Sample records for number violating processes

  1. Where syntax meets math: Right Intraparietal Sulcus activation in response to grammatical number agreement violations

    PubMed Central

    Carreiras, Manuel; Carr, Lindsay; Barber, Horacio A.; Hernandez, Arturo

    2009-01-01

    Previous research has shown that the processing of words referring to actions activated motor areas. Here we show activation of the right intraparietal sulcus, an area that has been associated with quantity processing, when participants are asked to read pairs of words with number agreement violations as opposed to phrases with gender agreement violations or with no violation. In addition, we show activation in the left premotor and left inferior frontal areas when either gender or number agreement is violated. We argue that number violation automatically activates processes linked to quantity processing which are not directly related to language mechanisms. PMID:19800410

  2. Cosmological baryon and lepton number in the presence of electroweak fermion-number violation

    NASA Technical Reports Server (NTRS)

    Harvey, Jeffrey A.; Turner, Michael S.

    1990-01-01

    In the presence of rapid fermion-number violation due to nonperturbative electroweak effects certain relations between the baryon number of the Universe and the lepton numbers of the Universe are predicted. In some cases the electron-neutrino asymmetry is exactly specified in terms of the baryon asymmetry. Without introducing new particles, beyond the usual quarks and leptons, it is necessary that the Universe possess a nonzero value of B - L prior to the epoch of fermion-number violation if baryon and lepton asymmetries are to survive. Contrary to intuition, even though electroweak processes violate B + L, a nonzero value of B + L persists after the epoch of rapid fermion-number violation. If the standard model is extended to include lepton-number violation, for example through Majorana neutrino masses, then electroweak processes will reduce the baryon number to zero even in the presence of an initial B - L unless 20 M(sub L) approximately greater than the square root of (T(sub B - L) m(sub P1)) where M(sub L) sets the scale of lepton number violation and T(sub B - L) is the temperature at which a B - L asymmetry is produced. In many models this implies that neutrinos must be so light that they cannot contribute appreciably to the mass density of the Universe.

  3. Clitic pronouns reveal the time course of processing gender and number in a second language

    PubMed Central

    Rossi, Eleonora; Kroll, Judith F.; Dussias, Paola E.

    2014-01-01

    This study investigates grammatical gender and number processing marked on clitic pronouns in native Spanish speakers and in late English-Spanish bilinguals using ERPs. Spanish clitic pronouns were chosen as a critical grammatical structure which is absent in English, and which encodes both grammatical gender and number. Number, but not grammatical gender, is present in English, making this structure a prime one to investigate second language processing. Results reveal a P600 effect in native speakers for violations of both gender and number. Late but relatively proficient English-Spanish bilinguals show a P600 effect only for number violations occurring at the clitic pronoun, but not for gender violations. However a post-hoc analysis reveals that a subset of highly proficient late bilinguals does reveal sensitivity to violations of grammatical gender marked on clitic pronouns. Taken together these results suggest that native-like processing is possible for highly proficient late second language learners for grammatical features that are not present in the speakers' native language, even when those features are encoded on a grammatical morpheme which itself is absent in the speakers' native language. PMID:25036762

  4. Δ L =3 processes: Proton decay and the LHC

    NASA Astrophysics Data System (ADS)

    Fonseca, Renato M.; Hirsch, Martin; Srivastava, Rahul

    2018-04-01

    We discuss lepton number violation in three units. From an effective field theory point of view, Δ L =3 processes can only arise from dimension 9 or higher operators. These operators also violate baryon number, hence many of them will induce proton decay. Given the high dimensionality of these operators, in order to have a proton half-life in the observable range, the new physics associated to Δ L =3 processes should be at a scale as low as 1 TeV. This opens up the possibility of searching for such processes not only in proton decay experiments but also at the LHC. In this work we analyze the relevant d =9 , 11, 13 operators which violate lepton number in three units. We then construct one simple concrete model with interesting low- and high-energy phenomenology.

  5. Lepton number violation in theories with a large number of standard model copies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kovalenko, Sergey; Schmidt, Ivan; Paes, Heinrich

    2011-03-01

    We examine lepton number violation (LNV) in theories with a saturated black hole bound on a large number of species. Such theories have been advocated recently as a possible solution to the hierarchy problem and an explanation of the smallness of neutrino masses. On the other hand, the violation of the lepton number can be a potential phenomenological problem of this N-copy extension of the standard model as due to the low quantum gravity scale black holes may induce TeV scale LNV operators generating unacceptably large rates of LNV processes. We show, however, that this issue can be avoided bymore » introducing a spontaneously broken U{sub 1(B-L)}. Then, due to the existence of a specific compensation mechanism between contributions of different Majorana neutrino states, LNV processes in the standard model copy become extremely suppressed with rates far beyond experimental reach.« less

  6. Information Structure Influences Depth of Syntactic Processing: Event-Related Potential Evidence for the Chomsky Illusion

    PubMed Central

    Wang, Lin; Bastiaansen, Marcel; Yang, Yufang; Hagoort, Peter

    2012-01-01

    Information structure facilitates communication between interlocutors by highlighting relevant information. It has previously been shown that information structure modulates the depth of semantic processing. Here we used event-related potentials to investigate whether information structure can modulate the depth of syntactic processing. In question-answer pairs, subtle (number agreement) or salient (phrase structure) syntactic violations were placed either in focus or out of focus through information structure marking. P600 effects to these violations reflect the depth of syntactic processing. For subtle violations, a P600 effect was observed in the focus condition, but not in the non-focus condition. For salient violations, comparable P600 effects were found in both conditions. These results indicate that information structure can modulate the depth of syntactic processing, but that this effect depends on the salience of the information. When subtle violations are not in focus, they are processed less elaborately. We label this phenomenon the Chomsky illusion. PMID:23110131

  7. Information structure influences depth of syntactic processing: event-related potential evidence for the Chomsky illusion.

    PubMed

    Wang, Lin; Bastiaansen, Marcel; Yang, Yufang; Hagoort, Peter

    2012-01-01

    Information structure facilitates communication between interlocutors by highlighting relevant information. It has previously been shown that information structure modulates the depth of semantic processing. Here we used event-related potentials to investigate whether information structure can modulate the depth of syntactic processing. In question-answer pairs, subtle (number agreement) or salient (phrase structure) syntactic violations were placed either in focus or out of focus through information structure marking. P600 effects to these violations reflect the depth of syntactic processing. For subtle violations, a P600 effect was observed in the focus condition, but not in the non-focus condition. For salient violations, comparable P600 effects were found in both conditions. These results indicate that information structure can modulate the depth of syntactic processing, but that this effect depends on the salience of the information. When subtle violations are not in focus, they are processed less elaborately. We label this phenomenon the Chomsky illusion.

  8. A person is not a number: discourse involvement in subject-verb agreement computation.

    PubMed

    Mancini, Simona; Molinaro, Nicola; Rizzi, Luigi; Carreiras, Manuel

    2011-09-02

    Agreement is a very important mechanism for language processing. Mainstream psycholinguistic research on subject-verb agreement processing has emphasized the purely formal and encapsulated nature of this phenomenon, positing an equivalent access to person and number features. However, person and number are intrinsically different, because person conveys extra-syntactic information concerning the participants in the speech act. To test the person-number dissociation hypothesis we investigated the neural correlates of subject-verb agreement in Spanish, using person and number violations. While number agreement violations produced a left-anterior negativity followed by a P600 with a posterior distribution, the negativity elicited by person anomalies had a centro-posterior maximum and was followed by a P600 effect that was frontally distributed in the early phase and posteriorly distributed in the late phase. These data reveal that the parser is differentially sensitive to the two features and that it deals with the two anomalies by adopting different strategies, due to the different levels of analysis affected by the person and number violations. Copyright © 2011 Elsevier B.V. All rights reserved.

  9. Four-body decays of B meson with lepton number violation

    NASA Astrophysics Data System (ADS)

    Yuan, Han; Wang, Tianhong; Jiang, Yue; Li, Qiang; Wang, Guo-Li

    2018-06-01

    The existence of heavy meson lepton number violating (LNV) processes shows the Majorana nature of the neutrino. Much of this theoretical and experimental researche focuses on this type of decay. Four-body epton-number violation (LNV) processes of the B meson may have sizable branching ratios as they share the same vertex and mixing parameters with the three-body case. Mixing parameters between the heavy Majorana neutrino and charged leptons extracted from the three-body case can be used to constrain the branching ratios of four-body decays of the B meson. So we can update the upper limits of these mixing parameters with new experimental data of the three-body LNV decays. We also analyze {B}0\\to {D}* -{{\\ell }}1+{{\\ell }}2+{M}2- using the updated parameters and estimate some channels’ reconstruction events using current experimental data from Belle.

  10. Seesaw at Lhc Through Left-Right Symmetry

    NASA Astrophysics Data System (ADS)

    Senjanović, Goran

    I argue that LHC may shed light on the nature of neutrino mass through the probe of the seesaw mechanism. The smoking gun signature is lepton number violation through the production of same sign lepton pairs, a collider analogy of the neutrinoless double beta decay. I discuss this in the context of left-right symmetric theories, which led originally to neutrino mass and the seesaw mechanism. A WR gauge boson with a mass in a few TeV region could easily dominate neutrinoless double beta decay, and its discovery at LHC would have spectacular signatures of parity restoration and lepton number violation. Moreover, LHC can measure the masses of the right-handed neutrinos and the right-handed leptonic mixing matrix, which could in turn be used to predict the rates for neutrinoless double decay and lepton flavor violating violating processes. The LR scale at the LHC energies offers great hope of observing these low energy processes in the present and upcoming experiments.

  11. Leptogenesis from spin-gravity coupling following inflation.

    PubMed

    Mohanty, Subhendra; Prasanna, A R; Lambiase, G

    2006-02-24

    The energy levels of the left- and the right-handed neutrinos are split in the background of gravitational waves generated during inflation, which, in presence of lepton-number-violating interactions, gives rise to a net lepton asymmetry at equilibrium. Lepton number violation is achieved by the same dimension five operator which gives rise to neutrino masses after electroweak symmetry breaking. A net baryon asymmetry of the same magnitude can be generated from this lepton asymmetry by electroweak sphaleron processes.

  12. Asymptotic violation of Bell inequalities and distillability.

    PubMed

    Masanes, Lluís

    2006-08-04

    A multipartite quantum state violates a Bell inequality asymptotically if, after jointly processing by general local operations an arbitrarily large number of copies of it, the result violates the inequality. In the bipartite case we show that asymptotic violation of the Clauser-Horne-Shimony-Holt inequality is equivalent to distillability. Hence, bound entangled states do not violate it. In the multipartite case we consider the complete set of full-correlation Bell inequalities with two dichotomic observables per site. We show that asymptotic violation of any of these inequalities by a multipartite state implies that pure-state entanglement can be distilled from it, although the corresponding distillation protocol may require that some of the parties join into several groups. We also obtain the extreme points of the set of distributions generated by measuring N quantum systems with two dichotomic observables per site.

  13. Grammatical number agreement processing using the visual half-field paradigm: an event-related brain potential study.

    PubMed

    Kemmer, Laura; Coulson, Seana; Kutas, Marta

    2014-02-01

    Despite indications in the split-brain and lesion literatures that the right hemisphere is capable of some syntactic analysis, few studies have investigated right hemisphere contributions to syntactic processing in people with intact brains. Here we used the visual half-field paradigm in healthy adults to examine each hemisphere's processing of correct and incorrect grammatical number agreement marked either lexically, e.g., antecedent/reflexive pronoun ("The grateful niece asked herself/*themselves…") or morphologically, e.g., subject/verb ("Industrial scientists develop/*develops…"). For reflexives, response times and accuracy of grammaticality decisions suggested similar processing regardless of visual field of presentation. In the subject/verb condition, we observed similar response times and accuracies for central and right visual field (RVF) presentations. For left visual field (LVF) presentation, response times were longer and accuracy rates were reduced relative to RVF presentation. An event-related brain potential (ERP) study using the same materials revealed similar ERP responses to the reflexive pronouns in the two visual fields, but very different ERP effects to the subject/verb violations. For lexically marked violations on reflexives, P600 was elicited by stimuli in both the LVF and RVF; for morphologically marked violations on verbs, P600 was elicited only by RVF stimuli. These data suggest that both hemispheres can process lexically marked pronoun agreement violations, and do so in a similar fashion. Morphologically marked subject/verb agreement errors, however, showed a distinct LH advantage. Copyright © 2013 Elsevier B.V. All rights reserved.

  14. Grammatical number agreement processing using the visual half-field paradigm: An event-related brain potential study

    PubMed Central

    Kemmer, Laura; Coulson, Seana; Kutas, Marta

    2014-01-01

    Despite indications in the split-brain and lesion literatures that the right hemisphere is capable of some syntactic analysis, few studies have investigated right hemisphere contributions to syntactic processing in people with intact brains. Here we used the visual half-field paradigm in healthy adults to examine each hemisphere’s processing of correct and incorrect grammatical number agreement marked either lexically, e.g., antecedent/reflexive pronoun (“The grateful niece asked herself/*themselves…”) or morphologically, e.g., subject/verb (“Industrial scientists develop/*develops…”). For reflexives, response times and accuracy of grammaticality decisions suggested similar processing regardless of visual field of presentation. In the subject/verb condition, we observed similar response times and accuracies for central and right visual field (RVF) presentations. For left visual field (LVF) presentation, response times were longer and accuracy rates were reduced relative to RVF presentation. An event-related brain potential (ERP) study using the same materials revealed similar ERP responses to the reflexive pronouns in the two visual fields, but very different ERP effects to the subject/verb violations. For lexically marked violations on reflexives, P600 was elicited by stimuli in both the LVF and RVF; for morphologically marked violations on verbs, P600 was elicited only by RVF stimuli. These data suggest that both hemispheres can process lexically marked pronoun agreement violations, and do so in a similar fashion. Morphologically marked subject/verb agreement errors, however, showed a distinct LH advantage. PMID:24326084

  15. Trends in Nitrate Drinking Water Violations Across the US ...

    EPA Pesticide Factsheets

    Background/Question/Methods Safe drinking water is essential for the health and well-being of humans and life on Earth. Previous studies have shown that groundwater and other sources of drinking water can be contaminated with nitrate above the 10 mg nitrate-N L-1 maximum contaminant level (MCL), which is known to have adverse health effects, including certain cancers. Public water systems (PWS) across the US have been required since 1979 to report violations of the nitrate MCL to the US Environmental Protection Agency’s Safe Drinking Water Information System (SDWIS). The objective of this research was to use SDWIS data to assess temporal and spatial trends for nitrate violations. We collected data from SDWIS on the number of PWS that violated the nitrate MCL at least once each year. The proportion of systems in violation each year was calculated by diving the number of systems in violation by the total number of active systems that year. The number of people served by systems in violation was calculated by summing the number of people served by each PWS in violation. Results/Conclusions We found that the number and proportion of systems in violation for nitrate significantly increased over time, almost doubling from 280 (0.16%) to 527 (0.33%) systems between 1994 and 2010. The increase in number and proportion of systems in violation is attributed to an increase in violations for groundwater systems, whereas violations for surface water systems have

  16. $$L_\\mu - L_\\tau$$ theory of Higgs flavor violation and $$(g-2)_\\mu$$

    DOE PAGES

    Altmannshofer, Wolfgang; Carena, Marcela; Crivellin, Andreas

    2016-11-01

    Several experiments reported hints for the violation of lepton flavor or lepton flavor universality in processes involving muons. Most prominently, there is the hint for a nonzero rate of the flavor violating Higgs decay h→τμ at the LHC, as well as the hint for lepton flavor universality violation in rare B meson decays at the LHCb. In addition, also the long-standing discrepancy in the anomalous magnetic moment of the muon motivates new physics connected to muons. A symmetry which violates lepton flavor universality is Lμ-Lτ: the difference of muon number and tau number. We show that adding vectorlike fermions tomore » a Lμ-Lτ theory generates naturally an effect in the anomalous magnetic moment of the muon and h→τμ, while effects in other τ→μ transitions are systematically suppressed by symmetry arguments. We find that if Lμ-Lτ is gauged it is possible to also accommodate the discrepant b→sμμ data while predicting a τ→3μ and a modified h→μμ rate within reach of upcoming experiments.« less

  17. Search for charged lepton flavor violation of vector mesons in the BLMSSM model

    NASA Astrophysics Data System (ADS)

    Dong, Xing-Xing; Zhao, Shu-Min; Feng, Jing-Jing; Ning, Guo-Zhu; Chen, Jian-Bin; Zhang, Hai-Bin; Feng, Tai-Fu

    2018-03-01

    We analyze the charged lepton flavor violating (CLFV) decays of vector mesons V →li±lj∓ with V ∈{ϕ ,J /Ψ ,ϒ ,ρ0,ω } in the BLMSSM model. This new model is introduced as a supersymmetric extension of the Standard Model (SM), where local gauged baryon number B and lepton number L are considered. The numerical results indicate the BLMSSM model can produce significant contributions to such two-body CLFV decays, and the branching ratios to these CLFV processes can easily reach the present experimental upper bounds. Therefore, searching for CLFV processes of vector mesons may be an effective channel to study new physics.

  18. An analysis of violations of Osha's (1987) occupational exposure to benzene standard.

    PubMed

    Williams, Pamela R D

    2014-01-01

    The Occupational Safety and Health Administration (OSHA), which was formed by the Occupational Safety and Health Act of 1970 (OSH Act), establishes enforceable health and safety standards in the workplace and issues violations and penalties for non-compliance with these standards. The purpose of the current study was to evaluate the number and type of violations of the OSHA (1987) Occupational Exposure to Benzene Standard. Violations of the OSHA Hazard Communication Standard (HCS), particularly those that may pertain to specific provisions of the benzene standard, were also assessed. All analyses were based on OSHA inspection data that have been collected since the early 1970s and that are publicly available from the U.S. Department of Labor enforcement website. Analysis of these data shows that fewer than a thousand OSHA violations of the benzene standard have been issued over the last 25+ years. The results for benzene are in contrast to those for some other toxic and hazardous substances that are regulated by OSHA, such as blood-borne pathogens, lead, and asbestos, for which there have been issued tens of thousands of OSHA violations. The number of benzene standard violations also varies by time period, standard provision, industry sector, and other factors. In particular, the greatest number of benzene standard violations occurred during the late 1980s to early/mid 1990s, soon after the 1987 final benzene rule was promulgated. The majority of benzene standard violations also pertain to noncompliance with specific provisions and subprovisions of the standard dealing with initial exposure monitoring requirements, the communication of hazards to employees, and medical surveillance programs. Only a small fraction of HCS violations are attributed, at least in part, to potential benzene hazards in the workplace. In addition, most benzene standard violations are associated with specific industries within the manufacturing sector where benzene or benzene-containing products may be used or produced during production processes, such as petroleum refineries, metal industries, and chemical companies. Not surprisingly, the greatest number of benzene standard violations have been issued to private facility owners (rather than government entities), given that the OSH Act primarily covers private sector employers. More violations have also been issued during inspections where union representation was present and from complaint-driven (vs. planned or other) inspections, which is consistent with OSHA inspection priorities. Violations of the benzene standard have typically involved a single instance per facility and 10 or fewer exposed employees. Because the OSH Act prescribes penalty caps for citations, initial penalties issued for noncompliance with the benzene standard have generally been less than $5,000 per violation. Despite some potential limitations, the OSHA inspection database contains the best available data for assessing historical and current violations of the benzene standard. These data, which have not been previously analyzed or published for benzene, may be of interest to professionals and practitioners involved in benzene risk assessment, risk management, and/or public policy issues.

  19. Gravitational leptogenesis, reheating, and models of neutrino mass

    NASA Astrophysics Data System (ADS)

    Adshead, Peter; Long, Andrew J.; Sfakianakis, Evangelos I.

    2018-02-01

    Gravitational leptogenesis refers to a class of baryogenesis models in which the matter-antimatter asymmetry of the Universe arises through the standard model lepton-number gravitational anomaly. In these models chiral gravitational waves source a lepton asymmetry in standard model neutrinos during the inflationary epoch. We point out that gravitational leptogenesis can be successful in either the Dirac or Majorana neutrino mass scenario. In the Dirac mass scenario, gravitational leptogenesis predicts a relic abundance of sterile neutrinos that remain out of equilibrium, and the lepton asymmetry carried by the standard model sector is unchanged. In the Majorana mass scenario, the neutrinos participate in lepton-number-violating interactions that threaten to wash out the lepton asymmetry during postinflationary reheating. However, we show that a complete (exponential) washout of the lepton asymmetry is prevented if the lepton-number-violating interactions go out of equilibrium before all of the standard model Yukawa interactions come into equilibrium. The baryon and lepton asymmetries carried by right-chiral quarks and leptons are sequestered from the lepton-number violation, and the washout processes only suppress the predicted baryon asymmetry by a factor of ɛw .o .=±O (0.1 ). The sign of ɛw .o . depends on the model parameters in such a way that a future measurement of the primordial gravitational wave chirality would constrain the scale of lepton-number violation (heavy Majorana neutrino mass).

  20. Electrophysiological responses to argument structure violations in healthy adults and individuals with agrammatic aphasia

    PubMed Central

    Kielar, Aneta; Meltzer-Asscher, Aya; Thompson, Cynthia

    2012-01-01

    Sentence comprehension requires processing of argument structure information associated with verbs, i.e. the number and type of arguments that they select. Many individuals with agrammatic aphasia show impaired production of verbs with greater argument structure density. The extent to which these participants also show argument structure deficits during comprehension, however, is unclear. Some studies find normal access to verb arguments, whereas others report impaired ability. The present study investigated verb argument structure processing in agrammatic aphasia by examining event-related potentials associated with argument structure violations in healthy young and older adults as well as aphasic individuals. A semantic violation condition was included to investigate possible differences in sensitivity to semantic and argument structure information during sentence processing. Results for the healthy control participants showed a negativity followed by a positive shift (N400-P600) in the argument structure violation condition, as found in previous ERP studies (Friederici & Frisch, 2000; Frisch, Hahne, & Friederici, 2004). In contrast, individuals with agrammatic aphasia showed a P600, but no N400, response to argument structure mismatches. Additionally, compared to the control groups, the agrammatic participants showed an attenuated, but relatively preserved, N400 response to semantic violations. These data show that agrammatic individuals do not demonstrate normal real-time sensitivity to verb argument structure requirements during sentence processing. PMID:23022079

  1. Baryon number violation and nonperturbative weak processes at Superconducting Super Collider energies

    NASA Astrophysics Data System (ADS)

    Shuryak, E. V.; Verbaarschot, J. J. M.

    1992-04-01

    Baryon number violation and multiple production of W and Higgs bosons are described semiclassically in terms of the instanton-anti-instanton valley. We find (i) two saddle points, one describing reflection from a barrier and the other describing tunneling through it. We find (ii) a critical energy Ec~35 TeV where the cross section is suppressed as exp(-const/g2w), but the formulas are no longer valid; (iii) however, depending on the (still uncertain) Higgs bosson action, the cross section at this point may be large enough to be observable.

  2. The lepton flavor violating exclusive b bar → s bar ℓi- ℓj+ decays in SUSY without R-parity

    NASA Astrophysics Data System (ADS)

    Sheng, Jin-Huan; Song, Jia-Jia; Wang, Ru-Min; Yang, Ya-Dong

    2018-05-01

    Inspired by the recent anomaly measurements of the lepton-flavor violating decays h → μτ and the lepton flavor non-universality in decays b bar → s bar ℓ-ℓ+, we investigate the lepton flavor violating exclusive b bar → s bar ℓi- ℓj+ (i ≠ j and ℓ = e , μ , τ) decays within supersymmetry. Relevant R-parity violating couplings are constrained by using the latest experimental upper limits on the branching ratios of Bs → ℓi- ℓj+ and B →K (*) ℓi- ℓ j + flavor changing neutral current processes, and we find that all relevant branching ratios are very sensitive to the moduli of the squark and sneutrino exchange coupling products. In addition, the constrained lepton number violating effects on the dilepton invariant mass spectra, the single lepton polarization asymmetries and the differential forward-backward asymmetries are also studied. These lepton-flavor violating B decays could be used for the search of lepton flavor violation at the running LHC and the forthcoming Belle-II.

  3. Is it Possible to Conserve Electric Charge Without Separately Conserving Baryonic Number and Leptonic Number?

    NASA Astrophysics Data System (ADS)

    Tsan, Ung Chan

    Charges that are sources of fields must be universally conserved. Any quantity which is proved to be violated in certain circumstance cannot be a source of field. To account for the asymmetry of our Universe baryon number A has to be violated; thus A cannot be a charge. We postulate a new interaction, matter creation, with (A-L) as charge and Z* as messenger. Conservation of (A-L) instead of (3A-L) suggested by Sakharov is deduced on the one hand from observational facts (our Universe is both material and neutral) and on the other hand from the generalized Gell-Mann and Nishijima formula. Conservation of (A-L) forbids neutrinoless double beta decay and neutron antineutron oscillations. The union of four interactions — electromagnetism, the MC interaction, the weak interaction and the strong interaction — considered as the product U(1) × U(1) × SU(2) × SU(3) would account for available experimental and observational data. Observation of processes violating baryon number conservation would be of great interest in falsifying this suggestion.

  4. Migrant Farmworker Housing Regulation Violations in North Carolina

    PubMed Central

    Arcury, Thomas A.; Weir, Maria; Chen, Haiying; Summers, Phillip; Pelletier, Lori E.; Galván, Leonardo; Bischoff, Werner E.; Mirabelli, Maria C.; Quandt, Sara A.

    2013-01-01

    Background The quality of housing provided to migrant farmworkers is often criticized, but few studies have investigated these housing conditions. This analysis examines housing regulation violations experienced by migrant farmworkers in North Carolina, and the associations of camp characteristics with the presence of housing violations. Methods Data were collected in183 eastern North Carolina migrant farmworker camps in 2010. Housing regulation violations for the domains of camp, sleeping room, bathroom, kitchen, laundry room, and general housing, as well as total violations were assessed using North Carolina Department of Labor standards. Results Violations of housing regulations were common, ranging from 4 to 22 per camp. Housing regulation violations were common in all domains; the mean number of camp violations was 1.6, of sleeping room violations was 3.8, of bathroom violations was 4.5, of kitchen violations was 2.3, of laundry room violations was 1.2, and of general housing violations was 3.1. The mean number of total housing violations was 11.4. Several camp characteristics were consistently associated with the number of violations; camps with workers having H-2A visas, with North Carolina Department of Labor Certificates of Inspection posted, and assessed early in the season had fewer violations. Conclusions These results argue for regulatory changes to improve the quality of housing provided to migrant farmworkers, including stronger regulations and the more vigorous enforcement of existing regulations. PMID:22237961

  5. ERP correlates of German Sign Language processing in deaf native signers.

    PubMed

    Hänel-Faulhaber, Barbara; Skotara, Nils; Kügow, Monique; Salden, Uta; Bottari, Davide; Röder, Brigitte

    2014-05-10

    The present study investigated the neural correlates of sign language processing of Deaf people who had learned German Sign Language (Deutsche Gebärdensprache, DGS) from their Deaf parents as their first language. Correct and incorrect signed sentences were presented sign by sign on a computer screen. At the end of each sentence the participants had to judge whether or not the sentence was an appropriate DGS sentence. Two types of violations were introduced: (1) semantically incorrect sentences containing a selectional restriction violation (implausible object); (2) morphosyntactically incorrect sentences containing a verb that was incorrectly inflected (i.e., incorrect direction of movement). Event-related brain potentials (ERPs) were recorded from 74 scalp electrodes. Semantic violations (implausible signs) elicited an N400 effect followed by a positivity. Sentences with a morphosyntactic violation (verb agreement violation) elicited a negativity followed by a broad centro-parietal positivity. ERP correlates of semantic and morphosyntactic aspects of DGS clearly differed from each other and showed a number of similarities with those observed in other signed and oral languages. These data suggest a similar functional organization of signed and oral languages despite the visual-spacial modality of sign language.

  6. ERP correlates of German Sign Language processing in deaf native signers

    PubMed Central

    2014-01-01

    Background The present study investigated the neural correlates of sign language processing of Deaf people who had learned German Sign Language (Deutsche Gebärdensprache, DGS) from their Deaf parents as their first language. Correct and incorrect signed sentences were presented sign by sign on a computer screen. At the end of each sentence the participants had to judge whether or not the sentence was an appropriate DGS sentence. Two types of violations were introduced: (1) semantically incorrect sentences containing a selectional restriction violation (implausible object); (2) morphosyntactically incorrect sentences containing a verb that was incorrectly inflected (i.e., incorrect direction of movement). Event-related brain potentials (ERPs) were recorded from 74 scalp electrodes. Results Semantic violations (implausible signs) elicited an N400 effect followed by a positivity. Sentences with a morphosyntactic violation (verb agreement violation) elicited a negativity followed by a broad centro-parietal positivity. Conclusions ERP correlates of semantic and morphosyntactic aspects of DGS clearly differed from each other and showed a number of similarities with those observed in other signed and oral languages. These data suggest a similar functional organization of signed and oral languages despite the visual-spacial modality of sign language. PMID:24884527

  7. Using lean to improve medication administration safety: in search of the "perfect dose".

    PubMed

    Ching, Joan M; Long, Christina; Williams, Barbara L; Blackmore, C Craig

    2013-05-01

    At Virginia Mason Medical Center (Seattle), the Collaborative Alliance for Nursing Outcomes (CALNOC) Medication Administration Accuracy Quality Study was used in combination with Lean quality improvement efforts to address medication administration safety. Lean interventions were targeted at improving the medication room layout, applying visual controls, and implementing nursing standard work. The interventions were designed to prevent medication administration errors through improving six safe practices: (1) comparing medication with medication administration record, (2) labeling medication, (3) checking two forms of patient identification, (4) explaining medication to patient, (5) charting medication immediately, and (6) protecting the process from distractions/interruptions. Trained nurse auditors observed 9,244 doses for 2,139 patients. Following the intervention, the number of safe-practice violations decreased from 83 violations/100 doses at baseline (January 2010-March 2010) to 42 violations/100 doses at final follow-up (July 2011-September 2011), resulting in an absolute risk reduction of 42 violations/100 doses (95% confidence interval [CI]: 35-48), p < .001). The number of medication administration errors decreased from 10.3 errors/100 doses at baseline to 2.8 errors/100 doses at final follow-up (absolute risk reduction: 7 violations/100 doses [95% CI: 5-10, p < .001]). The "perfect dose" score, reflecting compliance with all six safe practices and absence of any of the eight medication administration errors, improved from 37 in compliance/100 doses at baseline to 68 in compliance/100 doses at the final follow-up. Lean process improvements coupled with direct observation can contribute to substantial decreases in errors in nursing medication administration.

  8. Achievement Place: experiments in self-government with pre-delinquents.

    PubMed

    Fixsen, D L; Phillips, E L; Wolf, M M

    1973-01-01

    One of the goals of many treatment programs for pre-delinquent youths is the development of the skills involved in the democratic decision-making process. At Achievement Place, one aspect of the treatment program is a semi-self-government system whereby the seven pre-delinquent youths can democratically establish many of their own rules of behavior, monitor their peers' behavior to detect violations of their rules, and conduct a "trial" to determine a rule violator's guilt or innocence, and to determine the consequences for a youth who violates a rule. Two experiments were carried out to determine the role of some of the procedures in the boys' participation in the self-government system. Experiment I showed that more boys participated in the discussion of consequences for a rule violation when they had complete responsibility for setting the consequence during the trials than when the teaching-parents set the consequence for each rule violation before the trial. An analysis of the rule violations in this experiment indicated that the boys in Achievement Place reported more of the rule violations that resulted in trials than reported by the teaching-parents or school personnel. The boys reported rule violations that occurred in the community and school as well as at Achievement Place, including most of the serious rule violations that came to the attention of the teaching-parents. In Experiment II, the results indicated that more trials were called when the teaching-parents were responsible for calling trials on rule violations reported by the peers than when the boys were responsible for calling trials. When the youths earned points for calling trials the average number of trials per day increased, but more trivial rule violations were reported. These results suggest that aspects of the democratic decision-making process in a small group of pre-delinquents can be studied and variables that affect participation can be identified and evaluated.

  9. Number Attraction Effects in Near-Native Spanish Sentence Comprehension

    ERIC Educational Resources Information Center

    Jegerski, Jill

    2016-01-01

    Grammatical agreement phenomena such as verbal number have long been of fundamental interest in the study of second language (L2) acquisition. Previous research from the perspective of sentence processing has documented nativelike behavior among nonnative participants but has also relied almost exclusively on grammar violation paradigms. The…

  10. Electric dipole moments with and beyond flavor invariants

    NASA Astrophysics Data System (ADS)

    Smith, Christopher; Touati, Selim

    2017-11-01

    In this paper, the flavor structure of quark and lepton electric dipole moments in the SM and beyond is investigated using tools inspired from Minimal Flavor Violation. While Jarlskog-like flavor invariants are adequate for estimating CP-violation from closed fermion loops, non-invariant structures arise from rainbow-like processes. Our goal is to systematically construct these latter flavor structures in the quark and lepton sectors, assuming different mechanisms for generating neutrino masses. Numerically, they are found typically much larger, and not necessarily correlated with, Jarlskog-like invariants. Finally, the formalism is adapted to deal with a third class of flavor structures, sensitive to the flavored U (1) phases, and used to study the impact of the strong CP-violating interaction and the interplay between the neutrino Majorana phases and possible baryon and/or lepton number violating interactions.

  11. Statistical inference of static analysis rules

    NASA Technical Reports Server (NTRS)

    Engler, Dawson Richards (Inventor)

    2009-01-01

    Various apparatus and methods are disclosed for identifying errors in program code. Respective numbers of observances of at least one correctness rule by different code instances that relate to the at least one correctness rule are counted in the program code. Each code instance has an associated counted number of observances of the correctness rule by the code instance. Also counted are respective numbers of violations of the correctness rule by different code instances that relate to the correctness rule. Each code instance has an associated counted number of violations of the correctness rule by the code instance. A respective likelihood of the validity is determined for each code instance as a function of the counted number of observances and counted number of violations. The likelihood of validity indicates a relative likelihood that a related code instance is required to observe the correctness rule. The violations may be output in order of the likelihood of validity of a violated correctness rule.

  12. Lepton Number Violating e-W+ → e+W- → W-W- Processes in the Left-Right Gauge Model

    NASA Astrophysics Data System (ADS)

    Doi, M.

    1999-03-01

    As new tests of the nature of neutrinos, lepton number violating e-W+a → e+W-b and e-e- → W-a W-b processes are studied within the SU(2)L × SU(2)R × U(1)B-L gauge model. They take place via exchange of a Majorana neutrino and a doubly charged Higgs particle. Differential cross sections are derived in the most general form. The angular distribution of the former process becomes resonant at cos θj= -1+2(Ma2Mb2 -mj2s)/ (s-Ma2) (s-Mb2), from which the neutrino mass mj can be deduced. Differential cross sections are estimated by using present bounds on the parameters. The cross section of the former process is about 102 times larger than the latter. Another process, e-p → e+W-n, which includes e-W+ → e+ W- as a sub-process, is also discussed, and orders of magnitude of the cross section are estimated.

  13. Delinquency Cases in Juvenile Court, 2002. OJJDP Fact Sheet #02

    ERIC Educational Resources Information Center

    Stahl, Anne L.

    2006-01-01

    This fact sheet presents statistics on delinquency cases processed by juvenile courts in 2002. The number of delinquency cases handled by juvenile courts decreased 11 percent between 1997 and 2002. During this time, the number of person offense cases decreased 2 percent, property offense cases decreased 27 percent, drug law violation cases…

  14. Differential effects of constraints in the processing of Russian cataphora.

    PubMed

    Kazanina, Nina; Phillips, Colin

    2010-02-01

    Anaphoric relations between pronouns and their antecedents are subject to a number of different linguistic constraints, which exclude the possibility of coreference in specific syntactic or discourse contexts. Constraints on anaphora may, in principle, impact online sentence processing in a couple of different ways. They may act as constraints on the generation of interpretations, preventing illicit anaphoric relations from ever being considered. Alternatively, they may act as later filters on interpretations, rejecting candidate interpretations after initial consideration. A number of previous studies have sought to determine which of these mechanisms accurately describes the online impact of constraints on anaphora. The current studies present evidence that there is no uniform answer to this question, and that the two mechanisms are both used, for different constraints. Evidence for this is drawn from studies on the processing of two constraints on backwards anaphora or cataphora in Russian that apply in superficially similar contexts but that differ in a number of respects. One self-paced reading study and two judgement studies are reported. The self-paced reading study manipulates the gender congruency between a pronoun and a following name in three pairs of conditions. In conditions where the pronoun-name configuration violates no constraints on anaphora a gender mismatch effect was observed following the name, as in previous studies, suggesting that comprehenders actively search for an antecedent following a cataphoric pronoun. In conditions where the pronoun-name configuration violates Principle C of the classical binding theory no effect of the gender manipulation was observed, suggesting that comprehenders do not even consider the possibility of interpretations that violate this constraint. In conditions where the pronoun-name configuration violates a Russian-specific constraint on cataphora a gender match effect was observed following the name, the reverse of the finding in the no-constraint conditions, suggesting that the constraint applies as a filter on candidate interpretations.

  15. The influence of language deprivation in early childhood on L2 processing: An ERP comparison of deaf native signers and deaf signers with a delayed language acquisition.

    PubMed

    Skotara, Nils; Salden, Uta; Kügow, Monique; Hänel-Faulhaber, Barbara; Röder, Brigitte

    2012-05-03

    To examine which language function depends on early experience, the present study compared deaf native signers, deaf non-native signers and hearing German native speakers while processing German sentences. The participants watched simple written sentences while event-related potentials (ERPs) were recorded. At the end of each sentence they were asked to judge whether the sentence was correct or not. Two types of violations were introduced in the middle of the sentence: a semantically implausible noun or a violation of subject-verb number agreement. The results showed a similar ERP pattern after semantic violations (an N400 followed by a positivity) in all three groups. After syntactic violations, native German speakers and native signers of German sign language (DGS) with German as second language (L2) showed a left anterior negativity (LAN) followed by a P600, whereas no LAN but a negativity over the right hemisphere instead was found in deaf participants with a delayed onset of first language (L1) acquisition. The P600 of this group had a smaller amplitude and a different scalp distribution as compared to German native speakers. The results of the present study suggest that language deprivation in early childhood alters the cerebral organization of syntactic language processing mechanisms for L2. Semantic language processing instead was unaffected.

  16. Evaluation of five years of nursing home inspection forms: structural and hygiene-related violation trends.

    PubMed

    Avery, Chris; Humphrey, Charles; Balany, Jo Anne

    2014-11-01

    Health inspections are performed at nursing homes to identify and reduce risk and to help maintain a safe environment for nursing home residents. The study described in this article aimed to identify the most frequent violations, types of violations (hygiene or structural), and repeat violations in nursing home facilities during health inspections; and to determine if the age of the facility influenced inspection scores. Nursing home health inspection forms (N = 131) completed between 2005 and 2011 in Pitt County, North Carolina, were analyzed. Results indicated that 60% of all violations were hygiene-related and could possibly be corrected without significant financial investments by management. Significant correlations occurred between the total number of violations and the facility age (p = .003) and between the number of repeat violations and total violations (p < .001). The average inspection score for nursing homes could be increased by more than three points if sanitation practices were improved.

  17. Double dissociation between rules and memory in music: an event-related potential study.

    PubMed

    Miranda, Robbin A; Ullman, Michael T

    2007-11-01

    Language and music share a number of characteristics. Crucially, both domains depend on both rules and memorized representations. Double dissociations between the neurocognition of rule-governed and memory-based knowledge have been found in language but not music. Here, the neural bases of both of these aspects of music were examined with an event-related potential (ERP) study of note violations in melodies. Rule-only violations consisted of out-of-key deviant notes that violated tonal harmony rules in novel (unfamiliar) melodies. Memory-only violations consisted of in-key deviant notes in familiar well-known melodies; these notes followed musical rules but deviated from the actual melodies. Finally, out-of-key notes in familiar well-known melodies constituted violations of both rules and memory. All three conditions were presented, within-subjects, to healthy young adults, half musicians and half non-musicians. The results revealed a double dissociation, independent of musical training, between rules and memory: both rule violation conditions, but not the memory-only violations, elicited an early, somewhat right-lateralized anterior-central negativity (ERAN), consistent with previous studies of rule violations in music, and analogous to the early left-lateralized anterior negativities elicited by rule violations in language. In contrast, both memory violation conditions, but not the rule-only violation, elicited a posterior negativity that might be characterized as an N400, an ERP component that depends, at least in part, on the processing of representations stored in long-term memory, both in language and in other domains. The results suggest that the neurocognitive rule/memory dissociation extends from language to music, further strengthening the similarities between the two domains.

  18. Double dissociation between rules and memory in music: An event-related potential study

    PubMed Central

    Miranda, Robbin A.; Ullman, Michael T.

    2007-01-01

    Language and music share a number of characteristics. Crucially, both domains depend on both rules and memorized representations. Double dissociations between the neurocognition of rule-governed and memory-based knowledge have been found in language but not music. Here, the neural bases of both of these aspects of music were examined with an event-related potential (ERP) study of note violations in melodies. Rule-only violations consisted of out-of-key deviant notes that violated tonal harmony rules in novel (unfamiliar) melodies. Memory-only violations consisted of in-key deviant notes in familiar well-known melodies; these notes followed musical rules but deviated from the actual melodies. Finally, out-of-key notes in familiar well-known melodies constituted violations of both rules and memory. All three conditions were presented, within-subjects, to healthy young adults, half musicians and half non-musicians. The results revealed a double dissociation, independent of musical training, between rules and memory: both rule violation conditions, but not the memory-only violations, elicited an early, somewhat right-lateralized anterior-central negativity (ERAN), consistent with previous studies of rule violations in music, and analogous to the early left-lateralized anterior negativities elicited by rule violations in language. In contrast, both memory violation conditions, but not the rule-only violation, elicited a posterior negativity that might be characterized as an N400, an ERP component that depends, at least in part, on the processing of representations stored in long-term memory, both in language and in other domains. The results suggest that the neurocognitive rule/memory dissociation extends from language to music, further strengthening the similarities between the two domains. PMID:17855126

  19. Random numbers certified by Bell's theorem.

    PubMed

    Pironio, S; Acín, A; Massar, S; de la Giroday, A Boyer; Matsukevich, D N; Maunz, P; Olmschenk, S; Hayes, D; Luo, L; Manning, T A; Monroe, C

    2010-04-15

    Randomness is a fundamental feature of nature and a valuable resource for applications ranging from cryptography and gambling to numerical simulation of physical and biological systems. Random numbers, however, are difficult to characterize mathematically, and their generation must rely on an unpredictable physical process. Inaccuracies in the theoretical modelling of such processes or failures of the devices, possibly due to adversarial attacks, limit the reliability of random number generators in ways that are difficult to control and detect. Here, inspired by earlier work on non-locality-based and device-independent quantum information processing, we show that the non-local correlations of entangled quantum particles can be used to certify the presence of genuine randomness. It is thereby possible to design a cryptographically secure random number generator that does not require any assumption about the internal working of the device. Such a strong form of randomness generation is impossible classically and possible in quantum systems only if certified by a Bell inequality violation. We carry out a proof-of-concept demonstration of this proposal in a system of two entangled atoms separated by approximately one metre. The observed Bell inequality violation, featuring near perfect detection efficiency, guarantees that 42 new random numbers are generated with 99 per cent confidence. Our results lay the groundwork for future device-independent quantum information experiments and for addressing fundamental issues raised by the intrinsic randomness of quantum theory.

  20. Re-examination of Chinese semantic processing and syntactic processing: evidence from conventional ERPs and reconstructed ERPs by residue iteration decomposition (RIDE).

    PubMed

    Wang, Fang; Ouyang, Guang; Zhou, Changsong; Wang, Suiping

    2015-01-01

    A number of studies have explored the time course of Chinese semantic and syntactic processing. However, whether syntactic processing occurs earlier than semantics during Chinese sentence reading is still under debate. To further explore this issue, an event-related potentials (ERPs) experiment was conducted on 21 native Chinese speakers who read individually-presented Chinese simple sentences (NP1+VP+NP2) word-by-word for comprehension and made semantic plausibility judgments. The transitivity of the verbs was manipulated to form three types of stimuli: congruent sentences (CON), sentences with a semantically violated NP2 following a transitive verb (semantic violation, SEM), and sentences with a semantically violated NP2 following an intransitive verb (combined semantic and syntactic violation, SEM+SYN). The ERPs evoked from the target NP2 were analyzed by using the Residue Iteration Decomposition (RIDE) method to reconstruct the ERP waveform blurred by trial-to-trial variability, as well as by using the conventional ERP method based on stimulus-locked averaging. The conventional ERP analysis showed that, compared with the critical words in CON, those in SEM and SEM+SYN elicited an N400-P600 biphasic pattern. The N400 effects in both violation conditions were of similar size and distribution, but the P600 in SEM+SYN was bigger than that in SEM. Compared with the conventional ERP analysis, RIDE analysis revealed a larger N400 effect and an earlier P600 effect (in the time window of 500-800 ms instead of 570-810ms). Overall, the combination of conventional ERP analysis and the RIDE method for compensating for trial-to-trial variability confirmed the non-significant difference between SEM and SEM+SYN in the earlier N400 time window. Converging with previous findings on other Chinese structures, the current study provides further precise evidence that syntactic processing in Chinese does not occur earlier than semantic processing.

  1. Supersymmetric Galileons

    DOE PAGES

    Khoury, Justin; Lehners, Jean -Luc; Ovrut, Burt A.

    2011-08-15

    Galileon theories are of considerable interest since they allow for stable violations of the null energy condition. Since such violations could have occurred during a high-energy regime in the history of our universe, we are motivated to study supersymmetric extensions of these theories. This is carried out in this paper, where we construct generic classes of N = 1 supersymmetric Galileon Lagrangians. They are shown to admit non-equivalent stress-energy tensors and, hence, vacua manifesting differing conditions for violating the null energy condition. The temporal and spatial fluctuations of all component fields of the supermultiplet are analyzed and shown to bemore » stable on a large number of such backgrounds. In the process, we uncover a surprising connection between conformal Galileon and ghost condensate theories, allowing for a deeper understanding of both types of theories.« less

  2. 30 CFR 843.13 - Suspension or revocation of permits: Pattern of violations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... order to a permittee requiring him or her to show cause why his or her permit and right to mine under... the circumstances, including: (i) The number of violations, cited on more than one occasion, of the... number of violations, cited on more than one occasion, of different requirements of the Act, this chapter...

  3. Constraint monitoring in TOSCA

    NASA Technical Reports Server (NTRS)

    Beck, Howard

    1992-01-01

    The Job-Shop Scheduling Problem (JSSP) deals with the allocation of resources over time to factory operations. Allocations are subject to various constraints (e.g., production precedence relationships, factory capacity constraints, and limits on the allowable number of machine setups) which must be satisfied for a schedule to be valid. The identification of constraint violations and the monitoring of constraint threats plays a vital role in schedule generation in terms of the following: (1) directing the scheduling process; and (2) informing scheduling decisions. This paper describes a general mechanism for identifying constraint violations and monitoring threats to the satisfaction of constraints throughout schedule generation.

  4. Some Legal Concerns in Student Assessment.

    ERIC Educational Resources Information Center

    Lemley, Charles R.

    1982-01-01

    Discusses the court's active role in addressing a number of student assessment questions and the resultant decisions which suggest considerations for educators. Suggests assessment is legal, but the particular instrument must not violate student constitutional rights of due process, property, and liberty. Further, the instrument must accurately…

  5. An Analysis of Shuttle Crew Scheduling Violations

    NASA Technical Reports Server (NTRS)

    Bristol, Douglas

    2012-01-01

    From the early years of the Space Shuttle program, National Aeronautics and Space Administration (NASA) Shuttle crews have had a timeline of activities to guide them through their time on-orbit. Planners used scheduling constraints to build timelines that ensured the health and safety of the crews. If a constraint could not be met it resulted in a violation. Other agencies of the federal government also have scheduling constraints to ensure the safety of personnel and the public. This project examined the history of Space Shuttle scheduling constraints, constraints from Federal agencies and branches of the military and how these constraints may be used as a guide for future NASA and private spacecraft. This was conducted by reviewing rules and violations with regard to human aerospace scheduling constraints, environmental, political, social and technological factors, operating environment and relevant human factors. This study includes a statistical analysis of Shuttle Extra Vehicular Activity (EVA) related violations to determine if these were a significant producer of constraint violations. It was hypothesized that the number of SCSC violations caused by EVA activities were a significant contributor to the total number of violations for Shuttle/ISS missions. Data was taken from NASA data archives at the Johnson Space Center from Space Shuttle/ISS missions prior to the STS-107 accident. The results of the analysis rejected the null hypothesis and found that EVA violations were a significant contributor to the total number of violations. This analysis could help NASA and commercial space companies understand the main source of constraint violations and allow them to create constraint rules that ensure the safe operation of future human private and exploration missions. Additional studies could be performed to evaluate other variables that could have influenced the scheduling violations that were analyzed.

  6. Nuclei and Fundamental Symmetries

    NASA Astrophysics Data System (ADS)

    Haxton, Wick

    2016-09-01

    Nuclei provide marvelous laboratories for testing fundamental interactions, often enhancing weak processes through accidental degeneracies among states, and providing selection rules that can be exploited to isolate selected interactions. I will give an overview of current work, including the use of parity violation to probe unknown aspects of the hadronic weak interaction; nuclear electric dipole moment searches that may shed light on new sources of CP violation; and tests of lepton number violation made possible by the fact that many nuclei can only decay by rare second-order weak interactions. I will point to opportunities in both theory and experiment to advance the field. Based upon work supported in part by the US Department of Energy, Office of Science, Office of Nuclear Physics and SciDAC under Awards DE-SC00046548 (Berkeley), DE-AC02-05CH11231 (LBNL), and KB0301052 (LBNL).

  7. 28 CFR 523.2 - Good time credit for violators.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., CLASSIFICATION, AND TRANSFER COMPUTATION OF SENTENCE Good Time § 523.2 Good time credit for violators. (a) An... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Good time credit for violators. 523.2... good time, upon being returned to custody for violation of supervised release, based on the number of...

  8. 28 CFR 523.2 - Good time credit for violators.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., CLASSIFICATION, AND TRANSFER COMPUTATION OF SENTENCE Good Time § 523.2 Good time credit for violators. (a) An... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Good time credit for violators. 523.2... good time, upon being returned to custody for violation of supervised release, based on the number of...

  9. 28 CFR 523.2 - Good time credit for violators.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., CLASSIFICATION, AND TRANSFER COMPUTATION OF SENTENCE Good Time § 523.2 Good time credit for violators. (a) An... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Good time credit for violators. 523.2... good time, upon being returned to custody for violation of supervised release, based on the number of...

  10. 28 CFR 523.2 - Good time credit for violators.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., CLASSIFICATION, AND TRANSFER COMPUTATION OF SENTENCE Good Time § 523.2 Good time credit for violators. (a) An... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Good time credit for violators. 523.2... good time, upon being returned to custody for violation of supervised release, based on the number of...

  11. 28 CFR 523.2 - Good time credit for violators.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., CLASSIFICATION, AND TRANSFER COMPUTATION OF SENTENCE Good Time § 523.2 Good time credit for violators. (a) An... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Good time credit for violators. 523.2... good time, upon being returned to custody for violation of supervised release, based on the number of...

  12. Asymptotic relation between Bell-inequality violations and entanglement distillability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kwon, Younghun

    2010-11-15

    We investigate the asymptotic relation between violations of the Mermin-Belinskii-Klyshko inequality and the entanglement distillability of multipartite entangled states, as the number of parties increases. We in particular consider noisy multiqubit GHZ and so-called Duer states in the Mermin-Belinskii-Klyshko inequality, and show that, in the asymptotic limit of the number of parties, the violation of the inequality implies the distillability in almost all bipartitions.

  13. Phenomenology of the standard model under conditions of spontaneously broken mirror symmetry

    NASA Astrophysics Data System (ADS)

    Dyatlov, I. T.

    2017-03-01

    Spontaneously broken mirror symmetry is able to reproduce observed qualitative properties of weak mixing for quark and leptons. Under conditions of broken mirror symmetry, the phenomenology of leptons—that is, small neutrino masses and a mixing character other than that in the case of quarks—requires the Dirac character of the neutrinos and the existence of processes violating the total lepton number. Such processes involve heavy mirror neutrinos; that is, they proceed at very high energies. Here, CP violation implies that a P-even mirror-symmetric Lagrangian must simultaneously be T-odd and, according to the CPT theorem, C-odd. All these properties create preconditions for the occurrence of leptogenesis, which is a mechanism of the emergence of the baryon-lepton asymmetry of the universe in models featuring broken mirror symmetry.

  14. Commentary on Coefficient Alpha: A Cautionary Tale

    ERIC Educational Resources Information Center

    Green, Samuel B.; Yang, Yanyun

    2009-01-01

    The general use of coefficient alpha to assess reliability should be discouraged on a number of grounds. The assumptions underlying coefficient alpha are unlikely to hold in practice, and violation of these assumptions can result in nontrivial negative or positive bias. Structural equation modeling was discussed as an informative process both to…

  15. A simple testable model of baryon number violation: Baryogenesis, dark matter, neutron-antineutron oscillation and collider signals

    NASA Astrophysics Data System (ADS)

    Allahverdi, Rouzbeh; Dev, P. S. Bhupal; Dutta, Bhaskar

    2018-04-01

    We study a simple TeV-scale model of baryon number violation which explains the observed proximity of the dark matter and baryon abundances. The model has constraints arising from both low and high-energy processes, and in particular, predicts a sizable rate for the neutron-antineutron (n - n bar) oscillation at low energy and the monojet signal at the LHC. We find an interesting complementarity among the constraints arising from the observed baryon asymmetry, ratio of dark matter and baryon abundances, n - n bar oscillation lifetime and the LHC monojet signal. There are regions in the parameter space where the n - n bar oscillation lifetime is found to be more constraining than the LHC constraints, which illustrates the importance of the next-generation n - n bar oscillation experiments.

  16. TSCA traps for the unwary plant manager

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kuryla, M.

    1993-09-01

    Plant managers in the CPI should proceed with caution in making some changes in chemical processes or waste disposal. A number of seemingly routine decisions, often made at the level of the plant manager and even below, can turn into costly compliance traps under the Toxic Substances Control Act (TSCA). TSCA is a federal statute designed to give the U.S. Environmental Protection Agency (EPA) information and control over commercial chemicals. Originally passed in 1976, the regulations it supports have been reworked at various times over the years. EPA is on the hunt for TSCA violators. In a December 1992 blitz,more » EPA assessed combined TSCA penalties of $9 million against 22 major chemical companies, including several of the top 20 international producers. According to a recent EPA press release, these actions are only the first in a series of planned enforcements initiatives. Among the various environmental statutes, TSCA is one of the most costly to violate. TSCA authorizes $23,000-per-day penalties for violations of its rules. EPA's internal penalty policies apply rigid formulas, often resulting in million-dollar assessments for essentially paperwork violations.« less

  17. Small violations of Bell inequalities for multipartite pure random states

    NASA Astrophysics Data System (ADS)

    Drumond, Raphael C.; Duarte, Cristhiano; Oliveira, Roberto I.

    2018-05-01

    For any finite number of parts, measurements, and outcomes in a Bell scenario, we estimate the probability of random N-qudit pure states to substantially violate any Bell inequality with uniformly bounded coefficients. We prove that under some conditions on the local dimension, the probability to find any significant amount of violation goes to zero exponentially fast as the number of parts goes to infinity. In addition, we also prove that if the number of parts is at least 3, this probability also goes to zero as the local Hilbert space dimension goes to infinity.

  18. Two paths to blame: Intentionality directs moral information processing along two distinct tracks.

    PubMed

    Monroe, Andrew E; Malle, Bertram F

    2017-01-01

    There is broad consensus that features such as causality, mental states, and preventability are key inputs to moral judgments of blame. What is not clear is exactly how people process these inputs to arrive at such judgments. Three studies provide evidence that early judgments of whether or not a norm violation is intentional direct information processing along 1 of 2 tracks: if the violation is deemed intentional, blame processing relies on information about the agent's reasons for committing the violation; if the violation is deemed unintentional, blame processing relies on information about how preventable the violation was. Owing to these processing commitments, when new information requires perceivers to switch tracks, they must reconfigure their judgments, which results in measurable processing costs indicated by reaction time (RT) delays. These findings offer support for a new theory of moral judgment (the Path Model of Blame) and advance the study of moral cognition as hierarchical information processing. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  19. Alternative Outpatient Chemotherapy Scheduling Method to Improve Patient Service Quality and Nurse Satisfaction.

    PubMed

    Huang, Yu-Li; Bryce, Alan H; Culbertson, Tracy; Connor, Sarah L; Looker, Sherry A; Altman, Kristin M; Collins, James G; Stellner, Winston; McWilliams, Robert R; Moreno-Aspitia, Alvaro; Ailawadhi, Sikander; Mesa, Ruben A

    2018-02-01

    Optimal scheduling and calendar management in an outpatient chemotherapy unit is a complex process that is driven by a need to focus on safety while accommodating a high degree of variability. Primary constraints are infusion times, staffing resources, chair availability, and unit hours. We undertook a process to analyze our existing management models across multiple practice settings in our health care system, then developed a model to optimize safety and efficiency. The model was tested in one of the community chemotherapy units. We assessed staffing violations as measured by nurse-to-patient ratios throughout the workday and at key points during treatment. Staffing violations were tracked before and after the implementation of the new model. The new model reduced staffing violations by nearly 50% and required fewer chairs to treat the same number of patients for the selected clinic day. Actual implementation results indicated that the new model leveled the distribution of patients across the workday with an 18% reduction in maximum chair utilization and a 27% reduction in staffing violations. Subsequently, a positive impact on peak pharmacy workload reduced delays by as much as 35 minutes. Nursing staff satisfaction with the new model was positive. We conclude that the proposed optimization approach with regard to nursing resource assignment and workload balance throughout a day effectively improves patient service quality and staff satisfaction.

  20. Dirac-phase thermal leptogenesis in the extended type-I seesaw model

    NASA Astrophysics Data System (ADS)

    Dolan, Matthew J.; Dutka, Tomasz P.; Volkas, Raymond R.

    2018-06-01

    Motivated by the fact that δCP, the Dirac phase in the PMNS matrix, is the only CP-violating parameter in the leptonic sector that can be measured in neutrino oscillation experiments, we examine the possibility that it is the dominant source of CP violation for leptogenesis caused by the out-of-equilibrium decays of heavy singlet fermions. We do so within a low-scale extended type-I seesaw model, featuring two Standard Model singlet fermions per family, in which lepton number is approximately conserved such that the heavy singlet neutrinos are pseudo-Dirac. We find that this produces a predictive model of leptogenesis. Our results show that for low-scale thermal leptogenesis, a pure inverse-seesaw scenario fails to produce the required asymmetry, even accounting for resonance effects, because wash-out processes are too efficient. Dirac-phase leptogenesis is, however, possible when the linear seesaw term is switched on, with the aid of the resonance contributions naturally present in the model. Degenerate and hierarchical spectra are considered—both can achieve δCP-leptogenesis, although the latter is more constrained. Finally, although unable to probe the parameter space of Dirac-phase leptogenesis, the contributions to unitarity violation of the PMNS matrix, collider constraints and charged-lepton flavour-violating processes are calculated and we further estimate the impact of the future experiments MEG-II and COMET for such models.

  1. 25 CFR 42.5 - When can a school use ADR processes to address an alleged violation?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false When can a school use ADR processes to address an alleged... RIGHTS § 42.5 When can a school use ADR processes to address an alleged violation? (a) The school may address an alleged violation through the ADR processes described in § 42.4, unless one of the conditions...

  2. 25 CFR 42.5 - When can a school use ADR processes to address an alleged violation?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false When can a school use ADR processes to address an alleged... RIGHTS § 42.5 When can a school use ADR processes to address an alleged violation? (a) The school may address an alleged violation through the ADR processes described in § 42.4, unless one of the conditions...

  3. How embarrassing! The behavioral and neural correlates of processing social norm violations

    PubMed Central

    van Steenbergen, Henk; Kreuk, Tanja; van der Wee, Nic J. A.; Westenberg, P. Michiel

    2017-01-01

    Social norms are important for human social interactions, and violations of these norms are evaluated partly on the intention of the actor. Here, we describe the revised Social Norm Processing Task (SNPT-R), a paradigm enabling the study of behavioral and neural responses to intended and unintended social norm violations among both adults and adolescents. We investigated how participants (adolescents and adults, n = 87) rate intentional and unintentional social norm violations with respect to inappropriateness and embarrassment, and we examined the brain activation patterns underlying the processing of these transgressions in an independent sample of 21 adults using functional Magnetic Resonance Imaging (fMRI). We hypothesized to find activation within the medial prefrontal cortex, temporo-parietal cortex and orbitofrontal cortex in response to both intentional and unintentional social norm violations, with more pronounced activation for the intentional social norm violations in these regions and in the amygdala. Participants’ ratings confirmed the hypothesis that the three types of stories are evaluated differently with respect to intentionality: intentional social norm violations were rated as the most inappropriate and most embarrassing. Furthermore, fMRI results showed that reading stories on intentional and unintentional social norm violations evoked activation within the frontal pole, the paracingulate gyrus and the superior frontal gyrus. In addition, processing unintentional social norm violations was associated with activation in, among others, the orbitofrontal cortex, middle frontal gyrus and superior parietal lobule, while reading intentional social norm violations was related to activation in the left amygdala. These regions have been previously implicated in thinking about one’s self, thinking about others and moral reasoning. Together, these findings indicate that the SNPT-R could serve as a useful paradigm for examining social norm processing, both at the behavioral and the neural level. PMID:28441460

  4. Search for baryon number violation in top-quark decays

    DOE PAGES

    Chatrchyan, Serguei

    2014-02-20

    A search for baryon number violation (BNV) in top-quark decays is performed using pp collisions produced by the LHC at sqrt(s) = 8 TeV. The top-quark decay considered in this search results in one light lepton (muon or electron), two jets, but no neutrino in the final state. Data used for the analysis were collected by the CMS detector and correspond to an integrated luminosity of 19.5 inverse femtobarns. The event selection is optimized for top quarks produced in pairs, with one undergoing the BNV decay and the other the standard model hadronic decay to three jets. No significant excessmore » of events over the expected yield from standard model processes is observed. The upper limits at 95% confidence level on the branching fraction of the BNV top-quark decay are calculated to be 0.0016 and 0.0017 for the muon and the electron channels, respectively. Assuming lepton universality, an upper limit of 0.0015 results from the combination of the two channels. These limits are the first that have been obtained on a BNV process involving the top quark.« less

  5. 10 CFR 26.39 - Review process for fitness-for-duty policy violations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Review process for fitness-for-duty policy violations. 26.39 Section 26.39 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.39 Review process for fitness-for-duty policy violations. (a) Each licensee and other entity who is...

  6. 10 CFR 26.39 - Review process for fitness-for-duty policy violations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Review process for fitness-for-duty policy violations. 26.39 Section 26.39 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.39 Review process for fitness-for-duty policy violations. (a) Each licensee and other entity who is...

  7. 10 CFR 26.39 - Review process for fitness-for-duty policy violations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Review process for fitness-for-duty policy violations. 26.39 Section 26.39 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.39 Review process for fitness-for-duty policy violations. (a) Each licensee and other entity who is...

  8. 10 CFR 26.39 - Review process for fitness-for-duty policy violations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Review process for fitness-for-duty policy violations. 26.39 Section 26.39 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.39 Review process for fitness-for-duty policy violations. (a) Each licensee and other entity who is...

  9. 10 CFR 26.39 - Review process for fitness-for-duty policy violations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Review process for fitness-for-duty policy violations. 26.39 Section 26.39 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.39 Review process for fitness-for-duty policy violations. (a) Each licensee and other entity who is...

  10. Phenomenology of the standard model under conditions of spontaneously broken mirror symmetry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dyatlov, I. T., E-mail: dyatlov@thd.pnpi.spb.ru

    2017-03-15

    Spontaneously broken mirror symmetry is able to reproduce observed qualitative properties of weak mixing for quark and leptons. Under conditions of broken mirror symmetry, the phenomenology of leptons—that is, small neutrino masses and a mixing character other than that in the case of quarks—requires the Dirac character of the neutrinos and the existence of processes violating the total lepton number. Such processes involve heavy mirror neutrinos; that is, they proceed at very high energies. Here, CP violation implies that a P-even mirror-symmetric Lagrangian must simultaneously be T-odd and, according to the CPT theorem, C-odd. All these properties create preconditions formore » the occurrence of leptogenesis, which is a mechanism of the emergence of the baryon–lepton asymmetry of the universe in models featuring broken mirror symmetry.« less

  11. Baryogenesis via particle-antiparticle oscillations

    DOE PAGES

    Ipek, Seyda; March-Russell, John

    2016-06-29

    CP violation, which is crucial for producing the baryon asymmetry of the Universe, is enhanced in particle-antiparticle oscillations. We study particle-antiparticle oscillations [of a particle with mass O(100GeV)] with CP violation in the early Universe in the presence of interactions with O(ab-fb) cross sections. We show that if baryon-number-violating interactions exist, a baryon asymmetry can be produced via out-of-equilibrium decays of oscillating particles. As a concrete example we study a U(1)R-symmetric, R-parity-violating supersymmetry model with pseudo-Dirac gauginos, which undergo particle-antiparticle oscillations. Hence, taking bino to be the lightest U(1) R-symmetric particle, and assuming it decays via baryon-number-violating interactions, we showmore » that bino-antibino oscillations can produce the baryon asymmetry of the Universe.« less

  12. Anticipating the higher generations of quarks from rephasing invariance of the mixing matrix

    NASA Astrophysics Data System (ADS)

    Botella, F. J.; Chau, Ling-Lie

    1986-02-01

    We show that the number of invariant CP violating parameters XCP jumps from the unique universal one in three generations to nine in the four-generation case, saturating the parameter space for generation numbers higher than three. This can lead to drastically different consequences in CP-violating phenomena. We give the quark mass matrices in the three-generation case and speculate for higher generations. We also give some invariant definitions of “maximal” CP violation.

  13. REDUCTION OF CLASSROOM NOISE LEVELS USING GROUP CONTINGENCIES

    PubMed Central

    Ring, Brandon M.; Sigurdsson, Sigurdur O.; Eubanks, Sean L.; Silverman, Kenneth

    2016-01-01

    The therapeutic workplace is an employment-based abstinence reinforcement intervention for unemployed drug users where trainees receive on-the-job employment skills training in a classroom setting. The study is an extension of prior therapeutic workplace research, which suggested that trainees frequently violated noise standards. Participants received real-time graphed feedback of noise levels and had the opportunity to earn monetary group reinforcement for maintaining a low number of noise violations. Results suggested that feedback and monetary reinforcement reduced the number of noise violations. PMID:25175843

  14. Cooperative intersection collision avoidance system limited to stop sign and traffic signal violations (CICAS-V).

    DOT National Transportation Integrated Search

    2008-09-30

    The objective of the Cooperative Intersection Collision Avoidance System for Violations (CICAS-V) Project is to develop and field-test a comprehensive system to reduce the number of crashes at intersections due to violations of traffic control device...

  15. 21 CFR 108.12 - Manufacturing, processing, or packing without a permit, or in violation of a permit.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Manufacturing, processing, or packing without a permit, or in violation of a permit. 108.12 Section 108.12 Food and Drugs FOOD AND DRUG ADMINISTRATION... General Provisions § 108.12 Manufacturing, processing, or packing without a permit, or in violation of a...

  16. CP violation induced by the double resonance for pure annihilation decay process in perturbative QCD

    DOE PAGES

    Lü, Gang; Lu, Ye; Li, Sheng-Tao; ...

    2017-08-04

    In a perturbative QCD approach we study the direct CP violation in the pure annihilation decay process ofmore » $$\\bar{B}$$$0\\atop{s}$$→π +π -π +π - induced by the ρ and ω double resonance effect.Generally, the CP violation is small in the pure annihilation type decay process. But, we find that the CP violation can be enhanced by doubleinterference when the invariant masses of the π + π - pairs are in the vicinity of the ω resonance. For the decay process of $$\\bar{B}$$$0\\atop{s}$$→π +π -π +π -, the CP violation can reach ACP($$\\bar{B}$$$0\\atop{s}$$→π +π -π +π -)=27.20$$+0.05+0.28+7.13\\atop{-0.15-0.31-6.11}$$%.« less

  17. CP violation induced by the double resonance for pure annihilation decay process in perturbative QCD

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lü, Gang; Lu, Ye; Li, Sheng-Tao

    In a perturbative QCD approach we study the direct CP violation in the pure annihilation decay process ofmore » $$\\bar{B}$$$0\\atop{s}$$→π +π -π +π - induced by the ρ and ω double resonance effect.Generally, the CP violation is small in the pure annihilation type decay process. But, we find that the CP violation can be enhanced by doubleinterference when the invariant masses of the π + π - pairs are in the vicinity of the ω resonance. For the decay process of $$\\bar{B}$$$0\\atop{s}$$→π +π -π +π -, the CP violation can reach ACP($$\\bar{B}$$$0\\atop{s}$$→π +π -π +π -)=27.20$$+0.05+0.28+7.13\\atop{-0.15-0.31-6.11}$$%.« less

  18. Pedestrians' intention to jaywalk: Automatic or planned? A study based on a dual-process model in China.

    PubMed

    Xu, Yaoshan; Li, Yongjuan; Zhang, Feng

    2013-01-01

    The present study investigates the determining factors of Chinese pedestrians' intention to violate traffic laws using a dual-process model. This model divides the cognitive processes of intention formation into controlled analytical processes and automatic associative processes. Specifically, the process explained by the augmented theory of planned behavior (TPB) is controlled, whereas the process based on past behavior is automatic. The results of a survey conducted on 323 adult pedestrian respondents showed that the two added TPB variables had different effects on the intention to violate, i.e., personal norms were significantly related to traffic violation intention, whereas descriptive norms were non-significant predictors. Past behavior significantly but uniquely predicted the intention to violate: the results of the relative weight analysis indicated that the largest percentage of variance in pedestrians' intention to violate was explained by past behavior (42%). According to the dual-process model, therefore, pedestrians' intention formation relies more on habit than on cognitive TPB components and social norms. The implications of these findings for the development of intervention programs are discussed. Copyright © 2012 Elsevier Ltd. All rights reserved.

  19. Searches for Bound Neutron-Antineutron Oscillation in Liquid Argon Time Projection Chambers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hewes, Jeremy E.T.

    2017-01-01

    The next-generation Deep Underground Neutrino Experiment’s liquid argon detector represents an opportunity to probe previously unexplored parameter space for beyond-Standard Model processes. One such process is baryon number violating neutron-antineutron oscillation, the observation of which would have profound implications on our understanding of the origin of the matter-antimatter asymmetry in the universe, and provide strong hints as to the nature of neutrino mass. A GENIE n

  20. Work hours restrictions as an ethical dilemma for residents: a descriptive survey of violation types and frequency.

    PubMed

    Carpenter, Robert O; Spooner, John; Arbogast, Patrick G; Tarpley, John L; Griffin, Marie R; Lomis, Kimberly D

    2006-01-01

    The Accreditation Council for Graduate Medical Education (ACGME) implemented requirements regarding allowable duty hours for resident training in the United States in July 2003. In a previous pilot study at Vanderbilt University Medical Center, a significant number of residents reported violation of requirements. In addition, almost half of those individuals admitted under-reporting their hours worked. The authors' goal was to further delineate the type and frequency of violations and under-reporting. A survey tool was designed to assess specific types of violations as well as factors that influence the number of hours residents worked and reported. Approval was obtained from the Vanderbilt Institutional Review Board and Office of Graduate Medical Education before enrollment of subjects. The program directors of Pediatrics, Internal Medicine, Medicine-Pediatrics, and General Surgery supported the participation of their residents. A voluntary anonymous survey of these residents was conducted 1 year after the pilot study. Of 263 eligible residents, 175 were surveyed. Of 175 residents, 125 (71%) residents responded. Eighty-five percent of residents reported violation of duty-hour requirements within the preceding 3 months. Residents reported violation of specific requirements as follows: 1 day off in 7, 28%; 80-hour weekly average, 65%; and "24+6" consecutive hours, 85%. Residents were asked to estimate the number of hours by which they exceeded requirements. Hours over the 80-hour weekly requirement were reported as follows: 1 hour, 12%; 2 hours, 15%; 3 hours, 21%; 4 hours, 5%; 5 hours, 14%; and 6 or more hours, 33%. Hours over the "24+6" requirement were reported as follows: 1 hour, 30%; 2 hours, 42%; 3 hours, 18%; 4 hours, 7%; 5 hours, 1%; and 6 or more hours, 2%. Forty-eight percent of respondents admitted under-reporting violations to their program director. Eighty-five percent of residents reported at least 1 violation, and 48% admitted under-reporting violations. These results support the previous findings of 80% and 49%, respectively. Of the various requirements, the "24+6" rule was most frequently violated. Of those in violation of the "24+6" requirement, the majority (90%) exceeded limits by no more than 3 hours. Of those in violation of the 80-hour weekly average requirement, the majority (57%) exceeded limits by no more than 5 hours. Per the ACGME website, "an RRC may grant exceptions for up to 10% of the 80-hour limit, to individual programs based on a sound educational rationale." Although the overall percent of residents reporting violation remains high, the number of excess hours worked is small relative to established standards (within 10%). The authors propose that systems adaptations could be developed to improve compliance. Special attention is warranted to investigate the activities of residents in the post-call period.

  1. The role of CP violating scatterings in baryogenesis—case study of the neutron portal

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baldes, Iason; Bell, Nicole F.; Millar, Alexander

    Many baryogenesis scenarios invoke the charge parity (CP) violating out-of-equilibrium decay of a heavy particle in order to explain the baryon asymmetry. Such scenarios will in general also allow CP violating scatterings. We study the effect of these CP violating scatterings on the final asymmetry in a neutron portal scenario. We solve the Boltzmann equations governing the evolution of the baryon number numerically and show that the CP violating scatterings play a dominant role in a significant portion of the parameter space.

  2. 25 CFR 42.5 - When can a school use ADR processes to address an alleged violation?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... school must address alleged violations through the formal disciplinary proceeding described in § 42.8. ... 25 Indians 1 2013-04-01 2013-04-01 false When can a school use ADR processes to address an alleged... RIGHTS § 42.5 When can a school use ADR processes to address an alleged violation? (a) The school may...

  3. 25 CFR 42.5 - When can a school use ADR processes to address an alleged violation?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... school must address alleged violations through the formal disciplinary proceeding described in § 42.8. ... 25 Indians 1 2014-04-01 2014-04-01 false When can a school use ADR processes to address an alleged... RIGHTS § 42.5 When can a school use ADR processes to address an alleged violation? (a) The school may...

  4. 25 CFR 42.5 - When can a school use ADR processes to address an alleged violation?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... school must address alleged violations through the formal disciplinary proceeding described in § 42.8. ... 25 Indians 1 2012-04-01 2011-04-01 true When can a school use ADR processes to address an alleged... RIGHTS § 42.5 When can a school use ADR processes to address an alleged violation? (a) The school may...

  5. Search for Baryon-Number Violating Ξb0 Oscillations

    NASA Astrophysics Data System (ADS)

    Aaij, R.; Adeva, B.; Adinolfi, M.; Ajaltouni, Z.; Akar, S.; Albrecht, J.; Alessio, F.; Alexander, M.; Alfonso Albero, A.; Ali, S.; Alkhazov, G.; Alvarez Cartelle, P.; Alves, A. A.; Amato, S.; Amerio, S.; Amhis, Y.; An, L.; Anderlini, L.; Andreassi, G.; Andreotti, M.; Andrews, J. E.; Appleby, R. B.; Archilli, F.; d'Argent, P.; Arnau Romeu, J.; Artamonov, A.; Artuso, M.; Aslanides, E.; Auriemma, G.; Baalouch, M.; Babuschkin, I.; Bachmann, S.; Back, J. J.; Badalov, A.; Baesso, C.; Baker, S.; Balagura, V.; Baldini, W.; Baranov, A.; Barlow, R. J.; Barschel, C.; Barsuk, S.; Barter, W.; Baryshnikov, F.; Batozskaya, V.; Battista, V.; Bay, A.; Beaucourt, L.; Beddow, J.; Bedeschi, F.; Bediaga, I.; Beiter, A.; Bel, L. J.; Beliy, N.; Bellee, V.; Belloli, N.; Belous, K.; Belyaev, I.; Ben-Haim, E.; Bencivenni, G.; Benson, S.; Beranek, S.; Berezhnoy, A.; Bernet, R.; Berninghoff, D.; Bertholet, E.; Bertolin, A.; Betancourt, C.; Betti, F.; Bettler, M.-O.; van Beuzekom, M.; Bezshyiko, Ia.; Bifani, S.; Billoir, P.; Birnkraut, A.; Bitadze, A.; Bizzeti, A.; Bjørn, M.; Blake, T.; Blanc, F.; Blouw, J.; Blusk, S.; Bocci, V.; Boettcher, T.; Bondar, A.; Bondar, N.; Bonivento, W.; Bordyuzhin, I.; Borgheresi, A.; Borghi, S.; Borisyak, M.; Borsato, M.; Bossu, F.; Boubdir, M.; Bowcock, T. J. V.; Bowen, E.; Bozzi, C.; Braun, S.; Britton, T.; Brodzicka, J.; Brundu, D.; Buchanan, E.; Burr, C.; Bursche, A.; Buytaert, J.; Byczynski, W.; Cadeddu, S.; Cai, H.; Calabrese, R.; Calladine, R.; Calvi, M.; Calvo Gomez, M.; Camboni, A.; Campana, P.; Campora Perez, D. H.; Capriotti, L.; Carbone, A.; Carboni, G.; Cardinale, R.; Cardini, A.; Carniti, P.; Carson, L.; Carvalho Akiba, K.; Casse, G.; Cassina, L.; Castillo Garcia, L.; Cattaneo, M.; Cavallero, G.; Cenci, R.; Chamont, D.; Charles, M.; Charpentier, Ph.; Chatzikonstantinidis, G.; Chefdeville, M.; Chen, S.; Cheung, S. F.; Chitic, S.-G.; Chobanova, V.; Chrzaszcz, M.; Chubykin, A.; Ciambrone, P.; Cid Vidal, X.; Ciezarek, G.; Clarke, P. E. L.; Clemencic, M.; Cliff, H. V.; Closier, J.; Cogan, J.; Cogneras, E.; Cogoni, V.; Cojocariu, L.; Collins, P.; Colombo, T.; Comerma-Montells, A.; Contu, A.; Cook, A.; Coombs, G.; Coquereau, S.; Corti, G.; Corvo, M.; Costa Sobral, C. M.; Couturier, B.; Cowan, G. A.; Craik, D. C.; Crocombe, A.; Cruz Torres, M.; Currie, R.; D'Ambrosio, C.; Da Cunha Marinho, F.; Dall'Occo, E.; Dalseno, J.; Davis, A.; De Aguiar Francisco, O.; De Capua, S.; De Cian, M.; De Miranda, J. M.; De Paula, L.; De Serio, M.; De Simone, P.; Dean, C. T.; Decamp, D.; Del Buono, L.; Dembinski, H.-P.; Demmer, M.; Dendek, A.; Derkach, D.; Deschamps, O.; Dettori, F.; Dey, B.; Di Canto, A.; Di Nezza, P.; Dijkstra, H.; Dordei, F.; Dorigo, M.; Dosil Suárez, A.; Douglas, L.; Dovbnya, A.; Dreimanis, K.; Dufour, L.; Dujany, G.; Durante, P.; Dzhelyadin, R.; Dziewiecki, M.; Dziurda, A.; Dzyuba, A.; Easo, S.; Ebert, M.; Egede, U.; Egorychev, V.; Eidelman, S.; Eisenhardt, S.; Eitschberger, U.; Ekelhof, R.; Eklund, L.; Ely, S.; Esen, S.; Evans, H. M.; Evans, T.; Falabella, A.; Farley, N.; Farry, S.; Fazzini, D.; Federici, L.; Ferguson, D.; Fernandez, G.; Fernandez Declara, P.; Fernandez Prieto, A.; Ferrari, F.; Ferreira Rodrigues, F.; Ferro-Luzzi, M.; Filippov, S.; Fini, R. A.; Fiore, M.; Fiorini, M.; Firlej, M.; Fitzpatrick, C.; Fiutowski, T.; Fleuret, F.; Fohl, K.; Fontana, M.; Fontanelli, F.; Forshaw, D. C.; Forty, R.; Franco Lima, V.; Frank, M.; Frei, C.; Fu, J.; Funk, W.; Furfaro, E.; Färber, C.; Gabriel, E.; Gallas Torreira, A.; Galli, D.; Gallorini, S.; Gambetta, S.; Gandelman, M.; Gandini, P.; Gao, Y.; Garcia Martin, L. M.; García Pardiñas, J.; Garra Tico, J.; Garrido, L.; Garsed, P. J.; Gascon, D.; Gaspar, C.; Gavardi, L.; Gazzoni, G.; Gerick, D.; Gersabeck, E.; Gersabeck, M.; Gershon, T.; Ghez, Ph.; Gianı, S.; Gibson, V.; Girard, O. G.; Giubega, L.; Gizdov, K.; Gligorov, V. V.; Golubkov, D.; Golutvin, A.; Gomes, A.; Gorelov, I. V.; Gotti, C.; Govorkova, E.; Grabowski, J. P.; Graciani Diaz, R.; Granado Cardoso, L. A.; Graugés, E.; Graverini, E.; Graziani, G.; Grecu, A.; Greim, R.; Griffith, P.; Grillo, L.; Gruber, L.; Gruberg Cazon, B. R.; Grünberg, O.; Gushchin, E.; Guz, Yu.; Gys, T.; Göbel, C.; Hadavizadeh, T.; Hadjivasiliou, C.; Haefeli, G.; Haen, C.; Haines, S. C.; Hamilton, B.; Han, X.; Hancock, T. H.; Hansmann-Menzemer, S.; Harnew, N.; Harnew, S. T.; Harrison, J.; Hasse, C.; Hatch, M.; He, J.; Hecker, M.; Heinicke, K.; Heister, A.; Hennessy, K.; Henrard, P.; Henry, L.; van Herwijnen, E.; Heß, M.; Hicheur, A.; Hill, D.; Hombach, C.; Hopchev, P. H.; Huard, Z. C.; Hulsbergen, W.; Humair, T.; Hushchyn, M.; Hutchcroft, D.; Ibis, P.; Idzik, M.; Ilten, P.; Jacobsson, R.; Jalocha, J.; Jans, E.; Jawahery, A.; Jiang, F.; John, M.; Johnson, D.; Jones, C. R.; Joram, C.; Jost, B.; Jurik, N.; Kandybei, S.; Karacson, M.; Kariuki, J. M.; Karodia, S.; Kazeev, N.; Kecke, M.; Kelsey, M.; Kenzie, M.; Ketel, T.; Khairullin, E.; Khanji, B.; Khurewathanakul, C.; Kirn, T.; Klaver, S.; Klimaszewski, K.; Klimkovich, T.; Koliiev, S.; Kolpin, M.; Komarov, I.; Kopecna, R.; Koppenburg, P.; Kosmyntseva, A.; Kotriakhova, S.; Kozeiha, M.; Kravchuk, L.; Kreps, M.; Krokovny, P.; Kruse, F.; Krzemien, W.; Kucewicz, W.; Kucharczyk, M.; Kudryavtsev, V.; Kuonen, A. K.; Kurek, K.; Kvaratskheliya, T.; Lacarrere, D.; Lafferty, G.; Lai, A.; Lanfranchi, G.; Langenbruch, C.; Latham, T.; Lazzeroni, C.; Le Gac, R.; Leflat, A.; Lefrançois, J.; Lefèvre, R.; Lemaitre, F.; Lemos Cid, E.; Leroy, O.; Lesiak, T.; Leverington, B.; Li, P.-R.; Li, T.; Li, Y.; Li, Z.; Likhomanenko, T.; Lindner, R.; Lionetto, F.; Lisovskyi, V.; Liu, X.; Loh, D.; Loi, A.; Longstaff, I.; Lopes, J. H.; Lucchesi, D.; Lucio Martinez, M.; Luo, H.; Lupato, A.; Luppi, E.; Lupton, O.; Lusiani, A.; Lyu, X.; Machefert, F.; Maciuc, F.; Macko, V.; Mackowiak, P.; Maddrell-Mander, S.; Maev, O.; Maguire, K.; Maisuzenko, D.; Majewski, M. W.; Malde, S.; Malinin, A.; Maltsev, T.; Manca, G.; Mancinelli, G.; Manning, P.; Marangotto, D.; Maratas, J.; Marchand, J. F.; Marconi, U.; Marin Benito, C.; Marinangeli, M.; Marino, P.; Marks, J.; Martellotti, G.; Martin, M.; Martinelli, M.; Martinez Santos, D.; Martinez Vidal, F.; Martins Tostes, D.; Massacrier, L. M.; Massafferri, A.; Matev, R.; Mathad, A.; Mathe, Z.; Matteuzzi, C.; Mauri, A.; Maurice, E.; Maurin, B.; Mazurov, A.; McCann, M.; McNab, A.; McNulty, R.; Mead, J. V.; Meadows, B.; Meaux, C.; Meier, F.; Meinert, N.; Melnychuk, D.; Merk, M.; Merli, A.; Michielin, E.; Milanes, D. A.; Millard, E.; Minard, M.-N.; Minzoni, L.; Mitzel, D. S.; Mogini, A.; Molina Rodriguez, J.; Mombacher, T.; Monroy, I. A.; Monteil, S.; Morandin, M.; Morello, M. J.; Morgunova, O.; Moron, J.; Morris, A. B.; Mountain, R.; Muheim, F.; Mulder, M.; Müller, D.; Müller, J.; Müller, K.; Müller, V.; Naik, P.; Nakada, T.; Nandakumar, R.; Nandi, A.; Nasteva, I.; Needham, M.; Neri, N.; Neubert, S.; Neufeld, N.; Neuner, M.; Nguyen, T. D.; Nguyen-Mau, C.; Nieswand, S.; Niet, R.; Nikitin, N.; Nikodem, T.; Nogay, A.; O'Hanlon, D. P.; Oblakowska-Mucha, A.; Obraztsov, V.; Ogilvy, S.; Oldeman, R.; Onderwater, C. J. G.; Ossowska, A.; Otalora Goicochea, J. M.; Owen, P.; Oyanguren, A.; Pais, P. R.; Palano, A.; Palutan, M.; Papanestis, A.; Pappagallo, M.; Pappalardo, L. L.; Parker, W.; Parkes, C.; Passaleva, G.; Pastore, A.; Patel, M.; Patrignani, C.; Pearce, A.; Pellegrino, A.; Penso, G.; Pepe Altarelli, M.; Perazzini, S.; Perret, P.; Pescatore, L.; Petridis, K.; Petrolini, A.; Petrov, A.; Petruzzo, M.; Picatoste Olloqui, E.; Pietrzyk, B.; Pikies, M.; Pinci, D.; Pistone, A.; Piucci, A.; Placinta, V.; Playfer, S.; Plo Casasus, M.; Polci, F.; Poli Lener, M.; Poluektov, A.; Polyakov, I.; Polycarpo, E.; Pomery, G. J.; Ponce, S.; Popov, A.; Popov, D.; Poslavskii, S.; Potterat, C.; Price, E.; Prisciandaro, J.; Prouve, C.; Pugatch, V.; Puig Navarro, A.; Pullen, H.; Punzi, G.; Qian, W.; Quagliani, R.; Quintana, B.; Rachwal, B.; Rademacker, J. H.; Rama, M.; Ramos Pernas, M.; Rangel, M. S.; Raniuk, I.; Ratnikov, F.; Raven, G.; Ravonel Salzgeber, M.; Reboud, M.; Redi, F.; Reichert, S.; dos Reis, A. C.; Remon Alepuz, C.; Renaudin, V.; Ricciardi, S.; Richards, S.; Rihl, M.; Rinnert, K.; Rives Molina, V.; Robbe, P.; Robert, A.; Rodrigues, A. B.; Rodrigues, E.; Rodriguez Lopez, J. A.; Rodriguez Perez, P.; Rogozhnikov, A.; Roiser, S.; Rollings, A.; Romanovskiy, V.; Romero Vidal, A.; Ronayne, J. W.; Rotondo, M.; Rudolph, M. S.; Ruf, T.; Ruiz Valls, P.; Ruiz Vidal, J.; Saborido Silva, J. J.; Sadykhov, E.; Sagidova, N.; Saitta, B.; Salustino Guimaraes, V.; Sanchez Mayordomo, C.; Sanmartin Sedes, B.; Santacesaria, R.; Santamarina Rios, C.; Santimaria, M.; Santovetti, E.; Sarpis, G.; Sarti, A.; Satriano, C.; Satta, A.; Saunders, D. M.; Savrina, D.; Schael, S.; Schellenberg, M.; Schiller, M.; Schindler, H.; Schlupp, M.; Schmelling, M.; Schmelzer, T.; Schmidt, B.; Schneider, O.; Schopper, A.; Schreiner, H. F.; Schubert, K.; Schubiger, M.; Schune, M.-H.; Schwemmer, R.; Sciascia, B.; Sciubba, A.; Semennikov, A.; Sepulveda, E. S.; Sergi, A.; Serra, N.; Serrano, J.; Sestini, L.; Seyfert, P.; Shapkin, M.; Shapoval, I.; Shcheglov, Y.; Shears, T.; Shekhtman, L.; Shevchenko, V.; Siddi, B. G.; Silva Coutinho, R.; Silva de Oliveira, L.; Simi, G.; Simone, S.; Sirendi, M.; Skidmore, N.; Skwarnicki, T.; Smith, E.; Smith, I. T.; Smith, J.; Smith, M.; Soares Lavra, l.; Sokoloff, M. D.; Soler, F. J. P.; Souza De Paula, B.; Spaan, B.; Spradlin, P.; Sridharan, S.; Stagni, F.; Stahl, M.; Stahl, S.; Stefko, P.; Stefkova, S.; Steinkamp, O.; Stemmle, S.; Stenyakin, O.; Stepanova, M.; Stevens, H.; Stone, S.; Storaci, B.; Stracka, S.; Stramaglia, M. E.; Straticiuc, M.; Straumann, U.; Sun, J.; Sun, L.; Sutcliffe, W.; Swientek, K.; Syropoulos, V.; Szczekowski, M.; Szumlak, T.; Szymanski, M.; T'Jampens, S.; Tayduganov, A.; Tekampe, T.; Tellarini, G.; Teubert, F.; Thomas, E.; van Tilburg, J.; Tilley, M. J.; Tisserand, V.; Tobin, M.; Tolk, S.; Tomassetti, L.; Tonelli, D.; Toriello, F.; Tourinho Jadallah Aoude, R.; Tournefier, E.; Traill, M.; Tran, M. T.; Tresch, M.; Trisovic, A.; Tsaregorodtsev, A.; Tsopelas, P.; Tully, A.; Tuning, N.; Ukleja, A.; Usachov, A.; Ustyuzhanin, A.; Uwer, U.; Vacca, C.; Vagner, A.; Vagnoni, V.; Valassi, A.; Valat, S.; Valenti, G.; Vazquez Gomez, R.; Vazquez Regueiro, P.; Vecchi, S.; van Veghel, M.; Velthuis, J. J.; Veltri, M.; Veneziano, G.; Venkateswaran, A.; Verlage, T. A.; Vernet, M.; Vesterinen, M.; Viana Barbosa, J. V.; Viaud, B.; Vieira, D.; Vieites Diaz, M.; Viemann, H.; Vilasis-Cardona, X.; Vitti, M.; Volkov, V.; Vollhardt, A.; Voneki, B.; Vorobyev, A.; Vorobyev, V.; Voß, C.; de Vries, J. A.; Vázquez Sierra, C.; Waldi, R.; Wallace, C.; Wallace, R.; Walsh, J.; Wang, J.; Ward, D. R.; Wark, H. M.; Watson, N. K.; Websdale, D.; Weiden, A.; Whitehead, M.; Wicht, J.; Wilkinson, G.; Wilkinson, M.; Williams, M.; Williams, M. P.; Williams, M.; Williams, T.; Wilson, F. F.; Wimberley, J.; Winn, M.; Wishahi, J.; Wislicki, W.; Witek, M.; Wormser, G.; Wotton, S. A.; Wraight, K.; Wyllie, K.; Xie, Y.; Xu, Z.; Yang, Z.; Yang, Z.; Yao, Y.; Yin, H.; Yu, J.; Yuan, X.; Yushchenko, O.; Zarebski, K. A.; Zavertyaev, M.; Zhang, L.; Zhang, Y.; Zhelezov, A.; Zheng, Y.; Zhu, X.; Zhukov, V.; Zonneveld, J. B.; Zucchelli, S.; LHCb Collaboration

    2017-11-01

    A search for baryon-number violating Ξb0 oscillations is performed with a sample of p p collision data recorded by the LHCb experiment, corresponding to an integrated luminosity of 3 fb-1 . The baryon number at the moment of production is identified by requiring that the Ξb0 come from the decay of a resonance Ξb*-→Ξb0π- or Ξb'-→Ξb0π-, and the baryon number at the moment of decay is identified from the final state using the decays Ξb0→Ξc+π-,Ξc+→p K-π+. No evidence of baryon-number violation is found, and an upper limit at the 95% confidence level is set on the oscillation rate of ω <0.08 ps-1, where ω is the associated angular frequency.

  6. $$\\chi$$EFT studies of few-nucleon systems: a status report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schiavilla, Rocco

    2016-06-01

    A status report onmore » $$\\chi$$EFT studies of few-nucleon electroweak structure and dynamics is provided, including electromagnetic elastic form factors of few-nucleon systems, the $pp$ weak fusion and muon weak captures on deuteron and $^3$He, and a number of parity-violating processes induced by hadronic weak interactions.« less

  7. B+ L violation at colliders and new physics

    NASA Astrophysics Data System (ADS)

    Cerdeño, David G.; Reimitz, Peter; Sakurai, Kazuki; Tamarit, Carlos

    2018-04-01

    Chiral electroweak anomalies predict baryon ( B) and lepton ( L) violating fermion interactions, which can be dressed with large numbers of Higgs and gauge bosons. The estimation of the total B + L-violating rate from an initial two-particle state — potentially observable at colliders — has been the subject of an intense discussion, mainly centered on the resummation of boson emission, which is believed to contribute to the cross-section with an exponential function of the energy, yet with an exponent (the "holy-grail" function) which is not fully known in the energy range of interest. In this article we focus instead on the effect of fermions beyond the Standard-Model (SM) in the polynomial contributions to the rate. It is shown that B + L processes involving the new fermions have a polynomial contribution that can be several orders of magnitude greater than in the SM, for high centre-of-mass energies and light enough masses. We also present calculations that hint at a simple dependence of the holy grail function on the heavy fermion masses. Thus, if anomalous B + L violating interactions are ever detected at high-energy colliders, they could be associated with new physics.

  8. Android-based E-Traffic law enforcement system in Surakarta City

    NASA Astrophysics Data System (ADS)

    Yulianto, Budi; Setiono

    2018-03-01

    The urban advancement is always overpowered by the increasing number of vehicles as the need for movement of people and goods. This can lead to traffic problems if there is no effort on the implementation of traffic management and engineering, and traffic law enforcement. In this case, the Government of Surakarta City has implemented various policies and regulations related to traffic management and engineering in order to run traffic in an orderly, safe and comfortable manner according to the applicable law. However, conditions in the field shows that traffic violations still occurred frequently due to the weakness of traffic law enforcement in terms of human resources and the system. In this connection, a tool is needed to support traffic law enforcement, especially in relation to the reporting system of traffic violations. This study aims to develop an Android-based traffic violations reporting application (E-Traffic Law Enforcement) as part of the traffic law enforcement system in Surakarta City. The Android-apps records the location and time of the traffic violations incident along with the visual evidence of the infringement. This information will be connected to the database system to detect offenders and to do the traffic law enforcement process.

  9. Three-observer Bell inequality violation on a two-qubit entangled state

    NASA Astrophysics Data System (ADS)

    Schiavon, Matteo; Calderaro, Luca; Pittaluga, Mirko; Vallone, Giuseppe; Villoresi, Paolo

    2017-03-01

    Bipartite Bell inequalities can simultaneously be violated by two different pairs of observers when weak measurements and signalling is employed. Here, we experimentally demonstrate the violation of two simultaneous CHSH inequalities by exploiting a two-photon polarisation maximally entangled state. Our results demonstrate that large double violation is experimentally achievable. Our demonstration may have impact for Quantum Key Distribution or certification of Quantum Random Number generators based on weak measurements.

  10. Baryon number violation and novel canonical anti-commutation relations

    NASA Astrophysics Data System (ADS)

    Fujikawa, Kazuo; Tureanu, Anca

    2018-02-01

    The possible neutron-antineutron oscillation is described by an effective quadratic Lagrangian analogous to the BCS theory. It is shown that the conventional equal-time anti-commutation relations of the neutron variable n (t , x →) are modified by the baryon number violating terms. This is established by the Bjorken-Johnson-Low prescription and also by the canonical quantization combined with equations of motion. This novel canonical behavior can give rise to an important physical effect, which is illustrated by analyzing the Lagrangian that violates the baryon number but gives rise to the degenerate effective Majorana fermions and thus no neutron-antineutron oscillation. Technically, this model is neatly treated using a relativistic analogue of the Bogoliubov transformation.

  11. When Norms Are Violated: Imagined Interactions as Processing and Coping Mechanisms.

    ERIC Educational Resources Information Center

    Berkos, Kristen M.; Allen, Terre H.; Kearney, Patricia; Plax, Timothy G.

    2001-01-01

    Explores undergraduate student receivers' symbolic cognitive processes in response to particular types of norm violations. Finds that imagined interactions were used in respect to all three types of violations profiled and that participants were significantly more likely to engage in imagined interactions than to interact with or confront norm…

  12. Experimental many-pairs nonlocality

    NASA Astrophysics Data System (ADS)

    Poh, Hou Shun; Cerè, Alessandro; Bancal, Jean-Daniel; Cai, Yu; Sangouard, Nicolas; Scarani, Valerio; Kurtsiefer, Christian

    2017-08-01

    Collective measurements on large quantum systems together with a majority voting strategy can lead to a violation of the Clauser-Horne-Shimony-Holt Bell inequality. In the presence of many entangled pairs, this violation decreases quickly with the number of pairs and vanishes for some critical pair number that is a function of the noise present in the system. Here we show that a different binning strategy can lead to a more substantial Bell violation when the noise is sufficiently small. Given the relation between the critical pair number and the source noise, we then present an experiment where the critical pair number is used to quantify the quality of a high visibility photon pair source. Our results demonstrate nonlocal correlations using collective measurements operating on clusters of more than 40 photon pairs.

  13. 20 CFR 655.410 - Civil money penalties and other remedies.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... TEMPORARY EMPLOYMENT OF FOREIGN WORKERS IN THE UNITED STATES Enforcement of H-1A Attestations § 655.410... E of this part; (2) The number of workers affected by the violation or violations; (3) The gravity... account the public health, interest or safety; and (7) The extent to which the violator achieved a...

  14. Emotion and Deliberative Reasoning in Moral Judgment

    PubMed Central

    Cummins, Denise Dellarosa; Cummins, Robert C.

    2012-01-01

    According to an influential dual-process model, a moral judgment is the outcome of a rapid, affect-laden process and a slower, deliberative process. If these outputs conflict, decision time is increased in order to resolve the conflict. Violations of deontological principles proscribing the use of personal force to inflict intentional harm are presumed to elicit negative affect which biases judgments early in the decision-making process. This model was tested in three experiments. Moral dilemmas were classified using (a) decision time and consensus as measures of system conflict and (b) the aforementioned deontological criteria. In Experiment 1, decision time was either unlimited or reduced. The dilemmas asked whether it was appropriate to take a morally questionable action to produce a “greater good” outcome. Limiting decision time reduced the proportion of utilitarian (“yes”) decisions, but contrary to the model’s predictions, (a) vignettes that involved more deontological violations logged faster decision times, and (b) violation of deontological principles was not predictive of decisional conflict profiles. Experiment 2 ruled out the possibility that time pressure simply makes people more like to say “no.” Participants made a first decision under time constraints and a second decision under no time constraints. One group was asked whether it was appropriate to take the morally questionable action while a second group was asked whether it was appropriate to refuse to take the action. The results replicated that of Experiment 1 regardless of whether “yes” or “no” constituted a utilitarian decision. In Experiment 3, participants rated the pleasantness of positive visual stimuli prior to making a decision. Contrary to the model’s predictions, the number of deontological decisions increased in the positive affect rating group compared to a group that engaged in a cognitive task or a control group that engaged in neither task. These results are consistent with the view that early moral judgments are influenced by affect. But they are inconsistent with the view that (a) violation of deontological principles are predictive of differences in early, affect-based judgment or that (b) engaging in tasks that are inconsistent with the negative emotional responses elicited by such violations diminishes their impact. PMID:22973255

  15. Connecting Majorana phases to the geometric parameters of the Majorana unitarity triangle in a neutrino mass matrix model

    NASA Astrophysics Data System (ADS)

    Verma, Surender; Bhardwaj, Shankita

    2018-05-01

    We have investigated a possible connection between the Majorana phases and geometric parameters of Majorana unitarity triangle (MT) in two-texture zero neutrino mass matrix. Such analytical relations can, also, be obtained for other theoretical models viz. hybrid textures, neutrino mass matrix with vanishing minors and have profound implications for geometric description of C P violation. As an example, we have considered the two-texture zero neutrino mass model to obtain a relation between Majorana phases and MT parameters that may be probed in various lepton number violating processes. In particular, we find that Majorana phases depend on only one of the three interior angles of the MT in each class of two-texture zero neutrino mass matrix. We have also constructed the MT for class A , B , and C neutrino mass matrices. Nonvanishing areas and nontrivial orientations of these Majorana unitarity triangles indicate nonzero C P violation as a generic feature of this class of mass models.

  16. Let's face the music: a behavioral and electrophysiological exploration of score reading.

    PubMed

    Gunter, Thomas C; Schmidt, Björn-Helmer; Besson, Mireille

    2003-09-01

    This experiment was carried out to determine whether reading diatonic violations in a musical score elicits similar endogenous ERP components when hearing such violations in the auditory modality. In the behavioral study, musicians were visually presented with 120 scores of familiar musical pieces, half of which contained a diatonic violation. The score was presented in a measure-by-measure manner. Self-paced reading was significantly delayed for measures containing a violation, indicating that sight reading a violation requires additional effort. In the ERP study, the musical phrases were presented in a "RSVP"-like manner. We predicted that diatonic violations would elicit a late positive component. However, the ERP associated with the measure where a violation was presented showed a negativity instead. The negativity started around 100 ms and lasted for the entire recording period. This long-lasting negativity encompassed at least three distinct effects that were possibly related to violation detection, working memory processing, and a further integration/interpretation process.

  17. Left cytoarchitectonic BA 44 processes syntactic gender violations in determiner phrases.

    PubMed

    Heim, Stefan; van Ermingen, Muna; Huber, Walter; Amunts, Katrin

    2010-10-01

    Recent neuroimaging studies make contradictory predictions about the involvement of left Brodmann's area (BA) 44 in processing local syntactic violations in determiner phrases (DPs). Some studies suggest a role for BA 44 in detecting local syntactic violations, whereas others attribute this function to the left premotor cortex. Therefore, the present event-related functional magnetic resonance imaging (fMRI) study investigated whether left-cytoarchitectonic BA 44 was activated when German DPs involving syntactic gender violations were compared with correct DPs (correct: 'der Baum'-the[masculine] tree[masculine]; violated: 'das Baum'--the[neuter] tree[masculine]). Grammaticality judgements were made for both visual and auditory DPs to be able to generalize the results across modalities. Grammaticality judgements involved, among others, left BA 44 and left BA 6 in the premotor cortex for visual and auditory stimuli. Most importantly, activation in left BA 44 was consistently higher for violated than for correct DPs. This finding was behaviourally corroborated by longer reaction times for violated versus correct DPs. Additional brain regions, showing the same effect, included left premotor cortex, supplementary motor area, right middle and superior frontal cortex, and left cerebellum. Based on earlier findings from the literature, the results indicate the involvement of left BA 44 in processing local syntactic violations when these include morphological features, whereas left premotor cortex seems crucial for the detection of local word category violations. © 2010 Wiley-Liss, Inc.

  18. National evaluation of strategies to reduce safety violations for working from heights in construction companies: results from a randomized controlled trial.

    PubMed

    van der Molen, Henk F; den Herder, Aalt; Warning, Jan; Frings-Dresen, Monique H W

    2016-01-09

    The objective of this study is to evaluate the effectiveness of a face-to-face strategy and a direct mail strategy on safety violations while working from heights among construction companies compared to a control condition. Construction companies with workers at risk for fall injuries were eligible for this three-armed randomized controlled trial. In total, 27 cities were randomly assigned to intervention groups-where eligible companies were given either a face-to-face guidance strategy or a direct mailing strategy with access to internet facilities-or to a control group. The primary outcomes were the number and type of safety violations recorded by labor inspectors after three months. A process evaluation for both strategies was performed to determine reach, program implementation, satisfaction, knowledge and perceived safety behavior. A cost analysis was performed to establish the financial costs for each intervention strategy. Analyses were done by intention to treat. In total, 41% (n = 88) of the companies eligible for the face-to-face intervention participated and 73% (n = 69) for direct mail. Intervention materials were delivered to 69 % (face-to-face group) and 100 % (direct mail group); completion of intervention activities within companies was low. Satisfaction, increase in knowledge, and safety behavior did not differ between the intervention groups. Costs for personal advice were 28% higher than for direct mail. Ultimately, nine intervention companies were captured in the 288 worksite measurements performed by the labor inspectorate. No statistical differences in mean number of safety violations (1.8-2.4) or penalties (72%-100%) were found between the intervention and control groups based on all worksite inspections. No conclusions about the effect of face-to-face and direct mail strategies on safety violations could be drawn due to the limited number of intervention companies captured in the primary outcome measurements. The costs for a face-to-face strategy are higher compared with a direct mail strategy. No difference in awareness and attitude for safe working was found between employers and workers between both strategies. NTR 4298 on 29-Nov-2013.

  19. Search for Baryon-Number Violating Ξ_{b}^{0} Oscillations.

    PubMed

    Aaij, R; Adeva, B; Adinolfi, M; Ajaltouni, Z; Akar, S; Albrecht, J; Alessio, F; Alexander, M; Alfonso Albero, A; Ali, S; Alkhazov, G; Alvarez Cartelle, P; Alves, A A; Amato, S; Amerio, S; Amhis, Y; An, L; Anderlini, L; Andreassi, G; Andreotti, M; Andrews, J E; Appleby, R B; Archilli, F; d'Argent, P; Arnau Romeu, J; Artamonov, A; Artuso, M; Aslanides, E; Auriemma, G; Baalouch, M; Babuschkin, I; Bachmann, S; Back, J J; Badalov, A; Baesso, C; Baker, S; Balagura, V; Baldini, W; Baranov, A; Barlow, R J; Barschel, C; Barsuk, S; Barter, W; Baryshnikov, F; Batozskaya, V; Battista, V; Bay, A; Beaucourt, L; Beddow, J; Bedeschi, F; Bediaga, I; Beiter, A; Bel, L J; Beliy, N; Bellee, V; Belloli, N; Belous, K; Belyaev, I; Ben-Haim, E; Bencivenni, G; Benson, S; Beranek, S; Berezhnoy, A; Bernet, R; Berninghoff, D; Bertholet, E; Bertolin, A; Betancourt, C; Betti, F; Bettler, M-O; van Beuzekom, M; Bezshyiko, Ia; Bifani, S; Billoir, P; Birnkraut, A; Bitadze, A; Bizzeti, A; Bjørn, M; Blake, T; Blanc, F; Blouw, J; Blusk, S; Bocci, V; Boettcher, T; Bondar, A; Bondar, N; Bonivento, W; Bordyuzhin, I; Borgheresi, A; Borghi, S; Borisyak, M; Borsato, M; Bossu, F; Boubdir, M; Bowcock, T J V; Bowen, E; Bozzi, C; Braun, S; Britton, T; Brodzicka, J; Brundu, D; Buchanan, E; Burr, C; Bursche, A; Buytaert, J; Byczynski, W; Cadeddu, S; Cai, H; Calabrese, R; Calladine, R; Calvi, M; Calvo Gomez, M; Camboni, A; Campana, P; Campora Perez, D H; Capriotti, L; Carbone, A; Carboni, G; Cardinale, R; Cardini, A; Carniti, P; Carson, L; Carvalho Akiba, K; Casse, G; Cassina, L; Castillo Garcia, L; Cattaneo, M; Cavallero, G; Cenci, R; Chamont, D; Charles, M; Charpentier, Ph; Chatzikonstantinidis, G; Chefdeville, M; Chen, S; Cheung, S F; Chitic, S-G; Chobanova, V; Chrzaszcz, M; Chubykin, A; Ciambrone, P; Cid Vidal, X; Ciezarek, G; Clarke, P E L; Clemencic, M; Cliff, H V; Closier, J; Cogan, J; Cogneras, E; Cogoni, V; Cojocariu, L; Collins, P; Colombo, T; Comerma-Montells, A; Contu, A; Cook, A; Coombs, G; Coquereau, S; Corti, G; Corvo, M; Costa Sobral, C M; Couturier, B; Cowan, G A; Craik, D C; Crocombe, A; Cruz Torres, M; Currie, R; D'Ambrosio, C; Da Cunha Marinho, F; Dall'Occo, E; Dalseno, J; Davis, A; De Aguiar Francisco, O; De Capua, S; De Cian, M; De Miranda, J M; De Paula, L; De Serio, M; De Simone, P; Dean, C T; Decamp, D; Del Buono, L; Dembinski, H-P; Demmer, M; Dendek, A; Derkach, D; Deschamps, O; Dettori, F; Dey, B; Di Canto, A; Di Nezza, P; Dijkstra, H; Dordei, F; Dorigo, M; Dosil Suárez, A; Douglas, L; Dovbnya, A; Dreimanis, K; Dufour, L; Dujany, G; Durante, P; Dzhelyadin, R; Dziewiecki, M; Dziurda, A; Dzyuba, A; Easo, S; Ebert, M; Egede, U; Egorychev, V; Eidelman, S; Eisenhardt, S; Eitschberger, U; Ekelhof, R; Eklund, L; Ely, S; Esen, S; Evans, H M; Evans, T; Falabella, A; Farley, N; Farry, S; Fazzini, D; Federici, L; Ferguson, D; Fernandez, G; Fernandez Declara, P; Fernandez Prieto, A; Ferrari, F; Ferreira Rodrigues, F; Ferro-Luzzi, M; Filippov, S; Fini, R A; Fiore, M; Fiorini, M; Firlej, M; Fitzpatrick, C; Fiutowski, T; Fleuret, F; Fohl, K; Fontana, M; Fontanelli, F; Forshaw, D C; Forty, R; Franco Lima, V; Frank, M; Frei, C; Fu, J; Funk, W; Furfaro, E; Färber, C; Gabriel, E; Gallas Torreira, A; Galli, D; Gallorini, S; Gambetta, S; Gandelman, M; Gandini, P; Gao, Y; Garcia Martin, L M; García Pardiñas, J; Garra Tico, J; Garrido, L; Garsed, P J; Gascon, D; Gaspar, C; Gavardi, L; Gazzoni, G; Gerick, D; Gersabeck, E; Gersabeck, M; Gershon, T; Ghez, Ph; Gianì, S; Gibson, V; Girard, O G; Giubega, L; Gizdov, K; Gligorov, V V; Golubkov, D; Golutvin, A; Gomes, A; Gorelov, I V; Gotti, C; Govorkova, E; Grabowski, J P; Graciani Diaz, R; Granado Cardoso, L A; Graugés, E; Graverini, E; Graziani, G; Grecu, A; Greim, R; Griffith, P; Grillo, L; Gruber, L; Gruberg Cazon, B R; Grünberg, O; Gushchin, E; Guz, Yu; Gys, T; Göbel, C; Hadavizadeh, T; Hadjivasiliou, C; Haefeli, G; Haen, C; Haines, S C; Hamilton, B; Han, X; Hancock, T H; Hansmann-Menzemer, S; Harnew, N; Harnew, S T; Harrison, J; Hasse, C; Hatch, M; He, J; Hecker, M; Heinicke, K; Heister, A; Hennessy, K; Henrard, P; Henry, L; van Herwijnen, E; Heß, M; Hicheur, A; Hill, D; Hombach, C; Hopchev, P H; Huard, Z C; Hulsbergen, W; Humair, T; Hushchyn, M; Hutchcroft, D; Ibis, P; Idzik, M; Ilten, P; Jacobsson, R; Jalocha, J; Jans, E; Jawahery, A; Jiang, F; John, M; Johnson, D; Jones, C R; Joram, C; Jost, B; Jurik, N; Kandybei, S; Karacson, M; Kariuki, J M; Karodia, S; Kazeev, N; Kecke, M; Kelsey, M; Kenzie, M; Ketel, T; Khairullin, E; Khanji, B; Khurewathanakul, C; Kirn, T; Klaver, S; Klimaszewski, K; Klimkovich, T; Koliiev, S; Kolpin, M; Komarov, I; Kopecna, R; Koppenburg, P; Kosmyntseva, A; Kotriakhova, S; Kozeiha, M; Kravchuk, L; Kreps, M; Krokovny, P; Kruse, F; Krzemien, W; Kucewicz, W; Kucharczyk, M; Kudryavtsev, V; Kuonen, A K; Kurek, K; Kvaratskheliya, T; Lacarrere, D; Lafferty, G; Lai, A; Lanfranchi, G; Langenbruch, C; Latham, T; Lazzeroni, C; Le Gac, R; Leflat, A; Lefrançois, J; Lefèvre, R; Lemaitre, F; Lemos Cid, E; Leroy, O; Lesiak, T; Leverington, B; Li, P-R; Li, T; Li, Y; Li, Z; Likhomanenko, T; Lindner, R; Lionetto, F; Lisovskyi, V; Liu, X; Loh, D; Loi, A; Longstaff, I; Lopes, J H; Lucchesi, D; Lucio Martinez, M; Luo, H; Lupato, A; Luppi, E; Lupton, O; Lusiani, A; Lyu, X; Machefert, F; Maciuc, F; Macko, V; Mackowiak, P; Maddrell-Mander, S; Maev, O; Maguire, K; Maisuzenko, D; Majewski, M W; Malde, S; Malinin, A; Maltsev, T; Manca, G; Mancinelli, G; Manning, P; Marangotto, D; Maratas, J; Marchand, J F; Marconi, U; Marin Benito, C; Marinangeli, M; Marino, P; Marks, J; Martellotti, G; Martin, M; Martinelli, M; Martinez Santos, D; Martinez Vidal, F; Martins Tostes, D; Massacrier, L M; Massafferri, A; Matev, R; Mathad, A; Mathe, Z; Matteuzzi, C; Mauri, A; Maurice, E; Maurin, B; Mazurov, A; McCann, M; McNab, A; McNulty, R; Mead, J V; Meadows, B; Meaux, C; Meier, F; Meinert, N; Melnychuk, D; Merk, M; Merli, A; Michielin, E; Milanes, D A; Millard, E; Minard, M-N; Minzoni, L; Mitzel, D S; Mogini, A; Molina Rodriguez, J; Mombacher, T; Monroy, I A; Monteil, S; Morandin, M; Morello, M J; Morgunova, O; Moron, J; Morris, A B; Mountain, R; Muheim, F; Mulder, M; Müller, D; Müller, J; Müller, K; Müller, V; Naik, P; Nakada, T; Nandakumar, R; Nandi, A; Nasteva, I; Needham, M; Neri, N; Neubert, S; Neufeld, N; Neuner, M; Nguyen, T D; Nguyen-Mau, C; Nieswand, S; Niet, R; Nikitin, N; Nikodem, T; Nogay, A; O'Hanlon, D P; Oblakowska-Mucha, A; Obraztsov, V; Ogilvy, S; Oldeman, R; Onderwater, C J G; Ossowska, A; Otalora Goicochea, J M; Owen, P; Oyanguren, A; Pais, P R; Palano, A; Palutan, M; Papanestis, A; Pappagallo, M; Pappalardo, L L; Parker, W; Parkes, C; Passaleva, G; Pastore, A; Patel, M; Patrignani, C; Pearce, A; Pellegrino, A; Penso, G; Pepe Altarelli, M; Perazzini, S; Perret, P; Pescatore, L; Petridis, K; Petrolini, A; Petrov, A; Petruzzo, M; Picatoste Olloqui, E; Pietrzyk, B; Pikies, M; Pinci, D; Pistone, A; Piucci, A; Placinta, V; Playfer, S; Plo Casasus, M; Polci, F; Poli Lener, M; Poluektov, A; Polyakov, I; Polycarpo, E; Pomery, G J; Ponce, S; Popov, A; Popov, D; Poslavskii, S; Potterat, C; Price, E; Prisciandaro, J; Prouve, C; Pugatch, V; Puig Navarro, A; Pullen, H; Punzi, G; Qian, W; Quagliani, R; Quintana, B; Rachwal, B; Rademacker, J H; Rama, M; Ramos Pernas, M; Rangel, M S; Raniuk, I; Ratnikov, F; Raven, G; Ravonel Salzgeber, M; Reboud, M; Redi, F; Reichert, S; Dos Reis, A C; Remon Alepuz, C; Renaudin, V; Ricciardi, S; Richards, S; Rihl, M; Rinnert, K; Rives Molina, V; Robbe, P; Robert, A; Rodrigues, A B; Rodrigues, E; Rodriguez Lopez, J A; Rodriguez Perez, P; Rogozhnikov, A; Roiser, S; Rollings, A; Romanovskiy, V; Romero Vidal, A; Ronayne, J W; Rotondo, M; Rudolph, M S; Ruf, T; Ruiz Valls, P; Ruiz Vidal, J; Saborido Silva, J J; Sadykhov, E; Sagidova, N; Saitta, B; Salustino Guimaraes, V; Sanchez Mayordomo, C; Sanmartin Sedes, B; Santacesaria, R; Santamarina Rios, C; Santimaria, M; Santovetti, E; Sarpis, G; Sarti, A; Satriano, C; Satta, A; Saunders, D M; Savrina, D; Schael, S; Schellenberg, M; Schiller, M; Schindler, H; Schlupp, M; Schmelling, M; Schmelzer, T; Schmidt, B; Schneider, O; Schopper, A; Schreiner, H F; Schubert, K; Schubiger, M; Schune, M-H; Schwemmer, R; Sciascia, B; Sciubba, A; Semennikov, A; Sepulveda, E S; Sergi, A; Serra, N; Serrano, J; Sestini, L; Seyfert, P; Shapkin, M; Shapoval, I; Shcheglov, Y; Shears, T; Shekhtman, L; Shevchenko, V; Siddi, B G; Silva Coutinho, R; Silva de Oliveira, L; Simi, G; Simone, S; Sirendi, M; Skidmore, N; Skwarnicki, T; Smith, E; Smith, I T; Smith, J; Smith, M; Soares Lavra, L; Sokoloff, M D; Soler, F J P; Souza De Paula, B; Spaan, B; Spradlin, P; Sridharan, S; Stagni, F; Stahl, M; Stahl, S; Stefko, P; Stefkova, S; Steinkamp, O; Stemmle, S; Stenyakin, O; Stepanova, M; Stevens, H; Stone, S; Storaci, B; Stracka, S; Stramaglia, M E; Straticiuc, M; Straumann, U; Sun, J; Sun, L; Sutcliffe, W; Swientek, K; Syropoulos, V; Szczekowski, M; Szumlak, T; Szymanski, M; T'Jampens, S; Tayduganov, A; Tekampe, T; Tellarini, G; Teubert, F; Thomas, E; van Tilburg, J; Tilley, M J; Tisserand, V; Tobin, M; Tolk, S; Tomassetti, L; Tonelli, D; Toriello, F; Tourinho Jadallah Aoude, R; Tournefier, E; Traill, M; Tran, M T; Tresch, M; Trisovic, A; Tsaregorodtsev, A; Tsopelas, P; Tully, A; Tuning, N; Ukleja, A; Usachov, A; Ustyuzhanin, A; Uwer, U; Vacca, C; Vagner, A; Vagnoni, V; Valassi, A; Valat, S; Valenti, G; Vazquez Gomez, R; Vazquez Regueiro, P; Vecchi, S; van Veghel, M; Velthuis, J J; Veltri, M; Veneziano, G; Venkateswaran, A; Verlage, T A; Vernet, M; Vesterinen, M; Viana Barbosa, J V; Viaud, B; Vieira, D; Vieites Diaz, M; Viemann, H; Vilasis-Cardona, X; Vitti, M; Volkov, V; Vollhardt, A; Voneki, B; Vorobyev, A; Vorobyev, V; Voß, C; de Vries, J A; Vázquez Sierra, C; Waldi, R; Wallace, C; Wallace, R; Walsh, J; Wang, J; Ward, D R; Wark, H M; Watson, N K; Websdale, D; Weiden, A; Whitehead, M; Wicht, J; Wilkinson, G; Wilkinson, M; Williams, M; Williams, M P; Williams, M; Williams, T; Wilson, F F; Wimberley, J; Winn, M; Wishahi, J; Wislicki, W; Witek, M; Wormser, G; Wotton, S A; Wraight, K; Wyllie, K; Xie, Y; Xu, Z; Yang, Z; Yang, Z; Yao, Y; Yin, H; Yu, J; Yuan, X; Yushchenko, O; Zarebski, K A; Zavertyaev, M; Zhang, L; Zhang, Y; Zhelezov, A; Zheng, Y; Zhu, X; Zhukov, V; Zonneveld, J B; Zucchelli, S

    2017-11-03

    A search for baryon-number violating Ξ_{b}^{0} oscillations is performed with a sample of pp collision data recorded by the LHCb experiment, corresponding to an integrated luminosity of 3  fb^{-1}. The baryon number at the moment of production is identified by requiring that the Ξ_{b}^{0} come from the decay of a resonance Ξ_{b}^{*-}→Ξ_{b}^{0}π^{-} or Ξ_{b}^{'-}→Ξ_{b}^{0}π^{-}, and the baryon number at the moment of decay is identified from the final state using the decays Ξ_{b}^{0}→Ξ_{c}^{+}π^{-},Ξ_{c}^{+}→pK^{-}π^{+}. No evidence of baryon-number violation is found, and an upper limit at the 95% confidence level is set on the oscillation rate of ω<0.08  ps^{-1}, where ω is the associated angular frequency.

  20. Age-Related Changes in Cognitive Processing of Moral and Social Conventional Violations

    ERIC Educational Resources Information Center

    Lahat, Ayelet; Helwig, Charles C.; Zelazo, Philip David

    2012-01-01

    Moral and conventional violations are usually judged differently: Only moral violations are treated as independent of social rules. To investigate the cognitive processing involved in the development of this distinction, undergraduates (N = 34), adolescents (N = 34), and children (N = 14) read scenarios presented on a computer that had 1 of 3…

  1. Education and Violation: Conceptualizing Power, Domination, and Agency in the Hidden Curriculum

    ERIC Educational Resources Information Center

    De Lissovoy, Noah

    2012-01-01

    This article offers a theory of a process of "violation" that connects macropolitical effects to the intimate terrain of subject production. I describe power, as violation, in terms of a simultaneous process of construction and destruction, which seeks its satisfaction in an injury to the very identities it is complicit in producing. Starting from…

  2. Modifying Open-Campus Lunch Policy to Reduce Discipline Violations: An Action Research Study

    ERIC Educational Resources Information Center

    Wilkes, James S., III

    2016-01-01

    An intervention was implemented to address the high number of discipline violations due to an unconditional open-campus lunch policy at a senior high school. The intent of the intervention was to statistically measure discipline violations among voluntary participants and to determine whether or not a significant change occurred. The research…

  3. Marketing of breast-milk substitutes in Zambia: evaluation of compliance to the international regulatory code.

    PubMed

    Funduluka, P; Bosomprah, S; Chilengi, R; Mugode, R H; Bwembya, P A; Mudenda, B

    2018-03-01

    We sought to assess the level of non-compliance with the International Code of Marketing breast-milk substitutes (BMS) and/or Statutory Instrument (SI) Number 48 of 2006 of the Laws of Zambia in two suburbs, Kalingalinga and Chelstone, in Zambia. This was a cross sectional survey. Shop owners (80), health workers (8) and mothers (214) were interviewed. BMS labels and advertisements (62) were observed. The primary outcome was mean non-compliance defined as the number of article violations divided by the total 'obtainable' violations. The score ranges from 0 to 1 with 0 representing no violations in all the articles and one representing violations in all the articles. A total of 62 BMS were assessed. The mean non-compliance score by manufacturers in terms of violations in labelling of BMS was 0.33 (SD = 0.28; 95% CI: 0.26, 0.40). These violations were mainly due to labels containing pictures or graphics representing an infant. 80 shops were also assessed with mean non-compliance score in respect of violations in tie-in-sales, special display, and contact with mothers at the shop estimated as 0.14 (SD = 0.14; 95% CI: 0.11, 0.18). Non-compliance with the Code and/or the local SI is high after 10 years of domesticating the Code.

  4. 77 FR 33753 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection, DHS/CBP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-07

    ... users in the field in preventing the illegal entry of people and goods, or identifying other violations....g., Employer Identification Number (EIN) or Social Security Number (SSN), where available). f... entry of people and goods, or identifying other violations of law; (2) Allow analysts to conduct...

  5. High sensitivity tests of the standard model for electroweak interactions. [Lepton-family-number-violating decay; Michel [rho] parameter

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Koetke, D.D.; Manweiler, R.W.; Shirvel Stanislaus, T.D.

    1993-01-01

    The work done on this project was focused on two LAMPF experiments. The MEGA experiment, a high-sensitivity search for the lepton-family-number-violating decay [mu] [yields] e [gamma] to a sensitivity which, measured in terms of the branching ratio, BR = [[mu] [yields] e [gamma

  6. Effect of a Manager Training and Certification Program on Food Safety and Hygiene in Food Service Operations

    PubMed Central

    Kassa, Hailu; Silverman, Gary S.; Baroudi, Karim

    2010-01-01

    Food safety is an important public health issue in the U.S. Eating at restaurants and other food service facilities increasingly has been associated with food borne disease outbreaks. Food safety training and certification of food mangers has been used as a method for reducing food safety violations at food service facilities. However, the literature is inconclusive about the effectiveness of such training programs for improving food safety and protecting consumer health. The purpose of this study was to examine the effect of food manger training on reducing food safety violations. We examined food inspection reports from the Toledo/Lucas County Health Department (Ohio) from March 2005 through February 2006 and compared food hygiene violations between food service facilities with certified and without certified food managers. We also examined the impact on food safety of a food service facility being part of a larger group of facilities. Restaurants with trained and certified food managers had significantly fewer critical food safety violations but more non-critical violations than restaurants without certified personnel. Institutional food service facilities had significantly fewer violations than restaurants, and the number of violations did not differ as a function of certification. Similarly, restaurants with many outlets had significantly fewer violations than restaurants with fewer outlets, and training was not associated with lower numbers of violations from restaurants with many outlets. The value of having certified personnel was only observed in independent restaurants and those with few branches. This information may be useful in indicating where food safety problems are most likely to occur. Furthermore, we recommend that those characteristics of institutional and chain restaurants that result in fewer violations should be identified in future research, and efforts made to apply this knowledge at the level of individual restaurants. PMID:20523880

  7. Effect of a manager training and certification program on food safety and hygiene in food service operations.

    PubMed

    Kassa, Hailu; Silverman, Gary S; Baroudi, Karim

    2010-05-06

    Food safety is an important public health issue in the U.S. Eating at restaurants and other food service facilities increasingly has been associated with food borne disease outbreaks. Food safety training and certification of food mangers has been used as a method for reducing food safety violations at food service facilities. However, the literature is inconclusive about the effectiveness of such training programs for improving food safety and protecting consumer health. The purpose of this study was to examine the effect of food manger training on reducing food safety violations. We examined food inspection reports from the Toledo/Lucas County Health Department (Ohio) from March 2005 through February 2006 and compared food hygiene violations between food service facilities with certified and without certified food managers. We also examined the impact on food safety of a food service facility being part of a larger group of facilities.Restaurants with trained and certified food managers had significantly fewer critical food safety violations but more non-critical violations than restaurants without certified personnel. Institutional food service facilities had significantly fewer violations than restaurants, and the number of violations did not differ as a function of certification. Similarly, restaurants with many outlets had significantly fewer violations than restaurants with fewer outlets, and training was not associated with lower numbers of violations from restaurants with many outlets. The value of having certified personnel was only observed in independent restaurants and those with few branches. This information may be useful in indicating where food safety problems are most likely to occur. Furthermore, we recommend that those characteristics of institutional and chain restaurants that result in fewer violations should be identified in future research, and efforts made to apply this knowledge at the level of individual restaurants.

  8. Modeling Psychological Contract Violation using Dual Regime Models: An Event-based Approach

    PubMed Central

    Hofmans, Joeri

    2017-01-01

    A good understanding of the dynamics of psychological contract violation requires theories, research methods and statistical models that explicitly recognize that violation feelings follow from an event that violates one's acceptance limits, after which interpretative processes are set into motion, determining the intensity of these violation feelings. Whereas theories—in the form of the dynamic model of the psychological contract—and research methods—in the form of daily diary research and experience sampling research—are available by now, the statistical tools to model such a two-stage process are still lacking. The aim of the present paper is to fill this gap in the literature by introducing two statistical models—the Zero-Inflated model and the Hurdle model—that closely mimic the theoretical process underlying the elicitation violation feelings via two model components: a binary distribution that models whether violation has occurred or not, and a count distribution that models how severe the negative impact is. Moreover, covariates can be included for both model components separately, which yields insight into their unique and shared antecedents. By doing this, the present paper offers a methodological-substantive synergy, showing how sophisticated methodology can be used to examine an important substantive issue. PMID:29163316

  9. Modeling Psychological Contract Violation using Dual Regime Models: An Event-based Approach.

    PubMed

    Hofmans, Joeri

    2017-01-01

    A good understanding of the dynamics of psychological contract violation requires theories, research methods and statistical models that explicitly recognize that violation feelings follow from an event that violates one's acceptance limits, after which interpretative processes are set into motion, determining the intensity of these violation feelings. Whereas theories-in the form of the dynamic model of the psychological contract-and research methods-in the form of daily diary research and experience sampling research-are available by now, the statistical tools to model such a two-stage process are still lacking. The aim of the present paper is to fill this gap in the literature by introducing two statistical models-the Zero-Inflated model and the Hurdle model-that closely mimic the theoretical process underlying the elicitation violation feelings via two model components: a binary distribution that models whether violation has occurred or not, and a count distribution that models how severe the negative impact is. Moreover, covariates can be included for both model components separately, which yields insight into their unique and shared antecedents. By doing this, the present paper offers a methodological-substantive synergy, showing how sophisticated methodology can be used to examine an important substantive issue.

  10. Charged pions tagged with polarized photons probing strong C P violation in a chiral-imbalance medium

    NASA Astrophysics Data System (ADS)

    Kawaguchi, Mamiya; Harada, Masayasu; Matsuzaki, Shinya; Ouyang, Ruiwen

    2017-06-01

    It is expected that in a hot QCD system, a local parity-odd domain can be produced due to nonzero chirality, which is induced from the difference of winding numbers carried by the gluon topological configuration (QCD sphaleron). This local domain is called the chiral-imbalance medium, characterized by nonzero chiral chemical potential, which can be interpreted as the time variation of the strong C P phase. We find that the chiral chemical potential generates the parity breaking term in the electromagnetic form factor of charged pions. Heavy ion collision experiments could observe the phenomenological consequence of this parity-odd form factor through the elastic scattering of a pion and a photon in the medium. Then we quantify the asymmetry rate of the parity violation by measuring the polarization of the photon associated with the pion, and discuss how it could be measured in a definite laboratory frame. We roughly estimate the typical size of the asymmetry, just by picking up the pion resonant process, and find that the signal can be sufficiently larger than possible background events from parity-breaking electroweak process. Our findings might provide a novel possibility to make a manifest detection for the remnant of the strong C P violation.

  11. Experimental Non-Violation of the Bell Inequality

    NASA Astrophysics Data System (ADS)

    Palmer, Tim

    2018-05-01

    A finite non-classical framework for physical theory is described which challenges the conclusion that the Bell Inequality has been shown to have been violated experimentally, even approximately. This framework postulates the universe as a deterministic locally causal system evolving on a measure-zero fractal-like geometry $I_U$ in cosmological state space. Consistent with the assumed primacy of $I_U$, and $p$-adic number theory, a non-Euclidean (and hence non-classical) metric $g_p$ is defined on cosmological state space, where $p$ is a large but finite Pythagorean prime. Using number-theoretic properties of spherical triangles, the inequalities violated experimentally are shown to be $g_p$-distant from the CHSH inequality, whose violation would rule out local realism. This result fails in the singular limit $p=\\infty$, at which $g_p$ is Euclidean. Broader implications are discussed.

  12. Search for the lepton-number-violating decay Xi(-)-->pmu(-)mu(-).

    PubMed

    Rajaram, D; Burnstein, R A; Chakravorty, A; Chan, A; Chen, Y C; Choong, W S; Clark, K; Dukes, E C; Durandet, C; Felix, J; Gidal, G; Gu, P; Gustafson, H R; Ho, C; Holmstrom, T; Huang, M; James, C; Jenkins, C M; Kaplan, D M; Lederman, L M; Leros, N; Longo, M J; Lopez, F; Lu, L C; Luebke, W; Luk, K B; Nelson, K S; Park, H K; Perroud, J-P; Rubin, H A; Teng, P K; Volk, J; White, C G; White, S L; Zyla, P

    2005-05-13

    A sensitive search for the lepton-number-violating decay Xi(-)-->pmu(-)mu(-) has been performed using a sample of approximately 10(9) Xi(-) hyperons produced in 800 GeV/c p-Cu collisions. We obtain B(Xi(-)-->pmu(-)mu(-))<4.0x10(-8) at 90% confidence, improving on the best previous limit by 4 orders of magnitude.

  13. Notice of Violation of IEEE Publication PrinciplesJoint Redundant Residue Number Systems and Module Isolation for Mitigating Single Event Multiple Bit Upsets in Datapath

    NASA Astrophysics Data System (ADS)

    Li, Lei; Hu, Jianhao

    2010-12-01

    Notice of Violation of IEEE Publication Principles"Joint Redundant Residue Number Systems and Module Isolation for Mitigating Single Event Multiple Bit Upsets in Datapath"by Lei Li and Jianhao Hu,in the IEEE Transactions on Nuclear Science, vol.57, no.6, Dec. 2010, pp. 3779-3786After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.This paper contains substantial duplication of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:"Multiple Error Detection and Correction Based on Redundant Residue Number Systems"by Vik Tor Goh and M.U. Siddiqi,in the IEEE Transactions on Communications, vol.56, no.3, March 2008, pp.325-330"A Coding Theory Approach to Error Control in Redundant Residue Number Systems. I: Theory and Single Error Correction"by H. Krishna, K-Y. Lin, and J-D. Sun, in the IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol.39, no.1, Jan 1992, pp.8-17In this paper, we propose a joint scheme which combines redundant residue number systems (RRNS) with module isolation (MI) for mitigating single event multiple bit upsets (SEMBUs) in datapath. The proposed hardening scheme employs redundant residues to improve the fault tolerance for datapath and module spacings to guarantee that SEMBUs caused by charge sharing do not propagate among the operation channels of different moduli. The features of RRNS, such as independence, parallel and error correction, are exploited to establish the radiation hardening architecture for the datapath in radiation environments. In the proposed scheme, all of the residues can be processed independently, and most of the soft errors in datapath can be corrected with the redundant relationship of the residues at correction module, which is allocated at the end of the datapath. In the back-end implementation, module isolation technique is used to improve the soft error rate performance for RRNS by physically separating the operation channels of different moduli. The case studies show at least an order of magnitude decrease on the soft error rate (SER) as compared to the NonRHBD designs, and demonstrate that RRNS+MI can reduce the SER from 10-12 to 10-17 when the processing steps of datapath are 106. The proposed scheme can even achieve less area and latency overheads than that without radiation hardening, since RRNS can reduce the operational complexity in datapath.

  14. Economic irrationality is optimal during noisy decision making

    PubMed Central

    Moreland, James; Chater, Nick; Usher, Marius; Summerfield, Christopher

    2016-01-01

    According to normative theories, reward-maximizing agents should have consistent preferences. Thus, when faced with alternatives A, B, and C, an individual preferring A to B and B to C should prefer A to C. However, it has been widely argued that humans can incur losses by violating this axiom of transitivity, despite strong evolutionary pressure for reward-maximizing choices. Here, adopting a biologically plausible computational framework, we show that intransitive (and thus economically irrational) choices paradoxically improve accuracy (and subsequent economic rewards) when decision formation is corrupted by internal neural noise. Over three experiments, we show that humans accumulate evidence over time using a “selective integration” policy that discards information about alternatives with momentarily lower value. This policy predicts violations of the axiom of transitivity when three equally valued alternatives differ circularly in their number of winning samples. We confirm this prediction in a fourth experiment reporting significant violations of weak stochastic transitivity in human observers. Crucially, we show that relying on selective integration protects choices against “late” noise that otherwise corrupts decision formation beyond the sensory stage. Indeed, we report that individuals with higher late noise relied more strongly on selective integration. These findings suggest that violations of rational choice theory reflect adaptive computations that have evolved in response to irreducible noise during neural information processing. PMID:26929353

  15. Economic irrationality is optimal during noisy decision making.

    PubMed

    Tsetsos, Konstantinos; Moran, Rani; Moreland, James; Chater, Nick; Usher, Marius; Summerfield, Christopher

    2016-03-15

    According to normative theories, reward-maximizing agents should have consistent preferences. Thus, when faced with alternatives A, B, and C, an individual preferring A to B and B to C should prefer A to C. However, it has been widely argued that humans can incur losses by violating this axiom of transitivity, despite strong evolutionary pressure for reward-maximizing choices. Here, adopting a biologically plausible computational framework, we show that intransitive (and thus economically irrational) choices paradoxically improve accuracy (and subsequent economic rewards) when decision formation is corrupted by internal neural noise. Over three experiments, we show that humans accumulate evidence over time using a "selective integration" policy that discards information about alternatives with momentarily lower value. This policy predicts violations of the axiom of transitivity when three equally valued alternatives differ circularly in their number of winning samples. We confirm this prediction in a fourth experiment reporting significant violations of weak stochastic transitivity in human observers. Crucially, we show that relying on selective integration protects choices against "late" noise that otherwise corrupts decision formation beyond the sensory stage. Indeed, we report that individuals with higher late noise relied more strongly on selective integration. These findings suggest that violations of rational choice theory reflect adaptive computations that have evolved in response to irreducible noise during neural information processing.

  16. Fundamental Neutron Physics: Theory and Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gudkov, Vladimir

    The goal of the proposal was to study the possibility of searching for manifestations of new physics beyond the Standard model in fundamental neutron physics experiments. This involves detailed theoretical analyses of parity- and time reversal invariance-violating processes in neutron-induced reactions, properties of neutron β-decay, and the precise description of properties of neutron interactions with nuclei. To describe neutron-nuclear interactions, we use both the effective field theory approach and the theory of nuclear reaction with phenomenological nucleon potentials for the systematic description of parity- and time reversal-violating effects in the consistent way. A major emphasis of our research during themore » funding period has been the study of parity violation (PV) and time reversal invariance violation (TRIV) in few-body systems. We studied PV effects in non-elastic processes in three-nucleon system using both ”DDH-like” and effective field theory (EFT) approaches. The wave functions were obtained by solving three-body Faddeev equations in configuration space for a number of realistic strong potentials. The observed model dependence for the DDH approach indicates intrinsic difficulty in the description of nuclear PV effects, and it could be the reason for the observed discrepancies in the nuclear PV data analysis. It shows that the DDH approach could be a reasonable approach for analysis of PV effects only if exactly the same strong and weak potentials are used in calculating all PV observables in all nuclei. However, the existing calculations of nuclear PV effects were performed using different potentials; therefore, strictly speaking, one cannot compare the existing results of these calculations among themselves.« less

  17. Violated Wishes About Division of Childcare Labor Predict Early Coparenting Process During Stressful and Nonstressful Family Evaluations.

    PubMed

    Khazan, Inna; McHale, James P; Decourcey, Wendy

    2008-01-01

    Prior research has indicated that expectant parents overestimate the extent to which fathers will take part in the "work" of parenting, with mothers often becoming disenchanted when these expectations are violated following the baby's arrival. In this study, we examine the role of violated wishes concerning childcare involvement in accounting for variability in maternal and paternal marital satisfaction, and in early coparenting behavior as assessed during family-interaction sessions. The results indicate possible negative effects of violated wishes on the enacted family process and confirm previous findings regarding the effects of marital satisfaction. In addition, we uncovered differences in the way that violated maternal wishes are related to coparenting during playful and mildly stressful family interactions.

  18. 48 CFR 203.806 - Processing suspected violations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... violations. 203.806 Section 203.806 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST.... Report suspected violations to the address at PGI 203.8(a). ...

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vongehr, Sascha, E-mail: vongehr@usc.edu

    There are increasingly suggestions for computer simulations of quantum statistics which try to violate Bell type inequalities via classical, common cause correlations. The Clauser–Horne–Shimony–Holt (CHSH) inequality is very robust. However, we argue that with the Einstein–Podolsky–Rosen setup, the CHSH is inferior to the Bell inequality, although and because the latter must assume anti-correlation of entangled photon singlet states. We simulate how often quantum behavior violates both inequalities, depending on the number of photons. Violating Bell 99% of the time is argued to be an ideal benchmark. We present hidden variables that violate the Bell and CHSH inequalities with 50% probability,more » and ones which violate Bell 85% of the time when missing 13% anti-correlation. We discuss how to present the quantum correlations to a wide audience and conclude that, when defending against claims of hidden classicality, one should demand numerical simulations and insist on anti-correlation and the full amount of Bell violation. -- Highlights: •The widely assumed superiority of the CHSH fails in the EPR problem. •We simulate Bell type inequalities behavior depending on the number of photons. •The core of Bell’s theorem in the EPR setup is introduced in a simple way understandable to a wide audience. •We present hidden variables that violate both inequalities with 50% probability. •Algorithms have been supplied in form of Mathematica programs.« less

  20. Multipartite nonlocality and random measurements

    NASA Astrophysics Data System (ADS)

    de Rosier, Anna; Gruca, Jacek; Parisio, Fernando; Vértesi, Tamás; Laskowski, Wiesław

    2017-07-01

    We present an exhaustive numerical analysis of violations of local realism by families of multipartite quantum states. As an indicator of nonclassicality we employ the probability of violation for randomly sampled observables. Surprisingly, it rapidly increases with the number of parties or settings and even for relatively small values local realism is violated for almost all observables. We have observed this effect to be typical in the sense that it emerged for all investigated states including some with randomly drawn coefficients. We also present the probability of violation as a witness of genuine multipartite entanglement.

  1. Violation of Bell's Inequality Using Continuous Variable Measurements

    NASA Astrophysics Data System (ADS)

    Thearle, Oliver; Janousek, Jiri; Armstrong, Seiji; Hosseini, Sara; Schünemann Mraz, Melanie; Assad, Syed; Symul, Thomas; James, Matthew R.; Huntington, Elanor; Ralph, Timothy C.; Lam, Ping Koy

    2018-01-01

    A Bell inequality is a fundamental test to rule out local hidden variable model descriptions of correlations between two physically separated systems. There have been a number of experiments in which a Bell inequality has been violated using discrete-variable systems. We demonstrate a violation of Bell's inequality using continuous variable quadrature measurements. By creating a four-mode entangled state with homodyne detection, we recorded a clear violation with a Bell value of B =2.31 ±0.02 . This opens new possibilities for using continuous variable states for device independent quantum protocols.

  2. Higher Education: Information on Incentive Compensation Violations Substantiated by the U.S. Department of Education. GAO-10-370R

    ERIC Educational Resources Information Center

    Iritani, Katherine M.

    2010-01-01

    The Higher Education Opportunity Act (HEOA) mandated that GAO conduct a study on Education's enforcement of the incentive compensation ban in light of the safe harbors and report on the number of violations substantiated by the Secretary of Education since 1998, the nature of these violations, and the names of the institutions involved. This…

  3. Single Cigarette Sales: State Differences in FDA Advertising and Labeling Violations, 2014, United States

    PubMed Central

    Lee, Joseph G. L.; Ranney, Leah M.; Goldstein, Adam O.

    2016-01-01

    Importance: Single cigarettes, which are sold without warning labels and often evade taxes, can serve as a gateway for youth smoking. The Family Smoking Prevention and Tobacco Control Act of 2009 gives the US Food and Drug Administration (FDA) authority to regulate the manufacture, distribution, and marketing of tobacco products, including prohibiting the sale of single cigarettes. To enforce these regulations, the FDA conducted over 335 661 inspections between 2010 and September 30, 2014, and allocated over $115 million toward state inspections contracts. Objective: To examine differences in single cigarette violations across states and determine if likely correlates of single cigarette sales predict single cigarette violations at the state level. Design: Cross-sectional study of publicly available FDA warning letters from January 1 to July 31, 2014. Setting: All 50 states and the District of Columbia. Participants: Tobacco retailer inspections conducted by FDA (n = 33 543). Exposure(s) for Observational Studies: State cigarette tax, youth smoking prevalence, poverty, and tobacco production. Main Outcome(s) and Measure(s): State proportion of FDA warning letters issued for single cigarette violations. Results: There are striking differences in the number of single cigarette violations found by state, with 38 states producing no warning letters for selling single cigarettes even as state policymakers developed legislation to address retailer sales of single cigarettes. The state proportion of warning letters issued for single cigarettes is not predicted by state cigarette tax, youth smoking, poverty, or tobacco production, P = .12. Conclusions and Relevance: Substantial, unexplained variation exists in violations of single cigarette sales among states. These data suggest the possibility of differences in implementation of FDA inspections and the need for stronger quality monitoring processes across states implementing FDA inspections. PMID:25744967

  4. Single Cigarette Sales: State Differences in FDA Advertising and Labeling Violations, 2014, United States.

    PubMed

    Baker, Hannah M; Lee, Joseph G L; Ranney, Leah M; Goldstein, Adam O

    2016-02-01

    Single cigarettes, which are sold without warning labels and often evade taxes, can serve as a gateway for youth smoking. The Family Smoking Prevention and Tobacco Control Act of 2009 gives the US Food and Drug Administration (FDA) authority to regulate the manufacture, distribution, and marketing of tobacco products, including prohibiting the sale of single cigarettes. To enforce these regulations, the FDA conducted over 335,661 inspections between 2010 and September 30, 2014, and allocated over $115 million toward state inspections contracts. To examine differences in single cigarette violations across states and determine if likely correlates of single cigarette sales predict single cigarette violations at the state level. Cross-sectional study of publicly available FDA warning letters from January 1 to July 31, 2014. All 50 states and the District of Columbia. Tobacco retailer inspections conducted by FDA (n = 33 543). State cigarette tax, youth smoking prevalence, poverty, and tobacco production. State proportion of FDA warning letters issued for single cigarette violations. There are striking differences in the number of single cigarette violations found by state, with 38 states producing no warning letters for selling single cigarettes even as state policymakers developed legislation to address retailer sales of single cigarettes. The state proportion of warning letters issued for single cigarettes is not predicted by state cigarette tax, youth smoking, poverty, or tobacco production, P = .12. Substantial, unexplained variation exists in violations of single cigarette sales among states. These data suggest the possibility of differences in implementation of FDA inspections and the need for stronger quality monitoring processes across states implementing FDA inspections. © The Author 2015. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  5. Effective Majorana mass matrix from tau and pseudoscalar meson lepton number violating decays

    NASA Astrophysics Data System (ADS)

    Abada, Asmaa; De Romeri, Valentina; Lucente, Michele; Teixeira, Ana M.; Toma, Takashi

    2018-02-01

    An observation of any lepton number violating process will undoubtedly point towards the existence of new physics and indirectly to the clear Majorana nature of the exchanged fermion. In this work, we explore the potential of a minimal extension of the Standard Model via heavy sterile fermions with masses in the [0.1 - 10] GeV range concerning an extensive array of "neutrinoless" meson and tau decay processes. We assume that the Majorana neutrinos are produced on-shell, and focus on three-body decays. We conduct an update on the bounds on the active-sterile mixing elements, |{U}_{ℓ }{{}{_{α}}}_4{U}_{ℓ }{{}{_{β}}}_4| , taking into account the most recent experimental bounds (and constraints) and new theoretical inputs, as well as the effects of a finite detector, imposing that the heavy neutrino decay within the detector. This allows to establish up-to-date comprehensive constraints on the sterile fermion parameter space. Our results suggest that the branching fractions of several decays are close to current sensitivities (likely within reach of future facilities), some being already in conflict with current data (as is the case of K + → ℓ α + ℓ β + π -, and τ - → μ +π-π-). We use these processes to extract constraints on all entries of an enlarged definition of a 3 × 3 "effective" Majorana neutrino mass matrix m ν αβ .

  6. Search for the Lepton-Number-Violating Decay Ξ-→pμ-μ-

    NASA Astrophysics Data System (ADS)

    Rajaram, D.; Burnstein, R. A.; Chakravorty, A.; Chan, A.; Chen, Y. C.; Choong, W. S.; Clark, K.; Dukes, E. C.; Durandet, C.; Felix, J.; Gidal, G.; Gu, P.; Gustafson, H. R.; Ho, C.; Holmstrom, T.; Huang, M.; James, C.; Jenkins, C. M.; Kaplan, D. M.; Lederman, L. M.; Leros, N.; Longo, M. J.; Lopez, F.; Lu, L. C.; Luebke, W.; Luk, K. B.; Nelson, K. S.; Park, H. K.; Perroud, J.-P.; Rubin, H. A.; Teng, P. K.; Volk, J.; White, C. G.; White, S. L.; Zyla, P.

    2005-05-01

    A sensitive search for the lepton-number-violating decay Ξ-→pμ-μ- has been performed using a sample of ˜109 Ξ- hyperons produced in 800 GeV/c p-Cu collisions. We obtain B(Ξ-→pμ-μ-)<4.0×10-8 at 90% confidence, improving on the best previous limit by 4 orders of magnitude.

  7. 42 CFR 93.515 - Actions for violating an order or for disruptive conduct.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Actions for violating an order or for disruptive... Misconduct and HHS Administrative Actions Hearing Process § 93.515 Actions for violating an order or for disruptive conduct. (a) The ALJ may take action against any party in the proceeding for violating an order or...

  8. Access control violation prevention by low-cost infrared detection

    NASA Astrophysics Data System (ADS)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this type of security breach.

  9. Violated Wishes About Division of Childcare Labor Predict Early Coparenting Process During Stressful and Nonstressful Family Evaluations

    PubMed Central

    Khazan, Inna; Mchale, James P.; Decourcey, Wendy

    2009-01-01

    Prior research has indicated that expectant parents overestimate the extent to which fathers will take part in the “work” of parenting, with mothers often becoming disenchanted when these expectations are violated following the baby’s arrival. In this study, we examine the role of violated wishes concerning childcare involvement in accounting for variability in maternal and paternal marital satisfaction, and in early coparenting behavior as assessed during family-interaction sessions. The results indicate possible negative effects of violated wishes on the enacted family process and confirm previous findings regarding the effects of marital satisfaction. In addition, we uncovered differences in the way that violated maternal wishes are related to coparenting during playful and mildly stressful family interactions. PMID:19768138

  10. Use of automated enforcement for red light violations

    DOT National Transportation Integrated Search

    1997-08-01

    The use of automated enforcement systems offers the potential to decrease the number of red light violations and improve the safety of intersections. Included in this report are an evaluation of the operating conditions where automated enforcement wa...

  11. Boundary violations and departments of psychiatry.

    PubMed

    Garfinkel, P E; Dorian, B; Sadavoy, J; Bagby, R M

    1997-09-01

    To explore a number of issues related to boundary violations in psychiatry, including the relationship between the individual physician and his or her patient and broader issues related to various dilemmas arising in academic departments of psychiatry. Several potentially troublesome scenarios are presented and discussed in the contexts of 1) the doctor-patient relationship, 2) sexual boundary violations, and 3) nonsexual forms of exploitation, such as finances, confidentiality, dual relationships, and relationships with industry. A number of examples of boundary problems involving psychiatrists have been explored, and although some of these behaviours are clearly forbidden and harmful, others are less clear and require careful consideration if the profession is to arrive at a thoughtful consensus.

  12. Effects of Type of Agreement Violation and Utterance Position on the Auditory Processing of Subject-Verb Agreement: An ERP Study

    PubMed Central

    Dube, Sithembinkosi; Kung, Carmen; Peter, Varghese; Brock, Jon; Demuth, Katherine

    2016-01-01

    Previous ERP studies have often reported two ERP components—LAN and P600—in response to subject-verb (S-V) agreement violations (e.g., the boys *runs). However, the latency, amplitude and scalp distribution of these components have been shown to vary depending on various experiment-related factors. One factor that has not received attention is the extent to which the relative perceptual salience related to either the utterance position (verbal inflection in utterance-medial vs. utterance-final contexts) or the type of agreement violation (errors of omission vs. errors of commission) may influence the auditory processing of S-V agreement. The lack of reports on these effects in ERP studies may be due to the fact that most studies have used the visual modality, which does not reveal acoustic information. To address this gap, we used ERPs to measure the brain activity of Australian English-speaking adults while they listened to sentences in which the S-V agreement differed by type of agreement violation and utterance position. We observed early negative and positive clusters (AN/P600 effects) for the overall grammaticality effect. Further analysis revealed that the mean amplitude and distribution of the P600 effect was only significant in contexts where the S-V agreement violation occurred utterance-finally, regardless of type of agreement violation. The mean amplitude and distribution of the negativity did not differ significantly across types of agreement violation and utterance position. These findings suggest that the increased perceptual salience of the violation in utterance final position (due to phrase-final lengthening) influenced how S-V agreement violations were processed during sentence comprehension. Implications for the functional interpretation of language-related ERPs and experimental design are discussed. PMID:27625617

  13. Effects of Type of Agreement Violation and Utterance Position on the Auditory Processing of Subject-Verb Agreement: An ERP Study.

    PubMed

    Dube, Sithembinkosi; Kung, Carmen; Peter, Varghese; Brock, Jon; Demuth, Katherine

    2016-01-01

    Previous ERP studies have often reported two ERP components-LAN and P600-in response to subject-verb (S-V) agreement violations (e.g., the boys (*) runs). However, the latency, amplitude and scalp distribution of these components have been shown to vary depending on various experiment-related factors. One factor that has not received attention is the extent to which the relative perceptual salience related to either the utterance position (verbal inflection in utterance-medial vs. utterance-final contexts) or the type of agreement violation (errors of omission vs. errors of commission) may influence the auditory processing of S-V agreement. The lack of reports on these effects in ERP studies may be due to the fact that most studies have used the visual modality, which does not reveal acoustic information. To address this gap, we used ERPs to measure the brain activity of Australian English-speaking adults while they listened to sentences in which the S-V agreement differed by type of agreement violation and utterance position. We observed early negative and positive clusters (AN/P600 effects) for the overall grammaticality effect. Further analysis revealed that the mean amplitude and distribution of the P600 effect was only significant in contexts where the S-V agreement violation occurred utterance-finally, regardless of type of agreement violation. The mean amplitude and distribution of the negativity did not differ significantly across types of agreement violation and utterance position. These findings suggest that the increased perceptual salience of the violation in utterance final position (due to phrase-final lengthening) influenced how S-V agreement violations were processed during sentence comprehension. Implications for the functional interpretation of language-related ERPs and experimental design are discussed.

  14. Differential electrophysiological signatures of semantic and syntactic scene processing.

    PubMed

    Võ, Melissa L-H; Wolfe, Jeremy M

    2013-09-01

    In sentence processing, semantic and syntactic violations elicit differential brain responses observable in event-related potentials: An N400 signals semantic violations, whereas a P600 marks inconsistent syntactic structure. Does the brain register similar distinctions in scene perception? To address this question, we presented participants with semantic inconsistencies, in which an object was incongruent with a scene's meaning, and syntactic inconsistencies, in which an object violated structural rules. We found a clear dissociation between semantic and syntactic processing: Semantic inconsistencies produced negative deflections in the N300-N400 time window, whereas mild syntactic inconsistencies elicited a late positivity resembling the P600 found for syntactic inconsistencies in sentence processing. Extreme syntactic violations, such as a hovering beer bottle defying gravity, were associated with earlier perceptual processing difficulties reflected in the N300 response, but failed to produce a P600 effect. We therefore conclude that different neural populations are active during semantic and syntactic processing of scenes, and that syntactically impossible object placements are processed in a categorically different manner than are syntactically resolvable object misplacements.

  15. Good, bad and ugly word stress--fMRI evidence for foot structure driven processing of prosodic violations.

    PubMed

    Domahs, Ulrike; Klein, Elise; Huber, Walter; Domahs, Frank

    2013-06-01

    Using a stress violation paradigm, we investigated whether metrical feet constrain the way prosodic patterns are processed and evaluated. Processing of correctly versus incorrectly stressed words was associated with activation in left posterior angular and retrosplenial cortex, indicating the recognition of an expected and familiar pattern, whereas the inverse contrast yielded enhanced bilateral activation in the superior temporal gyrus, reflecting higher costs in auditory (re-)analysis. More fine-grained analyses of severe versus mild stress violations revealed activations of the left superior temporal and left anterior angular gyrus whereas the opposite contrast led to frontal activations including Broca's area and its right-hemisphere homologue, suggesting that detection of mild violations lead to increased effort in working memory and deeper phonological processing. Our results provide first evidence that different incorrect stress patterns are processed in a qualitatively different way and that the underlying foot structure seems to determine potential stress positions in German words. Copyright © 2013 Elsevier Inc. All rights reserved.

  16. New observables for $CP$ violation in Higgs decays

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yi; Falkowski, Adam; Low, Ian

    Current experimental data on the 125 GeV Higgs boson still allow room for large $CP$ violation. The observables usually considered in this context are triple product asymmetries, which require an input of four visible particles after imposing momentum conservation. Here, we point out a new class of $CP$ -violating observables in Higgs physics which require only three reconstructed momenta. They may arise if the process involves an interference of amplitudes with different intermediate particles, which provide distinct “strong phases” in the form of the Breit-Wigner widths, in addition to possible “weak phases” that arise from $CP$ -violating couplings of themore » Higgs in the Lagrangian. As an example, we propose a forward-backward asymmetry of the charged lepton in the three-body Higgs decay, h → ℓ $-$ ℓ + γ , as a probe for $CP$ -violating Higgs couplings to Zγ and γγ pairs. In conclusion, we also discuss other processes exhibiting this type of $CP$ violation.« less

  17. New observables for $CP$ violation in Higgs decays

    DOE PAGES

    Chen, Yi; Falkowski, Adam; Low, Ian; ...

    2014-12-09

    Current experimental data on the 125 GeV Higgs boson still allow room for large $CP$ violation. The observables usually considered in this context are triple product asymmetries, which require an input of four visible particles after imposing momentum conservation. Here, we point out a new class of $CP$ -violating observables in Higgs physics which require only three reconstructed momenta. They may arise if the process involves an interference of amplitudes with different intermediate particles, which provide distinct “strong phases” in the form of the Breit-Wigner widths, in addition to possible “weak phases” that arise from $CP$ -violating couplings of themore » Higgs in the Lagrangian. As an example, we propose a forward-backward asymmetry of the charged lepton in the three-body Higgs decay, h → ℓ $-$ ℓ + γ , as a probe for $CP$ -violating Higgs couplings to Zγ and γγ pairs. In conclusion, we also discuss other processes exhibiting this type of $CP$ violation.« less

  18. Electroweak standard model with very special relativity

    NASA Astrophysics Data System (ADS)

    Alfaro, Jorge; González, Pablo; Ávila, Ricardo

    2015-05-01

    The very special relativity electroweak Standard Model (VSR EW SM) is a theory with SU (2 )L×U (1 )R symmetry, with the same number of leptons and gauge fields as in the usual Weinberg-Salam model. No new particles are introduced. The model is renormalizable and unitarity is preserved. However, photons obtain mass and the massive bosons obtain different masses for different polarizations. Besides, neutrino masses are generated. A VSR-invariant term will produce neutrino oscillations and new processes are allowed. In particular, we compute the rate of the decays μ →e +γ . All these processes, which are forbidden in the electroweak Standard Model, put stringent bounds on the parameters of our model and measure the violation of Lorentz invariance. We investigate the canonical quantization of this nonlocal model. Second quantization is carried out, and we obtain a well-defined particle content. Additionally, we do a counting of the degrees of freedom associated with the gauge bosons involved in this work, after spontaneous symmetry breaking has been realized. Violations of Lorentz invariance have been predicted by several theories of quantum gravity [J. Alfaro, H. Morales-Tecotl, and L. F. Urrutia, Phys. Rev. Lett. 84, 2318 (2000); Phys. Rev. D 65, 103509 (2002)]. It is a remarkable possibility that the low-energy effects of Lorentz violation induced by quantum gravity could be contained in the nonlocal terms of the VSR EW SM.

  19. 49 CFR 28.170 - Compliance procedures.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... request reconsideration by the Departmental element of the decision. The decision on the petition or... the Department; (b)(1) The Department shall process complaints alleging violations of section 504 with...) The Department shall process complaints alleging violations of section 504 with respect to...

  20. 10 CFR 820.20 - Purpose and scope.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... OF ENERGY PROCEDURAL RULES FOR DOE NUCLEAR ACTIVITIES Enforcement Process § 820.20 Purpose and scope... violations of the DOE Nuclear Safety Requirements, for determining, whether a violation has occurred, for... of a violation of: (1) Any DOE Nuclear Safety Requirement set forth in the Code of Federal...

  1. 10 CFR 820.20 - Purpose and scope.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... OF ENERGY PROCEDURAL RULES FOR DOE NUCLEAR ACTIVITIES Enforcement Process § 820.20 Purpose and scope... violations of the DOE Nuclear Safety Requirements, for determining, whether a violation has occurred, for... of a violation of: (1) Any DOE Nuclear Safety Requirement set forth in the Code of Federal...

  2. 10 CFR 820.20 - Purpose and scope.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... OF ENERGY PROCEDURAL RULES FOR DOE NUCLEAR ACTIVITIES Enforcement Process § 820.20 Purpose and scope... violations of the DOE Nuclear Safety Requirements, for determining, whether a violation has occurred, for... of a violation of: (1) Any DOE Nuclear Safety Requirement set forth in the Code of Federal...

  3. 10 CFR 820.20 - Purpose and scope.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... OF ENERGY PROCEDURAL RULES FOR DOE NUCLEAR ACTIVITIES Enforcement Process § 820.20 Purpose and scope... violations of the DOE Nuclear Safety Requirements, for determining, whether a violation has occurred, for... of a violation of: (1) Any DOE Nuclear Safety Requirement set forth in the Code of Federal...

  4. Search for the lepton flavor violating decay Z → e μ in p p collisions at s = 8 TeV with the ATLAS detector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aad, G.; Abbott, B.; Abdallah, J.

    2014-10-23

    We use the ATLAS detector at the Large Hadron Collider to search for the lepton flavor violating process Z→eμ in pp collisions using 20.3 fb -1 of data collected at √s=8 TeV. An enhancement in the eμ invariant mass spectrum is searched for at the Z-boson mass. The number of Z bosons produced in the data sample is estimated using events of similar topology, Z→ee and μμ, significantly reducing the systematic uncertainty in the measurement. In conclusion, there is no evidence of an enhancement at the Z-boson mass, resulting in an upper limit on the branching fraction, B(Z→eμ)<7.5×10 -7 atmore » the 95% confidence level.« less

  5. 32 CFR Appendix D to Part 1290 - Ticket Sample-A Nontraffic Violation

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Ticket Sample-A Nontraffic Violation D Appendix D to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S...

  6. 32 CFR Appendix D to Part 1290 - Ticket Sample-A Nontraffic Violation

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Ticket Sample-A Nontraffic Violation D Appendix D to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S...

  7. 32 CFR Appendix D to Part 1290 - Ticket Sample-A Nontraffic Violation

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Ticket Sample-A Nontraffic Violation D Appendix D to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S...

  8. 32 CFR Appendix D to Part 1290 - Ticket Sample-A Nontraffic Violation

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Ticket Sample-A Nontraffic Violation D Appendix D to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S...

  9. 32 CFR Appendix D to Part 1290 - Ticket Sample-A Nontraffic Violation

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Ticket Sample-A Nontraffic Violation D Appendix D to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S...

  10. 28 CFR 570.45 - Violation of escorted trip.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Violation of escorted trip. 570.45 Section 570.45 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE COMMUNITY PROGRAMS AND RELEASE COMMUNITY PROGRAMS Escorted Trips § 570.45 Violation of escorted trip. (a) Staff shall process as...

  11. Inspection Frequency, Sociodemographic Factors, and Food Safety Violations in Chain and Nonchain Restaurants, Philadelphia, Pennsylvania, 2013-2014

    PubMed Central

    Glanz, Karen; Keenan, Brendan T.; Branas, Charles C.

    2017-01-01

    Objectives: We explored how restaurant inspection frequency and restaurant neighborhood sociodemographic characteristics are related to food safety inspection outcomes in chain and nonchain restaurants to better understand external factors that may influence inspection outcomes. Methods: We categorized the results of restaurant inspections in Philadelphia, Pennsylvania, in 2013 and 2014 by restaurant type (chain or nonchain), inspection frequency (1, 2, or ≥3 per 2-year study period), and violation type (total number of violations, foodborne-illness risk factor violation, or good retail practice violation). We collected 2013 US Census block group sociodemographic data for each restaurant neighborhood. We used nested mixed-effects regression analyses to determine the association between restaurant inspection frequency and inspection violations, as well as between inspection violations and restaurant neighborhood sociodemographic variables, stratified by restaurant type. Results: Compared with nonchain restaurants, chain restaurants had significantly fewer total violations per inspection (mean [SD]: 6.5 [4.6] vs 9.6 [6.8] violations, P < .001). For nonchain restaurants, an increase from 1 to 2 inspections resulted in 0.8 (P < .001) fewer mean violations per inspection, and an increase from 1 to ≥3 inspections resulted in 1.6 (P < .001) fewer mean violations; this association was not seen in chain restaurants. For nonchain restaurants, a higher proportion of black residents in a restaurant neighborhood was associated with 0.6 (P < .001) fewer mean foodborne-illness risk factor violations but 1.0 (P < .001) more mean good retail practice violations per inspection. Conclusions: A risk-based stratified approach to restaurant food safety inspection frequency, based on whether or not restaurants are part of chains, could reduce the frequency of violations, particularly in restaurants with the most violations. PMID:28060568

  12. Inspection Frequency, Sociodemographic Factors, and Food Safety Violations in Chain and Nonchain Restaurants, Philadelphia, Pennsylvania, 2013-2014.

    PubMed

    Leinwand, Sarah E; Glanz, Karen; Keenan, Brendan T; Branas, Charles C

    We explored how restaurant inspection frequency and restaurant neighborhood sociodemographic characteristics are related to food safety inspection outcomes in chain and nonchain restaurants to better understand external factors that may influence inspection outcomes. We categorized the results of restaurant inspections in Philadelphia, Pennsylvania, in 2013 and 2014 by restaurant type (chain or nonchain), inspection frequency (1, 2, or ≥3 per 2-year study period), and violation type (total number of violations, foodborne-illness risk factor violation, or good retail practice violation). We collected 2013 US Census block group sociodemographic data for each restaurant neighborhood. We used nested mixed-effects regression analyses to determine the association between restaurant inspection frequency and inspection violations, as well as between inspection violations and restaurant neighborhood sociodemographic variables, stratified by restaurant type. Compared with nonchain restaurants, chain restaurants had significantly fewer total violations per inspection (mean [SD]: 6.5 [4.6] vs 9.6 [6.8] violations, P < .001). For nonchain restaurants, an increase from 1 to 2 inspections resulted in 0.8 ( P < .001) fewer mean violations per inspection, and an increase from 1 to ≥3 inspections resulted in 1.6 ( P < .001) fewer mean violations; this association was not seen in chain restaurants. For nonchain restaurants, a higher proportion of black residents in a restaurant neighborhood was associated with 0.6 ( P < .001) fewer mean foodborne-illness risk factor violations but 1.0 ( P < .001) more mean good retail practice violations per inspection. A risk-based stratified approach to restaurant food safety inspection frequency, based on whether or not restaurants are part of chains, could reduce the frequency of violations, particularly in restaurants with the most violations.

  13. Sphaleron rate in the minimal standard model.

    PubMed

    D'Onofrio, Michela; Rummukainen, Kari; Tranberg, Anders

    2014-10-03

    We use large-scale lattice simulations to compute the rate of baryon number violating processes (the sphaleron rate), the Higgs field expectation value, and the critical temperature in the standard model across the electroweak phase transition temperature. While there is no true phase transition between the high-temperature symmetric phase and the low-temperature broken phase, the crossover is sharp and located at temperature T(c) = (159.5 ± 1.5)  GeV. The sphaleron rate in the symmetric phase (T>T(c)) is Γ/T(4) = (18 ± 3)α(W)(5), and in the broken phase in the physically interesting temperature range 130 GeV < T < T(c) it can be parametrized as log(Γ/T(4)) = (0.83 ± 0.01)T/GeV-(147.7 ± 1.9). The freeze-out temperature in the early Universe, where the Hubble rate wins over the baryon number violation rate, is T* = (131.7 ± 2.3) GeV. These values, beyond being intrinsic properties of the standard model, are relevant for, e.g., low-scale leptogenesis scenarios.

  14. Multilepton collider signatures of heavy Dirac and Majorana neutrinos

    NASA Astrophysics Data System (ADS)

    Chen, Chien-Yi; Dev, P. S. Bhupal

    2012-05-01

    We discuss the possibility of observing multi-lepton signals at the Large Hadron Collider (LHC) from the production and decay of heavy standard model (SM) singlet neutrinos added in extensions of SM to explain the observed light neutrino masses by seesaw mechanism. In particular, we analyze two “smoking gun” signals depending on the Dirac or Majorana nature of the heavy neutrino: (i) for Majorana case, the same-sign di-lepton signal which can be used as a probe of lepton-number violation, and (ii) for Dirac case, the tri-lepton signal which conserves lepton number but may violate lepton flavor. Within a minimal Left-Right symmetric framework in which these additional neutrino states arise naturally, we find that in both cases, the signals can be identified with virtually no background beyond a TeV, and the heavy gauge boson WR can be discovered in this process. This analysis also provides a direct way to probe the nature of seesaw physics involving the SM singlets at TeV-scale, and in particular, to distinguish type-I seesaw with purely Majorana heavy neutrinos from inverse seesaw with pseudo-Dirac counterparts.

  15. 48 CFR 803.806 - Processing suspected violations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Processing suspected violations. 803.806 Section 803.806 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Limitation on the Payment of Funds...

  16. Pitch Syntax Violations Are Linked to Greater Skin Conductance Changes, Relative to Timbral Violations - The Predictive Role of the Reward System in Perspective of Cortico-subcortical Loops.

    PubMed

    Gorzelańczyk, Edward J; Podlipniak, Piotr; Walecki, Piotr; Karpiński, Maciej; Tarnowska, Emilia

    2017-01-01

    According to contemporary opinion emotional reactions to syntactic violations are due to surprise as a result of the general mechanism of prediction. The classic view is that, the processing of musical syntax can be explained by activity of the cerebral cortex. However, some recent studies have indicated that subcortical brain structures, including those related to the processing of emotions, are also important during the processing of syntax. In order to check whether emotional reactions play a role in the processing of pitch syntax or are only the result of the general mechanism of prediction, the comparison of skin conductance levels reacting to three types of melodies were recorded. In this study, 28 subjects listened to three types of short melodies prepared in Musical Instrument Digital Interface Standard files (MIDI) - tonally correct, tonally violated (with one out-of-key - i.e., of high information content), and tonally correct but with one note played in a different timbre. The BioSemi ActiveTwo with two passive Nihon Kohden electrodes was used. Skin conductance levels were positively correlated with the presented stimuli (timbral changes and tonal violations). Although changes in skin conductance levels were also observed in response to the change in timbre, the reactions to tonal violations were significantly stronger. Therefore, despite the fact that timbral change is at least as equally unexpected as an out-of-key note, the processing of pitch syntax mainly generates increased activation of the sympathetic part of the autonomic nervous system. These results suggest that the cortico-subcortical loops (especially the anterior cingulate - limbic loop) may play an important role in the processing of musical syntax.

  17. Simulations of cold electroweak baryogenesis: dependence on the source of CP-violation

    NASA Astrophysics Data System (ADS)

    Mou, Zong-Gang; Saffin, Paul M.; Tranberg, Anders

    2018-05-01

    We compute the baryon asymmetry created in a tachyonic electroweak symmetry breaking transition, focusing on the dependence on the source of effective CP-violation. Earlier simulations of Cold Electroweak Baryogenesis have almost exclusively considered a very specific CP-violating term explicitly biasing Chern-Simons number. We compare four different dimension six, scalar-gauge CP-violating terms, involving both the Higgs field and another dynamical scalar coupled to SU(2) or U(1) gauge fields. We find that for sensible values of parameters, all implementations can generate a baryon asymmetry consistent with observations, showing that baryogenesis is a generic outcome of a fast tachyonic electroweak transition.

  18. Subliminal Emotional Words Impact Syntactic Processing: Evidence from Performance and Event-Related Brain Potentials.

    PubMed

    Jiménez-Ortega, Laura; Espuny, Javier; de Tejada, Pilar Herreros; Vargas-Rivero, Carolina; Martín-Loeches, Manuel

    2017-01-01

    Recent studies demonstrate that syntactic processing can be affected by emotional information and that subliminal emotional information can also affect cognitive processes. In this study, we explore whether unconscious emotional information may also impact syntactic processing. In an Event-Related brain Potential (ERP) study, positive, neutral and negative subliminal adjectives were inserted within neutral sentences, just before the presentation of the supraliminal adjective. They could either be correct (50%) or contain a morphosyntactic violation (number or gender disagreements). Larger error rates were observed for incorrect sentences than for correct ones, in contrast to most studies using supraliminal information. Strikingly, emotional adjectives affected the conscious syntactic processing of sentences containing morphosyntactic anomalies. The neutral condition elicited left anterior negativity (LAN) followed by a P600 component. However, a lack of anterior negativity and an early P600 onset for the negative condition were found, probably as a result of the negative subliminal correct adjective capturing early syntactic resources. Positive masked adjectives in turn prompted an N400 component in response to morphosyntactic violations, probably reflecting the induction of a heuristic processing mode involving access to lexico-semantic information to solve agreement anomalies. Our results add to recent evidence on the impact of emotional information on syntactic processing, while showing that this can occur even when the reader is unaware of the emotional stimuli.

  19. Subliminal Emotional Words Impact Syntactic Processing: Evidence from Performance and Event-Related Brain Potentials

    PubMed Central

    Jiménez-Ortega, Laura; Espuny, Javier; de Tejada, Pilar Herreros; Vargas-Rivero, Carolina; Martín-Loeches, Manuel

    2017-01-01

    Recent studies demonstrate that syntactic processing can be affected by emotional information and that subliminal emotional information can also affect cognitive processes. In this study, we explore whether unconscious emotional information may also impact syntactic processing. In an Event-Related brain Potential (ERP) study, positive, neutral and negative subliminal adjectives were inserted within neutral sentences, just before the presentation of the supraliminal adjective. They could either be correct (50%) or contain a morphosyntactic violation (number or gender disagreements). Larger error rates were observed for incorrect sentences than for correct ones, in contrast to most studies using supraliminal information. Strikingly, emotional adjectives affected the conscious syntactic processing of sentences containing morphosyntactic anomalies. The neutral condition elicited left anterior negativity (LAN) followed by a P600 component. However, a lack of anterior negativity and an early P600 onset for the negative condition were found, probably as a result of the negative subliminal correct adjective capturing early syntactic resources. Positive masked adjectives in turn prompted an N400 component in response to morphosyntactic violations, probably reflecting the induction of a heuristic processing mode involving access to lexico-semantic information to solve agreement anomalies. Our results add to recent evidence on the impact of emotional information on syntactic processing, while showing that this can occur even when the reader is unaware of the emotional stimuli. PMID:28487640

  20. Search for baryon-number and lepton-number violating decays of Λ hyperons using the CLAS detector at Jefferson Laboratory

    NASA Astrophysics Data System (ADS)

    McCracken, M. E.; Bellis, M.; Adhikari, K. P.; Adikaram, D.; Akbar, Z.; Pereira, S. Anefalos; Badui, R. A.; Ball, J.; Baltzell, N. A.; Battaglieri, M.; Batourine, V.; Bedlinskiy, I.; Biselli, A. S.; Boiarinov, S.; Briscoe, W. J.; Brooks, W. K.; Burkert, V. D.; Cao, T.; Carman, D. S.; Celentano, A.; Chandavar, S.; Charles, G.; Colaneri, L.; Cole, P. L.; Contalbrigo, M.; Cortes, O.; Crede, V.; D'Angelo, A.; Dashyan, N.; De Vita, R.; De Sanctis, E.; Deur, A.; Djalali, C.; Dodge, G. E.; Dupre, R.; Alaoui, A. El; Fassi, L. El; Elouadrhiri, E.; Eugenio, P.; Fedotov, G.; Fegan, S.; Fersch, R.; Filippi, A.; Fleming, J. A.; Garillon, B.; Gevorgyan, N.; Gilfoyle, G. P.; Giovanetti, K. L.; Girod, F. X.; Golovatch, E.; Gothe, R. W.; Griffioen, K. A.; Guidal, M.; Guo, L.; Hafidi, K.; Hakobyan, H.; Hanretty, C.; Hattawy, M.; Hicks, K.; Holtrop, M.; Hughes, S. M.; Ilieva, Y.; Ireland, D. G.; Ishkhanov, B. S.; Isupov, E. L.; Jenkins, D.; Jiang, H.; Jo, H. S.; Keller, D.; Khachatryan, G.; Khandaker, M.; Kim, A.; Kim, W.; Klein, A.; Klein, F. J.; Kubarovsky, V.; Lenisa, P.; Livingston, K.; Lu, H. Y.; MacGregor, I. J. D.; Mayer, M.; McKinnon, B.; Mestayer, M. D.; Meyer, C. A.; Mirazita, M.; Mokeev, V.; Moody, C. I.; Moriya, K.; Camacho, C. Munoz; Nadel-Turonski, P.; Net, L. A.; Niccolai, S.; Osipenko, M.; Ostrovidov, A. I.; Park, K.; Pasyuk, E.; Pisano, S.; Pogorelko, O.; Price, J. W.; Procureur, S.; Prok, Y.; Raue, B. A.; Ripani, M.; Rizzo, A.; Rosner, G.; Roy, P.; Sabatié, F.; Salgado, C.; Schumacher, R. A.; Seder, E.; Sharabian, Y. G.; Skorodumina, Iu.; Sokhan, D.; Sparveris, N.; Stoler, P.; Strakovsky, I. I.; Strauch, S.; Sytnik, V.; Tian, Ye; Ungaro, M.; Voskanyan, H.; Voutier, E.; Walford, N. K.; Watts, D. P.; Wei, X.; Wood, M. H.; Zachariou, N.; Zana, L.; Zhang, J.; Zhao, Z. W.; Zonta, I.; CLAS Collaboration

    2015-10-01

    We present a search for ten baryon number violating decay modes of Λ hyperons using the CLAS detector at Jefferson Laboratory. Nine of these decay modes result in a single meson and single lepton in the final state (Λ →m ℓ) and conserve either the sum or the difference of baryon and lepton number (B ±L ). The tenth decay mode (Λ →p ¯ π+ ) represents a difference in baryon number of two units and no difference in lepton number. We observe no significant signal and set upper limits on the branching fractions of these reactions in the range (4 - 200 )×10-7 at the 90% confidence level.

  1. When one person's mistake is another's standard usage: the effect of foreign accent on syntactic processing.

    PubMed

    Hanulíková, Adriana; van Alphen, Petra M; van Goch, Merel M; Weber, Andrea

    2012-04-01

    How do native listeners process grammatical errors that are frequent in non-native speech? We investigated whether the neural correlates of syntactic processing are modulated by speaker identity. ERPs to gender agreement errors in sentences spoken by a native speaker were compared with the same errors spoken by a non-native speaker. In line with previous research, gender violations in native speech resulted in a P600 effect (larger P600 for violations in comparison with correct sentences), but when the same violations were produced by the non-native speaker with a foreign accent, no P600 effect was observed. Control sentences with semantic violations elicited comparable N400 effects for both the native and the non-native speaker, confirming no general integration problem in foreign-accented speech. The results demonstrate that the P600 is modulated by speaker identity, extending our knowledge about the role of speaker's characteristics on neural correlates of speech processing.

  2. Perceptual dehumanization of faces is activated by norm violations and facilitates norm enforcement.

    PubMed

    Fincher, Katrina M; Tetlock, Philip E

    2016-02-01

    This article uses methods drawn from perceptual psychology to answer a basic social psychological question: Do people process the faces of norm violators differently from those of others--and, if so, what is the functional significance? Seven studies suggest that people process these faces different and the differential processing makes it easier to punish norm violators. Studies 1 and 2 use a recognition-recall paradigm that manipulated facial-inversion and spatial frequency to show that people rely upon face-typical processing less when they perceive norm violators' faces. Study 3 uses a facial composite task to demonstrate that the effect is actor dependent, not action dependent, and to suggest that configural processing is the mechanism of perceptual change. Studies 4 and 5 use offset faces to show that configural processing is only attenuated when they belong to perpetrators who are culpable. Studies 6 and 7 show that people find it easier to punish inverted faces and harder to punish faces displayed in low spatial frequency. Taken together, these data suggest a bidirectional flow of causality between lower-order perceptual and higher-order cognitive processes in norm enforcement. PsycINFO Database Record (c) 2016 APA, all rights reserved.

  3. 32 CFR Appendix B to Part 1290 - Ticket Sample-A Parking Violation

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Ticket Sample-A Parking Violation B Appendix B to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S. DISTRICT COURTS Pt...

  4. 32 CFR Appendix C to Part 1290 - Ticket Sample-A Moving Violation

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Ticket Sample-A Moving Violation C Appendix C to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S. DISTRICT COURTS Pt...

  5. 32 CFR Appendix B to Part 1290 - Ticket Sample-A Parking Violation

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Ticket Sample-A Parking Violation B Appendix B to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S. DISTRICT COURTS Pt...

  6. 32 CFR Appendix C to Part 1290 - Ticket Sample-A Moving Violation

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Ticket Sample-A Moving Violation C Appendix C to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S. DISTRICT COURTS Pt...

  7. 32 CFR Appendix B to Part 1290 - Ticket Sample-A Parking Violation

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Ticket Sample-A Parking Violation B Appendix B to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S. DISTRICT COURTS Pt...

  8. 32 CFR Appendix B to Part 1290 - Ticket Sample-A Parking Violation

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Ticket Sample-A Parking Violation B Appendix B to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S. DISTRICT COURTS Pt...

  9. 32 CFR Appendix C to Part 1290 - Ticket Sample-A Moving Violation

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Ticket Sample-A Moving Violation C Appendix C to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S. DISTRICT COURTS Pt...

  10. 32 CFR Appendix B to Part 1290 - Ticket Sample-A Parking Violation

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Ticket Sample-A Parking Violation B Appendix B to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S. DISTRICT COURTS Pt...

  11. Actively Coping with Violation: Exploring Upward Dissent Patterns in Functional, Dysfunctional, and Deserted Psychological Contract End States

    PubMed Central

    Schalk, René; De Ruiter, Melanie; Van Loon, Joost; Kuijpers, Evy; Van Regenmortel, Tine

    2018-01-01

    Recently, scholars have emphasized the importance of examining how employees cope with psychological contract violation and how the coping process contributes to psychological contract violation resolution and post-violation psychological contracts. Recent work points to the important role of problem-focused coping. Yet, to date, problem-focused coping strategies have not been conceptualized on a continuum from constructive to destructive strategies. Consequently, potential differences in the use of specific types of problem-focused coping strategies and the role these different strategies play in the violation resolution process has not been explored. In this study, we stress the importance of focusing on different types of problem-focused coping strategies. We explore how employee upward dissent strategies, conceptualized as different forms of problem-focused coping, contribute to violation resolution and post-violation psychological contracts. Two sources of data were used. In-depth interviews with supervisors of a Dutch car lease company provided 23 case descriptions of employee-supervisor interactions after a psychological contract violation. Moreover, a database with descriptions of Dutch court sentences provided eight case descriptions of employee-organization interactions following a perceived violation. Based on these data sources, we explored the pattern of upward dissent strategies employees used over time following a perceived violation. We distinguished between functional (thriving and reactivation), dysfunctional (impairment and dissolution) and deserted psychological contract end states and explored whether different dissent patterns over time differentially contributed to the dissent outcome (i.e., psychological contract end state). The results of our study showed that the use of problem-focused coping is not as straightforward as suggested by the post-violation model. While the post-violation model suggests that problem-focused coping will most likely contribute positively to violation resolution, we found that this also depends on the type of problem-focused coping strategy used. That is, more threatening forms of problem-focused coping (i.e., threatening resignation as a way to trigger one’s manager/organization to resolve the violation) mainly contributed to dysfunctional and deserted PC end states. Yet, in some instances the use of these types of active coping strategies also contributed to functional violation resolution. These findings have important implications for the literature on upward dissent strategies and psychological contract violation repair. PMID:29467692

  12. Actively Coping with Violation: Exploring Upward Dissent Patterns in Functional, Dysfunctional, and Deserted Psychological Contract End States.

    PubMed

    Schalk, René; De Ruiter, Melanie; Van Loon, Joost; Kuijpers, Evy; Van Regenmortel, Tine

    2018-01-01

    Recently, scholars have emphasized the importance of examining how employees cope with psychological contract violation and how the coping process contributes to psychological contract violation resolution and post-violation psychological contracts. Recent work points to the important role of problem-focused coping. Yet, to date, problem-focused coping strategies have not been conceptualized on a continuum from constructive to destructive strategies. Consequently, potential differences in the use of specific types of problem-focused coping strategies and the role these different strategies play in the violation resolution process has not been explored. In this study, we stress the importance of focusing on different types of problem-focused coping strategies. We explore how employee upward dissent strategies, conceptualized as different forms of problem-focused coping, contribute to violation resolution and post-violation psychological contracts. Two sources of data were used. In-depth interviews with supervisors of a Dutch car lease company provided 23 case descriptions of employee-supervisor interactions after a psychological contract violation. Moreover, a database with descriptions of Dutch court sentences provided eight case descriptions of employee-organization interactions following a perceived violation. Based on these data sources, we explored the pattern of upward dissent strategies employees used over time following a perceived violation. We distinguished between functional (thriving and reactivation), dysfunctional (impairment and dissolution) and deserted psychological contract end states and explored whether different dissent patterns over time differentially contributed to the dissent outcome (i.e., psychological contract end state). The results of our study showed that the use of problem-focused coping is not as straightforward as suggested by the post-violation model. While the post-violation model suggests that problem-focused coping will most likely contribute positively to violation resolution, we found that this also depends on the type of problem-focused coping strategy used. That is, more threatening forms of problem-focused coping (i.e., threatening resignation as a way to trigger one's manager/organization to resolve the violation) mainly contributed to dysfunctional and deserted PC end states. Yet, in some instances the use of these types of active coping strategies also contributed to functional violation resolution. These findings have important implications for the literature on upward dissent strategies and psychological contract violation repair.

  13. Creation and Evolution of Particle Number Asymmetry in an Expanding Universe

    NASA Astrophysics Data System (ADS)

    Morozumi, T.; Nagao, K. I.; Adam, A. S.; Takata, H.

    2017-03-01

    We introduce a model which may generate particle number asymmetry in an expanding Universe. The model includes charge parity (CP) violating and particle number violating interactions. The model consists of a real scalar field and a complex scalar field. Starting with an initial condition specified by a density matrix, we show how the asymmetry is created through the interaction and how it evolves at later time. We compute the asymmetry using non-equilibrium quantum field theory and as a first test of the model, we study how the asymmetry evolves in the flat limit.

  14. 48 CFR 9.407-2 - Causes for suspension.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... laws, or receiving stolen property; or (4) Violations of the Drug-Free Workplace Act of 1988 (Public..., Drug-Free Workplace; or (ii) Such a number of contractor employees convicted of violations of criminal drug statutes occurring in the workplace as to indicate that the contractor has failed to make a good...

  15. From the trees to the forest: a review of radiative neutrino mass models

    NASA Astrophysics Data System (ADS)

    Cai, Yi; Herrero García, Juan; Schmidt, Michael A.; Vicente, Avelino; Volkas, Raymond R.

    2017-12-01

    A plausible explanation for the lightness of neutrino masses is that neutrinos are massless at tree level, with their mass (typically Majorana) being generated radiatively at one or more loops. The new couplings, together with the suppression coming from the loop factors, imply that the new degrees of freedom cannot be too heavy (they are typically at the TeV scale). Therefore, in these models there are no large mass hierarchies and they can be tested using different searches, making their detailed phenomenological study very appealing. In particular, the new particles can be searched for at colliders and generically induce signals in lepton-flavor and lepton-number violating processes (in the case of Majorana neutrinos), which are not independent from reproducing correctly the neutrino masses and mixings. The main focus of the review is on Majorana neutrinos. We order the allowed theory space from three different perspectives: (i) using an effective operator approach to lepton number violation, (ii) by the number of loops at which the Weinberg operator is generated, (iii) within a given loop order, by the possible irreducible topologies. We also discuss in more detail some popular radiative models which involve qualitatively different features, revisiting their most important phenomenological implications. Finally, we list some promising avenues to pursue.

  16. On the forecasting the unfavorable periods in the technosphere by the space weather factors

    NASA Astrophysics Data System (ADS)

    Lyakhov, N. N.

    2002-12-01

    There is the considerable progress in development of geomagnetic disturbances forecast technique, in the necessary time, by solar activity phenomena last years. The possible relationship between violations of the traffic safety terms (VTS) in East Siberian Railway during 1986-1999 and the space weather factors was investigated. The overall number of cases under consideration is equal to 11575. By methods of correlation and spectral analysis it was shown, that statistics of VTS has not a random and it's character is probably caused by space weather factors. The principal difference between rhythmic of VTS by purely technical reasons (MECH) (failures in mechanical systems) and, that of VTS caused by wrong operations of a personnel (MAN), is noted. Increase of sudden storm commencements number results in increase of probability of mistakable actions of an operator. Probability of violations in mechanical systems increases with increase of number of quiet geomagnetic conditions. This, in its turn, dictate different approach to the ordered rows of MECH and MAN data when forecasting the unfavourable periods as the priods of increased risk in working out a wrong decision by technological process participants. The advances in forecasting of geomagnetic environment technique made possible to start construction of systems of the operative informing about unfavourable factors of space weather for the interested organizations.

  17. 32 CFR Appendix A to Part 1290 - Preparation Guide for DD Form 1805, Violation Notice

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Preparation Guide for DD Form 1805, Violation Notice A Appendix A to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S...

  18. 32 CFR Appendix A to Part 1290 - Preparation Guide for DD Form 1805, Violation Notice

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Preparation Guide for DD Form 1805, Violation Notice A Appendix A to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S...

  19. 32 CFR Appendix A to Part 1290 - Preparation Guide for DD Form 1805, Violation Notice

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Preparation Guide for DD Form 1805, Violation Notice A Appendix A to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S...

  20. 32 CFR Appendix A to Part 1290 - Preparation Guide for DD Form 1805, Violation Notice

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Preparation Guide for DD Form 1805, Violation Notice A Appendix A to Part 1290 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS PREPARING AND PROCESSING MINOR OFFENSES AND VIOLATION NOTICES REFERRED TO U.S...

  1. Search for baryon-number and lepton-number violating decays of Λ hyperons using the CLAS detector at Jefferson Laboratory

    DOE PAGES

    McCracken, Michael E.

    2015-10-09

    We present a search for ten baryon-number violating decay modes of Λ hyperons using the CLAS detector at Jefferson Laboratory. Nine of these decay modes result in a single meson and single lepton in the final state (Λ → mΙ) and conserve either the sum or the difference of baryon and lepton number (Β ± L). The tenth decay mode (Λ → p¯π +) represents a difference in baryon number of two units and no difference in lepton number. Furthermore, we observe no significant signal and set upper limits on the branching fractions of these reactions in the range (4more » – 200) x 10 7 at the 90% confidence level.« less

  2. Morphosyntax can modulate the N400 component: Event related potentials to gender-marked post-nominal adjectives

    PubMed Central

    Guajardo, Lourdes F.; Wicha, Nicole Y. Y.

    2014-01-01

    Event-related potential studies of grammatical gender agreement often report a left anterior negativity (LAN) when agreement violations occur. Some studies have shown that during sentence comprehension gender violations can also interact with semantic processing to modulate a negativity associated with processing meaning – the N400. Given that the LAN and N400 overlap in time, they are identified by their scalp distributions and purported functional roles. Critically, grammatical gender violations also elicit a right posterior positivity that can overlap temporally with and potentially affect the scalp distribution of the LAN/N400. We measured the effect of grammatical gender violations in the LAN/N400 window and late positive component (LPC) during comprehension of Spanish sentences. A post-nominal adjective could either make sense or not, and either agree or disagree in gender with the preceding noun. We observed a negativity to gender agreement violations in the LAN/N400 window (300–500 ms post stimulus onset) that was smaller than the semantic-congruity N400, but overlapped with it in time and distribution. The early portion of the LPC to gender violations was modulated by sentence constraint, occurring as early as 450ms in highly constraining sentences. A subadditive interaction occurred at the later portion of the LPC with equivalent effects for single and double violations (gender and semantics), reflecting a general stage of reprocessing. Overall, our data support models of language comprehension whereby both semantic and morphosyntactic information can affect processing at similar time points. PMID:24462934

  3. Morphosyntax can modulate the N400 component: event related potentials to gender-marked post-nominal adjectives.

    PubMed

    Guajardo, Lourdes F; Wicha, Nicole Y Y

    2014-05-01

    Event-related potential studies of grammatical gender agreement often report a left anterior negativity (LAN) when agreement violations occur. Some studies have shown that during sentence comprehension gender violations can also interact with semantic processing to modulate a negativity associated with processing meaning - the N400. Given that the LAN and N400 overlap in time, they are identified by their scalp distributions and purported functional roles. Critically, grammatical gender violations also elicit a right posterior positivity that can overlap temporally and potentially affect the scalp distribution of the LAN/N400. We measured the effect of grammatical gender violations in the LAN/N400 window and late positive component (LPC) during comprehension of Spanish sentences. A post-nominal adjective could either make sense or not, and either agree or disagree in gender with the preceding noun. We observed a negativity to gender agreement violations in the LAN/N400 window (300-500ms post stimulus onset) that was smaller than the semantic-congruity N400, but overlapped with it in time and distribution. The early portion of the LPC to gender violations was modulated by sentence constraint, occurring as early as 450ms in highly constraining sentences. A subadditive interaction occurred at the later portion of the LPC with equivalent effects for single and double violations (gender and semantics), reflecting a general stage of reprocessing. Overall, our data support models of language comprehension whereby both semantic and morphosyntactic information can affect processing at similar time points. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. Improvement of statistical methods for detecting anomalies in climate and environmental monitoring systems

    NASA Astrophysics Data System (ADS)

    Yakunin, A. G.; Hussein, H. M.

    2018-01-01

    The article shows how the known statistical methods, which are widely used in solving financial problems and a number of other fields of science and technology, can be effectively applied after minor modification for solving such problems in climate and environment monitoring systems, as the detection of anomalies in the form of abrupt changes in signal levels, the occurrence of positive and negative outliers and the violation of the cycle form in periodic processes.

  5. Towards the identification of new physics through quark flavour violating processes.

    PubMed

    Buras, Andrzej J; Girrbach, Jennifer

    2014-08-01

    We outline a systematic strategy that should help in this decade to identify new physics (NP) beyond the standard model (SM) by means of quark flavour violating processes, and thereby extend the picture of short distance physics down to scales as short as 10(-20) m and even shorter distance scales corresponding to energies of 100 TeV. Rather than using all of the possible flavour-violating observables that will be measured in the coming years at the LHC, SuperKEKB and in Kaon physics dedicated experiments at CERN, J-PARC and Fermilab, we concentrate on those observables that are theoretically clean and very sensitive to NP. Assuming that the data on the selected observables will be very precise, we stress the importance of correlations between these observables as well as of future precise calculations of non-perturbative parameters by means of lattice QCD simulations with dynamical fermions. Our strategy consists of twelve steps, which we will discuss in detail while illustrating the possible outcomes with the help of the SM, models with constrained minimal flavour violation (CMFV), MFV at large and models with tree-level flavour changing neutral currents mediated by neutral gauge bosons and scalars. We will also briefly summarize the status of a number of concrete models. We propose DNA charts that exhibit correlations between flavour observables in different NP scenarios. Models with new left-handed and/or right-handed currents and non-MFV interactions can be distinguished transparently in this manner. We emphasize the important role of the stringent CMFV relations between various observables as standard candles of flavour physics. The pattern of deviations from these relations may help in identifying the correct NP scenario. The success of this program will be very much facilitated through direct signals of NP at the LHC, even if the LHC will not be able to probe the physics at scales shorter than 4 × 10(-20) m. We also emphasize the importance of lepton flavour violation, electric dipole moments, and (g - 2)e, μ in these studies.

  6. A new method for evaluating compliance with industry self-regulation codes governing the content of alcohol advertising.

    PubMed

    Babor, Thomas F; Xuan, Ziming; Damon, Donna

    2013-10-01

    This study evaluated the use of a modified Delphi technique in combination with a previously developed alcohol advertising rating procedure to detect content violations in the U.S. Beer Institute Code. A related aim was to estimate the minimum number of raters needed to obtain reliable evaluations of code violations in television commercials. Six alcohol ads selected for their likelihood of having code violations were rated by community and expert participants (N = 286). Quantitative rating scales were used to measure the content of alcohol advertisements based on alcohol industry self-regulatory guidelines. The community group participants represented vulnerability characteristics that industry codes were designed to protect (e.g., age <21); experts represented various health-related professions, including public health, human development, alcohol research, and mental health. Alcohol ads were rated on 2 occasions separated by 1 month. After completing Time 1 ratings, participants were randomized to receive feedback from 1 group or the other. Findings indicate that (i) ratings at Time 2 had generally reduced variance, suggesting greater consensus after feedback, (ii) feedback from the expert group was more influential than that of the community group in developing group consensus, (iii) the expert group found significantly fewer violations than the community group, (iv) experts representing different professional backgrounds did not differ among themselves in the number of violations identified, and (v) a rating panel composed of at least 15 raters is sufficient to obtain reliable estimates of code violations. The Delphi technique facilitates consensus development around code violations in alcohol ad content and may enhance the ability of regulatory agencies to monitor the content of alcoholic beverage advertising when combined with psychometric-based rating procedures. Copyright © 2013 by the Research Society on Alcoholism.

  7. A New Method for Evaluating Compliance with Industry Self-regulation Codes Governing the Content of Alcohol Advertising

    PubMed Central

    Babor, Thomas F.; Xuan, Ziming; Damon, Donna

    2013-01-01

    Background This study evaluated the use of a modified Delphi technique in combination with a previously developed alcohol advertising rating procedure to detect content violations in the US Beer Institute code. A related aim was to estimate the minimum number of raters needed to obtain reliable evaluations of code violations in television commercials. Methods Six alcohol ads selected for their likelihood of having code violations were rated by community and expert participants (N=286). Quantitative rating scales were used to measure the content of alcohol advertisements based on alcohol industry self-regulatory guidelines. The community group participants represented vulnerability characteristics that industry codes were designed to protect (e.g., age < 21); experts represented various health-related professions, including public health, human development, alcohol research and mental health. Alcohol ads were rated on two occasions separated by one month. After completing Time 1 ratings, participants were randomized to receive feedback from one group or the other. Results Findings indicate that (1) ratings at Time 2 had generally reduced variance, suggesting greater consensus after feedback, (2) feedback from the expert group was more influential than that of the community group in developing group consensus, (3) the expert group found significantly fewer violations than the community group, (4) experts representing different professional backgrounds did not differ among themselves in the number of violations identified; (5) a rating panel composed of at least 15 raters is sufficient to obtain reliable estimates of code violations. Conclusions The Delphi Technique facilitates consensus development around code violations in alcohol ad content and may enhance the ability of regulatory agencies to monitor the content of alcoholic beverage advertising when combined with psychometric-based rating procedures. PMID:23682927

  8. Global and local music perception in children with Williams syndrome.

    PubMed

    Deruelle, Christine; Schön, Daniele; Rondan, Cécilie; Mancini, Josette

    2005-04-25

    Musical processing can be decomposed into the appreciation of global and local elements. This global/local dissociation was investigated with the processing of contour-violated and interval-violated melodies. Performance of a group of 16 children with Williams syndrome and a group of 16 control children were compared in a same-different task. Control participants were more accurate in detecting differences in the contour-violated than in the interval-violated condition while Williams syndrome individuals performed equally well in both conditions. This finding suggests that global precedence may occur at an early perceptual stage in normally developing children. In contrast, no such global precedence is observed in the Williams syndrome population. These data are discussed in the context of atypical cognitive profiles of individuals with Williams syndrome.

  9. Event-related brain potentials to violations of arithmetic syntax represented by place value structure.

    PubMed

    Szucs, Dénes; Soltész, Fruzsina

    2010-05-01

    We dissociated ERP markers of semantic (numerical distance) vs. syntactic (place value) incongruence in the domain of arithmetic. Participants verified additions with four-digit numbers. Semantic incongruencies elicited the N400 ERP effect. A centro-parietal (putative P600) effect to place value violations was not related to arithmetic syntax. Rather, this effect was an enlarged P3b reflecting different surprise values of place value vs. non-place value violations. This potential confound should be considered in numerical cognition experiments. The latency of the N400 and P3a effects were differentially affected by place value analysis. The amplitude of the P3a and that of a fronto-central positive effect (FP600) was sensitive to place value analysis and digit content. Results suggest that ERPs can index the syntactical analysis of multi-digit numbers. Both ERP and behavioral data confirmed that multi-digit numbers were decomposed into their constituent digits, rather than evaluated holistically. Copyright 2010 Elsevier B.V. All rights reserved.

  10. Processing Temporal Constraints and Some Implications for the Investigation of Second Language Sentence Processing and Acquisition. Commentary on Baggio

    ERIC Educational Resources Information Center

    Roberts, Leah

    2008-01-01

    Baggio presents the results of an event-related potential (ERP) study in which he examines the processing consequences of reading tense violations such as *"Afgelopen zondag lakt Vincent de kozijnen van zijn landhuis" (*"Last Sunday Vincent paints the window-frames of his country house"). The violation is arguably caused by a mismatch between the…

  11. Event-Related Potentials Reflecting the Processing of Phonological Constraint Violations

    ERIC Educational Resources Information Center

    Domahs, Ulrike; Kehrein, Wolfgang; Knaus, Johannes; Wiese, Richard; Schlesewsky, Matthias

    2009-01-01

    How are violations of phonological constraints processed in word comprehension? The present article reports the results of an event-related potentials (ERP) study on a phonological constraint of German that disallows identical segments within a syllable or word (CC[subscript i]VC[subscript i]). We examined three types of monosyllabic CCVC words:…

  12. 40 CFR 63.11226 - Affirmative defense for violation of emission standards during malfunction.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., infrequent, and unavoidable failure of air pollution control equipment, process equipment, or a process to..., proper design or better operation and maintenance practices; and (iii) Did not stem from any activity or... minimize the impact of the violation on ambient air quality, the environment, and human health; and (6) All...

  13. 76 FR 12279 - Amendment to the Export Administration Regulations: Application Processing, Issuance, and Denial

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-07

    ... (EAR) by clarifying the Application Processing, Issuance, and Denial provisions concerning BIS's... the EAR provides for the revision, suspension or revocation of licenses whenever it is known that the EAR have been violated or that a violation is about to occur. In this final rule, BIS revises the...

  14. Automaticity of higher cognitive functions: neurophysiological evidence for unconscious syntactic processing of masked words.

    PubMed

    Jiménez-Ortega, Laura; García-Milla, Marcos; Fondevila, Sabela; Casado, Pilar; Hernández-Gutiérrez, David; Martín-Loeches, Manuel

    2014-12-01

    Models of language comprehension assume that syntactic processing is automatic, at least at early stages. However, the degree of automaticity of syntactic processing is still controversial. Evidence of automaticity is either indirect or has been observed for pairs of words, which might provide a poor syntactic context in comparison to sentences. The present study investigates the automaticity of syntactic processing using event-related brain potentials (ERPs) during sentence processing. To this end, masked adjectives that could either be syntactically correct or incorrect relative to a sentence being processed appeared just prior to the presentation of supraliminal adjectives. The latter could also be correct or incorrect. According to our data, subliminal gender agreement violations embedded in a sentence trigger an early anterior negativity-like modulation, whereas supraliminal gender agreement violations elicited a later anterior negativity. First-pass syntactic parsing thus appears to be unconsciously and automatically elicited. Interestingly, a P600-like modulation of short duration and early latency could also be observed for masked violations. In addition, masked violations also modulated the P600 component elicited by unmasked targets, probably reflecting that the mechanisms of revising a structural mismatch appear affected by subliminal information. According to our findings, both conscious and unconscious processes apparently contribute to syntactic processing. These results are discussed in line with most recent theories of automaticity and syntactic processing. Copyright © 2014 Elsevier B.V. All rights reserved.

  15. Charged lepton flavor violation in a class of radiative neutrino mass generation models

    NASA Astrophysics Data System (ADS)

    Chowdhury, Talal Ahmed; Nasri, Salah

    2018-04-01

    We investigate the charged lepton flavor violating processes μ →e γ , μ →e e e ¯, and μ -e conversion in nuclei for a class of three-loop radiative neutrino mass generation models with electroweak multiplets of increasing order. We find that, because of certain cancellations among various one-loop diagrams which give the dipole and nondipole contributions in an effective μ e γ vertex and a Z-penguin contribution in an effective μ e Z vertex, the flavor violating processes μ →e γ and μ -e conversion in nuclei become highly suppressed compared to μ →e e e ¯ process. Therefore, the observation of such a pattern in LFV processes may reveal the radiative mechanism behind neutrino mass generation.

  16. International Students Reported for Academic Integrity Violations: Demographics, Retention, and Graduation

    ERIC Educational Resources Information Center

    Fass-Holmes, Barry

    2017-01-01

    How many international students are reported for academic integrity violations (AIV), what are their demographics, and how do AIV sanctions affect their retention and/or graduation? Descriptive statistical analyses showed that the number of internationals reported for AIVs at an American West Coast public university increased almost six-fold…

  17. 48 CFR 9.406-2 - Causes for debarment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... of, one or more contracts. (ii) Violations of the Drug-Free Workplace Act of 1988 (Public Law 100-690... Workplace; or (B) Such a number of contractor employees convicted of violations of criminal drug statutes occurring in the workplace as to indicate that the contractor has failed to make a good faith effort to...

  18. Monitoring, reporting and addressing child rights and protection violations in 'non-listed' countries.

    PubMed

    Mc Cormick, Christine

    2013-07-01

    Children have been affected by the Israeli-Palestinian conflict for several generations. Recent reports state that they are subject to a number of grave violations, ranging from killing and maiming to detention and ill-treatment. The monitoring and reporting mechanism (MRM) for United Nations Security Council Resolution 1612 (2005), although not formally mandated in Israel and the occupied Palestinian territories (oPt), has been successfully adapted and used by humanitarian and human rights agencies to support monitoring, reporting, and responding to violations against children. However, agencies in Israel and the oPt face a number of challenges in doing so, which are common in other countries where the MRM is employed. These include limited recognition and understanding of the issues, insufficient resources, and a difficult operational environment. Despite these challenges, local adaptation of the mechanism to reflect the specific situation of children and close collaboration have enabled these agencies to monitor and respond to violations against children in a more effective manner. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.

  19. Defectors, not norm violators, are punished by third-parties.

    PubMed

    Bone, Jonathan; Silva, Antonio S; Raihani, Nichola J

    2014-07-01

    Punishment of defectors and cooperators is prevalent when their behaviour deviates from the social norm. Why atypical behaviour is more likely to be punished than typical behaviour remains unclear. One possible proximate explanation is that individuals simply dislike norm violators. However, an alternative possibility exists: individuals may be more likely to punish atypical behaviour, because the cost of punishment generally increases with the number of individuals that are punished. We used a public goods game with third-party punishment to test whether punishment of defectors was reduced when defecting was typical, as predicted if punishment is responsive to norm violation. The cost of punishment was fixed, regardless of the number of players punished, meaning that it was not more costly to punish typical, relative to atypical, behaviour. Under these conditions, atypical behaviour was not punished more often than typical behaviour. In fact, most punishment was targeted at defectors, irrespective of whether defecting was typical or atypical. We suggest that the reduced punishment of defectors when they are common might often be explained in terms of the costs to the punisher, rather than responses to norm violators.

  20. Sterile neutrinos and B-L symmetry

    NASA Astrophysics Data System (ADS)

    Fileviez Pérez, Pavel; Murgui, Clara

    2018-02-01

    We revisit the relation between the neutrino masses and the spontaneous breaking of the B-L gauge symmetry. We discuss the main scenarios for Dirac and Majorana neutrinos and point out two simple mechanisms for neutrino masses. In this context the neutrino masses can be generated either at tree level or at quantum level and one predicts the existence of very light sterile neutrinos with masses below the eV scale. The predictions for lepton number violating processes such as μ → e and μ → eγ are discussed in detail. The impact from the cosmological constraints on the effective number of relativistic degree of freedom is investigated.

  1. The discovery reach of CP violation in neutrino oscillation with non-standard interaction effects

    NASA Astrophysics Data System (ADS)

    Rahman, Zini; Dasgupta, Arnab; Adhikari, Rathin

    2015-06-01

    We have studied the CP violation discovery reach in a neutrino oscillation experiment with superbeam, neutrino factory and monoenergetic neutrino beam from the electron capture process. For NSI satisfying model-dependent bound for shorter baselines (like CERN-Fréjus set-up) there is insignificant effect of NSI on the the discovery reach of CP violation due to δ. Particularly, for the superbeam and neutrino factory we have also considered relatively longer baselines for which there could be significant NSI effects on CP violation discovery reach for higher allowed values of NSI. For the monoenergetic beam only shorter baselines are considered to study CP violation with different nuclei as neutrino sources. Interestingly for non-standard interactions—{{\\varepsilon }eμ } and {{\\varepsilon }eτ } of neutrinos with matter during propagation in longer baselines in the superbeam, there is the possibility of better discovery reach of CP violation than that with only Standard Model interactions of neutrinos with matter. For complex NSI we have shown the CP violation discovery reach in the plane of Dirac phase δ and NSI phase {{φ }ij}. The CP violation due to some values of δ remain unobservable with present and near future experimental facilities in the superbeam and neutrino factory. However, in the presence of some ranges of off-diagonal NSI phase values there are some possibilities of discovering total CP violation for any {{δ }CP} value even at 5σ confidence level for neutrino factory. Our analysis indicates that for some values of NSI phases total CP violation may not be at all observable for any values of δ. Combination of shorter and longer baselines could indicate in some cases the presence of NSI. However, in general for NSIs ≲ 1 the CP violation discovery reach is better in neutrino factory set-ups. Using a neutrino beam from the electron capture process for nuclei 50110Sn and 152Yb, we have shown the discovery reach of CP violation in a neutrino oscillation experiment. Particularly for 50110Sn nuclei CP violation could be found for about 51% of the possible δ values for a baseline of 130 km with boost factor γ =500. Although the nuclei 152Yb is technically more feasible for the production of a mono-energetic beam, it is found to be unsuitable in obtaining good discovery reach of CP violation.

  2. Precise discussion of time-reversal asymmetries in B-meson decays

    DOE PAGES

    Morozumi, Takuya; Okane, Hideaki; Umeeda, Hiroyuki

    2015-02-26

    BaBar collaboration announced that they observed time reversal (T) asymmetry through B meson system. In the experiment, time dependencies of two distinctive processes, B_ →B¯ 0 and B¯ 0 → B_ (– expresses CP value) are compared with each other. In our study, we examine event number difference of these two processes. In contrast to the BaBar asymmetry, the asymmetry of events number includes the overall normalization difference for rates. Time dependence of the asymmetry is more general and it includes terms absent in one used by BaBar collaboration. Both of the BaBar asymmetry and ours are naively thought tomore » be T-odd since two processes compared are related with flipping time direction. We investigate the time reversal transformation property of our asymmetry. Using our notation, one can see that the asymmetry is not precisely a T-odd quantity, taking into account indirect CP and CPT violation of K meson systems. The effect of ϵK is extracted and gives rise to O(10 –3) contribution. The introduced parameters are invariant under rephasing of quarks so that the coefficients of our asymmetry are expressed as phase convention independent quantities. Some combinations of the asymmetry enable us to extract parameters for wrong sign decays of B d meson, CPT violation, etc. As a result, we also study the reason why the T-even terms are allowed to contribute to the asymmetry, and find that several conditions are needed for the asymmetry to be a T-odd quantity.« less

  3. On-Line Sentence Processing in Swedish: Cross-Linguistic Developmental Comparisons with French

    ERIC Educational Resources Information Center

    Kail, Michele; Kihlstedt, Maria; Bonnet, Philippe

    2012-01-01

    This study examined on-line processing of Swedish sentences in a grammaticality-judgement experiment within the framework of the Competition Model. Three age groups from 6 to 11 and an adult group were asked to detect grammatical violations as quickly as possible. Three factors concerning cue cost were studied: violation position (early vs. late),…

  4. The Elaboration Likelihood Model and Proxemic Violations as Peripheral Cues to Information Processing.

    ERIC Educational Resources Information Center

    Eaves, Michael

    This paper provides a literature review of the elaboration likelihood model (ELM) as applied in persuasion. Specifically, the paper addresses distraction with regard to effects on persuasion. In addition, the application of proxemic violations as peripheral cues in message processing is discussed. Finally, the paper proposes to shed new light on…

  5. Home-Schools and Interscholastic Sports: Denying Participation Violates United States Constitutional Due Process and Equal Protection Rights. Chalk Talk.

    ERIC Educational Resources Information Center

    Webb, Derwin L.

    1997-01-01

    Participation in sports, in some instances, is considered a right which grants students the opportunity to be involved in extracurricular activities. Discusses the potential violation of home-schooled students' constitutional due process and equal protection rights and the pertinent laws regarding students and their ability to participate in…

  6. Inferring energy dissipation from violation of the fluctuation-dissipation theorem

    NASA Astrophysics Data System (ADS)

    Wang, Shou-Wen

    2018-05-01

    The Harada-Sasa equality elegantly connects the energy dissipation rate of a moving object with its measurable violation of the Fluctuation-Dissipation Theorem (FDT). Although proven for Langevin processes, its validity remains unclear for discrete Markov systems whose forward and backward transition rates respond asymmetrically to external perturbation. A typical example is a motor protein called kinesin. Here we show generally that the FDT violation persists surprisingly in the high-frequency limit due to the asymmetry, resulting in a divergent FDT violation integral and thus a complete breakdown of the Harada-Sasa equality. A renormalized FDT violation integral still well predicts the dissipation rate when each discrete transition produces a small entropy in the environment. Our study also suggests a way to infer this perturbation asymmetry based on the measurable high-frequency-limit FDT violation.

  7. 29 CFR 24.103 - Filing of retaliation complaint.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... violations. (c) Place of Filing. The complaint should be filed with the OSHA Area Director responsible for... by an employer in violation of any of the statutes listed in § 24.100(a) may file, or have filed by... with any OSHA officer or employee. Addresses and telephone numbers for these officials are set forth in...

  8. 76 FR 67104 - Child Labor Regulations, Orders and Statements of Interpretation; Child Labor Violations-Civil...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-31

    ... Regulations, Orders and Statements of Interpretation; Child Labor Violations--Civil Money Penalties AGENCY..., DC 20210; telephone: (202) 693-0072 (this is not a toll free number). Copies of this notice of...), upon request, by calling (202) 693-0023. TTY/TDD callers may dial toll-free (877) 889-5627 to obtain...

  9. 42 CFR 402.208 - Factors considered in determining whether to exclude, and the length of exclusion.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., ASSESSMENTS, AND EXCLUSIONS Exclusions § 402.208 Factors considered in determining whether to exclude, and the... financial condition of the person presenting the claims. (3) The total number of acts in which the violation... correct said violations. (6) Any other facts bearing on the nature and seriousness of the person's...

  10. 42 CFR 402.208 - Factors considered in determining whether to exclude, and the length of exclusion.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., ASSESSMENTS, AND EXCLUSIONS Exclusions § 402.208 Factors considered in determining whether to exclude, and the... financial condition of the person presenting the claims. (3) The total number of acts in which the violation... correct said violations. (6) Any other facts bearing on the nature and seriousness of the person's...

  11. 42 CFR 402.208 - Factors considered in determining whether to exclude, and the length of exclusion.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., ASSESSMENTS, AND EXCLUSIONS Exclusions § 402.208 Factors considered in determining whether to exclude, and the... financial condition of the person presenting the claims. (3) The total number of acts in which the violation... correct said violations. (6) Any other facts bearing on the nature and seriousness of the person's...

  12. The effect on collisions with injuries of a reduction in traffic citations issued by police officers.

    PubMed

    Blais, Etienne; Gagné, Marie-Pier

    2010-12-01

    To assess the effect on collisions with injuries of a 61% reduction in the number of traffic citations issued by police officers over a 21-month period. Using descriptive analyses as well as ARIMA intervention time-series analyses, this study estimated the impact of this reduction in citations issued for traffic violations on the monthly number of collisions with injuries. Simple descriptive analysis reveals that the 61% reduction in the number of citations issued for traffic violations during the experimental period coincided with an increase in collisions with injuries. Results from the interrupted time-series analyses reveal that, on average, eight additional collisions with injuries occurred every month during which the number of tickets issued for traffic violations was lower than normal. As this pressure tactic was applied for 21 months, it is estimated that this situation was associated with approximately 184 additional collisions with injuries: equivalent to 239 traffic injuries (either deaths, minor or serious injuries). In the province of Quebec, police officers are an important component of road safety policy. Issuing citations prevents drivers from adopting reckless driving habits such as speeding, running red lights and failing to fasten their seat belt.

  13. 20 CFR 653.113 - Processing apparent violations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... receipt of information regarding a suspected violation of employment related laws or JS regulations by an...) If the employer has filed a job order with the JS office within the past 12 months, the local office...

  14. Towards Device-Independent Information Processing on General Quantum Networks

    NASA Astrophysics Data System (ADS)

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  15. Towards Device-Independent Information Processing on General Quantum Networks.

    PubMed

    Lee, Ciarán M; Hoban, Matty J

    2018-01-12

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  16. Power to Punish Norm Violations Affects the Neural Processes of Fairness-Related Decision Making.

    PubMed

    Cheng, Xuemei; Zheng, Li; Li, Lin; Guo, Xiuyan; Wang, Qianfeng; Lord, Anton; Hu, Zengxi; Yang, Guang

    2015-01-01

    Punishing norm violations is considered an important motive during rejection of unfair offers in the ultimatum game (UG). The present study investigates the impact of the power to punish norm violations on people's responses to unfairness and associated neural correlates. In the UG condition participants had the power to punish norm violations, while an alternate condition, the impunity game (IG), was presented where participants had no power to punish norm violations since rejection only reduced the responder's income to zero. Results showed that unfair offers were rejected more often in UG compared to IG. At the neural level, anterior insula and dorsal anterior cingulate cortex were more active when participants received and rejected unfair offers in both UG and IG. Moreover, greater dorsolateral prefrontal cortex activity was observed when participants rejected than accepted unfair offers in UG but not in IG. Ventromedial prefrontal cortex activation was higher in UG than IG when unfair offers were accepted as well as when rejecting unfair offers in IG as opposed to UG. Taken together, our results demonstrate that the power to punish norm violations affects not only people's behavioral responses to unfairness but also the neural correlates of the fairness-related social decision-making process.

  17. Baryon and lepton number violating effective operators in a non-universal extension of the standard model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fuentes-Martín, J.

    2016-01-22

    It is well known that non-abelian Yang-Mills theories present non-trivial minima of the action, the so-called instantons. In the context of electroweak theories these instanton solutions may induce violations of baryon and lepton number of the form ΔB = ΔL = n{sub f}, with n{sub f} being the number of families coupled to the gauge group. An interesting feature of these violations is that the flavor structure of the gauge couplings is inherited by the instanton transitions. This effect is generally neglected in the literature. We will show that the inclusion of flavor interactions in the instanton solutions may bemore » interesting in certain theoretical frameworks and will provide an approach to include these effects. In particular we will perform this implementation in the non-universal SU (2){sub l} ⊗SU (2){sub h} ⊗U (1){sub Y} model that singularizes the third family. Within this framework, we will use the instanton transitions to set a bound on the SU (2){sub h} gauge coupling.« less

  18. RK(*) and related b →s ℓℓ¯ anomalies in minimal flavor violation framework with Z' boson

    NASA Astrophysics Data System (ADS)

    Chiang, Cheng-Wei; He, Xiao-Gang; Tandean, Jusak; Yuan, Xing-Bo

    2017-12-01

    A recent LHCb measurement of the ratio RK* of B →K*μ μ ¯ to B →K*e e ¯ branching fractions has produced results in mild tension with the standard model (SM). This adds to the known anomalies also induced by the b →s ℓℓ ¯ transitions, resulting in a confidence level now as high as 4 σ . We analyze whether the parameter space preferred by all the b →s ℓℓ¯ anomalies is compatible with a heavy Z' boson assumed to have nonuniversal couplings to SM fermions dictated by the principle of minimal flavor violation (MFV). We deal with the MFV couplings of the Z' to leptons in the context of the type-I seesaw scenario for generating neutrino masses. The flavor-violating Z' interactions are subject to stringent constraints from other processes, especially B -B ¯ mixing, charged lepton decays ℓi→ℓjℓkℓ¯ l occurring at tree level, and the loop induced μ →e γ . We perform scans for parameter regions allowed by various data and predict the ranges for a number of observables. Some of the predictions, such as the branching fractions of lepton-flavor violating τ →3 μ , B →K e μ , KL→e μ , and Z →ℓℓ', are not far below their experimental bounds and therefore could be probed by searches in the near future. The viable parameter space depends strongly on the neutrino mass hierarchy, with a preference for the inverted one.

  19. The Role of Attribution in the Experience of Crowding.

    ERIC Educational Resources Information Center

    Worchel, Stephen; Yohai, Steven M. L.

    Groups of subjects were placed in a room in which their personal space was violated or not violated. Some subjects were told that subliminal noise would be played into the room and that noise would either arouse or relax them. (Actually there was no noise.) Other subjects were told nothing about subliminal noise. The subjects worked on a number of…

  20. Neural signature of the conscious processing of auditory regularities

    PubMed Central

    Bekinschtein, Tristan A.; Dehaene, Stanislas; Rohaut, Benjamin; Tadel, François; Cohen, Laurent; Naccache, Lionel

    2009-01-01

    Can conscious processing be inferred from neurophysiological measurements? Some models stipulate that the active maintenance of perceptual representations across time requires consciousness. Capitalizing on this assumption, we designed an auditory paradigm that evaluates cerebral responses to violations of temporal regularities that are either local in time or global across several seconds. Local violations led to an early response in auditory cortex, independent of attention or the presence of a concurrent visual task, whereas global violations led to a late and spatially distributed response that was only present when subjects were attentive and aware of the violations. We could detect the global effect in individual subjects using functional MRI and both scalp and intracerebral event-related potentials. Recordings from 8 noncommunicating patients with disorders of consciousness confirmed that only conscious individuals presented a global effect. Taken together these observations suggest that the presence of the global effect is a signature of conscious processing, although it can be absent in conscious subjects who are not aware of the global auditory regularities. This simple electrophysiological marker could thus serve as a useful clinical tool. PMID:19164526

  1. Syntactic processing in music and language: Effects of interrupting auditory streams with alternating timbres.

    PubMed

    Fiveash, Anna; Thompson, William Forde; Badcock, Nicholas A; McArthur, Genevieve

    2018-07-01

    Music and language both rely on the processing of spectral (pitch, timbre) and temporal (rhythm) information to create structure and meaning from incoming auditory streams. Behavioral results have shown that interrupting a melodic stream with unexpected changes in timbre leads to reduced syntactic processing. Such findings suggest that syntactic processing is conditional on successful streaming of incoming sequential information. The current study used event-related potentials (ERPs) to investigate whether (1) the effect of alternating timbres on syntactic processing is reflected in a reduced brain response to syntactic violations, and (2) the phenomenon is similar for music and language. Participants listened to melodies and sentences with either one timbre (piano or one voice) or three timbres (piano, guitar, and vibraphone, or three different voices). Half the stimuli contained syntactic violations: an out-of-key note in the melodies, and a phrase-structure violation in the sentences. We found smaller ERPs to syntactic violations in music in the three-timbre compared to the one-timbre condition, reflected in a reduced early right anterior negativity (ERAN). A similar but non-significant pattern was observed for language stimuli in both the early left anterior negativity (ELAN) and the left anterior negativity (LAN) ERPs. The results suggest that disruptions to auditory streaming may interfere with syntactic processing, especially for melodic sequences. Copyright © 2018 Elsevier B.V. All rights reserved.

  2. Violation of the Sphericity Assumption and Its Effect on Type-I Error Rates in Repeated Measures ANOVA and Multi-Level Linear Models (MLM).

    PubMed

    Haverkamp, Nicolas; Beauducel, André

    2017-01-01

    We investigated the effects of violations of the sphericity assumption on Type I error rates for different methodical approaches of repeated measures analysis using a simulation approach. In contrast to previous simulation studies on this topic, up to nine measurement occasions were considered. Effects of the level of inter-correlations between measurement occasions on Type I error rates were considered for the first time. Two populations with non-violation of the sphericity assumption, one with uncorrelated measurement occasions and one with moderately correlated measurement occasions, were generated. One population with violation of the sphericity assumption combines uncorrelated with highly correlated measurement occasions. A second population with violation of the sphericity assumption combines moderately correlated and highly correlated measurement occasions. From these four populations without any between-group effect or within-subject effect 5,000 random samples were drawn. Finally, the mean Type I error rates for Multilevel linear models (MLM) with an unstructured covariance matrix (MLM-UN), MLM with compound-symmetry (MLM-CS) and for repeated measures analysis of variance (rANOVA) models (without correction, with Greenhouse-Geisser-correction, and Huynh-Feldt-correction) were computed. To examine the effect of both the sample size and the number of measurement occasions, sample sizes of n = 20, 40, 60, 80, and 100 were considered as well as measurement occasions of m = 3, 6, and 9. With respect to rANOVA, the results plead for a use of rANOVA with Huynh-Feldt-correction, especially when the sphericity assumption is violated, the sample size is rather small and the number of measurement occasions is large. For MLM-UN, the results illustrate a massive progressive bias for small sample sizes ( n = 20) and m = 6 or more measurement occasions. This effect could not be found in previous simulation studies with a smaller number of measurement occasions. The proportionality of bias and number of measurement occasions should be considered when MLM-UN is used. The good news is that this proportionality can be compensated by means of large sample sizes. Accordingly, MLM-UN can be recommended even for small sample sizes for about three measurement occasions and for large sample sizes for about nine measurement occasions.

  3. A radiative seesaw model with higher order terms under an alternative U(1)B-L

    NASA Astrophysics Data System (ADS)

    Nomura, Takaaki; Okada, Hiroshi

    2018-06-01

    We propose a model based on an alternative U(1) B - L gauge symmetry with 5 dimensional operators in the Lagrangian, and we construct the neutrino masses at one-loop level, and discuss lepton flavor violations, dark matter, and the effective number of neutrino species due to two massless particles in our model. Then we search allowed region to satisfy the current experimental data of neutrino oscillation and lepton flavor violations without conflict of several constraints such as stability of dark matter and the effective number of neutrino species, depending on normal hierarchy and inverted one.

  4. Difference in direct charge-parity violation between charged and neutral B meson decays.

    PubMed

    Lin, S-W; Unno, Y; Hou, W-S; Chang, P; Adachi, I; Aihara, H; Akai, K; Arinstein, K; Aulchenko, V; Aushev, T; Aziz, T; Bakich, A M; Balagura, V; Barberio, E; Bay, A; Bedny, I; Bitenc, U; Bondar, A; Bozek, A; Bracko, M; Browder, T E; Chang, M-C; Chao, Y; Chen, A; Chen, K-F; Chen, W T; Cheon, B G; Chiang, C-C; Chistov, R; Cho, I-S; Choi, S-K; Choi, Y; Choi, Y K; Cole, S; Dalseno, J; Danilov, M; Dash, M; Drutskoy, A; Eidelman, S; Epifanov, D; Fratina, S; Fujikawa, M; Furukawa, K; Gabyshev, N; Goldenzweig, P; Golob, B; Ha, H; Haba, J; Hara, T; Hayasaka, K; Hayashii, H; Hazumi, M; Heffernan, D; Hokuue, T; Hoshi, Y; Hsiung, Y B; Hyun, H J; Iijima, T; Ikado, K; Inami, K; Ishikawa, A; Ishino, H; Itoh, R; Iwabuchi, M; Iwasaki, M; Iwasaki, Y; Kah, D H; Kaji, H; Kataoka, S U; Kawai, H; Kawasaki, T; Kibayashi, A; Kichimi, H; Kikutani, E; Kim, H J; Kim, S K; Kim, Y J; Kinoshita, K; Korpar, S; Kozakai, Y; Krizan, P; Krokovny, P; Kumar, R; Kuo, C C; Kuzmin, A; Kwon, Y-J; Lee, M J; Lee, S E; Lesiak, T; Li, J; Liu, Y; Liventsev, D; Mandl, F; Marlow, D; McOnie, S; Medvedeva, T; Mimashi, T; Mitaroff, W; Miyabayashi, K; Miyake, H; Miyazaki, Y; Mizuk, R; Mori, T; Nakamura, T T; Nakano, E; Nakao, M; Nakazawa, H; Nishida, S; Nitoh, O; Noguchi, S; Nozaki, T; Ogawa, S; Ogawa, Y; Ohshima, T; Okuno, S; Olsen, S L; Ozaki, H; Pakhlova, G; Park, C W; Park, H; Peak, L S; Pestotnik, R; Peters, M; Piilonen, L E; Poluektov, A; Sahoo, H; Sakai, Y; Schneider, O; Schümann, J; Schwartz, A J; Seidl, R; Senyo, K; Sevior, M E; Shapkin, M; Shen, C P; Shibuya, H; Shidara, T; Shinomiya, S; Shiu, J-G; Shwartz, B; Singh, J B; Sokolov, A; Somov, A; Stanic, S; Staric, M; Sumisawa, K; Sumiyoshi, T; Suzuki, S; Tajima, O; Takasaki, F; Tamura, N; Tanaka, M; Tawada, M; Taylor, G N; Teramoto, Y; Tikhomirov, I; Trabelsi, K; Uehara, S; Ueno, K; Uglov, T; Uno, S; Urquijo, P; Ushiroda, Y; Usov, Y; Varner, G; Varvell, K E; Vervink, K; Villa, S; Wang, C C; Wang, C H; Wang, M-Z; Watanabe, Y; Wedd, R; Wicht, J; Won, E; Yabsley, B D; Yamaguchi, A; Yamashita, Y; Yamauchi, M; Yoshida, M; Yuan, C Z; Yusa, Y; Zhang, C C; Zhang, Z P; Zhilich, V; Zhulanov, V; Zupanc, A

    2008-03-20

    Equal amounts of matter and antimatter are predicted to have been produced in the Big Bang, but our observable Universe is clearly matter-dominated. One of the prerequisites for understanding this elimination of antimatter is the nonconservation of charge-parity (CP) symmetry. So far, two types of CP violation have been observed in the neutral K meson (K(0)) and B meson (B(0)) systems: CP violation involving the mixing between K(0) and its antiparticle (and likewise for B(0) and ), and direct CP violation in the decay of each meson. The observed effects for both types of CP violation are substantially larger for the B(0) meson system. However, they are still consistent with the standard model of particle physics, which has a unique source of CP violation that is known to be too small to account for the matter-dominated Universe. Here we report that the direct CP violation in charged B(+/-)-->K(+/-)pi(0) decay is different from that in the neutral B(0) counterpart. The direct CP-violating decay rate asymmetry, (that is, the difference between the number of observed B(-)-->K(-)pi(0) event versus B(+)-->K(+) pi(0) events, normalized to the sum of these events) is measured to be about +7%, with an uncertainty that is reduced by a factor of 1.7 from a previous measurement. However, the asymmetry for versus B(0)-->K(+)pi(-) is at the -10% level. Although it is susceptible to strong interaction effects that need further clarification, this large deviation in direct CP violation between charged and neutral B meson decays could be an indication of new sources of CP violation-which would help to explain the dominance of matter in the Universe.

  5. Violations of information structure: an electrophysiological study of answers to wh-questions.

    PubMed

    Cowles, H W; Kluender, Robert; Kutas, Marta; Polinsky, Maria

    2007-09-01

    This study investigates brain responses to violations of information structure in wh-question-answer pairs, with particular emphasis on violations of focus assignment in it-clefts (It was the queen that silenced the banker). Two types of ERP responses in answers to wh-questions were found. First, all words in the focus-marking (cleft) position elicited a large positivity (P3b) characteristic of sentence-final constituents, as did the final words of these sentences, which suggests that focused elements may trigger integration effects like those seen at sentence end. Second, the focusing of an inappropriate referent elicited a smaller, N400-like effect. The results show that comprehenders actively use structural focus cues and discourse-level restrictions during online sentence processing. These results, based on visual stimuli, were different from the brain response to auditory focus violations indicated by pitch-accent [Hruska, C., Steinhauer, K., Alter, K., & Steube, A. (2000). ERP effects of sentence accents and violations of the information structure. In Poster presented at the 13th annual CUNY conference on human sentence processing, San Diego, CA.], but similar to brain responses to newly introduced discourse referents [Bornkessel, I., Schlesewsky, M., & Friederici, A. (2003). Contextual information modulated initial processes of syntactic integration: the role of inter- versus intrasentential predictions. Journal of Experimental Psychology: Learning, Memory and Cognition, 29, 871-882.].

  6. Fast and slow brain rhythms in rule/expectation violation tasks: focusing on evaluation processes by excluding motor action.

    PubMed

    Tzur, Gabriel; Berger, Andrea

    2009-03-17

    Theta rhythm has been connected to ERP components such as the error-related negativity (ERN) and the feedback-related negativity (FRN). The nature of this theta activity is still unclear, that is, whether it is related to error detection, conflict between responses or reinforcement learning processes. We examined slow (e.g., theta) and fast (e.g., gamma) brain rhythms related to rule violation. A time-frequency decomposition analysis on a wide range of frequencies band (0-95 Hz) indicated that the theta activity relates to evaluation processes, regardless of motor/action processes. Similarities between the theta activities found in rule-violation tasks and in tasks eliciting ERN/FRN suggest that this theta activity reflects the operation of general evaluation mechanisms. Moreover, significant effects were found also in fast brain rhythms. These effects might be related to the synchronization between different types of cognitive processes involving the fulfillment of a task (e.g., working memory, visual perception, mathematical calculation, etc.).

  7. Flavor Physics in the Quark Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Antonelli, Mario; /Frascati; Asner, David Mark

    2010-08-26

    In the past decade, one of the major challenges of particle physics has been to gain an in-depth understanding of the role of quark flavor. In this time frame, measurements and the theoretical interpretation of their results have advanced tremendously. A much broader understanding of flavor particles has been achieved, apart from their masses and quantum numbers, there now exist detailed measurements of the characteristics of their interactions allowing stringent tests of Standard Model predictions. Among the most interesting phenomena of flavor physics is the violation of the CP symmetry that has been subtle and difficult to explore. In themore » past, observations of CP violation were confined to neutral K mesons, but since the early 1990s, a large number of CP-violating processes have been studied in detail in neutral B mesons. In parallel, measurements of the couplings of the heavy quarks and the dynamics for their decays in large samples of K,D, and B mesons have been greatly improved in accuracy and the results are being used as probes in the search for deviations from the Standard Model. In the near future, there will be a transition from the current to a new generation of experiments, thus a review of the status of quark flavor physics is timely. This report is the result of the work of the physicists attending the 5th CKM workshop, hosted by the University of Rome 'La Sapienza', September 9-13, 2008. It summarizes the results of the current generation of experiments that is about to be completed and it confronts these results with the theoretical understanding of the field which has greatly improved in the past decade.« less

  8. Cooperative Intersection Collision Avoidance System for Violations (CICAS-V) : Database Structure

    DOT National Transportation Integrated Search

    2011-07-01

    This report documents the process required for data exchange between a conductor of a field operational test (FOT) and an independent evaluator based on the experience of the Cooperative Intersection Collision Avoidance System for Violations (CICAS-V...

  9. Arithmetic mismatch negativity and numerical magnitude processing in number matching.

    PubMed

    Hsu, Yi-Fang; Szücs, Dénes

    2011-08-11

    This study examined the relationship of the arithmetic mismatch negativity (AMN) and the semantic evaluation of numerical magnitude. The first question was whether the AMN was sensitive to the incongruity in numerical information per se, or rather, to the violation of strategic expectations. The second question was whether the numerical distance effect could appear independently of the AMN. Event-related potentials (ERPs) were recorded while participants decided whether two digits were matching or non-matching in terms of physical similarity. The AMN was enhanced in matching trials presented infrequently relative to non-matching trials presented frequently. The numerical distance effect was found over posterior sites during a 92 ms long interval (236-328 ms) but appeared independently of the AMN. It was not the incongruity in numerical information per se, but rather, the violation of strategic expectations that elicited the AMN. The numerical distance effect might only temporally coincide with the AMN and did not form an inherent part of it.

  10. The relative advantages of criminal versus administrative environmental enforcement actions in Israel.

    PubMed

    Tal, Alon; Aharon, Yaara; Yuhas-Peled, Hadar

    2010-04-01

    Most environmental enforcement programs have separate criminal and administrative procedures for addressing violations. Pitting "criminal"versus"administrative" enforcement as mutually exclusive alternatives constitutes a "false dilemma". Clearly, the government response should be influenced by the severity of pollution and the specific circumstances of the polluter. Yet, policy makers seeking to improve environmental compliance need to have a clearer picture about the merits of each approach and their relative effectiveness. This research empirically assesses the effectiveness of criminal versus administrative enforcement activities in Israel. After considering the philosophical implications associated with each regulatory approach, the results of a year-long study are presented. A series of performance indicators are utilized, with particular weight on compliance status in the field, to assess the condition of environmental violations several years subsequent to completion of enforcement activities. The state of 100 violations of air, water and hazardous materials laws that had been addressed through the criminal process were matched with results of comparable violations, against which administrative actions were taken. Results suggest that while criminal enforcement is a longer process, compliance following these actions was significantly greater than in administrative enforcement cases. The findings also underline the significance of a systematic follow-up system for tracking violations after enforcement actions are complete. Finally, the study confirms the benefits of targeted assistance to improve compliance among violators of environmental standards.

  11. Pre-attentive mental processing of music expectation: event-related potentials of a partially violating and resolving paradigm.

    PubMed

    Pei, Yu-Cheng; Chen, Chia-Ling; Chung, Chia-Ying; Chou, Shi-Wei; Wong, Alice M K; Tang, Simon F T

    2004-02-01

    Auditory event-related potentials (ERPs) were investigated in an oddball paradigm to verify electrophysiological evidence of music expectation, which is a key component of artistic presentation. The non-target condition consisted of four-chord harmonic chord sequences, while the target condition was manifested by a partially violating third chord and a resolving fourth chord. The results showed that the specific mismatch negativity (MMN) elicited in the resolving chord is as robust as that elicited in the partially violating chord. Moreover, the P3b (P300) elicited in the resolving chord was smaller than the one in the violating chord. Taken together these data indicates that the human brain pre-attentatively may be able to anticipate a subsequent resolving chord when music expectation is generated by a partially violating chord.

  12. Japanese Listeners' Perceptions of Phonotactic Violations

    ERIC Educational Resources Information Center

    Fais, Laurel; Kajikawa, Sachiyo; Werker, Janet; Amano, Shigeaki

    2005-01-01

    The canonical form for Japanese words is (Consonant)Vowel(Consonant) Vowel[approximately]. However, a regular process of high vowel devoicing between voiceless consonants and word-finally after voiceless consonants results in consonant clusters and word-final consonants, apparent violations of that phonotactic pattern. We investigated Japanese…

  13. Safety behavior: Job demands, job resources, and perceived management commitment to safety.

    PubMed

    Hansez, Isabelle; Chmiel, Nik

    2010-07-01

    The job demands-resources model posits that job demands and resources influence outcomes through job strain and work engagement processes. We test whether the model can be extended to effort-related "routine" safety violations and "situational" safety violations provoked by the organization. In addition we test more directly the involvement of job strain than previous studies which have used burnout measures. Structural equation modeling provided, for the first time, evidence of predicted relationships between job strain and "routine" violations and work engagement with "routine" and "situational" violations, thereby supporting the extension of the job demands-resources model to safety behaviors. In addition our results showed that a key safety-specific construct 'perceived management commitment to safety' added to the explanatory power of the job demands-resources model. A predicted path from job resources to perceived management commitment to safety was highly significant, supporting the view that job resources can influence safety behavior through both general motivational involvement in work (work engagement) and through safety-specific processes.

  14. The Influence of Task-Irrelevant Music on Language Processing: Syntactic and Semantic Structures

    PubMed Central

    Hoch, Lisianne; Poulin-Charronnat, Benedicte; Tillmann, Barbara

    2011-01-01

    Recent research has suggested that music and language processing share neural resources, leading to new hypotheses about interference in the simultaneous processing of these two structures. The present study investigated the effect of a musical chord's tonal function on syntactic processing (Experiment 1) and semantic processing (Experiment 2) using a cross-modal paradigm and controlling for acoustic differences. Participants read sentences and performed a lexical decision task on the last word, which was, syntactically or semantically, expected or unexpected. The simultaneously presented (task-irrelevant) musical sequences ended on either an expected tonic or a less-expected subdominant chord. Experiment 1 revealed interactive effects between music-syntactic and linguistic-syntactic processing. Experiment 2 showed only main effects of both music-syntactic and linguistic-semantic expectations. An additional analysis over the two experiments revealed that linguistic violations interacted with musical violations, though not differently as a function of the type of linguistic violations. The present findings were discussed in light of currently available data on the processing of music as well as of syntax and semantics in language, leading to the hypothesis that resources might be shared for structural integration processes and sequencing. PMID:21713122

  15. 77 FR 31433 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-25

    ... to better audit the returns of U.S. corporations engaged in cross-border transactions with a related... violation of Income Tax Law. We need the taxpayer identification numbers, Social Security Number (SSN) or...

  16. RAND Workshop on Antiproton Science and Technology, Annotated Executive Summary. (October 6-9, 1987)

    DTIC Science & Technology

    1988-10-01

    parity violation to condensed matter . A number of near-term important applications are possible using the source and portable storage devices...from charge parity violation studies to condensed matter studies. -vi - The CERN/LEAR facility will continue to only scratch the surface of important...technology programs. These technology programs include possible small tools to study extreme states of matter ;, a propulsion test facility for

  17. A review of FDA warning letters and notices of violation issued for patient-reported outcomes promotional claims between 2006 and 2012.

    PubMed

    Symonds, Tara; Hackford, Claire; Abraham, Lucy

    2014-06-01

    To ascertain the frequency and types of patient-reported outcome (PRO) violations made in US pharmaceutical promotional materials between 2006 and 2012 and determine whether there were increases in violation warnings after issuance of the Food and Drug Administration (FDA) draft and final PRO Guidance. All warning letters (WLs) or notices of violation (NOVs) issued by the FDA's Office of Prescription Drug Promotion were reviewed for PRO violations (n = 213). Each letter containing a PRO violation was reviewed to determine the type of violation: 1) PRO measure not fit for purpose, 2) study design/interpretation of results, 3) statistical analysis, and 4) no treatment benefit. Forty-one (19%) letters contained information about PRO infringements. Noticeable spikes in letters were shown in 2007 (37%) and 2010 (31%) after the issuance of the draft and final PRO Guidance, respectively. The most common violation was PRO measure not fit for purpose (54%), specifically: use of individual items (45%), insufficient evidence of content validity (36%), and broadening of the claim beyond what the PRO measures (27%). Issues with study design/interpretation of results were also high (49%), particularly broadening of claim beyond what was measured in the trial (55%) and no PRO measure used (50%). A fifth of the letters issued to companies contained PRO violations, with most related to poor selection of the PRO measure used or trying to broaden the claim. More guidance from the Office of Prescription Drug Promotion about what is considered "substantial evidence" in this area could help reduce the number of letters issued. Copyright © 2014 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  18. Dual agency, dual relationships, boundary crossings, and associated boundary violations: a survey of military and civilian psychiatrists.

    PubMed

    Hines, A H; Ader, D N; Chang, A S; Rundell, J R

    1998-12-01

    We hypothesized that psychiatrists with high dual-agency potential (military and health maintenance organization [HMO] psychiatrists) were more likely than non-HMO civilian psychiatrists to engage in dual relationships, report pressures to do so, participate in other general boundary-crossing activities, and report associated counter-therapeutic outcomes (boundary violations). Ninety military and 191 demographically matched civilian psychiatrists reported the number of boundary-crossing activities (including dual relationships) and associated counter-therapeutic outcomes in the preceding year with adult patients. Military and HMO psychiatrists reported greater external pressures than non-HMO civilian psychiatrists to engage in dual relationships; however, all three groups were similar in their reported numbers of dual relationships. The reported boundary-crossing activities and dual relationships studied here are not necessarily associated with reported boundary violations. The relative risk of a particular boundary crossing associating with harm to a patient likely depends on the therapeutic context and should be determined on a case-by-case basis.

  19. Entanglement contour perspective for "strong area-law violation" in a disordered long-range hopping model

    NASA Astrophysics Data System (ADS)

    Roy, Nilanjan; Sharma, Auditya

    2018-03-01

    We numerically investigate the link between the delocalization-localization transition and entanglement in a disordered long-range hopping model of spinless fermions by studying various static and dynamical quantities. This includes the inverse participation ratio, level statistics, entanglement entropy, and number fluctuations in the subsystem along with quench and wave-packet dynamics. Finite systems show delocalized, quasilocalized, and localized phases. The delocalized phase shows strong area-law violation, whereas the (quasi)localized phase adheres to (for large subsystems) the strict area law. The idea of "entanglement contour" nicely explains the violation of area law and its relationship with "fluctuation contour" reveals a signature at the transition point. The relationship between entanglement entropy and number fluctuations in the subsystem also carries signatures for the transition in the model. Results from the Aubry-Andre-Harper model are compared in this context. The propagation of charge and entanglement are contrasted by studying quench and wave-packet dynamics at the single-particle and many-particle levels.

  20. Searches for the baryon- and lepton-number violating decays B0→Λc+l-, B-→Λl-, and B-→Λ¯l-

    NASA Astrophysics Data System (ADS)

    Del Amo Sanchez, P.; Lees, J. P.; Poireau, V.; Prencipe, E.; Tisserand, V.; Garra Tico, J.; Grauges, E.; Martinelli, M.; Milanes, D. A.; Palano, A.; Pappagallo, M.; Eigen, G.; Stugu, B.; Sun, L.; Brown, D. N.; Kerth, L. T.; Kolomensky, Yu. G.; Lynch, G.; Osipenkov, I. L.; Koch, H.; Schroeder, T.; Asgeirsson, D. J.; Hearty, C.; Mattison, T. S.; McKenna, J. A.; Khan, A.; Blinov, V. E.; Buzykaev, A. R.; Druzhinin, V. P.; Golubev, V. B.; Kravchenko, E. A.; Onuchin, A. P.; Serednyakov, S. I.; Skovpen, Yu. I.; Solodov, E. P.; Todyshev, K. Yu.; Yushkov, A. N.; Bondioli, M.; Curry, S.; Kirkby, D.; Lankford, A. J.; Mandelkern, M.; Martin, E. C.; Stoker, D. P.; Atmacan, H.; Gary, J. W.; Liu, F.; Long, O.; Vitug, G. M.; Campagnari, C.; Hong, T. M.; Kovalskyi, D.; Richman, J. D.; West, C. A.; Eisner, A. M.; Heusch, C. A.; Kroseberg, J.; Lockman, W. S.; Martinez, A. J.; Schalk, T.; Schumm, B. A.; Seiden, A.; Winstrom, L. O.; Cheng, C. H.; Doll, D. A.; Echenard, B.; Hitlin, D. G.; Ongmongkolkul, P.; Porter, F. C.; Rakitin, A. Y.; Andreassen, R.; Dubrovin, M. S.; Meadows, B. T.; Sokoloff, M. D.; Bloom, P. C.; Ford, W. T.; Gaz, A.; Nagel, M.; Nauenberg, U.; Smith, J. G.; Wagner, S. R.; Ayad, R.; Toki, W. H.; Jasper, H.; Petzold, A.; Spaan, B.; Kobel, M. J.; Schubert, K. R.; Schwierz, R.; Bernard, D.; Verderi, M.; Clark, P. J.; Playfer, S.; Watson, J. E.; Andreotti, M.; Bettoni, D.; Bozzi, C.; Calabrese, R.; Cecchi, A.; Cibinetto, G.; Fioravanti, E.; Franchini, P.; Garzia, I.; Luppi, E.; Munerato, M.; Negrini, M.; Petrella, A.; Piemontese, L.; Baldini-Ferroli, R.; Calcaterra, A.; de Sangro, R.; Finocchiaro, G.; Nicolaci, M.; Pacetti, S.; Patteri, P.; Peruzzi, I. M.; Piccolo, M.; Rama, M.; Zallo, A.; Contri, R.; Guido, E.; Lo Vetere, M.; Monge, M. R.; Passaggio, S.; Patrignani, C.; Robutti, E.; Bhuyan, B.; Prasad, V.; Lee, C. L.; Morii, M.; Edwards, A. J.; Adametz, A.; Marks, J.; Uwer, U.; Bernlochner, F. U.; Ebert, M.; Lacker, H. M.; Lueck, T.; Volk, A.; Dauncey, P. D.; Tibbetts, M.; Behera, P. K.; Mallik, U.; Chen, C.; Cochran, J.; Crawley, H. B.; Meyer, W. T.; Prell, S.; Rosenberg, E. I.; Rubin, A. E.; Gritsan, A. V.; Guo, Z. J.; Arnaud, N.; Davier, M.; Derkach, D.; Firmino da Costa, J.; Grosdidier, G.; Le Diberder, F.; Lutz, A. M.; Malaescu, B.; Perez, A.; Roudeau, P.; Schune, M. H.; Serrano, J.; Sordini, V.; Stocchi, A.; Wang, L.; Wormser, G.; Lange, D. J.; Wright, D. M.; Bingham, I.; Chavez, C. A.; Coleman, J. P.; Fry, J. R.; Gabathuler, E.; Hutchcroft, D. E.; Payne, D. J.; Touramanis, C.; Bevan, A. J.; di Lodovico, F.; Sacco, R.; Sigamani, M.; Cowan, G.; Paramesvaran, S.; Wren, A. C.; Brown, D. N.; Davis, C. L.; Denig, A. G.; Fritsch, M.; Gradl, W.; Hafner, A.; Alwyn, K. E.; Bailey, D.; Barlow, R. J.; Jackson, G.; Lafferty, G. D.; Anderson, J.; Cenci, R.; Jawahery, A.; Roberts, D. A.; Simi, G.; Tuggle, J. M.; Dallapiccola, C.; Salvati, E.; Cowan, R.; Dujmic, D.; Sciolla, G.; Zhao, M.; Lindemann, D.; Patel, P. M.; Robertson, S. H.; Schram, M.; Biassoni, P.; Lazzaro, A.; Lombardo, V.; Palombo, F.; Stracka, S.; Cremaldi, L.; Godang, R.; Kroeger, R.; Sonnek, P.; Summers, D. J.; Nguyen, X.; Simard, M.; Taras, P.; de Nardo, G.; Monorchio, D.; Onorato, G.; Sciacca, C.; Raven, G.; Snoek, H. L.; Jessop, C. P.; Knoepfel, K. J.; Losecco, J. M.; Wang, W. F.; Corwin, L. A.; Honscheid, K.; Kass, R.; Blount, N. L.; Brau, J.; Frey, R.; Igonkina, O.; Kolb, J. A.; Rahmat, R.; Sinev, N. B.; Strom, D.; Strube, J.; Torrence, E.; Castelli, G.; Feltresi, E.; Gagliardi, N.; Margoni, M.; Morandin, M.; Posocco, M.; Rotondo, M.; Simonetto, F.; Stroili, R.; Ben-Haim, E.; Bomben, M.; Bonneaud, G. R.; Briand, H.; Calderini, G.; Chauveau, J.; Hamon, O.; Leruste, Ph.; Marchiori, G.; Ocariz, J.; Prendki, J.; Sitt, S.; Biasini, M.; Manoni, E.; Rossi, A.; Angelini, C.; Batignani, G.; Bettarini, S.; Carpinelli, M.; Casarosa, G.; Cervelli, A.; Forti, F.; Giorgi, M. A.; Lusiani, A.; Neri, N.; Paoloni, E.; Rizzo, G.; Walsh, J. J.; Lopes Pegna, D.; Lu, C.; Olsen, J.; Smith, A. J. S.; Telnov, A. V.; Anulli, F.; Baracchini, E.; Cavoto, G.; Faccini, R.; Ferrarotto, F.; Ferroni, F.; Gaspero, M.; Li Gioi, L.; Mazzoni, M. A.; Piredda, G.; Renga, F.; Buenger, C.; Hartmann, T.; Leddig, T.; Schröder, H.; Waldi, R.; Adye, T.; Olaiya, E. O.; Wilson, F. F.; Emery, S.; Hamel de Monchenault, G.; Vasseur, G.; Yèche, Ch.; Allen, M. T.; Aston, D.; Bard, D. J.; Bartoldus, R.; Benitez, J. F.; Cartaro, C.; Convery, M. R.; Dorfan, J.; Dubois-Felsmann, G. P.; Dunwoodie, W.; Field, R. C.; Franco Sevilla, M.; Fulsom, B. G.; Gabareen, A. M.; Graham, M. T.; Grenier, P.; Hast, C.; Innes, W. R.; Kelsey, M. H.; Kim, H.; Kim, P.; Kocian, M. L.; Leith, D. W. G. S.; Lewis, P.; Li, S.; Lindquist, B.; Luitz, S.; Luth, V.; Lynch, H. L.; Macfarlane, D. B.; Muller, D. R.; Neal, H.; Nelson, S.; O'Grady, C. P.; Ofte, I.; Perl, M.; Pulliam, T.; Ratcliff, B. N.; Roodman, A.; Salnikov, A. A.; Santoro, V.; Schindler, R. H.; Schwiening, J.; Snyder, A.; Su, D.; Sullivan, M. K.; Sun, S.; Suzuki, K.; Thompson, J. M.; Va'Vra, J.; Wagner, A. P.; Weaver, M.; Wisniewski, W. J.; Wittgen, M.; Wright, D. H.; Wulsin, H. W.; Yarritu, A. K.; Young, C. C.; Ziegler, V.; Chen, X. R.; Park, W.; Purohit, M. V.; White, R. M.; Wilson, J. R.; Randle-Conde, A.; Sekula, S. J.; Bellis, M.; Burchat, P. R.; Miyashita, T. S.; Ahmed, S.; Alam, M. S.; Ernst, J. A.; Pan, B.; Saeed, M. A.; Zain, S. B.; Guttman, N.; Soffer, A.; Lund, P.; Spanier, S. M.; Eckmann, R.; Ritchie, J. L.; Ruland, A. M.; Schilling, C. J.; Schwitters, R. F.; Wray, B. C.; Izen, J. M.; Lou, X. C.; Bianchi, F.; Gamba, D.; Pelliccioni, M.; Lanceri, L.; Vitale, L.; Lopez-March, N.; Martinez-Vidal, F.; Oyanguren, A.; Ahmed, H.; Albert, J.; Banerjee, Sw.; Choi, H. H. F.; Hamano, K.; King, G. J.; Kowalewski, R.; Lewczuk, M. J.; Lindsay, C.; Nugent, I. M.; Roney, J. M.; Sobie, R. J.; Gershon, T. J.; Harrison, P. F.; Latham, T. E.; Puccio, E. M. T.; Band, H. R.; Dasu, S.; Flood, K. T.; Pan, Y.; Prepost, R.; Vuosalo, C. O.; Wu, S. L.

    2011-05-01

    Searches for B mesons decaying to final states containing a baryon and a lepton are performed, where the baryon is either Λc or Λ and the lepton is a muon or an electron. These decays violate both baryon and lepton number and would be a signature of physics beyond the standard model. No significant signal is observed in any of the decay modes, and upper limits in the range (3.2-520)×10-8 are set on the branching fractions at the 90% confidence level.

  1. Genetics and human rights. Two histories: Restoring genetic identity after forced disappearance and identity suppression in Argentina and after compulsory isolation for leprosy in Brazil

    PubMed Central

    Penchaszadeh, Victor B.; Schuler-Faccini, Lavinia

    2014-01-01

    Over the past three decades, there has been an accelerated development of genetic technology, leading to its use in human genetic identification for many purposes. Additionally, it has been made explicit that identity is a fundamental human right. A number of historical circumstances have connected these developments. Personal identity is increasingly associated with the preservation and defense of human rights and is a tool to repair the violation of these rights, particularly the right to identity. In this article, we report the use of genetics to support the right to identity in two historical circumstances. First, we report the search, localization, DNA testing and genetic identification of 110 individuals who were appropriated as babies by the Argentine military dictatorship of 1976–1983 in the context of savage repression and egregious violations of human rights, including forced disappearance and suppression of identity. Second, we report on the repair of right-to-identity violations of hundreds of individuals that occurred during the process of compulsory isolation of patients with leprosy in Brazil through the Program “Reencontro”, which has led to the genetic identification of 158 pairs of individuals who previously did not have proof that they were siblings. The high value placed on genetic identification by victims of identity suppression did not counter the prevailing view that genetic factors were not more important than other factors (social, emotional, educational, cultural, spiritual) in determining the complex phenomenon of personal identity. The use of genetic identification as a tool to redress and repair human rights violations is a novel application of human genetics for the benefit of mankind. PMID:24764764

  2. Genetics and human rights. Two histories: Restoring genetic identity after forced disappearance and identity suppression in Argentina and after compulsory isolation for leprosy in Brazil.

    PubMed

    Penchaszadeh, Victor B; Schuler-Faccini, Lavinia

    2014-03-01

    Over the past three decades, there has been an accelerated development of genetic technology, leading to its use in human genetic identification for many purposes. Additionally, it has been made explicit that identity is a fundamental human right. A number of historical circumstances have connected these developments. Personal identity is increasingly associated with the preservation and defense of human rights and is a tool to repair the violation of these rights, particularly the right to identity. In this article, we report the use of genetics to support the right to identity in two historical circumstances. First, we report the search, localization, DNA testing and genetic identification of 110 individuals who were appropriated as babies by the Argentine military dictatorship of 1976-1983 in the context of savage repression and egregious violations of human rights, including forced disappearance and suppression of identity. Second, we report on the repair of right-to-identity violations of hundreds of individuals that occurred during the process of compulsory isolation of patients with leprosy in Brazil through the Program "Reencontro", which has led to the genetic identification of 158 pairs of individuals who previously did not have proof that they were siblings. The high value placed on genetic identification by victims of identity suppression did not counter the prevailing view that genetic factors were not more important than other factors (social, emotional, educational, cultural, spiritual) in determining the complex phenomenon of personal identity. The use of genetic identification as a tool to redress and repair human rights violations is a novel application of human genetics for the benefit of mankind.

  3. Identifying fMRI Model Violations with Lagrange Multiplier Tests

    PubMed Central

    Cassidy, Ben; Long, Christopher J; Rae, Caroline; Solo, Victor

    2013-01-01

    The standard modeling framework in Functional Magnetic Resonance Imaging (fMRI) is predicated on assumptions of linearity, time invariance and stationarity. These assumptions are rarely checked because doing so requires specialised software, although failure to do so can lead to bias and mistaken inference. Identifying model violations is an essential but largely neglected step in standard fMRI data analysis. Using Lagrange Multiplier testing methods we have developed simple and efficient procedures for detecting model violations such as non-linearity, non-stationarity and validity of the common Double Gamma specification for hemodynamic response. These procedures are computationally cheap and can easily be added to a conventional analysis. The test statistic is calculated at each voxel and displayed as a spatial anomaly map which shows regions where a model is violated. The methodology is illustrated with a large number of real data examples. PMID:22542665

  4. Cognitive Load Does Not Affect the Behavioral and Cognitive Foundations of Social Cooperation.

    PubMed

    Mieth, Laura; Bell, Raoul; Buchner, Axel

    2016-01-01

    The present study serves to test whether the cognitive mechanisms underlying social cooperation are affected by cognitive load. Participants interacted with trustworthy-looking and untrustworthy-looking partners in a sequential Prisoner's Dilemma Game. Facial trustworthiness was manipulated to stimulate expectations about the future behavior of the partners which were either violated or confirmed by the partners' cheating or cooperation during the game. In a source memory test, participants were required to recognize the partners and to classify them as cheaters or cooperators. A multinomial model was used to disentangle item memory, source memory and guessing processes. We found an expectancy-congruent bias toward guessing that trustworthy-looking partners were more likely to be associated with cooperation than untrustworthy-looking partners. Source memory was enhanced for cheating that violated the participants' positive expectations about trustworthy-looking partners. We were interested in whether or not this expectancy-violation effect-that helps to revise unjustified expectations about trustworthy-looking partners-depends on cognitive load induced via a secondary continuous reaction time task. Although this secondary task interfered with working memory processes in a validation study, both the expectancy-congruent guessing bias as well as the expectancy-violation effect were obtained with and without cognitive load. These findings support the hypothesis that the expectancy-violation effect is due to a simple mechanism that does not rely on demanding elaborative processes. We conclude that most cognitive mechanisms underlying social cooperation presumably operate automatically so that they remain unaffected by cognitive load.

  5. Cognitive Load Does Not Affect the Behavioral and Cognitive Foundations of Social Cooperation

    PubMed Central

    Mieth, Laura; Bell, Raoul; Buchner, Axel

    2016-01-01

    The present study serves to test whether the cognitive mechanisms underlying social cooperation are affected by cognitive load. Participants interacted with trustworthy-looking and untrustworthy-looking partners in a sequential Prisoner’s Dilemma Game. Facial trustworthiness was manipulated to stimulate expectations about the future behavior of the partners which were either violated or confirmed by the partners’ cheating or cooperation during the game. In a source memory test, participants were required to recognize the partners and to classify them as cheaters or cooperators. A multinomial model was used to disentangle item memory, source memory and guessing processes. We found an expectancy-congruent bias toward guessing that trustworthy-looking partners were more likely to be associated with cooperation than untrustworthy-looking partners. Source memory was enhanced for cheating that violated the participants’ positive expectations about trustworthy-looking partners. We were interested in whether or not this expectancy-violation effect—that helps to revise unjustified expectations about trustworthy-looking partners—depends on cognitive load induced via a secondary continuous reaction time task. Although this secondary task interfered with working memory processes in a validation study, both the expectancy-congruent guessing bias as well as the expectancy-violation effect were obtained with and without cognitive load. These findings support the hypothesis that the expectancy-violation effect is due to a simple mechanism that does not rely on demanding elaborative processes. We conclude that most cognitive mechanisms underlying social cooperation presumably operate automatically so that they remain unaffected by cognitive load. PMID:27630597

  6. 28 CFR 570.37 - Violation of furlough.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Violation of furlough. 570.37 Section 570.37 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE COMMUNITY PROGRAMS AND RELEASE.... (a) Staff shall process as an escapee an inmate who absconds from furlough. (b) Staff may take...

  7. Phenomenology of neutron-antineutron conversion

    NASA Astrophysics Data System (ADS)

    Gardner, Susan; Yan, Xinshuai

    2018-03-01

    We consider the possibility of neutron-antineutron (n -n ¯ ) conversion, in which the change of a neutron into an antineutron is mediated by an external source, as can occur in a scattering process. We develop the connections between n -n ¯ conversion and n -n ¯ oscillation, in which a neutron spontaneously transforms into an antineutron, noting that if n -n ¯ oscillation occurs in a theory with baryon number minus lepton number (B-L) violation, then n -n ¯ conversion can occur also. We show how an experimental limit on n -n ¯ conversion could connect concretely to a limit on n -n ¯ oscillation, and vice versa, using effective field theory techniques and baryon matrix elements computed in the MIT bag model.

  8. Realizing total reciprocity violation in the phase for photon scattering

    PubMed Central

    Deák, László; Bottyán, László; Fülöp, Tamás; Merkel, Dániel Géza; Nagy, Dénes Lajos; Sajti, Szilárd; Schulze, Kai Sven; Spiering, Hartmut; Uschmann, Ingo; Wille, Hans-Christian

    2017-01-01

    Reciprocity is when wave or quantum scattering satisfies a symmetry property, connecting a scattering process with the reversed one. While reciprocity involves the interchange of source and detector, it is fundamentally different from rotational invariance, and is a generalization of time reversal invariance, occurring in absorptive media as well. Due to its presence at diverse areas of physics, it admits a wide variety of applications. For polarization dependent scatterings, reciprocity is often violated, but violation in the phase of the scattering amplitude is much harder to experimentally observe than violation in magnitude. Enabled by the advantageous properties of nuclear resonance scattering of synchrotron radiation, we have measured maximal, i.e., 180-degree, reciprocity violation in the phase. For accessing phase information, we introduced a new version of stroboscopic detection. The scattering setting was devised based on a generalized reciprocity theorem that opens the way to construct new types of reciprocity related devices. PMID:28225031

  9. Realizing total reciprocity violation in the phase for photon scattering.

    PubMed

    Deák, László; Bottyán, László; Fülöp, Tamás; Merkel, Dániel Géza; Nagy, Dénes Lajos; Sajti, Szilárd; Schulze, Kai Sven; Spiering, Hartmut; Uschmann, Ingo; Wille, Hans-Christian

    2017-02-22

    Reciprocity is when wave or quantum scattering satisfies a symmetry property, connecting a scattering process with the reversed one. While reciprocity involves the interchange of source and detector, it is fundamentally different from rotational invariance, and is a generalization of time reversal invariance, occurring in absorptive media as well. Due to its presence at diverse areas of physics, it admits a wide variety of applications. For polarization dependent scatterings, reciprocity is often violated, but violation in the phase of the scattering amplitude is much harder to experimentally observe than violation in magnitude. Enabled by the advantageous properties of nuclear resonance scattering of synchrotron radiation, we have measured maximal, i.e., 180-degree, reciprocity violation in the phase. For accessing phase information, we introduced a new version of stroboscopic detection. The scattering setting was devised based on a generalized reciprocity theorem that opens the way to construct new types of reciprocity related devices.

  10. Lorentz violation, gravitoelectromagnetic field and Bhabha scattering

    NASA Astrophysics Data System (ADS)

    Santos, A. F.; Khanna, Faqir C.

    2018-01-01

    Lorentz symmetry is a fundamental symmetry in the Standard Model (SM) and in General Relativity (GR). This symmetry holds true for all models at low energies. However, at energies near the Planck scale, it is conjectured that there may be a very small violation of Lorentz symmetry. The Standard Model Extension (SME) is a quantum field theory that includes a systematic description of Lorentz symmetry violations in all sectors of particle physics and gravity. In this paper, SME is considered to study the physical process of Bhabha Scattering in the Gravitoelectromagnetism (GEM) theory. GEM is an important formalism that is valid in a suitable approximation of general relativity. A new nonminimal coupling term that violates Lorentz symmetry is used in this paper. Differential cross-section for gravitational Bhabha scattering is calculated. The Lorentz violation contributions to this GEM scattering cross-section are small and are similar in magnitude to the case of the electromagnetic field.

  11. Penguin-diagram-induced CP violation in charmless exclusive hadronic B decays

    NASA Astrophysics Data System (ADS)

    Du, Dongsheng; Xing, Zhi-Zhong

    1993-11-01

    We make a detailed analysis of some charmless self-tagging B decays, e.g., B+u-->K+K¯0, K*+π0, and B0d-->K+π-, which are of great experimental interest for probing CP violation in the decay amplitude. A few neutral B decays into CP eigenstates such as B0d-->π+π- are also studied on the Υ(4S) resonance to distinguish CP violation induced by penguin loops from that via B0-dB¯0d mixing. We present a clear factorization description of partial decay rates and CP asymmetries for B-->PP, PV, and VV processes, and illustrate the rescattering effects of final-state particles on CP violation in those tree-penguin interfering channels. Our numerical estimates show that it is possible to uncover the penguin-diagram-induced CP violation in a handful of self-tagging modes if about 108-109 B events are accumulated.

  12. Probing quantumness with joint continuous measurements of non-commuting qubit observables

    NASA Astrophysics Data System (ADS)

    Garcia-Pintos, Luis Pedro; Dressel, Justin

    In this talk we consider continuous weak measurements as a means to probe foundational issues in quantum mechanics. We consider the simultaneous monitoring of two noncommuting observables-as recently implemented by the Siddiqi group at UC Berkeley. Contrary to naive expectation, the output of such experiment can be used to simultaneously track the approximate observable dynamics. Despite this seeming realism, we also show that the readouts violate macrorealistic Leggett-Garg inequalities for arbitrarily short temporal correlations, and that the derived inequalities are manifestly violated even in the absence of Hamiltonian evolution. Such violations should indicate the failure of at least one postulate of macrorealism: either physical quantities do not have well defined values at all times, or the measurement process itself disturbs what is being measured. Despite this macrorealism violation, we construct a realistic, but epistemically restricted, model that perfectly emulates both the qubit evolution and the observed noisy signals, thus also emulating the violations.

  13. Should Weights and Risk Categories Be Used for Inspection Scores To Evaluate Food Safety in Restaurants?

    PubMed

    da Cunha, Diogo Thimoteo; de Rosso, Veridiana Vera; Stedefeldt, Elke

    2016-03-01

    The objective of this study was to verify the characteristics of food safety inspections, considering risk categories and binary scores. A cross-sectional study was performed with 439 restaurants in 43 Brazilian cities. A food safety checklist with 177 items was applied to the food service establishments. These items were classified into four groups (R1 to R4) according to the main factors that can cause outbreaks involving food: R1, time and temperature aspects; R2, direct contamination; R3, water conditions and raw material; and R4, indirect contamination (i.e., structures and buildings). A score adjusted for 100 was calculated for the overall violation score and the violation score for each risk category. The average violation score (standard deviation) was 18.9% (16.0), with an amplitude of 0.0 to 76.7%. Restaurants with a low overall violation score (approximately 20%) presented a high number of violations from the R1 and R2 groups, representing the most risky violations. Practical solutions to minimize this evaluation bias were discussed. Food safety evaluation should use weighted scores and be risk-based. However, some precautions must be taken by researchers, health inspectors, and health surveillance departments to develop an adequate and reliable instrument.

  14. No Pass, No Drive?

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    2001-01-01

    Discusses basis for Kentucky appellate court decision that state's no-pass, no-drive statute did not violate due-process and equal-protection clauses of the Kentucky and federal constitutions, but did violate the federal Family Education Rights and Privacy Act, but nevertheless did not invalidate the statute. Explains why the decision is…

  15. 40 CFR 51.364 - Enforcement against contractors, stations and inspectors.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... suspend or revoke the station or inspector license within three station business days of the finding. (2..., revocations, and violations and shall compile statistics on violations and penalties on an annual basis. (d... approved by the Administrator. Statistical process control shall be used whenever possible to demonstrate...

  16. Integrating gender and number information in Spanish word pairs: an ERP study.

    PubMed

    Barber, Horacio; Carreiras, Manuel

    2003-06-01

    The aim of the current study was to explore the integration processes of gender and number morphological features, since it has been proposed that grammatical gender and number features might be associated with different strength with the word stem in lexical representation. Event related potentials (ERPs) were recorded using a 128-channel sensor net while twenty-four volunteers read Spanish word pairs and performed a syntactic judgment task. The word pairs which could agree or disagree in gender or number or in gender and number at the same time, were formed by a noun and an adjective (e.g. faro-alto [lighthouse-high]). A negativity around 400 msec with posterior distribution, which has been related to lexical integration processes, was found in response to both gender and number violations. No differences were found between gender disagreement, number disagreement and the double disagreement. Therefore, ERPs suggest that integration of gender and number features may not be different, and that the detection of disagreement may work under a binary state, since the double disagreement condition did not differ from the others. In addition, a subsequent component (identified as P3) showed delayed latencies in the gender disagreement condition as compared to the number disagreement condition, while the double disagreement conditions showed a shorter peak latency than the other two disagreement conditions and similar to the agreement condition. The variations in the latency of the P3 component, which has been related to categorization processes, suggest that these processes are quickly triggered by the accumulation of two incongruent as compared to one disagreement features, and that reanalysis is costlier in the case of gender disagreement as compared to the number disagreement.

  17. Empirical study on neural network based predictive techniques for automatic number plate recognition

    NASA Astrophysics Data System (ADS)

    Shashidhara, M. S.; Indrakumar, S. S.

    2011-10-01

    The objective of this study is to provide an easy, accurate and effective technology for the Bangalore city traffic control. This is based on the techniques of image processing and laser beam technology. The core concept chosen here is an image processing technology by the method of automatic number plate recognition system. First number plate is recognized if any vehicle breaks the traffic rules in the signals. The number is fetched from the database of the RTO office by the process of automatic database fetching. Next this sends the notice and penalty related information to the vehicle owner email-id and an SMS sent to vehicle owner. In this paper, we use of cameras with zooming options & laser beams to get accurate pictures further applied image processing techniques such as Edge detection to understand the vehicle, Identifying the location of the number plate, Identifying the number plate for further use, Plain plate number, Number plate with additional information, Number plates in the different fonts. Accessing the database of the vehicle registration office to identify the name and address and other information of the vehicle number. The updates to be made to the database for the recording of the violation and penalty issues. A feed forward artificial neural network is used for OCR. This procedure is particularly important for glyphs that are visually similar such as '8' and '9' and results in training sets of between 25,000 and 40,000 training samples. Over training of the neural network is prevented by Bayesian regularization. The neural network output value is set to 0.05 when the input is not desired glyph, and 0.95 for correct input.

  18. Doctors charged with manslaughter in the course of medical practice, 1795-2005: a literature review

    PubMed Central

    Ferner, R E; McDowell, Sarah E

    2006-01-01

    Objectives: To quantify the number of doctors charged with manslaughter in the course of legitimate medical practice and to classify cases, as mistakes, slips (or lapses), and violations, using a recognized classification of human error system. Design: We searched newspaper databases, Medline, Embase, and the Wellcome library catalogue to identify relevant cases from 1795 to December 2005. Setting: Medical practice in the United Kingdom. Main outcome measure: Number of doctors charged with manslaughter in the course of medical practice. Results: We identified 85 doctors charged with manslaughter since 1795. The number of doctors charged was relatively high in the mid-19th century and the inter-war years, and has dramatically increased since 1990. Sixty of the doctors were acquitted, 22 were convicted, and three pleaded guilty. Most doctors were charged as a consequence of mistakes (37) or slips (17), and a minority because of alleged violations (16). Conclusions: The number of doctors prosecuted for manslaughter has risen steeply since 1990, but the proportion of doctors convicted remains low. Prosecution for deliberately violating rules is understandable, but accounts for only a minority of these cases. Unconscious errors—mistakes and slips (or lapses)—are an inescapable consequence of human actions and prosecution of individuals is unlikely to improve patient safety. That requires improvement to the complex systems of health care. PMID:16738374

  19. Early Childhood Stuttering and Electrophysiological Indices of Language Processing

    PubMed Central

    Weber-Fox, Christine; Wray, Amanda Hampton; Arnold, Hayley

    2013-01-01

    We examined neural activity mediating semantic and syntactic processing in 27 preschool-age children who stutter (CWS) and 27 preschool-age children who do not stutter (CWNS) matched for age, nonverbal IQ and language abilities. All participants displayed language abilities and nonverbal IQ within the normal range. Event-related brain potentials (ERPs) were elicited while participants watched a cartoon video and heard naturally spoken sentences that were either correct or contained semantic or syntactic (phrase structure) violations. ERPs in CWS, compared to CWNS, were characterized by longer N400 peak latencies elicited by semantic processing. In the CWS, syntactic violations elicited greater negative amplitudes for the early time window (150–350 ms) over medial sites compared to CWNS. Additionally, the amplitude of the P600 elicited by syntactic violations relative to control words was significant over the left hemisphere for the CWNS but showed the reverse pattern in CWS, a robust effect only over the right hemisphere. Both groups of preschoolage children demonstrated marked and differential effects for neural processes elicited by semantic and phrase structure violations; however, a significant proportion of young CWS exhibit differences in the neural functions mediating language processing compared to CWNS despite normal language abilities. These results are the first to show that differences in event-related brain potentials reflecting language processing occur as early as the preschool years in CWS and provide the first evidence that atypical lateralization of hemispheric speech/language functions previously observed in the brains of adults who stutter begin to emerge near the onset of developmental stuttering. PMID:23773672

  20. Research in Neutrino Physics and Particle Astrophysics: Final Technical Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kearns, Edward

    The Boston University Neutrino Physics and Particle Astrophysics Group investigates the fundamental laws of particle physics using natural and man-made neutrinos and rare processes such as proton decay. The primary instrument for this research is the massive Super-Kamiokande (SK) water Cherenkov detector, operating since 1996 at the Kamioka Neutrino Observatory, one kilometer underground in a mine in Japan. We study atmospheric neutrinos from cosmic rays, which were first used to discover that neutrinos have mass, as recognized by the 2015 Nobel Prize in Physics. Our latest measurements with atmospheric neutrinos are giving valuable information, complementary to longbaseline experiments, on themore » ordering of massive neutrino states and as to whether neutrinos violate CP symmetry. We have studied a variety of proton decay modes, including the most frequently predicted modes such as p → e +π 0 and p → ν K +, as well as more exotic baryon number violating processes such as dinucleon decay and neutronantineutron oscillation. We search for neutrinos from dark matter annihilation or decay in the universe. Our group has made significant contributions to detector operation, particularly in the area of electronics. Most recently, we have contributed to planning for an upgrade to the SK detector by the addition of gadolinium to the water, which will enable efficient neutron capture detection.« less

  1. Learning about Expectation Violation from Prediction Error Paradigms – A Meta-Analysis on Brain Processes Following a Prediction Error

    PubMed Central

    D’Astolfo, Lisa; Rief, Winfried

    2017-01-01

    Modifying patients’ expectations by exposing them to expectation violation situations (thus maximizing the difference between the expected and the actual situational outcome) is proposed to be a crucial mechanism for therapeutic success for a variety of different mental disorders. However, clinical observations suggest that patients often maintain their expectations regardless of experiences contradicting their expectations. It remains unclear which information processing mechanisms lead to modification or persistence of patients’ expectations. Insight in the processing could be provided by Neuroimaging studies investigating prediction error (PE, i.e., neuronal reactions to non-expected stimuli). Two methods are often used to investigate the PE: (1) paradigms, in which participants passively observe PEs (”passive” paradigms) and (2) paradigms, which encourage a behavioral adaptation following a PE (“active” paradigms). These paradigms are similar to the methods used to induce expectation violations in clinical settings: (1) the confrontation with an expectation violation situation and (2) an enhanced confrontation in which the patient actively challenges his expectation. We used this similarity to gain insight in the different neuronal processing of the two PE paradigms. We performed a meta-analysis contrasting neuronal activity of PE paradigms encouraging a behavioral adaptation following a PE and paradigms enforcing passiveness following a PE. We found more neuronal activity in the striatum, the insula and the fusiform gyrus in studies encouraging behavioral adaptation following a PE. Due to the involvement of reward assessment and avoidance learning associated with the striatum and the insula we propose that the deliberate execution of action alternatives following a PE is associated with the integration of new information into previously existing expectations, therefore leading to an expectation change. While further research is needed to directly assess expectations of participants, this study provides new insights into the information processing mechanisms following an expectation violation. PMID:28804467

  2. Learning about Expectation Violation from Prediction Error Paradigms - A Meta-Analysis on Brain Processes Following a Prediction Error.

    PubMed

    D'Astolfo, Lisa; Rief, Winfried

    2017-01-01

    Modifying patients' expectations by exposing them to expectation violation situations (thus maximizing the difference between the expected and the actual situational outcome) is proposed to be a crucial mechanism for therapeutic success for a variety of different mental disorders. However, clinical observations suggest that patients often maintain their expectations regardless of experiences contradicting their expectations. It remains unclear which information processing mechanisms lead to modification or persistence of patients' expectations. Insight in the processing could be provided by Neuroimaging studies investigating prediction error (PE, i.e., neuronal reactions to non-expected stimuli). Two methods are often used to investigate the PE: (1) paradigms, in which participants passively observe PEs ("passive" paradigms) and (2) paradigms, which encourage a behavioral adaptation following a PE ("active" paradigms). These paradigms are similar to the methods used to induce expectation violations in clinical settings: (1) the confrontation with an expectation violation situation and (2) an enhanced confrontation in which the patient actively challenges his expectation. We used this similarity to gain insight in the different neuronal processing of the two PE paradigms. We performed a meta-analysis contrasting neuronal activity of PE paradigms encouraging a behavioral adaptation following a PE and paradigms enforcing passiveness following a PE. We found more neuronal activity in the striatum, the insula and the fusiform gyrus in studies encouraging behavioral adaptation following a PE. Due to the involvement of reward assessment and avoidance learning associated with the striatum and the insula we propose that the deliberate execution of action alternatives following a PE is associated with the integration of new information into previously existing expectations, therefore leading to an expectation change. While further research is needed to directly assess expectations of participants, this study provides new insights into the information processing mechanisms following an expectation violation.

  3. Asymmetric dark matter, baryon asymmetry and lepton number violation

    NASA Astrophysics Data System (ADS)

    Frandsen, Mads T.; Hagedorn, Claudia; Huang, Wei-Chih; Molinaro, Emiliano; Päs, Heinrich

    2018-07-01

    We study the effect of lepton number violation (LNV) on baryon asymmetry, generated in the early Universe, in the presence of a dark sector with a global symmetry U(1)X, featuring asymmetric dark matter (ADM). We show that in general LNV, observable at the LHC or in neutrinoless double beta decay experiments, cannot wash out a baryon asymmetry generated at higher scales, unlike in scenarios without such dark sector. An observation of LNV at the TeV scale may thus support ADM scenarios. Considering several models with different types of dark matter (DM), we find that the DM mass is of the order of a few GeV or below in our scenario.

  4. Search for Lepton Number Violating Decays B+→π-μ+μ+ and B+→K-μ+μ+

    NASA Astrophysics Data System (ADS)

    Aaij, R.; Abellan Beteta, C.; Adeva, B.; Adinolfi, M.; Adrover, C.; Affolder, A.; Ajaltouni, Z.; Albrecht, J.; Alessio, F.; Alexander, M.; Alkhazov, G.; Alvarez Cartelle, P.; Alves, A. A., Jr.; Amato, S.; Amhis, Y.; Anderson, J.; Appleby, R. B.; Aquines Gutierrez, O.; Archilli, F.; Arrabito, L.; Artamonov, A.; Artuso, M.; Aslanides, E.; Auriemma, G.; Bachmann, S.; Back, J. J.; Bailey, D. S.; Balagura, V.; Baldini, W.; Barlow, R. J.; Barschel, C.; Barsuk, S.; Barter, W.; Bates, A.; Bauer, C.; Bauer, Th.; Bay, A.; Bediaga, I.; Belous, K.; Belyaev, I.; Ben-Haim, E.; Benayoun, M.; Bencivenni, G.; Benson, S.; Benton, J.; Bernet, R.; Bettler, M.-O.; van Beuzekom, M.; Bien, A.; Bifani, S.; Bizzeti, A.; Bjørnstad, P. M.; Blake, T.; Blanc, F.; Blanks, C.; Blouw, J.; Blusk, S.; Bobrov, A.; Bocci, V.; Bondar, A.; Bondar, N.; Bonivento, W.; Borghi, S.; Borgia, A.; Bowcock, T. J. V.; Bozzi, C.; Brambach, T.; van den Brand, J.; Bressieux, J.; Brett, D.; Brisbane, S.; Britsch, M.; Britton, T.; Brook, N. H.; Brown, H.; Büchler-Germann, A.; Burducea, I.; Bursche, A.; Buytaert, J.; Cadeddu, S.; Caicedo Carvajal, J. M.; Callot, O.; Calvi, M.; Calvo Gomez, M.; Camboni, A.; Campana, P.; Carbone, A.; Carboni, G.; Cardinale, R.; Cardini, A.; Carson, L.; Carvalho Akiba, K.; Casse, G.; Cattaneo, M.; Charles, M.; Charpentier, Ph.; Chiapolini, N.; Ciba, K.; Cid Vidal, X.; Ciezarek, G.; Clarke, P. E. L.; Clemencic, M.; Cliff, H. V.; Closier, J.; Coca, C.; Coco, V.; Cogan, J.; Collins, P.; Comerma-Montells, A.; Constantin, F.; Conti, G.; Contu, A.; Cook, A.; Coombes, M.; Corti, G.; Cowan, G. A.; Currie, R.; D'Almagne, B.; D'Ambrosio, C.; David, P.; de Bonis, I.; de Capua, S.; de Cian, M.; de Lorenzi, F.; de Miranda, J. M.; de Paula, L.; de Simone, P.; Decamp, D.; Deckenhoff, M.; Degaudenzi, H.; Deissenroth, M.; Del Buono, L.; Deplano, C.; Deschamps, O.; Dettori, F.; Dickens, J.; Dijkstra, H.; Diniz Batista, P.; Domingo Bonal, F.; Donleavy, S.; Dosil Suárez, A.; Dossett, D.; Dovbnya, A.; Dupertuis, F.; Dzhelyadin, R.; Easo, S.; Egede, U.; Egorychev, V.; Eidelman, S.; van Eijk, D.; Eisele, F.; Eisenhardt, S.; Ekelhof, R.; Eklund, L.; Elsasser, Ch.; D'Enterria, D. G.; Esperante Pereira, D.; Estève, L.; Falabella, A.; Fanchini, E.; Färber, C.; Fardell, G.; Farinelli, C.; Farry, S.; Fave, V.; Fernandez Albor, V.; Ferro-Luzzi, M.; Filippov, S.; Fitzpatrick, C.; Fontana, M.; Fontanelli, F.; Forty, R.; Frank, M.; Frei, C.; Frosini, M.; Furcas, S.; Gallas Torreira, A.; Galli, D.; Gandelman, M.; Gandini, P.; Gao, Y.; Garnier, J.-C.; Garofoli, J.; Garra Tico, J.; Garrido, L.; Gascon, D.; Gaspar, C.; Gauvin, N.; Gersabeck, M.; Gershon, T.; Ghez, Ph.; Gibson, V.; Gligorov, V. V.; Göbel, C.; Golubkov, D.; Golutvin, A.; Gomes, A.; Gordon, H.; Grabalosa Gándara, M.; Graciani Diaz, R.; Granado Cardoso, L. A.; Graugés, E.; Graziani, G.; Grecu, A.; Greening, E.; Gregson, S.; Gui, B.; Gushchin, E.; Guz, Yu.; Gys, T.; Haefeli, G.; Haen, C.; Haines, S. C.; Hampson, T.; Hansmann-Menzemer, S.; Harji, R.; Harnew, N.; Harrison, J.; Harrison, P. F.; He, J.; Heijne, V.; Hennessy, K.; Henrard, P.; Hernando Morata, J. A.; van Herwijnen, E.; Hicks, E.; Hofmann, W.; Holubyev, K.; Hopchev, P.; Hulsbergen, W.; Hunt, P.; Huse, T.; Huston, R. S.; Hutchcroft, D.; Hynds, D.; Iakovenko, V.; Ilten, P.; Imong, J.; Jacobsson, R.; Jaeger, A.; Jahjah Hussein, M.; Jans, E.; Jansen, F.; Jaton, P.; Jean-Marie, B.; Jing, F.; John, M.; Johnson, D.; Jones, C. R.; Jost, B.; Kandybei, S.; Karacson, M.; Karbach, T. M.; Keaveney, J.; Kerzel, U.; Ketel, T.; Keune, A.; Khanji, B.; Kim, Y. M.; Knecht, M.; Koblitz, S.; Koppenburg, P.; Kozlinskiy, A.; Kravchuk, L.; Kreplin, K.; Kreps, M.; Krocker, G.; Krokovny, P.; Kruse, F.; Kruzelecki, K.; Kucharczyk, M.; Kukulak, S.; Kumar, R.; Kvaratskheliya, T.; La Thi, V. N.; Lacarrere, D.; Lafferty, G.; Lai, A.; Lambert, D.; Lambert, R. W.; Lanciotti, E.; Lanfranchi, G.; Langenbruch, C.; Latham, T.; Le Gac, R.; van Leerdam, J.; Lees, J.-P.; Lefèvre, R.; Leflat, A.; Lefrançois, J.; Leroy, O.; Lesiak, T.; Li, L.; Li Gioi, L.; Lieng, M.; Liles, M.; Lindner, R.; Linn, C.; Liu, B.; Liu, G.; Lopes, J. H.; Lopez Asamar, E.; Lopez-March, N.; Luisier, J.; Machefert, F.; Machikhiliyan, I. V.; Maciuc, F.; Maev, O.; Magnin, J.; Malde, S.; Mamunur, R. M. D.; Manca, G.; Mancinelli, G.; Mangiafave, N.; Marconi, U.; Märki, R.; Marks, J.; Martellotti, G.; Martens, A.; Martin, L.; Martín Sánchez, A.; Martinez Santos, D.; Massafferri, A.; Mathe, Z.; Matteuzzi, C.; Matveev, M.; Maurice, E.; Maynard, B.; Mazurov, A.; McGregor, G.; McNulty, R.; McLean, C.; Meissner, M.; Merk, M.; Merkel, J.; Messi, R.; Miglioranzi, S.; Milanes, D. A.; Minard, M.-N.; Monteil, S.; Moran, D.; Morawski, P.; Mountain, R.; Mous, I.; Muheim, F.; Müller, K.; Muresan, R.; Muryn, B.; Musy, M.; Mylroie-Smith, J.; Naik, P.; Nakada, T.; Nandakumar, R.; Nardulli, J.; Nasteva, I.; Nedos, M.; Needham, M.; Neufeld, N.; Nguyen-Mau, C.; Nicol, M.; Nies, S.; Niess, V.; Nikitin, N.; Nomerotski, A.; Oblakowska-Mucha, A.; Obraztsov, V.; Oggero, S.; Ogilvy, S.; Okhrimenko, O.; Oldeman, R.; Orlandea, M.; Otalora Goicochea, J. M.; Owen, P.; Pal, K.; Palacios, J.; Palano, A.; Palutan, M.; Panman, J.; Papanestis, A.; Pappagallo, M.; Parkes, C.; Parkinson, C. J.; Passaleva, G.; Patel, G. D.; Patel, M.; Paterson, S. K.; Patrick, G. N.; Patrignani, C.; Pavel-Nicorescu, C.; Pazos Alvarez, A.; Pellegrino, A.; Penso, G.; Pepe Altarelli, M.; Perazzini, S.; Perego, D. L.; Perez Trigo, E.; Pérez-Calero Yzquierdo, A.; Perret, P.; Perrin-Terrin, M.; Pessina, G.; Petrella, A.; Petrolini, A.; Picatoste Olloqui, E.; Pie Valls, B.; Pietrzyk, B.; Pilar, T.; Pinci, D.; Plackett, R.; Playfer, S.; Plo Casasus, M.; Polok, G.; Poluektov, A.; Polycarpo, E.; Popov, D.; Popovici, B.; Potterat, C.; Powell, A.; Du Pree, T.; Prisciandaro, J.; Pugatch, V.; Puig Navarro, A.; Qian, W.; Rademacker, J. H.; Rakotomiaramanana, B.; Rangel, M. S.; Raniuk, I.; Raven, G.; Redford, S.; Reid, M. M.; Dos Reis, A. C.; Ricciardi, S.; Rinnert, K.; Roa Romero, D. A.; Robbe, P.; Rodrigues, E.; Rodrigues, F.; Rodriguez Perez, P.; Rogers, G. J.; Roiser, S.; Romanovsky, V.; Rosello, M.; Rouvinet, J.; Ruf, T.; Ruiz, H.; Sabatino, G.; Saborido Silva, J. J.; Sagidova, N.; Sail, P.; Saitta, B.; Salzmann, C.; Sannino, M.; Santacesaria, R.; Santinelli, R.; Santovetti, E.; Sapunov, M.; Sarti, A.; Satriano, C.; Satta, A.; Savrie, M.; Savrina, D.; Schaack, P.; Schiller, M.; Schleich, S.; Schmelling, M.; Schmidt, B.; Schneider, O.; Schopper, A.; Schune, M.-H.; Schwemmer, R.; Sciascia, B.; Sciubba, A.; Seco, M.; Semennikov, A.; Senderowska, K.; Sepp, I.; Serra, N.; Serrano, J.; Seyfert, P.; Shao, B.; Shapkin, M.; Shapoval, I.; Shatalov, P.; Shcheglov, Y.; Shears, T.; Shekhtman, L.; Shevchenko, O.; Shevchenko, V.; Shires, A.; Silva Coutinho, R.; Skottowe, H. P.; Skwarnicki, T.; Smith, A. C.; Smith, N. A.; Smith, E.; Sobczak, K.; Soler, F. J. P.; Solomin, A.; Soomro, F.; Souza de Paula, B.; Spaan, B.; Sparkes, A.; Spradlin, P.; Stagni, F.; Stahl, S.; Steinkamp, O.; Stoica, S.; Stone, S.; Storaci, B.; Straticiuc, M.; Straumann, U.; Styles, N.; Subbiah, V. K.; Swientek, S.; Szczekowski, M.; Szczypka, P.; Szumlak, T.; T'Jampens, S.; Teodorescu, E.; Teubert, F.; Thomas, C.; Thomas, E.; van Tilburg, J.; Tisserand, V.; Tobin, M.; Topp-Joergensen, S.; Torr, N.; Tran, M. T.; Tsaregorodtsev, A.; Tuning, N.; Ukleja, A.; Urquijo, P.; Uwer, U.; Vagnoni, V.; Valenti, G.; Vazquez Gomez, R.; Vazquez Regueiro, P.; Vecchi, S.; Velthuis, J. J.; Veltri, M.; Vervink, K.; Viaud, B.; Videau, I.; Vilasis-Cardona, X.; Visniakov, J.; Vollhardt, A.; Voong, D.; Vorobyev, A.; Voss, H.; Wacker, K.; Wandernoth, S.; Wang, J.; Ward, D. R.; Webber, A. D.; Websdale, D.; Whitehead, M.; Wiedner, D.; Wiggers, L.; Wilkinson, G.; Williams, M. P.; Williams, M.; Wilson, F. F.; Wishahi, J.; Witek, M.; Witzeling, W.; Wotton, S. A.; Wyllie, K.; Xie, Y.; Xing, F.; Xing, Z.; Yang, Z.; Young, R.; Yushchenko, O.; Zavertyaev, M.; Zhang, L.; Zhang, W. C.; Zhang, Y.; Zhelezov, A.; Zhong, L.; Zverev, E.; Zvyagin, A.

    2012-03-01

    A search is performed for the lepton number violating decay B+→h-μ+μ+, where h- represents a K- or a π-, using an integrated luminosity of 36pb-1 of data collected with the LHCb detector. The decay is forbidden in the standard model but allowed in models with a Majorana neutrino. No signal is observed in either channel and limits of B(B+→K-μ+μ+)<5.4×10-8 and B(B+→π-μ+μ+)<5.8×10-8 are set at the 95% confidence level. These improve the previous best limits by factors of 40 and 30, respectively.

  5. Atomic parity violation as a probe of new physics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marciano, W.J.; Rosner, J.L.

    Effects of physics beyond the standard model on electroweak observables ares studied using the Peskin-Takeuchi isospin-conserving, {ital S}, and -breaking, {ital T}, parametrization of new'' quantum loop corrections. Experimental constraints on {ital S} and {ital T} are presented. Atomic parity-violating experiments are shown to be particularly sensitive to {ital S} with existing data giving {ital S}={minus}2.7{plus minus}2.0{plus minus}1.1. That constraint has important implications for generic technicolor models which predict {ital S}{approx equal}0.1{ital N}{sub {ital T}}{ital N}{sub {ital D}} ({ital N}{sub {ital T}} is the number of technicolors, {ital N}{sub {ital D}} is the number of technidoublets).

  6. Cost-performance analysis of nutrient removal in a full-scale oxidation ditch process based on kinetic modeling.

    PubMed

    Li, Zheng; Qi, Rong; Wang, Bo; Zou, Zhe; Wei, Guohong; Yang, Min

    2013-01-01

    A full-scale oxidation ditch process for treating sewage was simulated with the ASM2d model and optimized for minimal cost with acceptable performance in terms of ammonium and phosphorus removal. A unified index was introduced by integrating operational costs (aeration energy and sludge production) with effluent violations for performance evaluation. Scenario analysis showed that, in comparison with the baseline (all of the 9 aerators activated), the strategy of activating 5 aerators could save aeration energy significantly with an ammonium violation below 10%. Sludge discharge scenario analysis showed that a sludge discharge flow of 250-300 m3/day (solid retention time (SRT), 13-15 days) was appropriate for the enhancement of phosphorus removal without excessive sludge production. The proposed optimal control strategy was: activating 5 rotating disks operated with a mode of "111100100" ("1" represents activation and "0" represents inactivation) for aeration and sludge discharge flow of 200 m3/day (SRT, 19 days). Compared with the baseline, this strategy could achieve ammonium violation below 10% and TP violation below 30% with substantial reduction of aeration energy cost (46%) and minimal increment of sludge production (< 2%). This study provides a useful approach for the optimization of process operation and control.

  7. 15 CFR 30.70 - Violation of the Clean Diamond Trade Act.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Violation of the Clean Diamond Trade... Clean Diamond Trade Act. Public Law 108-19, the Clean Diamond Trade Act (the Act), section 8(c... diamonds, including those with respect to the validation of the Kimberley Process Certificate by the...

  8. 15 CFR 30.70 - Violation of the Clean Diamond Trade Act.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false Violation of the Clean Diamond Trade... Clean Diamond Trade Act. Public Law 108-19, the Clean Diamond Trade Act (the Act), section 8(c... diamonds, including those with respect to the validation of the Kimberley Process Certificate by the...

  9. 15 CFR 30.70 - Violation of the Clean Diamond Trade Act.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Violation of the Clean Diamond Trade... Clean Diamond Trade Act. Public Law 108-19, the Clean Diamond Trade Act (the Act), section 8(c... diamonds, including those with respect to the validation of the Kimberley Process Certificate by the...

  10. 15 CFR 30.70 - Violation of the Clean Diamond Trade Act.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Violation of the Clean Diamond Trade... Clean Diamond Trade Act. Public Law 108-19, the Clean Diamond Trade Act (the Act), section 8(c... diamonds, including those with respect to the validation of the Kimberley Process Certificate by the...

  11. Word-Category Violations in Patients with Broca's Aphasia: An ERP Study

    ERIC Educational Resources Information Center

    Wassenaar, Marlies; Hagoort, Peter

    2005-01-01

    An event-related brain potential experiment was carried out to investigate on-line syntactic processing in patients with Broca's aphasia. Subjects were visually presented with sentences that were either syntactically correct or contained violations of word-category. Three groups of subjects were tested: Broca patients (N=11), non-aphasic patients…

  12. On the Early Left-Anterior Negativity (ELAN) in Syntax Studies

    ERIC Educational Resources Information Center

    Steinhauer, Karsten; Drury, John E.

    2012-01-01

    Within the framework of Friederici's (2002) neurocognitive model of sentence processing, the early left anterior negativity (ELAN) in event-related potentials (ERPs) has been claimed to be a brain marker of syntactic first-pass parsing. As ELAN components seem to be exclusively elicited by word category violations (phrase structure violations),…

  13. A psychophysiological investigation of moral judgment after ventromedial prefrontal damage.

    PubMed

    Moretto, Giovanna; Làdavas, Elisabetta; Mattioli, Flavia; di Pellegrino, Giuseppe

    2010-08-01

    Converging evidence suggests that emotion processing mediated by ventromedial prefrontal cortex (vmPFC) is necessary to prevent personal moral violations. In moral dilemmas, for example, patients with lesions in vmPFC are more willing than normal controls to approve harmful actions that maximize good consequences (e.g., utilitarian moral judgments). Yet, none of the existing studies has measured subjects' emotional responses while they considered moral dilemmas. Therefore, a direct link between emotion processing and moral judgment is still lacking. Here, vmPFC patients and control participants considered moral dilemmas while skin conductance response (SCR) was measured as a somatic index of affective state. Replicating previous evidence, vmPFC patients approved more personal moral violations than did controls. Critically, we found that, unlike control participants, vmPFC patients failed to generate SCRs before endorsing personal moral violations. In addition, such anticipatory SCRs correlated negatively with the frequency of utilitarian judgments in normal participants. These findings provide direct support to the hypothesis that the vmPFC promotes moral behavior by mediating the anticipation of the emotional consequences of personal moral violations.

  14. Baryogenesis in false vacuum

    NASA Astrophysics Data System (ADS)

    Hamada, Yuta; Yamada, Masatoshi

    2017-09-01

    The null result in the LHC may indicate that the standard model is not drastically modified up to very high scales, such as the GUT/string scale. Having this in the mind, we suggest a novel leptogenesis scenario realized in the false vacuum of the Higgs field. If the Higgs field develops a large vacuum expectation value in the early universe, a lepton number violating process is enhanced, which we use for baryogenesis. To demonstrate the scenario, several models are discussed. For example, we show that the observed baryon asymmetry is successfully generated in the standard model with higher-dimensional operators.

  15. Gross violation of human rights and inequality in city of São Paulo, Southeastern Brazil.

    PubMed

    Ruotti, Caren; Freitas, Taís Viudes de; Almeida, Juliana Feliciano de; Peres, Maria Fernanda Tourinho

    2009-06-01

    To analyze the profile of gross human rights violations, and the relationship between these violations and socioeconomic and demographic indicators. Cross-sectional ecological study of 96 census districts of the city of São Paulo (Southeastern Brazil) in the year 2000. The data used came from the gross human rights violations database maintained by the Núcleo de Estudos de Violência (Center for the Study of Violence) at the Universidade de São Paulo. This database contains information on all the cases of summary executions, lynching and police violence reported on the written press. Socioeconomic and demographic data were obtained from the 2000 Census carried out by the Instituto Brasileiro de Geografia e Estatística (Brazilian Institute of Geography and Statistics). A descriptive analysis of the data was carried out, and the association between the dependent variable - gross human rights violations (number of police violence victims, lynching episodes and summary executions) -, and different socioeconomic and demographic variables was tested. In order to test this association the Spearman's correlation test was used. The correlations between gross human rights violations and the socioeconomic and demographic indicators were statistically significant, except for the urbanization rate and the hospital beds per 1000 inhabitants. The strongest correlations were found between the dependent variable and the following variables: size of the resident population (r=0,693), proportion of youths aged from 15 to 24 years (r=0,621), and proportion of household heads with no education or with up to three years of schooling (r=0,590). Gross human rights violations more markedly occur in the population with the worst living conditions. Therefore, in a scenario in which inequality in attaining social and economic rights is directly superposed to the violation of civil rights, the violence cycle is intensified and perpetuated.

  16. HYDJET++ for ultra-relativistic HIC’s: A hot cocktail of hydrodynamics, resonances and jets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bravina, L. V.; Johansson, B. H. Brusheim; Crkovska, J.

    An ultra-relativistic heavy-ion collision at LHC energies is a mixture of soft and hard processes. For comparison with data we employ the HYDJET++ model, which combines the description of soft processes with the treatment of hard partons propagating hot and dense nuclear medium. Importance of the interplay of ideal hydrodynamics, final state interactions and jets for the description of harmonics of the anisotropic flow is discussed. Jets are found to be the main source of violation of the number-of-constituent-quark (NCQ) scaling at LHC energies. Many features of higher flow harmonics and dihadron angular correlations, including ridge, can be described bymore » the interference of elliptic and triangular flows.« less

  17. Six-quark decays of the Higgs boson in supersymmetry with R-parity violation.

    PubMed

    Carpenter, Linda M; Kaplan, David E; Rhee, Eun-Jung

    2007-11-23

    Both electroweak precision measurements and simple supersymmetric extensions of the standard model prefer a mass of the Higgs boson less than the experimental lower limit (on a standard-model-like Higgs boson) of 114 GeV. We show that supersymmetric models with R parity violation and baryon-number violation have a significant range of parameter space in which the Higgs boson dominantly decays to six jets. These decays are much more weakly constrained by current CERN LEP analyses and would allow for a Higgs boson mass near that of the Z. In general, lighter scalar quark and other superpartner masses are allowed. The Higgs boson would potentially be discovered at hadron colliders via the appearance of new displaced vertices.

  18. Enhanced neural responses to rule violation in children with autism: a comparison to social exclusion.

    PubMed

    Bolling, Danielle Z; Pitskel, Naomi B; Deen, Ben; Crowley, Michael J; McPartland, James C; Kaiser, Martha D; Wyk, Brent C Vander; Wu, Jia; Mayes, Linda C; Pelphrey, Kevin A

    2011-07-01

    The present study aimed to explore the neural correlates of two characteristic deficits in autism spectrum disorders (ASD); social impairment and restricted, repetitive behavior patterns. To this end, we used comparable experiences of social exclusion and rule violation to probe potentially atypical neural networks in ASD. In children and adolescents with and without ASD, we used the interactive ball-toss game (Cyberball) to elicit social exclusion and a comparable game (Cybershape) to elicit a non-exclusive rule violation. Using functional magnetic resonance imaging (fMRI), we identified group differences in brain responses to social exclusion and rule violation. Though both groups reported equal distress following exclusion, the right insula and ventral anterior cingulate cortex were hypoactive during exclusion in children with ASD. In rule violation, right insula and dorsal prefrontal cortex were hyperactive in ASD. Right insula showed a dissociation in activation; it was hypoactive to social exclusion and hyperactive to rule violation in the ASD group. Further probed, different regions of right insula were modulated in each game, highlighting differences in regional specificity for which subsequent analyses revealed differences in patterns of functional connectivity. These results demonstrate neurobiological differences in processing social exclusion and rule violation in children with ASD.

  19. Can the standard model CP violation near the W bags explain the cosmological baryonic asymmetry?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Burnier, Yannis; Shuryak, Edward

    2011-10-01

    In the scenario of cold electroweak baryogenesis, oscillations of the Higgs field lead to metastable domains of unbroken phase where the Higgs field nearly vanishes. Those domains have also been identified with the W-t-t bags, a nontopological solitons made of large number ({approx}1000) of gauge quanta and heavy (top and antitop) quarks. As real-time numerical studies had shown, sphalerons (topological transition events violating the baryon number) occur only inside those bags. In this work we estimate the amount of CP violation in this scenario coming from the standard model, via the Cabibbo-Kobayashi-Maskawa (CKM) quark mixing matrix, resulting in top-minus-antitop differencemore » of the population in the bags. Since these tops/antitops are recycled by sphalerons, this population difference leads directly to the baryonic asymmetry of the Universe. We look at the effect appearing in the 4th order in weak W diagrams describing interference of different quark flavor contributions. We found that there are multiple cancellations of diagrams and clearly sign-definite effect appears only in the 6th-order expansion over flavor-dependent phases. We then estimate contributions to these diagrams in which weak interaction occurs (i) inside, (ii) near and (iii) far from the W-t-t b-bags, optimizing the contributions in each of them. We conclude that the second (near) scenario is the dominant one, producing CP violation of the order of 10{sup -10}, in our crude estimates. Together with the baryon violation rate of about 10{sup -2}, previously demonstrated for this scenario, it puts the resulting asymmetry close to what is needed to explain the observed baryonic asymmetry in the Universe. Our answer also has a definite sign, which apparently seems to be the correct one.« less

  20. 31 CFR 103.36 - Additional records to be made and retained by casinos.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and maintain a record of the name, permanent address, and social security number of the person... secure the name, permanent address, and social security number of each person having a financial interest... to secure the required social security number, it shall not be deemed to be in violation of this...

  1. Cooking and Eating Facilities in Migrant Farmworker Housing in North Carolina

    PubMed Central

    Summers, Phillip; Bischoff, Werner E.; Chen, Haiying; Wiggins, Melinda F.; Spears, Chaya R.; Arcury, Thomas A.

    2013-01-01

    Objectives. We sought to (1) describe observed cooking and eating facilities in migrant farmworker camps, (2) compare observed conditions with existing farmworker housing regulations, and (3) examine associations of violations with camp characteristics. Methods. We collected data in 182 farmworker camps in eastern North Carolina during the 2010 agricultural season. We compared our observations with 15 kitchen-related housing regulations specified by federal and state housing standards. Results. We observed violations of 8 regulations in at least 10% of camps: improper refrigerator temperature (65.5%), cockroach infestation (45.9%), contaminated water (34.4%), rodent infestation (28.9%), improper flooring (25.8%), unsanitary conditions (21.2%), improper fire extinguisher (19.9%), and holes or leaks in walls (12.1%). Logistic regression showed that violations were related to the time of the agricultural season, housing type, number of dwellings and residents, and presence of workers with H-2A visas. Conclusions. Cooking and eating facilities for migrant farmworkers fail to comply with regulations in a substantial number of camps. Greater enforcement of regulations, particularly during occupancy during the agricultural season, is needed to protect farmworkers. PMID:23327274

  2. Using lean "automation with a human touch" to improve medication safety: a step closer to the "perfect dose".

    PubMed

    Ching, Joan M; Williams, Barbara L; Idemoto, Lori M; Blackmore, C Craig

    2014-08-01

    Virginia Mason Medical Center (Seattle) employed the Lean concept of Jidoka (automation with a human touch) to plan for and deploy bar code medication administration (BCMA) to hospitalized patients. Integrating BCMA technology into the nursing work flow with minimal disruption was accomplished using three steps ofJidoka: (1) assigning work to humans and machines on the basis of their differing abilities, (2) adapting machines to the human work flow, and (3) monitoring the human-machine interaction. Effectiveness of BCMA to both reinforce safe administration practices and reduce medication errors was measured using the Collaborative Alliance for Nursing Outcomes (CALNOC) Medication Administration Accuracy Quality Study methodology. Trained nurses observed a total of 16,149 medication doses for 3,617 patients in a three-year period. Following BCMA implementation, the number of safe practice violations decreased from 54.8 violations/100 doses (January 2010-September 2011) to 29.0 violations/100 doses (October 2011-December 2012), resulting in an absolute risk reduction of 25.8 violations/100 doses (95% confidence interval [CI]: 23.7, 27.9, p < .001). The number of medication errors decreased from 5.9 errors/100 doses at baseline to 3.0 errors/100 doses after BCMA implementation (absolute risk reduction: 2.9 errors/100 doses [95% CI: 2.2, 3.6,p < .001]). The number of unsafe administration practices (estimate, -5.481; standard error 1.133; p < .001; 95% CI: -7.702, -3.260) also decreased. As more hospitals respond to health information technology meaningful use incentives, thoughtful, methodical, and well-managed approaches to technology deployment are crucial. This work illustrates how Jidoka offers opportunities for a smooth transition to new technology.

  3. Statistical power to detect violation of the proportional hazards assumption when using the Cox regression model.

    PubMed

    Austin, Peter C

    2018-01-01

    The use of the Cox proportional hazards regression model is widespread. A key assumption of the model is that of proportional hazards. Analysts frequently test the validity of this assumption using statistical significance testing. However, the statistical power of such assessments is frequently unknown. We used Monte Carlo simulations to estimate the statistical power of two different methods for detecting violations of this assumption. When the covariate was binary, we found that a model-based method had greater power than a method based on cumulative sums of martingale residuals. Furthermore, the parametric nature of the distribution of event times had an impact on power when the covariate was binary. Statistical power to detect a strong violation of the proportional hazards assumption was low to moderate even when the number of observed events was high. In many data sets, power to detect a violation of this assumption is likely to be low to modest.

  4. Statistical power to detect violation of the proportional hazards assumption when using the Cox regression model

    PubMed Central

    Austin, Peter C.

    2017-01-01

    The use of the Cox proportional hazards regression model is widespread. A key assumption of the model is that of proportional hazards. Analysts frequently test the validity of this assumption using statistical significance testing. However, the statistical power of such assessments is frequently unknown. We used Monte Carlo simulations to estimate the statistical power of two different methods for detecting violations of this assumption. When the covariate was binary, we found that a model-based method had greater power than a method based on cumulative sums of martingale residuals. Furthermore, the parametric nature of the distribution of event times had an impact on power when the covariate was binary. Statistical power to detect a strong violation of the proportional hazards assumption was low to moderate even when the number of observed events was high. In many data sets, power to detect a violation of this assumption is likely to be low to modest. PMID:29321694

  5. Probing high scale physics with top quarks at the Large Hadron Collider

    NASA Astrophysics Data System (ADS)

    Dong, Zhe

    With the Large Hadron Collider (LHC) running at TeV scale, we are expecting to find the deviations from the Standard Model in the experiments, and understanding what is the origin of these deviations. Being the heaviest elementary particle observed so far in the experiments with the mass at the electroweak scale, top quark is a powerful probe for new phenomena of high scale physics at the LHC. Therefore, we concentrate on studying the high scale physics phenomena with top quark pair production or decay at the LHC. In this thesis, we study the discovery potential of string resonances decaying to t/tbar final state, and examine the possibility of observing baryon-number-violating top-quark production or decay, at the LHC. We point out that string resonances for a string scale below 4 TeV can be detected via the t/tbar channel, by reconstructing center-of-mass frame kinematics of the resonances from either the t/tbar semi-leptonic decay or recent techniques of identifying highly boosted tops. For the study of baryon-number-violating processes, by a model independent effective approach and focusing on operators with minimal mass-dimension, we find that corresponding effective coefficients could be directly probed at the LHC already with an integrated luminosity of 1 inverse femtobarns at 7 TeV, and further constrained with 30 (100) inverse femtobarns at 7 (14) TeV.

  6. Assessment of Self-Regulatory Code Violations in Brazilian Television Beer Advertisements*

    PubMed Central

    Vendrame, Alan; Pinsky, Ilana; Souza E Silva, Rebeca; Babor, Thomas

    2010-01-01

    Objective: Research suggests that alcoholic beverage advertisements may have an adverse effect on teenagers and young adults, owing to their vulnerability to suggestive message content. This study was designed to evaluate perceived violations of the content guidelines of the Brazilian alcohol marketing self-regulation code, based on ratings of the five most popular beer advertisements broadcast on television in the summer of 2005–2006 and during the 2006 FIFA (Fédération Internationale de Football Association) World Cup games. Method: Five beer advertisements were selected from a previous study showing that they were perceived to be highly appealing to a sample of Brazilian teenagers. These advertisements were evaluated by a sample of Brazilian high school students using a rating procedure designed to measure the content of alcohol advertisements covered in industry self-regulation codes. Results: All five advertisements were found to violate multiple guidelines of the Brazilian code of marketing self-regulation. The advertisement with the greatest number of violations was Antarctica's “Male Repellent,” which was perceived to violate 11 of the 16 guidelines in the code. Two advertisements had nine violations, and one had eight. The guidelines most likely to be violated by these advertisements were Guideline 1, which is aimed at protecting children and teenagers, and Guideline 2, which prohibits content encouraging excessive and irresponsible alcoholic beverage consumption. Conclusions: The five beer advertisements rated as most appealing to Brazilian teenagers were perceived by a sample of the same population to have violated numerous principles of the Brazilian self-regulation code governing the marketing of alcoholic beverages. Because of these numerous perceived code violations, it now seems important for regulatory authorities to submit industry marketing content to more systematic evaluation by young people and public health experts and for researchers to focus more on the ways in which alcohol advertising influences early onset of drinking and excessive alcohol consumption. PMID:20409439

  7. Assessment of self-regulatory code violations in Brazilian television beer advertisements.

    PubMed

    Vendrame, Alan; Pinsky, Ilana; e Silva, Rebeca Souza; Babor, Thomas

    2010-05-01

    Research suggests that alcoholic beverage advertisements may have an adverse effect on teenagers and young adults, owing to their vulnerability to suggestive message content. This study was designed to evaluate perceived violations of the content guidelines of the Brazilian alcohol marketing self-regulation code, based on ratings of the five most popular beer advertisements broadcast on television in the summer of 2005-2006 and during the 2006 FIFA (Federation Internationale de Football Association) World Cup games. Five beer advertisements were selected from a previous study showing that they were perceived to be highly appealing to a sample of Brazilian teenagers. These advertisements were evaluated by a sample of Brazilian high school students using a rating procedure designed to measure the content of alcohol advertisements covered in industry self-regulation codes. All five advertisements were found to violate multiple guidelines of the Brazilian code of marketing self-regulation. The advertisement with the greatest number of violations was Antarctica's "Male Repellent," which was perceived to violate 11 of the 16 guidelines in the code. Two advertisements had nine violations, and one had eight. The guidelines most likely to be violated by these advertisements were Guideline 1, which is aimed at protecting children and teenagers, and Guideline 2, which prohibits content encouraging excessive and irresponsible alcoholic beverage consumption. The five beer advertisements rated as most appealing to Brazilian teenagers were perceived by a sample of the same population to have violated numerous principles of the Brazilian self-regulation code governing the marketing of alcoholic beverages. Because of these numerous perceived code violations, it now seems important for regulatory authorities to submit industry marketing content to more systematic evaluation by young people and public health experts and for researchers to focus more on the ways in which alcohol advertising influences early onset of drinking and excessive alcohol consumption.

  8. Warning letters to sponsor-investigators at academic health centres - the regulatory "canaries in a coal mine".

    PubMed

    O'Reilly, Erin K; Blair Holbein, M E; Berglund, Jelena P; Parrish, Amanda B; Roth, Mary-Tara; Burnett, Bruce K

    2013-12-01

    This study highlights Warning Letter (WL) findings issued to sponsor-investigators (S-Is) by the Food and Drug Administration (FDA). The online index of WLs issued from October 1, 2007 through September 30, 2012 was reviewed [1]. Through a manual screening process, letters were evaluated if specifically issued to 'clinical investigators', 'sponsors' or 'sponsor-investigators'. A particular focus was given to S-Is at Academic Health Centres (AHCs). Each letter was scored for the presence of violations in 40 general regulatory categories. A review of FDA WLs issued over a five-year period (FDA Fiscal Years 2008-2012) revealed that WLs to S-Is represent half of the WLs issued to all sponsors (16 of 32 letters). A review of these letters indicates that S-Is are not aware of, or simply do not meet, their regulatory responsibilities as either investigators or sponsors. In comparing total sponsor letters to those of S-Is, the most cited violation was the same: a lack of monitoring. A review of publicly available inspection data indicates that these 16 letters merely represent the tip of the iceberg. This review of the WL database reveals the potential for serious regulatory violations among S-Is at AHCs. Recent translational funding initiatives may serve to increase the number of S-Is, especially among Academic Health Centres (AHCs) [2]; thus, AHCs must become aware of this S-I role and work to support investigators who assume both roles in the course of their research.

  9. Quantifying Local, Response Dependence between Two Polytomous Items Using the Rasch Model

    ERIC Educational Resources Information Center

    Andrich, David; Humphry, Stephen M.; Marais, Ida

    2012-01-01

    Models of modern test theory imply statistical independence among responses, generally referred to as "local independence." One violation of local independence occurs when the response to one item governs the response to a subsequent item. Expanding on a formulation of this kind of violation as a process in the dichotomous Rasch model,…

  10. 20 CFR 653.113 - Processing apparent violations.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... employee shall document the suspected violation and refer this information to the local office manager. (b) If the employer has filed a job order with the JS office within the past 12 months, the local office... agency in writing. (c) If the employer has not filed a job order with the local office during the past 12...

  11. 20 CFR 653.113 - Processing apparent violations.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... employee shall document the suspected violation and refer this information to the local office manager. (b) If the employer has filed a job order with the JS office within the past 12 months, the local office... agency in writing. (c) If the employer has not filed a job order with the local office during the past 12...

  12. 20 CFR 653.113 - Processing apparent violations.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... employee shall document the suspected violation and refer this information to the local office manager. (b) If the employer has filed a job order with the JS office within the past 12 months, the local office... agency in writing. (c) If the employer has not filed a job order with the local office during the past 12...

  13. 20 CFR 653.113 - Processing apparent violations.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... employee shall document the suspected violation and refer this information to the local office manager. (b) If the employer has filed a job order with the JS office within the past 12 months, the local office... agency in writing. (c) If the employer has not filed a job order with the local office during the past 12...

  14. U.N. Withholds Action on a Report of Human Rights Violations in the United States.

    ERIC Educational Resources Information Center

    American Indian Journal, 1979

    1979-01-01

    A panel of seven international jurists and lawyers has found a pattern of human and legal rights violations against Native Americans and other minorities in the United States. Their three-week investigation focused on political prisoners and discovered abuses of both the activists and the criminal process. (Author/DS)

  15. Tests of CPT, Lorentz invariance and the WEP with antihydrogen

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Holzscheiter, M.H.; ATHENA Collaboration

    1999-03-01

    Antihydrogen atoms, produced near rest, trapped in a magnetic well, and cooled to the lowest possible temperature (kinetic energy) could provide an extremely powerful tool for the search of violations of CPT and Lorentz invariance. Equally well, such a system could be used for searches of violations of the Weak Equivalence Principle (WEP) at high precision. The author describes his plans to form a significant number of cold, trapped antihydrogen atoms for comparative precision spectroscopy of hydrogen and antihydrogen and comment on possible first experiments.

  16. Compliance of Ultra-Orthodox and secular pedestrians with traffic lights in Ultra-Orthodox and secular locations.

    PubMed

    Rosenbloom, Tova; Shahar, Amit; Perlman, Amotz

    2008-11-01

    Following a previous study that revealed the disobedience of Ultra-Orthodox citizens, as compared to secular citizens, of traffic lights at crosswalks, the present study examined the road habits of 995 Ultra-Orthodox and secular pedestrians in neighboring Ultra-Orthodox and secular cities. Using an observation grid designed specially for this study, the pedestrians were observed at two crosswalks--one in an Ultra-Orthodox city and one in a secular city--as far as similar traffic parameters, using a logistic regression. The tendency to cross on a red light was assessed as a function of estimated age, gender, religiosity, location (religious/secular), the duration of the red light, the number of vehicles crossing and the number of pedestrians waiting at the curb. Ultra-Orthodox pedestrians committed more violations than secular pedestrians did, and there were more road violations in the Ultra-Orthodox location than there were in the secular location. Fewer traffic violations were committed by "local" pedestrians (Ultra-Orthodox pedestrians in the Ultra-Orthodox location and secular pedestrians in the secular location) than by "foreigners" (Ultra-Orthodox pedestrians in the secular location and secular pedestrians in the Ultra-Orthodox location). The odds of crossing on a red light decreased as a function of both the number of people waiting at the curb and the number of vehicles. Consistent with previous research, males crossed on red much more than females did, regardless of religiosity and location. Our discussion focuses on theoretical and practical explanations of the findings.

  17. Drivers' perceptions and reactions to roadside memorials.

    PubMed

    Tay, Richard

    2009-07-01

    Despite their growing popularity in North America, little research has been conducted on understanding the effects of roadside memorials on drivers' behaviour. In this study, an online survey of 810 drivers found that public opinions on the policy options as well as drivers' self-reported reactions to the presence of roadside memorials were fairly divided. In addition, an on-road experiment was conducted to examine the short term effects of roadside memorials at two intersections. Our results showed that the number of red light violations was reduced by 16.7% in the 6 weeks after the installation of the mock memorials compared to the 6 weeks before whereas the number of violations at two comparison sites experienced an increase of 16.8%.

  18. Song Perception by Professional Singers and Actors: An MEG Study

    PubMed Central

    Rosslau, Ken; Herholz, Sibylle C.; Knief, Arne; Ortmann, Magdalene; Deuster, Dirk; Schmidt, Claus-Michael; Zehnhoff-Dinnesen, Antoinetteam; Pantev, Christo; Dobel, Christian

    2016-01-01

    The cortical correlates of speech and music perception are essentially overlapping, and the specific effects of different types of training on these networks remain unknown. We compared two groups of vocally trained professionals for music and speech, singers and actors, using recited and sung rhyme sequences from German art songs with semantic and/ or prosodic/melodic violations (i.e. violations of pitch) of the last word, in order to measure the evoked activation in a magnetoencephalographic (MEG) experiment. MEG data confirmed the existence of intertwined networks for the sung and spoken modality in an early time window after word violation. In essence for this early response, higher activity was measured after melodic/prosodic than semantic violations in predominantly right temporal areas. For singers as well as for actors, modality-specific effects were evident in predominantly left-temporal lateralized activity after semantic expectancy violations in the spoken modality, and right-dominant temporal activity in response to melodic violations in the sung modality. As an indication of a special group-dependent audiation process, higher neuronal activity for singers appeared in a late time window in right temporal and left parietal areas, both after the recited and the sung sequences. PMID:26863437

  19. Economic-Oriented Stochastic Optimization in Advanced Process Control of Chemical Processes

    PubMed Central

    Dobos, László; Király, András; Abonyi, János

    2012-01-01

    Finding the optimal operating region of chemical processes is an inevitable step toward improving economic performance. Usually the optimal operating region is situated close to process constraints related to product quality or process safety requirements. Higher profit can be realized only by assuring a relatively low frequency of violation of these constraints. A multilevel stochastic optimization framework is proposed to determine the optimal setpoint values of control loops with respect to predetermined risk levels, uncertainties, and costs of violation of process constraints. The proposed framework is realized as direct search-type optimization of Monte-Carlo simulation of the controlled process. The concept is illustrated throughout by a well-known benchmark problem related to the control of a linear dynamical system and the model predictive control of a more complex nonlinear polymerization process. PMID:23213298

  20. Realistic noise-tolerant randomness amplification using finite number of devices.

    PubMed

    Brandão, Fernando G S L; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna

    2016-04-21

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology.

  1. Realistic noise-tolerant randomness amplification using finite number of devices

    NASA Astrophysics Data System (ADS)

    Brandão, Fernando G. S. L.; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna

    2016-04-01

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology.

  2. Probing neutrino coupling to a light scalar with coherent neutrino scattering

    NASA Astrophysics Data System (ADS)

    Farzan, Yasaman; Lindner, Manfred; Rodejohann, Werner; Xu, Xun-Jie

    2018-05-01

    Large neutrino event numbers in future experiments measuring coherent elastic neutrino nucleus scattering allow precision measurements of standard and new physics. We analyze the current and prospective limits of a light scalar particle coupling to neutrinos and quarks, using COHERENT and CONUS as examples. Both lepton number conserving and violating interactions are considered. It is shown that current (future) experiments can probe for scalar masses of a few MeV couplings down to the level of 10-4 (10-6). Scalars with masses around the neutrino energy allow to determine their mass via a characteristic spectrum shape distortion. Our present and future limits are compared with constraints from supernova evolution, Big Bang nucleosynthesis and neutrinoless double beta decay. We also outline UV-complete underlying models that include a light scalar with coupling to quarks for both lepton number violating and conserving coupling to neutrinos.

  3. Realistic noise-tolerant randomness amplification using finite number of devices

    PubMed Central

    Brandão, Fernando G. S. L.; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna

    2016-01-01

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology. PMID:27098302

  4. Cognitive Constraints and Island Effects

    PubMed Central

    Hofmeister, Philip; Sag, Ivan A.

    2012-01-01

    Competence-based theories of island effects play a central role in generative grammar, yet the graded nature of many syntactic islands has never been properly accounted for. Categorical syntactic accounts of island effects have persisted in spite of a wealth of data suggesting that island effects are not categorical in nature and that non-structural manipulations that leave island structures intact can radically alter judgments of island violations. We argue here, building on work by Deane, Kluender, and others, that processing factors have the potential to account for this otherwise unexplained variation in acceptability judgments. We report the results of self-paced reading experiments and controlled acceptability studies which explore the relationship between processing costs and judgments of acceptability. In each of the three self-paced reading studies, the data indicate that the processing cost of different types of island violations can be significantly reduced to a degree comparable to that of non-island filler-gap constructions by manipulating a single non-structural factor. Moreover, this reduction in processing cost is accompanied by significant improvements in acceptability. This evidence favors the hypothesis that island-violating constructions involve numerous processing pressures that aggregate to drive processing difficulty above a threshold so that a perception of unacceptability ensues. We examine the implications of these findings for the grammar of filler-gap dependencies.* PMID:22661792

  5. Pollution Prevention in Air Force System Acquisition Programs

    DTIC Science & Technology

    1994-09-01

    Audits Number of Facility Audits 12. Chemical Spill Prevention Measures Number of Measures 13. Unresolved Notices of Violation Number of Open Notices...14. Air Force Environmental Audit Findings Number of Open Findings 15. Awareness / Information Tools Number of New Tools 16. Environmental Training...building thirty-six aircraft (FY94 budget) to be delivered in 1995-1996. The latest audited cost data that can be used in the negotiations ends in

  6. 31 CFR 1021.410 - Additional records to be made and retained by casinos.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... name, permanent address, and social security number of the person involved. Where the deposit, account..., and social security number of each person having a financial interest in the deposit, account or line... been unable to secure the required social security number, it shall not be deemed to be in violation of...

  7. 31 CFR 1021.410 - Additional records to be made and retained by casinos.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... name, permanent address, and social security number of the person involved. Where the deposit, account..., and social security number of each person having a financial interest in the deposit, account or line... been unable to secure the required social security number, it shall not be deemed to be in violation of...

  8. 31 CFR 1021.410 - Additional records to be made and retained by casinos.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... name, permanent address, and social security number of the person involved. Where the deposit, account..., and social security number of each person having a financial interest in the deposit, account or line... been unable to secure the required social security number, it shall not be deemed to be in violation of...

  9. 31 CFR 1021.410 - Additional records to be made and retained by casinos.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... name, permanent address, and social security number of the person involved. Where the deposit, account..., and social security number of each person having a financial interest in the deposit, account or line... been unable to secure the required social security number, it shall not be deemed to be in violation of...

  10. Is dissonance reduction a special case of fluid compensation? Evidence that dissonant cognitions cause compensatory affirmation and abstraction.

    PubMed

    Randles, Daniel; Inzlicht, Michael; Proulx, Travis; Tullett, Alexa M; Heine, Steven J

    2015-05-01

    Cognitive dissonance theory shares much in common with other perspectives that address anomalies, uncertainty, and general expectancy violations. This has led some theorists to argue that these theories represent overlapping psychological processes. If responding to dissonance and uncertainty occurs through a common psychological process, one should expect that the behavioral outcomes of feeling uncertain would also apply to feelings of dissonance, and vice versa. One specific prediction from the meaning maintenance model would be that cognitive dissonance, like other expectancy violations, should lead to the affirmation of unrelated beliefs, or the abstraction of unrelated schemas when the dissonant event cannot be easily accommodated. This article presents 4 studies (N = 1124) demonstrating that the classic induced-compliance dissonance paradigm can lead not only to a change of attitudes (dissonance reduction), but also to (a) an increased reported belief in God (Study 2), (b) a desire to punish norm-violators (Study 1 and 3), (c) a motivation to detect patterns amid noise (Study 3), and (d) polarizing support of public policies among those already biased toward a particular side (Study 4). These results are congruent with theories that propose content-general fluid compensation following the experience of anomaly, a finding not predicted by dissonance theory. The results suggest that dissonance reduction behaviors may share psychological processes described by other theories addressing violations of expectations. (c) 2015 APA, all rights reserved).

  11. Brain signatures of early lexical and morphological learning of a new language.

    PubMed

    Havas, Viktória; Laine, Matti; Rodríguez Fornells, Antoni

    2017-07-01

    Morphology is an important part of language processing but little is known about how adult second language learners acquire morphological rules. Using a word-picture associative learning task, we have previously shown that a brief exposure to novel words with embedded morphological structure (suffix for natural gender) is enough for language learners to acquire the hidden morphological rule. Here we used this paradigm to study the brain signatures of early morphological learning in a novel language in adults. Behavioural measures indicated successful lexical (word stem) and morphological (gender suffix) learning. A day after the learning phase, event-related brain potentials registered during a recognition memory task revealed enhanced N400 and P600 components for stem and suffix violations, respectively. An additional effect observed with combined suffix and stem violations was an enhancement of an early N2 component, most probably related to conflict-detection processes. Successful morphological learning was also evident in the ERP responses to the subsequent rule-generalization task with new stems, where violation of the morphological rule was associated with an early (250-400ms) and late positivity (750-900ms). Overall, these findings tend to converge with lexical and morphosyntactic violation effects observed in L1 processing, suggesting that even after a short exposure, adult language learners can acquire both novel words and novel morphological rules. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Diagnostic tools for mixing models of stream water chemistry

    USGS Publications Warehouse

    Hooper, Richard P.

    2003-01-01

    Mixing models provide a useful null hypothesis against which to evaluate processes controlling stream water chemical data. Because conservative mixing of end‐members with constant concentration is a linear process, a number of simple mathematical and multivariate statistical methods can be applied to this problem. Although mixing models have been most typically used in the context of mixing soil and groundwater end‐members, an extension of the mathematics of mixing models is presented that assesses the “fit” of a multivariate data set to a lower dimensional mixing subspace without the need for explicitly identified end‐members. Diagnostic tools are developed to determine the approximate rank of the data set and to assess lack of fit of the data. This permits identification of processes that violate the assumptions of the mixing model and can suggest the dominant processes controlling stream water chemical variation. These same diagnostic tools can be used to assess the fit of the chemistry of one site into the mixing subspace of a different site, thereby permitting an assessment of the consistency of controlling end‐members across sites. This technique is applied to a number of sites at the Panola Mountain Research Watershed located near Atlanta, Georgia.

  13. Stashing the stops in multijet events at the LHC

    NASA Astrophysics Data System (ADS)

    Diglio, Sara; Feligioni, Lorenzo; Moultaka, Gilbert

    2017-09-01

    While the presence of a light stop is increasingly disfavored by the experimental limits set on R-parity conserving scenarios, the naturalness of supersymmetry could still be safely concealed in the more challenging final states predicted by the existence of non-null R-parity violating couplings. Although R-parity violating signatures are extensively looked for at the Large Hadron Collider, these searches mostly assume 100% branching ratios for the direct decays of supersymmetric particles into Standard Model ones. In this paper we scrutinize the implications of relaxing this assumption by focusing on one motivated scenario where the lightest stop is heavier than a chargino and a neutralino. Considering a class of R-parity baryon number violating couplings, we show on general grounds that while the direct decay of the stop into Standard Model particles is dominant for large values of these couplings, smaller values give rise, instead, to the dominance of a plethora of longer decay chains and richer final states that have been so far barely analyzed at the LHC, thus weakening the impact of the present experimental stop mass limits. We characterize the case for R-parity baryon number violating couplings in the 10-7-10-1 range, in two different benchmark points scenarios within the model-independent setting of the low-energy phenomenological Minimal Supersymmetric Standard Model. We identify the different relevant experimental signatures from stop pair production and decays, estimate the corresponding proton-proton cross sections at √{s }=14 TeV and discuss signal versus background issues.

  14. Search for nucleon decays induced by GUT magnetic monopoles with the MACRO experiment

    NASA Astrophysics Data System (ADS)

    Ambrosio, M.; Antolini, R.; Auriemma, G.; Bakari, D.; Baldini, A.; Barbarino, G. C.; Barish, B. C.; Battistoni, G.; Becherini, Y.; Bellotti, R.; Bemporad, C.; Bernardini, P.; Bilokon, H.; Bloise, C.; Bower, C.; Brigida, M.; Bussino, S.; Cafagna, F.; Calicchio, M.; Campana, D.; Carboni, M.; Caruso, R.; Cecchini, S.; Cei, F.; Chiarella, V.; Choudhary, B. C.; Coutu, S.; Cozzi, M.; de Cataldo, G.; Dekhissi, H.; de Marzo, C.; de Mitri, I.; Derkaoui, J.; de Vincenzi, M.; di Credico, A.; Erriquez, O.; Favuzzi, C.; Forti, C.; Fusco, P.; Giacomelli, G.; Giannini, G.; Giglietto, N.; Giorgini, M.; Grassi, M.; Grillo, A.; Guarino, F.; Gustavino, C.; Habig, A.; Hanson, K.; Heinz, R.; Iarocci, E.; Katsavounidis, E.; Katsavounidis, I.; Kearns, E.; Kim, H.; Kyriazopoulou, S.; Lamanna, E.; Lane, C.; Levin, D. S.; Lipari, P.; Longley, N. P.; Longo, M. J.; Loparco, F.; Maaroufi, F.; Mancarella, G.; Mandrioli, G.; Manzoor, S.; Margiotta, A.; Marini, A.; Martello, D.; Marzari-Chiesa, A.; Mazziotta, M. N.; Michael, D. G.; Monacelli, P.; Montaruli, T.; Monteno, M.; Mufson, S.; Musser, J.; Nicolò, D.; Nolty, R.; Orth, C.; Osteria, G.; Palamara, O.; Patera, V.; Patrizii, L.; Pazzi, R.; Peck, C. W.; Perrone, L.; Petrera, S.; Pistilli, P.; Popa, V.; Rainò, A.; Reynoldson, J.; Ronga, F.; Rrhioua, A.; Satriano, C.; Scapparone, E.; Scholberg, K.; Sciubba, A.; Serra, P.; Sioli, M.; Sirri, G.; Sitta, M.; Spinelli, P.; Spinetti, M.; Spurio, M.; Steinberg, R.; Stone, J. L.; Sulak, L. R.; Surdo, A.; Tarlè, G.; Togo, V.; Vakili, M.; Walter, C. W.; Webb, R.

    2002-12-01

    The interaction of a Grand Unification Magnetic Monopole with a nucleon can lead to a barion-number violating process in which the nucleon decays into a lepton and one or more mesons (catalysis of nucleon decay). In this paper we report an experimental study of the effects of a catalysis process in the MACRO detector. Using a dedicated analysis we obtain new magnetic monopole (MM) flux upper limits at the level of \\char1263\\cdot 10^{-16} cm^{-2} s^{-1} sr^{-1} for 1.1\\cdot 10^{-4} le \\vertβ\\vert le 5\\cdot 10^{-3}, based on the search for catalysis events in the MACRO data. We also analyze the dependence of the MM flux limit on the catalysis cross section.

  15. Vacuum Cherenkov radiation for Lorentz-violating fermions

    NASA Astrophysics Data System (ADS)

    Schreck, M.

    2017-11-01

    The current work focuses on the process of vacuum Cherenkov radiation for Lorentz-violating fermions that are described by the minimal standard-model extension (SME). To date, most considerations of this important hypothetical process have been restricted to Lorentz-violating photons, as the necessary theoretical tools for the SME fermion sector have not been available. With their development in a very recent paper, we are now in a position to compute the decay rates based on a modified Dirac theory. Two realizations of the Cherenkov process are studied. In the first scenario, the spin projection of the incoming fermion is assumed to be conserved, and in the second, the spin projection is allowed to flip. The first type of process is shown to be still forbidden for the dimensionful a and b coefficients where there are strong indications that it is energetically disallowed for the H coefficients, as well. However, it is rendered possible for the dimensionless c , d , e , f , and g coefficients. For large initial fermion energies, the decay rates for the c and d coefficients were found to grow linearly with momentum and to be linearly suppressed by the smallness of the Lorentz-violating coefficient where for the e , f , and g coefficients this suppression is even quadratic. The decay rates vanish in the vicinity of the threshold, as expected. The decay including a fermion spin-flip plays a role for the spin-nondegenerate operators and it was found to occur for the dimensionful b and H coefficients as well as for the dimensionless d and g . The characteristics of this process differ much from the properties of the spin-conserving one, e.g., there is no threshold. Based on experimental data of ultra-high-energy cosmic rays, new constraints on Lorentz violation in the quark sector are obtained from the thresholds. However, it does not seem to be possible to derive bounds from the spin-flip decays. This work reveals the usefulness of the quantum field theoretic methods recently developed to study the phenomenology of high-energy fermions within the framework of the SME.

  16. An Iterative, Mixed Usability Approach Applied to the Telekit System from the Danish TeleCare North Trial

    PubMed Central

    Schaarup, Clara; Hejlesen, Ole Kristian

    2016-01-01

    Objective. The aim of the present study is to evaluate the usability of the telehealth system, coined Telekit, by using an iterative, mixed usability approach. Materials and Methods. Ten double experts participated in two heuristic evaluations (HE1, HE2), and 11 COPD patients attended two think-aloud tests. The double experts identified usability violations and classified them into Jakob Nielsen's heuristics. These violations were then translated into measurable values on a scale of 0 to 4 indicating degree of severity. In the think-aloud tests, COPD participants were invited to verbalise their thoughts. Results. The double experts identified 86 usability violations in HE1 and 101 usability violations in HE2. The majority of the violations were rated in the 0–2 range. The findings from the think-aloud tests resulted in 12 themes and associated examples regarding the usability of the Telekit system. The use of the iterative, mixed usability approach produced both quantitative and qualitative results. Conclusion. The iterative, mixed usability approach yields a strong result owing to the high number of problems identified in the tests because the double experts and the COPD participants focus on different aspects of Telekit's usability. This trial is registered with Clinicaltrials.gov, NCT01984840, November 14, 2013. PMID:27974888

  17. Asymptotically optimal data analysis for rejecting local realism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Yanbao; Applied and Computational Mathematics Division, National Institute of Standards and Technology, Boulder, Colorado 80305; Glancy, Scott

    2011-12-15

    Reliable experimental demonstrations of violations of local realism are highly desirable for fundamental tests of quantum mechanics. One can quantify the violation witnessed by an experiment in terms of a statistical p value, which can be defined as the maximum probability according to local realism of a violation at least as high as that witnessed. Thus, high violation corresponds to small p value. We propose a prediction-based-ratio (PBR) analysis protocol whose p values are valid even if the prepared quantum state varies arbitrarily and local realistic models can depend on previous measurement settings and outcomes. It is therefore not subjectmore » to the memory loophole [J. Barrett et al., Phys. Rev. A 66, 042111 (2002)]. If the prepared state does not vary in time, the p values are asymptotically optimal. For comparison, we consider protocols derived from the number of standard deviations of violation of a Bell inequality and from martingale theory [R. Gill, e-print arXiv:quant-ph/0110137]. We find that the p values of the former can be too small and are therefore not statistically valid, while those derived from the latter are suboptimal. PBR p values do not require a predetermined Bell inequality and can be used to compare results from different tests of local realism independent of experimental details.« less

  18. Automated survey of 8000 plan checks at eight facilities.

    PubMed

    Halabi, Tarek; Lu, Hsiao-Ming; Bernard, Damian A; Chu, James C H; Kirk, Michael C; Hamilton, Russell J; Lei, Yu; Driewer, Joseph

    2016-09-01

    To identify policy and system related weaknesses in treatment planning and plan check work-flows. The authors' web deployed plan check automation solution, PlanCheck, which works with all major planning and record and verify systems (demonstrated here for mosaiq only), allows them to compute violation rates for a large number of plan checks across many facilities without requiring the manual data entry involved with incident filings. Workflows and failure modes are heavily influenced by the type of record and verify system used. Rather than tackle multiple record and verify systems at once, the authors restricted the present survey to mosaiq facilities. Violations were investigated by sending inquiries to physicists running the program. Frequent violations included inadequate tracking in the record and verify system of total and prescription doses. Infrequent violations included incorrect setting of patient orientation in the record and verify system. Peaks in the distribution, over facilities, of violation frequencies pointed to suboptimal policies at some of these facilities. Correspondence with physicists often revealed incomplete knowledge of settings at their facility necessary to perform thorough plan checks. The survey leads to the identification of specific and important policy and system deficiencies that include: suboptimal timing of initial plan checks, lack of communication or agreement on conventions surrounding prescription definitions, and lack of automation in the transfer of some parameters.

  19. An Iterative, Mixed Usability Approach Applied to the Telekit System from the Danish TeleCare North Trial.

    PubMed

    Lilholt, Pernille Heyckendorff; Schaarup, Clara; Hejlesen, Ole Kristian

    2016-01-01

    Objective . The aim of the present study is to evaluate the usability of the telehealth system, coined Telekit, by using an iterative, mixed usability approach. Materials and Methods . Ten double experts participated in two heuristic evaluations (HE1, HE2), and 11 COPD patients attended two think-aloud tests. The double experts identified usability violations and classified them into Jakob Nielsen's heuristics. These violations were then translated into measurable values on a scale of 0 to 4 indicating degree of severity. In the think-aloud tests, COPD participants were invited to verbalise their thoughts. Results . The double experts identified 86 usability violations in HE1 and 101 usability violations in HE2. The majority of the violations were rated in the 0-2 range. The findings from the think-aloud tests resulted in 12 themes and associated examples regarding the usability of the Telekit system. The use of the iterative, mixed usability approach produced both quantitative and qualitative results. Conclusion . The iterative, mixed usability approach yields a strong result owing to the high number of problems identified in the tests because the double experts and the COPD participants focus on different aspects of Telekit's usability. This trial is registered with Clinicaltrials.gov, NCT01984840, November 14, 2013.

  20. Violation of lepton flavor and lepton flavor universality in rare kaon decays

    DOE PAGES

    Crivellin, Andreas; D'Ambrosio, Giancarlo; Hoferichter, Martin; ...

    2016-04-29

    Here, recent anomalies in the decays of B mesons and the Higgs boson provide hints towards lepton flavor (universality) violating physics beyond the Standard Model. We observe that four-fermion operators which can explain the B-physics anomalies have corresponding analogs in the kaon sector, and we analyze their impact on K→πℓℓ' and K→ℓℓ' decays (ℓ=μ,e). For these processes, we note the corresponding physics opportunities at the NA62 experiment. In particular, assuming minimal flavor violation, we comment on the required improvements in sensitivity necessary to test the B-physics anomalies in the kaon sector.

  1. Testing minimal flavor violation in leptoquark models of the {R_K}{^{(\\ast )}} anomaly

    NASA Astrophysics Data System (ADS)

    Aloni, Daniel; Dery, Avital; Frugiuele, Claudia; Nir, Yosef

    2017-11-01

    The {R_K}{^{(\\ast )}} anomaly can be explained by tree level exchange of leptoquarks. We study the consequences of subjecting these models to the principle of minimal flavor violation (MFV). We consider MFV in the linear regime, and take the charged lepton Yukawa matrix to be the only spurion that violates lepton flavor universality. We find that a combination of constraints from a variety of processes — b → sμμ, b → sττ , b → sνν, b\\overline{b}\\to τ τ and b → cτν — excludes MFV in these models.

  2. Brain Mechanisms Supporting Violated Expectations of Pain

    PubMed Central

    Zeidan, Fadel; Lobanov, Oleg V.; Kraft, Robert A.; Coghill, Robert C.

    2015-01-01

    The subjective experience of pain is influenced by interactions between prior experiences, future predictions and incoming afferent information. Expectations of high pain can exacerbate pain while expectations of low pain during a consistently noxious stimulus can produce significant reductions in pain. However, the brain mechanisms associated with processing mismatches between expected and experienced pain are poorly understood, but are important for imparting salience to a sensory event in order to override erroneous top-down expectancy-mediated information. The present investigation examined pain-related brain activation when expectations of pain were abruptly violated. After conditioning participants to cues predicting low or high pain, ten incorrectly cued stimuli were administered across 56 stimulus trials to determine if expectations would be less influential on pain when there is a high discordance between pre-stimulus cues and corresponding thermal stimulation. Incorrectly cued stimuli produced pain ratings and pain-related brain activation consistent with placebo analgesia, nocebo hyperalgesia, and violated expectations. Violated expectations of pain were associated with activation in distinct regions of the inferior parietal lobe, including the supramarginal and angular gyrus, and intraparietal sulcus, the superior parietal lobe, cerebellum and occipital lobe. Thus, violated expectations of pain engage mechanisms supporting salience-driven sensory discrimination, working memory, and associative learning processes. By overriding the influence of expectations on pain, these brain mechanisms are likely engaged in clinical situations where patients’ unrealistic expectations for pain relief diminish the efficacy of pain treatments. Accordingly, these findings underscore the importance of maintaining realistic expectations to augment the effectiveness of pain management. PMID:26083664

  3. DNA data in criminal procedure in the European fundamental rights context.

    PubMed

    Soleto, Helena

    2014-01-01

    Despite being one of the most useful and reliable identification tools, DNA profiling in criminal procedure balances on the border between the limitation and violation of Fundamental Rights that can occur beginning with the collection of the sample, its analysis, and its use; and ending with its processing. Throughout this complex process, violation of human or fundamental rights -such as the right to physical and moral integrity, the right not to be subject to degrading treatment, the right not to incriminate oneself, the right to family privacy together with that of not incriminating descendants or relatives in general, the right to personal development and the right to informative self-determination- is possible. This article presents an analysis of all the above-mentioned DNA treating phases in criminal process in the light of possible violations of some Fundamental Rights, while at the same time discarding some of them on the basis of European human rights protection standards. As the case-law of the European Court of Human Rights shows, the legislation on DNA collection and DNA related data processing or its implementation does not always respect all human rights and should be carefully considered before its adoption and during its application.

  4. Limit on the radiative neutrinoless double electron capture of ^{36}Ar from GERDA Phase I

    NASA Astrophysics Data System (ADS)

    Agostini, M.; Allardt, M.; Bakalyarov, A. M.; Balata, M.; Barabanov, I.; Barros, N.; Baudis, L.; Bauer, C.; Bellotti, E.; Belogurov, S.; Belyaev, S. T.; Benato, G.; Bettini, A.; Bezrukov, L.; Bode, T.; Borowicz, D.; Brudanin, V.; Brugnera, R.; Caldwell, A.; Cattadori, C.; Chernogorov, A.; D'Andrea, V.; Demidova, E. V.; di Vacri, A.; Domula, A.; Doroshkevich, E.; Egorov, V.; Falkenstein, R.; Fedorova, O.; Freund, K.; Frodyma, N.; Gangapshev, A.; Garfagnini, A.; Gooch, C.; Grabmayr, P.; Gurentsov, V.; Gusev, K.; Hakenmüller, J.; Hegai, A.; Heisel, M.; Hemmer, S.; Heusser, G.; Hofmann, W.; Hult, M.; Inzhechik, L. V.; Csáthy, J. Janicskó; Jochum, J.; Junker, M.; Kazalov, V.; Kihm, T.; Kirpichnikov, I. V.; Kirsch, A.; Kish, A.; Klimenko, A.; Kneißl, R.; Knöpfle, K. T.; Kochetov, O.; Kornoukhov, V. N.; Kuzminov, V. V.; Laubenstein, M.; Lazzaro, A.; Lebedev, V. I.; Lehnert, B.; Liao, H. Y.; Lindner, M.; Lippi, I.; Lubashevskiy, A.; Lubsandorzhiev, B.; Lutter, G.; Macolino, C.; Majorovits, B.; Maneschg, W.; Medinaceli, E.; Miloradovic, M.; Mingazheva, R.; Misiaszek, M.; Moseev, P.; Nemchenok, I.; Palioselitis, D.; Panas, K.; Pandola, L.; Pelczar, K.; Pullia, A.; Riboldi, S.; Rumyantseva, N.; Sada, C.; Salamida, F.; Salathe, M.; Schmitt, C.; Schneider, B.; Schönert, S.; Schreiner, J.; Schütz, A.-K.; Schulz, O.; Schwingenheuer, B.; Selivanenko, O.; Shirchenko, M.; Simgen, H.; Smolnikov, A.; Stanco, L.; Stepaniuk, M.; Vanhoefer, L.; Vasenko, A. A.; Veresnikova, A.; von Sturm, K.; Wagner, V.; Walter, M.; Wegmann, A.; Wester, T.; Wiesinger, C.; Wilsenach, H.; Wojcik, M.; Yanovich, E.; Zhitnikov, I.; Zhukov, S. V.; Zinatulina, D.; Zuber, K.; Zuzel, G.

    2016-12-01

    Neutrinoless double electron capture is a process that, if detected, would give evidence of lepton number violation and the Majorana nature of neutrinos. A search for neutrinoless double electron capture of ^{36}Ar has been performed with germanium detectors installed in liquid argon using data from Phase I of the GERmanium Detector Array ( Gerda) experiment at the Gran Sasso Laboratory of INFN, Italy. No signal was observed and an experimental lower limit on the half-life of the radiative neutrinoless double electron capture of ^{36}Ar was established: T_{1/2} > 3.6 × 10^{21} years at 90% CI.

  5. Limit on the radiative neutrinoless double electron capture of 36Ar from GERDA Phase I

    DOE PAGES

    Agostini, M.; Allardt, M.; Bakalyarov, A. M.; ...

    2016-11-28

    Neutrinoless double electron capture is a process that, if detected, would give evidence of lepton number violation and the Majorana nature of neutrinos. Here, a search for neutrinoless double electron capture of 36Ar has been performed with germanium detectors installed in liquid argon using data from Phase I of the GERmanium Detector Array (Gerda) experiment at the Gran Sasso Laboratory of INFN, Italy. No signal was observed and an experimental lower limit on the half-life of the radiative neutrinoless double electron capture of 36 Ar was established: T 1/2 > 3.6 × 10 21 years at 90% CI.

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pugliese, D.; Stuchlík, Z., E-mail: d.pugliese.physics@gmail.com, E-mail: zdenek.stuchlik@physics.cz

    We analyze the possibility that several instability points may be formed, due to the Paczyński mechanism of violation of mechanical equilibrium, in the orbiting matter around a supermassive Kerr black hole. We consider a recently proposed model of a ringed accretion disk, made up by several tori (rings) that can be corotating or counter-rotating relative to the Kerr attractor due to the history of the accretion process. Each torus is governed by the general relativistic hydrodynamic Boyer condition of equilibrium configurations of rotating perfect fluids. We prove that the number of the instability points is generally limited and depends onmore » the dimensionless spin of the rotating attractor.« less

  7. Factors associated with intern noncompliance with the 2003 Accreditation Council for Graduate Medical Education’s 30-hour duty period requirement

    PubMed Central

    2012-01-01

    Background In 2003 the Accreditation Council for Graduate Medical Education mandated work hour restrictions. Violations can results in a residency program being cited or placed on probation. Recurrent violations could results in loss of accreditation. We wanted to determine specific intern and workload factors associated with violation of a specific mandate, the 30-hour duty period requirement. Methods Retrospective review of interns’ performance against the 30-hour duty period requirement during inpatient ward rotations at a pediatric residency program between June 24, 2008 and June 23, 2009. The analytical plan included both univariate and multivariable logistic regression analyses. Results Twenty of the 26 (77%) interns had 80 self-reported episodes of continuous work hours greater than 30 hours. In multivariable analysis, noncompliance was inversely associated with the number of prior inpatient rotations (odds ratio: 0.49, 95% confidence interval (0.38, 0.64) per rotation) but directly associated with the total number of patients (odds ratio: 1.30 (1.10, 1.53) per additional patient). The number of admissions on-call, number of admissions after midnight and number of discharges post-call were not significantly associated with noncompliance. The level of noncompliance also varied significantly between interns after accounting for intern experience and workload factors. Subject to limitations in statistical power, we were unable to identify specific intern characteristics, such as demographic variables or examination scores, which account for the variation in noncompliance between interns. Conclusions Both intern and workload factors were associated with pediatric intern noncompliance with the 30-hour duty period requirement during inpatient ward rotations. Residency programs must develop information systems to understand the individual and experience factors associated with noncompliance and implement appropriate interventions to ensure compliance with the duty hour regulations. PMID:22621439

  8. Factors associated with intern noncompliance with the 2003 Accreditation Council for Graduate Medical Education's 30-hour duty period requirement.

    PubMed

    Maloney, Christopher G; Antommaria, Armand H Matheny; Bale, James F; Ying, Jian; Greene, Tom; Srivastava, Rajendu

    2012-07-13

    In 2003 the Accreditation Council for Graduate Medical Education mandated work hour restrictions. Violations can results in a residency program being cited or placed on probation. Recurrent violations could results in loss of accreditation. We wanted to determine specific intern and workload factors associated with violation of a specific mandate, the 30-hour duty period requirement. Retrospective review of interns' performance against the 30-hour duty period requirement during inpatient ward rotations at a pediatric residency program between June 24, 2008 and June 23, 2009. The analytical plan included both univariate and multivariable logistic regression analyses. Twenty of the 26 (77%) interns had 80 self-reported episodes of continuous work hours greater than 30 hours. In multivariable analysis, noncompliance was inversely associated with the number of prior inpatient rotations (odds ratio: 0.49, 95% confidence interval (0.38, 0.64) per rotation) but directly associated with the total number of patients (odds ratio: 1.30 (1.10, 1.53) per additional patient). The number of admissions on-call, number of admissions after midnight and number of discharges post-call were not significantly associated with noncompliance. The level of noncompliance also varied significantly between interns after accounting for intern experience and workload factors. Subject to limitations in statistical power, we were unable to identify specific intern characteristics, such as demographic variables or examination scores, which account for the variation in noncompliance between interns. Both intern and workload factors were associated with pediatric intern noncompliance with the 30-hour duty period requirement during inpatient ward rotations. Residency programs must develop information systems to understand the individual and experience factors associated with noncompliance and implement appropriate interventions to ensure compliance with the duty hour regulations.

  9. Beyond Gender Stereotypes in Language Comprehension: Self Sex-Role Descriptions Affect the Brain's Potentials Associated with Agreement Processing.

    PubMed

    Canal, Paolo; Garnham, Alan; Oakhill, Jane

    2015-01-01

    We recorded Event-Related Potentials to investigate differences in the use of gender information during the processing of reflexive pronouns. Pronouns either matched the gender provided by role nouns (such as "king" or "engineer") or did not. We compared two types of gender information, definitional information, which is semantic in nature (a mother is female), or stereotypical (a nurse is likely to be female). When they followed definitional role-nouns, gender-mismatching pronouns elicited a P600 effect reflecting a failure in the agreement process. When instead the gender violation occurred after stereotypical role-nouns the Event Related Potential response was biphasic, being positive in parietal electrodes and negative in anterior left electrodes. The use of a correlational approach showed that those participants with more "feminine" or "expressive" self sex-role descriptions showed a P600 response for stereotype violations, suggesting that they experienced the mismatch as an agreement violation; whereas less "expressive" participants showed an Nref effect, indicating more effort spent in linking the pronouns with the possible, although less likely, counter-stereotypical referent.

  10. ARS leptogenesis

    NASA Astrophysics Data System (ADS)

    Drewes, M.; Garbrecht, B.; Hernández, P.; Kekic, M.; Lopez-Pavon, J.; Racker, J.; Rius, N.; Salvado, J.; Teresi, D.

    2018-02-01

    We review the current status of the leptogenesis scenario originally proposed by Akhmedov, Rubakov and Smirnov (ARS). It takes place in the parametric regime where the right-handed neutrinos are at the electroweak scale or below and the CP-violating effects are induced by the coherent superposition of different right-handed mass eigenstates. Two main theoretical approaches to derive quantum kinetic equations, the Hamiltonian time evolution as well as the Closed-Time-Path technique are presented, and we discuss their relations. For scenarios with two right-handed neutrinos, we chart the viable parameter space. Both, a Bayesian analysis, that determines the most likely configurations for viable leptogenesis given different variants of flat priors, and a determination of the maximally allowed mixing between the light, mostly left-handed, and heavy, mostly right-handed, neutrino states are discussed. Rephasing invariants are shown to be a useful tool to classify and to understand various distinct contributions to ARS leptogenesis that can dominate in different parametric regimes. While these analyses are carried out for the parametric regime where initial asymmetries are generated predominantly from lepton-number conserving, but flavor violating effects, we also review the contributions from lepton-number violating operators and identify the regions of parameter space where these are relevant.

  11. Detection and classification of alarm threshold violations in condition monitoring systems working in highly varying operational conditions

    NASA Astrophysics Data System (ADS)

    Strączkiewicz, M.; Barszcz, T.; Jabłoński, A.

    2015-07-01

    All commonly used condition monitoring systems (CMS) enable defining alarm thresholds that enhance efficient surveillance and maintenance of dynamic state of machinery. The thresholds are imposed on the measured values such as vibration-based indicators, temperature, pressure, etc. For complex machinery such as wind turbine (WT) the total number of thresholds might be counted in hundreds multiplied by the number of operational states. All the parameters vary not only due to possible machinery malfunctions, but also due to changes in operating conditions and these changes are typically much stronger than the former ones. Very often, such a behavior may lead to hundreds of false alarms. Therefore, authors propose a novel approach based on parameterized description of the threshold violation. For this purpose the novelty and severity factors are introduced. The first parameter refers to the time of violation occurrence while the second one describes the impact of the indicator-increase to the entire machine. Such approach increases reliability of the CMS by providing the operator with the most useful information of the system events. The idea of the procedure is presented on a simulated data similar to those from a wind turbine.

  12. Distribution of Bell-inequality violation versus multiparty-quantum-correlation measures

    NASA Astrophysics Data System (ADS)

    Sharma, Kunal; Das, Tamoghna; Sen (de), Aditi; Sen, Ujjwal

    Violation of a Bell inequality guarantees the existence of quantum correlations in a shared quantum state. A pure bipartite quantum state, having nonvanishing quantum correlation, always violates a Bell inequality. Such correspondence is absent for multipartite pure quantum states in the case of multipartite correlation function Bell inequalities with two settings at each site. We establish a connection between the monogamy of Bell-inequality violation and multiparty quantum correlations for shared multisite quantum states. We believe that the relation is generic, as it is true for a number of different multisite measures that are defined from radically different perspectives. Precisely, we quantify the multisite-quantum-correlation content in the states by generalized geometric measure, a genuine multisite entanglement measure, as well as three monogamybased multiparty-quantum-correlation measures, viz., 3-tangle, quantum-discord score, and quantum-work-deficit score. We find that generalized Greenberger-Horne-Zeilinger states and another single-parameter family of states, which we refer to as the special Greenberger-Horne-Zeilinger states, have the status of extremal states in such relations.

  13. Note on gauge and gravitational anomalies of discrete Z N symmetries

    NASA Astrophysics Data System (ADS)

    Byakti, Pritibhajan; Ghosh, Diptimoy; Sharma, Tarun

    2018-01-01

    In this note, we discuss the consistency conditions which a discrete Z N symmetry should satisfy in order that it is not violated by gauge and gravitational instantons. As examples, we enlist all the Z N ℛ-symmetries as well as non-ℛ Z N symmetries (N=2,3,4) in the minimally supersymmetric standard model (MSSM) that are free from gauge and gravitational anomalies. We show that there exists non-anomalous discrete symmetries that forbid Baryon number violation up to dimension 6 level (in superspace). We also observe that there exists no non-anomalous Z 3 ℛ-symmetry in the MSSM. Furthermore, we point out that in a theory with one Majorana spin 3/2 gravitino, a large class of Z 4 ℛ-symmetries are violated in the presence of Eguchi-Hanson (EH) gravitational instanton. This is also in general true for higher Z N ℛ-symmetries. We also notice that in 4 dimensional N=1 supergravity, the global U(1) ℛ-symmetry is always violated by the EH instanton irrespective of the matter content of the theory.

  14. Distribution of Bell-inequality violation versus multiparty-quantum-correlation measures

    NASA Astrophysics Data System (ADS)

    Sharma, Kunal; Das, Tamoghna; SenDe, Aditi; Sen, Ujjwal

    2016-06-01

    Violation of a Bell inequality guarantees the existence of quantum correlations in a shared quantum state. A pure bipartite quantum state, having nonvanishing quantum correlation, always violates a Bell inequality. Such correspondence is absent for multipartite pure quantum states in the case of multipartite correlation function Bell inequalities with two settings at each site. We establish a connection between the monogamy of Bell-inequality violation and multiparty quantum correlations for shared multisite quantum states. We believe that the relation is generic, as it is true for a number of different multisite measures that are defined from radically different perspectives. Precisely, we quantify the multisite-quantum-correlation content in the states by generalized geometric measure, a genuine multisite entanglement measure, as well as three monogamy-based multiparty-quantum-correlation measures, viz., 3-tangle, quantum-discord score, and quantum-work-deficit score. We find that generalized Greenberger-Horne-Zeilinger states and another single-parameter family of states, which we refer to as the special Greenberger-Horne-Zeilinger states, have the status of extremal states in such relations.

  15. An Investigation of Demographic and Academic Factors as Predictors of Disproportionate Discretionary In-School Suspensions of Black High School Students

    ERIC Educational Resources Information Center

    Rochelle, Lori Patrice

    2012-01-01

    School districts were faced with numerous lawsuits for violating students' due process rights in the early 1980's. In response, schools began using other disciplinary responses to discipline violators such as in-school suspension (Adams 2000; Hanson 2005). In-school suspension provided a softer and less punitive approach to discipline and allowed…

  16. Parity violation in electron scattering

    DOE PAGES

    Souder, P.; Paschke, K. D.

    2015-12-22

    By comparing the cross sections for left- and right-handed electrons scattered from various unpolarized nuclear targets, the small parity-violating asymmetry can be measured. These asymmetry data probe a wide variety of important topics, including searches for new fundamental interactions and important features of nuclear structure that cannot be studied with other probes. A special feature of these experiments is that the results are interpreted with remarkably few theoretical uncertainties, which justifies pushing the experiments to the highest possible precision. To measure the small asymmetries accurately, a number of novel experimental techniques have been developed.

  17. Search for lepton-flavor violation in the decay tau- --> l- l+ l-.

    PubMed

    Aubert, B; Barate, R; Boutigny, D; Couderc, F; Gaillard, J-M; Hicheur, A; Karyotakis, Y; Lees, J P; Tisserand, V; Zghiche, A; Palano, A; Pompili, A; Chen, J C; Qi, N D; Rong, G; Wang, P; Zhu, Y S; Eigen, G; Ofte, I; Stugu, B; Abrams, G S; Borgland, A W; Breon, A B; Brown, D N; Button-Shafer, J; Cahn, R N; Charles, E; Day, C T; Gill, M S; Gritsan, A V; Groysman, Y; Jacobsen, R G; Kadel, R W; Kadyk, J; Kerth, L T; Kolomensky, Yu G; Kukartsev, G; LeClerc, C; Levi, M E; Lynch, G; Mir, L M; Oddone, P J; Orimoto, T J; Pripstein, M; Roe, N A; Ronan, M T; Shelkov, V G; Telnov, A V; Wenzel, W A; Ford, K; Harrison, T J; Hawkes, C M; Morgan, S E; Watson, A T; Watson, N K; Fritsch, M; Goetzen, K; Held, T; Koch, H; Lewandowski, B; Pelizaeus, M; Steinke, M; Boyd, J T; Chevalier, N; Cottingham, W N; Kelly, M P; Latham, T E; Wilson, F F; Abe, K; Cuhadar-Donszelmann, T; Hearty, C; Mattison, T S; McKenna, J A; Thiessen, D; Kyberd, P; Teodorescu, L; Blinov, V E; Bukin, A D; Druzhinin, V P; Golubev, V B; Ivanchenko, V N; Kravchenko, E A; Onuchin, A P; Serednyakov, S I; Skovpen, Yu I; Solodov, E P; Yushkov, A N; Best, D; Bruinsma, M; Chao, M; Eschrich, I; Kirkby, D; Lankford, A J; Mandelkern, M; Mommsen, R K; Roethel, W; Stoker, D P; Buchanan, C; Hartfiel, B L; Gary, J W; Shen, B C; Wang, K; Del Re, D; Hadavand, H K; Hill, E J; MacFarlane, D B; Paar, H P; Rahatlou, Sh; Sharma, V; Berryhill, J W; Campagnari, C; Dahmes, B; Levy, S L; Long, O; Lu, A; Mazur, M A; Richman, J D; Verkerke, W; Beck, T W; Eisner, A M; Heusch, C A; Lockman, W S; Schalk, T; Schmitz, R E; Schumm, B A; Seiden, A; Spradlin, P; Williams, D C; Wilson, M G; Albert, J; Chen, E; Dubois-Felsmann, G P; Dvoretskii, A; Hitlin, D G; Narsky, I; Piatenko, T; Porter, F C; Ryd, A; Samuel, A; Yang, S; Jayatilleke, S; Mancinelli, G; Meadows, B T; Sokoloff, M D; Abe, T; Blanc, F; Bloom, P; Chen, S; Clark, P J; Ford, W T; Nauenberg, U; Olivas, A; Rankin, P; Smith, J G; Van Hoek, W C; Zhang, L; Harton, J L; Hu, T; Soffer, A; Toki, W H; Wilson, R J; Altenburg, D; Brandt, T; Brose, J; Colberg, T; Dickopp, M; Feltresi, E; Hauke, A; Lacker, H M; Maly, E; Müller-Pfefferkorn, R; Nogowski, R; Otto, S; Schubert, J; Schubert, K R; Schwierz, R; Spaan, B; Bernard, D; Bonneaud, G R; Brochard, F; Grenier, P; Thiebaux, Ch; Vasileiadis, G; Verderi, M; Bard, D J; Khan, A; Lavin, D; Muheim, F; Playfer, S; Andreotti, M; Azzolini, V; Bettoni, D; Bozzi, C; Calabrese, R; Cibinetto, G; Luppi, E; Negrini, M; Sarti, A; Treadwell, E; Baldini-Ferroli, R; Calcaterra, A; De Sangro, R; Finocchiaro, G; Patteri, P; Piccolo, M; Zallo, A; Buzzo, A; Capra, R; Contri, R; Crosetti, G; Lo Vetere, M; Macri, M; Monge, M R; Passaggio, S; Patrignani, C; Robutti, E; Santroni, A; Tosi, S; Bailey, S; Brandenburg, G; Morii, M; Won, E; Dubitzky, R S; Langenegger, U; Bhimji, W; Bowerman, D A; Dauncey, P D; Egede, U; Gaillard, J R; Morton, G W; Nash, J A; Taylor, G P; Grenier, G J; Lee, S-J; Mallik, U; Cochran, J; Crawley, H B; Lamsa, J; Meyer, W T; Prell, S; Rosenberg, E I; Yi, J; Davier, M; Grosdidier, G; Höcker, A; Laplace, S; Le Diberder, F; Lepeltier, V; Lutz, A M; Petersen, T C; Plaszczynski, S; Schune, M H; Tantot, L; Wormser, G; Cheng, C H; Lange, D J; Simani, M C; Wright, D M; Bevan, A J; Coleman, J P; Fry, J R; Gabathuler, E; Gamet, R; Kay, M; Parry, R J; Payne, D J; Sloane, R J; Touramanis, C; Back, J J; Harrison, P F; Mohanty, G B; Brown, C L; Cowan, G; Flack, R L; Flaecher, H U; George, S; Green, M G; Kurup, A; Marker, C E; McMahon, T R; Ricciardi, S; Salvatore, F; Vaitsas, G; Winter, M A; Brown, D; Davis, C L; Allison, J; Barlow, N R; Barlow, R J; Hart, P A; Hodgkinson, M C; Lafferty, G D; Lyon, A J; Williams, J C; Farbin, A; Hulsbergen, W D; Jawahery, A; Kovalskyi, D; Lae, C K; Lillard, V; Roberts, D A; Blaylock, G; Dallapiccola, C; Flood, K T; Hertzbach, S S; Kofler, R; Koptchev, V B; Moore, T B; Saremi, S; Staengle, H; Willocq, S; Cowan, R; Sciolla, G; Taylor, F; Yamamoto, R K; Mangeol, D J J; Patel, P M; Robertson, S H; Lazzaro, A; Palombo, F; Bauer, J M; Cremaldi, L; Eschenburg, V; Godang, R; Kroeger, R; Reidy, J; Sanders, D A; Summers, D J; Zhao, H W; Brunet, S; Côté, D; Taras, P; Nicholson, H; Cartaro, C; Cavallo, N; Fabozzi, F; Gatto, C; Lista, L; Monorchio, D; Paolucci, P; Piccolo, D; Sciacca, C; Baak, M; Raven, G; Wilden, L; Jessop, C P; LoSecco, J M; Gabriel, T A; Allmendinger, T; Brau, B; Gan, K K; Honscheid, K; Hufnagel, D; Kagan, H; Kass, R; Pulliam, T; Ter-Antonyan, R; Wong, Q K; Brau, J; Frey, R; Igonkina, O; Potter, C T; Sinev, N B; Strom, D; Torrence, E; Colecchia, F; Dorigo, A; Galeazzi, F; Margoni, M; Morandin, M; Posocco, M; Rotondo, M; Simonetto, F; Stroili, R; Tiozzo, G; Voci, C; Benayoun, M; Briand, H; Chauveau, J; David, P; de la Vaissière, Ch; Del Buono, L; Hamon, O; John, M J J; Leruste, Ph; Ocariz, J; Pivk, M; Roos, L; T'Jampens, S; Therin, G; Manfredi, P F; Re, V; Behera, P K; Gladney, L; Guo, Q H; Panetta, J; Anulli, F; Biasini, M; Peruzzi, I M; Pioppi, M; Angelini, C; Batignani, G; Bettarini, S; Bondioli, M; Bucci, F; Calderini, G; Carpinelli, M; Del Gamba, V; Forti, F; Giorgi, M A; Lusiani, A; Marchiori, G; Martinez-Vidal, F; Morganti, M; Neri, N; Paoloni, E; Rama, M; Rizzo, G; Sandrelli, F; Walsh, J; Haire, M; Judd, D; Paick, K; Wagoner, D E; Danielson, N; Elmer, P; Lu, C; Miftakov, V; Olsen, J; Smith, A J S; Varnes, E W; Bellini, F; Cavoto, G; Faccini, R; Ferrarotto, F; Ferroni, F; Gaspero, M; Li Gioi, L; Mazzoni, M A; Morganti, S; Pierini, M; Piredda, G; Safai Tehrani, F; Voena, C; Christ, S; Wagner, G; Waldi, R; Adye, T; De Groot, N; Franek, B; Geddes, N I; Gopal, G P; Olaiya, E O; Xella, S M; Aleksan, R; Emery, S; Gaidot, A; Ganzhur, S F; Giraud, P-F; Hamel de Monchenault, G; Kozanecki, W; Langer, M; Legendre, M; London, G W; Mayer, B; Schott, G; Vasseur, G; Yèche, Ch; Zito, M; Purohit, M V; Weidemann, A W; Yumiceva, F X; Aston, D; Bartoldus, R; Berger, N; Boyarski, A M; Buchmueller, O L; Convery, M R; Cristinziani, M; De Nardo, G; Dong, D; Dorfan, J; Dujmic, D; Dunwoodie, W; Elsen, E E; Field, R C; Glanzman, T; Gowdy, S J; Hadig, T; Halyo, V; Hryn'ova, T; Innes, W R; Kelsey, M H; Kim, P; Kocian, M L; Leith, D W G S; Libby, J; Luitz, S; Luth, V; Lynch, H L; Marsiske, H; Messner, R; Muller, D R; O'Grady, C P; Ozcan, V E; Perazzo, A; Perl, M; Petrak, S; Ratcliff, B N; Roodman, A; Salnikov, A A; Schindler, R H; Schwiening, J; Simi, G; Snyder, A; Soha, A; Stelzer, J; Su, D; Sullivan, M K; Va'vra, J; Wagner, S R; Weaver, M; Weinstein, A J R; Wisniewski, W J; Wittgen, M; Wright, D H; Young, C C; Burchat, P R; Edwards, A J; Meyer, T I; Petersen, B A; Roat, C; Ahmed, S; Alam, M S; Ernst, J A; Saeed, M A; Saleem, M; Wappler, F R; Bugg, W; Krishnamurthy, M; Spanier, S M; Eckmann, R; Kim, H; Ritchie, J L; Satpathy, A; Schwitters, R F; Izen, J M; Kitayama, I; Lou, X C; Ye, S; Bianchi, F; Bona, M; Gallo, F; Gamba, D; Borean, C; Bosisio, L; Cossutti, F; Della Ricca, G; Dittongo, S; Grancagnolo, S; Lanceri, L; Poropat, P; Vitale, L; Vuagnin, G; Panvini, R S; Banerjee, Sw; Brown, C M; Fortin, D; Jackson, P D; Kowalewski, R; Roney, J M; Band, H R; Dasu, S; Datta, M; Eichenbaum, A M; Hollar, J J; Johnson, J R; Kutter, P E; Li, H; Liu, R; Di Lodovico, F; Mihalyi, A; Mohapatra, A K; Pan, Y; Prepost, R; Sekula, S J; Tan, P; von Wimmersperg-Toeller, J H; Wu, J; Wu, S L; Yu, Z; Neal, H

    2004-03-26

    A search for the lepton-flavor-violating decay of the tau into three charged leptons has been performed using 91.5 fb(-1) of data collected at an e(+)e(-)center-of-mass energy around 10.58 GeV with the BABAR detector at the SLAC storage ring PEP-II. In all six decay modes considered, the numbers of events found in data are compatible with the background expectations. Upper limits on the branching fractions are set in the range (1-3)x10(-7) at 90% confidence level.

  18. Quantum communication complexity advantage implies violation of a Bell inequality

    PubMed Central

    Buhrman, Harry; Czekaj, Łukasz; Grudka, Andrzej; Horodecki, Michał; Horodecki, Paweł; Markiewicz, Marcin; Speelman, Florian; Strelchuk, Sergii

    2016-01-01

    We obtain a general connection between a large quantum advantage in communication complexity and Bell nonlocality. We show that given any protocol offering a sufficiently large quantum advantage in communication complexity, there exists a way of obtaining measurement statistics that violate some Bell inequality. Our main tool is port-based teleportation. If the gap between quantum and classical communication complexity can grow arbitrarily large, the ratio of the quantum value to the classical value of the Bell quantity becomes unbounded with the increase in the number of inputs and outputs. PMID:26957600

  19. Usability of a patient education and motivation tool using heuristic evaluation.

    PubMed

    Joshi, Ashish; Arora, Mohit; Dai, Liwei; Price, Kathleen; Vizer, Lisa; Sears, Andrew

    2009-11-06

    Computer-mediated educational applications can provide a self-paced, interactive environment to deliver educational content to individuals about their health condition. These programs have been used to deliver health-related information about a variety of topics, including breast cancer screening, asthma management, and injury prevention. We have designed the Patient Education and Motivation Tool (PEMT), an interactive computer-based educational program based on behavioral, cognitive, and humanistic learning theories. The tool is designed to educate users and has three key components: screening, learning, and evaluation. The objective of this tutorial is to illustrate a heuristic evaluation using a computer-based patient education program (PEMT) as a case study. The aims were to improve the usability of PEMT through heuristic evaluation of the interface; to report the results of these usability evaluations; to make changes based on the findings of the usability experts; and to describe the benefits and limitations of applying usability evaluations to PEMT. PEMT was evaluated by three usability experts using Nielsen's usability heuristics while reviewing the interface to produce a list of heuristic violations with severity ratings. The violations were sorted by heuristic and ordered from most to least severe within each heuristic. A total of 127 violations were identified with a median severity of 3 (range 0 to 4 with 0 = no problem to 4 = catastrophic problem). Results showed 13 violations for visibility (median severity = 2), 38 violations for match between system and real world (median severity = 2), 6 violations for user control and freedom (median severity = 3), 34 violations for consistency and standards (median severity = 2), 11 violations for error severity (median severity = 3), 1 violation for recognition and control (median severity = 3), 7 violations for flexibility and efficiency (median severity = 2), 9 violations for aesthetic and minimalist design (median severity = 2), 4 violations for help users recognize, diagnose, and recover from errors (median severity = 3), and 4 violations for help and documentation (median severity = 4). We describe the heuristic evaluation method employed to assess the usability of PEMT, a method which uncovers heuristic violations in the interface design in a quick and efficient manner. Bringing together usability experts and health professionals to evaluate a computer-mediated patient education program can help to identify problems in a timely manner. This makes this method particularly well suited to the iterative design process when developing other computer-mediated health education programs. Heuristic evaluations provided a means to assess the user interface of PEMT.

  20. Usability of a Patient Education and Motivation Tool Using Heuristic Evaluation

    PubMed Central

    Arora, Mohit; Dai, Liwei; Price, Kathleen; Vizer, Lisa; Sears, Andrew

    2009-01-01

    Background Computer-mediated educational applications can provide a self-paced, interactive environment to deliver educational content to individuals about their health condition. These programs have been used to deliver health-related information about a variety of topics, including breast cancer screening, asthma management, and injury prevention. We have designed the Patient Education and Motivation Tool (PEMT), an interactive computer-based educational program based on behavioral, cognitive, and humanistic learning theories. The tool is designed to educate users and has three key components: screening, learning, and evaluation. Objective The objective of this tutorial is to illustrate a heuristic evaluation using a computer-based patient education program (PEMT) as a case study. The aims were to improve the usability of PEMT through heuristic evaluation of the interface; to report the results of these usability evaluations; to make changes based on the findings of the usability experts; and to describe the benefits and limitations of applying usability evaluations to PEMT. Methods PEMT was evaluated by three usability experts using Nielsen’s usability heuristics while reviewing the interface to produce a list of heuristic violations with severity ratings. The violations were sorted by heuristic and ordered from most to least severe within each heuristic. Results A total of 127 violations were identified with a median severity of 3 (range 0 to 4 with 0 = no problem to 4 = catastrophic problem). Results showed 13 violations for visibility (median severity = 2), 38 violations for match between system and real world (median severity = 2), 6 violations for user control and freedom (median severity = 3), 34 violations for consistency and standards (median severity = 2), 11 violations for error severity (median severity = 3), 1 violation for recognition and control (median severity = 3), 7 violations for flexibility and efficiency (median severity = 2), 9 violations for aesthetic and minimalist design (median severity = 2), 4 violations for help users recognize, diagnose, and recover from errors (median severity = 3), and 4 violations for help and documentation (median severity = 4). Conclusion We describe the heuristic evaluation method employed to assess the usability of PEMT, a method which uncovers heuristic violations in the interface design in a quick and efficient manner. Bringing together usability experts and health professionals to evaluate a computer-mediated patient education program can help to identify problems in a timely manner. This makes this method particularly well suited to the iterative design process when developing other computer-mediated health education programs. Heuristic evaluations provided a means to assess the user interface of PEMT. PMID:19897458

  1. Top B physics at the LHC.

    PubMed

    Gedalia, Oram; Isidori, Gino; Maltoni, Fabio; Perez, Gilad; Selvaggi, Michele; Soreq, Yotam

    2013-06-07

    In top-pair events where at least one of the tops decays semileptonically, the identification of the lepton charge allows us to tag not only the top quark charge but also that of the subsequent b quark. In cases where the b also decays semileptonically, the charge of the two leptons can be used to probe CP violation in heavy flavor mixing and decays. This strategy to measure CP violation is independent of those adopted so far in experiments, and can already constrain non standard model sources of CP violation with current and near future LHC data. To demonstrate the potential of this method we construct two CP asymmetries based on same-sign and opposite-sign leptons and estimate their sensitivities. This proposal opens a new window for doing precision measurements of CP violation in b and c quark physics via high p(T) processes at ATLAS and CMS.

  2. Cosmic chirality both true and false.

    PubMed

    Barron, Laurence D

    2012-12-01

    The discrete symmetries of parity P, time reversal T, and charge conjugation C may be used to characterize the properties of chiral systems. It is well known that parity violation infiltrates into ordinary matter via an interaction between the nucleons and electrons, mediated by the Z(0) particle, that lifts the degeneracy of the mirror-image enantiomers of a chiral molecule. Being odd under P but even under T, this P-violating interaction exhibits true chirality and so may induce absolute enantioselection under all circumstances. It has been suggested that CP violation may also infiltrate into ordinary matter via a P-odd, T-odd interaction mediated by the (as yet undetected) axion. This CP-violating interaction exhibits false chirality and so may induce absolute enantioselection in processes far from equilibrium. Both true and false cosmic chirality should be considered together as possible sources of homochirality in the molecules of life. Copyright © 2012 Wiley Periodicals, Inc.

  3. K S 0 - K L 0 asymmetries and CP violation in charmed baryon decays into neutral kaons

    NASA Astrophysics Data System (ADS)

    Wang, Di; Guo, Peng-Fei; Long, Wen-Hui; Yu, Fu-Sheng

    2018-03-01

    We study the K S 0 - K L 0 asymmetries and CP violations in charm-baryon decays with neutral kaons in the final state. The K S 0 - K L 0 asymmetry can be used to search for two-body doubly Cabibbo-suppressed amplitudes of charm-baryon decays, with the one in Λ c + → pK S, L 0 as a promising observable. Besides, it is studied for a new CP-violation effect in these processes, induced by the interference between the Cabibbo-favored and doubly Cabibbo-suppressed amplitudes with the neutral kaon mixing. Once the new CP-violation effect is determined by experiments, the direct CP asymmetry in neutral kaon modes can then be extracted and used to search for new physics. The numerical results based on SU(3) symmetry will be tested by the experiments in the future.

  4. Harm expectancy violation during exposure therapy for posttraumatic stress disorder.

    PubMed

    de Kleine, Rianne A; Hendriks, Lotte; Becker, Eni S; Broekman, Theo G; van Minnen, Agnes

    2017-06-01

    Exposure therapy has proven efficacy in the treatment of posttraumatic stress disorder (PTSD). Emotional processing theory proposes that fear habituation is a central mechanism in symptom reduction, but the empirical evidence supporting this is mixed. Recently it has been proposed that violation of harm expectancies is a crucial mechanism of action in exposure therapy. But to date, changes in harm expectancies have not been examined during exposure therapy in PTSD. The goal of the current study was to examine harm expectancy violation as mechanism of change in exposure therapy for posttraumatic stress disorder (PTSD). Patients (N=50, 44 female) with a primary diagnosis of chronic PTSD received intensive exposure therapy. Harm expectancies, harm experiences and subjective units of distress (SUDs) were assessed at each imaginal exposure session, and PTSD symptoms were assessed pre- and posttreatment with the Clinician Administered PTSD Scale (CAPS). Results showed that harm expectancies were violated within and strongly declined in-between exposure therapy sessions. However, expectancy violation was not related to PTSD symptom change. Fear habituation measures were moderately related to PTSD symptom reductions. In line with theory, exposure therapy promotes expectancy violation in PTSD patients, but this is not related to exposure therapy outcome. More work is warranted to investigate mechanisms of change during exposure therapy in PTSD. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Testing the structure of multipartite entanglement with Bell inequalities.

    PubMed

    Brunner, Nicolas; Sharam, James; Vértesi, Tamás

    2012-03-16

    We show that the rich structure of multipartite entanglement can be tested following a device-independent approach. Specifically we present Bell inequalities for distinguishing between different types of multipartite entanglement, without placing any assumptions on the measurement devices used in the protocol, in contrast with usual entanglement witnesses. We first address the case of three qubits and present Bell inequalities that can be violated by W states but not by Greenberger-Horne-Zeilinger states, and vice versa. Next, we devise 'subcorrelation Bell inequalities' for any number of parties, which can provably not be violated by a broad class of multipartite entangled states (generalizations of Greenberger-Horne-Zeilinger states), but for which violations can be obtained for W states. Our results give insight into the nonlocality of W states. The simplicity and robustness of our tests make them appealing for experiments.

  6. R parity violation from discrete R symmetries

    DOE PAGES

    Chen, Mu-Chun; Ratz, Michael; Takhistov, Volodymyr

    2014-12-15

    We consider supersymmetric extensions of the standard model in which the usual R or matter parity gets replaced by another R or non–R discrete symmetry that explains the observed longevity of the nucleon and solves the µ problem of MSSM. In order to identify suitable symmetries, we develop a novel method of deriving the maximal Z (R) N symmetry that satisfies a given set of constraints. We identify R parity violating (RPV) and conserving models that are consistent with precision gauge unification and also comment on their compatibility with a unified gauge symmetry such as the Pati–Salam group. Finally, wemore » provide a counter– example to the statement found in the recent literature that the lepton number violating RPV scenarios must have µ term and the bilinear κ L Hu operator of comparable magnitude.« less

  7. Neutrinoless double beta decay in chiral effective field theory: lepton number violation at dimension seven

    DOE PAGES

    Cirigliano, V.; Dekens, W.; de Vries, J.; ...

    2017-12-15

    Here, we analyze neutrinoless double beta decay (0νββ) within the framework of the Standard Model Effective Field Theory. Apart from the dimension-five Weinberg operator, the first contributions appear at dimension seven. We classify the operators and evolve them to the electroweak scale, where we match them to effective dimension-six, -seven, and -nine operators. In the next step, after renormalization group evolution to the QCD scale, we construct the chiral Lagrangian arising from these operators. We then develop a power-counting scheme and derive the two-nucleon 0νββ currents up to leading order in the power counting for each lepton-number-violating operator. We arguemore » that the leading-order contribution to the decay rate depends on a relatively small number of nuclear matrix elements. We test our power counting by comparing nuclear matrix elements obtained by various methods and by different groups. We find that the power counting works well for nuclear matrix elements calculated from a specific method, while, as in the case of light Majorana neutrino exchange, the overall magnitude of the matrix elements can differ by factors of two to three between methods. We also calculate the constraints that can be set on dimension-seven lepton-number-violating operators from 0νββ experiments and study the interplay between dimension-five and -seven operators, discussing how dimension-seven contributions affect the interpretation of 0νββ in terms of the effective Majorana mass m ββ .« less

  8. Neutrinoless double beta decay in chiral effective field theory: lepton number violation at dimension seven

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cirigliano, V.; Dekens, W.; de Vries, J.

    Here, we analyze neutrinoless double beta decay (0νββ) within the framework of the Standard Model Effective Field Theory. Apart from the dimension-five Weinberg operator, the first contributions appear at dimension seven. We classify the operators and evolve them to the electroweak scale, where we match them to effective dimension-six, -seven, and -nine operators. In the next step, after renormalization group evolution to the QCD scale, we construct the chiral Lagrangian arising from these operators. We then develop a power-counting scheme and derive the two-nucleon 0νββ currents up to leading order in the power counting for each lepton-number-violating operator. We arguemore » that the leading-order contribution to the decay rate depends on a relatively small number of nuclear matrix elements. We test our power counting by comparing nuclear matrix elements obtained by various methods and by different groups. We find that the power counting works well for nuclear matrix elements calculated from a specific method, while, as in the case of light Majorana neutrino exchange, the overall magnitude of the matrix elements can differ by factors of two to three between methods. We also calculate the constraints that can be set on dimension-seven lepton-number-violating operators from 0νββ experiments and study the interplay between dimension-five and -seven operators, discussing how dimension-seven contributions affect the interpretation of 0νββ in terms of the effective Majorana mass m ββ .« less

  9. Mental disorders and delivery motorcycle drivers (motoboys): a dangerous association.

    PubMed

    Kieling, R R; Szobot, C M; Matte, B; Coelho, R S; Kieling, C; Pechansky, F; Rohde, L A

    2011-01-01

    Low and middle-income countries experience an expressive growth in the number of circulating motorcycles, paralleled by an increasing number of traffic accidents. Delivery motorcycles drivers ("motoboys") are generally perceived as accountable for this scenario. Although traffic accidents have a multivariate etiology, mental disorders, such as substance use disorders (SUD) and attention deficit/hyperactivity disorder (ADHD), are often involved. This paper aims at investigating the prevalence of ADHD, SUD and other mental disorders in a sample of Brazilian motoboys, and additionally, to evaluate the association between psychiatric diagnoses, motorcycle accidents and traffic violation tickets. A convenient sample of subjects was invited to participate in a cross-sectional assessment including an inventory of traffic accidents and violations. Psychiatric diagnoses were based on semi-structured and clinical interviews. A sample of 101 motoboys was assessed. Overall, 75% of subjects had a positive lifetime history of at least one psychiatric disorder. SUD was the most frequent diagnosis (43.6% for alcohol, 39.6% for cannabis). ADHD was associated with a higher number of traffic accidents (p=0.002), and antisocial personality disorder (APD) was associated with a greater number of traffic violations (p=0.007). The prevalence of mental disorders was much higher in our sample than in the general population. ADHD and APD, but not SUD, were associated with negative traffic outcomes. These findings have implications for public mental health planning since mental disorders can be both prevented and treated, improving driving behavior and increasing road safety. Copyright © 2010 Elsevier Masson SAS. All rights reserved.

  10. Distinguishing Fast and Slow Processes in Accuracy - Response Time Data.

    PubMed

    Coomans, Frederik; Hofman, Abe; Brinkhuis, Matthieu; van der Maas, Han L J; Maris, Gunter

    2016-01-01

    We investigate the relation between speed and accuracy within problem solving in its simplest non-trivial form. We consider tests with only two items and code the item responses in two binary variables: one indicating the response accuracy, and one indicating the response speed. Despite being a very basic setup, it enables us to study item pairs stemming from a broad range of domains such as basic arithmetic, first language learning, intelligence-related problems, and chess, with large numbers of observations for every pair of problems under consideration. We carry out a survey over a large number of such item pairs and compare three types of psychometric accuracy-response time models present in the literature: two 'one-process' models, the first of which models accuracy and response time as conditionally independent and the second of which models accuracy and response time as conditionally dependent, and a 'two-process' model which models accuracy contingent on response time. We find that the data clearly violates the restrictions imposed by both one-process models and requires additional complexity which is parsimoniously provided by the two-process model. We supplement our survey with an analysis of the erroneous responses for an example item pair and demonstrate that there are very significant differences between the types of errors in fast and slow responses.

  11. A simulation framework for mapping risks in clinical processes: the case of in-patient transfers.

    PubMed

    Dunn, Adam G; Ong, Mei-Sing; Westbrook, Johanna I; Magrabi, Farah; Coiera, Enrico; Wobcke, Wayne

    2011-05-01

    To model how individual violations in routine clinical processes cumulatively contribute to the risk of adverse events in hospital using an agent-based simulation framework. An agent-based simulation was designed to model the cascade of common violations that contribute to the risk of adverse events in routine clinical processes. Clinicians and the information systems that support them were represented as a group of interacting agents using data from direct observations. The model was calibrated using data from 101 patient transfers observed in a hospital and results were validated for one of two scenarios (a misidentification scenario and an infection control scenario). Repeated simulations using the calibrated model were undertaken to create a distribution of possible process outcomes. The likelihood of end-of-chain risk is the main outcome measure, reported for each of the two scenarios. The simulations demonstrate end-of-chain risks of 8% and 24% for the misidentification and infection control scenarios, respectively. Over 95% of the simulations in both scenarios are unique, indicating that the in-patient transfer process diverges from prescribed work practices in a variety of ways. The simulation allowed us to model the risk of adverse events in a clinical process, by generating the variety of possible work subject to violations, a novel prospective risk analysis method. The in-patient transfer process has a high proportion of unique trajectories, implying that risk mitigation may benefit from focusing on reducing complexity rather than augmenting the process with further rule-based protocols.

  12. First Results from CUORE: A Search for Lepton Number Violation via 0 ν β β Decay of Te 130

    NASA Astrophysics Data System (ADS)

    Alduino, C.; Alessandria, F.; Alfonso, K.; Andreotti, E.; Arnaboldi, C.; Avignone, F. T.; Azzolini, O.; Balata, M.; Bandac, I.; Banks, T. I.; Bari, G.; Barucci, M.; Beeman, J. W.; Bellini, F.; Benato, G.; Bersani, A.; Biare, D.; Biassoni, M.; Bragazzi, F.; Branca, A.; Brofferio, C.; Bryant, A.; Buccheri, A.; Bucci, C.; Bulfon, C.; Camacho, A.; Caminata, A.; Canonica, L.; Cao, X. G.; Capelli, S.; Capodiferro, M.; Cappelli, L.; Cardani, L.; Cariello, M.; Carniti, P.; Carrettoni, M.; Casali, N.; Cassina, L.; Cereseto, R.; Ceruti, G.; Chiarini, A.; Chiesa, D.; Chott, N.; Clemenza, M.; Conventi, D.; Copello, S.; Cosmelli, C.; Cremonesi, O.; Crescentini, C.; Creswick, R. J.; Cushman, J. S.; D'Addabbo, A.; D'Aguanno, D.; Dafinei, I.; Datskov, V.; Davis, C. J.; Del Corso, F.; Dell'Oro, S.; Deninno, M. M.; di Domizio, S.; di Vacri, M. L.; di Paolo, L.; Drobizhev, A.; Ejzak, L.; Faccini, R.; Fang, D. Q.; Faverzani, M.; Ferri, E.; Ferroni, F.; Fiorini, E.; Franceschi, M. A.; Freedman, S. J.; Fujikawa, B. K.; Gaigher, R.; Giachero, A.; Gironi, L.; Giuliani, A.; Gladstone, L.; Goett, J.; Gorla, P.; Gotti, C.; Guandalini, C.; Guerzoni, M.; Gutierrez, T. D.; Haller, E. E.; Han, K.; Hansen, E. V.; Heeger, K. M.; Hennings-Yeomans, R.; Hickerson, K. P.; Huang, H. Z.; Iannone, M.; Ioannucci, L.; Kadel, R.; Keppel, G.; Kogler, L.; Kolomensky, Yu. G.; Leder, A.; Ligi, C.; Lim, K. E.; Liu, X.; Ma, Y. G.; Maiano, C.; Maino, M.; Marini, L.; Martinez, M.; Martinez Amaya, C.; Maruyama, R. H.; Mei, Y.; Moggi, N.; Morganti, S.; Mosteiro, P. J.; Nagorny, S. S.; Napolitano, T.; Nastasi, M.; Nisi, S.; Nones, C.; Norman, E. B.; Novati, V.; Nucciotti, A.; Nutini, I.; O'Donnell, T.; Olcese, M.; Olivieri, E.; Orio, F.; Orlandi, D.; Ouellet, J. L.; Pagliarone, C. E.; Pallavicini, M.; Palmieri, V.; Pattavina, L.; Pavan, M.; Pedretti, M.; Pedrotta, R.; Pelosi, A.; Pessina, G.; Pettinacci, V.; Piperno, G.; Pira, C.; Pirro, S.; Pozzi, S.; Previtali, E.; Reindl, F.; Rimondi, F.; Risegari, L.; Rosenfeld, C.; Rossi, C.; Rusconi, C.; Sakai, M.; Sala, E.; Salvioni, C.; Sangiorgio, S.; Santone, D.; Schaeffer, D.; Schmidt, B.; Schmidt, J.; Scielzo, N. D.; Singh, V.; Sisti, M.; Smith, A. R.; Stivanello, F.; Taffarello, L.; Tatananni, L.; Tenconi, M.; Terranova, F.; Tessaro, M.; Tomei, C.; Ventura, G.; Vignati, M.; Wagaarachchi, S. L.; Wallig, J.; Wang, B. S.; Wang, H. W.; Welliver, B.; Wilson, J.; Wilson, K.; Winslow, L. A.; Wise, T.; Zanotti, L.; Zarra, C.; Zhang, G. Q.; Zhu, B. X.; Zimmermann, S.; Zucchelli, S.; Cuore Collaboration

    2018-03-01

    The CUORE experiment, a ton-scale cryogenic bolometer array, recently began operation at the Laboratori Nazionali del Gran Sasso in Italy. The array represents a significant advancement in this technology, and in this work we apply it for the first time to a high-sensitivity search for a lepton-number-violating process: Te 130 neutrinoless double-beta decay. Examining a total TeO2 exposure of 86.3 kg yr, characterized by an effective energy resolution of (7.7 ±0.5 ) keV FWHM and a background in the region of interest of (0.014 ±0.002 ) counts /(keV kg yr ) , we find no evidence for neutrinoless double-beta decay. Including systematic uncertainties, we place a lower limit on the decay half-life of T1/2 0 ν(Te 130 )>1.3 ×1025 yr (90% C.L.); the median statistical sensitivity of this search is 7.0 ×1024 yr . Combining this result with those of two earlier experiments, Cuoricino and CUORE-0, we find T1/2 0 ν(Te 130 )>1.5 ×1025 yr (90% C.L.), which is the most stringent limit to date on this decay. Interpreting this result as a limit on the effective Majorana neutrino mass, we find mβ β<(110 -520 ) meV , where the range reflects the nuclear matrix element estimates employed.

  13. Grands principes de symétrie à l'épreuve de l'expérience

    NASA Astrophysics Data System (ADS)

    Depommier, P.

    This review article has its origin in a series of lectures (P, C, T, baryon number, lepton numbers) given at the « Joliot-Curie » School of Nuclear Physics (Maubuisson, France), in September 1986. The manuscript has been modified, a chapter on charge symmetry has been added and the bibliography has been updated. The lectures were intended for a nuclear physics audience, something which is reflected in the way this article has been written. The contribution of nuclear physics to the understanding of the fundamental interactions is stressed, as well as the relationship of nuclear to particle physics. The definitions of the various symmetry operations in question are recalled briefly in chapter 2. A short historical account is given in chapter 3. Since the presentation of the various parts of the article requires a theoretical framework, the « Standard Model » is briefly described in chapter 4. Its limitations are discussed together with the various avenues which have been explored to generalise it and to cure its diseases. The relations between quark families and the problem of neutrino masses are discussed. Chapter 5 contains a detailed presentation of the various manifestations of parity violation : existence of pseudoscalar observables, violation of selection rules. Parity violation is maximal in the charged current of weak interactions. In the pure leptonic sector it manifests itself in the asymmetry of electrons (positrons) in muon decay with respect to the muon spin. In the semileptonic sector (lepton-quark coupling) it is responsible for the asymmetry in the ?-decay of oriented nuclei, the ?-circularly polarized ? correlation and the longitudinal polarization of electrons (positrons). Together with the determination of the helicity of the neutrino these observations lead to the V - A theory of the weak interactions. The Standard Model also predicts a weak neutral current which affects the lepton and quark sectors. But for processes involving neutrinos the weak neutral current interferes with the electromagnetic current in a way which is predicted by the Standard Model and introduces a very important parameter, the Weinberg angle ? w. Purely leptonic processes include Mæller and Bhabha scatterings, the reactions e+ e- ? + ? - and e+ e- ? + ? -, where spatial asymmetries and polarizations can be observed, especially at high energies. In the semileptonic sector (lepton-quark coupling) the weak neutral current interferes with the electromagnetic current to produce parity-violating effects. Atomic physics is affected and very tiny effects have been observed in heavy atoms, such as a rotation of the plane of polarization when light passes through an atomic vapor. The scattering of longitudinally polarized electrons from nuclei gives a forward-backward asymmetry which has been observed, in beautiful agreement with Standard Model predictions. According to the Standard Model there is a weak interaction between quarks which gives rise to a violation of parity in nuclear forces and nuclear physics. It takes very careful and difficult experiments to extract the very tiny signal of the weak interactions in the huge background of the strong interaction. A well known selection rule in α decay is violated and the forbidden α transition from 16O (2- , 8.87 MeV) to the ground state of 12C has been observed. Electromagnetic selection rules are modified and the interference between, for instance, M1 and E1 monopoles, gives a circular polarization to photons emitted from non-oriented nuclei. After neutron-proton capture the emitted photons are circularly polarized. With oriented nuclear states (as obtained in polarized neutron capture) one observes an asymmetry in the emission of γ-rays. Parity violation has also been studied in nucleon-nucleon scattering and few-body reactions. The theory is a difficult one since there is a long way to go from the Standard Model to complicated systems such as nucleons and a fortiori nuclei. A qualitative agreement emerges from the comparison between experiment and theory. The origin of parity violation is not explained by the Standard Model. It is not known whether parity violation is a fundamental property of nature or if it is a low-energy phenomenon. It is possible to construct gauge theories which are basically symmetric but where this symmetry is spontaneously broken at some energy scale. In such theories there are additional weak bosons of right-handed character. These theories make interesting predictions, even at low energy (deviations from V — A) but they will be tested efficiently with the high energy electron-positron colliders. Parity violation has useful applications outside the field of particle and nuclear physics : muon spin rotation is widely used by solid state physicists and chemists. Chapter 6 discusses briefly CP violation in the neutral-kaon system and dwells on the experiments aimed at the verification of time-reversal invariance in various parts of physics. Time reversal invariance has several consequences for nuclear reactions. The theorem of detailed balance relates the cross-sections of inverse reactions. The polarization-asymmetry theorem relates the polarization observed in a reaction (induced by unpolarized particles) and the asymmetry observed in the inverse reaction (induced by polarized particles). No convincing evidence for time-reversal noninvariance has been obtained. In neutron and nuclear beta decay some correlations involving one spin and two momenta are odd under time reversal. Upper limits have been obtained for the phase between the V and A coupling constants in weak interactions. Electromagnetic transitions in nuclei can be used to test time reversal in various experimental conditions (oriented nuclei, measurement of linear polarization of γ-rays). One gets upper limits for the phase between electromagnetic nuclear matrix elements. All experiments are in agreement with no violation of time-reversal invariance. The most interesting observable seems to be the electric dipole moment of the neutron, which vanishes under time-reversal invariance (assuming parity violation). The magnitude of the theoretical predictions varies considerably, therefore the electric dipole moment of the neutron constitutes a very valuable test of time-reversal invariance. The conservation of parity and time reversal in the strong interaction raises a delicate problem in Quantum Chromodynamics. In order to get rid of parity and time reversal violating terms in the QCD Lagrangian one invokes a new symmetry which introduces a light pseudoscalar particle, the axion. This particle has been searched for but not found. Recent findings in heavy-ion collisions (the famous e+ -e- pairs) have probably nothing to do with axions. Chapter 7 deals with baryon number nonconservation. Grand unification theories have been introduced to cure several deficiencies of the Standard Model. One of the most dramatic consequences of these theories is the violation of baryon number conservation, resulting in the instability of the nucleon and other effects like neutron-antineutron oscillations. The economical model based on the unification group SU(5) fails in the prediction of the proton lifetime. Alternative unification groups have been proposed. Proton decay and neutron-antineutron searches are fundamental experiments which are pushed very strongly with a variety of experimental techniques. Lepton number nonconservation is the subject of chapter 8. The search for nuclear neutrinoless double beta decay is another activity which has become important in the attempt to elucidate the nature of the neutrino. Neutrinoless double beta decay can only occur with Majorana neutrinos if these neutrinos are massive and/or weak currents are not exactly V — A. In the context of the gauge theories the observation of this process would be a proof of massive Majorana neutrinos. Various isotopes can be used to search for double beta decay (with or without neutrinos) and detectors can be large-volume GeLi crystals, Time Projection Chambers, etc... Coincidences between beta particles and γ-rays are useful for shedding information on the mechanism responsible for lepton-number violation. A new particle, the majoron, has been invented. It is a Goldstone boson associated with the breaking of lepton-number symmetry. No convincing observation of neutrinoless double beta decay has been reported so far. Whereas quark families communicate via the Kobayashi-Maskawa matrix, leptons seem to obey separate conservation laws of lepton number (or lepton-flavor). This problem, which has received much attention recently, is presented in chapter 9. Searches for μ → eγ, μ → e γ γ, μ, → eee and muon-to-electron conversion in a nucleus have reached very low upper limits (down to the 10-11-10-12 range), although gauge theories provide several natural flavor-violating mechanisms. Neutrino oscillations in a vacuum open another window on the problem of neutrino masses and experiments are pursued actively at high-flux nuclear reactors and high-energy accelerators. There are some indications for neutrino oscillations but experimental results are still in conflict. The old Wolfenstein theory of neutrino oscillations in matter has been exploited by Mekheyev and Smirnov who showed that under suitable conditions the mixing angle between neutrinos of different flavors goes through a resonance. This gives rise to the MSW effect which has an important bearing on the solar neutrino problem. There is a good hope that nuclear forces will be eventually explained by Quantum Chromodynamics, in terms of quarks and gluons. Therefore it is important to establish the symmetry properties of these forces and in particular to study possible violations of isospin symmetry to a high level of accuracy. The subject of isospin is dealt with in a companion article by Galès and Van Giai, Ann. Phys. Fr. 12 (1987). Chapter 10 discusses a few tests of charge symmetry of nuclear forces. Cet article est une version révisée d'un cours donné à l'Ecole Joliot-Curie de Physique Nucléaire, en 1986, et destiné à des physiciens nucléaires. Le texte a été remanié et complété pour le rendre plus conforme à un article de synthèse. Après un court préambule (chapitre 1), on rappelle quelques définitions et théorèmes dans le chapitre 2. Une courte introduction historique est donnée dans le chapitre 3. Dans le chapitre 4 on expose le formalisme du modèle standard qui servira de cadre théorique pour l'ensemble de l'article. Le chapitre 5 est consacré à la violation de la parité, due aux interactions faibles, et qui se manifeste dans divers domaines : physique nucléaire, physique des particules, mais aussi physique atomique. On passe en revue les effets dus aux courants faibles chargés et neutres, en insistant sur les aspects expérimentaux. Le chapitre 6 est consacré à la violation de l'invariance CP, qui n'a été observée que dans le système des mésons K. En postulant l'invariance CPT on est conduit à se poser la question de la validité de l'invariance sous le renversement du temps. On discute des expériences qui ont été effectuées pour rechercher une violation de cette invariance, en physique nucléaire notamment. Dans le chapitre 7 on introduit à la grande unification des interactions faibles, électromagnétiques et fortes, dont une conséquence spectaculaire est la nonconservation du nombre baryonique, avec comme conséquences expérimentales l'instabilité du nucléon et les oscillations neutron-antineutron. Le chapitre 8 s'adresse à la violation du nombre leptonique. Cette question est importante dans le cadre des théories unificatrices et elle se rattache à la nature du neutrino (particule de Dirac ou particule de Majorana massive). La recherche de la double désintégration β est devenue une activité expérimentale de très grande importance. Le chapitre 9 traite de la non-conservation des nombres leptoniques partiels. Dans la plupart des extensions du modèle standard on met en évidence plusieurs mécanismes de conversion d'un lepton en un lepton d'une autre famille, avec comme conséquences expérimentales : les désintégrations μ → e γ , μ → e γ γ et μ → e e e la conversion muon-électron dans un noyau, les oscillations de neutrinos. La possibilité d'obtenir une résonance lors de l'oscillation des neutrinos dans la matière a des conséquences importantes pour l'astrophysique. En principe, l'isospin n'était pas au menu du cours, puisque traité par un autre professeur. On a cependant ajouté, à la demande de l'éditeur, un chapitre sur les expériences recherchant une violation de la symétrie de charge dans les forces nucléaires (chapitre 10).

  14. Application of Benford's law: a valuable tool for detecting scientific papers with fabricated data? : A case study using proven falsified articles against a comparison group.

    PubMed

    Hüllemann, S; Schüpfer, G; Mauch, J

    2017-10-01

    In naturally occurring numbers the frequencies of digits 1-9 in the leading position are counterintuitively distributed because the frequencies of occurrence are unequal. Benford-Newcomb's law describes the expected distribution of these frequencies. It was previously shown that known fraudulent articles consistently violated this law. To compare the features of 12 known fraudulent articles from a single Japanese author to the features of 13 articles in the same research field from other Japanese authors, published during the same time period and identified with a Medline database search. All 25 articles were assessed to determine whether the data violated the law. Formulas provided by the law were used to determine the frequencies of occurrence for the first two leading digits in manually extracted numbers. It was found that all the known fraudulent papers violated the law and 6 of the 13 articles used for comparison followed the law. Assuming that the articles in the comparison group were not falsified or fabricated, the sensitivity of assessing articles with Benford-Newcomb's law was 100% (95% confidence interval CI: 73.54-100%) but the specificity was only 46.15% (95% CI: 19.22-74.87%) and the positive predictive value was 63.16% (95% CI: 38.36-83.71%). All 12 of the known falsified articles violated Benford-Newcomb's law, which indicated that this analysis had a high sensitivity. The low specificity of the assessment may be explained by the assumptions made about the articles identified for comparison. Violations of Benford-Newcomb's law about the frequencies of the leading digits cannot serve as proof of falsification but they may provide a basis for deeper discussions between the editor and author about a submitted work.

  15. Traffic violations in Guangdong Province of China: speeding and drunk driving.

    PubMed

    Zhang, Guangnan; Yau, Kelvin K W; Gong, Xiangpu

    2014-03-01

    The number of speeding- and drunk driving-related injuries in China surged in the years immediately preceding 2004 and then began to decline. However, the percent decrease in the number of speeding and drunk driving incidents (decrease by 22%) is not proportional to the corresponding percent decrease in number of automobile accident-related injuries (decrease by 47%) from the year 2004 to 2010 (Traffic Management Bureau, Ministry of Public Security, Annual Statistical Reports on Road Traffic Accidents). Earlier studies have established traffic violations as one of the major risks threatening road safety. In this study, we examine in greater detail two important types of traffic violation events, speeding and drunk driving, and attempt to identify significant risk factors associated with these types of traffic violations. Risk factors in several different dimensions, including driver, vehicle, road and environmental factors, are considered. We analyze the speeding (N=11,055) and drunk driving (N=10,035) data for the period 2006-2010 in Guangdong Province, China. These data, obtained from the Guangdong Provincial Security Department, are extracted from the Traffic Management Sector-Specific Incident Case Data Report and are the only comprehensive and official source of traffic accident data in China. Significant risk factors associating with speeding and drunk driving are identified. We find that several factors are associated with a significantly higher probability of both speeding and drunk driving, particularly male drivers, private vehicles, the lack of street lighting at night and poor visibility. The impact of other specific and unique risk factors for either speeding or drunk driving, such as hukou, road type/grades, commercial vehicles, compulsory third party insurance and vehicle safety status, also require particular attention. Legislative or regulatory measures targeting different vehicle types and/or driver groups with respect to the various driver, vehicle, road and environmental risk factors can subsequently be devised to reduce the speeding and drunk driving rates. As the country with the highest number of traffic accident fatalities in the world, applying these findings in workable legislation and enforcement to reduce speeding and drunk driving rates will save tens of thousands of lives. Copyright © 2013 Elsevier Ltd. All rights reserved.

  16. Multipartite entangled states in particle mixing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blasone, M.; INFN Sezione di Napoli, Gruppo collegato di Salerno, Baronissi; Dell'Anno, F.

    2008-05-01

    In the physics of flavor mixing, the flavor states are given by superpositions of mass eigenstates. By using the occupation number to define a multiqubit space, the flavor states can be interpreted as multipartite mode-entangled states. By exploiting a suitable global measure of entanglement, based on the entropies related to all possible bipartitions of the system, we analyze the correlation properties of such states in the instances of three- and four-flavor mixing. Depending on the mixing parameters, and, in particular, on the values taken by the free phases, responsible for the CP-violation, entanglement concentrates in certain bipartitions. We quantify inmore » detail the amount and the distribution of entanglement in the physically relevant cases of flavor mixing in quark and neutrino systems. By using the wave packet description for localized particles, we use the global measure of entanglement, suitably adapted for the instance of multipartite mixed states, to analyze the decoherence, induced by the free evolution dynamics, on the quantum correlations of stationary neutrino beams. We define a decoherence length as the distance associated with the vanishing of the coherent interference effects among massive neutrino states. We investigate the role of the CP-violating phase in the decoherence process.« less

  17. Gauge bosons and heavy quarks: Proceedings of Summer Institute on Particle Physics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hawthorne, J.F.

    1991-01-01

    This report contains papers on the following topics: Z decays and tests of the standard model; future possibilities for LEP; studies of the interactions of electroweak gauge bosons; top quark topics; the next linear collider; electroweak processes in hadron colliders; theoretical topics in B-physics; experimental aspects of B-physics; B-factory storage ring design; rare kaon decays; CP violation in K{sup 0} decays at CERN; recent K{sup 0} decay results from Fermilab E-731; results from LEP on heavy quark physics; review of recent results on heavy flavor production; weak matrix elements and the determination of the weak mixing angles; recent results frommore » CLEO I and a glance at CLEO II data; recent results from ARGUS; neutrino lepton physics with the CHARM 2 detector; recent results from the three TRISTAN experiments; baryon number violation at high energy in the standard model: fact or fiction New particle searches at LEP; review of QCD at LEP; electroweak interactions at LEP; recent results on W physics from the UA2 experiment at the CERN {rho}{bar {rho}} collider; B physics at CDF; and review of particle astrophysics.« less

  18. Performance of DIMTEST-and NOHARM-Based Statistics for Testing Unidimensionality

    ERIC Educational Resources Information Center

    Finch, Holmes; Habing, Brian

    2007-01-01

    This Monte Carlo study compares the ability of the parametric bootstrap version of DIMTEST with three goodness-of-fit tests calculated from a fitted NOHARM model to detect violations of the assumption of unidimensionality in testing data. The effectiveness of the procedures was evaluated for different numbers of items, numbers of examinees,…

  19. Fact File: Crime Data From 2,400 Colleges and Universities.

    ERIC Educational Resources Information Center

    Chronicle of Higher Education, 1993

    1993-01-01

    Data from over 2,400 colleges and universities concerning the number and types of crimes committed on campus are tabulated by state and institution. Statistics are presented on reported numbers of incidents involving murder, rape, robbery, aggravated assault, burglary, and motor vehicle theft and on arrests for liquor violations, drugs, and…

  20. [Working environment and health assessment among dentists working at various stomatological institutions in Ajara].

    PubMed

    Margvelashvili, V; Jokhadze, Sh; Chomakhashvili, Z; Khuchua, A; Chomakhashvili, D

    2005-09-01

    Using anonymous inquiry and specifically constructed questionnaire, it was shown, that in stomatological institutions of Ajara and also in the whole west part of the country, there is lack of specialties in the field of stomatology. Working is conducted without license, in offices and also during working process there are many cases of violation of physiological and hygienic as well as of technical rules procedures. All this lead to: 1. violation of the low; 2. violation of patient's rights and 3. increase in the morbidity rate among the dentists. All the mentioned above requires immediate actions from the respective governmental bodies and also creation of stomatological associations.

  1. Interactions between mood and the structure of semantic memory: event-related potentials evidence

    PubMed Central

    Pinheiro, Ana P.; del Re, Elisabetta; Nestor, Paul G; McCarley, Robert W.; Gonçalves, Óscar F.

    2013-01-01

    Recent evidence suggests that affect acts as modulator of cognitive processes and in particular that induced mood has an effect on the way semantic memory is used on-line. We used event-related potentials (ERPs) to examine affective modulation of semantic information processing under three different moods: neutral, positive and negative. Fifteen subjects read 324 pairs of sentences, after mood induction procedure with 30 pictures of neutral, 30 pictures of positive and 30 pictures of neutral valence: 108 sentences were read in each mood induction condition. Sentences ended with three word types: expected words, within-category violations, and between-category violations. N400 amplitude was measured to the three word types under each mood induction condition. Under neutral mood, a congruency (more negative N400 amplitude for unexpected relative to expected endings) and a category effect (more negative N400 amplitude for between- than to within-category violations) were observed. Also, results showed differences in N400 amplitude for both within- and between-category violations as a function of mood: while positive mood tended to facilitate the integration of unexpected but related items, negative mood made their integration as difficult as unexpected and unrelated items. These findings suggest the differential impact of mood on access to long-term semantic memory during sentence comprehension. PMID:22434931

  2. Interactions between mood and the structure of semantic memory: event-related potentials evidence.

    PubMed

    Pinheiro, Ana P; del Re, Elisabetta; Nestor, Paul G; McCarley, Robert W; Gonçalves, Óscar F; Niznikiewicz, Margaret

    2013-06-01

    Recent evidence suggests that affect acts as modulator of cognitive processes and in particular that induced mood has an effect on the way semantic memory is used on-line. We used event-related potentials (ERPs) to examine affective modulation of semantic information processing under three different moods: neutral, positive and negative. Fifteen subjects read 324 pairs of sentences, after mood induction procedure with 30 pictures of neutral, 30 pictures of positive and 30 pictures of neutral valence: 108 sentences were read in each mood induction condition. Sentences ended with three word types: expected words, within-category violations, and between-category violations. N400 amplitude was measured to the three word types under each mood induction condition. Under neutral mood, a congruency (more negative N400 amplitude for unexpected relative to expected endings) and a category effect (more negative N400 amplitude for between- than to within-category violations) were observed. Also, results showed differences in N400 amplitude for both within- and between-category violations as a function of mood: while positive mood tended to facilitate the integration of unexpected but related items, negative mood made their integration as difficult as unexpected and unrelated items. These findings suggest the differential impact of mood on access to long-term semantic memory during sentence comprehension.

  3. An ACGME Duty Hour Compliant 3-Person Night Float System for Neurological Surgery Residency Programs.

    PubMed

    Ragel, Brian T; Piedra, Mark; Klimo, Paul; Burchiel, Kim J; Waldo, Heidi; McCartney, Shirley; Selden, Nathan R

    2014-06-01

    In 2003, the Accreditation Council for Graduate Medical Education (ACGME) instituted the 24+6-hour work schedule and 80-hour workweek, and in 2011, it enhanced work hour and supervision standards. In response, Oregon Health & Science University's (OHSU) neurological surgery residency instituted a 3-person night float system. We analyzed work hour records and operative experience for 1 year before and after night float implementation in a model that shortened a combined introductory research and basic clinical neurosciences rotation from 12 to 6 months. We analyzed residents' perception of the system using a confidential survey. The ACGME 2011 work hour standards were applied to both time periods. AFTER NIGHT FLOAT IMPLEMENTATION, THE NUMBER OF DUTY HOUR VIOLATIONS WAS REDUCED: 28-hour shift (11 versus 235), 8 hours off between shifts (2 versus 20), 80 hours per week (0 versus 17), and total violations (23 versus 275). Violations increased only for the less than 4 days off per 4-week interval rule (10 versus 3). No meaningful difference was seen in the number of operative cases performed per year at any postgraduate year (PGY) training level: PGY-2 (336 versus 351), PGY-3 (394 versus 354), PGY-4 (803 versus 802), PGY-5 (1075 versus 1040), PGY-7 (947 versus 913), and total (3555 versus 3460). Residents rated the new system favorably. To meet 2011 ACGME duty hour standards, the OHSU neurological surgery residency instituted a 3-person night float system. A nearly complete elimination of work hour violations did not affect overall resident operative experience.

  4. Prediction of vehicle crashes by drivers' characteristics and past traffic violations in Korea using a zero-inflated negative binomial model.

    PubMed

    Kim, Dae-Hwan; Ramjan, Lucie M; Mak, Kwok-Kei

    2016-01-01

    Traffic safety is a significant public health challenge, and vehicle crashes account for the majority of injuries. This study aims to identify whether drivers' characteristics and past traffic violations may predict vehicle crashes in Korea. A total of 500,000 drivers were randomly selected from the 11.6 million driver records of the Ministry of Land, Transport and Maritime Affairs in Korea. Records of traffic crashes were obtained from the archives of the Korea Insurance Development Institute. After matching the past violation history for the period 2004-2005 with the number of crashes in year 2006, a total of 488,139 observations were used for the analysis. Zero-inflated negative binomial model was used to determine the incident risk ratio (IRR) of vehicle crashes by past violations of individual drivers. The included covariates were driver's age, gender, district of residence, vehicle choice, and driving experience. Drivers violating (1) a hit-and-run or drunk driving regulation at least once and (2) a signal, central line, or speed regulation more than once had a higher risk of a vehicle crash with respective IRRs of 1.06 and 1.15. Furthermore, female gender, a younger age, fewer years of driving experience, and middle-sized vehicles were all significantly associated with a higher likelihood of vehicle crashes. Drivers' demographic characteristics and past traffic violations could predict vehicle crashes in Korea. Greater resources should be assigned to the provision of traffic safety education programs for the high-risk driver groups.

  5. Reproductive rights violations reported by Mexican women with HIV.

    PubMed

    Kendall, Tamil

    2009-01-01

    Demand for reproductive health services by people with HIV is increasing, as is the urgency of protecting and promoting their reproductive rights. The reproductive rights of Mexicans with HIV are formally protected by the constitution and by health and anti-discrimination legislation, as well as by international conventions. However, the reproductive rights of women with HIV continue to be violated in public clinics and hospitals. This paper discusses three violations identified as priority problems by Mexican women with HIV, illustrating these problems with cases identified during a participatory skills building workshop. The violations cover the following rights: the right to non-discrimination, the right to adequate information and informed consent to medical procedures, and the right to choose the number and spacing of children. Physicians can either violate or promote reproductive rights. Unfortunately, in many instances Mexican physicians continue to perpetrate reproductive rights abuses against women with HIV. Collaborations between women with HIV, civil society, government, and international organizations are needed to educate and sanction health care providers and to support women with HIV in their pursuit of reproductive rights. Demanding accountability from health care practitioners and the State to guarantee reproductive rights in countries where these rights are formally protected will improve the quality of life of people with HIV and can demonstrate that rights-based approaches are compatible with and indeed, crucial for public health.

  6. Exclusivity structures and graph representatives of local complementation orbits

    NASA Astrophysics Data System (ADS)

    Cabello, Adán; Parker, Matthew G.; Scarpa, Giannicola; Severini, Simone

    2013-07-01

    We describe a construction that maps any connected graph G on three or more vertices into a larger graph, H(G), whose independence number is strictly smaller than its Lovász number which is equal to its fractional packing number. The vertices of H(G) represent all possible events consistent with the stabilizer group of the graph state associated with G, and exclusive events are adjacent. Mathematically, the graph H(G) corresponds to the orbit of G under local complementation. Physically, the construction translates into graph-theoretic terms the connection between a graph state and a Bell inequality maximally violated by quantum mechanics. In the context of zero-error information theory, the construction suggests a protocol achieving the maximum rate of entanglement-assisted capacity, a quantum mechanical analogue of the Shannon capacity, for each H(G). The violation of the Bell inequality is expressed by the one-shot version of this capacity being strictly larger than the independence number. Finally, given the correspondence between graphs and exclusivity structures, we are able to compute the independence number for certain infinite families of graphs with the use of quantum non-locality, therefore highlighting an application of quantum theory in the proof of a purely combinatorial statement.

  7. Comparing performance in discrete and continuous comparison tasks.

    PubMed

    Leibovich, Tali; Henik, Avishai

    2014-05-01

    The approximate number system (ANS) theory suggests that all magnitudes, discrete (i.e., number of items) or continuous (i.e., size, density, etc.), are processed by a shared system and comply with Weber's law. The current study reexamined this notion by comparing performance in discrete (comparing numerosities of dot arrays) and continuous (comparisons of area of squares) tasks. We found that: (a) threshold of discrimination was higher for continuous than for discrete comparisons; (b) while performance in the discrete task complied with Weber's law, performance in the continuous task violated it; and (c) performance in the discrete task was influenced by continuous properties (e.g., dot density, dot cumulative area) of the dot array that were not predictive of numerosities or task relevant. Therefore, we propose that the magnitude processing system (MPS) is actually divided into separate (yet interactive) systems for discrete and continuous magnitude processing. Further subdivisions are discussed. We argue that cooperation between these systems results in a holistic comparison of magnitudes, one that takes into account continuous properties in addition to numerosities. Considering the MPS as two systems opens the door to new and important questions that shed light on both normal and impaired development of the numerical system.

  8. Higgs mediated CLFV processes μN(eN)→τX via gluon operators

    NASA Astrophysics Data System (ADS)

    Takeuchi, Michihisa; Uesaka, Yuichi; Yamanaka, Masato

    2017-09-01

    We revisit charged lepton flavor violating (CLFV) scattering processes ℓi N → τX (ℓi ∋ e , μ) mediated by Higgs. We point out that a new subprocess ℓi g → τg via the effective interactions of Higgs and gluon gives the dominant contribution to ℓi N → τX for an incident beam energy of Eℓ ≲ 1 TeV in fixed target experiments. Furthermore, in the light of quark number conservation, we consider quark pair-production processes ℓi g → τq q bar (q denotes quarks) instead of ℓi q → τq. This corrects the threshold energy of each subprocess contributing to σ (ℓi N → τX). Reevaluation of σ (ℓi N → τX) including all of relevant subprocesses shows that the search for ℓi N → τX could serve a complementary opportunity with other relevant processes to shed light on the Higgs CLFV.

  9. Dissociation of tone and vowel processing in Mandarin idioms.

    PubMed

    Hu, Jiehui; Gao, Shan; Ma, Weiyi; Yao, Dezhong

    2012-09-01

    Using event-related potentials, this study measured the access of suprasegmental (tone) and segmental (vowel) information in spoken word recognition with Mandarin idioms. Participants performed a delayed-response acceptability task, in which they judged the correctness of the last word of each idiom, which might deviate from the correct word in either tone or vowel. Results showed that, compared with the correct idioms, a larger early negativity appeared only for vowel violation. Additionally, a larger N400 effect was observed for vowel mismatch than tone mismatch. A control experiment revealed that these differences were not due to low-level physical differences across conditions; instead, they represented the greater constraining power of vowels than tones in the lexical selection and semantic integration of the spoken words. Furthermore, tone violation elicited a more robust late positive component than vowel violation, suggesting different reanalyses of the two types of information. In summary, the current results support a functional dissociation of tone and vowel processing in spoken word recognition. Copyright © 2012 Society for Psychophysiological Research.

  10. Symmetry restoration and quantumness reestablishment.

    PubMed

    Zeng, Guo-Mo; Wu, Lian-Ao; Xing, Hai-Jun

    2014-09-18

    A realistic quantum many-body system, characterized by a generic microscopic Hamiltonian, is accessible only through approximation methods. The mean field theories, as the simplest practices of approximation methods, commonly serve as a powerful tool, but unfortunately often violate the symmetry of the Hamiltonian. The conventional BCS theory, as an excellent mean field approach, violates the particle number conservation and completely erases quantumness characterized by concurrence and quantum discord between different modes. We restore the symmetry by using the projected BCS theory and the exact numerical solution and find that the lost quantumness is synchronously reestablished. We show that while entanglement remains unchanged with the particle numbers, quantum discord behaves as an extensive quantity with respect to the system size. Surprisingly, discord is hardly dependent on the interaction strengths. The new feature of discord offers promising applications in modern quantum technologies.

  11. Adaptation of Decoy Fusion Strategy for Existing Multi-Stage Search Workflows

    NASA Astrophysics Data System (ADS)

    Ivanov, Mark V.; Levitsky, Lev I.; Gorshkov, Mikhail V.

    2016-09-01

    A number of proteomic database search engines implement multi-stage strategies aiming at increasing the sensitivity of proteome analysis. These approaches often employ a subset of the original database for the secondary stage of analysis. However, if target-decoy approach (TDA) is used for false discovery rate (FDR) estimation, the multi-stage strategies may violate the underlying assumption of TDA that false matches are distributed uniformly across the target and decoy databases. This violation occurs if the numbers of target and decoy proteins selected for the second search are not equal. Here, we propose a method of decoy database generation based on the previously reported decoy fusion strategy. This method allows unbiased TDA-based FDR estimation in multi-stage searches and can be easily integrated into existing workflows utilizing popular search engines and post-search algorithms.

  12. A random-sum Wilcoxon statistic and its application to analysis of ROC and LROC data.

    PubMed

    Tang, Liansheng Larry; Balakrishnan, N

    2011-01-01

    The Wilcoxon-Mann-Whitney statistic is commonly used for a distribution-free comparison of two groups. One requirement for its use is that the sample sizes of the two groups are fixed. This is violated in some of the applications such as medical imaging studies and diagnostic marker studies; in the former, the violation occurs since the number of correctly localized abnormal images is random, while in the latter the violation is due to some subjects not having observable measurements. For this reason, we propose here a random-sum Wilcoxon statistic for comparing two groups in the presence of ties, and derive its variance as well as its asymptotic distribution for large sample sizes. The proposed statistic includes the regular Wilcoxon rank-sum statistic. Finally, we apply the proposed statistic for summarizing location response operating characteristic data from a liver computed tomography study, and also for summarizing diagnostic accuracy of biomarker data.

  13. Generalized monogamy of contextual inequalities from the no-disturbance principle.

    PubMed

    Ramanathan, Ravishankar; Soeda, Akihito; Kurzyński, Paweł; Kaszlikowski, Dagomir

    2012-08-03

    In this Letter, we demonstrate that the property of monogamy of Bell violations seen for no-signaling correlations in composite systems can be generalized to the monogamy of contextuality in single systems obeying the Gleason property of no disturbance. We show how one can construct monogamies for contextual inequalities by using the graph-theoretic technique of vertex decomposition of a graph representing a set of measurements into subgraphs of suitable independence numbers that themselves admit a joint probability distribution. After establishing that all the subgraphs that are chordal graphs admit a joint probability distribution, we formulate a precise graph-theoretic condition that gives rise to the monogamy of contextuality. We also show how such monogamies arise within quantum theory for a single four-dimensional system and interpret violation of these relations in terms of a violation of causality. These monogamies can be tested with current experimental techniques.

  14. 20 CFR 655.60 - Violations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... WORKERS IN THE UNITED STATES Labor Certification Process and Enforcement of Attestations for Temporary Employment in Occupations Other Than Agriculture or Registered Nursing in the United States (H-2B Workers... application process. ...

  15. Parallel detection of violations of color constancy

    PubMed Central

    Foster, David H.; Nascimento, Sérgio M. C.; Amano, Kinjiro; Arend, Larry; Linnell, Karina J.; Nieves, Juan Luis; Plet, Sabrina; Foster, Jeffrey S.

    2001-01-01

    The perceived colors of reflecting surfaces generally remain stable despite changes in the spectrum of the illuminating light. This color constancy can be measured operationally by asking observers to distinguish illuminant changes on a scene from changes in the reflecting properties of the surfaces comprising it. It is shown here that during fast illuminant changes, simultaneous changes in spectral reflectance of one or more surfaces in an array of other surfaces can be readily detected almost independent of the numbers of surfaces, suggesting a preattentive, spatially parallel process. This process, which is perfect over a spatial window delimited by the anatomical fovea, may form an early input to a multistage analysis of surface color, providing the visual system with information about a rapidly changing world in advance of the generation of a more elaborate and stable perceptual representation. PMID:11438751

  16. How the Emotional Content of Discourse Affects Language Comprehension

    PubMed Central

    Jiménez-Ortega, Laura; Martín-Loeches, Manuel; Casado, Pilar; Sel, Alejandra; Fondevila, Sabela; de Tejada, Pilar Herreros; Schacht, Annekathrin; Sommer, Werner

    2012-01-01

    Emotion effects on cognition have often been reported. However, only few studies investigated emotional effects on subsequent language processing, and in most cases these effects were induced by non-linguistic stimuli such as films, faces, or pictures. Here, we investigated how a paragraph of positive, negative, or neutral emotional valence affects the processing of a subsequent emotionally neutral sentence, which contained either semantic, syntactic, or no violation, respectively, by means of event-related brain potentials (ERPs). Behavioral data revealed strong effects of emotion; error rates and reaction times increased significantly in sentences preceded by a positive paragraph relative to negative and neutral ones. In ERPs, the N400 to semantic violations was not affected by emotion. In the syntactic experiment, however, clear emotion effects were observed on ERPs. The left anterior negativity (LAN) to syntactic violations, which was not visible in the neutral condition, was present in the negative and positive conditions. This is interpreted as reflecting modulatory effects of prior emotions on syntactic processing, which is discussed in the light of three alternative or complementary explanations based on emotion-induced cognitive styles, working memory, and arousal models. The present effects of emotion on the LAN are especially remarkable considering that syntactic processing has often been regarded as encapsulated and autonomous. PMID:22479432

  17. Study of the CP-violating effects with gg → Η → τ{sup +}τ{sup –} process

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Belyaev, N. L., E-mail: nbelyaev@cern.ch; Konoplich, R. V.

    Study of the gg → Η → τ{sup +}τ{sup –} process was performed at Monte Carlo level within the framework of searching for CP-violating effects. The sensitivity of chosen observables to CP-parity of the Higgs boson was demonstrated for hadronic 1-prong τ decays (τ{sup ±} → π{sup ±}, ρ{sup ±}). Monte Carlo samples for the gg → Η → τ{sup +}τ{sup -} process were generated including the parton hadronisation to final state particles. This generation was performed for the Standard Model Higgs boson, the pseudoscalar Higgs boson, the Z → τ{sup +}τ{sup –} background, and mixed CP-states of the Higgsmore » boson.« less

  18. Structural aspects of Lorentz-violating quantum field theory

    NASA Astrophysics Data System (ADS)

    Cambiaso, M.; Lehnert, R.; Potting, R.

    2018-01-01

    In the last couple of decades the Standard Model Extension has emerged as a fruitful framework to analyze the empirical and theoretical extent of the validity of cornerstones of modern particle physics, namely, of Special Relativity and of the discrete symmetries C, P and T (or some combinations of these). The Standard Model Extension allows to contrast high-precision experimental tests with posited alterations representing minute Lorentz and/or CPT violations. To date no violation of these symmetry principles has been observed in experiments, mostly prompted by the Standard-Model Extension. From the latter, bounds on the extent of departures from Lorentz and CPT symmetries can be obtained with ever increasing accuracy. These analyses have been mostly focused on tree-level processes. In this presentation I would like to comment on structural aspects of perturbative Lorentz violating quantum field theory. I will show that some insight coming from radiative corrections demands a careful reassessment of perturbation theory. Specifically I will argue that both the standard renormalization procedure as well as the Lehmann-Symanzik-Zimmermann reduction formalism need to be adapted given that the asymptotic single-particle states can receive quantum corrections from Lorentz-violating operators that are not present in the original Lagrangian.

  19. Violations of the Lattice Index Theorem for Spherical Center Vortices

    NASA Astrophysics Data System (ADS)

    Höllwieser, R.; Faber, M.; Heller, U. M.

    2011-05-01

    We address the puzzle raised in a previous work of our group [Phys. Rev. D 77, 14515 (2008)], where we found a violation of the lattice index theorem with the overlap Dirac operator in the fundamental representation even for "admissible" gauge fields of a classical, spherical center vortex. Here we confirm the discrepancy between the topological charge and the index of the Dirac operator also for asqtad staggered fermions and adjoint representations. Numerically, the discrepancy equals the sum of the winding numbers of the spheres when they are regarded as maps S3→SU(2).

  20. Electromagnetic structure of the proton within the CP-violation hypothesis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Krutov, A. F., E-mail: krutov@ssu.samara.ru; Kudinov, M. Yu., E-mail: kudinov@ssu.samara.ru

    2013-11-15

    The so-called non-Rosenbluth behavior of the proton electromagnetic form factors can be explained within the hypothesis of CP violation in electromagnetic processes involving composite systems of strongly interacting particles. It is shown that this hypothesis leads to the appearance of an additional, anapole, form factor of the proton. The proton electromagnetic form factors, including the anapole form factor, are estimated on the basis of experimental data on elastic electron-proton scattering.

  1. Origin of the violation of the Gottfried sum rule

    NASA Astrophysics Data System (ADS)

    Hwang, W.-Y. P.; Speth, J.

    1992-08-01

    Using generalized Sullivan processes to generate sea-quark distributions of a nucleon at Q2=4 GeV2, we find that the recent finding by the New Muon Collaboration on the violation of the Gottfried sum rule can be understood quantitatively, including the shape of Fp2(x)-Fn2(x) as a function of x. The agreement may be seen as a clear evidence toward the validity of a recent suggestion of Hwang, Speth, and Brown that the sea distributions of a hadron, at low and moderate Q2 (at least up to a few GeV2), may be attributed primarily to generalized Sullivan processes.

  2. Beyond Gender Stereotypes in Language Comprehension: Self Sex-Role Descriptions Affect the Brain’s Potentials Associated with Agreement Processing

    PubMed Central

    Canal, Paolo; Garnham, Alan; Oakhill, Jane

    2015-01-01

    We recorded Event-Related Potentials to investigate differences in the use of gender information during the processing of reflexive pronouns. Pronouns either matched the gender provided by role nouns (such as “king” or “engineer”) or did not. We compared two types of gender information, definitional information, which is semantic in nature (a mother is female), or stereotypical (a nurse is likely to be female). When they followed definitional role-nouns, gender-mismatching pronouns elicited a P600 effect reflecting a failure in the agreement process. When instead the gender violation occurred after stereotypical role-nouns the Event Related Potential response was biphasic, being positive in parietal electrodes and negative in anterior left electrodes. The use of a correlational approach showed that those participants with more “feminine” or “expressive” self sex-role descriptions showed a P600 response for stereotype violations, suggesting that they experienced the mismatch as an agreement violation; whereas less “expressive” participants showed an Nref effect, indicating more effort spent in linking the pronouns with the possible, although less likely, counter-stereotypical referent. PMID:26779046

  3. How Mean is the Mean?

    PubMed Central

    Speelman, Craig P.; McGann, Marek

    2013-01-01

    In this paper we voice concerns about the uncritical manner in which the mean is often used as a summary statistic in psychological research. We identify a number of implicit assumptions underlying the use of the mean and argue that the fragility of these assumptions should be more carefully considered. We examine some of the ways in which the potential violation of these assumptions can lead us into significant theoretical and methodological error. Illustrations of alternative models of research already extant within Psychology are used to explore methods of research less mean-dependent and suggest that a critical assessment of the assumptions underlying its use in research play a more explicit role in the process of study design and review. PMID:23888147

  4. Philosophers assess randomized clinical trials: the need for dialogue.

    PubMed

    Miké, V

    1989-09-01

    In recent years a growing number of professional philosophers have joined in the controversy over ethical aspects of randomized clinical trials (RCTs). Morally questionable in their utilitarian approach, RCTs are claimed by some to be in direct violation of the second form of Kant's Categorical Imperative. But the arguments used in these critiques at times derive from a lack of insight into basic statistical procedures and the realities of the biomedical research process. Presented to physicians and other nonspecialists, including the lay public, such distortions can be harmful. Given the great complexity of statistical methodology and the anomalous nature of concepts of evidence, more sustained input into the interdisciplinary dialogue is needed from the statistical profession.

  5. Spontaneous Representations of Small Numbers of Objects by Rhesus Macaques: Examinations of Content and Format

    ERIC Educational Resources Information Center

    Hauser, Marc D.; Carey, Susan

    2003-01-01

    The project of comparative cognition benefits from common measures across species. We report here on five experiments using the violation of expectancy looking time measure with free-ranging rhesus macaques ("Macaca mulatta"), each designed to build on current knowledge concerning spontaneous representations of number. Each subject, tested in only…

  6. First, Third, and Fifth Grade Children's Attitudes about Gender Norm Violations.

    ERIC Educational Resources Information Center

    Blakemore, Judith E. Owen

    This questionnaire study examined elementary school student's knowledge of a number of gender norms as well as some moral and social norms. Participating in the study were 111 first, third, and fifth graders, the majority of whom were white, with a small number of Hispanic and Asian children. The gender roles related to children's play, hair…

  7. The Combined Effects of Measurement Error and Omitting Confounders in the Single-Mediator Model

    PubMed Central

    Fritz, Matthew S.; Kenny, David A.; MacKinnon, David P.

    2016-01-01

    Mediation analysis requires a number of strong assumptions be met in order to make valid causal inferences. Failing to account for violations of these assumptions, such as not modeling measurement error or omitting a common cause of the effects in the model, can bias the parameter estimates of the mediated effect. When the independent variable is perfectly reliable, for example when participants are randomly assigned to levels of treatment, measurement error in the mediator tends to underestimate the mediated effect, while the omission of a confounding variable of the mediator to outcome relation tends to overestimate the mediated effect. Violations of these two assumptions often co-occur, however, in which case the mediated effect could be overestimated, underestimated, or even, in very rare circumstances, unbiased. In order to explore the combined effect of measurement error and omitted confounders in the same model, the impact of each violation on the single-mediator model is first examined individually. Then the combined effect of having measurement error and omitted confounders in the same model is discussed. Throughout, an empirical example is provided to illustrate the effect of violating these assumptions on the mediated effect. PMID:27739903

  8. Estimating Controller Intervention Probabilities for Optimized Profile Descent Arrivals

    NASA Technical Reports Server (NTRS)

    Meyn, Larry A.; Erzberger, Heinz; Huynh, Phu V.

    2011-01-01

    Simulations of arrival traffic at Dallas/Fort-Worth and Denver airports were conducted to evaluate incorporating scheduling and separation constraints into advisories that define continuous descent approaches. The goal was to reduce the number of controller interventions required to ensure flights maintain minimum separation distances of 5 nmi horizontally and 1000 ft vertically. It was shown that simply incorporating arrival meter fix crossing-time constraints into the advisory generation could eliminate over half of the all predicted separation violations and more than 80% of the predicted violations between two arrival flights. Predicted separation violations between arrivals and non-arrivals were 32% of all predicted separation violations at Denver and 41% at Dallas/Fort-Worth. A probabilistic analysis of meter fix crossing-time errors is included which shows that some controller interventions will still be required even when the predicted crossing-times of the advisories are set to add a 1 or 2 nmi buffer above the minimum in-trail separation of 5 nmi. The 2 nmi buffer was shown to increase average flight delays by up to 30 sec when compared to the 1 nmi buffer, but it only resulted in a maximum decrease in average arrival throughput of one flight per hour.

  9. The effect of ethics training on students recognizing ethical violations and developing moral sensitivity.

    PubMed

    Baykara, Zehra Gocmen; Demir, Sevil Guler; Yaman, Sengul

    2015-09-01

    Moral sensitivity is a life-long cognitive ability. It is expected that nurses who work in a professional purpose at "curing human beings" should have a highly developed moral sensitivity. The general opinion is that ethics education plays a significant role in this sense to enhance the moral sensitivity in terms of nurses' professional behaviors and distinguish ethical violations. This study was conducted as intervention research for the purpose of determining the effect of the ethics training on fourth-year students of the nursing department recognizing ethical violations experienced in the hospital and developing ethical sensitivity. The study was conducted with 50 students, with 25 students each in the experiment and control groups. Students in the experiment group were provided ethics training and consultancy services. The data were collected through the data collection form, which consists of questions on the socio-demographic characteristics and ethical sensitivity of the students, Moral Sensitivity Questionnaire, and the observation form on ethical principle violations/protection in the clinic environment. The data were digitized on the computer with the SPSS for Windows 13.0 program. The data were evaluated utilizing number, percentile calculation, paired samples t-test, Wilcoxon test, and the McNemar test. The total Moral Sensitivity Questionnaire pre-test score averages of students in the experiment group were determined to be 93.88 ± 13.57, and their total post-test score averages were determined to be 89.24 ± 15.90. The total pre-test score averages of students in the control group were determined to be 91.48 ± 17.59, and their total post-test score averages were determined to be 97.72 ± 19.91. In the study, it was determined that the post-training ethical sensitivity of students in the experiment group increased; however, this was statistically not significant. Furthermore, it was determined that the number of ethical principle protection/violation observations and correct examples provided by students in the experiment group were higher than the control group and the difference was statistically significant. Written permission and ethical approval were obtained from the university where the study was conducted. Written consent was received from students accepting to participate in the study. As a result, ethics education given to students enables them to distinguish ethical violations in a hospital and make a proper observation in this issue. © The Author(s) 2014.

  10. An ERP study of regular and irregular English past tense inflection.

    PubMed

    Newman, Aaron J; Ullman, Michael T; Pancheva, Roumyana; Waligura, Diane L; Neville, Helen J

    2007-01-01

    Compositionality is a critical and universal characteristic of human language. It is found at numerous levels, including the combination of morphemes into words and of words into phrases and sentences. These compositional patterns can generally be characterized by rules. For example, the past tense of most English verbs ("regulars") is formed by adding an -ed suffix. However, many complex linguistic forms have rather idiosyncratic mappings. For example, "irregular" English verbs have past tense forms that cannot be derived from their stems in a consistent manner. Whether regular and irregular forms depend on fundamentally distinct neurocognitive processes (rule-governed combination vs. lexical memorization), or whether a single processing system is sufficient to explain the phenomena, has engendered considerable investigation and debate. We recorded event-related potentials while participants read English sentences that were either correct or had violations of regular past tense inflection, irregular past tense inflection, syntactic phrase structure, or lexical semantics. Violations of regular past tense and phrase structure, but not of irregular past tense or lexical semantics, elicited left-lateralized anterior negativities (LANs). These seem to reflect neurocognitive substrates that underlie compositional processes across linguistic domains, including morphology and syntax. Regular, irregular, and phrase structure violations all elicited later positivities that were maximal over midline parietal sites (P600s), and seem to index aspects of controlled syntactic processing of both phrase structure and morphosyntax. The results suggest distinct neurocognitive substrates for processing regular and irregular past tense forms: regulars depending on compositional processing, and irregulars stored in lexical memory.

  11. Experimental violation of Bell inequalities for multi-dimensional systems

    PubMed Central

    Lo, Hsin-Pin; Li, Che-Ming; Yabushita, Atsushi; Chen, Yueh-Nan; Luo, Chih-Wei; Kobayashi, Takayoshi

    2016-01-01

    Quantum correlations between spatially separated parts of a d-dimensional bipartite system (d ≥ 2) have no classical analog. Such correlations, also called entanglements, are not only conceptually important, but also have a profound impact on information science. In theory the violation of Bell inequalities based on local realistic theories for d-dimensional systems provides evidence of quantum nonlocality. Experimental verification is required to confirm whether a quantum system of extremely large dimension can possess this feature, however it has never been performed for large dimension. Here, we report that Bell inequalities are experimentally violated for bipartite quantum systems of dimensionality d = 16 with the usual ensembles of polarization-entangled photon pairs. We also estimate that our entanglement source violates Bell inequalities for extremely high dimensionality of d > 4000. The designed scenario offers a possible new method to investigate the entanglement of multipartite systems of large dimensionality and their application in quantum information processing. PMID:26917246

  12. Gross human rights violations and reparation under international law: approaching rehabilitation as a form of reparation.

    PubMed

    Sveaass, Nora

    2013-01-01

    The strengthening of international criminal law through an increased focus on the right to reparation and rehabilitation for victims of crimes against humanity represents an important challenge to health professionals, particularly to those in the field of trauma research and treatment. A brief outline of some developments in the field of international law and justice for victims of gross human rights violations is presented, with a focus on the right to reparation including the means for rehabilitation. The fulfillment of this right is a complex endeavor which raises many questions. The road to justice and reparation for those whose rights have been brutally violated is long and burdensome. The active presence of trauma-informed health professionals in this process is a priority. Some of the issues raised within the context of states' obligations to provide and ensure redress and rehabilitation to those subjected to torture and gross human rights violations are discussed, and in particular how rehabilitation can be understood and responded to by health professionals.

  13. Leptonic Unitarity Triangle and CP-Violation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Farzan, Yasaman

    2002-02-01

    The area of the unitarity triangle is a measure of CP-violation. We introduce the leptonic unitarity triangles and study their properties. We consider the possibility of reconstructing the unitarity triangle in future oscillation and non-oscillation experiments. A set of measurements is suggested which will, in principle, allow us to measure all sides of the triangle, and consequently to establish CP-violation. For different values of the CP-violating phase, {delta}{sub D}, the required accuracy of measurements is estimated. The key elements of the method include determination of |U{sub e3}| and studies of the {nu}{sub {mu}} - {nu}{sub {mu}} survival probability in oscillationsmore » driven by the solar mass splitting {Delta}m{sub sun}{sup 2}. We suggest additional astrophysical measurements which may help to reconstruct the triangle. The method of the unitarity triangle is complementary to the direct measurements of CP-asymmetry. It requires mainly studies of the survival probabilities and processes where oscillations are averaged or the coherence of the state is lost.« less

  14. ERP Responses to Violations in the Hierarchical Structure of Functional Categories in Japanese Verb Conjugation.

    PubMed

    Kobayashi, Yuki; Sugioka, Yoko; Ito, Takane

    2018-02-01

    An event-related potential experiment was conducted in order to investigate readers' response to violations in the hierarchical structure of functional categories in Japanese, an agglutinative language where functional heads like Negation (Neg) as well as Tense (Tns) are realized as suffixes. A left-lateralized negativity followed by a P600 was elicited for the anomaly of attaching a Neg morpheme outside a Tns-marking suffix (i.e., syntactic violation of the form *[[V - Tns] - Neg]), while only P600 was observed for the anomalous form with a purely morphological/morpho-phonological violation, i.e., a Neg morpheme attached to ren'yo form instead of Neg-selecting form. The findings suggest that the syntactic structure involving Tns and Neg in Japanese, realized within a word as a sequence of suffixes, is processed in a similar manner to the syntactic structures that are phrasally realized in well-studied European languages like English.

  15. Hadronic Lorentz violation in chiral perturbation theory including the coupling to external fields

    NASA Astrophysics Data System (ADS)

    Kamand, Rasha; Altschul, Brett; Schindler, Matthias R.

    2018-05-01

    If any violation of Lorentz symmetry exists in the hadron sector, its ultimate origins must lie at the quark level. We continue the analysis of how the theories at these two levels are connected, using chiral perturbation theory. Considering a 2-flavor quark theory, with dimension-4 operators that break Lorentz symmetry, we derive a low-energy theory of pions and nucleons that is invariant under local chiral transformations and includes the coupling to external fields. The pure meson and baryon sectors, as well as the couplings between them and the couplings to external electromagnetic and weak gauge fields, contain forms of Lorentz violation which depend on linear combinations of quark-level coefficients. In particular, at leading order the electromagnetic couplings depend on the very same combinations as appear in the free particle propagators. This means that observations of electromagnetic processes involving hadrons—such as vacuum Cerenkov radiation, which may be allowed in Lorentz-violating theories—can only reliably constrain certain particular combinations of quark coefficients.

  16. Why emotions matter: expectancy violation and affective response mediate the emotional victim effect.

    PubMed

    Ask, Karl; Landström, Sara

    2010-10-01

    The mechanisms behind the 'emotional victim effect' (i.e., that the emotionality of a rape victim's demeanor affects perceived credibility) are relatively unexplored. In this article, a previously neglected mechanism--observers' affective response to the victim--is proposed as an alternative to the traditional expectancy-violation account. The emotional victim effect was replicated in an experiment with a sample of police trainees (N = 189), and cognitive load was found to increase the magnitude of the effect. Importantly, both compassionate affective response and expectancy violation actively mediated the emotional victim effect when the other mechanism was controlled for. These findings extend previous research on credibility judgments by introducing a 'hot' cognitive component in the judgment process. Theoretical and practical implications are discussed.

  17. Risk factors associated with traffic violations and accident severity in China.

    PubMed

    Zhang, Guangnan; Yau, Kelvin K W; Chen, Guanghan

    2013-10-01

    With the recent economic boom in China, vehicle volume and the number of traffic accident fatalities have become the highest in the world. Meanwhile, traffic accidents have become the leading cause of death in China. Systematically analyzing road safety data from different perspectives and applying empirical methods/implementing proper measures to reduce the fatality rate will be an urgent and challenging task for China in the coming years. In this study, we analyze the traffic accident data for the period 2006-2010 in Guangdong Province, China. These data, extracted from the Traffic Management Sector-Specific Incident Case Data Report, are the only officially available and reliable source of traffic accident data (with a sample size>7000 per year). In particular, we focus on two outcome measures: traffic violations and accident severity. Human, vehicle, road and environmental risk factors are considered. First, the results establish the role of traffic violations as one of the major risks threatening road safety. An immediate implication is: if the traffic violation rate could be reduced or controlled successfully, then the rate of serious injuries and fatalities would be reduced accordingly. Second, specific risk factors associated with traffic violations and accident severity are determined. Accordingly, to reduce traffic accident incidence and fatality rates, measures such as traffic regulations and legislation-targeting different vehicle types/driver groups with respect to the various human, vehicle and environment risk factors-are needed. Such measures could include road safety programs for targeted driver groups, focused enforcement of traffic regulations and road/transport facility improvements. Data analysis results arising from this study will shed lights on the development of similar (adjusted) measures to reduce traffic violations and/or accident fatalities and injuries, and to promote road safety in other regions. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. Observation of parity violation in the Ω→ΛK decay

    NASA Astrophysics Data System (ADS)

    Hypercp Collaboration; Lu, L. C.; Burnstein, R. A.; Chakravorty, A.; Chen, Y. C.; Choong, W.-S.; Clark, K.; Dukes, E. C.; Durandet, C.; Felix, J.; Fu, Y.; Gidal, G.; Gustafson, H. R.; Holmstrom, T.; Huang, M.; James, C.; Jenkins, C. M.; Jones, T. D.; Kaplan, D. M.; Longo, M. J.; Luebke, W.; Luk, K.-B.; Nelson, K. S.; Park, H. K.; Perroud, J.-P.; Rajaram, D.; Rubin, H. A.; Volk, J.; White, C. G.; White, S. L.; Zyla, P.

    2005-06-01

    The α decay parameter in the process Ω→ΛK has been measured from a sample of 4.50 million unpolarized Ω decays recorded by the HyperCP (E871) experiment at Fermilab and found to be [1.78±0.19(stat)±0.16(syst)]×10. This is the first unambiguous evidence for a nonzero α decay parameter, and hence parity violation, in the Ω→ΛK decay.

  19. Thermal entanglement and teleportation in a dipolar interacting system

    NASA Astrophysics Data System (ADS)

    Castro, C. S.; Duarte, O. S.; Pires, D. P.; Soares-Pinto, D. O.; Reis, M. S.

    2016-04-01

    Quantum teleportation, which depends on entangled states, is a fascinating subject and an important branch of quantum information processing. The present work reports the use of a dipolar spin thermal system as a noisy quantum channel to perform quantum teleportation. Non-locality, tested by violation of Bell's inequality and thermal entanglement, measured by negativity, shows that for the present model all entangled states, even those that do not violate Bell's inequality, are useful for teleportation.

  20. ERP effects and perceived exclusion in the Cyberball paradigm: Correlates of expectancy violation?

    PubMed

    Weschke, Sarah; Niedeggen, Michael

    2015-10-22

    A virtual ball-tossing game called Cyberball has allowed the identification of neural structures involved in the processing of social exclusion by using neurocognitive methods. However, there is still an ongoing debate if structures involved are either pain- or exclusion-specific or part of a broader network. In electrophysiological Cyberball studies we have shown that the P3b component is sensitive to exclusion manipulations, possibly modulated by the probability of ball possession of the participant (event "self") or the presumed co-players (event "other"). Since it is known from oddball studies that the P3b is not only modulated by the objective probability of an event, but also by subjective expectancy, we independently manipulated the probability of the events "self" and "other" and the expectancy for these events. Questionnaire data indicate that social need threat is only induced when the expectancy for involvement in the ball-tossing game is violated. Similarly, the P3b amplitude of both "self" and "other" events was a correlate of expectancy violation. We conclude that both the subjective report of exclusion and the P3b effect induced in the Cyberball paradigm are primarily based on a cognitive process sensitive to expectancy violations, and that the P3b is not related to the activation of an exclusion-specific neural alarm system. Copyright © 2015 Elsevier B.V. All rights reserved.

  1. Lorentzian Goldstone modes shared among photons and gravitons

    NASA Astrophysics Data System (ADS)

    Chkareuli, J. L.; Jejelava, J.; Kepuladze, Z.

    2018-02-01

    It has long been known that photons and gravitons may appear as vector and tensor Goldstone modes caused by spontaneous Lorentz invariance violation (SLIV). Usually this approach is considered for photons and gravitons separately. We develop the emergent electrogravity theory consisting of the ordinary QED and the tensor-field gravity model which mimics the linearized general relativity in Minkowski spacetime. In this theory, Lorentz symmetry appears incorporated into higher global symmetries of the length-fixing constraints put on the vector and tensor fields involved, A_{μ }2=± MA2 and H_{μ ν }2=± MH2 (MA and MH are the proposed symmetry breaking scales). We show that such a SLIV pattern being related to breaking of global symmetries underlying these constraints induces the massless Goldstone and pseudo-Goldstone modes shared by photon and graviton. While for a vector field case the symmetry of the constraint coincides with Lorentz symmetry SO(1, 3) of the electrogravity Lagrangian, the tensor-field constraint itself possesses much higher global symmetry SO(7, 3), whose spontaneous violation provides a sufficient number of zero modes collected in a graviton. Accordingly, while the photon may only contain true Goldstone modes, the graviton appears at least partially to be composed of pseudo-Goldstone modes rather than of pure Goldstone ones. When expressed in terms of these modes, the theory looks essentially nonlinear and contains a variety of Lorentz and CPT violating couplings. However, all SLIV effects turn out to be strictly cancelled in the lowest order processes considered in some detail. How this emergent electrogravity theory could be observationally different from conventional QED and GR theories is also briefly discussed.

  2. A longitudinal study of an intervention to improve road safety climate: climate as an organizational boundary spanner.

    PubMed

    Naveh, Eitan; Katz-Navon, Tal

    2015-01-01

    This study presents and tests an intervention to enhance organizational climate and expands existing conceptualization of organizational climate to include its influence on employee behaviors outside the organization's physical boundaries. In addition, by integrating the literatures of climate and work-family interface, the study explored climate spillover and crossover from work to the home domain. Focusing on an applied practical problem within organizations, we investigated the example of road safety climate and employees' and their families' driving, using a longitudinal study design of road safety intervention versus control groups. Results demonstrated that the intervention increased road safety climate and decreased the number of traffic violation tickets and that road safety climate mediated the relationship between the intervention and the number of traffic violation tickets. Road safety climate spilled over to the family domain but did not cross over to influence family members' driving. (c) 2015 APA, all rights reserved.

  3. Supplementing Public Health Inspection via Social Media

    PubMed Central

    Schomberg, John P.; Haimson, Oliver L.; Hayes, Gillian R.; Anton-Culver, Hoda

    2016-01-01

    Foodborne illness is prevented by inspection and surveillance conducted by health departments across America. Appropriate restaurant behavior is enforced and monitored via public health inspections. However, surveillance coverage provided by state and local health departments is insufficient in preventing the rising number of foodborne illness outbreaks. To address this need for improved surveillance coverage we conducted a supplementary form of public health surveillance using social media data: Yelp.com restaurant reviews in the city of San Francisco. Yelp is a social media site where users post reviews and rate restaurants they have personally visited. Presence of keywords related to health code regulations and foodborne illness symptoms, number of restaurant reviews, number of Yelp stars, and restaurant price range were included in a model predicting a restaurant’s likelihood of health code violation measured by the assigned San Francisco public health code rating. For a list of major health code violations see (S1 Table). We built the predictive model using 71,360 Yelp reviews of restaurants in the San Francisco Bay Area. The predictive model was able to predict health code violations in 78% of the restaurants receiving serious citations in our pilot study of 440 restaurants. Training and validation data sets each pulled data from 220 restaurants in San Francisco. Keyword analysis of free text within Yelp not only improved detection of high-risk restaurants, but it also served to identify specific risk factors related to health code violation. To further validate our model we applied the model generated in our pilot study to Yelp data from 1,542 restaurants in San Francisco. The model achieved 91% sensitivity 74% specificity, area under the receiver operator curve of 98%, and positive predictive value of 29% (given a substandard health code rating prevalence of 10%). When our model was applied to restaurant reviews in New York City we achieved 74% sensitivity, 54% specificity, area under the receiver operator curve of 77%, and positive predictive value of 25% (given a prevalence of 12%). Model accuracy improved when reviews ranked highest by Yelp were utilized. Our results indicate that public health surveillance can be improved by using social media data to identify restaurants at high risk for health code violation. Additionally, using highly ranked Yelp reviews improves predictive power and limits the number of reviews needed to generate prediction. Use of this approach as an adjunct to current risk ranking of restaurants prior to inspection may enhance detection of those restaurants participating in high risk practices that may have gone previously undetected. This model represents a step forward in the integration of social media into meaningful public health interventions. PMID:27023681

  4. Supplementing Public Health Inspection via Social Media.

    PubMed

    Schomberg, John P; Haimson, Oliver L; Hayes, Gillian R; Anton-Culver, Hoda

    2016-01-01

    Foodborne illness is prevented by inspection and surveillance conducted by health departments across America. Appropriate restaurant behavior is enforced and monitored via public health inspections. However, surveillance coverage provided by state and local health departments is insufficient in preventing the rising number of foodborne illness outbreaks. To address this need for improved surveillance coverage we conducted a supplementary form of public health surveillance using social media data: Yelp.com restaurant reviews in the city of San Francisco. Yelp is a social media site where users post reviews and rate restaurants they have personally visited. Presence of keywords related to health code regulations and foodborne illness symptoms, number of restaurant reviews, number of Yelp stars, and restaurant price range were included in a model predicting a restaurant's likelihood of health code violation measured by the assigned San Francisco public health code rating. For a list of major health code violations see (S1 Table). We built the predictive model using 71,360 Yelp reviews of restaurants in the San Francisco Bay Area. The predictive model was able to predict health code violations in 78% of the restaurants receiving serious citations in our pilot study of 440 restaurants. Training and validation data sets each pulled data from 220 restaurants in San Francisco. Keyword analysis of free text within Yelp not only improved detection of high-risk restaurants, but it also served to identify specific risk factors related to health code violation. To further validate our model we applied the model generated in our pilot study to Yelp data from 1,542 restaurants in San Francisco. The model achieved 91% sensitivity 74% specificity, area under the receiver operator curve of 98%, and positive predictive value of 29% (given a substandard health code rating prevalence of 10%). When our model was applied to restaurant reviews in New York City we achieved 74% sensitivity, 54% specificity, area under the receiver operator curve of 77%, and positive predictive value of 25% (given a prevalence of 12%). Model accuracy improved when reviews ranked highest by Yelp were utilized. Our results indicate that public health surveillance can be improved by using social media data to identify restaurants at high risk for health code violation. Additionally, using highly ranked Yelp reviews improves predictive power and limits the number of reviews needed to generate prediction. Use of this approach as an adjunct to current risk ranking of restaurants prior to inspection may enhance detection of those restaurants participating in high risk practices that may have gone previously undetected. This model represents a step forward in the integration of social media into meaningful public health interventions.

  5. Event-related potential evidence of processing lexical pitch-accent in auditory Japanese sentences.

    PubMed

    Koso, Ayumi; Hagiwara, Hiroko

    2009-09-23

    Neural mechanisms that underlie the processing of lexical pitch-accent in auditory Japanese were investigated by using event-related potentials. Native speakers of Japanese listened to two types of short sentences, both consisting of a noun and a verb. The sentences ended with a verb with either congruous or incongruous pitch-accent pattern, where pitch-accent violations occur at the verb in the incongruent condition. The event-related potentials of the incongruent condition showed an increased widespread negativity that started 400 ms after the onset of the deviant lexical item and lasted for about 400 ms. These results suggest that the negativity evoked by violations in lexical-pitch accent indicates electrophysiological evidence for the online processing of lexical-pitch accent in auditory Japanese.

  6. 78 FR 35826 - Unfair Competitive Advantages; Enhancement of the Formal Complaint Process

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-14

    ... Postal Service to the time and expense of the discovery process. The Commission anticipates that allowing.... 1739] Unfair Competitive Advantages; Enhancement of the Formal Complaint Process AGENCY: Postal... enhance the formal complaint process in cases involving alleged violations of a law that prohibits the...

  7. Searches for R -parity-violating supersymmetry in p p collisions at √{s }=8 TeV in final states with 0-4 leptons

    NASA Astrophysics Data System (ADS)

    Khachatryan, V.; Sirunyan, A. M.; Tumasyan, A.; Adam, W.; Asilar, E.; Bergauer, T.; Brandstetter, J.; Brondolin, E.; Dragicevic, M.; Erö, J.; Flechl, M.; Friedl, M.; Frühwirth, R.; Ghete, V. M.; Hartl, C.; Hörmann, N.; Hrubec, J.; Jeitler, M.; König, A.; Krammer, M.; Krätschmer, I.; Liko, D.; Matsushita, T.; Mikulec, I.; Rabady, D.; Rad, N.; Rahbaran, B.; Rohringer, H.; Schieck, J.; Strauss, J.; Treberer-Treberspurg, W.; Waltenberger, W.; Wulz, C.-E.; Mossolov, V.; Shumeiko, N.; Suarez Gonzalez, J.; Alderweireldt, S.; Cornelis, T.; De Wolf, E. A.; Janssen, X.; Knutsson, A.; Lauwers, J.; Luyckx, S.; Van De Klundert, M.; Van Haevermaet, H.; Van Mechelen, P.; Van Remortel, N.; Van Spilbeeck, A.; Abu Zeid, S.; Blekman, F.; D'Hondt, J.; Daci, N.; De Bruyn, I.; Deroover, K.; Heracleous, N.; Keaveney, J.; Lowette, S.; Moortgat, S.; Moreels, L.; Olbrechts, A.; Python, Q.; Strom, D.; Tavernier, S.; Van Doninck, W.; Van Mulders, P.; Van Parijs, I.; Brun, H.; Caillol, C.; Clerbaux, B.; De Lentdecker, G.; Fasanella, G.; Favart, L.; Goldouzian, R.; Grebenyuk, A.; Karapostoli, G.; Lenzi, T.; Léonard, A.; Maerschalk, T.; Marinov, A.; Randle-conde, A.; Seva, T.; Vander Velde, C.; Vanlaer, P.; Yonamine, R.; Zenoni, F.; Zhang, F.; Benucci, L.; Cimmino, A.; Crucy, S.; Dobur, D.; Fagot, A.; Garcia, G.; Gul, M.; Mccartin, J.; Ocampo Rios, A. A.; Poyraz, D.; Ryckbosch, D.; Salva, S.; Schöfbeck, R.; Sigamani, M.; Tytgat, M.; Van Driessche, W.; Yazgan, E.; Zaganidis, N.; Beluffi, C.; Bondu, O.; Brochet, S.; Bruno, G.; Caudron, A.; Ceard, L.; De Visscher, S.; Delaere, C.; Delcourt, M.; Forthomme, L.; Francois, B.; Giammanco, A.; Jafari, A.; Jez, P.; Komm, M.; Lemaitre, V.; Magitteri, A.; Mertens, A.; Musich, M.; Nuttens, C.; Piotrzkowski, K.; Quertenmont, L.; Selvaggi, M.; Vidal Marono, M.; Wertz, S.; Beliy, N.; Hammad, G. H.; Aldá Júnior, W. L.; Alves, F. L.; Alves, G. A.; Brito, L.; Correa Martins Junior, M.; Hamer, M.; Hensel, C.; Moraes, A.; Pol, M. E.; Rebello Teles, P.; Belchior Batista Das Chagas, E.; Carvalho, W.; Chinellato, J.; Custódio, A.; Da Costa, E. M.; De Jesus Damiao, D.; De Oliveira Martins, C.; Fonseca De Souza, S.; Huertas Guativa, L. M.; Malbouisson, H.; Matos Figueiredo, D.; Mora Herrera, C.; Mundim, L.; Nogima, H.; Prado Da Silva, W. L.; Santoro, A.; Sznajder, A.; Tonelli Manganote, E. J.; Vilela Pereira, A.; Ahuja, S.; Bernardes, C. A.; De Souza Santos, A.; Dogra, S.; Fernandez Perez Tomei, T. R.; Gregores, E. M.; Mercadante, P. G.; Moon, C. S.; Novaes, S. F.; Fernandez Perez Padula, Sandra S.; Romero Abad, D.; Ruiz Vargas, J. C.; Aleksandrov, A.; Hadjiiska, R.; Iaydjiev, P.; Rodozov, M.; Stoykova, S.; Sultanov, G.; Vutova, M.; Dimitrov, A.; Glushkov, I.; Litov, L.; Pavlov, B.; Petkov, P.; Fang, W.; Ahmad, M.; Bian, J. G.; Chen, G. M.; Chen, H. S.; Chen, M.; Cheng, T.; Du, R.; Jiang, C. H.; Leggat, D.; Plestina, R.; Romeo, F.; Shaheen, S. M.; Spiezia, A.; Tao, J.; Wang, C.; Wang, Z.; Zhang, H.; Asawatangtrakuldee, C.; Ban, Y.; Li, Q.; Liu, S.; Mao, Y.; Qian, S. J.; Wang, D.; Xu, Z.; Avila, C.; Cabrera, A.; Chaparro Sierra, L. F.; Florez, C.; Gomez, J. P.; Gomez Moreno, B.; Sanabria, J. C.; Godinovic, N.; Lelas, D.; Puljak, I.; Ribeiro Cipriano, P. M.; Antunovic, Z.; Kovac, M.; Brigljevic, V.; Ferencek, D.; Kadija, K.; Luetic, J.; Micanovic, S.; Sudic, L.; Attikis, A.; Mavromanolakis, G.; Mousa, J.; Nicolaou, C.; Ptochos, F.; Razis, P. A.; Rykaczewski, H.; Finger, M.; Finger, M.; Carrera Jarrin, E.; Abdelalim, A. A.; El-khateeb, E.; Elkafrawy, T.; Mahmoud, M. A.; Calpas, B.; Kadastik, M.; Murumaa, M.; Perrini, L.; Raidal, M.; Tiko, A.; Veelken, C.; Eerola, P.; Pekkanen, J.; Voutilainen, M.; Härkönen, J.; Karimäki, V.; Kinnunen, R.; Lampén, T.; Lassila-Perini, K.; Lehti, S.; Lindén, T.; Luukka, P.; Peltola, T.; Tuominiemi, J.; Tuovinen, E.; Wendland, L.; Talvitie, J.; Tuuva, T.; Besancon, M.; Couderc, F.; Dejardin, M.; Denegri, D.; Fabbro, B.; Faure, J. L.; Favaro, C.; Ferri, F.; Ganjour, S.; Givernaud, A.; Gras, P.; Hamel de Monchenault, G.; Jarry, P.; Locci, E.; Machet, M.; Malcles, J.; Rander, J.; Rosowsky, A.; Titov, M.; Zghiche, A.; Abdulsalam, A.; Antropov, I.; Baffioni, S.; Beaudette, F.; Busson, P.; Cadamuro, L.; Chapon, E.; Charlot, C.; Davignon, O.; Dobrzynski, L.; Granier de Cassagnac, R.; Jo, M.; Lisniak, S.; Miné, P.; Naranjo, I. N.; Nguyen, M.; Ochando, C.; Ortona, G.; Paganini, P.; Pigard, P.; Regnard, S.; Salerno, R.; Sirois, Y.; Strebler, T.; Yilmaz, Y.; Zabi, A.; Agram, J.-L.; Andrea, J.; Aubin, A.; Bloch, D.; Brom, J.-M.; Buttignol, M.; Chabert, E. C.; Chanon, N.; Collard, C.; Conte, E.; Coubez, X.; Fontaine, J.-C.; Gelé, D.; Goerlach, U.; Goetzmann, C.; Le Bihan, A.-C.; Merlin, J. A.; Skovpen, K.; Van Hove, P.; Gadrat, S.; Beauceron, S.; Bernet, C.; Boudoul, G.; Bouvier, E.; Carrillo Montoya, C. A.; Chierici, R.; Contardo, D.; Courbon, B.; Depasse, P.; El Mamouni, H.; Fan, J.; Fay, J.; Gascon, S.; Gouzevitch, M.; Ille, B.; Lagarde, F.; Laktineh, I. B.; Lethuillier, M.; Mirabito, L.; Pequegnot, A. L.; Perries, S.; Popov, A.; Ruiz Alvarez, J. D.; Sabes, D.; Sordini, V.; Vander Donckt, M.; Verdier, P.; Viret, S.; Toriashvili, T.; Tsamalaidze, Z.; Autermann, C.; Beranek, S.; Feld, L.; Heister, A.; Kiesel, M. K.; Klein, K.; Lipinski, M.; Ostapchuk, A.; Preuten, M.; Raupach, F.; Schael, S.; Schomakers, C.; Schulte, J. F.; Schulz, J.; Verlage, T.; Weber, H.; Zhukov, V.; Ata, M.; Brodski, M.; Dietz-Laursonn, E.; Duchardt, D.; Endres, M.; Erdmann, M.; Erdweg, S.; Esch, T.; Fischer, R.; Güth, A.; Hebbeker, T.; Heidemann, C.; Hoepfner, K.; Knutzen, S.; Merschmeyer, M.; Meyer, A.; Millet, P.; Mukherjee, S.; Olschewski, M.; Padeken, K.; Papacz, P.; Pook, T.; Radziej, M.; Reithler, H.; Rieger, M.; Scheuch, F.; Sonnenschein, L.; Teyssier, D.; Thüer, S.; Cherepanov, V.; Erdogan, Y.; Flügge, G.; Geenen, H.; Geisler, M.; Hoehle, F.; Kargoll, B.; Kress, T.; Künsken, A.; Lingemann, J.; Nehrkorn, A.; Nowack, A.; Nugent, I. M.; Pistone, C.; Pooth, O.; Stahl, A.; Aldaya Martin, M.; Asin, I.; Beernaert, K.; Behnke, O.; Behrens, U.; Borras, K.; Campbell, A.; Connor, P.; Contreras-Campana, C.; Costanza, F.; Diez Pardos, C.; Dolinska, G.; Dooling, S.; Eckerlin, G.; Eckstein, D.; Eichhorn, T.; Gallo, E.; Garay Garcia, J.; Geiser, A.; Gizhko, A.; Grados Luyando, J. M.; Gunnellini, P.; Harb, A.; Hauk, J.; Hempel, M.; Jung, H.; Kalogeropoulos, A.; Karacheban, O.; Kasemann, M.; Kieseler, J.; Kleinwort, C.; Korol, I.; Lange, W.; Lelek, A.; Leonard, J.; Lipka, K.; Lobanov, A.; Lohmann, W.; Mankel, R.; Melzer-Pellmann, I.-A.; Meyer, A. B.; Mittag, G.; Mnich, J.; Mussgiller, A.; Ntomari, E.; Pitzl, D.; Placakyte, R.; Raspereza, A.; Roland, B.; Sahin, M. Ö.; Saxena, P.; Schoerner-Sadenius, T.; Seitz, C.; Spannagel, S.; Stefaniuk, N.; Trippkewitz, K. D.; Van Onsem, G. P.; Walsh, R.; Wissing, C.; Blobel, V.; Centis Vignali, M.; Draeger, A. R.; Dreyer, T.; Erfle, J.; Garutti, E.; Goebel, K.; Gonzalez, D.; Görner, M.; Haller, J.; Hoffmann, M.; Höing, R. S.; Junkes, A.; Klanner, R.; Kogler, R.; Kovalchuk, N.; Lapsien, T.; Lenz, T.; Marchesini, I.; Marconi, D.; Meyer, M.; Niedziela, M.; Nowatschin, D.; Ott, J.; Pantaleo, F.; Peiffer, T.; Perieanu, A.; Pietsch, N.; Poehlsen, J.; Sander, C.; Scharf, C.; Schleper, P.; Schlieckau, E.; Schmidt, A.; Schumann, S.; Schwandt, J.; Stadie, H.; Steinbrück, G.; Stober, F. M.; Tholen, H.; Troendle, D.; Usai, E.; Vanelderen, L.; Vanhoefer, A.; Vormwald, B.; Barth, C.; Baus, C.; Berger, J.; Böser, C.; Butz, E.; Chwalek, T.; Colombo, F.; De Boer, W.; Descroix, A.; Dierlamm, A.; Fink, S.; Frensch, F.; Friese, R.; Giffels, M.; Gilbert, A.; Haitz, D.; Hartmann, F.; Heindl, S. M.; Husemann, U.; Katkov, I.; Kornmayer, A.; Lobelle Pardo, P.; Maier, B.; Mildner, H.; Mozer, M. U.; Müller, T.; Müller, Th.; Plagge, M.; Quast, G.; Rabbertz, K.; Röcker, S.; Roscher, F.; Schröder, M.; Sieber, G.; Simonis, H. J.; Ulrich, R.; Wagner-Kuhr, J.; Wayand, S.; Weber, M.; Weiler, T.; Williamson, S.; Wöhrmann, C.; Wolf, R.; Anagnostou, G.; Daskalakis, G.; Geralis, T.; Giakoumopoulou, V. A.; Kyriakis, A.; Loukas, D.; Psallidas, A.; Topsis-Giotis, I.; Agapitos, A.; Kesisoglou, S.; Panagiotou, A.; Saoulidou, N.; Tziaferi, E.; Evangelou, I.; Flouris, G.; Foudas, C.; Kokkas, P.; Loukas, N.; Manthos, N.; Papadopoulos, I.; Paradas, E.; Strologas, J.; Filipovic, N.; Bencze, G.; Hajdu, C.; Hidas, P.; Horvath, D.; Sikler, F.; Veszpremi, V.; Vesztergombi, G.; Zsigmond, A. J.; Beni, N.; Czellar, S.; Karancsi, J.; Molnar, J.; Szillasi, Z.; Bartók, M.; Makovec, A.; Raics, P.; Trocsanyi, Z. L.; Ujvari, B.; Choudhury, S.; Mal, P.; Mandal, K.; Nayak, A.; Sahoo, D. K.; Sahoo, N.; Swain, S. K.; Bansal, S.; Beri, S. B.; Bhatnagar, V.; Chawla, R.; Gupta, R.; Bhawandeep, U.; Kalsi, A. K.; Kaur, A.; Kaur, M.; Kumar, R.; Mehta, A.; Mittal, M.; Singh, J. B.; Walia, G.; Kumar, Ashok; Bhardwaj, A.; Choudhary, B. C.; Garg, R. B.; Keshri, S.; Kumar, A.; Malhotra, S.; Naimuddin, M.; Nishu, N.; Ranjan, K.; Sharma, R.; Sharma, V.; Bhattacharya, R.; Bhattacharya, S.; Chatterjee, K.; Dey, S.; Dutta, S.; Ghosh, S.; Majumdar, N.; Modak, A.; Mondal, K.; Mukhopadhyay, S.; Nandan, S.; Purohit, A.; Roy, A.; Roy, D.; Roy Chowdhury, S.; Sarkar, S.; Sharan, M.; Chudasama, R.; Dutta, D.; Jha, V.; Kumar, V.; Mohanty, A. K.; Pant, L. M.; Shukla, P.; Topkar, A.; Aziz, T.; Banerjee, S.; Bhowmik, S.; Chatterjee, R. M.; Dewanjee, R. K.; Dugad, S.; Ganguly, S.; Ghosh, S.; Guchait, M.; Gurtu, A.; Jain, Sa.; Kole, G.; Kumar, S.; Mahakud, B.; Maity, M.; Majumder, G.; Mazumdar, K.; Mitra, S.; Mohanty, G. B.; Parida, B.; Sarkar, T.; Sur, N.; Sutar, B.; Wickramage, N.; Chauhan, S.; Dube, S.; Kapoor, A.; Kothekar, K.; Rane, A.; Sharma, S.; Bakhshiansohi, H.; Behnamian, H.; Etesami, S. M.; Fahim, A.; Khakzad, M.; Mohammadi Najafabadi, M.; Naseri, M.; Paktinat Mehdiabadi, S.; Rezaei Hosseinabadi, F.; Safarzadeh, B.; Zeinali, M.; Felcini, M.; Grunewald, M.; Abbrescia, M.; Calabria, C.; Caputo, C.; Colaleo, A.; Creanza, D.; Cristella, L.; De Filippis, N.; De Palma, M.; Fiore, L.; Iaselli, G.; Maggi, G.; Maggi, M.; Miniello, G.; My, S.; Nuzzo, S.; Pompili, A.; Pugliese, G.; Radogna, R.; Ranieri, A.; Selvaggi, G.; Silvestris, L.; Venditti, R.; Abbiendi, G.; Battilana, C.; Bonacorsi, D.; Braibant-Giacomelli, S.; Brigliadori, L.; Campanini, R.; Capiluppi, P.; Castro, A.; Cavallo, F. R.; Chhibra, S. S.; Codispoti, G.; Cuffiani, M.; Dallavalle, G. M.; Fabbri, F.; Fanfani, A.; Fasanella, D.; Giacomelli, P.; Grandi, C.; Guiducci, L.; Marcellini, S.; Masetti, G.; Montanari, A.; Navarria, F. L.; Perrotta, A.; Rossi, A. M.; Rovelli, T.; Siroli, G. P.; Tosi, N.; Cappello, G.; Chiorboli, M.; Costa, S.; Di Mattia, A.; Giordano, F.; Potenza, R.; Tricomi, A.; Tuve, C.; Barbagli, G.; Ciulli, V.; Civinini, C.; D'Alessandro, R.; Focardi, E.; Gori, V.; Lenzi, P.; Meschini, M.; Paoletti, S.; Sguazzoni, G.; Viliani, L.; Benussi, L.; Bianco, S.; Fabbri, F.; Piccolo, D.; Primavera, F.; Calvelli, V.; Ferro, F.; Lo Vetere, M.; Monge, M. R.; Robutti, E.; Tosi, S.; Brianza, L.; Dinardo, M. E.; Fiorendi, S.; Gennai, S.; Ghezzi, A.; Govoni, P.; Malvezzi, S.; Manzoni, R. A.; Marzocchi, B.; Menasce, D.; Moroni, L.; Paganoni, M.; Pedrini, D.; Pigazzini, S.; Ragazzi, S.; Redaelli, N.; Tabarelli de Fatis, T.; Buontempo, S.; Cavallo, N.; Di Guida, S.; Esposito, M.; Fabozzi, F.; Iorio, A. O. M.; Lanza, G.; Lista, L.; Meola, S.; Merola, M.; Paolucci, P.; Sciacca, C.; Thyssen, F.; Azzi, P.; Bacchetta, N.; Benato, L.; Bisello, D.; Boletti, A.; Carlin, R.; Checchia, P.; Dall'Osso, M.; De Castro Manzano, P.; Dorigo, T.; Dosselli, U.; Gasparini, F.; Gasparini, U.; Gozzelino, A.; Lacaprara, S.; Margoni, M.; Meneguzzo, A. T.; Montecassiano, F.; Passaseo, M.; Pazzini, J.; Pegoraro, M.; Pozzobon, N.; Ronchese, P.; Simonetto, F.; Torassa, E.; Tosi, M.; Vanini, S.; Zanetti, M.; Zotto, P.; Zucchetta, A.; Braghieri, A.; Magnani, A.; Montagna, P.; Ratti, S. P.; Re, V.; Riccardi, C.; Salvini, P.; Vai, I.; Vitulo, P.; Alunni Solestizi, L.; Bilei, G. M.; Ciangottini, D.; Fanò, L.; Lariccia, P.; Leonardi, R.; Mantovani, G.; Menichelli, M.; Saha, A.; Santocchia, A.; Androsov, K.; Azzurri, P.; Bagliesi, G.; Bernardini, J.; Boccali, T.; Castaldi, R.; Ciocci, M. A.; Dell'Orso, R.; Donato, S.; Fedi, G.; Giassi, A.; Grippo, M. T.; Ligabue, F.; Lomtadze, T.; Martini, L.; Messineo, A.; Palla, F.; Rizzi, A.; Savoy-Navarro, A.; Spagnolo, P.; Tenchini, R.; Tonelli, G.; Venturi, A.; Verdini, P. G.; Barone, L.; Cavallari, F.; D'imperio, G.; Del Re, D.; Diemoz, M.; Gelli, S.; Jorda, C.; Longo, E.; Margaroli, F.; Meridiani, P.; Organtini, G.; Paramatti, R.; Preiato, F.; Rahatlou, S.; Rovelli, C.; Santanastasio, F.; Amapane, N.; Arcidiacono, R.; Argiro, S.; Arneodo, M.; Bartosik, N.; Bellan, R.; Biino, C.; Cartiglia, N.; Costa, M.; Covarelli, R.; Degano, A.; Demaria, N.; Finco, L.; Kiani, B.; Mariotti, C.; Maselli, S.; Migliore, E.; Monaco, V.; Monteil, E.; Obertino, M. M.; Pacher, L.; Pastrone, N.; Pelliccioni, M.; Pinna Angioni, G. L.; Ravera, F.; Romero, A.; Ruspa, M.; Sacchi, R.; Sola, V.; Solano, A.; Staiano, A.; Traczyk, P.; Belforte, S.; Candelise, V.; Casarsa, M.; Cossutti, F.; Della Ricca, G.; La Licata, C.; Schizzi, A.; Zanetti, A.; Nam, S. K.; Kim, D. H.; Kim, G. N.; Kim, M. S.; Kong, D. J.; Lee, S.; Lee, S. W.; Oh, Y. D.; Sakharov, A.; Son, D. C.; Yang, Y. C.; Brochero Cifuentes, J. A.; Kim, H.; Kim, T. J.; Song, S.; Cho, S.; Choi, S.; Go, Y.; Gyun, D.; Hong, B.; Jo, Y.; Kim, Y.; Lee, B.; Lee, K.; Lee, K. S.; Lee, S.; Lim, J.; Park, S. K.; Roh, Y.; Yoo, H. D.; Choi, M.; Kim, H.; Kim, H.; Kim, J. H.; Lee, J. S. H.; Park, I. C.; Ryu, G.; Ryu, M. S.; Choi, Y.; Goh, J.; Kim, D.; Kwon, E.; Lee, J.; Yu, I.; Dudenas, V.; Juodagalvis, A.; Vaitkus, J.; Ahmed, I.; Ibrahim, Z. A.; Komaragiri, J. R.; Md Ali, M. A. B.; Mohamad Idris, F.; Wan Abdullah, W. A. T.; Yusli, M. N.; Zolkapli, Z.; Casimiro Linares, E.; Castilla-Valdez, H.; De La Cruz-Burelo, E.; Heredia-De La Cruz, I.; Hernandez-Almada, A.; Lopez-Fernandez, R.; Mejia Guisao, J.; Sanchez-Hernandez, A.; Carrillo Moreno, S.; Vazquez Valencia, F.; Pedraza, I.; Salazar Ibarguen, H. A.; Uribe Estrada, C.; Morelos Pineda, A.; Krofcheck, D.; Butler, P. H.; Ahmad, A.; Ahmad, M.; Hassan, Q.; Hoorani, H. R.; Khan, W. A.; Qazi, S.; Shoaib, M.; Waqas, M.; Bialkowska, H.; Bluj, M.; Boimska, B.; Frueboes, T.; Górski, M.; Kazana, M.; Nawrocki, K.; Romanowska-Rybinska, K.; Szleper, M.; Zalewski, P.; Brona, G.; Bunkowski, K.; Byszuk, A.; Doroba, K.; Kalinowski, A.; Konecki, M.; Krolikowski, J.; Misiura, M.; Olszewski, M.; Walczak, M.; Bargassa, P.; Beirão Da Cruz E Silva, C.; Di Francesco, A.; Faccioli, P.; Ferreira Parracho, P. G.; Gallinaro, M.; Hollar, J.; Leonardo, N.; Lloret Iglesias, L.; Nemallapudi, M. V.; Nguyen, F.; Rodrigues Antunes, J.; Seixas, J.; Toldaiev, O.; Vadruccio, D.; Varela, J.; Vischia, P.; Bunin, P.; Gavrilenko, M.; Golutvin, I.; Gorbunov, I.; Kamenev, A.; Karjavin, V.; Lanev, A.; Malakhov, A.; Matveev, V.; Moisenz, P.; Palichik, V.; Perelygin, V.; Savina, M.; Shmatov, S.; Shulha, S.; Skatchkov, N.; Smirnov, V.; Voytishin, N.; Zarubin, A.; Golovtsov, V.; Ivanov, Y.; Kim, V.; Kuznetsova, E.; Levchenko, P.; Murzin, V.; Oreshkin, V.; Smirnov, I.; Sulimov, V.; Uvarov, L.; Vavilov, S.; Vorobyev, A.; Andreev, Yu.; Dermenev, A.; Gninenko, S.; Golubev, N.; Karneyeu, A.; Kirsanov, M.; Krasnikov, N.; Pashenkov, A.; Tlisov, D.; Toropin, A.; Epshteyn, V.; Gavrilov, V.; Lychkovskaya, N.; Popov, V.; Pozdnyakov, I.; Safronov, G.; Spiridonov, A.; Toms, M.; Vlasov, E.; Zhokin, A.; Danilov, M.; Markin, O.; Popova, E.; Rusinov, V.; Tarkovskii, E.; Andreev, V.; Azarkin, M.; Dremin, I.; Kirakosyan, M.; Leonidov, A.; Mesyats, G.; Rusakov, S. V.; Baskakov, A.; Belyaev, A.; Boos, E.; Dubinin, M.; Dudko, L.; Ershov, A.; Gribushin, A.; Klyukhin, V.; Kodolova, O.; Lokhtin, I.; Miagkov, I.; Obraztsov, S.; Petrushanko, S.; Savrin, V.; Snigirev, A.; Azhgirey, I.; Bayshev, I.; Bitioukov, S.; Kachanov, V.; Kalinin, A.; Konstantinov, D.; Krychkine, V.; Petrov, V.; Ryutin, R.; Sobol, A.; Tourtchanovitch, L.; Troshin, S.; Tyurin, N.; Uzunian, A.; Volkov, A.; Adzic, P.; Cirkovic, P.; Devetak, D.; Milosevic, J.; Rekovic, V.; Alcaraz Maestre, J.; Calvo, E.; Cerrada, M.; Chamizo Llatas, M.; Colino, N.; De La Cruz, B.; Delgado Peris, A.; Escalante Del Valle, A.; Fernandez Bedoya, C.; Fernández Ramos, J. P.; Flix, J.; Fouz, M. C.; Garcia-Abia, P.; Gonzalez Lopez, O.; Goy Lopez, S.; Hernandez, J. M.; Josa, M. I.; Navarro De Martino, E.; Pérez-Calero Yzquierdo, A.; Puerta Pelayo, J.; Quintario Olmeda, A.; Redondo, I.; Romero, L.; Soares, M. S.; de Trocóniz, J. F.; Missiroli, M.; Moran, D.; Cuevas, J.; Fernandez Menendez, J.; Folgueras, S.; Gonzalez Caballero, I.; Palencia Cortezon, E.; Vizan Garcia, J. M.; Cabrillo, I. J.; Calderon, A.; Castiñeiras De Saa, J. R.; Curras, E.; Fernandez, M.; Garcia-Ferrero, J.; Gomez, G.; Lopez Virto, A.; Marco, J.; Marco, R.; Martinez Rivero, C.; Matorras, F.; Piedra Gomez, J.; Rodrigo, T.; Rodríguez-Marrero, A. Y.; Ruiz-Jimeno, A.; Scodellaro, L.; Trevisani, N.; Vila, I.; Vilar Cortabitarte, R.; Abbaneo, D.; Auffray, E.; Auzinger, G.; Bachtis, M.; Baillon, P.; Ball, A. H.; Barney, D.; Benaglia, A.; Benhabib, L.; Berruti, G. M.; Bloch, P.; Bocci, A.; Bonato, A.; Botta, C.; Breuker, H.; Camporesi, T.; Castello, R.; Cepeda, M.; Cerminara, G.; D'Alfonso, M.; d'Enterria, D.; Dabrowski, A.; Daponte, V.; David, A.; De Gruttola, M.; De Guio, F.; De Roeck, A.; Di Marco, E.; Dobson, M.; Dordevic, M.; Dorney, B.; du Pree, T.; Duggan, D.; Dünser, M.; Dupont, N.; Elliott-Peisert, A.; Fartoukh, S.; Franzoni, G.; Fulcher, J.; Funk, W.; Gigi, D.; Gill, K.; Girone, M.; Glege, F.; Guida, R.; Gundacker, S.; Guthoff, M.; Hammer, J.; Harris, P.; Hegeman, J.; Innocente, V.; Janot, P.; Kirschenmann, H.; Knünz, V.; Kortelainen, M. J.; Kousouris, K.; Lecoq, P.; Lourenço, C.; Lucchini, M. T.; Magini, N.; Malgeri, L.; Mannelli, M.; Martelli, A.; Masetti, L.; Meijers, F.; Mersi, S.; Meschi, E.; Moortgat, F.; Morovic, S.; Mulders, M.; Neugebauer, H.; Orfanelli, S.; Orsini, L.; Pape, L.; Perez, E.; Peruzzi, M.; Petrilli, A.; Petrucciani, G.; Pfeiffer, A.; Pierini, M.; Piparo, D.; Racz, A.; Reis, T.; Rolandi, G.; Rovere, M.; Ruan, M.; Sakulin, H.; Sauvan, J. B.; Schäfer, C.; Schwick, C.; Seidel, M.; Sharma, A.; Silva, P.; Simon, M.; Sphicas, P.; Steggemann, J.; Stoye, M.; Takahashi, Y.; Treille, D.; Triossi, A.; Tsirou, A.; Veckalns, V.; Veres, G. I.; Wardle, N.; Wöhri, H. K.; Zagozdzinska, A.; Zeuner, W. D.; Bertl, W.; Deiters, K.; Erdmann, W.; Horisberger, R.; Ingram, Q.; Kaestli, H. C.; Kotlinski, D.; Langenegger, U.; Rohe, T.; Bachmair, F.; Bäni, L.; Bianchini, L.; Casal, B.; Dissertori, G.; Dittmar, M.; Donegà, M.; Eller, P.; Grab, C.; Heidegger, C.; Hits, D.; Hoss, J.; Kasieczka, G.; Lecomte, P.; Lustermann, W.; Mangano, B.; Marionneau, M.; Martinez Ruiz del Arbol, P.; Masciovecchio, M.; Meinhard, M. T.; Meister, D.; Micheli, F.; Musella, P.; Nessi-Tedaldi, F.; Pandolfi, F.; Pata, J.; Pauss, F.; Perrin, G.; Perrozzi, L.; Quittnat, M.; Rossini, M.; Schönenberger, M.; Starodumov, A.; Takahashi, M.; Tavolaro, V. R.; Theofilatos, K.; Wallny, R.; Aarrestad, T. K.; Amsler, C.; Caminada, L.; Canelli, M. F.; Chiochia, V.; De Cosa, A.; Galloni, C.; Hinzmann, A.; Hreus, T.; Kilminster, B.; Lange, C.; Ngadiuba, J.; Pinna, D.; Rauco, G.; Robmann, P.; Salerno, D.; Yang, Y.; Chen, K. H.; Doan, T. H.; Jain, Sh.; Khurana, R.; Konyushikhin, M.; Kuo, C. M.; Lin, W.; Lu, Y. J.; Pozdnyakov, A.; Yu, S. S.; Kumar, Arun; Chang, P.; Chang, Y. H.; Chang, Y. W.; Chao, Y.; Chen, K. F.; Chen, P. H.; Dietz, C.; Fiori, F.; Hou, W.-S.; Hsiung, Y.; Liu, Y. F.; Lu, R.-S.; Miñano Moya, M.; Tsai, J. f.; Tzeng, Y. M.; Asavapibhop, B.; Kovitanggoon, K.; Singh, G.; Srimanobhas, N.; Suwonjandee, N.; Adiguzel, A.; Cerci, S.; Damarseckin, S.; Demiroglu, Z. S.; Dozen, C.; Dumanoglu, I.; Girgis, S.; Gokbulut, G.; Guler, Y.; Gurpinar, E.; Hos, I.; Kangal, E. E.; Kayis Topaksu, A.; Onengut, G.; Ozdemir, K.; Ozturk, S.; Tali, B.; Topakli, H.; Zorbilmez, C.; Bilin, B.; Bilmis, S.; Isildak, B.; Karapinar, G.; Yalvac, M.; Zeyrek, M.; Gülmez, E.; Kaya, M.; Kaya, O.; Yetkin, E. A.; Yetkin, T.; Cakir, A.; Cankocak, K.; Sen, S.; Grynyov, B.; Levchuk, L.; Sorokin, P.; Aggleton, R.; Ball, F.; Beck, L.; Brooke, J. J.; Burns, D.; Clement, E.; Cussans, D.; Flacher, H.; Goldstein, J.; Grimes, M.; Heath, G. P.; Heath, H. F.; Jacob, J.; Kreczko, L.; Lucas, C.; Meng, Z.; Newbold, D. M.; Paramesvaran, S.; Poll, A.; Sakuma, T.; Seif El Nasr-storey, S.; Senkin, S.; Smith, D.; Smith, V. J.; Bell, K. W.; Belyaev, A.; Brew, C.; Brown, R. M.; Calligaris, L.; Cieri, D.; Cockerill, D. J. A.; Coughlan, J. A.; Harder, K.; Harper, S.; Olaiya, E.; Petyt, D.; Shepherd-Themistocleous, C. H.; Thea, A.; Tomalin, I. R.; Williams, T.; Worm, S. D.; Baber, M.; Bainbridge, R.; Buchmuller, O.; Bundock, A.; Burton, D.; Casasso, S.; Citron, M.; Colling, D.; Corpe, L.; Dauncey, P.; Davies, G.; De Wit, A.; Della Negra, M.; Dunne, P.; Elwood, A.; Futyan, D.; Haddad, Y.; Hall, G.; Iles, G.; Lane, R.; Lucas, R.; Lyons, L.; Magnan, A.-M.; Malik, S.; Mastrolorenzo, L.; Nash, J.; Nikitenko, A.; Pela, J.; Penning, B.; Pesaresi, M.; Raymond, D. M.; Richards, A.; Rose, A.; Seez, C.; Tapper, A.; Uchida, K.; Vazquez Acosta, M.; Virdee, T.; Zenz, S. C.; Cole, J. E.; Hobson, P. R.; Khan, A.; Kyberd, P.; Leslie, D.; Reid, I. D.; Symonds, P.; Teodorescu, L.; Turner, M.; Borzou, A.; Call, K.; Dittmann, J.; Hatakeyama, K.; Liu, H.; Pastika, N.; Charaf, O.; Cooper, S. I.; Henderson, C.; Rumerio, P.; Arcaro, D.; Avetisyan, A.; Bose, T.; Gastler, D.; Rankin, D.; Richardson, C.; Rohlf, J.; Sulak, L.; Zou, D.; Alimena, J.; Benelli, G.; Berry, E.; Cutts, D.; Ferapontov, A.; Garabedian, A.; Hakala, J.; Heintz, U.; Jesus, O.; Laird, E.; Landsberg, G.; Mao, Z.; Narain, M.; Piperov, S.; Sagir, S.; Syarif, R.; Breedon, R.; Breto, G.; Calderon De La Barca Sanchez, M.; Chauhan, S.; Chertok, M.; Conway, J.; Conway, R.; Cox, P. T.; Erbacher, R.; Flores, C.; Funk, G.; Gardner, M.; Ko, W.; Lander, R.; Mclean, C.; Mulhearn, M.; Pellett, D.; Pilot, J.; Ricci-Tam, F.; Shalhout, S.; Smith, J.; Squires, M.; Stolp, D.; Tripathi, M.; Wilbur, S.; Yohay, R.; Cousins, R.; Everaerts, P.; Florent, A.; Hauser, J.; Ignatenko, M.; Saltzberg, D.; Takasugi, E.; Valuev, V.; Weber, M.; Burt, K.; Clare, R.; Ellison, J.; Gary, J. W.; Hanson, G.; Heilman, J.; Jandir, P.; Kennedy, E.; Lacroix, F.; Long, O. R.; Malberti, M.; Olmedo Negrete, M.; Paneva, M. I.; Shrinivas, A.; Wei, H.; Wimpenny, S.; Yates, B. R.; Branson, J. G.; Cerati, G. B.; Cittolin, S.; D'Agnolo, R. T.; Derdzinski, M.; Gerosa, R.; Holzner, A.; Kelley, R.; Klein, D.; Letts, J.; Macneill, I.; Olivito, D.; Padhi, S.; Pieri, M.; Sani, M.; Sharma, V.; Simon, S.; Tadel, M.; Vartak, A.; Wasserbaech, S.; Welke, C.; Wood, J.; Würthwein, F.; Yagil, A.; Zevi Della Porta, G.; Bradmiller-Feld, J.; Campagnari, C.; Dishaw, A.; Dutta, V.; Flowers, K.; Franco Sevilla, M.; Geffert, P.; George, C.; Golf, F.; Gouskos, L.; Gran, J.; Incandela, J.; Mccoll, N.; Mullin, S. D.; Richman, J.; Stuart, D.; Suarez, I.; West, C.; Yoo, J.; Anderson, D.; Apresyan, A.; Bendavid, J.; Bornheim, A.; Bunn, J.; Chen, Y.; Duarte, J.; Mott, A.; Newman, H. B.; Pena, C.; Spiropulu, M.; Vlimant, J. R.; Xie, S.; Zhu, R. Y.; Andrews, M. B.; Azzolini, V.; Calamba, A.; Carlson, B.; Ferguson, T.; Paulini, M.; Russ, J.; Sun, M.; Vogel, H.; Vorobiev, I.; Cumalat, J. P.; Ford, W. T.; Jensen, F.; Johnson, A.; Krohn, M.; Mulholland, T.; Stenson, K.; Wagner, S. R.; Alexander, J.; Chatterjee, A.; Chaves, J.; Chu, J.; Dittmer, S.; Eggert, N.; Mirman, N.; Nicolas Kaufman, G.; Patterson, J. R.; Rinkevicius, A.; Ryd, A.; Skinnari, L.; Soffi, L.; Sun, W.; Tan, S. M.; Teo, W. D.; Thom, J.; Thompson, J.; Tucker, J.; Weng, Y.; Winstrom, L.; Wittich, P.; Abdullin, S.; Albrow, M.; Apollinari, G.; Banerjee, S.; Bauerdick, L. A. T.; Beretvas, A.; Berryhill, J.; Bhat, P. C.; Bolla, G.; Burkett, K.; Butler, J. N.; Cheung, H. W. K.; Chlebana, F.; Cihangir, S.; Cremonesi, M.; Elvira, V. D.; Fisk, I.; Freeman, J.; Gottschalk, E.; Gray, L.; Green, D.; Grünendahl, S.; Gutsche, O.; Hare, D.; Harris, R. M.; Hasegawa, S.; Hirschauer, J.; Hu, Z.; Jayatilaka, B.; Jindariani, S.; Johnson, M.; Joshi, U.; Klima, B.; Kreis, B.; Lammel, S.; Lewis, J.; Linacre, J.; Lincoln, D.; Lipton, R.; Liu, T.; Lopes De Sá, R.; Lykken, J.; Maeshima, K.; Marraffino, J. M.; Maruyama, S.; Mason, D.; McBride, P.; Merkel, P.; Mrenna, S.; Nahn, S.; Newman-Holmes, C.; O'Dell, V.; Pedro, K.; Prokofyev, O.; Rakness, G.; Sexton-Kennedy, E.; Soha, A.; Spalding, W. J.; Spiegel, L.; Stoynev, S.; Strobbe, N.; Taylor, L.; Tkaczyk, S.; Tran, N. V.; Uplegger, L.; Vaandering, E. W.; Vernieri, C.; Verzocchi, M.; Vidal, R.; Wang, M.; Weber, H. A.; Whitbeck, A.; Acosta, D.; Avery, P.; Bortignon, P.; Bourilkov, D.; Brinkerhoff, A.; Carnes, A.; Carver, M.; Curry, D.; Das, S.; Field, R. D.; Furic, I. K.; Konigsberg, J.; Korytov, A.; Kotov, K.; Ma, P.; Matchev, K.; Mei, H.; Milenovic, P.; Mitselmakher, G.; Rank, D.; Rossin, R.; Shchutska, L.; Sperka, D.; Terentyev, N.; Thomas, L.; Wang, J.; Wang, S.; Yelton, J.; Linn, S.; Markowitz, P.; Martinez, G.; Rodriguez, J. L.; Ackert, A.; Adams, J. R.; Adams, T.; Askew, A.; Bein, S.; Bochenek, J.; Diamond, B.; Haas, J.; Hagopian, S.; Hagopian, V.; Johnson, K. F.; Khatiwada, A.; Prosper, H.; Santra, A.; Weinberg, M.; Baarmand, M. M.; Bhopatkar, V.; Colafranceschi, S.; Hohlmann, M.; Kalakhety, H.; Noonan, D.; Roy, T.; Yumiceva, F.; Adams, M. R.; Apanasevich, L.; Berry, D.; Betts, R. R.; Bucinskaite, I.; Cavanaugh, R.; Evdokimov, O.; Gauthier, L.; Gerber, C. E.; Hofman, D. J.; Kurt, P.; O'Brien, C.; Sandoval Gonzalez, I. D.; Turner, P.; Varelas, N.; Wu, Z.; Zakaria, M.; Zhang, J.; Bilki, B.; Clarida, W.; Dilsiz, K.; Durgut, S.; Gandrajula, R. P.; Haytmyradov, M.; Khristenko, V.; Merlo, J.-P.; Mermerkaya, H.; Mestvirishvili, A.; Moeller, A.; Nachtman, J.; Ogul, H.; Onel, Y.; Ozok, F.; Penzo, A.; Snyder, C.; Tiras, E.; Wetzel, J.; Yi, K.; Anderson, I.; Blumenfeld, B.; Cocoros, A.; Eminizer, N.; Fehling, D.; Feng, L.; Gritsan, A. V.; Maksimovic, P.; Osherson, M.; Roskes, J.; Sarica, U.; Swartz, M.; Xiao, M.; Xin, Y.; You, C.; Baringer, P.; Bean, A.; Bruner, C.; Castle, J.; Kenny, R. P.; Kropivnitskaya, A.; Majumder, D.; Malek, M.; Mcbrayer, W.; Murray, M.; Sanders, S.; Stringer, R.; Wang, Q.; Ivanov, A.; Kaadze, K.; Khalil, S.; Makouski, M.; Maravin, Y.; Mohammadi, A.; Saini, L. K.; Skhirtladze, N.; Toda, S.; Lange, D.; Rebassoo, F.; Wright, D.; Anelli, C.; Baden, A.; Baron, O.; Belloni, A.; Calvert, B.; Eno, S. C.; Ferraioli, C.; Gomez, J. A.; Hadley, N. J.; Jabeen, S.; Kellogg, R. G.; Kolberg, T.; Kunkle, J.; Lu, Y.; Mignerey, A. C.; Shin, Y. H.; Skuja, A.; Tonjes, M. B.; Tonwar, S. C.; Apyan, A.; Barbieri, R.; Baty, A.; Bi, R.; Bierwagen, K.; Brandt, S.; Busza, W.; Cali, I. A.; Demiragli, Z.; Di Matteo, L.; Gomez Ceballos, G.; Goncharov, M.; Gulhan, D.; Hsu, D.; Iiyama, Y.; Innocenti, G. M.; Klute, M.; Kovalskyi, D.; Krajczar, K.; Lai, Y. S.; Lee, Y.-J.; Levin, A.; Luckey, P. D.; Marini, A. C.; Mcginn, C.; Mironov, C.; Narayanan, S.; Niu, X.; Paus, C.; Roland, C.; Roland, G.; Salfeld-Nebgen, J.; Stephans, G. S. F.; Sumorok, K.; Tatar, K.; Varma, M.; Velicanu, D.; Veverka, J.; Wang, J.; Wang, T. W.; Wyslouch, B.; Yang, M.; Zhukova, V.; Benvenuti, A. C.; Dahmes, B.; Evans, A.; Finkel, A.; Gude, A.; Hansen, P.; Kalafut, S.; Kao, S. C.; Klapoetke, K.; Kubota, Y.; Lesko, Z.; Mans, J.; Nourbakhsh, S.; Ruckstuhl, N.; Rusack, R.; Tambe, N.; Turkewitz, J.; Acosta, J. G.; Oliveros, S.; Avdeeva, E.; Bartek, R.; Bloom, K.; Bose, S.; Claes, D. R.; Dominguez, A.; Fangmeier, C.; Gonzalez Suarez, R.; Kamalieddin, R.; Knowlton, D.; Kravchenko, I.; Meier, F.; Monroy, J.; Ratnikov, F.; Siado, J. E.; Snow, G. R.; Stieger, B.; Alyari, M.; Dolen, J.; George, J.; Godshalk, A.; Harrington, C.; Iashvili, I.; Kaisen, J.; Kharchilava, A.; Kumar, A.; Parker, A.; Rappoccio, S.; Roozbahani, B.; Alverson, G.; Barberis, E.; Baumgartel, D.; Chasco, M.; Hortiangtham, A.; Massironi, A.; Morse, D. M.; Nash, D.; Orimoto, T.; Teixeira De Lima, R.; Trocino, D.; Wang, R.-J.; Wood, D.; Zhang, J.; Bhattacharya, S.; Hahn, K. A.; Kubik, A.; Low, J. F.; Mucia, N.; Odell, N.; Pollack, B.; Schmitt, M. H.; Sung, K.; Trovato, M.; Velasco, M.; Dev, N.; Hildreth, M.; Jessop, C.; Karmgard, D. J.; Kellams, N.; Lannon, K.; Marinelli, N.; Meng, F.; Mueller, C.; Musienko, Y.; Planer, M.; Reinsvold, A.; Ruchti, R.; Rupprecht, N.; Smith, G.; Taroni, S.; Valls, N.; Wayne, M.; Wolf, M.; Woodard, A.; Antonelli, L.; Brinson, J.; Bylsma, B.; Durkin, L. S.; Flowers, S.; Hart, A.; Hill, C.; Hughes, R.; Ji, W.; Liu, B.; Luo, W.; Puigh, D.; Rodenburg, M.; Winer, B. L.; Wulsin, H. W.; Driga, O.; Elmer, P.; Hardenbrook, J.; Hebda, P.; Koay, S. A.; Lujan, P.; Marlow, D.; Medvedeva, T.; Mooney, M.; Olsen, J.; Palmer, C.; Piroué, P.; Stickland, D.; Tully, C.; Zuranski, A.; Malik, S.; Barker, A.; Barnes, V. E.; Benedetti, D.; Gutay, L.; Jha, M. K.; Jones, M.; Jung, A. W.; Jung, K.; Miller, D. H.; Neumeister, N.; Radburn-Smith, B. C.; Shi, X.; Sun, J.; Svyatkovskiy, A.; Wang, F.; Xie, W.; Xu, L.; Parashar, N.; Stupak, J.; Adair, A.; Akgun, B.; Chen, Z.; Ecklund, K. M.; Geurts, F. J. M.; Guilbaud, M.; Li, W.; Michlin, B.; Northup, M.; Padley, B. P.; Redjimi, R.; Roberts, J.; Rorie, J.; Tu, Z.; Zabel, J.; Betchart, B.; Bodek, A.; de Barbaro, P.; Demina, R.; Duh, Y.-T.; Eshaq, Y.; Ferbel, T.; Galanti, M.; Garcia-Bellido, A.; Han, J.; Hindrichs, O.; Khukhunaishvili, A.; Lo, K. H.; Tan, P.; Verzetti, M.; Chou, J. P.; Contreras-Campana, E.; Gershtein, Y.; Gómez Espinosa, T. A.; Halkiadakis, E.; Heindl, M.; Hidas, D.; Hughes, E.; Kaplan, S.; Kunnawalkam Elayavalli, R.; Kyriacou, S.; Lath, A.; Nash, K.; Randall, S.; Saka, H.; Salur, S.; Schnetzer, S.; Sheffield, D.; Somalwar, S.; Stone, R.; Thomas, S.; Thomassen, P.; Walker, M.; Foerster, M.; Heideman, J.; Riley, G.; Rose, K.; Spanier, S.; Thapa, K.; Bouhali, O.; Castaneda Hernandez, A.; Celik, A.; Dalchenko, M.; De Mattia, M.; Delgado, A.; Dildick, S.; Eusebi, R.; Gilmore, J.; Huang, T.; Kamon, T.; Krutelyov, V.; Mueller, R.; Osipenkov, I.; Pakhotin, Y.; Patel, R.; Perloff, A.; Perniè, L.; Rathjens, D.; Rose, A.; Safonov, A.; Tatarinov, A.; Ulmer, K. A.; Akchurin, N.; Cowden, C.; Damgov, J.; Dragoiu, C.; Dudero, P. R.; Faulkner, J.; Kunori, S.; Lamichhane, K.; Lee, S. W.; Libeiro, T.; Undleeb, S.; Volobouev, I.; Wang, Z.; Appelt, E.; Delannoy, A. G.; Greene, S.; Gurrola, A.; Janjam, R.; Johns, W.; Maguire, C.; Mao, Y.; Melo, A.; Ni, H.; Sheldon, P.; Tuo, S.; Velkovska, J.; Xu, Q.; Arenton, M. W.; Barria, P.; Cox, B.; Francis, B.; Goodell, J.; Hirosky, R.; Ledovskoy, A.; Li, H.; Neu, C.; Sinthuprasith, T.; Sun, X.; Wang, Y.; Wolfe, E.; Xia, F.; Clarke, C.; Harr, R.; Karchin, P. E.; Kottachchi Kankanamge Don, C.; Lamichhane, P.; Sturdy, J.; Belknap, D. A.; Carlsmith, D.; Dasu, S.; Dodd, L.; Duric, S.; Gomber, B.; Grothe, M.; Herndon, M.; Hervé, A.; Klabbers, P.; Lanaro, A.; Levine, A.; Long, K.; Loveless, R.; Mohapatra, A.; Ojalvo, I.; Perry, T.; Pierro, G. A.; Polese, G.; Ruggles, T.; Sarangi, T.; Savin, A.; Sharma, A.; Smith, N.; Smith, W. H.; Taylor, D.; Verwilligen, P.; Woods, N.; CMS Collaboration

    2016-12-01

    Results are presented from searches for R -parity-violating supersymmetry in events produced in p p collisions at √{s }=8 TeV at the LHC. Final states with 0, 1, 2, or multiple leptons are considered independently. The analysis is performed on data collected by the CMS experiment corresponding to an integrated luminosity of 19.5 fb-1 . No excesses of events above the standard model expectations are observed, and 95% confidence level limits are set on supersymmetric particle masses and production cross sections. The results are interpreted in models featuring R -parity-violating decays of the lightest supersymmetric particle, which in the studied scenarios can be either the gluino, a bottom squark, or a neutralino. In a gluino pair production model with baryon number violation, gluinos with a mass less than 0.98 and 1.03 TeV are excluded, by analyses in a fully hadronic and one-lepton final state, respectively. An analysis in a dilepton final state is used to exclude bottom squarks with masses less than 307 GeV in a model considering bottom squark pair production. Multilepton final states are considered in the context of either strong or electroweak production of superpartners and are used to set limits on the masses of the lightest supersymmetric particles. These limits range from 300 to 900 GeV in models with leptonic and up to approximately 700 GeV in models with semileptonic R -parity-violating couplings.

  8. First Results from CUORE: A Search for Lepton Number Violation via 0νββ Decay of ^{130}Te.

    PubMed

    Alduino, C; Alessandria, F; Alfonso, K; Andreotti, E; Arnaboldi, C; Avignone, F T; Azzolini, O; Balata, M; Bandac, I; Banks, T I; Bari, G; Barucci, M; Beeman, J W; Bellini, F; Benato, G; Bersani, A; Biare, D; Biassoni, M; Bragazzi, F; Branca, A; Brofferio, C; Bryant, A; Buccheri, A; Bucci, C; Bulfon, C; Camacho, A; Caminata, A; Canonica, L; Cao, X G; Capelli, S; Capodiferro, M; Cappelli, L; Cardani, L; Cariello, M; Carniti, P; Carrettoni, M; Casali, N; Cassina, L; Cereseto, R; Ceruti, G; Chiarini, A; Chiesa, D; Chott, N; Clemenza, M; Conventi, D; Copello, S; Cosmelli, C; Cremonesi, O; Crescentini, C; Creswick, R J; Cushman, J S; D'Addabbo, A; D'Aguanno, D; Dafinei, I; Datskov, V; Davis, C J; Del Corso, F; Dell'Oro, S; Deninno, M M; Di Domizio, S; Di Vacri, M L; Di Paolo, L; Drobizhev, A; Ejzak, L; Faccini, R; Fang, D Q; Faverzani, M; Ferri, E; Ferroni, F; Fiorini, E; Franceschi, M A; Freedman, S J; Fujikawa, B K; Gaigher, R; Giachero, A; Gironi, L; Giuliani, A; Gladstone, L; Goett, J; Gorla, P; Gotti, C; Guandalini, C; Guerzoni, M; Gutierrez, T D; Haller, E E; Han, K; Hansen, E V; Heeger, K M; Hennings-Yeomans, R; Hickerson, K P; Huang, H Z; Iannone, M; Ioannucci, L; Kadel, R; Keppel, G; Kogler, L; Kolomensky, Yu G; Leder, A; Ligi, C; Lim, K E; Liu, X; Ma, Y G; Maiano, C; Maino, M; Marini, L; Martinez, M; Martinez Amaya, C; Maruyama, R H; Mei, Y; Moggi, N; Morganti, S; Mosteiro, P J; Nagorny, S S; Napolitano, T; Nastasi, M; Nisi, S; Nones, C; Norman, E B; Novati, V; Nucciotti, A; Nutini, I; O'Donnell, T; Olcese, M; Olivieri, E; Orio, F; Orlandi, D; Ouellet, J L; Pagliarone, C E; Pallavicini, M; Palmieri, V; Pattavina, L; Pavan, M; Pedretti, M; Pedrotta, R; Pelosi, A; Pessina, G; Pettinacci, V; Piperno, G; Pira, C; Pirro, S; Pozzi, S; Previtali, E; Reindl, F; Rimondi, F; Risegari, L; Rosenfeld, C; Rossi, C; Rusconi, C; Sakai, M; Sala, E; Salvioni, C; Sangiorgio, S; Santone, D; Schaeffer, D; Schmidt, B; Schmidt, J; Scielzo, N D; Singh, V; Sisti, M; Smith, A R; Stivanello, F; Taffarello, L; Tatananni, L; Tenconi, M; Terranova, F; Tessaro, M; Tomei, C; Ventura, G; Vignati, M; Wagaarachchi, S L; Wallig, J; Wang, B S; Wang, H W; Welliver, B; Wilson, J; Wilson, K; Winslow, L A; Wise, T; Zanotti, L; Zarra, C; Zhang, G Q; Zhu, B X; Zimmermann, S; Zucchelli, S

    2018-03-30

    The CUORE experiment, a ton-scale cryogenic bolometer array, recently began operation at the Laboratori Nazionali del Gran Sasso in Italy. The array represents a significant advancement in this technology, and in this work we apply it for the first time to a high-sensitivity search for a lepton-number-violating process: ^{130}Te neutrinoless double-beta decay. Examining a total TeO_{2} exposure of 86.3 kg yr, characterized by an effective energy resolution of (7.7±0.5)  keV FWHM and a background in the region of interest of (0.014±0.002)  counts/(keV kg yr), we find no evidence for neutrinoless double-beta decay. Including systematic uncertainties, we place a lower limit on the decay half-life of T_{1/2}^{0ν}(^{130}Te)>1.3×10^{25}  yr (90% C.L.); the median statistical sensitivity of this search is 7.0×10^{24}  yr. Combining this result with those of two earlier experiments, Cuoricino and CUORE-0, we find T_{1/2}^{0ν}(^{130}Te)>1.5×10^{25}  yr (90% C.L.), which is the most stringent limit to date on this decay. Interpreting this result as a limit on the effective Majorana neutrino mass, we find m_{ββ}<(110-520)  meV, where the range reflects the nuclear matrix element estimates employed.

  9. 22 CFR 1509.225 - What actions must I take concerning employees who are convicted of drug violations in the workplace?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... AFRICAN DEVELOPMENT FOUNDATION GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE... § 1509.205(c)(2), or you otherwise learn of the conviction. Your notification to the Federal agencies... number(s) of each affected award; (4) Be sent within ten calendar days after you learn of the conviction...

  10. 22 CFR 210.225 - What actions must I take concerning employees who are convicted of drug violations in the workplace?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... AGENCY FOR INTERNATIONAL DEVELOPMENT GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL... by § 210.205(c)(2), or you otherwise learn of the conviction. Your notification to the Federal... number(s) of each affected award; (4) Be sent within ten calendar days after you learn of the conviction...

  11. 78 FR 76812 - In the Matter of: Andrew Vincent O'Donnell, Inmate Number-62355-019, USP Atlanta, U.S...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-19

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security In the Matter of: Andrew Vincent O'Donnell, Inmate Number--62355- 019, USP Atlanta, U.S. Penitentiary, P.O. Box 15060, Atlanta, GA 30315; Order..., Andrew Vincent O'Donnell (``O'Donnell''), was convicted of violating Section 38 of the Arms Export...

  12. What Do You Mean by That?! An Electrophysiological Study of Emotional and Attitudinal Prosody.

    PubMed

    Wickens, Steven; Perry, Conrad

    2015-01-01

    The use of prosody during verbal communication is pervasive in everyday language and whilst there is a wealth of research examining the prosodic processing of emotional information, much less is known about the prosodic processing of attitudinal information. The current study investigated the online neural processes underlying the prosodic processing of non-verbal emotional and attitudinal components of speech via the analysis of event-related brain potentials related to the processing of anger and sarcasm. To examine these, sentences with prosodic expectancy violations created by cross-splicing a prosodically neutral head ('he has') and a prosodically neutral, angry, or sarcastic ending (e.g., 'a serious face') were used. Task demands were also manipulated, with participants in one experiment performing prosodic classification and participants in another performing probe-verification. Overall, whilst minor differences were found across the tasks, the results suggest that angry and sarcastic prosodic expectancy violations follow a similar processing time-course underpinned by similar neural resources.

  13. Launch Commit Criteria Monitoring Agent

    NASA Technical Reports Server (NTRS)

    Semmel, Glenn S.; Davis, Steven R.; Leucht, Kurt W.; Rowe, Dan A.; Kelly, Andrew O.; Boeloeni, Ladislau

    2005-01-01

    The Spaceport Processing Systems Branch at NASA Kennedy Space Center has developed and deployed a software agent to monitor the Space Shuttle's ground processing telemetry stream. The application, the Launch Commit Criteria Monitoring Agent, increases situational awareness for system and hardware engineers during Shuttle launch countdown. The agent provides autonomous monitoring of the telemetry stream, automatically alerts system engineers when predefined criteria have been met, identifies limit warnings and violations of launch commit criteria, aids Shuttle engineers through troubleshooting procedures, and provides additional insight to verify appropriate troubleshooting of problems by contractors. The agent has successfully detected launch commit criteria warnings and violations on a simulated playback data stream. Efficiency and safety are improved through increased automation.

  14. Operating manual-based usability evaluation of medical devices: an effective patient safety screening method.

    PubMed

    Turley, James P; Johnson, Todd R; Smith, Danielle Paige; Zhang, Jaijie; Brixey, Juliana J

    2006-04-01

    Use of medical devices often directly contributes to medical errors. Because it is difficult or impossible to change the design of existing devices, the best opportunity for improving medical device safety is during the purchasing process. However, most hospital personnel are not familiar with the usability evaluation methods designed to identify aspects of a user interface that do not support intuitive and safe use. A review of medical device operating manuals is proposed as a more practical method of usability evaluation. Operating manuals for five volumetric infusion pumps from three manufacturers were selected for this study (January-April 2003). Each manual's safety message content was evaluated to determine whether the message indicated a device design characteristic that violated known usability principles (heuristics) or indicated a violation of an affordance of the device. "Minimize memory load," with 65 violations, was the heuristic violated most frequently across pumps. Variations between pumps, including the frequency and severity of violations for each, were noted. Results suggest that manual review can provide a proxy for heuristic evaluation of the actual medical device. This method, intended to be a component of prepurchasing evaluation, can complement more formal usability evaluation methods and be used to select a subset of devices for more extensive and formal testing.

  15. 77 FR 40494 - Procedures for the Handling of Retaliation Complaints Under Section 219 of the Consumer Product...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-10

    ... cases involving important or novel legal issues, large numbers of employees, alleged violations that... computation of time before those tribunals and express filing deadlines as days rather than business days...

  16. Red light running camera assessment.

    DOT National Transportation Integrated Search

    2011-04-01

    In the 2004-2007 period, the Mission Street SE and 25th Street SE intersection in Salem, Oregon showed relatively few crashes attributable to red light running (RLR) but, since a high number of RLR violations were observed, the intersection was ident...

  17. Overrepresentation of seat belt non-users in traffic crashes

    DOT National Transportation Integrated Search

    1988-04-01

    This study used observations of driver belt use linked with driver history information to conclude that non-users of belts are overrepresented in traffic crashes. Examining average numbers of accidents and violations per observed belted and unbelted ...

  18. 40 CFR 403.19 - Provisions of specific applicability to the Owatonna Waste Water Treatment Facility.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Agency website for a period of one year, as soon as practicable upon identifying the violations. In... Noncompliance is determined, and a contact name and phone number for information regarding other, non...

  19. Area law violations and quantum phase transitions in modified Motzkin walk spin chains

    NASA Astrophysics Data System (ADS)

    Sugino, Fumihiko; Padmanabhan, Pramod

    2018-01-01

    Area law violations for entanglement entropy in the form of a square root have recently been studied for one-dimensional frustration-free quantum systems based on the Motzkin walks and their variations. Here we consider a Motzkin walk with a different Hilbert space on each step of the walk spanned by the elements of a symmetric inverse semigroup with the direction of each step governed by its algebraic structure. This change alters the number of paths allowed in the Motzkin walk and introduces a ground state degeneracy that is sensitive to boundary perturbations. We study the frustration-free spin chains based on three symmetric inverse semigroups, \

  20. Using time-dependent indirect CP asymmetries to measure T and CPT violation in B0-Bbar0 mixing

    NASA Astrophysics Data System (ADS)

    Karan, Anirban; Nayak, Abinash Kumar; Sinha, Rahul; London, David

    2018-06-01

    Quantum field theory, which is the basis for all of particle physics, requires that all processes respect CPT invariance. It is therefore of paramount importance to test the validity of CPT conservation. In this Letter, we show that the time-dependent, indirect CP asymmetries involving B decays to a CP eigenstate contain enough information to measure T and CPT violation in B0-Bbar0 mixing, in addition to the standard CP-violating weak phases. Entangled B0Bbar0 states are not required (so that this analysis can be carried out at LHCb, as well as at the B factories), penguin pollution need not be neglected, and the measurements can be made using Bd0 or Bs0 mesons.

  1. Understanding the positive effect of financial compensation on trust after norm violations: Evidence from fMRI in favor of forgiveness.

    PubMed

    Haesevoets, Tessa; De Cremer, David; Van Hiel, Alain; Van Overwalle, Frank

    2018-05-01

    Norm violations are ubiquitous in organizations and often result in tangible harm and a loss of trust. One possible response to enhance trust involves the provision of financial compensation. Unfortunately, little is known about the processes that underlie the effect of such a tangible response to increase trust. We employed techniques in cognitive neuroscience (functional magnetic resonance imaging) to examine these processes. Participants placed in the scanner played the role of recipient in a series of dictator games with different allocators who (unknown to them) were preprogrammed. An unequal division of resources was used as a norm violation that resulted in a financial loss. Afterward the inflicted harm was restored through equal financial compensation. Our neuroimaging data indicate that financial compensation activates forgiveness-related brain areas and that this activation mediates the positive effect of financial compensation on trust. We discuss the theoretical and managerial implications of using tangible responses to increase trust in organizational settings. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  2. Effects of subject-case marking on agreement processing: ERP evidence from Basque.

    PubMed

    Chow, Wing-Yee; Nevins, Andrew; Carreiras, Manuel

    2018-02-01

    Previous cross-linguistic research has found that comprehenders are immediately sensitive to various kinds of agreement violations across languages. We focused on Basque, a verb-final ergative language with both subject-verb (SV) and object-verb (OV) agreement. We compared the effects of SV agreement violations on comprehenders' event-related brain potentials (ERPs) in transitive sentences (where OV agreement is present, and the subject is ergative) and intransitive sentences (where OV agreement is absent, and the subject is absolutive). We observed a P600 effect in both cases, but only violations with intransitive subjects elicited an early posterior negativity. Such a qualitative difference suggests that distinct neurocognitive mechanisms are involved in processing agreement with transitive subjects (which are marked with ergative case) versus intransitive subjects (which bear absolutive case). Building on theoretical proposals that in languages such as Basque, true agreement occurs with absolutive subjects but not with ergative subjects, we submit that the early posterior negativity may be an electrophysiological signature for true agreement. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Confirmatory factor analysis of the Behaviour of Young Novice Drivers Scale (BYNDS).

    PubMed

    Scott-Parker, B; Watson, B; King, M J; Hyde, M K

    2012-11-01

    The greatly increased risk of being killed or injured in a car crash for the young novice driver has been recognised in the road safety and injury prevention literature for decades. Risky driving behaviour has consistently been found to contribute to traffic crashes. Researchers have devised a number of instruments to measure this risky driving behaviour. One tool developed specifically to measure the risky behaviour of young novice drivers is the Behaviour of Young Novice Drivers Scale (BYNDS) (Scott-Parker et al., 2010). The BYNDS consists of 44 items comprising five subscales for transient violations, fixed violations, misjudgement, risky driving exposure, and driving in response to their mood. The factor structure of the BYNDS has not been examined since its development in a matched sample of 476 novice drivers aged 17-25 years. The current research attempted to refine the BYNDS and explore its relationship with the self-reported crash and offence involvement and driving intentions of 390 drivers aged 17-25 years (M=18.23, SD=1.58) in Queensland, Australia, during their first 6 months of independent driving with a Provisional (intermediate) driver's licence. A confirmatory factor analysis was undertaken examining the fit of the originally proposed BYNDS measurement model. The model was not a good fit to the data. A number of iterations removed items with low factor loadings, resulting in a 36-item revised BYNDS which was a good fit to the data. The revised BYNDS was highly internally consistent. Crashes were associated with fixed violations, risky driving exposure, and misjudgement; offences were moderately associated with risky driving exposure and transient violations; and road-rule compliance intentions were highly associated with transient violations. Applications of the BYNDS in other young novice driver populations will further explore the factor structure of both the original and revised BYNDS. The relationships between BYNDS subscales and self-reported risky behaviour and attitudes can also inform countermeasure development, such as targeting young novice driver non-compliance through enforcement and education initiatives. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. Supersymmetry: Compactification, flavor, and dualities

    NASA Astrophysics Data System (ADS)

    Heidenreich, Benjamin Jones

    We describe several new research directions in the area of supersymmetry. In the context of low-energy supersymmetry, we show that the assumption of R-parity can be replaced with the minimal flavor violation hypothesis, solving the issue of nucleon decay and the new physics flavor problem in one stroke. The assumption of minimal flavor violation uniquely fixes the form of the baryon number violating vertex, leading to testable predictions. The NLSP is unstable, and decays promptly to jets, evading stringent bounds on vanilla supersymmetry from LHC searches, whereas the gravitino is long-lived, and can be a dark matter component. In the case of a sbottom LSP, neutral mesinos can form and undergo oscillations before decaying, leading to same sign tops, and allowing us to place constraints on the model in this case. We show that this well-motivated phenomenology can be naturally explained by spontaneously breaking a gauged flavor symmetry at a high scale in the presence of additional vector-like quarks, leading to mass mixings which simultaneously generate the flavor structure of the baryon-number violating vertex and the Standard Model Yukawa couplings, explaining their minimal flavor violating structure. We construct a model which is robust against Planck suppressed corrections and which also solves the mu problem. In the context of flux compactifications, we begin a study of the local geometry near a stack of D7 branes supporting a gaugino condensate, an integral component of the KKLT scenario for Kahler moduli stabilization. We obtain an exact solution for the geometry in a certain limit using reasonable assumptions about symmetries, and argue that this solution exhibits BPS domain walls, as expected from field theory arguments. We also begin a larger program of understanding general supersymmetric compactifications of type IIB string theory, reformulating previous results in an SL(2, R ) covariant fashion. Finally, we present extensive evidence for a new class of N = 1 gauge theory dualities relating different world-volume gauge theories of D3 branes probing an orientifold singularity. We argue that these dualities originate from the S-duality of type IIB string theory, much like electromagnetic dualities of N = 4 gauge theories.

  5. Mental health disabilities and human rights protections.

    PubMed

    Szmukler, G; Bach, M

    2015-01-01

    Around the world, reports regularly expose persistent and systemic human rights violations of patients in mental health services and facilities, and of those who are unable to access needed supports. A number of factors contribute - political will; the range and quality of services available; public and professional attitudes to mental health; stigma; health professionals' training and expertise; and available resources. This paper examines one of the main determinants, the legal framework. This sets the parameters for mental health policies and services and for applicable human rights norms and standards that can be realized in practice. We provide an overview of international human rights instruments in relation to mental health disabilities, and of the major human rights violations in this area. Key implications for mental health law reform are drawn with a particular focus on discrimination and coercive interventions. The major challenges posed by the UN Convention on the Rights of Persons with Disabilities (2006) are examined. Current mental health laws, to greater or lesser degrees, fail to meet the newly required standards. We discuss reforms based on 'generic law' and 'legal capacity' principles that seek to meet those standards. We outline some emergent and promising examples of reform. The role of civil society and the importance of the standing of those with mental health disabilities in this process is noted.

  6. AN ERP STUDY OF REGULAR AND IRREGULAR ENGLISH PAST TENSE INFLECTION

    PubMed Central

    Newman, Aaron J.; Ullman, Michael T.; Pancheva, Roumyana; Waligura, Diane L.; Neville, Helen J.

    2006-01-01

    Compositionality is a critical and universal characteristic of human language. It is found at numerous levels, including the combination of morphemes into words and of words into phrases and sentences. These compositional patterns can generally be characterized by rules. For example, the past tense of most English verbs (“regulars”) is formed by adding an -ed suffix. However, many complex linguistic forms have rather idiosyncratic mappings. For example, “irregular” English verbs have past tense forms that cannot be derived from their stems in a consistent manner. Whether regular and irregular forms depend on fundamentally distinct neurocognitive processes (rule-governed combination vs. lexical memorization), or whether a single processing system is sufficient to explain the phenomena, has engendered considerable investigation and debate. We recorded event-related potentials while participants read English sentences that were either correct or had violations of regular past tense inflection, irregular past tense inflection, syntactic phrase structure, or lexical semantics. Violations of regular past tense and phrase structure, but not of irregular past tense or lexical semantics, elicited left-lateralized anterior negativities (LANs). These seem to reflect neurocognitive substrates that underlie compositional processes across linguistic domains, including morphology and syntax. Regular, irregular, and phrase structure violations all elicited later positivities that were maximal over right parietal sites (P600s), and which seem to index aspects of controlled syntactic processing of both phrase structure and morphosyntax. The results suggest distinct neurocognitive substrates for processing regular and irregular past tense forms: regulars depending on compositional processing, and irregulars stored in lexical memory. PMID:17070703

  7. Leggett-Garg inequalities

    NASA Astrophysics Data System (ADS)

    Emary, Clive; Lambert, Neill; Nori, Franco

    2014-01-01

    In contrast to the spatial Bell's inequalities which probe entanglement between spatially separated systems, the Leggett-Garg inequalities test the correlations of a single system measured at different times. Violation of a genuine Leggett-Garg test implies either the absence of a realistic description of the system or the impossibility of measuring the system without disturbing it. Quantum mechanics violates the inequalities on both accounts and the original motivation for these inequalities was as a test for quantum coherence in macroscopic systems. The last few years has seen a number of experimental tests and violations of these inequalities in a variety of microscopic systems such as superconducting qubits, nuclear spins, and photons. In this article, we provide an introduction to the Leggett-Garg inequalities and review these latest experimental developments. We discuss important topics such as the significance of the non-invasive measurability assumption, the clumsiness loophole, and the role of weak measurements. Also covered are some recent theoretical proposals for the application of Leggett-Garg inequalities in quantum transport, quantum biology and nano-mechanical systems.

  8. Achieving Accreditation Council for Graduate Medical Education duty hours compliance within advanced surgical training: a simulation-based feasibility assessment.

    PubMed

    Obi, Andrea; Chung, Jennifer; Chen, Ryan; Lin, Wandi; Sun, Siyuan; Pozehl, William; Cohn, Amy M; Daskin, Mark S; Seagull, F Jacob; Reddy, Rishindra M

    2015-11-01

    Certain operative cases occur unpredictably and/or have long operative times, creating a conflict between Accreditation Council for Graduate Medical Education (ACGME) rules and adequate training experience. A ProModel-based simulation was developed based on historical data. Probabilistic distributions of operative time calculated and combined with an ACGME compliant call schedule. For the advanced surgical cases modeled (cardiothoracic transplants), 80-hour violations were 6.07% and the minimum number of days off was violated 22.50%. There was a 36% chance of failure to fulfill any (either heart or lung) minimum case requirement despite adequate volume. The variable nature of emergency cases inevitably leads to work hour violations under ACGME regulations. Unpredictable cases mandate higher operative volume to ensure achievement of adequate caseloads. Publically available simulation technology provides a valuable avenue to identify adequacy of case volumes for trainees in both the elective and emergency setting. Copyright © 2015 Elsevier Inc. All rights reserved.

  9. Synchronic interval Gaussian mixed-integer programming for air quality management.

    PubMed

    Cheng, Guanhui; Huang, Guohe Gordon; Dong, Cong

    2015-12-15

    To reveal the synchronism of interval uncertainties, the tradeoff between system optimality and security, the discreteness of facility-expansion options, the uncertainty of pollutant dispersion processes, and the seasonality of wind features in air quality management (AQM) systems, a synchronic interval Gaussian mixed-integer programming (SIGMIP) approach is proposed in this study. A robust interval Gaussian dispersion model is developed for approaching the pollutant dispersion process under interval uncertainties and seasonal variations. The reflection of synchronic effects of interval uncertainties in the programming objective is enabled through introducing interval functions. The proposition of constraint violation degrees helps quantify the tradeoff between system optimality and constraint violation under interval uncertainties. The overall optimality of system profits of an SIGMIP model is achieved based on the definition of an integrally optimal solution. Integer variables in the SIGMIP model are resolved by the existing cutting-plane method. Combining these efforts leads to an effective algorithm for the SIGMIP model. An application to an AQM problem in a region in Shandong Province, China, reveals that the proposed SIGMIP model can facilitate identifying the desired scheme for AQM. The enhancement of the robustness of optimization exercises may be helpful for increasing the reliability of suggested schemes for AQM under these complexities. The interrelated tradeoffs among control measures, emission sources, flow processes, receptors, influencing factors, and economic and environmental goals are effectively balanced. Interests of many stakeholders are reasonably coordinated. The harmony between economic development and air quality control is enabled. Results also indicate that the constraint violation degree is effective at reflecting the compromise relationship between constraint-violation risks and system optimality under interval uncertainties. This can help decision makers mitigate potential risks, e.g. insufficiency of pollutant treatment capabilities, exceedance of air quality standards, deficiency of pollution control fund, or imbalance of economic or environmental stress, in the process of guiding AQM. Copyright © 2015 Elsevier B.V. All rights reserved.

  10. Implications of Cognitive Load for Hypothesis Generation and Probability Judgment

    PubMed Central

    Sprenger, Amber M.; Dougherty, Michael R.; Atkins, Sharona M.; Franco-Watkins, Ana M.; Thomas, Rick P.; Lange, Nicholas; Abbs, Brandon

    2011-01-01

    We tested the predictions of HyGene (Thomas et al., 2008) that both divided attention at encoding and judgment should affect the degree to which participants’ probability judgments violate the principle of additivity. In two experiments, we showed that divided attention during judgment leads to an increase in subadditivity, suggesting that the comparison process for probability judgments is capacity limited. Contrary to the predictions of HyGene, a third experiment revealed that divided attention during encoding leads to an increase in later probability judgment made under full attention. The effect of divided attention during encoding on judgment was completely mediated by the number of hypotheses participants generated, indicating that limitations in both encoding and recall can cascade into biases in judgments. PMID:21734897

  11. Usability Evaluation of An Electronic Medication Administration Record (eMAR) Application

    PubMed Central

    Guo, J.; Iribarren, S.; Kapsandoy, S.; Perri, S.; Staggers, N.

    2011-01-01

    Background Electronic medication administration records (eMARs) have been widely used in recent years. However, formal usability evaluations are not yet available for these vendor applications, especially from the perspective of nurses, the largest group of eMAR users. Objective To conduct a formal usability evaluation of an implemented eMAR. Methods Four evaluators examined a commercial vendor eMAR using heuristic evaluation techniques. The evaluators defined seven tasks typical of eMAR use and independently evaluated the application. Consensus techniques were used to obtain 100% agreement of identified usability problems and severity ratings. Findings were reviewed with 5 clinical staff nurses and the Director of Clinical Informatics who verified findings with a small group of clinical nurses. Results Evaluators found 60 usability problems categorized into 233 heuristic violations. Match, Error, and Visibility heuristics were the most frequently violated. Administer Medication and Order and Modify Medications tasks had the highest number of heuristic violations and usability problems rated as major or catastrophic. Conclusion The high number of usability problems could impact the effectiveness, efficiency and satisfaction of nurses’ medication administration activities and may include concerns about patient safety. Usability is a joint responsibility between sites and vendors. We offer a call to action for usability evaluations at all sites and eMAR application redesign as necessary to improve the user experience and promote patient safety. PMID:23616871

  12. Gross human rights violations and reparation under international law: approaching rehabilitation as a form of reparation

    PubMed Central

    Sveaass, Nora

    2013-01-01

    The strengthening of international criminal law through an increased focus on the right to reparation and rehabilitation for victims of crimes against humanity represents an important challenge to health professionals, particularly to those in the field of trauma research and treatment. A brief outline of some developments in the field of international law and justice for victims of gross human rights violations is presented, with a focus on the right to reparation including the means for rehabilitation. The fulfillment of this right is a complex endeavor which raises many questions. The road to justice and reparation for those whose rights have been brutally violated is long and burdensome. The active presence of trauma-informed health professionals in this process is a priority. Some of the issues raised within the context of states’ obligations to provide and ensure redress and rehabilitation to those subjected to torture and gross human rights violations are discussed, and in particular how rehabilitation can be understood and responded to by health professionals. PMID:23671765

  13. Classical Causal Models for Bell and Kochen-Specker Inequality Violations Require Fine-Tuning

    NASA Astrophysics Data System (ADS)

    Cavalcanti, Eric G.

    2018-04-01

    Nonlocality and contextuality are at the root of conceptual puzzles in quantum mechanics, and they are key resources for quantum advantage in information-processing tasks. Bell nonlocality is best understood as the incompatibility between quantum correlations and the classical theory of causality, applied to relativistic causal structure. Contextuality, on the other hand, is on a more controversial foundation. In this work, I provide a common conceptual ground between nonlocality and contextuality as violations of classical causality. First, I show that Bell inequalities can be derived solely from the assumptions of no signaling and no fine-tuning of the causal model. This removes two extra assumptions from a recent result from Wood and Spekkens and, remarkably, does not require any assumption related to independence of measurement settings—unlike all other derivations of Bell inequalities. I then introduce a formalism to represent contextuality scenarios within causal models and show that all classical causal models for violations of a Kochen-Specker inequality require fine-tuning. Thus, the quantum violation of classical causality goes beyond the case of spacelike-separated systems and already manifests in scenarios involving single systems.

  14. Syntactic and semantic processing of Chinese middle sentences: evidence from event-related potentials.

    PubMed

    Zeng, Tao; Mao, Wen; Lu, Qing

    2016-05-25

    Scalp-recorded event-related potentials are known to be sensitive to particular aspects of sentence processing. The N400 component is widely recognized as an effect closely related to lexical-semantic processing. The absence of an N400 effect in participants performing tasks in Indo-European languages has been considered evidence that failed syntactic category processing appears to block lexical-semantic integration and that syntactic structure building is a prerequisite of semantic analysis. An event-related potential experiment was designed to investigate whether such syntactic primacy can be considered to apply equally to Chinese sentence processing. Besides correct middles, sentences with either single semantic or single syntactic violation as well as double syntactic and semantic anomaly were used in the present research. Results showed that both purely semantic and combined violation induced a broad negativity in the time window 300-500 ms, indicating the independence of lexical-semantic integration. These findings provided solid evidence that lexical-semantic parsing plays a crucial role in Chinese sentence comprehension.

  15. Making psycholinguistics musical: Self-paced reading time evidence for shared processing of linguistic and musical syntax

    PubMed Central

    Robert Slevc, L.; Rosenberg, Jason C.; Patel, Aniruddh D.

    2009-01-01

    Linguistic processing–especially syntactic processing–is often considered a hallmark of human cognition, thus the domain-specificity or domain-generality of syntactic processing has attracted considerable debate. These experiments address this issue by simultaneously manipulating syntactic processing demands in language and music. Participants performed self-paced reading of garden-path sentences in which structurally unexpected words cause temporary syntactic processing difficulty. A musical chord accompanied each sentence segment, with the resulting sequence forming a coherent chord progression. When structurally unexpected words were paired with harmonically unexpected chords, participants showed substantially enhanced garden-path effects. No such interaction was observed when the critical words violated semantic expectancy, nor when the critical chords violated timbral expectancy. These results support a prediction of the shared syntactic integration resource hypothesis (SSIRH, Patel, 2003), which suggests that music and language draw on a common pool of limited processing resources for integrating incoming elements into syntactic structures. PMID:19293110

  16. Final Closure Letter for Administrative Complaint Numbers 03R-07-R9, 10R-07-R9 and 01R-11R9

    EPA Pesticide Factsheets

    On 6-7-2017, ECRCO issued a closure letter for Admin Complaint Numbers 03r-07-r9, 10r-07-r9 and 01r-11-r9 involving the Maricopa County Air Quality Department regarding alleged complaints that MCAQD violated Title 6 of the Civil Rights Act of 1964.

  17. Anatomical Correlates of Non-Verbal Perception in Dementia Patients

    PubMed Central

    Lin, Pin-Hsuan; Chen, Hsiu-Hui; Chen, Nai-Ching; Chang, Wen-Neng; Huang, Chi-Wei; Chang, Ya-Ting; Hsu, Shih-Wei; Hsu, Che-Wei; Chang, Chiung-Chih

    2016-01-01

    Purpose: Patients with dementia who have dissociations in verbal and non-verbal sound processing may offer insights into the anatomic basis for highly related auditory modes. Methods: To determine the neuronal networks on non-verbal perception, 16 patients with Alzheimer’s dementia (AD), 15 with behavior variant fronto-temporal dementia (bv-FTD), 14 with semantic dementia (SD) were evaluated and compared with 15 age-matched controls. Neuropsychological and auditory perceptive tasks were included to test the ability to compare pitch changes, scale-violated melody and for naming and associating with environmental sound. The brain 3D T1 images were acquired and voxel-based morphometry (VBM) was used to compare and correlated the volumetric measures with task scores. Results: The SD group scored the lowest among 3 groups in pitch or scale-violated melody tasks. In the environmental sound test, the SD group also showed impairment in naming and also in associating sound with pictures. The AD and bv-FTD groups, compared with the controls, showed no differences in all tests. VBM with task score correlation showed that atrophy in the right supra-marginal and superior temporal gyri was strongly related to deficits in detecting violated scales, while atrophy in the bilateral anterior temporal poles and left medial temporal structures was related to deficits in environmental sound recognition. Conclusions: Auditory perception of pitch, scale-violated melody or environmental sound reflects anatomical degeneration in dementia patients and the processing of non-verbal sounds are mediated by distinct neural circuits. PMID:27630558

  18. Anatomical Correlates of Non-Verbal Perception in Dementia Patients.

    PubMed

    Lin, Pin-Hsuan; Chen, Hsiu-Hui; Chen, Nai-Ching; Chang, Wen-Neng; Huang, Chi-Wei; Chang, Ya-Ting; Hsu, Shih-Wei; Hsu, Che-Wei; Chang, Chiung-Chih

    2016-01-01

    Patients with dementia who have dissociations in verbal and non-verbal sound processing may offer insights into the anatomic basis for highly related auditory modes. To determine the neuronal networks on non-verbal perception, 16 patients with Alzheimer's dementia (AD), 15 with behavior variant fronto-temporal dementia (bv-FTD), 14 with semantic dementia (SD) were evaluated and compared with 15 age-matched controls. Neuropsychological and auditory perceptive tasks were included to test the ability to compare pitch changes, scale-violated melody and for naming and associating with environmental sound. The brain 3D T1 images were acquired and voxel-based morphometry (VBM) was used to compare and correlated the volumetric measures with task scores. The SD group scored the lowest among 3 groups in pitch or scale-violated melody tasks. In the environmental sound test, the SD group also showed impairment in naming and also in associating sound with pictures. The AD and bv-FTD groups, compared with the controls, showed no differences in all tests. VBM with task score correlation showed that atrophy in the right supra-marginal and superior temporal gyri was strongly related to deficits in detecting violated scales, while atrophy in the bilateral anterior temporal poles and left medial temporal structures was related to deficits in environmental sound recognition. Auditory perception of pitch, scale-violated melody or environmental sound reflects anatomical degeneration in dementia patients and the processing of non-verbal sounds are mediated by distinct neural circuits.

  19. A 3% Measurement of the Beam Normal Single Spin Asymmetry in Forward Angle Elastic Electron-Proton Scattering using the Qweak Setup

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Waidyawansa, Dinayadura Buddhini

    2013-08-01

    The beam normal single spin asymmetry generated in the scattering of transversely polarized electrons from unpolarized nucleons is an observable of the imaginary part of the two-photon exchange process. Moreover, it is a potential source of false asymmetry in parity violating electron scattering experiments. The Q{sub weak} experiment uses parity violating electron scattering to make a direct measurement of the weak charge of the proton. The targeted 4% measurement of the weak charge of the proton probes for parity violating new physics beyond the Standard Model. The beam normal single spin asymmetry at Q{sub weak} kinematics is at least threemore » orders of magnitude larger than 5 ppb precision of the parity violating asymmetry. To better understand this parity conserving background, the Q{sub weak} Collaboration has performed elastic scattering measurements with fully transversely polarized electron beam on the proton and aluminum. This dissertation presents the analysis of the 3% measurement (1.3% statistical and 2.6% systematic) of beam normal single spin asymmetry in electronproton scattering at a Q2 of 0.025 (GeV/c)2. It is the most precise existing measurement of beam normal single spin asymmetry available at the time. A measurement of this precision helps to improve the theoretical models on beam normal single spin asymmetry and thereby our understanding of the doubly virtual Compton scattering process.« less

  20. Meaningful coping with chronic pain: Exploring the interplay between goal violation, meaningful coping strategies and life satisfaction in chronic pain patients.

    PubMed

    Dezutter, Jessie; Dewitte, Laura; Thauvoye, Evalyne; Vanhooren, Siebrecht

    2017-02-01

    Trying to cope with chronic pain is a highly demanding and challenging task and pain patients often need to reformulate goals or aspirations due to their pain condition. This goal violation is often related with experienced distress and requires coping processes in order to decrease the distress and stimulate a healthy adaptation. Some scholars, however, argued that in so-called unsolvable or irreparable stressors such as chronic pain, conventional coping strategies like problem-focused coping might not be the most adaptive option. In these situations, meaningful coping strategies attempting to transform the meaning of the stressful experience would be more accurate. In this study, we aim to test if goal violation triggers meaningful coping strategies over time and whether engagement in these meaningful coping strategies result in improved life satisfaction, as an indicator of adaptation. A longitudinal three wave study in a sample of paint patients (n = 125) tests whether goal violation triggers positive reappraisal and downward comparison, two possible meaningful coping strategies. The study furthermore tests if engagement in these strategies results in a better adaptation to the pain condition, reflected in higher life satisfaction. Results partially supported our hypotheses by pointing to the benevolent role of downward comparison on life satisfaction via decreased goal violation of pain patients. Our findings however did also show that positive reappraisal predicted lower life satisfaction via increased levels of appraised goal violation which questions the role of positive reappraisal as a genuine meaningful coping strategy. Implications and limitations are discussed. © 2016 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  1. Making psycholinguistics musical: self-paced reading time evidence for shared processing of linguistic and musical syntax.

    PubMed

    Slevc, L Robert; Rosenberg, Jason C; Patel, Aniruddh D

    2009-04-01

    Linguistic processing, especially syntactic processing, is often considered a hallmark of human cognition; thus, the domain specificity or domain generality of syntactic processing has attracted considerable debate. The present experiments address this issue by simultaneously manipulating syntactic processing demands in language and music. Participants performed self-paced reading of garden path sentences, in which structurally unexpected words cause temporary syntactic processing difficulty. A musical chord accompanied each sentence segment, with the resulting sequence forming a coherent chord progression. When structurally unexpected words were paired with harmonically unexpected chords, participants showed substantially enhanced garden path effects. No such interaction was observed when the critical words violated semantic expectancy or when the critical chords violated timbral expectancy. These results support a prediction of the shared syntactic integration resource hypothesis (Patel, 2003), which suggests that music and language draw on a common pool of limited processing resources for integrating incoming elements into syntactic structures. Notations of the stimuli from this study may be downloaded from pbr.psychonomic-journals.org/content/supplemental.

  2. Searches for R-parity-violating supersymmetry in pp collisions at $$\\sqrt{s}$$ = 8 TeV in final states with 0-4 leptons

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Khachatryan, Vardan

    Results are presented from searches for R-parity-violating supersymmetry in events produced inmore » $pp$ collisions at $$\\sqrt{s}$$ = 8 TeV at the LHC. Final states with 0, 1, 2, or multiple leptons are considered independently. The analysis is performed on data collected by the CMS experiment corresponding to an integrated luminosity of 19.5 fb -1. No excesses of events above the standard model expectations are observed, and 95% confidence level limits are set on supersymmetric particle masses and production cross sections. The results are interpreted in models featuring R-parity-violating decays of the lightest supersymmetric particle, which in the studied scenarios can be either the gluino, a bottom squark, or a neutralino. In a gluino pair production model with baryon number violation, gluinos with a mass less than 0.98 and 1.03 TeV are excluded, by analyses in a fully hadronic and one-lepton final state, respectively. An analysis in a dilepton final state is used to exclude bottom squarks with masses less than 307 GeV in a model considering bottom squark pair production. Multilepton final states are considered in the context of either strong or electroweak production of superpartners and are used to set limits on the masses of the lightest supersymmetric particles. Finally, these limits range from 300 to 900 GeV in models with leptonic and up to approximately 700 GeV in models with semileptonic R-parity-violating couplings.« less

  3. Searches for R-parity-violating supersymmetry in pp collisions at $$\\sqrt{s}$$ = 8 TeV in final states with 0-4 leptons

    DOE PAGES

    Khachatryan, Vardan

    2016-12-29

    Results are presented from searches for R-parity-violating supersymmetry in events produced inmore » $pp$ collisions at $$\\sqrt{s}$$ = 8 TeV at the LHC. Final states with 0, 1, 2, or multiple leptons are considered independently. The analysis is performed on data collected by the CMS experiment corresponding to an integrated luminosity of 19.5 fb -1. No excesses of events above the standard model expectations are observed, and 95% confidence level limits are set on supersymmetric particle masses and production cross sections. The results are interpreted in models featuring R-parity-violating decays of the lightest supersymmetric particle, which in the studied scenarios can be either the gluino, a bottom squark, or a neutralino. In a gluino pair production model with baryon number violation, gluinos with a mass less than 0.98 and 1.03 TeV are excluded, by analyses in a fully hadronic and one-lepton final state, respectively. An analysis in a dilepton final state is used to exclude bottom squarks with masses less than 307 GeV in a model considering bottom squark pair production. Multilepton final states are considered in the context of either strong or electroweak production of superpartners and are used to set limits on the masses of the lightest supersymmetric particles. Finally, these limits range from 300 to 900 GeV in models with leptonic and up to approximately 700 GeV in models with semileptonic R-parity-violating couplings.« less

  4. Environmental factor(tm) system: RCRA hazardous waste handler information (on CD-ROM). Data file

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1995-11-01

    Environmental Factor(trademark) RCRA Hazardous Waste Handler Information on CD-ROM unleashes the invaluable information found in two key EPA data sources on hazardous waste handlers and offers cradle-to-grave waste tracking. It`s easy to search and display: (1) Permit status, design capacity, and compliance history for facilities found in the EPA Research Conservation and Recovery Information System (RCRIS) program tracking database; (2) Detailed information on hazardous wastes generation, management, and minimization by companies who are large quantity generators; and (3) Data on the waste management practices of treatment, storage, and disposal (TSD) facilities from the EPA Biennial Reporting System which is collectedmore » every other year. Environmental Factor`s powerful database retrieval system lets you: (1) Search for RCRA facilities by permit type, SIC code, waste codes, corrective action, or violation information, TSD status, generator and transporter status, and more. (2) View compliance information - dates of evaluation, violation, enforcement, and corrective action. (3) Lookup facilities by waste processing categories of marketing, transporting, processing, and energy recovery. (4) Use owner/operator information and names, titles, and telephone numbers of project managers for prospecting. (5) Browse detailed data on TSD facility and large quantity generators` activities such as onsite waste treatment, disposal, or recycling, offsite waste received, and waste generation and management. The product contains databases, search and retrieval software on two CD-ROMs, an installation diskette and User`s Guide. Environmental Factor has online context-sensitive help from any screen and a printed User`s Guide describing installation and step-by-step procedures for searching, retrieving, and exporting.« less

  5. Measurement of the Parity-Violating directional Gamma-ray Asymmetry in Polarized Neutron Capture on ^35Cl

    NASA Astrophysics Data System (ADS)

    Fomin, Nadia

    2012-03-01

    The NPDGamma experiment aims to measure the parity-odd correlation between the neutron spin and the direction of the emitted photon in neutron-proton capture. A parity violating asymmetry (to be measured to 10-8) from this process can be directly related to the strength of the hadronic weak interaction between nucleons. As part of the commissioning runs on the Fundamental Neutron Physics beamline at the Spallation Neutron Source at ORNL, the gamma-ray asymmetry from the parity-violating capture of cold neutrons on ^35Cl was measured, primarily to check for systematic effects and false asymmtries. The current precision from existing world measurements on this asymmetry is at the level of 10-6 and we believe we can improve it. The analysis methodology as well as preliminary results will be presented.

  6. Simulation of free-electron lasers seeded with broadband radiation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bajlekov, Svetoslav; Fawley, William; Schroeder, Carl

    2011-03-10

    The longitudinal coherence of free-electron laser (FEL) radiation can be enhanced by seeding the FEL with high harmonics of an optical laser pulse. The radiation produced by high-harmonic generation (HHG), however, has a fast-varying temporal profile that can violate the slowly varying envelope approximation and limited frequency window that is employed in conventional free-electron laser simulation codes. Here we investigate the implications of violating this approximation on the accuracy of simulations. On the basis of both analytical considerations and 1D numerical studies, it is concluded that, for most realistic scenarios, conventional FEL codes are capable of accurately simulating the FELmore » process even when the seed radiation violates the slowly varying envelope approximation. We additionally discuss the significance of filtering the harmonic content of broadband HHG seeds.« less

  7. Visual mismatch negativity and categorization.

    PubMed

    Czigler, István

    2014-07-01

    Visual mismatch negativity (vMMN) component of event-related potentials is elicited by stimuli violating the category rule of stimulus sequences, even if such stimuli are outside the focus of attention. Category-related vMMN emerges to colors, and color-related vMMN is sensitive to language-related effects. A higher-order perceptual category, bilateral symmetry is also represented in the memory processes underlying vMMN. As a relatively large body of research shows, violating the emotional category of human faces elicits vMMN. Another face-related category sensitive to the violation of regular presentation is gender. Finally, vMMN was elicited to the laterality of hands. As results on category-related vMMN show, stimulus representation in the non-conscious change detection system is fairly complex, and it is not restricted to the registration of elementary perceptual regularities.

  8. Evolution of multi-well pad development and influence of well pads on environmental violations and wastewater volumes in the Marcellus shale (USA).

    PubMed

    Manda, Alex K; Heath, Jamie L; Klein, Wendy A; Griffin, Michael T; Montz, Burrell E

    2014-09-01

    A majority of well pads for unconventional gas wells that are drilled into the Marcellus shale (northeastern USA) consist of multiple wells (in some cases as many as 12 wells per pad), yet the influence of the evolution of well pad development on the extent of environmental violations and wastewater production is unknown. Although the development of multi-well pads (MWP) at the expense of single well pads (SWP) has been mostly driven by economic factors, the concentrated nature of drilling activities from hydraulic fracturing and horizontal drilling operations on MWP suggests that MWP may create less surface disturbance, produce more volumes of wastewater, and generate more environmental violations than SWP. To explore these hypotheses, we use geospatial techniques and statistical analyses (i.e., regression and Mann-Whitney tests) to assess development of unconventional shale gas wells, and quantify environmental violations and wastewater volumes on SWP and MWP in Pennsylvania. The analyses include assessments of the influence of different types of well pads on potential, minor and major environmental events. Results reveal that (a) in recent years, a majority of pads on which new wells for unconventional gas were drilled are MWP, (b) on average, MWP have about five wells located on each pad and thus, had the transition to MWP not occurred, between two and four times as much land surface disturbance would have occurred per year if drilling was relegated to SWP, (c) there were more environmental violations on MWP than SWP, but when the number of wells were taken into account, fewer environmental violations per well were observed on MWP than on SWP, (d) there were more wastewater and recycled wastewater volumes per pad and per well produced on MWP than on SWP, and (e) the proportion of wastewater that was recycled was higher on MWP than SWP. This study sheds light on how the evolution from SWP to MWP has influenced environmental violations and wastewater production in a field that has undergone rapid development in recent years. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Results of EPA Pilot Studies on Arsenic Removal

    EPA Science Inventory

    This presentation will summarize the results of several projects of the USEPA Arsenic Demonstration Program. The presentation will begin with a summary of the current national compliance data of the arsenic regulation including the number and location of MCL violations. The sec...

  10. An fMRI investigation of expectation violation in magic tricks.

    PubMed

    Danek, Amory H; Öllinger, Michael; Fraps, Thomas; Grothe, Benedikt; Flanagin, Virginia L

    2015-01-01

    Magic tricks violate the expected causal relationships that form an implicit belief system about what is possible in the world around us. Observing a magic effect seemingly invalidates our implicit assumptions about what action causes which outcome. We aimed at identifying the neural correlates of such expectation violations by contrasting 24 video clips of magic tricks with 24 control clips in which the expected action-outcome relationship is upheld. Using fMRI, we measured the brain activity of 25 normal volunteers while they watched the clips in the scanner. Additionally, we measured the professional magician who had performed the magic tricks under the assumption that, in contrast to naïve observers, the magician himself would not perceive his own magic tricks as an expectation violation. As the main effect of magic - control clips in the normal sample, we found higher activity for magic in the head of the caudate nucleus (CN) bilaterally, the left inferior frontal gyrus and the left anterior insula. As expected, the magician's brain activity substantially differed from these results, with mainly parietal areas (supramarginal gyrus bilaterally) activated, supporting our hypothesis that he did not experience any expectation violation. These findings are in accordance with previous research that has implicated the head of the CN in processing changes in the contingency between action and outcome, even in the absence of reward or feedback.

  11. Processing complex pseudo-words in mild cognitive impairment: The interaction of preserved morphological rule knowledge with compromised cognitive ability.

    PubMed

    Manouilidou, Christina; Dolenc, Barbara; Marvin, Tatjana; Pirtošek, Zvezdan

    2016-01-01

    Mild cognitive impairment (MCI) affects the cognitive performance of elderly adults. However, the level of severity is not high enough to be diagnosed with dementia. Previous research reports subtle language impairments in individuals with MCI specifically in domains related to lexical meaning. The present study used both off-line (grammaticality judgment) and on-line (lexical decision) tasks to examine aspects of lexical processing and how they are affected by MCI. 21 healthy older adults and 23 individuals with MCI saw complex pseudo-words that violated various principles of word formation in Slovenian and decided if each letter string was an actual word of their language. The pseudo-words ranged in their degree of violability. A task effect was found, with MCI performance to be similar to that of healthy controls in the off-line task but different in the on-line task. Overall, the MCI group responded slower than the elderly controls. No significant differences were observed in the off-line task, while the on-line task revealed a main effect of Violation type, a main effect of Group and a significant Violation × Group interaction reflecting a difficulty for the MCI group to process pseudo-words in real time. That is, while individuals with MCI seem to preserve morphological rule knowledge, they experience additional difficulties while processing complex pseudo-words. This was attributed to an executive dysfunction associated with MCI that delays the recognition of ungrammatical formations.

  12. Searching for New Physics with b →s τ+τ- Processes

    NASA Astrophysics Data System (ADS)

    Capdevila, Bernat; Crivellin, Andreas; Descotes-Genon, Sébastien; Hofer, Lars; Matias, Joaquim

    2018-05-01

    In recent years, intriguing hints for the violation of lepton flavor universality (LFU) have been accumulated in semileptonic B decays, both in the charged-current transitions b →c ℓ-ν¯ℓ(i.e., RD, RD*,and RJ /ψ) and the neutral-current transitions b →s ℓ+ℓ-(i.e., RK and RK*). Hints for LFU violation in RD(*) and RJ /ψ point at large deviations from the standard model (SM) in processes involving tau leptons. Moreover, LHCb has reported deviations from the SM expectations in b →s μ+μ- processes as well as in the ratios RK and RK*, which together point at new physics (NP) affecting muons with a high significance. These hints for NP suggest the possibility of huge LFU-violating effects in b →s τ+τ- transitions. In this Letter, we predict the branching ratios of B →K τ+τ-, B →K*τ+τ-, and Bs→ϕ τ+τ-, taking into account NP effects in the Wilson coefficients C9(') ττ and C10(') τ τ. Assuming a common NP explanation of RD , RD(*), and RJ /ψ, we show that a very large enhancement of b →s τ+τ- processes, of around 3 orders of magnitude compared to the SM, can be expected under fairly general assumptions. We find that the branching ratios of Bs→τ+τ-, Bs→ϕ τ+τ-, and B →K(*)τ+τ- under these assumptions are in the observable range for LHCb and Belle II.

  13. Constraining new physics models with isotope shift spectroscopy

    NASA Astrophysics Data System (ADS)

    Frugiuele, Claudia; Fuchs, Elina; Perez, Gilad; Schlaffer, Matthias

    2017-07-01

    Isotope shifts of transition frequencies in atoms constrain generic long- and intermediate-range interactions. We focus on new physics scenarios that can be most strongly constrained by King linearity violation such as models with B -L vector bosons, the Higgs portal, and chameleon models. With the anticipated precision, King linearity violation has the potential to set the strongest laboratory bounds on these models in some regions of parameter space. Furthermore, we show that this method can probe the couplings relevant for the protophobic interpretation of the recently reported Be anomaly. We extend the formalism to include an arbitrary number of transitions and isotope pairs and fit the new physics coupling to the currently available isotope shift measurements.

  14. The quantum CP-violating kaon system reproduced in the electronic laboratory

    NASA Astrophysics Data System (ADS)

    Caruso, M.; Fanchiotti, H.; García Canal, C. A.; Mayosky, M.; Veiga, A.

    2016-11-01

    The equivalence between the Schrödinger dynamics of a quantum system with a finite number of basis states and a classical dynamics is realized in terms of electric networks. The isomorphism that connects in a univocal way both dynamical systems was applied to the case of neutral mesons, kaons in particular, and the class of electric networks univocally related to the quantum system was analysed. Moreover, under CPT invariance, the relevant ɛ parameter that measures CP violation in the kaon system is reinterpreted in terms of network parameters. All these results were explicitly shown by means of both a numerical simulation of the implied networks and by constructing the corresponding circuits.

  15. [Metabolic status and bone mineral density in patients with pseudarthrosis of long bones in hyperhomocysteinemia].

    PubMed

    Bezsmertnyĭ, Iu O

    2013-06-01

    In article described research of the metabolic status and bone mineral density in 153 patients with with pseudarthrosis of long bones, in individuals with consolidated fractures and healthy people. The violations of reparative osteogenesis at hyperhomocysteinemia are accompanied by disturbances of the functional state of bone tissue, inhibition of biosynthetic and increased destruction processes, reduced bone mineral density in the formation of osteopenia and osteoporosis. The degree and direction of change of bone depends on the type of violation of reparative osteogenesis.

  16. A high-rate 10B-loaded liquid scintillation detector for parity-violation studies in neutron resonances

    NASA Astrophysics Data System (ADS)

    Yen, Yi-Fen; Bowman, J. D.; Bolton, R. D.; Crawford, B. E.; Delheij, P. P. J.; Hart, G. W.; Haseyama, T.; Frankle, C. M.; Iinuma, M.; Knudson, J. N.; Masaike, A.; Masuda, Y.; Matsuda, Y.; Mitchell, G. E.; Penttilä, S. I.; Roberson, N. R.; Seestrom, S. J.; Sharapov, E.; Shimizu, H. M.; Smith, D. A.; Stephenson, S. L.; Szymanski, J. J.; Yoo, S. H.; Yuan, V. W.

    2000-06-01

    We have developed a large-area 10B-loaded liquid scintillation detector for parity-violation studies in neutron resonances with high instantaneous neutron fluxes from the LANSCE short-pulse spallation source. The detector has an efficiency of 95%, 85% and 71% at neutron energies of 10, 100 and 1000 eV, respectively. The neutron mean capture time in the detector is (416±5) ns. We describe the detector and the current-mode signal processing system, that can handle neutron rates up to 500 MHz.

  17. CP Violation in Unpolarized e+e-→ Charginos at One-Loop Level

    NASA Astrophysics Data System (ADS)

    Osland, P.; Vereshagin, A.

    2007-08-01

    We study CP violation in e+e-→χ˜i+χ˜j- in the framework of the minimal supersymmetric standard model. Though the cross section of this process is CP-even at the tree level even for polarized electron-positron beams, we show that it contains a CP-odd part at one-loop order and there are CP-odd observables that can in principle be measured even using unpolarized electron-positron beams. The relevant diagram calculations are briefly discussed, and the results of selected (box) diagram computations are shown.

  18. Simple and tight monogamy relations for a class of Bell inequalities

    NASA Astrophysics Data System (ADS)

    Augusiak, Remigiusz

    2017-01-01

    Physical principles constrain the way nonlocal correlations can be distributed among distant parties in a Bell-type experiment. These constraints are usually expressed by monogamy relations that bound the amount of Bell inequality violation observed by a set of parties by the violation observed by a different set of parties. Here we show that the no-signaling principle yields simple and tight monogamy relations for an important class of bipartite and multipartite Bell inequalities. We also link these trade-offs to the guessing probability—a key quantity in device-independent information processing.

  19. Search for the lepton-family-number nonconserving decay μ+-->e+γ

    NASA Astrophysics Data System (ADS)

    Ahmed, M.; Amann, J. F.; Barlow, D.; Black, K.; Bolton, R. D.; Brooks, M. L.; Carius, S.; Chen, Y. K.; Chernyshev, A.; Concannon, H. M.; Cooper, M. D.; Cooper, P. S.; Crocker, J.; Dittmann, J. R.; Dzemidzic, M.; Empl, A.; Fisk, R. J.; Fleet, E.; Foreman, W.; Gagliardi, C. A.; Haim, D.; Hallin, A.; Hoffman, C. M.; Hogan, G. E.; Hughes, E. B.; Hungerford, E. V.; Jui, C. C.; Kim, G. J.; Knott, J. E.; Koetke, D. D.; Kozlowski, T.; Kroupa, M. A.; Kunselman, A. R.; Lan, K. A.; Laptev, V.; Lee, D.; Liu, F.; Manweiler, R. W.; Marshall, R.; Mayes, B. W.; Mischke, R. E.; Nefkens, B. M.; Nickerson, L. M.; Nord, P. M.; Oothoudt, M. A.; Otis, J. N.; Phelps, R.; Piilonen, L. E.; Pillai, C.; Pinsky, L.; Ritter, M. W.; Smith, C.; Stanislaus, T. D.; Stantz, K. M.; Szymanski, J. J.; Tang, L.; Tippens, W. B.; Tribble, R. E.; Tu, X. L.; van Ausdeln, L. A.; von Witch, W. H.; Whitehouse, D.; Wilkinson, C.; Wright, B.; Wright, S. C.; Zhang, Y.; Ziock, K. O.

    2002-06-01

    The MEGA experiment, which searched for the muon- and electron-number violating decay μ+→e+γ, is described. The spectrometer system, the calibrations, the data taking procedures, the data analysis, and the sensitivity of the experiment are discussed. The most stringent upper limit on the branching ratio, B(μ+→e+γ)<1.2×10-11 with 90% confidence, is derived from a likelihood analysis.

  20. The Association between Aerobic Fitness and Language Processing in Children: Implications for Academic Achievement

    PubMed Central

    Scudder, Mark R.; Federmeier, Kara D.; Raine, Lauren B.; Direito, Artur; Boyd, Jeremy K.; Hillman, Charles H.

    2014-01-01

    Event-related brain potentials (ERPs) have been instrumental for discerning the relationship between children’s aerobic fitness and aspects of cognition, yet language processing remains unexplored. ERPs linked to the processing of semantic information (the N400) and the analysis of language structure (the P600) were recorded from higher and lower aerobically fit children as they read normal sentences and those containing semantic or syntactic violations. Results revealed that higher fit children exhibited greater N400 amplitude and shorter latency across all sentence types, and a larger P600 effect for syntactic violations. Such findings suggest that higher fitness may be associated with a richer network of words and their meanings, and a greater ability to detect and/or repair syntactic errors. The current findings extend previous ERP research explicating the cognitive benefits associated with greater aerobic fitness in children and may have important implications for learning and academic performance. PMID:24747513

  1. 40 CFR 1504.2 - Criteria for referral.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... possible in the process), but unsuccessful attempts to resolve differences with the lead agency. In... should weigh potential adverse environmental impacts, considering: (a) Possible violation of national...

  2. 40 CFR 1504.2 - Criteria for referral.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... possible in the process), but unsuccessful attempts to resolve differences with the lead agency. In... should weigh potential adverse environmental impacts, considering: (a) Possible violation of national...

  3. 40 CFR 1504.2 - Criteria for referral.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... possible in the process), but unsuccessful attempts to resolve differences with the lead agency. In... should weigh potential adverse environmental impacts, considering: (a) Possible violation of national...

  4. 40 CFR 1504.2 - Criteria for referral.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... possible in the process), but unsuccessful attempts to resolve differences with the lead agency. In... should weigh potential adverse environmental impacts, considering: (a) Possible violation of national...

  5. 40 CFR 1504.2 - Criteria for referral.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... possible in the process), but unsuccessful attempts to resolve differences with the lead agency. In... should weigh potential adverse environmental impacts, considering: (a) Possible violation of national...

  6. 24 CFR 905.200 - Eligible activities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... reduction. Physical improvements to reduce the number of units that are vacant. Not included are costs for... physical improvement costs associated with: (i) Correcting violations of local building code or the Uniform...) Management improvements. Noncapital activities that are project-specific or PHA-wide improvements needed to...

  7. Using Twitter to Identify and Respond to Food Poisoning: The Food Safety STL Project.

    PubMed

    Harris, Jenine K; Hawkins, Jared B; Nguyen, Leila; Nsoesie, Elaine O; Tuli, Gaurav; Mansour, Raed; Brownstein, John S

    Foodborne illness affects 1 in 4 US residents each year. Few of those sickened seek medical care or report the illness to public health authorities, complicating prevention efforts. Citizens who report illness identify food establishments with more serious and critical violations than found by regular inspections. New media sources, including online restaurant reviews and social media postings, have the potential to improve reporting. We implemented a Web-based Dashboard (HealthMap Foodborne Dashboard) to identify and respond to tweets about food poisoning from St Louis City residents. This report examines the performance of the Dashboard in its first 7 months after implementation in the City of St Louis Department of Health. We examined the number of relevant tweets captured and replied to, the number of foodborne illness reports received as a result of the new process, and the results of restaurant inspections following each report. In its first 7 months (October 2015-May 2016), the Dashboard captured 193 relevant tweets. Our replies to relevant tweets resulted in more filed reports than several previously existing foodborne illness reporting mechanisms in St Louis during the same time frame. The proportion of restaurants with food safety violations was not statistically different (P = .60) in restaurants inspected after reports from the Dashboard compared with those inspected following reports through other mechanisms. The Dashboard differs from other citizen engagement mechanisms in its use of current data, allowing direct interaction with constituents on issues when relevant to the constituent to provide time-sensitive education and mobilizing information. In doing so, the Dashboard technology has potential for improving foodborne illness reporting and can be implemented in other areas to improve response to public health issues such as suicidality, spread of Zika virus infection, and hospital quality.

  8. Initial validation of the International Crowding Measure in Emergency Departments (ICMED) to measure emergency department crowding.

    PubMed

    Boyle, Adrian; Coleman, James; Sultan, Yasmin; Dhakshinamoorthy, Vijayasankar; O'Keeffe, Jacqueline; Raut, Pramin; Beniuk, Kathleen

    2015-02-01

    Emergency department (ED) crowding is recognised as a major public health problem. While there is agreement that ED crowding harms patients, there is less agreement about the best way to measure ED crowding. We have previously derived an eight-point measure of ED crowding by a formal consensus process, the International Crowding Measure in Emergency Departments (ICMED). We aimed to test the feasibility of collecting this measure in real time and to partially validate this measure. We conducted a cross-sectional study in four EDs in England. We conducted independent observations of the measure and compared these with senior clinician's perceptions of crowding and safety. We obtained 84 measurements spread evenly across the four EDs. The measure was feasible to collect in real time except for the 'Left Before Being Seen' variable. Increasing numbers of violations of the measure were associated with increasing clinician concerns. The area under the receiver operating characteristic curve was 0.80 (95% CI 0.72 to 0.90) for predicting crowding and 0.74 (95% CI 0.60 to 0.89) for predicting danger. The optimal number of violations for predicting crowding was three, with a sensitivity of 91.2 (95% CI 85.1 to 97.2) and a specificity of 100.0 (92.9-100). The measure predicted clinician concerns better than individual variables such as occupancy. The ICMED can easily be collected in multiple EDs with different information technology systems. The ICMED seems to predict clinician's concerns about crowding and safety well, but future work is required to validate this before it can be advocated for widespread use. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  9. Strategies to reduce safety violations for working from heights in construction companies: study protocol for a randomized controlled trial.

    PubMed

    van der Molen, Henk F; Frings-Dresen, Monique H W

    2014-05-31

    Safety measures should be applied to reduce work-related fatal and non-fatal fall injuries. However, according to the labor inspectorate, more than 80% of Dutch construction sites violate safety regulations for working from heights. To increase compliance with safety regulations, employers and workers have to select, implement and monitor safety measures. To facilitate this behavioral change, stimulating knowledge awareness and personalized feedback are frequently advocated behavior change techniques. For this study, two behavior change strategies have been developed in addition to the announcement of safety inspections by the labor inspectorate. These strategies consist of 1) face-to-face contacts with safety consultants and 2) direct mail with access to internet facilities. The objective of this study is to evaluate the effectiveness of these two strategies on the safety violations for working from heights, the process and the cost measures. This study is a block randomized intervention trial in 27 cities to establish the effects of the face-to-face guidance strategy (N = 9), a direct mailing strategy (N = 9) and a control condition of no guidance (N = 9) on safety violations to record by labor inspectors after three months. A process evaluation for both strategies will be performed to determine program implementation (reach, dose delivered and dose received), satisfaction, knowledge and perceived safety behavior. A cost analysis will be performed to establish the financial costs for both strategies. The present study is in accordance with the CONSORT statement. This study increases insight into performing practice-based randomized controlled trials. The outcome will help to evaluate the effect of two guidance strategies on safety violations. If these strategies are effective, implementation of these strategies through the national institute of safety and health or labor inspectorate can take place to guide construction companies in complying with safety regulations. NTR 4298 on 29-nov-2013.

  10. Radiative corrections to masses and couplings in universal extra dimensions

    NASA Astrophysics Data System (ADS)

    Freitas, Ayres; Kong, Kyoungchul; Wiegand, Daniel

    2018-03-01

    Models with an orbifolded universal extra dimension receive important loop-induced corrections to the masses and couplings of Kaluza-Klein (KK) particles. The dominant contributions stem from so-called boundary terms which violate KK number. Previously, only the parts of these boundary terms proportional to ln(Λ R) have been computed, where R is the radius of the extra dimension and Λ is cut-off scale. However, for typical values of Λ R ˜ 10 · · · 50, the logarithms are not particularly large and non-logarithmic contributions may be numerically important. In this paper, these remaining finite terms are computed and their phenomenological impact is discussed. It is shown that the finite terms have a significant impact on the KK mass spectrum. Furthermore, one finds new KK-number violating interactions that do not depend on ln(Λ R) but nevertheless are non-zero. These lead to new production and decay channels for level-2 KK particles at colliders.

  11. Identification of task demands and usability issues in police use of mobile computing terminals.

    PubMed

    Zahabi, Maryam; Kaber, David

    2018-01-01

    Crash reports from various states in the U.S. have shown high numbers of emergency vehicle crashes, especially in law enforcement situations. This study identified the perceived importance and frequency of police mobile computing terminal (MCT) tasks, quantified the demands of different tasks using a cognitive performance modeling methodology, identified usability violations of current MCT interface designs, and formulated design recommendations for an enhanced interface. Results revealed that "access call notes", "plate number check" and "find location on map" are the most important and frequently performed tasks for officers. "Reading plate information" was also found to be the most visually and cognitively demanding task-method. Usability principles of "using simple and natural dialog" and "minimizing user memory load" were violated by the current MCT interface design. The enhanced design showed potential for reducing cognitive demands and task completion time. Findings should be further validated using a driving simulation study. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Managing heteroscedasticity in general linear models.

    PubMed

    Rosopa, Patrick J; Schaffer, Meline M; Schroeder, Amber N

    2013-09-01

    Heteroscedasticity refers to a phenomenon where data violate a statistical assumption. This assumption is known as homoscedasticity. When the homoscedasticity assumption is violated, this can lead to increased Type I error rates or decreased statistical power. Because this can adversely affect substantive conclusions, the failure to detect and manage heteroscedasticity could have serious implications for theory, research, and practice. In addition, heteroscedasticity is not uncommon in the behavioral and social sciences. Thus, in the current article, we synthesize extant literature in applied psychology, econometrics, quantitative psychology, and statistics, and we offer recommendations for researchers and practitioners regarding available procedures for detecting heteroscedasticity and mitigating its effects. In addition to discussing the strengths and weaknesses of various procedures and comparing them in terms of existing simulation results, we describe a 3-step data-analytic process for detecting and managing heteroscedasticity: (a) fitting a model based on theory and saving residuals, (b) the analysis of residuals, and (c) statistical inferences (e.g., hypothesis tests and confidence intervals) involving parameter estimates. We also demonstrate this data-analytic process using an illustrative example. Overall, detecting violations of the homoscedasticity assumption and mitigating its biasing effects can strengthen the validity of inferences from behavioral and social science data.

  13. Reframing violence against women as a human rights violation: Evan Stark's Coercive Control.

    PubMed

    Libal, Kathryn; Parekh, Serena

    2009-12-01

    Evan Stark claims that partner-perpetrated physical abuse and other forms of violence against women ought to be understood as a human rights violation. The authors engage Stark's rhetorically powerful political and analytical innovation by outlining one theoretical and one practical challenge to shifting the paradigm that researchers, advocates, and policy makers use to describe, explain, and remedy the harms of coercive control from misdemeanor assault to human rights violation. The theoretical challenge involves overcoming the public/ private dichotomy that underpins liberal conceptions of human rights.The practical challenge involves using the human rights framework in the United States, given public indifference to human rights rhetoric or law, reluctance of U.S. policy makers to submit to scrutiny or justice-oriented processes under international law on issues of human rights and especially war crimes, and the consequent U.S. legacy of refusal to participate meaningfully in the international human rights process. The authors conclude that employing a human rights framework holds potential in the United States, but the paradigm shift Stark advocates will not materialize without widespread mobilization of interest in and understanding of human rights among domestic violence advocates and the society in general.

  14. Event-related potentials in response to violations of content and temporal event knowledge.

    PubMed

    Drummer, Janna; van der Meer, Elke; Schaadt, Gesa

    2016-01-08

    Scripts that store knowledge of everyday events are fundamentally important for managing daily routines. Content event knowledge (i.e., knowledge about which events belong to a script) and temporal event knowledge (i.e., knowledge about the chronological order of events in a script) constitute qualitatively different forms of knowledge. However, there is limited information about each distinct process and the time course involved in accessing content and temporal event knowledge. Therefore, we analyzed event-related potentials (ERPs) in response to either correctly presented event sequences or event sequences that contained a content or temporal error. We found an N400, which was followed by a posteriorly distributed P600 in response to content errors in event sequences. By contrast, we did not find an N400 but an anteriorly distributed P600 in response to temporal errors in event sequences. Thus, the N400 seems to be elicited as a response to a general mismatch between an event and the established event model. We assume that the expectancy violation of content event knowledge, as indicated by the N400, induces the collapse of the established event model, a process indicated by the posterior P600. The expectancy violation of temporal event knowledge is assumed to induce an attempt to reorganize the event model in working memory, a process indicated by the frontal P600. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Higgs pair production at NLO QCD for CP-violating Higgs sectors

    NASA Astrophysics Data System (ADS)

    Gröber, R.; Mühlleitner, M.; Spira, M.

    2017-12-01

    Higgs pair production through gluon fusion is an important process at the LHC to test the dynamics underlying electroweak symmetry breaking. Higgs sectors beyond the Standard Model (SM) can substantially modify this cross section through novel couplings not present in the SM or the on-shell production of new heavy Higgs bosons that subsequently decay into Higgs pairs. CP violation in the Higgs sector is important for the explanation of the observed matter-antimatter asymmetry through electroweak baryogenesis. In this work we compute the next-to-leading order (NLO) QCD corrections in the heavy top quark limit, including the effects of CP violation in the Higgs sector. We choose the effective theory (EFT) approach, which provides a rather model-independent way to explore New Physics (NP) effects by adding dimension-6 operators, both CP-conserving and CP-violating ones, to the SM Lagrangian. Furthermore, we perform the computation within a specific UV-complete model and choose as benchmark model the general 2-Higgs-Doublet Model with CP violation, the C2HDM. Depending on the dimension-6 coefficients, the relative NLO QCD corrections are affected by several per cent through the new CP-violating operators. This is also the case for SM-like Higgs pair production in the C2HDM, while the relative QCD corrections in the production of heavier C2HDM Higgs boson pairs deviate more strongly from the SM case. The absolute cross sections both in the EFT and the C2HDM can be modified by more than an order of magnitude. In particular, in the C2HDM the resonant production of Higgs pairs can by far exceed the SM cross section.

  16. Effect of anomalous tbW vertex on decay-lepton distributions in e+ e-® tt(bar) and CP-violating asymmetries

    NASA Astrophysics Data System (ADS)

    Rindani, Saurabh D.

    2000-06-01

    We obtain analytic expressions for the energy and polar-angle double differential distributions of a secondary lepton l+(l-) arising from the decay of t (tbar) in with an anomalous tbW decay vertex. We also obtain analytic expressions for the various differential cross-sections with the lepton energy integrated over. In this case, we find that the angular distributions of the secondary lepton do not depend on the anomalous coupling in the decay, regardless of possible anomalous couplings occurring in the production amplitude for . Our study includes the effect of longitudinal e- and e+ beam polarization. We also study the lepton energy and beam polarization dependence of certain CP-violating lepton angular asymmetries arising from an anomalous tbW decay vertex and compare them with the asymmetries arising due to CP-violation in the production process due to the top electric or weak dipole moment.

  17. Experimental violation of local causality in a quantum network.

    PubMed

    Carvacho, Gonzalo; Andreoli, Francesco; Santodonato, Luca; Bentivegna, Marco; Chaves, Rafael; Sciarrino, Fabio

    2017-03-16

    Bell's theorem plays a crucial role in quantum information processing and thus several experimental investigations of Bell inequalities violations have been carried out over the years. Despite their fundamental relevance, however, previous experiments did not consider an ingredient of relevance for quantum networks: the fact that correlations between distant parties are mediated by several, typically independent sources. Here, using a photonic setup, we investigate a quantum network consisting of three spatially separated nodes whose correlations are mediated by two distinct sources. This scenario allows for the emergence of the so-called non-bilocal correlations, incompatible with any local model involving two independent hidden variables. We experimentally witness the emergence of this kind of quantum correlations by violating a Bell-like inequality under the fair-sampling assumption. Our results provide a proof-of-principle experiment of generalizations of Bell's theorem for networks, which could represent a potential resource for quantum communication protocols.

  18. Experimental violation of local causality in a quantum network

    PubMed Central

    Carvacho, Gonzalo; Andreoli, Francesco; Santodonato, Luca; Bentivegna, Marco; Chaves, Rafael; Sciarrino, Fabio

    2017-01-01

    Bell's theorem plays a crucial role in quantum information processing and thus several experimental investigations of Bell inequalities violations have been carried out over the years. Despite their fundamental relevance, however, previous experiments did not consider an ingredient of relevance for quantum networks: the fact that correlations between distant parties are mediated by several, typically independent sources. Here, using a photonic setup, we investigate a quantum network consisting of three spatially separated nodes whose correlations are mediated by two distinct sources. This scenario allows for the emergence of the so-called non-bilocal correlations, incompatible with any local model involving two independent hidden variables. We experimentally witness the emergence of this kind of quantum correlations by violating a Bell-like inequality under the fair-sampling assumption. Our results provide a proof-of-principle experiment of generalizations of Bell's theorem for networks, which could represent a potential resource for quantum communication protocols. PMID:28300068

  19. Experimental violation of local causality in a quantum network

    NASA Astrophysics Data System (ADS)

    Carvacho, Gonzalo; Andreoli, Francesco; Santodonato, Luca; Bentivegna, Marco; Chaves, Rafael; Sciarrino, Fabio

    2017-03-01

    Bell's theorem plays a crucial role in quantum information processing and thus several experimental investigations of Bell inequalities violations have been carried out over the years. Despite their fundamental relevance, however, previous experiments did not consider an ingredient of relevance for quantum networks: the fact that correlations between distant parties are mediated by several, typically independent sources. Here, using a photonic setup, we investigate a quantum network consisting of three spatially separated nodes whose correlations are mediated by two distinct sources. This scenario allows for the emergence of the so-called non-bilocal correlations, incompatible with any local model involving two independent hidden variables. We experimentally witness the emergence of this kind of quantum correlations by violating a Bell-like inequality under the fair-sampling assumption. Our results provide a proof-of-principle experiment of generalizations of Bell's theorem for networks, which could represent a potential resource for quantum communication protocols.

  20. Flavored dark matter beyond Minimal Flavor Violation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agrawal, Prateek; Blanke, Monika; Gemmler, Katrin

    We study the interplay of flavor and dark matter phenomenology for models of flavored dark matter interacting with quarks. We allow an arbitrary flavor structure in the coupling of dark matter with quarks. This coupling is assumed to be the only new source of violation of the Standard Model flavor symmetry extended by a U(3) χ associated with the dark matter. We call this ansatz Dark Minimal Flavor Violation (DMFV) and highlight its various implications, including an unbroken discrete symmetry that can stabilize the dark matter. As an illustration we study a Dirac fermionic dark matter χ which transforms asmore » triplet under U(3) χ , and is a singlet under the Standard Model. The dark matter couples to right-handed down-type quarks via a colored scalar mediator Φ with a coupling λ. We identify a number of “flavor-safe” scenarios for the structure of λ which are beyond Minimal Flavor Violation. Also, for dark matter and collider phenomenology we focus on the well-motivated case of b-flavored dark matter. Furthermore, the combined flavor and dark matter constraints on the parameter space of λ turn out to be interesting intersections of the individual ones. LHC constraints on simplified models of squarks and sbottoms can be adapted to our case, and monojet searches can be relevant if the spectrum is compressed.« less

  1. Flavored dark matter beyond Minimal Flavor Violation

    DOE PAGES

    Agrawal, Prateek; Blanke, Monika; Gemmler, Katrin

    2014-10-13

    We study the interplay of flavor and dark matter phenomenology for models of flavored dark matter interacting with quarks. We allow an arbitrary flavor structure in the coupling of dark matter with quarks. This coupling is assumed to be the only new source of violation of the Standard Model flavor symmetry extended by a U(3) χ associated with the dark matter. We call this ansatz Dark Minimal Flavor Violation (DMFV) and highlight its various implications, including an unbroken discrete symmetry that can stabilize the dark matter. As an illustration we study a Dirac fermionic dark matter χ which transforms asmore » triplet under U(3) χ , and is a singlet under the Standard Model. The dark matter couples to right-handed down-type quarks via a colored scalar mediator Φ with a coupling λ. We identify a number of “flavor-safe” scenarios for the structure of λ which are beyond Minimal Flavor Violation. Also, for dark matter and collider phenomenology we focus on the well-motivated case of b-flavored dark matter. Furthermore, the combined flavor and dark matter constraints on the parameter space of λ turn out to be interesting intersections of the individual ones. LHC constraints on simplified models of squarks and sbottoms can be adapted to our case, and monojet searches can be relevant if the spectrum is compressed.« less

  2. Helping or punishing strangers: neural correlates of altruistic decisions as third-party and of its relation to empathic concern.

    PubMed

    Hu, Yang; Strang, Sabrina; Weber, Bernd

    2015-01-01

    Social norms are a cornerstone of human society. When social norms are violated (e.g., fairness) people can either help the victim or punish the violator in order to restore justice. Recent research has shown that empathic concern influences this decision to help or punish. Using functional magnetic resonance imaging (fMRI) we investigated the neural underpinnings of third-party help and punishment and the involvement of empathic concern. Participants saw a person violating a social norm, i.e., proposing unfair offers in a dictator game, at the expense of another person. The participants could then decide to either punish the violator or help the victim. Our results revealed that both third-party helping as well as third-party punishing activated the bilateral striatum, a region strongly related with reward processing, indicating that both altruistic decisions share a common neuronal basis. In addition, also different networks were involved in the two processes compared with control conditions; bilateral striatum and the right lateral prefrontal cortex (lPFC) during helping and bilateral striatum as well as left lPFC and ventral medial prefrontal cortex (vmPFC) during punishment. Further we found that individual differences in empathic concern influenced whether people prefer to help or to punish. People with high empathic concern helped more frequently, were faster in their decision and showed higher activation in frontoparietal regions during helping compared with punishing. Our findings provide insights into the neuronal basis of human altruistic behavior and social norm enforcement mechanism.

  3. Parental socialization of sadness regulation in middle childhood: the role of expectations and gender.

    PubMed

    Cassano, Michael C; Zeman, Janice L

    2010-09-01

    The authors of this study investigated mothers' and fathers' socialization of their children's sadness. The particular focus was an examination of how socialization practices changed when parents' expectancies concerning their child's sadness management abilities were violated. Methods included an experimental manipulation and direct observation of parent-child interactions in 62 families of White, middle-class children in 3rd and 4th grades. Families were randomly assigned to 1 of 2 conditions. After parents were provided with a description of normative child behavior on a sadness-induction task, feedback was manipulated such that parents in the control condition were told their child had demonstrated typical regulation while parents in the violated-expectancy condition were informed their child did not manage sadness as well as peers. The hypothesis that violated expectancies influence socialization processes was supported, with greater evidence emerging for fathers than mothers. In certain circumstances within the violated-expectancy condition, there was more parental similarity in socialization practices than in the control condition. Further, mother-father comparisons indicated differences in socialization as a function of parent and child gender that were generally consistent with gender stereotypes.

  4. The Defense of Teachers' Trade Union Rights.

    ERIC Educational Resources Information Center

    Pepin, Luce

    1990-01-01

    The author sees cause for concern in the number of complaints to the International Labour Organisation alleging violations of teachers' union rights. She examines the right of public employees to organize and strike and government interference, concluding that greater protection for teachers' unions may be needed. (SK)

  5. Must-Carry and Public Broadcasting.

    ERIC Educational Resources Information Center

    Davenport, Elizabeth K.

    Because of the United States Court of Appeal's ruling ("Quincy Cable TV vs. Federal Communications Commission") that government regulation of what cable television stations can broadcast violates their First Amendment rights, a number of consequences have arisen concerning what cable stations are required to broadcast (must-carry rules),…

  6. China-U.S. Trade Issues

    DTIC Science & Technology

    2010-06-21

    of China’s censorship policies violated WTO rules or China’s limits on the number of foreign films that can be imported each year. China has agreed...19 Pending U.S. Cases Against China ................................................................................ 22 Resolved... Cases and WTO Panel Rulings....................................................................... 22 Chinese WTO Cases Brought Against the United

  7. China-U.S. Trade Issues

    DTIC Science & Technology

    2010-07-29

    China’s censorship policies violated WTO rules or China’s limits on the number of foreign films that can be imported each year. China has agreed to...17 Pending U.S. Cases Against China ................................................................................ 19 Resolved Cases and WTO...Panel Rulings....................................................................... 19 Chinese WTO Cases Brought Against the United States

  8. Trouble on Tap.

    ERIC Educational Resources Information Center

    Lewis, Scott Alan

    1995-01-01

    Evaluates the state of drinking-water quality in the United States. Maps the number of reported cases of waterborne disease by state and lists 23 cities with violations of contaminant standards 1 or more times from 1992 to 1994. Briefly describes four primary drinking-water pollution causes and six management options. (LZ)

  9. 20 CFR 655.65 - Remedies for violations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... EMPLOYMENT OF FOREIGN WORKERS IN THE UNITED STATES Labor Certification Process and Enforcement of Attestations for Temporary Employment in Occupations Other Than Agriculture or Registered Nursing in the United...

  10. Effectiveness of a computerized alert system based on re-testing intervals for limiting the inappropriateness of laboratory test requests.

    PubMed

    Lippi, Giuseppe; Brambilla, Marco; Bonelli, Patrizia; Aloe, Rosalia; Balestrino, Antonio; Nardelli, Anna; Ceda, Gian Paolo; Fabi, Massimo

    2015-11-01

    There is consolidated evidence that the burden of inappropriate laboratory test requests is very high, up to 70%. We describe here the function of a computerized alert system linked to the order entry, designed to limit the number of potentially inappropriate laboratory test requests. A computerized alert system based on re-testing intervals and entailing the generation of pop-up alerts when preset criteria of appropriateness for 15 laboratory tests were violated was implemented in two clinical wards of the University Hospital of Parma. The effectiveness of the system for limiting potentially inappropriate tests was monitored for 6months. Overall, 765/3539 (22%) test requests violated the preset criteria of appropriateness and generated the appearance of electronic alert. After alert appearance, 591 requests were annulled (17% of total tests requested and 77% of tests alerted, respectively). The total number of test requests violating the preset criteria of inappropriateness constantly decreased over time (26% in the first three months of implementation versus 17% in the following period; p<0.001). The total financial saving of test withdrawn was 3387 Euros (12.8% of the total test cost) throughout the study period. The results of this study suggest that a computerized alert system may be effective to limit the inappropriateness of laboratory test requests, generating significant economic saving and educating physicians to a more efficient use of laboratory resources. Copyright © 2015 The Canadian Society of Clinical Chemists. Published by Elsevier Inc. All rights reserved.

  11. Tightness of correlation inequalities with no quantum violation

    NASA Astrophysics Data System (ADS)

    Ramanathan, Ravishankar; Quintino, Marco Túlio; Sainz, Ana Belén; Murta, Gláucia; Augusiak, Remigiusz

    2017-01-01

    We study the faces of the set of quantum correlations, i.e., the Bell and noncontextuality inequalities without any quantum violation. First, we investigate the question of whether every proper (facet-defining) Bell inequality for two parties, other than the trivial ones from positivity, normalization, and no-signaling, can be violated by quantum correlations, i.e., whether the classical Bell polytope or the smaller correlation polytope share any facets with their respective quantum sets. To do this, we develop a recently derived bound on the quantum value of linear games based on the norms of game matrices to give a simple sufficient condition to identify linear games with no quantum advantage. Additionally we show how this bound can be extended to the general class of unique games. We then show that the paradigmatic examples of correlation Bell inequalities with no quantum violation, namely the nonlocal computation games, do not constitute facet-defining Bell inequalities, not even for the correlation polytope. We also extend this to an arbitrary prime number of outcomes for a specific class of these games. We then study the faces in the simplest Clauser-Horne-Shimony-Holt Bell scenario of binary dichotomic measurements, and identify edges in the set of quantum correlations in this scenario. Finally, we relate the noncontextual polytope of single-party correlation inequalities with the cut polytope CUT(∇ G ) , where G denotes the compatibility graph of observables in the contextuality scenario and ∇ G denotes the suspension graph of G . We observe that there exist facet-defining noncontextuality inequalities with no quantum violation, and furthermore that this set of inequalities is beyond those implied by the consistent exclusivity principle.

  12. Mu2e Technical Design Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bartoszek, L.; et al.

    Fermi National Accelerator Laboratory and the Mu2e Collaboration, composed of about 155 scientists and engineers from 28 universities and laboratories around the world, have collaborated to create this technical design for a new facility to study charged lepton flavor violation using the existing Department of Energy investment in the Fermilab accelerator complex. Mu2e proposes to measure the ratio of the rate of the neutrinoless, coherent conversion of muons into electrons in the field of a nucleus, relative to the rate of ordinary muon capture on the nucleus. The conversion process is an example of charged lepton flavor violation (CLFV), amore » process that has never been observed experimentally. The significant motivation behind the search for muon-to-electron conversion is discussed in Chapter 3.« less

  13. Correspondence of I- and Q-balls as non-relativistic condensates

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mukaida, Kyohei; Takimoto, Masahiro, E-mail: mukaida@hep-th.phys.s.u-tokyo.ac.jp, E-mail: takimoto@hep-th.phys.s.u-tokyo.ac.jp

    2014-08-01

    If a real scalar field is dominated by non-relativistic modes, then it approximately conserves its particle number and obeys an equation that governs a complex scalar field theory with a conserved global U(1) symmetry. From this fact, it is shown that the I-ball (oscillon) can be naturally understood as a projection (e.g., real part) of the non-relativistic Q-ball solution. In particular, we clarify that the stability of the I-ball is guaranteed by the U(1) symmetry in the corresponding complex scalar field theory as long as the non-relativistic condition holds. We also discuss the longevity of I-ball from the perspective ofmore » the complex scalar field in terms of U(1) charge violating processes.« less

  14. Defining Discrimination: Intent vs. Impact.

    ERIC Educational Resources Information Center

    Blumstein, James F.

    1984-01-01

    The nondiscrimination principle is process-oriented, and proof of its violation must focus on the process and criteria of decision making--i.e., intent either to discriminate or to disadvantage based on race. Civil rights laws should allow defendants to show good faith as a claim against illegal discrimination. (KH)

  15. 76 FR 38419 - United States v. George's Foods, LLC, et. al.; Proposed Final Judgment and Competitive Impact...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ...'s'') Harrisonburg, Virginia chicken processing complex, consummated May 7, 2011, violated Section 7... acquisition of Tyson Foods, Inc.'s (``Tyson's'') Harrisonburg, Virginia chicken processing complex..., when Tyson and George's publicly announced George's intent to buy Tyson's Harrisonburg chicken...

  16. The Möbius domain wall fermion algorithm

    NASA Astrophysics Data System (ADS)

    Brower, Richard C.; Neff, Harmut; Orginos, Kostas

    2017-11-01

    We present a review of the properties of generalized domain wall Fermions, based on a (real) Möbius transformation on the Wilson overlap kernel, discussing their algorithmic efficiency, the degree of explicit chiral violations measured by the residual mass (mres) and the Ward-Takahashi identities. The Möbius class interpolates between Shamir's domain wall operator and Boriçi's domain wall implementation of Neuberger's overlap operator without increasing the number of Dirac applications per conjugate gradient iteration. A new scaling parameter (α) reduces chiral violations at finite fifth dimension (Ls) but yields exactly the same overlap action in the limit Ls → ∞. Through the use of 4d Red/Black preconditioning and optimal tuning for the scaling α(Ls) , we show that chiral symmetry violations are typically reduced by an order of magnitude at fixed Ls. We argue that the residual mass for a tuned Möbius algorithm with α = O(1 /Lsγ) for γ < 1 will eventually fall asymptotically as mres = O(1 /Ls1+γ) in the case of a 5D Hamiltonian with out a spectral gap.

  17. Hacking the Bell test using classical light in energy-time entanglement-based quantum key distribution.

    PubMed

    Jogenfors, Jonathan; Elhassan, Ashraf Mohamed; Ahrens, Johan; Bourennane, Mohamed; Larsson, Jan-Åke

    2015-12-01

    Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson's configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.

  18. On the harmonic-type and linear-type confinement of a relativistic scalar particle yielded by Lorentz symmetry breaking effects

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bakke, K., E-mail: kbakke@fisica.ufpb.br; Belich, H., E-mail: belichjr@gmail.com

    2016-10-15

    Based on the Standard Model Extension, we investigate relativistic quantum effects on a scalar particle in backgrounds of the Lorentz symmetry violation defined by a tensor field. We show that harmonic-type and linear-type confining potentials can stem from Lorentz symmetry breaking effects, and thus, relativistic bound state solutions can be achieved. We first analyse a possible scenario of the violation of the Lorentz symmetry that gives rise to a harmonic-type potential. In the following, we analyse another possible scenario of the breaking of the Lorentz symmetry that induces both harmonic-type and linear-type confining potentials. In this second case, we alsomore » show that not all values of the parameter associated with the intensity of the electric field are permitted in the search for polynomial solutions to the radial equation, where the possible values of this parameter are determined by the quantum numbers of the system and the parameters associated with the violation of the Lorentz symmetry.« less

  19. Svetlichny's inequality and genuine tripartite nonlocality in three-qubit pure states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ajoy, Ashok; NMR Research Centre, Indian Institute of Science, Bangalore 560012; Rungta, Pranaw

    2010-05-15

    The violation of the Svetlichny's inequality (SI) [Phys. Rev. D 35, 3066 (1987)] is sufficient but not necessary for genuine tripartite nonlocal correlations. Here we quantify the relationship between tripartite entanglement and the maximum expectation value of the Svetlichny operator (which is bounded from above by the inequality) for the two inequivalent subclasses of pure three-qubit states: the Greenberger-Horne-Zeilinger (GHZ) class and the W class. We show that the maximum for the GHZ-class states reduces to Mermin's inequality [Phys. Rev. Lett. 65, 1838 (1990)] modulo a constant factor, and although it is a function of the three tangle and themore » residual concurrence, large numbers of states do not violate the inequality. We further show that by design SI is more suitable as a measure of genuine tripartite nonlocality between the three qubits in the W-class states, and the maximum is a certain function of the bipartite entanglement (the concurrence) of the three reduced states, and only when their sum attains a certain threshold value do they violate the inequality.« less

  20. JPRS Report, China, Red Flag, Number 23, 1 December 1987

    DTIC Science & Technology

    1988-03-04

    unhealthy tendency of violating laws and abusing power to seek personal gains. Party organizations and the vast numbers of party members should stand...34transition to communism" in production relations, and practiced egalitarianism characterized by "everybody sharing food from the big pot" in distribution...the party from those of the government easily engender the unhealthy tendency of bureaucracy and abusing power for personal gains. It is difficult

Top