WorldWideScience

Sample records for security violations

  1. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  2. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    Science.gov (United States)

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  3. Unified criterion for security of secret sharing in terms of violation of Bell inequalities

    International Nuclear Information System (INIS)

    Sen, Aditi; Sen, Ujjwal; Zukowski, Marek

    2003-01-01

    In secret sharing protocols, a secret is to be distributed among several partners such that leaving out any number of them, the rest do not have the complete information. Strong multiqubit correlations in the state by which secret sharing is carried out had been proposed as a criterion for security of such protocols against individual attacks by an eavesdropper. However we show that states with weak multiqubit correlations can also be used for secure secret sharing. That our state has weak multiqubit correlations is shown from the perspective of violation of local realism, and also by showing that its higher-order correlations are described by lower ones. We then present a unified criterion for security of secret sharing in terms of violation of local realism, which works when the secret sharing state is the Greenberger-Horne-Zeilinger state (with strong multiqubit correlations), as well as states of a different class (with weak multiqubit correlations)

  4. Detection of information security violations with the aid of information and telecommunication networks monitoring

    International Nuclear Information System (INIS)

    Kovalev, D.O.

    2011-01-01

    Author has studied the methods and algorithms used in the monitoring of information security (IS), the distribution law of the number of IS messages, has developed a method and an algorithm for detecting IS violations in the message flow, a technique for generating the consolidated evaluation of results of monitoring the data and telecommunications network information security. Practical recommendations for improving the IS monitoring have been elaborated [ru

  5. 48 CFR 3003.204 - Treatment of violations.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Treatment of violations. 3003.204 Section 3003.204 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS...

  6. 15 CFR 785.20 - Reporting a violation.

    Science.gov (United States)

    2010-01-01

    ...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS ENFORCEMENT § 785... Industry and Security, U.S. Department of Commerce, 14th Street and Constitution Avenue, NW., Room H-4520... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Reporting a violation. 785.20 Section...

  7. 15 CFR 700.74 - Violations, penalties, and remedies.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Violations, penalties, and remedies. 700.74 Section 700.74 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE...

  8. 17 CFR 14.4 - Violation of Commodity Exchange Act.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Violation of Commodity Exchange Act. 14.4 Section 14.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... Exchange Act. The Commission may deny, temporarily or permanently, the privilege of appearing or practicing...

  9. Social Security Funds Clamor for Reform

    Institute of Scientific and Technical Information of China (English)

    郑秉文

    2008-01-01

    This paper analyzed the institutional deficiencies inherent in China’s social security system based on a dissection of various social security fund violations. It holds that the unscientific design in social security system is the root cause for social security fund violations, which is reflected in low level of social security unification, irrational investment system and legislative loopholes etc. Currently, China’s social security funds are facing risks in management and in system; The key of risk control lies in the reforming of the overall framework of social security system through the following aspects: 1) readjust the unified account system structure to raise the level of unification; 2) reform funds investment system to boost ROI; 3) speeding up legislative to regulate the administrative costs and the behaviors of its entities.

  10. 48 CFR 3003.203 - Reporting suspected violations of the Gratuities clause.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Reporting suspected violations of the Gratuities clause. 3003.203 Section 3003.203 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL IMPROPER BUSINESS...

  11. Big Data and Heath Impacts of Drinking Water Quality Violation

    Science.gov (United States)

    Allaire, M.; Zheng, S.; Lall, U.

    2017-12-01

    Health impacts of drinking water quality violations are only understood at a coarse level in the United States. This limits identification of threats to water security in communities across the country. Substantial under-reporting is suspected due to requirements at U.S. public health institutes that water borne illnesses be confirmed by health providers. In the era of `big data', emerging information sources could offer insight into waterborne disease trends. In this study, we explore the use of fine-resolution sales data for over-the-counter medicine to estimate the health impacts of drinking water quality violations. We also demonstrate how unreported water quality issues can be detected by observing market behavior. We match a panel of supermarket sales data for the U.S. at the weekly level with geocoded violations data from 2006-2015. We estimate the change in anti-diarrheal medicine sale due to drinking water violations using a fixed effects model. We find that water quality violations have considerable effects on medicine sales. Sales nearly double due to Tier 1 violations, which pose an immediate health risk, and sales increase 15.1 percent due to violations related to microorganisms. Furthermore, our estimate of diarrheal illness cases associated with water quality violations indicates that the Centers for Disease Control and Prevention (CDC) reporting system may only capture about one percent of diarrheal cases due to impaired water. Incorporating medicine sales data could offer national public health institutes a game-changing way to improve monitoring of disease outbreaks. Since many disease cases are not formally diagnosed by health providers, consumption information could provide additional information to remedy under-reporting issues and improve water security in communities across the United States.

  12. 44 CFR 17.620 - Effect of violation.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Effect of violation. 17.620 Section 17.620 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (GRANTS) § 17.620 Effect of...

  13. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  14. Ethics issues in security hospitals.

    Science.gov (United States)

    Weinstein, Henry C

    2002-01-01

    The term 'security hospital' is used for a variety of facilities including forensic hospitals and prison hospitals, which, because of their mission, the nature of their work, and the populations they serve-or because of the authority under which they operate-place the staff at considerable risk of ethical violations related to either clinical care or to forensic activities. The problem of divided loyalties is of special concern in security hospitals. Ethics principles particularly at risk are confidentiality and informed consent. Where there are cultural disparities between the staff and the patients, differences in background, socioeconomic class, education, and other types of diversity, cultural awareness is required and must be reflected in appropriate treatment and evaluation. To counteract the risks of ethical violations, a security hospital should create an ethical climate and develop means to anticipate, prevent, and deal with ethical violations. These might include detailed and specific policies and procedures, programs of orientation, education, consultation, and liaison as well as its own ethics committee. Copyright 2002 John Wiley & Sons, Ltd.

  15. 77 FR 19153 - Nonpayment of Benefits to Fugitive Felons and Probation or Parole Violators

    Science.gov (United States)

    2012-03-30

    ... toll-free number, 1-800-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA 2006-0173] RIN 0960-AG12 Nonpayment of Benefits to Fugitive Felons and Probation or Parole Violators AGENCY: Social Security...

  16. Demonstration Of The Violation Of Bell Inequality In Quantum Key Distribution

    International Nuclear Information System (INIS)

    Dermez, R.

    2010-01-01

    Today, the data privacy has become very important. Quantum Key Distribution (QKD) system is developed in this area. QKD, coding technique with single-use method of encoding used keys (information and messages) security guarantees. The system is based on Quantum Mechanics (The Certainty Principle). However, in some cases for quantum communication, QKD are limited. In determining this limit Bell Inequality (CHSH Inequality, 1969) is used. Bell inequality shows a violation of Quantum Key Distribution. In this study, using the program of Matematica 6, QKD through bilateral quantum system (system with two qubits) has been investigating the leak case and the violations. We showed leakage and violations in these figures via the calculations results in Matematica program.

  17. The Impact of Gender on the Processing of Probation Violations and Contempt: A Study of One Juvenile Court

    Directory of Open Access Journals (Sweden)

    M. Dyan McGuire

    2013-12-01

    Full Text Available There is substantial evidence to suggest that in at least some contexts juvenile court judges are circumventing the proscription contained in the Juvenile Justice and Delinquency Prevention Act (“JJDPA”, which prohibits the secure confinement of status offenders, by securely detaining status offenders for contempt.  Some evidence also indicates that gender may influence whether a juvenile is detained as a result of violating a valid court order.  This study seeks to expand existing research by examining what happens to court order violators beyond detention and by explicitly comparing the treatment of court order violators with the treatment of probation violators in terms of detention, adjudication and confinement to shed light on how gender influences these decision points.  While high rates of detention and commitment were uncovered, these results do not suggest that females were more likely to experience these consequences than males.

  18. Department of Defense: Observations on the National Industrial Security Program

    National Research Council Canada - National Science Library

    Barr, Ann C; Denomme, Thomas J; Booth, Brandon; Krump, John; Sloan, Karen; Slodkowski, Lillian; Sterling, Suzanne

    2008-01-01

    .... In terms of facility oversight, DSS maintained files on contractor facilities security programs and their security violations, but it did not analyze this information to determine, for example...

  19. Hacking a Bridge: An Exploratory Study of Compliance-Based Information Security Management in Banking Organization

    Directory of Open Access Journals (Sweden)

    Tesleem Fagade

    2017-10-01

    Full Text Available This work is approached through the lens of compliant security by drawing on the concepts of neutralization theory, a prominent postulation in the criminology domain and the 'big five' personality construct. This research is conducted based on a case study of ISO/IEC27001 Standard certified banks, to empirically evaluate the link between cybersecurity protocols violation and how employees rationalise security behaviour. We propose that compliance-based security has the propensity for a heightened sense of false security and vulnerability perception; by showing that systemic security violation in compliance-based security models can be explained by the level of linkages from the personality construct and the neutralization theory. Building on the survey responses from banking organization employees and the application of partial least square structural equation modelling (PLS-SME analysis to test the hypotheses and validate survey samples, we draw a strong inference to support the importance of individual security scenario effect as a vital complementary element of compliance-based security. Based on our initial findings, conceptual principles and practical guidelines for reducing insider threats and improving employees' compliance is presented. We then suggest how information security protocol violations can be addressed in that context.

  20. CP violation

    CERN Document Server

    1989-01-01

    Contents: CP Phenomenology: Introduction to CP Violation (C Jarlskog); CP-Violation in the K 0 -K 0 -System (K Kleinknecht); The Quark Mixing Matrix, Charm Decays and B Decays (S Stone); The Question of CP Noninvariance - As Seen through the Eyes of Neutral Beauty (I I Bigi et al.); In Search of CP Noninvariance in Heavy Quark Systems (L-L Chau); CP Violation at High Energy e + e - Colliders (J Bernabéu & M B Gavela); CP Violation in the Standard Model with Four Families (A Datta & E A Paschos); CP Effects When Neutrinos are their Own Antiparticles (B Kayser); On Spontaneous CP Violation Trigg

  1. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  2. Draft secure medical database standard.

    Science.gov (United States)

    Pangalos, George

    2002-01-01

    Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.

  3. CP Violation course

    CERN Multimedia

    CERN. Geneva HR-RFA

    2006-01-01

    The lecture introduces the concepts and phenomena of matter-antimatter symmetry violation, so-called "CP" violation. The lecture is organized in four courses, the first being devoted to a historical overview and an introduction into fundamental discrete symmetries. The second course introduces the most compelling CP-violating phenomena, and presents the first experimental discovery of CP violation in the neutral kaon system. The third course discusses how CP violation is beautifully incorporated into the Standard Model of particle interactions, and how modern B-meson "factories" provide precise tests of this picture. Finally, the fourth and last course introduces CP violation and the genesis of our matter world.

  4. From hadronic parity violation to electron parity-violating experiments

    International Nuclear Information System (INIS)

    Oers, Willem T.H. van

    2010-01-01

    The weak interaction is manifested in parity-violating observables. With the weak interaction extremely well known parity-violating measurements in hadronic systems can be used to deduce strong interaction effects in those systems. Parity-violating analyzing powers in electron-proton scattering have led to determining the strange quark contributions to the charge and magnetization distributions of the nucleon. Parity-violating electron-proton and electron-electron scattering can also be performed to test the predictions of the Standard Model in the 'running' of the electroweak mixing angle or sin 2 θ W .

  5. Accounting and Control in Ensuring Economic Security of the Organizations of Perm Region

    Directory of Open Access Journals (Sweden)

    Vyacheslav Valetyevich Epishin

    2016-09-01

    Full Text Available The article deals with the urgent problem concerning the regional development as well as the specific organization, or to the development of an integrated system of economic security of the organization. The article discusses the importance of such an element of economic security (including the financial security as the accounting and control as well as their possible violations. The authors substantiate their position on the relationship of the violations of accounting and control and also the internal theft, other economic crimes and their negative consequences. The analysis of the existing national and foreign sources related to the subject of the study is carried out. The conclusion is made about the lack of modern research devoted to the study of the protective properties of accounting, control and their violations, which condition economic crimes. The methodological tools of the research include dialectic method, systemic analysis, complex sociological methods: the analysis of the legal sources, of statistical information and judicial practice. On the basis of the analysis of criminal cases, financial statements, publications media, the authors made the conclusion about the conditionality of the theft in the organizations as there are the violations of accounting and control, low efficiency of control and auditing, of preventive measures for neutralization of the violations of accounting and control from the services of economic security, accounting offices, auditing and law enforcement services. The recommendations for the optimization of this work are introduced. They can be used by accounting departments, auditing bodies, fiscal authorities at the municipal and regional level and by law enforcement officials. The economic security is necessary for any organizations regardless of their forms of ownership, ranging from government organizations to small kiosks. The difference will only consist in the means and methods.

  6. Computer security at ukrainian nuclear facilities: interface between nuclear safety and security

    International Nuclear Information System (INIS)

    Chumak, D.; Klevtsov, O.

    2015-01-01

    Active introduction of information technology, computer instrumentation and control systems (I and C systems) in the nuclear field leads to a greater efficiency and management of technological processes at nuclear facilities. However, this trend brings a number of challenges related to cyber-attacks on the above elements, which violates computer security as well as nuclear safety and security of a nuclear facility. This paper considers regulatory support to computer security at the nuclear facilities in Ukraine. The issue of computer and information security considered in the context of physical protection, because it is an integral component. The paper focuses on the computer security of I and C systems important to nuclear safety. These systems are potentially vulnerable to cyber threats and, in case of cyber-attacks, the potential negative impact on the normal operational processes can lead to a breach of the nuclear facility security. While ensuring nuclear security of I and C systems, it interacts with nuclear safety, therefore, the paper considers an example of an integrated approach to the requirements of nuclear safety and security

  7. T-violating effects in neutron physics and CP-violation in gauge models

    International Nuclear Information System (INIS)

    Herczeg, P.

    1987-01-01

    Discussed in this paper is the subject of T-violation in the transmission of polarized neutrons through polarized and oriented targets. Considered is the possible size of the T-violating effects both from a phenomenological point of view, and also in gauge models with CP-violation. A brief discussion of T-violating effects in β-decay is included

  8. CP violation in B decay

    OpenAIRE

    Yamamoto, Hitoshi

    2001-01-01

    We review the physics of CP violation in B decays. After introducing the CKM matrix and how it causes CP violation, we cover three types of CP violation that can occur in B decays: CP violation in mixing, CP violation by mixing-decay interference, and CP violation in decay.

  9. 48 CFR 2803.104-10 - Violations or possible violations.

    Science.gov (United States)

    2010-10-01

    ... General IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 2803.104-10 Violations... action to be taken. The types of actions that would normally be taken when a violation has occurred that...

  10. Modeling and Security Threat Assessments of Data Processed in Cloud Based Information Systems

    Directory of Open Access Journals (Sweden)

    Darya Sergeevna Simonenkova

    2016-03-01

    Full Text Available The subject of the research is modeling and security threat assessments of data processed in cloud based information systems (CBIS. This method allow to determine the current security threats of CBIS, state of the system in which vulnerabilities exists, level of possible violators, security properties and to generate recommendations for neutralizing security threats of CBIS.

  11. 77 FR 76319 - Self-Regulatory Organizations; BOX Options Exchange LLC; Order Approving Minor Rule Violation...

    Science.gov (United States)

    2012-12-27

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68489; File No. 4-655] Self-Regulatory Organizations; BOX Options Exchange LLC; Order Approving Minor Rule Violation Plan for BOX Options Exchange LLC... \\4\\ requiring that a self-regulatory organization (``SRO'') promptly file notice with the Commission...

  12. Tight Bound on Randomness for Violating the CHSH Inequality

    OpenAIRE

    Teng, Yifeng; Yang, Shenghao; Wang, Siwei; Zhao, Mingfei

    2015-01-01

    Free will (or randomness) has been studied to achieve loophole-free Bell's inequality test and to provide device-independent quantum key distribution security proofs. The required randomness such that a local hidden variable model (LHVM) can violate the Clauser-Horne-Shimony-Holt (CHSH) inequality has been studied, but a tight bound has not been proved for a practical case that i) the device settings of the two parties in the Bell test are independent; and ii) the device settings of each part...

  13. 17 CFR 245.103 - Issuer right of recovery; right of action by equity security owner.

    Science.gov (United States)

    2010-04-01

    ..., conversion or termination of a derivative security) in violation of section 306(a)(1) of that Act of an... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Issuer right of recovery; right of action by equity security owner. 245.103 Section 245.103 Commodity and Securities Exchanges...

  14. 48 CFR 903.104-7 - Violations or possible violations.

    Science.gov (United States)

    2010-10-01

    ... violation or possible violation of subsections 27 (a), (b), (c) or (d) of the Office of Federal Procurement... disclosure of proprietary or source selection information is the Assistant General Counsel for Procurement...) and (2) for Headquarters activities is the Agency Ethics Official (Designated Agency Ethics Official...

  15. 15 CFR 785.2 - Violations of the Act subject to administrative and criminal enforcement proceedings.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Violations of the Act subject to administrative and criminal enforcement proceedings. 785.2 Section 785.2 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE...

  16. CP violation and modular symmetries

    International Nuclear Information System (INIS)

    Dent, Thomas

    2001-01-01

    We reconsider the origin of CP violation in fundamental theory. Existing string models of spontaneous CP violation make ambiguous predictions, due to the arbitrariness of CP transformation and the apparent noninvariance of the results under duality. We find a modular CP invariance condition, applicable to any predictive model of spontaneous CP violation, which circumvents these problems; it strongly constrains CP violation by heterotic string moduli. The dilaton is also evaluated as a source of CP violation, but is likely experimentally excluded. We consider the prospects for explaining CP violation in strongly coupled strings and brane worlds

  17. CP violation

    Indian Academy of Sciences (India)

    We have just entered a period during which we expect considerable progress toward understanding CP violation. Here we review what we have learnt so far, and what is to be expected in the near future. To do this we cover the foundation of CP violation at a level which can be understood by physicists who are not working ...

  18. Economic sanctions as human rights violations: reconciling political and public health imperatives.

    Science.gov (United States)

    Marks, S P

    1999-10-01

    The impact of economic sanctions on civilians has frequently been studied by public health specialists and specialized agencies of the United Nations (UN). This commentary explores some of the difficulties of the claim that sanctions constitute violations of human rights. The deprivation suffered by civilian populations under sanctions regimes often are violations of economic, social, and cultural human rights; however, the attribution of responsibility for those violations to the "senders" of sanctions (the UN Security Council or the US government, for example) is difficult to sustain, particularly in light of the efforts made by these entities to provide for humanitarian exemptions and humanitarian aid. A more productive approach to avoiding civilian harm is to prefer, as a matter of policy, arms embargoes, severing of communications, and international criminal prosecutions over trade embargoes. Promising recommendations have been formulated regarding "smart sanctions," which target regimes rather than people, and "positive sanctions" in the form of incentives. Health and human rights professionals have specific and important tasks in implementing such a restructured approach to sanctions.

  19. CP violation

    CERN Multimedia

    CERN. Geneva

    1999-01-01

    In the first two lectures, CP violation in the K system is pedagogically reviewed: its manifestations in the neutral K meson systems, in rare K meson decays and in decays of charged K mesons, and results from classical and current experiments, are discussed. In the third lecture, CP Violation in the B system and the forthcoming experimental tests will be discussed.

  20. Is CP violation maximal

    International Nuclear Information System (INIS)

    Gronau, M.

    1984-01-01

    Two ambiguities are noted in the definition of the concept of maximal CP violation. The phase convention ambiguity is overcome by introducing a CP violating phase in the quark mixing matrix U which is invariant under rephasing transformations. The second ambiguity, related to the parametrization of U, is resolved by finding a single empirically viable definition of maximal CP violation when assuming that U does not single out one generation. Considerable improvement in the calculation of nonleptonic weak amplitudes is required to test the conjecture of maximal CP violation. 21 references

  1. Security of Linear Secret-Sharing Schemes Against Mass Surveillance

    DEFF Research Database (Denmark)

    Giacomelli, Irene; Olimid, Ruxandra; Ranellucci, Samuel

    2015-01-01

    by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme...... there exists an undetectable subversion of it that efficiently allows surveillance. Second, we formalize the security notion that assures that a sharing scheme is secure against ASAs and construct the first sharing scheme that meets this notion....

  2. US statutes of general interest to safeguards and security officers

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1988-09-01

    This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)

  3. Security analysis of interconnected AC/DC systems

    DEFF Research Database (Denmark)

    Eriksson, Robert

    2015-01-01

    This paper analyses N-1 security in an interconnected ac/dc transmission system using power transfer distribution factors (PTDFs). In the case of a dc converter outage the power needs to be redistributed among the remaining converter to maintain power balance and operation of the dc grid...... any line or transformer limits. Simulations were performed in a model of the Nordic power system where a dc grid is placed on top. The simulation supports the method as a tool to consider transfer limits in the grid to avoid violate the same and increase the security after a converter outage........ The redistribution of power has a sudden effect on the power-flow in the interconnected ac system. This may cause overloading of lines and transformers resulting in disconnection of equipment, and as a consequence cascading failure. The PTDF is used as a method to analyze and avoid violating limits by in the dc...

  4. CP violation

    International Nuclear Information System (INIS)

    Quinn, H.

    1995-12-01

    In this talk the author briefly reviews the cosmological importance of CP violation and the status of calculations of baryogenisis in the context of the Standard Model. The author then turns to a discussion of Standard Model Predictions for CP violation in B decays, stressing the importance of multiple measurements to overconstrain the model parameters and thus search for indications of beyond-Standard-Model physics

  5. Errors and violations

    International Nuclear Information System (INIS)

    Reason, J.

    1988-01-01

    This paper is in three parts. The first part summarizes the human failures responsible for the Chernobyl disaster and argues that, in considering the human contribution to power plant emergencies, it is necessary to distinguish between: errors and violations; and active and latent failures. The second part presents empirical evidence, drawn from driver behavior, which suggest that errors and violations have different psychological origins. The concluding part outlines a resident pathogen view of accident causation, and seeks to identify the various system pathways along which errors and violations may be propagated

  6. Best Practices and Lessons Learned In LANL Approaches to Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Drypolcher, Katherine Carr [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-10-24

    Presentation includes slides on Physical Protection of Material in Transit; Graded Approach for Implementation Controls; Security Requirements; LANL Lessons Learned; Shipping Violation; Unmonitored Shipment; Foreign shipment; and the Conclusion.

  7. CP violation

    International Nuclear Information System (INIS)

    Gronau, M.

    1995-01-01

    We review the present status of the Standard Model of CP violation, which is based on a complex phase in the Cabibbo-Kobayashi-Maskawa (CKM) matrix. So far CP violation has been observed only in K 0 -K 0 mixing, consistent with a sizable phase. The implications of future CP nonconserving measusrements in K and B decays are discussed within the model. Direct CP violation in K→2π may be observed in the near future, however this would not be a powerful test of the model. B decays provide a wide variety of CP asymmetry measurements, which can serve as precise tests of the Standard Model in cases where the asymmetry is cleanly related to phases of CKM matrix elements. Some of the most promising cases are discussed. ((orig.))

  8. R-parity violating supersymmetry

    CERN Document Server

    Barbier, R.; Besancon, M.; Chemtob, M.; Deandrea, A.; Dudas, E.; Fayet, Pierre; Lavignac, S.; Moreau, G.; Perez, E.; Sirois, Y.

    2004-01-01

    The possible appearance of R-parity violating couplings, and hence implicitly the question of lepton and baryon number conservation, has been emphasised since the early development of supersymmetric theories. The rich phenomenology implied by R-parity violation has now gained full attention in the search for supersymmetry. In this review, theoretical and phenomenological implications of R-parity violation in supersymmetric theories are discussed, in relation with particle and astroparticle physics. Fundamental aspects include the relation with continuous and discrete symmetries, up to more recent developments on the Abelian family symmetries and hierarchy of R-parity violating couplings. The question of the generation of the standard model neutrino masses and mixings is presented. The possible contributions of R-parity violating Yukawa couplings in processes involving virtual supersymmetric particles and the resulting constraints are reviewed. Finally, a survey of the direct production of supersymmetric parti...

  9. Moral Violations Reduce Oral Consumption

    Science.gov (United States)

    Chan, Cindy; Van Boven, Leaf; Andrade, Eduardo B.; Ariely, Dan

    2014-01-01

    Consumers frequently encounter moral violations in everyday life. They watch movies and television shows about crime and deception, hear news reports of corporate fraud and tax evasion, and hear gossip about cheaters and thieves. How does exposure to moral violations influence consumption? Because moral violations arouse disgust and because disgust is an evolutionarily important signal of contamination that should provoke a multi-modal response, we hypothesize that moral violations affect a key behavioral response to disgust: reduced oral consumption. In three experiments, compared with those in control conditions, people drank less water and chocolate milk while (a) watching a film portraying the moral violations of incest, (b) writing about moral violations of cheating or theft, and (c) listening to a report about fraud and manipulation. These findings imply that “moral disgust” influences consumption in ways similar to core disgust, and thus provide evidence for the associations between moral violations, emotions, and consumer behavior. PMID:25125931

  10. Moral Violations Reduce Oral Consumption.

    Science.gov (United States)

    Chan, Cindy; Van Boven, Leaf; Andrade, Eduardo B; Ariely, Dan

    2014-07-01

    Consumers frequently encounter moral violations in everyday life. They watch movies and television shows about crime and deception, hear news reports of corporate fraud and tax evasion, and hear gossip about cheaters and thieves. How does exposure to moral violations influence consumption? Because moral violations arouse disgust and because disgust is an evolutionarily important signal of contamination that should provoke a multi-modal response, we hypothesize that moral violations affect a key behavioral response to disgust: reduced oral consumption. In three experiments, compared with those in control conditions, people drank less water and chocolate milk while (a) watching a film portraying the moral violations of incest, (b) writing about moral violations of cheating or theft, and (c) listening to a report about fraud and manipulation. These findings imply that "moral disgust" influences consumption in ways similar to core disgust, and thus provide evidence for the associations between moral violations, emotions, and consumer behavior.

  11. A protect solution for data security in mobile cloud storage

    Science.gov (United States)

    Yu, Xiaojun; Wen, Qiaoyan

    2013-03-01

    It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.

  12. CP violation and modular symmetries

    OpenAIRE

    Dent, Thomas

    2001-01-01

    We reconsider the origin of CP violation in fundamental theory. Existing string models of spontaneous CP violation make ambiguous predictions, due to the arbitrariness of CP transformation and the apparent non-invariance of the results under duality. We find an unambiguous modular CP invariance condition, applicable to predictive models of spontaneous CP violation, which circumvents these problems; it strongly constrains CP violation by heterotic string moduli. The dilaton is also evaluated a...

  13. Extrinsic CPT Violation in Neutrino Oscillations

    International Nuclear Information System (INIS)

    Ohlsson, Tommy

    2004-01-01

    In this talk, we investigate extrinsic CPT violation in neutrino oscillations in matter with three flavors. Note that extrinsic CPT violation is different from intrinsic CPT violation. Extrinsic CPT violation is one way of quantifying matter effects, whereas intrinsic CPT violation would mean that the CPT invariance theorem is not valid. We present analytical formulas for the extrinsic CPT probability differences and discuss their implications for long-baseline experiments and neutrino factory setups

  14. CP-violations in B decays

    Indian Academy of Sciences (India)

    Recent results on CP-violation measurements in decays from energy asymmetric -factory experiments are reported. Thanks to large accumulated data samples, CP-violations in decays in mixing-decay interference and direct CP-violation are now firmly established. The measurements of three angles of the unitarity ...

  15. The UN Security Council and prevention of displacement

    Directory of Open Access Journals (Sweden)

    Sanjula Weerasinghe

    2012-12-01

    Full Text Available Respecting the prohibitions against forced and arbitrary displacementcould significantly reduce the risk of, or prevent, displacement insituations of armed conflict, as could insisting on accountabilityfor violations of these prohibitions that amount to war crimes orcrimes against humanity. The UN Security Council has only partiallyaddressed these issues.

  16. CP violation in B decays

    International Nuclear Information System (INIS)

    Kayser, B.

    1990-01-01

    The study of CP-violating effects in B decays will be a good test of whether CP violation is caused by the known weak interaction. If this is its origin, then large, cleanly-predicted CP-violating effects are expected in certain neutral B decays to hadronic CP eigenstates. The phenomenology of CP violation in the B system is reviewed, and the genesis of these large effects is explained. In this it is shown that large, cleanly-predicted effects are also expected in some decays to states which are not CP eigenstates. The combined study of the latter decays and those to CP eigenstates may make it possible to obtain a statistically-significant CP-violating signal with fewer B mesons that would otherwise be required

  17. Speeded Recognition of Ungrammaticality: Double Violations.

    Science.gov (United States)

    Moore, Timothy E.; Biederman, Irving

    1979-01-01

    The speed at which sentences with various kinds of violations could be rejected was studied. Compatible with the sequential model was the finding that noun-verb and adjective-noun double violations did not result in shorter reaction times than noun-verb single violations, although double violations were judged less acceptable. (Author/RD)

  18. Device-independent two-party cryptography secure against sequential attacks

    International Nuclear Information System (INIS)

    Kaniewski, Jędrzej; Wehner, Stephanie

    2016-01-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser–Horne–Shimony–Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation. (paper)

  19. Device-independent two-party cryptography secure against sequential attacks

    Science.gov (United States)

    Kaniewski, Jędrzej; Wehner, Stephanie

    2016-05-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser-Horne-Shimony-Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.

  20. Beautiful CP violation

    International Nuclear Information System (INIS)

    Dunietz, I.

    1997-01-01

    CP violation is observed to date only in K 0 decays and is parameterizable by a single quantity ε. Because it is one of the least understood phenomena in the Standard Model and holds a clue to baryogenesis, it must be investigated further. Highly specialized searches in K 0 decays are possible. Effects in B decays are much larger. In addition to the traditional B d → J/ψK S , π + π - asymmetries, CP violation could be searched for in already existing inclusive B data samples. The rapid B s --anti B s oscillations cancel in untagged B s data samples, which therefore allow feasibility studies for the observation of CP violation and the extraction of CKM elements with present vertex detectors. The favored method for the extraction of the CKM angle γ is shown to be unfeasible and a solution is presented involving striking direct CP violation in charged B decays. Novel methods for determining the B s mixing parameter Δm are described without the traditional requirement of flavor-specific final states

  1. An Integrative Behavioral Model of Information Security Policy Compliance

    Directory of Open Access Journals (Sweden)

    Sang Hoon Kim

    2014-01-01

    Full Text Available The authors found the behavioral factors that influence the organization members’ compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members’ attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1 the study is expected to play a role of the baseline for future research about organization members’ compliance with the information security policy, (2 the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3 the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training

  2. An integrative behavioral model of information security policy compliance.

    Science.gov (United States)

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing

  3. CP violation in gauge theories

    International Nuclear Information System (INIS)

    Escobar, C.O.

    Some aspects of CP violation in gauge theories are reviewed. The topics covered include a discussion of the Kobayashi-Maskawa six-quarks model, models of soft- CP violation (extended Higgs sector), the strong CP problem and finally some speculations relating CP violation and magnetic charges in non-abelian gauge theories. (Author) [pt

  4. Security breaches: tips for assessing and limiting your risks.

    Science.gov (United States)

    Coons, Leeanne R

    2011-01-01

    As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.

  5. 75 FR 13176 - Self-Regulatory Organizations; National Association of Securities Dealers, Inc. (n/k/a Financial...

    Science.gov (United States)

    2010-03-18

    ... Regulation of Securities, Business Law Section, American Bar Association (ABA), to Jonathan Katz, Secretary... Securities, Business Law Section, American Bar Association, to Jonathan Katz, Secretary, SEC, dated January 4... of the receipt of investment banking business would violate the spinning provision. Instead, FINRA is...

  6. Phenomenology of CP violation

    International Nuclear Information System (INIS)

    Ecker, G.

    1987-01-01

    A short survey of the theoretical status of CP violation is presented. The Standart Model is confronted with the present experimental situation. Possible future tests of our notions of CP violation are discussed, concentrating on rare K decays. Other promising reactions such as B decays are briefly reviewed. Among alternative models of CP violation, multi-Higgs extensions of the Standart Model, left-right symmetric gauge theories and minimal SUSY models are discussed. Finally, the relevance of generalized CP invariance is emphasized. 64 refs., 7 figs. (Author)

  7. Searching for Lorentz violation

    International Nuclear Information System (INIS)

    Allen, Roland E.; Yokoo, Seiichirou

    2004-01-01

    Astrophysical, terrestrial, and space-based searches for Lorentz violation are very briefly reviewed. Such searches are motivated by the fact that all superunified theories (and other theories that attempt to include quantum gravity) have some potential for observable violations of Lorentz invariance. Another motivation is the exquisite sensitivity of certain well-designed experiments and observations to particular forms of Lorentz violation. We also review some new predictions of a specific Lorentz-violating theory: If a fundamental energy m-bar c2 in this theory lies below the usual GZK cutoff E GZK , the cutoff is shifted to infinite energy; i.e., it no longer exists. On the other hand, if m-bar c2 lies above E GZK , there is a high-energy branch of the fermion dispersion relation which provides an alternative mechanism for super-GZK cosmic-ray protons

  8. Testing New Indirect CP Violation

    International Nuclear Information System (INIS)

    Grossman, Yuval; Nir, Yosef; Perez, Gilad

    2009-01-01

    If new CP violating physics contributes to neutral meson mixing, but its contribution to CP violation in decay amplitudes is negligible, then there is a model independent relation between four (generally independent) observables related to the mixing: the mass splitting (x), the width splitting (y), the CP violation in mixing (1-|q/p|), and the CP violation in the interference of decays with and without mixing (φ). For the four neutral meson systems, this relation can be written in a simple approximate form: ytanφ≅x(1-|q/p|). In the K system, all four observables have been measured and obey the relation to excellent accuracy. For the B s and D systems, new predictions are provided. The success or failure of these relations will probe the physics that is responsible for the CP violation.

  9. Psychological contract types as moderator in the breach-violation and violation-burnout relationships.

    Science.gov (United States)

    Jamil, Amber; Raja, Usman; Darr, Wendy

    2013-01-01

    This research examined the relationships between perceived psychological contract breach, felt violation, and burnout in a sample (n = 361) of employees from various organizations in Pakistan. The moderating role of contract types in these relationships was also tested. Findings supported a positive association between perceived psychological contract breach and felt violation and both were positively related to burnout. Transactional and relational contracts moderated the felt violation-burnout relationship. Scores on relational contract type tended to be higher than for transactional contract type showing some contextual influence.

  10. Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS

    OpenAIRE

    Bauereiss , Thomas; Hutter , Dieter

    2014-01-01

    Part 6: Information Flow Control; International audience; Motivated by typical security requirements of workflow management systems, we consider the integrated verification of both safety properties (e.g. separation of duty) and information flow security predicates of the MAKS framework (e.g. modeling confidentiality requirements). Due to the refinement paradox, enforcement of safety properties might violate possibilistic information flow properties of a system. We present an approach where s...

  11. CP violation, flavour violation and fermion mass relations in some horizontal gauge theories

    International Nuclear Information System (INIS)

    Shanker, O.

    1981-01-01

    Six quark horizontal gauge models incorporating a natural suppression mechanism for diagonal flavour-changing currents are considered. Some interesting possibilities for CP violation, flavour violation, fermion mass and mixing angle relation in these models are studied. (author)

  12. Parliamentary control of security information agency in terms of security culture: State and problems

    Directory of Open Access Journals (Sweden)

    Radivojević Nenad

    2013-01-01

    Full Text Available Even though security services have the same function as before, today they have different tasks and significantly more work than before. Modern security problems of the late 20th and early 21st century require states to reorganize their security services, adapting them to the new changes. The reorganization involves, among other things, giving wider powers of the security services, in order to effectively counter the growing and sophisticated security threats, which may also lead to violations of human rights and freedoms. It is therefore necessary to define the right competence, organization, authority and control of these services. In democratic countries, there are several institutions with different levels of control of security services. Parliament is certainly one of the most important institutions in that control, both in the world and in our country. Powers, finance, the use of special measures and the nature and scope of work of the Security Information Agency are certainly object of the control of the National Assembly. What seems to be the problem is achieving a balance between the need for control of security services and security services to have effective methods for combating modern security problems. This paper presents the legal framework related to the National Assembly control of the Security Intelligence Agency, as well as the practical problems associated with this type of control. We analyzed the role of security culture as one of the factors of that control. In this regard, it provides guidance for the practical work of the members of parliament who control the Security Intelligence Agency, noting in particular the importance of and the need for continuous improvement of security culture representatives.

  13. CP violation in b-hadrons

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00341004

    2016-01-01

    Latest LHCb measurements of $CP$ violation in b-hadrons are presented based on $pp$ collision data collected in 2011 and 2012 at centre-of-mass energies of $\\sqrt{s}=7$ $\\rm TeV$ and $8\\ \\rm TeV$ respectively. The total integrated luminosity collected is 3.0 fb$^{-1}$. Results include recent measurements of $CP$ violation in $B_d$ and $B_s$ mixing, along with those of quantifying the effects of $b\\to c\\bar{c} s$ loop pollution. Standard Model $CP$ violation tests in loop transitions are discussed with results consistent with expectations. New decays of b-baryons are presented and preliminary studies of $CP$ violation are performed.

  14. CP-violation and instantons

    International Nuclear Information System (INIS)

    Han, C.G.

    1980-01-01

    Effects of Yang-Mills instantons on CP-violating strong interactions are studied. Using simplified models of CP-noninvariant weak interactions, we calculate the induced strong CP-violation. Even in the simple examples studied, the CP-violating phase of a vacuum-to-vacuum transition amplitude differs in general from the phase of the determinant of the quark mass matrix multiplied by the topological charge of the background Yang-Mills field. Then several CP-violating phenomena such as eta → 2π decay and neutron electric dipole moment induced by instantons are studied. The result of our explicit calculation of eta → 2π decay strength verifies the current algebraic method used by Crewther et al. We also present a calculation of the instanton contribution, in the dilute gas approximation for instanton gas, to the electric dipole moment of a free quark without using 't Hooft's effective Lagrangian

  15. Parity violation in neutron resonances

    International Nuclear Information System (INIS)

    Mitchell, G.E.; Lowie, L.Y.; Bowman, J.D.; Knudson, J.; Crawford, B.E.; Delheij, P.P.J.; Haseyama, T.; Masaike, A.; Matsuda, Y.; Masuda, Y.

    1997-01-01

    The observation of very large parity violation in neutron resonances has led to a new approach to the study of symmetry breaking in nuclei. The origin of the enhancement of parity violation is discussed, as well as the new (statistical) analysis approach. The TRIPLE experimental system and analysis methods, their improvements are described. Sign correlation and results from recent parity violation experiments are presented and discussed. (author)

  16. Symmetry violating kaon decays

    International Nuclear Information System (INIS)

    Herczeg, P.

    1979-01-01

    An analysis of the muon number violating decay modes of the K-mesons is given. Subsequently, some new developments in the field of CP-violation are reviewed and the question of time-reversal invariance and the status of CPT-invariance are briefly considered. 42 references

  17. Border Security: A Conceptual Model of Complexity

    Science.gov (United States)

    2013-12-01

    law , constitutional powers, environmental regulations, and civil rights, http://tpplegal.files.wordpress.com/2012/05/isds-domestic-legal-process...Violation NAFTA North American Free Trade Agreement NII Non-Intrusive Inspection POE Port of Entry PPD-8 Presidential Policy Directive 8...security measured? What constitutes a measure of effectiveness for protection? These are all questions presented to representatives of the Department of

  18. Secure ICCP Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Rice, Mark J.; Bonebrake, Christopher A.; Dayley, Greg K.; Becker, Larry J.

    2017-06-30

    Inter-Control Center Communications Protocol (ICCP), defined by the IEC 60870-6 TASE.2 standard, was developed to enable data exchange over wide area networks between electric system entities, including utility control centers, Independent System Operators (ISOs), Regional Transmission Operators (RTOs) and Independent Power Producers (IPP) also known as Non-Utility Generators (NUG). ICCP is an unprotected protocol, and as a result is vulnerable to such actions as integrity violation, interception or alteration, spoofing, and eavesdropping. Because of these vulnerabilities with unprotected ICCP communication, security enhancements, referred to as Secure ICCP, have been added and are included in the ICCP products that utilities have received since 2003 when the standard was defined. This has resulted in an ICCP product whose communication can be encrypted and authenticated to address these vulnerabilities.

  19. How norm violations shape social hierarchies : Those who stand on top block norm violators from rising up

    NARCIS (Netherlands)

    Stamkou, E.; van Kleef, G.A.; Homan, A.C.; Galinsky, A.D.

    2016-01-01

    Norm violations engender both negative reactions and perceptions of power from observers. We addressed this paradox by examining whether observers’ tendency to grant power to norm followers versus norm violators is moderated by the observer’s position in the hierarchy. Because norm violations

  20. 7 CFR 631.14 - Contract violations.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE LONG TERM CONTRACTING GREAT PLAINS CONSERVATION PROGRAM Contracts § 631.14 Contract violations. Contract violations, determinations and appeals will be handled in accordance with the terms of the... 7 Agriculture 6 2010-01-01 2010-01-01 false Contract violations. 631.14 Section 631.14 Agriculture...

  1. Exploring CP Violation in the MSSM

    CERN Document Server

    Arbey, A.; Godbole, R.M.; Mahmoudi, F.

    2015-01-01

    We explore the prospects for observing CP violation in the minimal supersymmetric extension of the Standard Model (MSSM) with six CP-violating parameters, three gaugino mass phases and three phases in trilinear soft supersymmetry-breaking parameters, using the CPsuperH code combined with a geometric approach to maximize CP-violating observables subject to the experimental upper bounds on electric dipole moments. We also implement CP-conserving constraints from Higgs physics, flavour physics and the upper limits on the cosmological dark matter density and spin-independent scattering. We study possible values of observables within the constrained MSSM (CMSSM), the non-universal Higgs model (NUHM), the CPX scenario and a variant of the phenomenological MSSM (pMSSM). We find values of the CP-violating asymmetry A_CP in b -> s gamma decay that may be as large as 3%, so future measurements of A_CP may provide independent information about CP violation in the MSSM. We find that CP-violating MSSM contributions to the...

  2. CP violation in atoms

    International Nuclear Information System (INIS)

    Barr, S.M.

    1992-01-01

    Electric dipole moments of large atoms are an excellent tool to search for CP violation beyond the Standard Model. These tell us about the electron EDM but also about CP-violating electron-nucleon dimension-6 operators that arise from Higgs-exchange. Rapid strides are being made in searches for atomic EDMs. Limits on the electron EDM approaching the values which would be expected from Higgs-exchange mediated CP violation have been achieved. It is pointed out that in this same kind of model if tan β is large the effects in atoms of the dimension-6 e - n operators may outweigh the effect of the electron EDM. (author) 21 refs

  3. B decays and models for CP violation

    International Nuclear Information System (INIS)

    He, Xiao Gang

    1995-12-01

    The decay modes B to π π,υK S , K - D, πK and ηK are promising channels to study the unitarity triangle of the CP violating Cabibbo-Kobayashi-Maskawa (CKM) matrix. The consequences of these measurements in the Weinberg model are discussed. It is shown that measurements of CP violation in B decay can be used to distinguish Standard Model from Weinberg model and that the following different mechanisms for CP violation can be distinguished: 1) CP is violated in the CKM sector only; 2) CP is violated spontaneously in the Higgs sector only; and 3) CP is violated in both the CKM and Higgs sectors. 27 refs., 4 figs

  4. CP violation without elementary scalar fields

    International Nuclear Information System (INIS)

    Eichten, E.; Lane, K.; Preskill, J.

    1980-04-01

    Dynamically broken gauge theories of electroweak interactions provide a natural mechanism for generating CP violation. Even if all vacuum angles are unobservable, strong CP violation is not automatically avoided. In the absence of strong CP violation, the neutron electric dipole moment is expected to be of order 10 -24 e cm

  5. Superweak-like models of CP violation

    International Nuclear Information System (INIS)

    Lavoura, L.

    1992-01-01

    I put forward a two-Higgs-doublet model in which CP violation is mediated only by the neutral Higgs bosons, via the mechanism of scalar-pseudoscalar mixing. In this model there is no CP violation in the exchange of either W bosons or of charged Higgs bosons. The model is therefore an approximate realization of the superweak theory of CP violation. It has only two basic CP-violating quantities. I point out that other models of this kind, but with more than two Higgs doublets, may also be built

  6. Approaches to assign security levels for radioactive substances and radiation sources

    International Nuclear Information System (INIS)

    Ivanov, M.V.; Petrovskij, N.P.; Pinchuk, G.N.; Telkov, S.N.; Kuzin, V.V.

    2011-01-01

    The article contains analyzed provisions on categorization of radioactive substances and radiation sources according to the extent of their potential danger. Above provisions are used in the IAEA documents and in Russian regulatory documents for differentiation of regulatory requirements to physical security. It is demonstrated that with the account of possible threats of violators, rules of physical protection of radiation sources and radioactive substances should be amended as regards the approaches to assign their categories and security levels [ru

  7. Symmetry-violating kaon decays

    International Nuclear Information System (INIS)

    Herczeg, P.

    1979-01-01

    The content of this talk comprises two parts. In the first, an analysis of the muon number violating decay modes of the K-mesons is given. Subsequently, some new developments in the field of CP-violation are reviewed and the question of time-reversal invariance and the status of CPT-invariance are briefly considered. (auth)

  8. k-essence explains a Lorentz violation experiment

    International Nuclear Information System (INIS)

    Li Miao; Pang Yi; Wang Yi

    2009-01-01

    Recently, a state of the art experiment shows evidence for Lorentz violation in the gravitational sector. To explain this experiment, we investigate a spontaneous Lorentz violation scenario with a generalized scalar field. We find that when the scalar field is nonminimally coupled to gravity, the Lorentz violation induces a deformation in the Newtonian potential along the direction of Lorentz violation.

  9. Present status of CP violation

    International Nuclear Information System (INIS)

    Ng, J.N.

    1989-06-01

    A review of the status of CP violation in kaons is given. Status of our knowledge of quark mixing angles in the standard six quark model is presented. The role Β d o - Βd o transition plays in this study is examined. A comparison of the estimates of CP violation effects from models beyond the standard one is given. Other experiments that have the capability of testing different CP violation models are also discussed. (Author) 35 refs., 6 figs., tab

  10. Effect of CP violation in bilinear R-parity violation on baryogenesis

    Energy Technology Data Exchange (ETDEWEB)

    Cheriguene, Asma; Langenfeld, Ulrich; Porod, Werner [Universitaet Wuerzburg (Germany); Liebler, Stefan [Universitaet Wuppertal (Germany)

    2013-07-01

    Supersymmetric models where R-parity is broken via lepton number violation provides an intrinsically supersymmetric explanation for the observed neutrino. The complex phases of the corresponding parameters are constrained by the observed matter anti-matter asymmetry of the universe. Taking bilinear R-parity violation as framework in combination with the assumption of a large lepton asymmetry generated via the Affleck-Dine mechanism at the end of inflation we investigate these constraints in the parameter range compatible with neutrino data.

  11. T violating neutron spin rotation asymmetry

    International Nuclear Information System (INIS)

    Masuda, Yasushiro.

    1993-01-01

    A new experiment on T-violation is proposed, where a spin-rotating-neutron transmission through a polarized nuclear target is measuered. The method to control the neutron spin is discussed for the new T-violation experiment. The present method has possibility to provide us more accurate T-violation information than the neutron EDM measurement

  12. Cosmology and CPT violating neutrinos

    Energy Technology Data Exchange (ETDEWEB)

    Barenboim, Gabriela; Salvado, Jordi [Universitat de Valencia-CSIC, Departament de Fisica Teorica y Instituto de Fisica Corpuscular, Burjassot (Spain)

    2017-11-15

    The combination charge conjugation-parity-time reversal (CPT) is a fundamental symmetry in our current understanding of nature. As such, testing CPT violation is a strongly motivated path to explore new physics. In this paper we study CPT violation in the neutrino sector, giving for the first time a bound, for a fundamental particle, in the CPT violating particle-antiparticle gravitational mass difference. We argue that cosmology is nowadays the only data sensitive to CPT violation for the neutrino-antineutrino mass splitting and we use the latest data release from Planck combined with the current baryonic-acoustic-oscillation measurement to perform a full cosmological analysis. To show the potential of the future experiments we also show the results for Euclid, a next generation large scale structure experiment. (orig.)

  13. Roaring in Libya, whispering in others:UN Security Council's posture during the 'Arab Spring'

    OpenAIRE

    Aral, Berdal

    2014-01-01

    This paper examines the position of the United Nations Security Council (UNSC) during the Arab revolutions of 2010-2013. In the early 1990s, the UNSC devised the doctrine of ‘humanitarian intervention’ which was premised on the view that systematic and comprehensive human rights violations within a state could pose a “threat to international peace and security.” Nevertheless, the Security Council consistently failed to act during the course of Arab uprisings due to a number of structural and ...

  14. Constraints on the CP-Violating MSSM

    CERN Document Server

    Arbey, A; Godbole, R M; Mahmoudi, F

    2016-01-01

    We discuss the prospects for observing CP violation in the MSSM with six CP-violating phases, using a geometric approach to maximise CP-violating observables subject to the experimental upper bounds on electric dipole moments. We consider constraints from Higgs physics, flavour physics, the dark matter relic density and spin-independent scattering cross section with matter.

  15. Exploring CP violation in the MSSM.

    Science.gov (United States)

    Arbey, Alexandre; Ellis, John; Godbole, Rohini M; Mahmoudi, Farvah

    We explore the prospects for observing CP violation in the minimal supersymmetric extension of the Standard Model (MSSM) with six CP-violating parameters, three gaugino mass phases and three phases in trilinear soft supersymmetry-breaking parameters, using the CPsuperH code combined with a geometric approach to maximise CP-violating observables subject to the experimental upper bounds on electric dipole moments. We also implement CP-conserving constraints from Higgs physics, flavour physics and the upper limits on the cosmological dark matter density and spin-independent scattering. We study possible values of observables within the constrained MSSM (CMSSM), the non-universal Higgs model (NUHM), the CPX scenario and a variant of the phenomenological MSSM (pMSSM). We find values of the CP-violating asymmetry [Formula: see text] in [Formula: see text] decay that may be as large as 3 %, so future measurements of [Formula: see text] may provide independent information about CP violation in the MSSM. We find that CP-violating MSSM contributions to the [Formula: see text] meson mass mixing term [Formula: see text] are in general below the present upper limit, which is dominated by theoretical uncertainties. If these could be reduced, [Formula: see text] could also provide an interesting and complementary constraint on the six CP-violating MSSM phases, enabling them all to be determined experimentally, in principle. We also find that CP violation in the [Formula: see text] and [Formula: see text] couplings can be quite large, and so may offer interesting prospects for future [Formula: see text], [Formula: see text], [Formula: see text] and [Formula: see text] colliders.

  16. Parity violation experiments at RHIC

    International Nuclear Information System (INIS)

    Tannenbaum, M.J.

    1993-01-01

    With longitudinally polarized protons at RHIC, even a 1 month dedicated run utilizing both approved major detectors could produce a significant search for new physics in hadron collisions via parity violation. Additionally, in the energy range of RHIC, large ''conventional'' parity violating effects are predicted due to the direct production of the weak bosons W ± and Z 0 . One can even envision measurements of the spin dependent sea-quark structure functions of nucleons using the single-spin parity violating asymmetry of W ± and Z 0

  17. CP Violation

    International Nuclear Information System (INIS)

    Aleksan, R.

    1993-06-01

    The violation of the CP symmetry is a phenomenon, the origin of which is not yet well established and deserves a particular attention since it may be a fundamental property of Nature with very important consequences for the evolution of the universe. We propose in these lectures to have an overview of this phenomenon as we understand it so far. To this end, and after introducing the discrete space-time symmetries, we discuss the observation of the violation of the CP symmetry in the neutral kaon decays. We then derive the general formalism for any neutral system made of a particle and its antiparticle and discuss how CP violation is introduced. We show how this phenomenon is generated in the Standard Model of the electroweak interactions and what are the predictions that can be made. In particular we shall concentrate on the expected effects in the decays of mesons involving the b quark. We review the various possibilities for observing these effects, calculate their magnitudes and show how the consistency of the theory can be tested. Finally, we outline the experimental prospects for studying CP non conservation at an asymmetric B Factory to either verify the Standard Model mechanism or provide evidence for new physics. (author)

  18. Memory for expectation-violating concepts

    DEFF Research Database (Denmark)

    Porubanova, Michaela; Shaw, Daniel; McKay, Ryan

    2014-01-01

    Previous research has shown that ideas which violate our expectations, such as schema-inconsistent concepts, enjoy privileged status in terms of memorability. In our study, memory for concepts that violate cultural (cultural schema-level) expectations (e.g., ‘‘illiterate teacher’’, ‘‘wooden bottle...... expectations and with intuitive concepts (e.g., ‘‘galloping pony’’, ‘‘drying orchid’’, or ‘‘convertible car’’), in both immediate recall, and delayed recognition tests. Importantly, concepts related to agents showed a memory advantage over concepts not pertaining to agents, but this was true only...... for expectation-violating concepts. Our results imply that intuitive, everyday concepts are equally attractive and memorable regardless of the presence or absence of agents. However, concepts that violate our expectations (cultural-schema or domain-level) are more memorable when pertaining to agents (humans...

  19. 78 FR 2953 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Science.gov (United States)

    2013-01-15

    ... transport standards adopted by the Department of Health and Human Services at 45 CFR 170.202; 3. Access by... violations; and performing system health checks; 5. Support for standardized security automation technologies...

  20. 78 FR 62736 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of a...

    Science.gov (United States)

    2013-10-22

    ... commended the leadership of the MSRB on improving market transparency because retail investors do not have... violated a sense of fairness since they have no continued financial interest in the securities being...

  1. Low energy fermion number violation

    International Nuclear Information System (INIS)

    Peccei, R.D.

    1989-01-01

    After a brief aside on charge quantization in the standard electroweak theory, I concentrate on various aspects of anomaly induced fermion number violation in the standard model. A critical analysis of the role of sphalerons for the universe's baryon asymmetry is presented and the importance of calculating directly fermion number violating Green's functions is stressed. A physical interpretation of the recent observation of Ringwald, that coherent effects in the electroweak theory lead to catastrophic fermion number violation at 100 TeV, is discussed. Possible quantum effects which might spoil this semi-classical picture are examined

  2. 48 CFR 403.303 - Reporting suspected antitrust violations.

    Science.gov (United States)

    2010-10-01

    ... Antitrust Violations 403.303 Reporting suspected antitrust violations. Contracting officers shall report the circumstances of suspected violations of antitrust laws to the Office of Inspector General in accordance with... antitrust violations. 403.303 Section 403.303 Federal Acquisition Regulations System DEPARTMENT OF...

  3. CP violation in K decays

    International Nuclear Information System (INIS)

    Gilman, F.J.

    1989-05-01

    Recent theoretical and experimental progress on the manifestation of CP violation in K decays, and toward understanding whether CP violation originates in a phase, or phases, in the weak mixing matrix of quarks is reviewed. 23 refs., 10 figs

  4. National trends in drinking water quality violations.

    Science.gov (United States)

    Allaire, Maura; Wu, Haowei; Lall, Upmanu

    2018-02-27

    Ensuring safe water supply for communities across the United States is a growing challenge in the face of aging infrastructure, impaired source water, and strained community finances. In the aftermath of the Flint lead crisis, there is an urgent need to assess the current state of US drinking water. However, no nationwide assessment has yet been conducted on trends in drinking water quality violations across several decades. Efforts to reduce violations are of national concern given that, in 2015, nearly 21 million people relied on community water systems that violated health-based quality standards. In this paper, we evaluate spatial and temporal patterns in health-related violations of the Safe Drinking Water Act using a panel dataset of 17,900 community water systems over the period 1982-2015. We also identify vulnerability factors of communities and water systems through probit regression. Increasing time trends and violation hot spots are detected in several states, particularly in the Southwest region. Repeat violations are prevalent in locations of violation hot spots, indicating that water systems in these regions struggle with recurring issues. In terms of vulnerability factors, we find that violation incidence in rural areas is substantially higher than in urbanized areas. Meanwhile, private ownership and purchased water source are associated with compliance. These findings indicate the types of underperforming systems that might benefit from assistance in achieving consistent compliance. We discuss why certain violations might be clustered in some regions and strategies for improving national drinking water quality.

  5. B decays and models for CP violation

    International Nuclear Information System (INIS)

    He, X.

    1996-01-01

    The decay modes B to ππ, ψK S , K - D, πK, and ηK are promising channels to study the unitarity triangle of the CP-violating Cabibbo-Kobayashi-Maskawa (CKM) matrix. In this paper I study the consequences of these measurements in the Weinberg model. I show that using the same set of measurements, the following different mechanisms for CP violation can be distinguished: (1) CP is violated in the CKM sector only; (2) CP is violated spontaneously in the Higgs sector only; and (3) CP is violated in both the CKM and Higgs sectors. copyright 1996 The American Physical Society

  6. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  7. 48 CFR 1403.303 - Reporting suspected antitrust violations.

    Science.gov (United States)

    2010-10-01

    ... Antitrust Violations 1403.303 Reporting suspected antitrust violations. (a) Reports on suspected violations of antitrust laws as required by FAR 3.303 shall be prepared by the CO, reviewed by the SOL, and... antitrust violations. 1403.303 Section 1403.303 Federal Acquisition Regulations System DEPARTMENT OF THE...

  8. Gender Role Violations and the Sexual Double Standard.

    Science.gov (United States)

    Zaikman, Yuliana; Marks, Michael J; Young, Tara M; Zeiber, Jacqueline A

    2016-12-01

    The sexual double standard (SDS) suggests that women are evaluated negatively and men positively for engaging in similar sexual behaviors. According to social role theory, the SDS exists due to gender role structures. Consequently, perceived violations of women's sexual behavior are associated with the SDS. In addition to gender role violations of sexual behavior, two additional violations of gender roles exist: heterosexual sexual orientation norms and gender role characteristics. The current study aims to investigate whether the SDS persists for sexual orientation-violating and gender role characteristic-violating targets, and to examine which of the three gender role violations influence evaluations of others' sexual behavior. A U.S. sample of 483 participants evaluated target individuals who were either female or male, heterosexual/gay man or lesbian, feminine or masculine, and had 1 or 12 sexual partners. Results indicate that SDS persists for gender role-violating targets but is exhibited differently for targets violating heterosexual sexual orientation norms and gender role characteristics.

  9. Traffic violations in Guangdong Province of China: speeding and drunk driving.

    Science.gov (United States)

    Zhang, Guangnan; Yau, Kelvin K W; Gong, Xiangpu

    2014-03-01

    The number of speeding- and drunk driving-related injuries in China surged in the years immediately preceding 2004 and then began to decline. However, the percent decrease in the number of speeding and drunk driving incidents (decrease by 22%) is not proportional to the corresponding percent decrease in number of automobile accident-related injuries (decrease by 47%) from the year 2004 to 2010 (Traffic Management Bureau, Ministry of Public Security, Annual Statistical Reports on Road Traffic Accidents). Earlier studies have established traffic violations as one of the major risks threatening road safety. In this study, we examine in greater detail two important types of traffic violation events, speeding and drunk driving, and attempt to identify significant risk factors associated with these types of traffic violations. Risk factors in several different dimensions, including driver, vehicle, road and environmental factors, are considered. We analyze the speeding (N=11,055) and drunk driving (N=10,035) data for the period 2006-2010 in Guangdong Province, China. These data, obtained from the Guangdong Provincial Security Department, are extracted from the Traffic Management Sector-Specific Incident Case Data Report and are the only comprehensive and official source of traffic accident data in China. Significant risk factors associating with speeding and drunk driving are identified. We find that several factors are associated with a significantly higher probability of both speeding and drunk driving, particularly male drivers, private vehicles, the lack of street lighting at night and poor visibility. The impact of other specific and unique risk factors for either speeding or drunk driving, such as hukou, road type/grades, commercial vehicles, compulsory third party insurance and vehicle safety status, also require particular attention. Legislative or regulatory measures targeting different vehicle types and/or driver groups with respect to the various driver

  10. CP violating scalar Dark Matter

    Science.gov (United States)

    Cordero-Cid, A.; Hernández-Sánchez, J.; Keus, V.; King, S. F.; Moretti, S.; Rojas, D.; Sokołowska, D.

    2016-12-01

    We study an extension of the Standard Model (SM) in which two copies of the SM scalar SU(2) doublet which do not acquire a Vacuum Expectation Value (VEV), and hence are inert, are added to the scalar sector. We allow for CP-violation in the inert sector, where the lightest inert state is protected from decaying to SM particles through the conservation of a Z 2 symmetry. The lightest neutral particle from the inert sector, which has a mixed CP-charge due to CP-violation, is hence a Dark Matter (DM) candidate. We discuss the new regions of DM relic density opened up by CP-violation, and compare our results to the CP-conserving limit and the Inert Doublet Model (IDM). We constrain the parameter space of the CP-violating model using recent results from the Large Hadron Collider (LHC) and DM direct and indirect detection experiments.

  11. Flavour Physics and CP Violation

    CERN Document Server

    Fleischer, Robert

    2006-01-01

    The starting point of these lectures is an introduction to the weak interactions of quarks and the Standard-Model description of CP violation, where the central role is played by the Cabibbo-Kobayashi-Maskawa matrix and the corresponding unitarity triangles. Since the B-meson system will govern the stage of (quark) flavour physics and CP violation in this decade, it will be our main focus. We shall classify B-meson decays, introduce the theoretical tools to deal with them, investigate the requirements for non-vanishing CP-violating asymmetries, and discuss the main strategies to explore CP violation and the preferred avenues for physics beyond the Standard Model to enter. This formalism is then applied to discuss the status of important B-factory benchmark modes, where we focus on puzzling patterns in the data that may indicate new-physics effects, as well as the prospects for B-decay studies at the LHC.

  12. The strong equivalence principle and its violation

    International Nuclear Information System (INIS)

    Canuto, V.M.; Goldman, I.

    1983-01-01

    In this paper, the authors discuss theoretical and observational aspects of an SEP violation. They present a two-times theory as a possible framework to handle an SEP violation and summarize the tests performed to check the compatibility of such violation with a host of data ranging from nucleosynthesis to geophysics. They also discuss the dynamical equations needed to analyze radar ranging data to reveal an SEP violation and in particular the method employed by Shapiro and Reasenberg. (Auth.)

  13. Theory prospective on leptonic CP violation

    International Nuclear Information System (INIS)

    Petcov, S.T.

    2016-01-01

    The phenomenology of 3-neutrino mixing, the current status of our knowledge about the 3-neutrino mixing parameters, including the absolute neutrino mass scale, and of the Dirac and Majorana CP violation in the lepton sector are reviewed. The problems of CP violation in neutrino oscillations and of determining the nature – Dirac or Majorana – of massive neutrinos are discussed. The seesaw mechanism of neutrino mass generation and the related leptogenesis scenario of generation of the baryon asymmetry of the Universe are considered. The results showing that the CP violation necessary for the generation of the baryon asymmetry of the Universe in leptogenesis can be due exclusively to the Dirac and/or Majorana CP-violating phase(s) in the neutrino mixing matrix U are briefly reviewed. The discrete symmetry approach to understanding the observed pattern of neutrino mixing and the related predictions for the leptonic Dirac CP violation are also reviewed.

  14. Soft CP violation in K-meson systems

    International Nuclear Information System (INIS)

    Montero, J.C.; Nishi, C.C.; Pleitez, V.; Ravinez, O.; Rodriguez, M.C.

    2006-01-01

    We consider a model with soft CP violation which accommodates the CP violation in the neutral kaons even if we assume that the Cabibbo-Kobayashi-Maskawa mixing matrix is real and the sources of CP violation are three complex vacuum expectation values and a trilinear coupling in the scalar potential. We show that for some reasonable values of the masses and other parameters the model allows us to explain all the observed CP violation processes in the K 0 -K 0 system

  15. R-parity violation at the LHC

    Energy Technology Data Exchange (ETDEWEB)

    Dercks, Daniel [Universitaet Bonn, Physikalisches Institut, Bethe Center for Theoretical Physics, Bonn (Germany); Universitaet Hamburg, II. Institut fuer Theoretische Physik, Hamburg (Germany); Dreiner, Herbi; Krauss, Manuel E.; Opferkuch, Toby; Reinert, Annika [Universitaet Bonn, Physikalisches Institut, Bethe Center for Theoretical Physics, Bonn (Germany)

    2017-12-15

    We investigate the phenomenology of the MSSM extended by a single R-parity-violating coupling at the unification scale. For all R-parity-violating couplings, we discuss the evolution of the particle spectra through the renormalization group equations and the nature of the lightest supersymmetric particle (LSP) within the CMSSM, as an example of a specific complete supersymmetric model. We use the nature of the LSP to classify the possible signatures. For each possible scenario we present in detail the current LHC bounds on the supersymmetric particle masses, typically obtained using simplified models. From this we determine the present coverage of R-parity-violating models at the LHC. We find several gaps, in particular for a stau-LSP, which is easily obtained in R-parity-violating models. Using the program CheckMATE we recast existing LHC searches to set limits on the parameters of all R-parity-violating CMSSMs. We find that virtually all of them are either more strongly constrained or similarly constrained in comparison to the R-parity-conserving CMSSM, including the anti U anti D anti D models. For each R-parity-violating CMSSM we then give the explicit lower mass bounds on all relevant supersymmetric particles. (orig.)

  16. 32 CFR 634.32 - Traffic violation reports.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Traffic violation reports. 634.32 Section 634.32 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.32 Traffic violation reports. (a) Most traffic violations...

  17. CP violation and the top quark

    International Nuclear Information System (INIS)

    Atwood, D.

    1994-02-01

    We consider signals of CP violation in semi-leptonic decay of the top quark. We show that the transverse polarization asymmetries of the τ-lepton in the decay t → brv is extremely sensitive CP violation. As an illustration we consider CP phases arising from the charged Higgs exchange in the Weinberg three Higgs doublet model. Qualitatively, the polarization asymmetries are enhanced over rate or energy asymmetries by a factor of O(m t /m r ) ∼ 100 with a corresponding increase in sensitivity to CP violating parameters. We also examine τ polarization in b decays via b → cvr and find that may also be very effective in constraining CP violating effects such as those that arise from an extended Higgs sector

  18. CP violation in b → s penguin decays and T, CPT violation at BaBar and BELLE

    International Nuclear Information System (INIS)

    Emery-Schrenk, S.

    2014-01-01

    We report on the first direct observation of time reversal violation at BABAR in the interference between direct decay and decay with B 0 - B-bar 0 mixing, as well as on the most precise search for CPT violation in B 0 - B-bar 0 mixing at BELLE. We then present recent CP violation studies at BABAR in rare b → s penguin decays B → KKK and B → K*l + l - . (author)

  19. Applications for cyber security - System and application monitoring

    International Nuclear Information System (INIS)

    Marron, J. E.

    2006-01-01

    Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

  20. Models of dynamical R-parity violation

    Energy Technology Data Exchange (ETDEWEB)

    Csáki, Csaba; Kuflik, Eric [Department of Physics, LEPP, Cornell University, Ithaca, NY 14853 (United States); Slone, Oren; Volansky, Tomer [Raymond and Beverly Sackler School of Physics and Astronomy, Tel-Aviv University, Tel-Aviv 69978 (Israel)

    2015-06-08

    The presence of R-parity violating interactions may relieve the tension between existing LHC constraints and natural supersymmetry. In this paper we lay down the theoretical framework and explore models of dynamical R-parity violation in which the breaking of R-parity is communicated to the visible sector by heavy messenger fields. We find that R-parity violation is often dominated by non-holomorphic operators that have so far been largely ignored, and might require a modification of the existing searches at the LHC. The dynamical origin implies that the effects of such operators are suppressed by the ratio of either the light fermion masses or the supersymmetry breaking scale to the mediation scale, thereby providing a natural explanation for the smallness of R-parity violation. We consider various scenarios, classified by whether R-parity violation, flavor breaking and/or supersymmetry breaking are mediated by the same messenger fields. The most compact case, corresponding to a deformation of the so called flavor mediation scenario, allows for the mediation of supersymmetry breaking, R-parity breaking, and flavor symmetry breaking in a unified manner.

  1. CP violation

    International Nuclear Information System (INIS)

    Gilman, F.J.

    1989-12-01

    Predictions for CP violation in the three generation Standard Model are reviewed based on what is known about the Cabibbo-Kobayashi-Maskawa matrix. Application to the K and B meson systems are emphasized. 43 refs., 13 figs

  2. Rule-violations sensitise towards negative and authority-related stimuli.

    Science.gov (United States)

    Wirth, Robert; Foerster, Anna; Rendel, Hannah; Kunde, Wilfried; Pfister, Roland

    2018-05-01

    Rule violations have usually been studied from a third-person perspective, identifying situational factors that render violations more or less likely. A first-person perspective of the agent that actively violates the rules, on the other hand, is only just beginning to emerge. Here we show that committing a rule violation sensitises towards subsequent negative stimuli as well as subsequent authority-related stimuli. In a Prime-Probe design, we used an instructed rule-violation task as the Prime and a word categorisation task as the Probe. Also, we employed a control condition that used a rule inversion task as the Prime (instead of rule violations). Probe targets were categorised faster after a violation relative to after a rule-based response if they related to either, negative valence or authority. Inversions, however, primed only negative stimuli and did not accelerate the categorisation of authority-related stimuli. A heightened sensitivity towards authority-related targets thus seems to be specific to rule violations. A control experiment showed that these effects cannot be explained in terms of semantic priming. Therefore, we propose that rule violations necessarily activate authority-related representations that make rule violations qualitatively different from simple rule inversions.

  3. Report of the CP-violation working group

    International Nuclear Information System (INIS)

    Hoffman, C.M.

    1982-01-01

    The CP-Violation Working Group met twice during the workshop. A nice summary of our present knowledge of CP-violation was presented in the talk by Prof. James W. Cronin. In the final paragraph of his talk, Prof. Cronin argues that higher precision experiments studying CP-violation at LAMPF II will be extremely important no matter what additional knowledge we acquire in the time before LAMPF II is constructed. The crucial issue at present is to uncover the underlying mechanism responsible for CP-violation. The Working Group heard several talks aimed at reviewing the theoretical status of CP-violation and the directions that future experimental efforts might take. These talks included: Kaon Experiments at KEK, T. Yamazaki, University of Tokyo; Mechanisms for CP Violation, P. Herczeg, Los Alamos; and The Experimental Status of eta 00 Experiments, J.W. Cronin, Univ. of Chicago. There were also extended discussions on which experiments appear to be the most important and how to best perform these measurements. A summary of these discussions is given

  4. $CPT$ violation searches and prospects for LHCb

    CERN Document Server

    van Tilburg, Jeroen

    2015-03-06

    An overview of current experimental bounds on $CPT$ violation in neutral meson mixing is given. New values for the $CPT$ asymmetry in the $B^0$ and $B_s^0$ systems are deduced from BaBar, Belle and LHCb data. With dedicated analyses, LHCb will be able to further improve the bounds on $CPT$ violation in the $D^0$, $B^0$ and $B_s^0$ systems. Since $CPT$ violation implies violation of Lorentz invariance, the observed $CPT$ asymmetry will exhibit sidereal- and boost-dependent variations. Such $CPT$-violating and Lorentz-violating effects are accommodated in the framework of the Standard-Model Extension (SME). The large boost of the neutral mesons produced at LHCb results in a high sensitivity to the corresponding SME coefficients. For the $B^0$ and $B_s^0$ systems, using existing LHCb data, we determine with high precision the SME coefficients that are not varying with sidereal time. With a full sidereal analysis, LHCb will be able to improve the existing SME bounds in the $D^0$, $B^0$ and $B_s^0$ systems by up t...

  5. CP violation in the K and B systems

    International Nuclear Information System (INIS)

    Kayser, B.

    1997-01-01

    Although CP violation was discovered more than thirty years ago, its origin is still unknown. In these lectures, we describe the CP-violation effects which have been seen in K decays, and explain how CP violation can be caused by the Standard Model weak interaction. The hypothesis that this interaction is indeed the origin of CP violation will be incisively tested by future experiments on B and K decays. We explain what quantities these experiments will try to determine, and how they will be able to determine them in a theoretically clean way. To clarify the physics of the K system, we give a phase-convention-free description of CP violation in this system. We conclude by briefly exploring whether electric dipole moments actually violate CP even if CPT invariance is not assumed. (author)

  6. CP violation in the K and B systems

    International Nuclear Information System (INIS)

    Kayser, B.

    1996-11-01

    Although CP violation was discovered more than thirty years ago, its origin is still unknown. In these lectures, we describe the CP- violating effects which have been seen in K decays, and explain how CP violation can be caused by the Standard Model weak interaction. The hypothesis that this interaction is indeed the origin of CP violation will be incisively tested by future experiments on B and K decays. We explain what quantities these experiments will try to determine, and how they will be able to determine them in a theoretically clean way. To clarify the physics of the K system, we give a phase-convention-free description of CP violation in this system. We conclude by briefly exploring whether electric dipole moments actually violate CP even if CPT invariance is not assumed

  7. Threshold analyses and Lorentz violation

    International Nuclear Information System (INIS)

    Lehnert, Ralf

    2003-01-01

    In the context of threshold investigations of Lorentz violation, we discuss the fundamental principle of coordinate independence, the role of an effective dynamical framework, and the conditions of positivity and causality. Our analysis excludes a variety of previously considered Lorentz-breaking parameters and opens an avenue for viable dispersion-relation investigations of Lorentz violation

  8. Flavour Physics and CP Violation

    CERN Document Server

    Fleischer, Robert

    2005-01-01

    The starting point of these lectures is an introduction to the weak interactions of quarks and the Standard-Model description of CP violation, where the key element is the Cabibbo--Kobayashi--Maskawa matrix and the corresponding unitarity triangles. Since the B-meson system will govern the stage of (quark) flavour physics and CP violation in this decade, it will be -- after a brief look at the kaon system -- our main focus. We shall classify B-meson decays, introduce the theoretical tools to deal with them, explore the requirements for non-vanishing CP-violating asymmetries, and discuss B^0_q--B^0_q_bar mixing (q={d,s}). We will then turn to B-factory benchmark modes, discuss the physics potential of B^0_s mesons, which is particularly promising for B-decay experiments at hadron colliders, and emphasize the importance of studies of rare decays, which are absent at the tree level in the Standard Model, complement nicely the studies of CP violation, and provide interesting probes for new physics.

  9. Lorentz-violating electrodynamics and the cosmic microwave background.

    Science.gov (United States)

    Kostelecký, V Alan; Mewes, Matthew

    2007-07-06

    Possible Lorentz-violating effects in the cosmic microwave background are studied. We provide a systematic classification of renormalizable and nonrenormalizable operators for Lorentz violation in electrodynamics and use polarimetric observations to search for the associated violations.

  10. A definition of maximal CP-violation

    International Nuclear Information System (INIS)

    Roos, M.

    1985-01-01

    The unitary matrix of quark flavour mixing is parametrized in a general way, permitting a mathematically natural definition of maximal CP violation. Present data turn out to violate this definition by 2-3 standard deviations. (orig.)

  11. Towards understanding the known-key security of block ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart

    2014-01-01

    ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indifferentiability to capture the security of such block ciphers under a known key. To show its...... meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indifferentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher...... with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indifferentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks....

  12. Security and Privacy Analyses of Internet of Things Toys

    OpenAIRE

    Chu, Gordon; Apthorpe, Noah; Feamster, Nick

    2018-01-01

    This paper investigates the security and privacy of Internet-connected children's smart toys through case studies of three commercially-available products. We conduct network and application vulnerability analyses of each toy using static and dynamic analysis techniques, including application binary decompilation and network monitoring. We discover several publicly undisclosed vulnerabilities that violate the Children's Online Privacy Protection Rule (COPPA) as well as the toys' individual pr...

  13. This was the particle physics that was: The years from P and C violation to CP violation

    International Nuclear Information System (INIS)

    Feinberg, G.

    1989-01-01

    This paper contains lecture notes given by Gary Feinberg on the historical aspect of the violation of P and C invariance and more recently the violation of CP invariance. (LSP) 13 refs., 2 figs., 2 tabs

  14. Lorentz violation naturalness revisited

    Energy Technology Data Exchange (ETDEWEB)

    Belenchia, Alessio; Gambassi, Andrea; Liberati, Stefano [SISSA - International School for Advanced Studies, via Bonomea 265, 34136 Trieste (Italy); INFN, Sezione di Trieste, via Valerio 2, 34127 Trieste (Italy)

    2016-06-08

    We revisit here the naturalness problem of Lorentz invariance violations on a simple toy model of a scalar field coupled to a fermion field via a Yukawa interaction. We first review some well-known results concerning the low-energy percolation of Lorentz violation from high energies, presenting some details of the analysis not explicitly discussed in the literature and discussing some previously unnoticed subtleties. We then show how a separation between the scale of validity of the effective field theory and that one of Lorentz invariance violations can hinder this low-energy percolation. While such protection mechanism was previously considered in the literature, we provide here a simple illustration of how it works and of its general features. Finally, we consider a case in which dissipation is present, showing that the dissipative behaviour does not percolate generically to lower mass dimension operators albeit dispersion does. Moreover, we show that a scale separation can protect from unsuppressed low-energy percolation also in this case.

  15. Baryon number violation and string topologies

    International Nuclear Information System (INIS)

    Sjoestrand, T.; Skands, P.Z.

    2003-01-01

    In supersymmetric scenarios with broken R-parity, baryon number violating sparticle decays become possible. In order to search for such decays, a good understanding of expected event properties is essential. We here develop a complete framework that allows detailed studies. Special attention is given to the hadronization phase, wherein the baryon number violating vertex is associated with the appearance of a junction in the colour confinement field. This allows us to tell where to look for the extra (anti)baryon directly associated with the baryon number violating decay

  16. CP violation in CMS expected performance

    CERN Document Server

    Stefanescu, J

    1999-01-01

    The CMS experiment can contribute significantly to the measurement of the CP violation asymmetries. A recent evaluation of the expected precision on the CP violation parameter sin 2 beta in the channel B /sub d//sup 0/ to J/ psi $9 K/sub s//sup 0/ has been performed using a simulation of the CMS tracker including full pattern recognition. CMS has also studied the possibility to observe CP violation in the decay channel B/sub s//sup 0/ to J/ psi phi . The $9 results of these studies are reviewed. (7 refs).

  17. Better Bell-inequality violation by collective measurements

    International Nuclear Information System (INIS)

    Liang, Y.-C.; Doherty, Andrew C.

    2006-01-01

    The standard Bell-inequality experiments test for violation of local realism by repeatedly making local measurements on individual copies of an entangled quantum state. Here we investigate the possibility of increasing the violation of a Bell inequality by making collective measurements. We show that the nonlocality of bipartite pure entangled states, quantified by their maximal violation of the Bell-Clauser-Horne inequality, can always be enhanced by collective measurements, even without communication between the parties. For mixed states we also show that collective measurements can increase the violation of Bell inequalities, although numerical evidence suggests that the phenomenon is not common as it is for pure states

  18. Rephasing-invariant CP violating parameters with Majorana neutrinos

    International Nuclear Information System (INIS)

    Nieves, Jose F.; Pal, Palash B.

    2001-06-01

    We analyze the dependence of the squared amplitudes on the rephasing-invariant CP-violating parameters of the lepton sector, involving Majorana neutrinos, for various lepton- conserving and lepton-violating processes. We analyze the conditions under which the CP-violating effects in such processes vanish, in terms of the minimal set of rephasing invariants, giving special attention to the dependence on the extra CP-violating parameters that are due to the Majorana nature of the neutrinos. (author)

  19. Flavour physics and CP violation

    Indian Academy of Sciences (India)

    It is well known that the study of flavour physics and CP violation is very important to critically test the Standard Model and to look for possible signature of new physics beyond it. The observation of CP violation in kaon system in 1964 has ignited a lot of experimental and theoretical efforts to understand its origin and to look ...

  20. Anomalous Lorentz and CPT violation

    Science.gov (United States)

    Klinkhamer, F. R.

    2018-01-01

    If there exists Lorentz and CPT violation in nature, then it is crucial to discover and understand the underlying mechanism. In this contribution, we discuss one such mechanism which relies on four-dimensional chiral gauge theories defined over a spacetime manifold with topology ℛ3 × S 1 and periodic spin structure for the compact dimension. It can be shown that the effective gauge-field action contains a local Chern-Simons-like term which violates Lorentz and CPT invariance. For arbitrary Abelian U(1) gauge fields with trivial holonomies in the compact direction, this anomalous Lorentz and CPT violation has recently been established perturbatively with a Pauli-Villars-type regularization and nonperturbatively with a lattice regularization based on Ginsparg-Wilson fermions.

  1. Topics in CP violation

    Science.gov (United States)

    Quinn, H. R.

    1993-02-01

    Given the varied backgrounds of the members of this audience this talk will be a grab bag of topics related to the general theme of CP Violation. I do not have time to dwell in detail on any of them. First, for the astronomers and astrophysicists among you, I want to begin by reviewing the experimental status of evidence for CP violation in particle processes. There is only one system where this has been observed, and that is in the decays of neutral K mesons.

  2. Topics in CP violation

    International Nuclear Information System (INIS)

    Quinn, H.R.

    1993-02-01

    Given the varied backgrounds of the members of this audience this talk will be a grab bag of topics related to the general theme of CP Violation. I do not have time to dwell in detail on any of them. First, for the astronomers and astrophysicists among you, I want to begin by reviewing the experimental status of evidence for CP violation in particle processes. There is only one system where this has been observed, and that is in the decays of neutral K mesons

  3. Testing non-standard CP violation in neutrino propagation

    International Nuclear Information System (INIS)

    Winter, Walter

    2009-01-01

    Non-standard physics which can be described by effective four fermion interactions may be an additional source of CP violation in the neutrino propagation. We discuss the detectability of such a CP violation at a neutrino factory. We assume the current baseline setup of the international design study of a neutrino factory (IDS-NF) for the simulation. We find that the CP violation from certain non-standard interactions is, in principle, detectable significantly below their current bounds - even if there is no CP violation in the standard oscillation framework. Therefore, a new physics effect might be mis-interpreted as the canonical Dirac CP violation, and a possibly even more exciting effect might be missed

  4. Parity violation in neutron induced reactions

    International Nuclear Information System (INIS)

    Gudkov, V.P.

    1991-06-01

    The theory of parity violation in neutron induced reactions is discussed. Special attention is paid to the energy dependence and enhancement factors for the various types of nuclear reactions and the information which might be obtained from P-violating effects in nuclei. (author)

  5. New bounds on isotropic Lorentz violation

    International Nuclear Information System (INIS)

    Carone, Christopher D.; Sher, Marc; Vanderhaeghen, Marc

    2006-01-01

    Violations of Lorentz invariance that appear via operators of dimension four or less are completely parametrized in the Standard Model Extension (SME). In the pure photonic sector of the SME, there are 19 dimensionless, Lorentz-violating parameters. Eighteen of these have experimental upper bounds ranging between 10 -11 and 10 -32 ; the remaining parameter, k-tilde tr , is isotropic and has a much weaker bound of order 10 -4 . In this Brief Report, we point out that k-tilde tr gives a significant contribution to the anomalous magnetic moment of the electron and find a new upper bound of order 10 -8 . With reasonable assumptions, we further show that this bound may be improved to 10 -14 by considering the renormalization of other Lorentz-violating parameters that are more tightly constrained. Using similar renormalization arguments, we also estimate bounds on Lorentz-violating parameters in the pure gluonic sector of QCD

  6. Search for violations of quantum mechanics

    International Nuclear Information System (INIS)

    Ellis, J.; Hagelin, J.S.; Nanopoulos, D.V.; Srednicki, M.

    1984-01-01

    The treatment of quantum effects in gravitational fields indicates that pure states may evolve into mixed states, and Hawking has proposed modification of the axioms of field theory which incorporate the corresponding violation of quantum mechanics. In this paper we propose a modified hamiltonian equation of motion for density matrices and use it to interpret upper bounds on the violation of quantum mechanics in different phenomenological situations. We apply our formalism to the K 0 -anti K 0 system and to long baseline neutron interferometry experiments. In both cases we find upper bounds of about 2x10 -21 GeV on contributions to the single particle 'hamiltonian' which violate quantum mechanical coherence. We discuss how these limits might be improved in the future, and consider the relative significance of other successful tests of quantum mechanics. An appendix contains model estimates of the magnitude of effects violating quantum mechanics. (orig.)

  7. VIOLATION OF CONVERSATION MAXIM ON TV ADVERTISEMENTS

    Directory of Open Access Journals (Sweden)

    Desak Putu Eka Pratiwi

    2015-07-01

    Full Text Available Maxim is a principle that must be obeyed by all participants textually and interpersonally in order to have a smooth communication process. Conversation maxim is divided into four namely maxim of quality, maxim of quantity, maxim of relevance, and maxim of manner of speaking. Violation of the maxim may occur in a conversation in which the information the speaker has is not delivered well to his speaking partner. Violation of the maxim in a conversation will result in an awkward impression. The example of violation is the given information that is redundant, untrue, irrelevant, or convoluted. Advertisers often deliberately violate the maxim to create unique and controversial advertisements. This study aims to examine the violation of maxims in conversations of TV ads. The source of data in this research is food advertisements aired on TV media. Documentation and observation methods are applied to obtain qualitative data. The theory used in this study is a maxim theory proposed by Grice (1975. The results of the data analysis are presented with informal method. The results of this study show an interesting fact that the violation of maxim in a conversation found in the advertisement exactly makes the advertisements very attractive and have a high value.

  8. $CP$ violation in the B system at LHCb

    CERN Document Server

    AUTHOR|(CDS)2067431

    2014-01-01

    A selection of recent LHCb results on $CP$ violation in the $B$ system is presented. These include direct $CP$ violation measurements in $B^0 \\to \\phi K^*(892)^0$, $B_{(s)}^0 \\to K^\\pm\\pi^\\pm$, $B^\\pm \\to K^\\pm \\pi^+\\pi^-$, $B^\\pm \\to K^\\pm K^+K^-$ and $B^\\pm \\to \\phi K^\\pm$ decays; time-dependent $CP$ violation measurements in $B_s^0 \\to K^+K^-$ and $B^0 \\to \\pi^+\\pi^-$ decays; determination of the flavour-specific $CP$-violating asymmetry $a_{sl}^s$ in $B_s^0$ decays; and study of the mixing-induced $CP$ violation in $B_s^0 \\to J/\\psi K^+K^-$ and $B_s^0 \\to J/\\psi \\pi^+\\pi^-$ decays.

  9. Chirality and gravitational parity violation.

    Science.gov (United States)

    Bargueño, Pedro

    2015-06-01

    In this review, parity-violating gravitational potentials are presented as possible sources of both true and false chirality. In particular, whereas phenomenological long-range spin-dependent gravitational potentials contain both truly and falsely chiral terms, it is shown that there are models that extend general relativity including also coupling of fermionic degrees of freedom to gravity in the presence of torsion, which give place to short-range truly chiral interactions similar to that usually considered in molecular physics. Physical mechanisms which give place to gravitational parity violation together with the expected size of the effects and their experimental constraints are discussed. Finally, the possible role of parity-violating gravity in the origin of homochirality and a road map for future research works in quantum chemistry is presented. © 2015 Wiley Periodicals, Inc.

  10. Flavour physics and CP violation

    CERN Document Server

    Nir, Y.

    2015-05-22

    We explain the many reasons for the interest in flavor physics. We describe flavor physics and the related CP violation within the Standard Model, and explain how the B-factories proved that the Kobayashi-Maskawa mechanism dominates the CP violation that is observed in meson decays. We explain the implications of flavor physics for new physics, with emphasis on the “new physics flavor puzzle”, and present the idea of minimal flavor violation as a possible solution. We explain why the values flavor parameters of the Standard Model are puzzling, present the Froggatt-Nielsen mechanism as a possible solution, and describe how measurements of neutrino parameters are interpreted in the context of this puzzle. We show that the recently discovered Higgs-like boson may provide new opportunities for making progress on the various flavor puzzles.

  11. Search for CP-violation in the charm sector at LHCb

    International Nuclear Information System (INIS)

    Coombes, M.P.

    2014-01-01

    Results of searches for CP-violation in charm hadrons and measurements of CP-violating and D 0 mixing parameters are presented for LHCb data accumulated during 2010 and 2011. A time-integrated CP-violating asymmetry in two-body D 0 decays constitutes the first evidence of CP violation in the decay of charm hadrons. No CP violation has been found in D + → K - K + π + decays. Concerning mixing and time-dependent CP asymmetries in D 0 decays, results are compatible with the absence of CP-violation

  12. 24 CFR 30.55 - Interstate Land Sales violations.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Interstate Land Sales violations... Sales violations. (a) General. The Assistant Secretary for Housing-Federal Housing Commissioner, or his... materially violates any provision of the Interstate Land Sales Full Disclosure Act (15 U.S.C. 1701 et seq...

  13. CP violation in K- and B-meson decays

    CERN Multimedia

    2000-01-01

    These lectures will describe CP violation in K- and B-meson decays and will include the following topics:i) Grand view of the field including CKM matrix and the unitarily triangle ii) General aspects of the theoretical framework iii) Fundamentals of particle-antiparticle mixing iv) Fundamentals of CP violation v) Standard analysis of the unitarily triangle vi) The ratio e'/e including most recent developments vii) CP Violation in rare K- decays viii) Violation in B-Decays (asymmetries and other strategies) ix) A brief look beyond the Standard Model

  14. Constrained gauge fields from spontaneous Lorentz violation

    DEFF Research Database (Denmark)

    Chkareuli, J. L.; Froggatt, C. D.; Jejelava, J. G.

    2008-01-01

    Spontaneous Lorentz violation realized through a nonlinear vector field constraint of the type AµAµ=M2 (M is the proposed scale for Lorentz violation) is shown to generate massless vector Goldstone bosons, gauging the starting global internal symmetries in arbitrary relativistically invariant...... theories. The gauge invariance appears in essence as a necessary condition for these bosons not to be superfluously restricted in degrees of freedom, apart from the constraint due to which the true vacuum in a theory is chosen by the Lorentz violation. In the Abelian symmetry case the only possible theory...... couplings when expressed in terms of the pure Goldstone vector modes. However, they do not lead to physical Lorentz violation due to the simultaneously generated gauge invariance. Udgivelsesdato: June 11...

  15. Statistical mechanics and Lorentz violation

    International Nuclear Information System (INIS)

    Colladay, Don; McDonald, Patrick

    2004-01-01

    The theory of statistical mechanics is studied in the presence of Lorentz-violating background fields. The analysis is performed using the Standard-Model Extension (SME) together with a Jaynesian formulation of statistical inference. Conventional laws of thermodynamics are obtained in the presence of a perturbed hamiltonian that contains the Lorentz-violating terms. As an example, properties of the nonrelativistic ideal gas are calculated in detail. To lowest order in Lorentz violation, the scalar thermodynamic variables are only corrected by a rotationally invariant combination of parameters that mimics a (frame dependent) effective mass. Spin-couplings can induce a temperature-independent polarization in the classical gas that is not present in the conventional case. Precision measurements in the residual expectation values of the magnetic moment of Fermi gases in the limit of high temperature may provide interesting limits on these parameters

  16. The African Union's right of intervenion and the UN system of collective security

    NARCIS (Netherlands)

    Muhire, G.Y.|info:eu-repo/dai/nl/323053785

    2013-01-01

    The African Union (AU) was created in 2001 in replacement of the Organization of the African Unity in order to address inter alia the issues of peace and security as well as gross violations of human rights on the continent. For this purpose, paragraphs (h) and (j) of Article 4 of the Constitutive

  17. Three questions on Lorentz violation

    Energy Technology Data Exchange (ETDEWEB)

    Iorio, Alfredo [Institute of Particle and Nuclear Physics, Charles University of Prague - V Holesovickach 2, 180 00 Prague 8 (Czech Republic); Department of Physics ' E. R. Caianiello' , University of Salerno and I.N.F.N. Naples, Gruppo Collegato di Salerno - Via Allende, 84081 Baronissi (Italy)

    2007-05-15

    We review the basics of the two most widely used approaches to Lorentz violation - the Standard Model Extension and Noncommutative Field Theory - and discuss in some detail the example of the modified spectrum of the synchrotron radiation. Motivated by touching upon such a fundamental issue as Lorentz symmetry, we ask three questions: What is behind the search for Lorentz violation? Is String Theory a physical theory? Is there an alternative to Supersymmetry?.

  18. Quark flavour conserving violations of the lepton number

    CERN Document Server

    Binétruy, Pierre; Lavignac, Stephane; Savoy, C A

    1998-01-01

    We study supersymmetric models of lepton and baryon number violation based on an abelian family gauge group. Due to possible lepton-Higgs mixing, the lepton violating couplings are related to the Yukawa couplings and may be generated by them even if they were absent in the original theory. Such terms may be dominant and are not given by the naive family charge counting rules. This enhancement mechanism can provide an alignment between lepton-number violating terms and Yukawa couplings: as a result they conserve quark flavour. A natural way of suppressing baryon number violation in this class of models is also proposed.

  19. Exploring inequality violations by classical hidden variables numerically

    International Nuclear Information System (INIS)

    Vongehr, Sascha

    2013-01-01

    There are increasingly suggestions for computer simulations of quantum statistics which try to violate Bell type inequalities via classical, common cause correlations. The Clauser–Horne–Shimony–Holt (CHSH) inequality is very robust. However, we argue that with the Einstein–Podolsky–Rosen setup, the CHSH is inferior to the Bell inequality, although and because the latter must assume anti-correlation of entangled photon singlet states. We simulate how often quantum behavior violates both inequalities, depending on the number of photons. Violating Bell 99% of the time is argued to be an ideal benchmark. We present hidden variables that violate the Bell and CHSH inequalities with 50% probability, and ones which violate Bell 85% of the time when missing 13% anti-correlation. We discuss how to present the quantum correlations to a wide audience and conclude that, when defending against claims of hidden classicality, one should demand numerical simulations and insist on anti-correlation and the full amount of Bell violation. -- Highlights: •The widely assumed superiority of the CHSH fails in the EPR problem. •We simulate Bell type inequalities behavior depending on the number of photons. •The core of Bell’s theorem in the EPR setup is introduced in a simple way understandable to a wide audience. •We present hidden variables that violate both inequalities with 50% probability. •Algorithms have been supplied in form of Mathematica programs

  20. Cosmological CP Violation

    CERN Document Server

    Tomaschitz, R

    1994-01-01

    Spinor fields are studied in infinite, topologically multiply connected Robertson-Walker cosmologies. Unitary spinor representations for the discrete covering groups of the spacelike slices are constructed. The spectral resolution of Dirac's equation is given in terms of horospherical elementary waves, on which the treatment of spin and energy is based in these cosmologies. The meaning of the energy and the particle-antiparticle concept is explained in the context of this varying cosmic background. Discrete symmetries, in particular inversions of the multiply connected spacelike slices, are studied. The violation of the unitarity of the parity operator, due to self-interference of P-reflected wave packets, is discussed. The violation of the CP and CPT invariance - already on the level of the free Dirac equation on this cosmological background - is pointed out.

  1. 45 CFR 1640.4 - Violation of agreement.

    Science.gov (United States)

    2010-10-01

    ... OF FEDERAL LAW TO LSC RECIPIENTS § 1640.4 Violation of agreement. (a) A violation of the agreement... negligence allowed the employee or board member to engage in the activities which led to the conviction or...

  2. International Security Presence in Kosovo and its Human Rights Implications

    Directory of Open Access Journals (Sweden)

    Istrefi Remzije

    2017-11-01

    Full Text Available In this article I will examine the powers and activities of NATO-led Kosovo forces (KFOR and their impact on human rights protection in Kosovo. Through this examination, I seek to answer the following questions: which KFOR actions affected the human rights of Kosovars? Does KFOR carry out responsibilities and abide by the obligations normally imposed upon nation-states? And is there a solution available when the alleged violator is KFOR? KFOR is responsible for carrying out military tasks and for ‘shouldering’ UNMIK and local security forces in some civilian peace-building tasks. In the course of the exercise of its mandate, there were alleged complaints of human rights violations by KFOR. The legal implications of these alleged complaints against KFOR (inactions will also be discussed.

  3. Experimental violation of entropic inequalities

    International Nuclear Information System (INIS)

    Bovino, F.A.; Castagnoli, G.; Ekert, A.; Horodecki, P.; Alves, C.M.; Sergienko, A.V.

    2005-01-01

    Full text: We report the experimental evidence that polarization entangled photons violate the inequality based on Renyi entropy. Our experimental method is based on four-photon coincidences in photon bunching and antibunching effects. We introduce an additional 'phase marking' technique, which allow observing the violation of the inequalities even with non-deterministic sources of entangled photons. Our method can be applied to measure selected non-linear properties of bipartite quantum states, such as purity or entanglement. (author)

  4. Does the relativity principle violate?

    International Nuclear Information System (INIS)

    Barashenkov, V.S.

    1994-01-01

    Theoretical and experimental data about a possible existence in Nature of some preferred reference frame with a violation of the principle of relativity are considered. The Einstein's and Lorentz's points of view are compared. Although some experiments are known which, in opinion of their authors, indicate the relativity principle violation persuasive evidences supporting this conclusion are absent for the present. The proposals of new experiments in this region, particularly with electron spin precession, are discussed. 55 refs., 4 figs

  5. Providing Criminological Security of Minors at the National Level

    Directory of Open Access Journals (Sweden)

    Andrei I. Savelev

    2017-08-01

    Full Text Available The article discusses issues related to the provision of criminological security of minors at the national level. The Author analyzes the normative legal basis and main directions of activity of subjects of prevention of the violation of child rights in the Russian Federation. The Author believes that the current system of legal guarantees of criminological security of minors not fully meet modern requirements of protection of rights, freedoms and legitimate interests of adolescents. In particular, the legislation of the Russian Federation is largely focused on protecting the interests of disadvantaged segments of the population, including minors, being in socially dangerous position. It is proposed to improve the existing legislation through the adoption of a new federal law “The bases of the system of prevention of offences and security of minors”, which will be an important step towards building a legal state.

  6. Experimental violation of multipartite Bell inequalities with trapped ions.

    Science.gov (United States)

    Lanyon, B P; Zwerger, M; Jurcevic, P; Hempel, C; Dür, W; Briegel, H J; Blatt, R; Roos, C F

    2014-03-14

    We report on the experimental violation of multipartite Bell inequalities by entangled states of trapped ions. First, we consider resource states for measurement-based quantum computation of between 3 and 7 ions and show that all strongly violate a Bell-type inequality for graph states, where the criterion for violation is a sufficiently high fidelity. Second, we analyze Greenberger-Horne-Zeilinger states of up to 14 ions generated in a previous experiment using stronger Mermin-Klyshko inequalities, and show that in this case the violation of local realism increases exponentially with system size. These experiments represent a violation of multipartite Bell-type inequalities of deterministically prepared entangled states. In addition, the detection loophole is closed.

  7. Do community and autonomy moral violations elicit different emotions?

    Science.gov (United States)

    Kollareth, Dolichan; Kikutani, Mariko; Shirai, Mariko; Russell, James A

    2018-06-11

    According to one important set of theories, different domains of immorality are linked to different discrete emotions-panculturally. Violations against the community elicit contempt, whereas violations against an individual elicit anger. To test this theory, American, Indian and Japanese participants (N = 480) indicated contempt and anger reactions (with verbal rating and face selection) to both the types of immorality. To remedy method problems in previous research, community and autonomy violations were created for the same story-frame, by varying the target to be either the community or an individual. Community and autonomy violations did not differ significantly in the emotion elicited: overall, both types of violations elicited more anger than contempt (and more negative emotion of any kind than positive emotion). By verbal rating, Americans and Indians reported more anger than contempt for both types of violation, whereas Japanese reported more contempt than anger for both types. By face selection, the three cultural groups selected anger more than contempt for both types of violation. The results speak against defining distinct domains of morality by their association with distinct emotions. © 2018 International Union of Psychological Science.

  8. CP violation in $b$ hadrons at LHCb

    CERN Document Server

    Hicheur, Adlene

    2017-01-01

    The most recent results on $CP$ violation in b hadrons obtained by the LHCb Collaboration with Run I and years 2015-2016 of Run II are reviewed. The different types of violation are covered by the studies presented in this paper.

  9. Device-independent quantum key distribution secure against collective attacks

    International Nuclear Information System (INIS)

    Pironio, Stefano; Gisin, Nicolas; AcIn, Antonio; Brunner, Nicolas; Massar, Serge; Scarani, Valerio

    2009-01-01

    Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows from the laws of quantum physics, but contrary to usual QKD, it does not rely on any assumptions about the internal working of the quantum devices used in the protocol. In this paper, we present in detail the security proof for a DIQKD protocol introduced in AcIn et al (2008 Phys. Rev. Lett. 98 230501). This proof exploits the full structure of quantum theory (as opposed to other proofs that exploit only the no-signaling principle), but only holds against collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically in each round of the protocol (although she can act coherently on her systems at any time). The security of any DIQKD protocol necessarily relies on the violation of a Bell inequality. We discuss the issue of loopholes in Bell experiments in this context.

  10. Modelling Planck-scale Lorentz violation via analogue models

    International Nuclear Information System (INIS)

    Weinfurtner, Silke; Liberati, Stefano; Visser, Matt

    2006-01-01

    Astrophysical tests of Planck-suppressed Lorentz violations had been extensively studied in recent years and very stringent constraints have been obtained within the framework of effective field theory. There are however still some unresolved theoretical issues, in particular regarding the so called 'naturalness problem' - which arises when postulating that Planck suppressed Lorentz violations arise only from operators with mass dimension greater than four in the Lagrangian. In the work presented here we shall try to address this problem by looking at a condensed-matter analogue of the Lorentz violations considered in quantum gravity phenomenology. specifically, we investigate the class of two-component BECs subject to laserinduced transitions between the two components, and we show that this model is an example for Lorentz invariance violation due to ultraviolet physics. We shall show that such a model can be considered to be an explicit example high-energy Lorentz violations where the 'naturalness problem' does not arise

  11. Atomic T-violation: A biased history

    International Nuclear Information System (INIS)

    Sandars, P.G.H.

    1991-01-01

    This article reviews the history of atomic T-violation from a personal point of view. Considerable emphasis is put on the early edm work which was much encouraged by the interest shown by Art Rich. The present generation of beautiful experiments is described more briefly. We end with a short introduction to the new topic of T not P violation in atoms

  12. Spontaneous CP violation on the lattice

    CERN Document Server

    Laine, Mikko

    2000-01-01

    At finite temperatures around the electroweak phase transition, the thermodynamics of the MSSM can be described by a three-dimensional two Higgs doublet effective theory. This effective theory has a phase where CP is spontaneously violated. We study spontaneous CP violation with non-perturbative lattice simulations, and analyse whether one could end up in this phase for any physical MSSM parameter values.

  13. Possible violations of the relativity theory

    International Nuclear Information System (INIS)

    Tiomno, J.

    1985-01-01

    A review of previous works of the author and collaborators on possible violations of the Theory of Relativity (SR) is made. It is shown that there is no contradiction of the predictions of the Lorentz Aether Theory, in the form presented in these papers, with existing experiments. Further experiments to detect these violations (or to confirm SR) are indicated. (Author) [pt

  14. Lorentz violation and black-hole thermodynamics

    International Nuclear Information System (INIS)

    Betschart, G.; Kant, E.; Klinkhamer, F.R.

    2009-01-01

    We consider nonstandard photons from nonbirefringent modified Maxwell theory and discuss their propagation in a fixed Schwarzschild spacetime background. This particular modification of Maxwell theory is Lorentz-violating and allows for maximal photon velocities differing from the causal speed c of the asymptotic background spacetime. In the limit of geometrical optics, light rays from modified Maxwell theory are found to propagate along null geodesics in an effective metric. We observe that not every Lorentz-violating theory with multiple maximal velocities different from the causal speed c modifies the notion of the event horizon, contrary to naive expectations. This result implies that not every Lorentz-violating theory with multiple maximal velocities necessarily leads to a contradiction with the generalized second law of thermodynamics.

  15. Lepton flavor violation and seesaw symmetries

    Energy Technology Data Exchange (ETDEWEB)

    Aristizabal Sierra, D., E-mail: daristizabal@ulg.ac.be [Universite de Liege, IFPA, Department AGO (Belgium)

    2013-03-15

    When the standard model is extended with right-handed neutrinos the symmetries of the resulting Lagrangian are enlarged with a new global U(1){sub R} Abelian factor. In the context of minimal seesaw models we analyze the implications of a slightly broken U(1){sub R} symmetry on charged lepton flavor violating decays. We find, depending on the R-charge assignments, models where charged lepton flavor violating rates can be within measurable ranges. In particular, we show that in the resulting models due to the structure of the light neutrino mass matrix muon flavor violating decays are entirely determined by neutrino data (up to a normalization factor) and can be sizable in a wide right-handed neutrino mass range.

  16. LHC experimental sensitivity to CP violating gtt couplings

    CERN Document Server

    Sjölin, J

    2003-01-01

    The level of CP violation in pp to tt+X induced by the standard model is known to be below the experimental sensitivity by many orders of magnitude. However, in some effective theories, it is plausible that new CP violating physics could reveal itself as additional non- renormalizable terms in the Lagrangian. Since these should respect the symmetries of the low-energy gauge interaction, violate CP and generate the correct event topology, the set of allowed terms is highly restricted. This analysis gives an estimate of the expected experimental sensitivity to the lowest order effective CP violating gtt interaction term beyond the standard model using simulated data from the ATLAS detector at the LHC. (36 refs).

  17. CP violation and supersymmetry-breaking in superstring models

    International Nuclear Information System (INIS)

    Dent, T.E.

    2000-09-01

    In this thesis I discuss aspects of the phenomenology of heterotic string, theory, using low-energy effective supergravity models. I investigate the origin of CP violation, the implications for low-energy physics of the modular invariance of the theory, supersymmetry-breaking via gaugino condensation in a hidden sector, and the interplay between these topics. I review the theory of CP violation and the problem of CP violation in supersymmetry phenomenology. In a scenario where the origin of CP violation lies in the compactification of the extra dimensions of string theory, I present simple models which include a duality symmetry acting on the compactification modulus and on observable fields. I show how the structure of the theory affects CP-violating observables, and discuss the effect of such a symmetry on low-energy physics in general. I present a detailed investigation of supersymmetry-breaking by gaugino condensation in supergravity, in particular as applied to the stabilisation of string moduli. For hidden sectors with or without matter I calculate corrections to the usual formulae for the scalar potential and soft supersymmetry-breaking terms. I discuss the phenomenological implications of these corrections and show that they may affect the value of the compactification modulus. and consequently the prospects for predictions of CP violation in string models. (author)

  18. Lepton number violation, lepton flavor violation and non zero Θ_1_3 in LRSM

    International Nuclear Information System (INIS)

    Borgohain, Happy; Das, Mrinal Kumar

    2017-01-01

    We have done a phenomenological study of lepton number violation and lepton flavour violation in a generic left-right symmetric model (LRSM) considering broken ϻ-τ symmetry. The leading order TBM mass matrix originates from the type I (II) seesaw mechanism, whereas the perturbations to generate non-zero reactor mixing angle Θ_1_3, originates from the type II (I) seesaw mechanism. We studied the new physics contributions to neutrinoless double beta decay (NDBD) ignoring the left-right gauge boson mixing and the heavy-light neutrino mixing within the framework of left-right symmetric regime by considering the presence of both type I and type II seesaw. We assumed the mass of the gauge bosons and scalars to be around TeV and studied the effects of the new physics contributions on the effective mass and compared with the current experimental limit imposed by GERDA. We further extended our analysis by correlating the lepton flavour violation of the decay process, (ϻ→ 3e) with Θ_1_3. (author)

  19. CP violation in bilinear R-parity violation and its consequences for the early universe

    Energy Technology Data Exchange (ETDEWEB)

    Cheriguene, Asma; Porod, Werner [Wuerzburg Univ. (Germany). Inst. fuer Theoretische Physik und Astrophysik; Liebler, Stefan [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2014-06-15

    Supersymmetric models with bilinear R-parity violation (BRpV) provide a framework for neutrino masses and mixing angles to explain neutrino oscillation data. We consider CP violation within the new physical phases in BRpV and discuss their effect on the generation of neutrino masses and the decays of the lightest supersymmetric particle (LSP), being a light neutralino with mass ∝100 GeV, at next-to-leading order. The decays affect the lepton and via sphaleron transitions the baryon asymmetry in the early universe. For a rather light LSP, asymmetries generated before the electroweak phase transition via e.g. the Affleck-Dine mechanism are reduced up to two orders of magnitude, but are still present. On the other hand, the decays of a light LSP themselves can account for the generation of a lepton and baryon asymmetry, the latter in accordance to the observation in our universe, since the smallness of the BRpV parameters allows for an out-of-equilibrium decay and sufficiently large CP violation is possible consistent with experimental bounds from the non-observation of electric dipole-moments.

  20. Near-Optimal and Explicit Bell Inequality Violations

    NARCIS (Netherlands)

    Buhrman, H.; Regev, O.; Scarpa, G.; de Wolf, R.

    2011-01-01

    Bell inequality violations correspond to behavior of entangled quantum systems that cannot be simulated classically. We give two new two-player games with Bell inequality violations that are stronger, fully explicit, and arguably simpler than earlier work.The first game is based on the Hidden

  1. Definitions of minimal flavour violation for leptons

    International Nuclear Information System (INIS)

    Palorini, F.

    2006-01-01

    Neutrino masses imply the violation of lepton flavour and new physics beyond the Standard Model. However, flavour change has only been observed in oscillations. In analogy with the quark sector, we could deduce the existence of a principle of Minimal Flavour Violation also for Leptons (MFVL). Such an extension is not straightforward, since the mechanisms generating neutrino masses are unknown and many scenarios can be envisaged. Thus, we explore some possible definitions of MFVL and propose a notion that can include many models. We show, furthermore, that flavour violating processes are not necessarily controlled by the PMNS mixing matrix. (author)

  2. arXiv Flavour Physics and CP Violation

    CERN Document Server

    Kamenik, J.F.

    2016-01-01

    These notes represent a summary of three lectures on flavour and CP violation, given at the CERNs European School of High Energy Physics in 2014. They cover flavour physics within the standard model, phenomenology of CP violation in meson mixing and decays, as well as constraints of flavour observableson physics beyond the standard model. In preparing the lectures (and consequently this summary) I drew heavily from several existing excellent and exhaustive sets of lecture notes and reviews on flavour physics and CP violation [1]. The reader is encouraged to consult those as well as the original literature for a more detailed study.

  3. Up sector of minimal flavor violation: top quark properties and direct D meson CP violation

    Energy Technology Data Exchange (ETDEWEB)

    Bai, Yang; Berger, Joshua; Hewett, JoAnne L.; Li, Ye

    2013-07-01

    Minimal Flavor Violation in the up-type quark sector leads to particularly interesting phenomenology due to the interplay of flavor physics in the charm sector and collider physics from flavor changing processes in the top sector. We study the most general operators that can affect top quark properties and D meson decays in this scenario, concentrating on two CP violating operators for detailed studies. The consequences of these effective operators on charm and top flavor changing processes are generically small, but can be enhanced if there exists a light flavor mediator that is a Standard Model gauge singlet scalar and transforms under the flavor symmetry group. This flavor mediator can satisfy the current experimental bounds with a mass as low as tens of GeV and explain observed D-meson direct CP violation. Additionally, the model predicts a non-trivial branching fraction for a top quark decay that would mimic a dijet resonance.

  4. Backlash against gender stereotype-violating preschool children.

    Science.gov (United States)

    Sullivan, Jessica; Moss-Racusin, Corinne; Lopez, Michael; Williams, Katherine

    2018-01-01

    While there is substantial evidence that adults who violate gender stereotypes often face backlash (i.e. social and economic penalties), less is known about the nature of gender stereotypes for young children, and the penalties that children may face for violating them. We conducted three experiments, with over 2000 adults from the US, to better understand the content and consequences of adults' gender stereotypes for young children. In Experiment 1, we tested which characteristics adults (N = 635) believed to be descriptive (i.e. typical), prescriptive (i.e. required), and proscriptive (i.e. forbidden) for preschool-aged boys and girls. Using the characteristics that were rated in Experiment 1, we then constructed vignettes that were either 'masculine' or 'feminine', and manipulated whether the vignettes were said to describe a boy or a girl. Experiment 2 (N = 697) revealed that adults rated stereotype-violating children as less likeable than their stereotype-conforming peers, and that this difference was more robust for boys than girls. Experiment 3 (N = 731) was a direct replication of Experiment 2, and revealed converging evidence of backlash against stereotype-violating children. In sum, our results suggest that even young children encounter backlash from adults for stereotype violations, and that these effects may be strongest for boys.

  5. CP violation in KL → π0e+e-

    International Nuclear Information System (INIS)

    Littenberg, L.S.

    1989-01-01

    It's been appreciated for many years that the decays K L → π 0 ell bar ell are CP violating to lowest order in the Standard Model, and that the component of direct CP violation in these decays is likely to be comparable to that of the CP violation due to state mixing (ε). This is to be contrasted with the case of K 0 → ππ wherein the latter contribution is predicted to be hundreds of times larger than the former. This paper investigates this CP violation further. 19 refs., 2 figs

  6. CP violation in τ → ντ + 3π

    International Nuclear Information System (INIS)

    Tsai, Y.S.

    1998-01-01

    In the Standard Model no CP violation can occur in decay processes involving leptons either as a parent or a daughter because these processes involve one W exchange and thus, even if the CP violating complex coupling exists in these decays, its effect will not show up when the amplitude is squared. The author needs two diagrams to interfere with each other to see the CP violating effects. Here, he discusses ways to find CP violation in the decay of τ ± → ν τ + 3π from unpolarized as well as polarized τ ±

  7. 'Violation' - does HRA need the concept?

    International Nuclear Information System (INIS)

    Dougherty, Ed

    1995-01-01

    Violations are part of a complex matrix of judgmental behavior. The term violation is an indicator of the possibility of recent judgment errors but more so of latent errors in management and/or design. The effect of investigations in this arena do indicate a need for an extension of the classic slip/mistake taxonomy of human reliability analysis. The note attempts to initiate this extension

  8. CP Violation and B Physics

    International Nuclear Information System (INIS)

    Quinn, Helen R

    2001-01-01

    These lectures provide a basic overview of topics related to the study of CP Violation in B decays. In the first lecture, I review the basics of discrete symmetries in field theories, the quantum mechanics of neutral but flavor-non-trivial mesons, and the classification of three types of CP violation [1]. The actual second lecture which I gave will be separately published as it is my Dirac award lecture and is focused on the separate topic of strong CP Violation. In Lecture 2 here, I cover the Standard Model predictions for neutral B decays, and in particular discuss some channels of interest for CP Violation studies. Lecture 3 reviews the various tools and techniques used to deal with the hadronic physics effects. In Lecture 4, I briefly review the present and planned experiments that can study B decays. I cannot teach all the details of this subject in this short course, so my approach is instead to try to give students a grasp of the relevant concepts and an overview of the available tools. The level of these lectures is introductory. I will provide some references to more detailed treatments and current literature, but this is not a review article so I do not attempt to give complete references to all related literature. By now there are some excellent textbooks that cover this subject in great detail [1]. I refer students to these for more details and for more complete references to the original literature

  9. B physics and CP violation

    International Nuclear Information System (INIS)

    Quinn, H.

    2002-01-01

    These lectures provide a basic overview of topics related to the study of CP Violation in B decays. In the first lecture, I review the basics of discrete symmetries in field theories, the quantum mechanics of neutral but flavor-non-trivial mesons, and the classification of three types of CP violation. The actual second lecture which I gave will be separately published as it is my Dirac award lecture and is focussed on the separate topic of strong CP Violation. In Lecture 2 here, I cover the Standard Model predictions for neutral B decays, and in particular discuss some channels of interest for CP Violation studies. Lecture 3 reviews the various tools and techniques used to deal with the hadronic physics effects. In Lecture 4, I briefly review the present and planned experiments that can study B decays. I cannot teach all the details of this subject in this short course, so my approach is instead to try to give students a grasp of the relevant concepts and an overview of the available tools. The level of these lectures is introductory. I will provide some references to more detailed treatments and current literature, but this is not a review article so I do not attempt to give complete references to all related literature. By now there are some excellent textbooks that cover this subject in great detail. I refer students to these for more details and for more complete references to the original literature. (author)

  10. Implications of maximal Jarlskog invariant and maximal CP violation

    International Nuclear Information System (INIS)

    Rodriguez-Jauregui, E.; Universidad Nacional Autonoma de Mexico

    2001-04-01

    We argue here why CP violating phase Φ in the quark mixing matrix is maximal, that is, Φ=90 . In the Standard Model CP violation is related to the Jarlskog invariant J, which can be obtained from non commuting Hermitian mass matrices. In this article we derive the conditions to have Hermitian mass matrices which give maximal Jarlskog invariant J and maximal CP violating phase Φ. We find that all squared moduli of the quark mixing elements have a singular point when the CP violation phase Φ takes the value Φ=90 . This special feature of the Jarlskog invariant J and the quark mixing matrix is a clear and precise indication that CP violating Phase Φ is maximal in order to let nature treat democratically all of the quark mixing matrix moduli. (orig.)

  11. Lorentz violation, gravitoelectromagnetic field and Bhabha scattering

    Science.gov (United States)

    Santos, A. F.; Khanna, Faqir C.

    2018-01-01

    Lorentz symmetry is a fundamental symmetry in the Standard Model (SM) and in General Relativity (GR). This symmetry holds true for all models at low energies. However, at energies near the Planck scale, it is conjectured that there may be a very small violation of Lorentz symmetry. The Standard Model Extension (SME) is a quantum field theory that includes a systematic description of Lorentz symmetry violations in all sectors of particle physics and gravity. In this paper, SME is considered to study the physical process of Bhabha Scattering in the Gravitoelectromagnetism (GEM) theory. GEM is an important formalism that is valid in a suitable approximation of general relativity. A new nonminimal coupling term that violates Lorentz symmetry is used in this paper. Differential cross-section for gravitational Bhabha scattering is calculated. The Lorentz violation contributions to this GEM scattering cross-section are small and are similar in magnitude to the case of the electromagnetic field.

  12. Constrained Gauge Fields from Spontaneous Lorentz Violation

    CERN Document Server

    Chkareuli, J L; Jejelava, J G; Nielsen, H B

    2008-01-01

    Spontaneous Lorentz violation realized through a nonlinear vector field constraint of the type $A_{\\mu}^{2}=M^{2}$ ($M$ is the proposed scale for Lorentz violation) is shown to generate massless vector Goldstone bosons, gauging the starting global internal symmetries in arbitrary relativistically invariant theories. The gauge invariance appears in essence as a necessary condition for these bosons not to be superfluously restricted in degrees of freedom, apart from the constraint due to which the true vacuum in a theory is chosen by the Lorentz violation. In the Abelian symmetry case the only possible theory proves to be QED with a massless vector Goldstone boson naturally associated with the photon, while the non-Abelian symmetry case results in a conventional Yang-Mills theory. These theories, both Abelian and non-Abelian, look essentially nonlinear and contain particular Lorentz (and $CPT$) violating couplings when expressed in terms of the pure Goldstone vector modes. However, they do not lead to physical ...

  13. A Lorentz-Violating Alternative to Higgs Mechanism?

    CERN Document Server

    Alexandre, Jean

    2011-01-01

    We consider a four-dimensional field-theory model with two massless fermions, coupled to an Abelian vector field without flavour mixing, and to another Abelian vector field with flavour mixing. Both Abelian vectors have a Lorentz-violating kinetic term, introducing a Lorentz-violation mass scale $M$, from which fermions and the flavour-mixing vector get their dynamical masses, whereas the vector coupled without flavour mixing remains massless. When the two coupling constants have similar values in order of magnitude, a mass hierarchy pattern emerges, in which one fermion is very light compared to the other, whilst the vector mass is larger than the mass of the heavy fermion. The work presented here may be considered as a Lorentz-symmetry-Violating alternative to the Higgs mechanism, in the sense that no scalar particle (fundamental or composite) is necessary for the generation of the vector-meson mass. However, the model is not realistic given that, as a result of Lorentz Violation, the maximal (light-cone) s...

  14. Extrinsic CPT violation in neutrino oscillations in matter

    International Nuclear Information System (INIS)

    Jacobson, Magnus; Ohlsson, Tommy

    2004-01-01

    We investigate matter-induced (or extrinsic) CPT violation effects in neutrino oscillations in matter. Especially, we present approximate analytical formulas for the CPT-violating probability differences for three flavor neutrino oscillations in matter with an arbitrary matter density profile. Note that we assume that the CPT invariance theorem holds, which means that the CPT violation effects arise entirely because of the presence of matter. As special cases of matter density profiles, we consider constant and step-function matter density profiles, which are relevant for neutrino oscillation physics in accelerator and reactor long baseline experiments as well as neutrino factories. Finally, the implications of extrinsic CPT violation on neutrino oscillations in matter for several past, present, and future long baseline experiments are estimated

  15. Neutrinos as a probe of CP-violation and leptogenesis

    Indian Academy of Sciences (India)

    Establishing CP-violation in the lepton sector is one of the most challenging future tasks in neutrino physics. The lepton mixing matrix contains one Dirac phase and, if neutrinos are Majorana particles, two additional CP-violating phases. I will review the main theoretical aspects of CP-violation in the lepton sector. Then, I will ...

  16. From symmetry violation to dynamics: The charm window

    International Nuclear Information System (INIS)

    Appel, J.A.

    1997-12-01

    C.S. Wu observed parity violation in the low energy process of nuclear decay. She was the first to observe this symmetry violation at any energy. Yet, her work taught us about the form and strengths of the couplings of the massive weak boson. Today, we use the same approach. We look for very much higher mass-scale interactions through symmetry violations in the decays of charm quark systems. These charm decays provide a unique window to new physics

  17. Lorentz Violation, Möller Scattering, and Finite Temperature

    Directory of Open Access Journals (Sweden)

    Alesandro F. Santos

    2018-01-01

    Full Text Available Lorentz and CPT symmetries may be violated in new physics that emerges at very high energy scale, that is, at the Planck scale. The differential cross section of the Möller scattering due to Lorentz violation at finite temperature is calculated. Lorentz-violating effects emerge from an interaction vertex due to a CPT-odd nonminimal coupling in the covariant derivative. The finite temperature effects are determined using the Thermo Field Dynamics (TFD formalism.

  18. Parity violation in two-nucleon systems

    Energy Technology Data Exchange (ETDEWEB)

    Liu, C.-P., E-mail: cpliu@mail.ndhu.edu.tw [National Dong Hwa University, Department of Physics (China)

    2013-03-15

    Nuclear few-body systems become attractive avenues for the study of low-energy parity violation because experiments start to meet the precision requirements and theoretical calculations can be performed reliably. In this talk, an attempt of parametrizing low-energy parity-violating observables by the Danilov parameters will be introduced. Analyses of two-nucleon observables, based on the modern phenomenological potentials or the one of effective field theory, will be discussed.

  19. A model for the origin and mechanisms of CP violation

    International Nuclear Information System (INIS)

    Wu, Y.

    1995-01-01

    In this talk I will show that the two-Higgs doublet model with vacuum CP violation and approximate global U(1) family symmetries may provide one of the simplest and attractive models for understanding the origin and mechanisms of CP violation. It is shown that the mechanism of spontaneous symmetry breaking provides not only a mechanism for generating masses of the bosons and fermions, but also a mechanism for creating CP-phases of the bosons and fermions, so that CP violation occurs, after spontaneous symmetry breaking, in all possible ways from a single CP phase of the vacuum and is generally classified into four types of CP-violating mechanism. A new type of CP-violating mechanism in the charged Higgs boson interactions of the fermions is emphasized and can provide a consistent description for both established and reported CP-, P-, and T-violating phenomena. Of particular importance is the new source of CP violation for charged Higgs boson interactions that lead to the value of ε'/ε as large as 10 -3 independent of the CKM phase. copyright 1995 American Institute of Physics

  20. Search for CP violation in baryon decays at LHCb

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The phenomenon of CP violation has been observed in the K- and B-meson systems, but not yet with any baryonic particle. We report on searches for CP violation in baryon decays at LHCb using Run I data. We find evidence for CP violation in Lambda0b -> p pi- pi+ pi- decays with a statistical significance corresponding to 3.3 standard deviations, including systematic uncertainties. This represents the first evidence of CP violation in the baryon sector. An overview of other recent results of baryon decays will be presented, along with some highlights of the charmless B-decay programme.

  1. Probing CPT violation in neutrino oscillation: A three flavor analysis

    International Nuclear Information System (INIS)

    Samanta, Abhijit

    2010-01-01

    We have studied CPT violation in neutrino oscillation considering three flavor framework with matter effect. We have constructed a new way to find the oscillation probability incorporating CPT violating terms without any approximation. Then CPT violation with atmospheric neutrinos for a magnetized iron calorimeter detector considering the muons (directly measurable with high resolution) of the charge current events has been studied for zero and nonzero θ 13 values. It is found that a potential bound of δb 32 ≤6x10 -24 GeV at 99% CL can be obtained with 1 Mton.year exposure of this detector; and unlike neutrino beam experiments, there is no possibility to generate 'fake' CPT violation due to matter effect with atmospheric neutrinos. The advantages of atmospheric neutrinos to discriminate CPT violation from CP violation and nonstandard interactions are also discussed.

  2. Lorentz violation, gravitoelectromagnetism and Bhabha scattering at finite temperature

    Science.gov (United States)

    Santos, A. F.; Khanna, Faqir C.

    2018-04-01

    Gravitoelectromagnetism (GEM) is an approach for the gravitation field that is described using the formulation and terminology similar to that of electromagnetism. The Lorentz violation is considered in the formulation of GEM that is covariant in its form. In practice, such a small violation of the Lorentz symmetry may be expected in a unified theory at very high energy. In this paper, a non-minimal coupling term, which exhibits Lorentz violation, is added as a new term in the covariant form. The differential cross-section for Bhabha scattering in the GEM framework at finite temperature is calculated that includes Lorentz violation. The Thermo Field Dynamics (TFD) formalism is used to calculate the total differential cross-section at finite temperature. The contribution due to Lorentz violation is isolated from the total cross-section. It is found to be small in magnitude.

  3. Parity violation in electron scattering; Violation de parite en diffusion d'electrons

    Energy Technology Data Exchange (ETDEWEB)

    Lhuillier, D

    2007-09-15

    The elaboration of the electroweak standard model from the discovery of parity violation to the weak neutral current is described in the first chapter. In the second chapter the author discusses the 2 experimental approaches of the parity violation experiments. In the first approach the weak neutral current can be assumed to be well known and can be used as a probe for the hadronic matter. The second approach consists in measuring the weak neutral current between 2 particles with known internal structure in order to test the predictions of the standard model in the low energy range. The chapters 3 and 4 are an illustration of the first approach through the HAPPEx series of experiments that took place in the Jefferson Laboratory from 1998 to 2005. The HAPPEx experiments aimed at measuring the contribution of strange quarks in the electromagnetic form factors of the nucleon through the violation of parity in the elastic scattering at forward angles. The last chapter is dedicated to the E158 experiment that was performed at the Slac (California) between 2000 and 2003. The weak neutral current was measured between 2 electrons and the high accuracy obtained allowed the physics beyond the standard model to be indirectly constraint up to a few TeV. (A.C.)

  4. Lepton number violation searches at the LHC

    CERN Document Server

    Salvucci, Antonio; The ATLAS collaboration

    2017-01-01

    Lepton number is conserved in the Standard Model, therefore, any evidence for its violation would indicate the existence of new physics. This talk presents a review of the latest searches performed at the LHC concerning Lepton Number Violation (LNV) processes in the context of Left-Right Symmetric theory and Seesaw mechanism.

  5. CP violation experiment at Fermilab

    International Nuclear Information System (INIS)

    Hsiung, Yee B.

    1990-07-01

    The E731 experiment at Fermilab has searched for ''direct'' CP violation in K 0 → ππ, which is parametrized by var-epsilon '/var-epsilon. For the first time, in 20% of the data set, all four modes of the K L,S → π + π - (π 0 π 0 ) were collected simultaneously, providing a great check on the systematic uncertainty. The result is Re(var-epsilon '/var-epsilon) = -0.0004 ± 0.0014 (stat) ± 0.0006(syst), which provides no evidence for ''direct'' CP violation. The CPT symmetry has also been tested by measuring the phase difference Δφ = φ 00 - φ ± between the two CP violating parameters η 00 and η ± . We fine Δφ = -0.3 degrees ± 2.4 degree(stat) ± 1.2 degree(syst). Using this together with the world average φ ± , we fine that the phase of the K 0 -bar K 0 mixing parameter var-epsilon is 44.5 degree ± 1.5 degree. Both of these results agree well with the predictions of CPT symmetry. 17 refs., 10 figs

  6. Prototype Rail Crossing Violation Warning Application Project Report.

    Science.gov (United States)

    2017-09-05

    This report is the Project Report for the Rail Crossing Violation Warning (RCVW) safety application developed for the project on Rail Crossing Violation Warning Application and Infrastructure Connection, providing a means for equipped connected vehic...

  7. Lorentz violation. Motivation and new constraints

    Energy Technology Data Exchange (ETDEWEB)

    Liberati, S. [Scuola Internazionale Superiore di Studi Avanzati SISSA, Trieste (Italy); Istituto Nazionale di Fisica Nucleare INFN, Sezione di Trieste (Italy); Maccione, L. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    We review the main theoretical motivations and observational constraints on Planck scale sup-pressed violations of Lorentz invariance. After introducing the problems related to the phenomenological study of quantum gravitational effects, we discuss the main theoretical frameworks within which possible departures from Lorentz invariance can be described. In particular, we focus on the framework of Effective Field Theory, describing several possible ways of including Lorentz violation therein and discussing their theoretical viability. We review the main low energy effects that are expected in this framework. We discuss the current observational constraints on such a framework, focusing on those achievable through high-energy astrophysics observations. In this context we present a summary of the most recent and strongest constraints on QED with Lorentz violating non-renormalizable operators. Finally, we discuss the present status of the field and its future perspectives. (orig.)

  8. Lorentz violation. Motivation and new constraints

    International Nuclear Information System (INIS)

    Liberati, S.; Maccione, L.

    2009-09-01

    We review the main theoretical motivations and observational constraints on Planck scale sup-pressed violations of Lorentz invariance. After introducing the problems related to the phenomenological study of quantum gravitational effects, we discuss the main theoretical frameworks within which possible departures from Lorentz invariance can be described. In particular, we focus on the framework of Effective Field Theory, describing several possible ways of including Lorentz violation therein and discussing their theoretical viability. We review the main low energy effects that are expected in this framework. We discuss the current observational constraints on such a framework, focusing on those achievable through high-energy astrophysics observations. In this context we present a summary of the most recent and strongest constraints on QED with Lorentz violating non-renormalizable operators. Finally, we discuss the present status of the field and its future perspectives. (orig.)

  9. 32 CFR 935.51 - Motor vehicle violations.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Motor vehicle violations. 935.51 Section 935.51... REGULATIONS WAKE ISLAND CODE Penalties § 935.51 Motor vehicle violations. Whoever is found guilty of a... than 30 days, or suspension or revocation of his motor vehicle operator's permit, or any combination or...

  10. Framing Effects as Violations of Extensionality

    OpenAIRE

    Bourgeois-Gironde , Sacha; Giraud , Raphaël

    2009-01-01

    Framing effects occur when different descriptions of the same decision problem give rise to divergent decisions. They can be seen as a violation of the decisiontheoretic version of the principle of extensionality (PE). The PE in logic means that two logically equivalent sentences can be substituted salva veritate. We explore what this notion of extensionality becomes in decision contexts. Violations of extensionality may have rational grounds. Based on some ideas proposed by the psychologist ...

  11. 50 CFR 20.72 - Violation of State law.

    Science.gov (United States)

    2010-10-01

    ... export any migratory bird, or any part, nest, or egg of any such bird, in violation of any applicable law... WILDLIFE AND PLANTS (CONTINUED) MIGRATORY BIRD HUNTING Federal, State, and Foreign Law § 20.72 Violation of...

  12. 50 CFR 20.71 - Violation of Federal law.

    Science.gov (United States)

    2010-10-01

    ... export any migratory bird, or any part, nest, or egg of any such bird, in violation of any act of... WILDLIFE AND PLANTS (CONTINUED) MIGRATORY BIRD HUNTING Federal, State, and Foreign Law § 20.71 Violation of...

  13. Subtleties in the BABAR measurement of time-reversal violation

    International Nuclear Information System (INIS)

    Efrati, Aielet

    2015-01-01

    A first measurement of time-reversal (T) asymmetries that are not also CP asymmetries has been recently achieved by the B A B AR collaboration. In this talk, which follows the work done in Ref. [1], I discuss the subtleties of this measurement in the presence of direct CP violation, CPT violation, wrong strangeness decays and wrong sign semi-leptonic decays. In particular, I explain why, in order to identify the measured asymmetries with time-reversal violation, one needs to assume (i) the absence of wrong strangeness decays or of CPT violation in strangeness changing decays, and (ii) the absence of wrong sign decays. (paper)

  14. Supersymmetry violation in elementary particle-monopole scattering

    International Nuclear Information System (INIS)

    Casher, A.; Shamir, Y.

    1991-10-01

    We show that the scattering of elementary particles on solitons (monopoles, fluxons, etc.) in supersymmetric gauge theories violates the relations dictated by supersymmetry at tree level. The violation arises because of the discrepancy between the spectra of bosonic and fermionic fluctuations and because of the fermionic nature of the supersymmetry generators. (author). 14 refs

  15. Weak NNM couplings and nuclear parity violation

    International Nuclear Information System (INIS)

    Holstein, B.R.

    1987-01-01

    After many years of careful theoretical and experimental study of nuclear parity violation, rough empirical values for weak parity violation nucleon-nucleon-meson vertices have been deduced. We address some of the physics which has been learned from this effort and show that it has implications for work going on outside this field. (author)

  16. Security Issues of the Digital Certificates within Public Key Infrastructures

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available The paper presents the basic byte level interpretation of an X.509 v3 digital certificate according to ASN.1 DER/BER encoding. The reasons for byte level analysis are various and important. For instance, a research paper has mentioned how a PKI security may be violated by MD5 collision over information from the certificates. In order to develop further studies on the topic a serious knowledge about certificate structure is necessary.

  17. Wages, wage violations, and pesticide safety experienced by migrant farmworkers in North Carolina.

    Science.gov (United States)

    Robinson, Erin; Nguyen, Ha T; Isom, Scott; Quandt, Sara A; Grzywacz, Joseph G; Chen, Haiying; Arcury, Thomas A

    2011-01-01

    Farmworkers have the potential to receive wages that fail to meet minimum wage standards. This analysis describes wages and minimum wage violations among farmworkers, and it determines associations of wage violations with personal characteristics and pesticide safety regulation violations. Data are from a cross-sectional survey of 300 eastern North Carolina farmworkers conducted in June through August, 2009. Most farmworkers (90.0%) were paid by the hour, but 11.7 percent received piece-rate pay. Wage violations were prevalent among farmworkers: 18.3 percent of all farmworkers, 45.3 percent of farmworkers without H-2A visas, and 3.6 percent of farmworkers with H-2A visas experienced wage violations. Most farmworkers experienced numerous pesticide safety violations. Personal characteristics were not associated with wage violations among farmworkers without H-2A visas, but some pesticide safety violations were associated with wage violations. The association of violations indicates that some growers generally violate regulations. Greater enforcement of all regulations is needed.

  18. Pittsburgh PLI Violations Report

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — Report containing Department of Permits, Licenses, and Inspections violation notices that have been issued by the City after October 15, 2015

  19. Violation of Bell's Inequality Using Continuous Variable Measurements

    Science.gov (United States)

    Thearle, Oliver; Janousek, Jiri; Armstrong, Seiji; Hosseini, Sara; Schünemann Mraz, Melanie; Assad, Syed; Symul, Thomas; James, Matthew R.; Huntington, Elanor; Ralph, Timothy C.; Lam, Ping Koy

    2018-01-01

    A Bell inequality is a fundamental test to rule out local hidden variable model descriptions of correlations between two physically separated systems. There have been a number of experiments in which a Bell inequality has been violated using discrete-variable systems. We demonstrate a violation of Bell's inequality using continuous variable quadrature measurements. By creating a four-mode entangled state with homodyne detection, we recorded a clear violation with a Bell value of B =2.31 ±0.02 . This opens new possibilities for using continuous variable states for device independent quantum protocols.

  20. Two-Higgs-doublet models with Minimal Flavour Violation

    International Nuclear Information System (INIS)

    Carlucci, Maria Valentina

    2010-01-01

    The tree-level flavour-changing neutral currents in the two-Higgs-doublet models can be suppressed by protecting the breaking of either flavour or flavour-blind symmetries, but only the first choice, implemented by the application of the Minimal Flavour Violation hypothesis, is stable under quantum corrections. Moreover, a two-Higgs-doublet model with Minimal Flavour Violation enriched with flavour-blind phases can explain the anomalies recently found in the ΔF = 2 transitions, namely the large CP-violating phase in B s mixing and the tension between ε K and S ψKS .

  1. What If Quantum Theory Violates All Mathematics?

    Directory of Open Access Journals (Sweden)

    Rosinger Elemér Elad

    2017-09-01

    Full Text Available It is shown by using a rather elementary argument in Mathematical Logic that if indeed, quantum theory does violate the famous Bell Inequalities, then quantum theory must inevitably also violate all valid mathematical statements, and in particular, such basic algebraic relations like 0 = 0, 1 = 1, 2 = 2, 3 = 3, … and so on …

  2. Directly detecting isospin-violating dark matter

    OpenAIRE

    Kelso, Chris; Kumar, Jason; Marfatia, Danny; Sandick, Pearl

    2018-01-01

    We consider the prospects for multiple dark matter direct detection experiments to determine if the interactions of a dark matter candidate are isospin-violating. We focus on theoretically well-motivated examples of isospin-violating dark matter (IVDM), including models in which dark matter interactions with nuclei are mediated by a dark photon, a Z, or a squark. We determine that the best prospects for distinguishing IVDM from the isospin-invariant scenario arise in the cases of dark photon–...

  3. Parity violation experiments at intermediate energies

    International Nuclear Information System (INIS)

    Van Oers, W.T.H.

    1996-06-01

    The status of the TRIUMF 221 MeV proton-proton violation experiment is reviewed. Several other proton-proton parity violation experiments in the in the intermediate energy range, currently in various stages of preparation, are discussed. A new experiment at an energy of 5.13 GeV (and if confirmed also at an energy of tens of GeV) is needed to follow on the earlier unexpected large result obtained at 5.13 GeV. (author)

  4. A mechanistic classical laboratory situation violating the Bell inequalities with 2.√2, exactly 'in the same way' as its violations by the EPR experiments

    International Nuclear Information System (INIS)

    Aerts, D.

    1991-01-01

    We present a macroscopical mechanistic classical laboratory situation, and a classical macroscopical entity, and coincidence measurements on this entity, that lead to a violation of the Bell inequalities corresponding to these coincidence measurements. The violation that we obtain with these coincidence measurements is exactly the same as the violation of the Bell inequalities by the well known coincidence measurements of the quantum entity of two spin 1/2 particles in a singlet spin state. With this we mean that it gives rise to the same numerical values for the expectation values and the same numerical value 2.√2 for the expression used in the Bell inequality. We analyze the origin of the violation, and can formulate the main difference between the violation of Bell inequalities by means of classical entities and the violation of Bell inequalities by means of quantum entities. The making clear of this difference can help us to understand better what the quantum-violation could mean for the nature of reality. We think that some classical concepts will have to be changed, and new concepts will have to be introduced, to be able to understand the reality of the quantum world. (orig.)

  5. The role of OSHA violations in serious workplace accidents.

    Science.gov (United States)

    Mendeloff, J

    1984-05-01

    California accident investigations for 1976 show that violations of the Occupational Safety and Health Administration's safety standards were a contributing factor in 13% to 19% of the 645 deaths reported to the workers' compensation program during that year. However, a panel of safety engineers judged that only about 50% of these violations could have been detected if an inspector had visited the day before the accident. These findings indicate that the potential gains from stronger enforcement of current standards are limited but not insignificant. The likelihood that a violation contributed to a serious accident varied considerably among accident types, industries, and size classes of plants. These findings can be used to increase the efficiency and effectiveness of the OSHA program by means of better targeting of inspections and accident investigations, more intelligent assessment of which violations should be penalized most heavily, and the provision of information to employers and workers about which violations are most consequential.

  6. CP violation outside the standard model phenomenology for pedestrians

    International Nuclear Information System (INIS)

    Lipkin, H.J.

    1993-01-01

    So far the only experimental evidence for CP violation is the 1964 discovery of K L →2π where the two mass eigenstates produced by neutral meson mixing both decay into the same CP eigenstate. This result is described by two parameters ε and ε'. Today ε ∼ its 1964 value, ε' data are still inconclusive and there is no new evidence for CP violation. One might expect to observe similar phenomena in other systems and also direct CP violation as charge asymmetries between decays of charge conjugate hadrons H ± → f ± . Why is it so hard to find CP violation? How can B Physics help? Does CP lead beyond the standard model? The author presents a pedestrian symmetry approach which exhibits the difficulties and future possibilities of these two types of CP-violation experiments, neutral meson mixing and direct charge asymmetry: what may work, what doesn't work and why

  7. Phenomenology of CP violation from the Kobayashi-Maskawa model

    International Nuclear Information System (INIS)

    Wang, L.L.C.

    1980-01-01

    The CP violation consequences of the K-M model, which Kobayashi, Maskawa introduced in 1977 for the purpose of incorporating CP violation via the complexity in the mixing matrix of the quarks are discussed. Much of the talk is a review of current work on the subject. Some new results on the CP violation effects in exclusive and inclusive decays of bottom, charm and strange particles are also given

  8. Bell's theorem, the measurement problem, Newton's self-gravitation and its connections to violations of the discrete symmetries C, P, T

    Science.gov (United States)

    Hiesmayr, Beatrix C.

    2015-07-01

    About 50 years ago John St. Bell published his famous Bell theorem that initiated a new field in physics. This contribution discusses how discrete symmetries relate to the big open questions of quantum mechanics, in particular: (i) how correlations stronger than those predicted by theories sharing randomness (Bell's theorem) relate to the violation of the CP symmetry and the P symmetry; and its relation to the security of quantum cryptography, (ii) how the measurement problem (“why do we observe no tables in superposition?”) can be polled in weakly decaying systems, (iii) how strongly and weakly interacting quantum systems are affected by Newton's self gravitation. These presented preliminary results show that the meson-antimeson systems and the hyperon- antihyperon systems are a unique laboratory to tackle deep fundamental questions and to contribute to the understand what impact the violation of discrete symmetries has.

  9. CP violation in the lepton sector with Majorana neutrinos

    International Nuclear Information System (INIS)

    Aguila, F. del

    1995-01-01

    We study CP violation in the lepton sector in extended models with right-handed neutrinos, without and with left-right symmetry, and with arbitrary mass terms. We find the conditions which must be satisfied by the neutrino and charged lepton mass matrices for CP conservation. These constraints, which are independent of the choice of weak basis, are proven to be also sufficient in simple cases. This invariant formulation makes apparent the necessary requirements for CP violation, as well as the size of CP violating effects. As an example, we show that CP violation can be much larger in left-right symmetric models than in models with only additional right-handed neutrinos, i.e., without right-handed currents. (orig.)

  10. CP violation and B0-(B0)-bar mixing

    International Nuclear Information System (INIS)

    Aleksan, R.

    1996-01-01

    The status of CP violation and B 0 -(B 0 )-bar mixing is given and the subsequent constraints in the framework of the Standard Model are discussed. Recent result on CP violation in the kaon system and related topics are reviewed, including the status of T violation and the tests of the CPT symmetry. The results on B 0 -(B 0 )-bar mixing are presented followed by the studies on B d 0 -(B d 0 )-bar and B s 0 -(B s 0 )-bar oscillations. Finally, the prospects of progress on understanding CP violation are discussed in framework of the new projects expected to produce results at the turn of the century. (author)

  11. Status in CP violation

    International Nuclear Information System (INIS)

    Fayard, L.

    1989-11-01

    Twenty-five years after the discovery of CP violation in the neutral Kaon system, we still dont know exactly the origin and the components of that weak non invariance. The two more precise experiments give slightly different answers concerning the direct way of CP violation NA 31 gives ε prime/ε incompatible with the Superweak Model (for which ε prime=0) and in agreement with Standard Model predictions compatible with both. Again, one needs new and precise results in order to conclude about ε prime. E731 and NA31 are actually working on their new data samples. Longer term ideas are also being discussed, looking for new experiments able to give ε prime/ε with a precision. Concerning CPT invariance the situation seems to be more clear

  12. Local commutativity versus Bell inequality violation for entangled states and versus non-violation for separable states

    International Nuclear Information System (INIS)

    Seevinck, Michael; Uffink, Jos

    2007-01-01

    By introducing a quantitative 'degree of commutativity' in terms of the angle between spin observables we present two tight quantitative trade-off relations in the case of two qubits. First, for entangled states, between the degree of commutativity of local observables and the maximal amount of violation of the Bell inequality: if both local angles increase from zero to π/2 (i.e., the degree of local commutativity decreases), the maximum violation of the Bell inequality increases. Secondly, a converse trade-off relation holds for separable states: if both local angles approach π/2 the maximal value obtainable for the correlations in the Bell inequality decreases and thus the non-violation increases. As expected, the extremes of these relations are found in the case of anticommuting local observables where, respectively, the bounds of 2√(2) and √(2) hold for the expectation value of the Bell operator. The trade-off relations show that noncommmutativity gives ''a more than classical result'' for entangled states, whereas ''a less than classical result'' is obtained for separable states. The experimental relevance of the trade-off relation for separable states is that it provides an experimental test for two qubit entanglement. Its advantages are twofold: in comparison to violations of Bell inequalities it is a stronger criterion and in comparison to entanglement witnesses it needs to make less strong assumptions about the observables implemented in the experiment

  13. Bell violation in the sky

    Science.gov (United States)

    Choudhury, Sayantan; Panda, Sudhakar; Singh, Rajeev

    2017-02-01

    In this work, we have studied the possibility of setting up Bell's inequality violating experiment in the context of cosmology, based on the basic principles of quantum mechanics. First we start with the physical motivation of implementing the Bell inequality violation in the context of cosmology. Then to set up the cosmological Bell violating test experiment we introduce a model independent theoretical framework using which we have studied the creation of new massive particles by implementing the WKB approximation method for the scalar fluctuations in the presence of additional time-dependent mass contribution in the cosmological perturbation theory. Here for completeness we compute the total number density and the energy density of the newly created particles in terms of the Bogoliubov coefficients using the WKB approximation method. Next using the background scalar fluctuation in the presence of a new time-dependent mass contribution, we explicitly compute the expression for the one point and two point correlation functions. Furthermore, using the results for a one point function we introduce a new theoretical cosmological parameter which can be expressed in terms of the other known inflationary observables and can also be treated as a future theoretical probe to break the degeneracy amongst various models of inflation. Additionally, we also fix the scale of inflation in a model-independent way without any prior knowledge of primordial gravitational waves. Also using the input from a newly introduced cosmological parameter, we finally give a theoretical estimate for the tensor-to-scalar ratio in a model-independent way. Next, we also comment on the technicalities of measurements from isospin breaking interactions and the future prospects of newly introduced massive particles in a cosmological Bell violating test experiment. Further, we cite a precise example of this setup applicable in the context of string theory motivated axion monodromy model. Then we comment

  14. Bell violation in the sky

    International Nuclear Information System (INIS)

    Choudhury, Sayantan; Panda, Sudhakar; Singh, Rajeev

    2017-01-01

    In this work, we have studied the possibility of setting up Bell's inequality violating experiment in the context of cosmology, based on the basic principles of quantum mechanics. First we start with the physical motivation of implementing the Bell inequality violation in the context of cosmology. Then to set up the cosmological Bell violating test experiment we introduce a model independent theoretical framework using which we have studied the creation of new massive particles by implementing the WKB approximation method for the scalar fluctuations in the presence of additional time-dependent mass contribution in the cosmological perturbation theory. Here for completeness we compute the total number density and the energy density of the newly created particles in terms of the Bogoliubov coefficients using the WKB approximation method. Next using the background scalar fluctuation in the presence of a new time-dependent mass contribution, we explicitly compute the expression for the one point and two point correlation functions. Furthermore, using the results for a one point function we introduce a new theoretical cosmological parameter which can be expressed in terms of the other known inflationary observables and can also be treated as a future theoretical probe to break the degeneracy amongst various models of inflation. Additionally, we also fix the scale of inflation in a model-independent way without any prior knowledge of primordial gravitational waves. Also using the input from a newly introduced cosmological parameter, we finally give a theoretical estimate for the tensor-to-scalar ratio in a model-independent way. Next, we also comment on the technicalities of measurements from isospin breaking interactions and the future prospects of newly introduced massive particles in a cosmological Bell violating test experiment. Further, we cite a precise example of this setup applicable in the context of string theory motivated axion monodromy model. Then we comment

  15. Bell violation in the sky

    Energy Technology Data Exchange (ETDEWEB)

    Choudhury, Sayantan [Tata Institute of Fundamental Research, Department of Theoretical Physics, Mumbai (India); TIFR, DTP, Mumbai (India); Panda, Sudhakar [Institute of Physics, Bhubaneswar, Odisha (India); Homi Bhabha National Institute, Mumbai (India); Singh, Rajeev [Savitribai Phule Pune University, Department of Physics, Pune (India)

    2017-02-15

    In this work, we have studied the possibility of setting up Bell's inequality violating experiment in the context of cosmology, based on the basic principles of quantum mechanics. First we start with the physical motivation of implementing the Bell inequality violation in the context of cosmology. Then to set up the cosmological Bell violating test experiment we introduce a model independent theoretical framework using which we have studied the creation of new massive particles by implementing the WKB approximation method for the scalar fluctuations in the presence of additional time-dependent mass contribution in the cosmological perturbation theory. Here for completeness we compute the total number density and the energy density of the newly created particles in terms of the Bogoliubov coefficients using the WKB approximation method. Next using the background scalar fluctuation in the presence of a new time-dependent mass contribution, we explicitly compute the expression for the one point and two point correlation functions. Furthermore, using the results for a one point function we introduce a new theoretical cosmological parameter which can be expressed in terms of the other known inflationary observables and can also be treated as a future theoretical probe to break the degeneracy amongst various models of inflation. Additionally, we also fix the scale of inflation in a model-independent way without any prior knowledge of primordial gravitational waves. Also using the input from a newly introduced cosmological parameter, we finally give a theoretical estimate for the tensor-to-scalar ratio in a model-independent way. Next, we also comment on the technicalities of measurements from isospin breaking interactions and the future prospects of newly introduced massive particles in a cosmological Bell violating test experiment. Further, we cite a precise example of this setup applicable in the context of string theory motivated axion monodromy model. Then we

  16. New paradigm for baryon and lepton number violation

    International Nuclear Information System (INIS)

    Fileviez Pérez, Pavel

    2015-01-01

    The possible discovery of proton decay, neutron–antineutron oscillation, neutrinoless double beta decay in low energy experiments, and exotic signals related to the violation of the baryon and lepton numbers at collider experiments will change our understanding of the conservation of fundamental symmetries in nature. In this review we discuss the rare processes due to the existence of baryon and lepton number violating interactions. The simplest grand unified theories and the neutrino mass generation mechanisms are discussed. The theories where the baryon and lepton numbers are defined as local gauge symmetries spontaneously broken at the low scale are discussed in detail. The simplest supersymmetric gauge theory which predicts the existence of lepton number violating processes at the low scale is investigated. The main goal of this review is to discuss the main implications of baryon and lepton number violation in physics beyond the Standard Model.

  17. Violation of local realism with freedom of choice.

    Science.gov (United States)

    Scheidl, Thomas; Ursin, Rupert; Kofler, Johannes; Ramelow, Sven; Ma, Xiao-Song; Herbst, Thomas; Ratschbacher, Lothar; Fedrizzi, Alessandro; Langford, Nathan K; Jennewein, Thomas; Zeilinger, Anton

    2010-11-16

    Bell's theorem shows that local realistic theories place strong restrictions on observable correlations between different systems, giving rise to Bell's inequality which can be violated in experiments using entangled quantum states. Bell's theorem is based on the assumptions of realism, locality, and the freedom to choose between measurement settings. In experimental tests, "loopholes" arise which allow observed violations to still be explained by local realistic theories. Violating Bell's inequality while simultaneously closing all such loopholes is one of the most significant still open challenges in fundamental physics today. In this paper, we present an experiment that violates Bell's inequality while simultaneously closing the locality loophole and addressing the freedom-of-choice loophole, also closing the latter within a reasonable set of assumptions. We also explain that the locality and freedom-of-choice loopholes can be closed only within nondeterminism, i.e., in the context of stochastic local realism.

  18. Flavour Physics and CP Violation : Expecting the LHC

    CERN Document Server

    Fleischer, Robert

    2008-01-01

    The starting point of these lectures is an introduction to the weak interactions of quarks and the Standard-Model description of CP violation, where the central role is played by the Cabibbo-Kobayashi-Maskawa matrix and the corresponding unitarity triangles. Since the B-meson system governs the stage of (quark) flavour physics and CP violation, it is our main focus: we shall classify B-meson decays, introduce the theoretical tools to deal with them, investigate the requirements for non-vanishing CP-violating asymmetries, and discuss the main strategies to explore CP violation and the preferred avenues for physics beyond the Standard Model to enter. This formalism allows us then to discuss important benchmark modes, where we will also address the question of how much space for new-physics effects in the B studies at the LHC is left by the recent experimental results from the B factories and the Tevatron.

  19. Radiative violation of CP-symmetry

    International Nuclear Information System (INIS)

    Galvan Herrera, J.B.

    1990-01-01

    The left-right quiral symmetry is not conserved by the Standard model. A subgroup of the standard gauge group (SU(2) L ) breaks this symmetry in a explicit way. Moreover, the standard model, if there are theree or more matter generations, violates the CP discrete symmetry. This prediction has been experimentally demonstrated correct in the Kaon anti Kaon system. In this work some possible explanations to the CP violation parameter magnitude are researched. We have studied the variation of the Kobayashi-Maskawa matrix with the energy scale. To realize this work we have developed a general method to calculate the renormalization group equations of the Kobayashi-Maskawa matrix parameters. From these equations we could also calculate the renormalization group equation of the J parameter that characterizes the CP violation. This calculus has been applied in a concrete example: a typical supersymmetric model from superstring theories. This model can be seen like a natural extension of the supersymmetric standard model. This kind of models have a gauge group bigger that the standard one more particles and new terms of the Lagrangian. We have verified that such model provides us of a correct low energy fenomenology and, moreover other results, some particle spectrums have been developed. In the elaboration of this model some conditions, that the model has to respected to be compatible with the actual fenomenology, have been studied. The most interesting results of this thesis are the develop of a general method to calculate the renormalization group equations of the Kobayashi-Maskawa matrix parameters and the develop of a new mechanism of the radiative violation. This mechanism is related with the new terms of the Lagrangian. (Author)

  20. Lepton flavor violation induced by dark matter

    Science.gov (United States)

    Arcadi, Giorgio; Ferreira, C. P.; Goertz, Florian; Guzzo, M. M.; Queiroz, Farinaldo S.; Santos, A. C. O.

    2018-04-01

    Guided by gauge principles we discuss a predictive and falsifiable UV complete model where the Dirac fermion that accounts for the cold dark matter abundance in our Universe induces the lepton flavor violation (LFV) decays μ →e γ and μ →e e e as well as μ -e conversion. We explore the interplay between direct dark matter detection, relic density, collider probes and lepton flavor violation to conclusively show that one may have a viable dark matter candidate yielding flavor violation signatures that can be probed in the upcoming experiments. In fact, keeping the dark matter mass at the TeV scale, a sizable LFV signal is possible, while reproducing the correct dark matter relic density and meeting limits from direct-detection experiments.

  1. Inferring energy dissipation from violation of the fluctuation-dissipation theorem

    Science.gov (United States)

    Wang, Shou-Wen

    2018-05-01

    The Harada-Sasa equality elegantly connects the energy dissipation rate of a moving object with its measurable violation of the Fluctuation-Dissipation Theorem (FDT). Although proven for Langevin processes, its validity remains unclear for discrete Markov systems whose forward and backward transition rates respond asymmetrically to external perturbation. A typical example is a motor protein called kinesin. Here we show generally that the FDT violation persists surprisingly in the high-frequency limit due to the asymmetry, resulting in a divergent FDT violation integral and thus a complete breakdown of the Harada-Sasa equality. A renormalized FDT violation integral still well predicts the dissipation rate when each discrete transition produces a small entropy in the environment. Our study also suggests a way to infer this perturbation asymmetry based on the measurable high-frequency-limit FDT violation.

  2. Is weak violation of the Pauli principle possible?

    International Nuclear Information System (INIS)

    Ignat'ev, A.Yu.; Kuz'min, V.A.

    1987-01-01

    The question considered in the work is whether there are models which can account for small violation of the Pauli principle. A simple algebra is constructed for the creation-annihilation operators, which contains a parameter β and describe small violation of the Pauli principle (the Pauli principle is valid exactly for β=0). The commutation relations in this algebra are trilinear. A model is presented, basing upon this commutator algebra, which allows transitions violating the Pauli principle, their probability being suppressed by a factor of β 2 (even though the Hamiltonian does not contain small parameters)

  3. The Security Council's Methods of Work: The Borderlines of Legality

    DEFF Research Database (Denmark)

    Cullen, Miriam

    2015-01-01

    The first section outlines the Security Council’s rules of procedure (or lack thereof) and working methods. Examples are used to illustrate that the Council's methods of work have, paradoxically, become increasingly opaque at the same time as its direct involvement in international justice has...... escalated. The paper concludes by positing that a lack of procedural fairness in the Council’s methods of work at least undermines the justice imperative that the Council so espouses and at most violates an ancillary legal obligation....

  4. Simultaneous B and L violation: new signatures from RPV-SUSY

    International Nuclear Information System (INIS)

    Faroughy, Cyrus; Prabhu, Siddharth; Zheng, Bob

    2015-01-01

    Studies of R-parity violating (RPV) supersymmetry typically assume that nucleon stability is protected by approximate baryon number (B) or lepton number (L) conservation. We present a new class of RPV models that violate B and L simultaneously (BLRPV), without inducing rapid nucleon decay. These models feature an approximate Z 2 e ×Z 2 μ ×Z 2 τ flavor symmetry, which forbids 2-body nucleon decay and ensures that flavor antisymmetric LLE c couplings are the only non-negligible L-violating operators. Nucleons are predicted to decay through N→Keμν and n→eμν; the resulting bounds on RPV couplings are rather mild. Novel collider phenomenology arises because the superpartners can decay through both L-violating and B-violating couplings. This can lead to, for example, final states with high jet multiplicity and multiple leptons of different flavor, or a spectrum in which depending on the superpartner, either B or L violating decays dominate. BLRPV can also provide a natural setting for displaced ν̃→μe decays, which evade many existing collider searches for RPV supersymmetry.

  5. Can R-parity violation hide vanilla supersymmetry at the LHC?

    International Nuclear Information System (INIS)

    Asano, Masaki

    2012-09-01

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.

  6. Can R-parity violation hide vanilla supersymmetry at the LHC?

    Energy Technology Data Exchange (ETDEWEB)

    Asano, Masaki [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Rolbiecki, Krzysztof; Sakurai, Kazuki [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2012-09-15

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.

  7. Breaching the security of the Kaiser Permanente Internet patient portal: the organizational foundations of information security.

    Science.gov (United States)

    Collmann, Jeff; Cooper, Ted

    2007-01-01

    This case study describes and analyzes a breach of the confidentiality and integrity of personally identified health information (e.g. appointment details, answers to patients' questions, medical advice) for over 800 Kaiser Permanente (KP) members through KP Online, a web-enabled health care portal. The authors obtained and analyzed multiple types of qualitative data about this incident including interviews with KP staff, incident reports, root cause analyses, and media reports. Reasons at multiple levels account for the breach, including the architecture of the information system, the motivations of individual staff members, and differences among the subcultures of individual groups within as well as technical and social relations across the Kaiser IT program. None of these reasons could be classified, strictly speaking, as "security violations." This case study, thus, suggests that, to protect sensitive patient information, health care organizations should build safe organizational contexts for complex health information systems in addition to complying with good information security practice and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) of 1996.

  8. 48 CFR 903.303 - Reporting suspected antitrust violations.

    Science.gov (United States)

    2010-10-01

    ... as described in FAR 3.301, and antitrust law violations as described in FAR 3.303, evidenced in bids... antitrust violations. 903.303 Section 903.303 Federal Acquisition Regulations System DEPARTMENT OF ENERGY GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Reports of Suspected Antitrust...

  9. Noncommutative field theory and violation of translation invariance

    International Nuclear Information System (INIS)

    Bertolami, Orfeu; Guisado, Luis

    2003-01-01

    Noncommutative field theories with commutator of the coordinates of the form [x μ , x ν ] = i Λ μν ω x ω with nilpotent structure constants are studied and shown that a free quantum field theory is not affected. Invariance under translations is broken and the conservation of energy-momentum is violated, obeying a new law which is expressed by a Poincare-invariant equation. The resulting new kinematics is studied and applied to simple examples and to astrophysical puzzles, such as the observed violation of the GZK cutoff. The λΦ 4 quantum field theory is also considered in this context. In particular, self interaction terms violate the usual conservation of energy-momentum and, hence, the radiative correction to the propagator is altered. The correction to first order in λ is calculated. The usual UV divergent terms are still present, but a new type of term also emerges, which is IR divergent, violates momentum conservation and implies a correction to the dispersion relation. (author)

  10. Measurements of CPT Violation at LHCb

    CERN Document Server

    INSPIRE-00260865

    2017-01-01

    Recent measurements of CPT violation and Lorentz symmetry breaking in $B^0-\\bar{B}^0$ mixing and $B^0_s-\\bar{B}^0_s$ mixing, obtained from data taken by the LHCb experiment, are highlighted. The results are expressed in terms of the Standard-Model Extension (SME) coefficients, which incorporate both CPT and Lorentz violation. Due to the large boost of the $B$ mesons at LHCb, the SME coefficients can be determined with high precision. The bounds on these coefficients are improved significantly compared to previous measurements.

  11. CPLEAR et BABAR, all aspects of CP violation; CPLEAR et BABAR la violation de CP dans tous ses etats

    Energy Technology Data Exchange (ETDEWEB)

    Yeche, Ch

    2003-06-01

    This report of French 'Habilitation a diriger les recherches' summarizes my scientific activity from 1993 to 2003. During this decade, my research work was related to two particle physics experiments: CPLEAR and BABAR. The first one, CPLEAR, has recorded data from 1988 to 1995 on the low energy anti-proton ring (LEAR) at CERN. This experiment was devoted to the study of T, CPT et CP discrete symmetries. The second experiment, BABAR, has been running since 1999, on the PEP-II B factory at SLAC. This experiment searches for CP violation and tests the Standard Model through the measurements of the angles and the sides of the Unitarity Triangle. My research work is divided in five main topics: Study of CP and CPT violation in K{sup 0} {yields} {pi}{sup +} {pi}{sup -} decays; Performance optimization of the particle identification detector (DIRC) of the BABAR experiment; B meson tagging in BABAR experiment; {delta}m{sub d} measurement and Search for CP and T violation in mixing with dilepton events; Search for CP violation in B{sup 0} {yields} {rho}{sup {+-}} {pi}{sup {+-}} and B{sup 0} {yields} {pi}{sup {+-}} K{sup {+-}} decays. (author)

  12. On cryptographic security of end-to-end encrypted connections in WhatsApp and Telegram messengers

    Directory of Open Access Journals (Sweden)

    Sergey V. Zapechnikov

    2017-11-01

    Full Text Available The aim of this work is to analyze the available possibilities for improving secure messaging with end-to-end connections under conditions of external violator actions and distrusted service provider. We made a comparative analysis of cryptographic security mechanisms for two widely used messengers: Telegram and WhatsApp. It was found that Telegram is based on MTProto protocol, while WhatsApp is based on the alternative Signal protocol. We examine the specific features of messengers implementation associated with random number generation on the most popular Android mobile platform. It was shown that Signal has better security properties. It is used in several other popular messengers such as TextSecure, RedPhone, GoogleAllo, FacebookMessenger, Signal along with WhatsApp. A number of possible attacks on both messengers were analyzed in details. In particular, we demonstrate that the metadata are poorly protected in both messengers. Metadata security may be one of the goals for further studies.

  13. 7 CFR 1465.25 - Contract violations and termination.

    Science.gov (United States)

    2010-01-01

    .... (2) If NRCS terminates a contract due to breach of contract, or the participant voluntarily... 7 Agriculture 10 2010-01-01 2010-01-01 false Contract violations and termination. 1465.25 Section... ASSISTANCE Contracts § 1465.25 Contract violations and termination. (a) If NRCS determines that a participant...

  14. 28 CFR 570.45 - Violation of escorted trip.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Violation of escorted trip. 570.45 Section 570.45 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE COMMUNITY PROGRAMS AND RELEASE COMMUNITY PROGRAMS Escorted Trips § 570.45 Violation of escorted trip. (a) Staff shall process as...

  15. Lepton flavor violation

    International Nuclear Information System (INIS)

    Cooper, M.D. Brooks, M.; Hogan, G.E.

    1997-01-01

    The connection of rare decays to supersymmetric grand unification is highlighted, and a review of the status of rare decay experiments is given. Plans for future investigations of processes that violate lepton flavor are discussed. A new result from the MEGA experiment, a search for μ + → e + γ, is reported to be B.R. -11 with 90% confidence

  16. IT Security Support for the Spaceport Command Control System Development

    Science.gov (United States)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  17. Experimental tests of charge symmetry violation in parton distributions

    International Nuclear Information System (INIS)

    Londergan, J.T.; Murdock, D.P.; Thomas, A.W.

    2005-01-01

    Recently, a global phenomenological fit to high energy data has included charge symmetry breaking terms, leading to limits on the allowed magnitude of such effects. We discuss two possible experiments that could search for isospin violation in valence parton distributions. We show that, given the magnitude of charge symmetry violation consistent with existing global data, such experiments might expect to see effects at a level of several percent. Alternatively, such experiments could significantly decrease the upper limits on isospin violation in parton distributions

  18. A Newtonian separable model which violates Bell's inequality

    International Nuclear Information System (INIS)

    Notarrigo, S.

    1984-01-01

    On the basis of the Mackey's axiomatization of quantum mechanics an argument is given which allows, in determinate circumstances, the violation of Bell's inequality also in a ''classical mechanics'' and a ''classical probability'' context. A classical model made out of two separate subsystems of coupled oscillators is studied by computer experiments to illustrate the point. In fact, the model violates Bell's inequality. The hypothesis is put forward that the principal reason for this violation is due to the special kind of ''detectors'' introduced in the model which gave a ''count'' every time a given dynamical variable of the mechanical system crosses an assigned threshold

  19. Measuring the Effect of Using Simulated Security Awareness Training and Testing on Members of Virtual Communities of Practice

    Directory of Open Access Journals (Sweden)

    Craig L. Tidwell

    2010-12-01

    Full Text Available Information security (Infosec has become a major challenge for all private and public organizations. The protecting of proprietary and secret data and the proper awareness of what is entailed in protecting this data is necessary in all organizations. How does simulation and training influence virtual communities of practice information security awareness over time and with a variety of security scenarios. Can members of a virtual community be significantly changed in how they respond to routine security processes and attempts to breach security or violate the security policy of their organization? How does deterrence play a role in this prevention and education? A study is planned that will train and test users of a virtual community of practice over a 3 month period of time, via a web interface, and using simulated events, to see if the planned security awareness training will be effective in changing their responses to the events and further testing.

  20. 40 CFR 170.9 - Violations of this part.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Violations of this part. 170.9 Section... PROTECTION STANDARD General Provisions § 170.9 Violations of this part. (a) Under the Federal Insecticide... general sanitary hazards addressed by the OSHA Field Sanitation Standard, 29 CFR 1928.110, or other...

  1. Val L. Fitch, the CP Violation, and Antimatter

    Science.gov (United States)

    dropdown arrow Site Map A-Z Index Menu Synopsis Val L. Fitch, the CP Violation, and Antimatter Resources ) 'to verify a fundamental tenet of physics, known as CP [charge-parity] symmetry, by showing that two into two pi mesons. Cronin and Fitch had found an example of CP violation. The discovery's

  2. CP violation in the baryon sector

    CERN Document Server

    Smith, Eluned Anne

    2017-01-01

    The study of CP violation in the baryon sector is still a relatively new field and offers the possibility to make many CP measurements which could complement those performed in the meson sector. This is especially true of late given the large number of baryons currently being produced at the LHC. Such measurements could help further over-constrain the CKM unitary triangle, as well as furthering our understand of baryongenesis. These proceedings will give an overview of the current state of the search for CP violation in the baryon sector.

  3. Covenant Violations and Dynamic Loan Contracting

    DEFF Research Database (Denmark)

    Freudenberg, Felix; Imbierowicz, Björn; Saunders, Anthony

    2017-01-01

    This paper examines the dynamic allocation of control rights in private debt contracts of firms. We show that a covenant violation in the prior loan contract implies a stigma for borrowers which results in stricter loan contract terms in subsequent new loan contracts. Our analyses reject...... potentially other explanations such as firm characteristics or agency problems between the lender and firm management, shareholders or public debtholders. After covenant violations in the prior contract, new loans have on average 18 bps higher spreads and include more of those covenant types which also have...

  4. Left cytoarchitectonic BA 44 processes syntactic gender violations in determiner phrases.

    Science.gov (United States)

    Heim, Stefan; van Ermingen, Muna; Huber, Walter; Amunts, Katrin

    2010-10-01

    Recent neuroimaging studies make contradictory predictions about the involvement of left Brodmann's area (BA) 44 in processing local syntactic violations in determiner phrases (DPs). Some studies suggest a role for BA 44 in detecting local syntactic violations, whereas others attribute this function to the left premotor cortex. Therefore, the present event-related functional magnetic resonance imaging (fMRI) study investigated whether left-cytoarchitectonic BA 44 was activated when German DPs involving syntactic gender violations were compared with correct DPs (correct: 'der Baum'-the[masculine] tree[masculine]; violated: 'das Baum'--the[neuter] tree[masculine]). Grammaticality judgements were made for both visual and auditory DPs to be able to generalize the results across modalities. Grammaticality judgements involved, among others, left BA 44 and left BA 6 in the premotor cortex for visual and auditory stimuli. Most importantly, activation in left BA 44 was consistently higher for violated than for correct DPs. This finding was behaviourally corroborated by longer reaction times for violated versus correct DPs. Additional brain regions, showing the same effect, included left premotor cortex, supplementary motor area, right middle and superior frontal cortex, and left cerebellum. Based on earlier findings from the literature, the results indicate the involvement of left BA 44 in processing local syntactic violations when these include morphological features, whereas left premotor cortex seems crucial for the detection of local word category violations. © 2010 Wiley-Liss, Inc.

  5. Simultaneous B and L violation: new signatures from RPV-SUSY

    Energy Technology Data Exchange (ETDEWEB)

    Faroughy, Cyrus [Department of Physics and Astronomy, Johns Hopkins University,Baltimore, MD 21218 (United States); Prabhu, Siddharth [Department of Physics, Yale University,New Haven, CT 06511 (United States); Zheng, Bob [Michigan Center for Theoretical Physics, University of Michigan,Ann Arbor, MI 48109 (United States)

    2015-06-11

    Studies of R-parity violating (RPV) supersymmetry typically assume that nucleon stability is protected by approximate baryon number (B) or lepton number (L) conservation. We present a new class of RPV models that violate B and L simultaneously (BLRPV), without inducing rapid nucleon decay. These models feature an approximate Z{sub 2}{sup e}×Z{sub 2}{sup μ}×Z{sub 2}{sup τ} flavor symmetry, which forbids 2-body nucleon decay and ensures that flavor antisymmetric LLE{sup c} couplings are the only non-negligible L-violating operators. Nucleons are predicted to decay through N→Keμν and n→eμν; the resulting bounds on RPV couplings are rather mild. Novel collider phenomenology arises because the superpartners can decay through both L-violating and B-violating couplings. This can lead to, for example, final states with high jet multiplicity and multiple leptons of different flavor, or a spectrum in which depending on the superpartner, either B or L violating decays dominate. BLRPV can also provide a natural setting for displaced ν̃→μe decays, which evade many existing collider searches for RPV supersymmetry.

  6. Parity violation in electron scattering

    International Nuclear Information System (INIS)

    Lhuillier, D.

    2007-09-01

    The elaboration of the electroweak standard model from the discovery of parity violation to the weak neutral current is described in the first chapter. In the second chapter the author discusses the 2 experimental approaches of the parity violation experiments. In the first approach the weak neutral current can be assumed to be well known and can be used as a probe for the hadronic matter. The second approach consists in measuring the weak neutral current between 2 particles with known internal structure in order to test the predictions of the standard model in the low energy range. The chapters 3 and 4 are an illustration of the first approach through the HAPPEx series of experiments that took place in the Jefferson Laboratory from 1998 to 2005. The HAPPEx experiments aimed at measuring the contribution of strange quarks in the electromagnetic form factors of the nucleon through the violation of parity in the elastic scattering at forward angles. The last chapter is dedicated to the E158 experiment that was performed at the Slac (California) between 2000 and 2003. The weak neutral current was measured between 2 electrons and the high accuracy obtained allowed the physics beyond the standard model to be indirectly constraint up to a few TeV. (A.C.)

  7. Flavor and CP violations from sleptons at the Muon Collider

    International Nuclear Information System (INIS)

    Cheng, H.-C.

    1997-12-01

    Supersymmetric theories generally have new flavor and CP violation sources in the squark and slepton mass matrices. They will contribute to the lepton flavor violation processes, such as μ→eγ, which can be probed far below the current bound with an intense muon source at the front end of the muon collider. In addition, if sleptons can be produced at the muon collider, the flavor violation can occur at their production and decay, allowing us to probe the flavor mixing structure directly. Asymmetry between numbers of μ + e - and e + μ - events will be a sign for CP violation in supersymmetric flavor mixing

  8. Minimal flavour violation in the quark and lepton sector and beyond

    Energy Technology Data Exchange (ETDEWEB)

    Uhlig, S.L.

    2008-01-07

    We address to explain the matter-antimatter asymmetry of the universe in a framework that generalizes the quark minimal flavour violation hypothesis to the lepton sector. We study the impact of CP violation present at low and high energies and investigate the existence of correlations among leptogenesis and lepton flavour violation. Further we present an approach alternative to minimal flavour violation where the suppression of flavour changing transitions involving quarks and leptons is governed by hierarchical fermion wave functions. (orig.)

  9. Violation of Bell-type inequality in single-neutron interferometry

    International Nuclear Information System (INIS)

    Hasegawa, Y.; Badurek, G.; Baron, M.; Rauch, H.; Loidl, R.

    2003-01-01

    Full text: We present an interferometric experiment with single spin-1/2 neutrons to demonstrate the violation of Bell-type inequality. The total wave function of neutrons is described by a two-dimensional Hilbert space. Appropriate combinations of the direction of the spin analysis and the position of the phase shifter allow to demonstrate the violation of the Bell-type inequality. The discussions are given on the violation of the Bell-type inequality in terms of beam polarizations and an entanglement-induced correlation in our experiment. (author)

  10. Why does CP violation matter to the universe?

    CERN Document Server

    Ellis, Jonathan Richard

    1999-01-01

    The seemingly obscure phenomenon of CP violation is increasingly being viewed as the key to a deeper understanding of both the behaviour of elementary particles and the big bang origin of the universe. Here, John Ellis of CERN explains how far and how deep the implications of CP violation extend. (0 refs).

  11. 40 CFR 303.12 - Criminal violations covered by this award authority.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Criminal violations covered by this... (CONTINUED) SUPERFUND, EMERGENCY PLANNING, AND COMMUNITY RIGHT-TO-KNOW PROGRAMS CITIZEN AWARDS FOR INFORMATION ON CRIMINAL VIOLATIONS UNDER SUPERFUND General § 303.12 Criminal violations covered by this award...

  12. CP violation with an unbroken CP transformation

    Energy Technology Data Exchange (ETDEWEB)

    Ratz, Michael [Department of Physics and Astronomy, University of California,Irvine, California 92697-4575 (United States); Trautner, Andreas [Bethe Center for Theoretical Physics und Physikalisches Institut der Universität Bonn,Nussallee 12, 53115 Bonn (Germany)

    2017-02-21

    A CP conserving SU(3) gauge theory is spontaneously broken to T{sub 7} by the vacuum expectation value (VEV) of a 15-plet. Even though the SU(3)-CP transformation is not broken by the VEV, the theory exhibits physical CP violation in the broken phase. This is because the SU(3)-CP transformation corresponds to the unique order-two outer automorphism of T{sub 7}, which is not a physical CP transformation for the T{sub 7} states, and there is no other possible CP transformation. We explicitly demonstrate that CP is violated by calculating a CP odd decay asymmetry in the broken phase. This scenario provides us with a natural protection for topological vacuum terms, ensuring that θ G{sub μν}G̃{sup μν} is absent even though CP is violated for the physical states of the model.

  13. Masses, flavor mix and CP violation

    International Nuclear Information System (INIS)

    Chaussard, L.

    2004-06-01

    The author describes the relationships between masses, mixing of flavors and CP violation. This document is divided into 4 chapters: 1) fermions' masses, 2) mixing of flavors and CP violation, 3) beauty physics and 4) neutrino physics. In chapter 1 an attempt is made to explain what is behind the concepts of lepton mass and quark mass. As for neutrinos, the only neutral fermion, Dirac's and Majorana's views are exposed as well as their consequences. Fermion flavors are mixed in the process of mass generation and this mix is responsible for the breaking of CP and T symmetries. In chapter 2 the author shows how the analysis of particle oscillations from neutral mesons (K 0 , D 0 , B d 0 and B s 0 ) and from neutrinos can shed light on CP violation. Chapter 3 is dedicated to the contribution of beauty physics to the determination of the unitary triangle, through the oscillations of beauty mesons. In chapter 4 the author reviews the experimental results obtained recently concerning neutrino mass and neutrino oscillations and draws some perspectives on future neutrino experiments. (A.C.)

  14. Professional boundary violations: a literature review.

    Science.gov (United States)

    Manfrin-Ledet, Linda; Porche, Demetrius J; Eymard, Amanda S

    2015-06-01

    The purpose of this article is to review the nursing literature related to professional boundary violations in nursing. A search was conducted using CINAHL, MEDLINE, Ebscohost, and NCSBN. The key words searched were professional boundaries, boundary violation, boundary crossings, nurse, home health nurses, and home nursing. The search returned over 40 publications related specifically to boundary violations and nursing although only four of them are published research studies and one as a dissertation. Seven common characteristics emerged from the nonresearch nursing articles on professional boundaries: (1) Dual relations/role reversal, (2) Gifts and money, (3) Excessive self-disclosure, (4) Secretive behavior, (5) Excessive attention/overinvolvement, (6) Sexual behavior, and (7) Social media. Additional nursing research is greatly needed in the area of professional boundaries. The nurse-patient relationship should always be maintained for the benefit of the patient and not the personal gain of the nurse. Ongoing education in nursing practice regarding professional boundaries is needed. Nurses need to be mindful of state practice acts, codes of conduct, and employer policies.

  15. R-parity violating right-handed neutrino in gravitino dark matter scenario

    International Nuclear Information System (INIS)

    Endo, Motoi

    2009-06-01

    A decay of the gravitino dark matter is an attractive candidate to explain the current excesses of the PAMELA/ATIC cosmic-ray data. However, R-parity violations are required to be very tiny in low-energy scale. We suggest a R-parity violation in the right-handed neutrino sector. The violation is suppressed by a see-saw mechanism. Although a reheating temperature is constrained from above, the thermal leptogenesis is found to work successfully with a help of the R-parity violating right-handed neutrino. (orig.)

  16. R-parity violating right-handed neutrino in gravitino dark matter scenario

    Energy Technology Data Exchange (ETDEWEB)

    Endo, Motoi [CERN, Geneva (Switzerland). Theory Div., PH Dept.; Shindou, Tetsuo [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-06-15

    A decay of the gravitino dark matter is an attractive candidate to explain the current excesses of the PAMELA/ATIC cosmic-ray data. However, R-parity violations are required to be very tiny in low-energy scale. We suggest a R-parity violation in the right-handed neutrino sector. The violation is suppressed by a see-saw mechanism. Although a reheating temperature is constrained from above, the thermal leptogenesis is found to work successfully with a help of the R-parity violating right-handed neutrino. (orig.)

  17. CP violation in ATLAS

    International Nuclear Information System (INIS)

    Saavedra, A.F.

    1995-01-01

    Full text: In the standard model CP violation is generated by a non trivial complex phase in the CKM matrix. The Standard Model does not predict the elements of the CKM matrix, they need to be experimentally measured. This will show if all the CP violation phenomena can be accounted by the complex phase or there are other contributing mechanisms which lie beyond the scope of Standard Model. It is of interest to overconstraint the so called unitary triangle by measuring each angle (α, β and γ) from the CP asymmetry that occurs in different decay modes. During the initial low luminosity period of the LHC a large effort will be concentrated in studying B physics, especially CP violation in the B 0 - B-bar 0 system, with the ATLAS detector. The features of the detector which are important for CP studies are: sharp trigger from the muon spectrometer (muons will be identify down to p T ≅ 5GeV, be able to distinguish electrons from hadrons (down to p T ≅ 1 GeV) with the Straw Tracker and Transition detector and high resolution of tracks, secondary vertices with the Semiconductor Tracker (resolution of 10-90 μm. For some decays modes ATLAS is expected to obtain larger sample of events than the B-factories that are being proposed. It has been calculated that the systematic error σ sin (2 α) = 0.06 and σ sin ( 2 β) = 0.027 which is comparable with other future experiments

  18. Constraints on relativity violations from gamma-ray bursts.

    Science.gov (United States)

    Kostelecký, V Alan; Mewes, Matthew

    2013-05-17

    Tiny violations of the Lorentz symmetry of relativity and the associated discrete CPT symmetry could emerge in a consistent theory of quantum gravity such as string theory. Recent evidence for linear polarization in gamma-ray bursts improves existing sensitivities to Lorentz and CPT violation involving photons by factors ranging from ten to a million.

  19. Parity and time-reversal violation in nuclei and atoms

    International Nuclear Information System (INIS)

    Adelberger, E.G.

    1986-01-01

    Two topics are briefly reviewed: the parity (P)-violating NN interaction and the time-reversal (T) and P-violating electric moments (EDM's) of atoms. The ΔI = 1 P-violating NN amplitude dominated by weak π +- exchange is found to be appreciably smaller than bag-model predictions. This may be a dynamical symmetry of flavor-conserving hadronic weak processes reminiscent of the ΔI = 1/2 rule in flavor-changing decays. General principles of experimental searches for atomic EDM's are discussed. Atomic EDM's are sensitive to electronic or nuclear EDM's and to a P-and-T-violating electron-quark interaction. Even though the experimental precision is still ∼10 4 times worse than counting statistics, the recent results have reached a sensitivity to nuclear EDM's which rivals that of the neutron EDM data. Further significant improvements can be expected

  20. Recent Results on T and CP Violation at BABAR

    Energy Technology Data Exchange (ETDEWEB)

    Perez Perez, Alejandro [Istituto Nazionale di Fisica Nucleare (INFN), Pisa (Italy).

    2015-02-06

    CP-violation (CPV) and Time-reversal violation (TRV) are intimately related through the CPT theorem: if one of these discrete symmetries is violated the other one has to be violated in such a way to conserve CPT. Although CPV in the B0B0-bar system has been established by the B-factories, implying indirectly TRV, there is still no direct evidence of TRV. We report on the observation of TRV in the B-meson system performed with a dataset of 468 × 106 BB-bar pairs produced in Υ(4S) decays collected by the BABAR detector at the PEP-II asymmetric-energy e+e- collider at the SLAC National Accelerator Laboratory. We also report on other CPV measurements recently performed on the B-meson system

  1. Penguins and cp violation in β decays

    International Nuclear Information System (INIS)

    He, X.C.

    1996-11-01

    The measurement of the ε-parameter in the K 0 - K-bar 0 meson system is the only direct evidence for CP violation in the laboratory. The Standard Model (SM) of three generations with the source for CP violation arising from the phases in the Cabibbo-Kobayashi-Maskawa (CKM) matrix is consistent with the experiment. An unique feature of this model is that the CKM matrix is a 3 x 3 unitary matrix. (author)

  2. From parity violation to hadronic structure and more

    CERN Document Server

    Jager, K; Kox, S; Lhuillier, D; Maas, F; Page, S; Papanicolas, C; Stiliaris, S; Wiele, J; 3rd International Workshop on From Parity Violation to Hadronic Structure and More (PAVI06); PAVI 06; PAVI 2006

    2007-01-01

    This book contains the proceedings of the third international workshop on “From Parity Violation to Hadronic Structure and more ...” which was held from May 16 to May 20, 2006, at the George Eliopoulos conference center on the Greek island of Milos. It is part of a series that started in Mainz in 2002 and was followed by a second workshop in Grenoble in 2004. While originally initiated by the extraction of the strangeness contribution to the electromagnetic form factors of the nucleon, the workshop series has continuously broadened the focus to the application of Parity Violation using hadronic probes and to Parity Violation experiments in atomic physics. Meanwhile there have been many exciting new proposals for using Parity Violation in other areas like in the search for new physics beyond the standard model or in exploring hadron structure. There are also close connections to the open question on the size of the two photon exchange amplitude. Fifty years after the 1956 proposal of Lee and Yang to test t...

  3. CP symmetry violation. The search for its origin

    International Nuclear Information System (INIS)

    Cronin, J.W.

    1981-01-01

    The present experimental situation on detection of CP symmetry violation is presented. Interference between decays of long-lived (Ksub(L)sup(0)) and short-lived (Ksub(S)sup(0)) mesons into two charged pions serves a direct demonstration of the fact that the effect is caused by CP symmetry breaking. The time distribution of decays into π + π - when the 4-10 GeV Ksub(L) meson beam passes through a carbon regenerator is given as an example of the measurement accuracy. The measurements of the charge asymmetry in half-lepton channels of Ksub(L)→π +- l +- ν decay where l is an electron or a muon are discussed. It is noted that the presence of the charge asymmetry serves an indication of CP invariance violation and permits to carry out experimental differentiation between the matter and antimatter. Different theoretical assumptions on the nature of CP invariance violation are discussed. A list of experiments on search for CP, T and C invariance violation carried out in different laboratories of the world is given [ru

  4. Responding to chemical weapons violations in Syria: legal, health, and humanitarian recommendations.

    Science.gov (United States)

    Brooks, Julia; Erickson, Timothy B; Kayden, Stephanie; Ruiz, Raul; Wilkinson, Stephen; Burkle, Frederick M

    2018-01-01

    The repeated use of prohibited chemical weapons in the Syrian conflict poses serious health, humanitarian, and security threats to civilians, healthcare personnel, and first responders. Moreover, the use of chemical weapons constitutes a clear and egregious violation of international law-likely amounting to a war crime-for which continued impunity is setting a dangerous precedent in relation to current and future conflicts. This debate article calls upon concerned states, organizations, and individuals to respond urgently and unequivocally to this serious breach of international legal and humanitarian norms. Based on health, humanitarian, and legal findings, this article calls for concrete action to: 1) reduce the risk of chemical weapons being used in current and future conflicts; 2) review and support the preparedness equipment and antidote supplies of first responders, humanitarian organizations, and military forces operating in Syria; 3) support international mechanisms for monitoring and enforcing the prohibition on chemical weapons, including through criminal accountability; 4) support civilian victims of chemical weapons attacks, including refugees; and 5) re-commit to the complete elimination of chemical weapons in compliance with the Chemical Weapons Convention (1993), a comprehensive treaty that bans chemical weapons and requires their complete destruction. All involved states and organizations should take urgent steps to ensure the protection of the most vulnerable victims of conflict, including victims of chemical weapons attacks in Syria, and to reinforce international law in the face of such serious violations.

  5. Phenomenology of muon number violation in spontaneously broken gauge theories

    International Nuclear Information System (INIS)

    Shanker, O.U.

    1980-01-01

    The phenomenology of muon number violation in gauge theories of weak and electromagnetic interactions is studied. In the first chapter a brief introduction to the concept of muon number and to spontaneously broken gauge theories is given. A review of the phenomenology and experimental situation regarding different muon number violating processes is made in the second chapter. A detailed phenomenological study of the μe conversion process μ - + (A,Z) → e - + (A,Z) is given in the third chapter. In the fourth chapter some specific gauge theories incorporating spontaneously broken horizontal gauge symmetries between different fermion generations are discussed with special reference to muon number violation in the theories. The μe conversion process seems to be a good process to search for muon number violation if it occurs. The K/sub L/-K/sub S/ mass difference is likely to constrain muon number violating rates to lie far below present experimental limits unless strangeness changing neutral currents changing strangeness by two units are suppressed

  6. Violations of conservation laws in viscous liquid dynamics

    DEFF Research Database (Denmark)

    Dyre, Jeppe

    2007-01-01

    The laws expressing conservation of momentum and energy apply to any isolated system, but these laws are violated for highly viscous liquids under laboratory conditions because of the unavoidable interactions with the measuring equipment over the long times needed to study the dynamics. Moreover,......, although particle number conservation applies strictly for any liquid, the solidity of viscous liquids implies that even this conservation law is apparently violated in coarse-grained descriptions of density fluctuations.......The laws expressing conservation of momentum and energy apply to any isolated system, but these laws are violated for highly viscous liquids under laboratory conditions because of the unavoidable interactions with the measuring equipment over the long times needed to study the dynamics. Moreover...

  7. CP-violating profile of the electroweak bubble wall

    Energy Technology Data Exchange (ETDEWEB)

    Funakubo, Koichi [Saga Univ. (Japan). Dept. of Physics; Kakuto, Akira; Otsuki, Shoichiro; Takenaga, Kazunori; Toyoda, Fumihiko

    1995-11-01

    In any scenario of the electroweak baryogenesis, the profile of the CP violating bubble wall, created at the first-order phase transition, plays an essential role. We attempt to determine it by solving the equations of motion for the scalars in the two-Higgs-doublet model at the transition temperature. According to the parameters in the potential, we found three solutions. Two of them smoothly connect the CP-violating broken phase and the symmetric phase, while the other connects CP-conserving vacua but violates CP in the intermediate region. We also estimate the chiral charge flux, which will be turned into the baryon density in the symmetric phase by the sphaleron process. (author).

  8. Hyperasymptotics and quark-hadron duality violations in QCD

    Science.gov (United States)

    Boito, Diogo; Caprini, Irinel; Golterman, Maarten; Maltman, Kim; Peris, Santiago

    2018-03-01

    We investigate the origin of the quark-hadron duality-violating terms in the expansion of the QCD two-point vector correlation function at large energies in the complex q2 plane. Starting from the dispersive representation for the associated polarization, the analytic continuation of the operator product expansion from the Euclidean to the Minkowski region is performed by means of a generalized Borel-Laplace transform, borrowing techniques from hyperasymptotics. We establish a connection between singularities in the Borel plane and quark-hadron duality-violating contributions. Starting with the assumption that for QCD at Nc=∞ the spectrum approaches a Regge trajectory at large energy, we obtain an expression for quark-hadron duality violations at large, but finite Nc.

  9. CP violating observables in e$^{-}$e$^{+}$ --> W$^{-}$W$^{+}$

    CERN Document Server

    Chang, D; Phillips, I

    1993-01-01

    We consider various integrated lepton charge-energy asymmetries and azimuthal asymmetries as tests of CP violation in the process $e^-e^+ \\to W^-W^+$. These asymmetries are sensitive to different linear combinations of the CP violating form factors in the three gauge boson $W^-W^+$ production vertex, and can distinguish dispersive and absorptive parts of the form factors. It makes use of purely hadronic and purely leptonic modes of $W$'s decays as well as the mixed modes. The techniques of using the kinematics of jets or missing momentum to construct CP--odd observables are also employed. These CP violating observables are illustrated in the generalized Left-Right Model and the Charged Higgs Model.

  10. Intervention pursuant to article 4(h) of the Constitutive Act of the African Union without United Nations Security Council authorisation

    OpenAIRE

    Amvane, Gabriel

    2015-01-01

    Article 4(h) of the Constitutive Act of the African Union (AU) establishes the right of the Union to intervene in a member state to prevent grave violations of human rights. It does not state whether the AU should request prior authorisation from the United Nations (UN) Security Council, leading to many interpretations. Many articles were written on this issue at a time when the AU and the Security Council were not in confrontation. However, the situation has changed since the controversy ove...

  11. arXiv CP violation in $b$ hadrons at LHCb

    CERN Document Server

    INSPIRE-00028041

    The most recent results on CP violation in $b$ hadrons obtained by the LHCb Collaboration with Run I and years 2015-2016 of Run II are reviewed. The different types of violation are covered by the studies presented in this paper.

  12. Threats to information security in a highly organized system of the “Smart city”

    Science.gov (United States)

    Kurcheeva, G. I.; Denisov, V. V.; Khvorostov, V. A.

    2017-01-01

    The article discusses issues related to comprehensive development and introduction of technologies such as “Smart city”. The urgency of accelerating the development of such highly organized systems, primarily in terms of reducing threats to information security, is emphasized in the paper. In accordance with authors’ analysis of the composition and structure of the threats to information security, “Accessibility”, “Integrity” and “Confidentiality” are highlighted. Violation of any of them leads to harmful effects on the information and other system resources. The protection of “Accessibility” mobilizes one third of all efforts to ensure information security that must be taken into account when allocating protective actions. The threats associated with failure of the supporting infrastructure are also significantly reduced. But the threats associated with failures of the system itself and failures of users are clearly increasing. There is a high level of society and production informatization, and the threats to information security are changing accordingly.

  13. Scaling violation in the heavy quark fragmentation functian

    International Nuclear Information System (INIS)

    Avaliani, I.S.; Kartvelishvili, V.G.

    1981-01-01

    The scaling violation in the heavy quark fragmentation functions is analysed in the framework of the leading logarithmic approximation in QCD and it is shown, that the slaling violation effects are more essential for heavy quarks, than for light ones. These results indicate that the D-meson inclusive spectra measurement is a sensitive test for some standard assumptions [ru

  14. Direct СP violation in neutral kaon decays

    Indian Academy of Sciences (India)

    The final result of the NA48 experiment is presented and performed at the CERN SPS neutral kaon beams, on the direct CP violation parameter Re ( ′ / ) , as measured from the decay rates of neutral kaons into two pions. The data collected in the years 1997-2001 yield the evidence for the direct CP violation with Re ...

  15. 45 CFR 73b.3 - Reports of violations.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Reports of violations. 73b.3 Section 73b.3 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION DEBARMENT OR SUSPENSION OF FORMER EMPLOYEES § 73b.3 Reports of violations. (a) If an officer or employee of the Department has reason to...

  16. Isospin-violating mixing in meson nonets

    International Nuclear Information System (INIS)

    Isgur, N.

    1979-01-01

    Segregation into ideally mixed nonets results when the OZI-violating interaction which would mix u anti u, d anti d, and s anti s mesons into isospin and SU(3) eigenstates is much weaker than the s anti s-d anti d mass difference. We show that the d anti d-u anti u mass difference can begin to induce a similar segregation into d anti d and anti u mesons which leads to large isospin violations. An experimental example of such large isospin breaking (approx. 30%) which we predict has probably already been seen in f → K anti K. (orig.)

  17. Feynman rules for fermion-number-violating interactions

    International Nuclear Information System (INIS)

    Denner, A.; Eck, H.; Hahn, O.; Kueblbeck, J.

    1992-01-01

    We present simple algorithmic Feynman rules for fermion-number-violating interactions. They do not involve explicit charge-conjugation matrices and resemble closely the familiar rules for Dirac fermions. We insist on a fermion flow through the graphs along fermion lines and get the correct relative signs between different interfering Feynman graphs as in the case of Dirac fermions. We only need the familiar Dirac propagator and fewer vertices than in the usual treatment of fermion-number-violating interactions. (orig.)

  18. Electron scattering violates parity

    CERN Multimedia

    2004-01-01

    Parity violation has been observed in collisions between electrons at the Stanford Linear Accelerator Center (SLAC) in the US. The resuls, which are in agreement with the Stanford Model of particle physics, also provide a new measurement of the weak charge of the electron (½ page)

  19. Chiral flavor violation from extended gauge mediation

    Energy Technology Data Exchange (ETDEWEB)

    Evans, Jared A. [Department of Physics, University of Illinois at Urbana-Champaign,Urbana, IL 61801 (United States); Shih, David; Thalapillil, Arun [NHETC, Department of Physics and Astronomy,Rutgers University, Piscataway, NJ 08854 (United States)

    2015-07-08

    Models of extended gauge mediation, in which large A-terms arise through direct messenger-MSSM superpotential couplings, are well-motivated by the discovery of the 125 GeV Higgs. However, since these models are not necessarily MFV, the flavor constraints could be stringent. In this paper, we perform the first detailed and quantitative study of the flavor violation in these models. To facilitate our study, we introduce a new tool called FormFlavor for computing precision flavor observables in the general MSSM. We validate FormFlavor and our qualitative understanding of the flavor violation in these models by comparing against analytical expressions. Despite being non-MFV, we show that these models are protected against the strongest constraints by a special flavor texture, which we dub chiral flavor violation (χFV). This results in only mild bounds from current experiments, and exciting prospects for experiments in the near future.

  20. Access to essential maternal health interventions and human rights violations among vulnerable communities in eastern Burma.

    Directory of Open Access Journals (Sweden)

    Luke C Mullany

    2008-12-01

    households had been forced to move. Among Karen households, odds of anemia were 1.51 (95% confidence interval [CI] 0.95-2.40 times higher among women reporting forced displacement, and 7.47 (95% CI 2.21-25.3 higher among those exposed to food security violations. The odds of receiving no antenatal care services were 5.94 (95% CI 2.23-15.8 times higher among those forcibly displaced. CONCLUSIONS: Coverage of basic maternal health interventions is woefully inadequate in these selected populations and substantially lower than even the national estimates for Burma, among the lowest in the region. Considerable political, financial, and human resources are necessary to improve access to maternal health care in these communities.

  1. Quaternionic potentials and CP-violation

    International Nuclear Information System (INIS)

    Nishi, Celso Chikahiro

    2000-01-01

    Full text follows: In the formulation of Quantum Mechanics by using a non-commutative ring of quaternions, we attempt to solve the Schroedinger equation with quaternionic potentials. Decay processes can easily be modeled by including complex imaginary potentials. Although, it could be explained as a transition between states under action of a perturbation. Purely imaginary quaternionic potentials can be used to describe CP-violation effects. The neutral kaon system, K 0 - K-bar 0 or K L - K S , represents an example of CP-violation phenomenon. The inclusion of quaternionic potentials imply a reformulation of the whole quantum theory. The use of a quaternionic algebra in discussing the Schroedinger equation leads to the lost of time reversal invariance (T), closely connected to CP violation by the well-known CPT theorem. In particular, we study the Schroedinger equation in presence of a quaternionic potential barrier given in terms of V, real potential acting in the region of width a, and jW, purely quaternionic potential acting in the region of width b. Different cases, |W|/V and b/a, are discussed in view of possible deviations of standard Quantum Mechanics. The complex linear Schroedinger equation is solved for stationary states. The explicit solution contains complex and quaternionic transmission/reflection coefficients. A wave packet treatment needs to make a more realistic and physical description. We briefly discuss possible interpretations and remaining questions. (author)

  2. James Cronin, CP Violation, and the Pierre Auger Observatory

    Science.gov (United States)

    dropdown arrow Site Map A-Z Index Menu Synopsis James Cronin, CP Violation and the Pierre Auger Observatory matter over antimatter."1 "The experiment uncovered the CP [charge-parity] violation, or a with Additional Information Additional information about James Cronin and the charge-parity (CP

  3. Lorentz-violating alternative to the Higgs mechanism?

    International Nuclear Information System (INIS)

    Alexandre, Jean; Mavromatos, Nick E.

    2011-01-01

    We consider a four-dimensional field-theory model with two massless fermions, coupled to an Abelian vector field without flavor mixing, and to another Abelian vector field with flavor mixing. Both Abelian vectors have a Lorentz-violating kinetic term, introducing a Lorentz-violation mass scale M, from which fermions and the flavor-mixing vector get their dynamical masses, whereas the vector coupled without flavor mixing remains massless. When the two coupling constants have similar values in order of magnitude, a mass hierarchy pattern emerges, in which one fermion is very light compared to the other, while the vector mass is of the order of the heavy fermion mass. The work presented here may be considered as a Lorentz-symmetry-violating alternative to the Higgs mechanism, in the sense that no scalar particle (fundamental or composite) is necessary for the generation of the vector-meson mass. However, the model is not realistic given that, as a result of Lorentz violation, the maximal (light-cone) speed seen by the fermions is smaller than that of the massless gauge boson (which equals the speed of light in vacuo) by an amount which is unacceptably large to be compatible with the current tests of Lorentz invariance, unless the gauge couplings assume unnaturally small values. Possible ways out of this phenomenological drawback are briefly discussed, postponing a detailed construction of more realistic models for future work.

  4. Regge behavior saves string theory from causality violations

    DEFF Research Database (Denmark)

    di Vecchia, Paolo; Giuseppe, D'Appollonio; Russo, Rodolfo

    2015-01-01

    Higher-derivative corrections to the Einstein-Hilbert action are present in bosonic string theory leading to the potential causality violations recently pointed out by Camanho et al. [1]. We analyze in detail this question by considering high-energy string-brane collisions at impact parameters b....... Such violations are instead neatly avoided when the full structure of string theory — and in particular its Regge behavior — is taken into account....... ≤ l s (the string-length parameter) with l s ≫ R p (the characteristic scale of the Dp-brane geometry). If we keep only the contribution of the massless states causality is violated for a set of initial states whose polarization is suitably chosen with respect to the impact parameter vector...

  5. CP violation in the standard model and beyond

    International Nuclear Information System (INIS)

    Buras, A.J.

    1984-01-01

    The present status of CP violation in the standard six quark model is reviewed and a combined analysis with B-meson decays is presented. The theoretical uncertainties in the analysis are discussed and the resulting KM weak mixing angles, the phase delta and the ratio epsilon'/epsilon are given as functions of Tsub(B), GAMMA(b -> u)/GAMMA(b -> c), msub(t) and the B parameter. For certain ranges of the values of these parameters the standard model is not capable in reproducing the experimental values for epsilon' and epsilon parameters. Anticipating possible difficulties we discuss various alternatives to the standard explanation of CP violation such as horizontal interactions, left-right symmetric models and supersymmetry. CP violation outside the kaon system is also briefly discussed. (orig.)

  6. Is a weak violation of the Pauli principle possible?

    International Nuclear Information System (INIS)

    Ignat'ev, A.Y.; Kuz'min, V.A.

    1987-01-01

    We examine models in which there is a weak violation of the Pauli principle. A simple algebra of creation and annihilation operators is constructed which contains a parameter β and describes a weak violation of the Pauli principle (when β = 0 the Pauli principle is satisfied exactly). The commutation relations in this algebra turn out to be trilinear. A model based on this algebra is described. It allows transitions in which the Pauli principle is violated, but the probability of these transitions is suppressed by the quantity β 2 (even though the interaction Hamiltonian does not contain small parameters)

  7. Instrument to measure psychological contract violation in pharmacy students.

    Science.gov (United States)

    Spies, Alan R; Wilkin, Noel E; Bentley, John P; Bouldin, Alicia S; Wilson, Marvin C; Holmes, Erin R

    2010-08-10

    To adapt and evaluate an instrument that measures perceived psychological contract violations in pharmacy students by schools and colleges of pharmacy. A psychological contract violations measure was developed from existing literature and the 1997 ACPE Guidelines and pilot-tested with second-year pharmacy students at 2 schools of pharmacy. A revised measure then was administered to second-year pharmacy students at 6 schools of pharmacy. Using a 5-point Likert-type scale, participants were asked to indicate the level of obligations they received compared to what was promised by the school of pharmacy. Exploratory factor analysis on the psychological contract violations measure was conducted using principal components analysis resulting in 7 factors, which led to a revised measure with 26 items. Using a sample of 339 students, the proposed 7-factor measurement model was tested using confirmatory factor analysis. In general, the results supported the hypothesized model. The final 23-item scale demonstrated both reliability and validity. Some students perceived certain aspects of the psychological contract that exists with their school of pharmacy were being violated. The psychological contract violations measure may serve as a valuable tool in helping to identify areas where their students believe that schools/colleges of pharmacy have not fulfilled promised obligations.

  8. Viscosity bound violation in holographic solids and the viscoelastic response

    Energy Technology Data Exchange (ETDEWEB)

    Alberte, Lasma [Abdus Salam International Centre for Theoretical Physics (ICTP),Strada Costiera 11, 34151, Trieste (Italy); Baggioli, Matteo [Institut de Física d’Altes Energies (IFAE),The Barcelona Institute of Science and Technology (BIST),Campus UAB, 08193 Bellaterra, Barcelona (Spain); Department of Physics, Institute for Condensed Matter Theory, University of Illinois,1110 W. Green Street, Urbana, IL 61801 (United States); Pujolàs, Oriol [Institut de Física d’Altes Energies (IFAE),The Barcelona Institute of Science and Technology (BIST),Campus UAB, 08193 Bellaterra, Barcelona (Spain)

    2016-07-14

    We argue that the Kovtun-Son-Starinets (KSS) lower bound on the viscosity to entropy density ratio holds in fluid systems but is violated in solid materials with a non-zero shear elastic modulus. We construct explicit examples of this by applying the standard gauge/gravity duality methods to massive gravity and show that the KSS bound is clearly violated in black brane solutions whenever the massive gravity theories are of solid type. We argue that the physical reason for the bound violation relies on the viscoelastic nature of the mechanical response in these materials. We speculate on whether any real-world materials can violate the bound and discuss a possible generalization of the bound that involves the ratio of the shear elastic modulus to the pressure.

  9. Viscosity bound violation in holographic solids and the viscoelastic response

    International Nuclear Information System (INIS)

    Alberte, Lasma; Baggioli, Matteo; Pujolàs, Oriol

    2016-01-01

    We argue that the Kovtun-Son-Starinets (KSS) lower bound on the viscosity to entropy density ratio holds in fluid systems but is violated in solid materials with a non-zero shear elastic modulus. We construct explicit examples of this by applying the standard gauge/gravity duality methods to massive gravity and show that the KSS bound is clearly violated in black brane solutions whenever the massive gravity theories are of solid type. We argue that the physical reason for the bound violation relies on the viscoelastic nature of the mechanical response in these materials. We speculate on whether any real-world materials can violate the bound and discuss a possible generalization of the bound that involves the ratio of the shear elastic modulus to the pressure.

  10. Efficient Secure and Privacy-Preserving Route Reporting Scheme for VANETs

    Science.gov (United States)

    Zhang, Yuanfei; Pei, Qianwen; Dai, Feifei; Zhang, Lei

    2017-10-01

    Vehicular ad-hoc network (VANET) is a core component of intelligent traffic management system which could provide various of applications such as accident prediction, route reporting, etc. Due to the problems caused by traffic congestion, route reporting becomes a prospective application which can help a driver to get optimal route to save her travel time. Before enjoying the convenience of route reporting, security and privacy-preserving issues need to be concerned. In this paper, we propose a new secure and privacy-preserving route reporting scheme for VANETs. In our scheme, only an authenticated vehicle can use the route reporting service provided by the traffic management center. Further, a vehicle may receive the response from the traffic management center with low latency and without violating the privacy of the vehicle. Experiment results show that our scheme is much more efficiency than the existing one.

  11. Equivalence principle, CP violations, and the Higgs-like boson mass

    International Nuclear Information System (INIS)

    Bellucci, S.; Faraoni, V.

    1994-01-01

    We consider the violation of the equivalence principle induced by a massive gravivector, i.e., the partner of the graviton in N>1 supergravity. The present limits on this violation allow us to obtain a lower bound on the vacuum expectation value of the scalar field that gives the gravivector its mass. We consider also the effective neutral kaon mass difference induced by the gravivector and compare the result with the experimental data on the CP-violation parameter ε

  12. Future prospects for studying CP violation in B-meson decays

    International Nuclear Information System (INIS)

    Nakada, T.

    1997-01-01

    Experimental prospects for observing CP violation in B-meson decays are reviewed. Comparisons are made for various options: experiments a e + e - B-Meson Factories, HERA and the TEVATRON will produce results n near future. They will have a good chance to discover CP violation in B-meson decays. On a longer time scale, experiments at the LHC will aim at accurate measurements to make a precision test of the standard model in CP violation. (author)

  13. CP violation in neutral B decays to non-CP-eigenstates

    International Nuclear Information System (INIS)

    Kayser, B.

    1992-01-01

    If CP violation comes from complex phases in the quark mixing matrix, then neutral B decays to CP eigenstates will exhibit large, cleanly-predicted CP-violating effects. The authors show that the same is true of neutral B decays to several types of ''near-CP-eigenstates.'' By experimentally studying the latter decays as well as those to the CP eigenstates, one will be able to obtain more definitive information on CP violation from a given number of B mesons

  14. THE RESPONSIBILITY OF PROTECTING (R2P HUMAN RIGHTS AND SECURITY COUNCIL

    Directory of Open Access Journals (Sweden)

    ULDARICIO FIGUEROA PLÁ

    2017-12-01

    Full Text Available The adoption in 1948 of the Convention on the Prevention and Punishment of the Crime of Genocide seemed to open a new era in the international scenario in which these kind of practices apparently are left in the historic past. Reality has shown us that this international instrument was not enough to face arbitrary measures of some Governments. Nevertheless, genocide actions continuing to be performed, and in order to decrease human suffering, “humanitarian intervention” was thought as a response to the ineffectiveness of the Security Council which also brought along arbitrary actions in its invocation, discrediting it. Before the reiterated calls of the Secretary General of the United Nations to prevent and detain massive violations to human rights, an effort has been made in order to standardizing a type of interventions that can respond to massive violations of human rights. This has been called Responsibility to Protect.

  15. Leggett-Garg inequalities violation via the Fermi contact hyperfine interaction

    Energy Technology Data Exchange (ETDEWEB)

    Lobejko, Marcin; Dajka, Jerzy [Institute of Physics, University of Silesia, Katowice (Poland); Silesian Center for Education and Interdisciplinary Research, University of Silesia, Chorzow (Poland)

    2017-06-15

    In this paper we examine theoretically how the spin-spin interaction between a nuclei and an electron in the atom affects violation of the Leggett-Garg inequalities. We consider the simplest case of atoms in the {sup 2}S{sub 1/2} state that in the valence shell have just a single electron and the evolution in time of the spin is dictated only by the Fermi contact hyperfine interaction. We found that for special initial conditions and a particular measured observable the high spin nucleus couple to the valence electron such that violation of Leggett-Garg inequalities increases with total spin of states. Consequently, our results show that for the Hydrogen, the smallest atom in Nature, the violation of the Leggett-Garg inequalities is the smallest whereas for the largest atom, the Cesium, the violation is the largest. Moreover, this violation does not depend on a principal quantum number, thus our model can be used for Rydberg atoms in order to test macrorealism for 'almost macroscopic' objects. (copyright 2016 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  16. CP-violation and Todd effects at lep-II

    International Nuclear Information System (INIS)

    Bilal, A.; Masso, E.; Rujula, A. de

    1991-01-01

    LEP-II will be a tool study CP-violation in processes involving vector bosons, and will test in particular the CP properties of the coupling of photons and Z's to W-pairs. While it is difficult to observe truly CP-odd effects, it is easy to measure T-odd ones. The latter can originate from CP-violation, or from radiative corrections involving the absorptive part of the scattering amplitude. T-odd effects are interesting in themselves, in that they accurately test the standard model and are sensitive to its unmeasured ingredients, such as the WW→WW scattering amplitude of the masses of the top quark and the elementary scalar. The prediction of the standard T-odd effects is a necessary stepping stone in the search for an honest-to-goodness violation of CP in the pure gauge sector. We thoroughly analyse the T-odd observables in the e + e - →W + W - process within the standard model, as well as the extra effects to be expected if the γW + W - and/or ZW + W - vertices were to violate CP in a non-standard fashion. (orig.)

  17. CPLEAR et BABAR, all aspects of CP violation

    International Nuclear Information System (INIS)

    Yeche, Ch.

    2003-06-01

    This report of French 'Habilitation a diriger les recherches' summarizes my scientific activity from 1993 to 2003. During this decade, my research work was related to two particle physics experiments: CPLEAR and BABAR. The first one, CPLEAR, has recorded data from 1988 to 1995 on the low energy anti-proton ring (LEAR) at CERN. This experiment was devoted to the study of T, CPT et CP discrete symmetries. The second experiment, BABAR, has been running since 1999, on the PEP-II B factory at SLAC. This experiment searches for CP violation and tests the Standard Model through the measurements of the angles and the sides of the Unitarity Triangle. My research work is divided in five main topics: Study of CP and CPT violation in K 0 → π + π - decays; Performance optimization of the particle identification detector (DIRC) of the BABAR experiment; B meson tagging in BABAR experiment; Δm d measurement and Search for CP and T violation in mixing with dilepton events; Search for CP violation in B 0 → ρ ± π ± and B 0 → π ± K ± decays. (author)

  18. Effective Lagrangian description of Higgs mediated flavor violating electromagnetic transitions: Implications on lepton flavor violation

    International Nuclear Information System (INIS)

    Aranda, J. I.; Tututi, E. S.; Flores-Tlalpa, A.; Ramirez-Zavaleta, F.; Tlachino, F. J.; Toscano, J. J.

    2009-01-01

    Higgs mediated flavor violating electromagnetic interactions, induced at the one-loop level by a nondiagonal Hf i f j vertex, with f i and f j charged leptons or quarks, are studied within the context of a completely general effective Yukawa sector that comprises SU L (2)xU Y (1)-invariant operators of up to dimension-six. Exact formulae for the one-loop γf i f j and γγf i f j couplings are presented and their related processes used to study the phenomena of Higgs mediated lepton flavor violation. The experimental limit on the μ→eγ decay is used to derive a bound on the branching ratio of the μ→eγγ transition, which is 6 orders of magnitude stronger than the current experimental limit. Previous results on the τ→μγ and τ→μγγ decays are reproduced. The possibility of detecting signals of lepton flavor violation at γγ colliders is explored through the γγ→l i l j reaction, putting special emphasis on the τμ final state. Using the bound imposed on the Hτμ vertex by the current experimental data on the muon anomalous magnetic moment, it is found that about half a hundred events may be produced in the International Linear Collider.

  19. Lorentz violation and generalized uncertainty principle

    Science.gov (United States)

    Lambiase, Gaetano; Scardigli, Fabio

    2018-04-01

    Investigations on possible violation of Lorentz invariance have been widely pursued in the last decades, both from theoretical and experimental sides. A comprehensive framework to formulate the problem is the standard model extension (SME) proposed by A. Kostelecky, where violation of Lorentz invariance is encoded into specific coefficients. Here we present a procedure to link the deformation parameter β of the generalized uncertainty principle to the SME coefficients of the gravity sector. The idea is to compute the Hawking temperature of a black hole in two different ways. The first way involves the deformation parameter β , and therefore we get a deformed Hawking temperature containing the parameter β . The second way involves a deformed Schwarzschild metric containing the Lorentz violating terms s¯μ ν of the gravity sector of the SME. The comparison between the two different techniques yields a relation between β and s¯μ ν. In this way bounds on β transferred from s¯μ ν are improved by many orders of magnitude when compared with those derived in other gravitational frameworks. Also the opposite possibility of bounds transferred from β to s¯μ ν is briefly discussed.

  20. Theoretical perspective for baryon number violation

    International Nuclear Information System (INIS)

    Langacker, P.

    1982-01-01

    In this talk I describe the theoretical predictions for proton decay and other baryon number violating processes, emphasizing that there are many models and theories involving baryon number violation and that it is an experimental problem to distinguish between them. I first review the the theoretical predictions for the unification mass M/sub X/ and for the weak angle sin 2 theta/sub W/. It will be seen that the class of models involving an Su 3 x SU 2 x U 1 invariant desert between M/sub W/ and M/sub X/ are strongly favored. I then turn to baryon number violation. The proton lifetime and branching ratio predictions for the SU 5 and other 3-2-1 desert models are reviewed, with emphasis on distinguishing between models and on the implications of the small value of the QCD parameter lambda/sub anti MS/ that seems to be favored by the data. I then discuss the consequences of low energy supersymmetry for proton decay, nuclear effects, and models with low mass scales. Finally, I mention possible implications of the anomalously large flux of cosmic ray antiprotons that has recently been reported

  1. CP Violation in Heavy MSSM Higgs Scenarios

    CERN Document Server

    Carena, M; Lee, J S; Pilaftsis, A; Wagner, C E M

    2016-01-01

    We introduce and explore new heavy Higgs scenarios in the Minimal Supersymmetric Standard Model (MSSM) with explicit CP violation, which have important phenomenological implications that may be testable at the LHC. For soft supersymmetry-breaking scales M_S above a few TeV and a charged Higgs boson mass M_H+ above a few hundred GeV, new physics effects including those from explicit CP violation decouple from the light Higgs boson sector. However, such effects can significantly alter the phenomenology of the heavy Higgs bosons while still being consistent with constraints from low-energy observables, for instance electric dipole moments. To consider scenarios with a charged Higgs boson much heavier than the Standard Model (SM) particles but much lighter than the supersymmetric particles, we revisit previous calculations of the MSSM Higgs sector. We compute the Higgs boson masses in the presence of CP violating phases, implementing improved matching and renormalization group (RG) effects, as well as two-loop RG...

  2. 78 FR 48413 - Proposed Information Collection; Comment Request; Voluntary Self-Disclosure of Violations of the...

    Science.gov (United States)

    2013-08-08

    ... Request; Voluntary Self- Disclosure of Violations of the Export Administration Regulations AGENCY: Bureau... violators. Voluntary self-disclosure of EAR violations strengthens BIS's enforcement efforts by allowing BIS... detect the violations without such disclosures. BIS evaluates the seriousness of the violation and either...

  3. Smooth criminal: convicted rule-breakers show reduced cognitive conflict during deliberate rule violations.

    Science.gov (United States)

    Jusyte, Aiste; Pfister, Roland; Mayer, Sarah V; Schwarz, Katharina A; Wirth, Robert; Kunde, Wilfried; Schönenberg, Michael

    2017-09-01

    Classic findings on conformity and obedience document a strong and automatic drive of human agents to follow any type of rule or social norm. At the same time, most individuals tend to violate rules on occasion, and such deliberate rule violations have recently been shown to yield cognitive conflict for the rule-breaker. These findings indicate persistent difficulty to suppress the rule representation, even though rule violations were studied in a controlled experimental setting with neither gains nor possible sanctions for violators. In the current study, we validate these findings by showing that convicted criminals, i.e., individuals with a history of habitual and severe forms of rule violations, can free themselves from such cognitive conflict in a similarly controlled laboratory task. These findings support an emerging view that aims at understanding rule violations from the perspective of the violating agent rather than from the perspective of outside observer.

  4. LHCb CP violation

    CERN Document Server

    Vesterinen, Mika

    2016-01-01

    The study of $CP$ violation in the beauty hadron sector is a promising approach to search for the effects of physics beyond the Standard Model. Several recent measurements in this area from the LHCb experiment are reported in these proceedings. These are based on the Run-I dataset of 3~fb$^{-1}$ of data collected at proton-proton centre of mass energies of 7 and 8~TeV.

  5. Safety of protocol violations in acute stroke tPA administration.

    Science.gov (United States)

    Lyerly, Michael J; Albright, Karen C; Boehme, Amelia K; Bavarsad Shahripour, Reza; Houston, James T; Rawal, Pawan V; Kapoor, Niren; Alvi, Muhammad; Sisson, April; Alexandrov, Anne W; Alexandrov, Andrei V

    2014-01-01

    Intravenous (IV) tissue plasminogen activator remains the only approved therapy for acute ischemic stroke (AIS) in the United States; however, less than 10% of patients receive treatment. This is partially because of the large number of contraindications, narrow treatment window, and physician reluctance to deviate from these criteria. We retrospectively analyzed consecutive patients who received IV thrombolysis at our stroke center for National Institute of Neurological Disorders and Stroke (NINDS) protocol violations and rates of symptomatic intracerebral hemorrhage (sICH). Other outcome variables included systemic hemorrhage, modified Rankin Scale at discharge, and discharge disposition. A total of 212 patients were identified in our stroke registry between 2009 and 2011 and included in the analysis. Protocol violations occurred in 76 patients (36%). The most common violations were thrombolysis beyond 3 hours (26%), aggressive blood pressure management (15%), elevated prothrombin time (PT) or partial thromboplastin time (PTT) (6.6%), minor or resolving deficits (4.2%), unclear time of onset (3.9%), and stroke within 3 months (3%). There were no significant differences in any of the safety outcomes or discharge disposition between patients with or without protocol violations. Controlling for age, National Institutes of Health Stroke Scale on admission, and glucose on admission, there was no significant increase in sICH (odds ratio: 3.8; 95% confidence interval: .37-38.72) in the patients who had protocol violations. Despite more than one third of patients receiving thrombolysis with protocol violations, overall rates of hemorrhage remained low and did not differ from those who did not have violations. Our data support the need to expand access to thrombolysis in AIS patients. Published by Elsevier Inc.

  6. SM with two Higgs doublets: an example of CP-violation without Fermions

    International Nuclear Information System (INIS)

    Cvetic, G.

    1993-01-01

    Some CP-violation effects without fermions in the Standard Model are investigated with two Higgs doublets. First, the mass eigenstates of the physical neutral Higgses are calculated for small but nonzero CP-violation parameter ξ * , and then a ''forward-backward'' asymmetry A fb for the decay H → W + W - Z that would be a signal of CP-violation. The effects are in general small. However, A fb turns out to be a rather clean signal of CP-violation: neither the CP-conserving final state interactions nor the direct production background events contribute to Γ fb . The KM-type CP-violation effects that could in principle also contribute to A fb are negligible. 6 refs

  7. 15 CFR 764.2 - Violations.

    Science.gov (United States)

    2010-01-01

    ... issued thereunder. (e) Acting with knowledge of a violation. No person may order, buy, remove, conceal... or may occur in the future. (h) Evasion. No person may engage in any transaction or take any other...

  8. Factors and Predictors of Online Security and Privacy Behavior

    Directory of Open Access Journals (Sweden)

    Goran Bubaš

    2008-12-01

    Full Text Available Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT skills that investigated how assumptions and habits of Internet users are related to their online security and privacy. The following four factors of online security and privacy related behaviors were revealed in factor analysis: F1 – conscientiousness in the maintenance of the operating system, upgrading of the Internet browser and use of antivirus and antispyware programs; F2 –engagement in risky and careless online activities with lack of concern for personal online privacy; F3 – disbelief that privacy violations and security threats represent possible problems; F4 – lack of fear regarding potential privacy and security threats with no need for change in personal online behavior. Statistically significant correlations were found between some of the discovered factors on the one side, and criteria variables occurrence of malicious code (C1 and data loss on the home computer (C2 on the other. In addition, a regression analysis was performed which revealed that the potentially risky online behaviors of Internet users were associated with the two criteria variables. To properly interpret the results of correlation and regression analyses a conceptual model was developed of the potential causal relationships between the behavior of Internet users and their experiences with online security threats. An additional study was also performed which partly confirmed the conceptual model, as well as the factors of online security and privacy related behaviors.

  9. Baryogenesis and standard model CP violation

    International Nuclear Information System (INIS)

    Huet, P.

    1994-08-01

    The standard model possesses a natural source of CP violation contained in the phase of the CKM matrix. Whether the latter participated to the making of the matter-antimatter asymmetry of the observable universe is a fundamental question which has been addressed only recently. The generation of a CP observable occurs through interference of quantum paths along which a sequence of flavor mixings and chirality flips take place. The coherence of this phenomenon in the primeval plasma is limited by the fast quark-gluon interactions. At the electroweak era, this phenomenon of decoherence forbids a successful baryogenesis based on the sole CP violation of the CKM matrix

  10. CP violation in rare K decays

    International Nuclear Information System (INIS)

    Ecker, G.

    1990-01-01

    The investigation of rare K decays calls for a unified treatment of short- and long-distance aspects as provided by chiral perturbation theory. For the standard model with three generations, the theoretical predictions for signals of CP violation in those decays are reviewed. With direct CP violation as the main target, special emphasis is given to the charge asymmetries in charged K decays and to the especially rare decays K L → π 0 ll-bar. Time dependent rate asymmetries in K 0 decays and the longitudinal muon polarization in K L → μ + μ - are also discussed. 50 refs., 3 figs., 1 tab. (Author)

  11. Experimental Bell-inequality violation without the postselection loophole

    International Nuclear Information System (INIS)

    Lima, G.; Vallone, G.; Chiuri, A.; Cabello, A.; Mataloni, P.

    2010-01-01

    We report on an experimental violation of the Bell-Clauser-Horne-Shimony-Holt (Bell-CHSH) inequality using energy-time-entangled photons. The experiment is not free of the locality and detection loopholes but is the first violation of the Bell-CHSH inequality using energy-time entangled photons which is free of the postselection loophole described by Aerts et al. [Phys. Rev. Lett. 83, 2872 (1999)].

  12. Local models violating Bell's inequality by time delays

    International Nuclear Information System (INIS)

    Scalera, G.C.

    1984-01-01

    The performance of ensemble averages is neither a sufficient nor a necessary condition to avoid Bell's inequality violations characteristic of nonergodic systems. Slight modifications of a local nonergodic logical model violating Bell's inequality produce a stochastic model exactly fitting the quantum-mechanical correlation function. From these considerations is appears evident that the last experiments on the existence of local hidden variables are not conclusive

  13. Quark flavor mixing, CP violation, and all that

    International Nuclear Information System (INIS)

    Gilman, F.J.

    1988-04-01

    We review the present state of knowledge of the mixing of quark flavors under weak interactions and the associated explanation of CP violation inherent in the single nontrivial phase present in the three-generation mixing matrix. In this context we present the phenomenological basis for the increasing possibility that large CP violation asymmetries can be experimentally observed in the B meson system. 39 refs., 11 figs.,

  14. 24 CFR 30.20 - Ethical violations by HUD employees.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Ethical violations by HUD employees. 30.20 Section 30.20 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development CIVIL MONEY PENALTIES: CERTAIN PROHIBITED CONDUCT Violations § 30.20 Ethical...

  15. Federal securities law and the need to disclose the risk of canceling nuclear plant

    International Nuclear Information System (INIS)

    Sponseller, D.

    1984-01-01

    Almost every electric utility company involved in nuclear plant construction has experienced difficulty as a result of the deteriorating condition of the nuclear industry as a whole. The thrust of a growing number of lawsuits brought against electric companies for alleged violations of federal securities laws is that the companies failed to reveal cost overruns, delays, and the risk of cancellation and write-off of nuclear plants in their annual reports and registration statements. A review of several suits and the disclosure requirements of securities statutes concludes that, although investors have known about utility problems, they have just become aware this year that the entire financial viability of the electric companies is threatened

  16. CP Violation in Single Top Quark Production

    Energy Technology Data Exchange (ETDEWEB)

    Geng, Weigang [Michigan State Univ., East Lansing, MI (United States)

    2012-01-01

    We present a search for CP violation in single top quark production with the DØ experiment at the Tevatron proton-antiproton collider. CP violation in the top electroweak interaction results in different single top quark production cross sections for top and antitop quarks. We perform the search in the single top quark final state using 5.4 fb-1 of data, in the s-channel, t-channel, and for both combined. At this time, we do not see an observable CP asymmetry.

  17. Maximal CP violation via Higgs-boson exchange

    International Nuclear Information System (INIS)

    Lavoura, L.

    1992-01-01

    The unitarity of the mixing matrix of the charged Higgs bosons, and the orthogonality of the mixing matrix of the neutral Higgs bosons, are used to derive upper bounds on the values of general CP-violating expressions. The bounds are independent of the total number of Higgs fields in any specific model. They allow is to relax the usual assumption of only one Higgs boson being light. It is natural that the CP violation in the exchange of neutral Higgs bosons between bottom quarks be particularly large

  18. Flavour physics and CP violation

    Indian Academy of Sciences (India)

    status and prospectives of the flavour physics associated with the strange, charm and .... might reveal something completely unexpected. Standard Model weak ..... Thus, in order to have an observable CP violation effect in the SM, the mixing.

  19. Top searches and R-parity violation at hadron colliders

    International Nuclear Information System (INIS)

    Dreiner, H.

    1991-07-01

    In R p -violating supersymmetric theories there are new 2-body top quark decays which can substantially suppress the branching fraction of the Standard Model process t → bW + → bl + υ 1 . With some choices of the dominant R p -violating operator the CDF top-quark mass bound can be lowered below the LEP bound. With other choices, however, leptonic signals from top decay become much stronger; in such scenarios the bounds on the top quark mass become more stringent than the Standard Model bounds. In future top quark searches R p -violating decays could lead to the most prominent signals. (author)

  20. Enhanced lepton flavour violation in the supersymmetric inverse seesaw

    International Nuclear Information System (INIS)

    Weiland, C

    2013-01-01

    In minimal supersymmetric seesaw models, the contribution to lepton flavour violation from Z-penguins is usually negligible. In this study, we consider the supersymmetric inverse seesaw and show that, in this case, the Z-penguin contribution dominates in several lepton flavour violating observables due to the low scale of the inverse seesaw mechanism. Among the observables considered, we find that the most constraining one is the μ-e conversion rate which is already restricting the otherwise allowed parameter space of the model. Moreover, in this framework, the Z-penguins exhibit a non-decoupling behaviour, which has previously been noticed in lepton flavour violating Higgs decays

  1. Violating Bell inequalities maximally for two d-dimensional systems

    International Nuclear Information System (INIS)

    Chen Jingling; Wu Chunfeng; Oh, C. H.; Kwek, L. C.; Ge Molin

    2006-01-01

    We show the maximal violation of Bell inequalities for two d-dimensional systems by using the method of the Bell operator. The maximal violation corresponds to the maximal eigenvalue of the Bell operator matrix. The eigenvectors corresponding to these eigenvalues are described by asymmetric entangled states. We estimate the maximum value of the eigenvalue for large dimension. A family of elegant entangled states |Ψ> app that violate Bell inequality more strongly than the maximally entangled state but are somewhat close to these eigenvectors is presented. These approximate states can potentially be useful for quantum cryptography as well as many other important fields of quantum information

  2. An introduction to baryon violation in standard electroweak theory

    International Nuclear Information System (INIS)

    Arnold, P.B.

    1990-12-01

    I shall begin with a qualitative overview of the anomaly and B violation at zero and non-zero temperature, demonstrating how these processes may be understood on the back of an envelope. Then I shall discuss a part of the formalism necessary for doing calculations in more detail. Specifically, B violation is related to various solutions to the Euclidean equations of motion; instantons, sphalerons, and calorons (also called periodic instantons). The applicability of the various solutions may be understood by analogies with elementary quantum mechanics problems. Finally, I shall touch upon the computation of high-energy B violation mentioned above. 29 refs., 11 figs

  3. A Geometric Approach to CP Violation: Applications to the MCPMFV SUSY Model

    CERN Document Server

    Ellis, John; Pilaftsis, Apostolos

    2010-01-01

    We analyze the constraints imposed by experimental upper limits on electric dipole moments (EDMs) within the Maximally CP- and Minimally Flavour-Violating (MCPMFV) version of the MSSM. Since the MCPMFV scenario has 6 non-standard CP-violating phases, in addition to the CP-odd QCD vacuum phase \\theta_QCD, cancellations may occur among the CP-violating contributions to the three measured EDMs, those of the Thallium, neutron and Mercury, leaving open the possibility of relatively large values of the other CP-violating observables. We develop a novel geometric method that uses the small-phase approximation as a starting point, takes the existing EDM constraints into account, and enables us to find maximal values of other CP-violating observables, such as the EDMs of the Deuteron and muon, the CP-violating asymmetry in b --> s \\gamma decay, and the B_s mixing phase. We apply this geometric method to provide upper limits on these observables within specific benchmark supersymmetric scenarios, including extensions t...

  4. CP violation in a multi-Higgs-doublet model with flavor-changing neutral currents

    International Nuclear Information System (INIS)

    Deshpande, N.G.; He, X.

    1994-01-01

    We study CP violation in multi-Higgs-doublet model based on a S 3 xZ 3 horizontal symmetry where the CKM phase is not the principal source of CP violation. We consider two mechanisms for CP violation in this model: (a) CP violation due to complex Yukawa couplings, and (b) CP violation due to scalar-pseudoscalar Higgs boson mixings. Both mechanisms can explain the observed CP violation in the neutral kaon system. ε'/ε due to neutral Higgs boson exchange is small in both mechanisms, but charged Higgs boson contributions can be as large as 10 -4 for (a) and 10 -3 for (b). CP violation in the neutral B system is, however, quite different from the minimal standard model. The neutron electric dipole moment can be as large as the present experimental bound, and can be used to constrain charged Higgs boson masses. The electron EDM is one order of magnitude below the experimental bound in case (b) and smaller in case (a)

  5. 29 CFR 825.402 - Violations of the posting requirement.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Violations of the posting requirement. 825.402 Section 825.402 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR OTHER LAWS THE FAMILY AND MEDICAL LEAVE ACT OF 1993 Enforcement Mechanisms § 825.402 Violations of the...

  6. Access to essential maternal health interventions and human rights violations among vulnerable communities in eastern Burma.

    Science.gov (United States)

    Mullany, Luke C; Lee, Catherine I; Yone, Lin; Paw, Palae; Oo, Eh Kalu Shwe; Maung, Cynthia; Lee, Thomas J; Beyrer, Chris

    2008-12-23

    reporting forced displacement, and 7.47 (95% CI 2.21-25.3) higher among those exposed to food security violations. The odds of receiving no antenatal care services were 5.94 (95% CI 2.23-15.8) times higher among those forcibly displaced. Coverage of basic maternal health interventions is woefully inadequate in these selected populations and substantially lower than even the national estimates for Burma, among the lowest in the region. Considerable political, financial, and human resources are necessary to improve access to maternal health care in these communities.

  7. An analysis of violations of Osha's (1987) occupational exposure to benzene standard.

    Science.gov (United States)

    Williams, Pamela R D

    2014-01-01

    The Occupational Safety and Health Administration (OSHA), which was formed by the Occupational Safety and Health Act of 1970 (OSH Act), establishes enforceable health and safety standards in the workplace and issues violations and penalties for non-compliance with these standards. The purpose of the current study was to evaluate the number and type of violations of the OSHA (1987) Occupational Exposure to Benzene Standard. Violations of the OSHA Hazard Communication Standard (HCS), particularly those that may pertain to specific provisions of the benzene standard, were also assessed. All analyses were based on OSHA inspection data that have been collected since the early 1970s and that are publicly available from the U.S. Department of Labor enforcement website. Analysis of these data shows that fewer than a thousand OSHA violations of the benzene standard have been issued over the last 25+ years. The results for benzene are in contrast to those for some other toxic and hazardous substances that are regulated by OSHA, such as blood-borne pathogens, lead, and asbestos, for which there have been issued tens of thousands of OSHA violations. The number of benzene standard violations also varies by time period, standard provision, industry sector, and other factors. In particular, the greatest number of benzene standard violations occurred during the late 1980s to early/mid 1990s, soon after the 1987 final benzene rule was promulgated. The majority of benzene standard violations also pertain to noncompliance with specific provisions and subprovisions of the standard dealing with initial exposure monitoring requirements, the communication of hazards to employees, and medical surveillance programs. Only a small fraction of HCS violations are attributed, at least in part, to potential benzene hazards in the workplace. In addition, most benzene standard violations are associated with specific industries within the manufacturing sector where benzene or benzene

  8. INFLUENCE OF CUSTOMS PAYMENTS ON THE ECONOMIC SECURITY OF THE COUNTRY, PROBLEMS AND WAYS OF OVERCOMING

    Directory of Open Access Journals (Sweden)

    Inna Kiyanchuk

    2017-11-01

    Full Text Available The article considers the role of customs payments as one of the main revenue sources of the state budget of Ukraine. The volume of receipt of customs payments to the state budget is characterized. The structure of receipts from customs payments for 2016-2017 is considered. Problems that violate the stable level of economic security of the country are identified. The complex of measures proposed to resolve deficiencies in the system of collection of customs payments to the State Budget of Ukraine is considered. The purpose of this article is to reveal the content and role of revenues from customs payments to the state budget and their impact on the country’s economic security. The subject of research: the impact of customs payments on the country’s economic security. The methodological basis of the study is a set of general, scientific, specific scientific and special methods and approaches, which helped to realize the conceptual unity of the research. In particular: an integrated approach that is used to analyse the collection of customs payments methods of induction and deduction, formalization to study the mechanism of charging customs payments, the method of analysis – in the study of the main elements of the collection of customs payments in Ukraine. Positive and normative research methods are used to develop proposed budget revenues from receipt of customs payments and to ensure stable economic security. Results. Thus, according to the results of the analysis, in 2017, there is a clear tendency to increase revenues to the state budget, including from customs payments. Thus, in 2017, the total amount of customs payments amounted to 277.27 billion UAH, which is 57.24 billion UAH more than the previous year (220.03 billion UAH. That is, customs payments increased by 26%. Economic implications. However, there are some problems in collecting customs payments to the state budget, which in turn violate a stable level of economic security of

  9. Violation of a Bell-like inequality in neutron-interferometer experiments

    International Nuclear Information System (INIS)

    Hasegawa, Yuji; Badurek, Gerald; Rauch, Helmut; Loidl, Rudolf; Baron, Matthias

    2003-01-01

    We report an interferometric experiment with spin-1/2 neutrons to demonstrate the violation of a Bell-like inequality. The total wave function of neutrons is described by a tensor product Hilbert space. Appropriate combinations of the direction of the spin analysis and the position of the phase shifter allow to demonstrate the violation of the Bell-like inequality. The discussions are presented on the violation of the Bell-like inequality in terms of quantum contextuality and an entanglement-induced correlation in our experiment. (author)

  10. Violation of the Cauchy-Schwarz inequality in collective Raman scattering

    International Nuclear Information System (INIS)

    Shumovskij, A.S.; Tran Quang

    1988-01-01

    The violation of Cauchy-Schwarz (C-S) inequality for correlations between spectrum components of the Reyleigh line and between components of the Stokes line in the collective Raman scattering is discussed. It is shown that the violation of the C-S inequailty occurs only in the Rayleigh line, moreover, for the sidebands of the Rayleigh line the violation of the C-S inequality takes place for a large number of atoms, which means that this quantum effect has the macroscopic nature. 20 refs.; 3 figs

  11. New signatures of flavor violating Higgs couplings

    Energy Technology Data Exchange (ETDEWEB)

    Buschmann, Malte; Kopp, Joachim; Liu, Jia; Wang, Xiao-Ping [PRISMA Cluster of Excellence and Mainz Institute for Theoretical Physics,Johannes Gutenberg University, 55099 Mainz (Germany)

    2016-06-24

    We explore several novel LHC signatures arising from quark or lepton flavor violating couplings in the Higgs sector, and we constrain such couplings using LHC data. Since the largest signals are possible in channels involving top quarks or tau leptons, we consider in particular the following flavor violating processes: (1) pp→thh (top plus di-Higgs final state) arising from a dimension six coupling of up-type quarks to three insertions of the Higgs field. We develop a search strategy for this final state and demonstrate that detection is possible at the high luminosity LHC if flavor violating top-up-Higgs couplings are not too far below the current limit. (2) pp→tH{sup 0}, where H{sup 0} is the heavy neutral CP-even Higgs boson in a two Higgs doublet model (2HDM). We consider the decay channels H{sup 0}→tu,WW,ZZ,hh and use existing LHC data to constrain the first three of them. For the fourth, we adapt our search for the thh final state, and we demonstrate that in large regions of the parameter space, it is superior to other searches, including searches for flavor violating top quark decays (t→hq). (3) H{sup 0}→τμ, again in the context of a 2HDM. This channel is particularly well motivated by the recent CMS excess in h→τμ, and we use the data from this search to constrain the properties of H{sup 0}.

  12. A mini review on CP-violating minimal supersymmetric Standard

    Indian Academy of Sciences (India)

    We discuss the present status of the Higgs sector of the CP-violating minimal supersymmetric Standard Model (CPVMSSM). In the Standard Model (SM) of particle physics, the only source of CP violation is the complex phase in the Cabibbo–Kobayashi–Maskawa (CKM) matrix. By now we all know that this singlephase is ...

  13. Searching for QCD-violations in deep inelastic structure functions

    International Nuclear Information System (INIS)

    Avilez, C.; Garcia Canal, C.A.; Gay Ducati, M.B.; Martins Simoes, J.A.

    1979-01-01

    Due to the difficulties in extracting information from data of different experiments, a systematic procedure to look for QCD-violations in the Q 2 -dependence of F 2 is discussed. The validity of the Callan-Gross relation is assumed. The proposal is illustrated in a well-known model which implies QCD-violations

  14. Constraints on CP violating four-fermion interactions

    International Nuclear Information System (INIS)

    He, X.G.; McKellar, B.

    1996-04-01

    It has been shown that CP violating electron-nucleon and nucleon-nucleon interactions can induce atomic electric dipole moments and are therefore constrained from experimental data. We show that using the experimental upper bounds on neutron and electron electric dipole moments, one can also obtain constraints, in some cases better ones, on these interactions. In addition stringent constraints can also be obtained for muon-quark and tauon-quark four-fermion CP violating interactions, which cannot be constrained from atomic electric dipole moment experiments. 12 refs., 2 tabs., 1 fig

  15. Thermal fluctuations in a hyperscaling-violation background

    Energy Technology Data Exchange (ETDEWEB)

    Pourhassan, Behnam [Damghan University, School of Physics, Damghan (Iran, Islamic Republic of); Faizal, Mir [University of British Columbia-Okanagan, Irving K. Barber School of Arts and Sciences, Kelowna, BC (Canada); University of Lethbridge, Department of Physics and Astronomy, Lethbridge, AB (Canada); Upadhyay, Sudhaker [Indian Institute of Technology Kharagpur, Centre for Theoretical Studies, Kharagpur (India); Al Asfar, Lina [Universite Blaise Pascal, Laboratoire de Physique Corpusculaire de Clermont-Ferrand, Aubiere (France)

    2017-08-15

    In this paper, we study the effect of thermal fluctuations on the thermodynamics of a black geometry with hyperscaling violation. These thermal fluctuations in the thermodynamics of this system are produced from quantum corrections of geometry describing this system. We discuss the stability of this system using specific heat and the entire Hessian matrix of the free energy. We will analyze the effects of thermal fluctuations on the stability of this system. We also analyze the effects of thermal fluctuations on the criticality of the hyperscaling-violation background. (orig.)

  16. The seesaw path to leptonic CP violation

    CERN Document Server

    Caputo, A.; Kekic, M.; López-Pavón, J.; Salvado, J.

    2017-04-24

    Future experiments such as SHiP and high-intensity $e^+ e^-$ colliders will have a superb sensitivity to heavy Majorana neutrinos with masses below $M_Z$. We show that the measurement of the mixing to electrons and muons of one such state could imply the discovery of leptonic CP violation in the context of seesaw models. We quantify in the minimal model the CP discovery potential of these future experiments, and demonstrate that a 5$\\sigma$ CL discovery of leptonic CP violation would be possible in a very significant fraction of parameter space.

  17. CP Violation in b- and c-hadron decays at LHCb

    Science.gov (United States)

    Steinkamp, Olaf; LHCb Collaboration

    2017-07-01

    Testing the Standard Model of particle physics by precision measurements of CP violating observables in the decays of b and c hadrons has been one of the design goals of the LHCb experiment. World-leading measurements have been performed of the semileptonic asymmetry, {a}ssl, and of the mixing-induced CP-violating phase ϕs in the {B}s0{\\bar{B}}s0 system. The CKM angle γ is still the least known angle of the Unitarity Triangle, and the only one easily accessible using tree-level decays. A recent combination of LHCb measurements in various B → DK decay modes has yielded the most precise determination of γ from a single experiment to date. The LHCb experiment is collecting unprecedented samples of beauty baryons, allowing for the first time to study CP violating observables in their decays. A recent analysis provided the first evidence for CP violation in the beauty baryon sector. Finally, LHCb has the largest samples of charmed hadron decays collected by any experiment to date. These samples yield some of the world’s most sensitive searches for direct and indirect CP violation in the charm sector.

  18. Disgust and Anger Relate to Different Aggressive Responses to Moral Violations

    Science.gov (United States)

    Molho, Catherine; Tybur, Joshua M.; Güler, Ezgi; Balliet, Daniel; Hofmann, Wilhelm

    2017-01-01

    In response to the same moral violation, some people report experiencing anger, and others report feeling disgust. Do differences in emotional responses to moral violations reflect idiosyncratic differences in the communication of outrage, or do they reflect differences in motivational states? Whereas equivalence accounts suggest that anger and disgust are interchangeable expressions of condemnation, sociofunctional accounts suggest that they have distinct antecedents and consequences. We tested these accounts by investigating whether anger and disgust vary depending on the costs imposed by moral violations and whether they differentially correspond with aggressive tendencies. Results across four studies favor a sociofunctional account: When the target of a moral violation shifts from the self to another person, anger decreases, but disgust increases. Whereas anger is associated with high-cost, direct aggression, disgust is associated with less costly indirect aggression. Finally, whether the target of a moral violation is the self or another person influences direct aggression partially via anger and influences indirect aggression partially via disgust. PMID:28485700

  19. On the Universality of CP Violation in Delta F = 1 Processes

    CERN Document Server

    Gedalia, Oram; Ligeti, Zoltan; Perez, Gilad

    2012-01-01

    We show that new physics that breaks the left-handed SU(3)_Q quark flavor symmetry induces contributions to CP violation in Delta F = 1 processes which are approximately universal, in that they are not affected by flavor rotations between the up and the down mass bases. Therefore, such flavor violation cannot be aligned, and is constrained by the strongest bound from either the up or the down sectors. We use this result to show that the bound from eps'/eps prohibits an SU(3)_Q breaking explanation of the recent LHCb evidence for CP violation in D meson decays. Another consequence of this universality is that supersymmetric alignment models with a moderate mediation scale are consistent with the data, and are harder to probe via CP violating observables. With current constraints, therefore, squarks need not be degenerate. However, future improvements in the measurement of CP violation in D-Dbar mixing will start to probe alignment models.

  20. Large violation of Bell inequalities using both particle andwave measurements

    International Nuclear Information System (INIS)

    Cavalcanti, Daniel; Brunner, Nicolas; Skrzypczyk, Paul; Salles, Alejo; Scarani, Valerio

    2011-01-01

    When separated measurements on entangled quantum systems are performed, the theory predicts correlations that cannot be explained by any classical mechanism: communication is excluded because the signal should travel faster than light; preestablished agreement is excluded because Bell inequalities are violated. All optical demonstrations of such violations have involved discrete degrees of freedom and are plagued by the detection-efficiency loophole. A promising alternative is to use continuous variables combined with highly efficient homodyne measurements. However, all the schemes proposed so far use states or measurements that are extremely difficult to achieve, or they produce very weak violations. We present a simple method to generate large violations for feasible states using both photon counting and homodyne detections. The present scheme can also be used to obtain nonlocality from easy-to-prepare Gaussian states (e.g., two-mode squeezed state).

  1. Is CP violation observable in long baseline neutrino oscillation experiments?

    International Nuclear Information System (INIS)

    Tanimoto, M.

    1997-01-01

    We have studied CP violation originating from the phase of the neutrino-mixing matrix in the long baseline neutrino oscillation experiments. The direct measurement of CP violation is the difference of the transition probabilities between CP-conjugate channels. In those experiments, the CP-violating effect is not suppressed if the highest neutrino mass scale is taken to be 1 endash 5 eV, which is appropriate for the cosmological hot dark matter. Assuming the hierarchy for the neutrino masses, the upper bounds of CP violation have been calculated for three cases, in which mixings are constrained by the recent short baseline ones. The calculated upper bounds are larger than 10 -2 , which will be observable in the long baseline accelerator experiments. The matter effect, which is not CP invariant, has been also estimated in those experiments. copyright 1997 The American Physical Society

  2. 50 years of CP violation — What have we learned?

    Energy Technology Data Exchange (ETDEWEB)

    McKellar, Bruce H. J. [Centre of Excellence for Particle Physics at the Terrascale School of Physics, University of Melbourne, Australia 3010 (Australia)

    2015-04-24

    Early after the discovery of CP violation, the explanation of how the Standard Model of particle physics could allow CP violation was quickly given, but it took many years for the original observation to be unequivocally explained on that basis. It was also proposed that this observation opened up the possibility that we could now explain the fact that the universe is made of matter. Remarkably, 50 years later we have no evidence in particle physics that there is any CP violation except that of the Kobayashi Maskawa mechanism of the standard model. Yet we fail completely to explain the baryon asymmetry of the Universe through that mechanism. After reviewing the main points in the history I describe the present experimental attempts to find CP violation beyond the standard model, and explain the theoretical attempts to explain the matter in the Universe.

  3. Large violation of Bell inequalities using both particle andwave measurements

    Energy Technology Data Exchange (ETDEWEB)

    Cavalcanti, Daniel [Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543 (Singapore); Brunner, Nicolas; Skrzypczyk, Paul [H. H. Wills Physics Laboratory, University of Bristol, Tyndall Avenue, Bristol BS8 1TL (United Kingdom); Salles, Alejo [Niels Bohr Institute, Blegdamsvej 17, DK-2100 Copenhagen (Denmark); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543 (Singapore); Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542 (Singapore)

    2011-08-15

    When separated measurements on entangled quantum systems are performed, the theory predicts correlations that cannot be explained by any classical mechanism: communication is excluded because the signal should travel faster than light; preestablished agreement is excluded because Bell inequalities are violated. All optical demonstrations of such violations have involved discrete degrees of freedom and are plagued by the detection-efficiency loophole. A promising alternative is to use continuous variables combined with highly efficient homodyne measurements. However, all the schemes proposed so far use states or measurements that are extremely difficult to achieve, or they produce very weak violations. We present a simple method to generate large violations for feasible states using both photon counting and homodyne detections. The present scheme can also be used to obtain nonlocality from easy-to-prepare Gaussian states (e.g., two-mode squeezed state).

  4. How preschoolers react to norm violations is associated with culture.

    Science.gov (United States)

    Gampe, Anja; Daum, Moritz M

    2018-01-01

    Children from the age of 3years understand social norms as such and enforce these norms in interactions with others. Differences in parental and institutional education across cultures make it likely that children receive divergent information about how to act in cases of norm violations. In the current study, we investigated whether cultural values are associated with the ways in which children react to norm violations. We tested 80 bicultural 3-year-olds with a norm enforcement paradigm and analyzed their reactions to norm violations. The reactions were correlated to the children's parental cultural values using the Global Leadership and Organizational Behavior Effectiveness (GLOBE) scales, and these results show that parental culture was associated with children's reactions to norm violations. The three strongest correlations were found for institutional collectivism, performance orientation, and assertiveness. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. Systematic Approach to Gauge-Invariant Relations between Lepton Flavor Violating Processes

    CERN Document Server

    Ibarra, A; Redondo, J; Ibarra, Alejandro; Masso, Eduard; Redondo, Javier

    2005-01-01

    We analyze four-lepton contact interactions that lead to lepton flavor violating processes, with violation of individual family lepton number but total lepton number conserved. In an effective Lagrangian framework, the assumption of gauge invariance leads to relations among branching ratios and cross sections of lepton flavor violating processes. In this paper, we work out how to use these relations systematically. We also study the consequences of loop-induced processes.

  6. Parity violation in nuclei

    International Nuclear Information System (INIS)

    Robertson, R.G.H.

    1980-01-01

    A summary of parity violating effects in nuclei is given. Thanks to vigorous experimental and theoretical effort, it now appears that a reasonably well-defined value for the weak isovector π-nucleon coupling constant can be obtained. There is one major uncertainty in the analysis, namely the M2/E1 mixing ratio for the 2.79 MeV transition in 21 Ne. This quantity is virtually impossible to calculate reliably and must be measured. If it turns out to be much larger than 1, then a null result in 21 Ne is expected no matter what the weak interaction, so an experimental determination is urgently needed. The most promising approach is perhaps a measurement of the pair internal conversion coefficient. Of course, a direct measurement of a pure isovector case is highly desirable, and it is to be hoped that the four ΔT = 1 experiments will be pushed still further, and that improved calculations will be made for the 6 Li case. Nuclear parity violation seems to be rapidly approaching an interesting and useful synthesis

  7. Formulating weak CP-violation in terms of quark mass hierarchies

    International Nuclear Information System (INIS)

    Davidson, A.

    1982-06-01

    That physics which explains Cabibbo mixing is shown to also put a lower bound on Kobayashi-Maskawa CP-violation. The observed amount epsilon = 0.002 of CP-violation in the Ksub(L) - Ksub(S) system in turn sharply requires 25 GeV <= msub(t) <= 59 GeV; msub(t) being the top-quark mass. Assuming a vanishing weak (ala strong) CP-violation amplitude for msub(u) → 0, as strongly indicated by the data, epsilon is formulated as a second order quantity in the fermionic mass hierarchy. (author)

  8. Structural aspects of Lorentz-violating quantum field theory

    Science.gov (United States)

    Cambiaso, M.; Lehnert, R.; Potting, R.

    2018-01-01

    In the last couple of decades the Standard Model Extension has emerged as a fruitful framework to analyze the empirical and theoretical extent of the validity of cornerstones of modern particle physics, namely, of Special Relativity and of the discrete symmetries C, P and T (or some combinations of these). The Standard Model Extension allows to contrast high-precision experimental tests with posited alterations representing minute Lorentz and/or CPT violations. To date no violation of these symmetry principles has been observed in experiments, mostly prompted by the Standard-Model Extension. From the latter, bounds on the extent of departures from Lorentz and CPT symmetries can be obtained with ever increasing accuracy. These analyses have been mostly focused on tree-level processes. In this presentation I would like to comment on structural aspects of perturbative Lorentz violating quantum field theory. I will show that some insight coming from radiative corrections demands a careful reassessment of perturbation theory. Specifically I will argue that both the standard renormalization procedure as well as the Lehmann-Symanzik-Zimmermann reduction formalism need to be adapted given that the asymptotic single-particle states can receive quantum corrections from Lorentz-violating operators that are not present in the original Lagrangian.

  9. Leptogenesis and low energy CP-violation in neutrino physics

    International Nuclear Information System (INIS)

    Pascoli, S.; Petcov, S.T.; Riotto, A.

    2007-01-01

    Taking into account the recent progress in the understanding of the lepton flavor effects in leptogenesis, we investigate in detail the possibility that the CP-violation necessary for the generation of the baryon asymmetry of the Universe is due exclusively to the Dirac and/or Majorana CP-violating phases in the PMNS neutrino mixing matrix U, and thus is directly related to the low energy CP-violation in the lepton sector (e.g., in neutrino oscillations, etc.). We first derive the conditions of CP-invariance of the neutrino Yukawa couplings λ in the see-saw Lagrangian, and of the complex orthogonal matrix R in the 'orthogonal' parametrization of λ. We show, e.g. that under certain conditions (i) real R and specific CP-conserving values of the Majorana and Dirac phases can imply CP-violation, and (ii) purely imaginary R does not necessarily imply breaking of CP-symmetry. We study in detail the case of hierarchical heavy Majorana neutrino mass spectrum, presenting results for three possible types of light neutrino mass spectrum: (i) normal hierarchical, (ii) inverted hierarchical, and (iii) quasi-degenerate. Results in the alternative case of quasi-degenerate in mass heavy Majorana neutrinos, are also derived. The minimal supersymmetric extension of the standard theory with right-handed Majorana neutrinos and see-saw mechanism of neutrino mass generation is discussed as well. We illustrate the possible correlations between the baryon asymmetry of the Universe and (i) the rephasing invariant J CP controlling the magnitude of CP-violation in neutrino oscillations, or (ii) the effective Majorana mass in neutrinoless double beta decay, in the cases when the only source of CP-violation is respectively the Dirac or the Majorana phases in the neutrino mixing matrix

  10. Optimal quantum violation of Clauser–Horne–Shimony–Holt like steering inequality

    International Nuclear Information System (INIS)

    Roy, Arup; Sankar Bhattacharya, Some; Mukherjee, Amit; Banik, Manik

    2015-01-01

    We study a recently proposed Einstein–Podolsky–Rosen steering inequality (Cavalcanti et al 2015 J. Opt. Soc. Am. B 32 A74–A81). Analogous to Clauser–Horne–Shimony–Holt (CHSH) inequality for Bell nonlocality, in the simplest scenario, i.e., two parties, two measurements per party and two outcomes per measurement, this newly proposed inequality has been proved to be necessary and sufficient for steering. In this article we find the optimal violation amount of this inequality in quantum theory. Interestingly, the optimal violation amount matches with optimal quantum violation of CHSH inequality, i.e., Cirel’son quantity. We further study the optimal violation of this inequality for different classes of 2-qubit quantum states. (paper)

  11. CP-violating MSSM Higgs bosons in the light of LEP 2

    International Nuclear Information System (INIS)

    Carena, M.; Ellis, J.; Pilaftsis, A.; Wagner, C.E.M.

    2000-01-01

    In the MSSM, the CP parities of the neutral Higgs bosons may be mixed by radiative effects induced by explicit CP violation in the third generation of squarks. To allow for this possibility, we argue that the charged Higgs-boson mass and tanβ should be used to parametrize the MSSM Higgs sector. We introduce a new benchmark scenario of maximal CP violation appropriate for direct searches of CP-violating MSSM Higgs bosons. We show that the bounds established by LEP 2 on the MSSM Higgs sector may be substantially relaxed at low and intermediate values of tanβ in the presence of CP violation, and comment on possible Higgs boson signatures at LEP 2 within this framework.

  12. Bell's theorem, the measurement problem, Newton's self-gravitation and its connections to violations of the discrete symmetries C, P, T

    International Nuclear Information System (INIS)

    Hiesmayr, Beatrix C

    2015-01-01

    About 50 years ago John St. Bell published his famous Bell theorem that initiated a new field in physics. This contribution discusses how discrete symmetries relate to the big open questions of quantum mechanics, in particular:(i) how correlations stronger than those predicted by theories sharing randomness (Bell's theorem) relate to the violation of the CP symmetry and the P symmetry; and its relation to the security of quantum cryptography,(ii) how the measurement problem (“why do we observe no tables in superposition?”) can be polled in weakly decaying systems,(iii) how strongly and weakly interacting quantum systems are affected by Newton's self gravitation.These presented preliminary results show that the meson-antimeson systems and the hyperon- antihyperon systems are a unique laboratory to tackle deep fundamental questions and to contribute to the understand what impact the violation of discrete symmetries has. (paper)

  13. Optimal behaviour can violate the principle of regularity.

    Science.gov (United States)

    Trimmer, Pete C

    2013-07-22

    Understanding decisions is a fundamental aim of behavioural ecology, psychology and economics. The regularity axiom of utility theory holds that a preference between options should be maintained when other options are made available. Empirical studies have shown that animals violate regularity but this has not been understood from a theoretical perspective, such decisions have therefore been labelled as irrational. Here, I use models of state-dependent behaviour to demonstrate that choices can violate regularity even when behavioural strategies are optimal. I also show that the range of conditions over which regularity should be violated can be larger when options do not always persist into the future. Consequently, utility theory--based on axioms, including transitivity, regularity and the independence of irrelevant alternatives--is undermined, because even alternatives that are never chosen by an animal (in its current state) can be relevant to a decision.

  14. Risk assessment of safety violations for coal mines

    Energy Technology Data Exchange (ETDEWEB)

    Megan Orsulaka; Vladislav Kecojevicb; Larry Graysona; Antonio Nietoa [Pennsylvania State University, University Park, PA (United States). Dept of Energy and Mineral Engineering

    2010-09-15

    This article presents an application of a risk assessment approach in characterising the risks associated with safety violations in underground bituminous mines in Pennsylvania using the Mine Safety and Health Administration (MSHA) citation database. The MSHA database on citations provides an opportunity to assess risks in mines through scrutiny of violations of mandatory safety standards. In this study, quantitative risk assessment is performed, which allows determination of the frequency of occurrence of safety violations (through associated citations) as well as the consequences of them in terms of penalty assessments. Focus is on establishing risk matrices on citation experiences of mines, which can give early indication of emerging potentially serious problems. The resulting frequency, consequence and risk rankings present valuable tools for prioritising resource allocations, determining control strategies, and could potentially contribute to more proactive prevention of incidents and injuries.

  15. 32 CFR 552.96 - Violations.

    Science.gov (United States)

    2010-07-01

    .... Lewis Area Access Section or the Military Police as soon as possible. ... Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Fort Lewis Land Use Policy § 552.96 Violations. Anyone...

  16. Techniques for studies of unbinned model independent CP violation

    Energy Technology Data Exchange (ETDEWEB)

    Bedford, Nicholas; Weisser, Constantin; Parkes, Chris; Gersabeck, Marco; Brodzicka, Jolanta; Chen, Shanzhen [University of Manchester (United Kingdom)

    2016-07-01

    Charge-Parity (CP) violation is a known part of the Standard Model and has been observed and measured in both the B and K meson systems. The observed levels, however, are insufficient to explain the observed matter-antimatter asymmetry in the Universe, and so other sources need to be found. One area of current investigation is the D meson system, where predicted levels of CP violation are much lower than in the B and K meson systems. This means that more sensitive methods are required when searching for CP violation in this system. Several unbinned model independent methods have been proposed for this purpose, all of which need to be optimised and their sensitivities compared.

  17. Maximal Bell's inequality violation for non-maximal entanglement

    International Nuclear Information System (INIS)

    Kobayashi, M.; Khanna, F.; Mann, A.; Revzen, M.; Santana, A.

    2004-01-01

    Bell's inequality violation (BIQV) for correlations of polarization is studied for a product state of two two-mode squeezed vacuum (TMSV) states. The violation allowed is shown to attain its maximal limit for all values of the squeezing parameter, ζ. We show via an explicit example that a state whose entanglement is not maximal allow maximal BIQV. The Wigner function of the state is non-negative and the average value of either polarization is nil

  18. Parity violating electron scattering

    International Nuclear Information System (INIS)

    McKeown, R.D.

    1990-01-01

    Previous measurements of parity violation in electron scattering are reviewed with particular emphasis on experimental techniques. Significant progress in the attainment of higher precision is evident in these efforts. These pioneering experiments provide a basis for consideration of a future program of such measurements. In this paper some future plans and possibilities in this field are discussed

  19. Search for nonstandard model CP or T violation at the τ-charm factory

    International Nuclear Information System (INIS)

    Huang, T.; Lu, W.; Tao, Z.

    1997-01-01

    We systematically investigate the possibility of finding CP or T violation in the τ sector at the τ-charm factory. CP or T violation may occur in the τ pair production process, expressed as an electric dipole moment, and in τ decay processes. By assuming that an electric dipole moment as large as 10 -19 ecm and CP or T violation effects originating from τ decay as large as 10 -3 are observable at the τ-charm factory, we study all the possible extensions of the SM which are relevant for generating CP or T violation in the τ sector. And we point out, there are a few kinds of models which are hopeful candidates for generating such CP or T violation. For these models we consider all the theoretical and current experimental constraints and find that there exists some parameter space which will result in a measurable CP or T violation. Therefore we conclude that the τ-charm factory is a hopeful place to discover CP or T violation in the τ sector. copyright 1997 The American Physical Society

  20. The investigation of CP violation through the decay of polarized tau leptons II

    International Nuclear Information System (INIS)

    Tsai, Y.S.

    1996-05-01

    Under the assumption that CP violation is caused by exchange of anew boson, the authors propose to measure the magnitudes and CP-violating phases of the coupling constants of this boson to five different vertices in tau decay. This can be accomplished by studying the decay of polarized tau leptons produced at an e + e - collider whose beams are polarized. These five coupling constants could be used to construct a future theory of CP violation. If CP is violated in any channel of tau decay, it will imply that there exists a new charged boson other than the W boson responsible for CP violation. It will also imply that CP violation is much more prevalent than the standard theory predicts and this may enable one to understand the preponderance of matter over antimatter in the present universe

  1. 29 CFR 452.5 - Effect of violation on outcome.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Effect of violation on outcome. 452.5 Section 452.5 Labor... DISCLOSURE ACT OF 1959 General Considerations § 452.5 Effect of violation on outcome. Since the remedy under... affected the outcome of an election” 5 the Secretary as a matter of policy will not file suit to enforce...

  2. Flavored dark matter beyond Minimal Flavor Violation

    CERN Document Server

    Agrawal, Prateek; Gemmler, Katrin

    2014-10-13

    We study the interplay of flavor and dark matter phenomenology for models of flavored dark matter interacting with quarks. We allow an arbitrary flavor structure in the coupling of dark matter with quarks. This coupling is assumed to be the only new source of violation of the Standard Model flavor symmetry extended by a $U(3)_\\chi$ associated with the dark matter. We call this ansatz Dark Minimal Flavor Violation (DMFV) and highlight its various implications, including an unbroken discrete symmetry that can stabilize the dark matter. As an illustration we study a Dirac fermionic dark matter $\\chi$ which transforms as triplet under $U(3)_\\chi$, and is a singlet under the Standard Model. The dark matter couples to right-handed down-type quarks via a colored scalar mediator $\\phi$ with a coupling $\\lambda$. We identify a number of "flavor-safe" scenarios for the structure of $\\lambda$ which are beyond Minimal Flavor Violation. For dark matter and collider phenomenology we focus on the well-motivated case of $b$-...

  3. Black holes in Lorentz-violating gravity theories

    International Nuclear Information System (INIS)

    Barausse, Enrico; Sotiriou, Thomas P

    2013-01-01

    Lorentz symmetry and the notion of light cones play a central role in the definition of horizons and the existence of black holes. Current observations provide strong indications that astrophysical black holes do exist in Nature. Here we explore what happens to the notion of a black hole in gravity theories where local Lorentz symmetry is violated, and discuss the relevant astrophysical implications. Einstein-aether theory and Hořava gravity are used as the theoretical background for addressing this question. We review earlier results about static, spherically symmetric black holes, which demonstrate that in Lorentz-violating theories there can be a new type of horizon and, hence, a new notion of black hole. We also present both known and new results on slowly rotating black holes in these theories, which provide insights on how generic these new horizons are. Finally, we discuss the differences between black holes in Lorentz-violating theories and in General Relativity, and assess to what extent they can be probed with present and future observations. (paper)

  4. Polarized protons and parity violating asymmetries

    International Nuclear Information System (INIS)

    Trueman, T.L.

    1984-01-01

    The potential for utilizing parity violating effects, associated with polarized protons, to study the standard model, proton structure, and new physics at the SPS Collider is summarized. 24 references

  5. GraDit: graph-based data repair algorithm for multiple data edits rule violations

    Science.gov (United States)

    Ode Zuhayeni Madjida, Wa; Gusti Bagus Baskara Nugraha, I.

    2018-03-01

    Constraint-based data cleaning captures data violation to a set of rule called data quality rules. The rules consist of integrity constraint and data edits. Structurally, they are similar, where the rule contain left hand side and right hand side. Previous research proposed a data repair algorithm for integrity constraint violation. The algorithm uses undirected hypergraph as rule violation representation. Nevertheless, this algorithm can not be applied for data edits because of different rule characteristics. This study proposed GraDit, a repair algorithm for data edits rule. First, we use bipartite-directed hypergraph as model representation of overall defined rules. These representation is used for getting interaction between violation rules and clean rules. On the other hand, we proposed undirected graph as violation representation. Our experimental study showed that algorithm with undirected graph as violation representation model gave better data quality than algorithm with undirected hypergraph as representation model.

  6. Factoring the dispersion relation in the presence of Lorentz violation

    International Nuclear Information System (INIS)

    Colladay, Don; McDonald, Patrick; Mullins, David

    2010-01-01

    We produce an explicit formula for the dispersion relation for the Dirac equation in the standard model extension in the presence of Lorentz violation. Our expression is obtained using novel techniques which exploit the algebra of quaternions. The dispersion relation is found to conveniently factor in two special cases that each involve a mutually exclusive set of nonvanishing Lorentz-violating parameters. This suggests that a useful approach to studies of Lorentz-violating models is to split the parameter space into two separate pieces, each of which yields a simple, tractable dispersion relation that can be used for analysis.

  7. First Search for {ital CP} Violation in Tau Lepton Decay

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, S.; Kubota, Y.; Lee, S.J.; ONeill, J.J.; Poling, R.; Riehle, T.; Smith, A. [University of Minnesota, Minneapolis, Minnesota 55455 (United States); Alam, M.S.; Athar, S.B.; Ling, Z.; Mahmood, A.H.; Timm, S.; Wappler, F. [State University of New York at Albany, Albany, New York 12222 (United States); Anastassov, A.; Duboscq, J.E.; Fujino, D.; Gan, K.K.; Hart, T.; Honscheid, K.; Kagan, H.; Kass, R.; Lee, J.; Schwarthoff, H.; Spencer, M.B.; Sung, M.; Undrus, A.; Wolf, A.; Zoeller, M.M. [The Ohio State University, Columbus, Ohio 43210 (United States); Richichi, S.J.; Severini, H.; Skubic, P. [University of Oklahoma, Norman, Oklahoma 73019 (United States); Bishai, M.; Fast, J.; Hinson, J.W.; Menson, N.; Miller, D.H.; Shibata, E.I.; Shipsey, I.P.; Yurko, M. [Purdue University, West Lafayette, Indiana 47907 (United States); Glenn, S.; Kwon, Y.; Lyon, A.L.; Roberts, S.; Thorndike, E.H. [University of Rochester, Rochester, New York 14627 (United States); Jessop, C.P.; Lingel, K.; Marsiske, H.; Perl, M.L.; Savinov, V.; Ugolini, D.; Zhou, X. [Stanford Linear Accelerator Center, Stanford University, Stanford, California 94309 (United States); Coan, T.E.; Fadeyev, V.; Korolkov, I.; Maravin, Y.; Narsky, I.; Shelkov, V.; Staeck, J.; Stroynowski, R.; Volobouev, I.; Ye, J. [Southern Methodist University, Dallas, Texas 75275 (United States); Artuso, M.; Azfar, F.; Efimov, A.; Goldberg, M.; He, D.; Kopp, S.; Moneti, G.C.; Mountain, R.; Schuh, S.; Skwarnicki, T.; Stone, S.; Viehhauser, G.; Wang, J.C.; Xing, X. [Syracuse University, Syracuse, New York 13244 (United States); Bartelt, J.; Csorna, S.E.; Jain, V.; McLean, K.W.; Marka, S. [Vanderbilt University, Nashville, Tennessee 37235 (United States); Godang, R.; Kinoshita, K.; Lai, I.C.; Pomianowski, P.; Schrenk, S. [Virginia Polytechnic Institute and State University, Blacksburg, Virginia 24061 (United States); Bonvicini, G.; Cinabro, D.; Greene, R.; Perera, L.P.; Zhou, G.J. [Wayne State Univ., (United States)

    1998-11-01

    We have performed the first search for CP violation in tau lepton decay. CP violation in lepton decay does not occur in the minimal standard model but can occur in extensions such as the multi-Higgs doublet model. It appears as a characteristic difference between the {tau}{sup {minus}} and {tau}{sup +} decay angular distributions for the semileptonic decay modes such as {tau}{sup {minus}}{r_arrow}K{sup 0}{pi}{sup {minus}}{nu} . We define an observable asymmetry to exploit this and find no evidence for any CP violation. {copyright} {ital 1998} {ital The American Physical Society }

  8. Lorentz-violating theories in the standard model extension

    Energy Technology Data Exchange (ETDEWEB)

    Ferreira Junior, Manoel Messias [Universidade Federal do Maranhao (UFMA), Sao Luis, MA (Brazil)

    2012-07-01

    Full text: Lorentz-violating theories have been an issue of permanent interest in the latest years. Many of these investigations are developed under the theoretical framework of the Standard Model Extension (SME), a broad extension of the minimal Standard Model embracing Lorentz-violating (LV) terms, generated as vacuum expectation values of tensor quantities, in all sectors of interaction. In this talk, we comment on some general properties of the SME, concerning mainly the gauge and fermion sectors, focusing in new phenomena induced by Lorentz violation. The LV terms are usually separated in accordance with the behavior under discrete symmetries, being classified as CPT-odd or CPT-even, parity-even or parity-odd. We follow this classification scheme discussing some features and new properties of the CPT-even and CPT-odd parts of the gauge and fermion sectors. We finalize presenting some upper bounds imposed on the corresponding LV coefficients. (author)

  9. Lorentz Violation of the Photon Sector in Field Theory Models

    Directory of Open Access Journals (Sweden)

    Lingli Zhou

    2014-01-01

    Full Text Available We compare the Lorentz violation terms of the pure photon sector between two field theory models, namely, the minimal standard model extension (SME and the standard model supplement (SMS. From the requirement of the identity of the intersection for the two models, we find that the free photon sector of the SMS can be a subset of the photon sector of the minimal SME. We not only obtain some relations between the SME parameters but also get some constraints on the SMS parameters from the SME parameters. The CPT-odd coefficients (kAFα of the SME are predicted to be zero. There are 15 degrees of freedom in the Lorentz violation matrix Δαβ of free photons of the SMS related with the same number of degrees of freedom in the tensor coefficients (kFαβμν, which are independent from each other in the minimal SME but are interrelated in the intersection of the SMS and the minimal SME. With the related degrees of freedom, we obtain the conservative constraints (2σ on the elements of the photon Lorentz violation matrix. The detailed structure of the photon Lorentz violation matrix suggests some applications to the Lorentz violation experiments for photons.

  10. Driving violations and health promotion behaviors among undergraduate students: Self-report of on-road behavior.

    Science.gov (United States)

    Korn, Liat; Weiss, Yossi; Rosenbloom, Tova

    2017-11-17

    The purposes of this study are to characterize Israeli undergraduate students' driving violations in the terms of problem behavior theory and to identify whether there is any relationship between driving violations and health risk behaviors, daring behaviors, excitement seeking, and health promotion behaviors. This study is based on a structured self-reported anonymous questionnaire distributed to undergraduate students in an academic institution. The sample included 533 undergraduate students (374 females and 159 males). The mean age was 23.4 (SD = 1.4, range = 5). A higher prevalence of self-reported driving violations was found among males in comparison to females. All substance use measures were positively related to driving violations; for example, use of cigarettes (OR = 4.287, P driving violations. The strongest predictive factors for the frequent driving violations group were alcohol consumption-related variables: binge drinking (OR = 2.560, P driving violations group and selling or dealing drugs (12.143, P driving violations group was physical confrontation due to verbal disagreement (3.439, P driving violations was higher for subjects who reported intense physical workout regimens (OR = 1.638, P driving violations. This study shows that bachelors tend to be more involved in risk behaviors, such as substance use, excitement-seeking behaviors, and daring behaviors and are active physically and thus constitute a risk group for driving violations. As such, intervention resources should be directed toward this group.

  11. 76 FR 18467 - Pattern of Violations

    Science.gov (United States)

    2011-04-04

    ... Eastern Daylight Savings Time on April 18, 2011. ADDRESSES: Submit comments by any of the following... proposed rule addressing Pattern of Violations (POV). This extension gives commenters additional time to...

  12. Particularly compliance violations in patients with diabetes mellitus of 2nd type

    Directory of Open Access Journals (Sweden)

    V. V. Chugunov

    2017-04-01

    Full Text Available Aim: to investigate and establish the specific complains violations in patients with diabetes mellitus (DM of 2nd type. Materials and methods: 543 patients with DM of 2nd type were examined; the disease duration ranged from 2 to 27 years, average – (14.58 ± 1.82 years. Research methods: clinical-anamnestic, clinical-psychopathological, psycho diagnostic, statistical. Research results. We found that compliance to therapy in patients with DM of 2nd type was broken in 90.49 % of cases. We highlighted three options for compliance violations to DM therapy of 2nd type: dismedication (to 68.14 %, disdiet (88.40 % and disexercise (90.49 %. The sub-variants of dismedication compliance violations to DM therapy of 2nd type was hyper-curation type (8.29 %, which was developed according to surplus of appointments execution and hypo-curation type (59.85 %, which was developed according to deficiency of appointments execution. Among them it was possible to distinguish a third – mixed version (7.37 %, which brings together episodes of the surplus and the deficit of medical drugs usage. The sub-options of disdiet option of compliance violations was hyper-curation type (1.66 %, which manifested itself in pathologically excessive rejection of food and hypo-curation type (86.74 %, which manifested itself in a disregard for the restrictions in the diet. Disexercise variant of compliance violations was possible to divide into hyper-curation type (4,24 %, manifested in excessive physical activity and, in its turn, had three subtypes – inceptional (1.66 %, sub-hyper-curation (1.10 % and procurationis (1.47 %, and hypo-curation type of compliance violations (87.48 %, which manifested itself in a disregard of physical exertion. Dominance of disdiet and disexercise compliance violations among patients with DM of 2nd type (χ2 = 117.258, p < 0.01, dismedication option among patients of all hyper-curation types of compliance violations with DM of 2nd type (χ2 = 26

  13. Young children remedy second- and third-party ownership violations.

    Science.gov (United States)

    Van de Vondervoort, Julia W; Hamlin, J Kiley

    2015-09-01

    When responding to ownership violations, children can focus on the victim's needs, the perpetrator's punishment, or both. Recent studies show that 3- and 5-year-olds are equally likely to respond to second- and third-party violations, and 3-year-olds return objects to their rightful owners. Children's interventions are consistent with justice for victims. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Right-handed neutrinos and T-violating, P-conserving interactions

    Directory of Open Access Journals (Sweden)

    Basem Kamal El-Menoufi

    2017-02-01

    Full Text Available We show that experimental probes of the P-conserving, T-violating triple correlation in polarized neutron or nuclear β-decay provide a unique probe of possible T-violation at the TeV scale in the presence of right-handed neutrinos. In contrast to other possible sources of semileptonic T-violation involving only left-handed neutrinos, those involving right-handed neutrinos are relatively unconstrained by present limits on the permanent electric dipole moments of the electron, neutral atoms, and the neutron. On the other hand, LHC results for pp→e+ missing transverse energy imply that an order of magnitude of improvement in D-coefficient sensitivity would be needed for discovery. Finally, we discuss the interplay with the scale of neutrino mass and naturalness considerations.

  15. 48 CFR 403.405 - Misrepresentations or violations of the Covenant Against Contingent Fees.

    Science.gov (United States)

    2010-10-01

    ... violations of the Covenant Against Contingent Fees. 403.405 Section 403.405 Federal Acquisition Regulations... Contingent Fees 403.405 Misrepresentations or violations of the Covenant Against Contingent Fees. (a) A suspected misrepresentation or violation of the Covenant Against Contingent Fees shall be documented in...

  16. Parity violation in the compound nucleus

    International Nuclear Information System (INIS)

    Bowman, J.D.; Frankle, C.M.; Green, A.A.

    1994-01-01

    The status of parity violation in the compound nucleus is reviewed. The results of previous experimental results obtained by scattering polarized epithermal neutrons from heavy nuclei in the 3-p and 4-p p-wave strength function peaks are presented. Experimental techniques are presented. The extraction of the mean squared matrix element of the parity-violating interaction, M 2 , between compound-nuclear levels and the relationship of M 2 to the coupling strengths in the meson exchange weak nucleon-nucleon potential are discussed. The tendency of measured asymmetries to have a common sign and theoretical implications are discussed. New experimental results are presented that show that the common sign phenomenon is not universal, as theoretical models developed up to now would predict

  17. Scaling violation in QCD

    International Nuclear Information System (INIS)

    Furmanski, W.

    1981-08-01

    The effects of scaling violation in QCD are discussed in the perturbative scheme, based on the factorization of mass singularities in the light-like gauge. Some recent applications including the next-to-leading corrections are presented (large psub(T) scattering, numerical analysis of the leptoproduction data). A proposal is made for extending the method on the higher twist sector. (author)

  18. Fiber-optic perimeter security system based on WDM technology

    Science.gov (United States)

    Polyakov, Alexandre V.

    2017-10-01

    Intelligent underground fiber optic perimeter security system is presented. Their structure, operation, software and hardware with neural networks elements are described. System allows not only to establish the fact of violation of the perimeter, but also to locate violations. This is achieved through the use of WDM-technology division spectral information channels. As used quasi-distributed optoelectronic recirculation system as a discrete sensor. The principle of operation is based on registration of the recirculation period change in the closed optoelectronic circuit at different wavelengths under microstrain exposed optical fiber. As a result microstrain fiber having additional power loss in a fiber optical propagating pulse, which causes a time delay as a result of switching moments of the threshold device. To separate the signals generated by intruder noise and interference, the signal analyzer is used, based on the principle of a neural network. The system detects walking, running or crawling intruder, as well as undermining attempts to register under the perimeter line. These alarm systems can be used to protect the perimeters of facilities such as airports, nuclear reactors, power plants, warehouses, and other extended territory.

  19. Violations of Management Principles within Academe.

    Science.gov (United States)

    Sikula, Andrew F.; Sikula, John P.

    1980-01-01

    Principles of effective management commonly violated by educational institutions include: (1) unity of command; (2) division or specialization of labor; (3) delegation of authority; and (4) authority equal to responsibility. (JMF)

  20. Search for R-parity violating decays of sfermions at LEP

    CERN Document Server

    Abbiendi, G.; Akesson, P.F.; Alexander, G.; Allison, John; Amaral, P.; Anagnostou, G.; Anderson, K.J.; Arcelli, S.; Asai, S.; Axen, D.; Azuelos, G.; Bailey, I.; Barberio, E.; Barlow, R.J.; Batley, R.J.; Bechtle, P.; Behnke, T.; Bell, Kenneth Watson; Bell, P.J.; Bella, G.; Bellerive, A.; Benelli, G.; Bethke, S.; Biebel, O.; Boeriu, O.; Bock, P.; Boutemeur, M.; Braibant, S.; Brigliadori, L.; Brown, Robert M.; Buesser, K.; Burckhart, H.J.; Campana, S.; Carnegie, R.K.; Caron, B.; Carter, A.A.; Carter, J.R.; Chang, C.Y.; Charlton, David G.; Csilling, A.; Cuffiani, M.; Dado, S.; De Roeck, A.; De Wolf, E.A.; Desch, K.; Dienes, B.; Donkers, M.; Dubbert, J.; Duchovni, E.; Duckeck, G.; Duerdoth, I.P.; Etzion, E.; Fabbri, F.; Feld, L.; Ferrari, P.; Fiedler, F.; Fleck, I.; Ford, M.; Frey, A.; Furtjes, A.; Gagnon, P.; Gary, John William; Gaycken, G.; Geich-Gimbel, C.; Giacomelli, G.; Giacomelli, P.; Giunta, Marina; Goldberg, J.; Gross, E.; Grunhaus, J.; Gruwe, M.; Gunther, P.O.; Gupta, A.; Hajdu, C.; Hamann, M.; Hanson, G.G.; Harder, K.; Harel, A.; Harin-Dirac, M.; Hauschild, M.; Hawkes, C.M.; Hawkings, R.; Hemingway, R.J.; Hensel, C.; Herten, G.; Heuer, R.D.; Hill, J.C.; Hoffman, Kara Dion; Horvath, D.; Igo-Kemenes, P.; Ishii, K.; Jeremie, H.; Jovanovic, P.; Junk, T.R.; Kanaya, N.; Kanzaki, J.; Karapetian, G.; Karlen, D.; Kawagoe, K.; Kawamoto, T.; Keeler, R.K.; Kellogg, R.G.; Kennedy, B.W.; Kim, D.H.; Klein, K.; Klier, A.; Kluth, S.; Kobayashi, T.; Kobel, M.; Komamiya, S.; Kormos, Laura L.; Kramer, T.; Krieger, P.; von Krogh, J.; Kruger, K.; Kuhl, T.; Kupper, M.; Lafferty, G.D.; Landsman, H.; Lanske, D.; Layter, J.G.; Leins, A.; Lellouch, D.; Letts, J.; Levinson, L.; Lillich, J.; Lloyd, S.L.; Loebinger, F.K.; Lu, J.; Ludwig, J.; Macpherson, A.; Mader, W.; Marcellini, S.; Martin, A.J.; Masetti, G.; Mashimo, T.; Mattig, Peter; McDonald, W.J.; McKenna, J.; McMahon, T.J.; McPherson, R.A.; Meijers, F.; Menges, W.; Merritt, F.S.; Mes, H.; Michelini, A.; Mihara, S.; Mikenberg, G.; Miller, D.J.; Moed, S.; Mohr, W.; Mori, T.; Mutter, A.; Nagai, K.; Nakamura, I.; Nanjo, H.; Neal, H.A.; Nisius, R.; O'Neale, S.W.; Oh, A.; Okpara, A.; Oreglia, M.J.; Orito, S.; Pahl, C.; Pasztor, G.; Pater, J.R.; Patrick, G.N.; Pilcher, J.E.; Pinfold, J.; Plane, David E.; Poli, B.; Polok, J.; Pooth, O.; Przybycien, M.; Quadt, A.; Rabbertz, K.; Rembser, C.; Renkel, P.; Rick, H.; Roney, J.M.; Rosati, S.; Rozen, Y.; Runge, K.; Sachs, K.; Saeki, T.; Sarkisyan, E.K.G.; Schaile, A.D.; Schaile, O.; Scharff-Hansen, P.; Schieck, J.; Schoerner-Sadenius, Thomas; Schroder, Matthias; Schumacher, M.; Schwick, C.; Scott, W.G.; Seuster, R.; Shears, T.G.; Shen, B.C.; Sherwood, P.; Siroli, G.; Skuja, A.; Smith, A.M.; Sobie, R.; Soldner-Rembold, S.; Spano, F.; Stahl, A.; Stephens, K.; Strom, David M.; Strohmer, R.; Tarem, S.; Tasevsky, M.; Taylor, R.J.; Teuscher, R.; Thomson, M.A.; Torrence, E.; Toya, D.; Tran, P.; Trigger, I.; Trocsanyi, Z.; Tsur, E.; Turner-Watson, M.F.; Ueda, I.; Ujvari, B.; Vollmer, C.F.; Vannerem, P.; Vertesi, R.; Verzocchi, M.; Voss, H.; Vossebeld, J.; Waller, D.; Ward, C.P.; Ward, D.R.; Warsinsky, M.; Watkins, P.M.; Watson, A.T.; Watson, N.K.; Wells, P.S.; Wengler, T.; Wermes, N.; Wetterling, D.; Wilson, G.W.; Wilson, J.A.; Wolf, G.; Wyatt, T.R.; Yamashita, S.; Zer-Zion, D.; Zivkovic, Lidija

    2004-01-01

    A search for pair-produced scalar fermions under the assumption that R-parity is not conserved has been performed using data collected with the OPAL detector at LEP. The data samples analysed correspond to an integrated luminosity of about 610 pb-1 collected at centre-of-mass energies of sqrt(s) 189-209 GeV. An important consequence of R-parity violation is that the lightest supersymmetric particle is expected to be unstable. Searches of R-parity violating decays of charged sleptons, sneutrinos and squarks have been performed under the assumptions that the lightest supersymmetric particle decays promptly and that only one of the R-parity violating couplings is dominant for each of the decay modes considered. Such processes would yield final states consisting of leptons, jets, or both with or without missing energy. No significant single-like excess of events has been observed with respect to the Standard Model expectations. Limits on the production cross- section of scalar fermions in R-parity violating scena...

  1. In defense of commitment: The curative power of violated expectations.

    Science.gov (United States)

    Murray, Sandra L; Lamarche, Veronica M; Gomillion, Sarah; Seery, Mark D; Kondrak, Cheryl

    2017-11-01

    A new model of commitment defense in romantic relationships is proposed. It assumes that relationships afford a central resource for affirming meaning and purpose in the world. Consequently, violating expectations about the world outside the relationship can precipitate commitment defense inside the relationship. A meta-analysis of 5 experiments, 2 follow-up correlational studies, and a longitudinal study of the transition to first parenthood supported the model. Experimentally violating conventional expectations about the world (e.g., "hard work pays off") motivated less satisfied people to defensively affirm their commitment. Similarly, when becoming a parent naturalistically violated culturally conditioned gendered expectations about the division of household labor, less satisfied new mothers and fathers defensively affirmed their commitment from pre-to-post baby. The findings suggest that violating expected associations in the world outside the relationship motivates vulnerable people to set relationship their relationship right, thereby affirming expected associations in the relationship in the face of an unexpected world. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  2. Realizing total reciprocity violation in the phase for photon scattering.

    Science.gov (United States)

    Deák, László; Bottyán, László; Fülöp, Tamás; Merkel, Dániel Géza; Nagy, Dénes Lajos; Sajti, Szilárd; Schulze, Kai Sven; Spiering, Hartmut; Uschmann, Ingo; Wille, Hans-Christian

    2017-02-22

    Reciprocity is when wave or quantum scattering satisfies a symmetry property, connecting a scattering process with the reversed one. While reciprocity involves the interchange of source and detector, it is fundamentally different from rotational invariance, and is a generalization of time reversal invariance, occurring in absorptive media as well. Due to its presence at diverse areas of physics, it admits a wide variety of applications. For polarization dependent scatterings, reciprocity is often violated, but violation in the phase of the scattering amplitude is much harder to experimentally observe than violation in magnitude. Enabled by the advantageous properties of nuclear resonance scattering of synchrotron radiation, we have measured maximal, i.e., 180-degree, reciprocity violation in the phase. For accessing phase information, we introduced a new version of stroboscopic detection. The scattering setting was devised based on a generalized reciprocity theorem that opens the way to construct new types of reciprocity related devices.

  3. Observation of CP violation in the B(0) meson system.

    Science.gov (United States)

    Aubert, B; Boutigny, D; Gaillard, J M; Hicheur, A; Karyotakis, Y; Lees, J P; Robbe, P; Tisserand, V; Palano, A; Chen, G P; Chen, J C; Qi, N D; Rong, G; Wang, P; Zhu, Y S; Eigen, G; Reinertsen, P L; Stugu, B; Abbott, B; Abrams, G S; Borgland, A W; Breon, A B; Brown, D N; Button-Shafer, J; Cahn, R N; Clark, A R; Gill, M S; Gritsan, A V; Groysman, Y; Jacobsen, R G; Kadel, R W; Kadyk, J; Kerth, L T; Kluth, S; Kolomensky, Y G; Kral, J F; LeClerc, C; Levi, M E; Liu, T; Lynch, G; Meyer, A B; Momayezi, M; Oddone, P J; Perazzo, A; Pripstein, M; Roe, N A; Romosan, A; Ronan, M T; Shelkov, V G; Telnov, A V; Wenzel, W A; Zisman, M S; Bright-Thomas, P G; Harrison, T J; Hawkes, C M; Knowles, D J; O'Neale, S W; Penny, R C; Watson, A T; Watson, N K; Deppermann, T; Goetzen, K; Koch, H; Krug, J; Kunze, M; Lewandowski, B; Peters, K; Schmuecker, H; Steinke, M; Andress, J C; Barlow, N R; Bhimji, W; Chevalier, N; Clark, P J; Cottingham, W N; De Groot, N; Dyce, N; Foster, B; McFall, J D; Wallom, D; Wilson, F F; Abe, K; Hearty, C; Mattison, T S; McKenna, J A; Thiessen, D; Jolly, S; McKemey, A K; Tinslay, J; Blinov, V E; Bukin, A D; Bukin, D A; Buzykaev, A R; Golubev, V B; Ivanchenko, V N; Korol, A A; Kravchenko, E A; Onuchin, A P; Salnikov, A A; Serednyakov, S I; Skovpen, Y I; Telnov, V I; Yushkov, A N; Best, D; Lankford, A J; Mandelkern, M; McMahon, S; Stoker, D P; Ahsan, A; Arisaka, K; Buchanan, C; Chun, S; Branson, J G; MacFarlane, D B; Prell, S; Rahatlou, S; Raven, G; Sharma, V; Campagnari, C; Dahmes, B; Hart, P A; Kuznetsova, N; Levy, S L; Long, O; Lu, A; Richman, J D; Verkerke, W; Witherell, M; Yellin, S; Beringer, J; Dorfan, D E; Eisner, A M; Frey, A; Grillo, A A; Grothe, M; Heusch, C A; Johnson, R P; Kroeger, W; Lockman, W S; Pulliam, T; Sadrozinski, H; Schalk, T; Schmitz, R E; Schumm, B A; Seiden, A; Turri, M; Walkowiak, W; Williams, D C; Wilson, M G; Chen, E; Dubois-Felsmann, G P; Dvoretskii, A; Hitlin, D G; Metzler, S; Oyang, J; Porter, F C; Ryd, A; Samuel, A; Weaver, M; Yang, S; Zhu, R Y; Devmal, S; Geld, T L; Jayatilleke, S; Mancinelli, G; Meadows, B T; Sokoloff, M D; Barillari, T; Bloom, P; Dima, M O; Fahey, S; Ford, W T; Johnson, D R; Nauenberg, U; Olivas, A; Park, H; Rankin, P; Roy, J; Sen, S; Smith, J G; van Hoek, W C; Wagner, D L; Blouw, J; Harton, J L; Krishnamurthy, M; Soffer, A; Toki, W H; Wilson, R J; Zhang, J; Brandt, T; Brose, J; Colberg, T; Dahlinger, G; Dickopp, M; Dubitzky, R S; Hauke, A; Maly, E; Müller-Pfefferkorn, R; Otto, S; Schubert, K R; Schwierz, R; Spaan, B; Wilden, L; Behr, L; Bernard, D; Bonneaud, G R; Brochard, F; Cohen-Tanugi, J; Ferrag, S; Roussot, E; T'Jampens, S; Thiebaux, C; Vasileiadis, G; Verderi, M; Anjomshoaa, A; Bernet, R; Khan, A; Lavin, D; Muheim, F; Playfer, S; Swain, J E; Falbo, M; Borean, C; Bozzi, C; Dittongo, S; Folegani, M; Piemontese, L; Treadwell, E; Anulli, F; Baldini-Ferroli, R; Calcaterra, A; de Sangro, R; Falciai, D; Finocchiaro, G; Patteri, P; Peruzzi, I M; Piccolo, M; Xie, Y; Zallo, A; Bagnasco, S; Buzzo, A; Contri, R; Crosetti, G; Fabbricatore, P; Farinon, S; Lo Vetere, M; Macri, M; Monge, M R; Musenich, R; Pallavicini, M; Parodi, R; Passaggio, S; Pastore, F C; Patrignani, C; Pia, M G; Priano, C; Robutti, E; Santroni, A; Morii, M; Bartoldus, R; Dignan, T; Hamilton, R; Mallik, U; Cochran, J; Crawley, H B; Fischer, P A; Lamsa, J; Meyer, W T; Rosenberg, E I; Benkebil, M; Grosdidier, G; Hast, C; Höcker, A; Lacker, H M; Laplace, S; Lepeltier, V; Lutz, A M; Plaszczynski, S; Schune, M H; Trincaz-Duvoid, S; Valassi, A; Wormser, G; Bionta, R M; Brigljević, V; Lange, D J; Mugge, M; Shi, X; van Bibber, K; Wenaus, T J; Wright, D M; Wuest, C R; Carroll, M; Fry, J R; Gabathuler, E; Gamet, R; George, M; Kay, M; Payne, D J; Sloane, R J; Touramanis, C; Aspinwall, M L; Bowerman, D A; Dauncey, P D; Egede, U; Eschrich, I; Gunawardane, N J; Nash, J A; Sanders, P; Smith, D; Azzopardi, D E; Back, J J; Dixon, P; Harrison, P F; Potter, R J; Shorthouse, H W; Strother, P; Vidal, P B; Williams, M I; Cowan, G; George, S; Green, M G; Kurup, A; Marker, C E; McGrath, P; McMahon, T R; Ricciardi, S; Salvatore, F; Scott, I; Vaitsas, G; Brown, D; Davis, C L; Allison, J; Barlow, R J; Boyd, J T; Forti, A C; Fullwood, J; Jackson, F; Lafferty, G D; Savvas, N; Simopoulos, E T; Weatherall, J H; Farbin, A; Jawahery, A; Lillard, V; Olsen, J; Roberts, D A; Schieck, J R; Blaylock, G; Dallapiccola, C; Flood, K T; Hertzbach, S S; Kofler, R; Moore, T B; Staengle, H; Willocq, S; Brau, B; Cowan, R; Sciolla, G; Taylor, F; Yamamoto, R K; Milek, M; Patel, P M; Trischuk, J; Lanni, F; Palombo, F; Bauer, J M; Booke, M; Cremaldi, L; Eschenburg, V; Kroeger, R; Reidy, J; Sanders, D A; Summers, D J; Martin, J P; Nief, J Y; Seitz, R; Taras, P; Zacek, V; Nicholson, H; Sutton, C S; Cartaro, C; Cavallo, N; De Nardo, G; Fabozzi, F; Gatto, C; Lista, L; Paolucci, P; Piccolo, D; Sciacca, C; LoSecco, J M; Alsmiller, J R; Gabriel, T A; Handler, T; Brau, J; Frey, R; Iwasaki, M; Sinev, N B; Strom, D; Colecchia, F; Dal Corso, F; Dorigo, A; Galeazzi, F; Margoni, M; Michelon, G; Morandin, M; Posocco, M; Rotondo, M; Simonetto, F; Stroili, R; Torassa, E; Voci, C; Benayoun, M; Briand, H; Chauveau, J; David, P; de La Vaissière, C; Del Buono, L; Hamon, O; Le Diberder, F; Leruste, P; Lory, J; Roos, L; Stark, J; Versillé, S; Manfredi, P F; Re, V; Speziali, V; Frank, E D; Gladney, L; Guo, Q H; Panetta, J H; Angelini, C; Batignani, G; Bettarini, S; Bondioli, M; Carpinelli, M; Forti, F; Giorgi, M A; Lusiani, A; Martinez-Vidal, F; Morganti, M; Neri, N; Paoloni, E; Rama, M; Rizzo, G; Sandrelli, F; Simi, G; Triggiani, G; Walsh, J; Haire, M; Judd, D; Paick, K; Turnbull, L; Wagoner, D E; Albert, J; Bula, C; Elmer, P; Lu, C; McDonald, K T; Miftakov, V; Schaffner, S F; Smith, A J; Tumanov, A; Varnes, E W; Cavoto, G; del Re, D; Faccini, R; Ferrarotto, F; Ferroni, F; Fratini, K; Lamanna, E; Leonardi, E; Mazzoni, M A; Morganti, S; Piredda, G; Safai Tehrani, F; Serra, M; Voena, C; Christ, S; Waldi, R; Adye, T; Franek, B; Geddes, N I; Gopal, G P; Xella, S M; Aleksan, R; De Domenico, G; Emery, S; Gaidot, A; Ganzhur, S F; Giraud, P F; Hamel De Monchenault, G; Kozanecki, W; Langer, M; London, G W; Mayer, B; Serfass, B; Vasseur, G; Yèche, C; Zito, M; Copty, N; Purohit, M V; Singh, H; Yumiceva, F X; Adam, I; Anthony, P L; Aston, D; Baird, K; Berger, J P; Bloom, E; Boyarski, A M; Bulos, F; Calderini, G; Claus, R; Convery, M R; Coupal, D P; Coward, D H; Dorfan, J; Dorser, M; Dunwoodie, W; Field, R C; Glanzman, T; Godfrey, G L; Gowdy, S J; Grosso, P; Himel, T; Hryn'ova, T; Huffer, M E; Innes, W R; Jessop, C P; Kelsey, M H; Kim, P; Kocian, M L; Langennegger, U; Leith, D W; Luitz, S; Luth, V; Lynch, H L; Marsiske, H; Menke, S; Messner, R; Moffeit, K C; Mount, R; Muller, D R; O'Grady, C P; Perl, M; Petrak, S; Quinn, H; Ratcliff, B N; Robertson, S H; Rochester, L S; Roodman, A; Schietinger, T; Schindler, R H; Schwiening, J; Seeman, J T; Serbo, V V; Snyder, S R; Soha, A; Spanier, S M; Stelzer, J; Su, D; Sullivan, M K; Tanaka, H A; Va'vra, J; Wagner, S R; Weinstein, A J; Wienands, U; Wisniewski, W J; Wright, D H; Young, C C; Burchat, P R; Cheng, C H; Kirkby, D; Meyer, T I; Roat, C; Henderson, R; Bugg, W; Cohn, H; Weidemann, A W; Izen, J M; Kitayama, I; Lou, X C; Turcotte, M; Bianchi, F; Bona, M; DiGirolamo, B; Gamba, D; Smol, A; Zanin, D; Bosisio, L; Della Ricci, G; Lanceri, L; Pompili, A; Poropat, P; Vuagnin, G; Panvini, R S; Brown, C M; De Silva, A; Kowalewski, R; Roney, J M; Band, H R; Charles, E; Dasu, S; Di Lodovico, F; Eichenbaum, A M; Hu, H; Johnson, J R; Liu, R; Nielsen, J; Pan, Y; Prepost, R; Scott, I J; Sekula, S J; von Wimmersperg-Toeller, J H; Wu, S L; Zobernig, H; Kordich, T M; Neal, H

    2001-08-27

    We present an updated measurement of time-dependent CP-violating asymmetries in neutral B decays with the BABAR detector at the PEP-II asymmetric B Factory at SLAC. This result uses an additional sample of Upsilon(4S) decays collected in 2001, bringing the data available to 32 x 10(6) BB macro pairs. We select events in which one neutral B meson is fully reconstructed in a final state containing charmonium and the flavor of the other neutral B meson is determined from its decay products. The amplitude of the CP-violating asymmetry, which in the standard model is proportional to sin2 beta, is derived from the decay time distributions in such events. The result sin2 beta = 0.59+/-0.14(stat)+/-0.05(syst) establishes CP violation in the B(0) meson system. We also determine absolute value of lambda = 0.93+/-0.09(stat)+/-0.03(syst), consistent with no direct CP violation.

  4. Modeling Psychological Contract Violation using Dual Regime Models: An Event-based Approach.

    Science.gov (United States)

    Hofmans, Joeri

    2017-01-01

    A good understanding of the dynamics of psychological contract violation requires theories, research methods and statistical models that explicitly recognize that violation feelings follow from an event that violates one's acceptance limits, after which interpretative processes are set into motion, determining the intensity of these violation feelings. Whereas theories-in the form of the dynamic model of the psychological contract-and research methods-in the form of daily diary research and experience sampling research-are available by now, the statistical tools to model such a two-stage process are still lacking. The aim of the present paper is to fill this gap in the literature by introducing two statistical models-the Zero-Inflated model and the Hurdle model-that closely mimic the theoretical process underlying the elicitation violation feelings via two model components: a binary distribution that models whether violation has occurred or not, and a count distribution that models how severe the negative impact is. Moreover, covariates can be included for both model components separately, which yields insight into their unique and shared antecedents. By doing this, the present paper offers a methodological-substantive synergy, showing how sophisticated methodology can be used to examine an important substantive issue.

  5. SmartCop: Enabling Smart Traffic Violations Ticketing in Vehicular Named Data Networks

    Directory of Open Access Journals (Sweden)

    Syed Hassan Ahmed

    2016-01-01

    Full Text Available Recently, various applications for Vehicular Ad hoc Networks (VANETs have been proposed and smart traffic violation ticketing is one of them. On the other hand, the new Information-Centric Networking (ICN architectures have emerged and been investigated into VANETs, such as Vehicular Named Data Networking (VNDN. However, the existing applications in VANETs are not suitable for VNDN paradigm due to the dependency on a “named content” instead of a current “host-centric” approach. Thus, we need to design the emerging and new architectures for VNDN applications. In this paper, we propose a smart traffic violation ticketing (TVT system for VNDN, named as SmartCop, that enables a cop vehicle (CV to issue tickets for traffic violation(s to the offender(s autonomously, once they are in the transmission range of that CV. The ticket issuing delay, messaging cost, and percentage of violations detected for varying number of vehicles, violators, CVs, and vehicles speeds are estimated through simulations. In addition, we provide a road map of future research directions for enabling safe driving experience in future cars aided with VNDN technology.

  6. Nuclear isospin mixing and elastic parity-violating electron scattering

    International Nuclear Information System (INIS)

    Moreno, O.; Sarriguren, P.; Moya de Guerra, E.; Udias, J.M.; Donnelly, T.W.; Sick, I.

    2009-01-01

    The influence of nuclear isospin mixing on parity-violating elastic electron scattering is studied for the even-even, N=Z nuclei 12 C, 24 Mg, 28 Si, and 32 S. Their ground-state wave functions have been obtained using a self-consistent axially-symmetric mean-field approximation with density-dependent effective two-body Skyrme interactions. Some differences from previous shell-model calculations appear for the isovector Coulomb form factors which play a role in determining the parity-violating asymmetry. To gain an understanding of how these differences arise, the results have been expanded in a spherical harmonic oscillator basis. Results are obtained not only within the plane-wave Born approximation, but also using the distorted-wave Born approximation for comparison with potential future experimental studies of parity-violating electron scattering. To this end, for each nucleus the focus is placed on kinematic ranges where the signal (isospin-mixing effects on the parity-violating asymmetry) and the experimental figure-of-merit are maximized. Strangeness contributions to the asymmetry are also briefly discussed, since they and the isospin mixing contributions may play comparable roles for the nuclei being studied at the low momentum transfers of interest in the present work.

  7. Application of HGSO to security based optimal placement and parameter setting of UPFC

    International Nuclear Information System (INIS)

    Tarafdar Hagh, Mehrdad; Alipour, Manijeh; Teimourzadeh, Saeed

    2014-01-01

    Highlights: • A new method for solving the security based UPFC placement and parameter setting problem is proposed. • The proposed method is a global method for all mixed-integer problems. • The proposed method has the ability of the parallel search in binary and continues space. • By using the proposed method, most of the problems due to line contingencies are solved. • Comparison studies are done to compare the performance of the proposed method. - Abstract: This paper presents a novel method to solve security based optimal placement and parameter setting of unified power flow controller (UPFC) problem based on hybrid group search optimization (HGSO) technique. Firstly, HGSO is introduced in order to solve mix-integer type problems. Afterwards, the proposed method is applied to the security based optimal placement and parameter setting of UPFC problem. The focus of the paper is to enhance the power system security through eliminating or minimizing the over loaded lines and the bus voltage limit violations under single line contingencies. Simulation studies are carried out on the IEEE 6-bus, IEEE 14-bus and IEEE 30-bus systems in order to verify the accuracy and robustness of the proposed method. The results indicate that by using the proposed method, the power system remains secure under single line contingencies

  8. CP violation and ΔI=1/2 enhancement in K decays

    International Nuclear Information System (INIS)

    Choudhury, S.R.; Scadron, M.D.

    1996-01-01

    We study CP-conserving and CP-violating K 0 →ππ and K 0 →ππγ decays, using the same techniques which explain the ΔI=1/2 enhancement of the former to also explore CP violation of the latter transitions. If CP violation is driven by the WWγ vertex, we show that direct CP violation in K L →ππγ is scaled to the s→dγ E1 quark transition and the latter is suppressed by the GIM mechanism (compatible with recent experiments). In the same spirit, the dominant ΔI=1/2 enhancement of CP-conserving kaon weak decays can be scaled to an s→d quark transition which is enhanced by the GIM mechanism. copyright 1996 The American Physical Society

  9. Mapping Expectancy Violations: Self-Reflection and Planning for Better Communication

    Science.gov (United States)

    Gregory, Lynn Dee

    2013-01-01

    Communication expectancies are an important part of intercultural understanding, and are defined as cultural guidelines for anticipating behavior (Burgoon, 1995). Burgoon's 1978 expectancy violations theory (EVT) explored nonverbal violations and their outcomes (Burgoon, 1995). The theory has been identified as one approach to the study of…

  10. The CP-odd nucleon interaction and the value of T-violation in nuclei

    International Nuclear Information System (INIS)

    Gudkov, V.P.

    1997-01-01

    The relations between the value of T- and P-violating correlations in neutron scattering and different models of CP violation are discussed. It is shown that a specific structure of CP-odd nucleon interactions gives the possibility to obtain the essential information about CP-odd interaction at the quark-gluon level from nuclear experimental data. The up-to-date estimations for CP-violating nucleon coupling constants show that each class of CP-violating models can give a measurable effect for the neutron scattering experiments. 57 refs

  11. 14th Conference on Flavor Physics and CP Violation

    CERN Document Server

    2016-01-01

    The 2016 edition of the Conference on Flavor Physics and CP Violation will be held at on the campus of the California Institute of Technology on 6-9 June. The FPCP conference series was founded in 2002 through the merger of the Heavy Flavor (HF) and B Physics and CP Violation (BPCP) conference series. A list of previous FPCP venues can be found here.

  12. Dynamical CP violation of the generalized Yang-Mills model

    International Nuclear Information System (INIS)

    Wang Dianfu; Chang Xiaojing; Sun Xiaoyu

    2011-01-01

    Starting from the generalized Yang-Mills model which contains, besides the vector part V μ , also a scalar part S and a pseudoscalar part P . It is shown, in terms of the Nambu-Jona-Lasinio (NJL) mechanism, that CP violation can be realized dynamically. The combination of the generalized Yang-Mills model and the NJL mechanism provides a new way to explain CP violation. (authors)

  13. Parity- and time-reversal-violating moments of light nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Vries, Jordy de, E-mail: devries@kvi.nl [KVI, theory group (Netherlands)

    2013-03-15

    I present the calculation of parity- and time-reversal-violating moments of the nucleon and light nuclei, originating from the QCD {theta}-bar term and effective dimension-six operators. By applying chiral effective field theory these calculations are performed in a unified framework. I argue that measurements of a few light-nuclear electric dipole moments would shed light on the mechanism of parity and time-reversal violation.

  14. Experimental searches for CP and CPT symmetries violation in the neutral kaons system

    International Nuclear Information System (INIS)

    Debu, P.

    1996-01-01

    The aim of this lecture is to give an overview of the experiments devoted to the study and research of CP, T and CPT symmetries invariance violations in the system of neutral K mesons. The discovery of K mesons has provided crucial informations for the elaboration of the standard model. However, the observation of CP violation has remained confined to the K system. The origin of the observed CP violation remains hypothetic. Its origin could be a complex phase in the mixing matrix of quarks. In the standard model of electroweak interactions, several evidences of the CP violation exist: the observed K neutral mesons (K L and K S ) are not proper states of CP and are due to CP violation in the K 0 - anti-K 0 mixture. On the other hand, the model predicts also a CP violation in decay amplitudes, named direct CP violation. Important experiments have been carried out for its demonstration. The K system is also the most precise test for CPT invariance. A description of the experiments in progress developed to improve the precision of these tests is given. The plan of the lecture is the following: after a recall of K 0 - anti-K 0 phenomenology, some important steps in the CP violation study are described. Then, the regeneration phenomenon is briefly described and two of the most recent measurements of the direct CP violation parameter are analysed. Finally, the CPT invariance tests are described with their parameters and the measurements in progress. A review of the principal results is given in conclusion with their improvements expected in a near future. (J.S.). 71 refs., 4 figs., 4 tabs

  15. Probability density functions for CP-violating rephasing invariants

    Science.gov (United States)

    Fortin, Jean-François; Giasson, Nicolas; Marleau, Luc

    2018-05-01

    The implications of the anarchy principle on CP violation in the lepton sector are investigated. A systematic method is introduced to compute the probability density functions for the CP-violating rephasing invariants of the PMNS matrix from the Haar measure relevant to the anarchy principle. Contrary to the CKM matrix which is hierarchical, it is shown that the Haar measure, and hence the anarchy principle, are very likely to lead to the observed PMNS matrix. Predictions on the CP-violating Dirac rephasing invariant |jD | and Majorana rephasing invariant |j1 | are also obtained. They correspond to 〈 |jD | 〉 Haar = π / 105 ≈ 0.030 and 〈 |j1 | 〉 Haar = 1 / (6 π) ≈ 0.053 respectively, in agreement with the experimental hint from T2K of | jDexp | ≈ 0.032 ± 0.005 (or ≈ 0.033 ± 0.003) for the normal (or inverted) hierarchy.

  16. R-parity violation and the cosmological gravitino problem

    International Nuclear Information System (INIS)

    Moreau, G.; Chemtob, M.

    2002-01-01

    Based on the R-parity violation option of the minimal supersymmetric standard model, we examine the scenario where the massive gravitino, a relic from the hot big-bang, is the lightest supersymmetric particle and can decay through one or several of the trilinear R-parity violating interactions. We calculate the rates of the gravitino decay via the various three-body decay channels with final states involving three quarks and/or leptons. By taking into account the present constraints on the trilinear R-parity violating coupling constants and assuming the gravitino and scalar superpartner masses do not exceed ∼80 TeV, it turns out that the gravitinos could easily have decayed before the present epoch but not earlier than the big-bang nucleosynthesis one. Therefore, the considered scenario would upset the standard big-bang nucleosynthesis scenario and we conclude that it does not seem to constitute a natural solution for the cosmological gravitino problem

  17. A time-dependent measurement of charm CP violation at LHCb

    CERN Multimedia

    Smith, M

    2014-01-01

    A time dependent analysis of CP violation in charm mesons is presented through the measurement of the observable $A_{\\Gamma}$. This observable involves precise measurements of the D0 lifetime as it decays to a CP eigenstate. The results presented are the most precise to date. No CP violation is observed.

  18. NMR analog of Bell's inequalities violation test

    International Nuclear Information System (INIS)

    Souza, A M; Oliveira, I S; Sarthour, R S; Magalhaes, A; Teles, J; Azevedo, E R de; Bonagamba, T J

    2008-01-01

    In this paper, we present an analog of Bell's inequalities violation test for N qubits to be performed in a nuclear magnetic resonance (NMR) quantum computer. This can be used to simulate or predict the results for different Bell's inequality tests, with distinct configurations and a larger number of qubits. To demonstrate our scheme, we implemented a simulation of the violation of the Clauser, Horne, Shimony and Holt (CHSH) inequality using a two-qubit NMR system and compared the results to those of a photon experiment. The experimental results are well described by the quantum mechanics theory and a local realistic hidden variables model (LRHVM) that was specifically developed for NMR. That is why we refer to this experiment as a simulation of Bell's inequality violation. Our result shows explicitly how the two theories can be compatible with each other due to the detection loophole. In the last part of this work, we discuss the possibility of testing some fundamental features of quantum mechanics using NMR with highly polarized spins, where a strong discrepancy between quantum mechanics and hidden variables models can be expected

  19. Causality violation, gravitational shockwaves and UV completion

    Energy Technology Data Exchange (ETDEWEB)

    Hollowood, Timothy J.; Shore, Graham M. [Department of Physics, Swansea University,Swansea, SA2 8PP (United Kingdom)

    2016-03-18

    The effective actions describing the low-energy dynamics of QFTs involving gravity generically exhibit causality violations. These may take the form of superluminal propagation or Shapiro time advances and allow the construction of “time machines”, i.e. spacetimes admitting closed non-spacelike curves. Here, we discuss critically whether such causality violations may be used as a criterion to identify unphysical effective actions or whether, and how, causality problems may be resolved by embedding the action in a fundamental, UV complete QFT. We study in detail the case of photon scattering in an Aichelburg-Sexl gravitational shockwave background and calculate the phase shifts in QED for all energies, demonstrating their smooth interpolation from the causality-violating effective action values at low-energy to their manifestly causal high-energy limits. At low energies, these phase shifts may be interpreted as backwards-in-time coordinate jumps as the photon encounters the shock wavefront, and we illustrate how the resulting causality problems emerge and are resolved in a two-shockwave time machine scenario. The implications of our results for ultra-high (Planck) energy scattering, in which graviton exchange is modelled by the shockwave background, are highlighted.

  20. Violation of the Leggett-Garg Inequality in neutrino oscillations

    Science.gov (United States)

    Weiss, T. E.; Formaggio, J. A.; Kaiser, D. I.; Murskyj, M. M.

    2017-09-01

    The Leggett-Garg inequality, an analogue of Bell’s inequality involving correlations of measurements on a system at different times, stands as one of the hallmark tests of quantum mechanics against classical predictions. The phenomenon of neutrino oscillations should adhere to quantum-mechanical predictions and provide an observable violation of the Leggett-Garg inequality. We demonstrate how oscillation phenomena can be used to test for violations of the classical bound by performing measurements on an ensemble of neutrinos at distinct energies, as opposed to a single neutrino at distinct times. A study of the MINOS experiment’s data shows a greater than 6σ violation over a distance of 735 km, representing the longest distance over which either the Leggett-Garg inequality or Bell’s inequality has been tested.

  1. Gamma ray constraints on flavor violating asymmetric dark matter

    DEFF Research Database (Denmark)

    Masina, I.; Panci, P.; Sannino, F.

    2012-01-01

    We show how cosmic gamma rays can be used to constrain models of asymmetric Dark Matter decaying into lepton pairs by violating flavor. First of all we require the models to explain the anomalies in the charged cosmic rays measured by PAMELA, Fermi and H.E.S.S.; performing combined fits we...... determine the allowed values of the Dark Matter mass and lifetime. For these models, we then determine the constraints coming from the measurement of the isotropic gamma-ray background by Fermi for a complete set of lepton flavor violating primary modes and over a range of DM masses from 100 GeV to 10 Te......V. We find that the Fermi constraints rule out the flavor violating asymmetric Dark Matter interpretation of the charged cosmic ray anomalies....

  2. The possibility of leptonic CP-violation measurement with JUNO

    Science.gov (United States)

    Smirnov, M. V.; Hu, Zh. J.; Li, S. J.; Ling, J. J.

    2018-06-01

    The existence of CP-violation in the leptonic sector is one of the most important issues for modern science. Neutrino physics is a key to the solution of this problem. JUNO (under construction) is the near future of neutrino physics. However CP-violation is not a priority for the current scientific program. We estimate the capability of δCP measurement, assuming a combination of the JUNO detector and a superconductive cyclotron as the antineutrino source. This method of measuring CP-violation is an alternative to conventional beam experiments. A significance level of 3σ can be reached for 22% of the δCP range. The accuracy of measurement lies between 8o and 22o. It is shown that the dominant influence on the result is the uncertainty in the mixing angle Θ23.

  3. On the phase of ε and the NA31 bound on CPT violation

    International Nuclear Information System (INIS)

    Lavoura, L.

    1992-01-01

    In this paper the author discusses the theoretical prediction for the phase of the CP-violating parameter ε, and the experimental bound on the CPT-violating contribution to that parameter. The author concludes that, if one neglects theoretical prejudices and only takes into account the experimental data, the phase of ε may differ by as much as four degrees from the superweak phase. The present experimental bound on CPT violation cannot be much strengthened if one does not first obtain better bounds on the CP violation in the three-pion decay modes

  4. Harm expectancy violation during exposure therapy for posttraumatic stress disorder.

    Science.gov (United States)

    de Kleine, Rianne A; Hendriks, Lotte; Becker, Eni S; Broekman, Theo G; van Minnen, Agnes

    2017-06-01

    Exposure therapy has proven efficacy in the treatment of posttraumatic stress disorder (PTSD). Emotional processing theory proposes that fear habituation is a central mechanism in symptom reduction, but the empirical evidence supporting this is mixed. Recently it has been proposed that violation of harm expectancies is a crucial mechanism of action in exposure therapy. But to date, changes in harm expectancies have not been examined during exposure therapy in PTSD. The goal of the current study was to examine harm expectancy violation as mechanism of change in exposure therapy for posttraumatic stress disorder (PTSD). Patients (N=50, 44 female) with a primary diagnosis of chronic PTSD received intensive exposure therapy. Harm expectancies, harm experiences and subjective units of distress (SUDs) were assessed at each imaginal exposure session, and PTSD symptoms were assessed pre- and posttreatment with the Clinician Administered PTSD Scale (CAPS). Results showed that harm expectancies were violated within and strongly declined in-between exposure therapy sessions. However, expectancy violation was not related to PTSD symptom change. Fear habituation measures were moderately related to PTSD symptom reductions. In line with theory, exposure therapy promotes expectancy violation in PTSD patients, but this is not related to exposure therapy outcome. More work is warranted to investigate mechanisms of change during exposure therapy in PTSD. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Studies of $C\\!P$-violation in charmless three-body $b$-hadron decays

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00401396

    Violation of combined charge and parity inversion ($C\\!P$) is a property of the Standard Model that results in a fundamental difference between particles and anti-particles. The single source of $C\\!P$-violation in the Standard Model is insufficient to explain the dominance of matter over anti-matter in the contemporary universe, however, thus far, there has been no clear observation of $C\\!P$-violation beyond the Standard Model. Constraints on various $C\\!P$-violating observables are now precise enough that these represent sensitive tests for physics beyond the Standard Model. This thesis firstly documents the observation of two three-body $b$-baryon decays, and measurements of their phase-space integrated $C\\!P$-asymmetries, which are some of the first to be performed on baryon decays. These measurements provide useful information on hadronisation in $b$-baryon decays, on the intermediate decay dynamics, and give a potential avenue to search for $C\\!P$-violation in baryon decays. An amplitude analysis of th...

  6. What If Quantum Theory Violates All Mathematics?

    Science.gov (United States)

    Rosinger, Elemér Elad

    2017-09-01

    It is shown by using a rather elementary argument in Mathematical Logic that if indeed, quantum theory does violate the famous Bell Inequalities, then quantum theory must inevitably also violate all valid mathematical statements, and in particular, such basic algebraic relations like 0 = 0, 1 = 1, 2 = 2, 3 = 3, … and so on … An interest in that result is due to the following three alternatives which it imposes upon both Physics and Mathematics: Quantum Theory is inconsistent. Quantum Theory together with Mathematics are inconsistent. Mathematics is inconsistent. In this regard one should recall that, up until now, it is not known whether Mathematics is indeed consistent.

  7. The seesaw path to leptonic CP violation

    Energy Technology Data Exchange (ETDEWEB)

    Caputo, A.; Hernandez, P. [Universidad de Valencia and CSIC, Edificio Institutos Investigacion, Instituto de Fisica Corpuscular, Paterna (Spain); CERN, Theoretical Physics Department, Geneva (Switzerland); Kekic, M.; Salvado, J. [Universidad de Valencia and CSIC, Edificio Institutos Investigacion, Instituto de Fisica Corpuscular, Paterna (Spain); Lopez-Pavon, J. [CERN, Theoretical Physics Department, Geneva (Switzerland)

    2017-04-15

    Future experiments such as SHiP and high-intensity e{sup +}e{sup -} colliders will have a superb sensitivity to heavy Majorana neutrinos with masses below M{sub Z}. We show that the measurement of the mixing to electrons and muons of one such state could establish the existence of CP violating phases in the neutrino mixing matrix, in the context of low-scale seesaw models. We quantify in the minimal model the CP reach of these future experiments, and demonstrate that CP violating phases in the mixing matrix could be established at 5σ CL in a very significant fraction of parameter space. (orig.)

  8. Violations of Grice`s Maxims in The Prince and the Pauper Movie

    Directory of Open Access Journals (Sweden)

    Antonius Waget

    2016-12-01

    Full Text Available Proper responses must be provided interlocutors to make onversation productive and meaningful. However, interlocutors do not always provide proper responses because they do not even know conversation rules. Grice coins 4 maxims as general rules to govern daily conversation. The maxims are Quantity, Quality, Relevance, and Manner. Conversation occurs in the real daily interaction also in arts including movies. The Prince and the Pauper movie is one of the media for human daily conversation. Some parts of the movie contains violations of Grice`s maxims by the characters. Based on this background, the writer intends to explore violations ofGrice’s maxims in the movie and analyze the purposes of the violations. To achieve these objectives, the writer formulates two research problems: (1 Which of Grice`s maxims are violated by the addressees in The Prince and the Pauper movie? (2 For what purposes do the addressees violate the maxims? The base of this research is a movie script as document. Thus, the writer uses document analysis as the method of this research. Grounded on the analysis, the writer finds that the characters, especially Prince, Tom Canty, King, and the Earl of Hertford in the movie dialogues violate the four of Grice`s maxims. When failing to provide sufficient information, telling lie to their addressers, providing irrelevant glosses, and failing to be true, brief, univocal, and orderly, they respectively violate maxims of Quantity, Quality, Relevance, and Manner. Moreover, the writer finds that the characters violate the maxims in order to mislead the counterparts, be polite, save face, avoid discussion, and communicate self-interest.   DOI: https://doi.org/10.24071/llt.2015.180101

  9. 15 CFR 280.201 - Violations.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Violations. 280.201 Section 280.201 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF... otherwise, fasteners that are required by the applicable consensus standard or standards to bear an insignia...

  10. Diagnosis of plan structure Violations

    NARCIS (Netherlands)

    Roos, Nico

    2007-01-01

    Failures in plan execution can be attributed to errors in the execution of plan steps or violations of the plan structure. The structure of a plan prescribes which actions have to be performed and which precedence constraints between them have to be respected. Especially in multi-agent environments

  11. Directly detecting isospin-violating dark matter

    Science.gov (United States)

    Kelso, Chris; Kumar, Jason; Marfatia, Danny; Sandick, Pearl

    2018-03-01

    We consider the prospects for multiple dark matter direct detection experiments to determine if the interactions of a dark matter candidate are isospin-violating. We focus on theoretically well-motivated examples of isospin-violating dark matter (IVDM), including models in which dark matter interactions with nuclei are mediated by a dark photon, a Z , or a squark. We determine that the best prospects for distinguishing IVDM from the isospin-invariant scenario arise in the cases of dark photon-or Z -mediated interactions, and that the ideal experimental scenario would consist of large exposure xenon- and neon-based detectors. If such models just evade current direct detection limits, then one could distinguish such models from the standard isospin-invariant case with two detectors with of order 100 ton-year exposure.

  12. Modeling Psychological Contract Violation using Dual Regime Models: An Event-based Approach

    Directory of Open Access Journals (Sweden)

    Joeri Hofmans

    2017-11-01

    Full Text Available A good understanding of the dynamics of psychological contract violation requires theories, research methods and statistical models that explicitly recognize that violation feelings follow from an event that violates one's acceptance limits, after which interpretative processes are set into motion, determining the intensity of these violation feelings. Whereas theories—in the form of the dynamic model of the psychological contract—and research methods—in the form of daily diary research and experience sampling research—are available by now, the statistical tools to model such a two-stage process are still lacking. The aim of the present paper is to fill this gap in the literature by introducing two statistical models—the Zero-Inflated model and the Hurdle model—that closely mimic the theoretical process underlying the elicitation violation feelings via two model components: a binary distribution that models whether violation has occurred or not, and a count distribution that models how severe the negative impact is. Moreover, covariates can be included for both model components separately, which yields insight into their unique and shared antecedents. By doing this, the present paper offers a methodological-substantive synergy, showing how sophisticated methodology can be used to examine an important substantive issue.

  13. Security controls in an integrated Biobank to protect privacy in data sharing: rationale and study design.

    Science.gov (United States)

    Takai-Igarashi, Takako; Kinoshita, Kengo; Nagasaki, Masao; Ogishima, Soichi; Nakamura, Naoki; Nagase, Sachiko; Nagaie, Satoshi; Saito, Tomo; Nagami, Fuji; Minegishi, Naoko; Suzuki, Yoichi; Suzuki, Kichiya; Hashizume, Hiroaki; Kuriyama, Shinichi; Hozawa, Atsushi; Yaegashi, Nobuo; Kure, Shigeo; Tamiya, Gen; Kawaguchi, Yoshio; Tanaka, Hiroshi; Yamamoto, Masayuki

    2017-07-06

    With the goal of realizing genome-based personalized healthcare, we have developed a biobank that integrates personal health, genome, and omics data along with biospecimens donated by volunteers of 150,000. Such a large-scale of data integration involves obvious risks of privacy violation. The research use of personal genome and health information is a topic of global discussion with regard to the protection of privacy while promoting scientific advancement. The present paper reports on our plans, current attempts, and accomplishments in addressing security problems involved in data sharing to ensure donor privacy while promoting scientific advancement. Biospecimens and data have been collected in prospective cohort studies with the comprehensive agreement. The sample size of 150,000 participants was required for multiple researches including genome-wide screening of gene by environment interactions, haplotype phasing, and parametric linkage analysis. We established the T ohoku M edical M egabank (TMM) data sharing policy: a privacy protection rule that requires physical, personnel, and technological safeguards against privacy violation regarding the use and sharing of data. The proposed policy refers to that of NCBI and that of the Sanger Institute. The proposed policy classifies shared data according to the strength of re-identification risks. Local committees organized by TMM evaluate re-identification risk and assign a security category to a dataset. Every dataset is stored in an assigned segment of a supercomputer in accordance with its security category. A security manager should be designated to handle all security problems at individual data use locations. The proposed policy requires closed networks and IP-VPN remote connections. The mission of the biobank is to distribute biological resources most productively. This mission motivated us to collect biospecimens and health data and simultaneously analyze genome/omics data in-house. The biobank also has the

  14. Proceedings of the Workshop on CP Violation at KAON Factory

    International Nuclear Information System (INIS)

    Ng, J.N.

    1989-07-01

    These proceedings contain the written version of eight talks delivered at the Workshop on CP Violation at KAON Factory. The articles contain reviews on the exploration of CP violation effects associated with the s-quark. Discussion on the use of intense kaon fluxes, which will be available at the proposed KAON Factory, are included

  15. Charged singularities: the causality violation

    Energy Technology Data Exchange (ETDEWEB)

    De Felice, F; Nobili, L [Padua Univ. (Italy). Ist. di Fisica; Calvani, M [Padua Univ. (Italy). Ist. di Astronomia

    1980-12-01

    A search is made for examples of particle trajectories which, approaching a naked singularity from infinity, make up for lost time before going back to infinity. In the Kerr-Newman metric a whole family of such trajectories is found showing that the causality violation is indeed a non-avoidable pathology.

  16. CP violation in B decays

    International Nuclear Information System (INIS)

    Quinn, H.R.

    1994-02-01

    She reviews how one can test the Standard Model predictions for CP violation. This test requires sufficient independent measurements to overconstrain the model parameters and thus be sensitive to possible beyond Standard Model contributions. She addresses the challenges for theory as well as for experiment to achieve such a test

  17. CPLEAR and BaBar: CP violation in all its states

    CERN Document Server

    Yeche, Christophe

    2003-01-01

    This report of French 'Habilitation a diriger les recherches' summarizes my scientific activity from 1993 to 2003. During this decade, my research work was related to two particle physics experiments: CPLEAR and BABAR. The first one, CPLEAR, has recorded data from 1988 to 1995 on the low energy anti-proton ring (LEAR) at CERN. This experiment was devoted to the study of T, CPT et CP discrete symmetries. The second experiment, BABAR, has been running since 1999, on the PEP-II B factory at SLAC. This experiment searches for CP violation and tests the Standard Model through the measurements of the angles and the sides of the Unitarity Triangle. My research work is divided in five main topics: Study of CP and CPT violation in K0 → π+ π- decays; Performance optimization of the particle identification detector (DIRC) of the BABAR experiment; B meson tagging in BABAR experiment; Δmd measurement and Search for CP and T violation in mixing with dilepton events; Search for CP violation in B0 → ρ± π± and B0 �...

  18. Violation of multipartite Bell inequalities with classical subsystems via operationally local transformations

    International Nuclear Information System (INIS)

    Williamson, Mark S.; Son Wonmin; Heaney, Libby

    2010-01-01

    Recently, it was demonstrated by Son et al., Phys. Rev. Lett. 102, 110404 (2009), that a separable bipartite continuous-variable quantum system can violate the Clauser-Horne-Shimony-Holt (CHSH) inequality via operationally local transformations. Operationally local transformations are parametrized only by local variables; however, in order to allow violation of the CHSH inequality, a maximally entangled ancilla was necessary. The use of the entangled ancilla in this scheme caused the state under test to become dependent on the measurement choice one uses to calculate the CHSH inequality, thus violating one of the assumptions used in deriving a Bell inequality, namely, the free will or statistical independence assumption. The novelty in this scheme however is that the measurement settings can be external free parameters. In this paper, we generalize these operationally local transformations for multipartite Bell inequalities (with dichotomic observables) and provide necessary and sufficient conditions for violation within this scheme. Namely, a violation of a multipartite Bell inequality in this setting is contingent on whether an ancillary system admits any realistic local hidden variable model (i.e., whether the ancilla violates the given Bell inequality). These results indicate that violation of a Bell inequality performed on a system does not necessarily imply that the system is nonlocal. In fact, the system under test may be completely classical. However, nonlocality must have resided somewhere, this may have been in the environment, the physical variables used to manipulate the system or the detectors themselves provided the measurement settings are external free variables.

  19. Violation of multipartite Bell inequalities with classical subsystems via operationally local transformations

    Science.gov (United States)

    Williamson, Mark S.; Heaney, Libby; Son, Wonmin

    2010-09-01

    Recently, it was demonstrated by Son , Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.102.110404 102, 110404 (2009), that a separable bipartite continuous-variable quantum system can violate the Clauser-Horne-Shimony-Holt (CHSH) inequality via operationally local transformations. Operationally local transformations are parametrized only by local variables; however, in order to allow violation of the CHSH inequality, a maximally entangled ancilla was necessary. The use of the entangled ancilla in this scheme caused the state under test to become dependent on the measurement choice one uses to calculate the CHSH inequality, thus violating one of the assumptions used in deriving a Bell inequality, namely, the free will or statistical independence assumption. The novelty in this scheme however is that the measurement settings can be external free parameters. In this paper, we generalize these operationally local transformations for multipartite Bell inequalities (with dichotomic observables) and provide necessary and sufficient conditions for violation within this scheme. Namely, a violation of a multipartite Bell inequality in this setting is contingent on whether an ancillary system admits any realistic local hidden variable model (i.e., whether the ancilla violates the given Bell inequality). These results indicate that violation of a Bell inequality performed on a system does not necessarily imply that the system is nonlocal. In fact, the system under test may be completely classical. However, nonlocality must have resided somewhere, this may have been in the environment, the physical variables used to manipulate the system or the detectors themselves provided the measurement settings are external free variables.

  20. Noncommutativity and unitarity violation in gauge boson scattering

    International Nuclear Information System (INIS)

    Hewett, J. L.; Petriello, F. J.; Rizzo, T. G.

    2002-01-01

    We examine the unitarity properties of spontaneously broken noncommutative gauge theories. We find that the symmetry breaking mechanism in the noncommutative standard model of Chaichian et al. leads to an unavoidable violation of tree-level unitarity in gauge boson scattering at high energies. We then study a variety of simplified spontaneously broken noncommutative theories and isolate the source of this unitarity violation. Given the group theoretic restrictions endemic to noncommutative model building, we conclude that it is difficult to build a noncommutative standard model under the Weyl-Moyal approach that preserves unitarity

  1. Parity violation and superconductivity in doped Mott insulators

    International Nuclear Information System (INIS)

    Khveshchenko, D.V.; Kogan, Ya.I.

    1989-12-01

    We study parity violating states of strongly correlated two-dimensional electronic systems. On the basis of mean field theory for the SU(2N)-symmetric generalization of the system involved we give the arguments supporting the existence of these states at a filling number different from one-half. We derive an effective Lagrangian describing the long wavelength dynamics of magnetic excitations and their interaction with charged spinless holes. We establish that the ground state of a doped system is superconducting and discuss the phenomenological manifestations of the parity violation. (author). 48 refs, 3 figs

  2. Parity violation and superconductivity in doped Mott insulators

    International Nuclear Information System (INIS)

    Khveshchenko, D.Y.; Kogan, Y.I.

    1990-01-01

    The authors study parity violating states of strongly correlated two-dimensional electronic systems. On the basis of mean field theory for the SU(2N)-symmetric generalization of the system involved the authors give the arguments supporting the existence of these states at a filling number different from one-half. The authors derive an effective Lagrangian describing the long wavelength dynamics of magnetic excitations and their interaction with charged spinless holes. This paper establishes the ground state of a doped system is superconducting and discuss the phenomenological manifestations of the parity violation

  3. Evaluation of five years of nursing home inspection forms: structural and hygiene-related violation trends.

    Science.gov (United States)

    Avery, Chris; Humphrey, Charles; Balany, Jo Anne

    2014-11-01

    Health inspections are performed at nursing homes to identify and reduce risk and to help maintain a safe environment for nursing home residents. The study described in this article aimed to identify the most frequent violations, types of violations (hygiene or structural), and repeat violations in nursing home facilities during health inspections; and to determine if the age of the facility influenced inspection scores. Nursing home health inspection forms (N = 131) completed between 2005 and 2011 in Pitt County, North Carolina, were analyzed. Results indicated that 60% of all violations were hygiene-related and could possibly be corrected without significant financial investments by management. Significant correlations occurred between the total number of violations and the facility age (p = .003) and between the number of repeat violations and total violations (p < .001). The average inspection score for nursing homes could be increased by more than three points if sanitation practices were improved.

  4. The Search for Fundamental Symmetry Violation in Radium Nuclei

    Science.gov (United States)

    Dietrich, Matthew; Bishof, Michael; Bailey, Kevin; Greene, John; Mueller, Peter; O'Connor, Thomas; Lu, Zheng-Tian; Rabga, Tenzin; Ready, Roy; Singh, Jaideep

    2017-09-01

    Electric dipole moments (EDMs) are signatures of time-reversal, parity, and charge-parity (CP) violation, which makes them a sensitive probe of expected new physics beyond the Standard Model. Due to its large nuclear octupole deformation and high atomic mass, the radioactive Ra-225 isotope is a favorable EDM case; it is particularly sensitive to CP-violating interactions in the nuclear medium. We have developed a cold-atom approach of measuring the atomic EDM of atoms held stationary in an optical dipole trap, which we have used to place the only upper limit on the EDM of radium, |d(225Ra)|EDM, but also the first time the EDM of any octupole deformed species has been measured. We will present results on a new approach to spin detection that we expect to improve our EDM sensitivity by a factor of 20. Combined with upcoming improvements to our electric field generation, the next measurement should be competitive with the best neutron EDM result, in terms of sensitivity to CP-violating interactions. The Search for Fudamental Symmetry Violation in Radium Nuclei. This work is supported by the U.S. DOE, Office of Science, Office of Nuclear Physics, under Contract DE-AC02-06CH11357.

  5. [A guide to good practice for information security in the handling of personal health data by health personnel in ambulatory care facilities].

    Science.gov (United States)

    Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel

    2014-04-01

    The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.

  6. Parity violation in proton-proton scattering at 230 MEV

    International Nuclear Information System (INIS)

    Birchall, J.; Bowman, J.D.; Davis, C.A.

    1988-01-01

    Below /similar to/300 MeV six meson-nucleon coupling strengths are required to describe the weak interaction of nucleons. Many experiments have found parity-violating effects in nuclear systems, but only four significant, independent constraints exist. A new measurement is proposed where measurable effects are predicted with minimal dependence on nuclear interaction models, yielding information complementary to previous results. This is a measurement of the parity-violating analyzing power. A/sub z/ in p-p scattering at 230 MeV, which is shown to be sensitive to the weak rho-nucleon coupling. This measurement, at a precision of +- 2 x 10/sup -8/, together with a proposed measurement by the University of Washington group at I.L.L. of the parity-violating neutron spin rotation, will provide the fifth and sixth independent constraints needed to determine the weak meson-nucleon coupling constants

  7. 78 FR 9845 - Minimum and Ordinary Maximum and Aggravated Maximum Civil Monetary Penalties for a Violation of...

    Science.gov (United States)

    2013-02-12

    ... maximum penalty amount of $75,000 for each violation, except that if the violation results in death... the maximum civil penalty for a violation is $175,000 if the violation results in death, serious... Penalties for a Violation of the Hazardous Materials Transportation Laws or Regulations, Orders, Special...

  8. P and T violations in QED

    International Nuclear Information System (INIS)

    Pleitez, V.

    1983-01-01

    An abelian gauge theory with violation of P and T symmetries, is constructed other features of usual spinor quantum electrodynamics are maintained. The theory is applied to some scattering processes with polarized and unpolarized electrons. (Author) [pt

  9. Particles with small violations of Fermi or Bose statistics

    International Nuclear Information System (INIS)

    Greenberg, O.W.

    1991-01-01

    I discuss the statistics of ''quons'' (pronounced to rhyme with muons), particles whose annihilation and creation operators obey the q-deformed commutation relation (the quon algebra or q-mutator) which interpolates between fermions and bosons. Topics discussed include representations of the quon algebra, proof of the TCP theorem, violation of the usual locality properties, and experimental constraints on violations of the Pauli exclusion principle (i.e., Fermi statistics) and of Bose statistics

  10. Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions

    Science.gov (United States)

    Gupta, Ankur; Awasthi, Lalit K.

    Peer-to-Peer networks have been widely used for sharing millions of terabytes of content, for large-scale distributed computing and for a variety of other novel applications, due to their scalability and fault-tolerance. However, the scope of P2P networks has somehow been limited to individual computers connected to the internet. P2P networks are also notorious for blatant copyright violations and facilitating several kinds of security attacks. Businesses and large organizations have thus stayed away from deploying P2P applications citing security loopholes in P2P systems as the biggest reason for non-adoption. In theory P2P applications can help fulfill many organizational requirements such as collaboration and joint projects with other organizations, access to specialized computing infrastructure and finally accessing the specialized information/content and expert human knowledge available at other organizations. These potentially beneficial interactions necessitate that the research community attempt to alleviate the security shortcomings in P2P systems and ensure their acceptance and wide deployment. This research paper therefore examines the security issues prevalent in enabling cross-organizational P2P interactions and provides some technical insights into how some of these issues can be resolved.

  11. B Factories and CP Violation

    International Nuclear Information System (INIS)

    Wilson, R. J.

    2001-01-01

    In this lecture, I will give an overview of the current and planned B meson facilities and the motivation for building them. The emphasis will be on the BaBar experiment at the PEP-II accelerator and on the primary physics motivation for these facilities: charge-parity symmetry violation. (Author) 11 refs

  12. Bipartite Bell Inequality and Maximal Violation

    International Nuclear Information System (INIS)

    Li Ming; Fei Shaoming; Li-Jost Xian-Qing

    2011-01-01

    We present new bell inequalities for arbitrary dimensional bipartite quantum systems. The maximal violation of the inequalities is computed. The Bell inequality is capable of detecting quantum entanglement of both pure and mixed quantum states more effectively. (general)

  13. Spacetime-varying couplings and Lorentz violation

    International Nuclear Information System (INIS)

    Kostelecky, V. Alan; Lehnert, Ralf; Perry, Malcolm J.

    2003-01-01

    Spacetime-varying coupling constants can be associated with violations of local Lorentz invariance and CPT symmetry. An analytical supergravity cosmology with a time-varying fine-structure constant provides an explicit example. Estimates are made for some experimental constraints

  14. Intrinsic honesty and the prevalence of rule violations across societies.

    Science.gov (United States)

    Gächter, Simon; Schulz, Jonathan F

    2016-03-24

    Deception is common in nature and humans are no exception. Modern societies have created institutions to control cheating, but many situations remain where only intrinsic honesty keeps people from cheating and violating rules. Psychological, sociological and economic theories suggest causal pathways to explain how the prevalence of rule violations in people's social environment, such as corruption, tax evasion or political fraud, can compromise individual intrinsic honesty. Here we present cross-societal experiments from 23 countries around the world that demonstrate a robust link between the prevalence of rule violations and intrinsic honesty. We developed an index of the 'prevalence of rule violations' (PRV) based on country-level data from the year 2003 of corruption, tax evasion and fraudulent politics. We measured intrinsic honesty in an anonymous die-rolling experiment. We conducted the experiments with 2,568 young participants (students) who, due to their young age in 2003, could not have influenced PRV in 2003. We find individual intrinsic honesty is stronger in the subject pools of low PRV countries than those of high PRV countries. The details of lying patterns support psychological theories of honesty. The results are consistent with theories of the cultural co-evolution of institutions and values, and show that weak institutions and cultural legacies that generate rule violations not only have direct adverse economic consequences, but might also impair individual intrinsic honesty that is crucial for the smooth functioning of society.

  15. Computational substrates of norms and their violations during social exchange.

    Science.gov (United States)

    Xiang, Ting; Lohrenz, Terry; Montague, P Read

    2013-01-16

    Social norms in humans constrain individual behaviors to establish shared expectations within a social group. Previous work has probed social norm violations and the feelings that such violations engender; however, a computational rendering of the underlying neural and emotional responses has been lacking. We probed norm violations using a two-party, repeated fairness game (ultimatum game) where proposers offer a split of a monetary resource to a responder who either accepts or rejects the offer. Using a norm-training paradigm where subject groups are preadapted to either high or low offers, we demonstrate that unpredictable shifts in expected offers creates a difference in rejection rates exhibited by the two responder groups for otherwise identical offers. We constructed an ideal observer model that identified neural correlates of norm prediction errors in the ventral striatum and anterior insula, regions that also showed strong responses to variance-prediction errors generated by the same model. Subjective feelings about offers correlated with these norm prediction errors, and the two signals displayed overlapping, but not identical, neural correlates in striatum, insula, and medial orbitofrontal cortex. These results provide evidence for the hypothesis that responses in anterior insula can encode information about social norm violations that correlate with changes in overt behavior (changes in rejection rates). Together, these results demonstrate that the brain regions involved in reward prediction and risk prediction are also recruited in signaling social norm violations.

  16. Lepton flavor violation with light vector bosons

    Directory of Open Access Journals (Sweden)

    Julian Heeck

    2016-07-01

    Full Text Available New sub-GeV vector bosons with couplings to muons but not electrons have been discussed in order to explain the muon's magnetic moment, the gap of high-energy neutrinos in IceCube or the proton radius puzzle. If such a light Z′ not only violates lepton universality but also lepton flavor, as expected for example from the recent hint for h→μτ at CMS, the two-body decay mode τ→μZ′ opens up and for MZ′<2mμ gives better constraints than τ→3μ already with 20-year-old ARGUS limits. We discuss the general prospects and motivation of light vector bosons with lepton-flavor-violating couplings.

  17. Parity violating nuclear force by meson mixing

    International Nuclear Information System (INIS)

    Iqbal, M.J.; Niskanen, J.A.

    1990-01-01

    We study a mechanism for parity violation in the two nucleon meson-exchange interaction by way of the mixing of mesons of opposite parities. This mixing arises from parity violating W ± and Z exchange between the q bar q pair in the meson. Numerically its effect turns out to be as important as vector meson exchange with a weak meson-nucleon vertex and may partly be used to model this vertex. The calculation is performed using both the standard Born approximation adding the amplitude phases by Watson's theorem and also using the exact correlated two-nucleon wave functions. The effect of correlations and form factors is found to be crucially important at intermediate energies

  18. The securitization of health in the context of the war on terror. National security and global health: the conflict of imperatives.

    Science.gov (United States)

    Chung, Ryoa

    2017-03-01

    In this article, I want to show that the securitization of health issues in the name of national interests led to the militarization of health care in the context of the war against terrorism. However, the connection between health and security also gave way to the emergence of the notion of human security, thus, converging with the human right to health approach and the cosmopolitan discourse on global health. These two perspectives on the relation between health and security lead to conflicting imperatives in the current state of counter-terrorism operations. I argue that when the securitization of health concerns in the name of national security conflicts with the provision of health care in the name of universal human rights, the higher moral end must trump the prudential one. Moreover, it is a duty to promote the human right to health when liberal democracies in foreign policies directly violate this moral ideal in the name of national security.

  19. Topics on CP violation in B-meson decays

    International Nuclear Information System (INIS)

    Soares, J.M.

    1993-01-01

    In this work several independent topics on CP violation in the B-meson decays are addressed. To begin with, the present constraints on the parameters of the Cabibbo-Kobayashi-Maskawa (CKM) matrix are discussed. Then, I calculate the CP-violating asymmetry in the radiative decays of the charged B-mesons: it only appears at the 2-loop level, but it can be large in the b → dγ decays. At this point, the possibility of using these decays to measure the CKM entry |V td | will be studied. I also consider the decays of the neutral B-mesons: the strong correlation between the asymmetries in B 0 → ΨK S and the B 0 → π + π - is suggested as a powerful test of the standard model (a simple extension of the model is given where the correlation disappears). Finally, I address the question of observing direct CP violation in comparing these two asymmetries. An ambiguity that may arise is resolved due to the role that is played by penguin diagram contributions to the decay amplitudes

  20. CP violation conditions in N-Higgs-doublet potentials

    International Nuclear Information System (INIS)

    Nishi, C. C.

    2006-01-01

    Conditions for CP violation in the scalar potential sector of general N-Higgs-doublet models are analyzed from a group theoretical perspective. For the simplest two-Higgs-doublet model potential, a minimum set of conditions for explicit and spontaneous CP violation is presented. The conditions can be given a clear geometrical interpretation in terms of quantities in the adjoint representation of the basis transformation group for the two doublets. Such conditions depend on CP-odd pseudoscalar invariants. When the potential is CP invariant, the explicit procedure to reach the real CP-basis and the explicit CP transformation can also be obtained. The procedure to find the real basis and the conditions for CP violation are then extended to general N-Higgs-doublet model potentials. The analysis becomes more involved and only a formal procedure to reach the real basis is found. Necessary conditions for CP invariance can still be formulated in terms of group invariants: the CP-odd generalized pseudoscalars. The problem can be completely solved for three Higgs-doublets

  1. Search for CP violation in BS0 → J/ψφ

    International Nuclear Information System (INIS)

    Liu, Chunlei; /Pittsburgh U.

    2008-01-01

    The CDF experiment, which uses p(bar p) collisions at √s = 1.9 TeV produced at the Fermilab Tevatron, is unique in its ability to observe all flavors of B hadrons and measure their properties. Among them, CP violation is of fundamental interest. In the B + and B 0 systems, measurements of CP violation parameters performed essentially at B factories have borne out the predictions of CKM model. Little is known, experimentally, about CP violation in the B s 0 system. The standard model predicts very little CP violation there, thus any nonzero measurement could be an indication of new physics. In this thesis, we will report on the very first flavor-tagged analysis of approximately 2000 B s 0 → J/ψφ decays reconstructed in a 1.35 fb -1 data sample collected at CDF. This channel is sensitive not only to the width difference ΔΛ in the B s 0 system but also to the CP violation parameter β s . The final result we obtain is a confidence region in the two dimensional space of β s and ΔΛ. Assuming the standard model predictions of β s and ΔΛ, the probability is 15%, corresponding to 1.5 Gaussian standard deviations

  2. 75 FR 39603 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Order Approving...

    Science.gov (United States)

    2010-07-09

    ... related to fraud or securities laws violations; \\10\\ (4) a government authority or regulator has provided... related to fraud or securities laws violations; \\14\\ (4) a government authority or regulator has provided... potentially violating an anti-fraud rule of the Federal securities laws and stated that where it has actual...

  3. Kobayashi-Maskawa type of hard-CP-violation model with three-generation Majorana neutrinos

    International Nuclear Information System (INIS)

    Cheng, H.

    1986-01-01

    Within the framework of the Kobayashi-Maskawa (KM) type of hard CP-violation model with three-generation Majorana neutrinos, we point out that on-shell CP-violation phenomena (i.e., CP-violating effects taking place in on-shell processes), which are characteristic of Majorana neutrinos, can only occur in total-lepton-number-conserving reactions, and are unobservably small. Off-shell CP-nonconserving effects which arise from gauge bosons are undetectable, but those which are mediated by Higgs bosons could be seen in certain rare decays. It is emphasized that CP-odd effects intrinsic to Majorana behavior depend not only on the two CP-violating Majorana phases but also on the KM phase. We then demonstrate why the KM model, which has rich implications in the hadronic sector, leads to no observable CP-violating effects in leptonic processes (except in neutrino oscillations) directly related to the CP-odd KM phase

  4. Where syntax meets math: Right Intraparietal Sulcus activation in response to grammatical number agreement violations

    Science.gov (United States)

    Carreiras, Manuel; Carr, Lindsay; Barber, Horacio A.; Hernandez, Arturo

    2009-01-01

    Previous research has shown that the processing of words referring to actions activated motor areas. Here we show activation of the right intraparietal sulcus, an area that has been associated with quantity processing, when participants are asked to read pairs of words with number agreement violations as opposed to phrases with gender agreement violations or with no violation. In addition, we show activation in the left premotor and left inferior frontal areas when either gender or number agreement is violated. We argue that number violation automatically activates processes linked to quantity processing which are not directly related to language mechanisms. PMID:19800410

  5. The effect of maintenance policy violations

    NARCIS (Netherlands)

    Rijsdijk, Christiaan; Tinga, Tiedo

    2014-01-01

    Motivation Maintenance policy assessments usually rely on expert judgement. We seek for some history based validation. Organisations may use our inference to assess risks of maintenance policy violations. Approach We depart from the arbitrary viewpoint that decisions have observable effects. We

  6. Quark mixing and CP violation

    International Nuclear Information System (INIS)

    Paschos, E.A.

    1992-01-01

    These lectures present a pedagogical introduction to the topics quark mixing and CP violation. They explain how the mixing matrix comes about and reviews the values of constraints for its elements. The second chapter reviews the CP transformation properties of amplitudes and defines the quantities which are measured in the experiments. Then it reviews the theory of CP violation in the standard model. In addition to the phase and the angles introduced through the flavor matrix, numerical predictions also depend (a) on hadronic matrix elements of weak current operators and (b) the short distance expansion of effective Hamiltonians computed by methods of Quantum Chromodynamics (QCD). I also review these topics and present predictions for (ε'/ε) which are shown to be consistent with the experiments. Last but not least, the article is divided into sections which are as self-contained as possible. The article assumes a general knowledge of the electroweak theory. For guidance, the interested reader will find a table of contents at the end of the text. (author). 29 refs, 5 figs, 1 tab

  7. Unitarity violation in noninteger dimensional Gross-Neveu-Yukawa model

    Science.gov (United States)

    Ji, Yao; Kelly, Michael

    2018-05-01

    We construct an explicit example of unitarity violation in fermionic quantum field theories in noninteger dimensions. We study the two-point correlation function of four-fermion operators. We compute the one-loop anomalous dimensions of these operators in the Gross-Neveu-Yukawa model. We find that at one-loop order, the four-fermion operators split into three classes with one class having negative norms. This implies that the theory violates unitarity, following the definition in Ref. [1].

  8. CRIMINAL RESPONSIBILITY OF STUDENTS REGARDING USING MOBILE DEVICES AND VIOLATING THE PRINCIPLES OF INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    Blaž Markelj

    2014-01-01

    Full Text Available The combination of information security and criminal law in the case of usage of smart mobile phones among the students is a very relevant and current topic. Namely, the number of smart mobile phones’ users is rising daily, including among the student population, due to the need for perpetual communication and constant access to information. However, the lack of knowledge about recommendations on information security and safe use of smart mobile phone together with their disregard could lead to criminal responsibility of the users of smart mobile phones, including students. The purpose of this paper is therefore to represent the potential consequences of criminal responsibility and how to avoid it. The knowledge on safe use of smart mobile phones, their software, but also threats and safety solutions is very low among students, as the survey shows. Due to the loss, conveyance or disclosure of protected data, criminal responsibility of a user could therefore be relevant. In certain cases the juvenile criminal justice system is partly still relevant due to the students’ age, whereas in every case the students' culpability should be assessed precisely. This assessment namely distinguishes the cases, when the student is a perpetrator of a criminal act from the cases, when the student is only a victim of a criminal act due to his improper use of smart mobile phones.

  9. Search for CP violation in singly Cabibbo suppressed four-body D decays

    Energy Technology Data Exchange (ETDEWEB)

    Martinelli, Maurizio [Univ. of Bari Aldo Moro (Italy)

    2011-02-01

    We search for CP violation in a sample of 4.7 x 104 singly Cabibbo suppressed D0 → K+ K- π+π- decays and 1.8(2.6) x 104 D(s)+ → KS0 K+ π+ π- decays. CP violation is searched for in the difference between the T-odd asymmetries, obtained using triple product correlations, measured for D and D decays. The measured CP violation parameters are AT(D0) = (1.0 ± 5.1(stat) ± 4.4(syst)) x 10-3, AT(D+) = (-11.96 ± 10.04(stat) ± 4.81(syst)) x 10-3 and AT(Ds+) = (-13.57 ± 7.67(stat) ± 4.82(syst)) x 10-3. This search for CP violation showed that the T-odd correlations are a powerful tool to measure the CP violating observable AT. The relative simplicity of an analysis based on T-odd correlations and the high quality results that can be obtained, allow to consider this tool as fundamental to search for CP violation in four-body decays. Even if the CP violation has not been found, excluding any New Physics effect to the sensitivity of about 0.5%, it is still worth to search for CP violation in D decays. The high statistics that can be obtained at the LHC or by the proposed high luminosity B-factories, make this topic to be considered in high consideration by experiments such as LHCb, SuperB or SuperBelle. The results outlined in this thesis strongly suggest to include a similar analysis into the Physics program of these experiments.

  10. Parity violation in proton-proton scattering at 221 MeV

    International Nuclear Information System (INIS)

    Berdoz, A.R.; Birchall, J.; Bland, J.B.; Campbell, J.R.; Green, A.A.; Hamian, A.A.; Lee, L.; Page, S.A.; Ramsay, W.D.; Reitzner, S.D.; Sekulovich, A.M.; Sum, V.; Oers, W.T.H. van; Woo, R.J.; Bowman, J.D.; Mischke, R.E.; Coombes, G.H.; Helmer, R.; Kadantsev, S.; Levy, C.D.P.

    2003-01-01

    TRIUMF experiment 497 has measured the parity-violating longitudinal analyzing power A z in p(vector sign)p elastic scattering at 221.3 MeV incident proton energy. This comprehensive paper includes details of the corrections, some of magnitude comparable to A z itself, required to arrive at the final result. The largest correction was for the effects of first moments of transverse polarization. The addition of the result, A z =[0.84±0.29 (stat.)±0.17 (syst.)]x10 -7 , to the p(vector sign)p parity-violation experimental data base greatly improves the experimental constraints on the weak meson-nucleon coupling constants h ρ pp and h ω pp , and also has implications for the interpretation of electron parity-violation experiments

  11. Boundary violations, gender and the nature of nursing work.

    Science.gov (United States)

    Chiarella, Mary; Adrian, Amanda

    2014-05-01

    Complaints against nurses can be made on several grounds and orders, including removal from the registry of nurses, can be made as a result of these complaints. Boundary violations generally relate to complaints around criminal charges, unsatisfactory professional conduct or professional misconduct or a lack of good character. This article explores the spectrum of boundary violations in the nurse-patient relationship by reviewing disciplinary cases from the New South Wales Nurses and Midwives Tribunal and Professional Standards Committees. The complaints spanned a spectrum of behaviours, from minor infringements such as inappropriate compliments to intimate touching and sexual intercourse. Furthermore, the majority of respondents were men, although men comprise a minority of the nursing profession. This phenomenon is discussed in terms of gender stereotyping and nursing work. In addition, the possibility that improved supervision may have gone some way to preventing the violations is explored.

  12. Analysis of parity violating nuclear effects at low energy

    Energy Technology Data Exchange (ETDEWEB)

    Desplanques, B; Missimer, J [Carnegie-Mellon Univ., Pittsburgh, Pa. (USA). Dept. of Physics

    1978-05-15

    The authors present an analysis of parity-violating nuclear effects at low energy which attempts to circumvent the uncertainties due to the weak and strong nucleon-nucleon interactions at short distances. Extending Danilov's parametrization of the parity-violating nucleon-nucleon scattering amplitude, they introduce six parameters: one for the long-range contribution due to the pion exchange and five for the shorter-range contributions. This choice gives an accurate representation of parity-violating effects in the nucleon-nucleon system up to a lab energy of 75 MeV. For calculations in nuclei, an effective two-body potential is derived in terms of the parameters. The analysis of presently measured effects shows that they are consistent, and, in particular, that the circular polarization of photons in n + p ..-->.. d + ..gamma.. is not incompatible with the other measurements. It does not imply a dominant isotensor component.

  13. Search for R-Parity Violating Decays of Scalar Fermions at LEP

    CERN Document Server

    Abbiendi, G.; Alexander, G.; Allison, John; Altekamp, N.; Anderson, K.J.; Anderson, S.; Arcelli, S.; Asai, S.; Ashby, S.F.; Axen, D.; Azuelos, G.; Ball, A.H.; Barberio, E.; Barlow, Roger J.; Batley, J.R.; Baumann, S.; Bechtluft, J.; Behnke, T.; Bell, Kenneth Watson; Bella, G.; Bellerive, A.; Bentvelsen, S.; Bethke, S.; Betts, S.; Biebel, O.; Biguzzi, A.; Bloodworth, I.J.; Bock, P.; Bohme, J.; Bonacorsi, D.; Boutemeur, M.; Braibant, S.; Bright-Thomas, P.; Brigliadori, L.; Brown, Robert M.; Burckhart, H.J.; Capiluppi, P.; Carnegie, R.K.; Carter, A.A.; Carter, J.R.; Chang, C.Y.; Charlton, David G.; Chrisman, D.; Ciocca, C.; Clarke, P.E.L.; Clay, E.; Cohen, I.; Conboy, J.E.; Cooke, O.C.; Couchman, J.; Couyoumtzelis, C.; Coxe, R.L.; Cuffiani, M.; Dado, S.; Dallavalle, G.Marco; Davis, R.; De Jong, S.; de Roeck, A.; Dervan, P.; Desch, K.; Dienes, B.; Dixit, M.S.; Dubbert, J.; Duchovni, E.; Duckeck, G.; Duerdoth, I.P.; Estabrooks, P.G.; Etzion, E.; Fabbri, F.; Fanfani, A.; Fanti, M.; Faust, A.A.; Fiedler, F.; Fierro, M.; Fleck, I.; Frey, A.; Furtjes, A.; Futyan, D.I.; Gagnon, P.; Gary, J.W.; Gascon-Shotkin, S.M.; Gaycken, G.; Geich-Gimbel, C.; Giacomelli, G.; Giacomelli, P.; Gibson, V.; Gibson, W.R.; Gingrich, D.M.; Glenzinski, D.; Goldberg, J.; Gorn, W.; Grandi, C.; Graham, K.; Gross, E.; Grunhaus, J.; Gruwe, M.; Hajdu, C.; Hanson, G.G.; Hansroul, M.; Hapke, M.; Harder, K.; Harel, A.; Hargrove, C.K.; Harin-Dirac, M.; Hauschild, M.; Hawkes, C.M.; Hawkings, R.; Hemingway, R.J.; Herndon, M.; Herten, G.; Heuer, R.D.; Hildreth, M.D.; Hill, J.C.; Hobson, P.R.; Hocker, James Andrew; Hoffman, Kara Dion; Homer, R.J.; Honma, A.K.; Horvath, D.; Hossain, K.R.; Howard, R.; Huntemeyer, P.; Igo-Kemenes, P.; Imrie, D.C.; Ishii, K.; Jacob, F.R.; Jawahery, A.; Jeremie, H.; Jimack, M.; Jones, C.R.; Jovanovic, P.; Junk, T.R.; Kanaya, N.; Kanzaki, J.; Karlen, D.; Kartvelishvili, V.; Kawagoe, K.; Kawamoto, T.; Kayal, P.I.; Keeler, R.K.; Kellogg, R.G.; Kennedy, B.W.; Kim, D.H.; Klier, A.; Kobayashi, T.; Kobel, M.; Kokott, T.P.; Kolrep, M.; Komamiya, S.; Kowalewski, Robert V.; Kress, T.; Krieger, P.; von Krogh, J.; Kuhl, T.; Kyberd, P.; Lafferty, G.D.; Landsman, H.; Lanske, D.; Lauber, J.; Lawson, I.; Layter, J.G.; Lellouch, D.; Letts, J.; Levinson, L.; Liebisch, R.; List, B.; Littlewood, C.; Lloyd, A.W.; Lloyd, S.L.; Loebinger, F.K.; Long, G.D.; Losty, M.J.; Lu, J.; Ludwig, J.; Lui, D.; Macchiolo, A.; Macpherson, A.; Mader, W.; Mannelli, M.; Marcellini, S.; Martin, A.J.; Martin, J.P.; Martinez, G.; Mashimo, T.; Mattig, Peter; McDonald, W.John; McKenna, J.; Mckigney, E.A.; McMahon, T.J.; McPherson, R.A.; Meijers, F.; Mendez-Lorenzo, P.; Merritt, F.S.; Mes, H.; Michelini, A.; Mihara, S.; Mikenberg, G.; Miller, D.J.; Mohr, W.; Montanari, A.; Mori, T.; Nagai, K.; Nakamura, I.; Neal, H.A.; Nisius, R.; O'Neale, S.W.; Oakham, F.G.; Odorici, F.; Ogren, H.O.; Okpara, A.; Oreglia, M.J.; Orito, S.; Pasztor, G.; Pater, J.R.; Patrick, G.N.; Patt, J.; Perez-Ochoa, R.; Petzold, S.; Pfeifenschneider, P.; Pilcher, J.E.; Pinfold, J.; Plane, David E.; Poffenberger, P.; Poli, B.; Polok, J.; Przybycien, M.; Quadt, A.; Rembser, C.; Rick, H.; Robertson, S.; Robins, S.A.; Rodning, N.; Roney, J.M.; Rosati, S.; Roscoe, K.; Rossi, A.M.; Rozen, Y.; Runge, K.; Runolfsson, O.; Rust, D.R.; Sachs, K.; Saeki, T.; Sahr, O.; Sang, W.M.; Sarkisian, E.K.G.; Sbarra, C.; Schaile, A.D.; Schaile, O.; Scharff-Hansen, P.; Schieck, J.; Schmitt, S.; Schoning, A.; Schroder, Matthias; Schumacher, M.; Schwick, C.; Scott, W.G.; Seuster, R.; Shears, T.G.; Shen, B.C.; Shepherd-Themistocleous, C.H.; Sherwood, P.; Siroli, G.P.; Sittler, A.; Skuja, A.; Smith, A.M.; Snow, G.A.; Sobie, R.; Soldner-Rembold, S.; Spagnolo, S.; Sproston, M.; Stahl, A.; Stephens, K.; Steuerer, J.; Stoll, K.; Strom, David M.; Strohmer, R.; Surrow, B.; Talbot, S.D.; Taras, P.; Tarem, S.; Teuscher, R.; Thiergen, M.; Thomas, J.; Thomson, M.A.; Torrence, E.; Towers, S.; Trigger, I.; Trocsanyi, Z.; Tsur, E.; Turner-Watson, M.F.; Ueda, I.; Van Kooten, Rick J.; Vannerem, P.; Verzocchi, M.; Voss, H.; Wackerle, F.; Wagner, A.; Ward, C.P.; Ward, D.R.; Watkins, P.M.; Watson, A.T.; Watson, N.K.; Wells, P.S.; Wermes, N.; Wetterling, D.; White, J.S.; Wilson, G.W.; Wilson, J.A.; Wyatt, T.R.; Yamashita, S.; Zacek, V.; Zer-Zion, D.

    2000-01-01

    A search for pair produced scalar fermions with couplings that violate R-parity has been performed using a data sample corresponding to an integrated luminosity of 56 pb-1 at a centre-of-mass energy of sqrt{s}= 183 GeV collected with the OPAL detector at LEP. An important consequence of R-parity breaking interactions is that the lightest supersymmetric particle is expected to be unstable. Searches for R-parity violating decays of charged sleptons, sneutrinos and stop quarks have been performed under the assumptions that the lightest supersymmetric particle decays promptly and that only one of the R-parity violating couplings is dominant for each of the decay modes considered. Such processes would yield multi-leptons, jets plus leptons or multi-jets, with or without missing energy, in the final state. No significant excess of such events has been observed. Limits on the production cross-sections of scalar fermions in R-parity violating scenarios are obtained. Mass exclusion regions are also presented in the fr...

  14. Measurement of CP Violation in B^{0}→D^{+}D^{-} Decays.

    Science.gov (United States)

    Aaij, R; Adeva, B; Adinolfi, M; Ajaltouni, Z; Akar, S; Albrecht, J; Alessio, F; Alexander, M; Ali, S; Alkhazov, G; Alvarez Cartelle, P; Alves, A A; Amato, S; Amerio, S; Amhis, Y; An, L; Anderlini, L; Andreassi, G; Andreotti, M; Andrews, J E; Appleby, R B; Archilli, F; d'Argent, P; Arnau Romeu, J; Artamonov, A; Artuso, M; Aslanides, E; Auriemma, G; Baalouch, M; Babuschkin, I; Bachmann, S; Back, J J; Badalov, A; Baesso, C; Baker, S; Baldini, W; Barlow, R J; Barschel, C; Barsuk, S; Barter, W; Baszczyk, M; Batozskaya, V; Batsukh, B; Battista, V; Bay, A; Beaucourt, L; Beddow, J; Bedeschi, F; Bediaga, I; Bel, L J; Bellee, V; Belloli, N; Belous, K; Belyaev, I; Ben-Haim, E; Bencivenni, G; Benson, S; Benton, J; Berezhnoy, A; Bernet, R; Bertolin, A; Betti, F; Bettler, M-O; van Beuzekom, M; Bezshyiko, Ia; Bifani, S; Billoir, P; Bird, T; Birnkraut, A; Bitadze, A; Bizzeti, A; Blake, T; Blanc, F; Blouw, J; Blusk, S; Bocci, V; Boettcher, T; Bondar, A; Bondar, N; Bonivento, W; Borgheresi, A; Borghi, S; Borisyak, M; Borsato, M; Bossu, F; Boubdir, M; Bowcock, T J V; Bowen, E; Bozzi, C; Braun, S; Britsch, M; Britton, T; Brodzicka, J; Buchanan, E; Burr, C; Bursche, A; Buytaert, J; Cadeddu, S; Calabrese, R; Calvi, M; Calvo Gomez, M; Camboni, A; Campana, P; Campora Perez, D; Campora Perez, D H; Capriotti, L; Carbone, A; Carboni, G; Cardinale, R; Cardini, A; Carniti, P; Carson, L; Carvalho Akiba, K; Casse, G; Cassina, L; Castillo Garcia, L; Cattaneo, M; Cauet, Ch; Cavallero, G; Cenci, R; Charles, M; Charpentier, Ph; Chatzikonstantinidis, G; Chefdeville, M; Chen, S; Cheung, S-F; Chobanova, V; Chrzaszcz, M; Cid Vidal, X; Ciezarek, G; Clarke, P E L; Clemencic, M; Cliff, H V; Closier, J; Coco, V; Cogan, J; Cogneras, E; Cogoni, V; Cojocariu, L; Collazuol, G; Collins, P; Comerma-Montells, A; Contu, A; Cook, A; Coombs, G; Coquereau, S; Corti, G; Corvo, M; Costa Sobral, C M; Couturier, B; Cowan, G A; Craik, D C; Crocombe, A; Cruz Torres, M; Cunliffe, S; Currie, R; D'Ambrosio, C; Da Cunha Marinho, F; Dall'Occo, E; Dalseno, J; David, P N Y; Davis, A; De Aguiar Francisco, O; De Bruyn, K; De Capua, S; De Cian, M; De Miranda, J M; De Paula, L; De Serio, M; De Simone, P; Dean, C-T; Decamp, D; Deckenhoff, M; Del Buono, L; Demmer, M; Derkach, D; Deschamps, O; Dettori, F; Dey, B; Di Canto, A; Dijkstra, H; Dordei, F; Dorigo, M; Dosil Suárez, A; Dovbnya, A; Dreimanis, K; Dufour, L; Dujany, G; Dungs, K; Durante, P; Dzhelyadin, R; Dziurda, A; Dzyuba, A; Déléage, N; Easo, S; Ebert, M; Egede, U; Egorychev, V; Eidelman, S; Eisenhardt, S; Eitschberger, U; Ekelhof, R; Eklund, L; Elsasser, Ch; Ely, S; Esen, S; Evans, H M; Evans, T; Falabella, A; Farley, N; Farry, S; Fay, R; Fazzini, D; Ferguson, D; Fernandez Albor, V; Fernandez Prieto, A; Ferrari, F; Ferreira Rodrigues, F; Ferro-Luzzi, M; Filippov, S; Fini, R A; Fiore, M; Fiorini, M; Firlej, M; Fitzpatrick, C; Fiutowski, T; Fleuret, F; Fohl, K; Fontana, M; Fontanelli, F; Forshaw, D C; Forty, R; Franco Lima, V; Frank, M; Frei, C; Fu, J; Furfaro, E; Färber, C; Gallas Torreira, A; Galli, D; Gallorini, S; Gambetta, S; Gandelman, M; Gandini, P; Gao, Y; Garcia Martin, L M; García Pardiñas, J; Garra Tico, J; Garrido, L; Garsed, P J; Gascon, D; Gaspar, C; Gavardi, L; Gazzoni, G; Gerick, D; Gersabeck, E; Gersabeck, M; Gershon, T; Ghez, Ph; Gianì, S; Gibson, V; Girard, O G; Giubega, L; Gizdov, K; Gligorov, V V; Golubkov, D; Golutvin, A; Gomes, A; Gorelov, I V; Gotti, C; Grabalosa Gándara, M; Graciani Diaz, R; Granado Cardoso, L A; Graugés, E; Graverini, E; Graziani, G; Grecu, A; Griffith, P; Grillo, L; Gruberg Cazon, B R; Grünberg, O; Gushchin, E; Guz, Yu; Gys, T; Göbel, C; Hadavizadeh, T; Hadjivasiliou, C; Haefeli, G; Haen, C; Haines, S C; Hall, S; Hamilton, B; Han, X; Hansmann-Menzemer, S; Harnew, N; Harnew, S T; Harrison, J; Hatch, M; He, J; Head, T; Heister, A; Hennessy, K; Henrard, P; Henry, L; Hernando Morata, J A; van Herwijnen, E; Heß, M; Hicheur, A; Hill, D; Hombach, C; Hopchev, H; Hulsbergen, W; Humair, T; Hushchyn, M; Hussain, N; Hutchcroft, D; Idzik, M; Ilten, P; Jacobsson, R; Jaeger, A; Jalocha, J; Jans, E; Jawahery, A; Jiang, F; John, M; Johnson, D; Jones, C R; Joram, C; Jost, B; Jurik, N; Kandybei, S; Kanso, W; Karacson, M; Kariuki, J M; Karodia, S; Kecke, M; Kelsey, M; Kenyon, I R; Kenzie, M; Ketel, T; Khairullin, E; Khanji, B; Khurewathanakul, C; Kirn, T; Klaver, S; Klimaszewski, K; Koliiev, S; Kolpin, M; Komarov, I; Koopman, R F; Koppenburg, P; Kosmyntseva, A; Kozachuk, A; Kozeiha, M; Kravchuk, L; Kreplin, K; Kreps, M; Krokovny, P; Kruse, F; Krzemien, W; Kucewicz, W; Kucharczyk, M; Kudryavtsev, V; Kuonen, A K; Kurek, K; Kvaratskheliya, T; Lacarrere, D; Lafferty, G; Lai, A; Lambert, D; Lanfranchi, G; Langenbruch, C; Latham, T; Lazzeroni, C; Le Gac, R; van Leerdam, J; Lees, J-P; Leflat, A; Lefrançois, J; Lefèvre, R; Lemaitre, F; Lemos Cid, E; Leroy, O; Lesiak, T; Leverington, B; Li, Y; Likhomanenko, T; Lindner, R; Linn, C; Lionetto, F; Liu, B; Liu, X; Loh, D; Longstaff, I; Lopes, J H; Lucchesi, D; Lucio Martinez, M; Luo, H; Lupato, A; Luppi, E; Lupton, O; Lusiani, A; Lyu, X; Machefert, F; Maciuc, F; Maev, O; Maguire, K; Malde, S; Malinin, A; Maltsev, T; Manca, G; Mancinelli, G; Manning, P; Maratas, J; Marchand, J F; Marconi, U; Marin Benito, C; Marino, P; Marks, J; Martellotti, G; Martin, M; Martinelli, M; Martinez Santos, D; Martinez Vidal, F; Martins Tostes, D; Massacrier, L M; Massafferri, A; Matev, R; Mathad, A; Mathe, Z; Matteuzzi, C; Mauri, A; Maurin, B; Mazurov, A; McCann, M; McCarthy, J; McNab, A; McNulty, R; Meadows, B; Meier, F; Meissner, M; Melnychuk, D; Merk, M; Merli, A; Michielin, E; Milanes, D A; Minard, M-N; Mitzel, D S; Mogini, A; Molina Rodriguez, J; Monroy, I A; Monteil, S; Morandin, M; Morawski, P; Mordà, A; Morello, M J; Moron, J; Morris, A B; Mountain, R; Muheim, F; Mulder, M; Mussini, M; Müller, D; Müller, J; Müller, K; Müller, V; Naik, P; Nakada, T; Nandakumar, R; Nandi, A; Nasteva, I; Needham, M; Neri, N; Neubert, S; Neufeld, N; Neuner, M; Nguyen, A D; Nguyen, T D; Nguyen-Mau, C; Nieswand, S; Niet, R; Nikitin, N; Nikodem, T; Novoselov, A; O'Hanlon, D P; Oblakowska-Mucha, A; Obraztsov, V; Ogilvy, S; Oldeman, R; Onderwater, C J G; Otalora Goicochea, J M; Otto, A; Owen, P; Oyanguren, A; Pais, P R; Palano, A; Palombo, F; Palutan, M; Panman, J; Papanestis, A; Pappagallo, M; Pappalardo, L L; Parker, W; Parkes, C; Passaleva, G; Pastore, A; Patel, G D; Patel, M; Patrignani, C; Pearce, A; Pellegrino, A; Penso, G; Pepe Altarelli, M; Perazzini, S; Perret, P; Pescatore, L; Petridis, K; Petrolini, A; Petrov, A; Petruzzo, M; Picatoste Olloqui, E; Pietrzyk, B; Pikies, M; Pinci, D; Pistone, A; Piucci, A; Playfer, S; Plo Casasus, M; Poikela, T; Polci, F; Poluektov, A; Polyakov, I; Polycarpo, E; Pomery, G J; Popov, A; Popov, D; Popovici, B; Poslavskii, S; Potterat, C; Price, E; Price, J D; Prisciandaro, J; Pritchard, A; Prouve, C; Pugatch, V; Puig Navarro, A; Punzi, G; Qian, W; Quagliani, R; Rachwal, B; Rademacker, J H; Rama, M; Ramos Pernas, M; Rangel, M S; Raniuk, I; Raven, G; Redi, F; Reichert, S; Dos Reis, A C; Remon Alepuz, C; Renaudin, V; Ricciardi, S; Richards, S; Rihl, M; Rinnert, K; Rives Molina, V; Robbe, P; Rodrigues, A B; Rodrigues, E; Rodriguez Lopez, J A; Rodriguez Perez, P; Rogozhnikov, A; Roiser, S; Rollings, A; Romanovskiy, V; Romero Vidal, A; Ronayne, J W; Rotondo, M; Rudolph, M S; Ruf, T; Ruiz Valls, P; Saborido Silva, J J; Sadykhov, E; Sagidova, N; Saitta, B; Salustino Guimaraes, V; Sanchez Mayordomo, C; Sanmartin Sedes, B; Santacesaria, R; Santamarina Rios, C; Santimaria, M; Santovetti, E; Sarti, A; Satriano, C; Satta, A; Saunders, D M; Savrina, D; Schael, S; Schellenberg, M; Schiller, M; Schindler, H; Schlupp, M; Schmelling, M; Schmelzer, T; Schmidt, B; Schneider, O; Schopper, A; Schubert, K; Schubiger, M; Schune, M-H; Schwemmer, R; Sciascia, B; Sciubba, A; Semennikov, A; Sergi, A; Serra, N; Serrano, J; Sestini, L; Seyfert, P; Shapkin, M; Shapoval, I; Shcheglov, Y; Shears, T; Shekhtman, L; Shevchenko, V; Shires, A; Siddi, B G; Silva Coutinho, R; Silva de Oliveira, L; Simi, G; Simone, S; Sirendi, M; Skidmore, N; Skwarnicki, T; Smith, E; Smith, I T; Smith, J; Smith, M; Snoek, H; Sokoloff, M D; Soler, F J P; Souza De Paula, B; Spaan, B; Spradlin, P; Sridharan, S; Stagni, F; Stahl, M; Stahl, S; Stefko, P; Stefkova, S; Steinkamp, O; Stemmle, S; Stenyakin, O; Stevenson, S; Stoica, S; Stone, S; Storaci, B; Stracka, S; Straticiuc, M; Straumann, U; Sun, L; Sutcliffe, W; Swientek, K; Syropoulos, V; Szczekowski, M; Szumlak, T; T'Jampens, S; Tayduganov, A; Tekampe, T; Teklishyn, M; Tellarini, G; Teubert, F; Thomas, E; van Tilburg, J; Tilley, M J; Tisserand, V; Tobin, M; Tolk, S; Tomassetti, L; Tonelli, D; Topp-Joergensen, S; Toriello, F; Tournefier, E; Tourneur, S; Trabelsi, K; Traill, M; Tran, M T; Tresch, M; Trisovic, A; Tsaregorodtsev, A; Tsopelas, P; Tully, A; Tuning, N; Ukleja, A; Ustyuzhanin, A; Uwer, U; Vacca, C; Vagnoni, V; Valassi, A; Valat, S; Valenti, G; Vallier, A; Vazquez Gomez, R; Vazquez Regueiro, P; Vecchi, S; van Veghel, M; Velthuis, J J; Veltri, M; Veneziano, G; Venkateswaran, A; Vernet, M; Vesterinen, M; Viaud, B; Vieira, D; Vieites Diaz, M; Vilasis-Cardona, X; Volkov, V; Vollhardt, A; Voneki, B; Vorobyev, A; Vorobyev, V; Voß, C; de Vries, J A; Vázquez Sierra, C; Waldi, R; Wallace, C; Wallace, R; Walsh, J; Wang, J; Ward, D R; Wark, H M; Watson, N K; Websdale, D; Weiden, A; Whitehead, M; Wicht, J; Wilkinson, G; Wilkinson, M; Williams, M; Williams, M P; Williams, M; Williams, T; Wilson, F F; Wimberley, J; Wishahi, J; Wislicki, W; Witek, M; Wormser, G; Wotton, S A; Wraight, K; Wright, S; Wyllie, K; Xie, Y; Xing, Z; Xu, Z; Yang, Z; Yin, H; Yu, J; Yuan, X; Yushchenko, O; Zarebski, K A; Zavertyaev, M; Zhang, L; Zhang, Y; Zhang, Y; Zhelezov, A; Zheng, Y; Zhokhov, A; Zhu, X; Zhukov, V; Zucchelli, S

    2016-12-23

    The CP violation observables S and C in the decay channel B^{0}→D^{+}D^{-} are determined from a sample of proton-proton collisions at center-of-mass energies of 7 and 8 TeV, collected by the LHCb experiment and corresponding to an integrated luminosity of 3  fb^{-1}. The observable S describes CP violation in the interference between mixing and the decay amplitude, and C parametrizes direct CP violation in the decay. The following values are obtained from a flavor-tagged, decay-time-dependent analysis: S=-0.54_{-0.16}^{+0.17}(stat)±0.05(syst), C=0.26_{-0.17}^{+0.18}(stat)±0.02(syst). These values provide evidence for CP violation at a significance level of 4.0 standard deviations. The phase shift due to higher-order standard model corrections is constrained to a small value of Δϕ=-0.16_{-0.21}^{+0.19}  rad.

  15. Lepton flavor changing processes and CP violation in the 331 model

    Energy Technology Data Exchange (ETDEWEB)

    Liu, J T [Texas A and M Univ., College Station, TX (United States). Center for Theoretical Physics; Ng, D

    1994-01-01

    By extending the electroweak gauge group to SU(3){sub L}x U(1){sub y}, the 331 model incorporates dilepton gauge bosons Y which do not respect individual lepton family number. We point out that, in addition to family diagonal couplings such as Y-e-e that change lepton family number by two units, dileptons may also have family nondiagonal couplings such as Y-{mu}-e. The latter coupling violates lepton family number by a single unit and manifests itself via lepton flavor changing decays such as {mu} {yields} e{gamma} and p --+ c-1. The family non-diagonal interaction can be CP violating and typically generates extremely large leptonic electric dipole moments. We demonstrate a natural mechanism for eliminating both single unit lepton flavor violation and large leptonic CP violation. Although we focus on the 331 model, our results are applicable to other dilepton models as well, including SU(15) grand unification. (author). 41 refs., 2 figs.

  16. Violations of war: testing the meaning-making model among Vietnam veterans.

    Science.gov (United States)

    Steger, Michael F; Owens, Gina P; Park, Crystal L

    2015-01-01

    Posttrauma adjustment theories postulate that intense stressors violate people's beliefs about the world and perceived ability to achieve valued goals. Failure to make meaning from traumatic events exacerbates negative adjustment (e.g., PTSD), whereas success facilitates positive adjustment (e.g., stress-related growth). The current study aimed to test this model of direct and indirect effects among a sample of veterans. Vietnam veterans (N = 130) completed assessment measures in an online survey format. Participants were largely male (91%) and Caucasian (93%) with a mean age of 61 years. Results supported basic model tenets, linking military stress severity to violations of beliefs and goals. In the final model, only goal violations carried indirect effects of severity on PTSD symptoms. Presence of and search for meaning carried a portion of the indirect effects between goal violations and both PTSD and stress-related growth. Findings suggest that traumatic stress may disrupt people's goals and meaning-making may center on these disruptions. © 2014 Wiley Periodicals, Inc.

  17. Modeling Pedestrian’s Conformity Violation Behavior: A Complex Network Based Approach

    Directory of Open Access Journals (Sweden)

    Zhuping Zhou

    2014-01-01

    Full Text Available Pedestrian injuries and fatalities present a problem all over the world. Pedestrian conformity violation behaviors, which lead to many pedestrian crashes, are common phenomena at the signalized intersections in China. The concepts and metrics of complex networks are applied to analyze the structural characteristics and evolution rules of pedestrian network about the conformity violation crossings. First, a network of pedestrians crossing the street is established, and the network’s degree distributions are analyzed. Then, by using the basic idea of SI model, a spreading model of pedestrian illegal crossing behavior is proposed. Finally, through simulation analysis, pedestrian’s illegal crossing behavior trends are obtained in different network structures and different spreading rates. Some conclusions are drawn: as the waiting time increases, more pedestrians will join in the violation crossing once a pedestrian crosses on red firstly. And pedestrian’s conformity violation behavior will increase as the spreading rate increases.

  18. Zweig rule violation decays of the new particles

    International Nuclear Information System (INIS)

    Chaichian, M.; Hayashi, M.

    1976-01-01

    The specific decay modes of the new psi particles and their cascade products are considered according to an approximate scheme of sequential pole dominance proposed by Freund and Nambu, which is dictated by the dual model dynamics. Predictions and comparison with available data are presented. While asymptotically free gauge theory can trace the origin of violation of Zweig rule and the smallness of psi width, it can only give an estimate of the over-all violation of the rule and is not well suited for each decay channel separately. The sequential pole model fulfils this task. (Auth.)

  19. Neutrinoless double beta decay and lepton flavor violation

    International Nuclear Information System (INIS)

    Cirigliano, V.; Kurylov, A.; Vogel, P.; Ramsey-Musolf, M.J.

    2004-01-01

    We point out that extensions of the standard model with low scale (∼TeV) lepton number violation (LNV) generally lead to a pattern of lepton flavor violation (LFV) experimentally distinguishable from the one implied by models with grand unified theory scale LNV. As a consequence, muon LFV processes provide a powerful diagnostic tool to determine whether or not the effective neutrino mass can be deduced from the rate of neutrinoless double beta decay. We discuss the role of μ→eγ and μ→e conversion in nuclei, which will be studied with high sensitivity in forthcoming experiments

  20. 21 CFR 7.84 - Opportunity for presentation of views before report of criminal violation.

    Science.gov (United States)

    2010-04-01

    ... report of criminal violation. 7.84 Section 7.84 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ENFORCEMENT POLICY Criminal Violations § 7.84 Opportunity for presentation of views before report of criminal violation. (a)(1) Except as provided in paragraph (a) (2) and...

  1. Reproductive rights violations reported by Mexican women with HIV.

    Science.gov (United States)

    Kendall, Tamil

    2009-01-01

    Demand for reproductive health services by people with HIV is increasing, as is the urgency of protecting and promoting their reproductive rights. The reproductive rights of Mexicans with HIV are formally protected by the constitution and by health and anti-discrimination legislation, as well as by international conventions. However, the reproductive rights of women with HIV continue to be violated in public clinics and hospitals. This paper discusses three violations identified as priority problems by Mexican women with HIV, illustrating these problems with cases identified during a participatory skills building workshop. The violations cover the following rights: the right to non-discrimination, the right to adequate information and informed consent to medical procedures, and the right to choose the number and spacing of children. Physicians can either violate or promote reproductive rights. Unfortunately, in many instances Mexican physicians continue to perpetrate reproductive rights abuses against women with HIV. Collaborations between women with HIV, civil society, government, and international organizations are needed to educate and sanction health care providers and to support women with HIV in their pursuit of reproductive rights. Demanding accountability from health care practitioners and the State to guarantee reproductive rights in countries where these rights are formally protected will improve the quality of life of people with HIV and can demonstrate that rights-based approaches are compatible with and indeed, crucial for public health.

  2. Human rights violations among sexual and gender minorities in Kathmandu, Nepal: a qualitative investigation.

    Science.gov (United States)

    Singh, Sonal; Pant, Sunil Babu; Dhakal, Suben; Pokhrel, Subash; Mullany, Luke C

    2012-05-16

    Nepal has experienced sporadic reports of human rights violations among sexual and gender minorities. Our objective was to identify a range of human rights that are enshrined in international law and/or are commonly reported by sexual and gender minority participants in Kathmandu, to be nonprotected or violated. In September 2009 three focus group discussions were conducted by trained interviewers among a convenience sample of sexual and gender minority participants in Kathmandu Nepal. The modified Delphi technique was utilized to elicit and rank participant-generated definitions of human rights and their subsequent violations. Data was analyzed independently and cross checked by another investigator. Participants (n = 29) reported experiencing a range of human rights violations at home, work, educational, health care settings and in public places. Lack of adequate legal protection, physical and mental abuse and torture were commonly reported. Access to adequate legal protection and improvements in the family and healthcare environment were ranked as the most important priority areas. Sexual and gender minorities in Nepal experienced a range of human rights violations. Future efforts should enroll a larger and more systematic sample of participants to determine frequency, timing, and/or intensity of exposure to rights violations, and estimate the population-based impact of these rights violations on specific health outcomes.

  3. Search for CP violation in the decay Z → b overlinebg

    Science.gov (United States)

    Buskulic, D.; de Bonis, I.; Decamp, D.; Ghez, P.; Goy, C.; Lees, J.-P.; Lucotte, A.; Minard, M.-N.; Nief, J.-Y.; Odier, P.; Pietrzyk, B.; Casado, M. P.; Chmeissani, M.; Crespo, J. M.; Delfino, M.; Efthymiopoulos, I.; Fernandez, E.; Fernandez-Bosman, M.; Garrido, Ll.; Juste, A.; Martinez, M.; Orteu, S.; Padilla, C.; Park, I. C.; Pascual, A.; Perlas, J. A.; Riu, I.; Sanchez, F.; Teubert, F.; Colaleo, A.; Creanza, D.; de Palma, M.; Gelao, G.; Girone, M.; Iaselli, G.; Maggi, G.; Maggi, M.; Marinelli, N.; Nuzzo, S.; Ranieri, A.; Raso, G.; Ruggieri, F.; Selvaggi, G.; Silvestris, L.; Tempesta, P.; Zito, G.; Huang, X.; Lin, J.; Ouyang, Q.; Wang, T.; Xie, Y.; Xu, R.; Xue, S.; Zhang, J.; Zhang, L.; Zhao, W.; Alemany, R.; Bazarko, A. O.; Bonvicini, G.; Cattaneo, M.; Comas, P.; Coyle, P.; Drevermann, H.; Forty, R. W.; Frank, M.; Hagelberg, R.; Harvey, J.; Janot, P.; Jost, B.; Kneringer, E.; Knobloch, J.; Lehraus, I.; Lutters, G.; Martin, E. B.; Mato, P.; Minten, A.; Miquel, R.; Mir, Ll. M.; Moneta, L.; Oest, T.; Pacheco, A.; Pusztaszeri, J.-F.; Ranjard, F.; Rensing, P.; Rolandi, L.; Schlatter, D.; Schmelling, M.; Schmitt, M.; Schneider, O.; Tejessy, W.; Tomalin, I. R.; Venturi, A.; Wachsmuth, H.; Wagner, A.; Ajaltouni, Z.; Barrès, A.; Boyer, C.; Falvard, A.; Gay, P.; Guicheney, C.; Henrard, P.; Jousset, J.; Michel, B.; Monteil, S.; Montret, J.-C.; Pallin, D.; Perret, P.; Podlyski, F.; Proriol, J.; Rosnet, P.; Rossignol, J.-M.; Fearnley, T.; Hansen, J. B.; Hansen, J. D.; Hansen, J. R.; Hansen, P. H.; Nilsson, B. S.; Rensch, B.; Wäänänen, A.; Kyriakis, A.; Markou, C.; Simopoulou, E.; Siotis, I.; Vayaki, A.; Zachariadou, K.; Blondel, A.; Bonneaud, G.; Brient, J. C.; Bourdon, P.; Rougé, A.; Rumpf, M.; Valassi, A.; Verderi, M.; Videau, H.; Candlin, D. J.; Parsons, M. I.; Focardi, E.; Parrini, G.; Corden, M.; Georgiopoulos, C.; Jaffe, D. E.; Antonelli, A.; Bencivenni, G.; Bologna, G.; Bossi, F.; Campana, P.; Capon, G.; Casper, D.; Chiarella, V.; Felici, G.; Laurelli, P.; Mannocchi, G.; Murtas, F.; Murtas, G. P.; Passalacqua, L.; Pepe-Altarelli, M.; Curtis, L.; Dorris, S. J.; Halley, A. W.; Knowles, I. G.; Lynch, J. G.; O'Shea, V.; Raine, C.; Reeves, P.; Scarr, J. M.; Smith, K.; Teixeira-Dias, P.; Thompson, A. S.; Thomson, F.; Thorn, S.; Turnbull, R. M.; Becker, U.; Dhamotharan, S.; Geweniger, C.; Graefe, G.; Hanke, P.; Hansper, G.; Hepp, V.; Kluge, E. E.; Putzer, A.; Schmidt, M.; Sommer, J.; Stenzel, H.; Tittel, K.; Werner, S.; Wunsch, M.; Abbaneo, D.; Beuselinck, R.; Binnie, D. M.; Cameron, W.; Dornan, P. J.; Moutoussi, A.; Nash, J.; Sedgbeer, J. K.; Stacey, A. M.; Williams, M. D.; Dissertori, G.; Girtler, P.; Kuhn, D.; Rudolph, G.; Betteridge, A. P.; Bowdery, C. K.; Colrain, P.; Crawford, G.; Finch, A. J.; Foster, F.; Hughes, G.; Sloan, T.; Williams, M. I.; Galla, A.; Giehl, I.; Greene, A. M.; Kleinknecht, K.; Quast, G.; Renk, B.; Rohne, E.; Sander, H.-G.; van Gemmeren, P.; Zeitnitz, C.; Aubert, J. J.; Bencheikh, A. M.; Benchouk, C.; Bonissent, A.; Bujosa, G.; Calvet, D.; Carr, J.; Diaconu, C.; Etienne, F.; Konstantinidis, N.; Payre, P.; Rousseau, D.; Talby, M.; Sadouki, A.; Thulasidas, M.; Trabelsi, K.; Aleppo, M.; Ragusa, F.; Abt, I.; Assmann, R.; Bauer, C.; Blum, W.; Dietl, H.; Dydak, F.; Ganis, G.; Gotzhein, C.; Jakobs, K.; Kroha, H.; Lütjens, G.; Lutz, G.; Männer, W.; Moser, H.-G.; Richter, R.; Rosado-Schlosser, A.; Schael, S.; Settles, R.; Seywerd, H.; Denis, R. St.; Wiedenmann, W.; Wolf, G.; Boucrot, J.; Callot, O.; Choi, Y.; Cordier, A.; Davier, M.; Duflot, L.; Grivaz, J.-F.; Heusse, Ph.; Höcker, A.; Jacquet, M.; Kim, D. W.; Le Diberder, F.; Lefrançois, J.; Lutz, A.-M.; Nikolic, I.; Park, H. J.; Schune, M.-H.; Simion, S.; Veillet, J.-J.; Videau, I.; Zerwas, D.; Azzurri, P.; Bagliesi, G.; Batignani, G.; Bettarini, S.; Bozzi, C.; Calderini, G.; Carpinelli, M.; Ciocci, M. A.; Ciulli, V.; Dell'Orso, R.; Fantechi, R.; Ferrante, I.; Foà, L.; Forti, F.; Giassi, A.; Giorgi, M. A.; Gregorio, A.; Ligabue, F.; Lusiani, A.; Marrocchesi, P. S.; Messineo, A.; Palla, F.; Rizzo, G.; Sanguinetti, G.; Sciabà, A.; Spagnolo, P.; Steinberger, J.; Tenchini, R.; Tonelli, G.; Vannini, C.; Verdini, P. G.; Walsh, J.; Blair, G. A.; Bryant, L. M.; Cerutti, F.; Chambers, J. T.; Gao, Y.; Green, M. G.; Medcalf, T.; Perrodo, P.; Strong, J. A.; von Wimmersperg-Toeller, J. H.; Botterill, D. R.; Clifft, R. W.; Edgecock, T. R.; Haywood, S.; Maley, P.; Norton, P. R.; Thompson, J. C.; Wright, A. E.; Bloch-Devaux, B.; Colas, P.; Emery, S.; Kozanecki, W.; Lançon, E.; Lemaire, M. C.; Locci, E.; Marx, B.; Perez, P.; Rander, J.; Renardy, J.-F.; Roussarie, A.; Schuller, J.-P.; Schwindling, J.; Trabelsi, A.; Vallage, B.; Black, S. N.; Dann, J. H.; Johnson, R. P.; Kim, H. Y.; Litke, A. M.; McNeil, M. A.; Taylor, G.; Booth, C. N.; Boswell, R.; Brew, C. A. J.; Cartwright, S.; Combley, F.; Koksal, A.; Letho, M.; Newton, W. M.; Reeve, J.; Thompson, L. F.; Böhrer, A.; Brandt, S.; Büscher, V.; Cowan, G.; Grupen, C.; Minguet-Rodriguez, J.; Rivera, F.; Saraiva, P.; Smolik, L.; Stephan, F.; Apollonio, M.; Bosisio, L.; Della Marina, R.; Giannini, G.; Gobbo, B.; Musolino, G.; Rothberg, J.; Wasserbaech, S.; Armstrong, S. R.; Elmer, P.; Feng, Z.; Ferguson, D. P. S.; Gao, Y. S.; González, S.; Grahl, J.; Greening, T. C.; Hayes, O. J.; Hu, H.; McNamara, P. A.; Nachtman, J. M.; Orejudos, W.; Pan, Y. B.; Saadi, Y.; Scott, I. J.; Walsh, A. M.; Wu, Sau Lan; Wu, X.; Yamartino, J. M.; Zheng, M.; Zobernig, G.; Aleph Collaboration

    1996-02-01

    About three million hadronic decays of the Z collected by ALEPH in the years 1991 to 1994 are used to search for anomalous CP violation beyond the Standard Model in the decay Z → b overlinebg . The study is performed by analyzing angular correlations between the two quarks and the gluon in three-jet events and by measuring the differential two-jet rate. No signal of CP violation is found. For the combinations of anomalous CP violating couplings, ĥb = ĥAbg Vb - ĥVbg Ab and b∗ = ĥVb2+ ĥAb2, limits of | ĥb | < 0.59 and h b∗ < 3.02 are given at 95% CL.

  4. Beauty for pedestrians toy models for CP violation and baryon asymmetry

    International Nuclear Information System (INIS)

    Lipkin, H.J.

    1995-01-01

    Why are particles different from antiparticles? C and P Violation - 1956; CP Violation - 1964. Why so little new experimental information in thirty years? Where has all the antimatter gone? Toy models are presented showing: (1) How CPT and ΔI = 1/2 make life difficult in kaon physics by requiring equal K ± total widths and also equal partial widths to many exclusive channels. (2) How to understand and get around CPT restrictions. (3) How CP asymmetries can occur in exclusive partial widths and still add up to equal total widths. (4) Sakharov's 1966 scenario for how CP Violation + proton decay can explain baryon asymmetry (5) How B physics can help

  5. CP-Violating solitons in the early universe

    International Nuclear Information System (INIS)

    Tornkvist, O.; Riotto, A.

    1997-07-01

    Solitons in extensions of the Standard Model can serve as localized sources of CP violation. Depending on their stability properties, they may serve either to create or to deplete the baryon asymmetry. The conditions for existence of a particular soliton candidate, the membrane solution of the two-Higgs model, are presented. In the generic case, investigated by Bachas and Tomaras, membranes exist and are metastable for a wide range of parameters. For the more viable supersymmetric case, it is shown that the present-day existence of CP-violating membranes is experimentally excluded, but preliminary studies suggest that they may have existed in the early universe soon after the electroweak phase transition, with important consequences for the baryon asymmetry of the universe

  6. Lepton number violating processes and Majorana neutrinos

    International Nuclear Information System (INIS)

    Dib, C.; Schmidt, I.; Gribanov, V.; Kovalenko, S.

    2001-01-01

    Some generic properties of lepton number violating processes and their relation to different entries of the Majorana neutrino mass matrix are discussed. Present and near future experiments searching for these processes, except the neutrinoless double beta decay, are unable to probe light (eV mass region) and heavy (hundred GeV mass region) neutrinos. On the other hand, due to the effect of a resonant enhancement, some of lepton number violating decays can be very sensitive to the intermediate-mass neutrinos with typical masses in the hundred MeV region. These neutrinos may appear as admixtures of the three active and an arbitrary number of sterile neutrino species. The experimental constraints on these massive neutrino states are analyzed and their possible cosmological and astrophysical implications are discussed

  7. 28 CFR 810.3 - Consequences of violating the conditions of supervision.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Consequences of violating the conditions of supervision. 810.3 Section 810.3 Judicial Administration COURT SERVICES AND OFFENDER SUPERVISION AGENCY FOR THE DISTRICT OF COLUMBIA COMMUNITY SUPERVISION: ADMINISTRATIVE SANCTIONS § 810.3 Consequences of violating the conditions of supervision. ...

  8. Do violations of the axioms of expected utility theory threaten decision analysis?

    Science.gov (United States)

    Nease, R F

    1996-01-01

    Research demonstrates that people violate the independence principle of expected utility theory, raising the question of whether expected utility theory is normative for medical decision making. The author provides three arguments that violations of the independence principle are less problematic than they might first appear. First, the independence principle follows from other more fundamental axioms whose appeal may be more readily apparent than that of the independence principle. Second, the axioms need not be descriptive to be normative, and they need not be attractive to all decision makers for expected utility theory to be useful for some. Finally, by providing a metaphor of decision analysis as a conversation between the actual decision maker and a model decision maker, the author argues that expected utility theory need not be purely normative for decision analysis to be useful. In short, violations of the independence principle do not necessarily represent direct violations of the axioms of expected utility theory; behavioral violations of the axioms of expected utility theory do not necessarily imply that decision analysis is not normative; and full normativeness is not necessary for decision analysis to generate valuable insights.

  9. Baryon number violation, baryogenesis, and defects with extra dimensions

    International Nuclear Information System (INIS)

    Matsuda, Tomohiro

    2002-01-01

    In generic models for grand unified theories (GUT), various types of baryon-number-violating processes are expected when quarks and leptons propagate in the background of GUT strings. On the other hand, in models with large extra dimensions, the baryon number violation in the background of a string is not trivial because it must depend on the mechanism of the proton stabilization. In this paper, we argue that cosmic strings in models with extra dimensions can enhance the baryon number violation to a phenomenologically interesting level, if the proton decay is suppressed by the mechanism of localized wave functions. We also make some comments on baryogenesis mediated by cosmological defects. We show that at least two scenarios will be successful in this direction. One is the scenario of leptogenesis where the required lepton number conversion is mediated by cosmic strings, and the other is the baryogenesis from the decaying cosmological domain wall. Both scenarios are new and have not been discussed in the past

  10. Understanding Violations of Gricean Maxims in Preschoolers and Adults

    Directory of Open Access Journals (Sweden)

    Mako eOkanda

    2015-07-01

    Full Text Available This study used a revised Conversational Violations Test to examine Gricean maxim violations in 4- to 6-year-old Japanese children and adults. Participants’ understanding of the following maxims was assessed: be informative (first maxim of quantity, avoid redundancy (second maxim of quantity, be truthful (maxim of quality, be relevant (maxim of relation, avoid ambiguity (second maxim of manner, and be polite (maxim of politeness. Sensitivity to violations of Gricean maxims increased with age: 4-year-olds’ understanding of maxims was near chance, 5-year-olds understood some maxims (first maxim of quantity and maxims of quality, relation, and manner, and 6-year-olds and adults understood all maxims. Preschoolers acquired the maxim of relation first and had the greatest difficulty understanding the second maxim of quantity. Children and adults differed in their comprehension of the maxim of politeness. The development of the pragmatic understanding of Gricean maxims and implications for the construction of developmental tasks from early childhood to adulthood are discussed.

  11. Towards improved measurements of parity violation in atomic ytterbium

    Energy Technology Data Exchange (ETDEWEB)

    Antypas, D., E-mail: dantypas@uni-mainz.de [Helmholtz-Institut Mainz (Germany); Fabricant, A.; Bougas, L. [Johannes Gutenberg-Universität Mainz, Institut für Physik (Germany); Tsigutkin, K. [ASML (Netherlands); Budker, D. [Helmholtz-Institut Mainz (Germany)

    2017-11-15

    We report on progress towards performing precision measurements of parity violation in Yb, in which the theoretical prediction for a strong weak-interaction-induced effect in the 6s{sup 2} {sup 1}S{sub 0}→ 5d6s{sup 3}D{sub 1} optical transition at 408 nm has already been confirmed, with a measurement of the effect at the ≈10 % level of accuracy. With a new atomic-beam apparatus offering enhanced sensitivity, we are aiming at precisely determining the parity violation observable in Yb, which will allow us to probe the distributions of neutrons in different isotopes, investigate physics beyond the Standard Model, as well as to study intra-nucleus weak interactions, through an observation of the anapole moment of Yb nuclei with nonzero spin. We present the experimental principle employed to probe atomic parity violation, describe our new apparatus, and discuss the attained experimental sensitivity as well as the methods for characterizing systematics in these measurements.

  12. W K H Panofsky prize awarded for CP violation

    CERN Multimedia

    2006-01-01

    Italo Mannelli (left) et Heinrich Wahl (right) at CERN after the announcement of the prize. The American Physical Society has recently announced its 2007 winners of the W K H Panofsky prize to CERN's Heinrich Wahl (now at the University of Ferrara), Italo Mannelli from Scuola Normale Superiore di Pisa and Bruce Winstein of University of Chicago. These three physicists led experiments that resulted in a multitude of precision measurements of properties of neutral kaons, most notably the discovery of direct CP violation. The W K H Panofsky prize recognizes outstanding achievements in experimental particle physics. Wahl and Mannelli's important work at CERN with CP violation and neutral kaons in the 1970s paved the way for the NA31 experiment in the 1980s. This experiment, of which Wahl was the spokesperson, focused on and found the first evidence for direct CP violation. Mannelli played a leading role, particularly in implementing his knowledge of calorimetry using liquefied noble gases, a technique originally...

  13. Lepton-flavour violating $B$ decays in generic $Z'$ models

    CERN Document Server

    Crivellin, Andreas; Matias, Joaquim; Nierste, Ulrich; Pokorski, Stefan; Rosiek, Janusz

    2015-01-01

    LHCb has reported deviations from the SM expectations in $B\\to K^* \\mu^+\\mu^-$ angular observables, in $B_s\\to\\phi\\mu^+\\mu^-$ and in ratio $R(K)=Br[B\\to K \\mu^+\\mu^-]/Br[B\\to K e^+e^-]$. For all three decays, a heavy neutral gauge boson mediating $b\\to s\\mu^+\\mu^-$ transitions is a prime candidate for an explanation. As $R(K)$ measures violation of lepton-flavour universality, it is interesting to examine the possibility that also lepton flavour is violated. In this article, we investigate the perspectives to discover the lepton-flavour violating modes $B\\to K^{(*)}\\tau^\\pm\\mu^\\mp$, $B_s\\to \\tau^\\pm\\mu^\\mp$ and $B\\to K^{(*)} \\mu^\\pm e^\\mp$, $B_s\\to \\mu^\\pm e^\\mp$. For this purpose we consider a simplified model in which new-physics effects originate from an additional neutral gauge boson ($Z^\\prime$) with generic couplings to quarks and leptons. The constraints from $\\tau\\to3\\mu$, $\\tau\\to\\mu\

  14. The Impact of Coworkers’ Safety Violations on an Individual Worker: A Social Contagion Effect within the Construction Crew

    Science.gov (United States)

    Zhang, Shoujian; Su, Yikun

    2018-01-01

    This research developed and tested a model of the social contagion effect of coworkers’ safety violations on individual workers within construction crews. Both situational and routine safety violations were considered in this model. Empirical data were collected from 345 construction workers in China using a detailed questionnaire. The results showed that both types of safety violations made by coworkers were significantly related to individuals’ perceived social support and production pressure. Individuals’ attitudinal ambivalence toward safety compliance mediated the relationships between perceived social support and production pressure and both types of individuals’ safety violations. However, safety motivation only mediated the effects of perceived social support and production pressure on individuals’ situational safety violations. Further, this research supported the differences between situational and routine safety violations. Specifically, we found that individuals were more likely to imitate coworkers’ routine safety violations than their situational safety violations. Coworkers’ situational safety violations had an indirect effect on individuals’ situational safety violations mainly through perceived social support and safety motivation. By contrast, coworkers’ routine safety violations had an indirect effect on individuals’ routine safety violations mainly through perceived production pressure and attitudinal ambivalence. Finally, the theoretical and practical implications, research limitations, and future directions were discussed. PMID:29673149

  15. The Impact of Coworkers' Safety Violations on an Individual Worker: A Social Contagion Effect within the Construction Crew.

    Science.gov (United States)

    Liang, Huakang; Lin, Ken-Yu; Zhang, Shoujian; Su, Yikun

    2018-04-17

    This research developed and tested a model of the social contagion effect of coworkers’ safety violations on individual workers within construction crews. Both situational and routine safety violations were considered in this model. Empirical data were collected from 345 construction workers in China using a detailed questionnaire. The results showed that both types of safety violations made by coworkers were significantly related to individuals’ perceived social support and production pressure. Individuals’ attitudinal ambivalence toward safety compliance mediated the relationships between perceived social support and production pressure and both types of individuals’ safety violations. However, safety motivation only mediated the effects of perceived social support and production pressure on individuals’ situational safety violations. Further, this research supported the differences between situational and routine safety violations. Specifically, we found that individuals were more likely to imitate coworkers’ routine safety violations than their situational safety violations. Coworkers’ situational safety violations had an indirect effect on individuals’ situational safety violations mainly through perceived social support and safety motivation. By contrast, coworkers’ routine safety violations had an indirect effect on individuals’ routine safety violations mainly through perceived production pressure and attitudinal ambivalence. Finally, the theoretical and practical implications, research limitations, and future directions were discussed.

  16. Mass mixing, CP violation and left-right symmetry for heavy neutral mesons

    International Nuclear Information System (INIS)

    Ecker, G.; Grimus, W.

    1985-01-01

    We investigate M 0 - M-bar 0 mixing and CP violation in the minimal left-right symmetric gauge model with spontaneous P and CP violation. The dominant contributions to the mixing amplitude including QCD corrections are calculated explicitly for B 0 - B-bar 0 . While the amount of mixing is not much changed with respect to the standard model left-right symmetry can give rise to significantly larger CP violation in the B 0 sub(s) - B-bar 0 sub(s) system (up to two orders of magnitude for the dilepton charge asymmetry). Sizable CP violating effects require that the left-right contribution to the KsubLKsubS mass difference has the same sign as the standard model contribution. We also comment on D 0 - D-bar 0 mixing including a careful discussion of the standard model prediction. (Author)

  17. Asymmetric dark matter and CP violating scatterings in a UV complete model

    Energy Technology Data Exchange (ETDEWEB)

    Baldes, Iason; Bell, Nicole F.; Millar, Alexander J.; Volkas, Raymond R. [ARC Centre of Excellence for Particle Physics at the Terascale,School of Physics, The University of Melbourne, Victoria, 3010 (Australia)

    2015-10-21

    We explore possible asymmetric dark matter models using CP violating scatterings to generate an asymmetry. In particular, we introduce a new model, based on DM fields coupling to the SM Higgs and lepton doublets, a neutrino portal, and explore its UV completions. We study the CP violation and asymmetry formation of this model, to demonstrate that it is capable of producing the correct abundance of dark matter and the observed matter-antimatter asymmetry. Crucial to achieving this is the introduction of interactions which violate CP with a T{sup 2} dependence.

  18. Asymmetric dark matter and CP violating scatterings in a UV complete model

    Energy Technology Data Exchange (ETDEWEB)

    Baldes, Iason; Bell, Nicole F.; Millar, Alexander J.; Volkas, Raymond R., E-mail: i.baldes@student.unimelb.edu.au, E-mail: n.bell@unimelb.edu.au, E-mail: amillar@student.unimelb.edu.au, E-mail: raymondv@unimelb.edu.au [ARC Centre of Excellence for Particle Physics at the Terascale, School of Physics, The University of Melbourne, Victoria, 3010 Australia (Australia)

    2015-10-01

    We explore possible asymmetric dark matter models using CP violating scatterings to generate an asymmetry. In particular, we introduce a new model, based on DM fields coupling to the SM Higgs and lepton doublets, a neutrino portal, and explore its UV completions. We study the CP violation and asymmetry formation of this model, to demonstrate that it is capable of producing the correct abundance of dark matter and the observed matter-antimatter asymmetry. Crucial to achieving this is the introduction of interactions which violate CP with a T{sup 2} dependence.

  19. Measurement of CP violation in B-s(0) ->Phi Phi decays

    NARCIS (Netherlands)

    Aaij, R.; Adeva, B.; Adinolfi, M.; Affolder, A.; Ajaltouni, Z.; Akar, S.; Albrecht, J.; Alessio, F.; Alexander, M.; Ali, S.; Alkhazov, G.; Alvarez Cartelle, P.; Alves, A. A.; Amato, S.; Amerio, S.; Amhis, Y.; An, L.; Anderlini, L.; Anderson, J.; Andreassen, R.; Andreotti, M.; Andrews, J. E.; Appleby, R. B.; Gutierrez, O. Aquines; Archilli, F.; Artamonov, A.; Artuso, M.; Aslanides, E.; Auriemma, G.; Baalouch, M.; Bachmann, S.; Back, J. J.; Badalov, A.; Balagura, V.; Baldini, W.; Barlow, R. J.; Barschel, C.; Barsuk, S.; Barter, W.; Batozskaya, V.; Battista, V.; Bay, A.; Beaucourt, L.; Beddow, J.; Bedeschi, F.; Bediaga, I.; Belogurov, S.; Belous, K.; Onderwater, G.; Pellegrino, A.

    2014-01-01

    A measurement of the decay time-dependent CP-violating asymmetry in B-s(0) -> phi phi decays is presented, along with measurements of the T-odd triple-product asymmetries. In this decay channel, the CP-violating weak phase arises from the interference between B-s(0) -(B) over bar (0)(s) mixing and

  20. How culture gets embrained: Cultural differences in event-related potentials of social norm violations.

    Science.gov (United States)

    Mu, Yan; Kitayama, Shinobu; Han, Shihui; Gelfand, Michele J

    2015-12-15

    Humans are unique among all species in their ability to develop and enforce social norms, but there is wide variation in the strength of social norms across human societies. Despite this fundamental aspect of human nature, there has been surprisingly little research on how social norm violations are detected at the neurobiological level. Building on the emerging field of cultural neuroscience, we combine noninvasive electroencephalography (EEG) with a new social norm violation paradigm to examine the neural mechanisms underlying the detection of norm violations and how they vary across cultures. EEG recordings from Chinese and US participants (n = 50) showed consistent negative deflection of event-related potential around 400 ms (N400) over the central and parietal regions that served as a culture-general neural marker of detecting norm violations. The N400 at the frontal and temporal regions, however, was only observed among Chinese but not US participants, illustrating culture-specific neural substrates of the detection of norm violations. Further, the frontal N400 predicted a variety of behavioral and attitudinal measurements related to the strength of social norms that have been found at the national and state levels, including higher culture superiority and self-control but lower creativity. There were no cultural differences in the N400 induced by semantic violation, suggesting a unique cultural influence on social norm violation detection. In all, these findings provided the first evidence, to our knowledge, for the neurobiological foundations of social norm violation detection and its variation across cultures.