau, M.

    1984-01-01

    Two ambiguities are noted in the definition of the concept of maximal CP violation. The phase convention ambiguity is overcome by introducing a CP violating phase in the quark mixing matrix U which is invariant under rephasing transformations. The second ambiguity, related to the parametrization of U, is resolved by finding a single empirically viable definition of maximal CP violation when assuming that U does not single out one generation. Considerable improvement in the calculation of nonleptonic weak amplitudes is required to test the conjecture of maximal CP violation. 21 references

  19. CP violation

    International Nuclear Information System (INIS)

    Quinn, H.

    1995-12-01

    In this talk the author briefly reviews the cosmological importance of CP violation and the status of calculations of baryogenisis in the context of the Standard Model. The author then turns to a discussion of Standard Model Predictions for CP violation in B decays, stressing the importance of multiple measurements to overconstrain the model parameters and thus search for indications of beyond-Standard-Model physics

  20. Errors and violations

    International Nuclear Information System (INIS)

    Reason, J.

    1988-01-01

    This paper is in three parts. The first part summarizes the human failures responsible for the Chernobyl disaster and argues that, in considering the human contribution to power plant emergencies, it is necessary to distinguish between: errors and violations; and active and latent failures. The second part presents empirical evidence, drawn from driver behavior, which suggest that errors and violations have different psychological origins. The concluding part outlines a resident pathogen view of accident causation, and seeks to identify the various system pathways along which errors and violations may be propagated

  1. CP violation

    International Nuclear Information System (INIS)

    Gronau, M.

    1995-01-01

    We review the present status of the Standard Model of CP violation, which is based on a complex phase in the Cabibbo-Kobayashi-Maskawa (CKM) matrix. So far CP violation has been observed only in K 0 -K 0 mixing, consistent with a sizable phase. The implications of future CP nonconserving measusrements in K and B decays are discussed within the model. Direct CP violation in K→2π may be observed in the near future, however this would not be a powerful test of the model. B decays provide a wide variety of CP asymmetry measurements, which can serve as precise tests of the Standard Model in cases where the asymmetry is cleanly related to phases of CKM matrix elements. Some of the most promising cases are discussed. ((orig.))

  2. R-parity violating supersymmetry

    CERN Document Server

    Barbier, R.; Besancon, M.; Chemtob, M.; Deandrea, A.; Dudas, E.; Fayet, Pierre; Lavignac, S.; Moreau, G.; Perez, E.; Sirois, Y.

    2004-01-01

    The possible appearance of R-parity violating couplings, and hence implicitly the question of lepton and baryon number conservation, has been emphasised since the early development of supersymmetric theories. The rich phenomenology implied by R-parity violation has now gained full attention in the search for supersymmetry. In this review, theoretical and phenomenological implications of R-parity violation in supersymmetric theories are discussed, in relation with particle and astroparticle physics. Fundamental aspects include the relation with continuous and discrete symmetries, up to more recent developments on the Abelian family symmetries and hierarchy of R-parity violating couplings. The question of the generation of the standard model neutrino masses and mixings is presented. The possible contributions of R-parity violating Yukawa couplings in processes involving virtual supersymmetric particles and the resulting constraints are reviewed. Finally, a survey of the direct production of supersymmetric parti...

  3. Moral Violations Reduce Oral Consumption

    Science.gov (United States)

    Chan, Cindy; Van Boven, Leaf; Andrade, Eduardo B.; Ariely, Dan

    2014-01-01

    Consumers frequently encounter moral violations in everyday life. They watch movies and television shows about crime and deception, hear news reports of corporate fraud and tax evasion, and hear gossip about cheaters and thieves. How does exposure to moral violations influence consumption? Because moral violations arouse disgust and because disgust is an evolutionarily important signal of contamination that should provoke a multi-modal response, we hypothesize that moral violations affect a key behavioral response to disgust: reduced oral consumption. In three experiments, compared with those in control conditions, people drank less water and chocolate milk while (a) watching a film portraying the moral violations of incest, (b) writing about moral violations of cheating or theft, and (c) listening to a report about fraud and manipulation. These findings imply that “moral disgust” influences consumption in ways similar to core disgust, and thus provide evidence for the associations between moral violations, emotions, and consumer behavior. PMID:25125931

  4. Moral Violations Reduce Oral Consumption.

    Science.gov (United States)

    Chan, Cindy; Van Boven, Leaf; Andrade, Eduardo B; Ariely, Dan

    2014-07-01

    Consumers frequently encounter moral violations in everyday life. They watch movies and television shows about crime and deception, hear news reports of corporate fraud and tax evasion, and hear gossip about cheaters and thieves. How does exposure to moral violations influence consumption? Because moral violations arouse disgust and because disgust is an evolutionarily important signal of contamination that should provoke a multi-modal response, we hypothesize that moral violations affect a key behavioral response to disgust: reduced oral consumption. In three experiments, compared with those in control conditions, people drank less water and chocolate milk while (a) watching a film portraying the moral violations of incest, (b) writing about moral violations of cheating or theft, and (c) listening to a report about fraud and manipulation. These findings imply that "moral disgust" influences consumption in ways similar to core disgust, and thus provide evidence for the associations between moral violations, emotions, and consumer behavior.

  5. Applying an extended theory of planned behavior to predicting violations at automated railroad crossings.

    Science.gov (United States)

    Palat, Blazej; Paran, Françoise; Delhomme, Patricia

    2017-01-01

    Based on an extended Theory of Planned Behavior (TPB, Ajzen, 1985, 1991), we conducted surveys in order to explain and predict violations at a railroad crossing, among pedestrians (n=153) and car drivers (n=151). Measures were made with respect to three chronologically related railroad crossing situations that varied in risk level. The situations were described in scenarios and depicted on photographs. The participants were recruited in the suburbs of Paris, at two automated railroad crossings with four half-barriers. We found that the pedestrians had stronger crossing intentions than did car drivers, especially at the more congested crossing of the two under study. For both categories of road users, intentions and the amount of intention variance explained by the extended TPB factors decreased significantly with risk level. In the most dangerous situations, risk-taking was the most unlikely and the least predictable Self-reported past frequency of crossing against safety warning devices was the main predictor of the intention to commit this violation again, especially among males, followed by the attitude and the injunctive norm in favor the violation. Moreover, car drivers were influenced in their crossing intentions by the descriptive norm. The presence of another vehicle on the tracks when the safety warning devices were activated was perceived not as facilitating, but as an additional risk factor. The discussion addresses the importance of taking into account these determinants of violations in conceiving countermeasures. Our findings could be especially useful for conceiving risk-communication campaigns. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. CP violation and modular symmetries

    OpenAIRE

    Dent, Thomas

    2001-01-01

    We reconsider the origin of CP violation in fundamental theory. Existing string models of spontaneous CP violation make ambiguous predictions, due to the arbitrariness of CP transformation and the apparent non-invariance of the results under duality. We find an unambiguous modular CP invariance condition, applicable to predictive models of spontaneous CP violation, which circumvents these problems; it strongly constrains CP violation by heterotic string moduli. The dilaton is also evaluated a...

  7. Price-Anderson Nuclear Safety Enforcement Program. 1997 annual report

    International Nuclear Information System (INIS)

    1998-01-01

    This report summarizes activities in the Department of Energy's Price-Anderson Amendments Act (PAAA) Enforcement Program in calendar year 1997 and highlights improvements planned for 1998. The DOE Enforcement Program involves the Office of Enforcement and Investigation in the DOE Headquarters Office of Environment, Safety and Health, as well as numerous PAAA Coordinators and technical advisors in DOE Field and Program Offices. The DOE Enforcement Program issued 13 Notices of Violation (NOV's) in 1997 for cases involving significant or potentially significant nuclear safety violations. Six of these included civil penalties totaling $440,000. Highlights of these actions include: (1) Brookhaven National Laboratory Radiological Control Violations / Associated Universities, Inc.; (2) Bioassay Program Violations at Mound / EG ampersand G, Inc.; (3) Savannah River Crane Operator Uptake / Westinghouse Savannah River Company; (4) Waste Calciner Worker Uptake / Lockheed-Martin Idaho Technologies Company; and (5) Reactor Scram and Records Destruction at Sandia / Sandia Corporation (Lockheed-Martin). Sandia / Sandia Corporation (Lockheed-Martin)

  8. Nuclear Power Safety Reporting System. Final evaluation results

    International Nuclear Information System (INIS)

    Finlayson, F.C.; Newton, R.D.

    1986-02-01

    This document presents the results of a study conducted by the US Nuclear Regulatory Commission of an unobtrusive, voluntary, anonymous third-party managed, nonpunitive human factors data gathering system (the Nuclear power Safety Reporting System - NPSRS) for the nuclear electric power production industry. The data to be gathered by the NPSRS are intended for use in identifying and quantifying the factors that contribute to the occurrence of significant safety incidents involving humans in nuclear power plants. The NPSRS has been designed to encourage participation in the System through guarantees of reporter anonymity provided by a third-party organization that would be responsible for NPSRS management. As additional motivation to reporters for contributing data to the NPSRS, conditional waivers of NRC disciplinary action would be provided to individuals. These conditional waivers of immunity would apply to potential violations of NRC regulations that might be disclosed through reports submitted to the System about inadvertent, noncriminal incidents in nuclear plants. This document summarizes the overall results of the study of the NPSRS concept. In it, a functional description of the NPSRS is presented together with a review and assessment of potential problem areas that might be met if the System were implemented. Conclusions and recommendations resulting from the study are also presented. A companion volume (NUREG/CR-4133, Nuclear Power Safety Reporting System: Implementation and Operational Specifications'') presented in detail the elements, requirements, forms, and procedures for implementing and operating the System. 13 refs

  9. Extrinsic CPT Violation in Neutrino Oscillations

    International Nuclear Information System (INIS)

    Ohlsson, Tommy

    2004-01-01

    In this talk, we investigate extrinsic CPT violation in neutrino oscillations in matter with three flavors. Note that extrinsic CPT violation is different from intrinsic CPT violation. Extrinsic CPT violation is one way of quantifying matter effects, whereas intrinsic CPT violation would mean that the CPT invariance theorem is not valid. We present analytical formulas for the extrinsic CPT probability differences and discuss their implications for long-baseline experiments and neutrino factory setups

  10. CP-violations in B decays

    Indian Academy of Sciences (India)

    Recent results on CP-violation measurements in decays from energy asymmetric -factory experiments are reported. Thanks to large accumulated data samples, CP-violations in decays in mixing-decay interference and direct CP-violation are now firmly established. The measurements of three angles of the unitarity ...

  11. A General Legislative Analysis of "Torture" as a Human Rights Violation in Zimbabwe

    Directory of Open Access Journals (Sweden)

    Howard Chitimira

    2017-06-01

    Full Text Available Several challenges involving torture-related human rights violations have been reported in Zimbabwe from the late 1970s to date. Notably, these torture-related human rights violations were problematic during the liberation war era in Zimbabwe. Regrettably, such violations are allegedly still prevalent, especially prior to and/or during general political elections in Zimbabwe. Accordingly, this article investigates torture as a human rights violation in Zimbabwe, inter alia by focusing on the role of selected law enforcement agencies in the protection of human rights in Zimbabwe. The article also discusses the legal position on torture and the perpetration of torture against ordinary people prior to as well as after independence in Zimbabwe. This is done to investigate the adequacy of the legal framework in Zimbabwe with regard to the combatting of torture. In relation to this, selected regional and international legal frameworks against torture are briefly discussed in order to determine possible measures that could be utilised in Zimbabwe. The authors submit that although the Constitution of Zimbabwe Amendment (No 20 Act, 2013 (Zimbabwe Constitution, 2013 prohibits torture, more may still need to be done to enhance the combatting of torture in Zimbabwe. For instance, apart from the prohibition contained in the Zimbabwe Constitution, 2013, there is no legislation that expressly outlaws torture in Zimbabwe. Moreover, Zimbabwe has not ratified the United Nations (UN Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment of 1984 (UN Convention against Torture to date. Lastly, concluding remarks and possible recommendations that could be employed to discourage torture-related human rights abuses in Zimbabwe are provided.

  12. CP violation in B decays

    International Nuclear Information System (INIS)

    Kayser, B.

    1990-01-01

    The study of CP-violating effects in B decays will be a good test of whether CP violation is caused by the known weak interaction. If this is its origin, then large, cleanly-predicted CP-violating effects are expected in certain neutral B decays to hadronic CP eigenstates. The phenomenology of CP violation in the B system is reviewed, and the genesis of these large effects is explained. In this it is shown that large, cleanly-predicted effects are also expected in some decays to states which are not CP eigenstates. The combined study of the latter decays and those to CP eigenstates may make it possible to obtain a statistically-significant CP-violating signal with fewer B mesons that would otherwise be required

  13. Speeded Recognition of Ungrammaticality: Double Violations.

    Science.gov (United States)

    Moore, Timothy E.; Biederman, Irving

    1979-01-01

    The speed at which sentences with various kinds of violations could be rejected was studied. Compatible with the sequential model was the finding that noun-verb and adjective-noun double violations did not result in shorter reaction times than noun-verb single violations, although double violations were judged less acceptable. (Author/RD)

  14. Beautiful CP violation

    International Nuclear Information System (INIS)

    Dunietz, I.

    1997-01-01

    CP violation is observed to date only in K 0 decays and is parameterizable by a single quantity ε. Because it is one of the least understood phenomena in the Standard Model and holds a clue to baryogenesis, it must be investigated further. Highly specialized searches in K 0 decays are possible. Effects in B decays are much larger. In addition to the traditional B d → J/ψK S , π + π - asymmetries, CP violation could be searched for in already existing inclusive B data samples. The rapid B s --anti B s oscillations cancel in untagged B s data samples, which therefore allow feasibility studies for the observation of CP violation and the extraction of CKM elements with present vertex detectors. The favored method for the extraction of the CKM angle γ is shown to be unfeasible and a solution is presented involving striking direct CP violation in charged B decays. Novel methods for determining the B s mixing parameter Δm are described without the traditional requirement of flavor-specific final states

  15. Safety performance indicators used by the Russian Safety Regulatory Authority in its practical activities on nuclear power plant safety regulation

    International Nuclear Information System (INIS)

    Khazanov, A.L.

    2005-01-01

    The Sixth Department of the Nuclear, Industrial and Environmental Regulatory Authority of Russia, Scientific and Engineering Centre for Nuclear and Radiation Safety process, analyse and use the information on nuclear power plants (NPPs) operational experience or NPPs safety improvement. Safety performance indicators (SPIs), derived from processing of information on operational violations and analysis of annual NPP Safety Reports, are used as tools to determination of trends towards changing of characteristics of operational safety, to assess the effectiveness of corrective measures, to monitor and evaluate the current operational safety level of NPPs, to regulate NPP safety. This report includes a list of the basic SPIs, those used by the Russian safety regulatory authority in regulatory activity. Some of them are absent in list of IAEA-TECDOC-1141 ('Operational safety performance indicators for nuclear power plants'). (author)

  16. Safety Behavior After Extinction Triggers a Return of Threat Expectancy

    NARCIS (Netherlands)

    van Uijen, S.L.; Leer, A.; Engelhard, I.M.

    2018-01-01

    Safety behavior is involved in the maintenance of anxiety disorders, presumably because it prevents the violation of negative expectancies. Recent research showed that safety behavior is resistant to fear extinction. This fear conditioning study investigated whether safety behavior after fear

  17. CP violation in gauge theories

    International Nuclear Information System (INIS)

    Escobar, C.O.

    Some aspects of CP violation in gauge theories are reviewed. The topics covered include a discussion of the Kobayashi-Maskawa six-quarks model, models of soft- CP violation (extended Higgs sector), the strong CP problem and finally some speculations relating CP violation and magnetic charges in non-abelian gauge theories. (Author) [pt

  18. An extension of the theory of planned behavior to predict pedestrians' violating crossing behavior using structural equation modeling.

    Science.gov (United States)

    Zhou, Hongmei; Romero, Stephanie Ballon; Qin, Xiao

    2016-10-01

    This paper aimed to examine pedestrians' self-reported violating crossing behavior intentions by applying the theory of planned behavior (TPB). We studied the behavior intentions regarding instrumental attitude, subjective norm, perceived behavioral control, the three basic components of TPB, and extended the theory by adding new factors including descriptive norm, perceived risk and conformity tendency to evaluate their respective impacts on pedestrians' behavior intentions. A questionnaire presented with a scenario that pedestrians crossed the road violating the pedestrian lights at an intersection was designed, and the survey was conducted in Dalian, China. Based on the 260 complete and valid responses, reliability and validity of the data for each question was evaluated. The data were then analyzed by using the structural equation modeling (SEM). The results showed that people had a negative attitude toward the behavior of violating road-crossing rules; they perceived social influences from their family and friends; and they believed that this kind of risky behavior would potentially harm them in a traffic accident. The results also showed that instrumental attitude and subjective norm were significant in the basic TPB model. After adding descriptive norm, subjective norm was no more significant. Other models showed that conformity tendency was a strong predictor, indicating that the presence of other pedestrians would influence behavioral intention. The findings could help to design more effective interventions and safety campaigns, such as changing people's attitude toward this violation behavior, correcting the social norms, increasing their safety awareness, etc. in order to reduce pedestrians' road crossing violations. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Phenomenology of CP violation

    International Nuclear Information System (INIS)

    Ecker, G.

    1987-01-01

    A short survey of the theoretical status of CP violation is presented. The Standart Model is confronted with the present experimental situation. Possible future tests of our notions of CP violation are discussed, concentrating on rare K decays. Other promising reactions such as B decays are briefly reviewed. Among alternative models of CP violation, multi-Higgs extensions of the Standart Model, left-right symmetric gauge theories and minimal SUSY models are discussed. Finally, the relevance of generalized CP invariance is emphasized. 64 refs., 7 figs. (Author)

  20. Searching for Lorentz violation

    International Nuclear Information System (INIS)

    Allen, Roland E.; Yokoo, Seiichirou

    2004-01-01

    Astrophysical, terrestrial, and space-based searches for Lorentz violation are very briefly reviewed. Such searches are motivated by the fact that all superunified theories (and other theories that attempt to include quantum gravity) have some potential for observable violations of Lorentz invariance. Another motivation is the exquisite sensitivity of certain well-designed experiments and observations to particular forms of Lorentz violation. We also review some new predictions of a specific Lorentz-violating theory: If a fundamental energy m-bar c2 in this theory lies below the usual GZK cutoff E GZK , the cutoff is shifted to infinite energy; i.e., it no longer exists. On the other hand, if m-bar c2 lies above E GZK , there is a high-energy branch of the fermion dispersion relation which provides an alternative mechanism for super-GZK cosmic-ray protons

  1. Testing New Indirect CP Violation

    International Nuclear Information System (INIS)

    Grossman, Yuval; Nir, Yosef; Perez, Gilad

    2009-01-01

    If new CP violating physics contributes to neutral meson mixing, but its contribution to CP violation in decay amplitudes is negligible, then there is a model independent relation between four (generally independent) observables related to the mixing: the mass splitting (x), the width splitting (y), the CP violation in mixing (1-|q/p|), and the CP violation in the interference of decays with and without mixing (φ). For the four neutral meson systems, this relation can be written in a simple approximate form: ytanφ≅x(1-|q/p|). In the K system, all four observables have been measured and obey the relation to excellent accuracy. For the B s and D systems, new predictions are provided. The success or failure of these relations will probe the physics that is responsible for the CP violation.

  2. Psychological contract types as moderator in the breach-violation and violation-burnout relationships.

    Science.gov (United States)

    Jamil, Amber; Raja, Usman; Darr, Wendy

    2013-01-01

    This research examined the relationships between perceived psychological contract breach, felt violation, and burnout in a sample (n = 361) of employees from various organizations in Pakistan. The moderating role of contract types in these relationships was also tested. Findings supported a positive association between perceived psychological contract breach and felt violation and both were positively related to burnout. Transactional and relational contracts moderated the felt violation-burnout relationship. Scores on relational contract type tended to be higher than for transactional contract type showing some contextual influence.

  3. CP violation, flavour violation and fermion mass relations in some horizontal gauge theories

    International Nuclear Information System (INIS)

    Shanker, O.

    1981-01-01

    Six quark horizontal gauge models incorporating a natural suppression mechanism for diagonal flavour-changing currents are considered. Some interesting possibilities for CP violation, flavour violation, fermion mass and mixing angle relation in these models are studied. (author)

  4. Prediction of vehicle crashes by drivers' characteristics and past traffic violations in Korea using a zero-inflated negative binomial model.

    Science.gov (United States)

    Kim, Dae-Hwan; Ramjan, Lucie M; Mak, Kwok-Kei

    2016-01-01

    Traffic safety is a significant public health challenge, and vehicle crashes account for the majority of injuries. This study aims to identify whether drivers' characteristics and past traffic violations may predict vehicle crashes in Korea. A total of 500,000 drivers were randomly selected from the 11.6 million driver records of the Ministry of Land, Transport and Maritime Affairs in Korea. Records of traffic crashes were obtained from the archives of the Korea Insurance Development Institute. After matching the past violation history for the period 2004-2005 with the number of crashes in year 2006, a total of 488,139 observations were used for the analysis. Zero-inflated negative binomial model was used to determine the incident risk ratio (IRR) of vehicle crashes by past violations of individual drivers. The included covariates were driver's age, gender, district of residence, vehicle choice, and driving experience. Drivers violating (1) a hit-and-run or drunk driving regulation at least once and (2) a signal, central line, or speed regulation more than once had a higher risk of a vehicle crash with respective IRRs of 1.06 and 1.15. Furthermore, female gender, a younger age, fewer years of driving experience, and middle-sized vehicles were all significantly associated with a higher likelihood of vehicle crashes. Drivers' demographic characteristics and past traffic violations could predict vehicle crashes in Korea. Greater resources should be assigned to the provision of traffic safety education programs for the high-risk driver groups.

  5. Safety culture of nuclear power plant

    International Nuclear Information System (INIS)

    Zheng Beixin

    2008-01-01

    This paper is a summary on the basis of DNMC safety culture training material for managerial personnel. It intends to explain the basic contents of safety, design, management, enterprise culture, safety culture of nuclear power plant and the relationship among them. It explains especially the constituent elements of safety culture system, the basic requirements for the three levels of commitments: policy level, management level and employee level. It also makes some analyses and judgments for some typical safety culture cases, for example, transparent culture and habitual violation of procedure. (authors)

  6. CP violation in b-hadrons

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00341004

    2016-01-01

    Latest LHCb measurements of $CP$ violation in b-hadrons are presented based on $pp$ collision data collected in 2011 and 2012 at centre-of-mass energies of $\\sqrt{s}=7$ $\\rm TeV$ and $8\\ \\rm TeV$ respectively. The total integrated luminosity collected is 3.0 fb$^{-1}$. Results include recent measurements of $CP$ violation in $B_d$ and $B_s$ mixing, along with those of quantifying the effects of $b\\to c\\bar{c} s$ loop pollution. Standard Model $CP$ violation tests in loop transitions are discussed with results consistent with expectations. New decays of b-baryons are presented and preliminary studies of $CP$ violation are performed.

  7. CP-violation and instantons

    International Nuclear Information System (INIS)

    Han, C.G.

    1980-01-01

    Effects of Yang-Mills instantons on CP-violating strong interactions are studied. Using simplified models of CP-noninvariant weak interactions, we calculate the induced strong CP-violation. Even in the simple examples studied, the CP-violating phase of a vacuum-to-vacuum transition amplitude differs in general from the phase of the determinant of the quark mass matrix multiplied by the topological charge of the background Yang-Mills field. Then several CP-violating phenomena such as eta → 2π decay and neutron electric dipole moment induced by instantons are studied. The result of our explicit calculation of eta → 2π decay strength verifies the current algebraic method used by Crewther et al. We also present a calculation of the instanton contribution, in the dilute gas approximation for instanton gas, to the electric dipole moment of a free quark without using 't Hooft's effective Lagrangian

  8. Parity violation in neutron resonances

    International Nuclear Information System (INIS)

    Mitchell, G.E.; Lowie, L.Y.; Bowman, J.D.; Knudson, J.; Crawford, B.E.; Delheij, P.P.J.; Haseyama, T.; Masaike, A.; Matsuda, Y.; Masuda, Y.

    1997-01-01

    The observation of very large parity violation in neutron resonances has led to a new approach to the study of symmetry breaking in nuclei. The origin of the enhancement of parity violation is discussed, as well as the new (statistical) analysis approach. The TRIPLE experimental system and analysis methods, their improvements are described. Sign correlation and results from recent parity violation experiments are presented and discussed. (author)

  9. 33 CFR 150.606 - After learning of a possible violation, what does the Officer in Charge of Marine Inspection do?

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false After learning of a possible violation, what does the Officer in Charge of Marine Inspection do? 150.606 Section 150.606 Navigation and...: OPERATIONS Workplace Safety and Health Safety and Health (general) § 150.606 After learning of a possible...

  10. 75 FR 54804 - Safety and Health Management Programs for Mines

    Science.gov (United States)

    2010-09-09

    .... Worker Involvement. 3. Hazard Identification, including workplace inspections for violations of mandatory... requirements; it reflects the embodiment of a culture of safety--from the CEO to the worker to the contractor. This culture of safety derives from a commitment to a systematic, effective, comprehensive safety and...

  11. Guidance for identifying, reporting and tracking nuclear safety noncompliances

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-01

    This document provides Department of Energy (DOE) contractors, subcontractors and suppliers with guidance in the effective use of DOE`s Price-Anderson nuclear safety Noncompliance Tracking System (NTS). Prompt contractor identification, reporting to DOE, and correction of nuclear safety noncompliances provides DOE with a basis to exercise enforcement discretion to mitigate civil penalties, and suspend the issuance of Notices of Violation for certain violations. Use of this reporting methodology is elective by contractors; however, this methodology is intended to reflect DOE`s philosophy on effective identification and reporting of nuclear safety noncompliances. To the extent that these expectations are met for particular noncompliances, DOE intends to appropriately exercise its enforcement discretion in considering whether, and to what extent, to undertake enforcement action.

  12. Symmetry violating kaon decays

    International Nuclear Information System (INIS)

    Herczeg, P.

    1979-01-01

    An analysis of the muon number violating decay modes of the K-mesons is given. Subsequently, some new developments in the field of CP-violation are reviewed and the question of time-reversal invariance and the status of CPT-invariance are briefly considered. 42 references

  13. Results of operation and current safety performance of nuclear facilities located in the Russian Federation

    Science.gov (United States)

    Kuznetsov, V. M.; Khvostova, M. S.

    2016-12-01

    After the NPP radiation accidents in Russia and Japan, a safety statu of Russian nuclear power plants causes concern. A repeated life time extension of power unit reactor plants, designed at the dawn of the nuclear power engineering in the Soviet Union, power augmentation of the plants to 104-109%, operation of power units in a daily power mode in the range of 100-70-100%, the use of untypical for NPP remixed nuclear fuel without a careful study of the results of its application (at least after two operating periods of the research nuclear installations), the aging of operating personnel, and many other management actions of the State Corporation "Rosatom", should attract the attention of the Federal Service for Ecological, Technical and Atomic Supervision (RosTekhNadzor), but this doesn't happen. The paper considers safety issues of nuclear power plants operating in the Russian Federation. The authors collected statistical information on violations in NPP operation over the past 25 years, which shows that even after repeated relaxation over this period of time of safety regulation requirements in nuclear industry and highly expensive NPP modernization, the latter have not become more safe, and the statistics confirms this. At a lower utilization factor high-power pressure-tube reactors RBMK-1000, compared to light water reactors VVER-440 and 1000, have a greater number of violations and that after annual overhauls. A number of direct and root causes of NPP mulfunctions is still high and remains stable for decades. The paper reveals bottlenecks in ensuring nuclear and radiation safety of nuclear facilities. Main outstanding issues on the storage of spent nuclear fuel are defined. Information on emissions and discharges of radioactive substances, as well as fullness of storages of solid and liquid radioactive waste, located at the NPP sites are presented. Russian NPPs stress test results are submitted, as well as data on the coming removal from operation of NPP

  14. Nuclear safety regulation on nuclear safety equipment activities in relation to human and organizational factors

    International Nuclear Information System (INIS)

    Li Tianshu

    2013-01-01

    Based on years of knowledge in nuclear safety supervision and experience of investigating and dealing with violation events in repair welding of DFHM, this paper analyzes major faults in manufacturing and maintaining activities of nuclear safety equipment in relation to human and organizational factors. It could be deducted that human and organizational factors has definitely become key features in the development of nuclear energy and technology. Some feasible measures to reinforce supervision on nuclear safety equipment activities have also been proposed. (author)

  15. Food safety practices among Norwegian consumers.

    Science.gov (United States)

    Røssvoll, Elin Halbach; Lavik, Randi; Ueland, Øydis; Jacobsen, Eivind; Hagtvedt, Therese; Langsrud, Solveig

    2013-11-01

    An informed consumer can compensate for several potential food safety violations or contaminations that may occur earlier in the food production chain. However, a consumer can also destroy the work of others in the chain by poor food handling practices, e.g., by storing chilled ready-to-eat foods at abusive temperatures. To target risk-reducing strategies, consumer groups with high-risk behavior should be identified. The aim of this study was to identify demographic characteristics associated with high-risk food handling practices among Norwegian consumers. More than 2,000 randomly selected Norwegian consumers were surveyed, and the results were analyzed with a risk-based grading system, awarding demerit points for self-reported food safety violations. The violations were categorized into groups, and an ordinary multiple linear regression analysis was run on the summarized demerit score for each group and for the entire survey group as a whole. Young and elderly men were identified as the least informed consumer groups with the most unsafe practices regarding food safety. Single persons reported poorer practices than those in a relationship. People with higher education reported poorer practices than those with lower or no education, and those living in the capital of Norway (Oslo) reported following more unsafe food practices than people living elsewhere in Norway. Men reported poorer food safety practices than women in all categories with two exceptions: parboiling raw vegetables before consumption and knowledge of refrigerator temperature. These findings suggest that risk-reducing measures should target men, and a strategy is needed to change their behavior and attitudes.

  16. Environment, Health, and Safety - Construction Subcontractors Documents |

    Science.gov (United States)

    NREL Environment, Health, and Safety - Construction Subcontractors Documents Environment Environment, Health and Safety (EH&S) requirements are understood by construction subcontractors and with these requirements before submitting proposals and/or environment, health and safety plans for the

  17. How norm violations shape social hierarchies : Those who stand on top block norm violators from rising up

    NARCIS (Netherlands)

    Stamkou, E.; van Kleef, G.A.; Homan, A.C.; Galinsky, A.D.

    2016-01-01

    Norm violations engender both negative reactions and perceptions of power from observers. We addressed this paradox by examining whether observers’ tendency to grant power to norm followers versus norm violators is moderated by the observer’s position in the hierarchy. Because norm violations

  18. 7 CFR 631.14 - Contract violations.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE LONG TERM CONTRACTING GREAT PLAINS CONSERVATION PROGRAM Contracts § 631.14 Contract violations. Contract violations, determinations and appeals will be handled in accordance with the terms of the... 7 Agriculture 6 2010-01-01 2010-01-01 false Contract violations. 631.14 Section 631.14 Agriculture...

  19. Exploring CP Violation in the MSSM

    CERN Document Server

    Arbey, A.; Godbole, R.M.; Mahmoudi, F.

    2015-01-01

    We explore the prospects for observing CP violation in the minimal supersymmetric extension of the Standard Model (MSSM) with six CP-violating parameters, three gaugino mass phases and three phases in trilinear soft supersymmetry-breaking parameters, using the CPsuperH code combined with a geometric approach to maximize CP-violating observables subject to the experimental upper bounds on electric dipole moments. We also implement CP-conserving constraints from Higgs physics, flavour physics and the upper limits on the cosmological dark matter density and spin-independent scattering. We study possible values of observables within the constrained MSSM (CMSSM), the non-universal Higgs model (NUHM), the CPX scenario and a variant of the phenomenological MSSM (pMSSM). We find values of the CP-violating asymmetry A_CP in b -> s gamma decay that may be as large as 3%, so future measurements of A_CP may provide independent information about CP violation in the MSSM. We find that CP-violating MSSM contributions to the...

  20. CP violation in atoms

    International Nuclear Information System (INIS)

    Barr, S.M.

    1992-01-01

    Electric dipole moments of large atoms are an excellent tool to search for CP violation beyond the Standard Model. These tell us about the electron EDM but also about CP-violating electron-nucleon dimension-6 operators that arise from Higgs-exchange. Rapid strides are being made in searches for atomic EDMs. Limits on the electron EDM approaching the values which would be expected from Higgs-exchange mediated CP violation have been achieved. It is pointed out that in this same kind of model if tan β is large the effects in atoms of the dimension-6 e - n operators may outweigh the effect of the electron EDM. (author) 21 refs

  1. B decays and models for CP violation

    International Nuclear Information System (INIS)

    He, Xiao Gang

    1995-12-01

    The decay modes B to π π,υK S , K - D, πK and ηK are promising channels to study the unitarity triangle of the CP violating Cabibbo-Kobayashi-Maskawa (CKM) matrix. The consequences of these measurements in the Weinberg model are discussed. It is shown that measurements of CP violation in B decay can be used to distinguish Standard Model from Weinberg model and that the following different mechanisms for CP violation can be distinguished: 1) CP is violated in the CKM sector only; 2) CP is violated spontaneously in the Higgs sector only; and 3) CP is violated in both the CKM and Higgs sectors. 27 refs., 4 figs

  2. Lawful Solutions For Violation On Women In Sports

    Directory of Open Access Journals (Sweden)

    Sakáčová Zuzana

    2015-11-01

    Full Text Available This contribution deals with the legal aspects and acts of violence against a group of women in sport. Discussions about violence in society and thus on violence in sport are often associated with people's thoughts about the moral state of society as a whole. Violence against women is one of the most widespread violations of human dignity. It represents a violation of human rights, namely the right to life, the right to safety, the right to dignity, the right to physical and mental integrity. It is desirable to raise awareness about the prevention of sexual violence at all levels. We have to focus on preventive precautions to support projects to fight violence and intolerance in sport, to develop codes of conduct that determine the relationship between athletes, relations between men and women, as well as relations between coaches and officials, relations between parents and coaches. The Slovak Republic is only at the beginning of the way of creating the relationship between law and sport. Therefore, it is necessary to increase the legal awareness of sport as a tool for regulation in sport activities.

  3. Upgrade in the CNSNS of the determination process about the importance for the impact evaluation to the safety of defaults or violations in the national nuclear facilities; Actualizacion en la CNSNS del proceso de determinacion de la importancia para la evaluacion de impacto a la seguridad de incumplimientos o violaciones en las instalaciones nucleares mexicanas

    Energy Technology Data Exchange (ETDEWEB)

    Espinosa V, J. M.; Jauregui Ch, V., E-mail: jmespinosa@cnsns.gob.mx [Comision Nacional de Seguridad Nuclear y Salvaguardias, Dr. Barragan No. 779, Col. Narvarte, 03020 Mexico D. F. (Mexico)

    2014-10-15

    Inside the process of Impact Evaluation to the Safety of the Direccion General Adjunta de Seguridad Nuclear of the Comision Nacional de Seguridad Nuclear y Salvaguardias (CNSNS) the Significance Determination Process (SDP) is used, developed by the United States Nuclear Regulatory Commission (US NRC), to evaluate the violations or defaults to the regulatory framework and to determine its importance to the risk by means of a fixed color: Green (Very low impact to the safety), White (Low impact to moderate to the safety), Yellow (Substantial impact to the safety) or Red (High impact to the safety). All this inside the seven safety foundations of the Reactor Oversight Process: Initiator Events, Mitigation Systems, Integrity of the Barriers, Preparation for Emergencies, Occupational Radiological Safety, Radiological Safety of the Public and Physical Safety. At present the US NRC has developed a new version of the SDP, which presents changes in its structure and the opportunity of carrying out informed evaluations in risk, with more detail about the violations or defaults that happen in different areas. The CNSNS carries out the adaptation of this last version of the SDP in order to have an updated tool for the violations and defaults characterization to the regulatory framework happened in the nuclear power plant of Laguna Verde. In this article is mentioned the legal framework that confers the CNSNS the attributions to impose urgency measures and administrative sanctions to its licensees, also is established the definition of the different colors that the SDP contemplates in function of the increased risk (ΔCdf), a description of the SDP objectives and the elements that conform it is presented, in the same way some examples to illustrate its application are raised. Finally, the steps to continue for their implementation are mentioned. (Author)

  4. CP violation without elementary scalar fields

    International Nuclear Information System (INIS)

    Eichten, E.; Lane, K.; Preskill, J.

    1980-04-01

    Dynamically broken gauge theories of electroweak interactions provide a natural mechanism for generating CP violation. Even if all vacuum angles are unobservable, strong CP violation is not automatically avoided. In the absence of strong CP violation, the neutron electric dipole moment is expected to be of order 10 -24 e cm

  5. 77 FR 42314 - Proposed Data Collections Submitted for Public Comment and Recommendations

    Science.gov (United States)

    2012-07-18

    ... characteristics of the work environment, such as the norms, rules, and common understandings that influence employees' perceptions of the importance that the organization places on safety. NIOSH requests OMB approval...] Proposed Data Collections Submitted for Public Comment and Recommendations In compliance with the...

  6. National Institute for Occupational Safety and Health

    Science.gov (United States)

    ... Submit Search The CDC The National Institute for Occupational Safety and Health (NIOSH) Note: Javascript is disabled or is not ... and Events NIOSH Contact Information Related Federal Agencies Occupational Safety and Health Administration Mine Safety and Health Administration Follow NIOSH ...

  7. Superweak-like models of CP violation

    International Nuclear Information System (INIS)

    Lavoura, L.

    1992-01-01

    I put forward a two-Higgs-doublet model in which CP violation is mediated only by the neutral Higgs bosons, via the mechanism of scalar-pseudoscalar mixing. In this model there is no CP violation in the exchange of either W bosons or of charged Higgs bosons. The model is therefore an approximate realization of the superweak theory of CP violation. It has only two basic CP-violating quantities. I point out that other models of this kind, but with more than two Higgs doublets, may also be built

  8. Analysis of safety supervision effect on coal mine using game theory

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Min; Xiao Zhong-hai [China University of Mining & Technology, Xuzhou (China). School of Management

    2006-07-01

    A two-phase game model was constructed based on economic game theory to improve the inefficient supervision conditions of coalmining enterprises' safety production. The inner mechanism of safety supervision system was carefully studied. The strategy set of the dynamic game-theory relations between colliery proprietor and safety supervision department and the strict competitive game-theory relations between safety supervision department and workers at the production line was analyzed. The conditions of achieving the dominant-strategy equilibrium were revealed. Upon this basis, the possible solution set of safety benefit distribution for the cooperative game-theory of triple party was obtained and the effective and cooperative fair solution was formed. Finally, conclusions are drawn as follows: the combination of necessary penalty to supervisors and operators with the fair distribution of safety benefits can realize the zero-defect of operational violation, so that the violation behavior can be completely avoided. 10 refs., 7 figs.

  9. Symmetry-violating kaon decays

    International Nuclear Information System (INIS)

    Herczeg, P.

    1979-01-01

    The content of this talk comprises two parts. In the first, an analysis of the muon number violating decay modes of the K-mesons is given. Subsequently, some new developments in the field of CP-violation are reviewed and the question of time-reversal invariance and the status of CPT-invariance are briefly considered. (auth)

  10. k-essence explains a Lorentz violation experiment

    International Nuclear Information System (INIS)

    Li Miao; Pang Yi; Wang Yi

    2009-01-01

    Recently, a state of the art experiment shows evidence for Lorentz violation in the gravitational sector. To explain this experiment, we investigate a spontaneous Lorentz violation scenario with a generalized scalar field. We find that when the scalar field is nonminimally coupled to gravity, the Lorentz violation induces a deformation in the Newtonian potential along the direction of Lorentz violation.

  11. Present status of CP violation

    International Nuclear Information System (INIS)

    Ng, J.N.

    1989-06-01

    A review of the status of CP violation in kaons is given. Status of our knowledge of quark mixing angles in the standard six quark model is presented. The role Β d o - Βd o transition plays in this study is examined. A comparison of the estimates of CP violation effects from models beyond the standard one is given. Other experiments that have the capability of testing different CP violation models are also discussed. (Author) 35 refs., 6 figs., tab

  12. Effect of CP violation in bilinear R-parity violation on baryogenesis

    Energy Technology Data Exchange (ETDEWEB)

    Cheriguene, Asma; Langenfeld, Ulrich; Porod, Werner [Universitaet Wuerzburg (Germany); Liebler, Stefan [Universitaet Wuppertal (Germany)

    2013-07-01

    Supersymmetric models where R-parity is broken via lepton number violation provides an intrinsically supersymmetric explanation for the observed neutrino. The complex phases of the corresponding parameters are constrained by the observed matter anti-matter asymmetry of the universe. Taking bilinear R-parity violation as framework in combination with the assumption of a large lepton asymmetry generated via the Affleck-Dine mechanism at the end of inflation we investigate these constraints in the parameter range compatible with neutrino data.

  13. T violating neutron spin rotation asymmetry

    International Nuclear Information System (INIS)

    Masuda, Yasushiro.

    1993-01-01

    A new experiment on T-violation is proposed, where a spin-rotating-neutron transmission through a polarized nuclear target is measuered. The method to control the neutron spin is discussed for the new T-violation experiment. The present method has possibility to provide us more accurate T-violation information than the neutron EDM measurement

  14. Cosmology and CPT violating neutrinos

    Energy Technology Data Exchange (ETDEWEB)

    Barenboim, Gabriela; Salvado, Jordi [Universitat de Valencia-CSIC, Departament de Fisica Teorica y Instituto de Fisica Corpuscular, Burjassot (Spain)

    2017-11-15

    The combination charge conjugation-parity-time reversal (CPT) is a fundamental symmetry in our current understanding of nature. As such, testing CPT violation is a strongly motivated path to explore new physics. In this paper we study CPT violation in the neutrino sector, giving for the first time a bound, for a fundamental particle, in the CPT violating particle-antiparticle gravitational mass difference. We argue that cosmology is nowadays the only data sensitive to CPT violation for the neutrino-antineutrino mass splitting and we use the latest data release from Planck combined with the current baryonic-acoustic-oscillation measurement to perform a full cosmological analysis. To show the potential of the future experiments we also show the results for Euclid, a next generation large scale structure experiment. (orig.)

  15. Testing the violation of conservatism accounting principle. Case study on Romanian listed entities

    Directory of Open Access Journals (Sweden)

    Bunget Ovidiu Constantin

    2015-12-01

    Full Text Available From the beginning of the debates regarding the conservatism principle, the concept experienced a significant development. As it is one of the most controversial and violated accounting principle, we started to seek how can we help one of the auditor’s challenge in the audit mission: to identify and evaluate the risks from the financial statement level. The most affected accounting principle in Romania is the conservatism principle. After a long time of debates, it was stated that the conservatism principle, considered to be complementary to the “fair view” concept, which means that financial reports shall be required to submit information so impartial and in such a manner as to enable the reader to understand them clearly. Considered as a risk that should be identified, this study demonstrates a relationship between the violation of the conservatism principle and the analysis of the financial indicators, such as: Long-Term-Debt-to-Equity Ratio; Debt-to-Equity Ratio; Global Solvency Ratio; Operating Margin Ratio; Current Finance Ratio; Period of Activity Indicator and Auditor Indicator. Based on a quantitative method, this analyze was realized through three econometric model performed on annual financial statements of the companies from Bucharest Stock Exchange. After validating the sample and analyzing the factorial variables, we selected the best model: the probit model. In conclusion, as can be seen in the paper, the econometric function is efficient, reliable and can be applied to assess the risk likelihood for violating the conservatism principle by a Romanian company.

  16. Constraints on the CP-Violating MSSM

    CERN Document Server

    Arbey, A; Godbole, R M; Mahmoudi, F

    2016-01-01

    We discuss the prospects for observing CP violation in the MSSM with six CP-violating phases, using a geometric approach to maximise CP-violating observables subject to the experimental upper bounds on electric dipole moments. We consider constraints from Higgs physics, flavour physics, the dark matter relic density and spin-independent scattering cross section with matter.

  17. Exploring CP violation in the MSSM.

    Science.gov (United States)

    Arbey, Alexandre; Ellis, John; Godbole, Rohini M; Mahmoudi, Farvah

    We explore the prospects for observing CP violation in the minimal supersymmetric extension of the Standard Model (MSSM) with six CP-violating parameters, three gaugino mass phases and three phases in trilinear soft supersymmetry-breaking parameters, using the CPsuperH code combined with a geometric approach to maximise CP-violating observables subject to the experimental upper bounds on electric dipole moments. We also implement CP-conserving constraints from Higgs physics, flavour physics and the upper limits on the cosmological dark matter density and spin-independent scattering. We study possible values of observables within the constrained MSSM (CMSSM), the non-universal Higgs model (NUHM), the CPX scenario and a variant of the phenomenological MSSM (pMSSM). We find values of the CP-violating asymmetry [Formula: see text] in [Formula: see text] decay that may be as large as 3 %, so future measurements of [Formula: see text] may provide independent information about CP violation in the MSSM. We find that CP-violating MSSM contributions to the [Formula: see text] meson mass mixing term [Formula: see text] are in general below the present upper limit, which is dominated by theoretical uncertainties. If these could be reduced, [Formula: see text] could also provide an interesting and complementary constraint on the six CP-violating MSSM phases, enabling them all to be determined experimentally, in principle. We also find that CP violation in the [Formula: see text] and [Formula: see text] couplings can be quite large, and so may offer interesting prospects for future [Formula: see text], [Formula: see text], [Formula: see text] and [Formula: see text] colliders.

  18. Safety evaluation status report for the prototype license application safety analysis report

    International Nuclear Information System (INIS)

    1989-07-01

    The US Nuclear Regulatory Commission (NRC) staff and consultants reviewed a Prototype License Application Safety Analysis Report (PLASAR) submitted by the US Department of Energy (DOE) for the earth-mounded concrete bunker (EMCB) alternative method of low-level radioactive waste disposal. The NRC reviewers relied extensively on the Standard Review Plan (SRP), Rev.1 (NUREG-1200), to evaluate the acceptability of the information provided in the EMCB PLASAR. The NRC staff selected certain review areas in the PLASAR for development of safety evaluation report input to provide examples of safety assessments that are necessary as part of a licensing review. Because of the fictitious nature of the assumed disposal site, and the decision to limit the review to essentially first-round review status, the NRC staff report is labeled a ''Safety Evaluation Status Report'' (SESR). Appendix A comprises the NRC review comments and questions on the information that DOE submitted in the PLASAR. The NRC concentrated its review on the design and operations-related portions of the EMCB PLASAR

  19. The safety management of the informative communication technologies

    International Nuclear Information System (INIS)

    Kotora, D.

    2009-01-01

    In the first part, the contribute deals with the basic principals of the central monitoring of safety by means of the product Cisco SIMS (now netForensic SIM One), which enable to monitor the multi / platform surroundings, the collection of the data of central data base and to provide the analytical tools and the progress at the incidents detection. The second part pays attention to the integration of SAP A3 into the central monitoring of safety, what enables the automatic correlation of notice SAP with the other monitoring equipment's (farewell's, IPS etc.) and thereby the possibility to uncover the sophisticated attacks and data leakage. Within the integrated works, the mechanisms enabling the automatic control of activity concord on the system SAP with the required organization rules and consecutive alert for following events were formed: I. Environment segregation violation - the violation of the principles for department of the development, testing and production surroundings e.g. the change of authorized profiles on the production system in spite of the transport from the testing surrounding; II. Operation violation - unauthorized access to the operations, object etc.; III. The violation of the principles by the important users; IV. The access of the common users on the important operations

  20. Parity violation experiments at RHIC

    International Nuclear Information System (INIS)

    Tannenbaum, M.J.

    1993-01-01

    With longitudinally polarized protons at RHIC, even a 1 month dedicated run utilizing both approved major detectors could produce a significant search for new physics in hadron collisions via parity violation. Additionally, in the energy range of RHIC, large ''conventional'' parity violating effects are predicted due to the direct production of the weak bosons W ± and Z 0 . One can even envision measurements of the spin dependent sea-quark structure functions of nucleons using the single-spin parity violating asymmetry of W ± and Z 0

  1. CP Violation

    International Nuclear Information System (INIS)

    Aleksan, R.

    1993-06-01

    The violation of the CP symmetry is a phenomenon, the origin of which is not yet well established and deserves a particular attention since it may be a fundamental property of Nature with very important consequences for the evolution of the universe. We propose in these lectures to have an overview of this phenomenon as we understand it so far. To this end, and after introducing the discrete space-time symmetries, we discuss the observation of the violation of the CP symmetry in the neutral kaon decays. We then derive the general formalism for any neutral system made of a particle and its antiparticle and discuss how CP violation is introduced. We show how this phenomenon is generated in the Standard Model of the electroweak interactions and what are the predictions that can be made. In particular we shall concentrate on the expected effects in the decays of mesons involving the b quark. We review the various possibilities for observing these effects, calculate their magnitudes and show how the consistency of the theory can be tested. Finally, we outline the experimental prospects for studying CP non conservation at an asymmetric B Factory to either verify the Standard Model mechanism or provide evidence for new physics. (author)

  2. Memory for expectation-violating concepts

    DEFF Research Database (Denmark)

    Porubanova, Michaela; Shaw, Daniel; McKay, Ryan

    2014-01-01

    Previous research has shown that ideas which violate our expectations, such as schema-inconsistent concepts, enjoy privileged status in terms of memorability. In our study, memory for concepts that violate cultural (cultural schema-level) expectations (e.g., ‘‘illiterate teacher’’, ‘‘wooden bottle...... expectations and with intuitive concepts (e.g., ‘‘galloping pony’’, ‘‘drying orchid’’, or ‘‘convertible car’’), in both immediate recall, and delayed recognition tests. Importantly, concepts related to agents showed a memory advantage over concepts not pertaining to agents, but this was true only...... for expectation-violating concepts. Our results imply that intuitive, everyday concepts are equally attractive and memorable regardless of the presence or absence of agents. However, concepts that violate our expectations (cultural-schema or domain-level) are more memorable when pertaining to agents (humans...

  3. Low energy fermion number violation

    International Nuclear Information System (INIS)

    Peccei, R.D.

    1989-01-01

    After a brief aside on charge quantization in the standard electroweak theory, I concentrate on various aspects of anomaly induced fermion number violation in the standard model. A critical analysis of the role of sphalerons for the universe's baryon asymmetry is presented and the importance of calculating directly fermion number violating Green's functions is stressed. A physical interpretation of the recent observation of Ringwald, that coherent effects in the electroweak theory lead to catastrophic fermion number violation at 100 TeV, is discussed. Possible quantum effects which might spoil this semi-classical picture are examined

  4. 48 CFR 403.303 - Reporting suspected antitrust violations.

    Science.gov (United States)

    2010-10-01

    ... Antitrust Violations 403.303 Reporting suspected antitrust violations. Contracting officers shall report the circumstances of suspected violations of antitrust laws to the Office of Inspector General in accordance with... antitrust violations. 403.303 Section 403.303 Federal Acquisition Regulations System DEPARTMENT OF...

  5. CP violation in K decays

    International Nuclear Information System (INIS)

    Gilman, F.J.

    1989-05-01

    Recent theoretical and experimental progress on the manifestation of CP violation in K decays, and toward understanding whether CP violation originates in a phase, or phases, in the weak mixing matrix of quarks is reviewed. 23 refs., 10 figs

  6. National trends in drinking water quality violations.

    Science.gov (United States)

    Allaire, Maura; Wu, Haowei; Lall, Upmanu

    2018-02-27

    Ensuring safe water supply for communities across the United States is a growing challenge in the face of aging infrastructure, impaired source water, and strained community finances. In the aftermath of the Flint lead crisis, there is an urgent need to assess the current state of US drinking water. However, no nationwide assessment has yet been conducted on trends in drinking water quality violations across several decades. Efforts to reduce violations are of national concern given that, in 2015, nearly 21 million people relied on community water systems that violated health-based quality standards. In this paper, we evaluate spatial and temporal patterns in health-related violations of the Safe Drinking Water Act using a panel dataset of 17,900 community water systems over the period 1982-2015. We also identify vulnerability factors of communities and water systems through probit regression. Increasing time trends and violation hot spots are detected in several states, particularly in the Southwest region. Repeat violations are prevalent in locations of violation hot spots, indicating that water systems in these regions struggle with recurring issues. In terms of vulnerability factors, we find that violation incidence in rural areas is substantially higher than in urbanized areas. Meanwhile, private ownership and purchased water source are associated with compliance. These findings indicate the types of underperforming systems that might benefit from assistance in achieving consistent compliance. We discuss why certain violations might be clustered in some regions and strategies for improving national drinking water quality.

  7. B decays and models for CP violation

    International Nuclear Information System (INIS)

    He, X.

    1996-01-01

    The decay modes B to ππ, ψK S , K - D, πK, and ηK are promising channels to study the unitarity triangle of the CP-violating Cabibbo-Kobayashi-Maskawa (CKM) matrix. In this paper I study the consequences of these measurements in the Weinberg model. I show that using the same set of measurements, the following different mechanisms for CP violation can be distinguished: (1) CP is violated in the CKM sector only; (2) CP is violated spontaneously in the Higgs sector only; and (3) CP is violated in both the CKM and Higgs sectors. copyright 1996 The American Physical Society

  8. 77 FR 15453 - Pipeline Safety: Information Collection Activities

    Science.gov (United States)

    2012-03-15

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... information collection titled, ``Gas Pipeline Safety Program Certification and Hazardous Liquid Pipeline... collection request that PHMSA will be submitting to OMB for renewal titled, ``Gas Pipeline Safety Program...

  9. 48 CFR 1403.303 - Reporting suspected antitrust violations.

    Science.gov (United States)

    2010-10-01

    ... Antitrust Violations 1403.303 Reporting suspected antitrust violations. (a) Reports on suspected violations of antitrust laws as required by FAR 3.303 shall be prepared by the CO, reviewed by the SOL, and... antitrust violations. 1403.303 Section 1403.303 Federal Acquisition Regulations System DEPARTMENT OF THE...

  10. Gender Role Violations and the Sexual Double Standard.

    Science.gov (United States)

    Zaikman, Yuliana; Marks, Michael J; Young, Tara M; Zeiber, Jacqueline A

    2016-12-01

    The sexual double standard (SDS) suggests that women are evaluated negatively and men positively for engaging in similar sexual behaviors. According to social role theory, the SDS exists due to gender role structures. Consequently, perceived violations of women's sexual behavior are associated with the SDS. In addition to gender role violations of sexual behavior, two additional violations of gender roles exist: heterosexual sexual orientation norms and gender role characteristics. The current study aims to investigate whether the SDS persists for sexual orientation-violating and gender role characteristic-violating targets, and to examine which of the three gender role violations influence evaluations of others' sexual behavior. A U.S. sample of 483 participants evaluated target individuals who were either female or male, heterosexual/gay man or lesbian, feminine or masculine, and had 1 or 12 sexual partners. Results indicate that SDS persists for gender role-violating targets but is exhibited differently for targets violating heterosexual sexual orientation norms and gender role characteristics.

  11. CP violating scalar Dark Matter

    Science.gov (United States)

    Cordero-Cid, A.; Hernández-Sánchez, J.; Keus, V.; King, S. F.; Moretti, S.; Rojas, D.; Sokołowska, D.

    2016-12-01

    We study an extension of the Standard Model (SM) in which two copies of the SM scalar SU(2) doublet which do not acquire a Vacuum Expectation Value (VEV), and hence are inert, are added to the scalar sector. We allow for CP-violation in the inert sector, where the lightest inert state is protected from decaying to SM particles through the conservation of a Z 2 symmetry. The lightest neutral particle from the inert sector, which has a mixed CP-charge due to CP-violation, is hence a Dark Matter (DM) candidate. We discuss the new regions of DM relic density opened up by CP-violation, and compare our results to the CP-conserving limit and the Inert Doublet Model (IDM). We constrain the parameter space of the CP-violating model using recent results from the Large Hadron Collider (LHC) and DM direct and indirect detection experiments.

  12. Flavour Physics and CP Violation

    CERN Document Server

    Fleischer, Robert

    2006-01-01

    The starting point of these lectures is an introduction to the weak interactions of quarks and the Standard-Model description of CP violation, where the central role is played by the Cabibbo-Kobayashi-Maskawa matrix and the corresponding unitarity triangles. Since the B-meson system will govern the stage of (quark) flavour physics and CP violation in this decade, it will be our main focus. We shall classify B-meson decays, introduce the theoretical tools to deal with them, investigate the requirements for non-vanishing CP-violating asymmetries, and discuss the main strategies to explore CP violation and the preferred avenues for physics beyond the Standard Model to enter. This formalism is then applied to discuss the status of important B-factory benchmark modes, where we focus on puzzling patterns in the data that may indicate new-physics effects, as well as the prospects for B-decay studies at the LHC.

  13. The strong equivalence principle and its violation

    International Nuclear Information System (INIS)

    Canuto, V.M.; Goldman, I.

    1983-01-01

    In this paper, the authors discuss theoretical and observational aspects of an SEP violation. They present a two-times theory as a possible framework to handle an SEP violation and summarize the tests performed to check the compatibility of such violation with a host of data ranging from nucleosynthesis to geophysics. They also discuss the dynamical equations needed to analyze radar ranging data to reveal an SEP violation and in particular the method employed by Shapiro and Reasenberg. (Auth.)

  14. Perceived enjoyment, concentration, intention, and speed violation behavior: Using flow theory and theory of planned behavior.

    Science.gov (United States)

    Atombo, Charles; Wu, Chaozhong; Zhang, Hui; Wemegah, Tina D

    2017-10-03

    Road accidents are an important public health concern, and speeding is a major contributor. Although flow theory (FLT) is a valid model for understanding behavior, currently the nature of the roles and interplay of FLT constructs within the theory of planned behavior (TPB) framework when attempting to explain the determinants of motivations for intention to speed and speeding behavior of car drivers is not yet known. The study aims to synthesize TPB and FLT in explaining drivers of advanced vehicles intentions to speed and speed violation behaviors and evaluate factors that are critical for explaining intention and behavior. The hypothesized model was validated using a sample collected from 354 fully licensed drivers of advanced vehicles, involving 278 males and 76 females on 2 occasions separated by a 3-month interval. During the first of the 2 occasions, participants completed questionnaire measures of TPB and FLT variables. Three months later, participants' speed violation behaviors were assessed. The study observed a significant positive relationship between the constructs. The proposed model accounted for 51 and 45% of the variance in intention to speed and speed violation behavior, respectively. The independent predictors of intention were enjoyment, attitude, and subjective norm. The independent predictors of speed violation behavior were enjoyment, concentration, intention, and perceived behavioral control. The findings suggest that safety interventions for preventing speed violation behaviors should be aimed at underlying beliefs influencing the speeding behaviors of drivers of advanced vehicles. Furthermore, perceived enjoyment is of equal importance to driver's intention, influencing speed violation behavior.

  15. Theory prospective on leptonic CP violation

    International Nuclear Information System (INIS)

    Petcov, S.T.

    2016-01-01

    The phenomenology of 3-neutrino mixing, the current status of our knowledge about the 3-neutrino mixing parameters, including the absolute neutrino mass scale, and of the Dirac and Majorana CP violation in the lepton sector are reviewed. The problems of CP violation in neutrino oscillations and of determining the nature – Dirac or Majorana – of massive neutrinos are discussed. The seesaw mechanism of neutrino mass generation and the related leptogenesis scenario of generation of the baryon asymmetry of the Universe are considered. The results showing that the CP violation necessary for the generation of the baryon asymmetry of the Universe in leptogenesis can be due exclusively to the Dirac and/or Majorana CP-violating phase(s) in the neutrino mixing matrix U are briefly reviewed. The discrete symmetry approach to understanding the observed pattern of neutrino mixing and the related predictions for the leptonic Dirac CP violation are also reviewed.

  16. Soft CP violation in K-meson systems

    International Nuclear Information System (INIS)

    Montero, J.C.; Nishi, C.C.; Pleitez, V.; Ravinez, O.; Rodriguez, M.C.

    2006-01-01

    We consider a model with soft CP violation which accommodates the CP violation in the neutral kaons even if we assume that the Cabibbo-Kobayashi-Maskawa mixing matrix is real and the sources of CP violation are three complex vacuum expectation values and a trilinear coupling in the scalar potential. We show that for some reasonable values of the masses and other parameters the model allows us to explain all the observed CP violation processes in the K 0 -K 0 system

  17. Nuclear safety review for the year 1997

    International Nuclear Information System (INIS)

    1998-12-01

    The Nuclear Safety Review attempts to summarize the global nuclear safety scene during 1997. It starts with discussion of significant safety related events worldwide: International cooperation; reactor facilities; radioactive waste management; medical uses of radiation sources; events at other facilities and transport of radioactive material. This is followed by a description of principal IAEA activities that contributed to global nuclear safety, namely: legally binding international agreements; non-binding safety standards and their application. The third part highlights developments in Member States as they reported them. The review closes with a description of issues that are likely to be prominent in the coming year(s). A draft version was submitted to the March 1998 session of the IAEA Board of Governors, and this final version has been prepared in light of the discussion in the Board and was submitted for information to the 42nd session of the IAEA General Conference

  18. R-parity violation at the LHC

    Energy Technology Data Exchange (ETDEWEB)

    Dercks, Daniel [Universitaet Bonn, Physikalisches Institut, Bethe Center for Theoretical Physics, Bonn (Germany); Universitaet Hamburg, II. Institut fuer Theoretische Physik, Hamburg (Germany); Dreiner, Herbi; Krauss, Manuel E.; Opferkuch, Toby; Reinert, Annika [Universitaet Bonn, Physikalisches Institut, Bethe Center for Theoretical Physics, Bonn (Germany)

    2017-12-15

    We investigate the phenomenology of the MSSM extended by a single R-parity-violating coupling at the unification scale. For all R-parity-violating couplings, we discuss the evolution of the particle spectra through the renormalization group equations and the nature of the lightest supersymmetric particle (LSP) within the CMSSM, as an example of a specific complete supersymmetric model. We use the nature of the LSP to classify the possible signatures. For each possible scenario we present in detail the current LHC bounds on the supersymmetric particle masses, typically obtained using simplified models. From this we determine the present coverage of R-parity-violating models at the LHC. We find several gaps, in particular for a stau-LSP, which is easily obtained in R-parity-violating models. Using the program CheckMATE we recast existing LHC searches to set limits on the parameters of all R-parity-violating CMSSMs. We find that virtually all of them are either more strongly constrained or similarly constrained in comparison to the R-parity-conserving CMSSM, including the anti U anti D anti D models. For each R-parity-violating CMSSM we then give the explicit lower mass bounds on all relevant supersymmetric particles. (orig.)

  19. Occupational carbon monoxide violations in the State of Washington, 1994-1999.

    Science.gov (United States)

    Lofgren, Don J

    2002-07-01

    Occupational exposure to carbon monoxide continues to cause a number of injuries and deaths. This study reviewed the State of Washington OSHA inspection records for occupational safety or health violations related to carbon monoxide for the time period 1994-1999 to assess the agency's efforts and further identify and characterize causative factors. Inspection data were also compared with carbon monoxide claims data from a companion study to determine if the agency was visiting the most at risk work operations. Inspections were identified by searching computerized violation texts for "carbon monoxide" or "CO." The study found 142 inspections with one or more carbon monoxide violations. Inspections were spread over 84 different 4-digit Standard Industrial Classification codes. Most inspections were initiated as a result of a complaint or other informant. Inspections were predominantly in construction and manufacturing, whereas carbon monoxide claims were mores evenly distributed between the major industries. Inspections also may have failed to find violations for some types of equipment responsible for carbon monoxide claims. Forklifts were the source of carbon monoxide most often associated with a violation, followed by compressors for respirators, auto/truck/bus, and temporary heating devices. Inspections in response to poisonings found common factors associated with lack of recognition and failure to use or maintain equipment and ventilation. Some work sites with one or more poisonings were not being inspected. Only 10 of the 51 incidents with industrial insurance claim reports of carboxyhemoglobin at or above 20 percent were inspected. Further, it was found more preventive efforts should be targeted at cold storage operations and certain warehouse and construction activities. It is proposed that more specific standards, both consensus and regulatory, would provide additional risk reduction. Reliance upon safe work practices as a primary method of control in the

  20. High-risk driving attitudes and everyday driving violations of car and racing enthusiasts in Ontario, Canada.

    Science.gov (United States)

    Yildirim-Yenier, Zümrüt; Vingilis, Evelyn; Wiesenthal, David L; Mann, Robert E; Seeley, Jane

    2015-01-01

    Attitudes and individual difference variables of car and racing enthusiasts regarding high-risk behaviors of street racing and stunt driving have recently been investigated. Positive attitudes toward high-risk driving, personality variables such as driver thrill seeking, and other self-reported risky driving acts were associated with these behaviors. However, probable relationships among high-risk driving tendencies, everyday driving behaviors, and negative road safety outcomes have remained largely unexamined. This study aimed to investigate the associations among car and racing enthusiasts' high-risk driving attitudes, self-reported everyday driving violations (i.e., ordinary and aggressive violations), and self-reported negative outcomes (i.e., collisions and driving offense citations). A web-based survey was conducted with members and visitors of car club and racing websites in Ontario, Canada. Data were obtained from 366 participants. The questionnaire included 4 attitude measures-(1) attitudes toward new penalties for Ontario's Street Racers, Stunt and Aggressive Drivers Legislation; (2) attitudes toward new offenses of stunt driving under the same legislation; (3) general attitudes toward street racing and stunt driving; (4) comparison of street racing with other risky driving behaviors-self-reported driving violations (i.e., ordinary and aggressive violations); self-reported collisions and offense citations; and background and driving questions (e.g., age, driving frequency). Results revealed that attitudes toward stunt driving offenses negatively and general attitudes toward street racing and stunt driving positively predicted ordinary violations, which, in turn, predicted offense citations. Moreover, general attitudes toward street racing and stunt driving positively predicted aggressive violations, which, in turn, predicted offense citations. The findings indicate that positive high-risk driving attitudes may be transferring to driving violations in

  1. 32 CFR 634.32 - Traffic violation reports.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Traffic violation reports. 634.32 Section 634.32 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.32 Traffic violation reports. (a) Most traffic violations...

  2. CP violation and the top quark

    International Nuclear Information System (INIS)

    Atwood, D.

    1994-02-01

    We consider signals of CP violation in semi-leptonic decay of the top quark. We show that the transverse polarization asymmetries of the τ-lepton in the decay t → brv is extremely sensitive CP violation. As an illustration we consider CP phases arising from the charged Higgs exchange in the Weinberg three Higgs doublet model. Qualitatively, the polarization asymmetries are enhanced over rate or energy asymmetries by a factor of O(m t /m r ) ∼ 100 with a corresponding increase in sensitivity to CP violating parameters. We also examine τ polarization in b decays via b → cvr and find that may also be very effective in constraining CP violating effects such as those that arise from an extended Higgs sector

  3. CP violation in b → s penguin decays and T, CPT violation at BaBar and BELLE

    International Nuclear Information System (INIS)

    Emery-Schrenk, S.

    2014-01-01

    We report on the first direct observation of time reversal violation at BABAR in the interference between direct decay and decay with B 0 - B-bar 0 mixing, as well as on the most precise search for CPT violation in B 0 - B-bar 0 mixing at BELLE. We then present recent CP violation studies at BABAR in rare b → s penguin decays B → KKK and B → K*l + l - . (author)

  4. Aviation Safety Simulation Model

    Science.gov (United States)

    Houser, Scott; Yackovetsky, Robert (Technical Monitor)

    2001-01-01

    The Aviation Safety Simulation Model is a software tool that enables users to configure a terrain, a flight path, and an aircraft and simulate the aircraft's flight along the path. The simulation monitors the aircraft's proximity to terrain obstructions, and reports when the aircraft violates accepted minimum distances from an obstruction. This model design facilitates future enhancements to address other flight safety issues, particularly air and runway traffic scenarios. This report shows the user how to build a simulation scenario and run it. It also explains the model's output.

  5. Models of dynamical R-parity violation

    Energy Technology Data Exchange (ETDEWEB)

    Csáki, Csaba; Kuflik, Eric [Department of Physics, LEPP, Cornell University, Ithaca, NY 14853 (United States); Slone, Oren; Volansky, Tomer [Raymond and Beverly Sackler School of Physics and Astronomy, Tel-Aviv University, Tel-Aviv 69978 (Israel)

    2015-06-08

    The presence of R-parity violating interactions may relieve the tension between existing LHC constraints and natural supersymmetry. In this paper we lay down the theoretical framework and explore models of dynamical R-parity violation in which the breaking of R-parity is communicated to the visible sector by heavy messenger fields. We find that R-parity violation is often dominated by non-holomorphic operators that have so far been largely ignored, and might require a modification of the existing searches at the LHC. The dynamical origin implies that the effects of such operators are suppressed by the ratio of either the light fermion masses or the supersymmetry breaking scale to the mediation scale, thereby providing a natural explanation for the smallness of R-parity violation. We consider various scenarios, classified by whether R-parity violation, flavor breaking and/or supersymmetry breaking are mediated by the same messenger fields. The most compact case, corresponding to a deformation of the so called flavor mediation scenario, allows for the mediation of supersymmetry breaking, R-parity breaking, and flavor symmetry breaking in a unified manner.

  6. Aviation Safety Hotline Information System -

    Data.gov (United States)

    Department of Transportation — The Aviation Safety Hotline Information System (ASHIS) collects, stores, and retrieves reports submitted by pilots, mechanics, cabin crew, passengers, or the public...

  7. CP violation

    International Nuclear Information System (INIS)

    Gilman, F.J.

    1989-12-01

    Predictions for CP violation in the three generation Standard Model are reviewed based on what is known about the Cabibbo-Kobayashi-Maskawa matrix. Application to the K and B meson systems are emphasized. 43 refs., 13 figs

  8. Martin Marietta Energy Systems Nuclear Criticality Safety Improvement Program

    International Nuclear Information System (INIS)

    Speas, I.G.

    1987-01-01

    This report addresses questions raised by criticality safety violation at several DOE plants. Two charts are included that define the severity and reporting requirements for the six levels of accidents. A summary is given of all reported criticality incident at the DOE plants involved. The report concludes with Martin Marietta's Nuclear Criticality Safety Policy Statement

  9. Rule-violations sensitise towards negative and authority-related stimuli.

    Science.gov (United States)

    Wirth, Robert; Foerster, Anna; Rendel, Hannah; Kunde, Wilfried; Pfister, Roland

    2018-05-01

    Rule violations have usually been studied from a third-person perspective, identifying situational factors that render violations more or less likely. A first-person perspective of the agent that actively violates the rules, on the other hand, is only just beginning to emerge. Here we show that committing a rule violation sensitises towards subsequent negative stimuli as well as subsequent authority-related stimuli. In a Prime-Probe design, we used an instructed rule-violation task as the Prime and a word categorisation task as the Probe. Also, we employed a control condition that used a rule inversion task as the Prime (instead of rule violations). Probe targets were categorised faster after a violation relative to after a rule-based response if they related to either, negative valence or authority. Inversions, however, primed only negative stimuli and did not accelerate the categorisation of authority-related stimuli. A heightened sensitivity towards authority-related targets thus seems to be specific to rule violations. A control experiment showed that these effects cannot be explained in terms of semantic priming. Therefore, we propose that rule violations necessarily activate authority-related representations that make rule violations qualitatively different from simple rule inversions.

  10. Report of the CP-violation working group

    International Nuclear Information System (INIS)

    Hoffman, C.M.

    1982-01-01

    The CP-Violation Working Group met twice during the workshop. A nice summary of our present knowledge of CP-violation was presented in the talk by Prof. James W. Cronin. In the final paragraph of his talk, Prof. Cronin argues that higher precision experiments studying CP-violation at LAMPF II will be extremely important no matter what additional knowledge we acquire in the time before LAMPF II is constructed. The crucial issue at present is to uncover the underlying mechanism responsible for CP-violation. The Working Group heard several talks aimed at reviewing the theoretical status of CP-violation and the directions that future experimental efforts might take. These talks included: Kaon Experiments at KEK, T. Yamazaki, University of Tokyo; Mechanisms for CP Violation, P. Herczeg, Los Alamos; and The Experimental Status of eta 00 Experiments, J.W. Cronin, Univ. of Chicago. There were also extended discussions on which experiments appear to be the most important and how to best perform these measurements. A summary of these discussions is given

  11. $CPT$ violation searches and prospects for LHCb

    CERN Document Server

    van Tilburg, Jeroen

    2015-03-06

    An overview of current experimental bounds on $CPT$ violation in neutral meson mixing is given. New values for the $CPT$ asymmetry in the $B^0$ and $B_s^0$ systems are deduced from BaBar, Belle and LHCb data. With dedicated analyses, LHCb will be able to further improve the bounds on $CPT$ violation in the $D^0$, $B^0$ and $B_s^0$ systems. Since $CPT$ violation implies violation of Lorentz invariance, the observed $CPT$ asymmetry will exhibit sidereal- and boost-dependent variations. Such $CPT$-violating and Lorentz-violating effects are accommodated in the framework of the Standard-Model Extension (SME). The large boost of the neutral mesons produced at LHCb results in a high sensitivity to the corresponding SME coefficients. For the $B^0$ and $B_s^0$ systems, using existing LHCb data, we determine with high precision the SME coefficients that are not varying with sidereal time. With a full sidereal analysis, LHCb will be able to improve the existing SME bounds in the $D^0$, $B^0$ and $B_s^0$ systems by up t...

  12. CP violation in the K and B systems

    International Nuclear Information System (INIS)

    Kayser, B.

    1997-01-01

    Although CP violation was discovered more than thirty years ago, its origin is still unknown. In these lectures, we describe the CP-violation effects which have been seen in K decays, and explain how CP violation can be caused by the Standard Model weak interaction. The hypothesis that this interaction is indeed the origin of CP violation will be incisively tested by future experiments on B and K decays. We explain what quantities these experiments will try to determine, and how they will be able to determine them in a theoretically clean way. To clarify the physics of the K system, we give a phase-convention-free description of CP violation in this system. We conclude by briefly exploring whether electric dipole moments actually violate CP even if CPT invariance is not assumed. (author)

  13. CP violation in the K and B systems

    International Nuclear Information System (INIS)

    Kayser, B.

    1996-11-01

    Although CP violation was discovered more than thirty years ago, its origin is still unknown. In these lectures, we describe the CP- violating effects which have been seen in K decays, and explain how CP violation can be caused by the Standard Model weak interaction. The hypothesis that this interaction is indeed the origin of CP violation will be incisively tested by future experiments on B and K decays. We explain what quantities these experiments will try to determine, and how they will be able to determine them in a theoretically clean way. To clarify the physics of the K system, we give a phase-convention-free description of CP violation in this system. We conclude by briefly exploring whether electric dipole moments actually violate CP even if CPT invariance is not assumed

  14. Threshold analyses and Lorentz violation

    International Nuclear Information System (INIS)

    Lehnert, Ralf

    2003-01-01

    In the context of threshold investigations of Lorentz violation, we discuss the fundamental principle of coordinate independence, the role of an effective dynamical framework, and the conditions of positivity and causality. Our analysis excludes a variety of previously considered Lorentz-breaking parameters and opens an avenue for viable dispersion-relation investigations of Lorentz violation

  15. Flavour Physics and CP Violation

    CERN Document Server

    Fleischer, Robert

    2005-01-01

    The starting point of these lectures is an introduction to the weak interactions of quarks and the Standard-Model description of CP violation, where the key element is the Cabibbo--Kobayashi--Maskawa matrix and the corresponding unitarity triangles. Since the B-meson system will govern the stage of (quark) flavour physics and CP violation in this decade, it will be -- after a brief look at the kaon system -- our main focus. We shall classify B-meson decays, introduce the theoretical tools to deal with them, explore the requirements for non-vanishing CP-violating asymmetries, and discuss B^0_q--B^0_q_bar mixing (q={d,s}). We will then turn to B-factory benchmark modes, discuss the physics potential of B^0_s mesons, which is particularly promising for B-decay experiments at hadron colliders, and emphasize the importance of studies of rare decays, which are absent at the tree level in the Standard Model, complement nicely the studies of CP violation, and provide interesting probes for new physics.

  16. Lorentz-violating electrodynamics and the cosmic microwave background.

    Science.gov (United States)

    Kostelecký, V Alan; Mewes, Matthew

    2007-07-06

    Possible Lorentz-violating effects in the cosmic microwave background are studied. We provide a systematic classification of renormalizable and nonrenormalizable operators for Lorentz violation in electrodynamics and use polarimetric observations to search for the associated violations.

  17. A definition of maximal CP-violation

    International Nuclear Information System (INIS)

    Roos, M.

    1985-01-01

    The unitary matrix of quark flavour mixing is parametrized in a general way, permitting a mathematically natural definition of maximal CP violation. Present data turn out to violate this definition by 2-3 standard deviations. (orig.)

  18. Elements to evaluate the intention in the non-compliance s or violations to the regulatory framework in the national nuclear facilities; Elementos para evaluar la intencionalidad en los incumplimientos o violaciones al marco regulador en las instalaciones nucleares nacionales

    Energy Technology Data Exchange (ETDEWEB)

    Espinosa V, J. M.; Gonzalez V, J. A., E-mail: jmespinosa@cnsns.gob.mx [Comision Nacional de Seguridad Nuclear y Salvaguardias, Dr. Jose Ma. Barragan No. 779, Col. Narvarte, 03020 Mexico D. F. (Mexico)

    2013-10-15

    Inside the impact evaluation process to the safety of non-compliance s or violations, developed and implanted by the Comision Nacional de Seguridad Nuclear y Salvaguardias (CNSNS), the Guide for the Impact Evaluation to the Safety in the National Nuclear Facilities by Non-compliance s or Violations to the Regulatory Framework was developed, which indicates that in the determination of the severity (graveness level) of a non-compliance or violation, four factors are evaluated: real and potential consequences to the safety, the impact to the regulator process and the intention. The non-compliance s or intentional violations are of particular interest, since the development of the regulatory activities of the CNSNS considers that the personnel of the licensees, as well as their contractors, will act and will communicate with integrity and honesty. The CNSNS cannot tolerate intentional non-compliance s, for what this violations type can be considered of a level of more graveness that the subjacent non-compliance. To determine the severity of a violation that involves intention, the CNSNS also took in consideration factors as the position and the personnel's responsibilities involved in the violation, the graveness level of the non-compliance in itself, the offender's intention and the possible gain that would produce the non-compliance, if exists, either economic or of another nature. The CNSNS hopes the licensees take significant corrective actions in response to non-compliance s or intentional violations, these corrective actions should correspond to the violation graveness with the purpose of generating a dissuasive effect in the organizations of the licensees. The present article involves the legal framework that confers the CNSNS the attributions to impose administrative sanctions to its licensees, establishes the definition of the CNSNS about what constitutes a non-compliance or intentional violation and finally indicates the intention types (deliberate

  19. Implementation of School Uniform Policy and the Violation of Students’ Human Rights in Schools

    Directory of Open Access Journals (Sweden)

    Vimbi Petrus Mahlangu

    2017-05-01

    Full Text Available The paper highlights the violations of students’ human rights in schools. The problem is the incident that took place at a school in Pretoria in 2016 where Black girls protested against the School’s Code of Conduct relating to hairstyle. Qualitative approach was used to collect information through a literature review and desk-top research methods. Black girls claimed they were discriminated against and the protest serves as an example to demonstrate students’ human rights violations when schools implement school uniform policies. Inequality in schools is rife in South Africa. School uniform policies with regard to dress codes are expected to reduce school violence, prevent discipline issues, and improve in school safety. Students have rights and their rights can include issues regarding cultural, economic, and political freedoms. Students, especially adolescents, respond very negatively to school uniforms.

  20. 75 FR 80374 - Mine Safety Disclosure

    Science.gov (United States)

    2010-12-22

    ... other jurisdiction, and domestic issuers would be required to disclose mining-related fatalities at... violations, orders and citations, related assessments and legal actions, and mining- related fatalities... disclose safety records'' of mining companies. See SA 3886 (an amendment to SA 3739 to S. 3217, 111th Cong...

  1. Information to be submitted in support of licensing applications for nuclear power plants

    International Nuclear Information System (INIS)

    1979-01-01

    This Safety Guide was prepared as part of the Agency's programme, referred to as the NUSS programme, for establishing Codes of Practice and Safety Guides relating to nuclear power plants. It supplements the Agency's Safety Series No.50-C-G, entitled ''Governmental Organization for the Regulation of Nuclear Power Plants: A Code of Practice''. It is concerned with the content of documents which should be submitted to the regulatory body by the applicant/licensee in support of licensing applications, with a possible method of classifying these documents and with the scheduling of their submission to the regulatory body at each major stage of the licensing process

  2. This was the particle physics that was: The years from P and C violation to CP violation

    International Nuclear Information System (INIS)

    Feinberg, G.

    1989-01-01

    This paper contains lecture notes given by Gary Feinberg on the historical aspect of the violation of P and C invariance and more recently the violation of CP invariance. (LSP) 13 refs., 2 figs., 2 tabs

  3. Training Course for Compliance Safety and Health Officers. Final Report.

    Science.gov (United States)

    McKnight, A. James; And Others

    The report describes revision of the Compliance Safety and Health Officers (CSHO) course for the Department of Labor, Occupational Safety and Health Administration (OSHA). The CSHO's job was analyzed in depth, in accord with OSHA standards, policies, and procedures. A listing of over 1,700 violations of OSHA standards was prepared, and specialists…

  4. Occupational Safety and Health Act Handbook for Vocational and Technical Education Teachers.

    Science.gov (United States)

    Shashack, Willard F., Ed.

    The purpose of the handbook is to assist the school shop teacher in participating in voluntary compliance with the standards and regulations of the Occupational Safety and Health Act of 1970. The first major section deals with general shop safety and how the shop teacher can use the checklist to control possible safety violations in his shop. The…

  5. Lorentz violation naturalness revisited

    Energy Technology Data Exchange (ETDEWEB)

    Belenchia, Alessio; Gambassi, Andrea; Liberati, Stefano [SISSA - International School for Advanced Studies, via Bonomea 265, 34136 Trieste (Italy); INFN, Sezione di Trieste, via Valerio 2, 34127 Trieste (Italy)

    2016-06-08

    We revisit here the naturalness problem of Lorentz invariance violations on a simple toy model of a scalar field coupled to a fermion field via a Yukawa interaction. We first review some well-known results concerning the low-energy percolation of Lorentz violation from high energies, presenting some details of the analysis not explicitly discussed in the literature and discussing some previously unnoticed subtleties. We then show how a separation between the scale of validity of the effective field theory and that one of Lorentz invariance violations can hinder this low-energy percolation. While such protection mechanism was previously considered in the literature, we provide here a simple illustration of how it works and of its general features. Finally, we consider a case in which dissipation is present, showing that the dissipative behaviour does not percolate generically to lower mass dimension operators albeit dispersion does. Moreover, we show that a scale separation can protect from unsuppressed low-energy percolation also in this case.

  6. Baryon number violation and string topologies

    International Nuclear Information System (INIS)

    Sjoestrand, T.; Skands, P.Z.

    2003-01-01

    In supersymmetric scenarios with broken R-parity, baryon number violating sparticle decays become possible. In order to search for such decays, a good understanding of expected event properties is essential. We here develop a complete framework that allows detailed studies. Special attention is given to the hadronization phase, wherein the baryon number violating vertex is associated with the appearance of a junction in the colour confinement field. This allows us to tell where to look for the extra (anti)baryon directly associated with the baryon number violating decay

  7. CP violation in CMS expected performance

    CERN Document Server

    Stefanescu, J

    1999-01-01

    The CMS experiment can contribute significantly to the measurement of the CP violation asymmetries. A recent evaluation of the expected precision on the CP violation parameter sin 2 beta in the channel B /sub d//sup 0/ to J/ psi $9 K/sub s//sup 0/ has been performed using a simulation of the CMS tracker including full pattern recognition. CMS has also studied the possibility to observe CP violation in the decay channel B/sub s//sup 0/ to J/ psi phi . The $9 results of these studies are reviewed. (7 refs).

  8. Better Bell-inequality violation by collective measurements

    International Nuclear Information System (INIS)

    Liang, Y.-C.; Doherty, Andrew C.

    2006-01-01

    The standard Bell-inequality experiments test for violation of local realism by repeatedly making local measurements on individual copies of an entangled quantum state. Here we investigate the possibility of increasing the violation of a Bell inequality by making collective measurements. We show that the nonlocality of bipartite pure entangled states, quantified by their maximal violation of the Bell-Clauser-Horne inequality, can always be enhanced by collective measurements, even without communication between the parties. For mixed states we also show that collective measurements can increase the violation of Bell inequalities, although numerical evidence suggests that the phenomenon is not common as it is for pure states

  9. Rephasing-invariant CP violating parameters with Majorana neutrinos

    International Nuclear Information System (INIS)

    Nieves, Jose F.; Pal, Palash B.

    2001-06-01

    We analyze the dependence of the squared amplitudes on the rephasing-invariant CP-violating parameters of the lepton sector, involving Majorana neutrinos, for various lepton- conserving and lepton-violating processes. We analyze the conditions under which the CP-violating effects in such processes vanish, in terms of the minimal set of rephasing invariants, giving special attention to the dependence on the extra CP-violating parameters that are due to the Majorana nature of the neutrinos. (author)

  10. Flavour physics and CP violation

    Indian Academy of Sciences (India)

    It is well known that the study of flavour physics and CP violation is very important to critically test the Standard Model and to look for possible signature of new physics beyond it. The observation of CP violation in kaon system in 1964 has ignited a lot of experimental and theoretical efforts to understand its origin and to look ...

  11. Anomalous Lorentz and CPT violation

    Science.gov (United States)

    Klinkhamer, F. R.

    2018-01-01

    If there exists Lorentz and CPT violation in nature, then it is crucial to discover and understand the underlying mechanism. In this contribution, we discuss one such mechanism which relies on four-dimensional chiral gauge theories defined over a spacetime manifold with topology ℛ3 × S 1 and periodic spin structure for the compact dimension. It can be shown that the effective gauge-field action contains a local Chern-Simons-like term which violates Lorentz and CPT invariance. For arbitrary Abelian U(1) gauge fields with trivial holonomies in the compact direction, this anomalous Lorentz and CPT violation has recently been established perturbatively with a Pauli-Villars-type regularization and nonperturbatively with a lattice regularization based on Ginsparg-Wilson fermions.

  12. Topics in CP violation

    Science.gov (United States)

    Quinn, H. R.

    1993-02-01

    Given the varied backgrounds of the members of this audience this talk will be a grab bag of topics related to the general theme of CP Violation. I do not have time to dwell in detail on any of them. First, for the astronomers and astrophysicists among you, I want to begin by reviewing the experimental status of evidence for CP violation in particle processes. There is only one system where this has been observed, and that is in the decays of neutral K mesons.

  13. Topics in CP violation

    International Nuclear Information System (INIS)

    Quinn, H.R.

    1993-02-01

    Given the varied backgrounds of the members of this audience this talk will be a grab bag of topics related to the general theme of CP Violation. I do not have time to dwell in detail on any of them. First, for the astronomers and astrophysicists among you, I want to begin by reviewing the experimental status of evidence for CP violation in particle processes. There is only one system where this has been observed, and that is in the decays of neutral K mesons

  14. Testing non-standard CP violation in neutrino propagation

    International Nuclear Information System (INIS)

    Winter, Walter

    2009-01-01

    Non-standard physics which can be described by effective four fermion interactions may be an additional source of CP violation in the neutrino propagation. We discuss the detectability of such a CP violation at a neutrino factory. We assume the current baseline setup of the international design study of a neutrino factory (IDS-NF) for the simulation. We find that the CP violation from certain non-standard interactions is, in principle, detectable significantly below their current bounds - even if there is no CP violation in the standard oscillation framework. Therefore, a new physics effect might be mis-interpreted as the canonical Dirac CP violation, and a possibly even more exciting effect might be missed

  15. Parity violation in neutron induced reactions

    International Nuclear Information System (INIS)

    Gudkov, V.P.

    1991-06-01

    The theory of parity violation in neutron induced reactions is discussed. Special attention is paid to the energy dependence and enhancement factors for the various types of nuclear reactions and the information which might be obtained from P-violating effects in nuclei. (author)

  16. New bounds on isotropic Lorentz violation

    International Nuclear Information System (INIS)

    Carone, Christopher D.; Sher, Marc; Vanderhaeghen, Marc

    2006-01-01

    Violations of Lorentz invariance that appear via operators of dimension four or less are completely parametrized in the Standard Model Extension (SME). In the pure photonic sector of the SME, there are 19 dimensionless, Lorentz-violating parameters. Eighteen of these have experimental upper bounds ranging between 10 -11 and 10 -32 ; the remaining parameter, k-tilde tr , is isotropic and has a much weaker bound of order 10 -4 . In this Brief Report, we point out that k-tilde tr gives a significant contribution to the anomalous magnetic moment of the electron and find a new upper bound of order 10 -8 . With reasonable assumptions, we further show that this bound may be improved to 10 -14 by considering the renormalization of other Lorentz-violating parameters that are more tightly constrained. Using similar renormalization arguments, we also estimate bounds on Lorentz-violating parameters in the pure gluonic sector of QCD

  17. Search for violations of quantum mechanics

    International Nuclear Information System (INIS)

    Ellis, J.; Hagelin, J.S.; Nanopoulos, D.V.; Srednicki, M.

    1984-01-01

    The treatment of quantum effects in gravitational fields indicates that pure states may evolve into mixed states, and Hawking has proposed modification of the axioms of field theory which incorporate the corresponding violation of quantum mechanics. In this paper we propose a modified hamiltonian equation of motion for density matrices and use it to interpret upper bounds on the violation of quantum mechanics in different phenomenological situations. We apply our formalism to the K 0 -anti K 0 system and to long baseline neutron interferometry experiments. In both cases we find upper bounds of about 2x10 -21 GeV on contributions to the single particle 'hamiltonian' which violate quantum mechanical coherence. We discuss how these limits might be improved in the future, and consider the relative significance of other successful tests of quantum mechanics. An appendix contains model estimates of the magnitude of effects violating quantum mechanics. (orig.)

  18. Documents pertaining to safety control of nuclear facilities

    International Nuclear Information System (INIS)

    1998-01-01

    The Finnish Radiation and Nuclear Safety Authority (STUK) controls the safety of nuclear facilities in Finland. This control encompasses on one hand the evaluation of plant safety on the basis of plans and analyses pertaining to the plant and on the other hand the inspection of plant structures, systems and components as well as of operational activity. STUK also monitors plants operational experience feedback and technical developments in the field, as well as the development of safety research and takes the necessary measures on their basis. Guide YVL 1.1 describes how STUK controls the design, construction and operation of nuclear power plants. The documents to be submitted to STUK are described in the nuclear energy legislation and YVL guides. This guide presents the mode of delivery, quality, contents and number of documents to be submitted to STUK

  19. VIOLATION OF CONVERSATION MAXIM ON TV ADVERTISEMENTS

    Directory of Open Access Journals (Sweden)

    Desak Putu Eka Pratiwi

    2015-07-01

    Full Text Available Maxim is a principle that must be obeyed by all participants textually and interpersonally in order to have a smooth communication process. Conversation maxim is divided into four namely maxim of quality, maxim of quantity, maxim of relevance, and maxim of manner of speaking. Violation of the maxim may occur in a conversation in which the information the speaker has is not delivered well to his speaking partner. Violation of the maxim in a conversation will result in an awkward impression. The example of violation is the given information that is redundant, untrue, irrelevant, or convoluted. Advertisers often deliberately violate the maxim to create unique and controversial advertisements. This study aims to examine the violation of maxims in conversations of TV ads. The source of data in this research is food advertisements aired on TV media. Documentation and observation methods are applied to obtain qualitative data. The theory used in this study is a maxim theory proposed by Grice (1975. The results of the data analysis are presented with informal method. The results of this study show an interesting fact that the violation of maxim in a conversation found in the advertisement exactly makes the advertisements very attractive and have a high value.

  20. 78 FR 55257 - Patient Safety and Quality Improvement: Civil Money Penalty Inflation Adjustment

    Science.gov (United States)

    2013-09-10

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Patient Safety and Quality Improvement: Civil Money... Civil Rights has determined that an adjustment to the maximum civil money penalty amount for violations... confidentiality and privilege protections of Patient Safety Work Product (PSWP), and procedures for enforcement...

  1. $CP$ violation in the B system at LHCb

    CERN Document Server

    AUTHOR|(CDS)2067431

    2014-01-01

    A selection of recent LHCb results on $CP$ violation in the $B$ system is presented. These include direct $CP$ violation measurements in $B^0 \\to \\phi K^*(892)^0$, $B_{(s)}^0 \\to K^\\pm\\pi^\\pm$, $B^\\pm \\to K^\\pm \\pi^+\\pi^-$, $B^\\pm \\to K^\\pm K^+K^-$ and $B^\\pm \\to \\phi K^\\pm$ decays; time-dependent $CP$ violation measurements in $B_s^0 \\to K^+K^-$ and $B^0 \\to \\pi^+\\pi^-$ decays; determination of the flavour-specific $CP$-violating asymmetry $a_{sl}^s$ in $B_s^0$ decays; and study of the mixing-induced $CP$ violation in $B_s^0 \\to J/\\psi K^+K^-$ and $B_s^0 \\to J/\\psi \\pi^+\\pi^-$ decays.

  2. Chirality and gravitational parity violation.

    Science.gov (United States)

    Bargueño, Pedro

    2015-06-01

    In this review, parity-violating gravitational potentials are presented as possible sources of both true and false chirality. In particular, whereas phenomenological long-range spin-dependent gravitational potentials contain both truly and falsely chiral terms, it is shown that there are models that extend general relativity including also coupling of fermionic degrees of freedom to gravity in the presence of torsion, which give place to short-range truly chiral interactions similar to that usually considered in molecular physics. Physical mechanisms which give place to gravitational parity violation together with the expected size of the effects and their experimental constraints are discussed. Finally, the possible role of parity-violating gravity in the origin of homochirality and a road map for future research works in quantum chemistry is presented. © 2015 Wiley Periodicals, Inc.

  3. Flavour physics and CP violation

    CERN Document Server

    Nir, Y.

    2015-05-22

    We explain the many reasons for the interest in flavor physics. We describe flavor physics and the related CP violation within the Standard Model, and explain how the B-factories proved that the Kobayashi-Maskawa mechanism dominates the CP violation that is observed in meson decays. We explain the implications of flavor physics for new physics, with emphasis on the “new physics flavor puzzle”, and present the idea of minimal flavor violation as a possible solution. We explain why the values flavor parameters of the Standard Model are puzzling, present the Froggatt-Nielsen mechanism as a possible solution, and describe how measurements of neutrino parameters are interpreted in the context of this puzzle. We show that the recently discovered Higgs-like boson may provide new opportunities for making progress on the various flavor puzzles.

  4. Transport company safety climate - the impact on truck driver behaviour and crash involvement

    OpenAIRE

    Sullman, Mark J. M.; Stephens A. N.; Pajo K.

    2017-01-01

    Objective: The present study investigated the relationships between safety climate and driving behavior and crash involvement. Methods: A total of 339 company-employed truck drivers completed a questionnaire that measured their perceptions of safety climate, crash record, speed choice, and aberrant driving behaviors (errors, lapses, and violations). Results: Although there was no direct relationship between the drivers' perceptions of safety climate and crash involvement, safety clima...

  5. 75 FR 75448 - Revised Proposal for Revisions to the Schedules of Civil Penalties for a Violation of a Federal...

    Science.gov (United States)

    2010-12-03

    ... the Schedules of Civil Penalties for a Violation of a Federal Railroad Safety Law or Federal Railroad... September 21, 2010. The proposal, if adopted, would amend, line by line, FRA's schedules of civil penalties... . SUPPLEMENTARY INFORMATION: FRA's proposal to amend, line by line, FRA's schedules of civil penalties as well as...

  6. Search for CP-violation in the charm sector at LHCb

    International Nuclear Information System (INIS)

    Coombes, M.P.

    2014-01-01

    Results of searches for CP-violation in charm hadrons and measurements of CP-violating and D 0 mixing parameters are presented for LHCb data accumulated during 2010 and 2011. A time-integrated CP-violating asymmetry in two-body D 0 decays constitutes the first evidence of CP violation in the decay of charm hadrons. No CP violation has been found in D + → K - K + π + decays. Concerning mixing and time-dependent CP asymmetries in D 0 decays, results are compatible with the absence of CP-violation

  7. 24 CFR 30.55 - Interstate Land Sales violations.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Interstate Land Sales violations... Sales violations. (a) General. The Assistant Secretary for Housing-Federal Housing Commissioner, or his... materially violates any provision of the Interstate Land Sales Full Disclosure Act (15 U.S.C. 1701 et seq...

  8. Workplace Safety and Health Topics: Industries and Occupations

    Science.gov (United States)

    ... Submit Search The CDC The National Institute for Occupational Safety and Health (NIOSH) Note: Javascript is disabled or is not ... September 6, 2017 Content source: National Institute for Occupational Safety and Health Education and Information Division Email Recommend Tweet YouTube ...

  9. CP violation in K- and B-meson decays

    CERN Multimedia

    2000-01-01

    These lectures will describe CP violation in K- and B-meson decays and will include the following topics:i) Grand view of the field including CKM matrix and the unitarily triangle ii) General aspects of the theoretical framework iii) Fundamentals of particle-antiparticle mixing iv) Fundamentals of CP violation v) Standard analysis of the unitarily triangle vi) The ratio e'/e including most recent developments vii) CP Violation in rare K- decays viii) Violation in B-Decays (asymmetries and other strategies) ix) A brief look beyond the Standard Model

  10. Constrained gauge fields from spontaneous Lorentz violation

    DEFF Research Database (Denmark)

    Chkareuli, J. L.; Froggatt, C. D.; Jejelava, J. G.

    2008-01-01

    Spontaneous Lorentz violation realized through a nonlinear vector field constraint of the type AµAµ=M2 (M is the proposed scale for Lorentz violation) is shown to generate massless vector Goldstone bosons, gauging the starting global internal symmetries in arbitrary relativistically invariant...... theories. The gauge invariance appears in essence as a necessary condition for these bosons not to be superfluously restricted in degrees of freedom, apart from the constraint due to which the true vacuum in a theory is chosen by the Lorentz violation. In the Abelian symmetry case the only possible theory...... couplings when expressed in terms of the pure Goldstone vector modes. However, they do not lead to physical Lorentz violation due to the simultaneously generated gauge invariance. Udgivelsesdato: June 11...

  11. Artificial neural network for violation analysis

    International Nuclear Information System (INIS)

    Zhang, Z.; Polet, P.; Vanderhaegen, F.; Millot, P.

    2004-01-01

    Barrier removal (BR) is a safety-related violation, and it can be analyzed in terms of benefits, costs, and potential deficits. In order to allow designers to integrate BR into the risk analysis during the initial design phase or during re-design work, we propose a connectionist method integrating self-organizing maps (SOM). The basic SOM is an artificial neural network that, on the basis of the information contained in a multi-dimensional space, generates a space of lesser dimensions. Three algorithms--Unsupervised SOM, Supervised SOM, and Hierarchical SOM--have been developed to permit BR classification and prediction in terms of the different criteria. The proposed method can be used, on the one hand, to foresee/predict the possibility level of a new/changed barrier (prospective analysis), and on the other hand, to synthetically regroup/rearrange the BR of a given human-machine system (retrospective analysis). We applied this method to the BR analysis of an experimental railway simulator, and our preliminary results are presented here

  12. 77 FR 46126 - Maritime Advisory Committee for Occupational Safety and Health (MACOSH)

    Science.gov (United States)

    2012-08-02

    ... DEPARTMENT OF LABOR Occupational Safety and Health Administration [Docket No. OSHA-2012-0003] Maritime Advisory Committee for Occupational Safety and Health (MACOSH) AGENCY: Occupational Safety and... Advisory Committee for Occupational Safety and Health. SUMMARY: OSHA invites interested persons to submit...

  13. Data Mining Mining Data: MSHA Enforcement Efforts, Underground Coal Mine Safety, and New Health Implications

    OpenAIRE

    Kniesner, Thomas J.; Leeth, John D.

    2003-01-01

    Studies of industrial safety regulations, OSHA in particular, often find little effect on worker safety. Critics of the regulatory approach argue that safety standards have little to do with industrial injuries, and defenders of the regulatory approach cite infrequent inspections and low penalties for violating safety standards. We use recently assembled data from the Mine Safety and Health Administration (MSHA) concerning underground coal mine production, safety regulatory activities, and wo...

  14. Statistical mechanics and Lorentz violation

    International Nuclear Information System (INIS)

    Colladay, Don; McDonald, Patrick

    2004-01-01

    The theory of statistical mechanics is studied in the presence of Lorentz-violating background fields. The analysis is performed using the Standard-Model Extension (SME) together with a Jaynesian formulation of statistical inference. Conventional laws of thermodynamics are obtained in the presence of a perturbed hamiltonian that contains the Lorentz-violating terms. As an example, properties of the nonrelativistic ideal gas are calculated in detail. To lowest order in Lorentz violation, the scalar thermodynamic variables are only corrected by a rotationally invariant combination of parameters that mimics a (frame dependent) effective mass. Spin-couplings can induce a temperature-independent polarization in the classical gas that is not present in the conventional case. Precision measurements in the residual expectation values of the magnetic moment of Fermi gases in the limit of high temperature may provide interesting limits on these parameters

  15. 14 CFR 1274.936 - Breach of safety or security.

    Science.gov (United States)

    2010-01-01

    ... property equal to or greater than $1 million; or in any “willful” or “repeat” violation cited by the Occupational Safety and Health Administration (OSHA) or by a state agency operating under an OSHA approved plan...

  16. Three questions on Lorentz violation

    Energy Technology Data Exchange (ETDEWEB)

    Iorio, Alfredo [Institute of Particle and Nuclear Physics, Charles University of Prague - V Holesovickach 2, 180 00 Prague 8 (Czech Republic); Department of Physics ' E. R. Caianiello' , University of Salerno and I.N.F.N. Naples, Gruppo Collegato di Salerno - Via Allende, 84081 Baronissi (Italy)

    2007-05-15

    We review the basics of the two most widely used approaches to Lorentz violation - the Standard Model Extension and Noncommutative Field Theory - and discuss in some detail the example of the modified spectrum of the synchrotron radiation. Motivated by touching upon such a fundamental issue as Lorentz symmetry, we ask three questions: What is behind the search for Lorentz violation? Is String Theory a physical theory? Is there an alternative to Supersymmetry?.

  17. Quark flavour conserving violations of the lepton number

    CERN Document Server

    Binétruy, Pierre; Lavignac, Stephane; Savoy, C A

    1998-01-01

    We study supersymmetric models of lepton and baryon number violation based on an abelian family gauge group. Due to possible lepton-Higgs mixing, the lepton violating couplings are related to the Yukawa couplings and may be generated by them even if they were absent in the original theory. Such terms may be dominant and are not given by the naive family charge counting rules. This enhancement mechanism can provide an alignment between lepton-number violating terms and Yukawa couplings: as a result they conserve quark flavour. A natural way of suppressing baryon number violation in this class of models is also proposed.

  18. Traffic violations in Guangdong Province of China: speeding and drunk driving.

    Science.gov (United States)

    Zhang, Guangnan; Yau, Kelvin K W; Gong, Xiangpu

    2014-03-01

    The number of speeding- and drunk driving-related injuries in China surged in the years immediately preceding 2004 and then began to decline. However, the percent decrease in the number of speeding and drunk driving incidents (decrease by 22%) is not proportional to the corresponding percent decrease in number of automobile accident-related injuries (decrease by 47%) from the year 2004 to 2010 (Traffic Management Bureau, Ministry of Public Security, Annual Statistical Reports on Road Traffic Accidents). Earlier studies have established traffic violations as one of the major risks threatening road safety. In this study, we examine in greater detail two important types of traffic violation events, speeding and drunk driving, and attempt to identify significant risk factors associated with these types of traffic violations. Risk factors in several different dimensions, including driver, vehicle, road and environmental factors, are considered. We analyze the speeding (N=11,055) and drunk driving (N=10,035) data for the period 2006-2010 in Guangdong Province, China. These data, obtained from the Guangdong Provincial Security Department, are extracted from the Traffic Management Sector-Specific Incident Case Data Report and are the only comprehensive and official source of traffic accident data in China. Significant risk factors associating with speeding and drunk driving are identified. We find that several factors are associated with a significantly higher probability of both speeding and drunk driving, particularly male drivers, private vehicles, the lack of street lighting at night and poor visibility. The impact of other specific and unique risk factors for either speeding or drunk driving, such as hukou, road type/grades, commercial vehicles, compulsory third party insurance and vehicle safety status, also require particular attention. Legislative or regulatory measures targeting different vehicle types and/or driver groups with respect to the various driver

  19. Nuclear safety in Slovak Republic. Safety analysis reports for WWER 440 reactors

    International Nuclear Information System (INIS)

    Rohar, S.

    1999-01-01

    Implementation of nuclear power program is connected to establishment of regulatory body for safe regulation of siting, construction, operation and decommissioning of nuclear installations. Licensing being one of the most important regulatory surveillance activity is based on independent regulatory review and assessment of information on nuclear safety for particular nuclear facility. Documents required to be submitted to the regulatory body by the licensee in Slovakia for the review and assessment usually named Safety Analysis Report (SAR) are presented in detail in this paper. Current status of Safety Analysis Reports for Bohunice V-1, Bohunice V-2 and Mochovce NPP is shown

  20. Exploring inequality violations by classical hidden variables numerically

    International Nuclear Information System (INIS)

    Vongehr, Sascha

    2013-01-01

    There are increasingly suggestions for computer simulations of quantum statistics which try to violate Bell type inequalities via classical, common cause correlations. The Clauser–Horne–Shimony–Holt (CHSH) inequality is very robust. However, we argue that with the Einstein–Podolsky–Rosen setup, the CHSH is inferior to the Bell inequality, although and because the latter must assume anti-correlation of entangled photon singlet states. We simulate how often quantum behavior violates both inequalities, depending on the number of photons. Violating Bell 99% of the time is argued to be an ideal benchmark. We present hidden variables that violate the Bell and CHSH inequalities with 50% probability, and ones which violate Bell 85% of the time when missing 13% anti-correlation. We discuss how to present the quantum correlations to a wide audience and conclude that, when defending against claims of hidden classicality, one should demand numerical simulations and insist on anti-correlation and the full amount of Bell violation. -- Highlights: •The widely assumed superiority of the CHSH fails in the EPR problem. •We simulate Bell type inequalities behavior depending on the number of photons. •The core of Bell’s theorem in the EPR setup is introduced in a simple way understandable to a wide audience. •We present hidden variables that violate both inequalities with 50% probability. •Algorithms have been supplied in form of Mathematica programs

  1. Cosmological CP Violation

    CERN Document Server

    Tomaschitz, R

    1994-01-01

    Spinor fields are studied in infinite, topologically multiply connected Robertson-Walker cosmologies. Unitary spinor representations for the discrete covering groups of the spacelike slices are constructed. The spectral resolution of Dirac's equation is given in terms of horospherical elementary waves, on which the treatment of spin and energy is based in these cosmologies. The meaning of the energy and the particle-antiparticle concept is explained in the context of this varying cosmic background. Discrete symmetries, in particular inversions of the multiply connected spacelike slices, are studied. The violation of the unitarity of the parity operator, due to self-interference of P-reflected wave packets, is discussed. The violation of the CP and CPT invariance - already on the level of the free Dirac equation on this cosmological background - is pointed out.

  2. 45 CFR 1640.4 - Violation of agreement.

    Science.gov (United States)

    2010-10-01

    ... OF FEDERAL LAW TO LSC RECIPIENTS § 1640.4 Violation of agreement. (a) A violation of the agreement... negligence allowed the employee or board member to engage in the activities which led to the conviction or...

  3. Experimental violation of entropic inequalities

    International Nuclear Information System (INIS)

    Bovino, F.A.; Castagnoli, G.; Ekert, A.; Horodecki, P.; Alves, C.M.; Sergienko, A.V.

    2005-01-01

    Full text: We report the experimental evidence that polarization entangled photons violate the inequality based on Renyi entropy. Our experimental method is based on four-photon coincidences in photon bunching and antibunching effects. We introduce an additional 'phase marking' technique, which allow observing the violation of the inequalities even with non-deterministic sources of entangled photons. Our method can be applied to measure selected non-linear properties of bipartite quantum states, such as purity or entanglement. (author)

  4. Does the relativity principle violate?

    International Nuclear Information System (INIS)

    Barashenkov, V.S.

    1994-01-01

    Theoretical and experimental data about a possible existence in Nature of some preferred reference frame with a violation of the principle of relativity are considered. The Einstein's and Lorentz's points of view are compared. Although some experiments are known which, in opinion of their authors, indicate the relativity principle violation persuasive evidences supporting this conclusion are absent for the present. The proposals of new experiments in this region, particularly with electron spin precession, are discussed. 55 refs., 4 figs

  5. Natural Language Interface for Safety Certification of Safety-Critical Software

    Science.gov (United States)

    Denney, Ewen; Fischer, Bernd

    2011-01-01

    Model-based design and automated code generation are being used increasingly at NASA. The trend is to move beyond simulation and prototyping to actual flight code, particularly in the guidance, navigation, and control domain. However, there are substantial obstacles to more widespread adoption of code generators in such safety-critical domains. Since code generators are typically not qualified, there is no guarantee that their output is correct, and consequently the generated code still needs to be fully tested and certified. The AutoCert generator plug-in supports the certification of automatically generated code by formally verifying that the generated code is free of different safety violations, by constructing an independently verifiable certificate, and by explaining its analysis in a textual form suitable for code reviews.

  6. Aviation Safety Reporting System: Process and Procedures

    Science.gov (United States)

    Connell, Linda J.

    1997-01-01

    The Aviation Safety Reporting System (ASRS) was established in 1976 under an agreement between the Federal Aviation Administration (FAA) and the National Aeronautics and Space Administration (NASA). This cooperative safety program invites pilots, air traffic controllers, flight attendants, maintenance personnel, and others to voluntarily report to NASA any aviation incident or safety hazard. The FAA provides most of the program funding. NASA administers the program, sets its policies in consultation with the FAA and aviation community, and receives the reports submitted to the program. The FAA offers those who use the ASRS program two important reporting guarantees: confidentiality and limited immunity. Reports sent to ASRS are held in strict confidence. More than 350,000 reports have been submitted since the program's beginning without a single reporter's identity being revealed. ASRS removes all personal names and other potentially identifying information before entering reports into its database. This system is a very successful, proof-of-concept for gathering safety data in order to provide timely information about safety issues. The ASRS information is crucial to aviation safety efforts both nationally and internationally. It can be utilized as the first step in safety by providing the direction and content to informed policies, procedures, and research, especially human factors. The ASRS process and procedures will be presented as one model of safety reporting feedback systems.

  7. Experimental violation of multipartite Bell inequalities with trapped ions.

    Science.gov (United States)

    Lanyon, B P; Zwerger, M; Jurcevic, P; Hempel, C; Dür, W; Briegel, H J; Blatt, R; Roos, C F

    2014-03-14

    We report on the experimental violation of multipartite Bell inequalities by entangled states of trapped ions. First, we consider resource states for measurement-based quantum computation of between 3 and 7 ions and show that all strongly violate a Bell-type inequality for graph states, where the criterion for violation is a sufficiently high fidelity. Second, we analyze Greenberger-Horne-Zeilinger states of up to 14 ions generated in a previous experiment using stronger Mermin-Klyshko inequalities, and show that in this case the violation of local realism increases exponentially with system size. These experiments represent a violation of multipartite Bell-type inequalities of deterministically prepared entangled states. In addition, the detection loophole is closed.

  8. Data Mining Mining Data: MSHA Enforcement Efforts, Underground Coal Mine Safety, and New Health Policy Implications

    OpenAIRE

    Thomas J. Kniesner; John D. Leeth

    2003-01-01

    Studies of industrial safety regulations, Occupational Safety and Health Administration (OSHA) in particular, often find little effect on worker safety. Critics of the regulatory approach argue that safety standards have little to do with industrial injuries and defenders of the regulatory approach cite infrequent inspections and low fines for violating safety standards. We use recently assembled data from the Mine Safety and Health Administration (MSHA) concerning underground coal mine produ...

  9. Do community and autonomy moral violations elicit different emotions?

    Science.gov (United States)

    Kollareth, Dolichan; Kikutani, Mariko; Shirai, Mariko; Russell, James A

    2018-06-11

    According to one important set of theories, different domains of immorality are linked to different discrete emotions-panculturally. Violations against the community elicit contempt, whereas violations against an individual elicit anger. To test this theory, American, Indian and Japanese participants (N = 480) indicated contempt and anger reactions (with verbal rating and face selection) to both the types of immorality. To remedy method problems in previous research, community and autonomy violations were created for the same story-frame, by varying the target to be either the community or an individual. Community and autonomy violations did not differ significantly in the emotion elicited: overall, both types of violations elicited more anger than contempt (and more negative emotion of any kind than positive emotion). By verbal rating, Americans and Indians reported more anger than contempt for both types of violation, whereas Japanese reported more contempt than anger for both types. By face selection, the three cultural groups selected anger more than contempt for both types of violation. The results speak against defining distinct domains of morality by their association with distinct emotions. © 2018 International Union of Psychological Science.

  10. CP violation in $b$ hadrons at LHCb

    CERN Document Server

    Hicheur, Adlene

    2017-01-01

    The most recent results on $CP$ violation in b hadrons obtained by the LHCb Collaboration with Run I and years 2015-2016 of Run II are reviewed. The different types of violation are covered by the studies presented in this paper.

  11. LNG Safety Assessment Evaluation Methods

    Energy Technology Data Exchange (ETDEWEB)

    Muna, Alice Baca [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); LaFleur, Angela Christine [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-05-01

    Sandia National Laboratories evaluated published safety assessment methods across a variety of industries including Liquefied Natural Gas (LNG), hydrogen, land and marine transportation, as well as the US Department of Defense (DOD). All the methods were evaluated for their potential applicability for use in the LNG railroad application. After reviewing the documents included in this report, as well as others not included because of repetition, the Department of Energy (DOE) Hydrogen Safety Plan Checklist is most suitable to be adapted to the LNG railroad application. This report was developed to survey industries related to rail transportation for methodologies and tools that can be used by the FRA to review and evaluate safety assessments submitted by the railroad industry as a part of their implementation plans for liquefied or compressed natural gas storage ( on-board or tender) and engine fueling delivery systems. The main sections of this report provide an overview of various methods found during this survey. In most cases, the reference document is quoted directly. The final section provides discussion and a recommendation for the most appropriate methodology that will allow efficient and consistent evaluations to be made. The DOE Hydrogen Safety Plan Checklist was then revised to adapt it as a methodology for the Federal Railroad Administration’s use in evaluating safety plans submitted by the railroad industry.

  12. Modelling Planck-scale Lorentz violation via analogue models

    International Nuclear Information System (INIS)

    Weinfurtner, Silke; Liberati, Stefano; Visser, Matt

    2006-01-01

    Astrophysical tests of Planck-suppressed Lorentz violations had been extensively studied in recent years and very stringent constraints have been obtained within the framework of effective field theory. There are however still some unresolved theoretical issues, in particular regarding the so called 'naturalness problem' - which arises when postulating that Planck suppressed Lorentz violations arise only from operators with mass dimension greater than four in the Lagrangian. In the work presented here we shall try to address this problem by looking at a condensed-matter analogue of the Lorentz violations considered in quantum gravity phenomenology. specifically, we investigate the class of two-component BECs subject to laserinduced transitions between the two components, and we show that this model is an example for Lorentz invariance violation due to ultraviolet physics. We shall show that such a model can be considered to be an explicit example high-energy Lorentz violations where the 'naturalness problem' does not arise

  13. Assessment of criticality safety

    International Nuclear Information System (INIS)

    Lloyd, R.C.; Heaberlin, S.W.; Clayton, E.D.; Carter, R.D.

    1979-01-01

    A study was made of 100 violations of criticality safety specifications reported over a 10-y period in the operations of fuel reprocessing plants. The seriousness of each rule violation was evaluated by assigning it a severity index value. The underlying causes or reasons, for the violations were identified. A criticality event tree was constructed using the parameters, causes, and reasons found in the analysis of the infractions. The event tree provides a means for visualizing the paths to an accidental criticality. Some 65% of the violations were caused by misinterpretation on the part of the operator, being attributed to a lack of clarity in the specification and insufficient training; 33% were attributed to lack of care, whereas only 2% were caused by mechanical failure. A fault tree was constructed by assembling the events that could contribute to an accident. With suitable data on the probabilities of contributing events, the probability of the accident's occurrence can be forecast. Estimated probabilities for criticality were made, based on the limited data available, that in this case indicate a minimum time span of 244 y of plant operation per accident ranging up to approx. 3000 y subject to the various underlying assumptions made. Some general suggestions for improvement are formulated based on the cases studied. Although conclusions for other plants may differ in detail, the general method of analysis and the fault tree logic should prove applicable. 4 figures, 8 tables

  14. Atomic T-violation: A biased history

    International Nuclear Information System (INIS)

    Sandars, P.G.H.

    1991-01-01

    This article reviews the history of atomic T-violation from a personal point of view. Considerable emphasis is put on the early edm work which was much encouraged by the interest shown by Art Rich. The present generation of beautiful experiments is described more briefly. We end with a short introduction to the new topic of T not P violation in atoms

  15. Spontaneous CP violation on the lattice

    CERN Document Server

    Laine, Mikko

    2000-01-01

    At finite temperatures around the electroweak phase transition, the thermodynamics of the MSSM can be described by a three-dimensional two Higgs doublet effective theory. This effective theory has a phase where CP is spontaneously violated. We study spontaneous CP violation with non-perturbative lattice simulations, and analyse whether one could end up in this phase for any physical MSSM parameter values.

  16. Possible violations of the relativity theory

    International Nuclear Information System (INIS)

    Tiomno, J.

    1985-01-01

    A review of previous works of the author and collaborators on possible violations of the Theory of Relativity (SR) is made. It is shown that there is no contradiction of the predictions of the Lorentz Aether Theory, in the form presented in these papers, with existing experiments. Further experiments to detect these violations (or to confirm SR) are indicated. (Author) [pt

  17. A longitudinal study of an intervention to improve road safety climate: climate as an organizational boundary spanner.

    Science.gov (United States)

    Naveh, Eitan; Katz-Navon, Tal

    2015-01-01

    This study presents and tests an intervention to enhance organizational climate and expands existing conceptualization of organizational climate to include its influence on employee behaviors outside the organization's physical boundaries. In addition, by integrating the literatures of climate and work-family interface, the study explored climate spillover and crossover from work to the home domain. Focusing on an applied practical problem within organizations, we investigated the example of road safety climate and employees' and their families' driving, using a longitudinal study design of road safety intervention versus control groups. Results demonstrated that the intervention increased road safety climate and decreased the number of traffic violation tickets and that road safety climate mediated the relationship between the intervention and the number of traffic violation tickets. Road safety climate spilled over to the family domain but did not cross over to influence family members' driving. (c) 2015 APA, all rights reserved.

  18. Lorentz violation and black-hole thermodynamics

    International Nuclear Information System (INIS)

    Betschart, G.; Kant, E.; Klinkhamer, F.R.

    2009-01-01

    We consider nonstandard photons from nonbirefringent modified Maxwell theory and discuss their propagation in a fixed Schwarzschild spacetime background. This particular modification of Maxwell theory is Lorentz-violating and allows for maximal photon velocities differing from the causal speed c of the asymptotic background spacetime. In the limit of geometrical optics, light rays from modified Maxwell theory are found to propagate along null geodesics in an effective metric. We observe that not every Lorentz-violating theory with multiple maximal velocities different from the causal speed c modifies the notion of the event horizon, contrary to naive expectations. This result implies that not every Lorentz-violating theory with multiple maximal velocities necessarily leads to a contradiction with the generalized second law of thermodynamics.

  19. Lepton flavor violation and seesaw symmetries

    Energy Technology Data Exchange (ETDEWEB)

    Aristizabal Sierra, D., E-mail: daristizabal@ulg.ac.be [Universite de Liege, IFPA, Department AGO (Belgium)

    2013-03-15

    When the standard model is extended with right-handed neutrinos the symmetries of the resulting Lagrangian are enlarged with a new global U(1){sub R} Abelian factor. In the context of minimal seesaw models we analyze the implications of a slightly broken U(1){sub R} symmetry on charged lepton flavor violating decays. We find, depending on the R-charge assignments, models where charged lepton flavor violating rates can be within measurable ranges. In particular, we show that in the resulting models due to the structure of the light neutrino mass matrix muon flavor violating decays are entirely determined by neutrino data (up to a normalization factor) and can be sizable in a wide right-handed neutrino mass range.

  20. LHC experimental sensitivity to CP violating gtt couplings

    CERN Document Server

    Sjölin, J

    2003-01-01

    The level of CP violation in pp to tt+X induced by the standard model is known to be below the experimental sensitivity by many orders of magnitude. However, in some effective theories, it is plausible that new CP violating physics could reveal itself as additional non- renormalizable terms in the Lagrangian. Since these should respect the symmetries of the low-energy gauge interaction, violate CP and generate the correct event topology, the set of allowed terms is highly restricted. This analysis gives an estimate of the expected experimental sensitivity to the lowest order effective CP violating gtt interaction term beyond the standard model using simulated data from the ATLAS detector at the LHC. (36 refs).

  1. CP violation and supersymmetry-breaking in superstring models

    International Nuclear Information System (INIS)

    Dent, T.E.

    2000-09-01

    In this thesis I discuss aspects of the phenomenology of heterotic string, theory, using low-energy effective supergravity models. I investigate the origin of CP violation, the implications for low-energy physics of the modular invariance of the theory, supersymmetry-breaking via gaugino condensation in a hidden sector, and the interplay between these topics. I review the theory of CP violation and the problem of CP violation in supersymmetry phenomenology. In a scenario where the origin of CP violation lies in the compactification of the extra dimensions of string theory, I present simple models which include a duality symmetry acting on the compactification modulus and on observable fields. I show how the structure of the theory affects CP-violating observables, and discuss the effect of such a symmetry on low-energy physics in general. I present a detailed investigation of supersymmetry-breaking by gaugino condensation in supergravity, in particular as applied to the stabilisation of string moduli. For hidden sectors with or without matter I calculate corrections to the usual formulae for the scalar potential and soft supersymmetry-breaking terms. I discuss the phenomenological implications of these corrections and show that they may affect the value of the compactification modulus. and consequently the prospects for predictions of CP violation in string models. (author)

  2. Lepton number violation, lepton flavor violation and non zero Θ_1_3 in LRSM

    International Nuclear Information System (INIS)

    Borgohain, Happy; Das, Mrinal Kumar

    2017-01-01

    We have done a phenomenological study of lepton number violation and lepton flavour violation in a generic left-right symmetric model (LRSM) considering broken ϻ-τ symmetry. The leading order TBM mass matrix originates from the type I (II) seesaw mechanism, whereas the perturbations to generate non-zero reactor mixing angle Θ_1_3, originates from the type II (I) seesaw mechanism. We studied the new physics contributions to neutrinoless double beta decay (NDBD) ignoring the left-right gauge boson mixing and the heavy-light neutrino mixing within the framework of left-right symmetric regime by considering the presence of both type I and type II seesaw. We assumed the mass of the gauge bosons and scalars to be around TeV and studied the effects of the new physics contributions on the effective mass and compared with the current experimental limit imposed by GERDA. We further extended our analysis by correlating the lepton flavour violation of the decay process, (ϻ→ 3e) with Θ_1_3. (author)

  3. CP violation in bilinear R-parity violation and its consequences for the early universe

    Energy Technology Data Exchange (ETDEWEB)

    Cheriguene, Asma; Porod, Werner [Wuerzburg Univ. (Germany). Inst. fuer Theoretische Physik und Astrophysik; Liebler, Stefan [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2014-06-15

    Supersymmetric models with bilinear R-parity violation (BRpV) provide a framework for neutrino masses and mixing angles to explain neutrino oscillation data. We consider CP violation within the new physical phases in BRpV and discuss their effect on the generation of neutrino masses and the decays of the lightest supersymmetric particle (LSP), being a light neutralino with mass ∝100 GeV, at next-to-leading order. The decays affect the lepton and via sphaleron transitions the baryon asymmetry in the early universe. For a rather light LSP, asymmetries generated before the electroweak phase transition via e.g. the Affleck-Dine mechanism are reduced up to two orders of magnitude, but are still present. On the other hand, the decays of a light LSP themselves can account for the generation of a lepton and baryon asymmetry, the latter in accordance to the observation in our universe, since the smallness of the BRpV parameters allows for an out-of-equilibrium decay and sufficiently large CP violation is possible consistent with experimental bounds from the non-observation of electric dipole-moments.

  4. Near-Optimal and Explicit Bell Inequality Violations

    NARCIS (Netherlands)

    Buhrman, H.; Regev, O.; Scarpa, G.; de Wolf, R.

    2011-01-01

    Bell inequality violations correspond to behavior of entangled quantum systems that cannot be simulated classically. We give two new two-player games with Bell inequality violations that are stronger, fully explicit, and arguably simpler than earlier work.The first game is based on the Hidden

  5. Definitions of minimal flavour violation for leptons

    International Nuclear Information System (INIS)

    Palorini, F.

    2006-01-01

    Neutrino masses imply the violation of lepton flavour and new physics beyond the Standard Model. However, flavour change has only been observed in oscillations. In analogy with the quark sector, we could deduce the existence of a principle of Minimal Flavour Violation also for Leptons (MFVL). Such an extension is not straightforward, since the mechanisms generating neutrino masses are unknown and many scenarios can be envisaged. Thus, we explore some possible definitions of MFVL and propose a notion that can include many models. We show, furthermore, that flavour violating processes are not necessarily controlled by the PMNS mixing matrix. (author)

  6. arXiv Flavour Physics and CP Violation

    CERN Document Server

    Kamenik, J.F.

    2016-01-01

    These notes represent a summary of three lectures on flavour and CP violation, given at the CERNs European School of High Energy Physics in 2014. They cover flavour physics within the standard model, phenomenology of CP violation in meson mixing and decays, as well as constraints of flavour observableson physics beyond the standard model. In preparing the lectures (and consequently this summary) I drew heavily from several existing excellent and exhaustive sets of lecture notes and reviews on flavour physics and CP violation [1]. The reader is encouraged to consult those as well as the original literature for a more detailed study.

  7. Up sector of minimal flavor violation: top quark properties and direct D meson CP violation

    Energy Technology Data Exchange (ETDEWEB)

    Bai, Yang; Berger, Joshua; Hewett, JoAnne L.; Li, Ye

    2013-07-01

    Minimal Flavor Violation in the up-type quark sector leads to particularly interesting phenomenology due to the interplay of flavor physics in the charm sector and collider physics from flavor changing processes in the top sector. We study the most general operators that can affect top quark properties and D meson decays in this scenario, concentrating on two CP violating operators for detailed studies. The consequences of these effective operators on charm and top flavor changing processes are generically small, but can be enhanced if there exists a light flavor mediator that is a Standard Model gauge singlet scalar and transforms under the flavor symmetry group. This flavor mediator can satisfy the current experimental bounds with a mass as low as tens of GeV and explain observed D-meson direct CP violation. Additionally, the model predicts a non-trivial branching fraction for a top quark decay that would mimic a dijet resonance.

  8. Backlash against gender stereotype-violating preschool children.

    Science.gov (United States)

    Sullivan, Jessica; Moss-Racusin, Corinne; Lopez, Michael; Williams, Katherine

    2018-01-01

    While there is substantial evidence that adults who violate gender stereotypes often face backlash (i.e. social and economic penalties), less is known about the nature of gender stereotypes for young children, and the penalties that children may face for violating them. We conducted three experiments, with over 2000 adults from the US, to better understand the content and consequences of adults' gender stereotypes for young children. In Experiment 1, we tested which characteristics adults (N = 635) believed to be descriptive (i.e. typical), prescriptive (i.e. required), and proscriptive (i.e. forbidden) for preschool-aged boys and girls. Using the characteristics that were rated in Experiment 1, we then constructed vignettes that were either 'masculine' or 'feminine', and manipulated whether the vignettes were said to describe a boy or a girl. Experiment 2 (N = 697) revealed that adults rated stereotype-violating children as less likeable than their stereotype-conforming peers, and that this difference was more robust for boys than girls. Experiment 3 (N = 731) was a direct replication of Experiment 2, and revealed converging evidence of backlash against stereotype-violating children. In sum, our results suggest that even young children encounter backlash from adults for stereotype violations, and that these effects may be strongest for boys.

  9. CP violation in KL → π0e+e-

    International Nuclear Information System (INIS)

    Littenberg, L.S.

    1989-01-01

    It's been appreciated for many years that the decays K L → π 0 ell bar ell are CP violating to lowest order in the Standard Model, and that the component of direct CP violation in these decays is likely to be comparable to that of the CP violation due to state mixing (ε). This is to be contrasted with the case of K 0 → ππ wherein the latter contribution is predicted to be hundreds of times larger than the former. This paper investigates this CP violation further. 19 refs., 2 figs

  10. CP violation in τ → ντ + 3π

    International Nuclear Information System (INIS)

    Tsai, Y.S.

    1998-01-01

    In the Standard Model no CP violation can occur in decay processes involving leptons either as a parent or a daughter because these processes involve one W exchange and thus, even if the CP violating complex coupling exists in these decays, its effect will not show up when the amplitude is squared. The author needs two diagrams to interfere with each other to see the CP violating effects. Here, he discusses ways to find CP violation in the decay of τ ± → ν τ + 3π from unpolarized as well as polarized τ ±

  11. OBSERVABILITY-IN-DEPTH: AN ESSENTIAL COMPLEMENT TO THE DEFENSE-IN-DEPTH SAFETY STRATEGY IN THE NUCLEAR INDUSTRY1

    Directory of Open Access Journals (Sweden)

    FRANCESCA M. FAVARÒ

    2014-12-01

    We examine several “event reports” from the U.S. Nuclear Regulatory Commission database, which illustrate specific instances of violation of the observability-in-depth safety principle and the consequences that followed (e.g., unmonitored releases and loss of containments. We also revisit the Three Mile Island accident in light of the proposed principle, and identify causes and consequences of the lack of observability-in-depth related to this accident sequence. We illustrate both the benefits of adopting the observability-in-depth safety principle and the adverse consequences when this principle is violated or not implemented. This work constitutes a first step in the development of the observability-in-depth safety principle, and we hope this effort invites other researchers and safety professionals to further explore and develop this principle and its implementation.

  12. OSHA safety requirements for hazardous chemicals in the workplace.

    Science.gov (United States)

    Dohms, J

    1992-01-01

    This article outlines the Occupational Safety and Health Administration (OSHA) requirements set forth by the Hazard Communication Standard, which has been in effect for the healthcare industry since 1987. Administrators who have not taken concrete steps to address employee health and safety issues relating to hazardous chemicals are encouraged to do so to avoid the potential of large fines for cited violations. While some states administer their own occupational safety and health programs, they must adopt standards and enforce requirements that are at least as effective as federal requirements.

  13. 'Violation' - does HRA need the concept?

    International Nuclear Information System (INIS)

    Dougherty, Ed

    1995-01-01

    Violations are part of a complex matrix of judgmental behavior. The term violation is an indicator of the possibility of recent judgment errors but more so of latent errors in management and/or design. The effect of investigations in this arena do indicate a need for an extension of the classic slip/mistake taxonomy of human reliability analysis. The note attempts to initiate this extension

  14. CP Violation and B Physics

    International Nuclear Information System (INIS)

    Quinn, Helen R

    2001-01-01

    These lectures provide a basic overview of topics related to the study of CP Violation in B decays. In the first lecture, I review the basics of discrete symmetries in field theories, the quantum mechanics of neutral but flavor-non-trivial mesons, and the classification of three types of CP violation [1]. The actual second lecture which I gave will be separately published as it is my Dirac award lecture and is focused on the separate topic of strong CP Violation. In Lecture 2 here, I cover the Standard Model predictions for neutral B decays, and in particular discuss some channels of interest for CP Violation studies. Lecture 3 reviews the various tools and techniques used to deal with the hadronic physics effects. In Lecture 4, I briefly review the present and planned experiments that can study B decays. I cannot teach all the details of this subject in this short course, so my approach is instead to try to give students a grasp of the relevant concepts and an overview of the available tools. The level of these lectures is introductory. I will provide some references to more detailed treatments and current literature, but this is not a review article so I do not attempt to give complete references to all related literature. By now there are some excellent textbooks that cover this subject in great detail [1]. I refer students to these for more details and for more complete references to the original literature

  15. B physics and CP violation

    International Nuclear Information System (INIS)

    Quinn, H.

    2002-01-01

    These lectures provide a basic overview of topics related to the study of CP Violation in B decays. In the first lecture, I review the basics of discrete symmetries in field theories, the quantum mechanics of neutral but flavor-non-trivial mesons, and the classification of three types of CP violation. The actual second lecture which I gave will be separately published as it is my Dirac award lecture and is focussed on the separate topic of strong CP Violation. In Lecture 2 here, I cover the Standard Model predictions for neutral B decays, and in particular discuss some channels of interest for CP Violation studies. Lecture 3 reviews the various tools and techniques used to deal with the hadronic physics effects. In Lecture 4, I briefly review the present and planned experiments that can study B decays. I cannot teach all the details of this subject in this short course, so my approach is instead to try to give students a grasp of the relevant concepts and an overview of the available tools. The level of these lectures is introductory. I will provide some references to more detailed treatments and current literature, but this is not a review article so I do not attempt to give complete references to all related literature. By now there are some excellent textbooks that cover this subject in great detail. I refer students to these for more details and for more complete references to the original literature. (author)

  16. Implications of maximal Jarlskog invariant and maximal CP violation

    International Nuclear Information System (INIS)

    Rodriguez-Jauregui, E.; Universidad Nacional Autonoma de Mexico

    2001-04-01

    We argue here why CP violating phase Φ in the quark mixing matrix is maximal, that is, Φ=90 . In the Standard Model CP violation is related to the Jarlskog invariant J, which can be obtained from non commuting Hermitian mass matrices. In this article we derive the conditions to have Hermitian mass matrices which give maximal Jarlskog invariant J and maximal CP violating phase Φ. We find that all squared moduli of the quark mixing elements have a singular point when the CP violation phase Φ takes the value Φ=90 . This special feature of the Jarlskog invariant J and the quark mixing matrix is a clear and precise indication that CP violating Phase Φ is maximal in order to let nature treat democratically all of the quark mixing matrix moduli. (orig.)

  17. Lorentz violation, gravitoelectromagnetic field and Bhabha scattering

    Science.gov (United States)

    Santos, A. F.; Khanna, Faqir C.

    2018-01-01

    Lorentz symmetry is a fundamental symmetry in the Standard Model (SM) and in General Relativity (GR). This symmetry holds true for all models at low energies. However, at energies near the Planck scale, it is conjectured that there may be a very small violation of Lorentz symmetry. The Standard Model Extension (SME) is a quantum field theory that includes a systematic description of Lorentz symmetry violations in all sectors of particle physics and gravity. In this paper, SME is considered to study the physical process of Bhabha Scattering in the Gravitoelectromagnetism (GEM) theory. GEM is an important formalism that is valid in a suitable approximation of general relativity. A new nonminimal coupling term that violates Lorentz symmetry is used in this paper. Differential cross-section for gravitational Bhabha scattering is calculated. The Lorentz violation contributions to this GEM scattering cross-section are small and are similar in magnitude to the case of the electromagnetic field.

  18. Constrained Gauge Fields from Spontaneous Lorentz Violation

    CERN Document Server

    Chkareuli, J L; Jejelava, J G; Nielsen, H B

    2008-01-01

    Spontaneous Lorentz violation realized through a nonlinear vector field constraint of the type $A_{\\mu}^{2}=M^{2}$ ($M$ is the proposed scale for Lorentz violation) is shown to generate massless vector Goldstone bosons, gauging the starting global internal symmetries in arbitrary relativistically invariant theories. The gauge invariance appears in essence as a necessary condition for these bosons not to be superfluously restricted in degrees of freedom, apart from the constraint due to which the true vacuum in a theory is chosen by the Lorentz violation. In the Abelian symmetry case the only possible theory proves to be QED with a massless vector Goldstone boson naturally associated with the photon, while the non-Abelian symmetry case results in a conventional Yang-Mills theory. These theories, both Abelian and non-Abelian, look essentially nonlinear and contain particular Lorentz (and $CPT$) violating couplings when expressed in terms of the pure Goldstone vector modes. However, they do not lead to physical ...

  19. A Lorentz-Violating Alternative to Higgs Mechanism?

    CERN Document Server

    Alexandre, Jean

    2011-01-01

    We consider a four-dimensional field-theory model with two massless fermions, coupled to an Abelian vector field without flavour mixing, and to another Abelian vector field with flavour mixing. Both Abelian vectors have a Lorentz-violating kinetic term, introducing a Lorentz-violation mass scale $M$, from which fermions and the flavour-mixing vector get their dynamical masses, whereas the vector coupled without flavour mixing remains massless. When the two coupling constants have similar values in order of magnitude, a mass hierarchy pattern emerges, in which one fermion is very light compared to the other, whilst the vector mass is larger than the mass of the heavy fermion. The work presented here may be considered as a Lorentz-symmetry-Violating alternative to the Higgs mechanism, in the sense that no scalar particle (fundamental or composite) is necessary for the generation of the vector-meson mass. However, the model is not realistic given that, as a result of Lorentz Violation, the maximal (light-cone) s...

  20. Extrinsic CPT violation in neutrino oscillations in matter

    International Nuclear Information System (INIS)

    Jacobson, Magnus; Ohlsson, Tommy

    2004-01-01

    We investigate matter-induced (or extrinsic) CPT violation effects in neutrino oscillations in matter. Especially, we present approximate analytical formulas for the CPT-violating probability differences for three flavor neutrino oscillations in matter with an arbitrary matter density profile. Note that we assume that the CPT invariance theorem holds, which means that the CPT violation effects arise entirely because of the presence of matter. As special cases of matter density profiles, we consider constant and step-function matter density profiles, which are relevant for neutrino oscillation physics in accelerator and reactor long baseline experiments as well as neutrino factories. Finally, the implications of extrinsic CPT violation on neutrino oscillations in matter for several past, present, and future long baseline experiments are estimated

  1. Neutrinos as a probe of CP-violation and leptogenesis

    Indian Academy of Sciences (India)

    Establishing CP-violation in the lepton sector is one of the most challenging future tasks in neutrino physics. The lepton mixing matrix contains one Dirac phase and, if neutrinos are Majorana particles, two additional CP-violating phases. I will review the main theoretical aspects of CP-violation in the lepton sector. Then, I will ...

  2. 77 FR 6411 - Training, Qualification, and Oversight for Safety-Related Railroad Employees

    Science.gov (United States)

    2012-02-07

    ... Oversight for Safety-Related Railroad Employees AGENCY: Federal Railroad Administration (FRA), Department of... establishing minimum training standards for each category and subcategory of safety-related railroad employee... or contractor that employs one or more safety-related railroad employee to develop and submit a...

  3. Predicting crash-relevant violations at stop sign-controlled intersections for the development of an intersection driver assistance system.

    Science.gov (United States)

    Scanlon, John M; Sherony, Rini; Gabler, Hampton C

    2016-09-01

    Intersection crashes resulted in over 5,000 fatalities in the United States in 2014. Intersection Advanced Driver Assistance Systems (I-ADAS) are active safety systems that seek to help drivers safely traverse intersections. I-ADAS uses onboard sensors to detect oncoming vehicles and, in the event of an imminent crash, can either alert the driver or take autonomous evasive action. The objective of this study was to develop and evaluate a predictive model for detecting whether a stop sign violation was imminent. Passenger vehicle intersection approaches were extracted from a data set of typical driver behavior (100-Car Naturalistic Driving Study) and violations (event data recorders downloaded from real-world crashes) and were assigned weighting factors based on real-world frequency. A k-fold cross-validation procedure was then used to develop and evaluate 3 hypothetical stop sign warning algorithms (i.e., early, intermediate, and delayed) for detecting an impending violation during the intersection approach. Violation detection models were developed using logistic regression models that evaluate likelihood of a violation at various locations along the intersection approach. Two potential indicators of driver intent to stop-that is, required deceleration parameter (RDP) and brake application-were used to develop the predictive models. The earliest violation detection opportunity was then evaluated for each detection algorithm in order to (1) evaluate the violation detection accuracy and (2) compare braking demand versus maximum braking capabilities. A total of 38 violating and 658 nonviolating approaches were used in the analysis. All 3 algorithms were able to detect a violation at some point during the intersection approach. The early detection algorithm, as designed, was able to detect violations earlier than all other algorithms during the intersection approach but gave false alarms for 22.3% of approaches. In contrast, the delayed detection algorithm sacrificed

  4. From symmetry violation to dynamics: The charm window

    International Nuclear Information System (INIS)

    Appel, J.A.

    1997-12-01

    C.S. Wu observed parity violation in the low energy process of nuclear decay. She was the first to observe this symmetry violation at any energy. Yet, her work taught us about the form and strengths of the couplings of the massive weak boson. Today, we use the same approach. We look for very much higher mass-scale interactions through symmetry violations in the decays of charm quark systems. These charm decays provide a unique window to new physics

  5. Lorentz Violation, Möller Scattering, and Finite Temperature

    Directory of Open Access Journals (Sweden)

    Alesandro F. Santos

    2018-01-01

    Full Text Available Lorentz and CPT symmetries may be violated in new physics that emerges at very high energy scale, that is, at the Planck scale. The differential cross section of the Möller scattering due to Lorentz violation at finite temperature is calculated. Lorentz-violating effects emerge from an interaction vertex due to a CPT-odd nonminimal coupling in the covariant derivative. The finite temperature effects are determined using the Thermo Field Dynamics (TFD formalism.

  6. 75 FR 4136 - Pipeline Safety: Request To Modify Special Permit

    Science.gov (United States)

    2010-01-26

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2009-0377] Pipeline Safety: Request To Modify Special Permit AGENCY: Pipeline and Hazardous... coating on its gas pipeline. DATES: Submit any comments regarding this special permit modification request...

  7. Parity violation in two-nucleon systems

    Energy Technology Data Exchange (ETDEWEB)

    Liu, C.-P., E-mail: cpliu@mail.ndhu.edu.tw [National Dong Hwa University, Department of Physics (China)

    2013-03-15

    Nuclear few-body systems become attractive avenues for the study of low-energy parity violation because experiments start to meet the precision requirements and theoretical calculations can be performed reliably. In this talk, an attempt of parametrizing low-energy parity-violating observables by the Danilov parameters will be introduced. Analyses of two-nucleon observables, based on the modern phenomenological potentials or the one of effective field theory, will be discussed.

  8. A model for the origin and mechanisms of CP violation

    International Nuclear Information System (INIS)

    Wu, Y.

    1995-01-01

    In this talk I will show that the two-Higgs doublet model with vacuum CP violation and approximate global U(1) family symmetries may provide one of the simplest and attractive models for understanding the origin and mechanisms of CP violation. It is shown that the mechanism of spontaneous symmetry breaking provides not only a mechanism for generating masses of the bosons and fermions, but also a mechanism for creating CP-phases of the bosons and fermions, so that CP violation occurs, after spontaneous symmetry breaking, in all possible ways from a single CP phase of the vacuum and is generally classified into four types of CP-violating mechanism. A new type of CP-violating mechanism in the charged Higgs boson interactions of the fermions is emphasized and can provide a consistent description for both established and reported CP-, P-, and T-violating phenomena. Of particular importance is the new source of CP violation for charged Higgs boson interactions that lead to the value of ε'/ε as large as 10 -3 independent of the CKM phase. copyright 1995 American Institute of Physics

  9. Search for CP violation in baryon decays at LHCb

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The phenomenon of CP violation has been observed in the K- and B-meson systems, but not yet with any baryonic particle. We report on searches for CP violation in baryon decays at LHCb using Run I data. We find evidence for CP violation in Lambda0b -> p pi- pi+ pi- decays with a statistical significance corresponding to 3.3 standard deviations, including systematic uncertainties. This represents the first evidence of CP violation in the baryon sector. An overview of other recent results of baryon decays will be presented, along with some highlights of the charmless B-decay programme.

  10. Probing CPT violation in neutrino oscillation: A three flavor analysis

    International Nuclear Information System (INIS)

    Samanta, Abhijit

    2010-01-01

    We have studied CPT violation in neutrino oscillation considering three flavor framework with matter effect. We have constructed a new way to find the oscillation probability incorporating CPT violating terms without any approximation. Then CPT violation with atmospheric neutrinos for a magnetized iron calorimeter detector considering the muons (directly measurable with high resolution) of the charge current events has been studied for zero and nonzero θ 13 values. It is found that a potential bound of δb 32 ≤6x10 -24 GeV at 99% CL can be obtained with 1 Mton.year exposure of this detector; and unlike neutrino beam experiments, there is no possibility to generate 'fake' CPT violation due to matter effect with atmospheric neutrinos. The advantages of atmospheric neutrinos to discriminate CPT violation from CP violation and nonstandard interactions are also discussed.

  11. Lorentz violation, gravitoelectromagnetism and Bhabha scattering at finite temperature

    Science.gov (United States)

    Santos, A. F.; Khanna, Faqir C.

    2018-04-01

    Gravitoelectromagnetism (GEM) is an approach for the gravitation field that is described using the formulation and terminology similar to that of electromagnetism. The Lorentz violation is considered in the formulation of GEM that is covariant in its form. In practice, such a small violation of the Lorentz symmetry may be expected in a unified theory at very high energy. In this paper, a non-minimal coupling term, which exhibits Lorentz violation, is added as a new term in the covariant form. The differential cross-section for Bhabha scattering in the GEM framework at finite temperature is calculated that includes Lorentz violation. The Thermo Field Dynamics (TFD) formalism is used to calculate the total differential cross-section at finite temperature. The contribution due to Lorentz violation is isolated from the total cross-section. It is found to be small in magnitude.

  12. The natural lifespan of a safety policy: violations and system migration in anaesthesia.

    Science.gov (United States)

    de Saint Maurice, Guillaume; Auroy, Yves; Vincent, Charles; Amalberti, René

    2010-08-01

    Safety rules continue growing rapidly, as if constraining human behaviour was the unique avenue for reaching ultimate safety. Safety rules are essential for a safe system, but their multiplication can have counterproductive effects. To monitor, in an anaesthesia ward, compliance with a process-oriented safety rule, and understand barriers and facilitators which help and hinder physicians from following guidelines. The rule stipulated that the day before surgery anaesthetists had to record in the patient's file the drugs to be used for the anaesthesia (induction, maintenance, airway control). Compliance was assessed before introduction of the rule, immediately after, at 6 months and at 12 months. All medical staff were blinded to the protocol. 717 patient records were included. The results showed an initial compliance with policy, reaching 86% for some items (never 100%). Reduction began within 6 months and returned almost to initial levels within a year. One individual showed poor compliance throughout the study but even initially compliant doctors experienced a reduction. Compliance was higher for complex surgery but lower for unscheduled surgery and when job pressure was greater. Compliance eroded over time. A major trigger of erosion seemed to be lack of continued compliance by a senior member of staff. Rules and procedures constitute fragile safety barriers, and it may be better to forego introducing a new safety rule if it is not considered as a priority by staff and is therefore vulnerable to sacrifice in case of conflict with competitive demands.

  13. Parity violation in electron scattering; Violation de parite en diffusion d'electrons

    Energy Technology Data Exchange (ETDEWEB)

    Lhuillier, D

    2007-09-15

    The elaboration of the electroweak standard model from the discovery of parity violation to the weak neutral current is described in the first chapter. In the second chapter the author discusses the 2 experimental approaches of the parity violation experiments. In the first approach the weak neutral current can be assumed to be well known and can be used as a probe for the hadronic matter. The second approach consists in measuring the weak neutral current between 2 particles with known internal structure in order to test the predictions of the standard model in the low energy range. The chapters 3 and 4 are an illustration of the first approach through the HAPPEx series of experiments that took place in the Jefferson Laboratory from 1998 to 2005. The HAPPEx experiments aimed at measuring the contribution of strange quarks in the electromagnetic form factors of the nucleon through the violation of parity in the elastic scattering at forward angles. The last chapter is dedicated to the E158 experiment that was performed at the Slac (California) between 2000 and 2003. The weak neutral current was measured between 2 electrons and the high accuracy obtained allowed the physics beyond the standard model to be indirectly constraint up to a few TeV. (A.C.)

  14. Lepton number violation searches at the LHC

    CERN Document Server

    Salvucci, Antonio; The ATLAS collaboration

    2017-01-01

    Lepton number is conserved in the Standard Model, therefore, any evidence for its violation would indicate the existence of new physics. This talk presents a review of the latest searches performed at the LHC concerning Lepton Number Violation (LNV) processes in the context of Left-Right Symmetric theory and Seesaw mechanism.

  15. CP violation experiment at Fermilab

    International Nuclear Information System (INIS)

    Hsiung, Yee B.

    1990-07-01

    The E731 experiment at Fermilab has searched for ''direct'' CP violation in K 0 → ππ, which is parametrized by var-epsilon '/var-epsilon. For the first time, in 20% of the data set, all four modes of the K L,S → π + π - (π 0 π 0 ) were collected simultaneously, providing a great check on the systematic uncertainty. The result is Re(var-epsilon '/var-epsilon) = -0.0004 ± 0.0014 (stat) ± 0.0006(syst), which provides no evidence for ''direct'' CP violation. The CPT symmetry has also been tested by measuring the phase difference Δφ = φ 00 - φ ± between the two CP violating parameters η 00 and η ± . We fine Δφ = -0.3 degrees ± 2.4 degree(stat) ± 1.2 degree(syst). Using this together with the world average φ ± , we fine that the phase of the K 0 -bar K 0 mixing parameter var-epsilon is 44.5 degree ± 1.5 degree. Both of these results agree well with the predictions of CPT symmetry. 17 refs., 10 figs

  16. Cooperation of technical support organizations of state nuclear regulatory committee of Ukraine in sip safety regulation

    International Nuclear Information System (INIS)

    Bikov, V.O.; Kyilochits'ka, T.P.; Bogorins'kij, P.; Vasil'chenko, V.M.; Kondrat'jev, S.M.; Smishlyajeva, S.P.; Troter, D.

    2002-01-01

    The main task of the technical support in the Shelter Implementation Plan (SIP) licensing process consists in Technical Evaluation of SIP projects and documents submitted by the Licensee to State Nuclear Regulatory Committee to substantiate the safety of Shelter-related work. The goal of this task is to evaluate the submitted materials whether they meet the requirements of nuclear and radiation safety

  17. Lorentz violation. Motivation and new constraints

    Energy Technology Data Exchange (ETDEWEB)

    Liberati, S. [Scuola Internazionale Superiore di Studi Avanzati SISSA, Trieste (Italy); Istituto Nazionale di Fisica Nucleare INFN, Sezione di Trieste (Italy); Maccione, L. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    We review the main theoretical motivations and observational constraints on Planck scale sup-pressed violations of Lorentz invariance. After introducing the problems related to the phenomenological study of quantum gravitational effects, we discuss the main theoretical frameworks within which possible departures from Lorentz invariance can be described. In particular, we focus on the framework of Effective Field Theory, describing several possible ways of including Lorentz violation therein and discussing their theoretical viability. We review the main low energy effects that are expected in this framework. We discuss the current observational constraints on such a framework, focusing on those achievable through high-energy astrophysics observations. In this context we present a summary of the most recent and strongest constraints on QED with Lorentz violating non-renormalizable operators. Finally, we discuss the present status of the field and its future perspectives. (orig.)

  18. Lorentz violation. Motivation and new constraints

    International Nuclear Information System (INIS)

    Liberati, S.; Maccione, L.

    2009-09-01

    We review the main theoretical motivations and observational constraints on Planck scale sup-pressed violations of Lorentz invariance. After introducing the problems related to the phenomenological study of quantum gravitational effects, we discuss the main theoretical frameworks within which possible departures from Lorentz invariance can be described. In particular, we focus on the framework of Effective Field Theory, describing several possible ways of including Lorentz violation therein and discussing their theoretical viability. We review the main low energy effects that are expected in this framework. We discuss the current observational constraints on such a framework, focusing on those achievable through high-energy astrophysics observations. In this context we present a summary of the most recent and strongest constraints on QED with Lorentz violating non-renormalizable operators. Finally, we discuss the present status of the field and its future perspectives. (orig.)

  19. 32 CFR 935.51 - Motor vehicle violations.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Motor vehicle violations. 935.51 Section 935.51... REGULATIONS WAKE ISLAND CODE Penalties § 935.51 Motor vehicle violations. Whoever is found guilty of a... than 30 days, or suspension or revocation of his motor vehicle operator's permit, or any combination or...

  20. Proceedings of the twenty-fifth annual institute on mining health, safety and research

    Energy Technology Data Exchange (ETDEWEB)

    Tinney, G.R.; Bacho, A.; Karmis, M. [eds.

    1994-12-31

    The keynote session included papers on the US Bureau of Mines - a vision for the future; clean, green and lean; and the psychology of occupational safety. The technical sessions include panel discussions on Virginia`s revised mine safety regulations, and on independent contractors. Other papers covered: criminal enforcement of regulatory violations; accidents during surface mine mobile equipment; Federal Mine Safety and Health Review Commission; safety, technological and productivity potentials of highwall mining; and accidents caused by falls of unsupported roof.

  1. Hotel and Motel Fire Safety Project - USFA

    Data.gov (United States)

    Department of Homeland Security — Provides a listing of properties compliant with the requirements of the Hotel and Motel Fire Safety Act of 1990. Users may search for compliant properties and submit...

  2. Framing Effects as Violations of Extensionality

    OpenAIRE

    Bourgeois-Gironde , Sacha; Giraud , Raphaël

    2009-01-01

    Framing effects occur when different descriptions of the same decision problem give rise to divergent decisions. They can be seen as a violation of the decisiontheoretic version of the principle of extensionality (PE). The PE in logic means that two logically equivalent sentences can be substituted salva veritate. We explore what this notion of extensionality becomes in decision contexts. Violations of extensionality may have rational grounds. Based on some ideas proposed by the psychologist ...

  3. 78 FR 65661 - Agency Information Collection Activities; Proposed Collection; Comment Request; Food Safety Survey

    Science.gov (United States)

    2013-11-01

    ... are used to measure trends in consumer food safety habits including hand and cutting board washing... notice invites comments on a voluntary consumer survey entitled, ``Food Safety Survey.'' DATES: Submit... the safety of the nation's food supply. The Food Safety Survey measures consumers' knowledge...

  4. 50 CFR 20.72 - Violation of State law.

    Science.gov (United States)

    2010-10-01

    ... export any migratory bird, or any part, nest, or egg of any such bird, in violation of any applicable law... WILDLIFE AND PLANTS (CONTINUED) MIGRATORY BIRD HUNTING Federal, State, and Foreign Law § 20.72 Violation of...

  5. 50 CFR 20.71 - Violation of Federal law.

    Science.gov (United States)

    2010-10-01

    ... export any migratory bird, or any part, nest, or egg of any such bird, in violation of any act of... WILDLIFE AND PLANTS (CONTINUED) MIGRATORY BIRD HUNTING Federal, State, and Foreign Law § 20.71 Violation of...

  6. Subtleties in the BABAR measurement of time-reversal violation

    International Nuclear Information System (INIS)

    Efrati, Aielet

    2015-01-01

    A first measurement of time-reversal (T) asymmetries that are not also CP asymmetries has been recently achieved by the B A B AR collaboration. In this talk, which follows the work done in Ref. [1], I discuss the subtleties of this measurement in the presence of direct CP violation, CPT violation, wrong strangeness decays and wrong sign semi-leptonic decays. In particular, I explain why, in order to identify the measured asymmetries with time-reversal violation, one needs to assume (i) the absence of wrong strangeness decays or of CPT violation in strangeness changing decays, and (ii) the absence of wrong sign decays. (paper)

  7. Supersymmetry violation in elementary particle-monopole scattering

    International Nuclear Information System (INIS)

    Casher, A.; Shamir, Y.

    1991-10-01

    We show that the scattering of elementary particles on solitons (monopoles, fluxons, etc.) in supersymmetric gauge theories violates the relations dictated by supersymmetry at tree level. The violation arises because of the discrepancy between the spectra of bosonic and fermionic fluctuations and because of the fermionic nature of the supersymmetry generators. (author). 14 refs

  8. Weak NNM couplings and nuclear parity violation

    International Nuclear Information System (INIS)

    Holstein, B.R.

    1987-01-01

    After many years of careful theoretical and experimental study of nuclear parity violation, rough empirical values for weak parity violation nucleon-nucleon-meson vertices have been deduced. We address some of the physics which has been learned from this effort and show that it has implications for work going on outside this field. (author)

  9. 76 FR 64110 - Safety and Health Management Programs for Mines

    Science.gov (United States)

    2011-10-17

    ... section of this notice. Comment Dates: MSHA will hold the date for comments open until all meetings are... Identification, including workplace inspections for violations of mandatory health and safety standards. Hazard.... Improved communication. Increased productivity. Increased and improved worker and management involvement in...

  10. Pittsburgh PLI Violations Report

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — Report containing Department of Permits, Licenses, and Inspections violation notices that have been issued by the City after October 15, 2015

  11. Violation of Bell's Inequality Using Continuous Variable Measurements

    Science.gov (United States)

    Thearle, Oliver; Janousek, Jiri; Armstrong, Seiji; Hosseini, Sara; Schünemann Mraz, Melanie; Assad, Syed; Symul, Thomas; James, Matthew R.; Huntington, Elanor; Ralph, Timothy C.; Lam, Ping Koy

    2018-01-01

    A Bell inequality is a fundamental test to rule out local hidden variable model descriptions of correlations between two physically separated systems. There have been a number of experiments in which a Bell inequality has been violated using discrete-variable systems. We demonstrate a violation of Bell's inequality using continuous variable quadrature measurements. By creating a four-mode entangled state with homodyne detection, we recorded a clear violation with a Bell value of B =2.31 ±0.02 . This opens new possibilities for using continuous variable states for device independent quantum protocols.

  12. Two-Higgs-doublet models with Minimal Flavour Violation

    International Nuclear Information System (INIS)

    Carlucci, Maria Valentina

    2010-01-01

    The tree-level flavour-changing neutral currents in the two-Higgs-doublet models can be suppressed by protecting the breaking of either flavour or flavour-blind symmetries, but only the first choice, implemented by the application of the Minimal Flavour Violation hypothesis, is stable under quantum corrections. Moreover, a two-Higgs-doublet model with Minimal Flavour Violation enriched with flavour-blind phases can explain the anomalies recently found in the ΔF = 2 transitions, namely the large CP-violating phase in B s mixing and the tension between ε K and S ψKS .

  13. What If Quantum Theory Violates All Mathematics?

    Directory of Open Access Journals (Sweden)

    Rosinger Elemér Elad

    2017-09-01

    Full Text Available It is shown by using a rather elementary argument in Mathematical Logic that if indeed, quantum theory does violate the famous Bell Inequalities, then quantum theory must inevitably also violate all valid mathematical statements, and in particular, such basic algebraic relations like 0 = 0, 1 = 1, 2 = 2, 3 = 3, … and so on …

  14. Directly detecting isospin-violating dark matter

    OpenAIRE

    Kelso, Chris; Kumar, Jason; Marfatia, Danny; Sandick, Pearl

    2018-01-01

    We consider the prospects for multiple dark matter direct detection experiments to determine if the interactions of a dark matter candidate are isospin-violating. We focus on theoretically well-motivated examples of isospin-violating dark matter (IVDM), including models in which dark matter interactions with nuclei are mediated by a dark photon, a Z, or a squark. We determine that the best prospects for distinguishing IVDM from the isospin-invariant scenario arise in the cases of dark photon–...

  15. Parity violation experiments at intermediate energies

    International Nuclear Information System (INIS)

    Van Oers, W.T.H.

    1996-06-01

    The status of the TRIUMF 221 MeV proton-proton violation experiment is reviewed. Several other proton-proton parity violation experiments in the in the intermediate energy range, currently in various stages of preparation, are discussed. A new experiment at an energy of 5.13 GeV (and if confirmed also at an energy of tens of GeV) is needed to follow on the earlier unexpected large result obtained at 5.13 GeV. (author)

  16. A mechanistic classical laboratory situation violating the Bell inequalities with 2.√2, exactly 'in the same way' as its violations by the EPR experiments

    International Nuclear Information System (INIS)

    Aerts, D.

    1991-01-01

    We present a macroscopical mechanistic classical laboratory situation, and a classical macroscopical entity, and coincidence measurements on this entity, that lead to a violation of the Bell inequalities corresponding to these coincidence measurements. The violation that we obtain with these coincidence measurements is exactly the same as the violation of the Bell inequalities by the well known coincidence measurements of the quantum entity of two spin 1/2 particles in a singlet spin state. With this we mean that it gives rise to the same numerical values for the expectation values and the same numerical value 2.√2 for the expression used in the Bell inequality. We analyze the origin of the violation, and can formulate the main difference between the violation of Bell inequalities by means of classical entities and the violation of Bell inequalities by means of quantum entities. The making clear of this difference can help us to understand better what the quantum-violation could mean for the nature of reality. We think that some classical concepts will have to be changed, and new concepts will have to be introduced, to be able to understand the reality of the quantum world. (orig.)

  17. CP violation outside the standard model phenomenology for pedestrians

    International Nuclear Information System (INIS)

    Lipkin, H.J.

    1993-01-01

    So far the only experimental evidence for CP violation is the 1964 discovery of K L →2π where the two mass eigenstates produced by neutral meson mixing both decay into the same CP eigenstate. This result is described by two parameters ε and ε'. Today ε ∼ its 1964 value, ε' data are still inconclusive and there is no new evidence for CP violation. One might expect to observe similar phenomena in other systems and also direct CP violation as charge asymmetries between decays of charge conjugate hadrons H ± → f ± . Why is it so hard to find CP violation? How can B Physics help? Does CP lead beyond the standard model? The author presents a pedestrian symmetry approach which exhibits the difficulties and future possibilities of these two types of CP-violation experiments, neutral meson mixing and direct charge asymmetry: what may work, what doesn't work and why

  18. Phenomenology of CP violation from the Kobayashi-Maskawa model

    International Nuclear Information System (INIS)

    Wang, L.L.C.

    1980-01-01

    The CP violation consequences of the K-M model, which Kobayashi, Maskawa introduced in 1977 for the purpose of incorporating CP violation via the complexity in the mixing matrix of the quarks are discussed. Much of the talk is a review of current work on the subject. Some new results on the CP violation effects in exclusive and inclusive decays of bottom, charm and strange particles are also given

  19. CP violation in the lepton sector with Majorana neutrinos

    International Nuclear Information System (INIS)

    Aguila, F. del

    1995-01-01

    We study CP violation in the lepton sector in extended models with right-handed neutrinos, without and with left-right symmetry, and with arbitrary mass terms. We find the conditions which must be satisfied by the neutrino and charged lepton mass matrices for CP conservation. These constraints, which are independent of the choice of weak basis, are proven to be also sufficient in simple cases. This invariant formulation makes apparent the necessary requirements for CP violation, as well as the size of CP violating effects. As an example, we show that CP violation can be much larger in left-right symmetric models than in models with only additional right-handed neutrinos, i.e., without right-handed currents. (orig.)

  20. CP violation and B0-(B0)-bar mixing

    International Nuclear Information System (INIS)

    Aleksan, R.

    1996-01-01

    The status of CP violation and B 0 -(B 0 )-bar mixing is given and the subsequent constraints in the framework of the Standard Model are discussed. Recent result on CP violation in the kaon system and related topics are reviewed, including the status of T violation and the tests of the CPT symmetry. The results on B 0 -(B 0 )-bar mixing are presented followed by the studies on B d 0 -(B d 0 )-bar and B s 0 -(B s 0 )-bar oscillations. Finally, the prospects of progress on understanding CP violation are discussed in framework of the new projects expected to produce results at the turn of the century. (author)

  1. Status in CP violation

    International Nuclear Information System (INIS)

    Fayard, L.

    1989-11-01

    Twenty-five years after the discovery of CP violation in the neutral Kaon system, we still dont know exactly the origin and the components of that weak non invariance. The two more precise experiments give slightly different answers concerning the direct way of CP violation NA 31 gives ε prime/ε incompatible with the Superweak Model (for which ε prime=0) and in agreement with Standard Model predictions compatible with both. Again, one needs new and precise results in order to conclude about ε prime. E731 and NA31 are actually working on their new data samples. Longer term ideas are also being discussed, looking for new experiments able to give ε prime/ε with a precision. Concerning CPT invariance the situation seems to be more clear

  2. The use of non-animal alternatives in the safety evaluations of cosmetics ingredients by the Scientific Committee on Consumer Safety (SCCS).

    Science.gov (United States)

    Vinardell, M P

    2015-03-01

    In Europe, the safety evaluation of cosmetics is based on the safety evaluation of each individual ingredient. Article 3 of the Cosmetics Regulation specifies that a cosmetic product made available on the market is to be safe for human health when used normally or under reasonably foreseeable conditions. For substances that cause some concern with respect to human health (e.g., colourants, preservatives, UV-filters), safety is evaluated at the Commission level by a scientific committee, presently called the Scientific Committee on Consumer Safety (SCCS). According to the Cosmetics Regulations, in the EU, the marketing of cosmetics products and their ingredients that have been tested on animals for most of their human health effects, including acute toxicity, is prohibited. Nevertheless, any study dating from before this prohibition took effect is accepted for the safety assessment of cosmetics ingredients. The in vitro methods reported in the dossiers submitted to the SCCS are here evaluated from the published reports issued by the scientific committee of the Directorate General of Health and Consumers (DG SANCO); responsible for the safety of cosmetics ingredients. The number of studies submitted to the SCCS that do not involve animals is still low and in general the safety of cosmetics ingredients is based on in vivo studies performed before the prohibition. Copyright © 2014 Elsevier Inc. All rights reserved.

  3. Local commutativity versus Bell inequality violation for entangled states and versus non-violation for separable states

    International Nuclear Information System (INIS)

    Seevinck, Michael; Uffink, Jos

    2007-01-01

    By introducing a quantitative 'degree of commutativity' in terms of the angle between spin observables we present two tight quantitative trade-off relations in the case of two qubits. First, for entangled states, between the degree of commutativity of local observables and the maximal amount of violation of the Bell inequality: if both local angles increase from zero to π/2 (i.e., the degree of local commutativity decreases), the maximum violation of the Bell inequality increases. Secondly, a converse trade-off relation holds for separable states: if both local angles approach π/2 the maximal value obtainable for the correlations in the Bell inequality decreases and thus the non-violation increases. As expected, the extremes of these relations are found in the case of anticommuting local observables where, respectively, the bounds of 2√(2) and √(2) hold for the expectation value of the Bell operator. The trade-off relations show that noncommmutativity gives ''a more than classical result'' for entangled states, whereas ''a less than classical result'' is obtained for separable states. The experimental relevance of the trade-off relation for separable states is that it provides an experimental test for two qubit entanglement. Its advantages are twofold: in comparison to violations of Bell inequalities it is a stronger criterion and in comparison to entanglement witnesses it needs to make less strong assumptions about the observables implemented in the experiment

  4. 77 FR 42736 - Common Formats for Patient Safety Data Collection and Event Reporting

    Science.gov (United States)

    2012-07-20

    ... safety problems. The Patient Safety Act and Patient Safety Rule establish a framework by which doctors... DEPARTMENT OF HEALTH AND HUMAN SERVICES Agency for Healthcare Research and Quality Common Formats... formats, specified by AHRQ, that allow health care providers to collect and submit standardized...

  5. Review of WHC criticality safety audit findings for 1970-1981

    International Nuclear Information System (INIS)

    Rogers, C.A.; Paglieri, J.N.

    1984-01-01

    At Westinghouse Hanford Company (WHC) all fissionable material handling must meet DOE requirements for safety. This necessitates a program of regular audits by the Safety group to verify compliance with criticality safety limits and controls and to alert facility management to observed discrepancies and potential problems. Audits of fissionable material facilities by Safety are required at least once every 6 months, but in practice are conducted more frequently. This paper summarizes findings from over 400 criticality safety audits conducted by Safety between July 1970 and July 1981 in seven fissionable material facilities to show their types and frequencies of occurrence. All limit violations occurring during this period are summarized, including those found by the operating group. 1 ref., 1 tab

  6. [Evaluation on the effects of education regarding road safety among middle school students].

    Science.gov (United States)

    Jin, Hui-Qing; Li, Ying-Chun; Zhang, Shu-Lin; Yu, Wan-Sheng

    2009-08-01

    To evaluate the intervention effects for road traffic accident prevention among middle school students through understanding their knowledge, attitude and practice (KAP) on road safety. Students in Grade 1 and Grade 2 from 7 junior and senior middle schools in Ji'nan city were selected as intervention group and students from a middle school in Hefei city served as control group. Education was provided to the intervention group and all the middle school students in Ji'nan city. Changes of KAP on road safety were measured for both groups during the follow-up period, and comparison on KAP for the two groups was carried statistically. The mean scores of road safety knowledge for intervention group improved significantly during the follow-up period (from 0.9 - 3.8), while these indices did not change much in the control group (from 0 - 0.2). Negative attitude on road safety was found in both groups, but less in the intervention group. More students started to admit that middle school students themselves should be responsible for most of the RTAs. Per week frequency of violating traffic rules did not improve, however during the follow-up period on both groups as still 75% to 80% of the students violating the traffic rules less than 2 times per week. Although three kinds and one kind of traffic rules violation seemed to have improved in the intervention group and in the control group, there were still two and three other kinds turned worse in the intervention and in the control group, respectively. Program on road safety education significantly improved the relative knowledge for middle school student and it exerted positive effects in road safety attitude to some extent. However, no significant effect was found in the improvement on their behavior. Education on road safety should be carried out in the early stage of childhood with newer and more effective intervention approaches.

  7. Bell violation in the sky

    Science.gov (United States)

    Choudhury, Sayantan; Panda, Sudhakar; Singh, Rajeev

    2017-02-01

    In this work, we have studied the possibility of setting up Bell's inequality violating experiment in the context of cosmology, based on the basic principles of quantum mechanics. First we start with the physical motivation of implementing the Bell inequality violation in the context of cosmology. Then to set up the cosmological Bell violating test experiment we introduce a model independent theoretical framework using which we have studied the creation of new massive particles by implementing the WKB approximation method for the scalar fluctuations in the presence of additional time-dependent mass contribution in the cosmological perturbation theory. Here for completeness we compute the total number density and the energy density of the newly created particles in terms of the Bogoliubov coefficients using the WKB approximation method. Next using the background scalar fluctuation in the presence of a new time-dependent mass contribution, we explicitly compute the expression for the one point and two point correlation functions. Furthermore, using the results for a one point function we introduce a new theoretical cosmological parameter which can be expressed in terms of the other known inflationary observables and can also be treated as a future theoretical probe to break the degeneracy amongst various models of inflation. Additionally, we also fix the scale of inflation in a model-independent way without any prior knowledge of primordial gravitational waves. Also using the input from a newly introduced cosmological parameter, we finally give a theoretical estimate for the tensor-to-scalar ratio in a model-independent way. Next, we also comment on the technicalities of measurements from isospin breaking interactions and the future prospects of newly introduced massive particles in a cosmological Bell violating test experiment. Further, we cite a precise example of this setup applicable in the context of string theory motivated axion monodromy model. Then we comment

  8. Bell violation in the sky

    International Nuclear Information System (INIS)

    Choudhury, Sayantan; Panda, Sudhakar; Singh, Rajeev

    2017-01-01

    In this work, we have studied the possibility of setting up Bell's inequality violating experiment in the context of cosmology, based on the basic principles of quantum mechanics. First we start with the physical motivation of implementing the Bell inequality violation in the context of cosmology. Then to set up the cosmological Bell violating test experiment we introduce a model independent theoretical framework using which we have studied the creation of new massive particles by implementing the WKB approximation method for the scalar fluctuations in the presence of additional time-dependent mass contribution in the cosmological perturbation theory. Here for completeness we compute the total number density and the energy density of the newly created particles in terms of the Bogoliubov coefficients using the WKB approximation method. Next using the background scalar fluctuation in the presence of a new time-dependent mass contribution, we explicitly compute the expression for the one point and two point correlation functions. Furthermore, using the results for a one point function we introduce a new theoretical cosmological parameter which can be expressed in terms of the other known inflationary observables and can also be treated as a future theoretical probe to break the degeneracy amongst various models of inflation. Additionally, we also fix the scale of inflation in a model-independent way without any prior knowledge of primordial gravitational waves. Also using the input from a newly introduced cosmological parameter, we finally give a theoretical estimate for the tensor-to-scalar ratio in a model-independent way. Next, we also comment on the technicalities of measurements from isospin breaking interactions and the future prospects of newly introduced massive particles in a cosmological Bell violating test experiment. Further, we cite a precise example of this setup applicable in the context of string theory motivated axion monodromy model. Then we comment

  9. Bell violation in the sky

    Energy Technology Data Exchange (ETDEWEB)

    Choudhury, Sayantan [Tata Institute of Fundamental Research, Department of Theoretical Physics, Mumbai (India); TIFR, DTP, Mumbai (India); Panda, Sudhakar [Institute of Physics, Bhubaneswar, Odisha (India); Homi Bhabha National Institute, Mumbai (India); Singh, Rajeev [Savitribai Phule Pune University, Department of Physics, Pune (India)

    2017-02-15

    In this work, we have studied the possibility of setting up Bell's inequality violating experiment in the context of cosmology, based on the basic principles of quantum mechanics. First we start with the physical motivation of implementing the Bell inequality violation in the context of cosmology. Then to set up the cosmological Bell violating test experiment we introduce a model independent theoretical framework using which we have studied the creation of new massive particles by implementing the WKB approximation method for the scalar fluctuations in the presence of additional time-dependent mass contribution in the cosmological perturbation theory. Here for completeness we compute the total number density and the energy density of the newly created particles in terms of the Bogoliubov coefficients using the WKB approximation method. Next using the background scalar fluctuation in the presence of a new time-dependent mass contribution, we explicitly compute the expression for the one point and two point correlation functions. Furthermore, using the results for a one point function we introduce a new theoretical cosmological parameter which can be expressed in terms of the other known inflationary observables and can also be treated as a future theoretical probe to break the degeneracy amongst various models of inflation. Additionally, we also fix the scale of inflation in a model-independent way without any prior knowledge of primordial gravitational waves. Also using the input from a newly introduced cosmological parameter, we finally give a theoretical estimate for the tensor-to-scalar ratio in a model-independent way. Next, we also comment on the technicalities of measurements from isospin breaking interactions and the future prospects of newly introduced massive particles in a cosmological Bell violating test experiment. Further, we cite a precise example of this setup applicable in the context of string theory motivated axion monodromy model. Then we

  10. Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS

    OpenAIRE

    Bauereiss , Thomas; Hutter , Dieter

    2014-01-01

    Part 6: Information Flow Control; International audience; Motivated by typical security requirements of workflow management systems, we consider the integrated verification of both safety properties (e.g. separation of duty) and information flow security predicates of the MAKS framework (e.g. modeling confidentiality requirements). Due to the refinement paradox, enforcement of safety properties might violate possibilistic information flow properties of a system. We present an approach where s...

  11. New paradigm for baryon and lepton number violation

    International Nuclear Information System (INIS)

    Fileviez Pérez, Pavel

    2015-01-01

    The possible discovery of proton decay, neutron–antineutron oscillation, neutrinoless double beta decay in low energy experiments, and exotic signals related to the violation of the baryon and lepton numbers at collider experiments will change our understanding of the conservation of fundamental symmetries in nature. In this review we discuss the rare processes due to the existence of baryon and lepton number violating interactions. The simplest grand unified theories and the neutrino mass generation mechanisms are discussed. The theories where the baryon and lepton numbers are defined as local gauge symmetries spontaneously broken at the low scale are discussed in detail. The simplest supersymmetric gauge theory which predicts the existence of lepton number violating processes at the low scale is investigated. The main goal of this review is to discuss the main implications of baryon and lepton number violation in physics beyond the Standard Model.

  12. Violation of local realism with freedom of choice.

    Science.gov (United States)

    Scheidl, Thomas; Ursin, Rupert; Kofler, Johannes; Ramelow, Sven; Ma, Xiao-Song; Herbst, Thomas; Ratschbacher, Lothar; Fedrizzi, Alessandro; Langford, Nathan K; Jennewein, Thomas; Zeilinger, Anton

    2010-11-16

    Bell's theorem shows that local realistic theories place strong restrictions on observable correlations between different systems, giving rise to Bell's inequality which can be violated in experiments using entangled quantum states. Bell's theorem is based on the assumptions of realism, locality, and the freedom to choose between measurement settings. In experimental tests, "loopholes" arise which allow observed violations to still be explained by local realistic theories. Violating Bell's inequality while simultaneously closing all such loopholes is one of the most significant still open challenges in fundamental physics today. In this paper, we present an experiment that violates Bell's inequality while simultaneously closing the locality loophole and addressing the freedom-of-choice loophole, also closing the latter within a reasonable set of assumptions. We also explain that the locality and freedom-of-choice loopholes can be closed only within nondeterminism, i.e., in the context of stochastic local realism.

  13. Flavour Physics and CP Violation : Expecting the LHC

    CERN Document Server

    Fleischer, Robert

    2008-01-01

    The starting point of these lectures is an introduction to the weak interactions of quarks and the Standard-Model description of CP violation, where the central role is played by the Cabibbo-Kobayashi-Maskawa matrix and the corresponding unitarity triangles. Since the B-meson system governs the stage of (quark) flavour physics and CP violation, it is our main focus: we shall classify B-meson decays, introduce the theoretical tools to deal with them, investigate the requirements for non-vanishing CP-violating asymmetries, and discuss the main strategies to explore CP violation and the preferred avenues for physics beyond the Standard Model to enter. This formalism allows us then to discuss important benchmark modes, where we will also address the question of how much space for new-physics effects in the B studies at the LHC is left by the recent experimental results from the B factories and the Tevatron.

  14. Radiative violation of CP-symmetry

    International Nuclear Information System (INIS)

    Galvan Herrera, J.B.

    1990-01-01

    The left-right quiral symmetry is not conserved by the Standard model. A subgroup of the standard gauge group (SU(2) L ) breaks this symmetry in a explicit way. Moreover, the standard model, if there are theree or more matter generations, violates the CP discrete symmetry. This prediction has been experimentally demonstrated correct in the Kaon anti Kaon system. In this work some possible explanations to the CP violation parameter magnitude are researched. We have studied the variation of the Kobayashi-Maskawa matrix with the energy scale. To realize this work we have developed a general method to calculate the renormalization group equations of the Kobayashi-Maskawa matrix parameters. From these equations we could also calculate the renormalization group equation of the J parameter that characterizes the CP violation. This calculus has been applied in a concrete example: a typical supersymmetric model from superstring theories. This model can be seen like a natural extension of the supersymmetric standard model. This kind of models have a gauge group bigger that the standard one more particles and new terms of the Lagrangian. We have verified that such model provides us of a correct low energy fenomenology and, moreover other results, some particle spectrums have been developed. In the elaboration of this model some conditions, that the model has to respected to be compatible with the actual fenomenology, have been studied. The most interesting results of this thesis are the develop of a general method to calculate the renormalization group equations of the Kobayashi-Maskawa matrix parameters and the develop of a new mechanism of the radiative violation. This mechanism is related with the new terms of the Lagrangian. (Author)

  15. Nuclear Safety Review for the Year 2003

    International Nuclear Information System (INIS)

    2004-08-01

    The Nuclear Safety Review reports on worldwide efforts to strengthen nuclear, radiation and transport safety and the safety of radioactive waste management. In line with the suggestions made by the Board of Governors in March 2002, the first part is more analytical and less descriptive. This short analytical overview is supported by a second part, which describes significant safety related events and issues worldwide during 2003. A Draft Nuclear Safety Review for the Year 2003 was submitted to the March 2004 session of the Board of Governors in document GOV/2004/3. The final version of the Nuclear Safety Review for the Year 2003 was prepared in the light of the discussion by the Board.

  16. Reporting nuclear power plant operation to the Finnish Centre for Radiation and Nuclear Safety

    International Nuclear Information System (INIS)

    1997-01-01

    The Finnish Centre for Radiation and Nuclear safety (STUK) is the authority in Finland responsible for controlling the safety of the use of nuclear energy. The control includes, among other things, inspection of documents, reports and other clarification submitted to the STUK, and also independent safety analyses and inspections at the plant site. The guide presents what reports and notifications of the operation of the nuclear facilities are required and how they shall be submitted to the STUK. The guide does not cover reports to be submitted on nuclear material safeguards addressed in the guide YVL 6.10. Guide YVL 6.11 presents reporting related to the physical protection of nuclear power plants. Monitoring and reporting of occupational exposure at nuclear power plants is presented in the guide YVL 7.10 and reporting on radiological control in the environment of nuclear power plants in the guide YVL 7.8

  17. Lepton flavor violation induced by dark matter

    Science.gov (United States)

    Arcadi, Giorgio; Ferreira, C. P.; Goertz, Florian; Guzzo, M. M.; Queiroz, Farinaldo S.; Santos, A. C. O.

    2018-04-01

    Guided by gauge principles we discuss a predictive and falsifiable UV complete model where the Dirac fermion that accounts for the cold dark matter abundance in our Universe induces the lepton flavor violation (LFV) decays μ →e γ and μ →e e e as well as μ -e conversion. We explore the interplay between direct dark matter detection, relic density, collider probes and lepton flavor violation to conclusively show that one may have a viable dark matter candidate yielding flavor violation signatures that can be probed in the upcoming experiments. In fact, keeping the dark matter mass at the TeV scale, a sizable LFV signal is possible, while reproducing the correct dark matter relic density and meeting limits from direct-detection experiments.

  18. Inferring energy dissipation from violation of the fluctuation-dissipation theorem

    Science.gov (United States)

    Wang, Shou-Wen

    2018-05-01

    The Harada-Sasa equality elegantly connects the energy dissipation rate of a moving object with its measurable violation of the Fluctuation-Dissipation Theorem (FDT). Although proven for Langevin processes, its validity remains unclear for discrete Markov systems whose forward and backward transition rates respond asymmetrically to external perturbation. A typical example is a motor protein called kinesin. Here we show generally that the FDT violation persists surprisingly in the high-frequency limit due to the asymmetry, resulting in a divergent FDT violation integral and thus a complete breakdown of the Harada-Sasa equality. A renormalized FDT violation integral still well predicts the dissipation rate when each discrete transition produces a small entropy in the environment. Our study also suggests a way to infer this perturbation asymmetry based on the measurable high-frequency-limit FDT violation.

  19. Is weak violation of the Pauli principle possible?

    International Nuclear Information System (INIS)

    Ignat'ev, A.Yu.; Kuz'min, V.A.

    1987-01-01

    The question considered in the work is whether there are models which can account for small violation of the Pauli principle. A simple algebra is constructed for the creation-annihilation operators, which contains a parameter β and describe small violation of the Pauli principle (the Pauli principle is valid exactly for β=0). The commutation relations in this algebra are trilinear. A model is presented, basing upon this commutator algebra, which allows transitions violating the Pauli principle, their probability being suppressed by a factor of β 2 (even though the Hamiltonian does not contain small parameters)

  20. Simultaneous B and L violation: new signatures from RPV-SUSY

    International Nuclear Information System (INIS)

    Faroughy, Cyrus; Prabhu, Siddharth; Zheng, Bob

    2015-01-01

    Studies of R-parity violating (RPV) supersymmetry typically assume that nucleon stability is protected by approximate baryon number (B) or lepton number (L) conservation. We present a new class of RPV models that violate B and L simultaneously (BLRPV), without inducing rapid nucleon decay. These models feature an approximate Z 2 e ×Z 2 μ ×Z 2 τ flavor symmetry, which forbids 2-body nucleon decay and ensures that flavor antisymmetric LLE c couplings are the only non-negligible L-violating operators. Nucleons are predicted to decay through N→Keμν and n→eμν; the resulting bounds on RPV couplings are rather mild. Novel collider phenomenology arises because the superpartners can decay through both L-violating and B-violating couplings. This can lead to, for example, final states with high jet multiplicity and multiple leptons of different flavor, or a spectrum in which depending on the superpartner, either B or L violating decays dominate. BLRPV can also provide a natural setting for displaced ν̃→μe decays, which evade many existing collider searches for RPV supersymmetry.

  1. Can R-parity violation hide vanilla supersymmetry at the LHC?

    International Nuclear Information System (INIS)

    Asano, Masaki

    2012-09-01

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.

  2. Can R-parity violation hide vanilla supersymmetry at the LHC?

    Energy Technology Data Exchange (ETDEWEB)

    Asano, Masaki [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Rolbiecki, Krzysztof; Sakurai, Kazuki [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2012-09-15

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.

  3. 48 CFR 903.303 - Reporting suspected antitrust violations.

    Science.gov (United States)

    2010-10-01

    ... as described in FAR 3.301, and antitrust law violations as described in FAR 3.303, evidenced in bids... antitrust violations. 903.303 Section 903.303 Federal Acquisition Regulations System DEPARTMENT OF ENERGY GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Reports of Suspected Antitrust...

  4. The NASA Aviation Safety Reporting System

    Science.gov (United States)

    1983-01-01

    This is the fourteenth in a series of reports based on safety-related incidents submitted to the NASA Aviation Safety Reporting System by pilots, controllers, and, occasionally, other participants in the National Aviation System (refs. 1-13). ASRS operates under a memorandum of agreement between the National Aviation and Space Administration and the Federal Aviation Administration. The report contains, first, a special study prepared by the ASRS Office Staff, of pilot- and controller-submitted reports related to the perceived operation of the ATC system since the 1981 walkout of the controllers' labor organization. Next is a research paper analyzing incidents occurring while single-pilot crews were conducting IFR flights. A third section presents a selection of Alert Bulletins issued by ASRS, with the responses they have elicited from FAA and others concerned. Finally, the report contains a list of publications produced by ASRS with instructions for obtaining them.

  5. Noncommutative field theory and violation of translation invariance

    International Nuclear Information System (INIS)

    Bertolami, Orfeu; Guisado, Luis

    2003-01-01

    Noncommutative field theories with commutator of the coordinates of the form [x μ , x ν ] = i Λ μν ω x ω with nilpotent structure constants are studied and shown that a free quantum field theory is not affected. Invariance under translations is broken and the conservation of energy-momentum is violated, obeying a new law which is expressed by a Poincare-invariant equation. The resulting new kinematics is studied and applied to simple examples and to astrophysical puzzles, such as the observed violation of the GZK cutoff. The λΦ 4 quantum field theory is also considered in this context. In particular, self interaction terms violate the usual conservation of energy-momentum and, hence, the radiative correction to the propagator is altered. The correction to first order in λ is calculated. The usual UV divergent terms are still present, but a new type of term also emerges, which is IR divergent, violates momentum conservation and implies a correction to the dispersion relation. (author)

  6. Measurements of CPT Violation at LHCb

    CERN Document Server

    INSPIRE-00260865

    2017-01-01

    Recent measurements of CPT violation and Lorentz symmetry breaking in $B^0-\\bar{B}^0$ mixing and $B^0_s-\\bar{B}^0_s$ mixing, obtained from data taken by the LHCb experiment, are highlighted. The results are expressed in terms of the Standard-Model Extension (SME) coefficients, which incorporate both CPT and Lorentz violation. Due to the large boost of the $B$ mesons at LHCb, the SME coefficients can be determined with high precision. The bounds on these coefficients are improved significantly compared to previous measurements.

  7. DEPARTMENT OF ENERGY: Views on Proposed Civil Penalties, Security Oversight, and External Safety Regulation Legislation

    National Research Council Canada - National Science Library

    Jones, Gary

    2000-01-01

    .... 3383 would amend the Atomic Energy Act by eliminating the exemption that currently allows certain nonprofit contractors to avoid paying civil penalties if they violate DOE's nuclear safety rules...

  8. Safety Justification and Safety Case for Safety-critical Software in Digital Reactor Protection System

    International Nuclear Information System (INIS)

    Kwon, Kee-Choon; Lee, Jang-Soo; Jee, Eunkyoung

    2016-01-01

    Nuclear safety-critical software is under strict regulatory requirements and these regulatory requirements are essential for ensuring the safety of nuclear power plants. The verification & validation (V and V) and hazard analysis of the safety-critical software are required to follow regulatory requirements through the entire software life cycle. In order to obtain a license from the regulatory body through the development and validation of safety-critical software, it is essential to meet the standards which are required by the regulatory body throughout the software development process. Generally, large amounts of documents, which demonstrate safety justification including standard compliance, V and V, hazard analysis, and vulnerability assessment activities, are submitted to the regulatory body during the licensing process. It is not easy to accurately read and evaluate the whole documentation for the development activities, implementation technology, and validation activities. The safety case methodology has been kwon a promising approach to evaluate the level and depth of the development and validation results. A safety case is a structured argument, supported by a body of evidence that provides a compelling, comprehensible, and valid case that a system is safe for a given application in a given operating environment. It is suggested to evaluate the level and depth of the results of development and validation by applying safety case methodology to achieve software safety demonstration. A lot of documents provided as evidence are connected to claim that corresponds to the topic for safety demonstration. We demonstrated a case study in which more systematic safety demonstration for the target system software is performed via safety case construction than simply listing the documents

  9. Safety Justification and Safety Case for Safety-critical Software in Digital Reactor Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Kee-Choon; Lee, Jang-Soo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Jee, Eunkyoung [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    Nuclear safety-critical software is under strict regulatory requirements and these regulatory requirements are essential for ensuring the safety of nuclear power plants. The verification & validation (V and V) and hazard analysis of the safety-critical software are required to follow regulatory requirements through the entire software life cycle. In order to obtain a license from the regulatory body through the development and validation of safety-critical software, it is essential to meet the standards which are required by the regulatory body throughout the software development process. Generally, large amounts of documents, which demonstrate safety justification including standard compliance, V and V, hazard analysis, and vulnerability assessment activities, are submitted to the regulatory body during the licensing process. It is not easy to accurately read and evaluate the whole documentation for the development activities, implementation technology, and validation activities. The safety case methodology has been kwon a promising approach to evaluate the level and depth of the development and validation results. A safety case is a structured argument, supported by a body of evidence that provides a compelling, comprehensible, and valid case that a system is safe for a given application in a given operating environment. It is suggested to evaluate the level and depth of the results of development and validation by applying safety case methodology to achieve software safety demonstration. A lot of documents provided as evidence are connected to claim that corresponds to the topic for safety demonstration. We demonstrated a case study in which more systematic safety demonstration for the target system software is performed via safety case construction than simply listing the documents.

  10. CPLEAR et BABAR, all aspects of CP violation; CPLEAR et BABAR la violation de CP dans tous ses etats

    Energy Technology Data Exchange (ETDEWEB)

    Yeche, Ch

    2003-06-01

    This report of French 'Habilitation a diriger les recherches' summarizes my scientific activity from 1993 to 2003. During this decade, my research work was related to two particle physics experiments: CPLEAR and BABAR. The first one, CPLEAR, has recorded data from 1988 to 1995 on the low energy anti-proton ring (LEAR) at CERN. This experiment was devoted to the study of T, CPT et CP discrete symmetries. The second experiment, BABAR, has been running since 1999, on the PEP-II B factory at SLAC. This experiment searches for CP violation and tests the Standard Model through the measurements of the angles and the sides of the Unitarity Triangle. My research work is divided in five main topics: Study of CP and CPT violation in K{sup 0} {yields} {pi}{sup +} {pi}{sup -} decays; Performance optimization of the particle identification detector (DIRC) of the BABAR experiment; B meson tagging in BABAR experiment; {delta}m{sub d} measurement and Search for CP and T violation in mixing with dilepton events; Search for CP violation in B{sup 0} {yields} {rho}{sup {+-}} {pi}{sup {+-}} and B{sup 0} {yields} {pi}{sup {+-}} K{sup {+-}} decays. (author)

  11. 7 CFR 1465.25 - Contract violations and termination.

    Science.gov (United States)

    2010-01-01

    .... (2) If NRCS terminates a contract due to breach of contract, or the participant voluntarily... 7 Agriculture 10 2010-01-01 2010-01-01 false Contract violations and termination. 1465.25 Section... ASSISTANCE Contracts § 1465.25 Contract violations and termination. (a) If NRCS determines that a participant...

  12. 28 CFR 570.45 - Violation of escorted trip.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Violation of escorted trip. 570.45 Section 570.45 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE COMMUNITY PROGRAMS AND RELEASE COMMUNITY PROGRAMS Escorted Trips § 570.45 Violation of escorted trip. (a) Staff shall process as...

  13. Lepton flavor violation

    International Nuclear Information System (INIS)

    Cooper, M.D. Brooks, M.; Hogan, G.E.

    1997-01-01

    The connection of rare decays to supersymmetric grand unification is highlighted, and a review of the status of rare decay experiments is given. Plans for future investigations of processes that violate lepton flavor are discussed. A new result from the MEGA experiment, a search for μ + → e + γ, is reported to be B.R. -11 with 90% confidence

  14. Experimental tests of charge symmetry violation in parton distributions

    International Nuclear Information System (INIS)

    Londergan, J.T.; Murdock, D.P.; Thomas, A.W.

    2005-01-01

    Recently, a global phenomenological fit to high energy data has included charge symmetry breaking terms, leading to limits on the allowed magnitude of such effects. We discuss two possible experiments that could search for isospin violation in valence parton distributions. We show that, given the magnitude of charge symmetry violation consistent with existing global data, such experiments might expect to see effects at a level of several percent. Alternatively, such experiments could significantly decrease the upper limits on isospin violation in parton distributions

  15. A Newtonian separable model which violates Bell's inequality

    International Nuclear Information System (INIS)

    Notarrigo, S.

    1984-01-01

    On the basis of the Mackey's axiomatization of quantum mechanics an argument is given which allows, in determinate circumstances, the violation of Bell's inequality also in a ''classical mechanics'' and a ''classical probability'' context. A classical model made out of two separate subsystems of coupled oscillators is studied by computer experiments to illustrate the point. In fact, the model violates Bell's inequality. The hypothesis is put forward that the principal reason for this violation is due to the special kind of ''detectors'' introduced in the model which gave a ''count'' every time a given dynamical variable of the mechanical system crosses an assigned threshold

  16. Time Safety Margin: Theory and Practice

    Science.gov (United States)

    2016-09-01

    Air Education and Training Command Handbook 99-107, T-38 Road to Wings, Randolph Air Force Base, Texas, July 2013. 65 This page was intentionally left...412TW-TIH-16-01 TIME SAFETY MARGIN: THEORY AND PRACTICE WILLIAM R. GRAY, III Chief Test Pilot USAF Test Pilot School SEPTEMBER 2016... Safety Margin: The01y and Practice) was submitted by the Commander, 4 I 2th Test Wing, Edwards AFB, Ca lifornia 93524-6843. Foreign announcement and

  17. 40 CFR 170.9 - Violations of this part.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Violations of this part. 170.9 Section... PROTECTION STANDARD General Provisions § 170.9 Violations of this part. (a) Under the Federal Insecticide... general sanitary hazards addressed by the OSHA Field Sanitation Standard, 29 CFR 1928.110, or other...

  18. Val L. Fitch, the CP Violation, and Antimatter

    Science.gov (United States)

    dropdown arrow Site Map A-Z Index Menu Synopsis Val L. Fitch, the CP Violation, and Antimatter Resources ) 'to verify a fundamental tenet of physics, known as CP [charge-parity] symmetry, by showing that two into two pi mesons. Cronin and Fitch had found an example of CP violation. The discovery's

  19. CP violation in the baryon sector

    CERN Document Server

    Smith, Eluned Anne

    2017-01-01

    The study of CP violation in the baryon sector is still a relatively new field and offers the possibility to make many CP measurements which could complement those performed in the meson sector. This is especially true of late given the large number of baryons currently being produced at the LHC. Such measurements could help further over-constrain the CKM unitary triangle, as well as furthering our understand of baryongenesis. These proceedings will give an overview of the current state of the search for CP violation in the baryon sector.

  20. Covenant Violations and Dynamic Loan Contracting

    DEFF Research Database (Denmark)

    Freudenberg, Felix; Imbierowicz, Björn; Saunders, Anthony

    2017-01-01

    This paper examines the dynamic allocation of control rights in private debt contracts of firms. We show that a covenant violation in the prior loan contract implies a stigma for borrowers which results in stricter loan contract terms in subsequent new loan contracts. Our analyses reject...... potentially other explanations such as firm characteristics or agency problems between the lender and firm management, shareholders or public debtholders. After covenant violations in the prior contract, new loans have on average 18 bps higher spreads and include more of those covenant types which also have...

  1. Patient safety is not elective: a debate at the NPSF Patient Safety Congress.

    Science.gov (United States)

    McTiernan, Patricia; Wachter, Robert M; Meyer, Gregg S; Gandhi, Tejal K

    2015-02-01

    The opening keynote session of the 16th Annual National Patient Safety Foundation Patient Safety Congress, held 14-16 May 2014, featured a debate addressing the merits and challenges of accountability with respect to key issues in patient safety. The specific resolution debated was: Certain safety practices should be inviolable, and transgressions should result in penalties, potentially including fines, suspensions, and firing. The themes discussed in the debate are issues that healthcare professionals and leaders commonly struggle with in their day-to-day work. How do we draw a line between systems problems and personal failings? When should clinicians and staff be penalised for failing to follow a known safety protocol? The majority of those who listened to the live debate agreed that it is time to begin holding health professionals accountable when they wilfully or repeatedly violate policies or protocols put in place by their institutions to protect the safety of patients. This article summarises the debate as well as the questions and discussion generated by each side. A video of the original debate can be found at http://bit.ly/Npsf_debate. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  2. Left cytoarchitectonic BA 44 processes syntactic gender violations in determiner phrases.

    Science.gov (United States)

    Heim, Stefan; van Ermingen, Muna; Huber, Walter; Amunts, Katrin

    2010-10-01

    Recent neuroimaging studies make contradictory predictions about the involvement of left Brodmann's area (BA) 44 in processing local syntactic violations in determiner phrases (DPs). Some studies suggest a role for BA 44 in detecting local syntactic violations, whereas others attribute this function to the left premotor cortex. Therefore, the present event-related functional magnetic resonance imaging (fMRI) study investigated whether left-cytoarchitectonic BA 44 was activated when German DPs involving syntactic gender violations were compared with correct DPs (correct: 'der Baum'-the[masculine] tree[masculine]; violated: 'das Baum'--the[neuter] tree[masculine]). Grammaticality judgements were made for both visual and auditory DPs to be able to generalize the results across modalities. Grammaticality judgements involved, among others, left BA 44 and left BA 6 in the premotor cortex for visual and auditory stimuli. Most importantly, activation in left BA 44 was consistently higher for violated than for correct DPs. This finding was behaviourally corroborated by longer reaction times for violated versus correct DPs. Additional brain regions, showing the same effect, included left premotor cortex, supplementary motor area, right middle and superior frontal cortex, and left cerebellum. Based on earlier findings from the literature, the results indicate the involvement of left BA 44 in processing local syntactic violations when these include morphological features, whereas left premotor cortex seems crucial for the detection of local word category violations. © 2010 Wiley-Liss, Inc.

  3. Development of a safety parameter supervision system for Angra-1

    International Nuclear Information System (INIS)

    Silva, R.A. da; Thome Filho, Z.D.; Schirru, R.; Martinez, A.S.; Oliveira, L.F.S. de

    1986-01-01

    The Safety Parameter Supervision System (SSPS) which is a computerized system for monitoring essential parameters in real time, determining the safety status and emergency procedures for returning normal reactor operation, in case of an anomaly occurrence, is presented. The SSPS consists of three sub-systems: Integrated parameter monitoring system which gives to operators an integrated vision of values of a parameter set, able to detect any deviation of normal reactor operation; safety critical function system which evaluates safety status in terms of a safety critical function set appointed in advance, and in case of violation of any critical function, it initiates the adequate emergency procedure to return normal operation; and safety parameter computer system which carries out the arquirement of analogic and digital control signals of nuclear power plant. (M.C.K.) [pt

  4. 49 CFR Appendix B to Part 222 - Alternative Safety Measures

    Science.gov (United States)

    2010-10-01

    .... 222, App. B Appendix B to Part 222—Alternative Safety Measures Introduction A public authority seeking... requirements associated with an SSM as listed in appendix A is revised or deleted, data or analysis supporting...); d. Photographic or video equipment deployed to capture images sufficient to document the violation...

  5. Simultaneous B and L violation: new signatures from RPV-SUSY

    Energy Technology Data Exchange (ETDEWEB)

    Faroughy, Cyrus [Department of Physics and Astronomy, Johns Hopkins University,Baltimore, MD 21218 (United States); Prabhu, Siddharth [Department of Physics, Yale University,New Haven, CT 06511 (United States); Zheng, Bob [Michigan Center for Theoretical Physics, University of Michigan,Ann Arbor, MI 48109 (United States)

    2015-06-11

    Studies of R-parity violating (RPV) supersymmetry typically assume that nucleon stability is protected by approximate baryon number (B) or lepton number (L) conservation. We present a new class of RPV models that violate B and L simultaneously (BLRPV), without inducing rapid nucleon decay. These models feature an approximate Z{sub 2}{sup e}×Z{sub 2}{sup μ}×Z{sub 2}{sup τ} flavor symmetry, which forbids 2-body nucleon decay and ensures that flavor antisymmetric LLE{sup c} couplings are the only non-negligible L-violating operators. Nucleons are predicted to decay through N→Keμν and n→eμν; the resulting bounds on RPV couplings are rather mild. Novel collider phenomenology arises because the superpartners can decay through both L-violating and B-violating couplings. This can lead to, for example, final states with high jet multiplicity and multiple leptons of different flavor, or a spectrum in which depending on the superpartner, either B or L violating decays dominate. BLRPV can also provide a natural setting for displaced ν̃→μe decays, which evade many existing collider searches for RPV supersymmetry.

  6. Parity violation in electron scattering

    International Nuclear Information System (INIS)

    Lhuillier, D.

    2007-09-01

    The elaboration of the electroweak standard model from the discovery of parity violation to the weak neutral current is described in the first chapter. In the second chapter the author discusses the 2 experimental approaches of the parity violation experiments. In the first approach the weak neutral current can be assumed to be well known and can be used as a probe for the hadronic matter. The second approach consists in measuring the weak neutral current between 2 particles with known internal structure in order to test the predictions of the standard model in the low energy range. The chapters 3 and 4 are an illustration of the first approach through the HAPPEx series of experiments that took place in the Jefferson Laboratory from 1998 to 2005. The HAPPEx experiments aimed at measuring the contribution of strange quarks in the electromagnetic form factors of the nucleon through the violation of parity in the elastic scattering at forward angles. The last chapter is dedicated to the E158 experiment that was performed at the Slac (California) between 2000 and 2003. The weak neutral current was measured between 2 electrons and the high accuracy obtained allowed the physics beyond the standard model to be indirectly constraint up to a few TeV. (A.C.)

  7. Flavor and CP violations from sleptons at the Muon Collider

    International Nuclear Information System (INIS)

    Cheng, H.-C.

    1997-12-01

    Supersymmetric theories generally have new flavor and CP violation sources in the squark and slepton mass matrices. They will contribute to the lepton flavor violation processes, such as μ→eγ, which can be probed far below the current bound with an intense muon source at the front end of the muon collider. In addition, if sleptons can be produced at the muon collider, the flavor violation can occur at their production and decay, allowing us to probe the flavor mixing structure directly. Asymmetry between numbers of μ + e - and e + μ - events will be a sign for CP violation in supersymmetric flavor mixing

  8. Minimal flavour violation in the quark and lepton sector and beyond

    Energy Technology Data Exchange (ETDEWEB)

    Uhlig, S.L.

    2008-01-07

    We address to explain the matter-antimatter asymmetry of the universe in a framework that generalizes the quark minimal flavour violation hypothesis to the lepton sector. We study the impact of CP violation present at low and high energies and investigate the existence of correlations among leptogenesis and lepton flavour violation. Further we present an approach alternative to minimal flavour violation where the suppression of flavour changing transitions involving quarks and leptons is governed by hierarchical fermion wave functions. (orig.)

  9. Violation of Bell-type inequality in single-neutron interferometry

    International Nuclear Information System (INIS)

    Hasegawa, Y.; Badurek, G.; Baron, M.; Rauch, H.; Loidl, R.

    2003-01-01

    Full text: We present an interferometric experiment with single spin-1/2 neutrons to demonstrate the violation of Bell-type inequality. The total wave function of neutrons is described by a two-dimensional Hilbert space. Appropriate combinations of the direction of the spin analysis and the position of the phase shifter allow to demonstrate the violation of the Bell-type inequality. The discussions are given on the violation of the Bell-type inequality in terms of beam polarizations and an entanglement-induced correlation in our experiment. (author)

  10. Why does CP violation matter to the universe?

    CERN Document Server

    Ellis, Jonathan Richard

    1999-01-01

    The seemingly obscure phenomenon of CP violation is increasingly being viewed as the key to a deeper understanding of both the behaviour of elementary particles and the big bang origin of the universe. Here, John Ellis of CERN explains how far and how deep the implications of CP violation extend. (0 refs).

  11. 40 CFR 303.12 - Criminal violations covered by this award authority.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Criminal violations covered by this... (CONTINUED) SUPERFUND, EMERGENCY PLANNING, AND COMMUNITY RIGHT-TO-KNOW PROGRAMS CITIZEN AWARDS FOR INFORMATION ON CRIMINAL VIOLATIONS UNDER SUPERFUND General § 303.12 Criminal violations covered by this award...

  12. 29 CFR 1902.6 - Consultation with the National Institute for Occupational Safety and Health.

    Science.gov (United States)

    2010-07-01

    ... Safety and Health. 1902.6 Section 1902.6 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL... Occupational Safety and Health. The Assistant Secretary will consult, as appropriate, with the Director of the National Institute for Occupational Safety and Health with regard to plans submitted by the States under...

  13. CP violation with an unbroken CP transformation

    Energy Technology Data Exchange (ETDEWEB)

    Ratz, Michael [Department of Physics and Astronomy, University of California,Irvine, California 92697-4575 (United States); Trautner, Andreas [Bethe Center for Theoretical Physics und Physikalisches Institut der Universität Bonn,Nussallee 12, 53115 Bonn (Germany)

    2017-02-21

    A CP conserving SU(3) gauge theory is spontaneously broken to T{sub 7} by the vacuum expectation value (VEV) of a 15-plet. Even though the SU(3)-CP transformation is not broken by the VEV, the theory exhibits physical CP violation in the broken phase. This is because the SU(3)-CP transformation corresponds to the unique order-two outer automorphism of T{sub 7}, which is not a physical CP transformation for the T{sub 7} states, and there is no other possible CP transformation. We explicitly demonstrate that CP is violated by calculating a CP odd decay asymmetry in the broken phase. This scenario provides us with a natural protection for topological vacuum terms, ensuring that θ G{sub μν}G̃{sup μν} is absent even though CP is violated for the physical states of the model.

  14. Masses, flavor mix and CP violation

    International Nuclear Information System (INIS)

    Chaussard, L.

    2004-06-01

    The author describes the relationships between masses, mixing of flavors and CP violation. This document is divided into 4 chapters: 1) fermions' masses, 2) mixing of flavors and CP violation, 3) beauty physics and 4) neutrino physics. In chapter 1 an attempt is made to explain what is behind the concepts of lepton mass and quark mass. As for neutrinos, the only neutral fermion, Dirac's and Majorana's views are exposed as well as their consequences. Fermion flavors are mixed in the process of mass generation and this mix is responsible for the breaking of CP and T symmetries. In chapter 2 the author shows how the analysis of particle oscillations from neutral mesons (K 0 , D 0 , B d 0 and B s 0 ) and from neutrinos can shed light on CP violation. Chapter 3 is dedicated to the contribution of beauty physics to the determination of the unitary triangle, through the oscillations of beauty mesons. In chapter 4 the author reviews the experimental results obtained recently concerning neutrino mass and neutrino oscillations and draws some perspectives on future neutrino experiments. (A.C.)

  15. Professional boundary violations: a literature review.

    Science.gov (United States)

    Manfrin-Ledet, Linda; Porche, Demetrius J; Eymard, Amanda S

    2015-06-01

    The purpose of this article is to review the nursing literature related to professional boundary violations in nursing. A search was conducted using CINAHL, MEDLINE, Ebscohost, and NCSBN. The key words searched were professional boundaries, boundary violation, boundary crossings, nurse, home health nurses, and home nursing. The search returned over 40 publications related specifically to boundary violations and nursing although only four of them are published research studies and one as a dissertation. Seven common characteristics emerged from the nonresearch nursing articles on professional boundaries: (1) Dual relations/role reversal, (2) Gifts and money, (3) Excessive self-disclosure, (4) Secretive behavior, (5) Excessive attention/overinvolvement, (6) Sexual behavior, and (7) Social media. Additional nursing research is greatly needed in the area of professional boundaries. The nurse-patient relationship should always be maintained for the benefit of the patient and not the personal gain of the nurse. Ongoing education in nursing practice regarding professional boundaries is needed. Nurses need to be mindful of state practice acts, codes of conduct, and employer policies.

  16. International Conference of Ukrainian Nuclear Society ''NPP's safety and protection''(annotations)

    International Nuclear Information System (INIS)

    Barbashev, S.V.

    1997-01-01

    The abstracts of reports submitted to the Conference include: - New developments of the safe nuclear installations; - NPP ecological safety; - Methods of personnel and population protection; - Waste management safety (at transportation, processing and storage); - Spent nuclear fuel management; - NPP life extension and decommissioning; - Public opinion as an element of NPP safety; - Training of personnel, scientific support and safety culture; - Forecasting of nuclear power and industry safe development; - Development of international cooperation in nuclear power

  17. R-parity violating right-handed neutrino in gravitino dark matter scenario

    International Nuclear Information System (INIS)

    Endo, Motoi

    2009-06-01

    A decay of the gravitino dark matter is an attractive candidate to explain the current excesses of the PAMELA/ATIC cosmic-ray data. However, R-parity violations are required to be very tiny in low-energy scale. We suggest a R-parity violation in the right-handed neutrino sector. The violation is suppressed by a see-saw mechanism. Although a reheating temperature is constrained from above, the thermal leptogenesis is found to work successfully with a help of the R-parity violating right-handed neutrino. (orig.)

  18. R-parity violating right-handed neutrino in gravitino dark matter scenario

    Energy Technology Data Exchange (ETDEWEB)

    Endo, Motoi [CERN, Geneva (Switzerland). Theory Div., PH Dept.; Shindou, Tetsuo [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-06-15

    A decay of the gravitino dark matter is an attractive candidate to explain the current excesses of the PAMELA/ATIC cosmic-ray data. However, R-parity violations are required to be very tiny in low-energy scale. We suggest a R-parity violation in the right-handed neutrino sector. The violation is suppressed by a see-saw mechanism. Although a reheating temperature is constrained from above, the thermal leptogenesis is found to work successfully with a help of the R-parity violating right-handed neutrino. (orig.)

  19. CP violation in ATLAS

    International Nuclear Information System (INIS)

    Saavedra, A.F.

    1995-01-01

    Full text: In the standard model CP violation is generated by a non trivial complex phase in the CKM matrix. The Standard Model does not predict the elements of the CKM matrix, they need to be experimentally measured. This will show if all the CP violation phenomena can be accounted by the complex phase or there are other contributing mechanisms which lie beyond the scope of Standard Model. It is of interest to overconstraint the so called unitary triangle by measuring each angle (α, β and γ) from the CP asymmetry that occurs in different decay modes. During the initial low luminosity period of the LHC a large effort will be concentrated in studying B physics, especially CP violation in the B 0 - B-bar 0 system, with the ATLAS detector. The features of the detector which are important for CP studies are: sharp trigger from the muon spectrometer (muons will be identify down to p T ≅ 5GeV, be able to distinguish electrons from hadrons (down to p T ≅ 1 GeV) with the Straw Tracker and Transition detector and high resolution of tracks, secondary vertices with the Semiconductor Tracker (resolution of 10-90 μm. For some decays modes ATLAS is expected to obtain larger sample of events than the B-factories that are being proposed. It has been calculated that the systematic error σ sin (2 α) = 0.06 and σ sin ( 2 β) = 0.027 which is comparable with other future experiments

  20. Constraints on relativity violations from gamma-ray bursts.

    Science.gov (United States)

    Kostelecký, V Alan; Mewes, Matthew

    2013-05-17

    Tiny violations of the Lorentz symmetry of relativity and the associated discrete CPT symmetry could emerge in a consistent theory of quantum gravity such as string theory. Recent evidence for linear polarization in gamma-ray bursts improves existing sensitivities to Lorentz and CPT violation involving photons by factors ranging from ten to a million.

  1. Parity and time-reversal violation in nuclei and atoms

    International Nuclear Information System (INIS)

    Adelberger, E.G.

    1986-01-01

    Two topics are briefly reviewed: the parity (P)-violating NN interaction and the time-reversal (T) and P-violating electric moments (EDM's) of atoms. The ΔI = 1 P-violating NN amplitude dominated by weak π +- exchange is found to be appreciably smaller than bag-model predictions. This may be a dynamical symmetry of flavor-conserving hadronic weak processes reminiscent of the ΔI = 1/2 rule in flavor-changing decays. General principles of experimental searches for atomic EDM's are discussed. Atomic EDM's are sensitive to electronic or nuclear EDM's and to a P-and-T-violating electron-quark interaction. Even though the experimental precision is still ∼10 4 times worse than counting statistics, the recent results have reached a sensitivity to nuclear EDM's which rivals that of the neutron EDM data. Further significant improvements can be expected

  2. Recent Results on T and CP Violation at BABAR

    Energy Technology Data Exchange (ETDEWEB)

    Perez Perez, Alejandro [Istituto Nazionale di Fisica Nucleare (INFN), Pisa (Italy).

    2015-02-06

    CP-violation (CPV) and Time-reversal violation (TRV) are intimately related through the CPT theorem: if one of these discrete symmetries is violated the other one has to be violated in such a way to conserve CPT. Although CPV in the B0B0-bar system has been established by the B-factories, implying indirectly TRV, there is still no direct evidence of TRV. We report on the observation of TRV in the B-meson system performed with a dataset of 468 × 106 BB-bar pairs produced in Υ(4S) decays collected by the BABAR detector at the PEP-II asymmetric-energy e+e- collider at the SLAC National Accelerator Laboratory. We also report on other CPV measurements recently performed on the B-meson system

  3. Penguins and cp violation in β decays

    International Nuclear Information System (INIS)

    He, X.C.

    1996-11-01

    The measurement of the ε-parameter in the K 0 - K-bar 0 meson system is the only direct evidence for CP violation in the laboratory. The Standard Model (SM) of three generations with the source for CP violation arising from the phases in the Cabibbo-Kobayashi-Maskawa (CKM) matrix is consistent with the experiment. An unique feature of this model is that the CKM matrix is a 3 x 3 unitary matrix. (author)

  4. From parity violation to hadronic structure and more

    CERN Document Server

    Jager, K; Kox, S; Lhuillier, D; Maas, F; Page, S; Papanicolas, C; Stiliaris, S; Wiele, J; 3rd International Workshop on From Parity Violation to Hadronic Structure and More (PAVI06); PAVI 06; PAVI 2006

    2007-01-01

    This book contains the proceedings of the third international workshop on “From Parity Violation to Hadronic Structure and more ...” which was held from May 16 to May 20, 2006, at the George Eliopoulos conference center on the Greek island of Milos. It is part of a series that started in Mainz in 2002 and was followed by a second workshop in Grenoble in 2004. While originally initiated by the extraction of the strangeness contribution to the electromagnetic form factors of the nucleon, the workshop series has continuously broadened the focus to the application of Parity Violation using hadronic probes and to Parity Violation experiments in atomic physics. Meanwhile there have been many exciting new proposals for using Parity Violation in other areas like in the search for new physics beyond the standard model or in exploring hadron structure. There are also close connections to the open question on the size of the two photon exchange amplitude. Fifty years after the 1956 proposal of Lee and Yang to test t...

  5. CP symmetry violation. The search for its origin

    International Nuclear Information System (INIS)

    Cronin, J.W.

    1981-01-01

    The present experimental situation on detection of CP symmetry violation is presented. Interference between decays of long-lived (Ksub(L)sup(0)) and short-lived (Ksub(S)sup(0)) mesons into two charged pions serves a direct demonstration of the fact that the effect is caused by CP symmetry breaking. The time distribution of decays into π + π - when the 4-10 GeV Ksub(L) meson beam passes through a carbon regenerator is given as an example of the measurement accuracy. The measurements of the charge asymmetry in half-lepton channels of Ksub(L)→π +- l +- ν decay where l is an electron or a muon are discussed. It is noted that the presence of the charge asymmetry serves an indication of CP invariance violation and permits to carry out experimental differentiation between the matter and antimatter. Different theoretical assumptions on the nature of CP invariance violation are discussed. A list of experiments on search for CP, T and C invariance violation carried out in different laboratories of the world is given [ru

  6. Phenomenology of muon number violation in spontaneously broken gauge theories

    International Nuclear Information System (INIS)

    Shanker, O.U.

    1980-01-01

    The phenomenology of muon number violation in gauge theories of weak and electromagnetic interactions is studied. In the first chapter a brief introduction to the concept of muon number and to spontaneously broken gauge theories is given. A review of the phenomenology and experimental situation regarding different muon number violating processes is made in the second chapter. A detailed phenomenological study of the μe conversion process μ - + (A,Z) → e - + (A,Z) is given in the third chapter. In the fourth chapter some specific gauge theories incorporating spontaneously broken horizontal gauge symmetries between different fermion generations are discussed with special reference to muon number violation in the theories. The μe conversion process seems to be a good process to search for muon number violation if it occurs. The K/sub L/-K/sub S/ mass difference is likely to constrain muon number violating rates to lie far below present experimental limits unless strangeness changing neutral currents changing strangeness by two units are suppressed

  7. Violations of conservation laws in viscous liquid dynamics

    DEFF Research Database (Denmark)

    Dyre, Jeppe

    2007-01-01

    The laws expressing conservation of momentum and energy apply to any isolated system, but these laws are violated for highly viscous liquids under laboratory conditions because of the unavoidable interactions with the measuring equipment over the long times needed to study the dynamics. Moreover,......, although particle number conservation applies strictly for any liquid, the solidity of viscous liquids implies that even this conservation law is apparently violated in coarse-grained descriptions of density fluctuations.......The laws expressing conservation of momentum and energy apply to any isolated system, but these laws are violated for highly viscous liquids under laboratory conditions because of the unavoidable interactions with the measuring equipment over the long times needed to study the dynamics. Moreover...

  8. CP-violating profile of the electroweak bubble wall

    Energy Technology Data Exchange (ETDEWEB)

    Funakubo, Koichi [Saga Univ. (Japan). Dept. of Physics; Kakuto, Akira; Otsuki, Shoichiro; Takenaga, Kazunori; Toyoda, Fumihiko

    1995-11-01

    In any scenario of the electroweak baryogenesis, the profile of the CP violating bubble wall, created at the first-order phase transition, plays an essential role. We attempt to determine it by solving the equations of motion for the scalars in the two-Higgs-doublet model at the transition temperature. According to the parameters in the potential, we found three solutions. Two of them smoothly connect the CP-violating broken phase and the symmetric phase, while the other connects CP-conserving vacua but violates CP in the intermediate region. We also estimate the chiral charge flux, which will be turned into the baryon density in the symmetric phase by the sphaleron process. (author).

  9. Hyperasymptotics and quark-hadron duality violations in QCD

    Science.gov (United States)

    Boito, Diogo; Caprini, Irinel; Golterman, Maarten; Maltman, Kim; Peris, Santiago

    2018-03-01

    We investigate the origin of the quark-hadron duality-violating terms in the expansion of the QCD two-point vector correlation function at large energies in the complex q2 plane. Starting from the dispersive representation for the associated polarization, the analytic continuation of the operator product expansion from the Euclidean to the Minkowski region is performed by means of a generalized Borel-Laplace transform, borrowing techniques from hyperasymptotics. We establish a connection between singularities in the Borel plane and quark-hadron duality-violating contributions. Starting with the assumption that for QCD at Nc=∞ the spectrum approaches a Regge trajectory at large energy, we obtain an expression for quark-hadron duality violations at large, but finite Nc.

  10. CP violating observables in e$^{-}$e$^{+}$ --> W$^{-}$W$^{+}$

    CERN Document Server

    Chang, D; Phillips, I

    1993-01-01

    We consider various integrated lepton charge-energy asymmetries and azimuthal asymmetries as tests of CP violation in the process $e^-e^+ \\to W^-W^+$. These asymmetries are sensitive to different linear combinations of the CP violating form factors in the three gauge boson $W^-W^+$ production vertex, and can distinguish dispersive and absorptive parts of the form factors. It makes use of purely hadronic and purely leptonic modes of $W$'s decays as well as the mixed modes. The techniques of using the kinematics of jets or missing momentum to construct CP--odd observables are also employed. These CP violating observables are illustrated in the generalized Left-Right Model and the Charged Higgs Model.

  11. Big Data and Heath Impacts of Drinking Water Quality Violation

    Science.gov (United States)

    Allaire, M.; Zheng, S.; Lall, U.

    2017-12-01

    Health impacts of drinking water quality violations are only understood at a coarse level in the United States. This limits identification of threats to water security in communities across the country. Substantial under-reporting is suspected due to requirements at U.S. public health institutes that water borne illnesses be confirmed by health providers. In the era of `big data', emerging information sources could offer insight into waterborne disease trends. In this study, we explore the use of fine-resolution sales data for over-the-counter medicine to estimate the health impacts of drinking water quality violations. We also demonstrate how unreported water quality issues can be detected by observing market behavior. We match a panel of supermarket sales data for the U.S. at the weekly level with geocoded violations data from 2006-2015. We estimate the change in anti-diarrheal medicine sale due to drinking water violations using a fixed effects model. We find that water quality violations have considerable effects on medicine sales. Sales nearly double due to Tier 1 violations, which pose an immediate health risk, and sales increase 15.1 percent due to violations related to microorganisms. Furthermore, our estimate of diarrheal illness cases associated with water quality violations indicates that the Centers for Disease Control and Prevention (CDC) reporting system may only capture about one percent of diarrheal cases due to impaired water. Incorporating medicine sales data could offer national public health institutes a game-changing way to improve monitoring of disease outbreaks. Since many disease cases are not formally diagnosed by health providers, consumption information could provide additional information to remedy under-reporting issues and improve water security in communities across the United States.

  12. International conference on topical issues in nuclear safety. Contributed papers

    International Nuclear Information System (INIS)

    2001-01-01

    The objective of the Conference was to foster the exchange of information on topical issues in nuclear safety, with the aim of consolidating an international consensus on the present status of these issues, priorities for future work, and needs for strengthening international cooperation, including the IAEA recommendations for future activities. This book contains concise contributed papers submitted on issues falling within the thematic scope of the Conference: risk informed decision making, influence of external factors on safety, safety of fuel cycle facilities, safety of research reactors, and safety performance indicators

  13. International conference on topical issues in nuclear safety. Contributed papers

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    The objective of the Conference was to foster the exchange of information on topical issues in nuclear safety, with the aim of consolidating an international consensus on the present status of these issues, priorities for future work, and needs for strengthening international cooperation, including the IAEA recommendations for future activities. This book contains concise contributed papers submitted on issues falling within the thematic scope of the Conference: risk informed decision making, influence of external factors on safety, safety of fuel cycle facilities, safety of research reactors, and safety performance indicators.

  14. Testing the effects of safety climate and disruptive children behavior on school bus drivers performance: A multilevel model.

    Science.gov (United States)

    Zohar, Dov; Lee, Jin

    2016-10-01

    The study was designed to test a multilevel path model whose variables exert opposing effects on school bus drivers' performance. Whereas departmental safety climate was expected to improve driving safety, the opposite was true for in-vehicle disruptive children behavior. The driving safety path in this model consists of increasing risk-taking practices starting with safety shortcuts leading to rule violations and to near-miss events. The study used a sample of 474 school bus drivers in rural areas, driving children to school and school-related activities. Newly developed scales for measuring predictor, mediator and outcome variables were validated with video data taken from inner and outer cameras, which were installed in 29 buses. Results partially supported the model by indicating that group-level safety climate and individual-level children distraction exerted opposite effects on the driving safety path. Furthermore, as hypothesized, children disruption moderated the strength of the safety rule violation-near miss relationship, resulting in greater strength under high disruptiveness. At the same time, the hypothesized interaction between the two predictor variables was not supported. Theoretical and practical implications for studying safety climate in general and distracted driving in particular for professional drivers are discussed. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. 10CFR50.59 safety evaluations

    International Nuclear Information System (INIS)

    Grime, L.; Page, E.

    1987-01-01

    As a plant changes from the design phase to the operational phase, new regulations and standards apply. One such regulation is 10CFR50.59 on safety evaluations. Once an operating license is issued, it is mandatory to submit all applicable changes, tests, and experiments to the safety evaluation process. As preparation for this transition, Detroit Edison had procedures in place and conducted personnel training. Reviews of the safety engineering were conducted by the on-site review board. The off-site board delegated detailed reviews of most safety evaluations to the independent safety evaluation group (ISEG). The on-site group review included presentation of complete design packages by engineers. The ISEG and off-site review group's activity focused on safety evaluation. This paper addresses industry trends that were studied, Detroit Edison's recent actions, and industry issues related to 10CFR50.59 safety evaluations

  16. arXiv CP violation in $b$ hadrons at LHCb

    CERN Document Server

    INSPIRE-00028041

    The most recent results on CP violation in $b$ hadrons obtained by the LHCb Collaboration with Run I and years 2015-2016 of Run II are reviewed. The different types of violation are covered by the studies presented in this paper.

  17. Scaling violation in the heavy quark fragmentation functian

    International Nuclear Information System (INIS)

    Avaliani, I.S.; Kartvelishvili, V.G.

    1981-01-01

    The scaling violation in the heavy quark fragmentation functions is analysed in the framework of the leading logarithmic approximation in QCD and it is shown, that the slaling violation effects are more essential for heavy quarks, than for light ones. These results indicate that the D-meson inclusive spectra measurement is a sensitive test for some standard assumptions [ru

  18. Direct СP violation in neutral kaon decays

    Indian Academy of Sciences (India)

    The final result of the NA48 experiment is presented and performed at the CERN SPS neutral kaon beams, on the direct CP violation parameter Re ( ′ / ) , as measured from the decay rates of neutral kaons into two pions. The data collected in the years 1997-2001 yield the evidence for the direct CP violation with Re ...

  19. 45 CFR 73b.3 - Reports of violations.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Reports of violations. 73b.3 Section 73b.3 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION DEBARMENT OR SUSPENSION OF FORMER EMPLOYEES § 73b.3 Reports of violations. (a) If an officer or employee of the Department has reason to...

  20. 78 FR 77724 - PPL Bell Bend, LLC; Bell Bend Nuclear Power Plant; Exemption From the Requirement To Submit an...

    Science.gov (United States)

    2013-12-24

    ... submit its scheduled 2013 update while work is being completed on the generic aspects of the safety... issued, the probability of postulated accidents is not increased. Additionally, based on the nature of the requested exemption as described above, no new accident precursors are created by the exemption...

  1. Isospin-violating mixing in meson nonets

    International Nuclear Information System (INIS)

    Isgur, N.

    1979-01-01

    Segregation into ideally mixed nonets results when the OZI-violating interaction which would mix u anti u, d anti d, and s anti s mesons into isospin and SU(3) eigenstates is much weaker than the s anti s-d anti d mass difference. We show that the d anti d-u anti u mass difference can begin to induce a similar segregation into d anti d and anti u mesons which leads to large isospin violations. An experimental example of such large isospin breaking (approx. 30%) which we predict has probably already been seen in f → K anti K. (orig.)

  2. Bus safety study : a report to Congress.

    Science.gov (United States)

    2013-11-01

    Section 20021(b) of the Moving Ahead for Progress for the 21st Century (MAP-21) legislation requires the Secretary of Transportation : to submit a report of the results of a Bus Safety Study to the Committee on Banking, Housing, and Urban Affai...

  3. Feynman rules for fermion-number-violating interactions

    International Nuclear Information System (INIS)

    Denner, A.; Eck, H.; Hahn, O.; Kueblbeck, J.

    1992-01-01

    We present simple algorithmic Feynman rules for fermion-number-violating interactions. They do not involve explicit charge-conjugation matrices and resemble closely the familiar rules for Dirac fermions. We insist on a fermion flow through the graphs along fermion lines and get the correct relative signs between different interfering Feynman graphs as in the case of Dirac fermions. We only need the familiar Dirac propagator and fewer vertices than in the usual treatment of fermion-number-violating interactions. (orig.)

  4. Electron scattering violates parity

    CERN Multimedia

    2004-01-01

    Parity violation has been observed in collisions between electrons at the Stanford Linear Accelerator Center (SLAC) in the US. The resuls, which are in agreement with the Stanford Model of particle physics, also provide a new measurement of the weak charge of the electron (½ page)

  5. Chiral flavor violation from extended gauge mediation

    Energy Technology Data Exchange (ETDEWEB)

    Evans, Jared A. [Department of Physics, University of Illinois at Urbana-Champaign,Urbana, IL 61801 (United States); Shih, David; Thalapillil, Arun [NHETC, Department of Physics and Astronomy,Rutgers University, Piscataway, NJ 08854 (United States)

    2015-07-08

    Models of extended gauge mediation, in which large A-terms arise through direct messenger-MSSM superpotential couplings, are well-motivated by the discovery of the 125 GeV Higgs. However, since these models are not necessarily MFV, the flavor constraints could be stringent. In this paper, we perform the first detailed and quantitative study of the flavor violation in these models. To facilitate our study, we introduce a new tool called FormFlavor for computing precision flavor observables in the general MSSM. We validate FormFlavor and our qualitative understanding of the flavor violation in these models by comparing against analytical expressions. Despite being non-MFV, we show that these models are protected against the strongest constraints by a special flavor texture, which we dub chiral flavor violation (χFV). This results in only mild bounds from current experiments, and exciting prospects for experiments in the near future.

  6. Crash risk and aberrant driving behaviors among bus drivers: the role of personality and attitudes towards traffic safety.

    Science.gov (United States)

    Mallia, Luca; Lazuras, Lambros; Violani, Cristiano; Lucidi, Fabio

    2015-06-01

    Several studies have shown that personality traits and attitudes toward traffic safety predict aberrant driving behaviors and crash involvement. However, this process has not been adequately investigated in professional drivers, such as bus drivers. The present study used a personality-attitudes model to assess whether personality traits predicted aberrant self-reported driving behaviors (driving violations, lapses, and errors) both directly and indirectly, through the effects of attitudes towards traffic safety in a large sample of bus drivers. Additionally, the relationship between aberrant self-reported driving behaviors and crash risk was also assessed. Three hundred and one bus drivers (mean age=39.1, SD=10.7 years) completed a structured and anonymous questionnaire measuring personality traits, attitudes toward traffic safety, self-reported aberrant driving behaviors (i.e., errors, lapses, and traffic violations), and accident risk in the last 12 months. Structural equation modeling analysis revealed that personality traits were associated to aberrant driving behaviors both directly and indirectly. In particular altruism, excitement seeking, and normlessness directly predicted bus drivers' attitudes toward traffic safety which, in turn, were negatively associated with the three types of self-reported aberrant driving behaviors. Personality traits relevant to emotionality directly predicted bus drivers' aberrant driving behaviors, without any mediation of attitudes. Finally, only self-reported violations were related to bus drivers' accident risk. The present findings suggest that the hypothesized personality-attitudes model accounts for aberrant driving behaviors in bus drivers, and provide the empirical basis for evidence-based road safety interventions in the context of public transport. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. Quaternionic potentials and CP-violation

    International Nuclear Information System (INIS)

    Nishi, Celso Chikahiro

    2000-01-01

    Full text follows: In the formulation of Quantum Mechanics by using a non-commutative ring of quaternions, we attempt to solve the Schroedinger equation with quaternionic potentials. Decay processes can easily be modeled by including complex imaginary potentials. Although, it could be explained as a transition between states under action of a perturbation. Purely imaginary quaternionic potentials can be used to describe CP-violation effects. The neutral kaon system, K 0 - K-bar 0 or K L - K S , represents an example of CP-violation phenomenon. The inclusion of quaternionic potentials imply a reformulation of the whole quantum theory. The use of a quaternionic algebra in discussing the Schroedinger equation leads to the lost of time reversal invariance (T), closely connected to CP violation by the well-known CPT theorem. In particular, we study the Schroedinger equation in presence of a quaternionic potential barrier given in terms of V, real potential acting in the region of width a, and jW, purely quaternionic potential acting in the region of width b. Different cases, |W|/V and b/a, are discussed in view of possible deviations of standard Quantum Mechanics. The complex linear Schroedinger equation is solved for stationary states. The explicit solution contains complex and quaternionic transmission/reflection coefficients. A wave packet treatment needs to make a more realistic and physical description. We briefly discuss possible interpretations and remaining questions. (author)

  8. James Cronin, CP Violation, and the Pierre Auger Observatory

    Science.gov (United States)

    dropdown arrow Site Map A-Z Index Menu Synopsis James Cronin, CP Violation and the Pierre Auger Observatory matter over antimatter."1 "The experiment uncovered the CP [charge-parity] violation, or a with Additional Information Additional information about James Cronin and the charge-parity (CP

  9. Lorentz-violating alternative to the Higgs mechanism?

    International Nuclear Information System (INIS)

    Alexandre, Jean; Mavromatos, Nick E.

    2011-01-01

    We consider a four-dimensional field-theory model with two massless fermions, coupled to an Abelian vector field without flavor mixing, and to another Abelian vector field with flavor mixing. Both Abelian vectors have a Lorentz-violating kinetic term, introducing a Lorentz-violation mass scale M, from which fermions and the flavor-mixing vector get their dynamical masses, whereas the vector coupled without flavor mixing remains massless. When the two coupling constants have similar values in order of magnitude, a mass hierarchy pattern emerges, in which one fermion is very light compared to the other, while the vector mass is of the order of the heavy fermion mass. The work presented here may be considered as a Lorentz-symmetry-violating alternative to the Higgs mechanism, in the sense that no scalar particle (fundamental or composite) is necessary for the generation of the vector-meson mass. However, the model is not realistic given that, as a result of Lorentz violation, the maximal (light-cone) speed seen by the fermions is smaller than that of the massless gauge boson (which equals the speed of light in vacuo) by an amount which is unacceptably large to be compatible with the current tests of Lorentz invariance, unless the gauge couplings assume unnaturally small values. Possible ways out of this phenomenological drawback are briefly discussed, postponing a detailed construction of more realistic models for future work.

  10. Regge behavior saves string theory from causality violations

    DEFF Research Database (Denmark)

    di Vecchia, Paolo; Giuseppe, D'Appollonio; Russo, Rodolfo

    2015-01-01

    Higher-derivative corrections to the Einstein-Hilbert action are present in bosonic string theory leading to the potential causality violations recently pointed out by Camanho et al. [1]. We analyze in detail this question by considering high-energy string-brane collisions at impact parameters b....... Such violations are instead neatly avoided when the full structure of string theory — and in particular its Regge behavior — is taken into account....... ≤ l s (the string-length parameter) with l s ≫ R p (the characteristic scale of the Dp-brane geometry). If we keep only the contribution of the massless states causality is violated for a set of initial states whose polarization is suitably chosen with respect to the impact parameter vector...

  11. CP violation in the standard model and beyond

    International Nuclear Information System (INIS)

    Buras, A.J.

    1984-01-01

    The present status of CP violation in the standard six quark model is reviewed and a combined analysis with B-meson decays is presented. The theoretical uncertainties in the analysis are discussed and the resulting KM weak mixing angles, the phase delta and the ratio epsilon'/epsilon are given as functions of Tsub(B), GAMMA(b -> u)/GAMMA(b -> c), msub(t) and the B parameter. For certain ranges of the values of these parameters the standard model is not capable in reproducing the experimental values for epsilon' and epsilon parameters. Anticipating possible difficulties we discuss various alternatives to the standard explanation of CP violation such as horizontal interactions, left-right symmetric models and supersymmetry. CP violation outside the kaon system is also briefly discussed. (orig.)

  12. Is a weak violation of the Pauli principle possible?

    International Nuclear Information System (INIS)

    Ignat'ev, A.Y.; Kuz'min, V.A.

    1987-01-01

    We examine models in which there is a weak violation of the Pauli principle. A simple algebra of creation and annihilation operators is constructed which contains a parameter β and describes a weak violation of the Pauli principle (when β = 0 the Pauli principle is satisfied exactly). The commutation relations in this algebra turn out to be trilinear. A model based on this algebra is described. It allows transitions in which the Pauli principle is violated, but the probability of these transitions is suppressed by the quantity β 2 (even though the interaction Hamiltonian does not contain small parameters)

  13. Instrument to measure psychological contract violation in pharmacy students.

    Science.gov (United States)

    Spies, Alan R; Wilkin, Noel E; Bentley, John P; Bouldin, Alicia S; Wilson, Marvin C; Holmes, Erin R

    2010-08-10

    To adapt and evaluate an instrument that measures perceived psychological contract violations in pharmacy students by schools and colleges of pharmacy. A psychological contract violations measure was developed from existing literature and the 1997 ACPE Guidelines and pilot-tested with second-year pharmacy students at 2 schools of pharmacy. A revised measure then was administered to second-year pharmacy students at 6 schools of pharmacy. Using a 5-point Likert-type scale, participants were asked to indicate the level of obligations they received compared to what was promised by the school of pharmacy. Exploratory factor analysis on the psychological contract violations measure was conducted using principal components analysis resulting in 7 factors, which led to a revised measure with 26 items. Using a sample of 339 students, the proposed 7-factor measurement model was tested using confirmatory factor analysis. In general, the results supported the hypothesized model. The final 23-item scale demonstrated both reliability and validity. Some students perceived certain aspects of the psychological contract that exists with their school of pharmacy were being violated. The psychological contract violations measure may serve as a valuable tool in helping to identify areas where their students believe that schools/colleges of pharmacy have not fulfilled promised obligations.

  14. Viscosity bound violation in holographic solids and the viscoelastic response

    Energy Technology Data Exchange (ETDEWEB)

    Alberte, Lasma [Abdus Salam International Centre for Theoretical Physics (ICTP),Strada Costiera 11, 34151, Trieste (Italy); Baggioli, Matteo [Institut de Física d’Altes Energies (IFAE),The Barcelona Institute of Science and Technology (BIST),Campus UAB, 08193 Bellaterra, Barcelona (Spain); Department of Physics, Institute for Condensed Matter Theory, University of Illinois,1110 W. Green Street, Urbana, IL 61801 (United States); Pujolàs, Oriol [Institut de Física d’Altes Energies (IFAE),The Barcelona Institute of Science and Technology (BIST),Campus UAB, 08193 Bellaterra, Barcelona (Spain)

    2016-07-14

    We argue that the Kovtun-Son-Starinets (KSS) lower bound on the viscosity to entropy density ratio holds in fluid systems but is violated in solid materials with a non-zero shear elastic modulus. We construct explicit examples of this by applying the standard gauge/gravity duality methods to massive gravity and show that the KSS bound is clearly violated in black brane solutions whenever the massive gravity theories are of solid type. We argue that the physical reason for the bound violation relies on the viscoelastic nature of the mechanical response in these materials. We speculate on whether any real-world materials can violate the bound and discuss a possible generalization of the bound that involves the ratio of the shear elastic modulus to the pressure.

  15. Viscosity bound violation in holographic solids and the viscoelastic response

    International Nuclear Information System (INIS)

    Alberte, Lasma; Baggioli, Matteo; Pujolàs, Oriol

    2016-01-01

    We argue that the Kovtun-Son-Starinets (KSS) lower bound on the viscosity to entropy density ratio holds in fluid systems but is violated in solid materials with a non-zero shear elastic modulus. We construct explicit examples of this by applying the standard gauge/gravity duality methods to massive gravity and show that the KSS bound is clearly violated in black brane solutions whenever the massive gravity theories are of solid type. We argue that the physical reason for the bound violation relies on the viscoelastic nature of the mechanical response in these materials. We speculate on whether any real-world materials can violate the bound and discuss a possible generalization of the bound that involves the ratio of the shear elastic modulus to the pressure.

  16. Equivalence principle, CP violations, and the Higgs-like boson mass

    International Nuclear Information System (INIS)

    Bellucci, S.; Faraoni, V.

    1994-01-01

    We consider the violation of the equivalence principle induced by a massive gravivector, i.e., the partner of the graviton in N>1 supergravity. The present limits on this violation allow us to obtain a lower bound on the vacuum expectation value of the scalar field that gives the gravivector its mass. We consider also the effective neutral kaon mass difference induced by the gravivector and compare the result with the experimental data on the CP-violation parameter ε

  17. Future prospects for studying CP violation in B-meson decays

    International Nuclear Information System (INIS)

    Nakada, T.

    1997-01-01

    Experimental prospects for observing CP violation in B-meson decays are reviewed. Comparisons are made for various options: experiments a e + e - B-Meson Factories, HERA and the TEVATRON will produce results n near future. They will have a good chance to discover CP violation in B-meson decays. On a longer time scale, experiments at the LHC will aim at accurate measurements to make a precision test of the standard model in CP violation. (author)

  18. CP violation in neutral B decays to non-CP-eigenstates

    International Nuclear Information System (INIS)

    Kayser, B.

    1992-01-01

    If CP violation comes from complex phases in the quark mixing matrix, then neutral B decays to CP eigenstates will exhibit large, cleanly-predicted CP-violating effects. The authors show that the same is true of neutral B decays to several types of ''near-CP-eigenstates.'' By experimentally studying the latter decays as well as those to the CP eigenstates, one will be able to obtain more definitive information on CP violation from a given number of B mesons

  19. Leggett-Garg inequalities violation via the Fermi contact hyperfine interaction

    Energy Technology Data Exchange (ETDEWEB)

    Lobejko, Marcin; Dajka, Jerzy [Institute of Physics, University of Silesia, Katowice (Poland); Silesian Center for Education and Interdisciplinary Research, University of Silesia, Chorzow (Poland)

    2017-06-15

    In this paper we examine theoretically how the spin-spin interaction between a nuclei and an electron in the atom affects violation of the Leggett-Garg inequalities. We consider the simplest case of atoms in the {sup 2}S{sub 1/2} state that in the valence shell have just a single electron and the evolution in time of the spin is dictated only by the Fermi contact hyperfine interaction. We found that for special initial conditions and a particular measured observable the high spin nucleus couple to the valence electron such that violation of Leggett-Garg inequalities increases with total spin of states. Consequently, our results show that for the Hydrogen, the smallest atom in Nature, the violation of the Leggett-Garg inequalities is the smallest whereas for the largest atom, the Cesium, the violation is the largest. Moreover, this violation does not depend on a principal quantum number, thus our model can be used for Rydberg atoms in order to test macrorealism for 'almost macroscopic' objects. (copyright 2016 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  20. CP-violation and Todd effects at lep-II

    International Nuclear Information System (INIS)

    Bilal, A.; Masso, E.; Rujula, A. de

    1991-01-01

    LEP-II will be a tool study CP-violation in processes involving vector bosons, and will test in particular the CP properties of the coupling of photons and Z's to W-pairs. While it is difficult to observe truly CP-odd effects, it is easy to measure T-odd ones. The latter can originate from CP-violation, or from radiative corrections involving the absorptive part of the scattering amplitude. T-odd effects are interesting in themselves, in that they accurately test the standard model and are sensitive to its unmeasured ingredients, such as the WW→WW scattering amplitude of the masses of the top quark and the elementary scalar. The prediction of the standard T-odd effects is a necessary stepping stone in the search for an honest-to-goodness violation of CP in the pure gauge sector. We thoroughly analyse the T-odd observables in the e + e - →W + W - process within the standard model, as well as the extra effects to be expected if the γW + W - and/or ZW + W - vertices were to violate CP in a non-standard fashion. (orig.)

  1. CPLEAR et BABAR, all aspects of CP violation

    International Nuclear Information System (INIS)

    Yeche, Ch.

    2003-06-01

    This report of French 'Habilitation a diriger les recherches' summarizes my scientific activity from 1993 to 2003. During this decade, my research work was related to two particle physics experiments: CPLEAR and BABAR. The first one, CPLEAR, has recorded data from 1988 to 1995 on the low energy anti-proton ring (LEAR) at CERN. This experiment was devoted to the study of T, CPT et CP discrete symmetries. The second experiment, BABAR, has been running since 1999, on the PEP-II B factory at SLAC. This experiment searches for CP violation and tests the Standard Model through the measurements of the angles and the sides of the Unitarity Triangle. My research work is divided in five main topics: Study of CP and CPT violation in K 0 → π + π - decays; Performance optimization of the particle identification detector (DIRC) of the BABAR experiment; B meson tagging in BABAR experiment; Δm d measurement and Search for CP and T violation in mixing with dilepton events; Search for CP violation in B 0 → ρ ± π ± and B 0 → π ± K ± decays. (author)

  2. Effective Lagrangian description of Higgs mediated flavor violating electromagnetic transitions: Implications on lepton flavor violation

    International Nuclear Information System (INIS)

    Aranda, J. I.; Tututi, E. S.; Flores-Tlalpa, A.; Ramirez-Zavaleta, F.; Tlachino, F. J.; Toscano, J. J.

    2009-01-01

    Higgs mediated flavor violating electromagnetic interactions, induced at the one-loop level by a nondiagonal Hf i f j vertex, with f i and f j charged leptons or quarks, are studied within the context of a completely general effective Yukawa sector that comprises SU L (2)xU Y (1)-invariant operators of up to dimension-six. Exact formulae for the one-loop γf i f j and γγf i f j couplings are presented and their related processes used to study the phenomena of Higgs mediated lepton flavor violation. The experimental limit on the μ→eγ decay is used to derive a bound on the branching ratio of the μ→eγγ transition, which is 6 orders of magnitude stronger than the current experimental limit. Previous results on the τ→μγ and τ→μγγ decays are reproduced. The possibility of detecting signals of lepton flavor violation at γγ colliders is explored through the γγ→l i l j reaction, putting special emphasis on the τμ final state. Using the bound imposed on the Hτμ vertex by the current experimental data on the muon anomalous magnetic moment, it is found that about half a hundred events may be produced in the International Linear Collider.

  3. 2011 Annual Criticality Safety Program Performance Summary

    Energy Technology Data Exchange (ETDEWEB)

    Andrea Hoffman

    2011-12-01

    The 2011 review of the INL Criticality Safety Program has determined that the program is robust and effective. The review was prepared for, and fulfills Contract Data Requirements List (CDRL) item H.20, 'Annual Criticality Safety Program performance summary that includes the status of assessments, issues, corrective actions, infractions, requirements management, training, and programmatic support.' This performance summary addresses the status of these important elements of the INL Criticality Safety Program. Assessments - Assessments in 2011 were planned and scheduled. The scheduled assessments included a Criticality Safety Program Effectiveness Review, Criticality Control Area Inspections, a Protection of Controlled Unclassified Information Inspection, an Assessment of Criticality Safety SQA, and this management assessment of the Criticality Safety Program. All of the assessments were completed with the exception of the 'Effectiveness Review' for SSPSF, which was delayed due to emerging work. Although minor issues were identified in the assessments, no issues or combination of issues indicated that the INL Criticality Safety Program was ineffective. The identification of issues demonstrates the importance of an assessment program to the overall health and effectiveness of the INL Criticality Safety Program. Issues and Corrective Actions - There are relatively few criticality safety related issues in the Laboratory ICAMS system. Most were identified by Criticality Safety Program assessments. No issues indicate ineffectiveness in the INL Criticality Safety Program. All of the issues are being worked and there are no imminent criticality concerns. Infractions - There was one criticality safety related violation in 2011. On January 18, 2011, it was discovered that a fuel plate bundle in the Nuclear Materials Inspection and Storage (NMIS) facility exceeded the fissionable mass limit, resulting in a technical safety requirement (TSR) violation. The

  4. Safety and excellence--is regulation ensuring their achievement

    International Nuclear Information System (INIS)

    Levesque, R.J.A.

    1992-01-01

    Canada has a large, vigorous nuclear industry staffed by competent people, and a vigourous, independent regulatory agency similarly staffed. Nevertheless, there have been many signs over the last few years that the level of operating and engineering excellence needed to ensure a high level of safety was not being achieved in some key sections of the industry. Years of successful, accident-free operation - a hallmark of Canadian nuclear generating stations - are not by themselves a proof of adequate safety. Signs that the level of excellence is not being met in the nuclear reactor business have been seen, for example, in reviews of significant events, in the standard of generating documentation, and in the time taken to implement necessary design modifications. In the radioisotope business, the number of violations of licence conditions has been growing steadily, and there are an unacceptable number of workers exceeding regulatory dose limits. While many of these violations are minor in themselves, their prevalence suggests a degree of complacency has been developing which will be an enemy of excellence. Equally, the level of review, assessment, inspection and confirmatory research carried out in the past by the Atomic Energy Control Board (AECB) has been clearly inadequate. The paper discusses these and other examples of a lack of excellence, particularly in organization and management within its licensees and its effect on safety,. and identifies some of the performance indicators used. The paper also identifies some of the actions that are being taken by the AECB and the licensees to ensure an adequate level of safety is being maintained. The AECB is increasing, for example, its frequency of inspections in several industrial sectors and increasing its depth of safety review of nuclear generating stations

  5. Lorentz violation and generalized uncertainty principle

    Science.gov (United States)

    Lambiase, Gaetano; Scardigli, Fabio

    2018-04-01

    Investigations on possible violation of Lorentz invariance have been widely pursued in the last decades, both from theoretical and experimental sides. A comprehensive framework to formulate the problem is the standard model extension (SME) proposed by A. Kostelecky, where violation of Lorentz invariance is encoded into specific coefficients. Here we present a procedure to link the deformation parameter β of the generalized uncertainty principle to the SME coefficients of the gravity sector. The idea is to compute the Hawking temperature of a black hole in two different ways. The first way involves the deformation parameter β , and therefore we get a deformed Hawking temperature containing the parameter β . The second way involves a deformed Schwarzschild metric containing the Lorentz violating terms s¯μ ν of the gravity sector of the SME. The comparison between the two different techniques yields a relation between β and s¯μ ν. In this way bounds on β transferred from s¯μ ν are improved by many orders of magnitude when compared with those derived in other gravitational frameworks. Also the opposite possibility of bounds transferred from β to s¯μ ν is briefly discussed.

  6. Theoretical perspective for baryon number violation

    International Nuclear Information System (INIS)

    Langacker, P.

    1982-01-01

    In this talk I describe the theoretical predictions for proton decay and other baryon number violating processes, emphasizing that there are many models and theories involving baryon number violation and that it is an experimental problem to distinguish between them. I first review the the theoretical predictions for the unification mass M/sub X/ and for the weak angle sin 2 theta/sub W/. It will be seen that the class of models involving an Su 3 x SU 2 x U 1 invariant desert between M/sub W/ and M/sub X/ are strongly favored. I then turn to baryon number violation. The proton lifetime and branching ratio predictions for the SU 5 and other 3-2-1 desert models are reviewed, with emphasis on distinguishing between models and on the implications of the small value of the QCD parameter lambda/sub anti MS/ that seems to be favored by the data. I then discuss the consequences of low energy supersymmetry for proton decay, nuclear effects, and models with low mass scales. Finally, I mention possible implications of the anomalously large flux of cosmic ray antiprotons that has recently been reported

  7. CP Violation in Heavy MSSM Higgs Scenarios

    CERN Document Server

    Carena, M; Lee, J S; Pilaftsis, A; Wagner, C E M

    2016-01-01

    We introduce and explore new heavy Higgs scenarios in the Minimal Supersymmetric Standard Model (MSSM) with explicit CP violation, which have important phenomenological implications that may be testable at the LHC. For soft supersymmetry-breaking scales M_S above a few TeV and a charged Higgs boson mass M_H+ above a few hundred GeV, new physics effects including those from explicit CP violation decouple from the light Higgs boson sector. However, such effects can significantly alter the phenomenology of the heavy Higgs bosons while still being consistent with constraints from low-energy observables, for instance electric dipole moments. To consider scenarios with a charged Higgs boson much heavier than the Standard Model (SM) particles but much lighter than the supersymmetric particles, we revisit previous calculations of the MSSM Higgs sector. We compute the Higgs boson masses in the presence of CP violating phases, implementing improved matching and renormalization group (RG) effects, as well as two-loop RG...

  8. 78 FR 48413 - Proposed Information Collection; Comment Request; Voluntary Self-Disclosure of Violations of the...

    Science.gov (United States)

    2013-08-08

    ... Request; Voluntary Self- Disclosure of Violations of the Export Administration Regulations AGENCY: Bureau... violators. Voluntary self-disclosure of EAR violations strengthens BIS's enforcement efforts by allowing BIS... detect the violations without such disclosures. BIS evaluates the seriousness of the violation and either...

  9. Smooth criminal: convicted rule-breakers show reduced cognitive conflict during deliberate rule violations.

    Science.gov (United States)

    Jusyte, Aiste; Pfister, Roland; Mayer, Sarah V; Schwarz, Katharina A; Wirth, Robert; Kunde, Wilfried; Schönenberg, Michael

    2017-09-01

    Classic findings on conformity and obedience document a strong and automatic drive of human agents to follow any type of rule or social norm. At the same time, most individuals tend to violate rules on occasion, and such deliberate rule violations have recently been shown to yield cognitive conflict for the rule-breaker. These findings indicate persistent difficulty to suppress the rule representation, even though rule violations were studied in a controlled experimental setting with neither gains nor possible sanctions for violators. In the current study, we validate these findings by showing that convicted criminals, i.e., individuals with a history of habitual and severe forms of rule violations, can free themselves from such cognitive conflict in a similarly controlled laboratory task. These findings support an emerging view that aims at understanding rule violations from the perspective of the violating agent rather than from the perspective of outside observer.

  10. LHCb CP violation

    CERN Document Server

    Vesterinen, Mika

    2016-01-01

    The study of $CP$ violation in the beauty hadron sector is a promising approach to search for the effects of physics beyond the Standard Model. Several recent measurements in this area from the LHCb experiment are reported in these proceedings. These are based on the Run-I dataset of 3~fb$^{-1}$ of data collected at proton-proton centre of mass energies of 7 and 8~TeV.

  11. SM with two Higgs doublets: an example of CP-violation without Fermions

    International Nuclear Information System (INIS)

    Cvetic, G.

    1993-01-01

    Some CP-violation effects without fermions in the Standard Model are investigated with two Higgs doublets. First, the mass eigenstates of the physical neutral Higgses are calculated for small but nonzero CP-violation parameter ξ * , and then a ''forward-backward'' asymmetry A fb for the decay H → W + W - Z that would be a signal of CP-violation. The effects are in general small. However, A fb turns out to be a rather clean signal of CP-violation: neither the CP-conserving final state interactions nor the direct production background events contribute to Γ fb . The KM-type CP-violation effects that could in principle also contribute to A fb are negligible. 6 refs

  12. 15 CFR 764.2 - Violations.

    Science.gov (United States)

    2010-01-01

    ... issued thereunder. (e) Acting with knowledge of a violation. No person may order, buy, remove, conceal... or may occur in the future. (h) Evasion. No person may engage in any transaction or take any other...

  13. Baryogenesis and standard model CP violation

    International Nuclear Information System (INIS)

    Huet, P.

    1994-08-01

    The standard model possesses a natural source of CP violation contained in the phase of the CKM matrix. Whether the latter participated to the making of the matter-antimatter asymmetry of the observable universe is a fundamental question which has been addressed only recently. The generation of a CP observable occurs through interference of quantum paths along which a sequence of flavor mixings and chirality flips take place. The coherence of this phenomenon in the primeval plasma is limited by the fast quark-gluon interactions. At the electroweak era, this phenomenon of decoherence forbids a successful baryogenesis based on the sole CP violation of the CKM matrix

  14. CP violation in rare K decays

    International Nuclear Information System (INIS)

    Ecker, G.

    1990-01-01

    The investigation of rare K decays calls for a unified treatment of short- and long-distance aspects as provided by chiral perturbation theory. For the standard model with three generations, the theoretical predictions for signals of CP violation in those decays are reviewed. With direct CP violation as the main target, special emphasis is given to the charge asymmetries in charged K decays and to the especially rare decays K L → π 0 ll-bar. Time dependent rate asymmetries in K 0 decays and the longitudinal muon polarization in K L → μ + μ - are also discussed. 50 refs., 3 figs., 1 tab. (Author)

  15. Experimental Bell-inequality violation without the postselection loophole

    International Nuclear Information System (INIS)

    Lima, G.; Vallone, G.; Chiuri, A.; Cabello, A.; Mataloni, P.

    2010-01-01

    We report on an experimental violation of the Bell-Clauser-Horne-Shimony-Holt (Bell-CHSH) inequality using energy-time-entangled photons. The experiment is not free of the locality and detection loopholes but is the first violation of the Bell-CHSH inequality using energy-time entangled photons which is free of the postselection loophole described by Aerts et al. [Phys. Rev. Lett. 83, 2872 (1999)].

  16. Local models violating Bell's inequality by time delays

    International Nuclear Information System (INIS)

    Scalera, G.C.

    1984-01-01

    The performance of ensemble averages is neither a sufficient nor a necessary condition to avoid Bell's inequality violations characteristic of nonergodic systems. Slight modifications of a local nonergodic logical model violating Bell's inequality produce a stochastic model exactly fitting the quantum-mechanical correlation function. From these considerations is appears evident that the last experiments on the existence of local hidden variables are not conclusive

  17. Quark flavor mixing, CP violation, and all that

    International Nuclear Information System (INIS)

    Gilman, F.J.

    1988-04-01

    We review the present state of knowledge of the mixing of quark flavors under weak interactions and the associated explanation of CP violation inherent in the single nontrivial phase present in the three-generation mixing matrix. In this context we present the phenomenological basis for the increasing possibility that large CP violation asymmetries can be experimentally observed in the B meson system. 39 refs., 11 figs.,

  18. 24 CFR 30.20 - Ethical violations by HUD employees.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Ethical violations by HUD employees. 30.20 Section 30.20 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development CIVIL MONEY PENALTIES: CERTAIN PROHIBITED CONDUCT Violations § 30.20 Ethical...

  19. Krsko NPP Periodic Safety Review program

    International Nuclear Information System (INIS)

    Basic, I.; Spiler, J.; Novsak, M.

    2001-01-01

    The need for conducting a Periodic Safety Review for the Krsko NPP has been clearly recognized both by the NEK and the regulator (SNSA). The PSR would be highly desirable both in the light of current trends in safety oversight practices and because of many benefits it is capable to provide. On January 11, 2001 the SNSA issued a decision requesting the Krsko NPP to prepare a program and determine a schedule for the implementation of the program for 'Periodic Safety Review of NPP Krsko'. The program, which is required to be in accordance with the IAEA safety philosophy and with the EU practice, was submitted for the approval to the SNSA by the end of March 2001. The paper summarizes Krsko NPP Periodic Safety Review Program [1] including implemented SNSA and IAEA Expert Mission comments.(author)

  20. 77 FR 51848 - Pipeline Safety: Information Collection Activities

    Science.gov (United States)

    2012-08-27

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... Program for Gas Distribution Pipelines. DATES: Interested persons are invited to submit comments on or.... These regulations require operators of hazardous liquid pipelines and gas pipelines to develop and...

  1. CP Violation in Single Top Quark Production

    Energy Technology Data Exchange (ETDEWEB)

    Geng, Weigang [Michigan State Univ., East Lansing, MI (United States)

    2012-01-01

    We present a search for CP violation in single top quark production with the DØ experiment at the Tevatron proton-antiproton collider. CP violation in the top electroweak interaction results in different single top quark production cross sections for top and antitop quarks. We perform the search in the single top quark final state using 5.4 fb-1 of data, in the s-channel, t-channel, and for both combined. At this time, we do not see an observable CP asymmetry.

  2. Maximal CP violation via Higgs-boson exchange

    International Nuclear Information System (INIS)

    Lavoura, L.

    1992-01-01

    The unitarity of the mixing matrix of the charged Higgs bosons, and the orthogonality of the mixing matrix of the neutral Higgs bosons, are used to derive upper bounds on the values of general CP-violating expressions. The bounds are independent of the total number of Higgs fields in any specific model. They allow is to relax the usual assumption of only one Higgs boson being light. It is natural that the CP violation in the exchange of neutral Higgs bosons between bottom quarks be particularly large

  3. Flavour physics and CP violation

    Indian Academy of Sciences (India)

    status and prospectives of the flavour physics associated with the strange, charm and .... might reveal something completely unexpected. Standard Model weak ..... Thus, in order to have an observable CP violation effect in the SM, the mixing.

  4. Top searches and R-parity violation at hadron colliders

    International Nuclear Information System (INIS)

    Dreiner, H.

    1991-07-01

    In R p -violating supersymmetric theories there are new 2-body top quark decays which can substantially suppress the branching fraction of the Standard Model process t → bW + → bl + υ 1 . With some choices of the dominant R p -violating operator the CDF top-quark mass bound can be lowered below the LEP bound. With other choices, however, leptonic signals from top decay become much stronger; in such scenarios the bounds on the top quark mass become more stringent than the Standard Model bounds. In future top quark searches R p -violating decays could lead to the most prominent signals. (author)

  5. Enhanced lepton flavour violation in the supersymmetric inverse seesaw

    International Nuclear Information System (INIS)

    Weiland, C

    2013-01-01

    In minimal supersymmetric seesaw models, the contribution to lepton flavour violation from Z-penguins is usually negligible. In this study, we consider the supersymmetric inverse seesaw and show that, in this case, the Z-penguin contribution dominates in several lepton flavour violating observables due to the low scale of the inverse seesaw mechanism. Among the observables considered, we find that the most constraining one is the μ-e conversion rate which is already restricting the otherwise allowed parameter space of the model. Moreover, in this framework, the Z-penguins exhibit a non-decoupling behaviour, which has previously been noticed in lepton flavour violating Higgs decays

  6. Violating Bell inequalities maximally for two d-dimensional systems

    International Nuclear Information System (INIS)

    Chen Jingling; Wu Chunfeng; Oh, C. H.; Kwek, L. C.; Ge Molin

    2006-01-01

    We show the maximal violation of Bell inequalities for two d-dimensional systems by using the method of the Bell operator. The maximal violation corresponds to the maximal eigenvalue of the Bell operator matrix. The eigenvectors corresponding to these eigenvalues are described by asymmetric entangled states. We estimate the maximum value of the eigenvalue for large dimension. A family of elegant entangled states |Ψ> app that violate Bell inequality more strongly than the maximally entangled state but are somewhat close to these eigenvectors is presented. These approximate states can potentially be useful for quantum cryptography as well as many other important fields of quantum information

  7. An introduction to baryon violation in standard electroweak theory

    International Nuclear Information System (INIS)

    Arnold, P.B.

    1990-12-01

    I shall begin with a qualitative overview of the anomaly and B violation at zero and non-zero temperature, demonstrating how these processes may be understood on the back of an envelope. Then I shall discuss a part of the formalism necessary for doing calculations in more detail. Specifically, B violation is related to various solutions to the Euclidean equations of motion; instantons, sphalerons, and calorons (also called periodic instantons). The applicability of the various solutions may be understood by analogies with elementary quantum mechanics problems. Finally, I shall touch upon the computation of high-energy B violation mentioned above. 29 refs., 11 figs

  8. A Geometric Approach to CP Violation: Applications to the MCPMFV SUSY Model

    CERN Document Server

    Ellis, John; Pilaftsis, Apostolos

    2010-01-01

    We analyze the constraints imposed by experimental upper limits on electric dipole moments (EDMs) within the Maximally CP- and Minimally Flavour-Violating (MCPMFV) version of the MSSM. Since the MCPMFV scenario has 6 non-standard CP-violating phases, in addition to the CP-odd QCD vacuum phase \\theta_QCD, cancellations may occur among the CP-violating contributions to the three measured EDMs, those of the Thallium, neutron and Mercury, leaving open the possibility of relatively large values of the other CP-violating observables. We develop a novel geometric method that uses the small-phase approximation as a starting point, takes the existing EDM constraints into account, and enables us to find maximal values of other CP-violating observables, such as the EDMs of the Deuteron and muon, the CP-violating asymmetry in b --> s \\gamma decay, and the B_s mixing phase. We apply this geometric method to provide upper limits on these observables within specific benchmark supersymmetric scenarios, including extensions t...

  9. CP violation in a multi-Higgs-doublet model with flavor-changing neutral currents

    International Nuclear Information System (INIS)

    Deshpande, N.G.; He, X.

    1994-01-01

    We study CP violation in multi-Higgs-doublet model based on a S 3 xZ 3 horizontal symmetry where the CKM phase is not the principal source of CP violation. We consider two mechanisms for CP violation in this model: (a) CP violation due to complex Yukawa couplings, and (b) CP violation due to scalar-pseudoscalar Higgs boson mixings. Both mechanisms can explain the observed CP violation in the neutral kaon system. ε'/ε due to neutral Higgs boson exchange is small in both mechanisms, but charged Higgs boson contributions can be as large as 10 -4 for (a) and 10 -3 for (b). CP violation in the neutral B system is, however, quite different from the minimal standard model. The neutron electric dipole moment can be as large as the present experimental bound, and can be used to constrain charged Higgs boson masses. The electron EDM is one order of magnitude below the experimental bound in case (b) and smaller in case (a)

  10. 76 FR 13638 - Ensuring the Safety of Imported Foods and Animal Feed: Comparability of Food Safety Systems and...

    Science.gov (United States)

    2011-03-14

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration [Docket No. FDA-2011-N-0135..., to request onsite parking, or to submit the full text, comprehensive outline, or summary of an oral presentation: Juanita Yates, Center for Food Safety and Applied Nutrition, Food and Drug Administation, 5100...

  11. 29 CFR 825.402 - Violations of the posting requirement.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Violations of the posting requirement. 825.402 Section 825.402 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR OTHER LAWS THE FAMILY AND MEDICAL LEAVE ACT OF 1993 Enforcement Mechanisms § 825.402 Violations of the...

  12. 76 FR 14592 - Safety Management System; Withdrawal

    Science.gov (United States)

    2011-03-17

    ...), Federal Aviation Administration, 800 Independence Avenue, SW., Washington, DC 20591; telephone (202) 494...). The FAA also chartered the Safety Management System Aviation Rulemaking Committee (ARC) (Order No..., including the ANPRM. On March 31, 2010, the ARC submitted its report to the FAA. As a result of the...

  13. Violation of a Bell-like inequality in neutron-interferometer experiments

    International Nuclear Information System (INIS)

    Hasegawa, Yuji; Badurek, Gerald; Rauch, Helmut; Loidl, Rudolf; Baron, Matthias

    2003-01-01

    We report an interferometric experiment with spin-1/2 neutrons to demonstrate the violation of a Bell-like inequality. The total wave function of neutrons is described by a tensor product Hilbert space. Appropriate combinations of the direction of the spin analysis and the position of the phase shifter allow to demonstrate the violation of the Bell-like inequality. The discussions are presented on the violation of the Bell-like inequality in terms of quantum contextuality and an entanglement-induced correlation in our experiment. (author)

  14. Violation of the Cauchy-Schwarz inequality in collective Raman scattering

    International Nuclear Information System (INIS)

    Shumovskij, A.S.; Tran Quang

    1988-01-01

    The violation of Cauchy-Schwarz (C-S) inequality for correlations between spectrum components of the Reyleigh line and between components of the Stokes line in the collective Raman scattering is discussed. It is shown that the violation of the C-S inequailty occurs only in the Rayleigh line, moreover, for the sidebands of the Rayleigh line the violation of the C-S inequality takes place for a large number of atoms, which means that this quantum effect has the macroscopic nature. 20 refs.; 3 figs

  15. New signatures of flavor violating Higgs couplings

    Energy Technology Data Exchange (ETDEWEB)

    Buschmann, Malte; Kopp, Joachim; Liu, Jia; Wang, Xiao-Ping [PRISMA Cluster of Excellence and Mainz Institute for Theoretical Physics,Johannes Gutenberg University, 55099 Mainz (Germany)

    2016-06-24

    We explore several novel LHC signatures arising from quark or lepton flavor violating couplings in the Higgs sector, and we constrain such couplings using LHC data. Since the largest signals are possible in channels involving top quarks or tau leptons, we consider in particular the following flavor violating processes: (1) pp→thh (top plus di-Higgs final state) arising from a dimension six coupling of up-type quarks to three insertions of the Higgs field. We develop a search strategy for this final state and demonstrate that detection is possible at the high luminosity LHC if flavor violating top-up-Higgs couplings are not too far below the current limit. (2) pp→tH{sup 0}, where H{sup 0} is the heavy neutral CP-even Higgs boson in a two Higgs doublet model (2HDM). We consider the decay channels H{sup 0}→tu,WW,ZZ,hh and use existing LHC data to constrain the first three of them. For the fourth, we adapt our search for the thh final state, and we demonstrate that in large regions of the parameter space, it is superior to other searches, including searches for flavor violating top quark decays (t→hq). (3) H{sup 0}→τμ, again in the context of a 2HDM. This channel is particularly well motivated by the recent CMS excess in h→τμ, and we use the data from this search to constrain the properties of H{sup 0}.

  16. Design for safety: theoretical framework of the safety aspect of BIM system to determine the safety index

    Directory of Open Access Journals (Sweden)

    Ai Lin Evelyn Teo

    2016-12-01

    Full Text Available Despite the safety improvement drive that has been implemented in the construction industry in Singapore for many years, the industry continues to report the highest number of workplace fatalities, compared to other industries. The purpose of this paper is to discuss the theoretical framework of the safety aspect of a proposed BIM System to determine a Safety Index. An online questionnaire survey was conducted to ascertain the current workplace safety and health situation in the construction industry and explore how BIM can be used to improve safety performance in the industry. A safety hazard library was developed based on the main contributors to fatal accidents in the construction industry, determined from the formal records and existing literature, and a series of discussions with representatives from the Workplace Safety and Health Institute (WSH Institute in Singapore. The results from the survey suggested that the majority of the firms have implemented the necessary policies, programmes and procedures on Workplace Safety and Health (WSH practices. However, BIM is still not widely applied or explored beyond the mandatory requirement that building plans should be submitted to the authorities for approval in BIM format. This paper presents a discussion of the safety aspect of the Intelligent Productivity and Safety System (IPASS developed in the study. IPASS is an intelligent system incorporating the buildable design concept, theory on the detection, prevention and control of hazards, and the Construction Safety Audit Scoring System (ConSASS. The system is based on the premise that safety should be considered at the design stage, and BIM can be an effective tool to facilitate the efforts to enhance safety performance. IPASS allows users to analyse and monitor key aspects of the safety performance of the project before the project starts and as the project progresses.

  17. A mini review on CP-violating minimal supersymmetric Standard

    Indian Academy of Sciences (India)

    We discuss the present status of the Higgs sector of the CP-violating minimal supersymmetric Standard Model (CPVMSSM). In the Standard Model (SM) of particle physics, the only source of CP violation is the complex phase in the Cabibbo–Kobayashi–Maskawa (CKM) matrix. By now we all know that this singlephase is ...

  18. Searching for QCD-violations in deep inelastic structure functions

    International Nuclear Information System (INIS)

    Avilez, C.; Garcia Canal, C.A.; Gay Ducati, M.B.; Martins Simoes, J.A.

    1979-01-01

    Due to the difficulties in extracting information from data of different experiments, a systematic procedure to look for QCD-violations in the Q 2 -dependence of F 2 is discussed. The validity of the Callan-Gross relation is assumed. The proposal is illustrated in a well-known model which implies QCD-violations

  19. The status of nuclear safety of Ukrainian NPPS and evaluations by ASSET methodology

    International Nuclear Information System (INIS)

    Koltakov, V.

    1997-01-01

    The presentation discusses the following issues: nuclear power plants and research reactors; electricity production and operating personnel; status of nuclear safety at NPPs of Ukraine; operation of Ukrainian NPPs; violations of NPPs operation; short review of ASSET missions; experience of feedback process. Figs, tabs

  20. The status of nuclear safety of Ukrainian NPPS and evaluations by ASSET methodology

    Energy Technology Data Exchange (ETDEWEB)

    Koltakov, V [State Scientific and Technical Center on Nuclear and Radiational Safety, Kiev (Ukraine)

    1997-10-01

    The presentation discusses the following issues: nuclear power plants and research reactors; electricity production and operating personnel; status of nuclear safety at NPPs of Ukraine; operation of Ukrainian NPPs; violations of NPPs operation; short review of ASSET missions; experience of feedback process. Figs, tabs.

  1. Comments on nuclear reactor safety in Ontario

    International Nuclear Information System (INIS)

    1987-08-01

    The Chalk River Technicians and Technologists Union representing 500 technical employees at the Chalk River Nuclear Laboratories of AECL submit comments on nuclear reactor safety to the Ontario Nuclear Safety Review. Issues identified by the Review Commissioner are addressed from the perspective of both a labour organization and experience in the nuclear R and D field. In general, Local 1568 believes Ontario's CANDU nuclear reactors are not only safe but also essential to the continued economic prosperity of the province

  2. Constraints on CP violating four-fermion interactions

    International Nuclear Information System (INIS)

    He, X.G.; McKellar, B.

    1996-04-01

    It has been shown that CP violating electron-nucleon and nucleon-nucleon interactions can induce atomic electric dipole moments and are therefore constrained from experimental data. We show that using the experimental upper bounds on neutron and electron electric dipole moments, one can also obtain constraints, in some cases better ones, on these interactions. In addition stringent constraints can also be obtained for muon-quark and tauon-quark four-fermion CP violating interactions, which cannot be constrained from atomic electric dipole moment experiments. 12 refs., 2 tabs., 1 fig

  3. Thermal fluctuations in a hyperscaling-violation background

    Energy Technology Data Exchange (ETDEWEB)

    Pourhassan, Behnam [Damghan University, School of Physics, Damghan (Iran, Islamic Republic of); Faizal, Mir [University of British Columbia-Okanagan, Irving K. Barber School of Arts and Sciences, Kelowna, BC (Canada); University of Lethbridge, Department of Physics and Astronomy, Lethbridge, AB (Canada); Upadhyay, Sudhaker [Indian Institute of Technology Kharagpur, Centre for Theoretical Studies, Kharagpur (India); Al Asfar, Lina [Universite Blaise Pascal, Laboratoire de Physique Corpusculaire de Clermont-Ferrand, Aubiere (France)

    2017-08-15

    In this paper, we study the effect of thermal fluctuations on the thermodynamics of a black geometry with hyperscaling violation. These thermal fluctuations in the thermodynamics of this system are produced from quantum corrections of geometry describing this system. We discuss the stability of this system using specific heat and the entire Hessian matrix of the free energy. We will analyze the effects of thermal fluctuations on the stability of this system. We also analyze the effects of thermal fluctuations on the criticality of the hyperscaling-violation background. (orig.)

  4. The seesaw path to leptonic CP violation

    CERN Document Server

    Caputo, A.; Kekic, M.; López-Pavón, J.; Salvado, J.

    2017-04-24

    Future experiments such as SHiP and high-intensity $e^+ e^-$ colliders will have a superb sensitivity to heavy Majorana neutrinos with masses below $M_Z$. We show that the measurement of the mixing to electrons and muons of one such state could imply the discovery of leptonic CP violation in the context of seesaw models. We quantify in the minimal model the CP discovery potential of these future experiments, and demonstrate that a 5$\\sigma$ CL discovery of leptonic CP violation would be possible in a very significant fraction of parameter space.

  5. CP Violation in b- and c-hadron decays at LHCb

    Science.gov (United States)

    Steinkamp, Olaf; LHCb Collaboration

    2017-07-01

    Testing the Standard Model of particle physics by precision measurements of CP violating observables in the decays of b and c hadrons has been one of the design goals of the LHCb experiment. World-leading measurements have been performed of the semileptonic asymmetry, {a}ssl, and of the mixing-induced CP-violating phase ϕs in the {B}s0{\\bar{B}}s0 system. The CKM angle γ is still the least known angle of the Unitarity Triangle, and the only one easily accessible using tree-level decays. A recent combination of LHCb measurements in various B → DK decay modes has yielded the most precise determination of γ from a single experiment to date. The LHCb experiment is collecting unprecedented samples of beauty baryons, allowing for the first time to study CP violating observables in their decays. A recent analysis provided the first evidence for CP violation in the beauty baryon sector. Finally, LHCb has the largest samples of charmed hadron decays collected by any experiment to date. These samples yield some of the world’s most sensitive searches for direct and indirect CP violation in the charm sector.

  6. Disgust and Anger Relate to Different Aggressive Responses to Moral Violations

    Science.gov (United States)

    Molho, Catherine; Tybur, Joshua M.; Güler, Ezgi; Balliet, Daniel; Hofmann, Wilhelm

    2017-01-01

    In response to the same moral violation, some people report experiencing anger, and others report feeling disgust. Do differences in emotional responses to moral violations reflect idiosyncratic differences in the communication of outrage, or do they reflect differences in motivational states? Whereas equivalence accounts suggest that anger and disgust are interchangeable expressions of condemnation, sociofunctional accounts suggest that they have distinct antecedents and consequences. We tested these accounts by investigating whether anger and disgust vary depending on the costs imposed by moral violations and whether they differentially correspond with aggressive tendencies. Results across four studies favor a sociofunctional account: When the target of a moral violation shifts from the self to another person, anger decreases, but disgust increases. Whereas anger is associated with high-cost, direct aggression, disgust is associated with less costly indirect aggression. Finally, whether the target of a moral violation is the self or another person influences direct aggression partially via anger and influences indirect aggression partially via disgust. PMID:28485700

  7. On the Universality of CP Violation in Delta F = 1 Processes

    CERN Document Server

    Gedalia, Oram; Ligeti, Zoltan; Perez, Gilad

    2012-01-01

    We show that new physics that breaks the left-handed SU(3)_Q quark flavor symmetry induces contributions to CP violation in Delta F = 1 processes which are approximately universal, in that they are not affected by flavor rotations between the up and the down mass bases. Therefore, such flavor violation cannot be aligned, and is constrained by the strongest bound from either the up or the down sectors. We use this result to show that the bound from eps'/eps prohibits an SU(3)_Q breaking explanation of the recent LHCb evidence for CP violation in D meson decays. Another consequence of this universality is that supersymmetric alignment models with a moderate mediation scale are consistent with the data, and are harder to probe via CP violating observables. With current constraints, therefore, squarks need not be degenerate. However, future improvements in the measurement of CP violation in D-Dbar mixing will start to probe alignment models.

  8. Nuclear Safety Review for the Year 2012

    International Nuclear Information System (INIS)

    2012-07-01

    The Nuclear Safety Review for the Year 2012 contains an analytical overview of the dominant trends, issues and challenges worldwide in 2011 and the Agency's efforts to strengthen the global nuclear safety framework. This year's report also highlights issues and activities related to the accident at the Fukushima Daiichi nuclear power plant. The analytical overview is supported by the Appendix at the end of this document, entitled: The IAEA Safety Standards: Activities during 2011. A draft version of the Nuclear Safety Review for the Year 2012 was submitted to the March 2012 session of the Board of Governors in document GOV/2012/6. The final version of the Nuclear Safety Review for the Year 2012 was prepared in light of the discussions held during the Board of Governors and also of the comments received.

  9. Large violation of Bell inequalities using both particle andwave measurements

    International Nuclear Information System (INIS)

    Cavalcanti, Daniel; Brunner, Nicolas; Skrzypczyk, Paul; Salles, Alejo; Scarani, Valerio

    2011-01-01

    When separated measurements on entangled quantum systems are performed, the theory predicts correlations that cannot be explained by any classical mechanism: communication is excluded because the signal should travel faster than light; preestablished agreement is excluded because Bell inequalities are violated. All optical demonstrations of such violations have involved discrete degrees of freedom and are plagued by the detection-efficiency loophole. A promising alternative is to use continuous variables combined with highly efficient homodyne measurements. However, all the schemes proposed so far use states or measurements that are extremely difficult to achieve, or they produce very weak violations. We present a simple method to generate large violations for feasible states using both photon counting and homodyne detections. The present scheme can also be used to obtain nonlocality from easy-to-prepare Gaussian states (e.g., two-mode squeezed state).

  10. Is CP violation observable in long baseline neutrino oscillation experiments?

    International Nuclear Information System (INIS)

    Tanimoto, M.

    1997-01-01

    We have studied CP violation originating from the phase of the neutrino-mixing matrix in the long baseline neutrino oscillation experiments. The direct measurement of CP violation is the difference of the transition probabilities between CP-conjugate channels. In those experiments, the CP-violating effect is not suppressed if the highest neutrino mass scale is taken to be 1 endash 5 eV, which is appropriate for the cosmological hot dark matter. Assuming the hierarchy for the neutrino masses, the upper bounds of CP violation have been calculated for three cases, in which mixings are constrained by the recent short baseline ones. The calculated upper bounds are larger than 10 -2 , which will be observable in the long baseline accelerator experiments. The matter effect, which is not CP invariant, has been also estimated in those experiments. copyright 1997 The American Physical Society

  11. 50 years of CP violation — What have we learned?

    Energy Technology Data Exchange (ETDEWEB)

    McKellar, Bruce H. J. [Centre of Excellence for Particle Physics at the Terrascale School of Physics, University of Melbourne, Australia 3010 (Australia)

    2015-04-24

    Early after the discovery of CP violation, the explanation of how the Standard Model of particle physics could allow CP violation was quickly given, but it took many years for the original observation to be unequivocally explained on that basis. It was also proposed that this observation opened up the possibility that we could now explain the fact that the universe is made of matter. Remarkably, 50 years later we have no evidence in particle physics that there is any CP violation except that of the Kobayashi Maskawa mechanism of the standard model. Yet we fail completely to explain the baryon asymmetry of the Universe through that mechanism. After reviewing the main points in the history I describe the present experimental attempts to find CP violation beyond the standard model, and explain the theoretical attempts to explain the matter in the Universe.

  12. Large violation of Bell inequalities using both particle andwave measurements

    Energy Technology Data Exchange (ETDEWEB)

    Cavalcanti, Daniel [Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543 (Singapore); Brunner, Nicolas; Skrzypczyk, Paul [H. H. Wills Physics Laboratory, University of Bristol, Tyndall Avenue, Bristol BS8 1TL (United Kingdom); Salles, Alejo [Niels Bohr Institute, Blegdamsvej 17, DK-2100 Copenhagen (Denmark); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543 (Singapore); Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542 (Singapore)

    2011-08-15

    When separated measurements on entangled quantum systems are performed, the theory predicts correlations that cannot be explained by any classical mechanism: communication is excluded because the signal should travel faster than light; preestablished agreement is excluded because Bell inequalities are violated. All optical demonstrations of such violations have involved discrete degrees of freedom and are plagued by the detection-efficiency loophole. A promising alternative is to use continuous variables combined with highly efficient homodyne measurements. However, all the schemes proposed so far use states or measurements that are extremely difficult to achieve, or they produce very weak violations. We present a simple method to generate large violations for feasible states using both photon counting and homodyne detections. The present scheme can also be used to obtain nonlocality from easy-to-prepare Gaussian states (e.g., two-mode squeezed state).

  13. How preschoolers react to norm violations is associated with culture.

    Science.gov (United States)

    Gampe, Anja; Daum, Moritz M

    2018-01-01

    Children from the age of 3years understand social norms as such and enforce these norms in interactions with others. Differences in parental and institutional education across cultures make it likely that children receive divergent information about how to act in cases of norm violations. In the current study, we investigated whether cultural values are associated with the ways in which children react to norm violations. We tested 80 bicultural 3-year-olds with a norm enforcement paradigm and analyzed their reactions to norm violations. The reactions were correlated to the children's parental cultural values using the Global Leadership and Organizational Behavior Effectiveness (GLOBE) scales, and these results show that parental culture was associated with children's reactions to norm violations. The three strongest correlations were found for institutional collectivism, performance orientation, and assertiveness. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Systematic Approach to Gauge-Invariant Relations between Lepton Flavor Violating Processes

    CERN Document Server

    Ibarra, A; Redondo, J; Ibarra, Alejandro; Masso, Eduard; Redondo, Javier

    2005-01-01

    We analyze four-lepton contact interactions that lead to lepton flavor violating processes, with violation of individual family lepton number but total lepton number conserved. In an effective Lagrangian framework, the assumption of gauge invariance leads to relations among branching ratios and cross sections of lepton flavor violating processes. In this paper, we work out how to use these relations systematically. We also study the consequences of loop-induced processes.

  15. Parity violation in nuclei

    International Nuclear Information System (INIS)

    Robertson, R.G.H.

    1980-01-01

    A summary of parity violating effects in nuclei is given. Thanks to vigorous experimental and theoretical effort, it now appears that a reasonably well-defined value for the weak isovector π-nucleon coupling constant can be obtained. There is one major uncertainty in the analysis, namely the M2/E1 mixing ratio for the 2.79 MeV transition in 21 Ne. This quantity is virtually impossible to calculate reliably and must be measured. If it turns out to be much larger than 1, then a null result in 21 Ne is expected no matter what the weak interaction, so an experimental determination is urgently needed. The most promising approach is perhaps a measurement of the pair internal conversion coefficient. Of course, a direct measurement of a pure isovector case is highly desirable, and it is to be hoped that the four ΔT = 1 experiments will be pushed still further, and that improved calculations will be made for the 6 Li case. Nuclear parity violation seems to be rapidly approaching an interesting and useful synthesis

  16. Formulating weak CP-violation in terms of quark mass hierarchies

    International Nuclear Information System (INIS)

    Davidson, A.

    1982-06-01

    That physics which explains Cabibbo mixing is shown to also put a lower bound on Kobayashi-Maskawa CP-violation. The observed amount epsilon = 0.002 of CP-violation in the Ksub(L) - Ksub(S) system in turn sharply requires 25 GeV <= msub(t) <= 59 GeV; msub(t) being the top-quark mass. Assuming a vanishing weak (ala strong) CP-violation amplitude for msub(u) → 0, as strongly indicated by the data, epsilon is formulated as a second order quantity in the fermionic mass hierarchy. (author)

  17. Structural aspects of Lorentz-violating quantum field theory

    Science.gov (United States)

    Cambiaso, M.; Lehnert, R.; Potting, R.

    2018-01-01

    In the last couple of decades the Standard Model Extension has emerged as a fruitful framework to analyze the empirical and theoretical extent of the validity of cornerstones of modern particle physics, namely, of Special Relativity and of the discrete symmetries C, P and T (or some combinations of these). The Standard Model Extension allows to contrast high-precision experimental tests with posited alterations representing minute Lorentz and/or CPT violations. To date no violation of these symmetry principles has been observed in experiments, mostly prompted by the Standard-Model Extension. From the latter, bounds on the extent of departures from Lorentz and CPT symmetries can be obtained with ever increasing accuracy. These analyses have been mostly focused on tree-level processes. In this presentation I would like to comment on structural aspects of perturbative Lorentz violating quantum field theory. I will show that some insight coming from radiative corrections demands a careful reassessment of perturbation theory. Specifically I will argue that both the standard renormalization procedure as well as the Lehmann-Symanzik-Zimmermann reduction formalism need to be adapted given that the asymptotic single-particle states can receive quantum corrections from Lorentz-violating operators that are not present in the original Lagrangian.

  18. Leptogenesis and low energy CP-violation in neutrino physics

    International Nuclear Information System (INIS)

    Pascoli, S.; Petcov, S.T.; Riotto, A.

    2007-01-01

    Taking into account the recent progress in the understanding of the lepton flavor effects in leptogenesis, we investigate in detail the possibility that the CP-violation necessary for the generation of the baryon asymmetry of the Universe is due exclusively to the Dirac and/or Majorana CP-violating phases in the PMNS neutrino mixing matrix U, and thus is directly related to the low energy CP-violation in the lepton sector (e.g., in neutrino oscillations, etc.). We first derive the conditions of CP-invariance of the neutrino Yukawa couplings λ in the see-saw Lagrangian, and of the complex orthogonal matrix R in the 'orthogonal' parametrization of λ. We show, e.g. that under certain conditions (i) real R and specific CP-conserving values of the Majorana and Dirac phases can imply CP-violation, and (ii) purely imaginary R does not necessarily imply breaking of CP-symmetry. We study in detail the case of hierarchical heavy Majorana neutrino mass spectrum, presenting results for three possible types of light neutrino mass spectrum: (i) normal hierarchical, (ii) inverted hierarchical, and (iii) quasi-degenerate. Results in the alternative case of quasi-degenerate in mass heavy Majorana neutrinos, are also derived. The minimal supersymmetric extension of the standard theory with right-handed Majorana neutrinos and see-saw mechanism of neutrino mass generation is discussed as well. We illustrate the possible correlations between the baryon asymmetry of the Universe and (i) the rephasing invariant J CP controlling the magnitude of CP-violation in neutrino oscillations, or (ii) the effective Majorana mass in neutrinoless double beta decay, in the cases when the only source of CP-violation is respectively the Dirac or the Majorana phases in the neutrino mixing matrix

  19. Optimal quantum violation of Clauser–Horne–Shimony–Holt like steering inequality

    International Nuclear Information System (INIS)

    Roy, Arup; Sankar Bhattacharya, Some; Mukherjee, Amit; Banik, Manik

    2015-01-01

    We study a recently proposed Einstein–Podolsky–Rosen steering inequality (Cavalcanti et al 2015 J. Opt. Soc. Am. B 32 A74–A81). Analogous to Clauser–Horne–Shimony–Holt (CHSH) inequality for Bell nonlocality, in the simplest scenario, i.e., two parties, two measurements per party and two outcomes per measurement, this newly proposed inequality has been proved to be necessary and sufficient for steering. In this article we find the optimal violation amount of this inequality in quantum theory. Interestingly, the optimal violation amount matches with optimal quantum violation of CHSH inequality, i.e., Cirel’son quantity. We further study the optimal violation of this inequality for different classes of 2-qubit quantum states. (paper)

  20. CP-violating MSSM Higgs bosons in the light of LEP 2

    International Nuclear Information System (INIS)

    Carena, M.; Ellis, J.; Pilaftsis, A.; Wagner, C.E.M.

    2000-01-01

    In the MSSM, the CP parities of the neutral Higgs bosons may be mixed by radiative effects induced by explicit CP violation in the third generation of squarks. To allow for this possibility, we argue that the charged Higgs-boson mass and tanβ should be used to parametrize the MSSM Higgs sector. We introduce a new benchmark scenario of maximal CP violation appropriate for direct searches of CP-violating MSSM Higgs bosons. We show that the bounds established by LEP 2 on the MSSM Higgs sector may be substantially relaxed at low and intermediate values of tanβ in the presence of CP violation, and comment on possible Higgs boson signatures at LEP 2 within this framework.

  1. Optimal behaviour can violate the principle of regularity.

    Science.gov (United States)

    Trimmer, Pete C

    2013-07-22

    Understanding decisions is a fundamental aim of behavioural ecology, psychology and economics. The regularity axiom of utility theory holds that a preference between options should be maintained when other options are made available. Empirical studies have shown that animals violate regularity but this has not been understood from a theoretical perspective, such decisions have therefore been labelled as irrational. Here, I use models of state-dependent behaviour to demonstrate that choices can violate regularity even when behavioural strategies are optimal. I also show that the range of conditions over which regularity should be violated can be larger when options do not always persist into the future. Consequently, utility theory--based on axioms, including transitivity, regularity and the independence of irrelevant alternatives--is undermined, because even alternatives that are never chosen by an animal (in its current state) can be relevant to a decision.

  2. NASA Aviation Safety Reporting System (ASRS)

    Science.gov (United States)

    Connell, Linda J.

    2017-01-01

    The NASA Aviation Safety Reporting System (ASRS) collects, analyzes, and distributes de-identified safety information provided through confidentially submitted reports from frontline aviation personnel. Since its inception in 1976, the ASRS has collected over 1.4 million reports and has never breached the identity of the people sharing their information about events or safety issues. From this volume of data, the ASRS has released over 6,000 aviation safety alerts concerning potential hazards and safety concerns. The ASRS processes these reports, evaluates the information, and provides selected de-identified report information through the online ASRS Database at http:asrs.arc.nasa.gov. The NASA ASRS is also a founding member of the International Confidential Aviation Safety Systems (ICASS) group which is a collection of other national aviation reporting systems throughout the world. The ASRS model has also been replicated for application to improving safety in railroad, medical, fire fighting, and other domains. This presentation will discuss confidential, voluntary, and non-punitive reporting systems and their advantages in providing information for safety improvements.

  3. Keynote presentation : the psychology of safety

    Energy Technology Data Exchange (ETDEWEB)

    Groeneweg, J. [Leiden Univ., Leiden (Netherlands)

    2009-07-01

    This keynote presentation by a leading psychology researcher in the field of human error and violation discussed the skills necessary to apply psychological knowledge to real-life problems in working environments and organizations. In particular, it focused on the role of safety culture in accident prevention. The presentation highlighted recent developments in the prevention of human errors which result in the loss of business process control. Although the speaker's field of expertise is in the underlying factors that promote human error, his research has shifted to accident prevention in the petrochemical industry, including offshore installations around the world. This address to the delegates of the Canadian Dam Association (CDA) offered insight into the future of safety risk management through the management of human behaviour.

  4. 32 CFR 552.96 - Violations.

    Science.gov (United States)

    2010-07-01

    .... Lewis Area Access Section or the Military Police as soon as possible. ... Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Fort Lewis Land Use Policy § 552.96 Violations. Anyone...

  5. Techniques for studies of unbinned model independent CP violation

    Energy Technology Data Exchange (ETDEWEB)

    Bedford, Nicholas; Weisser, Constantin; Parkes, Chris; Gersabeck, Marco; Brodzicka, Jolanta; Chen, Shanzhen [University of Manchester (United Kingdom)

    2016-07-01

    Charge-Parity (CP) violation is a known part of the Standard Model and has been observed and measured in both the B and K meson systems. The observed levels, however, are insufficient to explain the observed matter-antimatter asymmetry in the Universe, and so other sources need to be found. One area of current investigation is the D meson system, where predicted levels of CP violation are much lower than in the B and K meson systems. This means that more sensitive methods are required when searching for CP violation in this system. Several unbinned model independent methods have been proposed for this purpose, all of which need to be optimised and their sensitivities compared.

  6. Maximal Bell's inequality violation for non-maximal entanglement

    International Nuclear Information System (INIS)

    Kobayashi, M.; Khanna, F.; Mann, A.; Revzen, M.; Santana, A.

    2004-01-01

    Bell's inequality violation (BIQV) for correlations of polarization is studied for a product state of two two-mode squeezed vacuum (TMSV) states. The violation allowed is shown to attain its maximal limit for all values of the squeezing parameter, ζ. We show via an explicit example that a state whose entanglement is not maximal allow maximal BIQV. The Wigner function of the state is non-negative and the average value of either polarization is nil

  7. Regulatory Expectations for Safety Culture

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Su Jin; Oh, Jang Jin; Choi, Young Sung [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2014-05-15

    The oversight of licensee's safety culture becomes an important issue that attracts great public and political concerns recently in Korea. Beginning from the intended violation of rules, a series of corruptions, documents forgery and disclosure of wrong-doings made the public think that the whole mindset of nuclear workers has been inadequate. Thus, they are demanding that safety culture shall be improved and that regulatory body shall play more roles and responsibilities for the improvements and oversight for them. This paper introduces, as an effort of regulatory side, recent changes in the role of regulators in safety culture, regulatory expectations on the desired status of licensee's safety culture, the pilot inspection program for safety culture and research activity for the development of oversight system. After the Fukushima accident in Japan 2011, many critics has searched for cultural factors that caused the unacceptable negligence pervaded in Japan nuclear society and the renewed emphasis has been placed on rebuilding safety culture by operators, regulators, and relevant institutions globally. Significant progress has been made in how to approach safety culture and led to a new perspective different from the existing normative assessment method both in operators and regulatory side. Regulatory expectations and oversight of them are based on such a new holistic concept for human, organizational and cultural elements to maintain and strengthen the integrity of defense in depth and consequently nuclear safety.

  8. Regulatory Expectations for Safety Culture

    International Nuclear Information System (INIS)

    Jung, Su Jin; Oh, Jang Jin; Choi, Young Sung

    2014-01-01

    The oversight of licensee's safety culture becomes an important issue that attracts great public and political concerns recently in Korea. Beginning from the intended violation of rules, a series of corruptions, documents forgery and disclosure of wrong-doings made the public think that the whole mindset of nuclear workers has been inadequate. Thus, they are demanding that safety culture shall be improved and that regulatory body shall play more roles and responsibilities for the improvements and oversight for them. This paper introduces, as an effort of regulatory side, recent changes in the role of regulators in safety culture, regulatory expectations on the desired status of licensee's safety culture, the pilot inspection program for safety culture and research activity for the development of oversight system. After the Fukushima accident in Japan 2011, many critics has searched for cultural factors that caused the unacceptable negligence pervaded in Japan nuclear society and the renewed emphasis has been placed on rebuilding safety culture by operators, regulators, and relevant institutions globally. Significant progress has been made in how to approach safety culture and led to a new perspective different from the existing normative assessment method both in operators and regulatory side. Regulatory expectations and oversight of them are based on such a new holistic concept for human, organizational and cultural elements to maintain and strengthen the integrity of defense in depth and consequently nuclear safety

  9. Parity violating electron scattering

    International Nuclear Information System (INIS)

    McKeown, R.D.

    1990-01-01

    Previous measurements of parity violation in electron scattering are reviewed with particular emphasis on experimental techniques. Significant progress in the attainment of higher precision is evident in these efforts. These pioneering experiments provide a basis for consideration of a future program of such measurements. In this paper some future plans and possibilities in this field are discussed

  10. Search for nonstandard model CP or T violation at the τ-charm factory

    International Nuclear Information System (INIS)

    Huang, T.; Lu, W.; Tao, Z.

    1997-01-01

    We systematically investigate the possibility of finding CP or T violation in the τ sector at the τ-charm factory. CP or T violation may occur in the τ pair production process, expressed as an electric dipole moment, and in τ decay processes. By assuming that an electric dipole moment as large as 10 -19 ecm and CP or T violation effects originating from τ decay as large as 10 -3 are observable at the τ-charm factory, we study all the possible extensions of the SM which are relevant for generating CP or T violation in the τ sector. And we point out, there are a few kinds of models which are hopeful candidates for generating such CP or T violation. For these models we consider all the theoretical and current experimental constraints and find that there exists some parameter space which will result in a measurable CP or T violation. Therefore we conclude that the τ-charm factory is a hopeful place to discover CP or T violation in the τ sector. copyright 1997 The American Physical Society

  11. The investigation of CP violation through the decay of polarized tau leptons II

    International Nuclear Information System (INIS)

    Tsai, Y.S.

    1996-05-01

    Under the assumption that CP violation is caused by exchange of anew boson, the authors propose to measure the magnitudes and CP-violating phases of the coupling constants of this boson to five different vertices in tau decay. This can be accomplished by studying the decay of polarized tau leptons produced at an e + e - collider whose beams are polarized. These five coupling constants could be used to construct a future theory of CP violation. If CP is violated in any channel of tau decay, it will imply that there exists a new charged boson other than the W boson responsible for CP violation. It will also imply that CP violation is much more prevalent than the standard theory predicts and this may enable one to understand the preponderance of matter over antimatter in the present universe

  12. 29 CFR 452.5 - Effect of violation on outcome.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Effect of violation on outcome. 452.5 Section 452.5 Labor... DISCLOSURE ACT OF 1959 General Considerations § 452.5 Effect of violation on outcome. Since the remedy under... affected the outcome of an election” 5 the Secretary as a matter of policy will not file suit to enforce...

  13. Flavored dark matter beyond Minimal Flavor Violation

    CERN Document Server

    Agrawal, Prateek; Gemmler, Katrin

    2014-10-13

    We study the interplay of flavor and dark matter phenomenology for models of flavored dark matter interacting with quarks. We allow an arbitrary flavor structure in the coupling of dark matter with quarks. This coupling is assumed to be the only new source of violation of the Standard Model flavor symmetry extended by a $U(3)_\\chi$ associated with the dark matter. We call this ansatz Dark Minimal Flavor Violation (DMFV) and highlight its various implications, including an unbroken discrete symmetry that can stabilize the dark matter. As an illustration we study a Dirac fermionic dark matter $\\chi$ which transforms as triplet under $U(3)_\\chi$, and is a singlet under the Standard Model. The dark matter couples to right-handed down-type quarks via a colored scalar mediator $\\phi$ with a coupling $\\lambda$. We identify a number of "flavor-safe" scenarios for the structure of $\\lambda$ which are beyond Minimal Flavor Violation. For dark matter and collider phenomenology we focus on the well-motivated case of $b$-...

  14. Black holes in Lorentz-violating gravity theories

    International Nuclear Information System (INIS)

    Barausse, Enrico; Sotiriou, Thomas P

    2013-01-01

    Lorentz symmetry and the notion of light cones play a central role in the definition of horizons and the existence of black holes. Current observations provide strong indications that astrophysical black holes do exist in Nature. Here we explore what happens to the notion of a black hole in gravity theories where local Lorentz symmetry is violated, and discuss the relevant astrophysical implications. Einstein-aether theory and Hořava gravity are used as the theoretical background for addressing this question. We review earlier results about static, spherically symmetric black holes, which demonstrate that in Lorentz-violating theories there can be a new type of horizon and, hence, a new notion of black hole. We also present both known and new results on slowly rotating black holes in these theories, which provide insights on how generic these new horizons are. Finally, we discuss the differences between black holes in Lorentz-violating theories and in General Relativity, and assess to what extent they can be probed with present and future observations. (paper)

  15. Safety assessment and quality control of medical x-ray facilities in some hospitals in Ghana

    International Nuclear Information System (INIS)

    Darko, E.O.; Charles, D.F.

    1998-01-01

    Safety assessment and quality control measurements of diagnostic x-ray installations were carried out in five hospitals in Ghana. The study was focused on the siting, design and construction of the buildings housing the x-ray units, assessment of safety systems and devices and measurements of the technical performance, and film processing conditions. The location, inadequacies in the design/construction, unavailability of relevant safety systems and devices, violation of basic safety principles and poor performance of some of the x-ray facilities indicate the need to improve quality control programmes, safety culture and enforcement of regulatory standards in diagnostic x-ray examinations in Ghana. (author). 8 refs., 11 tabs., 8 figs

  16. Using Occupational Safety and Health Administration accident investigations to study patterns in work fatalities.

    Science.gov (United States)

    Mendeloff, J M; Kagey, B T

    1990-11-01

    Investigations of fatalities by the Occupational Safety and Health Administration (OSHA) provide the most detailed available information about traumatic workplace deaths that are potentially related to violations of existing safety standards. Comparison of the number of such deaths investigated by OSHA from 1977 to 1986 with the comparable category of deaths reported to the Bureau of Labor Statistics Survey of Occupational Injuries and Illnesses indicates that the overall magnitudes have been roughly similar. The OSHA data contain more information than other sources and are especially valuable for analyses of fatalities at smaller workplaces. The OSHA data show that death rates decline sharply with establishment size; the inverted "U" pattern for lost workday injury rates is absent. Because accident investigations are conducted as part of an administrative system, the OSHA data can be influenced by changes in administrative policies. Changes over time in the percent of fatalities in which violations of OSHA standards were cited have clearly been influenced by changes in OSHA citation policy and thus do not provide a valid measure of the rate of violation-caused deaths. Realization of the epidemiological value of this data source depends upon a commitment from OSHA to maintain consistency in investigating accidents and to improve its data collection methods.

  17. 77 FR 52110 - Agency Response to Public Comments of Safety Measurement System Changes

    Science.gov (United States)

    2012-08-28

    ... (IEP) regulations; Aligning violations that are included in the SMS with Commercial Vehicle Safety... least one other BASIC. Better Align SMS With IEP Regulations Comments: Many of the commenters that..., FMCSA adopted regulations to require IEPs to: register and file with FMCSA an IEP Identification Report...

  18. Updated safety analysis of ITER

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Neill, E-mail: neill.taylor@iter.org [ITER Organization, CS 90 046, 13067 St Paul Lez Durance Cedex (France); Baker, Dennis; Ciattaglia, Sergio; Cortes, Pierre; Elbez-Uzan, Joelle; Iseli, Markus; Reyes, Susana; Rodriguez-Rodrigo, Lina; Rosanvallon, Sandrine; Topilski, Leonid [ITER Organization, CS 90 046, 13067 St Paul Lez Durance Cedex (France)

    2011-10-15

    An updated version of the ITER Preliminary Safety Report has been produced and submitted to the licensing authorities. It is revised and expanded in response to requests from the authorities after their review of an earlier version in 2008, to reflect enhancements in ITER safety provisions through design changes, to incorporate new and improved safety analyses and to take into account other ITER design evolution. The updated analyses show that changes to the Tokamak cooling water system design have enhanced confinement and reduced potential radiological releases as well as removing decay heat with very high reliability. New and updated accident scenario analyses, together with fire and explosion risk analyses, have shown that design provisions are sufficient to minimize the likelihood of accidents and reduce potential consequences to a very low level. Taken together, the improvements provided a stronger demonstration of the very good safety performance of the ITER design.

  19. Updated safety analysis of ITER

    International Nuclear Information System (INIS)

    Taylor, Neill; Baker, Dennis; Ciattaglia, Sergio; Cortes, Pierre; Elbez-Uzan, Joelle; Iseli, Markus; Reyes, Susana; Rodriguez-Rodrigo, Lina; Rosanvallon, Sandrine; Topilski, Leonid

    2011-01-01

    An updated version of the ITER Preliminary Safety Report has been produced and submitted to the licensing authorities. It is revised and expanded in response to requests from the authorities after their review of an earlier version in 2008, to reflect enhancements in ITER safety provisions through design changes, to incorporate new and improved safety analyses and to take into account other ITER design evolution. The updated analyses show that changes to the Tokamak cooling water system design have enhanced confinement and reduced potential radiological releases as well as removing decay heat with very high reliability. New and updated accident scenario analyses, together with fire and explosion risk analyses, have shown that design provisions are sufficient to minimize the likelihood of accidents and reduce potential consequences to a very low level. Taken together, the improvements provided a stronger demonstration of the very good safety performance of the ITER design.

  20. Guidelines regarding the Review Process under the Convention on Nuclear Safety

    International Nuclear Information System (INIS)

    2011-01-01

    These guidelines, established by the Contracting Parties pursuant to Article 22 of the Convention, are intended to be read in conjunction with the text of the Convention. Their purpose is to provide guidance to the Contracting Parties on the process for reviewing National Reports submitted in accordance with Article 5 and thereby to facilitate the efficient review of implementation by the Contracting Parties of their obligations under the Convention. The aim of the review process should be to achieve a thorough examination of National Reports submitted in accordance with Article 5 of the Convention, so that Contracting Parties can learn from each other's solutions to common and individual nuclear safety problems and, above all, contribute to improving nuclear safety worldwide through a constructive exchange of views [fr

  1. Guidelines regarding the review process under the Convention on Nuclear Safety

    International Nuclear Information System (INIS)

    2002-01-01

    These guidelines, established by the Contracting Parties pursuant to Article 22 of the Convention, are intended to be read in conjunction with the text of the Convention. Their purpose is to provide guidance to the Contracting Parties on the process for reviewing National Reports submitted in accordance with Article 5 and thereby to facilitate the efficient review of implementation by the Contracting Parties of their obligations under the Convention. The aim of the review process should be to achieve a thorough examination of National Reports submitted in accordance with Article 5 of the Convention, so that Contracting Parties can learn from each other's solutions to common and individual nuclear safety problems and, above all, contribute to improving nuclear safety worldwide through a constructive exchange of views

  2. Guidelines regarding the review process under the convention on nuclear safety

    International Nuclear Information System (INIS)

    1998-01-01

    These guidelines, established by the Contracting Parties pursuant to Article 22 of the Convention, are intended to be read in conjunction with the text of the Convention. Their purpose is to provide guidance to the Contracting Parties on the process for reviewing national reports submitted in accordance with Article 5 and thereby to facilitate the efficient review of implementation by the Contracting Parties of their obligations under the Convention. The aim of the review process should be to achieve a thorough examination of national reports submitted in accordance with Article 5 of the Convention, so that Contracting Parties can learn from each other's solutions to common and individual nuclear safety problems and, above all, contribute to improving nuclear safety worldwide through a constructive exchange of views

  3. Guidelines regarding the Review Process under the Convention on Nuclear Safety

    International Nuclear Information System (INIS)

    2011-01-01

    These guidelines, established by the Contracting Parties pursuant to Article 22 of the Convention, are intended to be read in conjunction with the text of the Convention. Their purpose is to provide guidance to the Contracting Parties on the process for reviewing National Reports submitted in accordance with Article 5 and thereby to facilitate the efficient review of implementation by the Contracting Parties of their obligations under the Convention. The aim of the review process should be to achieve a thorough examination of National Reports submitted in accordance with Article 5 of the Convention, so that Contracting Parties can learn from each other's solutions to common and individual nuclear safety problems and, above all, contribute to improving nuclear safety worldwide through a constructive exchange of views

  4. Guidelines regarding the review process under the Convention on Nuclear Safety

    International Nuclear Information System (INIS)

    1999-01-01

    These guidelines, established by the Contracting Parties pursuant to Article 22 of the Convention, are intended to be read in conjunction with the text of the Convention. Their purpose is to provide guidance to the Contracting Parties on the process for reviewing national reports submitted in accordance with Article 5 and thereby to facilitate the efficient review of implementation by the Contracting Parties of their obligations under the Convention. The aim of the review process should be to achieve a thorough examination of national reports submitted in accordance with Article 5 of the Convention, so that Contracting Parties can learn from each other's solutions to common and individual nuclear safety problems and, above all, contribute to improving nuclear safety worldwide through a constructive exchange of views

  5. Guidelines regarding the Review Process under the Convention on Nuclear Safety

    International Nuclear Information System (INIS)

    2011-01-01

    These guidelines, established by the Contracting Parties pursuant to Article 22 of the Convention, are intended to be read in conjunction with the text of the Convention. Their purpose is to provide guidance to the Contracting Parties on the process for reviewing National Reports submitted in accordance with Article 5 and thereby to facilitate the efficient review of implementation by the Contracting Parties of their obligations under the Convention. The aim of the review process should be to achieve a thorough examination of National Reports submitted in accordance with Article 5 of the Convention, so that Contracting Parties can learn from each other's solutions to common and individual nuclear safety problems and, above all, contribute to improving nuclear safety worldwide through a constructive exchange of views [es

  6. Polarized protons and parity violating asymmetries

    International Nuclear Information System (INIS)

    Trueman, T.L.

    1984-01-01

    The potential for utilizing parity violating effects, associated with polarized protons, to study the standard model, proton structure, and new physics at the SPS Collider is summarized. 24 references

  7. How compliant are beverage employees to occupational health and safety regulations?

    Directory of Open Access Journals (Sweden)

    L. Chetty

    2009-01-01

    Full Text Available This observational study was undertaken to identify thehealth and safety violations of employees at a specific beverage manufac-turing company.  A  site inspection and observation of all employees employedat this specific beverage company was conducted by the researcher over 2 days. Employees were observed for 12 hours per day with the morningshift on Day 1 and the afternoon shift on Day 2. A  sample of conveniencewas used in that every employee who was present on those days was included. Descriptive statistics were used to analyze the data set. There were a total of 212 employees and 332 behaviours observed during thisstudy period. Unsafe handling and behaviour was observed in 55% of observations. Incorrect manual lifting techniques was the most frequent health and safety violation observed. In the 48 manual lifting behaviours observed, correct practice was observed in only three cases.  It is clear thatmore healthcare education and practical training is required in the area of manual lifting techniques. It is clear that more practical training is required in the area of manual handling.

  8. Environment, safety, and health manual, closeout report

    International Nuclear Information System (INIS)

    1975-12-01

    A coordination draft of the Environment, Safety, and Health (ES and H) manual was submitted on 2 September 1975. Comments provided by Operational Safety personnel were being incorporated by a task team when the effort was terminated on 31 October 1975. This report documents the development history of the manual and provides a status of the manual up to the time the efforts were discontinued. Also discussed are issues which effect completion of the manual. Additionally a plan for completion of the manual is suggested

  9. GraDit: graph-based data repair algorithm for multiple data edits rule violations

    Science.gov (United States)

    Ode Zuhayeni Madjida, Wa; Gusti Bagus Baskara Nugraha, I.

    2018-03-01

    Constraint-based data cleaning captures data violation to a set of rule called data quality rules. The rules consist of integrity constraint and data edits. Structurally, they are similar, where the rule contain left hand side and right hand side. Previous research proposed a data repair algorithm for integrity constraint violation. The algorithm uses undirected hypergraph as rule violation representation. Nevertheless, this algorithm can not be applied for data edits because of different rule characteristics. This study proposed GraDit, a repair algorithm for data edits rule. First, we use bipartite-directed hypergraph as model representation of overall defined rules. These representation is used for getting interaction between violation rules and clean rules. On the other hand, we proposed undirected graph as violation representation. Our experimental study showed that algorithm with undirected graph as violation representation model gave better data quality than algorithm with undirected hypergraph as representation model.

  10. Factoring the dispersion relation in the presence of Lorentz violation

    International Nuclear Information System (INIS)

    Colladay, Don; McDonald, Patrick; Mullins, David

    2010-01-01

    We produce an explicit formula for the dispersion relation for the Dirac equation in the standard model extension in the presence of Lorentz violation. Our expression is obtained using novel techniques which exploit the algebra of quaternions. The dispersion relation is found to conveniently factor in two special cases that each involve a mutually exclusive set of nonvanishing Lorentz-violating parameters. This suggests that a useful approach to studies of Lorentz-violating models is to split the parameter space into two separate pieces, each of which yields a simple, tractable dispersion relation that can be used for analysis.

  11. First Search for {ital CP} Violation in Tau Lepton Decay

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, S.; Kubota, Y.; Lee, S.J.; ONeill, J.J.; Poling, R.; Riehle, T.; Smith, A. [University of Minnesota, Minneapolis, Minnesota 55455 (United States); Alam, M.S.; Athar, S.B.; Ling, Z.; Mahmood, A.H.; Timm, S.; Wappler, F. [State University of New York at Albany, Albany, New York 12222 (United States); Anastassov, A.; Duboscq, J.E.; Fujino, D.; Gan, K.K.; Hart, T.; Honscheid, K.; Kagan, H.; Kass, R.; Lee, J.; Schwarthoff, H.; Spencer, M.B.; Sung, M.; Undrus, A.; Wolf, A.; Zoeller, M.M. [The Ohio State University, Columbus, Ohio 43210 (United States); Richichi, S.J.; Severini, H.; Skubic, P. [University of Oklahoma, Norman, Oklahoma 73019 (United States); Bishai, M.; Fast, J.; Hinson, J.W.; Menson, N.; Miller, D.H.; Shibata, E.I.; Shipsey, I.P.; Yurko, M. [Purdue University, West Lafayette, Indiana 47907 (United States); Glenn, S.; Kwon, Y.; Lyon, A.L.; Roberts, S.; Thorndike, E.H. [University of Rochester, Rochester, New York 14627 (United States); Jessop, C.P.; Lingel, K.; Marsiske, H.; Perl, M.L.; Savinov, V.; Ugolini, D.; Zhou, X. [Stanford Linear Accelerator Center, Stanford University, Stanford, California 94309 (United States); Coan, T.E.; Fadeyev, V.; Korolkov, I.; Maravin, Y.; Narsky, I.; Shelkov, V.; Staeck, J.; Stroynowski, R.; Volobouev, I.; Ye, J. [Southern Methodist University, Dallas, Texas 75275 (United States); Artuso, M.; Azfar, F.; Efimov, A.; Goldberg, M.; He, D.; Kopp, S.; Moneti, G.C.; Mountain, R.; Schuh, S.; Skwarnicki, T.; Stone, S.; Viehhauser, G.; Wang, J.C.; Xing, X. [Syracuse University, Syracuse, New York 13244 (United States); Bartelt, J.; Csorna, S.E.; Jain, V.; McLean, K.W.; Marka, S. [Vanderbilt University, Nashville, Tennessee 37235 (United States); Godang, R.; Kinoshita, K.; Lai, I.C.; Pomianowski, P.; Schrenk, S. [Virginia Polytechnic Institute and State University, Blacksburg, Virginia 24061 (United States); Bonvicini, G.; Cinabro, D.; Greene, R.; Perera, L.P.; Zhou, G.J. [Wayne State Univ., (United States)

    1998-11-01

    We have performed the first search for CP violation in tau lepton decay. CP violation in lepton decay does not occur in the minimal standard model but can occur in extensions such as the multi-Higgs doublet model. It appears as a characteristic difference between the {tau}{sup {minus}} and {tau}{sup +} decay angular distributions for the semileptonic decay modes such as {tau}{sup {minus}}{r_arrow}K{sup 0}{pi}{sup {minus}}{nu} . We define an observable asymmetry to exploit this and find no evidence for any CP violation. {copyright} {ital 1998} {ital The American Physical Society }

  12. Lorentz-violating theories in the standard model extension

    Energy Technology Data Exchange (ETDEWEB)

    Ferreira Junior, Manoel Messias [Universidade Federal do Maranhao (UFMA), Sao Luis, MA (Brazil)

    2012-07-01

    Full text: Lorentz-violating theories have been an issue of permanent interest in the latest years. Many of these investigations are developed under the theoretical framework of the Standard Model Extension (SME), a broad extension of the minimal Standard Model embracing Lorentz-violating (LV) terms, generated as vacuum expectation values of tensor quantities, in all sectors of interaction. In this talk, we comment on some general properties of the SME, concerning mainly the gauge and fermion sectors, focusing in new phenomena induced by Lorentz violation. The LV terms are usually separated in accordance with the behavior under discrete symmetries, being classified as CPT-odd or CPT-even, parity-even or parity-odd. We follow this classification scheme discussing some features and new properties of the CPT-even and CPT-odd parts of the gauge and fermion sectors. We finalize presenting some upper bounds imposed on the corresponding LV coefficients. (author)

  13. Lorentz Violation of the Photon Sector in Field Theory Models

    Directory of Open Access Journals (Sweden)

    Lingli Zhou

    2014-01-01

    Full Text Available We compare the Lorentz violation terms of the pure photon sector between two field theory models, namely, the minimal standard model extension (SME and the standard model supplement (SMS. From the requirement of the identity of the intersection for the two models, we find that the free photon sector of the SMS can be a subset of the photon sector of the minimal SME. We not only obtain some relations between the SME parameters but also get some constraints on the SMS parameters from the SME parameters. The CPT-odd coefficients (kAFα of the SME are predicted to be zero. There are 15 degrees of freedom in the Lorentz violation matrix Δαβ of free photons of the SMS related with the same number of degrees of freedom in the tensor coefficients (kFαβμν, which are independent from each other in the minimal SME but are interrelated in the intersection of the SMS and the minimal SME. With the related degrees of freedom, we obtain the conservative constraints (2σ on the elements of the photon Lorentz violation matrix. The detailed structure of the photon Lorentz violation matrix suggests some applications to the Lorentz violation experiments for photons.

  14. Driving violations and health promotion behaviors among undergraduate students: Self-report of on-road behavior.

    Science.gov (United States)

    Korn, Liat; Weiss, Yossi; Rosenbloom, Tova

    2017-11-17

    The purposes of this study are to characterize Israeli undergraduate students' driving violations in the terms of problem behavior theory and to identify whether there is any relationship between driving violations and health risk behaviors, daring behaviors, excitement seeking, and health promotion behaviors. This study is based on a structured self-reported anonymous questionnaire distributed to undergraduate students in an academic institution. The sample included 533 undergraduate students (374 females and 159 males). The mean age was 23.4 (SD = 1.4, range = 5). A higher prevalence of self-reported driving violations was found among males in comparison to females. All substance use measures were positively related to driving violations; for example, use of cigarettes (OR = 4.287, P driving violations. The strongest predictive factors for the frequent driving violations group were alcohol consumption-related variables: binge drinking (OR = 2.560, P driving violations group and selling or dealing drugs (12.143, P driving violations group was physical confrontation due to verbal disagreement (3.439, P driving violations was higher for subjects who reported intense physical workout regimens (OR = 1.638, P driving violations. This study shows that bachelors tend to be more involved in risk behaviors, such as substance use, excitement-seeking behaviors, and daring behaviors and are active physically and thus constitute a risk group for driving violations. As such, intervention resources should be directed toward this group.

  15. Particularly compliance violations in patients with diabetes mellitus of 2nd type

    Directory of Open Access Journals (Sweden)

    V. V. Chugunov

    2017-04-01

    Full Text Available Aim: to investigate and establish the specific complains violations in patients with diabetes mellitus (DM of 2nd type. Materials and methods: 543 patients with DM of 2nd type were examined; the disease duration ranged from 2 to 27 years, average – (14.58 ± 1.82 years. Research methods: clinical-anamnestic, clinical-psychopathological, psycho diagnostic, statistical. Research results. We found that compliance to therapy in patients with DM of 2nd type was broken in 90.49 % of cases. We highlighted three options for compliance violations to DM therapy of 2nd type: dismedication (to 68.14 %, disdiet (88.40 % and disexercise (90.49 %. The sub-variants of dismedication compliance violations to DM therapy of 2nd type was hyper-curation type (8.29 %, which was developed according to surplus of appointments execution and hypo-curation type (59.85 %, which was developed according to deficiency of appointments execution. Among them it was possible to distinguish a third – mixed version (7.37 %, which brings together episodes of the surplus and the deficit of medical drugs usage. The sub-options of disdiet option of compliance violations was hyper-curation type (1.66 %, which manifested itself in pathologically excessive rejection of food and hypo-curation type (86.74 %, which manifested itself in a disregard for the restrictions in the diet. Disexercise variant of compliance violations was possible to divide into hyper-curation type (4,24 %, manifested in excessive physical activity and, in its turn, had three subtypes – inceptional (1.66 %, sub-hyper-curation (1.10 % and procurationis (1.47 %, and hypo-curation type of compliance violations (87.48 %, which manifested itself in a disregard of physical exertion. Dominance of disdiet and disexercise compliance violations among patients with DM of 2nd type (χ2 = 117.258, p < 0.01, dismedication option among patients of all hyper-curation types of compliance violations with DM of 2nd type (χ2 = 26

  16. Probabilistic safety criteria at the safety function/system level

    International Nuclear Information System (INIS)

    1989-09-01

    A Technical Committee Meeting was held in Vienna, Austria, from 26-30 January 1987. The objectives of the meeting were: to review the national developments of PSC at the level of safety functions/systems including future trends; to analyse basic principles, assumptions, and objectives; to compare numerical values and the rationale for choosing them; to compile the experience with use of such PSC; to analyse the role of uncertainties in particular regarding procedures for showing compliance. The general objective of establishing PSC at the level of safety functions/systems is to provide a pragmatic tool to evaluate plant safety which is placing emphasis on the prevention principle. Such criteria could thus lead to a better understanding of the importance to safety of the various functions which have to be performed to ensure the safety of the plant, and the engineering means of performing these functions. They would reflect the state-of-the-art in modern PSAs and could contribute to a balance in system design. This report, prepared by the participants of the meeting, reviews the current status and future trends in the field and should assist Member States in developing their national approaches. The draft of this document was also submitted to INSAG to be considered in its work to prepare a document on safety principles for nuclear power plants. Five papers presented at the meeting are also included in this publication. A separate abstract was prepared for each of these papers. Refs, figs and tabs

  17. Young children remedy second- and third-party ownership violations.

    Science.gov (United States)

    Van de Vondervoort, Julia W; Hamlin, J Kiley

    2015-09-01

    When responding to ownership violations, children can focus on the victim's needs, the perpetrator's punishment, or both. Recent studies show that 3- and 5-year-olds are equally likely to respond to second- and third-party violations, and 3-year-olds return objects to their rightful owners. Children's interventions are consistent with justice for victims. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Right-handed neutrinos and T-violating, P-conserving interactions

    Directory of Open Access Journals (Sweden)

    Basem Kamal El-Menoufi

    2017-02-01

    Full Text Available We show that experimental probes of the P-conserving, T-violating triple correlation in polarized neutron or nuclear β-decay provide a unique probe of possible T-violation at the TeV scale in the presence of right-handed neutrinos. In contrast to other possible sources of semileptonic T-violation involving only left-handed neutrinos, those involving right-handed neutrinos are relatively unconstrained by present limits on the permanent electric dipole moments of the electron, neutral atoms, and the neutron. On the other hand, LHC results for pp→e+ missing transverse energy imply that an order of magnitude of improvement in D-coefficient sensitivity would be needed for discovery. Finally, we discuss the interplay with the scale of neutrino mass and naturalness considerations.

  19. 48 CFR 403.405 - Misrepresentations or violations of the Covenant Against Contingent Fees.

    Science.gov (United States)

    2010-10-01

    ... violations of the Covenant Against Contingent Fees. 403.405 Section 403.405 Federal Acquisition Regulations... Contingent Fees 403.405 Misrepresentations or violations of the Covenant Against Contingent Fees. (a) A suspected misrepresentation or violation of the Covenant Against Contingent Fees shall be documented in...

  20. Parity violation in the compound nucleus

    International Nuclear Information System (INIS)

    Bowman, J.D.; Frankle, C.M.; Green, A.A.

    1994-01-01

    The status of parity violation in the compound nucleus is reviewed. The results of previous experimental results obtained by scattering polarized epithermal neutrons from heavy nuclei in the 3-p and 4-p p-wave strength function peaks are presented. Experimental techniques are presented. The extraction of the mean squared matrix element of the parity-violating interaction, M 2 , between compound-nuclear levels and the relationship of M 2 to the coupling strengths in the meson exchange weak nucleon-nucleon potential are discussed. The tendency of measured asymmetries to have a common sign and theoretical implications are discussed. New experimental results are presented that show that the common sign phenomenon is not universal, as theoretical models developed up to now would predict

  1. Scaling violation in QCD

    International Nuclear Information System (INIS)

    Furmanski, W.

    1981-08-01

    The effects of scaling violation in QCD are discussed in the perturbative scheme, based on the factorization of mass singularities in the light-like gauge. Some recent applications including the next-to-leading corrections are presented (large psub(T) scattering, numerical analysis of the leptoproduction data). A proposal is made for extending the method on the higher twist sector. (author)

  2. Proceedings of the international symposium on safety and reliability systems of PWRs and BWRs

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-05-01

    Out of 33 contributions presented at the conference, 30 were submitted to INIS. The conference programme was divided into three sections: (i) Diagnostics and in-service inspection; (ii) Safety and reliability of NPP operation; (iii) Experience of NPP operation and new approaches to nuclear safety. (J.B.).

  3. Proceedings of the international symposium on safety and reliability systems of PWRs and BWRs

    International Nuclear Information System (INIS)

    1996-02-01

    Out of 33 contributions presented at the conference, 30 were submitted to INIS. The conference programme was divided into three sections: (i) Diagnostics and in-service inspection; (ii) Safety and reliability of NPP operation; (iii) Experience of NPP operation and new approaches to nuclear safety. (J.B.)

  4. Violations of Management Principles within Academe.

    Science.gov (United States)

    Sikula, Andrew F.; Sikula, John P.

    1980-01-01

    Principles of effective management commonly violated by educational institutions include: (1) unity of command; (2) division or specialization of labor; (3) delegation of authority; and (4) authority equal to responsibility. (JMF)

  5. Search for R-parity violating decays of sfermions at LEP

    CERN Document Server

    Abbiendi, G.; Akesson, P.F.; Alexander, G.; Allison, John; Amaral, P.; Anagnostou, G.; Anderson, K.J.; Arcelli, S.; Asai, S.; Axen, D.; Azuelos, G.; Bailey, I.; Barberio, E.; Barlow, R.J.; Batley, R.J.; Bechtle, P.; Behnke, T.; Bell, Kenneth Watson; Bell, P.J.; Bella, G.; Bellerive, A.; Benelli, G.; Bethke, S.; Biebel, O.; Boeriu, O.; Bock, P.; Boutemeur, M.; Braibant, S.; Brigliadori, L.; Brown, Robert M.; Buesser, K.; Burckhart, H.J.; Campana, S.; Carnegie, R.K.; Caron, B.; Carter, A.A.; Carter, J.R.; Chang, C.Y.; Charlton, David G.; Csilling, A.; Cuffiani, M.; Dado, S.; De Roeck, A.; De Wolf, E.A.; Desch, K.; Dienes, B.; Donkers, M.; Dubbert, J.; Duchovni, E.; Duckeck, G.; Duerdoth, I.P.; Etzion, E.; Fabbri, F.; Feld, L.; Ferrari, P.; Fiedler, F.; Fleck, I.; Ford, M.; Frey, A.; Furtjes, A.; Gagnon, P.; Gary, John William; Gaycken, G.; Geich-Gimbel, C.; Giacomelli, G.; Giacomelli, P.; Giunta, Marina; Goldberg, J.; Gross, E.; Grunhaus, J.; Gruwe, M.; Gunther, P.O.; Gupta, A.; Hajdu, C.; Hamann, M.; Hanson, G.G.; Harder, K.; Harel, A.; Harin-Dirac, M.; Hauschild, M.; Hawkes, C.M.; Hawkings, R.; Hemingway, R.J.; Hensel, C.; Herten, G.; Heuer, R.D.; Hill, J.C.; Hoffman, Kara Dion; Horvath, D.; Igo-Kemenes, P.; Ishii, K.; Jeremie, H.; Jovanovic, P.; Junk, T.R.; Kanaya, N.; Kanzaki, J.; Karapetian, G.; Karlen, D.; Kawagoe, K.; Kawamoto, T.; Keeler, R.K.; Kellogg, R.G.; Kennedy, B.W.; Kim, D.H.; Klein, K.; Klier, A.; Kluth, S.; Kobayashi, T.; Kobel, M.; Komamiya, S.; Kormos, Laura L.; Kramer, T.; Krieger, P.; von Krogh, J.; Kruger, K.; Kuhl, T.; Kupper, M.; Lafferty, G.D.; Landsman, H.; Lanske, D.; Layter, J.G.; Leins, A.; Lellouch, D.; Letts, J.; Levinson, L.; Lillich, J.; Lloyd, S.L.; Loebinger, F.K.; Lu, J.; Ludwig, J.; Macpherson, A.; Mader, W.; Marcellini, S.; Martin, A.J.; Masetti, G.; Mashimo, T.; Mattig, Peter; McDonald, W.J.; McKenna, J.; McMahon, T.J.; McPherson, R.A.; Meijers, F.; Menges, W.; Merritt, F.S.; Mes, H.; Michelini, A.; Mihara, S.; Mikenberg, G.; Miller, D.J.; Moed, S.; Mohr, W.; Mori, T.; Mutter, A.; Nagai, K.; Nakamura, I.; Nanjo, H.; Neal, H.A.; Nisius, R.; O'Neale, S.W.; Oh, A.; Okpara, A.; Oreglia, M.J.; Orito, S.; Pahl, C.; Pasztor, G.; Pater, J.R.; Patrick, G.N.; Pilcher, J.E.; Pinfold, J.; Plane, David E.; Poli, B.; Polok, J.; Pooth, O.; Przybycien, M.; Quadt, A.; Rabbertz, K.; Rembser, C.; Renkel, P.; Rick, H.; Roney, J.M.; Rosati, S.; Rozen, Y.; Runge, K.; Sachs, K.; Saeki, T.; Sarkisyan, E.K.G.; Schaile, A.D.; Schaile, O.; Scharff-Hansen, P.; Schieck, J.; Schoerner-Sadenius, Thomas; Schroder, Matthias; Schumacher, M.; Schwick, C.; Scott, W.G.; Seuster, R.; Shears, T.G.; Shen, B.C.; Sherwood, P.; Siroli, G.; Skuja, A.; Smith, A.M.; Sobie, R.; Soldner-Rembold, S.; Spano, F.; Stahl, A.; Stephens, K.; Strom, David M.; Strohmer, R.; Tarem, S.; Tasevsky, M.; Taylor, R.J.; Teuscher, R.; Thomson, M.A.; Torrence, E.; Toya, D.; Tran, P.; Trigger, I.; Trocsanyi, Z.; Tsur, E.; Turner-Watson, M.F.; Ueda, I.; Ujvari, B.; Vollmer, C.F.; Vannerem, P.; Vertesi, R.; Verzocchi, M.; Voss, H.; Vossebeld, J.; Waller, D.; Ward, C.P.; Ward, D.R.; Warsinsky, M.; Watkins, P.M.; Watson, A.T.; Watson, N.K.; Wells, P.S.; Wengler, T.; Wermes, N.; Wetterling, D.; Wilson, G.W.; Wilson, J.A.; Wolf, G.; Wyatt, T.R.; Yamashita, S.; Zer-Zion, D.; Zivkovic, Lidija

    2004-01-01

    A search for pair-produced scalar fermions under the assumption that R-parity is not conserved has been performed using data collected with the OPAL detector at LEP. The data samples analysed correspond to an integrated luminosity of about 610 pb-1 collected at centre-of-mass energies of sqrt(s) 189-209 GeV. An important consequence of R-parity violation is that the lightest supersymmetric particle is expected to be unstable. Searches of R-parity violating decays of charged sleptons, sneutrinos and squarks have been performed under the assumptions that the lightest supersymmetric particle decays promptly and that only one of the R-parity violating couplings is dominant for each of the decay modes considered. Such processes would yield final states consisting of leptons, jets, or both with or without missing energy. No significant single-like excess of events has been observed with respect to the Standard Model expectations. Limits on the production cross- section of scalar fermions in R-parity violating scena...

  6. In defense of commitment: The curative power of violated expectations.

    Science.gov (United States)

    Murray, Sandra L; Lamarche, Veronica M; Gomillion, Sarah; Seery, Mark D; Kondrak, Cheryl

    2017-11-01

    A new model of commitment defense in romantic relationships is proposed. It assumes that relationships afford a central resource for affirming meaning and purpose in the world. Consequently, violating expectations about the world outside the relationship can precipitate commitment defense inside the relationship. A meta-analysis of 5 experiments, 2 follow-up correlational studies, and a longitudinal study of the transition to first parenthood supported the model. Experimentally violating conventional expectations about the world (e.g., "hard work pays off") motivated less satisfied people to defensively affirm their commitment. Similarly, when becoming a parent naturalistically violated culturally conditioned gendered expectations about the division of household labor, less satisfied new mothers and fathers defensively affirmed their commitment from pre-to-post baby. The findings suggest that violating expected associations in the world outside the relationship motivates vulnerable people to set relationship their relationship right, thereby affirming expected associations in the relationship in the face of an unexpected world. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  7. Realizing total reciprocity violation in the phase for photon scattering.

    Science.gov (United States)

    Deák, László; Bottyán, László; Fülöp, Tamás; Merkel, Dániel Géza; Nagy, Dénes Lajos; Sajti, Szilárd; Schulze, Kai Sven; Spiering, Hartmut; Uschmann, Ingo; Wille, Hans-Christian

    2017-02-22

    Reciprocity is when wave or quantum scattering satisfies a symmetry property, connecting a scattering process with the reversed one. While reciprocity involves the interchange of source and detector, it is fundamentally different from rotational invariance, and is a generalization of time reversal invariance, occurring in absorptive media as well. Due to its presence at diverse areas of physics, it admits a wide variety of applications. For polarization dependent scatterings, reciprocity is often violated, but violation in the phase of the scattering amplitude is much harder to experimentally observe than violation in magnitude. Enabled by the advantageous properties of nuclear resonance scattering of synchrotron radiation, we have measured maximal, i.e., 180-degree, reciprocity violation in the phase. For accessing phase information, we introduced a new version of stroboscopic detection. The scattering setting was devised based on a generalized reciprocity theorem that opens the way to construct new types of reciprocity related devices.

  8. Observation of CP violation in the B(0) meson system.

    Science.gov (United States)

    Aubert, B; Boutigny, D; Gaillard, J M; Hicheur, A; Karyotakis, Y; Lees, J P; Robbe, P; Tisserand, V; Palano, A; Chen, G P; Chen, J C; Qi, N D; Rong, G; Wang, P; Zhu, Y S; Eigen, G; Reinertsen, P L; Stugu, B; Abbott, B; Abrams, G S; Borgland, A W; Breon, A B; Brown, D N; Button-Shafer, J; Cahn, R N; Clark, A R; Gill, M S; Gritsan, A V; Groysman, Y; Jacobsen, R G; Kadel, R W; Kadyk, J; Kerth, L T; Kluth, S; Kolomensky, Y G; Kral, J F; LeClerc, C; Levi, M E; Liu, T; Lynch, G; Meyer, A B; Momayezi, M; Oddone, P J; Perazzo, A; Pripstein, M; Roe, N A; Romosan, A; Ronan, M T; Shelkov, V G; Telnov, A V; Wenzel, W A; Zisman, M S; Bright-Thomas, P G; Harrison, T J; Hawkes, C M; Knowles, D J; O'Neale, S W; Penny, R C; Watson, A T; Watson, N K; Deppermann, T; Goetzen, K; Koch, H; Krug, J; Kunze, M; Lewandowski, B; Peters, K; Schmuecker, H; Steinke, M; Andress, J C; Barlow, N R; Bhimji, W; Chevalier, N; Clark, P J; Cottingham, W N; De Groot, N; Dyce, N; Foster, B; McFall, J D; Wallom, D; Wilson, F F; Abe, K; Hearty, C; Mattison, T S; McKenna, J A; Thiessen, D; Jolly, S; McKemey, A K; Tinslay, J; Blinov, V E; Bukin, A D; Bukin, D A; Buzykaev, A R; Golubev, V B; Ivanchenko, V N; Korol, A A; Kravchenko, E A; Onuchin, A P; Salnikov, A A; Serednyakov, S I; Skovpen, Y I; Telnov, V I; Yushkov, A N; Best, D; Lankford, A J; Mandelkern, M; McMahon, S; Stoker, D P; Ahsan, A; Arisaka, K; Buchanan, C; Chun, S; Branson, J G; MacFarlane, D B; Prell, S; Rahatlou, S; Raven, G; Sharma, V; Campagnari, C; Dahmes, B; Hart, P A; Kuznetsova, N; Levy, S L; Long, O; Lu, A; Richman, J D; Verkerke, W; Witherell, M; Yellin, S; Beringer, J; Dorfan, D E; Eisner, A M; Frey, A; Grillo, A A; Grothe, M; Heusch, C A; Johnson, R P; Kroeger, W; Lockman, W S; Pulliam, T; Sadrozinski, H; Schalk, T; Schmitz, R E; Schumm, B A; Seiden, A; Turri, M; Walkowiak, W; Williams, D C; Wilson, M G; Chen, E; Dubois-Felsmann, G P; Dvoretskii, A; Hitlin, D G; Metzler, S; Oyang, J; Porter, F C; Ryd, A; Samuel, A; Weaver, M; Yang, S; Zhu, R Y; Devmal, S; Geld, T L; Jayatilleke, S; Mancinelli, G; Meadows, B T; Sokoloff, M D; Barillari, T; Bloom, P; Dima, M O; Fahey, S; Ford, W T; Johnson, D R; Nauenberg, U; Olivas, A; Park, H; Rankin, P; Roy, J; Sen, S; Smith, J G; van Hoek, W C; Wagner, D L; Blouw, J; Harton, J L; Krishnamurthy, M; Soffer, A; Toki, W H; Wilson, R J; Zhang, J; Brandt, T; Brose, J; Colberg, T; Dahlinger, G; Dickopp, M; Dubitzky, R S; Hauke, A; Maly, E; Müller-Pfefferkorn, R; Otto, S; Schubert, K R; Schwierz, R; Spaan, B; Wilden, L; Behr, L; Bernard, D; Bonneaud, G R; Brochard, F; Cohen-Tanugi, J; Ferrag, S; Roussot, E; T'Jampens, S; Thiebaux, C; Vasileiadis, G; Verderi, M; Anjomshoaa, A; Bernet, R; Khan, A; Lavin, D; Muheim, F; Playfer, S; Swain, J E; Falbo, M; Borean, C; Bozzi, C; Dittongo, S; Folegani, M; Piemontese, L; Treadwell, E; Anulli, F; Baldini-Ferroli, R; Calcaterra, A; de Sangro, R; Falciai, D; Finocchiaro, G; Patteri, P; Peruzzi, I M; Piccolo, M; Xie, Y; Zallo, A; Bagnasco, S; Buzzo, A; Contri, R; Crosetti, G; Fabbricatore, P; Farinon, S; Lo Vetere, M; Macri, M; Monge, M R; Musenich, R; Pallavicini, M; Parodi, R; Passaggio, S; Pastore, F C; Patrignani, C; Pia, M G; Priano, C; Robutti, E; Santroni, A; Morii, M; Bartoldus, R; Dignan, T; Hamilton, R; Mallik, U; Cochran, J; Crawley, H B; Fischer, P A; Lamsa, J; Meyer, W T; Rosenberg, E I; Benkebil, M; Grosdidier, G; Hast, C; Höcker, A; Lacker, H M; Laplace, S; Lepeltier, V; Lutz, A M; Plaszczynski, S; Schune, M H; Trincaz-Duvoid, S; Valassi, A; Wormser, G; Bionta, R M; Brigljević, V; Lange, D J; Mugge, M; Shi, X; van Bibber, K; Wenaus, T J; Wright, D M; Wuest, C R; Carroll, M; Fry, J R; Gabathuler, E; Gamet, R; George, M; Kay, M; Payne, D J; Sloane, R J; Touramanis, C; Aspinwall, M L; Bowerman, D A; Dauncey, P D; Egede, U; Eschrich, I; Gunawardane, N J; Nash, J A; Sanders, P; Smith, D; Azzopardi, D E; Back, J J; Dixon, P; Harrison, P F; Potter, R J; Shorthouse, H W; Strother, P; Vidal, P B; Williams, M I; Cowan, G; George, S; Green, M G; Kurup, A; Marker, C E; McGrath, P; McMahon, T R; Ricciardi, S; Salvatore, F; Scott, I; Vaitsas, G; Brown, D; Davis, C L; Allison, J; Barlow, R J; Boyd, J T; Forti, A C; Fullwood, J; Jackson, F; Lafferty, G D; Savvas, N; Simopoulos, E T; Weatherall, J H; Farbin, A; Jawahery, A; Lillard, V; Olsen, J; Roberts, D A; Schieck, J R; Blaylock, G; Dallapiccola, C; Flood, K T; Hertzbach, S S; Kofler, R; Moore, T B; Staengle, H; Willocq, S; Brau, B; Cowan, R; Sciolla, G; Taylor, F; Yamamoto, R K; Milek, M; Patel, P M; Trischuk, J; Lanni, F; Palombo, F; Bauer, J M; Booke, M; Cremaldi, L; Eschenburg, V; Kroeger, R; Reidy, J; Sanders, D A; Summers, D J; Martin, J P; Nief, J Y; Seitz, R; Taras, P; Zacek, V; Nicholson, H; Sutton, C S; Cartaro, C; Cavallo, N; De Nardo, G; Fabozzi, F; Gatto, C; Lista, L; Paolucci, P; Piccolo, D; Sciacca, C; LoSecco, J M; Alsmiller, J R; Gabriel, T A; Handler, T; Brau, J; Frey, R; Iwasaki, M; Sinev, N B; Strom, D; Colecchia, F; Dal Corso, F; Dorigo, A; Galeazzi, F; Margoni, M; Michelon, G; Morandin, M; Posocco, M; Rotondo, M; Simonetto, F; Stroili, R; Torassa, E; Voci, C; Benayoun, M; Briand, H; Chauveau, J; David, P; de La Vaissière, C; Del Buono, L; Hamon, O; Le Diberder, F; Leruste, P; Lory, J; Roos, L; Stark, J; Versillé, S; Manfredi, P F; Re, V; Speziali, V; Frank, E D; Gladney, L; Guo, Q H; Panetta, J H; Angelini, C; Batignani, G; Bettarini, S; Bondioli, M; Carpinelli, M; Forti, F; Giorgi, M A; Lusiani, A; Martinez-Vidal, F; Morganti, M; Neri, N; Paoloni, E; Rama, M; Rizzo, G; Sandrelli, F; Simi, G; Triggiani, G; Walsh, J; Haire, M; Judd, D; Paick, K; Turnbull, L; Wagoner, D E; Albert, J; Bula, C; Elmer, P; Lu, C; McDonald, K T; Miftakov, V; Schaffner, S F; Smith, A J; Tumanov, A; Varnes, E W; Cavoto, G; del Re, D; Faccini, R; Ferrarotto, F; Ferroni, F; Fratini, K; Lamanna, E; Leonardi, E; Mazzoni, M A; Morganti, S; Piredda, G; Safai Tehrani, F; Serra, M; Voena, C; Christ, S; Waldi, R; Adye, T; Franek, B; Geddes, N I; Gopal, G P; Xella, S M; Aleksan, R; De Domenico, G; Emery, S; Gaidot, A; Ganzhur, S F; Giraud, P F; Hamel De Monchenault, G; Kozanecki, W; Langer, M; London, G W; Mayer, B; Serfass, B; Vasseur, G; Yèche, C; Zito, M; Copty, N; Purohit, M V; Singh, H; Yumiceva, F X; Adam, I; Anthony, P L; Aston, D; Baird, K; Berger, J P; Bloom, E; Boyarski, A M; Bulos, F; Calderini, G; Claus, R; Convery, M R; Coupal, D P; Coward, D H; Dorfan, J; Dorser, M; Dunwoodie, W; Field, R C; Glanzman, T; Godfrey, G L; Gowdy, S J; Grosso, P; Himel, T; Hryn'ova, T; Huffer, M E; Innes, W R; Jessop, C P; Kelsey, M H; Kim, P; Kocian, M L; Langennegger, U; Leith, D W; Luitz, S; Luth, V; Lynch, H L; Marsiske, H; Menke, S; Messner, R; Moffeit, K C; Mount, R; Muller, D R; O'Grady, C P; Perl, M; Petrak, S; Quinn, H; Ratcliff, B N; Robertson, S H; Rochester, L S; Roodman, A; Schietinger, T; Schindler, R H; Schwiening, J; Seeman, J T; Serbo, V V; Snyder, S R; Soha, A; Spanier, S M; Stelzer, J; Su, D; Sullivan, M K; Tanaka, H A; Va'vra, J; Wagner, S R; Weinstein, A J; Wienands, U; Wisniewski, W J; Wright, D H; Young, C C; Burchat, P R; Cheng, C H; Kirkby, D; Meyer, T I; Roat, C; Henderson, R; Bugg, W; Cohn, H; Weidemann, A W; Izen, J M; Kitayama, I; Lou, X C; Turcotte, M; Bianchi, F; Bona, M; DiGirolamo, B; Gamba, D; Smol, A; Zanin, D; Bosisio, L; Della Ricci, G; Lanceri, L; Pompili, A; Poropat, P; Vuagnin, G; Panvini, R S; Brown, C M; De Silva, A; Kowalewski, R; Roney, J M; Band, H R; Charles, E; Dasu, S; Di Lodovico, F; Eichenbaum, A M; Hu, H; Johnson, J R; Liu, R; Nielsen, J; Pan, Y; Prepost, R; Scott, I J; Sekula, S J; von Wimmersperg-Toeller, J H; Wu, S L; Zobernig, H; Kordich, T M; Neal, H

    2001-08-27

    We present an updated measurement of time-dependent CP-violating asymmetries in neutral B decays with the BABAR detector at the PEP-II asymmetric B Factory at SLAC. This result uses an additional sample of Upsilon(4S) decays collected in 2001, bringing the data available to 32 x 10(6) BB macro pairs. We select events in which one neutral B meson is fully reconstructed in a final state containing charmonium and the flavor of the other neutral B meson is determined from its decay products. The amplitude of the CP-violating asymmetry, which in the standard model is proportional to sin2 beta, is derived from the decay time distributions in such events. The result sin2 beta = 0.59+/-0.14(stat)+/-0.05(syst) establishes CP violation in the B(0) meson system. We also determine absolute value of lambda = 0.93+/-0.09(stat)+/-0.03(syst), consistent with no direct CP violation.

  9. Modeling Psychological Contract Violation using Dual Regime Models: An Event-based Approach.

    Science.gov (United States)

    Hofmans, Joeri

    2017-01-01

    A good understanding of the dynamics of psychological contract violation requires theories, research methods and statistical models that explicitly recognize that violation feelings follow from an event that violates one's acceptance limits, after which interpretative processes are set into motion, determining the intensity of these violation feelings. Whereas theories-in the form of the dynamic model of the psychological contract-and research methods-in the form of daily diary research and experience sampling research-are available by now, the statistical tools to model such a two-stage process are still lacking. The aim of the present paper is to fill this gap in the literature by introducing two statistical models-the Zero-Inflated model and the Hurdle model-that closely mimic the theoretical process underlying the elicitation violation feelings via two model components: a binary distribution that models whether violation has occurred or not, and a count distribution that models how severe the negative impact is. Moreover, covariates can be included for both model components separately, which yields insight into their unique and shared antecedents. By doing this, the present paper offers a methodological-substantive synergy, showing how sophisticated methodology can be used to examine an important substantive issue.

  10. SmartCop: Enabling Smart Traffic Violations Ticketing in Vehicular Named Data Networks

    Directory of Open Access Journals (Sweden)

    Syed Hassan Ahmed

    2016-01-01

    Full Text Available Recently, various applications for Vehicular Ad hoc Networks (VANETs have been proposed and smart traffic violation ticketing is one of them. On the other hand, the new Information-Centric Networking (ICN architectures have emerged and been investigated into VANETs, such as Vehicular Named Data Networking (VNDN. However, the existing applications in VANETs are not suitable for VNDN paradigm due to the dependency on a “named content” instead of a current “host-centric” approach. Thus, we need to design the emerging and new architectures for VNDN applications. In this paper, we propose a smart traffic violation ticketing (TVT system for VNDN, named as SmartCop, that enables a cop vehicle (CV to issue tickets for traffic violation(s to the offender(s autonomously, once they are in the transmission range of that CV. The ticket issuing delay, messaging cost, and percentage of violations detected for varying number of vehicles, violators, CVs, and vehicles speeds are estimated through simulations. In addition, we provide a road map of future research directions for enabling safe driving experience in future cars aided with VNDN technology.

  11. Nuclear isospin mixing and elastic parity-violating electron scattering

    International Nuclear Information System (INIS)

    Moreno, O.; Sarriguren, P.; Moya de Guerra, E.; Udias, J.M.; Donnelly, T.W.; Sick, I.

    2009-01-01

    The influence of nuclear isospin mixing on parity-violating elastic electron scattering is studied for the even-even, N=Z nuclei 12 C, 24 Mg, 28 Si, and 32 S. Their ground-state wave functions have been obtained using a self-consistent axially-symmetric mean-field approximation with density-dependent effective two-body Skyrme interactions. Some differences from previous shell-model calculations appear for the isovector Coulomb form factors which play a role in determining the parity-violating asymmetry. To gain an understanding of how these differences arise, the results have been expanded in a spherical harmonic oscillator basis. Results are obtained not only within the plane-wave Born approximation, but also using the distorted-wave Born approximation for comparison with potential future experimental studies of parity-violating electron scattering. To this end, for each nucleus the focus is placed on kinematic ranges where the signal (isospin-mixing effects on the parity-violating asymmetry) and the experimental figure-of-merit are maximized. Strangeness contributions to the asymmetry are also briefly discussed, since they and the isospin mixing contributions may play comparable roles for the nuclei being studied at the low momentum transfers of interest in the present work.

  12. IMPLEMENTING CHANGES TO AN APPROVED AND IN-USE DOCUMENTED SAFETY ANALYSIS

    International Nuclear Information System (INIS)

    KING JP

    2008-01-01

    The Plutonium Finishing Plant (PFP) has refined a process to ensure a comprehensive and complete DSA/TSR change implementation. Successful Nuclear Facility Safety Basis implementation is essential to avoid creating a Potential Inadequacy in Safety Analysis (PISA) situation, or implementing a facility into a non-compliance that can result in a TSR violation. Once past initial implementation, additional changes to Documented Safety Analysis (DSA) and Technical Safety Requirements (TSRs) are often needed due to needed requirement clarifications, operating experience indicating that Conditions/Required Actions/Surveillance Requirements could be improved, changes in facility conditions, or changes in facility mission etc. An effective change implementation process is essential to ensuring compliance with 10 CFR 830.202(a), 'The contractor responsible for a hazard category 1,2, or 3 DOE nuclear facility must establish and maintain the safety basis for the facility'

  13. CP violation and ΔI=1/2 enhancement in K decays

    International Nuclear Information System (INIS)

    Choudhury, S.R.; Scadron, M.D.

    1996-01-01

    We study CP-conserving and CP-violating K 0 →ππ and K 0 →ππγ decays, using the same techniques which explain the ΔI=1/2 enhancement of the former to also explore CP violation of the latter transitions. If CP violation is driven by the WWγ vertex, we show that direct CP violation in K L →ππγ is scaled to the s→dγ E1 quark transition and the latter is suppressed by the GIM mechanism (compatible with recent experiments). In the same spirit, the dominant ΔI=1/2 enhancement of CP-conserving kaon weak decays can be scaled to an s→d quark transition which is enhanced by the GIM mechanism. copyright 1996 The American Physical Society

  14. Mapping Expectancy Violations: Self-Reflection and Planning for Better Communication

    Science.gov (United States)

    Gregory, Lynn Dee

    2013-01-01

    Communication expectancies are an important part of intercultural understanding, and are defined as cultural guidelines for anticipating behavior (Burgoon, 1995). Burgoon's 1978 expectancy violations theory (EVT) explored nonverbal violations and their outcomes (Burgoon, 1995). The theory has been identified as one approach to the study of…

  15. The CP-odd nucleon interaction and the value of T-violation in nuclei

    International Nuclear Information System (INIS)

    Gudkov, V.P.

    1997-01-01

    The relations between the value of T- and P-violating correlations in neutron scattering and different models of CP violation are discussed. It is shown that a specific structure of CP-odd nucleon interactions gives the possibility to obtain the essential information about CP-odd interaction at the quark-gluon level from nuclear experimental data. The up-to-date estimations for CP-violating nucleon coupling constants show that each class of CP-violating models can give a measurable effect for the neutron scattering experiments. 57 refs

  16. 14th Conference on Flavor Physics and CP Violation

    CERN Document Server

    2016-01-01

    The 2016 edition of the Conference on Flavor Physics and CP Violation will be held at on the campus of the California Institute of Technology on 6-9 June. The FPCP conference series was founded in 2002 through the merger of the Heavy Flavor (HF) and B Physics and CP Violation (BPCP) conference series. A list of previous FPCP venues can be found here.

  17. Dynamical CP violation of the generalized Yang-Mills model

    International Nuclear Information System (INIS)

    Wang Dianfu; Chang Xiaojing; Sun Xiaoyu

    2011-01-01

    Starting from the generalized Yang-Mills model which contains, besides the vector part V μ , also a scalar part S and a pseudoscalar part P . It is shown, in terms of the Nambu-Jona-Lasinio (NJL) mechanism, that CP violation can be realized dynamically. The combination of the generalized Yang-Mills model and the NJL mechanism provides a new way to explain CP violation. (authors)

  18. Parity- and time-reversal-violating moments of light nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Vries, Jordy de, E-mail: devries@kvi.nl [KVI, theory group (Netherlands)

    2013-03-15

    I present the calculation of parity- and time-reversal-violating moments of the nucleon and light nuclei, originating from the QCD {theta}-bar term and effective dimension-six operators. By applying chiral effective field theory these calculations are performed in a unified framework. I argue that measurements of a few light-nuclear electric dipole moments would shed light on the mechanism of parity and time-reversal violation.

  19. Experimental searches for CP and CPT symmetries violation in the neutral kaons system

    International Nuclear Information System (INIS)

    Debu, P.

    1996-01-01

    The aim of this lecture is to give an overview of the experiments devoted to the study and research of CP, T and CPT symmetries invariance violations in the system of neutral K mesons. The discovery of K mesons has provided crucial informations for the elaboration of the standard model. However, the observation of CP violation has remained confined to the K system. The origin of the observed CP violation remains hypothetic. Its origin could be a complex phase in the mixing matrix of quarks. In the standard model of electroweak interactions, several evidences of the CP violation exist: the observed K neutral mesons (K L and K S ) are not proper states of CP and are due to CP violation in the K 0 - anti-K 0 mixture. On the other hand, the model predicts also a CP violation in decay amplitudes, named direct CP violation. Important experiments have been carried out for its demonstration. The K system is also the most precise test for CPT invariance. A description of the experiments in progress developed to improve the precision of these tests is given. The plan of the lecture is the following: after a recall of K 0 - anti-K 0 phenomenology, some important steps in the CP violation study are described. Then, the regeneration phenomenon is briefly described and two of the most recent measurements of the direct CP violation parameter are analysed. Finally, the CPT invariance tests are described with their parameters and the measurements in progress. A review of the principal results is given in conclusion with their improvements expected in a near future. (J.S.). 71 refs., 4 figs., 4 tabs

  20. Probability density functions for CP-violating rephasing invariants

    Science.gov (United States)

    Fortin, Jean-François; Giasson, Nicolas; Marleau, Luc

    2018-05-01

    The implications of the anarchy principle on CP violation in the lepton sector are investigated. A systematic method is introduced to compute the probability density functions for the CP-violating rephasing invariants of the PMNS matrix from the Haar measure relevant to the anarchy principle. Contrary to the CKM matrix which is hierarchical, it is shown that the Haar measure, and hence the anarchy principle, are very likely to lead to the observed PMNS matrix. Predictions on the CP-violating Dirac rephasing invariant |jD | and Majorana rephasing invariant |j1 | are also obtained. They correspond to 〈 |jD | 〉 Haar = π / 105 ≈ 0.030 and 〈 |j1 | 〉 Haar = 1 / (6 π) ≈ 0.053 respectively, in agreement with the experimental hint from T2K of | jDexp | ≈ 0.032 ± 0.005 (or ≈ 0.033 ± 0.003) for the normal (or inverted) hierarchy.