A System for Traffic Violation Detection
Aliane, Nourdine; Fernandez, Javier; Mata, Mario; Bemposta, Sergio
2014-01-01
This paper describes the framework and components of an experimental platform for an advanced driver assistance system (ADAS) aimed at providing drivers with a feedback about traffic violations they have committed during their driving. The system is able to detect some specific traffic violations, record data associated to these faults in a local data-base, and also allow visualization of the spatial and temporal information of these traffic violations in a geographical map using the standard Google Earth tool. The test-bed is mainly composed of two parts: a computer vision subsystem for traffic sign detection and recognition which operates during both day and nighttime, and an event data recorder (EDR) for recording data related to some specific traffic violations. The paper covers firstly the description of the hardware architecture and then presents the policies used for handling traffic violations. PMID:25421737
A system for traffic violation detection.
Aliane, Nourdine; Fernandez, Javier; Mata, Mario; Bemposta, Sergio
2014-11-24
This paper describes the framework and components of an experimental platform for an advanced driver assistance system (ADAS) aimed at providing drivers with a feedback about traffic violations they have committed during their driving. The system is able to detect some specific traffic violations, record data associated to these faults in a local data-base, and also allow visualization of the spatial and temporal information of these traffic violations in a geographical map using the standard Google Earth tool. The test-bed is mainly composed of two parts: a computer vision subsystem for traffic sign detection and recognition which operates during both day and nighttime, and an event data recorder (EDR) for recording data related to some specific traffic violations. The paper covers firstly the description of the hardware architecture and then presents the policies used for handling traffic violations.
Scanlon, John M; Sherony, Rini; Gabler, Hampton C
2016-09-01
Intersection crashes resulted in over 5,000 fatalities in the United States in 2014. Intersection Advanced Driver Assistance Systems (I-ADAS) are active safety systems that seek to help drivers safely traverse intersections. I-ADAS uses onboard sensors to detect oncoming vehicles and, in the event of an imminent crash, can either alert the driver or take autonomous evasive action. The objective of this study was to develop and evaluate a predictive model for detecting whether a stop sign violation was imminent. Passenger vehicle intersection approaches were extracted from a data set of typical driver behavior (100-Car Naturalistic Driving Study) and violations (event data recorders downloaded from real-world crashes) and were assigned weighting factors based on real-world frequency. A k-fold cross-validation procedure was then used to develop and evaluate 3 hypothetical stop sign warning algorithms (i.e., early, intermediate, and delayed) for detecting an impending violation during the intersection approach. Violation detection models were developed using logistic regression models that evaluate likelihood of a violation at various locations along the intersection approach. Two potential indicators of driver intent to stop-that is, required deceleration parameter (RDP) and brake application-were used to develop the predictive models. The earliest violation detection opportunity was then evaluated for each detection algorithm in order to (1) evaluate the violation detection accuracy and (2) compare braking demand versus maximum braking capabilities. A total of 38 violating and 658 nonviolating approaches were used in the analysis. All 3 algorithms were able to detect a violation at some point during the intersection approach. The early detection algorithm, as designed, was able to detect violations earlier than all other algorithms during the intersection approach but gave false alarms for 22.3% of approaches. In contrast, the delayed detection algorithm sacrificed some time for detecting violations but was able to substantially reduce false alarms to only 3.3% of all nonviolating approaches. Given good surface conditions (maximum braking capabilities = 0.8 g) and maximum effort, most drivers (55.3-71.1%) would be able to stop the vehicle regardless of the detection algorithm. However, given poor surface conditions (maximum braking capabilities = 0.4 g), few drivers (10.5-26.3%) would be able to stop the vehicle. Automatic emergency braking (AEB) would allow for early braking prior to driver reaction. If equipped with an AEB system, the results suggest that, even for the poor surface conditions scenario, over one half (55.3-65.8%) of the vehicles could have been stopped. This study demonstrates the potential of I-ADAS to incorporate a stop sign violation detection algorithm. Repeating the analysis on a larger, more extensive data set will allow for the development of a more comprehensive algorithm to further validate the findings.
Cosmides, Leda; Barrett, H Clark; Tooby, John
2010-05-11
Blank-slate theories of human intelligence propose that reasoning is carried out by general-purpose operations applied uniformly across contents. An evolutionary approach implies a radically different model of human intelligence. The task demands of different adaptive problems select for functionally specialized problem-solving strategies, unleashing massive increases in problem-solving power for ancestrally recurrent adaptive problems. Because exchange can evolve only if cooperators can detect cheaters, we hypothesized that the human mind would be equipped with a neurocognitive system specialized for reasoning about social exchange. Whereas humans perform poorly when asked to detect violations of most conditional rules, we predicted and found a dramatic spike in performance when the rule specifies an exchange and violations correspond to cheating. According to critics, people's uncanny accuracy at detecting violations of social exchange rules does not reflect a cheater detection mechanism, but extends instead to all rules regulating when actions are permitted (deontic conditionals). Here we report experimental tests that falsify these theories by demonstrating that deontic rules as a class do not elicit the search for violations. We show that the cheater detection system functions with pinpoint accuracy, searching for violations of social exchange rules only when these are likely to reveal the presence of someone who intends to cheat. It does not search for violations of social exchange rules when these are accidental, when they do not benefit the violator, or when the situation would make cheating difficult.
Adaptive specializations, social exchange, and the evolution of human intelligence
Cosmides, Leda; Barrett, H. Clark; Tooby, John
2010-01-01
Blank-slate theories of human intelligence propose that reasoning is carried out by general-purpose operations applied uniformly across contents. An evolutionary approach implies a radically different model of human intelligence. The task demands of different adaptive problems select for functionally specialized problem-solving strategies, unleashing massive increases in problem-solving power for ancestrally recurrent adaptive problems. Because exchange can evolve only if cooperators can detect cheaters, we hypothesized that the human mind would be equipped with a neurocognitive system specialized for reasoning about social exchange. Whereas humans perform poorly when asked to detect violations of most conditional rules, we predicted and found a dramatic spike in performance when the rule specifies an exchange and violations correspond to cheating. According to critics, people's uncanny accuracy at detecting violations of social exchange rules does not reflect a cheater detection mechanism, but extends instead to all rules regulating when actions are permitted (deontic conditionals). Here we report experimental tests that falsify these theories by demonstrating that deontic rules as a class do not elicit the search for violations. We show that the cheater detection system functions with pinpoint accuracy, searching for violations of social exchange rules only when these are likely to reveal the presence of someone who intends to cheat. It does not search for violations of social exchange rules when these are accidental, when they do not benefit the violator, or when the situation would make cheating difficult. PMID:20445099
NASA Astrophysics Data System (ADS)
Li, Jie; Zhu, Shi-Yao
2017-12-01
We investigate under which conditions quantum nonlocal manifestations such as Einstein-Podolsky-Rosen steering or Bell nonlocality can manifest themselves even at the macroscopic level of two mechanical resonators in optomechanical systems. We adopt the powerful scheme of reservoir engineering, implemented by driving a cavity mode with a properly chosen two-tone field, to prepare two mechanical oscillators in an entangled state. We show that large and robust (both one-way and two-way) steering could be achieved in the steady state with realistic parameters. We analyze the mechanism of the asymmetric nature of steering in our system of a two-mode Gaussian state. However, unlike steering, a Bell nonlocality is present under much more stringent conditions. We consider two types of measurements, displaced parity and on-off detection, respectively. We show that for both the measurements the Bell violation requires very low environmental temperature. For the parity detection, a large Bell violation is observed only in the transient state when the mechanical modes decouple from the optical mode and with extremely small cavity losses and mechanical damping. However, for the on-off detection, a moderate Bell violation is found in the steady state and is robust against cavity losses and mechanical damping. Although a Bell violation with parity detection seems extremely challenging to demonstrate experimentally, the conditions required for violating Bell inequalities with the on-off detection are much less demanding.
Video-based real-time on-street parking occupancy detection system
NASA Astrophysics Data System (ADS)
Bulan, Orhan; Loce, Robert P.; Wu, Wencheng; Wang, YaoRong; Bernal, Edgar A.; Fan, Zhigang
2013-10-01
Urban parking management is receiving significant attention due to its potential to reduce traffic congestion, fuel consumption, and emissions. Real-time parking occupancy detection is a critical component of on-street parking management systems, where occupancy information is relayed to drivers via smart phone apps, radio, Internet, on-road signs, or global positioning system auxiliary signals. Video-based parking occupancy detection systems can provide a cost-effective solution to the sensing task while providing additional functionality for traffic law enforcement and surveillance. We present a video-based on-street parking occupancy detection system that can operate in real time. Our system accounts for the inherent challenges that exist in on-street parking settings, including illumination changes, rain, shadows, occlusions, and camera motion. Our method utilizes several components from video processing and computer vision for motion detection, background subtraction, and vehicle detection. We also present three traffic law enforcement applications: parking angle violation detection, parking boundary violation detection, and exclusion zone violation detection, which can be integrated into the parking occupancy cameras as a value-added option. Our experimental results show that the proposed parking occupancy detection method performs in real-time at 5 frames/s and achieves better than 90% detection accuracy across several days of videos captured in a busy street block under various weather conditions such as sunny, cloudy, and rainy, among others.
Violation of Bell's Inequality Using Continuous Variable Measurements
NASA Astrophysics Data System (ADS)
Thearle, Oliver; Janousek, Jiri; Armstrong, Seiji; Hosseini, Sara; Schünemann Mraz, Melanie; Assad, Syed; Symul, Thomas; James, Matthew R.; Huntington, Elanor; Ralph, Timothy C.; Lam, Ping Koy
2018-01-01
A Bell inequality is a fundamental test to rule out local hidden variable model descriptions of correlations between two physically separated systems. There have been a number of experiments in which a Bell inequality has been violated using discrete-variable systems. We demonstrate a violation of Bell's inequality using continuous variable quadrature measurements. By creating a four-mode entangled state with homodyne detection, we recorded a clear violation with a Bell value of B =2.31 ±0.02 . This opens new possibilities for using continuous variable states for device independent quantum protocols.
Liu, Jun; Han, Jiuqiang; Lv, Hongqiang; Li, Bing
2015-04-16
With the continuing growth of highway construction and vehicle use expansion all over the world, highway vehicle traffic rule violation (TRV) detection has become more and more important so as to avoid traffic accidents and injuries in intelligent transportation systems (ITS) and vehicular ad hoc networks (VANETs). Since very few works have contributed to solve the TRV detection problem by moving vehicle measurements and surveillance devices, this paper develops a novel parallel ultrasonic sensor system that can be used to identify the TRV behavior of a host vehicle in real-time. Then a two-dimensional state method is proposed, utilizing the spacial state and time sequential states from the data of two parallel ultrasonic sensors to detect and count the highway vehicle violations. Finally, the theoretical TRV identification probability is analyzed, and actual experiments are conducted on different highway segments with various driving speeds, which indicates that the identification accuracy of the proposed method can reach about 90.97%.
Liu, Jun; Han, Jiuqiang; Lv, Hongqiang; Li, Bing
2015-01-01
With the continuing growth of highway construction and vehicle use expansion all over the world, highway vehicle traffic rule violation (TRV) detection has become more and more important so as to avoid traffic accidents and injuries in intelligent transportation systems (ITS) and vehicular ad hoc networks (VANETs). Since very few works have contributed to solve the TRV detection problem by moving vehicle measurements and surveillance devices, this paper develops a novel parallel ultrasonic sensor system that can be used to identify the TRV behavior of a host vehicle in real-time. Then a two-dimensional state method is proposed, utilizing the spacial state and time sequential states from the data of two parallel ultrasonic sensors to detect and count the highway vehicle violations. Finally, the theoretical TRV identification probability is analyzed, and actual experiments are conducted on different highway segments with various driving speeds, which indicates that the identification accuracy of the proposed method can reach about 90.97%. PMID:25894940
Patterns of chemical residues detected in US beef carcasses between 1991 and 1993.
Gibbons, S N; Kaneene, J B; Lloyd, J W
1996-08-01
A study of data from 12 states in the Food Safety Inspection Service's Residue Violation Information System was conducted to describe patterns of violative chemical residues in US beef during 1991, 1992, and 1993. In 1991, 3,249 violative residues were found in 2,734 carcasses in the 12 states included in the study. In 1992, 3,132 violative residues were found in 2,813 carcasses, and in 1993, 2,317 violative residues were found in 2,051 carcasses. During each of the 3 years, the Calf Antibiotic and Sulfonamide Test and Swab Test On Premises projects detected most of the violative residues, and producers/independent growers and dairy farms were recorded as the responsible sources for most of the violations. Also, most of the animals found to have violative residues were bob calves and culled cows. In bob calves, neomycin was the most frequently identified violative chemical, followed by tetracycline, gentamicin, oxytetracycline, and penicillin. In culled cows, penicillin was the most frequently identified violative chemical and was the chemical most frequently found in combination with other chemicals in cows with multiple violative residues. Distribution patterns of violative chemical residues by slaughter class and residue type varied among the 5 Food Safety Inspection Service regions. These specific regional characteristics support the need for customized intervention, education, assessment, and prevention programs.
National trends in drinking water quality violations.
Allaire, Maura; Wu, Haowei; Lall, Upmanu
2018-02-27
Ensuring safe water supply for communities across the United States is a growing challenge in the face of aging infrastructure, impaired source water, and strained community finances. In the aftermath of the Flint lead crisis, there is an urgent need to assess the current state of US drinking water. However, no nationwide assessment has yet been conducted on trends in drinking water quality violations across several decades. Efforts to reduce violations are of national concern given that, in 2015, nearly 21 million people relied on community water systems that violated health-based quality standards. In this paper, we evaluate spatial and temporal patterns in health-related violations of the Safe Drinking Water Act using a panel dataset of 17,900 community water systems over the period 1982-2015. We also identify vulnerability factors of communities and water systems through probit regression. Increasing time trends and violation hot spots are detected in several states, particularly in the Southwest region. Repeat violations are prevalent in locations of violation hot spots, indicating that water systems in these regions struggle with recurring issues. In terms of vulnerability factors, we find that violation incidence in rural areas is substantially higher than in urbanized areas. Meanwhile, private ownership and purchased water source are associated with compliance. These findings indicate the types of underperforming systems that might benefit from assistance in achieving consistent compliance. We discuss why certain violations might be clustered in some regions and strategies for improving national drinking water quality.
Experimental violation of multipartite Bell inequalities with trapped ions.
Lanyon, B P; Zwerger, M; Jurcevic, P; Hempel, C; Dür, W; Briegel, H J; Blatt, R; Roos, C F
2014-03-14
We report on the experimental violation of multipartite Bell inequalities by entangled states of trapped ions. First, we consider resource states for measurement-based quantum computation of between 3 and 7 ions and show that all strongly violate a Bell-type inequality for graph states, where the criterion for violation is a sufficiently high fidelity. Second, we analyze Greenberger-Horne-Zeilinger states of up to 14 ions generated in a previous experiment using stronger Mermin-Klyshko inequalities, and show that in this case the violation of local realism increases exponentially with system size. These experiments represent a violation of multipartite Bell-type inequalities of deterministically prepared entangled states. In addition, the detection loophole is closed.
Access control violation prevention by low-cost infrared detection
NASA Astrophysics Data System (ADS)
Rimmer, Andrew N.
2004-09-01
A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this type of security breach.
Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework
NASA Astrophysics Data System (ADS)
Tsigkritis, Theocharis; Spanoudakis, George; Kloukinas, Christos; Lorenzoli, Davide
The SERENITY monitoring framework offers mechanisms for diagnosing the causes of violations of security and dependability (S&D) properties and detecting potential violations of such properties, called "Cthreats". Diagnostic information and threat detection are often necessary for deciding what an appropriate reaction to a violation is and taking pre-emptive actions against predicted violations, respectively. In this chapter, we describe the mechanisms of the SERENITY monitoring framework which generate diagnostic information for violations of S&D properties and detecting threats.
Imbalance detection in a manufacturing system: An agent-based model usage
NASA Astrophysics Data System (ADS)
Shevchuk, G. K.; Zvereva, O. M.; Medvedev, M. A.
2017-11-01
This paper delivers the results of the research work targeted at communications in a manufacturing system. A computer agent-based model which simulates manufacturing system functioning has been engineered. The system lifecycle consists of two recursively repeated stages: a communication stage and a production stage. Model data sets were estimated with the static Leontief's equilibrium equation usage. In experiments relationships between the manufacturing system lifecycle time and conditions of equilibrium violations have been identified. The research results are to be used to propose violation negative influence compensation methods.
Mu, Yan; Kitayama, Shinobu; Han, Shihui; Gelfand, Michele J
2015-12-15
Humans are unique among all species in their ability to develop and enforce social norms, but there is wide variation in the strength of social norms across human societies. Despite this fundamental aspect of human nature, there has been surprisingly little research on how social norm violations are detected at the neurobiological level. Building on the emerging field of cultural neuroscience, we combine noninvasive electroencephalography (EEG) with a new social norm violation paradigm to examine the neural mechanisms underlying the detection of norm violations and how they vary across cultures. EEG recordings from Chinese and US participants (n = 50) showed consistent negative deflection of event-related potential around 400 ms (N400) over the central and parietal regions that served as a culture-general neural marker of detecting norm violations. The N400 at the frontal and temporal regions, however, was only observed among Chinese but not US participants, illustrating culture-specific neural substrates of the detection of norm violations. Further, the frontal N400 predicted a variety of behavioral and attitudinal measurements related to the strength of social norms that have been found at the national and state levels, including higher culture superiority and self-control but lower creativity. There were no cultural differences in the N400 induced by semantic violation, suggesting a unique cultural influence on social norm violation detection. In all, these findings provided the first evidence, to our knowledge, for the neurobiological foundations of social norm violation detection and its variation across cultures.
Mu, Yan; Kitayama, Shinobu; Han, Shihui; Gelfand, Michele J.
2015-01-01
Humans are unique among all species in their ability to develop and enforce social norms, but there is wide variation in the strength of social norms across human societies. Despite this fundamental aspect of human nature, there has been surprisingly little research on how social norm violations are detected at the neurobiological level. Building on the emerging field of cultural neuroscience, we combine noninvasive electroencephalography (EEG) with a new social norm violation paradigm to examine the neural mechanisms underlying the detection of norm violations and how they vary across cultures. EEG recordings from Chinese and US participants (n = 50) showed consistent negative deflection of event-related potential around 400 ms (N400) over the central and parietal regions that served as a culture-general neural marker of detecting norm violations. The N400 at the frontal and temporal regions, however, was only observed among Chinese but not US participants, illustrating culture-specific neural substrates of the detection of norm violations. Further, the frontal N400 predicted a variety of behavioral and attitudinal measurements related to the strength of social norms that have been found at the national and state levels, including higher culture superiority and self-control but lower creativity. There were no cultural differences in the N400 induced by semantic violation, suggesting a unique cultural influence on social norm violation detection. In all, these findings provided the first evidence, to our knowledge, for the neurobiological foundations of social norm violation detection and its variation across cultures. PMID:26621713
Bell Correlations in a Many-Body System with Finite Statistics
NASA Astrophysics Data System (ADS)
Wagner, Sebastian; Schmied, Roman; Fadel, Matteo; Treutlein, Philipp; Sangouard, Nicolas; Bancal, Jean-Daniel
2017-10-01
A recent experiment reported the first violation of a Bell correlation witness in a many-body system [Science 352, 441 (2016)]. Following discussions in this Letter, we address here the question of the statistics required to witness Bell correlated states, i.e., states violating a Bell inequality, in such experiments. We start by deriving multipartite Bell inequalities involving an arbitrary number of measurement settings, two outcomes per party and one- and two-body correlators only. Based on these inequalities, we then build up improved witnesses able to detect Bell correlated states in many-body systems using two collective measurements only. These witnesses can potentially detect Bell correlations in states with an arbitrarily low amount of spin squeezing. We then establish an upper bound on the statistics needed to convincingly conclude that a measured state is Bell correlated.
Bell Correlations in a Many-Body System with Finite Statistics.
Wagner, Sebastian; Schmied, Roman; Fadel, Matteo; Treutlein, Philipp; Sangouard, Nicolas; Bancal, Jean-Daniel
2017-10-27
A recent experiment reported the first violation of a Bell correlation witness in a many-body system [Science 352, 441 (2016)]. Following discussions in this Letter, we address here the question of the statistics required to witness Bell correlated states, i.e., states violating a Bell inequality, in such experiments. We start by deriving multipartite Bell inequalities involving an arbitrary number of measurement settings, two outcomes per party and one- and two-body correlators only. Based on these inequalities, we then build up improved witnesses able to detect Bell correlated states in many-body systems using two collective measurements only. These witnesses can potentially detect Bell correlations in states with an arbitrarily low amount of spin squeezing. We then establish an upper bound on the statistics needed to convincingly conclude that a measured state is Bell correlated.
Android-based E-Traffic law enforcement system in Surakarta City
NASA Astrophysics Data System (ADS)
Yulianto, Budi; Setiono
2018-03-01
The urban advancement is always overpowered by the increasing number of vehicles as the need for movement of people and goods. This can lead to traffic problems if there is no effort on the implementation of traffic management and engineering, and traffic law enforcement. In this case, the Government of Surakarta City has implemented various policies and regulations related to traffic management and engineering in order to run traffic in an orderly, safe and comfortable manner according to the applicable law. However, conditions in the field shows that traffic violations still occurred frequently due to the weakness of traffic law enforcement in terms of human resources and the system. In this connection, a tool is needed to support traffic law enforcement, especially in relation to the reporting system of traffic violations. This study aims to develop an Android-based traffic violations reporting application (E-Traffic Law Enforcement) as part of the traffic law enforcement system in Surakarta City. The Android-apps records the location and time of the traffic violations incident along with the visual evidence of the infringement. This information will be connected to the database system to detect offenders and to do the traffic law enforcement process.
Shallow and Deep Phases of Comprehension of Discourse by Children.
ERIC Educational Resources Information Center
Weist, Richard W.; And Others
1982-01-01
Children listened to stories which contained anomalies produced by violating semantic restrictions or based on conflicting propositions at two points in a story. The capacity to detect violations of sentences developed more rapidly than detection of violation of discourse. Children's developing capacity to integrate and store story structure is…
Listening to Limericks: A Pupillometry Investigation of Perceivers’ Expectancy
Scheepers, Christoph; Mohr, Sibylle; Fischer, Martin H.; Roberts, Andrew M.
2013-01-01
What features of a poem make it captivating, and which cognitive mechanisms are sensitive to these features? We addressed these questions experimentally by measuring pupillary responses of 40 participants who listened to a series of Limericks. The Limericks ended with either a semantic, syntactic, rhyme or metric violation. Compared to a control condition without violations, only the rhyme violation condition induced a reliable pupillary response. An anomaly-rating study on the same stimuli showed that all violations were reliably detectable relative to the control condition, but the anomaly induced by rhyme violations was perceived as most severe. Together, our data suggest that rhyme violations in Limericks may induce an emotional response beyond mere anomaly detection. PMID:24086417
78 FR 73923 - Privacy Act of 1974, as Amended; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... data sources, as well as access to analytical services designed to detect fraud and systemic improper... systemic fraud, waste, and abuse within Federal programs; (d) Disclosure to (1) a Federal agency, its... prosecuting violations of, or for enforcing or implementing, a statute, rule, regulation, order, or license...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-18
... Awards for Information Relating To Detecting Underpayments of Tax or Violations of the Internal Revenue... regarding underpayments of tax or violations of the internal revenue laws and filing claims for award, as...). SUPPLEMENTARY INFORMATION: Background Section 406 of the Tax Relief and Health Care Act of 2006, Public Law 109...
NASA Astrophysics Data System (ADS)
Wendel, D. E.; Liu, Y. H.; Giles, B. L.; Torbert, R. B.
2017-12-01
For the first time, space flight technology exists to detect, in situ, violation of magnetic field line conservation. The violation of magnetic line conservation on scales smaller than the system size is a necessary and sufficient condition for magnetic reconnection. We demonstrate that violation of line conservation produces a detectable, structured signature in both particle-in-cell simulations of reconnection and in data from the Magnetospheric Multi-Scale mission. In particle-in-cell simulations of asymmetric reconnection, the quantity-which we call M-that identifies this violation achieves a significant value in electron skin depth-scale layers that extend from the electron diffusion region along the separatrices, with higher values emerging on the low density, high magnetic field side of the current sheet. In two MMS burst data intervals associated with detection of the electron diffusion region—one interval with antiparallel reconnecting fields and the other with a guide field-we determine the location and scale of M and of the diffusion region relative to electron outflows and the magnetic separatrices. We find that M exceeds measurement uncertainties both at the diffusion region and near the separatrices, where it attains its highest values in layered structures. The observed magnitude scales as the simulated magnitude after adjusting for the artificial parameters of the simulation. Bipolar forms of the quantity also appear further from the diffusion region, possibly associated with electron holes. The measure serves not only as a powerful diagnostic for magnetic reconnection, but reveals that electrons transport this signature of reconnection away from the x-line.
Social cognition and revictimization risk.
DePrince, Anne P
2005-01-01
The ability to accurately detect violations in social contracts likely helps people to avoid or to withdraw from relationships in which they are at risk of being cheated or harmed. Betrayal trauma theory argues that detecting violations of social contracts may be counter-productive to survival under certain conditions, such as when a victim is dependent on a perpetrator. When dependent on a perpetrator (as in the case of child abuse perpetrated by a caregiver), the victim may be better able to preserve the necessary attachment with the caregiver by remaining unaware of the abuse. Thus, the victim may develop a compromised capacity to detect violations of social contracts in the caregiving relationship. Over time, the victim may develop more generalized problems detecting violations in social exchange rules; in turn, generalized problems in detecting violations of social contracts may increase risk for later victimization. Participants in the current study were asked to detect violations in three types of conditional (if-then) rules: abstract, social contract (rules involving a social exchange), and precautionary (rules involving safety). Young adults who reported experiences of revictimization made more errors on social contract and precautionary problems than a no revictimization group; group performance did not differ for abstract problems, suggesting these findings are not explained by general deficits in conditional reasoning. Pathological dissociation significantly predicted errors on social contract and precautionary problems.
Achievement Place: experiments in self-government with pre-delinquents.
Fixsen, D L; Phillips, E L; Wolf, M M
1973-01-01
One of the goals of many treatment programs for pre-delinquent youths is the development of the skills involved in the democratic decision-making process. At Achievement Place, one aspect of the treatment program is a semi-self-government system whereby the seven pre-delinquent youths can democratically establish many of their own rules of behavior, monitor their peers' behavior to detect violations of their rules, and conduct a "trial" to determine a rule violator's guilt or innocence, and to determine the consequences for a youth who violates a rule. Two experiments were carried out to determine the role of some of the procedures in the boys' participation in the self-government system. Experiment I showed that more boys participated in the discussion of consequences for a rule violation when they had complete responsibility for setting the consequence during the trials than when the teaching-parents set the consequence for each rule violation before the trial. An analysis of the rule violations in this experiment indicated that the boys in Achievement Place reported more of the rule violations that resulted in trials than reported by the teaching-parents or school personnel. The boys reported rule violations that occurred in the community and school as well as at Achievement Place, including most of the serious rule violations that came to the attention of the teaching-parents. In Experiment II, the results indicated that more trials were called when the teaching-parents were responsible for calling trials on rule violations reported by the peers than when the boys were responsible for calling trials. When the youths earned points for calling trials the average number of trials per day increased, but more trivial rule violations were reported. These results suggest that aspects of the democratic decision-making process in a small group of pre-delinquents can be studied and variables that affect participation can be identified and evaluated.
Characterizing entanglement of an artificial atom and a cavity cat state with Bell's inequality
Vlastakis, Brian; Petrenko, Andrei; Ofek, Nissim; Sun, Luyan; Leghtas, Zaki; Sliwa, Katrina; Liu, Yehan; Hatridge, Michael; Blumoff, Jacob; Frunzio, Luigi; Mirrahimi, Mazyar; Jiang, Liang; Devoret, M. H.; Schoelkopf, R. J.
2015-01-01
The Schrodinger's cat thought experiment highlights the counterintuitive concept of entanglement in macroscopically distinguishable systems. The hallmark of entanglement is the detection of strong correlations between systems, most starkly demonstrated by the violation of a Bell inequality. No violation of a Bell inequality has been observed for a system entangled with a superposition of coherent states, known as a cat state. Here we use the Clauser–Horne–Shimony–Holt formulation of a Bell test to characterize entanglement between an artificial atom and a cat state, or a Bell-cat. Using superconducting circuits with high-fidelity measurements and real-time feedback, we detect correlations that surpass the classical maximum of the Bell inequality. We investigate the influence of decoherence with states up to 16 photons in size and characterize the system by introducing joint Wigner tomography. Such techniques demonstrate that information stored in superpositions of coherent states can be extracted efficiently, a crucial requirement for quantum computing with resonators. PMID:26611724
Characterizing entanglement of an artificial atom and a cavity cat state with Bell's inequality.
Vlastakis, Brian; Petrenko, Andrei; Ofek, Nissim; Sun, Luyan; Leghtas, Zaki; Sliwa, Katrina; Liu, Yehan; Hatridge, Michael; Blumoff, Jacob; Frunzio, Luigi; Mirrahimi, Mazyar; Jiang, Liang; Devoret, M H; Schoelkopf, R J
2015-11-27
The Schrodinger's cat thought experiment highlights the counterintuitive concept of entanglement in macroscopically distinguishable systems. The hallmark of entanglement is the detection of strong correlations between systems, most starkly demonstrated by the violation of a Bell inequality. No violation of a Bell inequality has been observed for a system entangled with a superposition of coherent states, known as a cat state. Here we use the Clauser-Horne-Shimony-Holt formulation of a Bell test to characterize entanglement between an artificial atom and a cat state, or a Bell-cat. Using superconducting circuits with high-fidelity measurements and real-time feedback, we detect correlations that surpass the classical maximum of the Bell inequality. We investigate the influence of decoherence with states up to 16 photons in size and characterize the system by introducing joint Wigner tomography. Such techniques demonstrate that information stored in superpositions of coherent states can be extracted efficiently, a crucial requirement for quantum computing with resonators.
Launch Commit Criteria Monitoring Agent
NASA Technical Reports Server (NTRS)
Semmel, Glenn S.; Davis, Steven R.; Leucht, Kurt W.; Rowe, Dan A.; Kelly, Andrew O.; Boeloeni, Ladislau
2005-01-01
The Spaceport Processing Systems Branch at NASA Kennedy Space Center has developed and deployed a software agent to monitor the Space Shuttle's ground processing telemetry stream. The application, the Launch Commit Criteria Monitoring Agent, increases situational awareness for system and hardware engineers during Shuttle launch countdown. The agent provides autonomous monitoring of the telemetry stream, automatically alerts system engineers when predefined criteria have been met, identifies limit warnings and violations of launch commit criteria, aids Shuttle engineers through troubleshooting procedures, and provides additional insight to verify appropriate troubleshooting of problems by contractors. The agent has successfully detected launch commit criteria warnings and violations on a simulated playback data stream. Efficiency and safety are improved through increased automation.
Production and perception rules underlying visual patterns: effects of symmetry and hierarchy.
Westphal-Fitch, Gesche; Huber, Ludwig; Gómez, Juan Carlos; Fitch, W Tecumseh
2012-07-19
Formal language theory has been extended to two-dimensional patterns, but little is known about two-dimensional pattern perception. We first examined spontaneous two-dimensional visual pattern production by humans, gathered using a novel touch screen approach. Both spontaneous creative production and subsequent aesthetic ratings show that humans prefer ordered, symmetrical patterns over random patterns. We then further explored pattern-parsing abilities in different human groups, and compared them with pigeons. We generated visual plane patterns based on rules varying in complexity. All human groups tested, including children and individuals diagnosed with autism spectrum disorder (ASD), were able to detect violations of all production rules tested. Our ASD participants detected pattern violations with the same speed and accuracy as matched controls. Children's ability to detect violations of a relatively complex rotational rule correlated with age, whereas their ability to detect violations of a simple translational rule did not. By contrast, even with extensive training, pigeons were unable to detect orientation-based structural violations, suggesting that, unlike humans, they did not learn the underlying structural rules. Visual two-dimensional patterns offer a promising new formally-grounded way to investigate pattern production and perception in general, widely applicable across species and age groups.
Production and perception rules underlying visual patterns: effects of symmetry and hierarchy
Westphal-Fitch, Gesche; Huber, Ludwig; Gómez, Juan Carlos; Fitch, W. Tecumseh
2012-01-01
Formal language theory has been extended to two-dimensional patterns, but little is known about two-dimensional pattern perception. We first examined spontaneous two-dimensional visual pattern production by humans, gathered using a novel touch screen approach. Both spontaneous creative production and subsequent aesthetic ratings show that humans prefer ordered, symmetrical patterns over random patterns. We then further explored pattern-parsing abilities in different human groups, and compared them with pigeons. We generated visual plane patterns based on rules varying in complexity. All human groups tested, including children and individuals diagnosed with autism spectrum disorder (ASD), were able to detect violations of all production rules tested. Our ASD participants detected pattern violations with the same speed and accuracy as matched controls. Children's ability to detect violations of a relatively complex rotational rule correlated with age, whereas their ability to detect violations of a simple translational rule did not. By contrast, even with extensive training, pigeons were unable to detect orientation-based structural violations, suggesting that, unlike humans, they did not learn the underlying structural rules. Visual two-dimensional patterns offer a promising new formally-grounded way to investigate pattern production and perception in general, widely applicable across species and age groups. PMID:22688636
76 FR 53171 - Whistleblower Incentives and Protection
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-25
... not incentivized to promote their own self- interest at the possible expense of the entity's ability to detect, address, and self-report violations. Further, pursuant to the rules as adopted, such... violation of the law should be extended to civil violations of laws or rules, and violations of a self...
DOT National Transportation Integrated Search
2008-10-01
Two experiments (simulator and test track) were conducted to validate the concept of a system designed to warn potential victims of a likely red-light violator. The warning system uses sensors to detect vehicles that are unlikely to stop at red traff...
A machine learning approach for detecting cell phone usage
NASA Astrophysics Data System (ADS)
Xu, Beilei; Loce, Robert P.
2015-03-01
Cell phone usage while driving is common, but widely considered dangerous due to distraction to the driver. Because of the high number of accidents related to cell phone usage while driving, several states have enacted regulations that prohibit driver cell phone usage while driving. However, to enforce the regulation, current practice requires dispatching law enforcement officers at road side to visually examine incoming cars or having human operators manually examine image/video records to identify violators. Both of these practices are expensive, difficult, and ultimately ineffective. Therefore, there is a need for a semi-automatic or automatic solution to detect driver cell phone usage. In this paper, we propose a machine-learning-based method for detecting driver cell phone usage using a camera system directed at the vehicle's front windshield. The developed method consists of two stages: first, the frontal windshield region localization using the deformable part model (DPM), next, we utilize Fisher vectors (FV) representation to classify the driver's side of the windshield into cell phone usage violation and non-violation classes. The proposed method achieved about 95% accuracy with a data set of more than 100 images with drivers in a variety of challenging poses with or without cell phones.
NASA Astrophysics Data System (ADS)
Dilley, Daniel; Chitambar, Eric
2018-06-01
It is well-known that in certain scenarios weakly entangled states can generate stronger nonlocal effects than their maximally entangled counterparts. In this paper, we consider violations of the Clauser-Horne-Shimony-Holt (CHSH) inequality when one party has inefficient detectors, a scenario known as an asymmetric Bell experiment. For any fixed detection efficiency, we derive a simple upper bound on the entanglement needed to violate the inequality by more than some specified amount κ ≥0 . When κ =0 , the amount of entanglement in all states violating the inequality goes to zero as the detection efficiency approaches 50 % from above. We finally consider the scenario in which detection inefficiency arises for only one choice of local measurement. In this case, it is shown that the CHSH inequality can always be violated for any nonzero detection efficiency and any choice of noncommuting measurements.
Heap/stack guard pages using a wakeup unit
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gooding, Thomas M; Satterfield, David L; Steinmacher-Burow, Burkhard
A method and system for providing a memory access check on a processor including the steps of detecting accesses to a memory device including level-1 cache using a wakeup unit. The method includes invalidating level-1 cache ranges corresponding to a guard page, and configuring a plurality of wakeup address compare (WAC) registers to allow access to selected WAC registers. The method selects one of the plurality of WAC registers, and sets up a WAC register related to the guard page. The method configures the wakeup unit to interrupt on access of the selected WAC register. The method detects access ofmore » the memory device using the wakeup unit when a guard page is violated. The method generates an interrupt to the core using the wakeup unit, and determines the source of the interrupt. The method detects the activated WAC registers assigned to the violated guard page, and initiates a response.« less
NASA Astrophysics Data System (ADS)
Yakunin, A. G.; Hussein, H. M.
2018-01-01
The article shows how the known statistical methods, which are widely used in solving financial problems and a number of other fields of science and technology, can be effectively applied after minor modification for solving such problems in climate and environment monitoring systems, as the detection of anomalies in the form of abrupt changes in signal levels, the occurrence of positive and negative outliers and the violation of the cycle form in periodic processes.
Multipartite steering inequalities based on entropic uncertainty relations
NASA Astrophysics Data System (ADS)
Riccardi, Alberto; Macchiavello, Chiara; Maccone, Lorenzo
2018-05-01
We investigate quantum steering for multipartite systems by using entropic uncertainty relations. We introduce entropic steering inequalities whose violation certifies the presence of different classes of multipartite steering. These inequalities witness both steerable states and genuine multipartite steerable states. Furthermore, we study their detection power for several classes of states of a three-qubit system.
Trends in Nitrate Drinking Water Violations Across the US ...
Background/Question/Methods Safe drinking water is essential for the health and well-being of humans and life on Earth. Previous studies have shown that groundwater and other sources of drinking water can be contaminated with nitrate above the 10 mg nitrate-N L-1 maximum contaminant level (MCL), which is known to have adverse health effects, including certain cancers. Public water systems (PWS) across the US have been required since 1979 to report violations of the nitrate MCL to the US Environmental Protection Agency’s Safe Drinking Water Information System (SDWIS). The objective of this research was to use SDWIS data to assess temporal and spatial trends for nitrate violations. We collected data from SDWIS on the number of PWS that violated the nitrate MCL at least once each year. The proportion of systems in violation each year was calculated by diving the number of systems in violation by the total number of active systems that year. The number of people served by systems in violation was calculated by summing the number of people served by each PWS in violation. Results/Conclusions We found that the number and proportion of systems in violation for nitrate significantly increased over time, almost doubling from 280 (0.16%) to 527 (0.33%) systems between 1994 and 2010. The increase in number and proportion of systems in violation is attributed to an increase in violations for groundwater systems, whereas violations for surface water systems have
Austin, Peter C
2018-01-01
The use of the Cox proportional hazards regression model is widespread. A key assumption of the model is that of proportional hazards. Analysts frequently test the validity of this assumption using statistical significance testing. However, the statistical power of such assessments is frequently unknown. We used Monte Carlo simulations to estimate the statistical power of two different methods for detecting violations of this assumption. When the covariate was binary, we found that a model-based method had greater power than a method based on cumulative sums of martingale residuals. Furthermore, the parametric nature of the distribution of event times had an impact on power when the covariate was binary. Statistical power to detect a strong violation of the proportional hazards assumption was low to moderate even when the number of observed events was high. In many data sets, power to detect a violation of this assumption is likely to be low to modest.
Austin, Peter C.
2017-01-01
The use of the Cox proportional hazards regression model is widespread. A key assumption of the model is that of proportional hazards. Analysts frequently test the validity of this assumption using statistical significance testing. However, the statistical power of such assessments is frequently unknown. We used Monte Carlo simulations to estimate the statistical power of two different methods for detecting violations of this assumption. When the covariate was binary, we found that a model-based method had greater power than a method based on cumulative sums of martingale residuals. Furthermore, the parametric nature of the distribution of event times had an impact on power when the covariate was binary. Statistical power to detect a strong violation of the proportional hazards assumption was low to moderate even when the number of observed events was high. In many data sets, power to detect a violation of this assumption is likely to be low to modest. PMID:29321694
Design Of An ITS-Level Advanced Traffic Management System, A Human Factors Perspective
DOT National Transportation Integrated Search
1999-09-01
The incidence of motorists violating the red phase of a traffic signal has been on the rise and is a contributing factor to intersection crashes. Technology has become available that automatically detects a motorist running the red light and records ...
Constraints on frequency-dependent violations of Shapiro delay from GW150914
NASA Astrophysics Data System (ADS)
Kahya, Emre O.; Desai, Shantanu
2016-05-01
On 14th September 2015, a transient gravitational wave (GW150914) was detected by the two LIGO detectors at Hanford and Livingston from the coalescence of a binary black hole system located at a distance of about 400 Mpc. We point out that GW150914 experienced a Shapiro delay due to the gravitational potential of the mass distribution along the line of sight of about 1800 days. Also, the near-simultaneous arrival of gravitons over a frequency range of about 200 Hz within a 0.2 s window allows us to constrain any violations of Shapiro delay and Einstein's equivalence principle between the gravitons at different frequencies. From the calculated Shapiro delay and the observed duration of the signal, frequency-dependent violations of the equivalence principle for gravitons are constrained to an accuracy of O (10-9).
Visual mismatch negativity and categorization.
Czigler, István
2014-07-01
Visual mismatch negativity (vMMN) component of event-related potentials is elicited by stimuli violating the category rule of stimulus sequences, even if such stimuli are outside the focus of attention. Category-related vMMN emerges to colors, and color-related vMMN is sensitive to language-related effects. A higher-order perceptual category, bilateral symmetry is also represented in the memory processes underlying vMMN. As a relatively large body of research shows, violating the emotional category of human faces elicits vMMN. Another face-related category sensitive to the violation of regular presentation is gender. Finally, vMMN was elicited to the laterality of hands. As results on category-related vMMN show, stimulus representation in the non-conscious change detection system is fairly complex, and it is not restricted to the registration of elementary perceptual regularities.
Left cytoarchitectonic BA 44 processes syntactic gender violations in determiner phrases.
Heim, Stefan; van Ermingen, Muna; Huber, Walter; Amunts, Katrin
2010-10-01
Recent neuroimaging studies make contradictory predictions about the involvement of left Brodmann's area (BA) 44 in processing local syntactic violations in determiner phrases (DPs). Some studies suggest a role for BA 44 in detecting local syntactic violations, whereas others attribute this function to the left premotor cortex. Therefore, the present event-related functional magnetic resonance imaging (fMRI) study investigated whether left-cytoarchitectonic BA 44 was activated when German DPs involving syntactic gender violations were compared with correct DPs (correct: 'der Baum'-the[masculine] tree[masculine]; violated: 'das Baum'--the[neuter] tree[masculine]). Grammaticality judgements were made for both visual and auditory DPs to be able to generalize the results across modalities. Grammaticality judgements involved, among others, left BA 44 and left BA 6 in the premotor cortex for visual and auditory stimuli. Most importantly, activation in left BA 44 was consistently higher for violated than for correct DPs. This finding was behaviourally corroborated by longer reaction times for violated versus correct DPs. Additional brain regions, showing the same effect, included left premotor cortex, supplementary motor area, right middle and superior frontal cortex, and left cerebellum. Based on earlier findings from the literature, the results indicate the involvement of left BA 44 in processing local syntactic violations when these include morphological features, whereas left premotor cortex seems crucial for the detection of local word category violations. © 2010 Wiley-Liss, Inc.
Big Data and Heath Impacts of Drinking Water Quality Violation
NASA Astrophysics Data System (ADS)
Allaire, M.; Zheng, S.; Lall, U.
2017-12-01
Health impacts of drinking water quality violations are only understood at a coarse level in the United States. This limits identification of threats to water security in communities across the country. Substantial under-reporting is suspected due to requirements at U.S. public health institutes that water borne illnesses be confirmed by health providers. In the era of `big data', emerging information sources could offer insight into waterborne disease trends. In this study, we explore the use of fine-resolution sales data for over-the-counter medicine to estimate the health impacts of drinking water quality violations. We also demonstrate how unreported water quality issues can be detected by observing market behavior. We match a panel of supermarket sales data for the U.S. at the weekly level with geocoded violations data from 2006-2015. We estimate the change in anti-diarrheal medicine sale due to drinking water violations using a fixed effects model. We find that water quality violations have considerable effects on medicine sales. Sales nearly double due to Tier 1 violations, which pose an immediate health risk, and sales increase 15.1 percent due to violations related to microorganisms. Furthermore, our estimate of diarrheal illness cases associated with water quality violations indicates that the Centers for Disease Control and Prevention (CDC) reporting system may only capture about one percent of diarrheal cases due to impaired water. Incorporating medicine sales data could offer national public health institutes a game-changing way to improve monitoring of disease outbreaks. Since many disease cases are not formally diagnosed by health providers, consumption information could provide additional information to remedy under-reporting issues and improve water security in communities across the United States.
Detection and enforcement of failure-to-yield in an emergency vehicle preemption system
NASA Technical Reports Server (NTRS)
Bachelder, Aaron (Inventor); Wickline, Richard (Inventor)
2007-01-01
An intersection controlled by an intersection controller receives trigger signals from on-coming emergency vehicles responding to an emergency call. The intersection controller initiates surveillance of the intersection via cameras installed at the intersection in response to a received trigger signal. The surveillance may begin immediately upon receipt of the trigger signal from an emergency vehicle, or may wait until the intersection controller determines that the signaling emergency vehicle is in the field of view of the cameras at the intersection. Portions of the captured images are tagged by the intersection controller based on tag signals transmitted by the vehicle or based on detected traffic patterns that indicate a potential traffic violation. The captured images are downloaded to a processing facility that analyzes the images and automatically issues citations for captured traffic violations.
Lepton flavor violation induced by dark matter
NASA Astrophysics Data System (ADS)
Arcadi, Giorgio; Ferreira, C. P.; Goertz, Florian; Guzzo, M. M.; Queiroz, Farinaldo S.; Santos, A. C. O.
2018-04-01
Guided by gauge principles we discuss a predictive and falsifiable UV complete model where the Dirac fermion that accounts for the cold dark matter abundance in our Universe induces the lepton flavor violation (LFV) decays μ →e γ and μ →e e e as well as μ -e conversion. We explore the interplay between direct dark matter detection, relic density, collider probes and lepton flavor violation to conclusively show that one may have a viable dark matter candidate yielding flavor violation signatures that can be probed in the upcoming experiments. In fact, keeping the dark matter mass at the TeV scale, a sizable LFV signal is possible, while reproducing the correct dark matter relic density and meeting limits from direct-detection experiments.
Development and practice of a Telehealthcare Expert System (TES).
Lin, Hanjun; Hsu, Yeh-Liang; Hsu, Ming-Shinn; Cheng, Chih-Ming
2013-07-01
Expert systems have been widely used in medical and healthcare practice for various purposes. In addition to vital sign data, important concerns in telehealthcare include the compliance with the measurement prescription, the accuracy of vital sign measurements, and the functioning of vital sign meters and home gateways. However, few expert system applications are found in the telehealthcare domain to address these issues. This article presents an expert system application for one of the largest commercialized telehealthcare practices in Taiwan by Min-Sheng General Hospital. The main function of the Telehealthcare Expert System (TES) developed in this research is to detect and classify events based on the measurement data transmitted to the database at the call center, including abnormality of vital signs, violation of vital sign measurement prescriptions, and malfunction of hardware devices (home gateway and vital sign meter). When the expert system detects an abnormal event, it assigns an "urgent degree" and alerts the nursing team in the call center to take action, such as phoning the patient for counseling or to urge the patient to return to the hospital for further tests. During 2 years of clinical practice, from 2009 to 2011, 19,182 patients were served by the expert system. The expert system detected 41,755 events, of which 22.9% indicated abnormality of vital signs, 75.2% indicated violation of measurement prescription, and 1.9% indicated malfunction of devices. On average, the expert system reduced by 76.5% the time that the nursing team in the call center spent in handling the events. The expert system helped to reduce cost and improve quality of the telehealthcare service.
48 CFR 403.104-7 - Violations or possible violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Violations or possible violations. 403.104-7 Section 403.104-7 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 403.104-7 Violations or...
40 CFR 141.404 - Treatment technique violations for ground water systems.
Code of Federal Regulations, 2011 CFR
2011-07-01
....404 Treatment technique violations for ground water systems. (a) A ground water system with a... ground water system is in violation of the treatment technique requirement if, within 120 days (or...) before or at the first customer for a ground water source is in violation of the treatment technique...
A multisensor system for airborne surveillance of oil pollution
NASA Technical Reports Server (NTRS)
Edgerton, A. T.; Ketchal, R.; Catoe, C.
1973-01-01
The U.S. Coast Guard is developing a prototype airborne oil surveillance system for use in its Marine Environmental Protection Program. The prototype system utilizes an X-band side-looking radar, a 37-GHz imaging microwave radiometer, a multichannel line scanner, and a multispectral low light level system. The system is geared to detecting and mapping oil spills and potential pollution violators anywhere within a 25 nmi range of the aircraft flight track under all but extreme weather conditions. The system provides for false target discrimination and maximum identification of spilled materials. The system also provides an automated detection alarm, as well as a color display to achieve maximum coupling between the sensor data and the equipment operator.
Implicit Detection of Poetic Harmony by the Naïve Brain.
Vaughan-Evans, Awel; Trefor, Robat; Jones, Llion; Lynch, Peredur; Jones, Manon W; Thierry, Guillaume
2016-01-01
The power of poetry is universally acknowledged, but it is debatable whether its appreciation is reserved for experts. Here, we show that readers with no particular knowledge of a traditional form of Welsh poetry unconsciously distinguish phrases conforming to its complex poetic construction rules from those that violate them. We studied the brain response of native speakers of Welsh as they read meaningful sentences ending in a word that either complied with strict poetic construction rules, violated rules of consonantal repetition, violated stress pattern, or violated both these constraints. Upon reading the last word of each sentence, participants indicated sentence acceptability. As expected, our inexperienced participants did not explicitly distinguish between sentences that conformed to the poetic rules from those that violated them. However, in the case of orthodox sentences, the critical word elicited a distinctive brain response characteristic of target detection -the P3b- as compared to the other conditions, showing that speakers of Welsh with no expertise of this particular form of poetry implicitly detect poetic harmony. These results show for the first time that before we even consider literal meaning, the musical properties of poetry speak to the human mind in ways that escape consciousness.
Implicit Detection of Poetic Harmony by the Naïve Brain
Vaughan-Evans, Awel; Trefor, Robat; Jones, Llion; Lynch, Peredur; Jones, Manon W.; Thierry, Guillaume
2016-01-01
The power of poetry is universally acknowledged, but it is debatable whether its appreciation is reserved for experts. Here, we show that readers with no particular knowledge of a traditional form of Welsh poetry unconsciously distinguish phrases conforming to its complex poetic construction rules from those that violate them. We studied the brain response of native speakers of Welsh as they read meaningful sentences ending in a word that either complied with strict poetic construction rules, violated rules of consonantal repetition, violated stress pattern, or violated both these constraints. Upon reading the last word of each sentence, participants indicated sentence acceptability. As expected, our inexperienced participants did not explicitly distinguish between sentences that conformed to the poetic rules from those that violated them. However, in the case of orthodox sentences, the critical word elicited a distinctive brain response characteristic of target detection –the P3b– as compared to the other conditions, showing that speakers of Welsh with no expertise of this particular form of poetry implicitly detect poetic harmony. These results show for the first time that before we even consider literal meaning, the musical properties of poetry speak to the human mind in ways that escape consciousness. PMID:27933025
NASA Astrophysics Data System (ADS)
Strączkiewicz, M.; Barszcz, T.; Jabłoński, A.
2015-07-01
All commonly used condition monitoring systems (CMS) enable defining alarm thresholds that enhance efficient surveillance and maintenance of dynamic state of machinery. The thresholds are imposed on the measured values such as vibration-based indicators, temperature, pressure, etc. For complex machinery such as wind turbine (WT) the total number of thresholds might be counted in hundreds multiplied by the number of operational states. All the parameters vary not only due to possible machinery malfunctions, but also due to changes in operating conditions and these changes are typically much stronger than the former ones. Very often, such a behavior may lead to hundreds of false alarms. Therefore, authors propose a novel approach based on parameterized description of the threshold violation. For this purpose the novelty and severity factors are introduced. The first parameter refers to the time of violation occurrence while the second one describes the impact of the indicator-increase to the entire machine. Such approach increases reliability of the CMS by providing the operator with the most useful information of the system events. The idea of the procedure is presented on a simulated data similar to those from a wind turbine.
Brainerd, C. J.; Wang, Zheng; Reyna, Valerie. F.; Nakamura, K.
2015-01-01
Fuzzy-trace theory’s assumptions about memory representation are cognitive examples of the familiar superposition property of physical quantum systems. When those assumptions are implemented in a formal quantum model (QEMc), they predict that episodic memory will violate the additive law of probability: If memory is tested for a partition of an item’s possible episodic states, the individual probabilities of remembering the item as belonging to each state must sum to more than 1. We detected this phenomenon using two standard designs, item false memory and source false memory. The quantum implementation of fuzzy-trace theory also predicts that violations of the additive law will vary in strength as a function of reliance on gist memory. That prediction, too, was confirmed via a series of manipulations (e.g., semantic relatedness, testing delay) that are thought to increase gist reliance. Surprisingly, an analysis of the underlying structure of violations of the additive law revealed that as a general rule, increases in remembering correct episodic states do not produce commensurate reductions in remembering incorrect states. PMID:26236091
40 CFR 80.30 - Liability for violations of diesel fuel control and prohibitions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... facility the diesel fuel was produced or imported, except as provided in paragraph (g)(2) of this section... detected at a refinery or importer's facility, the refiner or importer shall be deemed in violation. (b... detected at a carrier's facility, whether in a transport vehicle, in a storage facility, or elsewhere at...
40 CFR 80.30 - Liability for violations of diesel fuel control and prohibitions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... facility the diesel fuel was produced or imported, except as provided in paragraph (g)(2) of this section... detected at a refinery or importer's facility, the refiner or importer shall be deemed in violation. (b... detected at a carrier's facility, whether in a transport vehicle, in a storage facility, or elsewhere at...
40 CFR 80.30 - Liability for violations of diesel fuel control and prohibitions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... facility the diesel fuel was produced or imported, except as provided in paragraph (g)(2) of this section... detected at a refinery or importer's facility, the refiner or importer shall be deemed in violation. (b... detected at a carrier's facility, whether in a transport vehicle, in a storage facility, or elsewhere at...
Directly detecting isospin-violating dark matter
NASA Astrophysics Data System (ADS)
Kelso, Chris; Kumar, Jason; Marfatia, Danny; Sandick, Pearl
2018-03-01
We consider the prospects for multiple dark matter direct detection experiments to determine if the interactions of a dark matter candidate are isospin-violating. We focus on theoretically well-motivated examples of isospin-violating dark matter (IVDM), including models in which dark matter interactions with nuclei are mediated by a dark photon, a Z , or a squark. We determine that the best prospects for distinguishing IVDM from the isospin-invariant scenario arise in the cases of dark photon-or Z -mediated interactions, and that the ideal experimental scenario would consist of large exposure xenon- and neon-based detectors. If such models just evade current direct detection limits, then one could distinguish such models from the standard isospin-invariant case with two detectors with of order 100 ton-year exposure.
Employing moderate resolution sensors in human rights and international humanitarian law monitoring
NASA Astrophysics Data System (ADS)
Marx, Andrew J.
Organizations concerned with human rights are increasingly using remote sensing as a tool to improve their detection of human rights and international humanitarian law violations. However, as these organizations have transitioned to human rights monitoring campaigns conducted over large regions and extended periods of time, current methods of using fine- resolution sensors and manpower-intensive analyses have become cost- prohibitive. To support the continued growth of remote sensing in human rights and international humanitarian law monitoring campaigns, this study researches how moderate resolution land observatories can provide complementary data to operational human rights monitoring efforts. This study demonstrates the capacity of moderate resolutions to provide data to monitoring efforts by developing an approach that uses Landsat Enhanced Thematic Mapper Plus (ETM+) as part of a system for the detection of village destruction in Darfur, Sudan. Village destruction is an indicator of a human rights or international humanitarian law violations in Darfur during the 2004 study period. This analysis approach capitalizes on Landsat's historical archive and systematic observations by constructing a historic spectral baseline for each village in the study area that supports automated detection of a potentially destroyed village with each new overpass of the sensor. Using Landsat's near-infrared band, the approach demonstrates high levels of accuracy when compared with a U.S. government database documenting destroyed villages. This approach is then applied to the Darfur conflict from 2002 to 2008, providing new data on when and where villages were destroyed in this widespread and long-lasting conflict. This application to the duration of a real-world conflict illustrates the abilities and shortcomings of moderate resolution sensors in human rights monitoring efforts. This study demonstrates that moderate resolution satellites have the capacity to contribute complementary data to operational human rights monitoring efforts. While this study validates this capacity for the burning of villages in arid environments, this approach can be generalized to detect other human rights violations if an observable signal that represents the violation is identified.
Models and (some) Searches for CPT Violation: From Early Universe to the Present Era
NASA Astrophysics Data System (ADS)
Mavromatos, Nick E.
2017-07-01
In the talk, I review theoretical models, inspired by quantum gravity, that may violate CPT symmetry. The amount of violation today (which is constrained severely by a plethora of experiments that I will not describe due to lack of space) need not be the same with the one that occurred in the Early Universe,. In certain models, one can obtain a precise temperature dependence of CPT violating effects, which is such that these effects are significant during the radiation era of the Universe, but are damped quickly so that they do not to affect nucleosynthesis and are negligible in the present epoch (that is, beyond experimental detection with the current experimental sensitivity). The CPT Violation (CPTV) in these models may arise from special properties of the background over which the fields of the model are propagating upon and be responsible for the generation of a matter-antimatter asymmetry, where any CP violation effects could only assist in the creation of the asymmetry, the dominant effect being CPTV. However, there are cases, where the CPTV arises as a consequence of an ill-defined CPT operator due to decoherence as a result of quantum gravity environmental degrees of freedom, inaccessible to a low-energy observer. I also discuss briefly the current-era phenomenology of some of the above models; in particular, for the ones involving decoherence-induced CPT violation, I argue that entangled states of neutral mesons (Kaons or B-systems) can provide smoking-gun sensitive tests or even falsify some of these models. If CPT is ill-defined one may also encounter violations of the spin-statistics theorem, with possible consequences for the Pauli Exclusion Principle.
Experimental measurement-device-independent verification of quantum steering.
Kocsis, Sacha; Hall, Michael J W; Bennet, Adam J; Saunders, Dylan J; Pryde, Geoff J
2015-01-07
Bell non-locality between distant quantum systems--that is, joint correlations which violate a Bell inequality--can be verified without trusting the measurement devices used, nor those performing the measurements. This leads to unconditionally secure protocols for quantum information tasks such as cryptographic key distribution. However, complete verification of Bell non-locality requires high detection efficiencies, and is not robust to typical transmission losses over long distances. In contrast, quantum or Einstein-Podolsky-Rosen steering, a weaker form of quantum correlation, can be verified for arbitrarily low detection efficiencies and high losses. The cost is that current steering-verification protocols require complete trust in one of the measurement devices and its operator, allowing only one-sided secure key distribution. Here we present measurement-device-independent steering protocols that remove this need for trust, even when Bell non-locality is not present. We experimentally demonstrate this principle for singlet states and states that do not violate a Bell inequality.
32 CFR 636.19 - Point system application.
Code of Federal Regulations, 2010 CFR
2010-07-01
... § 636.19 Point system application. Table 636.19 Violation: Parking in a handicap zone Points assessed: 3 Violation: Parking against a yellow curb Points assessed: 3 Violation: Parking within 10 feet of a fire... parking violations Points assessed: 2 ...
32 CFR 636.19 - Point system application.
Code of Federal Regulations, 2011 CFR
2011-07-01
... § 636.19 Point system application. Table 636.19 Violation: Parking in a handicap zone Points assessed: 3 Violation: Parking against a yellow curb Points assessed: 3 Violation: Parking within 10 feet of a fire... parking violations Points assessed: 2 ...
32 CFR 636.19 - Point system application.
Code of Federal Regulations, 2014 CFR
2014-07-01
... § 636.19 Point system application. Table 636.19 Violation: Parking in a handicap zone Points assessed: 3 Violation: Parking against a yellow curb Points assessed: 3 Violation: Parking within 10 feet of a fire... parking violations Points assessed: 2 ...
32 CFR 636.19 - Point system application.
Code of Federal Regulations, 2012 CFR
2012-07-01
... § 636.19 Point system application. Table 636.19 Violation: Parking in a handicap zone Points assessed: 3 Violation: Parking against a yellow curb Points assessed: 3 Violation: Parking within 10 feet of a fire... parking violations Points assessed: 2 ...
32 CFR 636.19 - Point system application.
Code of Federal Regulations, 2013 CFR
2013-07-01
... § 636.19 Point system application. Table 636.19 Violation: Parking in a handicap zone Points assessed: 3 Violation: Parking against a yellow curb Points assessed: 3 Violation: Parking within 10 feet of a fire... parking violations Points assessed: 2 ...
ERIC Educational Resources Information Center
Jak, Suzanne; Oort, Frans J.; Dolan, Conor V.
2013-01-01
We present a test for cluster bias, which can be used to detect violations of measurement invariance across clusters in 2-level data. We show how measurement invariance assumptions across clusters imply measurement invariance across levels in a 2-level factor model. Cluster bias is investigated by testing whether the within-level factor loadings…
ERIC Educational Resources Information Center
Wang, S.h.; Baillargeon, R.; Paterson, S.
2005-01-01
Recent research on infants' responses to occlusion and containment events indicates that, although some violations of the continuity principle are detected at an early age e.g. Aguiar, A., & Baillargeon, R. (1999). 2.5-month-old infants' reasoning about when objects should and should not be occluded. Cognitive Psychology 39, 116-157; Hespos, S.…
Cohen, Trevor; Blatter, Brett; Almeida, Carlos; Patel, Vimla L.
2007-01-01
Objective Contemporary error research suggests that the quest to eradicate error is misguided. Error commission, detection, and recovery are an integral part of cognitive work, even at the expert level. In collaborative workspaces, the perception of potential error is directly observable: workers discuss and respond to perceived violations of accepted practice norms. As perceived violations are captured and corrected preemptively, they do not fit Reason’s widely accepted definition of error as “failure to achieve an intended outcome.” However, perceived violations suggest the aversion of potential error, and consequently have implications for error prevention. This research aims to identify and describe perceived violations of the boundaries of accepted procedure in a psychiatric emergency department (PED), and how they are resolved in practice. Design Clinical discourse from fourteen PED patient rounds was audio-recorded. Excerpts from recordings suggesting perceived violations or incidents of miscommunication were extracted and analyzed using qualitative coding methods. The results are interpreted in relation to prior research on vulnerabilities to error in the PED. Results Thirty incidents of perceived violations or miscommunication are identified and analyzed. Of these, only one medication error was formally reported. Other incidents would not have been detected by a retrospective analysis. Conclusions The analysis of perceived violations expands the data available for error analysis beyond occasional reported adverse events. These data are prospective: responses are captured in real time. This analysis supports a set of recommendations to improve the quality of care in the PED and other critical care contexts. PMID:17329728
48 CFR 303.303 - Reporting suspected antitrust violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Reporting suspected antitrust violations. 303.303 Section 303.303 Federal Acquisition Regulations System HEALTH AND HUMAN... Antitrust Violations 303.303 Reporting suspected antitrust violations. (h) The HCA shall provide a copy of...
48 CFR 303.303 - Reporting suspected antitrust violations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Reporting suspected antitrust violations. 303.303 Section 303.303 Federal Acquisition Regulations System HEALTH AND HUMAN... Antitrust Violations 303.303 Reporting suspected antitrust violations. (h) The HCA shall provide a copy of...
48 CFR 903.104-7 - Violations or possible violations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Violations or possible violations. 903.104-7 Section 903.104-7 Federal Acquisition Regulations System DEPARTMENT OF ENERGY GENERAL... disclosure of proprietary or source selection information is the Assistant General Counsel for Procurement...
Experimental Bell-inequality violation without the postselection loophole
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lima, G.; Vallone, G.; Dipartimento di Fisica, Universita Sapienza di Roma, I-00185 Roma
2010-04-15
We report on an experimental violation of the Bell-Clauser-Horne-Shimony-Holt (Bell-CHSH) inequality using energy-time-entangled photons. The experiment is not free of the locality and detection loopholes but is the first violation of the Bell-CHSH inequality using energy-time entangled photons which is free of the postselection loophole described by Aerts et al. [Phys. Rev. Lett. 83, 2872 (1999)].
Predicting Regulatory Compliance in Beer Advertising on Facebook.
Noel, Jonathan K; Babor, Thomas F
2017-11-01
The prevalence of alcohol advertising has been growing on social media platforms. The purpose of this study was to evaluate alcohol advertising on Facebook for regulatory compliance and thematic content. A total of 50 Budweiser and Bud Light ads posted on Facebook within 1 month of the 2015 NFL Super Bowl were evaluated for compliance with a self-regulated alcohol advertising code and for thematic content. An exploratory sensitivity/specificity analysis was conducted to determine if thematic content could predict code violations. The code violation rate was 82%, with violations prevalent in guidelines prohibiting the association of alcohol with success (Guideline 5) and health benefits (Guideline 3). Overall, 21 thematic content areas were identified. Displaying the product (62%) and adventure/sensation seeking (52%) were the most prevalent. There was perfect specificity (100%) for 10 content areas for detecting any code violation (animals, negative emotions, positive emotions, games/contests/promotions, female characters, minorities, party, sexuality, night-time, sunrise) and high specificity (>80%) for 10 content areas for detecting violations of guidelines intended to protect minors (animals, negative emotions, famous people, friendship, games/contests/promotions, minorities, responsibility messages, sexuality, sunrise, video games). The high prevalence of code violations indicates a failure of self-regulation to prevent potentially harmful content from appearing in alcohol advertising, including explicit code violations (e.g. sexuality). Routine violations indicate an unwillingness to restrict advertising content for public health purposes, and statutory restrictions may be necessary to sufficiently deter alcohol producers from repeatedly violating marketing codes. Violations of a self-regulated alcohol advertising code are prevalent in a sample of beer ads published on Facebook near the US National Football League's Super Bowl. Overall, 16 thematic content areas demonstrated high specificity for code violations. Alcohol advertising codes should be updated to expressly prohibit the use of such content. © The Author 2017. Medical Council on Alcohol and Oxford University Press. All rights reserved.
48 CFR 2903.104-7 - Violations or possible violations of standards of conduct.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Violations or possible violations of standards of conduct. 2903.104-7 Section 2903.104-7 Federal Acquisition Regulations System DEPARTMENT OF LABOR GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 2903...
48 CFR 703.104-10.1 - Violations or possible violations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Violations or possible violations. 703.104-10.1 Section 703.104-10.1 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 703.104-10.1...
48 CFR 2903.204 - Treatment of violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Treatment of violations. 2903.204 Section 2903.204 Federal Acquisition Regulations System DEPARTMENT OF LABOR GENERAL IMPROPER....204 Treatment of violations. Any suspected violations of FAR subpart 3.2 and the clause at FAR 52.203...
48 CFR 703.104-10.1 - Violations or possible violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Violations or possible violations. 703.104-10.1 Section 703.104-10.1 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 703.104-10.1...
Code of Federal Regulations, 2014 CFR
2014-07-01
... PRIMARY DRINKING WATER REGULATIONS Revised Total Coliform Rule § 141.860 Violations. (a) E. coli MCL Violation. A system is in violation of the MCL for E. coli when any of the conditions identified in paragraphs (a)(1) through (a)(4) of this section occur. (1) The system has an E. coli-positive repeat sample...
Code of Federal Regulations, 2013 CFR
2013-07-01
... PRIMARY DRINKING WATER REGULATIONS Revised Total Coliform Rule § 141.860 Violations. (a) E. coli MCL Violation. A system is in violation of the MCL for E. coli when any of the conditions identified in paragraphs (a)(1) through (a)(4) of this section occur. (1) The system has an E. coli-positive repeat sample...
40 CFR 141.404 - Treatment technique violations for ground water systems.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 22 2010-07-01 2010-07-01 false Treatment technique violations for ground water systems. 141.404 Section 141.404 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY....404 Treatment technique violations for ground water systems. (a) A ground water system with a...
Let's face the music: a behavioral and electrophysiological exploration of score reading.
Gunter, Thomas C; Schmidt, Björn-Helmer; Besson, Mireille
2003-09-01
This experiment was carried out to determine whether reading diatonic violations in a musical score elicits similar endogenous ERP components when hearing such violations in the auditory modality. In the behavioral study, musicians were visually presented with 120 scores of familiar musical pieces, half of which contained a diatonic violation. The score was presented in a measure-by-measure manner. Self-paced reading was significantly delayed for measures containing a violation, indicating that sight reading a violation requires additional effort. In the ERP study, the musical phrases were presented in a "RSVP"-like manner. We predicted that diatonic violations would elicit a late positive component. However, the ERP associated with the measure where a violation was presented showed a negativity instead. The negativity started around 100 ms and lasted for the entire recording period. This long-lasting negativity encompassed at least three distinct effects that were possibly related to violation detection, working memory processing, and a further integration/interpretation process.
Phenomenology of small violations of Fermi and Bose statistics
NASA Astrophysics Data System (ADS)
Greenberg, O. W.; Mohapatra, Rabindra N.
1989-04-01
In a recent paper, we proposed a ``paronic'' field-theory framework for possible small deviations from the Pauli exclusion principle. This theory cannot be represented in a positive-metric (Hilbert) space. Nonetheless, the issue of possible small violations of the exclusion principle can be addressed in the framework of quantum mechanics, without being connected with a local quantum field theory. In this paper, we discuss the phenomenology of small violations of both Fermi and Bose statistics. We consider the implications of such violations in atomic, nuclear, particle, and condensed-matter physics and in astrophysics and cosmology. We also discuss experiments that can detect small violations of Fermi and Bose statistics or place stringent bounds on their validity.
Refined applications of the collapse of the wave function
NASA Astrophysics Data System (ADS)
Stodolsky, L.
2015-05-01
In a two-part system, the collapse of the wave function of one part can put the other part in a state which would be difficult or impossible to achieve otherwise, in particular, one sensitive to small effects in the "collapse" interaction. We present some applications to the very symmetric and experimentally accessible situations of the decays ϕ (1020 )→KoKo , ψ (3770 )→DoDo, or ϒ (4 s )→BoBo , involving the internal state of the two-state Ko, Do, or Bo mesons. The collapse of the wave function occasioned by a decay of one member of the pair (away side) fixes the state vector of that side's two-state system. Bose-Einstein statistics then determines the state of the recoiling meson (near side), whose evolution can then be followed further. In particular, the statistics requirement dictates that the "away side" and "near side" internal wave functions must be orthogonal at the time of the collapse. Thus a C P violation in the away side decay implies a complementary C P impurity on the near side, which can be detected in the further evolution. The C P violation so manifested is necessarily direct C P violation, since neither the mass matrix nor time evolution was involved in the collapse. A parametrization of the direct C P violation is given, and various manifestations are presented. Certain rates or combination of rates are identified which are nonzero only if there is direct C P violation. The very explicit and detailed use made of the collapse of the wave function makes the procedure interesting with respect to the fundamentals of quantum mechanics. We note an experimental consistency test for our treatment of the collapse of the wave function, which can be carried out by a certain measurement of partial decay rates.
Towards Loophole-Free Optical Bell Test of CHSH Inequality
NASA Astrophysics Data System (ADS)
Tan, Yong-gang; Li, Hong-wei
2016-09-01
Bell test had been suggested to end the long-standing debate on the EPR paradox, while the imperfections of experimental devices induce some loopholes in Bell test experiments and hence the assumption of local reality by EPR cannot be excluded with current experimental results. In optical Bell test experiments, the locality loophole can be closed easily, while the attempt of closing detection loophole requires very high efficiency of single photon detectors. Previous studies showed that the violation of Clauser-Horne-Shimony-Holt (CHSH) inequality with maximally entangled states requires the detection efficiency to be higher than 82.8 %. In this paper, we raise a modified CHSH inequality that covers all measurement events including the efficient and inefficient detections in the Bell test and prove that all local hidden models can be excluded when the inequality is violated. We find that, when non-maximally entangled states are applied to the Bell test, the lowest detection efficiency for violation of the present inequality is 66.7 %. This makes it feasible to close the detection loophole and the locality loophole simultaneously in optical Bell test of CHSH inequality.
Fiber-optic perimeter security system based on WDM technology
NASA Astrophysics Data System (ADS)
Polyakov, Alexandre V.
2017-10-01
Intelligent underground fiber optic perimeter security system is presented. Their structure, operation, software and hardware with neural networks elements are described. System allows not only to establish the fact of violation of the perimeter, but also to locate violations. This is achieved through the use of WDM-technology division spectral information channels. As used quasi-distributed optoelectronic recirculation system as a discrete sensor. The principle of operation is based on registration of the recirculation period change in the closed optoelectronic circuit at different wavelengths under microstrain exposed optical fiber. As a result microstrain fiber having additional power loss in a fiber optical propagating pulse, which causes a time delay as a result of switching moments of the threshold device. To separate the signals generated by intruder noise and interference, the signal analyzer is used, based on the principle of a neural network. The system detects walking, running or crawling intruder, as well as undermining attempts to register under the perimeter line. These alarm systems can be used to protect the perimeters of facilities such as airports, nuclear reactors, power plants, warehouses, and other extended territory.
NASA Astrophysics Data System (ADS)
Yagi, Kent; Yang, Huan
2018-05-01
The recent discovery of gravitational-wave events has offered us unique test beds of gravity in the strong and dynamical field regime. One possible modification to General Relativity is the gravitational parity violation that arises naturally from quantum gravity. Such parity violation gives rise to the so-called amplitude birefringence in gravitational waves, in which one of the circularly polarized modes is amplified while the other one is suppressed during their propagation. In this paper, we study how well one can measure gravitational parity violation via the amplitude birefringence effect of gravitational waves sourced by stellar-mass black hole binaries. We choose Chern-Simons gravity as an example and work within an effective field theory formalism to ensure that the approximate theory is well posed. We consider gravitational waves from both individual sources and stochastic gravitational-wave backgrounds. Regarding bounds from individual sources, we estimate such bounds using a Fisher analysis and carry out Monte Carlo simulations by randomly distributing sources over their sky location and binary orientation. We find that the bounds on the scalar field evolution in Chern-Simons gravity from the recently discovered gravitational-wave events are too weak to satisfy the weak Chern-Simons approximation, while aLIGO with its design sensitivity can place meaningful bounds. Regarding bounds from stochastic gravitational-wave backgrounds, we set the threshold signal-to-noise ratio for detection of the parity-violation mode as 5 and estimate projected bounds with future detectors assuming that signals are consistent with no parity violation. In an ideal situation in which all the source parameters and binary black hole merger-rate history are known a priori, we find that a network of two third-generation detectors is able to place bounds that are comparable to or slightly stronger than binary pulsar bounds. In a more realistic situation in which one does not have such information beforehand, approximate bounds can be derived if the regular parity-insensitive mode is detected and the peak redshift of the merger-rate history is known theoretically. Since gravitational-wave observations probe either the difference in parity violation between the source and the detector (with individual sources) or the line-of-sight cosmological integration of the scalar field (with gravitational-wave backgrounds), such bounds are complementary to local measurements from solar system experiments and binary pulsar observations.
DOT National Transportation Integrated Search
2008-09-30
The objective of the Cooperative Intersection Collision Avoidance System for Violations (CICAS-V) Project is to develop and field-test a comprehensive system to reduce the number of crashes at intersections due to violations of traffic control device...
48 CFR 203.806 - Processing suspected violations.
Code of Federal Regulations, 2013 CFR
2013-10-01
... violations. 203.806 Section 203.806 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST.... Report suspected violations to the address at PGI 203.8(a). ...
ERIC Educational Resources Information Center
Macdonald, Margaret; Campbell, Kenneth
2011-01-01
An infrequent physical increase in the intensity of an auditory stimulus relative to an already loud frequently occurring "standard" is processed differently than an equally perceptible physical decrease in intensity. This may be because a physical increment results in increased activation in two different systems, a transient and a change…
Atomicity violation detection using access interleaving invariants
Zhou, Yuanyuan; Lu, Shan; Tucek, Joseph Andrew
2013-09-10
During execution of a program, the situation where the atomicity of a pair of instructions that are to be executed atomically is violated is identified, and a bug is detected as occurring in the program at the pair of instructions. The pairs of instructions that are to be executed atomically can be identified in different manners, such as by executing a program multiple times and using the results of those executions to automatically identify the pairs of instructions.
Deep Learning-Based Data Forgery Detection in Automatic Generation Control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Fengli; Li, Qinghua
Automatic Generation Control (AGC) is a key control system in the power grid. It is used to calculate the Area Control Error (ACE) based on frequency and tie-line power flow between balancing areas, and then adjust power generation to maintain the power system frequency in an acceptable range. However, attackers might inject malicious frequency or tie-line power flow measurements to mislead AGC to do false generation correction which will harm the power grid operation. Such attacks are hard to be detected since they do not violate physical power system models. In this work, we propose algorithms based on Neural Networkmore » and Fourier Transform to detect data forgery attacks in AGC. Different from the few previous work that rely on accurate load prediction to detect data forgery, our solution only uses the ACE data already available in existing AGC systems. In particular, our solution learns the normal patterns of ACE time series and detects abnormal patterns caused by artificial attacks. Evaluations on the real ACE dataset show that our methods have high detection accuracy.« less
DOT National Transportation Integrated Search
2001-01-01
ADVANCE is an integration of state of the practice, off-the-shelf technologies which include video, speed measurement, distance measurement, and digital imaging that detects UDAs in the traffic stream and subsequently notifies violators by ma...
CP-violating top quark couplings at future linear e^+e^- colliders
NASA Astrophysics Data System (ADS)
Bernreuther, W.; Chen, L.; García, I.; Perelló, M.; Poeschl, R.; Richard, F.; Ros, E.; Vos, M.
2018-02-01
We study the potential of future lepton colliders to probe violation of the CP symmetry in the top quark sector. In certain extensions of the Standard Model, such as the two-Higgs-doublet model (2HDM), sizeable anomalous top quark dipole moments can arise, which may be revealed by a precise measurement of top quark pair production. We present results from detailed Monte Carlo studies for the ILC at 500 GeV and CLIC at 380 GeV and use parton-level simulations to explore the potential of high-energy operation. We find that precise measurements in e^+e^- → t\\bar{t} production with subsequent decay to lepton plus jets final states can provide sufficient sensitivity to detect Higgs-boson-induced CP violation in a viable two-Higgs-doublet model. The potential of a linear e^+e^- collider to detect CP-violating electric and weak dipole form factors of the top quark exceeds the prospects of the HL-LHC by over an order of magnitude.
Using Mobile Learning to Improve the Reflection: A Case Study of Traffic Violation
ERIC Educational Resources Information Center
Lan, Yu-Feng; Huang, Shin-Ming
2012-01-01
The purpose of this study was to integrate mobile communication technologies and a global positioning system (GPS) to construct an instant, convenient report of the mobile network service system named the Mobile Traffic Violation Reporting System (MTVRS), to improve learners' traffic violation reflection level. Data were collected using a…
The role of OSHA violations in serious workplace accidents.
Mendeloff, J
1984-05-01
California accident investigations for 1976 show that violations of the Occupational Safety and Health Administration's safety standards were a contributing factor in 13% to 19% of the 645 deaths reported to the workers' compensation program during that year. However, a panel of safety engineers judged that only about 50% of these violations could have been detected if an inspector had visited the day before the accident. These findings indicate that the potential gains from stronger enforcement of current standards are limited but not insignificant. The likelihood that a violation contributed to a serious accident varied considerably among accident types, industries, and size classes of plants. These findings can be used to increase the efficiency and effectiveness of the OSHA program by means of better targeting of inspections and accident investigations, more intelligent assessment of which violations should be penalized most heavily, and the provision of information to employers and workers about which violations are most consequential.
NASA Astrophysics Data System (ADS)
Pandya, Palash; Misra, Avijit; Chakrabarty, Indranil
2016-11-01
We find a single parameter family of genuinely entangled three-qubit pure states, called the maximally Bell-inequality violating states (MBV), which exhibit maximum Bell-inequality violation by the reduced bipartite system for a fixed amount of genuine tripartite entanglement quantified by the so-called tangle measure. This in turn implies that there holds a complementary relation between the Bell-inequality violation by the reduced bipartite systems and the tangle present in the three-qubit states, not necessarily pure. The MBV states also exhibit maximum Bell-inequality violation by the reduced bipartite systems of the three-qubit pure states with a fixed amount of genuine tripartite correlation quantified by the generalized geometric measure, a genuine entanglement measure of multiparty pure states, and the discord monogamy score, a multipartite quantum correlation measure from information-theoretic paradigm. The aforementioned complementary relation has also been established for three-qubit pure states for the generalized geometric measure and the discord monogamy score, respectively. The complementarity between the Bell-inequality violation by the reduced bipartite systems and the genuine tripartite correlation suggests that the Bell-inequality violation in the reduced two-qubit system comes at the cost of the total tripartite correlation present in the entire system.
Beyond Flint: National Trends in Drinking Water Quality Violations
NASA Astrophysics Data System (ADS)
Allaire, M.; Wu, H.; Lall, U.
2016-12-01
Ensuring safe water supply for communities across the U.S. represents an emerging challenge. Aging infrastructure, impaired source water, and strained community finances may increase vulnerability of water systems to quality violations. In the aftermath of Flint, there is a great need to assess the current state of U.S. drinking water quality. How widespread are violations? What are the spatial and temporal patterns in water quality? Which types of communities and systems are most vulnerable? This is the first national assessment of trends in drinking water quality violations across several decades. In 2015, 9% of community water systems violated health-related water quality standards. These non-compliant systems served nearly 23 million people. Thus, the challenge of providing safe drinking water extends beyond Flint and represents a nationwide concern. We use a panel dataset that includes every community water system in the United States from 1981 to 2010 to identify factors that lead to regulatory noncompliance. This study focuses on health-related violations of the Safe Drinking Water Act. Lasso regression informed selection of appropriate covariates, while logistic regressions modeled the probability of noncompliance. We find that compliance is positively associated with private ownership, purchased water supply, and greater household income. Yet, greater concentration of utility ownership and violations in prior years are associated with a higher likelihood of violation. The results suggest that purchased water contracts, which are growing among small utilities, could serve as a way to improve regulatory compliance in the future. However, persistence of violations and ownership concentration deserve attention from policymakers. Already, the EPA has begun to prioritize enforcement of persistent violators. Overall, as the revitalization of U.S. water infrastructure becomes a growing priority area, results of this study are intended to inform investment and policy.
48 CFR 1203.303 - Reporting suspected antitrust violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Reporting suspected antitrust violations. 1203.303 Section 1203.303 Federal Acquisition Regulations System DEPARTMENT OF... suspected antitrust violations shall be coordinated with legal counsel for referral to the Department of...
Fábri, Csaba; Horný, Ľuboš; Quack, Martin
2015-12-01
Measuring the parity-violating energy difference Δpv E between the enantiomers of chiral molecules is a major challenge of current physical-chemical stereochemistry. An important step towards this goal is to identify suitable molecules for such experiments by means of theory. This step has been made by calculations for the complex dynamics of tunneling and electroweak quantum chemistry of parity violation in the "classic" molecule trisulfane, HSSSH, which satisfies the relevant conditions for experiments almost ideally, as the molecule is comparatively simple and parity violation clearly dominates over tunneling in the ground state. At the same time, the barrier for stereomutation is easily overcome by the S-H infrared chromophore. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
48 CFR 222.1704 - Violations and remedies.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Violations and remedies. 222.1704 Section 222.1704 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Combating Trafficking in Persons 222.1704 Violations and remedies. Follow the procedures at PGI 222.1704 for...
Code of Federal Regulations, 2010 CFR
2010-07-01
... policies of OSHA, ESA and the United States Employment Service (USES), and the Office of the Solicitor and... complaints under, and to detect promptly violations of, any of the protective statutes. (2) The expedited... State agency of violations or complaints discovered by or reported to DOL agencies or appropriate State...
Code of Federal Regulations, 2010 CFR
2010-04-01
..., in the case of a violation involving a business organization, by notifying members of management not... enforcement actions can contribute significantly to the success of the agency's mission. Cooperation can enhance the Commission's ability to detect violations of the federal securities laws, increase the...
Code of Federal Regulations, 2011 CFR
2011-04-01
..., in the case of a violation involving a business organization, by notifying members of management not... enforcement actions can contribute significantly to the success of the agency's mission. Cooperation can enhance the Commission's ability to detect violations of the federal securities laws, increase the...
Development of a Hydrogen Møller Polarimeter for Precision Parity-Violating Electron Scattering
NASA Astrophysics Data System (ADS)
Gray, Valerie M.
2013-10-01
Parity-violating electron scattering experiments allow for testing the Standard Model at low energy accelerators. Future parity-violating electron scattering experiments, like the P2 experiment at the Johannes Gutenberg University, Mainz, Germany, and the MOLLER and SoLID experiments at Jefferson Lab will measure observables predicted by the Standard Model to high precision. In order to make these measurements, we will need to determine the polarization of the electron beam to sub-percent precision. The present way of measuring the polarization, with Møller scattering in iron foils or using Compton laser backscattering, will not easily be able to reach this precision. The novel Hydrogen Møller Polarimeter presents a non-invasive way to measure the electron polarization by scattering the electron beam off of atomic hydrogen gas polarized in a 7 Tesla solenoidal magnetic trap. This apparatus is expected to be operational by 2016 in Mainz. Currently, simulations of the polarimeter are used to develop the detection system at College of William & Mary, while the hydrogen trap and superconducting solenoid magnet are being developed at the Johannes Gutenberg University, Mainz. I will discuss the progress of the design and development of this novel polarimeter system. This material is based upon work supported by the National Science Foundation under Grant No. PHY-1206053.
Automatic Review of Abstract State Machines by Meta Property Verification
NASA Technical Reports Server (NTRS)
Arcaini, Paolo; Gargantini, Angelo; Riccobene, Elvinia
2010-01-01
A model review is a validation technique aimed at determining if a model is of sufficient quality and allows defects to be identified early in the system development, reducing the cost of fixing them. In this paper we propose a technique to perform automatic review of Abstract State Machine (ASM) formal specifications. We first detect a family of typical vulnerabilities and defects a developer can introduce during the modeling activity using the ASMs and we express such faults as the violation of meta-properties that guarantee certain quality attributes of the specification. These meta-properties are then mapped to temporal logic formulas and model checked for their violation. As a proof of concept, we also report the result of applying this ASM review process to several specifications.
NASA Astrophysics Data System (ADS)
Forbes, Grant; Noptrex Collaboration
2017-09-01
One of the most promising explanations for the observed matter-antimatter asymmetry in our universe is the search for new sources of time-reversal (T) symmetry violation. The current amount of violation seen in the kaon and B-meson systems is not sufficient to describe this asymmetry. The Neutron Optics Time Reversal Experiment Collaboration (NOPTREX) is a null test for T violation in polarized neutron transmission through a polarized 139La target. Due to the high neutron flux needed for this experiment, as well as the ability to effectively subtract background noise, a current-mode neutron detector that can resolve resonances at epithermal energies has been proposed. In order to ascertain if this detector design would meet the requirements for the eventual NOPTREX experiment, prototypical detectors were tested at the NOBORU beam at the Japan Proton Accelerator Research Complex (JPARC) facility. Resonances in In and Ta were measured and the collected data was analyzed. This presentation will describe the analysis process and the efficacy of the detectors will be discussed. Department of Energy under Contract DE-SC0008107, UGRAS Scholarship.
Validity of suspected alcohol and drug violations in aviation employees.
Li, Guohua; Brady, Joanne E; DiMaggio, Charles; Baker, Susan P; Rebok, George W
2010-10-01
In the United States, transportation employees who are suspected of using alcohol and drugs are subject to reasonable-cause testing. This study aims to assess the validity of suspected alcohol and drug violations in aviation employees. Using reasonable-cause testing and random testing data from the Federal Aviation Administration for the years 1995-2005, we calculated the positive predictive value (PPV) and positive likelihood ratio (LR+) of suspected alcohol and drug violations. The true status of violations was based on testing results, with an alcohol violation being defined as a blood alcohol concentration of ≥0.04 mg/dl and a drug violation as a test positive for marijuana, cocaine, amphetamines, phencyclidine or opiates. During the 11-year study period, a total of 2284 alcohol tests and 2015 drug tests were performed under the reasonable-cause testing program. The PPV was 37.7% [95% confidence interval (CI), 35.7-39.7%] for suspected alcohol violations and 12.6% (95% CI, 11.2-14.1%) for suspected drug violations. Random testing revealed an overall prevalence of 0.09% for alcohol violations and 0.6% for drug violations. The LR+ was 653.6 (95% CI, 581.7-734.3) for suspected alcohol violations and 22.5 (95% CI, 19.6-25.7) for suspected drug violations. The discriminative power of reasonable-cause testing suggests that, despite its limited positive predictive value, physical and behavioral observation represents an efficient screening method for detecting alcohol and drug violations. The limited positive predictive value of reasonable-cause testing in aviation employees is due in part to the very low prevalence of alcohol and drug violations. © 2010 The Authors, Addiction © 2010 Society for the Study of Addiction.
Validity of Suspected Alcohol and Drug Violations in Aviation Employees
Li, Guohua; Brady, Joanne E.; DiMaggio, Charles; Baker, Susan P.; Rebok, George W.
2012-01-01
Introduction In the United States, transportation employees who are suspected of using alcohol and drugs are subject to reasonable-cause testing. This study aims to assess the validity of suspected alcohol and drug violations in aviation employees. Methods Using reasonable-cause testing and random testing data from the Federal Aviation Administration for the years 1995 through 2005, we calculated the positive predictive value (PPV) and positive likelihood ratio (LR+) of suspected alcohol and drug violations. The true status of violations was based on testing results, with an alcohol violation being defined as a blood alcohol concentration of ≥40 mg/dL and a drug violation as a test positive for marijuana, cocaine, amphetamines, phencyclidine, or opiates. Results During the 11-year study period, a total of 2,284 alcohol tests and 2,015 drug tests were performed under the reasonable-cause testing program. The PPV was 37.7% [95% confidence interval (CI), 35.7–39.7%] for suspected alcohol violations and 12.6% (95% CI, 11.2–14.1%) for suspected drug violations. Random testing revealed an overall prevalence of 0.09% (601/649,796) for alcohol violations and 0.6% (7,211/1,130,922) for drug violations. The LR+ was 653.6 (95% CI, 581.7–734.3) for suspected alcohol violations and 22.5 (95% CI, 19.6–25.7) for suspected drug violations. Discussion The discriminative power of reasonable-cause testing suggests that, despite its limited positive predictive value, physical and behavioral observation represents an efficient screening method for detecting alcohol and drug violations. The limited positive predictive value of reasonable-cause testing in aviation employees is due in part to the very low prevalence of alcohol and drug violations. PMID:20712820
NASA Astrophysics Data System (ADS)
Leon, David; Kaufman, Jonathan; Keating, Brian; Mewes, Matthew
2017-01-01
One of the most powerful probes of new physics is the polarized cosmic microwave background (CMB). The detection of a nonzero polarization angle rotation between the CMB surface of last scattering and today could provide evidence of Lorentz-violating physics. The purpose of this paper is two-fold. First, we review one popular mechanism for polarization rotation of CMB photons: the pseudo-Nambu-Goldstone boson (PNGB). Second, we propose a method to use the POLARBEAR experiment to constrain Lorentz-violating physics in the context of the Standard Model Extension (SME), a framework to standardize a large class of potential Lorentz-violating terms in particle physics.
Random numbers certified by Bell's theorem.
Pironio, S; Acín, A; Massar, S; de la Giroday, A Boyer; Matsukevich, D N; Maunz, P; Olmschenk, S; Hayes, D; Luo, L; Manning, T A; Monroe, C
2010-04-15
Randomness is a fundamental feature of nature and a valuable resource for applications ranging from cryptography and gambling to numerical simulation of physical and biological systems. Random numbers, however, are difficult to characterize mathematically, and their generation must rely on an unpredictable physical process. Inaccuracies in the theoretical modelling of such processes or failures of the devices, possibly due to adversarial attacks, limit the reliability of random number generators in ways that are difficult to control and detect. Here, inspired by earlier work on non-locality-based and device-independent quantum information processing, we show that the non-local correlations of entangled quantum particles can be used to certify the presence of genuine randomness. It is thereby possible to design a cryptographically secure random number generator that does not require any assumption about the internal working of the device. Such a strong form of randomness generation is impossible classically and possible in quantum systems only if certified by a Bell inequality violation. We carry out a proof-of-concept demonstration of this proposal in a system of two entangled atoms separated by approximately one metre. The observed Bell inequality violation, featuring near perfect detection efficiency, guarantees that 42 new random numbers are generated with 99 per cent confidence. Our results lay the groundwork for future device-independent quantum information experiments and for addressing fundamental issues raised by the intrinsic randomness of quantum theory.
DOE Office of Scientific and Technical Information (OSTI.GOV)
El Hariri, Mohamad; Faddel, Samy; Mohammed, Osama
Decentralized and hierarchical microgrid control strategies have lain the groundwork for shaping the future smart grid. Such control approaches require the cooperation between microgrid operators in control centers, intelligent microcontrollers, and remote terminal units via secure and reliable communication networks. In order to enhance the security and complement the work of network intrusion detection systems, this paper presents an artificially intelligent physical model-checking that detects tampered-with circuit breaker switching control commands whether, due to a cyber-attack or human error. In this technique, distributed agents, which are monitoring sectionalized areas of a given microgrid, will be trained and continuously adapted tomore » verify that incoming control commands do not violate the physical system operational standards and do not put the microgrid in an insecure state. The potential of this approach has been tested by deploying agents that monitor circuit breakers status commands on a 14-bus IEEE benchmark system. The results showed the accuracy of the proposed framework in characterizing the power system and successfully detecting malicious and/or erroneous control commands.« less
NASA Astrophysics Data System (ADS)
Poluyan, A. Y.; Fugarov, D. D.; Purchina, O. A.; Nesterchuk, V. V.; Smirnova, O. V.; Petrenkova, S. B.
2018-05-01
To date, the problems associated with the detection of errors in digital equipment (DE) systems for the automation of explosive objects of the oil and gas complex are extremely actual. Especially this problem is actual for facilities where a violation of the accuracy of the DE will inevitably lead to man-made disasters and essential material damage, at such facilities, the diagnostics of the accuracy of the DE operation is one of the main elements of the industrial safety management system. In the work, the solution of the problem of selecting the optimal variant of the errors detection system of errors detection by a validation criterion. Known methods for solving these problems have an exponential valuation of labor intensity. Thus, with a view to reduce time for solving the problem, a validation criterion is compiled as an adaptive bionic algorithm. Bionic algorithms (BA) have proven effective in solving optimization problems. The advantages of bionic search include adaptability, learning ability, parallelism, the ability to build hybrid systems based on combining. [1].
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-10
... elimination of this fee. Consequently, the Exchange proposes to eliminate from its NYSE Amex Equities Price... surveillance for position limit violations, manipulation, front-running, contrary exercise advice violations... doing so shares information and coordinates with other exchanges designed to detect the unlawful use of...
Recent Results on T and CP Violation at BABAR
DOE Office of Scientific and Technical Information (OSTI.GOV)
Perez Perez, Alejandro
2015-02-06
CP-violation (CPV) and Time-reversal violation (TRV) are intimately related through the CPT theorem: if one of these discrete symmetries is violated the other one has to be violated in such a way to conserve CPT. Although CPV in the B 0B 0-bar system has been established by the B-factories, implying indirectly TRV, there is still no direct evidence of TRV. We report on the observation of TRV in the B-meson system performed with a dataset of 468 × 10 6 BB-bar pairs produced in Υ(4S) decays collected by the BABAR detector at the PEP-II asymmetric-energy e +e - collider atmore » the SLAC National Accelerator Laboratory. We also report on other CPV measurements recently performed on the B-meson system« less
32 CFR 634.45 - Point system application.
Code of Federal Regulations, 2014 CFR
2014-07-01
.... Violation: Fleeing the scene (hit and run)-property damage only. Points assessed: 6 D. Violation: Driving...: 2 I. Violation: Failure to properly restrain children in a child restraint system while moving (when child is 4 years of age or younger or the weight of child does not exceed 45 pounds). Points assessed: 2...
32 CFR 634.45 - Point system application.
Code of Federal Regulations, 2012 CFR
2012-07-01
.... Violation: Fleeing the scene (hit and run)-property damage only. Points assessed: 6 D. Violation: Driving...: 2 I. Violation: Failure to properly restrain children in a child restraint system while moving (when child is 4 years of age or younger or the weight of child does not exceed 45 pounds). Points assessed: 2...
32 CFR 634.45 - Point system application.
Code of Federal Regulations, 2010 CFR
2010-07-01
.... Violation: Fleeing the scene (hit and run)-property damage only. Points assessed: 6 D. Violation: Driving...: 2 I. Violation: Failure to properly restrain children in a child restraint system while moving (when child is 4 years of age or younger or the weight of child does not exceed 45 pounds). Points assessed: 2...
32 CFR 634.45 - Point system application.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... Violation: Fleeing the scene (hit and run)-property damage only. Points assessed: 6 D. Violation: Driving...: 2 I. Violation: Failure to properly restrain children in a child restraint system while moving (when child is 4 years of age or younger or the weight of child does not exceed 45 pounds). Points assessed: 2...
40 CFR 141.404 - Treatment technique violations for ground water systems.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 23 2014-07-01 2014-07-01 false Treatment technique violations for ground water systems. 141.404 Section 141.404 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER PROGRAMS (CONTINUED) NATIONAL PRIMARY DRINKING WATER REGULATIONS Ground Water Rule § 141.404 Treatment technique violations for...
Of duty hour violations and shift work: changing the educational paradigm.
Kohlbrenner, Amanda; Dirks, Rachel; Davis, James; Wolfe, Mary; Maser, Christina
2016-06-01
Successful surgical education balances learning opportunities with Accreditation Council on Graduate Medical Education (ACGME) duty hour requirements. We instituted a night shift system and hypothesized that implementation would decrease duty hour violations while maintaining quality education. A system of alternating teams working 12-hour shifts was instituted and was assessed via an electronic survey distributed at 2, 6, and 12 months after implementation. Resident duty hour violations and resident case volume were evaluated for 1 year before and 2 years after implementation of the night shift system. Survey data revealed a decrease in the perception that residents had problems meeting duty hour restrictions from 44% to 14% at 12 months (P = .012). Total violations increased 26% in the 1st year, subsequently decreasing by 62%, with shift length violations decreasing by 90%. Resident availability for didactics was improved, and average operative cases per academic year increased by 65%. Night shift systems are feasible and help meet duty hour requirements. Our program decreased violations while increasing operative volume and didactic time. Copyright © 2015 Elsevier Inc. All rights reserved.
Dinh, Thanh; Kim, Younghan
2016-06-02
Nowadays, in big cities, parking management is a critical issue from both the driver's side and the city government's side. From the driver's side, how to find an available parking lot in a city is a considerable concern. As a result, smart parking systems recently have received great interest, both in academia and industry. From the city government's side, how to manage and distribute such a limited public parking resource efficiently to give every visitor a fair chance of finding an on-street parking lot is also a considerable concern. However, existing studies of smart parking management focus only on assisting the driver's side to find available parking spaces. This study aims to raise a new perspective on such smart parking management and to propose a novel location-centric IoT-cloud-based parking violation management system. The system is designed to assist authoritative officers in finding parking violations easily and recommends the least cost path for officers so that officers can achieve their highest productivity in finding parking violations and issuing parking tickets. Experimental results show that the system not only improves the productivity of officers in finding parking violations and issuing tickets, but also helps reduce the traveling cost of officers and to reduce the average violation period of violating cars considerably.
Dinh, Thanh; Kim, Younghan
2016-01-01
Nowadays, in big cities, parking management is a critical issue from both the driver’s side and the city government’s side. From the driver’s side, how to find an available parking lot in a city is a considerable concern. As a result, smart parking systems recently have received great interest, both in academia and industry. From the city government’s side, how to manage and distribute such a limited public parking resource efficiently to give every visitor a fair chance of finding an on-street parking lot is also a considerable concern. However, existing studies of smart parking management focus only on assisting the driver’s side to find available parking spaces. This study aims to raise a new perspective on such smart parking management and to propose a novel location-centric IoT-cloud-based parking violation management system. The system is designed to assist authoritative officers in finding parking violations easily and recommends the least cost path for officers so that officers can achieve their highest productivity in finding parking violations and issuing parking tickets. Experimental results show that the system not only improves the productivity of officers in finding parking violations and issuing tickets, but also helps reduce the traveling cost of officers and to reduce the average violation period of violating cars considerably. PMID:27271620
DOE Office of Scientific and Technical Information (OSTI.GOV)
Williamson, Mark S.; Son Wonmin; Heaney, Libby
Recently, it was demonstrated by Son et al., Phys. Rev. Lett. 102, 110404 (2009), that a separable bipartite continuous-variable quantum system can violate the Clauser-Horne-Shimony-Holt (CHSH) inequality via operationally local transformations. Operationally local transformations are parametrized only by local variables; however, in order to allow violation of the CHSH inequality, a maximally entangled ancilla was necessary. The use of the entangled ancilla in this scheme caused the state under test to become dependent on the measurement choice one uses to calculate the CHSH inequality, thus violating one of the assumptions used in deriving a Bell inequality, namely, the free willmore » or statistical independence assumption. The novelty in this scheme however is that the measurement settings can be external free parameters. In this paper, we generalize these operationally local transformations for multipartite Bell inequalities (with dichotomic observables) and provide necessary and sufficient conditions for violation within this scheme. Namely, a violation of a multipartite Bell inequality in this setting is contingent on whether an ancillary system admits any realistic local hidden variable model (i.e., whether the ancilla violates the given Bell inequality). These results indicate that violation of a Bell inequality performed on a system does not necessarily imply that the system is nonlocal. In fact, the system under test may be completely classical. However, nonlocality must have resided somewhere, this may have been in the environment, the physical variables used to manipulate the system or the detectors themselves provided the measurement settings are external free variables.« less
NASA Astrophysics Data System (ADS)
Wu, H.; Zhou, L.; Xu, T.; Fang, W. L.; He, W. G.; Liu, H. M.
2017-11-01
In order to improve the situation of voltage violation caused by the grid-connection of photovoltaic (PV) system in a distribution network, a bi-level programming model is proposed for battery energy storage system (BESS) deployment. The objective function of inner level programming is to minimize voltage violation, with the power of PV and BESS as the variables. The objective function of outer level programming is to minimize the comprehensive function originated from inner layer programming and all the BESS operating parameters, with the capacity and rated power of BESS as the variables. The differential evolution (DE) algorithm is applied to solve the model. Based on distribution network operation scenarios with photovoltaic generation under multiple alternative output modes, the simulation results of IEEE 33-bus system prove that the deployment strategy of BESS proposed in this paper is well adapted to voltage violation regulation invariable distribution network operation scenarios. It contributes to regulating voltage violation in distribution network, as well as to improve the utilization of PV systems.
Managing heteroscedasticity in general linear models.
Rosopa, Patrick J; Schaffer, Meline M; Schroeder, Amber N
2013-09-01
Heteroscedasticity refers to a phenomenon where data violate a statistical assumption. This assumption is known as homoscedasticity. When the homoscedasticity assumption is violated, this can lead to increased Type I error rates or decreased statistical power. Because this can adversely affect substantive conclusions, the failure to detect and manage heteroscedasticity could have serious implications for theory, research, and practice. In addition, heteroscedasticity is not uncommon in the behavioral and social sciences. Thus, in the current article, we synthesize extant literature in applied psychology, econometrics, quantitative psychology, and statistics, and we offer recommendations for researchers and practitioners regarding available procedures for detecting heteroscedasticity and mitigating its effects. In addition to discussing the strengths and weaknesses of various procedures and comparing them in terms of existing simulation results, we describe a 3-step data-analytic process for detecting and managing heteroscedasticity: (a) fitting a model based on theory and saving residuals, (b) the analysis of residuals, and (c) statistical inferences (e.g., hypothesis tests and confidence intervals) involving parameter estimates. We also demonstrate this data-analytic process using an illustrative example. Overall, detecting violations of the homoscedasticity assumption and mitigating its biasing effects can strengthen the validity of inferences from behavioral and social science data.
Form Overrides Meaning When Bilinguals Monitor for Errors
Ivanova, Iva; Ferreira, Victor S.; Gollan, Tamar H.
2016-01-01
Bilinguals rarely produce unintended language switches, which may in part be because switches are detected and corrected by an internal monitor. But are language switches easier or harder to detect than within-language semantic errors? To approximate internal monitoring, bilinguals listened (Experiment 1) or read aloud (Experiment 2) stories, and detected language switches (translation equivalents or semantically unrelated to expected words) and within-language errors (semantically related or unrelated to expected words). Bilinguals detected semantically related within-language errors most slowly and least accurately, language switches more quickly and accurately than within-language errors, and (in Experiment 2), translation equivalents as quickly and accurately as unrelated language switches. These results suggest that internal monitoring of form (which can detect mismatches in language membership) completes earlier than, and is independent of, monitoring of meaning. However, analysis of reading times prior to error detection revealed meaning violations to be more disruptive for processing than language violations. PMID:28649169
Realizing total reciprocity violation in the phase for photon scattering
Deák, László; Bottyán, László; Fülöp, Tamás; Merkel, Dániel Géza; Nagy, Dénes Lajos; Sajti, Szilárd; Schulze, Kai Sven; Spiering, Hartmut; Uschmann, Ingo; Wille, Hans-Christian
2017-01-01
Reciprocity is when wave or quantum scattering satisfies a symmetry property, connecting a scattering process with the reversed one. While reciprocity involves the interchange of source and detector, it is fundamentally different from rotational invariance, and is a generalization of time reversal invariance, occurring in absorptive media as well. Due to its presence at diverse areas of physics, it admits a wide variety of applications. For polarization dependent scatterings, reciprocity is often violated, but violation in the phase of the scattering amplitude is much harder to experimentally observe than violation in magnitude. Enabled by the advantageous properties of nuclear resonance scattering of synchrotron radiation, we have measured maximal, i.e., 180-degree, reciprocity violation in the phase. For accessing phase information, we introduced a new version of stroboscopic detection. The scattering setting was devised based on a generalized reciprocity theorem that opens the way to construct new types of reciprocity related devices. PMID:28225031
Realizing total reciprocity violation in the phase for photon scattering.
Deák, László; Bottyán, László; Fülöp, Tamás; Merkel, Dániel Géza; Nagy, Dénes Lajos; Sajti, Szilárd; Schulze, Kai Sven; Spiering, Hartmut; Uschmann, Ingo; Wille, Hans-Christian
2017-02-22
Reciprocity is when wave or quantum scattering satisfies a symmetry property, connecting a scattering process with the reversed one. While reciprocity involves the interchange of source and detector, it is fundamentally different from rotational invariance, and is a generalization of time reversal invariance, occurring in absorptive media as well. Due to its presence at diverse areas of physics, it admits a wide variety of applications. For polarization dependent scatterings, reciprocity is often violated, but violation in the phase of the scattering amplitude is much harder to experimentally observe than violation in magnitude. Enabled by the advantageous properties of nuclear resonance scattering of synchrotron radiation, we have measured maximal, i.e., 180-degree, reciprocity violation in the phase. For accessing phase information, we introduced a new version of stroboscopic detection. The scattering setting was devised based on a generalized reciprocity theorem that opens the way to construct new types of reciprocity related devices.
CP violating scalar Dark Matter
NASA Astrophysics Data System (ADS)
Cordero-Cid, A.; Hernández-Sánchez, J.; Keus, V.; King, S. F.; Moretti, S.; Rojas, D.; Sokołowska, D.
2016-12-01
We study an extension of the Standard Model (SM) in which two copies of the SM scalar SU(2) doublet which do not acquire a Vacuum Expectation Value (VEV), and hence are inert, are added to the scalar sector. We allow for CP-violation in the inert sector, where the lightest inert state is protected from decaying to SM particles through the conservation of a Z 2 symmetry. The lightest neutral particle from the inert sector, which has a mixed CP-charge due to CP-violation, is hence a Dark Matter (DM) candidate. We discuss the new regions of DM relic density opened up by CP-violation, and compare our results to the CP-conserving limit and the Inert Doublet Model (IDM). We constrain the parameter space of the CP-violating model using recent results from the Large Hadron Collider (LHC) and DM direct and indirect detection experiments.
On-Line Sentence Processing in Swedish: Cross-Linguistic Developmental Comparisons with French
ERIC Educational Resources Information Center
Kail, Michele; Kihlstedt, Maria; Bonnet, Philippe
2012-01-01
This study examined on-line processing of Swedish sentences in a grammaticality-judgement experiment within the framework of the Competition Model. Three age groups from 6 to 11 and an adult group were asked to detect grammatical violations as quickly as possible. Three factors concerning cue cost were studied: violation position (early vs. late),…
Flavoured Dark Matter moving left
NASA Astrophysics Data System (ADS)
Blanke, Monika; Das, Satrajit; Kast, Simon
2018-02-01
We investigate the phenomenology of a simplified model of flavoured Dark Matter (DM), with a dark fermionic flavour triplet coupling to the left-handed SU(2) L quark doublets via a scalar mediator. The DM-quark coupling matrix is assumed to constitute the only new source of flavour and CP violation, following the hypothesis of Dark Minimal Flavour Violation. We analyse the constraints from LHC searches, from meson mixing data in the K, D, and B d,s meson systems, from thermal DM freeze-out, and from direct detection experiments. Our combined analysis shows that while the experimental constraints are similar to the DMFV models with DM coupling to right-handed quarks, the multitude of couplings between DM and the SM quark sector resulting from the SU(2) L structure implies a richer phenomenology and significantly alters the resulting impact on the viable parameter space.
Xuan, Ziming; Damon, Donna; Noel, Jonathan
2013-01-01
Objectives. We evaluated advertising code violations using the US Beer Institute guidelines for responsible advertising. Methods. We applied the Delphi rating technique to all beer ads (n = 289) broadcast in national markets between 1999 and 2008 during the National Collegiate Athletic Association basketball tournament games. Fifteen public health professionals completed ratings using quantitative scales measuring the content of alcohol advertisements (e.g., perceived actor age, portrayal of excessive drinking) according to 1997 and 2006 versions of the Beer Institute Code. Results. Depending on the code version, exclusion criteria, and scoring method, expert raters found that between 35% and 74% of the ads had code violations. There were significant differences among producers in the frequency with which ads with violations were broadcast, but not in the proportions of unique ads with violations. Guidelines most likely to be violated included the association of beer drinking with social success and the use of content appealing to persons younger than 21 years. Conclusions. The alcohol industry’s current self-regulatory framework is ineffective at preventing content violations but could be improved by the use of new rating procedures designed to better detect content code violations. PMID:23947318
Babor, Thomas F; Xuan, Ziming; Damon, Donna; Noel, Jonathan
2013-10-01
We evaluated advertising code violations using the US Beer Institute guidelines for responsible advertising. We applied the Delphi rating technique to all beer ads (n = 289) broadcast in national markets between 1999 and 2008 during the National Collegiate Athletic Association basketball tournament games. Fifteen public health professionals completed ratings using quantitative scales measuring the content of alcohol advertisements (e.g., perceived actor age, portrayal of excessive drinking) according to 1997 and 2006 versions of the Beer Institute Code. Depending on the code version, exclusion criteria, and scoring method, expert raters found that between 35% and 74% of the ads had code violations. There were significant differences among producers in the frequency with which ads with violations were broadcast, but not in the proportions of unique ads with violations. Guidelines most likely to be violated included the association of beer drinking with social success and the use of content appealing to persons younger than 21 years. The alcohol industry's current self-regulatory framework is ineffective at preventing content violations but could be improved by the use of new rating procedures designed to better detect content code violations.
Joshi, Ashish; Perin, Douglas M Puricelli; Amadi, Chioma; Trout, Kate
2015-03-05
The study purpose was to conduct heuristic evaluation of an interactive, bilingual touchscreen-enabled breastfeeding educational programme for Hispanic women living in rural settings in Nebraska. Three raters conducted the evaluation during May 2013 using principles of Nielson's heuristics. A total of 271 screens were evaluated and included: interface (n = 5), programme sections (n = 223) and educational content (n = 43). A total of 97 heuristic violations were identified and were mostly related to interface (8 violations/5 screens) and programme components (89 violations/266 screens). The most common heuristic violations reported were recognition rather than recall (62%, n = 60), consistency and standards (14%, n = 14) and match between the system and real world (9%, n = 9). Majority of the heuristic violations had minor usability issues (73%, n = 71). The only grade 4 heuristic violation reported was due to the visibility of system status in the assessment modules. The results demonstrated that the system was more consistent with Nielsen's usability heuristics. With Nielsen's usability heuristics, it is possible to identify problems in a timely manner, and help facilitate the identification and prioritisation of problems needing urgent attention at an earlier stage before the final deployment of the system.
WORKER PROTECTION: Federal Contractors and Violations of Labor Law
1995-10-01
receive billions of dollars annually in federal government contracts for goods and services. While these firms generally profit from their business with...Federal Procurement Data System (FPDS) that tracks firms receiving over $25,000 in federal funding in exchange for goods and services provided. For...B-257208 our detection. Also, we were unable to verify those firms that went out of business or relocated or for which location data in NLRB case
Efficient creation of multipartite entanglement in flux qubits.
Ferber, J; Wilhelm, F K
2010-07-09
We investigate three superconducting flux qubits coupled in a loop. In this setup, tripartite entanglement can be created in a natural, controllable, and stable way. Both generic kinds of tripartite entanglement--the W type as well as the GHZ type entanglement--can be identified among the eigenstates. We also discuss the violation of Bell inequalities in this system and show the impact of a limited measurement fidelity on the detection of entanglement and quantum nonlocality.
Final Overview of ACES Simulation for Evaluation SARP Well-Clear Definitions
NASA Technical Reports Server (NTRS)
Santiago, Confesor; Johnson, Marcus A.; Isaacson, Doug; Hershey, David
2014-01-01
The UAS in the NAS project is studying the minimum operational performance standards for unmanned aerial systems (UAS's) detect-and-avoid (DAA) system in order to operate in the National Airspace System. The DoD's Science and research Panel (SARP) Well-Clear Workshop is investigating the time and spatial boundary at which an UAS violates well-clear. NASA is supporting this effort through use of its Airspace Concept Evaluation System (ACES) simulation platform. This briefing presents the final results to the SARP, which will be used to judge the three candidate well-clear definitions, and for the selection of the most operationally suitable option.
DOT National Transportation Integrated Search
2011-07-01
This report describes the system capability assessment for the Cooperative Intersection Collision Avoidance System for Violations (CICAS-V) based on data collected from objective tests and a pilot test. The CICAS-V is a vehicle-to-infrastructure syst...
Haas, Derek A; Eslinger, Paul W; Bowyer, Theodore W; Cameron, Ian M; Hayes, James C; Lowrey, Justin D; Miley, Harry S
2017-11-01
The Comprehensive Nuclear-Test-Ban Treaty bans all nuclear tests and mandates development of verification measures to detect treaty violations. One verification measure is detection of radioactive xenon isotopes produced in the fission of actinides. The International Monitoring System (IMS) currently deploys automated radioxenon systems that can detect four radioxenon isotopes. Radioxenon systems with lower detection limits are currently in development. Historically, the sensitivity of radioxenon systems was measured by the minimum detectable concentration for each isotope. In this paper we analyze the response of radioxenon systems using rigorous metrics in conjunction with hypothetical representative releases indicative of an underground nuclear explosion instead of using only minimum detectable concentrations. Our analyses incorporate the impact of potential spectral interferences on detection limits and the importance of measuring isotopic ratios of the relevant radioxenon isotopes in order to improve discrimination from background sources particularly for low-level releases. To provide a sufficient data set for analysis, hypothetical representative releases are simulated every day from the same location for an entire year. The performance of three types of samplers are evaluated assuming they are located at 15 IMS radionuclide stations in the region of the release point. The performance of two IMS-deployed samplers and a next-generation system is compared with proposed metrics for detection and discrimination using representative releases from the nuclear test site used by the Democratic People's Republic of Korea. Copyright © 2017 Elsevier Ltd. All rights reserved.
An integrated approach to evaluate policies for controlling traffic law violations.
Mehmood, Arif
2010-03-01
Modeling dynamics of the driver behavior is a complex problem. In this paper a system approach is introduced to model and to analyze the driver behavior related to traffic law violations in the Emirate of Abu Dhabi. This paper demonstrates how the theoretical relationships between different factors can be expressed formally, and how the resulting model can assist in evaluating potential benefits of various policies to control the traffic law violations Using system approach, an integrated dynamic simulation model is developed, and model is tested to simulate the driver behavior for violating traffic laws during 2002-2007 in the Emirate of Abu Dhabi. The dynamic simulation model attempts to address the questions: (1) "what" interventions should be implemented to reduce and eventually control traffic violations which will lead to improving road safety and (2) "how" to justify those interventions will be effective or ineffective to control the violations in different transportation conditions. The simulation results reveal promising capability of applying system approach in the policy evaluation studies. Copyright 2009 Elsevier Ltd. All rights reserved.
Global and local music perception in children with Williams syndrome.
Deruelle, Christine; Schön, Daniele; Rondan, Cécilie; Mancini, Josette
2005-04-25
Musical processing can be decomposed into the appreciation of global and local elements. This global/local dissociation was investigated with the processing of contour-violated and interval-violated melodies. Performance of a group of 16 children with Williams syndrome and a group of 16 control children were compared in a same-different task. Control participants were more accurate in detecting differences in the contour-violated than in the interval-violated condition while Williams syndrome individuals performed equally well in both conditions. This finding suggests that global precedence may occur at an early perceptual stage in normally developing children. In contrast, no such global precedence is observed in the Williams syndrome population. These data are discussed in the context of atypical cognitive profiles of individuals with Williams syndrome.
NASA Technical Reports Server (NTRS)
Rogers, Ralph V.
1993-01-01
The TATSS Project's goal was to develop a design for computer software that would support the attainment of the following objectives for the air traffic simulation model: (1) Full freedom of movement for each aircraft object in the simulation model. Each aircraft object may follow any designated flight plan or flight path necessary as required by the experiment under consideration. (2) Object position precision up to +/- 3 meters vertically and +/- 15 meters horizontally. (3) Aircraft maneuvering in three space with the object position precision identified above. (4) Air traffic control operations and procedures. (5) Radar, communication, navaid, and landing aid performance. (6) Weather. (7) Ground obstructions and terrain. (8) Detection and recording of separation violations. (9) Measures of performance including deviations from flight plans, air space violations, air traffic control messages per aircraft, and traditional temporal based measures.
Low Clouds and Cosmic Rays: Possible Reasons for Correlation Changes
NASA Astrophysics Data System (ADS)
Veretenenko, S. V.; Ogurtsov, M. G.
2015-03-01
In this work we investigated the nature of correlations between low cloud cover anomalies (LCA) and galactic cosmic ray (GCR) variations detected on the decadal time scale, as well as possible reasons for the violation of these correlations in the early 2000s. It was shown that the link between cloud cover at middle latitudes and GCR fluxes is not direct, but it is realized through GCR influence on the development of extratropical baric systems (cyclones and troughs) which form cloud field. As the sign of GCR effects on the troposphere dynamics seems to depend on the strength of the stratospheric polar vortex, a possible reason for the violation of a positive correlation between LCA and GCR fluxes in the early 2000s may be the change of the vortex state which resulted in the reversal of GCR effects on extratropical cyclone development.
A Family of Well-Clear Boundary Models for the Integration of UAS in the NAS
NASA Technical Reports Server (NTRS)
Munoz, Cesar A.; Narkawicz, Anthony; Chamberlain, James; Consiglio, Maria; Upchurch, Jason
2014-01-01
The FAA-sponsored Sense and Avoid Workshop for Unmanned Aircraft Systems (UAS) defines the concept of sense and avoid for remote pilots as "the capability of a UAS to remain well clear from and avoid collisions with other airborne traffic." Hence, a rigorous definition of well clear is fundamental to any separation assurance concept for the integration of UAS into civil airspace. This paper presents a family of well-clear boundary models based on the TCAS II Resolution Advisory logic. For these models, algorithms that predict well-clear violations along aircraft current trajectories are provided. These algorithms are analogous to conflict detection algorithms but instead of predicting loss of separation, they predict whether well-clear violations will occur during a given lookahead time interval. Analytical techniques are used to study the properties and relationships satisfied by the models.
Identifying the null subject: evidence from event-related brain potentials.
Demestre, J; Meltzer, S; García-Albea, J E; Vigil, A
1999-05-01
Event-related brain potentials (ERPs) were recorded during spoken language comprehension to study the on-line effects of gender agreement violations in controlled infinitival complements. Spanish sentences were constructed in which the complement clause contained a predicate adjective marked for syntactic gender. By manipulating the gender of the antecedent (i.e., the controller) of the implicit subject while holding constant the gender of the adjective, pairs of grammatical and ungrammatical sentences were created. The detection of such a gender agreement violation would indicate that the parser had established the coreference relation between the null subject and its antecedent. The results showed a complex biphasic ERP (i.e., an early negativity with prominence at anterior and central sites, followed by a centroparietal positivity) in the violating condition as compared to the non-violating conditions. The brain reacts to NP-adjective gender agreement violations within a few hundred milliseconds of their occurrence. The data imply that the parser has properly coindexed the null subject of an infinitive clause with its antecedent.
Safe Drinking Water Information System Federal Version (SDWIS/FED)
SDWIS/FED is EPA’s national database that manages and collects public water system information from states, including reports of drinking water standard violations, reporting and monitoring violations, and other basic information.
Automated survey of 8000 plan checks at eight facilities.
Halabi, Tarek; Lu, Hsiao-Ming; Bernard, Damian A; Chu, James C H; Kirk, Michael C; Hamilton, Russell J; Lei, Yu; Driewer, Joseph
2016-09-01
To identify policy and system related weaknesses in treatment planning and plan check work-flows. The authors' web deployed plan check automation solution, PlanCheck, which works with all major planning and record and verify systems (demonstrated here for mosaiq only), allows them to compute violation rates for a large number of plan checks across many facilities without requiring the manual data entry involved with incident filings. Workflows and failure modes are heavily influenced by the type of record and verify system used. Rather than tackle multiple record and verify systems at once, the authors restricted the present survey to mosaiq facilities. Violations were investigated by sending inquiries to physicists running the program. Frequent violations included inadequate tracking in the record and verify system of total and prescription doses. Infrequent violations included incorrect setting of patient orientation in the record and verify system. Peaks in the distribution, over facilities, of violation frequencies pointed to suboptimal policies at some of these facilities. Correspondence with physicists often revealed incomplete knowledge of settings at their facility necessary to perform thorough plan checks. The survey leads to the identification of specific and important policy and system deficiencies that include: suboptimal timing of initial plan checks, lack of communication or agreement on conventions surrounding prescription definitions, and lack of automation in the transfer of some parameters.
HyperCP: A high-rate spectrometer for the study of charged hyperon and kaon decays
NASA Astrophysics Data System (ADS)
Burnstein, R. A.; Chakravorty, A.; Chan, A.; Chen, Y. C.; Choong, W.-S.; Clark, K.; Dukes, E. C.; Durandet, C.; Felix, J.; Fuzesy, R.; Gidal, G.; Gu, P.; Gustafson, H. R.; Ho, C.; Holmstrom, T.; Huang, M.; James, C.; Jenkins, C. M.; Jones, T. D.; Kaplan, D. M.; Lederman, L. M.; Leros, N.; Longo, M. J.; Lopez, F.; Lu, L. C.; Luebke, W.; Luk, K.-B.; Nelson, K. S.; Park, H. K.; Perroud, J.-P.; Rajaram, D.; Rubin, H. A.; Teng, P. K.; Turko, B.; Volk, J.; White, C. G.; White, S. L.; Zyla, P.
2005-04-01
The HyperCP experiment (Fermilab E871) was designed to search for rare phenomena in the decays of charged strange particles, in particular CP violation in Ξ and Λ hyperon decays with a sensitivity of 10-4. Intense charged secondary beams were produced by 800 GeV/ c protons and momentum selected by a magnetic channel. Decay products were detected in a large-acceptance, high-rate magnetic spectrometer using multiwire proportional chambers, trigger hodoscopes, a hadronic calorimeter, and a muon-detection system. Nearly identical acceptances and efficiencies for hyperons and antihyperons decaying within an evacuated volume were achieved by reversing the polarities of the channel and spectrometer magnets. A high-rate data-acquisition system enabled 231 billion events to be recorded in 12 months of data-taking.
Experimental violation of a Bell's inequality with efficient detection.
Rowe, M A; Kielpinski, D; Meyer, V; Sackett, C A; Itano, W M; Monroe, C; Wineland, D J
2001-02-15
Local realism is the idea that objects have definite properties whether or not they are measured, and that measurements of these properties are not affected by events taking place sufficiently far away. Einstein, Podolsky and Rosen used these reasonable assumptions to conclude that quantum mechanics is incomplete. Starting in 1965, Bell and others constructed mathematical inequalities whereby experimental tests could distinguish between quantum mechanics and local realistic theories. Many experiments have since been done that are consistent with quantum mechanics and inconsistent with local realism. But these conclusions remain the subject of considerable interest and debate, and experiments are still being refined to overcome 'loopholes' that might allow a local realistic interpretation. Here we have measured correlations in the classical properties of massive entangled particles (9Be+ ions): these correlations violate a form of Bell's inequality. Our measured value of the appropriate Bell's 'signal' is 2.25 +/- 0.03, whereas a value of 2 is the maximum allowed by local realistic theories of nature. In contrast to previous measurements with massive particles, this violation of Bell's inequality was obtained by use of a complete set of measurements. Moreover, the high detection efficiency of our apparatus eliminates the so-called 'detection' loophole.
Consent Agreement with the DOI, BIA and Bureau of Indian Education (BIE) on alleged violations at schools and public water systems owned, operated or the responsibility of DOI. Violations occurred under the CAA, CWA, SDWA, TSCA, ADHERA.
The search for permanent electric dipole moments, in particular for the one of the neutron
Kirch, Klaus
2018-05-04
Nonzero permanent electric dipole moments (EDM) of fundamental systems like particles, nuclei, atoms or molecules violate parity and time reversal invariance. Invoking the CPT theorem, time reversal violation implies CP violation. Although CP-violation is implemented in the standard electro-weak theory, EDM generated this way remain undetectably small. However, this CP-violation also appears to fail explaining the observed baryon asymmetry of our universe. Extensions of the standard theory usually include new CP violating phases which often lead to the prediciton of larger EDM. EDM searches in different systems are complementary and various efforts worldwide are underway, but no finite value could be established yet. An improved search for the EDM of the neutron requires, among other things, much better statistics. At PSI, we are presently commissioning a new high intensity source of ultracold neutrons. At the same time, with an international collaboration, we are setting up for a new measurement of the neutron EDM which is starting this year.
Experimental violation of Bell inequalities for multi-dimensional systems
Lo, Hsin-Pin; Li, Che-Ming; Yabushita, Atsushi; Chen, Yueh-Nan; Luo, Chih-Wei; Kobayashi, Takayoshi
2016-01-01
Quantum correlations between spatially separated parts of a d-dimensional bipartite system (d ≥ 2) have no classical analog. Such correlations, also called entanglements, are not only conceptually important, but also have a profound impact on information science. In theory the violation of Bell inequalities based on local realistic theories for d-dimensional systems provides evidence of quantum nonlocality. Experimental verification is required to confirm whether a quantum system of extremely large dimension can possess this feature, however it has never been performed for large dimension. Here, we report that Bell inequalities are experimentally violated for bipartite quantum systems of dimensionality d = 16 with the usual ensembles of polarization-entangled photon pairs. We also estimate that our entanglement source violates Bell inequalities for extremely high dimensionality of d > 4000. The designed scenario offers a possible new method to investigate the entanglement of multipartite systems of large dimensionality and their application in quantum information processing. PMID:26917246
Bell’s Nonlocality Can be Detected by the Violation of Einstein-Podolsky-Rosen Steering Inequality
Chen, Jing-Ling; Ren, Changliang; Chen, Changbo; Ye, Xiang-Jun; Pati, Arun Kumar
2016-01-01
Recently quantum nonlocality has been classified into three distinct types: quantum entanglement, Einstein-Podolsky-Rosen steering, and Bell’s nonlocality. Among which, Bell’s nonlocality is the strongest type. Bell’s nonlocality for quantum states is usually detected by violation of some Bell’s inequalities, such as Clause-Horne-Shimony-Holt inequality for two qubits. Steering is a manifestation of nonlocality intermediate between entanglement and Bell’s nonlocality. This peculiar feature has led to a curious quantum phenomenon, the one-way Einstein-Podolsky-Rosen steering. The one-way steering was an important open question presented in 2007, and positively answered in 2014 by Bowles et al., who presented a simple class of one-way steerable states in a two-qubit system with at least thirteen projective measurements. The inspiring result for the first time theoretically confirms quantum nonlocality can be fundamentally asymmetric. Here, we propose another curious quantum phenomenon: Bell nonlocal states can be constructed from some steerable states. This novel finding not only offers a distinctive way to study Bell’s nonlocality without Bell’s inequality but with steering inequality, but also may avoid locality loophole in Bell’s tests and make Bell’s nonlocality easier for demonstration. Furthermore, a nine-setting steering inequality has also been presented for developing more efficient one-way steering and detecting some Bell nonlocal states. PMID:27966616
Musser, Jeffrey M B; Anderson, Kevin L; Boison, Joe O
2002-01-01
Twelve calves were fed milk replacer containing 3.33 ppm penicillin G for one feeding, and 12 calves were fed the medicated milk replacer once daily at a rate of 12% of their body weight for 14 days. Two calves served as controls. Calves were slaughtered 4 to 13 hours after being fed. Kidney, liver, muscle, and urine samples were assayed for penicillin by high-pressure liquid chromatography (HPLC). Penicillin G was not detected in any muscle samples and concentrations of penicillin exceeded the tolerance level (0.05 microg/g) in kidney or liver tissue from 13 of 24 treated-calf carcasses examined by HPLC. The Live Animal Swab Test identified all 13 carcasses with violative drug residues. Using kidney as the test matrix, the Swab Test on Premises identified 10 of 13 carcasses with violative drug residues, while the Calf Antibiotic Sulfa Test identified seven of 13 carcasses with violative residues.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cornelio, Marcio F.; Oliveira, Marcos C. de
Employing the quantum Renyi {alpha} entropies as a measure of entanglement, we numerically find the violation of the strong superadditivity inequality for a system composed of four qubits and {alpha}>1. This violation gets smaller as {alpha}{yields}1 and vanishes for {alpha}=1 when the measure corresponds to the entanglement of formation. We show that the Renyi measure aways satisfies the standard monogamy of entanglement for {alpha}=2, and only violates a high-order monogamy inequality, in the rare cases in which the strong superadditivity is also violated. The sates numerically found where the violation occurs have special symmetries where both inequalities are equivalent. Wemore » also show that every measure satisfying monogamy for high-dimensional systems also satisfies the strong superadditivity inequality. For the case of Renyi measure, we provide strong numerical evidences that these two properties are equivalent.« less
High-speed holographic correlation system for video identification on the internet
NASA Astrophysics Data System (ADS)
Watanabe, Eriko; Ikeda, Kanami; Kodate, Kashiko
2013-12-01
Automatic video identification is important for indexing, search purposes, and removing illegal material on the Internet. By combining a high-speed correlation engine and web-scanning technology, we developed the Fast Recognition Correlation system (FReCs), a video identification system for the Internet. FReCs is an application thatsearches through a number of websites with user-generated content (UGC) and detects video content that violates copyright law. In this paper, we describe the FReCs configuration and an approach to investigating UGC websites using FReCs. The paper also illustrates the combination of FReCs with an optical correlation system, which is capable of easily replacing a digital authorization sever in FReCs with optical correlation.
15 CFR 700.74 - Violations, penalties, and remedies.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Violations, penalties, and remedies. 700.74 Section 700.74 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade... REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Compliance § 700.74 Violations, penalties, and remedies...
DOT National Transportation Integrated Search
2011-07-01
This report documents the results of the independent evaluations assessment of the driver acceptance of the Cooperative Intersection Collision Avoidance System limited to Stop Sign and Traffic Signal Violations (CICAS-V) system as tested during a ...
Wang, Su-hua; Baillargeon, Renée; Paterson, Sarah
2005-03-01
Recent research on infants' responses to occlusion and containment events indicates that, although some violations of the continuity principle are detected at an early age e.g. Aguiar, A., & Baillargeon, R. (1999). 2.5-month-old infants' reasoning about when objects should and should not be occluded. Cognitive Psychology 39, 116-157; Hespos, S. J., & Baillargeon, R. (2001). Knowledge about containment events in very young infants. Cognition 78, 207-245; Luo, Y., & Baillargeon, R. (in press). When the ordinary seems unexpected: Evidence for rule-based reasoning in young infants. Cognition; Wilcox, T., Nadel, L., & Rosser, R. (1996). Location memory in healthy preterm and full-term infants. Infant Behavior & Development 19, 309-323, others are not detected until much later e.g. Baillargeon, R., & DeVos, J. (1991). Object permanence in young infants: Further evidence. Child Development 62, 1227-1246; Hespos, S. J., & Baillargeon, R. (2001). Infants' knowledge about occlusion and containment events: A surprising discrepancy. Psychological Science 12, 140-147; Luo, Y., & Baillargeon, R. (2004). Infants' reasoning about events involving transparent occluders and containers. Manuscript in preparation; Wilcox, T. (1999). Object individuation: Infants' use of shape, size, pattern, and color. Cognition 72, 125-166. The present research focused on events involving covers or tubes, and brought to light additional examples of early and late successes in infants' ability to detect continuity violations. In Experiment 1, 2.5- to 3-month-old infants were surprised (1) when a cover was lowered over an object, slid to the right, and lifted to reveal no object; and (2) when a cover was lowered over an object, slid behind the left half of a screen, lifted above the screen, moved to the right, lowered behind the right half of the screen, slid past the screen, and finally lifted to reveal the object. In Experiments 2 and 3, 9- and 11-month-old infants were not surprised when a short cover was lowered over a tall object until it became fully hidden; only 12-month-old infants detected this violation. Finally, in Experiment 4, 9-, 12-, and 13-month-old infants were not surprised when a tall object was lowered inside a short tube until it became fully hidden; only 14-month-old infants detected this violation. A new account of infants' physical reasoning attempts to make sense of all of these results. New research directions suggested by the account are also discussed.
Gershon, T; Gligorov, V V
2017-04-01
The phenomenon of CP violation is crucial to understand the asymmetry between matter and antimatter that exists in the Universe. Dramatic experimental progress has been made, in particular in measurements of the behaviour of particles containing the b quark, where CP violation effects are predicted by the Kobayashi-Maskawa mechanism that is embedded in the standard model. The status of these measurements and future prospects for an understanding of CP violation beyond the standard model are reviewed.
30 CFR 845.13 - Point system for penalties.
Code of Federal Regulations, 2010 CFR
2010-07-01
... seriousness, based upon the extent to which enforcement is obstructed by the violation. (3) Negligence. (i... violation which occurs through no negligence shall be assigned no penalty points for negligence; (B) A violation which is caused by negligence shall be assigned 12 points or less, depending on the degree of...
30 CFR 723.13 - Point system for penalties.
Code of Federal Regulations, 2010 CFR
2010-07-01
... to which enforcement is obstructed by the violation. (3) Negligence. (i) The Office shall assign up... no negligence shall be assigned no penalty points for negligence; (B) A violation which is caused by negligence shall be assigned 12 points or less, depending on the degree of negligence; (C) A violation which...
36 CFR 223.196 - Civil penalties for violation
Code of Federal Regulations, 2011 CFR
2011-07-01
... SALE AND DISPOSAL OF NATIONAL FOREST SYSTEM TIMBER, SPECIAL FOREST PRODUCTS, AND FOREST BOTANICAL... person has violated any provision of the Act, or any regulation issued under the Act relating to National... determines that the person committed such violation in disregard of such provision or regulation; or (3...
Liang, Peipeng; Goel, Vinod; Jia, Xiuqin; Li, Kuncheng
2014-01-01
The inclusion fallacy is a phenomenon in which generalization from a specific premise category to a more general conclusion category is considered stronger than a generalization to a specific conclusion category nested within the more general set. Such inferences violate rational norms and are part of the reasoning fallacy literature that provides interesting tasks to explore cognitive and neural basis of reasoning. To explore the functional neuroanatomy of the inclusion fallacy, we used a 2 × 2 factorial design, with factors for quantification (explicit and implicit) and response (fallacious and non-fallacious). It was found that a left fronto-temporal system, along with a superior medial frontal system, was specifically activated in response to fallacious responses consistent with a semantic biasing of judgment explanation. A right fronto-parietal system was specifically recruited in response to detecting conflict associated with the heightened fallacy condition. These results are largely consistent with previous studies of reasoning fallacy and support a multiple systems model of reasoning.
Identifying fMRI Model Violations with Lagrange Multiplier Tests
Cassidy, Ben; Long, Christopher J; Rae, Caroline; Solo, Victor
2013-01-01
The standard modeling framework in Functional Magnetic Resonance Imaging (fMRI) is predicated on assumptions of linearity, time invariance and stationarity. These assumptions are rarely checked because doing so requires specialised software, although failure to do so can lead to bias and mistaken inference. Identifying model violations is an essential but largely neglected step in standard fMRI data analysis. Using Lagrange Multiplier testing methods we have developed simple and efficient procedures for detecting model violations such as non-linearity, non-stationarity and validity of the common Double Gamma specification for hemodynamic response. These procedures are computationally cheap and can easily be added to a conventional analysis. The test statistic is calculated at each voxel and displayed as a spatial anomaly map which shows regions where a model is violated. The methodology is illustrated with a large number of real data examples. PMID:22542665
Violation of unitarity by Hawking radiation does not violate energy-momentum conservation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nikolić, Hrvoje
2015-04-02
An argument by Banks, Susskind and Peskin (BSP), according to which violation of unitarity would violate either locality or energy-momentum conservation, is widely believed to be a strong argument against non-unitarity of Hawking radiation. We find that the whole BSP argument rests on the crucial assumption that the Hamiltonian is not highly degenerate, and point out that this assumption is not satisfied for systems with many degrees of freedom. Using Lindblad equation, we show that high degeneracy of the Hamiltonian allows local non-unitary evolution without violating energy-momentum conservation. Moreover, since energy-momentum is the source of gravity, we argue that energy-momentummore » is necessarily conserved for a large class of non-unitary systems with gravity. Finally, we explicitly calculate the Lindblad operators for non-unitary Hawking radiation and show that they conserve energy-momentum.« less
40 CFR 141.861 - Reporting and recordkeeping.
Code of Federal Regulations, 2014 CFR
2014-07-01
... recordkeeping. (a) Reporting—(1) E. coli. (i) A system must notify the State by the end of the day when the system learns of an E. coli MCL violation, unless the system learns of the violation after the State... by the end of the day when the system is notified of an E. coli-positive routine sample, unless the...
40 CFR 141.861 - Reporting and recordkeeping.
Code of Federal Regulations, 2013 CFR
2013-07-01
... recordkeeping. (a) Reporting. (1) E. coli.—(i) A system must notify the State by the end of the day when the system learns of an E. coli MCL violation, unless the system learns of the violation after the State... by the end of the day when the system is notified of an E. coli-positive routine sample, unless the...
Lai, Hsin-Hua; Yang, Kun; Bonesteel, N E
2013-11-22
We show the violation of the entanglement area law for bosonic systems with Bose surfaces. For bosonic systems with gapless factorized energy dispersions on an N(d) Cartesian lattice in d dimensions, e.g., the exciton Bose liquid in two dimensions, we explicitly show that a belt subsystem with width L preserving translational symmetry along d-1 Cartesian axes has leading entanglement entropy (N(d-1)/3)lnL. Using this result, the strong subadditivity inequality, and lattice symmetries, we bound the entanglement entropy of a rectangular subsystem from below and above showing a logarithmic violation of the area law. For subsystems with a single flat boundary, we also bound the entanglement entropy from below showing a logarithmic violation, and argue that the entanglement entropy of subsystems with arbitrary smooth boundaries are similarly bounded.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false General. 1203.301 Section 1203.301 Federal Acquisition Regulations System DEPARTMENT OF TRANSPORTATION GENERAL IMPROPER BUSINESS... violations, except reports of suspected antitrust violations shall be coordinated with legal counsel for...
Cooperative Intersection Collision Avoidance System for Violations (CICAS-V) : Database Structure
DOT National Transportation Integrated Search
2011-07-01
This report documents the process required for data exchange between a conductor of a field operational test (FOT) and an independent evaluator based on the experience of the Cooperative Intersection Collision Avoidance System for Violations (CICAS-V...
48 CFR 3003.204 - Treatment of violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Treatment of violations. 3003.204 Section 3003.204 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS...
NASA Astrophysics Data System (ADS)
Kawaguchi, Mamiya; Harada, Masayasu; Matsuzaki, Shinya; Ouyang, Ruiwen
2017-06-01
It is expected that in a hot QCD system, a local parity-odd domain can be produced due to nonzero chirality, which is induced from the difference of winding numbers carried by the gluon topological configuration (QCD sphaleron). This local domain is called the chiral-imbalance medium, characterized by nonzero chiral chemical potential, which can be interpreted as the time variation of the strong C P phase. We find that the chiral chemical potential generates the parity breaking term in the electromagnetic form factor of charged pions. Heavy ion collision experiments could observe the phenomenological consequence of this parity-odd form factor through the elastic scattering of a pion and a photon in the medium. Then we quantify the asymmetry rate of the parity violation by measuring the polarization of the photon associated with the pion, and discuss how it could be measured in a definite laboratory frame. We roughly estimate the typical size of the asymmetry, just by picking up the pion resonant process, and find that the signal can be sufficiently larger than possible background events from parity-breaking electroweak process. Our findings might provide a novel possibility to make a manifest detection for the remnant of the strong C P violation.
Nuno-amarteifio, N
1995-11-01
This case study by the Mayor of Accra, Ghana, discusses urban growth and government efforts at city management of education, town councils, the environment, health, and business. Accra struggles to balance city population growth with infrastructure and services. Suburbs are formed daily. The central Municipal Authority is creating a new system of government that aims to include a broad segment of the population. Departments and agencies have been decentralized. Sub-metro governments were created with town councils as the governing bodies. Town councils are elected by the residents and are comprised of unit committees, which are formed from one or two neighborhoods. Each level of government sends representatives to the next level of government. The neighborhoods are in charge of environmental management. Public tribunals are oversight bodies that adjudicate violations of municipal by-laws. The Health Department has new equipment and vehicles, detects sanitation violations, and participates in the arraignment of violators before tribunals. Health inspectors are encouraged to live in the communities that they supervise and to participate in community activities. The city is investing in education. The city has subcontracted with a mass media firm to produce a package of films on topical events that will be taken to densely populated areas for informing the community about city affairs. The city encourages private business development.
Increasing the statistical significance of entanglement detection in experiments.
Jungnitsch, Bastian; Niekamp, Sönke; Kleinmann, Matthias; Gühne, Otfried; Lu, He; Gao, Wei-Bo; Chen, Yu-Ao; Chen, Zeng-Bing; Pan, Jian-Wei
2010-05-28
Entanglement is often verified by a violation of an inequality like a Bell inequality or an entanglement witness. Considerable effort has been devoted to the optimization of such inequalities in order to obtain a high violation. We demonstrate theoretically and experimentally that such an optimization does not necessarily lead to a better entanglement test, if the statistical error is taken into account. Theoretically, we show for different error models that reducing the violation of an inequality can improve the significance. Experimentally, we observe this phenomenon in a four-photon experiment, testing the Mermin and Ardehali inequality for different levels of noise. Furthermore, we provide a way to develop entanglement tests with high statistical significance.
Mortise terrorism on the main pipelines
NASA Astrophysics Data System (ADS)
Komarov, V. A.; Nigrey, N. N.; Bronnikov, D. A.; Nigrey, A. A.
2018-01-01
The research aim of the work is to analyze the effectiveness of the methods of physical protection of main pipelines proposed in the article from the "mortise terrorism" A mathematical model has been developed that made it possible to predict the dynamics of "mortise terrorism" in the short term. An analysis of the effectiveness of physical protection methods proposed in the article to prevent unauthorized impacts on the objects under investigation is given. A variant of a video analytics system has been developed that allows detecting violators with recognition of the types of work they perform at a distance of 150 meters in conditions of complex natural backgrounds and precipitation. Probability of detection is 0.959.
Realistic loophole-free Bell test with atom-photon entanglement
NASA Astrophysics Data System (ADS)
Teo, C.; Araújo, M.; Quintino, M. T.; Minář, J.; Cavalcanti, D.; Scarani, V.; Terra Cunha, M.; França Santos, M.
2013-07-01
The establishment of nonlocal correlations, guaranteed through the violation of a Bell inequality, is not only important from a fundamental point of view but constitutes the basis for device-independent quantum information technologies. Although several nonlocality tests have been conducted so far, all of them suffered from either locality or detection loopholes. Among the proposals for overcoming these problems are the use of atom-photon entanglement and hybrid photonic measurements (for example, photodetection and homodyning). Recent studies have suggested that the use of atom-photon entanglement can lead to Bell inequality violations with moderate transmission and detection efficiencies. Here we combine these ideas and propose an experimental setup realizing a simple atom-photon entangled state that can be used to obtain nonlocality when considering realistic experimental parameters including detection efficiencies and losses due to required propagation distances.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How are violations of... Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL... DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Violations of this Part and Consequences § 105-74.500 How...
Difference in direct charge-parity violation between charged and neutral B meson decays.
Lin, S-W; Unno, Y; Hou, W-S; Chang, P; Adachi, I; Aihara, H; Akai, K; Arinstein, K; Aulchenko, V; Aushev, T; Aziz, T; Bakich, A M; Balagura, V; Barberio, E; Bay, A; Bedny, I; Bitenc, U; Bondar, A; Bozek, A; Bracko, M; Browder, T E; Chang, M-C; Chao, Y; Chen, A; Chen, K-F; Chen, W T; Cheon, B G; Chiang, C-C; Chistov, R; Cho, I-S; Choi, S-K; Choi, Y; Choi, Y K; Cole, S; Dalseno, J; Danilov, M; Dash, M; Drutskoy, A; Eidelman, S; Epifanov, D; Fratina, S; Fujikawa, M; Furukawa, K; Gabyshev, N; Goldenzweig, P; Golob, B; Ha, H; Haba, J; Hara, T; Hayasaka, K; Hayashii, H; Hazumi, M; Heffernan, D; Hokuue, T; Hoshi, Y; Hsiung, Y B; Hyun, H J; Iijima, T; Ikado, K; Inami, K; Ishikawa, A; Ishino, H; Itoh, R; Iwabuchi, M; Iwasaki, M; Iwasaki, Y; Kah, D H; Kaji, H; Kataoka, S U; Kawai, H; Kawasaki, T; Kibayashi, A; Kichimi, H; Kikutani, E; Kim, H J; Kim, S K; Kim, Y J; Kinoshita, K; Korpar, S; Kozakai, Y; Krizan, P; Krokovny, P; Kumar, R; Kuo, C C; Kuzmin, A; Kwon, Y-J; Lee, M J; Lee, S E; Lesiak, T; Li, J; Liu, Y; Liventsev, D; Mandl, F; Marlow, D; McOnie, S; Medvedeva, T; Mimashi, T; Mitaroff, W; Miyabayashi, K; Miyake, H; Miyazaki, Y; Mizuk, R; Mori, T; Nakamura, T T; Nakano, E; Nakao, M; Nakazawa, H; Nishida, S; Nitoh, O; Noguchi, S; Nozaki, T; Ogawa, S; Ogawa, Y; Ohshima, T; Okuno, S; Olsen, S L; Ozaki, H; Pakhlova, G; Park, C W; Park, H; Peak, L S; Pestotnik, R; Peters, M; Piilonen, L E; Poluektov, A; Sahoo, H; Sakai, Y; Schneider, O; Schümann, J; Schwartz, A J; Seidl, R; Senyo, K; Sevior, M E; Shapkin, M; Shen, C P; Shibuya, H; Shidara, T; Shinomiya, S; Shiu, J-G; Shwartz, B; Singh, J B; Sokolov, A; Somov, A; Stanic, S; Staric, M; Sumisawa, K; Sumiyoshi, T; Suzuki, S; Tajima, O; Takasaki, F; Tamura, N; Tanaka, M; Tawada, M; Taylor, G N; Teramoto, Y; Tikhomirov, I; Trabelsi, K; Uehara, S; Ueno, K; Uglov, T; Uno, S; Urquijo, P; Ushiroda, Y; Usov, Y; Varner, G; Varvell, K E; Vervink, K; Villa, S; Wang, C C; Wang, C H; Wang, M-Z; Watanabe, Y; Wedd, R; Wicht, J; Won, E; Yabsley, B D; Yamaguchi, A; Yamashita, Y; Yamauchi, M; Yoshida, M; Yuan, C Z; Yusa, Y; Zhang, C C; Zhang, Z P; Zhilich, V; Zhulanov, V; Zupanc, A
2008-03-20
Equal amounts of matter and antimatter are predicted to have been produced in the Big Bang, but our observable Universe is clearly matter-dominated. One of the prerequisites for understanding this elimination of antimatter is the nonconservation of charge-parity (CP) symmetry. So far, two types of CP violation have been observed in the neutral K meson (K(0)) and B meson (B(0)) systems: CP violation involving the mixing between K(0) and its antiparticle (and likewise for B(0) and ), and direct CP violation in the decay of each meson. The observed effects for both types of CP violation are substantially larger for the B(0) meson system. However, they are still consistent with the standard model of particle physics, which has a unique source of CP violation that is known to be too small to account for the matter-dominated Universe. Here we report that the direct CP violation in charged B(+/-)-->K(+/-)pi(0) decay is different from that in the neutral B(0) counterpart. The direct CP-violating decay rate asymmetry, (that is, the difference between the number of observed B(-)-->K(-)pi(0) event versus B(+)-->K(+) pi(0) events, normalized to the sum of these events) is measured to be about +7%, with an uncertainty that is reduced by a factor of 1.7 from a previous measurement. However, the asymmetry for versus B(0)-->K(+)pi(-) is at the -10% level. Although it is susceptible to strong interaction effects that need further clarification, this large deviation in direct CP violation between charged and neutral B meson decays could be an indication of new sources of CP violation-which would help to explain the dominance of matter in the Universe.
48 CFR 803.303 - Reporting suspected antitrust violations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Reporting suspected antitrust violations. 803.303 Section 803.303 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Reports of Suspected...
48 CFR 803.303 - Reporting suspected antitrust violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Reporting suspected antitrust violations. 803.303 Section 803.303 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Reports of Suspected...
48 CFR 803.806 - Processing suspected violations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Processing suspected violations. 803.806 Section 803.806 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Limitation on the Payment of Funds...
Fundamental monogamy relation between contextuality and nonlocality.
Kurzyński, Paweł; Cabello, Adán; Kaszlikowski, Dagomir
2014-03-14
We show that the no-disturbance principle imposes a tradeoff between locally contextual correlations violating the Klyachko-Can-Biniciogˇlu-Shumovski inequality and spatially separated correlations violating the Clauser-Horne-Shimony-Holt inequality. The violation of one inequality forbids the violation of the other. We also obtain the corresponding monogamy relation imposed by quantum theory for a qutrit-qubit system. Our results show the existence of fundamental monogamy relations between contextuality and nonlocality that suggest that entanglement might be a particular form of a more fundamental resource.
New Bell inequalities for three-qubit pure states
NASA Astrophysics Data System (ADS)
Das, Arpan; Datta, Chandan; Agrawal, Pankaj
2017-12-01
We introduce a set of Bell inequalities for a three-qubit system. Each inequality within this set is violated by all generalized GHZ states. The more entangled a generalized GHZ state is, the more will be the violation. This establishes a relation between nonlocality and entanglement for this class of states. Certain inequalities within this set are violated by pure biseparable states. We also provide numerical evidence that at least one of these Bell inequalities is violated by a pure genuinely entangled state. These Bell inequalities can distinguish between separable, biseparable and genuinely entangled pure three-qubit states. We also generalize this set to n-qubit systems and may be suitable to characterize the entanglement of n-qubit pure states.
Capabilities of long-baseline experiments in the presence of a sterile neutrino
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dutta, Debajyoti; Gandhi, Raj; Kayser, Boris
Assuming that there is a sterile neutrino, we ask what then is the ability of long-baseline experiments to i) establish that neutrino oscillation violates CP, ii) determine the three-neutrino mass ordering, and iii) determine which CP-violating phase or phases are the cause of any CP violation that may be observed. We find that the ability to establish CP violation and to determine the mass ordering could be very substantial. However, the effects of the sterile neutrino could be quite large, and it might prove very difficult to determine which phase is responsible for an observed CP violation. We explain whymore » a sterile neutrino changes the long-baseline sensitivities to CP violation and to the mass ordering in the ways that it does. We note that long-baseline experiments can probe the presence of sterile neutrinos in a way that is different from, and complementary to, the probes of short-baseline experiments. As a result, we explore the question of how large sterile-active mixing angles need to be before long-baseline experiments can detect their effects, or how small they need to be before the interpretation of these experiments can safely disregard the possible existence of sterile neutrinos.« less
Capabilities of long-baseline experiments in the presence of a sterile neutrino
Dutta, Debajyoti; Gandhi, Raj; Kayser, Boris; ...
2016-11-21
Assuming that there is a sterile neutrino, we ask what then is the ability of long-baseline experiments to i) establish that neutrino oscillation violates CP, ii) determine the three-neutrino mass ordering, and iii) determine which CP-violating phase or phases are the cause of any CP violation that may be observed. We find that the ability to establish CP violation and to determine the mass ordering could be very substantial. However, the effects of the sterile neutrino could be quite large, and it might prove very difficult to determine which phase is responsible for an observed CP violation. We explain whymore » a sterile neutrino changes the long-baseline sensitivities to CP violation and to the mass ordering in the ways that it does. We note that long-baseline experiments can probe the presence of sterile neutrinos in a way that is different from, and complementary to, the probes of short-baseline experiments. As a result, we explore the question of how large sterile-active mixing angles need to be before long-baseline experiments can detect their effects, or how small they need to be before the interpretation of these experiments can safely disregard the possible existence of sterile neutrinos.« less
48 CFR 803.203 - Reporting suspected violations of the Gratuities clause.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Reporting suspected violations of the Gratuities clause. 803.203 Section 803.203 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST...
48 CFR 803.203 - Reporting suspected violations of the Gratuities clause.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Reporting suspected violations of the Gratuities clause. 803.203 Section 803.203 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST...
48 CFR 3003.203 - Reporting suspected violations of the Gratuities clause.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Reporting suspected violations of the Gratuities clause. 3003.203 Section 3003.203 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL IMPROPER BUSINESS...
48 CFR 3403.203 - Reporting suspected violations of the Gratuities clause.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Reporting suspected violations of the Gratuities clause. 3403.203 Section 3403.203 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF...
Baryogenesis in Lorentz-violating gravity theories
NASA Astrophysics Data System (ADS)
Sakstein, Jeremy; Solomon, Adam R.
2017-10-01
Lorentz-violating theories of gravity typically contain constrained vector fields. We show that the lowest-order coupling of such vectors to U (1)-symmetric scalars can naturally give rise to baryogenesis in a manner akin to the Affleck-Dine mechanism. We calculate the cosmology of this new mechanism, demonstrating that a net B - L can be generated in the early Universe, and that the resulting baryon-to-photon ratio matches that which is presently observed. We discuss constraints on the model using solar system and astrophysical tests of Lorentz violation in the gravity sector. Generic Lorentz-violating theories can give rise to the observed matter-antimatter asymmetry without violating any current bounds.
NASA Technical Reports Server (NTRS)
He, Yuning
2015-01-01
The behavior of complex aerospace systems is governed by numerous parameters. For safety analysis it is important to understand how the system behaves with respect to these parameter values. In particular, understanding the boundaries between safe and unsafe regions is of major importance. In this paper, we describe a hierarchical Bayesian statistical modeling approach for the online detection and characterization of such boundaries. Our method for classification with active learning uses a particle filter-based model and a boundary-aware metric for best performance. From a library of candidate shapes incorporated with domain expert knowledge, the location and parameters of the boundaries are estimated using advanced Bayesian modeling techniques. The results of our boundary analysis are then provided in a form understandable by the domain expert. We illustrate our approach using a simulation model of a NASA neuro-adaptive flight control system, as well as a system for the detection of separation violations in the terminal airspace.
77 FR 50091 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-20
..., prosecution, or oversight of violations of administrative, civil, or criminal law or regulation. This system... oversight of violations of administrative, civil, or criminal law or regulation, if that information is... necessary information and to coordinate with other law enforcement agencies as appropriate. DATES: The...
48 CFR 1403.204 - Treatment of violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Treatment of violations. 1403.204 Section 1403.204 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL... contractor, its counsel or witnesses, the HCA may make a recommendation to the Director, PAM, pursuant to FAR...
48 CFR 3403.409 - Misrepresentations or violations of the Covenant Against Contingent Fees.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Misrepresentations or violations of the Covenant Against Contingent Fees. 3403.409 Section 3403.409 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL...
Understanding procedural violations using Safety-I and Safety-II: The case of community pharmacies.
Jones, Christian E L; Phipps, Denham L; Ashcroft, Darren M
2018-06-01
Procedural violations are known to occur in a range of work settings, and are an important topic of interest with regard to safety management. A Safety-I perspective sees violations as undesirable digressions from standardised procedures, while a Safety-II perspective sees violations as adaptations to a complex work system. This study aimed to apply both perspectives to the examination of violations in community pharmacies. Twenty-four participants (13 pharmacists and 11 pharmacy support staff) were purposively sampled to participate in semi-structured interviews using the critical incident technique. Participants described violations they made during the course of their work. Interviews were digitally recorded, transcribed verbatim and analysed using template analysis. Community pharmacies located in England and Wales. 31 procedural violations were described during the interviews revealing multiple reasons for violations in this setting. Our findings suggest that from a Safety-II perspective, staff violated to adapt to situations and to manage safety. However, participants also violated procedures in order to maintain productivity which was found to increase risk in some, but not all situations. Procedural violations often relied on the context in which staff were working, resulting in the violation being deemed rational to the individual making the violation, yet the behaviour may be difficult to justify from an outside perspective. Combining Safety-I and Safety-II perspectives provided a detailed understanding of the underlying reasons for procedural violations. Our findings identify aspects of practice that could benefit from targeted interventions to help support staff in providing safe patient care.
Searching for New Physics with Ultrahigh Energy Cosmic Rays
NASA Technical Reports Server (NTRS)
Stecker, Floyd W.; Scully, Sean T.
2009-01-01
Ultrahigh energy cosmic rays that produce giant extensive showers of charged particles and photons when they interact in the Earth's atmosphere provide a unique tool to search for new physics. Of particular interest is the possibility of detecting a very small violation of Lorentz invariance such as may be related to the structure of space-time near the Planck scale of approximately 10 (exp -35) m. We discuss here the possible signature of Lorentz invariance violation on the spectrum of ultrahigh energy cosmic rays as compared with present observations of giant air showers. We also discuss the possibilities of using more sensitive detection techniques to improve searches for Lorentz invariance violation in the future. Using the latest data from the Pierre Auger Observatory, we derive a best fit to the LIV parameter of 3 .0 + 1.5 - 3:0 x 10 (exp -23) ,corresponding to an upper limit of 4.5 x 10-23 at a proton Lorentz factor of approximately 2 x 10(exp 11) . This result has fundamental implications for quantum gravity models.
Various quantum nonlocality tests with a commercial two-photon entanglement source
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pomarico, Enrico; Bancal, Jean-Daniel; Sanguinetti, Bruno
2011-05-15
Nonlocality is a fascinating and counterintuitive aspect of nature, revealed by the violation of a Bell inequality. The standard and easiest configuration in which Bell inequalities can be measured has been proposed by Clauser-Horne-Shimony-Holt (CHSH). However, alternative nonlocality tests can also be carried out. In particular, Bell inequalities requiring multiple measurement settings can provide deeper fundamental insights about quantum nonlocality, as well as offering advantages in the presence of noise and detection inefficiency. In this paper we show how these nonlocality tests can be performed using a commercially available source of entangled photon pairs. We report the violation of amore » series of these nonlocality tests (I{sub 3322}, I{sub 4422}, and chained inequalities). With the violation of the chained inequality with 4 settings per side we put an upper limit at 0.49 on the local content of the states prepared by the source (instead of 0.63 attainable with CHSH). We also quantify the amount of true randomness that has been created during our experiment (assuming fair sampling of the detected events).« less
Processing changes across reading encounters.
Levy, B A; Newell, S; Snyder, J; Timmins, K
1986-10-01
Five experiments examined changes in the processing of a text across reading encounters. Experiment 1 showed that reading speed increased systematically across encounters, with no loss in the extensiveness of analyses of the printed text, as indicated by the ability to detect nonword errors embedded within that passage. Experiment 2 replicated this improved reading fluency with experience and showed that it occurred even with typescript changes across trials, thus indicating that a primed visual operations explanation cannot account for the effect. The third and fourth experiments then extended the study of the familiarity effect to higher level processing, as indicated by the detection of word errors. Familiarity facilitated the detection of these violations at the syntactic-semantic levels. Finally, Experiment 5 showed that these higher level violations continued to be well detected over a series of reading encounters with the same text. The results indicate that prior experience improves reading speed, with no attenuation of analysis of the printed words or of the passage's message.
Tests of local Lorentz invariance violation of gravity in the standard model extension with pulsars.
Shao, Lijing
2014-03-21
The standard model extension is an effective field theory introducing all possible Lorentz-violating (LV) operators to the standard model and general relativity (GR). In the pure-gravity sector of minimal standard model extension, nine coefficients describe dominant observable deviations from GR. We systematically implemented 27 tests from 13 pulsar systems to tightly constrain eight linear combinations of these coefficients with extensive Monte Carlo simulations. It constitutes the first detailed and systematic test of the pure-gravity sector of minimal standard model extension with the state-of-the-art pulsar observations. No deviation from GR was detected. The limits of LV coefficients are expressed in the canonical Sun-centered celestial-equatorial frame for the convenience of further studies. They are all improved by significant factors of tens to hundreds with existing ones. As a consequence, Einstein's equivalence principle is verified substantially further by pulsar experiments in terms of local Lorentz invariance in gravity.
Hallbeck, M Susan; Koneczny, Sonja; Smith, Justine
2009-01-01
Controls for most technologies, including medical devices, are becoming increasingly complex, difficult to intuitively understand and don't necessarily follow population stereotypes. The resulting delays and errors are unacceptable when seconds can mean the difference between life and death. In this study participants were asked to "control" a system using a paper prototype (color photographs of controls) and then with a higher fidelity prototype of the same physical controls to determine performance differences among ethnicities and genders. No ethnic nor gender differences were found, and the comparison of paper versus higher fidelity prototypes also showed no significant differences. Thus, paper prototypes can be employed as an early device design usability tool to illustrate stereotype violations long before the first physical prototype. This will not only save money in the development and design processes, but also makes sure that even the most complex devices are intuitively understandable and operable for their basic functions.
Atomic "bomb testing": the Elitzur-Vaidman experiment violates the Leggett-Garg inequality
NASA Astrophysics Data System (ADS)
Robens, Carsten; Alt, Wolfgang; Emary, Clive; Meschede, Dieter; Alberti, Andrea
2017-01-01
Elitzur and Vaidman have proposed a measurement scheme that, based on the quantum superposition principle, allows one to detect the presence of an object—in a dramatic scenario, a bomb—without interacting with it. It was pointed out by Ghirardi that this interaction-free measurement scheme can be put in direct relation with falsification tests of the macro-realistic worldview. Here we have implemented the "bomb test" with a single atom trapped in a spin-dependent optical lattice to show explicitly a violation of the Leggett-Garg inequality—a quantitative criterion fulfilled by macro-realistic physical theories. To perform interaction-free measurements, we have implemented a novel measurement method that correlates spin and position of the atom. This method, which quantum mechanically entangles spin and position, finds general application for spin measurements, thereby avoiding the shortcomings inherent in the widely used push-out technique. Allowing decoherence to dominate the evolution of our system causes a transition from quantum to classical behavior in fulfillment of the Leggett-Garg inequality.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Chian-Shu; Department of Physics, National Tsing Hua University, No. 101, Section 2, Kuang-Fu Road, Hsinchu, Taiwan, 30010 R.O.C.; Institute of Physics, Academia Sinica, 128 Sec. 2,Academia Rd., Nangang, Taipei, Taiwan, 11529 R.O.C.
2016-01-07
The halo dark matter (DM) can be captured by the Sun if its final velocity after the collision with a nucleus in the Sun is less than the escape velocity. We consider a selfinteracting dark matter (SIDM) model where U(1) gauge symmetry is introduced to account for the DM self-interaction. Such a model naturally leads to isospin violating DM-nucleon interaction, although isospin symmetric interaction is still allowed as a special case. We present the IceCube-PINGU 2σ sensitivity to the parameter range of the above model with 5 years of search for neutrino signature from DM annihilation in the Sun. Thismore » indirect detection complements the direct detection by probing those SIDM parameter ranges which are either the region for very small m{sub χ} or the region opened up due to isospin violations.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Chian-Shu; Lin, Guey-Lin; Lin, Yen-Hsun, E-mail: chianshu@gmail.com, E-mail: glin@cc.nctu.edu.tw, E-mail: chris.py99g@g2.nctu.edu.tw
2016-01-01
The halo dark matter (DM) can be captured by the Sun if its final velocity after the collision with a nucleus in the Sun is less than the escape velocity. We consider a selfinteracting dark matter (SIDM) model where U(1) gauge symmetry is introduced to account for the DM self-interaction. Such a model naturally leads to isospin violating DM-nucleon interaction, although isospin symmetric interaction is still allowed as a special case. We present the IceCube-PINGU 2σ sensitivity to the parameter range of the above model with 5 years of search for neutrino signature from DM annihilation in the Sun. Thismore » indirect detection complements the direct detection by probing those SIDM parameter ranges which are either the region for very small m{sub χ} or the region opened up due to isospin violations.« less
48 CFR 1203.405 - Misrepresentations or violations of the Covenant Against Contingent Fees.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Misrepresentations or... System DEPARTMENT OF TRANSPORTATION GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF... violations of the covenant against contingent fees shall be coordinated with legal counsel for referral to...
45 CFR 1386.21 - Requirements and authority of the Protection and Advocacy System.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Protection and Advocacy of the Rights of Individuals with Developmental Disabilities § 1386.21 Requirements... with developmental disabilities to remedy abuse, neglect and violations of rights as well and... disabilities regarding rights violations. (f) A Protection and Advocacy System may exercise its authority under...
48 CFR 203.070 - Reporting of violations and suspected violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL..., Coordination of Remedies for Fraud and Corruption Related to Procurement Activities: (a) Certificate of...
Columbus system support for telescience operations
NASA Technical Reports Server (NTRS)
Lytton, David W.; Schulze, Rolf
1993-01-01
With the given constraints of the space environment, the telescience concept aims at providing a space mission user with optimum flexibility and responsiveness for spaceborne investigations. The concept includes automated system management functions, which allocate and monitor planned resources and time windows, within which the investigator can perform his science interactively responding 'on-line' to experimental data. During the telescience operation, the user is given the capability to send telecommands to the payload from the User Home Base with transparency to the rest of the system. Any violation of the 'booked' time and resources will be detected by the system and reported back to the user for appropriate action. Ultimately, the system will react to maintain the integrity of the system and its payload. Upon completion of the telescience session, the system management function reverses the system configuration and deallocates resources automatically.
40 CFR 141.203 - Tier 2 Public Notice-Form, manner, and frequency of notice.
Code of Federal Regulations, 2010 CFR
2010-07-01
... must provide the public notice as soon as practical, but no later than 30 days after the system learns... initial notice of up to three months from the date the system learns of the violation. It is not... as soon as practical but no later than 24 hours after the public water system learns of the violation...
40 CFR 141.203 - Tier 2 Public Notice-Form, manner, and frequency of notice.
Code of Federal Regulations, 2011 CFR
2011-07-01
... must provide the public notice as soon as practical, but no later than 30 days after the system learns... initial notice of up to three months from the date the system learns of the violation. It is not... as soon as practical but no later than 24 hours after the public water system learns of the violation...
NASA Astrophysics Data System (ADS)
Alameddine, Ibrahim; Karmakar, Subhankar; Qian, Song S.; Paerl, Hans W.; Reckhow, Kenneth H.
2013-10-01
The total maximum daily load program aims to monitor more than 40,000 standard violations in around 20,000 impaired water bodies across the United States. Given resource limitations, future monitoring efforts have to be hedged against the uncertainties in the monitored system, while taking into account existing knowledge. In that respect, we have developed a hierarchical spatiotemporal Bayesian model that can be used to optimize an existing monitoring network by retaining stations that provide the maximum amount of information, while identifying locations that would benefit from the addition of new stations. The model assumes the water quality parameters are adequately described by a joint matrix normal distribution. The adopted approach allows for a reduction in redundancies, while emphasizing information richness rather than data richness. The developed approach incorporates the concept of entropy to account for the associated uncertainties. Three different entropy-based criteria are adopted: total system entropy, chlorophyll-a standard violation entropy, and dissolved oxygen standard violation entropy. A multiple attribute decision making framework is adopted to integrate the competing design criteria and to generate a single optimal design. The approach is implemented on the water quality monitoring system of the Neuse River Estuary in North Carolina, USA. The model results indicate that the high priority monitoring areas identified by the total system entropy and the dissolved oxygen violation entropy criteria are largely coincident. The monitoring design based on the chlorophyll-a standard violation entropy proved to be less informative, given the low probabilities of violating the water quality standard in the estuary.
Inferring energy dissipation from violation of the fluctuation-dissipation theorem
NASA Astrophysics Data System (ADS)
Wang, Shou-Wen
2018-05-01
The Harada-Sasa equality elegantly connects the energy dissipation rate of a moving object with its measurable violation of the Fluctuation-Dissipation Theorem (FDT). Although proven for Langevin processes, its validity remains unclear for discrete Markov systems whose forward and backward transition rates respond asymmetrically to external perturbation. A typical example is a motor protein called kinesin. Here we show generally that the FDT violation persists surprisingly in the high-frequency limit due to the asymmetry, resulting in a divergent FDT violation integral and thus a complete breakdown of the Harada-Sasa equality. A renormalized FDT violation integral still well predicts the dissipation rate when each discrete transition produces a small entropy in the environment. Our study also suggests a way to infer this perturbation asymmetry based on the measurable high-frequency-limit FDT violation.
Asymptotic violation of Bell inequalities and distillability.
Masanes, Lluís
2006-08-04
A multipartite quantum state violates a Bell inequality asymptotically if, after jointly processing by general local operations an arbitrarily large number of copies of it, the result violates the inequality. In the bipartite case we show that asymptotic violation of the Clauser-Horne-Shimony-Holt inequality is equivalent to distillability. Hence, bound entangled states do not violate it. In the multipartite case we consider the complete set of full-correlation Bell inequalities with two dichotomic observables per site. We show that asymptotic violation of any of these inequalities by a multipartite state implies that pure-state entanglement can be distilled from it, although the corresponding distillation protocol may require that some of the parties join into several groups. We also obtain the extreme points of the set of distributions generated by measuring N quantum systems with two dichotomic observables per site.
A New Limit on Planck Scale Lorentz Violation from Gamma-ray Burst Polarization
NASA Technical Reports Server (NTRS)
Stecker, Floyd W.
2011-01-01
Constraints on possible Lorentz invariance violation (UV) to first order in E/M(sub Plank) for photons in the framework of effective field theory (EFT) are discussed, taking cosmological factors into account. Then. using the reported detection of polarized soft gamma-ray emission from the gamma-ray burst GRB041219a that is indicative' of an absence of vacuum birefringence, together with a very recent improved method for estimating the redshift of the burst, we derive constraints on the dimension 5 Lorentz violating modification to the Lagrangian of an effective local QFT for QED. Our new constraints are more than five orders of magnitude better than recent constraints from observations of the Crab Nebula.. We obtain the upper limit on the Lorentz violating dimension 5 EFT parameter absolute value of zeta of 2.4 x 10(exp -15), corresponding to a constraint on the dimension 5 standard model extension parameter. Kappa (sup 5) (sub (v)oo) much less than 4.2 X 10(exp -3)4 / GeV.
Domahs, Ulrike; Klein, Elise; Huber, Walter; Domahs, Frank
2013-06-01
Using a stress violation paradigm, we investigated whether metrical feet constrain the way prosodic patterns are processed and evaluated. Processing of correctly versus incorrectly stressed words was associated with activation in left posterior angular and retrosplenial cortex, indicating the recognition of an expected and familiar pattern, whereas the inverse contrast yielded enhanced bilateral activation in the superior temporal gyrus, reflecting higher costs in auditory (re-)analysis. More fine-grained analyses of severe versus mild stress violations revealed activations of the left superior temporal and left anterior angular gyrus whereas the opposite contrast led to frontal activations including Broca's area and its right-hemisphere homologue, suggesting that detection of mild violations lead to increased effort in working memory and deeper phonological processing. Our results provide first evidence that different incorrect stress patterns are processed in a qualitatively different way and that the underlying foot structure seems to determine potential stress positions in German words. Copyright © 2013 Elsevier Inc. All rights reserved.
48 CFR 3.502-2 - Subcontractor kickbacks.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the consequences of detection; procurement procedures to minimize the opportunity for kickbacks; audit... gifts or gratuities received from subcontractors; annual employee declarations that they have violated...
Seismological Investigations of the National Data Centre Preparedness Exercise 2015 (NPE2015)
NASA Astrophysics Data System (ADS)
Gestermann, Nicolai; Hartmann, Gernot; Ross, Jens-Ole
2017-04-01
The Comprehensive Nuclear-Test-Ban Treaty (CTBT) prohibits all kinds of nuclear explosions. For the detection of treaty violations the International Monitoring System (IMS) operates stations observing seismic, hydroacoustic, and infrasound signals as well as radioisotopes in the atmosphere. While the IMS data is collected, processed and technically analyzed in the International Data Center (IDC) of the CTBT-Organization, National Data Centers (NDC) provide interpretation and advice to their government concerning suspicious detections occurring in IMS data. The National Data Centre Preparedness Exercises (NPE) are regularly performed dealing with fictitious treaty violations to practice the combined analysis of CTBT verification technologies and national technical means. These exercises should help to evaluate the effectiveness of analysis procedures applied at NDCs and the quality, completeness and usefulness of IDC products. The NPE2015 is a combined radionuclide-waveform scenario. Fictitious particulate radionuclide and radioxenon measurements at stations of the IMS (International Monitoring System) of the CTBTO were reported to the international community. The type of isotopes and concentrations could arise from an underground nuclear explosion (UNE). The task of the exercise is to identify the scenario behind the provided data. The source region and time domain of a possible treaty violation activity was determined from ATM in backtracking mode with input data from the fictitious data. A time slot in October and a region around the mining area of Lubin could be identified as the possible source area of the fictitious measurements. The seismicity of the determined source region was investigated in detail to identify events which cannot be classified as natural or induced within the relevant time interval. The comparison of spectral characteristics and a cluster analysis was applied to search for a non-characteristic event within a number of known induced events in the area. The results reveal that none of the candidate events had an explosion like characteristic. All candidate events are part of event cluster with a minimum of seven events with comparable signature. The possibility of a treaty violation would be very low in a real scenario. If the nature of a suspicious event cannot be clarified with data of the IMS or national technical means, an on-site inspection (OSI) can be requested by the member states. Taking into account the results of the seismological investigations it could be decided that an OSI is not necessary for the possible source region to exclude the possibility of a fictitious clandestine underground nuclear explosion.
Lopez-Martin, Manuel; Carro, Belen; Sanchez-Esguevillas, Antonio; Lloret, Jaime
2017-08-26
The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host's network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery.
Carro, Belen; Sanchez-Esguevillas, Antonio
2017-01-01
The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host’s network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery. PMID:28846608
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
... becomes ``systemic as well as intentional or willful.'' In response, FINRA noted that inclusion of a rule... the rules of a Registered Securities Association enforce compliance with, and provide appropriate... FINRA should only consider a member's activity a rule violation if the violation becomes systemic as...
Brown, B J; Emery, R J; Stock, T H; Lee, E S
2004-03-01
Inspection outcome data provided by the state of Washington Department of Health, Division of Radiation Protection, for licensees of radioactive materials was encoded according to a system established by the Texas Department of Health, Bureau of Radiation Control. The data, representing calendar year 1999 inspection activities, were then analyzed and the results compared to previously published studies for the same year in the states of Texas and Maine. Despite significant differences in regulatory program size, age, and geographic proximity, the most frequently cited violation for radioactive materials licensees were shown to be similar for all three states. Of particular note were the violations that were identified to be consistently issued in all three states. These included physical inventories and utilization logs not performed, not available, or incomplete; leak testing not performed or not performed on schedule; inadequate or unapproved operating and safety procedures; radiation survey and disposal records not available or incomplete; detection or measurement instrument calibration not performed or records not available; and radiation surveys or sampling not performed or performed with a noncalibrated instrument. Comparisons were made in an attempt to generate a summary of the most commonly issued violations that could be generalized to users of radioactive materials across the United States. A generalized list of common violations would be an invaluable tool for radiation protection programs, serving to aid in the reduction of the overall instance of program non-compliance. Any reduction in instances of non-compliance would result in the conservation of finite public health resources that might then be directed to other pressing public health matters.
NASA Astrophysics Data System (ADS)
Xing, Zhou
The large hadron collider (LHC) at the European Organization for Nuclear Research (CERN) in Geneva is the world's largest and highest-energy particle accelerator. It is located in a tunnel with a circumference of 27 kilometers (17 miles) whose synchrotron is designed to mainly collide opposing particle beams of protons with energy up to 7 TeV in 2011 and 8 TeV in 2012. LHC is designed to address some of the fundamental open questions in physics regarding the basic laws governing the interactions and forces among the elementary particles. Among the four major experiments at LHC: A Toroidal LHC Apparatus (ATLAS), Compact Muon Solenoid (CMS), Large Hadron Collider beauty (LHCb) and A Large Ion Collider Experiment (ALICE), LHCb is the one that is specialized on heavy flavor physics whose goal is to measure the Charge Parity Violation (CPV) parameters and rare decays of the Beauty and Charm hadrons. Such studies can help to explain the Matter-Antimatter asymmetry of the Universe. CP violation searches are performed at LHCb in quite a few probing decay channels and systems. In B0s-B0s mixing, the CP violation is expected to be tiny in the Standard Model, but can be significantly enhanced in the presence of new CP violation phases in general physics models. This thesis presents, in Chapter 5, the measurement of semileptonic asymmetry assl in B0s-B0s mixing system at LHCb. The CP-violating asymmetry assl is studied using samples of B0s and B0s semileptonic decays in pp collisions at a centre-of-mass energy of 7 TeV using a data sample, corresponding to an integrated luminosity of 1 fb-1 collected by LHCb. The detected final states are D+/-sm∓ , with the D+/-s particle reconstructed in the φpi+/- mode. The D+/-sm∓ yields are summed over untagged B0s and B0s initial states, and integrated with respect to decay time. Data-driven methods are used to measure all the efficiency ratios needed to determine assl . We obtain assl = (-0.06 +/- 0.50 +/- 0.36)%, where the first uncertainty is statistical and the second systematic. Specific attention is drawn to an elegant data-driven approach that is developed to determine the relative pion detection efficiency as described in Chapter 3. It is a key building block of the assl measurement and can open many other doors to CP searches at LHCb. As a "litmus test" for this tool, we measure the D+s-D-s production asymmetry using φpi+/- mode in 7 TeV pp collisions at LHC in Chapter 4. Heavy quark production in 7 TeV center-of-mass energy of pp collisions at the LHC is not necessarily flavor symmetric. The production asymmetry, AP, between D+s and D-s mesons is studied using the φpi+/- decay mode in a data sample of 1.0 fb-1 collected with the LHCb detector. The difference between pi+ and pi -- detection efficiencies is determined using the ratios of fully reconstructed to partially reconstructed D*+/- decays. The overall production asymmetry in the D+/-s rapidity region 2.0 to 4.5 with transverse momentum larger than 2 GeV is measured to be AP=(-0.33 +/- 0.22 +/- 0.10)%. While theoretical predictions are difficult and vague, a precise measure of the production asymmetry constrains future heavy quark models and can be used as inputs for other CP measurements.
McGowan, Conor P.; Gardner, Beth
2013-01-01
Estimating productivity for precocial species can be difficult because young birds leave their nest within hours or days of hatching and detectability thereafter can be very low. Recently, a method for using a modified catch-curve to estimate precocial chick daily survival for age based count data was presented using Piping Plover (Charadrius melodus) data from the Missouri River. However, many of the assumptions of the catch-curve approach were not fully evaluated for precocial chicks. We developed a simulation model to mimic Piping Plovers, a fairly representative shorebird, and age-based count-data collection. Using the simulated data, we calculated daily survival estimates and compared them with the known daily survival rates from the simulation model. We conducted these comparisons under different sampling scenarios where the ecological and statistical assumptions had been violated. Overall, the daily survival estimates calculated from the simulated data corresponded well with true survival rates of the simulation. Violating the accurate aging and the independence assumptions did not result in biased daily survival estimates, whereas unequal detection for younger or older birds and violating the birth death equilibrium did result in estimator bias. Assuring that all ages are equally detectable and timing data collection to approximately meet the birth death equilibrium are key to the successful use of this method for precocial shorebirds.
NASA Astrophysics Data System (ADS)
Reiser, Andreas; Schubert, Klaus R.; Stiewe, Jürgen
2012-08-01
Weak interactions break time-reversal (T) symmetry in the two-state system of neutral K-mesons. We present and discuss a two-state mechanical system, i.e. a Foucault-type pendulum on a rotating table, for a full representation of {K^0}{{\\overlineK}{}^0} transitions by the pendulum motions including T violation. The pendulum moves with two different oscillation frequencies and two different magnetic dampings. Its equation of motion is identical to the differential equation for the real part of the CPT-symmetric K-meson wavefunction. The pendulum is able to represent microscopic CP and T violation with CPT symmetry owing to the macroscopic Coriolis force, which breaks the symmetry under reversal-of-motion. Video clips of the pendulum motions are given as supplementary material.
Short-Term State Forecasting-Based Optimal Voltage Regulation in Distribution Systems: Preprint
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Rui; Jiang, Huaiguang; Zhang, Yingchen
2017-05-17
A novel short-term state forecasting-based optimal power flow (OPF) approach for distribution system voltage regulation is proposed in this paper. An extreme learning machine (ELM) based state forecaster is developed to accurately predict system states (voltage magnitudes and angles) in the near future. Based on the forecast system states, a dynamically weighted three-phase AC OPF problem is formulated to minimize the voltage violations with higher penalization on buses which are forecast to have higher voltage violations in the near future. By solving the proposed OPF problem, the controllable resources in the system are optimally coordinated to alleviate the potential severemore » voltage violations and improve the overall voltage profile. The proposed approach has been tested in a 12-bus distribution system and simulation results are presented to demonstrate the performance of the proposed approach.« less
NASA Technical Reports Server (NTRS)
Fish, B. R. (Principal Investigator)
1977-01-01
The author has identified the following significant results. Surface mining violation estimates were scaled by scores assigned by ten inspectors from western Kentucky to each violation. A sensitivity analysis was made by varying the violation costs; costs were varied by using three different average durations. These durations were: (1) best estimated duration; (2) longest possible duration as restricted by the one year permit renewal and bond release regulations, and (3) shortest possible duration when inspections were made. If a social cost cannot be reduced, then the value of the social cost is irrelevant. Indications from the increased inspection rate of 1975 were that the total amount of fines collected per year remains constant independent of the increased detection rate.
Using Runtime Analysis to Guide Model Checking of Java Programs
NASA Technical Reports Server (NTRS)
Havelund, Klaus; Norvig, Peter (Technical Monitor)
2001-01-01
This paper describes how two runtime analysis algorithms, an existing data race detection algorithm and a new deadlock detection algorithm, have been implemented to analyze Java programs. Runtime analysis is based on the idea of executing the program once. and observing the generated run to extract various kinds of information. This information can then be used to predict whether other different runs may violate some properties of interest, in addition of course to demonstrate whether the generated run itself violates such properties. These runtime analyses can be performed stand-alone to generate a set of warnings. It is furthermore demonstrated how these warnings can be used to guide a model checker, thereby reducing the search space. The described techniques have been implemented in the b e grown Java model checker called PathFinder.
Schaarup, Clara; Hejlesen, Ole Kristian
2016-01-01
Objective. The aim of the present study is to evaluate the usability of the telehealth system, coined Telekit, by using an iterative, mixed usability approach. Materials and Methods. Ten double experts participated in two heuristic evaluations (HE1, HE2), and 11 COPD patients attended two think-aloud tests. The double experts identified usability violations and classified them into Jakob Nielsen's heuristics. These violations were then translated into measurable values on a scale of 0 to 4 indicating degree of severity. In the think-aloud tests, COPD participants were invited to verbalise their thoughts. Results. The double experts identified 86 usability violations in HE1 and 101 usability violations in HE2. The majority of the violations were rated in the 0–2 range. The findings from the think-aloud tests resulted in 12 themes and associated examples regarding the usability of the Telekit system. The use of the iterative, mixed usability approach produced both quantitative and qualitative results. Conclusion. The iterative, mixed usability approach yields a strong result owing to the high number of problems identified in the tests because the double experts and the COPD participants focus on different aspects of Telekit's usability. This trial is registered with Clinicaltrials.gov, NCT01984840, November 14, 2013. PMID:27974888
Lilholt, Pernille Heyckendorff; Schaarup, Clara; Hejlesen, Ole Kristian
2016-01-01
Objective . The aim of the present study is to evaluate the usability of the telehealth system, coined Telekit, by using an iterative, mixed usability approach. Materials and Methods . Ten double experts participated in two heuristic evaluations (HE1, HE2), and 11 COPD patients attended two think-aloud tests. The double experts identified usability violations and classified them into Jakob Nielsen's heuristics. These violations were then translated into measurable values on a scale of 0 to 4 indicating degree of severity. In the think-aloud tests, COPD participants were invited to verbalise their thoughts. Results . The double experts identified 86 usability violations in HE1 and 101 usability violations in HE2. The majority of the violations were rated in the 0-2 range. The findings from the think-aloud tests resulted in 12 themes and associated examples regarding the usability of the Telekit system. The use of the iterative, mixed usability approach produced both quantitative and qualitative results. Conclusion . The iterative, mixed usability approach yields a strong result owing to the high number of problems identified in the tests because the double experts and the COPD participants focus on different aspects of Telekit's usability. This trial is registered with Clinicaltrials.gov, NCT01984840, November 14, 2013.
Ship recycling and marine pollution.
Chang, Yen-Chiang; Wang, Nannan; Durak, Onur Sabri
2010-09-01
This paper discusses the historical background, structure and enforcement of the '2009 Hong Kong International Convention on the Safe and Environmentally Sound Recycling of Ships.' the 2009 Hong Kong Convention establishes control and enforcement instruments related to ship recycling, determining the control rights of Port States and the obligations of Flag States, Parties and recycling facilities under its jurisdiction. The Convention also controls the communication and exchange of information procedures, establishes a reporting system to be used upon the completion of recycling, and outlines an auditing system for detecting violations. The Convention, however, also contains some deficiencies. This paper concludes these deficiencies will eventually influence the final acceptance of this Convention by the international community. Copyright 2010 Elsevier Ltd. All rights reserved.
Family of nonlocal bound entangled states
NASA Astrophysics Data System (ADS)
Yu, Sixia; Oh, C. H.
2017-03-01
Bound entanglement, being entangled yet not distillable, is essential to our understanding of the relations between nonlocality and entanglement besides its applications in certain quantum information tasks. Recently, bound entangled states that violate a Bell inequality have been constructed for a two-qutrit system, disproving a conjecture by Peres that bound entanglement is local. Here we construct this kind of nonlocal bound entangled state for all finite dimensions larger than two, making possible their experimental demonstration in most general systems. We propose a Bell inequality, based on a Hardy-type argument for nonlocality, and a steering inequality to identify their nonlocality. We also provide a family of entanglement witnesses to detect their entanglement beyond the Bell inequality and the steering inequality.
Code of Federal Regulations, 2010 CFR
2010-01-01
... resulting in a violation of the Bank Holding Company Act. 225.134 Section 225.134 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM BANK HOLDING COMPANIES AND CHANGE IN BANK CONTROL (REGULATION Y) Regulations Financial Holding Companies Interpretations § 225.134...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-24
... approach for the planning grants would be consistent with DOT and HUD's participation in the ``Partnership... applicant: 1. Have received a charge from HUD concerning a systemic violation of the Fair Housing Act or a... systemic violation of a substantially equivalent state or local fair housing law proscribing discrimination...
Lorentz and CPT Tests with Atoms
NASA Astrophysics Data System (ADS)
Vargas Silva, Arnaldo J.
The prospects for using atomic-spectroscopy experiments to test Lorentz and CPT symmetry are investigated. Phenomenological models for Lorentz violation studied in this work include ones with contributions from all quadratic operators for a Dirac fermion in the Lagrange density of the Standard-Model Extension (SME), without restriction on the operator mass dimension. The systems considered include atoms composed of conventional matter, antimatter, and second-generation particles. Generic expressions for the Lorentz-violating energy shifts applicable to a broad range of atomic transitions are obtained. Signals for Lorentz violation that can in principle be studied in spectroscopic experiments are identified from the theoretical corrections to the spectrum. Some of these signals include sidereal and annual variations of atomic transition frequencies measured in a laboratory on the surface of the Earth. Other possibilities include effects produced by changing the orientation of the applied magnetic field or by realizing space-based experiments. Discrepancies in the experimental values for fundamental constants and energy levels based on self-consistent predictions from the Standard Model also offer potential signals for Lorentz violation. The sensitivities of different experiments to distinct sets of coefficients for Lorentz violation are considered. Using atoms composed of different particle species allows measurements of coefficients for Lorentz violation in different fermion sectors of the SME. Experiments comparing hydrogen and antihydrogen can discriminate between coefficients for Lorentz violation that are associated with CPT-odd or CPT-even operators. Additionally, certain systems and transitions are more sensitive to nonminimal operators, while others are particularly sensitive to minimal ones.
Increasing the efficiency of photon collection in LArTPCs: the ARAPUCA light trap
NASA Astrophysics Data System (ADS)
Cancelo, G.; Cavanna, F.; Escobar, C. O.; Kemp, E.; Machado, A. A.; Para, A.; Segreto, E.; Totani, D.; Warner, D.
2018-03-01
The Liquid Argon Time Projection Chambers (LArTPCs) are a choice for the next generation of large neutrino detectors due to their optimal performance in particle tracking and calorimetry. The detection of Argon scintillation light plays a crucial role in the event reconstruction as well as the time reference for non-beam physics such as supernovae neutrino detection and baryon number violation studies. In this contribution, we present the current R&D work on the ARAPUCA (Argon R&D Advanced Program at UNICAMP), a light trap device to enhance Ar scintillation light collection and thus the overall performance of LArTPCs. The ARAPUCA working principle is based on a suitable combination of dichroic filters and wavelength shifters to achieve a high efficiency in light collection. We discuss the operational principles, the last results of laboratory tests and the application of the ARAPUCA as the alternative photon detection system in the protoDUNE detector.
Rewriting Modulo SMT and Open System Analysis
NASA Technical Reports Server (NTRS)
Rocha, Camilo; Meseguer, Jose; Munoz, Cesar
2014-01-01
This paper proposes rewriting modulo SMT, a new technique that combines the power of SMT solving, rewriting modulo theories, and model checking. Rewriting modulo SMT is ideally suited to model and analyze infinite-state open systems, i.e., systems that interact with a non-deterministic environment. Such systems exhibit both internal non-determinism, which is proper to the system, and external non-determinism, which is due to the environment. In a reflective formalism, such as rewriting logic, rewriting modulo SMT can be reduced to standard rewriting. Hence, rewriting modulo SMT naturally extends rewriting-based reachability analysis techniques, which are available for closed systems, to open systems. The proposed technique is illustrated with the formal analysis of: (i) a real-time system that is beyond the scope of timed-automata methods and (ii) automatic detection of reachability violations in a synchronous language developed to support autonomous spacecraft operations.
DC conductivity with external magnetic field in hyperscaling violating geometry
NASA Astrophysics Data System (ADS)
Bhatnagar, Neha; Siwach, Sanjay
2018-02-01
We investigate the holographic DC conductivity of (2+1)-dimensional systems while considering hyperscaling violating geometry in bulk. We consider Einstein-Maxwell-dilaton system with two gauge fields and Liouville-type potential for dilaton. We also consider axionic fields in bulk to introduce momentum relaxation in the system. We apply an external magnetic field to study the response of the system and obtain analytic expressions for DC conductivity, Hall angle and (thermo)electric conductivity.
Hétu, Sébastien; Luo, Yi; D’Ardenne, Kimberlee; Lohrenz, Terry
2017-01-01
Abstract As models of shared expectations, social norms play an essential role in our societies. Since our social environment is changing constantly, our internal models of it also need to change. In humans, there is mounting evidence that neural structures such as the insula and the ventral striatum are involved in detecting norm violation and updating internal models. However, because of methodological challenges, little is known about the possible involvement of midbrain structures in detecting norm violation and updating internal models of our norms. Here, we used high-resolution cardiac-gated functional magnetic resonance imaging and a norm adaptation paradigm in healthy adults to investigate the role of the substantia nigra/ventral tegmental area (SN/VTA) complex in tracking signals related to norm violation that can be used to update internal norms. We show that the SN/VTA codes for the norm’s variance prediction error (PE) and norm PE with spatially distinct regions coding for negative and positive norm PE. These results point to a common role played by the SN/VTA complex in supporting both simple reward-based and social decision making. PMID:28981876
A Bell inequality for a class of multilocal ring networks
NASA Astrophysics Data System (ADS)
Frey, Michael
2017-11-01
Quantum networks with independent sources of entanglement (hidden variables) and nodes that execute joint quantum measurements can create strong quantum correlations spanning the breadth of the network. Understanding of these correlations has to the present been limited to standard Bell experiments with one source of shared randomness, bilocal arrangements having two local sources of shared randomness, and multilocal networks with tree topologies. We introduce here a class of quantum networks with ring topologies comprised of subsystems each with its own internally shared source of randomness. We prove a Bell inequality for these networks, and to demonstrate violations of this inequality, we focus on ring networks with three-qubit subsystems. Three qubits are capable of two non-equivalent types of entanglement, GHZ and W-type. For rings of any number N of three-qubit subsystems, our inequality is violated when the subsystems are each internally GHZ-entangled. This violation is consistently stronger when N is even. This quantitative even-odd difference for GHZ entanglement becomes extreme in the case of W-type entanglement. When the ring size N is even, the presence of W-type entanglement is successfully detected; when N is odd, the inequality consistently fails to detect its presence.
Occupancy estimation and the closure assumption
Rota, Christopher T.; Fletcher, Robert J.; Dorazio, Robert M.; Betts, Matthew G.
2009-01-01
1. Recent advances in occupancy estimation that adjust for imperfect detection have provided substantial improvements over traditional approaches and are receiving considerable use in applied ecology. To estimate and adjust for detectability, occupancy modelling requires multiple surveys at a site and requires the assumption of 'closure' between surveys, i.e. no changes in occupancy between surveys. Violations of this assumption could bias parameter estimates; however, little work has assessed model sensitivity to violations of this assumption or how commonly such violations occur in nature. 2. We apply a modelling procedure that can test for closure to two avian point-count data sets in Montana and New Hampshire, USA, that exemplify time-scales at which closure is often assumed. These data sets illustrate different sampling designs that allow testing for closure but are currently rarely employed in field investigations. Using a simulation study, we then evaluate the sensitivity of parameter estimates to changes in site occupancy and evaluate a power analysis developed for sampling designs that is aimed at limiting the likelihood of closure. 3. Application of our approach to point-count data indicates that habitats may frequently be open to changes in site occupancy at time-scales typical of many occupancy investigations, with 71% and 100% of species investigated in Montana and New Hampshire respectively, showing violation of closure across time periods of 3 weeks and 8 days respectively. 4. Simulations suggest that models assuming closure are sensitive to changes in occupancy. Power analyses further suggest that the modelling procedure we apply can effectively test for closure. 5. Synthesis and applications. Our demonstration that sites may be open to changes in site occupancy over time-scales typical of many occupancy investigations, combined with the sensitivity of models to violations of the closure assumption, highlights the importance of properly addressing the closure assumption in both sampling designs and analysis. Furthermore, inappropriately applying closed models could have negative consequences when monitoring rare or declining species for conservation and management decisions, because violations of closure typically lead to overestimates of the probability of occurrence.
TESTING FOR CPT VIOLATION IN B0s SEMILEPTONIC DECAYS
NASA Astrophysics Data System (ADS)
Kooten, R. Van
2014-01-01
A DØ analysis measuring the charge asymmetry Absl of like-sign dimuon events due to semileptonic b-hadron decays at the Fermilab Tevatron Collider has shown indications of possible anomalous CP violation in the mixing of neutral B mesons. This result has been used to extract the first senstivity to CPT violation in the B0s system. An analysis to explore further this anomaly by specifically measuring the semileptonic charge asymmetry, assl, in B0s decays is described, as well as how a variant of this analysis can be used to explore a larger set of CPT-violating parameters in the B0s system for the first time.
Quantum voting and violation of Arrow's impossibility theorem
NASA Astrophysics Data System (ADS)
Bao, Ning; Yunger Halpern, Nicole
2017-06-01
We propose a quantum voting system in the spirit of quantum games such as the quantum prisoner's dilemma. Our scheme enables a constitution to violate a quantum analog of Arrow's impossibility theorem. Arrow's theorem is a claim proved deductively in economics: Every (classical) constitution endowed with three innocuous-seeming properties is a dictatorship. We construct quantum analogs of constitutions, of the properties, and of Arrow's theorem. A quantum version of majority rule, we show, violates this quantum Arrow conjecture. Our voting system allows for tactical-voting strategies reliant on entanglement, interference, and superpositions. This contribution to quantum game theory helps elucidate how quantum phenomena can be harnessed for strategic advantage.
Hoag, Linda A; Bedrosian, Jan L; McCoy, Kathleen F; Johnson, Dallas E
2008-01-01
This study examined the effects of using messages with conversational rule violations on attitudes toward people who used utterance-based augmentative and alternative communication (AAC) systems in transactional interactions. Specifically, the ratings were compared across messages with relevance, informativeness, and brevity violations, when latency remained constant (i.e., short). The 96 participating sales clerks viewed scripted, videotaped bookstore conversations and completed an attitude questionnaire. Results indicated that the prestored message with repeated words/phrases was rated the highest, followed by the message with excessive information; next was the message with inadequate information, followed by the message with partly relevant information. The findings may be useful to those using utterance-based systems when making message choices during interactions with service providers. Technological implications point to the development of schema/script-based systems and intelligent editing.
Search for the lepton-flavor-violating leptonic B(0)-->mu(+/-)tau(-/+) and B(0)-->e(+/-)tau(-/+).
Bornheim, A; Lipeles, E; Pappas, S P; Weinstein, A J; Briere, R A; Chen, G P; Ferguson, T; Tatishvili, G; Vogel, H; Watkins, M E; Adam, N E; Alexander, J P; Berkelman, K; Cassel, D G; Duboscq, J E; Ecklund, K M; Ehrlich, R; Fields, L; Galik, R S; Gibbons, L; Gittelman, B; Gray, R; Gray, S W; Hartill, D L; Heltsley, B K; Hertz, D; Hsu, L; Jones, C D; Kandaswamy, J; Kreinick, D L; Kuznetsov, V E; Mahlke-Krüger, H; Meyer, T O; Onyisi, P U E; Patterson, J R; Peterson, D; Pivarski, J; Riley, D; Rosner, J L; Ryd, A; Sadoff, A J; Schwarthoff, H; Shepherd, M R; Sun, W M; Thayer, J G; Urner, D; Wilksen, T; Weinberger, M; Athar, S B; Avery, P; Breva-Newell, L; Patel, R; Potlia, V; Stoeck, H; Yelton, J; Rubin, P; Cawlfield, C; Eisenstein, B I; Gollin, G D; Karliner, I; Kim, D; Lowrey, N; Naik, P; Sedlack, C; Selen, M; Thaler, J J; Williams, J; Wiss, J; Edwards, K W; Besson, D; Gao, K Y; Gong, D T; Kubota, Y; Li, S Z; Poling, R; Scott, A W; Smith, A; Stepaniak, C J; Urheim, J; Metreveli, Z; Seth, K K; Tomaradze, A; Zweber, P; Ernst, J; Arms, K; Gan, K K; Severini, H; Skubic, P; Asner, D M; Dytman, S A; Mehrabyan, S; Mueller, J A; Savinov, V; Li, Z; Lopez, A; Mendez, H; Ramirez, J; Huang, G S; Miller, D H; Pavlunin, V; Sanghi, B; Shibata, E I; Shipsey, I P J; Adams, G S; Chasse, M; Cummings, J P; Danko, I; Napolitano, J; Cronin-Hennessy, D; Park, C S; Park, W; Thayer, J B; Thorndike, E H; Coan, T E; Gao, Y S; Liu, F; Stroynowski, R; Artuso, M; Boulahouache, C; Blusk, S; Butt, J; Dambasuren, E; Dorjkhaidav, O; Menaa, N; Mountain, R; Muramatsu, H; Nandakumar, R; Redjimi, R; Sia, R; Skwarnicki, T; Stone, S; Wang, J C; Zhang, K; Mahmood, A H; Csorna, S E; Bonvicini, G; Cinabro, D; Dubrovin, M
2004-12-10
We have searched a sample of 9.6 x 10(6) BB events for the lepton-flavor-violating leptonic B decays, B(0)-->mu(+/-)tau(-/+) and B(0)-->e(+/-)tau(-/+). The tau lepton was detected through the decay modes tau-->lnunu(-) , where l=e, mu. There is no indication of a signal, and we obtain the 90% confidence level upper limits B(B(0)-->mu(+/-)tau(-/+))<3.8 x 10(-5) and B(B(0)-->e(+/-)tau(-/+))<1.3 x 10(-4).
Policy-Aware Content Reuse on the Web
NASA Astrophysics Data System (ADS)
Seneviratne, Oshani; Kagal, Lalana; Berners-Lee, Tim
The Web allows users to share their work very effectively leading to the rapid re-use and remixing of content on the Web including text, images, and videos. Scientific research data, social networks, blogs, photo sharing sites and other such applications known collectively as the Social Web have lots of increasingly complex information. Such information from several Web pages can be very easily aggregated, mashed up and presented in other Web pages. Content generation of this nature inevitably leads to many copyright and license violations, motivating research into effective methods to detect and prevent such violations.
Maggi, Claudio; Paoluzzi, Matteo; Angelani, Luca; Di Leonardo, Roberto
2017-12-14
We investigate experimentally and numerically the stochastic dynamics and the time-dependent response of colloids subject to a small external perturbation in a dense bath of motile E. coli bacteria. The external field is a magnetic field acting on a superparamagnetic microbead suspended in an active medium. The measured linear response reveals an instantaneous friction kernel despite the complexity of the bacterial bath. By comparing the mean squared displacement and the response function we detect a clear violation of the fluctuation dissipation theorem.
Pilot Alcohol Violations Reported in U.S. Newspapers, 1990–2006
Kraus, Chadd K.; Li, Guohua
2009-01-01
Introduction Alcohol violations by airline pilots are rare yet remain a public concern. Such incidents often generate widespread news coverage. This study examines the frequency and characteristics of alcohol violation incidents involving airline pilots reported in U.S. newspapers. Methods The database of Lexis-Nexis™, which contains full-text articles for over 350 newspapers, was searched to identify alcohol violation incidents involving airline pilots in the U.S. between January 1990 and June 2006. Information pertaining to the pilot, flight, blood alcohol concentration (BAC), and consequence was ascertained for each incident based on the newspaper coverage. Results During the study period, newspapers reported on a total of 13 incidents of alcohol violations involving 17 pilots. All but two of the incidents occurred during January 2002 through June 2006. The majority (85%) of the incidents were first identified by airport personnel, such as security screeners, based on suspicion of alcohol use by the pilot. Subsequent alcohol testing revealed a mean BAC of 90 mg/dL (ranging from 10 mg · dL−1 to 182 mg · dL−1). Of the 17 pilots, 6 were known to be prosecuted criminally, including 5 who were sentenced to jail terms. Discussion Incidents of alcohol violations by airline pilots reported in U.S. newspapers have increased in recent years. This increase is likely due in part to increased detection resulting from enhanced aviation security and enforcement following the September 2001 terrorist attacks. PMID:17183928
NASA Astrophysics Data System (ADS)
Emary, Clive; Lambert, Neill; Nori, Franco
2014-01-01
In contrast to the spatial Bell's inequalities which probe entanglement between spatially separated systems, the Leggett-Garg inequalities test the correlations of a single system measured at different times. Violation of a genuine Leggett-Garg test implies either the absence of a realistic description of the system or the impossibility of measuring the system without disturbing it. Quantum mechanics violates the inequalities on both accounts and the original motivation for these inequalities was as a test for quantum coherence in macroscopic systems. The last few years has seen a number of experimental tests and violations of these inequalities in a variety of microscopic systems such as superconducting qubits, nuclear spins, and photons. In this article, we provide an introduction to the Leggett-Garg inequalities and review these latest experimental developments. We discuss important topics such as the significance of the non-invasive measurability assumption, the clumsiness loophole, and the role of weak measurements. Also covered are some recent theoretical proposals for the application of Leggett-Garg inequalities in quantum transport, quantum biology and nano-mechanical systems.
Factors associated with civilian drivers involved in crashes with emergency vehicles.
Drucker, Christopher; Gerberich, Susan G; Manser, Michael P; Alexander, Bruce H; Church, Timothy R; Ryan, Andrew D; Becic, Ensar
2013-06-01
Motor vehicle crashes involving civilian and emergency vehicles (EVs) have been a known problem that contributes to fatal and nonfatal injuries; however, characteristics associated with civilian drivers have not been examined adequately. This study used data from The National Highway Traffic Safety Administration's Fatality Analysis Reporting System and the National Automotive Sampling System General Estimates System to identify driver, roadway, environmental, and crash factors, and consequences for civilian drivers involved in fatal and nonfatal crashes with in-use and in-transport EVs. In general, drivers involved in emergency-civilian crashes (ECCs) were more often driving: straight through intersections (vs. same direction) of four-points or more (vs. not at intersection); where traffic signals were present (vs. no traffic control device); and at night (vs. midday). For nonfatal ECCs, drivers were more often driving: distracted (vs. not distracted); with vision obstructed by external objects (vs. no obstruction); on dark but lighted roads (vs. daylight); and in opposite directions (vs. same directions) of the EVs. Consequences included increased risk of injury (vs. no injury) and receiving traffic violations (vs. no violation). Fatal ECCs were associated with driving on urban roads (vs. rural), although these types of crashes were less likely to occur on dark roads (vs. daylight). The findings of this study suggest drivers may have difficulties in visually detecting EVs in different environments. Copyright © 2013 Elsevier Ltd. All rights reserved.
Quantum contextuality in N-boson systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Benatti, Fabio; Istituto Nazionale di Fisica Nucleare, Sezione di Trieste, I-34014 Trieste; Floreanini, Roberto
2011-09-15
Quantum contextuality in systems of identical bosonic particles is explicitly exhibited via the maximum violation of a suitable inequality of Clauser-Horne-Shimony-Holt type. Unlike the approaches considered so far, which make use of single-particle observables, our analysis involves collective observables constructed using multiboson operators. An exemplifying scheme to test this violation with a quantum optical setup is also discussed.
White paper : the fourth amendment : implications for radiological and nuclear detection.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Levey, Brandon Seth
The need to improve the radiation detection architecture has given rise to increased concern over the potential of equipment or procedures to violate the Fourth Amendment. Protecting the rights guaranteed by the Constitution is a foremost value of every government agency. However, protecting U.S. residents and assets from potentially catastrophic threats is also a crucial role of government. In the absence of clear precedent, the fear of potentially violating rights could lead to the rejection of effective and reasonable means that could reduce risks, possibly savings lives and assets. The goal of this document is not to apply case lawmore » to determine what the precedent may be if it exists, but rather provide a detailed outline that defines searches and seizures, identifies what precedent exists and what precedent doesn't exist, and explore what the existing (and non-existing) precedent means for the use of radiation detection used inside the nation's borders.« less
The MTV experiment: searching for T-violation in polarized Li-8 at TRIUMF
NASA Astrophysics Data System (ADS)
Murata, J.; Baba, H.; Behr, J. A.; Goto, F.; Inaba, S.; Kawamura, H.; Kitaguchi, M.; Levy, C. D. P.; Masuda, H.; Nakaya, Y.; Ninomiya, K.; Onishi, J.; Openshaw, R.; Pearson, M.; Sakamoto, Y.; Shimizu, H.; Shimizu, Y.; Tanaka, S.; Tanaka, Y.; Tanuma, R.; Totsuka, Y.; Watanabe, E.; Yokohashi, M.
2016-12-01
The MTV experiment ( Mott Polarimetry for T- Violation Experiment) is running at TRIUMF, to search for a large T-violating transverse electron-polarization in polarized 8Li β-decay. We aim at reaching precision of 10-4 for the R-correlation, which is defined as a T-violating triple vector correlation in the β-decay rate function. A Mott polarimeter system using a CDC ( Cylindrical Drift Chamber) is used to measure the left-right scattering asymmetry in the Mott scattering from a thin metal foil. In the present study, we aim to discuss systematic effects in Mott polarimetry using the CDC.
Use of automated enforcement for red light violations
DOT National Transportation Integrated Search
1997-08-01
The use of automated enforcement systems offers the potential to decrease the number of red light violations and improve the safety of intersections. Included in this report are an evaluation of the operating conditions where automated enforcement wa...
NASA Astrophysics Data System (ADS)
Fu, Qiang; Chen, Xurong
2017-11-01
The Leggett-Garg inequality (LGI), derived under the assumption of realism, acts as the temporal Bell inequality. It is studied in electromagnetic and strong interaction like photonics, superconducting qubits and nuclear spin. The weak interaction two-state oscillations of neutrinos affirmed the violation of Leggett-Garg-type inequalities (LGtI). We make an empirical test for the deviation of experimental results with the classical limits by analyzing the survival probability data of reactor neutrinos at a distinct range of baseline dividing energies, as an analog to a single neutrino detected at different times. A study of the updated data of the Daya Bay experiment unambiguously depicts an obvious cluster of data over the classical bound of LGtI and shows a 6.1σ significance of the violation of them.
Babor, Thomas F; Xuan, Ziming; Damon, Donna
2013-10-01
This study evaluated the use of a modified Delphi technique in combination with a previously developed alcohol advertising rating procedure to detect content violations in the U.S. Beer Institute Code. A related aim was to estimate the minimum number of raters needed to obtain reliable evaluations of code violations in television commercials. Six alcohol ads selected for their likelihood of having code violations were rated by community and expert participants (N = 286). Quantitative rating scales were used to measure the content of alcohol advertisements based on alcohol industry self-regulatory guidelines. The community group participants represented vulnerability characteristics that industry codes were designed to protect (e.g., age <21); experts represented various health-related professions, including public health, human development, alcohol research, and mental health. Alcohol ads were rated on 2 occasions separated by 1 month. After completing Time 1 ratings, participants were randomized to receive feedback from 1 group or the other. Findings indicate that (i) ratings at Time 2 had generally reduced variance, suggesting greater consensus after feedback, (ii) feedback from the expert group was more influential than that of the community group in developing group consensus, (iii) the expert group found significantly fewer violations than the community group, (iv) experts representing different professional backgrounds did not differ among themselves in the number of violations identified, and (v) a rating panel composed of at least 15 raters is sufficient to obtain reliable estimates of code violations. The Delphi technique facilitates consensus development around code violations in alcohol ad content and may enhance the ability of regulatory agencies to monitor the content of alcoholic beverage advertising when combined with psychometric-based rating procedures. Copyright © 2013 by the Research Society on Alcoholism.
Babor, Thomas F.; Xuan, Ziming; Damon, Donna
2013-01-01
Background This study evaluated the use of a modified Delphi technique in combination with a previously developed alcohol advertising rating procedure to detect content violations in the US Beer Institute code. A related aim was to estimate the minimum number of raters needed to obtain reliable evaluations of code violations in television commercials. Methods Six alcohol ads selected for their likelihood of having code violations were rated by community and expert participants (N=286). Quantitative rating scales were used to measure the content of alcohol advertisements based on alcohol industry self-regulatory guidelines. The community group participants represented vulnerability characteristics that industry codes were designed to protect (e.g., age < 21); experts represented various health-related professions, including public health, human development, alcohol research and mental health. Alcohol ads were rated on two occasions separated by one month. After completing Time 1 ratings, participants were randomized to receive feedback from one group or the other. Results Findings indicate that (1) ratings at Time 2 had generally reduced variance, suggesting greater consensus after feedback, (2) feedback from the expert group was more influential than that of the community group in developing group consensus, (3) the expert group found significantly fewer violations than the community group, (4) experts representing different professional backgrounds did not differ among themselves in the number of violations identified; (5) a rating panel composed of at least 15 raters is sufficient to obtain reliable estimates of code violations. Conclusions The Delphi Technique facilitates consensus development around code violations in alcohol ad content and may enhance the ability of regulatory agencies to monitor the content of alcoholic beverage advertising when combined with psychometric-based rating procedures. PMID:23682927
Neural signature of the conscious processing of auditory regularities
Bekinschtein, Tristan A.; Dehaene, Stanislas; Rohaut, Benjamin; Tadel, François; Cohen, Laurent; Naccache, Lionel
2009-01-01
Can conscious processing be inferred from neurophysiological measurements? Some models stipulate that the active maintenance of perceptual representations across time requires consciousness. Capitalizing on this assumption, we designed an auditory paradigm that evaluates cerebral responses to violations of temporal regularities that are either local in time or global across several seconds. Local violations led to an early response in auditory cortex, independent of attention or the presence of a concurrent visual task, whereas global violations led to a late and spatially distributed response that was only present when subjects were attentive and aware of the violations. We could detect the global effect in individual subjects using functional MRI and both scalp and intracerebral event-related potentials. Recordings from 8 noncommunicating patients with disorders of consciousness confirmed that only conscious individuals presented a global effect. Taken together these observations suggest that the presence of the global effect is a signature of conscious processing, although it can be absent in conscious subjects who are not aware of the global auditory regularities. This simple electrophysiological marker could thus serve as a useful clinical tool. PMID:19164526
Two- and Three-Dimensional Probes of Parity in Primordial Gravity Waves.
Masui, Kiyoshi Wesley; Pen, Ue-Li; Turok, Neil
2017-06-02
We show that three-dimensional information is critical to discerning the effects of parity violation in the primordial gravity-wave background. If present, helical gravity waves induce parity-violating correlations in the cosmic microwave background (CMB) between parity-odd polarization B modes and parity-even temperature anisotropies (T) or polarization E modes. Unfortunately, EB correlations are much weaker than would be naively expected, which we show is due to an approximate symmetry resulting from the two-dimensional nature of the CMB. The detectability of parity-violating correlations is exacerbated by the fact that the handedness of individual modes cannot be discerned in the two-dimensional CMB, leading to a noise contribution from scalar matter perturbations. In contrast, the tidal imprints of primordial gravity waves fossilized into the large-scale structure of the Universe are a three-dimensional probe of parity violation. Using such fossils the handedness of gravity waves may be determined on a mode-by-mode basis, permitting future surveys to probe helicity at the percent level if the amplitude of primordial gravity waves is near current observational upper limits.
Application of photon detectors in the VIP2 experiment to test the Pauli Exclusion Principle
NASA Astrophysics Data System (ADS)
Pichler, A.; Bartalucci, S.; Bazzi, M.; Bertolucci, S.; Berucci, C.; Bragadireanu, M.; Cargnelli, M.; Clozza, A.; Curceanu, C.; De Paolis, L.; Di Matteo, S.; D'Ufflzi, A.; Egger, J.-P.; Guaraldo, C.; Iliescu, M.; Ishiwatari, T.; Laubenstein, M.; Marton, J.; Milotti, E.; Pietreanu, D.; Piscicchia, K.; Ponta, T.; Sbardella, E.; Scordo, A.; Shi, H.; Sirghi, D.; Sirghi, F.; Sperandio, L.; Vazquez-Doce, O.; Widmann, E.; Zmeskal, J.
2016-05-01
The Pauli Exclusion Principle (PEP) was introduced by the austrian physicist Wolfgang Pauli in 1925. Since then, several experiments have checked its validity. From 2006 until 2010, the VIP (Violation of the Pauli Principle) experiment took data at the LNGS underground laboratory to test the PEP. This experiment looked for electronic 2p to Is transitions in copper, where 2 electrons are in the Is state before the transition happens. These transitions violate the PEP. The lack of detection of X-ray photons coming from these transitions resulted in a preliminary upper limit for the violation of the PEP of 4.7 × 10-29. Currently, the successor experiment VIP2 is under preparation. The main improvements are, on one side, the use of Silicon Drift Detectors (SDDs) as X-ray photon detectors. On the other side an active shielding is implemented, which consists of plastic scintillator bars read by Silicon Photomultipliers (SiPMs). The employment of these detectors will improve the upper limit for the violation of the PEP by around 2 orders of magnitude.
Shell, Duane F; Newman, Ian M; Córdova-Cazar, Ana Lucía; Heese, Jill M
2015-09-01
Our primary research question was whether teens obtaining their intermediate-level provisional operators permit (POP) in a graduated driver licensing (GDL) environment through driver education differed in crashes and traffic violations from teens who obtained their POP by completing a supervised driving certification log without taking driver education. A descriptive epidemiological study examining a census of all teen drivers in Nebraska (151,880 teens, 48.6% girls, 51.4% boys) during an eight year period from 2003 to 2010 was conducted. The driver education cohort had significantly fewer crashes, injury or fatal crashes, violations, and alcohol-related violations than the certification log cohort in both years one and two of driving following receipt of the POP. Hierarchical logistic regression was conducted, controlling for gender, race/ethnicity, median household income, urban-rural residence, and age receiving the POP. In both year one and two of driving, teens in the certification log cohort had higher odds of a crash, injury or fatal crash, violation, or alcohol-related violation. Findings support that relative to a supervised driving certification log approach, teens taking driver education are less likely to be involved in crashes or to receive a traffic violation during their first two years of driving in an intermediate stage in a graduated driver licensing system. Because teen crash and fatality rates are highest at ages 16-18, these reductions are especially meaningful. Driver education appears to make a difference in teen traffic outcomes at a time when risk is highest. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.
NASA Technical Reports Server (NTRS)
Kavelund, Klaus; Barringer, Howard
2012-01-01
TraceContract is an API (Application Programming Interface) for trace analysis. A trace is a sequence of events, and can, for example, be generated by a running program, instrumented appropriately to generate events. An event can be any data object. An example of a trace is a log file containing events that a programmer has found important to record during a program execution. Trace - Contract takes as input such a trace together with a specification formulated using the API and reports on any violations of the specification, potentially calling code (reactions) to be executed when violations are detected. The software is developed as an internal DSL (Domain Specific Language) in the Scala programming language. Scala is a relatively new programming language that is specifically convenient for defining such internal DSLs due to a number of language characteristics. This includes Scala s elegant combination of object-oriented and functional programming, a succinct notation, and an advanced type system. The DSL offers a combination of data-parameterized state machines and temporal logic, which is novel. As an extension of Scala, it is a very expressive and convenient log file analysis framework.
NASA Astrophysics Data System (ADS)
Bailey, Quentin G.
2007-08-01
This work explores the theoretical and experimental aspects of Lorentz violation in gravity. A set of modified Einstein field equations is derived from the general Lorentz-violating Standard-Model Extension (SME). Some general theoretical implications of these results are discussed. The experimental consequences for weak-field gravitating systems are explored in the Earth- laboratory setting, the solar system, and beyond. The role of spontaneous Lorentz-symmetry breaking is discussed in the context of the pure-gravity sector of the SME. To establish the low-energy effective Einstein field equations, it is necessary to take into account the dynamics of 20 coefficients for Lorentz violation. As an example, the results are compared with bumblebee models, which are general theories of vector fields with spontaneous Lorentz violation. The field equations are evaluated in the post- newtonian limit using a perfect fluid description of matter. The post-newtonian metric of the SME is derived and compared with some standard test models of gravity. The possible signals for Lorentz violation due to gravity-sector coefficients are studied. Several new effects are identified that have experimental implications for current and future tests. Among the unconventional effects are a new type of spin precession for a gyroscope in orbit and a modification to the local gravitational acceleration on the Earth's surface. These and other tests are expected to yield interesting sensitivities to dimensionless gravity- sector coefficients.
32 CFR 1701.31 - General routine uses.
Code of Federal Regulations, 2010 CFR
2010-07-01
... with other information indicates or relates to a violation or potential violation of law, whether civil... affected information or information technology systems or programs (whether or not belonging to the ODNI... an appropriate federal, state, territorial, tribal, local law enforcement authority, foreign...
Marine safety manual, volume 5 : investigations and enforcement
DOT National Transportation Integrated Search
2008-04-01
This Manual established policies and procedures for the activities associated with the investigation of marine casualties, investigation into recreational boating deaths, detecting violations of criminal and other statutes for law enforcement purpose...
UNIX security in a supercomputing environment
NASA Technical Reports Server (NTRS)
Bishop, Matt
1989-01-01
The author critiques some security mechanisms in most versions of the Unix operating system and suggests more effective tools that either have working prototypes or have been implemented, for example in secure Unix systems. Although no computer (not even a secure one) is impenetrable, breaking into systems with these alternate mechanisms will cost more, require more skill, and be more easily detected than penetrations of systems without these mechanisms. The mechanisms described fall into four classes (with considerable overlap). User authentication at the local host affirms the identity of the person using the computer. The principle of least privilege dictates that properly authenticated users should have rights precisely sufficient to perform their tasks, and system administration functions should be compartmentalized; to this end, access control lists or capabilities should either replace or augment the default Unix protection system, and mandatory access controls implementing multilevel security models and integrity mechanisms should be available. Since most users access supercomputing environments using networks, the third class of mechanisms augments authentication (where feasible). As no security is perfect, the fourth class of mechanism logs events that may indicate possible security violations; this will allow the reconstruction of a successful penetration (if discovered), or possibly the detection of an attempted penetration.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heberlein, L.T.; Dias, G.V.; Levitt, K.N.
1989-11-01
The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, ourmore » work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.« less
Effects of a neutrino-dark energy coupling on oscillations of high-energy neutrinos
NASA Astrophysics Data System (ADS)
Klop, Niki; Ando, Shin'ichiro
2018-03-01
If dark energy (DE) is a dynamical field rather than a cosmological constant, an interaction between DE and the neutrino sector could exist, modifying the neutrino oscillation phenomenology and causing C P and apparent Lorentz violating effects. The terms in the Hamiltonian for flavor propagation induced by the DE-neutrino coupling do not depend on the neutrino energy, while the ordinary components decrease as Δ m2/Eν. Therefore, the DE-induced effects are absent at lower neutrino energies, but become significant at higher energies, allowing to be searched for by neutrino observatories. We explore the impact of the DE-neutrino coupling on the oscillation probability and the flavor transition in the three-flavor framework, and investigate the C P -violating and apparent Lorentz violating effects. We find that DE-induced effects become observable for Eνmeff˜10-20 GeV2, where meff is the effective mass parameter in the DE-induced oscillation probability, and C P is violated over a wide energy range. We also show that current and future experiments have the sensitivity to detect anomalous effects induced by a DE-neutrino coupling and probe the new mixing parameters. The DE-induced effects on neutrino oscillation can be distinguished from other new physics possibilities with similar effects, through the detection of the directional dependence of the interaction, which is specific to this interaction with DE. However, current experiments will not yet be able to measure the small changes of ˜0.03 % in the flavor composition due to this directional effect.
Dynamic analysis methods for detecting anomalies in asynchronously interacting systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kumar, Akshat; Solis, John Hector; Matschke, Benjamin
2014-01-01
Detecting modifications to digital system designs, whether malicious or benign, is problematic due to the complexity of the systems being analyzed. Moreover, static analysis techniques and tools can only be used during the initial design and implementation phases to verify safety and liveness properties. It is computationally intractable to guarantee that any previously verified properties still hold after a system, or even a single component, has been produced by a third-party manufacturer. In this paper we explore new approaches for creating a robust system design by investigating highly-structured computational models that simplify verification and analysis. Our approach avoids the needmore » to fully reconstruct the implemented system by incorporating a small verification component that dynamically detects for deviations from the design specification at run-time. The first approach encodes information extracted from the original system design algebraically into a verification component. During run-time this component randomly queries the implementation for trace information and verifies that no design-level properties have been violated. If any deviation is detected then a pre-specified fail-safe or notification behavior is triggered. Our second approach utilizes a partitioning methodology to view liveness and safety properties as a distributed decision task and the implementation as a proposed protocol that solves this task. Thus the problem of verifying safety and liveness properties is translated to that of verifying that the implementation solves the associated decision task. We develop upon results from distributed systems and algebraic topology to construct a learning mechanism for verifying safety and liveness properties from samples of run-time executions.« less
NASA Astrophysics Data System (ADS)
Hiesmayr, Beatrix C.
2015-07-01
About 50 years ago John St. Bell published his famous Bell theorem that initiated a new field in physics. This contribution discusses how discrete symmetries relate to the big open questions of quantum mechanics, in particular: (i) how correlations stronger than those predicted by theories sharing randomness (Bell's theorem) relate to the violation of the CP symmetry and the P symmetry; and its relation to the security of quantum cryptography, (ii) how the measurement problem (“why do we observe no tables in superposition?”) can be polled in weakly decaying systems, (iii) how strongly and weakly interacting quantum systems are affected by Newton's self gravitation. These presented preliminary results show that the meson-antimeson systems and the hyperon- antihyperon systems are a unique laboratory to tackle deep fundamental questions and to contribute to the understand what impact the violation of discrete symmetries has.
A Compelling Solution to Guantanamo Bay
2013-03-01
military commission violated separation of powers because one branch of the government, namely the Executive, controlled all aspects of the case... separation of powers requirement. The conclusion that can be drawn from these legal decisions is that the military system is fundamentally...the Rule of Law and violates the separation of powers .111 The current system has even strained the United States’ relationship with close allies
Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering.
Menon, Aditya Krishna; Jiang, Xiaoqian; Kim, Jihoon; Vaidya, Jaideep; Ohno-Machado, Lucila
2014-04-01
Many healthcare facilities enforce security on their electronic health records (EHRs) through a corrective mechanism: some staff nominally have almost unrestricted access to the records, but there is a strict ex post facto audit process for inappropriate accesses, i.e., accesses that violate the facility's security and privacy policies. This process is inefficient, as each suspicious access has to be reviewed by a security expert, and is purely retrospective, as it occurs after damage may have been incurred. This motivates automated approaches based on machine learning using historical data. Previous attempts at such a system have successfully applied supervised learning models to this end, such as SVMs and logistic regression. While providing benefits over manual auditing, these approaches ignore the identity of the users and patients involved in a record access. Therefore, they cannot exploit the fact that a patient whose record was previously involved in a violation has an increased risk of being involved in a future violation. Motivated by this, in this paper, we propose a collaborative filtering inspired approach to predicting inappropriate accesses. Our solution integrates both explicit and latent features for staff and patients, the latter acting as a personalized "finger-print" based on historical access patterns. The proposed method, when applied to real EHR access data from two tertiary hospitals and a file-access dataset from Amazon, shows not only significantly improved performance compared to existing methods, but also provides insights as to what indicates an inappropriate access.
Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering
Menon, Aditya Krishna; Jiang, Xiaoqian; Kim, Jihoon; Vaidya, Jaideep; Ohno-Machado, Lucila
2013-01-01
Many healthcare facilities enforce security on their electronic health records (EHRs) through a corrective mechanism: some staff nominally have almost unrestricted access to the records, but there is a strict ex post facto audit process for inappropriate accesses, i.e., accesses that violate the facility’s security and privacy policies. This process is inefficient, as each suspicious access has to be reviewed by a security expert, and is purely retrospective, as it occurs after damage may have been incurred. This motivates automated approaches based on machine learning using historical data. Previous attempts at such a system have successfully applied supervised learning models to this end, such as SVMs and logistic regression. While providing benefits over manual auditing, these approaches ignore the identity of the users and patients involved in a record access. Therefore, they cannot exploit the fact that a patient whose record was previously involved in a violation has an increased risk of being involved in a future violation. Motivated by this, in this paper, we propose a collaborative filtering inspired approach to predicting inappropriate accesses. Our solution integrates both explicit and latent features for staff and patients, the latter acting as a personalized “finger-print” based on historical access patterns. The proposed method, when applied to real EHR access data from two tertiary hospitals and a file-access dataset from Amazon, shows not only significantly improved performance compared to existing methods, but also provides insights as to what indicates an inappropriate access. PMID:24683293
Analysis of fatal crashes due to signal and stop sign violations
DOT National Transportation Integrated Search
2004-09-01
The 1999 and 2000 Fatality Analysis Reporting System databases were analyzed to gain a better understanding of fatal crashes involving light vehicles that violated traffic signals or stop signs. A total of 9,951 vehicles were involved in fatal crashe...
Broken detailed balance and non-equilibrium dynamics in living systems: a review
NASA Astrophysics Data System (ADS)
Gnesotto, F. S.; Mura, F.; Gladrow, J.; Broedersz, C. P.
2018-06-01
Living systems operate far from thermodynamic equilibrium. Enzymatic activity can induce broken detailed balance at the molecular scale. This molecular scale breaking of detailed balance is crucial to achieve biological functions such as high-fidelity transcription and translation, sensing, adaptation, biochemical patterning, and force generation. While biological systems such as motor enzymes violate detailed balance at the molecular scale, it remains unclear how non-equilibrium dynamics manifests at the mesoscale in systems that are driven through the collective activity of many motors. Indeed, in several cellular systems the presence of non-equilibrium dynamics is not always evident at large scales. For example, in the cytoskeleton or in chromosomes one can observe stationary stochastic processes that appear at first glance thermally driven. This raises the question how non-equilibrium fluctuations can be discerned from thermal noise. We discuss approaches that have recently been developed to address this question, including methods based on measuring the extent to which the system violates the fluctuation-dissipation theorem. We also review applications of this approach to reconstituted cytoskeletal networks, the cytoplasm of living cells, and cell membranes. Furthermore, we discuss a more recent approach to detect actively driven dynamics, which is based on inferring broken detailed balance. This constitutes a non-invasive method that uses time-lapse microscopy data, and can be applied to a broad range of systems in cells and tissue. We discuss the ideas underlying this method and its application to several examples including flagella, primary cilia, and cytoskeletal networks. Finally, we briefly discuss recent developments in stochastic thermodynamics and non-equilibrium statistical mechanics, which offer new perspectives to understand the physics of living systems.
Broken detailed balance and non-equilibrium dynamics in living systems: a review.
Gnesotto, F S; Mura, F; Gladrow, J; Broedersz, C P
2018-06-01
Living systems operate far from thermodynamic equilibrium. Enzymatic activity can induce broken detailed balance at the molecular scale. This molecular scale breaking of detailed balance is crucial to achieve biological functions such as high-fidelity transcription and translation, sensing, adaptation, biochemical patterning, and force generation. While biological systems such as motor enzymes violate detailed balance at the molecular scale, it remains unclear how non-equilibrium dynamics manifests at the mesoscale in systems that are driven through the collective activity of many motors. Indeed, in several cellular systems the presence of non-equilibrium dynamics is not always evident at large scales. For example, in the cytoskeleton or in chromosomes one can observe stationary stochastic processes that appear at first glance thermally driven. This raises the question how non-equilibrium fluctuations can be discerned from thermal noise. We discuss approaches that have recently been developed to address this question, including methods based on measuring the extent to which the system violates the fluctuation-dissipation theorem. We also review applications of this approach to reconstituted cytoskeletal networks, the cytoplasm of living cells, and cell membranes. Furthermore, we discuss a more recent approach to detect actively driven dynamics, which is based on inferring broken detailed balance. This constitutes a non-invasive method that uses time-lapse microscopy data, and can be applied to a broad range of systems in cells and tissue. We discuss the ideas underlying this method and its application to several examples including flagella, primary cilia, and cytoskeletal networks. Finally, we briefly discuss recent developments in stochastic thermodynamics and non-equilibrium statistical mechanics, which offer new perspectives to understand the physics of living systems.
Apartheid medicine. Health and human rights in South Africa.
Nightingale, E O; Hannibal, K; Geiger, H J; Hartmann, L; Lawrence, R; Spurlock, J
Human rights and health care under apartheid in South Africa were studied. Human rights violations, such as detention without charge or trial, assault and torture in police custody, and restriction orders, have had devastating effects on the health of persons experiencing them. These violations have occurred in the context of a deliberate policy of discriminatory health care favoring the white minority over the black majority. South Africa's medical societies have had mixed responses to the health problems raised by human rights violations and inequities in the health care system. The amelioration of health care for all and prevention of human rights violations depend on ending apartheid and discrimination and greater government attention to these problems.
Ethical Predispositions to Violate or Obey Traffic Rules and the Mediating Role of Driving Styles.
Holman, Andrei C; Popusoi, Simona A
2018-07-04
Traffic law violations are the most important determinants of traffic accidents. This study examined the influence of drivers' ethical perspective on their traffic violations and the mediating role of driving styles in these relationships. A sample of 313 drivers participated in the study. Contrary to expectations, high ethical relativism was found to be associated with fewer aggressive traffic violations. This suggests that the informal normative system that parallels the official traffic regulations is the more salient reference against which drivers usually assess the adequacy of their behaviors, highly relativistic drivers being more willing to also take into consideration the official traffic code in these appraisals. We also found significant interactions between idealism and relativism on both ordinary and aggressive violations. Idealism emerged as a predictor of these violations only in drivers low in relativism. In this group, one's concern about the harm that he/she might cause to other traffic participants induces higher traffic law abidingness. These influences of idealism were mediated by certain driving styles. Drivers' general ethical perspective fosters a specific pattern of driving styles and, consequently, the tendency to commit or to refrain from traffic violations.
NASA Astrophysics Data System (ADS)
Solodov, Alexander
The proliferation of nuclear weapons is a great threat to world peace and stability. The question of strengthening the nonproliferation regime has been open for a long period of time. In 1997 the International Atomic Energy Agency (IAEA) Board of Governors (BOG) adopted the Additional Safeguards Protocol. The purpose of the protocol is to enhance the IAEA's ability to detect undeclared production of fissile materials in member states. However, the IAEA does not always have sufficient human and financial resources to accomplish this task. Developed here is a concept for making use of human and technical resources available in academia that could be used to enhance the IAEA's mission. The objective of this research was to study the feasibility of an academic community using commercially or publicly available sources of information and products for the purpose of detecting covert facilities and activities intended for the unlawful acquisition of fissile materials or production of nuclear weapons. In this study, the availability and use of commercial satellite imagery systems, commercial computer codes for satellite imagery analysis, Comprehensive Test Ban Treaty (CTBT) verification International Monitoring System (IMS), publicly available information sources such as watchdog groups and press reports, and Customs Services information were explored. A system for integrating these data sources to form conclusions was also developed. The results proved that publicly and commercially available sources of information and data analysis can be a powerful tool in tracking violations in the international nuclear nonproliferation regime and a framework for implementing these tools in academic community was developed. As a result of this study a formation of an International Nonproliferation Monitoring Academic Community (INMAC) is proposed. This would be an independent organization consisting of academics (faculty, staff and students) from both nuclear weapon states (NWS) and non-nuclear weapon states (NNWS). This community analyzes all types of unclassified publicly and commercially available information to aid in detection of violations of the non-proliferation regime. INMAC shares all of this information with the IAEA and the public. Since INMAC is composed solely by members of the academic community, this organization would not demonstrate any biases in its investigations or reporting.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heaney, Libby; Jaksch, Dieter; Centre for Quantum Technologies, National University of Singapore
Proposals for Bell-inequality tests on systems restricted by the particle-number-superselection rule often require operations that are difficult to implement in practice. In this article, we derive a Bell inequality, where measurements on pairs of states are used as a method to bypass this superselection rule. In particular, we focus on mode entanglement of an arbitrary number of massive particles and show that our Bell inequality detects the entanglement in an identical pair of states when other inequalities fail. However, as the number of particles in the system increases, the violation of our Bell inequality decreases due to the restriction inmore » the measurement space caused by the superselection rule. This Bell test can be implemented using techniques that are routinely used in current experiments.« less
NASA Astrophysics Data System (ADS)
Maglevanny, I. I.; Smolar, V. A.; Karyakina, T. I.
2018-06-01
In this paper, we consider the activation processes in nonlinear meta-stable system based on a lateral (quasi-two-dimensional) superlattice and study the dynamics of such a system externally driven by a harmonic force. The internal control parameters are the longitudinal applied electric field and the sample temperature. The spontaneous transverse electric field is considered as an order parameter. The forced violations of order parameter are considered as a response of a system to periodic driving. We investigate the cooperative effects of self-organization and high harmonic forcing from the viewpoint of catastrophe theory and show the possibility of generation of third and higher odd harmonics in output signal that lead to distortion of its wave front. A higher harmonics detection strategy is further proposed and explained in detail by exploring the influences of system parameters on the response output of the system that are discussed through numerical simulations.
Heading off boundary problems: clinical supervision as risk management.
Walker, R; Clark, J J
1999-11-01
The effective management of risk in clinical practice includes steps to limit harm to clients resulting from ethical violations or professional misconduct. Boundary problems constitute some of the most damaging ethical violations. The authors propose an active use of clinical supervision to anticipate and head off possible ethical violations by intervening when signs of boundary problems appear. The authors encourage a facilitative, Socratic method, rather than directive approaches, to help supervisees maximize their learning about ethical complexities. Building on the idea of a slippery slope, in which seemingly insignificant acts can lead to unethical patterns of behavior, the authors discuss ten cues to potential boundary problems, including strong feelings about a client; extended sessions with clients; gift giving between clinician and client; loans, barter, and sale of goods; clinician self-disclosures; and touching and sex. The authors outline supervisory interventions to be made when the cues are detected.
Continuous punishment and the potential of gentle rule enforcement.
Erev, Ido; Ingram, Paul; Raz, Ornit; Shany, Dror
2010-05-01
The paper explores the conditions that determine the effect of rule enforcement policies that imply an attempt to punish all the visible violations of the rule. We start with a simple game-theoretic analysis that highlights the value of gentle COntinuous Punishment (gentle COP) policies. If the subjects of the rule are rational, gentle COP can eliminate violations even when the rule enforcer has limited resources. The second part of the paper uses simulations to examine the robustness of gentle COP policies to likely deviations from rationality. The results suggest that when the probability of detecting violations is sufficiently high, gentle COP policies can be effective even when the subjects of the rule are boundedly rational adaptive learners. The paper concludes with experimental studies that clarify the value of gentle COP policies in the lab, and in attempt to eliminate cheating in exams. Copyright (c) 2009 Elsevier B.V. All rights reserved.
77 FR 54864 - Federal Acquisition Regulation; Documenting Contractor Performance
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-06
....g., late or nonpayment to subcontractors, trafficking violations, tax delinquency, failure to report... applicable) (e.g.; late or nonpayment to subcontractors, trafficking violations, tax delinquency, failure to... that allowing contractors to ``report to the CPARS system'' would have a negative impact on future...
Drug Violations and Aviation Accidents: Findings from the U.S. Mandatory Drug Testing Programs
Li, Guohua; Baker, Susan P.; Zhao, Qi; Brady, Joanne E.; Lang, Barbara H.; Rebok, George W.; DiMaggio, Charles
2012-01-01
Aims To assess the role of drug violations in aviation accidents. Design Case-control analysis. Setting Commercial aviation in the United States. Participants Aviation employees who were tested for drugs during 1995 through 2005 under the post-accident testing program (cases, n=4,977) or under the random testing program (controls, n=1,129,922). Measurements Point prevalence of drug violations, odds ratio of accident involvement, and attributable risk in the population. A drug violation was defined as a confirmed positive test for marijuana (≥ 50 ng/ml), cocaine (≥ 300 ng/ml), amphetamines (≥1000 ng/ml), opiates (≥ 2000 ng/ml), or phencyclidine (≥ 25 ng/ml). Findings The prevalence of drug violations was 0.64% [95% confidence interval (CI), 0.62–0.65%] in random drug tests and 1.82% (95% CI, 1.47–2.24%) in post-accident tests. The odds of accident involvement for employees who tested positive for drugs was almost three times the odds for those who tested negative (odds ratio 2.90, 95% CI, 2.35–3.57), with an estimated attributable risk of 1.2%. Marijuana accounted for 67.3% of the illicit drugs detected. The proportion of illicit drugs represented by amphetamines increased progressively during the study period, from 3.4% in 1995 to 10.3% in 2005 (p<0.0001). Conclusions Use of illicit drugs by aviation employees is associated with a significantly increased risk of accident involvement. Due to the very low prevalence, drug violations contribute to only a small fraction of aviation accidents. PMID:21306594
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gaz, Alessandro
2011-11-16
After its formulation in 1960's the Standard Model of Fundamental Interactions has gone through an impressive series of successes, begun with the discovery of neutral weak currents [1] and the experimental observations of the massive carriers of weak interactions, the W ± and Z 0 bosons [2], [3]. High precision measurements performed at LEP and SLAC test the validity of the theory to an unprecedented level of accuracy and do not show any significant deviations with respect to the Standard Model predictions. One of the attractive features of the Standard Model is the description of the phenomena which violate the matter-antimatter symmetry (CP), and this violation uniquely depends (in the quark sector) on a weak phase in the matrix describing the couplings among different quark flavors. CP-violation was discovered in 1964 as a tiny effect in the mixing of the K 0 -more » $$\\bar{K}$$ 0 system [12] but, after a few decades of study of the physics of K mesons, no strong confirmation of the Standard Model can be obtained on the mechanism which generates CP-violation. On the other hand the physics of B mesons is suitable for a pretty large number of measurements which can confirm or disprove this aspect of the theory. The main goal of the BABAR and Belle experiments physics program is to test the description of CP-violation and flavor physics mainly from the decays of B u and B d mesons. Soon after the beginning of data-taking in 1999, CP-violation was discovered in the interference between mixing and decay in the golden channel B 0 → J/Ψ}K 0 [17] [18], while in 2004 a large direct charge asymmetry was observed in the B 0 → K +π - channel [16]. There is a third kind of CP-violation which can be exhibited by the B d - $$\\bar{B}$$ d system, the so called CP-violation in mixing. The Standard Model predicts this asymmetry to be small, possibly out of reach of current experiments, but several New Physics models contain new particles and couplings which can enhance it up to detectable levels. In this thesis we search for CP-violation in B d - $$\\bar{B}$$ d mixing at the BABAR experiment. We reconstruct one of the two B mesons produced at the PEP-II electromagnetic collider using the partial reconstruction technique, while the flavor of the other B is inferred by the charge of a kaon identified among its decay products. Given the smallness of the physical asymmetry we want to measure, a crucial aspect of this analysis is the control of spurious charge asymmetries arising from the interaction of particles with the detector material. We accomplish this by using a control sample of charged kaons on the same data we use in our analysis. After a brief introduction of the theoretical framework and the phenomenology of the decays of B mesons at a B-factory (chapters 1 and 2), we will review in chapter 3 the current experimental results on this topic. We will then describe the characteristics of the collider and the experimental apparatus (chapter 4) used to perform our measurement. The available dataset and the event pre-selection techniques are treated in chapter 5, while the analysis method is discussed in detail in the following one. In chapters 7 and 8 the definitions of the probability density functions used to model each component of our sample are given and then they are tested in samples of simulated data. Toy and reweighted Monte Carlo data are used in chapter 9 to test the sensitivity of our fitting procedure to the physical parameters related to CP violation; chapter 10 discusses the possibility of modeling some of the components of our sample directly on the data. Finally the fit on the real data sample is described in chapter 11 and the treatment of systematic uncertainties is done in chapter 12, while the final result is given in chapter 13.« less
Search for violations of quantum mechanics
Ellis, John; Hagelin, John S.; Nanopoulos, D. V.; ...
1984-07-01
The treatment of quantum effects in gravitational fields indicates that pure states may evolve into mixed states, and Hawking has proposed modification of the axioms of field theory which incorporate the corresponding violation of quantum mechanics. In this study we propose a modified hamiltonian equation of motion for density matrices and use it to interpret upper bounds on the violation of quantum mechanics in different phenomenological situations. We apply our formalism to the K 0-K 0 system and to long baseline neutron interferometry experiments. In both cases we find upper bounds of about 2 × 10 -21 GeV on contributionsmore » to the single particle “hamiltonian” which violate quantum mechanical coherence. We discuss how these limits might be improved in the future, and consider the relative significance of other successful tests of quantum mechanics. Finally, an appendix contains model estimates of the magnitude of effects violating quantum mechanics.« less
Violation of local realism with freedom of choice
Scheidl, Thomas; Ursin, Rupert; Kofler, Johannes; Ramelow, Sven; Ma, Xiao-Song; Herbst, Thomas; Ratschbacher, Lothar; Fedrizzi, Alessandro; Langford, Nathan K.; Jennewein, Thomas; Zeilinger, Anton
2010-01-01
Bell’s theorem shows that local realistic theories place strong restrictions on observable correlations between different systems, giving rise to Bell’s inequality which can be violated in experiments using entangled quantum states. Bell’s theorem is based on the assumptions of realism, locality, and the freedom to choose between measurement settings. In experimental tests, “loopholes” arise which allow observed violations to still be explained by local realistic theories. Violating Bell’s inequality while simultaneously closing all such loopholes is one of the most significant still open challenges in fundamental physics today. In this paper, we present an experiment that violates Bell’s inequality while simultaneously closing the locality loophole and addressing the freedom-of-choice loophole, also closing the latter within a reasonable set of assumptions. We also explain that the locality and freedom-of-choice loopholes can be closed only within nondeterminism, i.e., in the context of stochastic local realism. PMID:21041665
Violation of local realism with freedom of choice.
Scheidl, Thomas; Ursin, Rupert; Kofler, Johannes; Ramelow, Sven; Ma, Xiao-Song; Herbst, Thomas; Ratschbacher, Lothar; Fedrizzi, Alessandro; Langford, Nathan K; Jennewein, Thomas; Zeilinger, Anton
2010-11-16
Bell's theorem shows that local realistic theories place strong restrictions on observable correlations between different systems, giving rise to Bell's inequality which can be violated in experiments using entangled quantum states. Bell's theorem is based on the assumptions of realism, locality, and the freedom to choose between measurement settings. In experimental tests, "loopholes" arise which allow observed violations to still be explained by local realistic theories. Violating Bell's inequality while simultaneously closing all such loopholes is one of the most significant still open challenges in fundamental physics today. In this paper, we present an experiment that violates Bell's inequality while simultaneously closing the locality loophole and addressing the freedom-of-choice loophole, also closing the latter within a reasonable set of assumptions. We also explain that the locality and freedom-of-choice loopholes can be closed only within nondeterminism, i.e., in the context of stochastic local realism.
Statistical isotropy violation in WMAP CMB maps resulting from non-circular beams
NASA Astrophysics Data System (ADS)
Das, Santanu; Mitra, Sanjit; Rotti, Aditya; Pant, Nidhi; Souradeep, Tarun
2016-06-01
Statistical isotropy (SI) of cosmic microwave background (CMB) fluctuations is a key observational test to validate the cosmological principle underlying the standard model of cosmology. While a detection of SI violation would have immense cosmological ramification, it is important to recognise their possible origin in systematic effects of observations. The WMAP seven year (WMAP-7) release claimed significant deviation from SI in the bipolar spherical harmonic (BipoSH) coefficients and . Here we present the first explicit reproduction of the measurements reported in WMAP-7, confirming that beam systematics alone can completely account for the measured SI violation. The possibility of such a systematic origin was alluded to in WMAP-7 paper itself and other authors but not as explicitly so as to account for it accurately. We simulate CMB maps using the actual WMAP non-circular beams and scanning strategy. Our estimated BipoSH spectra from these maps match the WMAP-7 results very well. It is also evident that only a very careful and adequately detailed modelling, as carried out here, can conclusively establish that the entire signal arises from non-circular beam effect. This is important since cosmic SI violation signals are expected to be subtle and dismissing a large SI violation signal as observational artefact based on simplistic plausibility arguments run the serious risk of "throwing the baby out with the bathwater".
NASA Astrophysics Data System (ADS)
Parinov, A. V.; Korotkikh, L. P.; Desyatov, D. B.; Stepanov, L. V.
2018-03-01
The uniqueness of information processing mechanisms in special-purpose infocommunication systems and the increased interest of intruders lead to an increase in the relevance of the problems associated with their protection. The paper considers the issues of building risk-models for the violation of the relevance and value of information in infocommunication systems for special purposes. Also, special attention is paid to the connection between the qualities of relevance and the value of information obtained as a result of the operation of infocommunication systems for special purposes. Analytical expressions for the risk and damage function in the time range in special-purpose infocommunication systems are obtained, which can serve as a mathematical basis for risk assessment. Further, an analytical expression is obtained to assess the chance of obtaining up-to-date information in the operation of infocommunication systems up to the time the information quality is violated. An analytical expression for estimating the chance can be used to calculate the effectiveness of a special-purpose infocommunication system.
Salter, Robert; Holmes, Steven; Legg, David; Coble, Joel; George, Bruce
2012-02-01
Pork tissue samples that tested positive and negative by the Charm II tetracycline test screening method in the slaughter plant laboratory were tested with the modified AOAC International liquid chromatography tandem mass spectrometry (LC-MS-MS) method 995.09 to determine the predictive value of the screening method at detecting total tetracyclines at 10 μg/kg of tissue, in compliance with Russian import regulations. There were 218 presumptive-positive tetracycline samples of 4,195 randomly tested hogs. Of these screening test positive samples, 83% (182) were positive, >10 μg/kg by LC-MS-MS; 12.8% (28) were false violative, greater than limit of detection (LOD) but <10 μg/kg; and 4.2% (8) were not detected at the LC-MS-MS LOD. The 36 false-violative and not-detected samples represent 1% of the total samples screened. Twenty-seven of 30 randomly selected tetracycline screening negative samples tested below the LC-MS-MS LOD, and 3 samples tested <3 μg/kg chlortetracycline. Results indicate that the Charm II tetracycline test is effective at predicting hogs containing >10 μg/kg total tetracyclines in compliance with Russian import regulations.
28 CFR 28.28 - Sanctions for violations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Sanctions for violations. 28.28 Section 28.28 Judicial Administration DEPARTMENT OF JUSTICE DNA IDENTIFICATION SYSTEM Preservation of... evidence from being subjected to DNA testing or prevent the production or use of that evidence in an...
28 CFR 28.28 - Sanctions for violations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Sanctions for violations. 28.28 Section 28.28 Judicial Administration DEPARTMENT OF JUSTICE DNA IDENTIFICATION SYSTEM Preservation of... evidence from being subjected to DNA testing or prevent the production or use of that evidence in an...
28 CFR 28.28 - Sanctions for violations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Sanctions for violations. 28.28 Section 28.28 Judicial Administration DEPARTMENT OF JUSTICE DNA IDENTIFICATION SYSTEM Preservation of... evidence from being subjected to DNA testing or prevent the production or use of that evidence in an...
28 CFR 28.28 - Sanctions for violations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Sanctions for violations. 28.28 Section 28.28 Judicial Administration DEPARTMENT OF JUSTICE DNA IDENTIFICATION SYSTEM Preservation of... evidence from being subjected to DNA testing or prevent the production or use of that evidence in an...
28 CFR 28.28 - Sanctions for violations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Sanctions for violations. 28.28 Section 28.28 Judicial Administration DEPARTMENT OF JUSTICE DNA IDENTIFICATION SYSTEM Preservation of... evidence from being subjected to DNA testing or prevent the production or use of that evidence in an...
Parity and Time-Reversal Violation in Atomic Systems
NASA Astrophysics Data System (ADS)
Roberts, B. M.; Dzuba, V. A.; Flambaum, V. V.
2015-10-01
Studying the violation of parity and time-reversal invariance in atomic systems has proven to be a very effective means of testing the electroweak theory at low energy and searching for physics beyond it. Recent developments in both atomic theory and experimental methods have led to the ability to make extremely precise theoretical calculations and experimental measurements of these effects. Such studies are complementary to direct high-energy searches, and can be performed for only a fraction of the cost. We review the recent progress in the field of parity and time-reversal violation in atoms, molecules, and nuclei, and examine the implications for physics beyond the Standard Model, with an emphasis on possible areas for development in the near future.
High Energy Astrophysics Tests of Lorentz Invariance and Quantum Gravity Models
NASA Technical Reports Server (NTRS)
Stecker, Floyd W.
2011-01-01
High-energy astrophysics observations provide the best possibilities to detect a very small violation of Lorentz invariance such as may be related to the structure of space-time near the Planck scale of approximately 10-35 m. I will discuss here the possible signatures of Lorentz invariance violation (LIV) from observations of the spectra, polarization, and timing of gamma-rays from active galactic nuclei and gamma-ray bursts. Other sensitive tests are provided by observations ofthe spectra of ultrahigh energy cosmic rays and neutrinos. Using the latest data from the Pierre Auger Observatory one can already derive an upper limit of 4.5 x 10(exp -23) to the amount of LIV at a proton Lorentz factor of -2 x 10(exp 11). This result has fundamental implications for quantum gravity models. I will also discuss the possibilities of using more sensitive space based detection techniques to improve searches for LIV in the future.
Experimental measurement-device-independent verification of quantum steering
NASA Astrophysics Data System (ADS)
Kocsis, Sacha; Hall, Michael J. W.; Bennet, Adam J.; Saunders, Dylan J.; Pryde, Geoff J.
2015-01-01
Bell non-locality between distant quantum systems—that is, joint correlations which violate a Bell inequality—can be verified without trusting the measurement devices used, nor those performing the measurements. This leads to unconditionally secure protocols for quantum information tasks such as cryptographic key distribution. However, complete verification of Bell non-locality requires high detection efficiencies, and is not robust to typical transmission losses over long distances. In contrast, quantum or Einstein-Podolsky-Rosen steering, a weaker form of quantum correlation, can be verified for arbitrarily low detection efficiencies and high losses. The cost is that current steering-verification protocols require complete trust in one of the measurement devices and its operator, allowing only one-sided secure key distribution. Here we present measurement-device-independent steering protocols that remove this need for trust, even when Bell non-locality is not present. We experimentally demonstrate this principle for singlet states and states that do not violate a Bell inequality.
Cross-cultural differences in meter perception.
Kalender, Beste; Trehub, Sandra E; Schellenberg, E Glenn
2013-03-01
We examined the influence of incidental exposure to varied metrical patterns from different musical cultures on the perception of complex metrical structures from an unfamiliar musical culture. Adults who were familiar with Western music only (i.e., simple meters) and those who also had limited familiarity with non-Western music were tested on their perception of metrical organization in unfamiliar (Turkish) music with simple and complex meters. Adults who were familiar with Western music detected meter-violating changes in Turkish music with simple meter but not in Turkish music with complex meter. Adults with some exposure to non-Western music that was unmetered or metrically complex detected meter-violating changes in Turkish music with both simple and complex meters, but they performed better on patterns with a simple meter. The implication is that familiarity with varied metrical structures, including those with a non-isochronous tactus, enhances sensitivity to the metrical organization of unfamiliar music.
Adaptive envelope protection methods for aircraft
NASA Astrophysics Data System (ADS)
Unnikrishnan, Suraj
Carefree handling refers to the ability of a pilot to operate an aircraft without the need to continuously monitor aircraft operating limits. At the heart of all carefree handling or maneuvering systems, also referred to as envelope protection systems, are algorithms and methods for predicting future limit violations. Recently, envelope protection methods that have gained more acceptance, translate limit proximity information to its equivalent in the control channel. Envelope protection algorithms either use very small prediction horizon or are static methods with no capability to adapt to changes in system configurations. Adaptive approaches maximizing prediction horizon such as dynamic trim, are only applicable to steady-state-response critical limit parameters. In this thesis, a new adaptive envelope protection method is developed that is applicable to steady-state and transient response critical limit parameters. The approach is based upon devising the most aggressive optimal control profile to the limit boundary and using it to compute control limits. Pilot-in-the-loop evaluations of the proposed approach are conducted at the Georgia Tech Carefree Maneuver lab for transient longitudinal hub moment limit protection. Carefree maneuvering is the dual of carefree handling in the realm of autonomous Uninhabited Aerial Vehicles (UAVs). Designing a flight control system to fully and effectively utilize the operational flight envelope is very difficult. With the increasing role and demands for extreme maneuverability there is a need for developing envelope protection methods for autonomous UAVs. In this thesis, a full-authority automatic envelope protection method is proposed for limit protection in UAVs. The approach uses adaptive estimate of limit parameter dynamics and finite-time horizon predictions to detect impending limit boundary violations. Limit violations are prevented by treating the limit boundary as an obstacle and by correcting nominal control/command inputs to track a limit parameter safe-response profile near the limit boundary. The method is evaluated using software-in-the-loop and flight evaluations on the Georgia Tech unmanned rotorcraft platform---GTMax. The thesis also develops and evaluates an extension for calculating control margins based on restricting limit parameter response aggressiveness near the limit boundary.
Tight upper bound for the maximal quantum value of the Svetlichny operators
NASA Astrophysics Data System (ADS)
Li, Ming; Shen, Shuqian; Jing, Naihuan; Fei, Shao-Ming; Li-Jost, Xianqing
2017-10-01
It is a challenging task to detect genuine multipartite nonlocality (GMNL). In this paper, the problem is considered via computing the maximal quantum value of Svetlichny operators for three-qubit systems and a tight upper bound is obtained. The constraints on the quantum states for the tightness of the bound are also presented. The approach enables us to give the necessary and sufficient conditions of violating the Svetlichny inequality (SI) for several quantum states, including the white and color noised Greenberger-Horne-Zeilinger (GHZ) states. The relation between the genuine multipartite entanglement concurrence and the maximal quantum value of the Svetlichny operators for mixed GHZ class states is also discussed. As the SI is useful for the investigation of GMNL, our results give an effective and operational method to detect the GMNL for three-qubit mixed states.
Parallel detection of violations of color constancy
Foster, David H.; Nascimento, Sérgio M. C.; Amano, Kinjiro; Arend, Larry; Linnell, Karina J.; Nieves, Juan Luis; Plet, Sabrina; Foster, Jeffrey S.
2001-01-01
The perceived colors of reflecting surfaces generally remain stable despite changes in the spectrum of the illuminating light. This color constancy can be measured operationally by asking observers to distinguish illuminant changes on a scene from changes in the reflecting properties of the surfaces comprising it. It is shown here that during fast illuminant changes, simultaneous changes in spectral reflectance of one or more surfaces in an array of other surfaces can be readily detected almost independent of the numbers of surfaces, suggesting a preattentive, spatially parallel process. This process, which is perfect over a spatial window delimited by the anatomical fovea, may form an early input to a multistage analysis of surface color, providing the visual system with information about a rapidly changing world in advance of the generation of a more elaborate and stable perceptual representation. PMID:11438751
B+ L violation at colliders and new physics
NASA Astrophysics Data System (ADS)
Cerdeño, David G.; Reimitz, Peter; Sakurai, Kazuki; Tamarit, Carlos
2018-04-01
Chiral electroweak anomalies predict baryon ( B) and lepton ( L) violating fermion interactions, which can be dressed with large numbers of Higgs and gauge bosons. The estimation of the total B + L-violating rate from an initial two-particle state — potentially observable at colliders — has been the subject of an intense discussion, mainly centered on the resummation of boson emission, which is believed to contribute to the cross-section with an exponential function of the energy, yet with an exponent (the "holy-grail" function) which is not fully known in the energy range of interest. In this article we focus instead on the effect of fermions beyond the Standard-Model (SM) in the polynomial contributions to the rate. It is shown that B + L processes involving the new fermions have a polynomial contribution that can be several orders of magnitude greater than in the SM, for high centre-of-mass energies and light enough masses. We also present calculations that hint at a simple dependence of the holy grail function on the heavy fermion masses. Thus, if anomalous B + L violating interactions are ever detected at high-energy colliders, they could be associated with new physics.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marchiori, Giovanni
2005-06-23
The primary goals of the BABAR experiment are the detection of CP violation (CPV) in the B meson system, the precise measurement of some of the elements of the CKM matrix and the measurement of the rates of rare B meson decays. At present, BABAR has achieved major successes: (1) the discovery, in neutral B decays, of direct and mixing-induced CP violation; (2) accurate measurements of the magnitudes of the CKM matrix elements |V cb| and |V ub|; (3) a precise measurement of the CKM parameter β {triple_bond} arg[- V cdV* cb/V tdV* tb]; (4) a first measurement of themore » CKM parameters α (triple bond) arg[- V tdV* tb/V udV* ub], γ (triple bond) arg[- V udV* ub/V cdV* cb]; and (5) the observation of several rare B decays and the discovery of new particles (in the charmed and charmonium mesons spectroscopy). However, the physics program of BABAR is not yet complete. Two of the key elements of this program that still need to be achieved are: (1) the observation of direct CP violation in charged B decays, which would constitute the first evidence of direct CPV in a charged meson decay; and (2) the precise measurement of α and γ, which are necessary ingredients for a stringent test of the Standard Model predictions in the quark electroweak sector. A possibility for the discovery of direct CP violation in charged B decays would be the observation of a non-vanishing rate asymmetry in the Cabibbo-suppressed decay B - → D 0 K -, with the D 0 decaying to either a CP-even or a CP-odd eigenstate. This class of decays can also provide theoretically-clean information on γ.« less
Mitchell, J M; McNab, W B; Yee, A J; Griffiths, M W; McEwen, S A; Spilsbury, L; Boison, J O
1998-08-01
The Lactek test, marketed for antimicrobial residue detection in milk, was validated for the detection of antimicrobial residues in tissues. A previous study found that the LacTek test could confidently identify tissue samples spiked with antimicrobial residues. However, the test could not reliably distinguish violative from nonviolative spiked samples relative to Canadian maximum residue limits (MRLs). The objectives of this study were to assess and compare the performance of the LacTek tests for beta-lactams, tetracyclines, gentamicin, and sulfamethazine on samples containing naturally incurred residues by running the test in parallel with the standard microbial inhibition test (MIT) presently used for the routine testing of tissues at our facility and to assess the agreement with high pressure liquid chromatographic (HPLC) determinative methods. Parallel testing with the official MIT found that the Lactek tests could be confidently used for testing tissue samples containing incurred residues. Among 1,008 MIT-positive samples, the LacTek test found that 90% contained beta-lactams and/or tetracyclines. A further 7.3% of violative residues could not be identified to an antimicrobial class. In addition, 9% of samples testing negative on the MIT were found to contain an antimicrobial residue by the LacTek tests. Comparative testing with HPLC methods found that there was very good agreement between the two tests and that most violations were due to penicillin G and oxytetracycline. Although the LacTek test cannot be used to distinguish violative from nonviolative residue levels, it does offer several advantages over the present MIT. These include speed, ease of use, the ability to identify residues to a specific class, and an improved sensitivity at the MRL level for the most commonly found antimicrobials in tissue.
32 CFR 1290.9 - Forms and reports.
Code of Federal Regulations, 2014 CFR
2014-07-01
.... Magistrate system is based on use of a four-ply ticket designed to provide legal notice to violators and... departments. The DD Form 1805 is printed on chemically carbonized paper and prenumbered in series for... 635, Security/Criminal Incident Report, denoting the date, time, place, and type of violation, and the...
32 CFR 1290.9 - Forms and reports.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... Magistrate system is based on use of a four-ply ticket designed to provide legal notice to violators and... departments. The DD Form 1805 is printed on chemically carbonized paper and prenumbered in series for... 635, Security/Criminal Incident Report, denoting the date, time, place, and type of violation, and the...
32 CFR 1290.9 - Forms and reports.
Code of Federal Regulations, 2012 CFR
2012-07-01
.... Magistrate system is based on use of a four-ply ticket designed to provide legal notice to violators and... departments. The DD Form 1805 is printed on chemically carbonized paper and prenumbered in series for... 635, Security/Criminal Incident Report, denoting the date, time, place, and type of violation, and the...
Consent Agreement between EPA and the Department of Interior (DOI), Bureau of Indian Affairs and Bureau of Indian Education (BIE) for violations of RCRA, CAA, TSCA, AHERA, and SDWA. These violations involve schools and public water systems.
41 CFR 105-74.505 - How are violations of this part determined for recipients who are individuals?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How are violations of... and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services Administration 74-GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE...
Trends in Drinking Water Nitrate Violations Across the United States
Drinking water maximum contaminant levels (MCL) are established by the U.S. EPA in order to protect human health. Since 1975, public water suppliers across the U.S. have reported violations of the MCL to the national Safe Drinking Water Information System (SDWIS). Nitrate is on...
Generalized monogamy of contextual inequalities from the no-disturbance principle.
Ramanathan, Ravishankar; Soeda, Akihito; Kurzyński, Paweł; Kaszlikowski, Dagomir
2012-08-03
In this Letter, we demonstrate that the property of monogamy of Bell violations seen for no-signaling correlations in composite systems can be generalized to the monogamy of contextuality in single systems obeying the Gleason property of no disturbance. We show how one can construct monogamies for contextual inequalities by using the graph-theoretic technique of vertex decomposition of a graph representing a set of measurements into subgraphs of suitable independence numbers that themselves admit a joint probability distribution. After establishing that all the subgraphs that are chordal graphs admit a joint probability distribution, we formulate a precise graph-theoretic condition that gives rise to the monogamy of contextuality. We also show how such monogamies arise within quantum theory for a single four-dimensional system and interpret violation of these relations in terms of a violation of causality. These monogamies can be tested with current experimental techniques.
Sabbah, Shai; Hawryshyn, Craig W
2013-07-04
Two competing theories have been advanced to explain the evolution of multiple cone classes in vertebrate eyes. These two theories have important, but different, implications for our understanding of the design and tuning of vertebrate visual systems. The 'contrast theory' proposes that multiple cone classes evolved in shallow-water fish to maximize the visual contrast of objects against diverse backgrounds. The competing 'flicker theory' states that multiple cone classes evolved to eliminate the light flicker inherent in shallow-water environments through antagonistic neural interactions, thereby enhancing object detection. However, the selective pressures that have driven the evolution of multiple cone classes remain largely obscure. We show that two critical assumptions of the flicker theory are violated. We found that the amplitude and temporal frequency of flicker vary over the visible spectrum, precluding its cancellation by simple antagonistic interactions between the output signals of cones. Moreover, we found that the temporal frequency of flicker matches the frequency where sensitivity is maximal in a wide range of fish taxa, suggesting that the flicker may actually enhance the detection of objects. Finally, using modeling of the chromatic contrast between fish pattern and background under flickering illumination, we found that the spectral sensitivity of cones in a cichlid focal species is optimally tuned to maximize the visual contrast between fish pattern and background, instead of to produce a flicker-free visual signal. The violation of its two critical assumptions substantially undermines support for the flicker theory as originally formulated. While this alone does not support the contrast theory, comparison of the contrast and flicker theories revealed that the visual system of our focal species was tuned as predicted by the contrast theory rather than by the flicker theory (or by some combination of the two). Thus, these findings challenge key assumptions of the flicker theory, leaving the contrast theory as the most parsimonious and tenable account of the evolution of multiple cone classes.
NASA Astrophysics Data System (ADS)
Kowalewski, R. V.
2004-03-01
These lectures present the phenomenology of B meson decays and their impact on our understanding of CP violation in the quark sector, with an emphasis on measurements made at the e+e- B factories. Some of the relevant theoretical ideas such as the Operator Product Expansion and Heavy Quark Symmetry are introduced, and applications to the determination of CKM matrix elements given. The phenomenon of B flavor oscillations is reviewed, and the mechanisms for and current status of CP violation in the B system is given. The status of rare B decays is also discussed.
B(s) Mixing, Delta Gamma(s) and CP Violation at the Tevatron
DOE Office of Scientific and Technical Information (OSTI.GOV)
Di Giovanni, Gian Piero; /Paris U., VI-VII
The authors discuss the results from the Tevatron experiments on mixing and CP violation in the B{sub s}{sup 0}-{bar B}{sub s}{sup 0} system, with particular emphasis to the updated measurements of the decay-width difference {Delta}{Lambda}{sub s} and the first measurement of the CP-violating phase {beta}{sub s} using flavor tagging information. They also briefly review the charge asymmetry measurements in semileptonic B{sub s}{sup 0} decays and in B{sup {+-}} {yields} J/{psi}K{sup {+-}} decays.
Predicting Driver Behavior during the Yellow Interval Using Video Surveillance
Li, Juan; Jia, Xudong; Shao, Chunfu
2016-01-01
At a signalized intersection, drivers must make a stop/go decision at the onset of the yellow signal. Incorrect decisions would lead to red light running (RLR) violations or crashes. This study aims to predict drivers’ stop/go decisions and RLR violations during yellow intervals. Traffic data such as vehicle approaching speed, acceleration, distance to the intersection, and occurrence of RLR violations are gathered by a Vehicle Data Collection System (VDCS). An enhanced Gaussian Mixture Model (GMM) is used to extract moving vehicles from target lanes, and the Kalman Filter (KF) algorithm is utilized to acquire vehicle trajectories. The data collected from the VDCS are further analyzed by a sequential logit model, and the relationship between drivers’ stop/go decisions and RLR violations is identified. The results indicate that the distance of vehicles to the stop line at the onset of the yellow signal is an important predictor for both drivers’ stop/go decisions and RLR violations. In addition, vehicle approaching speed is a contributing factor for stop/go decisions. Furthermore, the accelerations of vehicles after the onset of the yellow signal are positively related to RLR violations. The findings of this study can be used to predict the probability of drivers’ RLR violations and improve traffic safety at signalized intersections. PMID:27929447
Predicting Driver Behavior during the Yellow Interval Using Video Surveillance.
Li, Juan; Jia, Xudong; Shao, Chunfu
2016-12-06
At a signalized intersection, drivers must make a stop/go decision at the onset of the yellow signal. Incorrect decisions would lead to red light running (RLR) violations or crashes. This study aims to predict drivers' stop/go decisions and RLR violations during yellow intervals. Traffic data such as vehicle approaching speed, acceleration, distance to the intersection, and occurrence of RLR violations are gathered by a Vehicle Data Collection System (VDCS). An enhanced Gaussian Mixture Model (GMM) is used to extract moving vehicles from target lanes, and the Kalman Filter (KF) algorithm is utilized to acquire vehicle trajectories. The data collected from the VDCS are further analyzed by a sequential logit model, and the relationship between drivers' stop/go decisions and RLR violations is identified. The results indicate that the distance of vehicles to the stop line at the onset of the yellow signal is an important predictor for both drivers' stop/go decisions and RLR violations. In addition, vehicle approaching speed is a contributing factor for stop/go decisions. Furthermore, the accelerations of vehicles after the onset of the yellow signal are positively related to RLR violations. The findings of this study can be used to predict the probability of drivers' RLR violations and improve traffic safety at signalized intersections.
Neuroadaptive technology enables implicit cursor control based on medial prefrontal cortex activity.
Zander, Thorsten O; Krol, Laurens R; Birbaumer, Niels P; Gramann, Klaus
2016-12-27
The effectiveness of today's human-machine interaction is limited by a communication bottleneck as operators are required to translate high-level concepts into a machine-mandated sequence of instructions. In contrast, we demonstrate effective, goal-oriented control of a computer system without any form of explicit communication from the human operator. Instead, the system generated the necessary input itself, based on real-time analysis of brain activity. Specific brain responses were evoked by violating the operators' expectations to varying degrees. The evoked brain activity demonstrated detectable differences reflecting congruency with or deviations from the operators' expectations. Real-time analysis of this activity was used to build a user model of those expectations, thus representing the optimal (expected) state as perceived by the operator. Based on this model, which was continuously updated, the computer automatically adapted itself to the expectations of its operator. Further analyses showed this evoked activity to originate from the medial prefrontal cortex and to exhibit a linear correspondence to the degree of expectation violation. These findings extend our understanding of human predictive coding and provide evidence that the information used to generate the user model is task-specific and reflects goal congruency. This paper demonstrates a form of interaction without any explicit input by the operator, enabling computer systems to become neuroadaptive, that is, to automatically adapt to specific aspects of their operator's mindset. Neuroadaptive technology significantly widens the communication bottleneck and has the potential to fundamentally change the way we interact with technology.
Implicit memory in music and language.
Ettlinger, Marc; Margulis, Elizabeth H; Wong, Patrick C M
2011-01-01
Research on music and language in recent decades has focused on their overlapping neurophysiological, perceptual, and cognitive underpinnings, ranging from the mechanism for encoding basic auditory cues to the mechanism for detecting violations in phrase structure. These overlaps have most often been identified in musicians with musical knowledge that was acquired explicitly, through formal training. In this paper, we review independent bodies of work in music and language that suggest an important role for implicitly acquired knowledge, implicit memory, and their associated neural structures in the acquisition of linguistic or musical grammar. These findings motivate potential new work that examines music and language comparatively in the context of the implicit memory system.
Seismological investigation of the National Data Centre Preparedness Exercise 2013
NASA Astrophysics Data System (ADS)
Gestermann, Nicolai; Hartmann, Gernot; Ross, J. Ole; Ceranna, Lars
2015-04-01
The Comprehensive Nuclear-Test-Ban Treaty (CTBT) prohibits all kinds of nuclear explosions conducted on Earth - underground, underwater or in the atmosphere. The verification regime of the CTBT is designed to detect any treaty violation. While the data of the International Monitoring System (IMS) is collected, processed and technically analyzed at the International Data Centre (IDC) of the CTBT-Organization, National Data Centres (NDC) of the member states provide interpretation and advice to their government concerning suspicious detections. The NDC Preparedness Exercises (NPE) are regularly performed dealing with fictitious treaty violations to practice the combined analysis of CTBT verification technologies. These exercises should help to evaluate the effectiveness of analysis procedures applied at NDCs and the quality, completeness and usefulness of IDC products for example. The exercise trigger of NPE2013 is a combination of a tempo-spatial indication pointing to a certain waveform event and simulated radionuclide concentrations generated by forward Atmospheric Transport Modelling based on a fictitious release. For the waveform event the date (4 Sept. 2013) is given and the region is communicated in a map showing the fictitious state of "Frisia" at the Coast of the North Sea in Central Europe. The potential connection between the waveform and radionuclide evidence remains unclear for exercise participants. The verification task was to identify the waveform event and to investigate potential sources of the radionuclide findings. The final question was whether the findings are CTBT relevant and justify a request for On-Site-Inspection in "Frisia". The seismic event was not included in the Reviewed Event Bulletin (REB) of the IDC. The available detections from the closest seismic IMS stations lead to a epicenter accuracy of about 24 km which is not sufficient to specify the 1000 km2 inspection area in case of an OSI. With use of data from local stations and adjusted velocity models the epicenter accuracy could be improved to less than 2 km, which demonstrates the crucial role of national technical means for verification tasks. The seismic NPE2013 event could be identified as induced from natural gas production in the source region. Similar waveforms and comparable spectral characteristic as a set of events in the same region are clear indications. The scenario of a possible treaty violation at the location of the seismic NPE2013 event could be disproved.
Increasing the efficiency of photon collection in LArTPCs: the ARAPUCA light trap
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cancelo, G.; Cavanna, F.; Escobar, C. O.
The Liquid Argon Time Projection Chambers (LArTPCs) are a choice for the next generation of large neutrino detectors due to their optimal performance in particle tracking and calorimetry. The detection of Argon scintillation light plays a crucial role in the event reconstruction as well as the time reference for non-beam physics such as supernovae neutrino detection and baryon number violation studies. Here in this contribution, we present the current R&D work on the ARAPUCA (Argon R&D Advanced Program at UNICAMP), a light trap device to enhance Ar scintillation light collection and thus the overall performance of LArTPCs. The ARAPUCA workingmore » principle is based on a suitable combination of dichroic filters and wavelength shifters to achieve a high efficiency in light collection. We discuss the operational principles, the last results of laboratory tests and the application of the ARAPUCA as the alternative photon detection system in the protoDUNE detector.« less
Increasing the efficiency of photon collection in LArTPCs: the ARAPUCA light trap
Cancelo, G.; Cavanna, F.; Escobar, C. O.; ...
2018-03-26
The Liquid Argon Time Projection Chambers (LArTPCs) are a choice for the next generation of large neutrino detectors due to their optimal performance in particle tracking and calorimetry. The detection of Argon scintillation light plays a crucial role in the event reconstruction as well as the time reference for non-beam physics such as supernovae neutrino detection and baryon number violation studies. Here in this contribution, we present the current R&D work on the ARAPUCA (Argon R&D Advanced Program at UNICAMP), a light trap device to enhance Ar scintillation light collection and thus the overall performance of LArTPCs. The ARAPUCA workingmore » principle is based on a suitable combination of dichroic filters and wavelength shifters to achieve a high efficiency in light collection. We discuss the operational principles, the last results of laboratory tests and the application of the ARAPUCA as the alternative photon detection system in the protoDUNE detector.« less
A practical way to estimate retail tobacco sales violation rates more accurately.
Levinson, Arnold H; Patnaik, Jennifer L
2013-11-01
U.S. states annually estimate retailer propensity to sell adolescents cigarettes, which is a violation of law, by staging a single purchase attempt among a random sample of tobacco businesses. The accuracy of single-visit estimates is unknown. We examined this question using a novel test-retest protocol. Supervised minors attempted to purchase cigarettes at all retail tobacco businesses located in 3 Colorado counties. The attempts observed federal standards: Minors were aged 15-16 years, were nonsmokers, and were free of visible tattoos and piercings, and were allowed to enter stores alone or in pairs to purchase a small item while asking for cigarettes and to show or not show genuine identification (ID, e.g., driver's license). Unlike federal standards, stores received a second purchase attempt within a few days unless minors were firmly told not to return. Separate violation rates were calculated for first visits, second visits, and either visit. Eleven minors attempted to purchase cigarettes 1,079 times from 671 retail businesses. One sixth of first visits (16.8%) resulted in a violation; the rate was similar for second visits (15.7%). Considering either visit, 25.3% of businesses failed the test. Factors predictive of violation were whether clerks asked for ID, whether the clerks closely examined IDs, and whether minors included snacks or soft drinks in cigarette purchase attempts. A test-retest protocol for estimating underage cigarette sales detected half again as many businesses in violation as the federally approved one-test protocol. Federal policy makers should consider using the test-retest protocol to increase accuracy and awareness of widespread adolescent access to cigarettes through retail businesses.
Experimental many-pairs nonlocality
NASA Astrophysics Data System (ADS)
Poh, Hou Shun; Cerè, Alessandro; Bancal, Jean-Daniel; Cai, Yu; Sangouard, Nicolas; Scarani, Valerio; Kurtsiefer, Christian
2017-08-01
Collective measurements on large quantum systems together with a majority voting strategy can lead to a violation of the Clauser-Horne-Shimony-Holt Bell inequality. In the presence of many entangled pairs, this violation decreases quickly with the number of pairs and vanishes for some critical pair number that is a function of the noise present in the system. Here we show that a different binning strategy can lead to a more substantial Bell violation when the noise is sufficiently small. Given the relation between the critical pair number and the source noise, we then present an experiment where the critical pair number is used to quantify the quality of a high visibility photon pair source. Our results demonstrate nonlocal correlations using collective measurements operating on clusters of more than 40 photon pairs.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nikolić, Hrvoje, E-mail: hnikolic@irb.hr
An argument by Banks, Susskind and Peskin (BSP), according to which violation of unitarity would violate either locality or energy-momentum conservation, is widely believed to be a strong argument against non-unitarity of Hawking radiation. We find that the whole BSP argument rests on the crucial assumption that the Hamiltonian is not highly degenerate, and point out that this assumption is not satisfied for systems with many degrees of freedom. Using Lindblad equation, we show that high degeneracy of the Hamiltonian allows local non-unitary evolution without violating energy-momentum conservation. Moreover, since energy-momentum is the source of gravity, we argue that energy-momentummore » is necessarily conserved for a large class of non-unitary systems with gravity. Finally, we explicitly calculate the Lindblad operators for non-unitary Hawking radiation and show that they conserve energy-momentum.« less
Violation of Bell inequalities for arbitrary-dimensional bipartite systems
NASA Astrophysics Data System (ADS)
Yang, Yanmin; Zheng, Zhu-Jun
2018-01-01
In this paper, we consider the violation of Bell inequalities for quantum system C^K⊗ C^K (integer K≥2) with group theoretical method. For general M possible measurements, and each measurement with K outcomes, the Bell inequalities based on the choice of two orbits are derived. When the observables are much enough, the quantum bounds are only dependent on M and approximate to the classical bounds. Moreover, the corresponding nonlocal games with two different scenarios are analyzed.
Thermal entanglement and teleportation in a dipolar interacting system
NASA Astrophysics Data System (ADS)
Castro, C. S.; Duarte, O. S.; Pires, D. P.; Soares-Pinto, D. O.; Reis, M. S.
2016-04-01
Quantum teleportation, which depends on entangled states, is a fascinating subject and an important branch of quantum information processing. The present work reports the use of a dipolar spin thermal system as a noisy quantum channel to perform quantum teleportation. Non-locality, tested by violation of Bell's inequality and thermal entanglement, measured by negativity, shows that for the present model all entangled states, even those that do not violate Bell's inequality, are useful for teleportation.
The SERENITY Runtime Monitoring Framework
NASA Astrophysics Data System (ADS)
Spanoudakis, George; Kloukinas, Christos; Mahbub, Khaled
This chapter describes SERENITY’s approach to runtime monitoring and the framework that has been developed to support it. Runtime monitoring is required in SERENITY in order to check for violations of security and dependability properties which are necessary for the correct operation of the security and dependability solutions that are available from the SERENITY framework. This chapter discusses how such properties are specified and monitored. The chapter focuses on the activation and execution of monitoring activities using S&D Patterns and the actions that may be undertaken following the detection of property violations. The approach is demonstrated in reference to one of the industrial case studies of the SERENITY project.
Violation of the Leggett-Garg Inequality in neutrino oscillations
NASA Astrophysics Data System (ADS)
Weiss, T. E.; Formaggio, J. A.; Kaiser, D. I.; Murskyj, M. M.
2017-09-01
The Leggett-Garg inequality, an analogue of Bell’s inequality involving correlations of measurements on a system at different times, stands as one of the hallmark tests of quantum mechanics against classical predictions. The phenomenon of neutrino oscillations should adhere to quantum-mechanical predictions and provide an observable violation of the Leggett-Garg inequality. We demonstrate how oscillation phenomena can be used to test for violations of the classical bound by performing measurements on an ensemble of neutrinos at distinct energies, as opposed to a single neutrino at distinct times. A study of the MINOS experiment’s data shows a greater than 6σ violation over a distance of 735 km, representing the longest distance over which either the Leggett-Garg inequality or Bell’s inequality has been tested.
Theory of Genuine Tripartite Nonlocality of Gaussian States
NASA Astrophysics Data System (ADS)
Adesso, Gerardo; Piano, Samanta
2014-01-01
We investigate the genuine multipartite nonlocality of three-mode Gaussian states of continuous variable systems. For pure states, we present a simplified procedure to obtain the maximum violation of the Svetlichny inequality based on displaced parity measurements, and we analyze its interplay with genuine tripartite entanglement measured via Rényi-2 entropy. The maximum Svetlichny violation admits tight upper and lower bounds at fixed tripartite entanglement. For mixed states, no violation is possible when the purity falls below 0.86. We also explore a set of recently derived weaker inequalities for three-way nonlocality, finding violations for all tested pure states. Our results provide a strong signature for the nonclassical and nonlocal nature of Gaussian states despite their positive Wigner function, and lead to precise recipes for its experimental verification.
This policy addresses significant noncompliance (SNC) violations associated with combined sewer overflows (CSOs), sanitary sewer overflows (SSOs), concentrated animal feeding operations (CAFOs), and storm water point source discharges covered by the National Pollutant Discharge Elimination System (NPDES) program under the Clean Water Act (CWA).
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What actions will the...-74.510 Public Contracts and Property Management Federal Property Management Regulations System...-GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Violations of this Part and...
DOT National Transportation Integrated Search
2004-03-01
The report provides the first two major task reports for a study to develop performance specifications and perform supporting objective tests for a planned field operational test (FOT) of a vehicle-based countermeasure to intersection crashes associa...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-15
... reporting is ``an ex post activity'' that provides only prospective benefits to system reliability.\\14... Section 215, and those obligations that do not, such as administrative record-keeping and ex- post... EOP-004-2 becomes effective. Finally, we approve the proposed violation risk factors and violation...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalty. 235.9 Section 235.9 Transportation... SIGNAL SYSTEM OR RELIEF FROM THE REQUIREMENTS OF PART 236 § 235.9 Civil penalty. Any person (an entity of... violates any requirement of this part or causes the violation of any such requirement is subject to a civil...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 4 2011-10-01 2011-10-01 false Civil penalty. 235.9 Section 235.9 Transportation... SIGNAL SYSTEM OR RELIEF FROM THE REQUIREMENTS OF PART 236 § 235.9 Civil penalty. Any person (an entity of... violates any requirement of this part or causes the violation of any such requirement is subject to a civil...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 4 2014-10-01 2014-10-01 false Civil penalty. 235.9 Section 235.9 Transportation... SIGNAL SYSTEM OR RELIEF FROM THE REQUIREMENTS OF PART 236 § 235.9 Civil penalty. Any person (an entity of... violates any requirement of this part or causes the violation of any such requirement is subject to a civil...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 4 2012-10-01 2012-10-01 false Civil penalty. 235.9 Section 235.9 Transportation... SIGNAL SYSTEM OR RELIEF FROM THE REQUIREMENTS OF PART 236 § 235.9 Civil penalty. Any person (an entity of... violates any requirement of this part or causes the violation of any such requirement is subject to a civil...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 4 2013-10-01 2013-10-01 false Civil penalty. 235.9 Section 235.9 Transportation... SIGNAL SYSTEM OR RELIEF FROM THE REQUIREMENTS OF PART 236 § 235.9 Civil penalty. Any person (an entity of... violates any requirement of this part or causes the violation of any such requirement is subject to a civil...
Classical Causal Models for Bell and Kochen-Specker Inequality Violations Require Fine-Tuning
NASA Astrophysics Data System (ADS)
Cavalcanti, Eric G.
2018-04-01
Nonlocality and contextuality are at the root of conceptual puzzles in quantum mechanics, and they are key resources for quantum advantage in information-processing tasks. Bell nonlocality is best understood as the incompatibility between quantum correlations and the classical theory of causality, applied to relativistic causal structure. Contextuality, on the other hand, is on a more controversial foundation. In this work, I provide a common conceptual ground between nonlocality and contextuality as violations of classical causality. First, I show that Bell inequalities can be derived solely from the assumptions of no signaling and no fine-tuning of the causal model. This removes two extra assumptions from a recent result from Wood and Spekkens and, remarkably, does not require any assumption related to independence of measurement settings—unlike all other derivations of Bell inequalities. I then introduce a formalism to represent contextuality scenarios within causal models and show that all classical causal models for violations of a Kochen-Specker inequality require fine-tuning. Thus, the quantum violation of classical causality goes beyond the case of spacelike-separated systems and already manifests in scenarios involving single systems.
Spectroscopy and imaging with a 4 tesla whole-body MR system.
Bomsdorf, H; Helzel, T; Kunz, D; Röschmann, P; Tschendel, O; Wieland, J
1988-06-01
Magnetic resonance (MR) spectroscopy and imaging experiments on humans were performed with a whole-body MR system at a static field of 4 tesla. Spectroscopic studies focussed on 1H, 13C, and 31P. Imaging of humans turned out to be possible, although below the optimum at this field. This holds especially for body imaging, since RF penetration effects and dielectric resonances influence the RF field homogeneity. Excellent volume selective proton spectra of the human cerebrum and cerebellum were obtained using the stimulated echo method. Natural abundance carbon spectra of the human calf were acquired both undecoupled and with narrowband decoupling, resolving the various triglyceride resonances. Broadband decoupling, however, would have violated SAR guidelines. Liver glycogen was detected on natural abundance 13C spectra.
A source of antihydrogen for in-flight hyperfine spectroscopy
Kuroda, N.; Ulmer, S.; Murtagh, D. J.; Van Gorp, S.; Nagata, Y.; Diermaier, M.; Federmann, S.; Leali, M.; Malbrunot, C.; Mascagna, V.; Massiczek, O.; Michishio, K.; Mizutani, T.; Mohri, A.; Nagahama, H.; Ohtsuka, M.; Radics, B.; Sakurai, S.; Sauerzopf, C.; Suzuki, K.; Tajima, M.; Torii, H. A.; Venturelli, L.; Wu¨nschek, B.; Zmeskal, J.; Zurlo, N.; Higaki, H.; Kanai, Y.; Lodi Rizzini, E.; Nagashima, Y.; Matsuda, Y.; Widmann, E.; Yamazaki, Y.
2014-01-01
Antihydrogen, a positron bound to an antiproton, is the simplest antiatom. Its counterpart—hydrogen—is one of the most precisely investigated and best understood systems in physics research. High-resolution comparisons of both systems provide sensitive tests of CPT symmetry, which is the most fundamental symmetry in the Standard Model of elementary particle physics. Any measured difference would point to CPT violation and thus to new physics. Here we report the development of an antihydrogen source using a cusp trap for in-flight spectroscopy. A total of 80 antihydrogen atoms are unambiguously detected 2.7 m downstream of the production region, where perturbing residual magnetic fields are small. This is a major step towards precision spectroscopy of the ground-state hyperfine splitting of antihydrogen using Rabi-like beam spectroscopy. PMID:24448273
Kepler-36: a pair of planets with neighboring orbits and dissimilar densities.
Carter, Joshua A; Agol, Eric; Chaplin, William J; Basu, Sarbani; Bedding, Timothy R; Buchhave, Lars A; Christensen-Dalsgaard, Jørgen; Deck, Katherine M; Elsworth, Yvonne; Fabrycky, Daniel C; Ford, Eric B; Fortney, Jonathan J; Hale, Steven J; Handberg, Rasmus; Hekker, Saskia; Holman, Matthew J; Huber, Daniel; Karoff, Christopher; Kawaler, Steven D; Kjeldsen, Hans; Lissauer, Jack J; Lopez, Eric D; Lund, Mikkel N; Lundkvist, Mia; Metcalfe, Travis S; Miglio, Andrea; Rogers, Leslie A; Stello, Dennis; Borucki, William J; Bryson, Steve; Christiansen, Jessie L; Cochran, William D; Geary, John C; Gilliland, Ronald L; Haas, Michael R; Hall, Jennifer; Howard, Andrew W; Jenkins, Jon M; Klaus, Todd; Koch, David G; Latham, David W; MacQueen, Phillip J; Sasselov, Dimitar; Steffen, Jason H; Twicken, Joseph D; Winn, Joshua N
2012-08-03
In the solar system, the planets' compositions vary with orbital distance, with rocky planets in close orbits and lower-density gas giants in wider orbits. The detection of close-in giant planets around other stars was the first clue that this pattern is not universal and that planets' orbits can change substantially after their formation. Here, we report another violation of the orbit-composition pattern: two planets orbiting the same star with orbital distances differing by only 10% and densities differing by a factor of 8. One planet is likely a rocky "super-Earth," whereas the other is more akin to Neptune. These planets are 20 times more closely spaced and have a larger density contrast than any adjacent pair of planets in the solar system.
CP Violation in b- and c-hadron decays at LHCb
NASA Astrophysics Data System (ADS)
Steinkamp, Olaf;
2017-07-01
Testing the Standard Model of particle physics by precision measurements of CP violating observables in the decays of b and c hadrons has been one of the design goals of the LHCb experiment. World-leading measurements have been performed of the semileptonic asymmetry, {a}ssl, and of the mixing-induced CP-violating phase ϕs in the {B}s0{\\bar{B}}s0 system. The CKM angle γ is still the least known angle of the Unitarity Triangle, and the only one easily accessible using tree-level decays. A recent combination of LHCb measurements in various B → DK decay modes has yielded the most precise determination of γ from a single experiment to date. The LHCb experiment is collecting unprecedented samples of beauty baryons, allowing for the first time to study CP violating observables in their decays. A recent analysis provided the first evidence for CP violation in the beauty baryon sector. Finally, LHCb has the largest samples of charmed hadron decays collected by any experiment to date. These samples yield some of the world’s most sensitive searches for direct and indirect CP violation in the charm sector.
Community Response to Impaired Drinking Water Quality: Evidence from Bottled Water Sales
NASA Astrophysics Data System (ADS)
Allaire, M.; Zheng, S.; Lall, U.
2017-12-01
Drinking water contaminants pose a harm to public health. When confronted with elevated contaminate levels, individuals can take averting actions to reduce exposure, such as bottled water purchases. This study addresses a problem of national interest given that 9 to 45 million people have been affected by drinking water quality violations in each of the past 34 years. Moreover, few studies address averting behavior and avoidance costs due to water quality violations. This study assesses how responses might differ across baseline risk of impaired water quality and demographics of service area. We match a panel of weekly supermarket sales data with geocoded violations data for 67 counties in the Southeast from 2006-2015. We estimate the change in bottled water sales due to drinking water violations using a fixed effects model. Observing market behavior also allows us to calculate the cost of these averting actions. Critical findings from this study contribute to understanding how communities respond to water quality violations. We find that violations have considerable effects on bottled water consumption. Sales increase 8.1 percent due to violations related to microorganisms and 31.2 percent due to Tier 1 violations, which pose an immediate health risk. In addition, we calculate a national cost of averting actions of $26 million for microorganism violations from 2006-2015, which represents a lower-bound estimate. Averting costs vary considerably across the U.S. and some counties bear a particularly large burden, such as in California and Texas. Overall, this study provides insight into how averting behavior differs across contaminant type, water utility characteristics, and community demographics. Such knowledge can aid public health agencies, water systems, and environmental regulators to direct assistance to communities most in need.
Zetterqvist, Anna V; Mulinari, Shai
2013-01-01
The alleged efficacy of pharmaceutical industry self-regulation has been used to repudiate increased government oversight over promotional activity. European politicians and industry have cited Sweden as an excellent example of self-regulation based on an ethical code. This paper considers antidepressant advertising in Sweden to uncover the strengths and weaknesses of self-regulation. We analyzed all antidepressant advertisements in the Swedish Medical Journal, 1994-2003. The regulation of these advertisements was analyzed using case reports from self-regulatory bodies. The authors independently reviewed this material to investigate: (1) extent of violative advertising; (2) pattern of code breaches; (3) rate at which the system reacted to violative advertising; (4) prevalence of and oversight over claims regarding antidepressant efficacy and disease causality, and (5) costs for manufactures associated with violative advertising. Self-regulatory bodies identified numerous code breaches. Nonetheless, they failed to protect doctors from unreliable information on antidepressants, since as many as 247 of 722 (34%) advertisements breached the industry code. Self-regulatory bodies repeatedly failed to challenge inflated claims of antidepressant efficacy, lending evidence of lax oversight. On average, 15 weeks elapsed between printing and censure of a wrongful claim, and in 25% of cases 47 weeks or more elapsed. Industry paid roughly €108000 in fines for violative advertising, adding an estimated additional average cost of 11% to each purchased violative advertisement, or amounting to as little as 0.009% of total antidepressant sales of around €1.2 billion. Lax oversight, combined with lags in the system and low fines for violations, may explain the Swedish system's failure to pressure companies into providing reliable antidepressants information. If these shortcomings prove to be consistent across self-regulatory settings, and if appropriate measures are not taken to amend shortcomings, many countries may want to reconsider the current balance between self-regulation, and legislative control with government oversight.
NASA Astrophysics Data System (ADS)
Li, Lei; Hu, Jianhao
2010-12-01
Notice of Violation of IEEE Publication Principles"Joint Redundant Residue Number Systems and Module Isolation for Mitigating Single Event Multiple Bit Upsets in Datapath"by Lei Li and Jianhao Hu,in the IEEE Transactions on Nuclear Science, vol.57, no.6, Dec. 2010, pp. 3779-3786After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.This paper contains substantial duplication of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:"Multiple Error Detection and Correction Based on Redundant Residue Number Systems"by Vik Tor Goh and M.U. Siddiqi,in the IEEE Transactions on Communications, vol.56, no.3, March 2008, pp.325-330"A Coding Theory Approach to Error Control in Redundant Residue Number Systems. I: Theory and Single Error Correction"by H. Krishna, K-Y. Lin, and J-D. Sun, in the IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol.39, no.1, Jan 1992, pp.8-17In this paper, we propose a joint scheme which combines redundant residue number systems (RRNS) with module isolation (MI) for mitigating single event multiple bit upsets (SEMBUs) in datapath. The proposed hardening scheme employs redundant residues to improve the fault tolerance for datapath and module spacings to guarantee that SEMBUs caused by charge sharing do not propagate among the operation channels of different moduli. The features of RRNS, such as independence, parallel and error correction, are exploited to establish the radiation hardening architecture for the datapath in radiation environments. In the proposed scheme, all of the residues can be processed independently, and most of the soft errors in datapath can be corrected with the redundant relationship of the residues at correction module, which is allocated at the end of the datapath. In the back-end implementation, module isolation technique is used to improve the soft error rate performance for RRNS by physically separating the operation channels of different moduli. The case studies show at least an order of magnitude decrease on the soft error rate (SER) as compared to the NonRHBD designs, and demonstrate that RRNS+MI can reduce the SER from 10-12 to 10-17 when the processing steps of datapath are 106. The proposed scheme can even achieve less area and latency overheads than that without radiation hardening, since RRNS can reduce the operational complexity in datapath.
Grinter, Roger; Jones, Garth A
2018-02-01
The transfer of angular momentum between a quadrupole emitter and a dipole acceptor is investigated theoretically. Vector spherical harmonics are used to describe the angular part of the field of the mediating photon. Analytical results are presented for predicting angular momentum transfer between the emitter and absorber within a quantum electrodynamical framework. We interpret the allowability of such a process, which appears to violate conservation of angular momentum, in terms of the breakdown of the isotropy of space at the point of photon absorption (detection). That is, collapse of the wavefunction results in loss of all angular momentum information. This is consistent with Noether's Theorem and demystifies some common misconceptions about the nature of the photon. The results have implications for interpreting the detection of photons from multipole sources and offers insight into limits on information that can be extracted from quantum measurements in photonic systems.
Event-Ready Bell Test Using Entangled Atoms Simultaneously Closing Detection and Locality Loopholes
NASA Astrophysics Data System (ADS)
Rosenfeld, Wenjamin; Burchardt, Daniel; Garthoff, Robert; Redeker, Kai; Ortegel, Norbert; Rau, Markus; Weinfurter, Harald
2017-07-01
An experimental test of Bell's inequality allows ruling out any local-realistic description of nature by measuring correlations between distant systems. While such tests are conceptually simple, there are strict requirements concerning the detection efficiency of the involved measurements, as well as the enforcement of spacelike separation between the measurement events. Only very recently could both loopholes be closed simultaneously. Here we present a statistically significant, event-ready Bell test based on combining heralded entanglement of atoms separated by 398 m with fast and efficient measurements of the atomic spin states closing essential loopholes. We obtain a violation with S =2.221 ±0.033 (compared to the maximal value of 2 achievable with models based on local hidden variables) which allows us to refute the hypothesis of local realism with a significance level P <2.57 ×10-9.
Involvement of the human midbrain and thalamus in auditory deviance detection.
Cacciaglia, Raffaele; Escera, Carles; Slabu, Lavinia; Grimm, Sabine; Sanjuán, Ana; Ventura-Campos, Noelia; Ávila, César
2015-02-01
Prompt detection of unexpected changes in the sensory environment is critical for survival. In the auditory domain, the occurrence of a rare stimulus triggers a cascade of neurophysiological events spanning over multiple time-scales. Besides the role of the mismatch negativity (MMN), whose cortical generators are located in supratemporal areas, cumulative evidence suggests that violations of auditory regularities can be detected earlier and lower in the auditory hierarchy. Recent human scalp recordings have shown signatures of auditory mismatch responses at shorter latencies than those of the MMN. Moreover, animal single-unit recordings have demonstrated that rare stimulus changes cause a release from stimulus-specific adaptation in neurons of the primary auditory cortex, the medial geniculate body (MGB), and the inferior colliculus (IC). Although these data suggest that change detection is a pervasive property of the auditory system which may reside upstream cortical sites, direct evidence for the involvement of subcortical stages in the human auditory novelty system is lacking. Using event-related functional magnetic resonance imaging during a frequency oddball paradigm, we here report that auditory deviance detection occurs in the MGB and the IC of healthy human participants. By implementing a random condition controlling for neural refractoriness effects, we show that auditory change detection in these subcortical stations involves the encoding of statistical regularities from the acoustic input. These results provide the first direct evidence of the existence of multiple mismatch detectors nested at different levels along the human ascending auditory pathway. Copyright © 2015 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Overduin, James; Everitt, Francis; Worden, Paul; Mester, John
2012-09-01
The Satellite Test of the Equivalence Principle (STEP) will advance experimental limits on violations of Einstein's equivalence principle from their present sensitivity of two parts in 1013 to one part in 1018 through multiple comparison of the motions of four pairs of test masses of different compositions in a drag-free earth-orbiting satellite. We describe the experiment, its current status and its potential implications for fundamental physics. Equivalence is at the heart of general relativity, our governing theory of gravity and violations are expected in most attempts to unify this theory with the other fundamental interactions of physics, as well as in many theoretical explanations for the phenomenon of dark energy in cosmology. Detection of such a violation would be equivalent to the discovery of a new force of nature. A null result would be almost as profound, pushing upper limits on any coupling between standard-model fields and the new light degrees of freedom generically predicted by these theories down to unnaturally small levels.
Fully device-independent conference key agreement
NASA Astrophysics Data System (ADS)
Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie
2018-02-01
We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.
Tzur, Gabriel; Berger, Andrea
2009-03-17
Theta rhythm has been connected to ERP components such as the error-related negativity (ERN) and the feedback-related negativity (FRN). The nature of this theta activity is still unclear, that is, whether it is related to error detection, conflict between responses or reinforcement learning processes. We examined slow (e.g., theta) and fast (e.g., gamma) brain rhythms related to rule violation. A time-frequency decomposition analysis on a wide range of frequencies band (0-95 Hz) indicated that the theta activity relates to evaluation processes, regardless of motor/action processes. Similarities between the theta activities found in rule-violation tasks and in tasks eliciting ERN/FRN suggest that this theta activity reflects the operation of general evaluation mechanisms. Moreover, significant effects were found also in fast brain rhythms. These effects might be related to the synchronization between different types of cognitive processes involving the fulfillment of a task (e.g., working memory, visual perception, mathematical calculation, etc.).
Finite-time stabilisation of a class of switched nonlinear systems with state constraints
NASA Astrophysics Data System (ADS)
Huang, Shipei; Xiang, Zhengrong
2018-06-01
This paper investigates the finite-time stabilisation for a class of switched nonlinear systems with state constraints. Some power orders of the system are allowed to be ratios of positive even integers over odd integers. A Barrier Lyapunov function is introduced to guarantee that the state constraint is not violated at any time. Using the convex combination method and a recursive design approach, a state-dependent switching law and state feedback controllers of individual subsystems are constructed such that the closed-loop system is finite-time stable without violation of the state constraint. Two examples are provided to show the effectiveness of the proposed method.
Wu, Yina; Abdel-Aty, Mohamed; Ding, Yaoxian; Jia, Bin; Shi, Qi; Yan, Xuedong
2018-07-01
The Type II dilemma zone describes the road segment to a signalized intersection where drivers have difficulties to decide either stop or go at the onset of yellow signal. Such phenomenon can result in an increased crash risk at signalized intersections. Different types of warning systems have been proposed to help drivers make decisions. Although the warning systems help to improve drivers' behavior, they also have several disadvantages such as increasing rear-end crashes or red-light running (RLR) violations. In this study, a new warning system called pavement marking with auxiliary countermeasure (PMAIC) is proposed to reduce the dilemma zone and enhance the traffic safety at signalized intersections. The proposed warning system integrates the pavement marking and flashing yellow system which can provide drivers with better suggestions about stop/go decisions based on their arriving time and speed. In order to evaluate the performance of the proposed warning system, this paper presents a cellular automata (CA) simulation study. The CA simulations are conducted for four different scenarios in total, including the typical intersection without warning system, the intersection with flashing green countermeasure, the intersection with pavement marking, and the intersection with the PMAIC warning system. Before the specific CA simulation analysis, a logistic regression model is calibrated based on field video data to predict drivers' general stop/go decisions. Also, the rules of vehicle movements in the CA models under the influence by different warning systems are proposed. The proxy indicators of rear-end crash and potential RLR violations were estimated and used to evaluate safety levels for the different scenarios. The simulation results showed that the PMAIC countermeasure consistently offered best performance to reduce rear-end crash and RLR violation. Meanwhile, the results indicate that the flashing-green countermeasure could not effectively reduce either rear-end crash risk or RLR violations. Also, it is found that the pavement-marking countermeasure has positive effects on reducing the rear-end risk while it may increase the probability of RLR violation. Lastly, the implementation of the proposed warning system is discussed with the consideration of connected-vehicle technology. It is expected that the dilemma zone issues can be efficiently addressed if the proposed countermeasure can be employed within connected vehicle technology. Copyright © 2017 Elsevier Ltd. All rights reserved.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 41 Public Contracts and Property Management 4 2013-07-01 2012-07-01 true What happens if I violate... Contracts and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES RELOCATION ALLOWANCES 3-RELOCATION ALLOWANCE BY SPECIFIC TYPE Types of Transfers Overseas Tour Renewal Agreement § 302-3...
40 CFR 63.7501 - Affirmative Defense for Violation of Emission Standards During Malfunction.
Code of Federal Regulations, 2014 CFR
2014-07-01
...: (1) The violation: (i) Was caused by a sudden, infrequent, and unavoidable failure of air pollution... practices; and (iii) Did not stem from any activity or event that could have been foreseen and avoided, or..., and human health; and (6) All emissions monitoring and control systems were kept in operation if at...
40 CFR 63.7501 - Affirmative Defense for Violation of Emission Standards During Malfunction.
Code of Federal Regulations, 2013 CFR
2013-07-01
...: (1) The violation: (i) Was caused by a sudden, infrequent, and unavoidable failure of air pollution... practices; and (iii) Did not stem from any activity or event that could have been foreseen and avoided, or..., and human health; and (6) All emissions monitoring and control systems were kept in operation if at...
40 CFR 69.13 - Title V conditional exemption.
Code of Federal Regulations, 2011 CFR
2011-07-01
... with a fixed term that shall not exceed five years. (10) The program shall allow Guam or the EPA to... penalties up to $10,000 per day per violation and to enjoin activities that are in violation of the permit... sources within three years of EPA approval of the program. (8) The program shall include a system of...
40 CFR 69.13 - Title V conditional exemption.
Code of Federal Regulations, 2010 CFR
2010-07-01
... with a fixed term that shall not exceed five years. (10) The program shall allow Guam or the EPA to... penalties up to $10,000 per day per violation and to enjoin activities that are in violation of the permit... sources within three years of EPA approval of the program. (8) The program shall include a system of...
The Spatial Distribution of Smoking Violations on a No-Smoking Campus: Implications for Prevention
ERIC Educational Resources Information Center
Pires, Stephen F.; Block, Steven; Belance, Ronald; Marteache, Nerea
2016-01-01
Objective: The present study extends research on campus smoking bans by examining where smokers are violating the policy at a large university in the southeastern region of the United States. Participants: The data collection was conducted by one graduate student from the university in August of 2014. Methods: A global positioning system device…
75 FR 5094 - Privacy Act of 1974; Report of an Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-01
... from the Division of Health Careers Diversity and Development in room 8-37 to the Division of Student... violation or potential violation of law, whether civil, criminal, or regulatory in nature, and whether.... Requesters may also request an accounting of disclosures that have been made of their records, if any...
A new device-independent dimension witness and its experimental implementation
NASA Astrophysics Data System (ADS)
Cai, Yu; Bancal, Jean-Daniel; Romero, Jacquiline; Scarani, Valerio
2016-07-01
A dimension witness is a criterion that sets a lower bound on the dimension needed to reproduce the observed data. Three types of dimension witnesses can be found in the literature: device-dependent ones, in which the bound is obtained assuming some knowledge on the state and the measurements; device-independent prepare-and-measure ones, that can be applied to any system including classical ones; and device-independent Bell-based ones, that certify the minimal dimension of some entangled systems. Here we consider the Collins-Gisin-Linden-Massar-Popescu Bell-type inequality for four outcomes. We show that a sufficiently high violation of this inequality witnesses d≥slant 4 and present a proof-of-principle experimental observation of such a violation. This presents a first experimental violation of the third type of dimension witness beyond qutrits.
Hybrid methods for witnessing entanglement in a microscopic-macroscopic system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Spagnolo, Nicolo; Consorzio Nazionale Interuniversitario per le Scienze Fisiche della Materia, Piazzale Aldo Moro 5, I-00185 Roma; Vitelli, Chiara
2011-09-15
We propose a hybrid approach to the experimental assessment of the genuine quantum features of a general system consisting of microscopic and macroscopic parts. We infer entanglement by combining dichotomic measurements on a bidimensional system and phase-space inference through the Wigner distribution associated with the macroscopic component of the state. As a benchmark, we investigate the feasibility of our proposal in a bipartite-entangled state composed of a single-photon and a multiphoton field. Our analysis shows that, under ideal conditions, maximal violation of a Clauser-Horne-Shimony-Holt-based inequality is achievable regardless of the number of photons in the macroscopic part of the state.more » The difficulty in observing entanglement when losses and detection inefficiency are included can be overcome by using a hybrid entanglement witness that allows efficient correction for losses in the few-photon regime.« less
van Elk, Michiel; Bousardt, Roel; Bekkering, Harold; van Schie, Hein T
2012-01-01
Detecting errors in other's actions is of pivotal importance for joint action, competitive behavior and observational learning. Although many studies have focused on the neural mechanisms involved in detecting low-level errors, relatively little is known about error-detection in everyday situations. The present study aimed to identify the functional and neural mechanisms whereby we understand the correctness of other's actions involving well-known objects (e.g. pouring coffee in a cup). Participants observed action sequences in which the correctness of the object grasped and the grip applied to a pair of objects were independently manipulated. Observation of object violations (e.g. grasping the empty cup instead of the coffee pot) resulted in a stronger P3-effect than observation of grip errors (e.g. grasping the coffee pot at the upper part instead of the handle), likely reflecting a reorienting response, directing attention to the relevant location. Following the P3-effect, a parietal slow wave positivity was observed that persisted for grip-errors, likely reflecting the detection of an incorrect hand-object interaction. These findings provide new insight in the functional significance of the neurophysiological markers associated with the observation of incorrect actions and suggest that the P3-effect and the subsequent parietal slow wave positivity may reflect the detection of errors at different levels in the action hierarchy. Thereby this study elucidates the cognitive processes that support the detection of action violations in the selection of objects and grips.
Usability of a patient education and motivation tool using heuristic evaluation.
Joshi, Ashish; Arora, Mohit; Dai, Liwei; Price, Kathleen; Vizer, Lisa; Sears, Andrew
2009-11-06
Computer-mediated educational applications can provide a self-paced, interactive environment to deliver educational content to individuals about their health condition. These programs have been used to deliver health-related information about a variety of topics, including breast cancer screening, asthma management, and injury prevention. We have designed the Patient Education and Motivation Tool (PEMT), an interactive computer-based educational program based on behavioral, cognitive, and humanistic learning theories. The tool is designed to educate users and has three key components: screening, learning, and evaluation. The objective of this tutorial is to illustrate a heuristic evaluation using a computer-based patient education program (PEMT) as a case study. The aims were to improve the usability of PEMT through heuristic evaluation of the interface; to report the results of these usability evaluations; to make changes based on the findings of the usability experts; and to describe the benefits and limitations of applying usability evaluations to PEMT. PEMT was evaluated by three usability experts using Nielsen's usability heuristics while reviewing the interface to produce a list of heuristic violations with severity ratings. The violations were sorted by heuristic and ordered from most to least severe within each heuristic. A total of 127 violations were identified with a median severity of 3 (range 0 to 4 with 0 = no problem to 4 = catastrophic problem). Results showed 13 violations for visibility (median severity = 2), 38 violations for match between system and real world (median severity = 2), 6 violations for user control and freedom (median severity = 3), 34 violations for consistency and standards (median severity = 2), 11 violations for error severity (median severity = 3), 1 violation for recognition and control (median severity = 3), 7 violations for flexibility and efficiency (median severity = 2), 9 violations for aesthetic and minimalist design (median severity = 2), 4 violations for help users recognize, diagnose, and recover from errors (median severity = 3), and 4 violations for help and documentation (median severity = 4). We describe the heuristic evaluation method employed to assess the usability of PEMT, a method which uncovers heuristic violations in the interface design in a quick and efficient manner. Bringing together usability experts and health professionals to evaluate a computer-mediated patient education program can help to identify problems in a timely manner. This makes this method particularly well suited to the iterative design process when developing other computer-mediated health education programs. Heuristic evaluations provided a means to assess the user interface of PEMT.
Usability of a Patient Education and Motivation Tool Using Heuristic Evaluation
Arora, Mohit; Dai, Liwei; Price, Kathleen; Vizer, Lisa; Sears, Andrew
2009-01-01
Background Computer-mediated educational applications can provide a self-paced, interactive environment to deliver educational content to individuals about their health condition. These programs have been used to deliver health-related information about a variety of topics, including breast cancer screening, asthma management, and injury prevention. We have designed the Patient Education and Motivation Tool (PEMT), an interactive computer-based educational program based on behavioral, cognitive, and humanistic learning theories. The tool is designed to educate users and has three key components: screening, learning, and evaluation. Objective The objective of this tutorial is to illustrate a heuristic evaluation using a computer-based patient education program (PEMT) as a case study. The aims were to improve the usability of PEMT through heuristic evaluation of the interface; to report the results of these usability evaluations; to make changes based on the findings of the usability experts; and to describe the benefits and limitations of applying usability evaluations to PEMT. Methods PEMT was evaluated by three usability experts using Nielsen’s usability heuristics while reviewing the interface to produce a list of heuristic violations with severity ratings. The violations were sorted by heuristic and ordered from most to least severe within each heuristic. Results A total of 127 violations were identified with a median severity of 3 (range 0 to 4 with 0 = no problem to 4 = catastrophic problem). Results showed 13 violations for visibility (median severity = 2), 38 violations for match between system and real world (median severity = 2), 6 violations for user control and freedom (median severity = 3), 34 violations for consistency and standards (median severity = 2), 11 violations for error severity (median severity = 3), 1 violation for recognition and control (median severity = 3), 7 violations for flexibility and efficiency (median severity = 2), 9 violations for aesthetic and minimalist design (median severity = 2), 4 violations for help users recognize, diagnose, and recover from errors (median severity = 3), and 4 violations for help and documentation (median severity = 4). Conclusion We describe the heuristic evaluation method employed to assess the usability of PEMT, a method which uncovers heuristic violations in the interface design in a quick and efficient manner. Bringing together usability experts and health professionals to evaluate a computer-mediated patient education program can help to identify problems in a timely manner. This makes this method particularly well suited to the iterative design process when developing other computer-mediated health education programs. Heuristic evaluations provided a means to assess the user interface of PEMT. PMID:19897458
NASA Astrophysics Data System (ADS)
Jogenfors, Jonathan; Larsson, Jan-Åke
2017-08-01
In any Bell test, loopholes can cause issues in the interpretation of the results, since an apparent violation of the inequality may not correspond to a violation of local realism. An important example is the coincidence-time loophole that arises when detector settings might influence the time when detection will occur. This effect can be observed in many experiments where measurement outcomes are to be compared between remote stations because the interpretation of an ostensible Bell violation strongly depends on the method used to decide coincidence. The coincidence-time loophole has previously been studied for the Clauser-Horne-Shimony-Holt and Clauser-Horne inequalities, but recent experiments have shown the need for a generalization. Here, we study the generalized "chained" inequality by Pearle, Braunstein, and Caves (PBC) with N ≥2 settings per observer. This inequality has applications in, for instance, quantum key distribution where it has been used to reestablish security. In this paper we give the minimum coincidence probability for the PBC inequality for all N ≥2 and show that this bound is tight for a violation free of the fair-coincidence assumption. Thus, if an experiment has a coincidence probability exceeding the critical value derived here, the coincidence-time loophole is eliminated.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Klink, W.H.; Wickramasekara, S., E-mail: wickrama@grinnell.edu; Department of Physics, Grinnell College, Grinnell, IA 50112
2014-01-15
In previous work we have developed a formulation of quantum mechanics in non-inertial reference frames. This formulation is grounded in a class of unitary cocycle representations of what we have called the Galilean line group, the generalization of the Galilei group that includes transformations amongst non-inertial reference frames. These representations show that in quantum mechanics, just as is the case in classical mechanics, the transformations to accelerating reference frames give rise to fictitious forces. A special feature of these previously constructed representations is that they all respect the non-relativistic equivalence principle, wherein the fictitious forces associated with linear acceleration canmore » equivalently be described by gravitational forces. In this paper we exhibit a large class of cocycle representations of the Galilean line group that violate the equivalence principle. Nevertheless the classical mechanics analogue of these cocycle representations all respect the equivalence principle. -- Highlights: •A formulation of Galilean quantum mechanics in non-inertial reference frames is given. •The key concept is the Galilean line group, an infinite dimensional group. •A large class of general cocycle representations of the Galilean line group is constructed. •These representations show violations of the equivalence principle at the quantum level. •At the classical limit, no violations of the equivalence principle are detected.« less
Testing genuine tripartite quantum nonlocality with three two-level atoms in a driven cavity
NASA Astrophysics Data System (ADS)
Yuan, H.; Wei, L. F.
2013-10-01
It is known that the violation of Svetlichny's inequality (SI), rather than the usual Mermin's inequality (MI), is a robust criterion to confirm the existence of genuine multipartite quantum nonlocality. In this paper, we propose a feasible approach to test SI with three two-level atoms (TLAs) dispersively coupled to a driven cavity. The proposal is based on the joint measurements of the states of three TLAs by probing the steady-state transmission spectra of the driven cavity: each peak marks one of the computational basis states and its relative height corresponds to the probability superposed in the detected three-TLA state. With these kinds of joint measurements, the correlation functions in SI can be directly calculated, and thus the SI can be efficiently tested for typical tripartite entanglement, i.e., genuine tripartite entanglement [e.g., Greenberger-Horne-Zeilinger (GHZ) and W states] and biseparable three-qubit entangled states (e.g., |χ>12|ξ>3). Our numerical experiments show that the SI is violated only by three-qubit GHZ and W states, not by biseparable three-qubit entangled state |χ>12|ξ>3, while the MI can still be violated by biseparable three-qubit entangled states. Thus the violation of SI can be regarded as a robust criterion for the existence of genuine tripartite entanglement.
Murty, Vishnu P.; Adcock, R. Alison
2014-01-01
Learning how to obtain rewards requires learning about their contexts and likely causes. How do long-term memory mechanisms balance the need to represent potential determinants of reward outcomes with the computational burden of an over-inclusive memory? One solution would be to enhance memory for salient events that occur during reward anticipation, because all such events are potential determinants of reward. We tested whether reward motivation enhances encoding of salient events like expectancy violations. During functional magnetic resonance imaging, participants performed a reaction-time task in which goal-irrelevant expectancy violations were encountered during states of high- or low-reward motivation. Motivation amplified hippocampal activation to and declarative memory for expectancy violations. Connectivity of the ventral tegmental area (VTA) with medial prefrontal, ventrolateral prefrontal, and visual cortices preceded and predicted this increase in hippocampal sensitivity. These findings elucidate a novel mechanism whereby reward motivation can enhance hippocampus-dependent memory: anticipatory VTA-cortical–hippocampal interactions. Further, the findings integrate literatures on dopaminergic neuromodulation of prefrontal function and hippocampus-dependent memory. We conclude that during reward motivation, VTA modulation induces distributed neural changes that amplify hippocampal signals and records of expectancy violations to improve predictions—a potentially unique contribution of the hippocampus to reward learning. PMID:23529005
Experimental Non-Violation of the Bell Inequality
NASA Astrophysics Data System (ADS)
Palmer, Tim
2018-05-01
A finite non-classical framework for physical theory is described which challenges the conclusion that the Bell Inequality has been shown to have been violated experimentally, even approximately. This framework postulates the universe as a deterministic locally causal system evolving on a measure-zero fractal-like geometry $I_U$ in cosmological state space. Consistent with the assumed primacy of $I_U$, and $p$-adic number theory, a non-Euclidean (and hence non-classical) metric $g_p$ is defined on cosmological state space, where $p$ is a large but finite Pythagorean prime. Using number-theoretic properties of spherical triangles, the inequalities violated experimentally are shown to be $g_p$-distant from the CHSH inequality, whose violation would rule out local realism. This result fails in the singular limit $p=\\infty$, at which $g_p$ is Euclidean. Broader implications are discussed.
The quantum CP-violating kaon system reproduced in the electronic laboratory
NASA Astrophysics Data System (ADS)
Caruso, M.; Fanchiotti, H.; García Canal, C. A.; Mayosky, M.; Veiga, A.
2016-11-01
The equivalence between the Schrödinger dynamics of a quantum system with a finite number of basis states and a classical dynamics is realized in terms of electric networks. The isomorphism that connects in a univocal way both dynamical systems was applied to the case of neutral mesons, kaons in particular, and the class of electric networks univocally related to the quantum system was analysed. Moreover, under CPT invariance, the relevant ɛ parameter that measures CP violation in the kaon system is reinterpreted in terms of network parameters. All these results were explicitly shown by means of both a numerical simulation of the implied networks and by constructing the corresponding circuits.
Correlations in star networks: from Bell inequalities to network inequalities
NASA Astrophysics Data System (ADS)
Tavakoli, Armin; Olivier Renou, Marc; Gisin, Nicolas; Brunner, Nicolas
2017-07-01
The problem of characterizing classical and quantum correlations in networks is considered. Contrary to the usual Bell scenario, where distant observers share a physical system emitted by one common source, a network features several independent sources, each distributing a physical system to a subset of observers. In the quantum setting, the observers can perform joint measurements on initially independent systems, which may lead to strong correlations across the whole network. In this work, we introduce a technique to systematically map a Bell inequality to a family of Bell-type inequalities bounding classical correlations on networks in a star-configuration. Also, we show that whenever a given Bell inequality can be violated by some entangled state ρ, then all the corresponding network inequalities can be violated by considering many copies of ρ distributed in the star network. The relevance of these ideas is illustrated by applying our method to a specific multi-setting Bell inequality. We derive the corresponding network inequalities, and study their quantum violations.
Dworkin, Shari L.; Lu, Tiffany; Grabe, Shelly; Kwena, Zachary; Mwaura-Muiru, Esther; Bukusi, Elizabeth
2014-01-01
Despite the recognized need for structural-level HIV prevention interventions that focus on economic empowerment to reduce women’s HIV risks, few science-based programs have focused on securing women’s land ownership as a primary or secondary HIV risk reduction strategy. The current study focused on a community-led land and property rights model that was implemented in two rural areas of western Kenya where HIV prevalence was high (24–30%) and property rights violations were common. The program was designed to reduce women’s HIV risk at the community level by protecting and enhancing women’s access to and ownership of land. Through in-depth interviews with 50 program leaders and implementers of this program we sought to identify the strategies that were used to prevent, mediate, and resolve property rights violations. Results included four strategies: (1) rights-based education of both women and men individually and at the community level, (2) funeral committees that intervene to prevent property grabbing and disinheritance, (3) paralegal training of traditional leaders and community members and local adjudication of cases of property rights violations, and (4) referring property rights violations to the formal justice system when these are not resolved at the community level. Study participants underscored that local mediation of cases resulted in a higher success rate than women experienced in the formal court system, underscoring the importance of community-level solutions to property rights violations. The current study assists researchers in understanding the steps needed to prevent and resolve women’s property rights violations so as to bolster the literature on potential structural HIV prevention interventions. Future research should rigorously test property rights programs as a structural HIV prevention intervention. PMID:24116828
Gorzelańczyk, Edward J; Podlipniak, Piotr; Walecki, Piotr; Karpiński, Maciej; Tarnowska, Emilia
2017-01-01
According to contemporary opinion emotional reactions to syntactic violations are due to surprise as a result of the general mechanism of prediction. The classic view is that, the processing of musical syntax can be explained by activity of the cerebral cortex. However, some recent studies have indicated that subcortical brain structures, including those related to the processing of emotions, are also important during the processing of syntax. In order to check whether emotional reactions play a role in the processing of pitch syntax or are only the result of the general mechanism of prediction, the comparison of skin conductance levels reacting to three types of melodies were recorded. In this study, 28 subjects listened to three types of short melodies prepared in Musical Instrument Digital Interface Standard files (MIDI) - tonally correct, tonally violated (with one out-of-key - i.e., of high information content), and tonally correct but with one note played in a different timbre. The BioSemi ActiveTwo with two passive Nihon Kohden electrodes was used. Skin conductance levels were positively correlated with the presented stimuli (timbral changes and tonal violations). Although changes in skin conductance levels were also observed in response to the change in timbre, the reactions to tonal violations were significantly stronger. Therefore, despite the fact that timbral change is at least as equally unexpected as an out-of-key note, the processing of pitch syntax mainly generates increased activation of the sympathetic part of the autonomic nervous system. These results suggest that the cortico-subcortical loops (especially the anterior cingulate - limbic loop) may play an important role in the processing of musical syntax.
Dworkin, Shari L; Lu, Tiffany; Grabe, Shelly; Kwena, Zachary; Mwaura-Muiru, Esther; Bukusi, Elizabeth
2014-01-01
Despite the recognized need for structural-level HIV prevention interventions that focus on economic empowerment to reduce women's HIV risks, few science-based programs have focused on securing women's land ownership as a primary or secondary HIV risk reduction strategy. The current study focused on a community-led land and property rights model that was implemented in two rural areas of western Kenya where HIV prevalence was high (24-30%) and property rights violations were common. The program was designed to reduce women's HIV risk at the community level by protecting and enhancing women's access to and ownership of land. Through in-depth interviews with 50 program leaders and implementers of this program we sought to identify the strategies that were used to prevent, mediate, and resolve property rights violations. Results included four strategies: (1) rights-based education of both women and men individually and at the community level, (2) funeral committees that intervene to prevent property grabbing and disinheritance, (3) paralegal training of traditional leaders and community members and local adjudication of cases of property rights violations, and (4) referring property rights violations to the formal justice system when these are not resolved at the community level. Study participants underscored that local mediation of cases resulted in a higher success rate than women experienced in the formal court system, underscoring the importance of community-level solutions to property rights violations. The current study assists researchers in understanding the steps needed to prevent and resolve women's property rights violations so as to bolster the literature on potential structural HIV prevention interventions. Future research should rigorously test property rights programs as a structural HIV prevention intervention.
Jogenfors, Jonathan; Elhassan, Ashraf Mohamed; Ahrens, Johan; Bourennane, Mohamed; Larsson, Jan-Åke
2015-12-01
Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson's configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.
Grammaticality Judgements in Adolescents with and without Language Impairment
ERIC Educational Resources Information Center
Miller, Carol; Leonard, Laurence; Finneran, Denise
2008-01-01
Background: Existing evidence suggests that young children with specific language impairment have unusual difficulty in detecting omissions of obligatory tense-marking morphemes, but little is known about adolescents' sensitivity to such violations. Aims: The study investigated whether limitations in receptive morphosyntax (as measured by…
High Energy Astrophysics Tests of Lorentz Invariance and Quantum Gravity Models
NASA Technical Reports Server (NTRS)
Stecker, F. W.
2011-01-01
High energy astrophysics observations provide the best possibilities to detect a very small violation of Lorentz invariance such as may be related to the structure of space-time near the Planck scale of approximately 10(exp -35)m. I will discuss the possible signatures of Lorentz invariance violation (LIV) that can be manifested by observing of the spectra, polarization, and timing of gamma-rays from active galactic nuclei and y-ray bursts. Other sensitive tests are provided by observations of the spectra of ultrahigh energy cosmic rays and neutrinos. Using the latest data from the Pierre Auger Observatory one can already derive an upper limit of 4.5 x 10(exp -23) on the fraction of LIV at a Lorentz factor of approximately 2 x 10(exp 11). This result has fundamental implications for quantum gravity models. I will also discuss the possibilities of using more sensitive space-based detection techniques to improve searches for LIV in the future.
An inequality for detecting financial fraud, derived from the Markowitz Optimal Portfolio Theory
NASA Astrophysics Data System (ADS)
Bard, Gregory V.
2016-12-01
The Markowitz Optimal Portfolio Theory, published in 1952, is well-known, and was often taught because it blends Lagrange Multipliers, matrices, statistics, and mathematical finance. However, the theory faded from prominence in American investing, as Business departments at US universities shifted from techniques based on mathematics, finance, and statistics, to focus instead on leadership, public speaking, interpersonal skills, advertising, etc… The author proposes a new application of Markowitz's Theory: the detection of a fairly broad category of financial fraud (called "Ponzi schemes" in American newspapers) by looking at a particular inequality derived from the Markowitz Optimal Portfolio Theory, relating volatility and expected rate of return. For example, one recent Ponzi scheme was that of Bernard Madoff, uncovered in December 2008, which comprised fraud totaling 64,800,000,000 US dollars [23]. The objective is to compare investments with the "efficient frontier" as predicted by Markowitz's theory. Violations of the inequality should be impossible in theory; therefore, in practice, violations might indicate fraud.
Direct detection of exothermic dark matter with light mediator
DOE Office of Scientific and Technical Information (OSTI.GOV)
Geng, Chao-Qiang; Department of Physics, National Tsing Hua University,Hsinchu, Taiwan; Physics Division, National Center for Theoretical Sciences,Hsinchu, Taiwan
2016-08-05
We study the dark matter (DM) direct detection for the models with the effects of the isospin-violating couplings, exothermic scatterings, and/or the lightness of the mediator, proposed to relax the tension between the CDMS-Si signals and null experiments. In the light of the new updates of the LUX and CDMSlite data, we find that many of the previous proposals are now ruled out, including the Ge-phobic exothermic DM model and the Xe-phobic DM one with a light mediator. We also examine the exothermic DM models with a light mediator but without the isospin violation, and we are unable to identifymore » any available parameter space that could simultaneously satisfy all the experiments. The only models that can partially relax the inconsistencies are the Xe-phobic exothermic DM models with or without a light mediator. But even in this case, a large portion of the CDMS-Si regions of interest has been constrained by the LUX and SuperCDMS data.« less
Gamma-Ray, Cosmic Ray and Neutrino Tests of Lorentz Invariance and Quantum Gravity Models
NASA Technical Reports Server (NTRS)
Stecker, Floyd
2011-01-01
High-energy astrophysics observations provide the best possibilities to detect a very small violation of Lorentz invariance such as may be related to the structure of space-time near the Planck scale of approximately 10(exp -35) m. I will discuss here the possible signatures of Lorentz invariance violation (LIV) from observations of the spectra, polarization, and timing of gamma-rays from active galactic nuclei and gamma-ray bursts. Other sensitive tests are provided by observations of the spectra of ultrahigh energy cosmic rays and neutrinos. Using the latest data from the Pierre Auger Observatory one can already derive an upper limit of 4.5 x 10(exp -23) to the amount of LIV of at a proton Lorentz factor of approximately 2 x 10(exp 11). This result has fundamental implications for quantum gravity models. I will also discuss the possibilities of using more sensitive space based detection techniques to improve searches for LIV in the future.
Ragel, Brian T; Piedra, Mark; Klimo, Paul; Burchiel, Kim J; Waldo, Heidi; McCartney, Shirley; Selden, Nathan R
2014-06-01
In 2003, the Accreditation Council for Graduate Medical Education (ACGME) instituted the 24+6-hour work schedule and 80-hour workweek, and in 2011, it enhanced work hour and supervision standards. In response, Oregon Health & Science University's (OHSU) neurological surgery residency instituted a 3-person night float system. We analyzed work hour records and operative experience for 1 year before and after night float implementation in a model that shortened a combined introductory research and basic clinical neurosciences rotation from 12 to 6 months. We analyzed residents' perception of the system using a confidential survey. The ACGME 2011 work hour standards were applied to both time periods. AFTER NIGHT FLOAT IMPLEMENTATION, THE NUMBER OF DUTY HOUR VIOLATIONS WAS REDUCED: 28-hour shift (11 versus 235), 8 hours off between shifts (2 versus 20), 80 hours per week (0 versus 17), and total violations (23 versus 275). Violations increased only for the less than 4 days off per 4-week interval rule (10 versus 3). No meaningful difference was seen in the number of operative cases performed per year at any postgraduate year (PGY) training level: PGY-2 (336 versus 351), PGY-3 (394 versus 354), PGY-4 (803 versus 802), PGY-5 (1075 versus 1040), PGY-7 (947 versus 913), and total (3555 versus 3460). Residents rated the new system favorably. To meet 2011 ACGME duty hour standards, the OHSU neurological surgery residency instituted a 3-person night float system. A nearly complete elimination of work hour violations did not affect overall resident operative experience.
Implicit Memory in Music and Language
Ettlinger, Marc; Margulis, Elizabeth H.; Wong, Patrick C. M.
2011-01-01
Research on music and language in recent decades has focused on their overlapping neurophysiological, perceptual, and cognitive underpinnings, ranging from the mechanism for encoding basic auditory cues to the mechanism for detecting violations in phrase structure. These overlaps have most often been identified in musicians with musical knowledge that was acquired explicitly, through formal training. In this paper, we review independent bodies of work in music and language that suggest an important role for implicitly acquired knowledge, implicit memory, and their associated neural structures in the acquisition of linguistic or musical grammar. These findings motivate potential new work that examines music and language comparatively in the context of the implicit memory system. PMID:21927608
Duarte, Adam; Adams, Michael J.; Peterson, James T.
2018-01-01
Monitoring animal populations is central to wildlife and fisheries management, and the use of N-mixture models toward these efforts has markedly increased in recent years. Nevertheless, relatively little work has evaluated estimator performance when basic assumptions are violated. Moreover, diagnostics to identify when bias in parameter estimates from N-mixture models is likely is largely unexplored. We simulated count data sets using 837 combinations of detection probability, number of sample units, number of survey occasions, and type and extent of heterogeneity in abundance or detectability. We fit Poisson N-mixture models to these data, quantified the bias associated with each combination, and evaluated if the parametric bootstrap goodness-of-fit (GOF) test can be used to indicate bias in parameter estimates. We also explored if assumption violations can be diagnosed prior to fitting N-mixture models. In doing so, we propose a new model diagnostic, which we term the quasi-coefficient of variation (QCV). N-mixture models performed well when assumptions were met and detection probabilities were moderate (i.e., ≥0.3), and the performance of the estimator improved with increasing survey occasions and sample units. However, the magnitude of bias in estimated mean abundance with even slight amounts of unmodeled heterogeneity was substantial. The parametric bootstrap GOF test did not perform well as a diagnostic for bias in parameter estimates when detectability and sample sizes were low. The results indicate the QCV is useful to diagnose potential bias and that potential bias associated with unidirectional trends in abundance or detectability can be diagnosed using Poisson regression. This study represents the most thorough assessment to date of assumption violations and diagnostics when fitting N-mixture models using the most commonly implemented error distribution. Unbiased estimates of population state variables are needed to properly inform management decision making. Therefore, we also discuss alternative approaches to yield unbiased estimates of population state variables using similar data types, and we stress that there is no substitute for an effective sample design that is grounded upon well-defined management objectives.
Suppressing supersymmetric flavor violations through quenched gaugino-flavor interactions
NASA Astrophysics Data System (ADS)
Wells, James D.; Zhao, Yue
2017-06-01
Realizing that couplings related by supersymmetry (SUSY) can be disentangled when SUSY is broken, it is suggested that unwanted flavor and C P -violating SUSY couplings may be suppressed via quenched gaugino-flavor interactions, which may be accomplished by power-law running of sfermion anomalous dimensions. A simple theoretical framework to accomplish this is exemplified, where a strongly coupled conformal field theory is achieved after SUSY is softly broken. The defeated constraints are tallied. One key implication of the scenario is the expectation of enhanced top, bottom and tau production at the LHC, accompanied by large missing energy. Also, direct detection signals of dark matter may be more challenging to find than in conventional SUSY scenarios.
Lepton flavor violating radiative decays in EW-scale ν R model: an update
Hung, P. Q.; Le, Trinh; Tran, Van Que; ...
2015-12-28
Here, we perform an updated analysis for the one-loop induced charged lepton flavor violating radiative decays l i → l j γ in an extended mirror model. Mixing effects of the neutrinos and charged leptons constructed with a horizontal A 4 symmetry are also taken into account. Current experimental limit and projected sensitivity on the branching ratio of μ → eγ are used to constrain the parameter space of the model. Calculations of two related observables, the electric and magnetic dipole moments of the leptons, are included. Implications concerning the possible detection of mirror leptons at the LHC and themore » ILC are also discussed.« less
Podbielska, Magdalena; Szpyrka, Ewa; Matyaszek, Aneta; Słowik-Borowiec, Magdalena; Rupar, Julian; Kurdziel, Anna
2016-07-01
This paper presents the results of official control of pesticide residues in minor crops collected in southeastern Poland in 2013-2014. Compliance of used pesticides with applicable law was also verified, and determined residues were compared to maximum residue levels (MRLs) provided for in Regulation (EC) No. 395/2005. A total of 583 samples of 25 different types of fresh fruit and vegetables were analyzed for pesticide residues. Pesticide residues were detected in 158 samples (27.1 % of the analyzed samples). According to the European Commission Health & Consumer Protection Directorate-General (SANCO) guidelines document, MRL violations were understood as cases where a residue level exceeded the MRL after the uncertainty of the method (50 %) was considered. MRL violations were found in four samples. The usage of unauthorized pesticides was detected in 5.8 % of analyzed samples. Substances banned in Poland were found in two samples. Fungicides were the most frequently detected group of pesticides. Pesticide residues were most commonly found in fruit samples (19.4 % of all analyzed samples), mainly in gooseberry, redcurrant, and huckleberry. The majority of samples were compliant with MRLs, which means that they were suitable for trade.
NASA Astrophysics Data System (ADS)
Addazi, Andrea
2018-05-01
In companion papers (A. Addazi, Nuovo Cim. C, 38(1): 21 (2015); A. Addazi, Z. Berezhiani, and Y. Kamyshkov, arXiv:1607.00348), we have discussed current bounds on a new super-light baryo-photon, associated with a U(1) B-L gauge, from current neutron-antineutron data, which are competitive with Eötvös-type experiments. Here, we discuss the implications of possible baryo-photon detection in string theory and quantum gravity. The discovery of a very light gauge boson should imply violation of the weak gravity conjecture, carrying deep consequences for our understanding of holography, quantum gravity and black holes. We also show how the detection of a baryo-photon would exclude the generation of all B–L violating operators from exotic stringy instantons. We will argue against the common statement in the literature that neutron-antineutron data may indirectly test at least the 300–1000 TeV scale. Searches for baryo-photons can provide indirect information on the Planck (or string) scale (quantum black holes, holography and non-perturbative stringy effects). This strongly motivates new neutron-antineutron experiments with adjustable magnetic fields dedicated to the detection of super-light baryo-photons.
Pezzetta, Rachele; Nicolardi, Valentina; Tidoni, Emmanuele; Aglioti, Salvatore Maria
2018-06-06
Detecting errors in one's own actions, and in the actions of others, is a crucial ability for adaptable and flexible behavior. Studies show that specific EEG signatures underpin the monitoring of observed erroneous actions (error-related negativity, error-positivity, mid-frontal theta oscillations). However, the majority of studies on action observation used sequences of trials where erroneous actions were less frequent than correct actions. Therefore, it was not possible to disentangle whether the activation of the performance monitoring system was due to an error - as a violation of the intended goal - or a surprise/novelty effect, associated with a rare and unexpected event. Combining EEG and immersive virtual reality (IVR-CAVE system), we recorded the neural signal of 25 young adults who observed in first-person perspective, simple reach-to-grasp actions performed by an avatar aiming for a glass. Importantly, the proportion of erroneous actions was higher than correct actions. Results showed that the observation of erroneous actions elicits the typical electro-cortical signatures of error monitoring and therefore the violation of the action goal is still perceived as a salient event. The observation of correct actions elicited stronger alpha suppression. This confirmed the role of the alpha frequency band in the general orienting response to novel and infrequent stimuli. Our data provides novel evidence that an observed goal error (the action slip) triggers the activity of the performance monitoring system even when erroneous actions, which are, typically, relevant events, occur more often than correct actions and thus are not salient because of their rarity.
Chang, Luke J.; Sanfey, Alan G.
2009-01-01
Recent work in the field of neuroeconomics has examined how people make decisions in interactive settings. However, less is currently known about how these social decisions influence subsequent memory for these interactions. We investigated this question by using functional magnetic resonance imaging to scan participants as they viewed photographs of people they had either recently played an Ultimatum Game with in the role of Responder, or that they had never seen before. Based on previous work that has investigated “cheater detection”, we were interested in whether participants demonstrated a relative enhanced memory for partners that made either fair or unfair proposals. We found no evidence, either behaviorally or neurally, supporting enhanced memory based on the amount of money offered by the Proposer. However, we did find that participants’ initial expectations about the offers they would experience in the game influenced their memory. Participants demonstrated relatively enhanced subjective memory for partners that made proposals that were contradictory to their initial expectations. In addition, we observed two distinct brain systems that were associated with partners that either offered more or less than the participants’ expectations. Viewing pictures of partners that exceeded initial expectations was associated with the bilateral anterior insula, anterior cingulate cortex/premotor area, striatum, and bilateral posterior hippocampi, while viewing partners that offered less than initial expectations was associated with bilateral temporal-parietal junction, right STS, bilateral posterior insula, and precuneus. These results suggest that memory for social interaction may not be guided by a specific cheater detection system, but rather a more general expectation violation system. PMID:19876405
CP-violating phase on magnetized toroidal orbifolds
NASA Astrophysics Data System (ADS)
Kobayashi, Tatsuo; Nishiwaki, Kenji; Tatsuta, Yoshiyuki
2017-04-01
We study the CP-violating phase of the quark sector on T 2 /Z N ( N = 2 , 3 , 4 , 6) with non-vanishing magnetic fluxes, where properties of possible origins of the CP violation are investigated minutely. In this system, a non-vanishing value is mandatory in the real part of the complex modulus parameter τ of the two-dimensional torus in order to explain the CP violation in the quark sector. On T 2 without orbifolding, underlying discrete flavor symmetries severely restrict the form of Yukawa couplings and it is very difficult to reproduce the observed pattern in the quark sector including the CP-violating phase δ CP. When multiple Higgs doublets emerge on T 2 /Z 2, the mass matrices of the zero-mode fermions can be written in the Gaussian textures by choosing appropriate configurations of vacuum expectation values of the Higgs fields. When such Gaussian textures of mass matrices are realized, we show that all of the quark profiles, which are mass hierarchies among the quarks, quark mixing angles, and δ CP can be simultaneously realized.
Import Security: Assessing the Risks of Imported Food.
Welburn, Jonathan; Bier, Vicki; Hoerning, Steven
2016-11-01
We use data on food import violations from the FDA Operational and Administrative System for Import Support (OASIS) to address rising concerns associated with imported food, quantify import risks by product and by country of origin, and explore the usefulness of OASIS data for risk assessment. In particular, we assess whether there are significant trends in violations, whether import violations can be used to quantify risks by country and by product, and how import risks depend on economic factors of the country of origin. The results show that normalizing import violations by volume of imports provides a meaningful indicator of risk. We then use regression analysis to characterize import risks. Using this model, we analyze import risks by product type, violation type, and economic factors of the country of origin. We find that OASIS data are useful in quantifying food import risks, and that the rate of refusals provides a useful decision tool for risk management. Furthermore, we find that some economic factors are significant indicators of food import risk by country. © 2016 Society for Risk Analysis.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 41 Public Contracts and Property Management 4 2011-07-01 2011-07-01 false If I violate my new... place of residence? 302-3.224 Section 302-3.224 Public Contracts and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES RELOCATION ALLOWANCES 3-RELOCATION ALLOWANCE BY SPECIFIC TYPE Types...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 4 2010-07-01 2010-07-01 false If I violate my new... place of residence? 302-3.224 Section 302-3.224 Public Contracts and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES RELOCATION ALLOWANCES 3-RELOCATION ALLOWANCE BY SPECIFIC TYPE Types...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 41 Public Contracts and Property Management 4 2012-07-01 2012-07-01 false If I violate my new... place of residence? 302-3.224 Section 302-3.224 Public Contracts and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES RELOCATION ALLOWANCES 3-RELOCATION ALLOWANCE BY SPECIFIC TYPE Types...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 41 Public Contracts and Property Management 4 2014-07-01 2014-07-01 false If I violate my new... place of residence? 302-3.224 Section 302-3.224 Public Contracts and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES RELOCATION ALLOWANCES 3-RELOCATION ALLOWANCE BY SPECIFIC TYPE Types...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 41 Public Contracts and Property Management 4 2013-07-01 2012-07-01 true If I violate my new... place of residence? 302-3.224 Section 302-3.224 Public Contracts and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES RELOCATION ALLOWANCES 3-RELOCATION ALLOWANCE BY SPECIFIC TYPE Types...
40 CFR 80.615 - What penalties apply under this subpart?
Code of Federal Regulations, 2010 CFR
2010-07-01
... specified in section 205 of the Clean Air Act (42 U.S.C. 7524) for every day of each such violation and the... and every day the non-complying diesel fuel remains any place in the distribution system. (2) Any... subject to a separate day of violation for each and every day that the noncomplying fuel remains any place...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What actions must I take concerning employees who are convicted of drug violations in the workplace? 105-74.225 Section 105-74.225 Public Contracts and Property Management Federal Property Management Regulations System (Continued...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Supplemental rules governing the administrative assessment of civil penalties for violations of compliance orders issued to owners or operators of public water systems under part B of the Safe Drinking Water Act. 22.42 Section 22.42 Protection of Environment ENVIRONMENTAL PROTECTION...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Supplemental rules governing the administrative assessment of civil penalties for violations of compliance orders issued to owners or operators of public water systems under part B of the Safe Drinking Water Act. 22.42 Section 22.42 Protection of Environment ENVIRONMENTAL PROTECTION...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Supplemental rules governing the administrative assessment of civil penalties for violations of compliance orders issued to owners or operators of public water systems under part B of the Safe Drinking Water Act. 22.42 Section 22.42 Protection of Environment ENVIRONMENTAL PROTECTION...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Supplemental rules governing the administrative assessment of civil penalties for violations of compliance orders issued to owners or operators of public water systems under part B of the Safe Drinking Water Act. 22.42 Section 22.42 Protection of Environment ENVIRONMENTAL PROTECTION...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 1 2012-07-01 2012-07-01 false Supplemental rules governing the administrative assessment of civil penalties for violations of compliance orders issued to owners or operators of public water systems under part B of the Safe Drinking Water Act. 22.42 Section 22.42 Protection of Environment ENVIRONMENTAL PROTECTION...
Smart Infrared Inspection System Field Operational Test Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Siekmann, Adam; Capps, Gary J; Franzese, Oscar
2011-06-01
The Smart InfraRed Inspection System (SIRIS) is a tool designed to assist inspectors in determining which vehicles passing through the SIRIS system are in need of further inspection by measuring the thermal data from the wheel components. As a vehicle enters the system, infrared cameras on the road measure temperatures of the brakes, tires, and wheel bearings on both wheel ends of commercial motor vehicles (CMVs) in motion. This thermal data is then presented to enforcement personal inside of the inspection station on a user friendly interface. Vehicles that are suspected to have a violation are automatically alerted to themore » enforcement staff. The main goal of the SIRIS field operational test (FOT) was to collect data to evaluate the performance of the prototype system and determine the viability of such a system being used for commercial motor vehicle enforcement. From March 2010 to September 2010, ORNL facilitated the SIRIS FOT at the Greene County Inspection Station (IS) in Greeneville, Tennessee. During the course of the FOT, 413 CMVs were given a North American Standard (NAS) Level-1 inspection. Of those 413 CMVs, 384 were subjected to a SIRIS screening. A total of 36 (9.38%) of the vehicles were flagged by SIRIS as having one or more thermal issues; with brakes issues making up 33 (91.67%) of those. Of the 36 vehicles flagged as having thermal issues, 31 (86.11%) were found to have a violation and 30 (83.33%) of those vehicles were placed out-of-service (OOS). Overall the enforcement personnel who have used SIRIS for screening purposes have had positive feedback on the potential of SIRIS. With improvements in detection algorithms and stability, the system will be beneficial to the CMV enforcement community and increase overall trooper productivity by accurately identifying a higher percentage of CMVs to be placed OOS with minimal error. No future evaluation of SIRIS has been deemed necessary and specifications for a production system will soon be drafted.« less
Towards Device-Independent Information Processing on General Quantum Networks
NASA Astrophysics Data System (ADS)
Lee, Ciarán M.; Hoban, Matty J.
2018-01-01
The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.
Neutrino-antineutrino oscillations as a possible solution for the LSND and MiniBooNE anomalies?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hollenberg, Sebastian; Micu, Octavian; Paes, Heinrich
2009-09-01
We investigate resonance structures in CPT and Lorentz symmetry-violating neutrino-antineutrino oscillations in a two generation framework. The neutrino-antineutrino oscillations are induced by Lorentz- and CPT-violating terms in the Hamiltonian. The resonances are suitably described in terms of charge conjugation eigenstates of the system. The relations among the flavor, charge conjugation and mass eigenbasis of neutrino-antineutrino oscillations are examined along with the interplay between the available CPT-violating parameter space and possible resonance structures. Eventually we remark on the consequences of such scenarios for neutrino oscillation experiments, namely, possible solutions for the LSND and MiniBooNE anomalies.
Towards Device-Independent Information Processing on General Quantum Networks.
Lee, Ciarán M; Hoban, Matty J
2018-01-12
The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.
Conflict Detection and Resolution for Future Air Transportation Management
NASA Technical Reports Server (NTRS)
Krozel, Jimmy; Peters, Mark E.; Hunter, George
1997-01-01
With a Free Flight policy, the emphasis for air traffic control is shifting from active control to passive air traffic management with a policy of intervention by exception. Aircraft will be allowed to fly user preferred routes, as long as safety Alert Zones are not violated. If there is a potential conflict, two (or more) aircraft must be able to arrive at a solution for conflict resolution without controller intervention. Thus, decision aid tools are needed in Free Flight to detect and resolve conflicts, and several problems must be solved to develop such tools. In this report, we analyze and solve problems of proximity management, conflict detection, and conflict resolution under a Free Flight policy. For proximity management, we establish a system based on Delaunay Triangulations of aircraft at constant flight levels. Such a system provides a means for analyzing the neighbor relationships between aircraft and the nearby free space around air traffic which can be utilized later in conflict resolution. For conflict detection, we perform both 2-dimensional and 3-dimensional analyses based on the penetration of the Protected Airspace Zone. Both deterministic and non-deterministic analyses are performed. We investigate several types of conflict warnings including tactical warnings prior to penetrating the Protected Airspace Zone, methods based on the reachability overlap of both aircraft, and conflict probability maps to establish strategic Alert Zones around aircraft.
Capuchin Monkeys Judge Third-Party Reciprocity
ERIC Educational Resources Information Center
Anderson, James R.; Takimoto, Ayaka; Kuroshima, Hika; Fujita, Kazuo
2013-01-01
Increasing interest is being shown in how children develop an understanding of reciprocity in social exchanges and fairness in resource distribution, including social exchanges between third parties. Although there are descriptions of reciprocity on a one-to-one basis in other species, whether nonhumans detect reciprocity and violations of…
NASA Astrophysics Data System (ADS)
Shabani, Hamid; Ziaie, Amir Hadi
2017-05-01
Very recently, Josset and Perez (Phys. Rev. Lett. 118:021102, 2017) have shown that a violation of the energy-momentum tensor ( EMT) could result in an accelerated expansion state via the appearance of an effective cosmological constant, in the context of unimodular gravity. Inspired by this outcome, in this paper we investigate cosmological consequences of a violation of the EMT conservation in a particular class of f(R,T) gravity when only the pressure-less fluid is present. In this respect, we focus on the late time solutions of models of the type f(R,T)=R+β Λ (-T). As the first task, we study the solutions when the conservation of EMT is respected, and then we proceed with those in which violation occurs. We have found, provided that the EMT conservation is violated, that there generally exist two accelerated expansion solutions of which the stability properties depend on the underlying model. More exactly, we obtain a dark energy solution for which the effective equation of state depends on the model parameters and a de Sitter solution. We present a method to parametrize the Λ (-T) function, which is useful in a dynamical system approach and has been employed in the model. Also, we discuss the cosmological solutions for models with Λ (-T)=8π G(-T)^{α } in the presence of ultra-relativistic matter.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Creminelli, Paolo; Gleyzes, Jérôme; Vernizzi, Filippo
2014-06-01
The recently derived consistency relations for Large Scale Structure do not hold if the Equivalence Principle (EP) is violated. We show it explicitly in a toy model with two fluids, one of which is coupled to a fifth force. We explore the constraints that galaxy surveys can set on EP violation looking at the squeezed limit of the 3-point function involving two populations of objects. We find that one can explore EP violations of order 10{sup −3}÷10{sup −4} on cosmological scales. Chameleon models are already very constrained by the requirement of screening within the Solar System and only a verymore » tiny region of the parameter space can be explored with this method. We show that no violation of the consistency relations is expected in Galileon models.« less
Strategic alliance, a way forward for violence against women: a case for the Special Cells, India.
Dave, Anjali
2013-10-01
This article attempts to describe the experiences of violated women and the struggles of social workers to contest violence against women in the Indian context. It begins with a brief account of an "indigenous model": the establishment of a service for violated women in India within the police force--the Special Cell on Violence Against Women. The article traces the strategic location, vision, growth, present position, expansion, and replication of the Special Cell in India, and discusses the necessity of working simultaneously with violated women, formal systems, and social structures; its contribution to the campaign for a Domestic Violence Act; and the resultant outcomes. The arduous nature of the work required for violated women and the women's own assessment of the Special Cells were accessed through a rigorous evaluation study, which is presented in the article, providing an answer and affirmation to the question: Why work with the Establishment--the State.
Low-energy Lorentz violation from high-energy modified dispersion in inertial and circular motion
NASA Astrophysics Data System (ADS)
Louko, Jorma; Upton, Samuel D.
2018-01-01
We consider an Unruh-DeWitt detector in inertial and circular motion in Minkowski spacetime of arbitrary dimension, coupled to a quantized scalar field with the Lorentz-violating dispersion relation ω =|k |f (|k |/M⋆) , where M⋆ is the Lorentz-breaking scale. Assuming that f dips below unity somewhere, we show that an inertial detector experiences large low-energy Lorentz violations in all spacetime dimensions greater than two, generalizing previous results in four dimensions. For a detector in circular motion, we show that a similar low-energy Lorentz violation occurs in three spacetime dimensions, and we lay the analytic groundwork for examining circular motion in all dimensions greater than three, generalizing previous work by Stargen, Kajuri and Sriramkumar in four dimensions. The circular motion results may be relevant for the prospects of observing the circular motion Unruh effect in analogue laboratory systems.
Cosmic chirality both true and false.
Barron, Laurence D
2012-12-01
The discrete symmetries of parity P, time reversal T, and charge conjugation C may be used to characterize the properties of chiral systems. It is well known that parity violation infiltrates into ordinary matter via an interaction between the nucleons and electrons, mediated by the Z(0) particle, that lifts the degeneracy of the mirror-image enantiomers of a chiral molecule. Being odd under P but even under T, this P-violating interaction exhibits true chirality and so may induce absolute enantioselection under all circumstances. It has been suggested that CP violation may also infiltrate into ordinary matter via a P-odd, T-odd interaction mediated by the (as yet undetected) axion. This CP-violating interaction exhibits false chirality and so may induce absolute enantioselection in processes far from equilibrium. Both true and false cosmic chirality should be considered together as possible sources of homochirality in the molecules of life. Copyright © 2012 Wiley Periodicals, Inc.
Study of C P -violating charge asymmetries of single muons and like-sign dimuons in p p ¯ collisions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abazov, V. M.; Abbott, B.; Acharya, B. S.
2014-01-01
We measure the inclusive single muon charge asymmetry and the like-sign dimuon charge asymmetry inmore » $$p \\bar{p}$$ collisions using the full data set of 10.4 fb$$^{-1}$$ collected with the D0 detector at the Fermilab Tevatron. The standard model predictions of the charge asymmetries induced by CP violation are small in magnitude compared to the current experimental precision, so non-zero measurements could indicate new sources of CP violation. The measurements differ from the standard model predictions of CP violation in these asymmetries with a significance of 3.6 standard deviations. These results are interpreted in a framework of $B$ meson mixing within the CKM formalism to measure the relative width difference $$\\dgg$$ between the mass eigenstates of the $$\\Bd$$ meson system, and the semileptonic charge asymmetries $$\\asld$$ and $$\\asls$$ of $$\\Bd$$ and $$\\Bs$$ mesons respectively.« less
Omissions and Byproducts across Moral Domains
DeScioli, Peter; Asao, Kelly; Kurzban, Robert
2012-01-01
Research indicates that moral violations are judged less wrong when the violation results from omission as opposed to commission, and when the violation is a byproduct as opposed to a means to an end. Previous work examined these effects mainly for violent offenses such as killing. Here we investigate the generality of these effects across a range of moral violations including sexuality, food, property, and group loyalty. In Experiment 1, we observed omission effects in wrongness ratings for all of the twelve offenses investigated. In Experiments 2 and 3, we observed byproduct effects in wrongness ratings for seven and eight offenses (out of twelve), respectively, and we observed byproduct effects in forced-choice responses for all twelve offenses. Our results address an ongoing debate about whether different cognitive systems compute moral wrongness for different types of behaviors (surrounding violence, sexuality, food, etc.), or, alternatively, a common cognitive architecture computes wrongness for a variety of behaviors. PMID:23071678
Liang, Ci; Ghazel, Mohamed; Cazier, Olivier; El-Koursi, El-Miloudi
2017-11-01
Accidents at railway level crossings (LXs) give rise to serious material and human damage. Particularly, collisions between trains and motorized vehicles are the most critical accidents occurring at LXs. It is worth noticing that violations committed by vehicle drivers are the primary cause of such accidents. The present study is a tentative to acquire a better understanding of risky behavior of vehicle drivers while crossing LXs during the closure cycle. Namely, risk analysis based on field measurement conducted at four automated LXs with two half barriers is performed. We focus on vehicle driver behavior during the LX closure cycle while distinguishing between different phases. In fact, the closure cycle is divided into three phases which are "Ph2 Red Flash and Siren", "Ph3 Barriers Coming Down" and "Ph4 Barriers Down"; and vehicle driver behavior in each phase as time increases is scrutinized respectively. Particularly, zigzag scenarios are detected, using an original experimental setting that we have implemented, and analyzed in detail. The main findings based on the analysis demonstrate that the peak of violation rate in the morning is later than the actual rush hour in the morning; a distinct peak of the violation rate shows on Friday, while the violation rate on weekend is fairly low; the relative violation rate of vehicles with high speed decreases continuously as time advances from Ph2 to Ph3 in the daytime; the violation rate during Ph4 decreases as Ph4 duration is prolonged, which contradicts a general speculation that a higher rate of zigzag violations would appear as the duration of Ph4 is extended. These findings open the way towards determining the impacting factors which have an important contribution to the vehicle driver decision-making in this context (e.g., traffic density, time schedule and phase duration). In addition, the outputs of the present study are conducive to identifying potential interventions to improve safety at LXs. Copyright © 2017 Elsevier Ltd. All rights reserved.
Violation of the zero-force theorem in the time-dependent Krieger-Li-Iafrate approximation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mundt, Michael; Kuemmel, Stephan; Leeuwen, Robert van
2007-05-15
We demonstrate that the time-dependent Krieger-Li-Iafrate approximation in combination with the exchange-only functional violates the zero-force theorem. By analyzing the time-dependent dipole moment of Na{sub 5} and Na{sub 9}{sup +}, we furthermore show that this can lead to an unphysical self-excitation of the system depending on the system properties and the excitation strength. Analytical aspects, especially the connection between the zero-force theorem and the generalized-translation invariance of the potential, are discussed.
Exorcising Maxwell's Demon from Liboff's Three-Channel Conundrum
NASA Astrophysics Data System (ADS)
Opatrný, Tomáš; Mišáková, Zuzana
2011-02-01
We study a model proposed by Liboff (Found. Phys. Lett. 10:89, 1997) to violate the second law of thermodynamics. Discs are moving without friction in three connected channels inclined by π/3 with respect to each other. Based on the geometry considerations, it was argued that eventually all the discs end up in the middle channel regardless of their initial positions. This would mean a decrease of the entropy of the system and violation of the second law. We argue that no such anomalous behavior occurs in the system.
Present and future K and B meson mixing constraints on TeV scale left-right symmetry
NASA Astrophysics Data System (ADS)
Bertolini, Stefano; Maiezza, Alessio; Nesti, Fabrizio
2014-05-01
We revisit the ΔF=2 transitions in the K and Bd ,s neutral meson systems in the context of the minimal left-right symmetric model. We take into account, in addition to up-to-date phenomenological data, the contributions related to the renormalization of the flavor-changing neutral Higgs tree-level amplitude. These contributions were neglected in recent discussions, albeit formally needed in order to obtain a gauge-independent result. Their impact on the minimal LR model is crucial and twofold. First, the effects are relevant in B meson oscillations, for both CP conserving and CP violating observables, so that for the first time these imply constraints on the LR scenario which compete with those of the K sector (plagued by long-distance uncertainties). Second, they sizably contribute to the indirect kaon CP violation parameter ɛ. We discuss the bounds from B and K mesons in both cases of LR symmetry: generalized parity (P) and charge conjugation (C). In the case of P, the interplay between the CP-violation parameters ɛ and ɛ' leads us to rule out the regime of very hierarchical bidoublet vacuum expectation values v2/v1
NASA Technical Reports Server (NTRS)
Jefferies, K. S.; Tew, R. C.
1974-01-01
A digital computer study was made of reactor thermal transients during startup of the Brayton power conversion loop of a 60-kWe reactor Brayton power system. A startup procedure requiring the least Brayton system complication was tried first; this procedure caused violations of design limits on key reactor variables. Several modifications of this procedure were then found which caused no design limit violations. These modifications involved: (1) using a slower rate of increase in gas flow; (2) increasing the initial reactor power level to make the reactor respond faster; and (3) appropriate reactor control drum manipulation during the startup transient.
Development and Application of a Portable Health Algorithms Test System
NASA Technical Reports Server (NTRS)
Melcher, Kevin J.; Fulton, Christopher E.; Maul, William A.; Sowers, T. Shane
2007-01-01
This paper describes the development and initial demonstration of a Portable Health Algorithms Test (PHALT) System that is being developed by researchers at the NASA Glenn Research Center (GRC). The PHALT System was conceived as a means of evolving the maturity and credibility of algorithms developed to assess the health of aerospace systems. Comprising an integrated hardware-software environment, the PHALT System allows systems health management algorithms to be developed in a graphical programming environment; to be tested and refined using system simulation or test data playback; and finally, to be evaluated in a real-time hardware-in-the-loop mode with a live test article. In this paper, PHALT System development is described through the presentation of a functional architecture, followed by the selection and integration of hardware and software. Also described is an initial real-time hardware-in-the-loop demonstration that used sensor data qualification algorithms to diagnose and isolate simulated sensor failures in a prototype Power Distribution Unit test-bed. Success of the initial demonstration is highlighted by the correct detection of all sensor failures and the absence of any real-time constraint violations.
2016-01-01
Reports an error in "A violation of the conditional independence assumption in the two-high-threshold model of recognition memory" by Tina Chen, Jeffrey J. Starns and Caren M. Rotello (Journal of Experimental Psychology: Learning, Memory, and Cognition, 2015[Jul], Vol 41[4], 1215-1222). In the article, Chen et al. compared three models: a continuous signal detection model (SDT), a standard two-high-threshold discrete-state model in which detect states always led to correct responses (2HT), and a full-mapping version of the 2HT model in which detect states could lead to either correct or incorrect responses. After publication, Rani Moran (personal communication, April 21, 2015) identified two errors that impact the reported fit statistics for the Bayesian information criterion (BIC) metric of all models as well as the Akaike information criterion (AIC) results for the full-mapping model. The errors are described in the erratum. (The following abstract of the original article appeared in record 2014-56216-001.) The 2-high-threshold (2HT) model of recognition memory assumes that test items result in distinct internal states: they are either detected or not, and the probability of responding at a particular confidence level that an item is "old" or "new" depends on the state-response mapping parameters. The mapping parameters are independent of the probability that an item yields a particular state (e.g., both strong and weak items that are detected as old have the same probability of producing a highest-confidence "old" response). We tested this conditional independence assumption by presenting nouns 1, 2, or 4 times. To maximize the strength of some items, "superstrong" items were repeated 4 times and encoded in conjunction with pleasantness, imageability, anagram, and survival processing tasks. The 2HT model failed to simultaneously capture the response rate data for all item classes, demonstrating that the data violated the conditional independence assumption. In contrast, a Gaussian signal detection model, which posits that the level of confidence that an item is "old" or "new" is a function of its continuous strength value, provided a good account of the data. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Toward the modelling of safety violations in healthcare systems.
Catchpole, Ken
2013-09-01
When frontline staff do not adhere to policies, protocols, or checklists, managers often regard these violations as indicating poor practice or even negligence. More often than not, however, these policy and protocol violations reflect the efforts of well intentioned professionals to carry out their work efficiently in the face of systems poorly designed to meet the diverse demands of patient care. Thus, non-compliance with institutional policies and protocols often signals a systems problem, rather than a people problem, and can be influenced among other things by training, competing goals, context, process, location, case complexity, individual beliefs, the direct or indirect influence of others, job pressure, flexibility, rule definition, and clinician-centred design. Three candidates are considered for developing a model of safety behaviour and decision making. The dynamic safety model helps to understand the relationship between systems designs and human performance. The theory of planned behaviour suggests that intention is a function of attitudes, social norms and perceived behavioural control. The naturalistic decision making paradigm posits that decisions are based on a wider view of multiple patients, expertise, systems complexity, behavioural intention, individual beliefs and current understanding of the system. Understanding and predicting behavioural safety decisions could help us to encourage compliance to current processes and to design better interventions.
Motion Planning in a Society of Intelligent Mobile Agents
NASA Technical Reports Server (NTRS)
Esterline, Albert C.; Shafto, Michael (Technical Monitor)
2002-01-01
The majority of the work on this grant involved formal modeling of human-computer integration. We conceptualize computer resources as a multiagent system so that these resources and human collaborators may be modeled uniformly. In previous work we had used modal for this uniform modeling, and we had developed a process-algebraic agent abstraction. In this work, we applied this abstraction (using CSP) in uniformly modeling agents and users, which allowed us to use tools for investigating CSP models. This work revealed the power of, process-algebraic handshakes in modeling face-to-face conversation. We also investigated specifications of human-computer systems in the style of algebraic specification. This involved specifying the common knowledge required for coordination and process-algebraic patterns of communication actions intended to establish the common knowledge. We investigated the conditions for agents endowed with perception to gain common knowledge and implemented a prototype neural-network system that allows agents to detect when such conditions hold. The literature on multiagent systems conceptualizes communication actions as speech acts. We implemented a prototype system that infers the deontic effects (obligations, permissions, prohibitions) of speech acts and detects violations of these effects. A prototype distributed system was developed that allows users to collaborate in moving proxy agents; it was designed to exploit handshakes and common knowledge Finally. in work carried over from a previous NASA ARC grant, about fifteen undergraduates developed and presented projects on multiagent motion planning.
Enhancing the violation of the einstein-podolsky-rosen local realism by quantum hyperentanglement.
Barbieri, Marco; De Martini, Francesco; Mataloni, Paolo; Vallone, Giuseppe; Cabello, Adán
2006-10-06
Mermin's observation [Phys. Rev. Lett. 65, 1838 (1990)] that the magnitude of the violation of local realism, defined as the ratio between the quantum prediction and the classical bound, can grow exponentially with the size of the system is demonstrated using two-photon hyperentangled states entangled in polarization and path degrees of freedom, and local measurements of polarization and path simultaneously.
Code of Federal Regulations, 2014 CFR
2014-07-01
....544, 141.560-141.564. 8. Filter Backwash Recycling Rule violations 2 141.76(c) 3 141.76(b), (d) 9... 16, 1999. The Surface Water Treatment Rule remains in effect for systems serving at least 10,000...-141.630 take effect under the schedule in § 141.620(c). 15. Failure to monitor for chlorine dioxide at...
Report Environmental Violations | ECHO | US EPA
ECHO, Enforcement and Compliance History Online, provides compliance and enforcement information for approximately 800,000 EPA-regulated facilities nationwide. ECHO includes permit, inspection, violation, enforcement action, and penalty information about facilities regulated under the Clean Air Act (CAA) Stationary Source Program, Clean Water Act (CWA) National Pollutant Elimination Discharge System (NPDES), and/or Resource Conservation and Recovery Act (RCRA). Information also is provided on surrounding demographics when available.
ERIC Educational Resources Information Center
Stern, Lynne Rothschild
1976-01-01
Franks v. Bowman Transportation Co. set forth the principles for determining whether a seniority system violates Title VII and awarded retroactive seniority to a limited group of employees previously denied employment due to their minority status. This ruling is examined in terms of the rights of non-minority employees. Available from: Loyola…
VizieR Online Data Catalog: 10 new pulsars in Arecibo drift-scan survey (Lorimer+, 2005)
NASA Astrophysics Data System (ADS)
Lorimer, D. R.; Xilouris, K. M.; Fruchter, A. S.; Stairs, I. H.; Camilo, F.; Vazquez, A. M.; Eder, J. A.; McLaughlin, M. A.; Roberts, M. S. E.; Hessels, J. W. T.; Ransom, S. M.
2006-02-01
We present the results of a 430-MHz survey for pulsars conducted during the upgrade to the 305-m Arecibo radio telescope. Our survey covered a total of 1147deg2 of sky using a drift-scan technique. We detected 33 pulsars, 10 of which were not known prior to the survey observations. The highlight of the new discoveries is PSR J0407+1607, which has a spin period of 25.7ms, a characteristic age of 1.5Gyr and is in a 1.8-yr orbit about a low-mass (>0.2M) companion. The long orbital period and small eccentricity (e=0.0009) make the binary system an important new addition to the ensemble of binary pulsars suitable to test for violations of the strong equivalence principle. We also report on our initially unsuccessful attempts to detect optically the companion to J0407+1607, which imply that its absolute visual magnitude is >12.1. If, as expected on evolutionary grounds, the companion is an He white dwarf, our non-detection implies a cooling age of least 1Gyr. (3 data files).
Code of Federal Regulations, 2012 CFR
2012-04-01
... authority to detect, prevent, or correct violations of the Federal Food, Drug, and Cosmetic Act. (e..., including any food, drug, and device intended for human or animal use, any cosmetic and biologic intended... not been marketed or that has not left the direct control of the firm, i.e., the product is located on...
Cognitive Biases and Nonverbal Cue Availability in Detecting Deception
ERIC Educational Resources Information Center
Burgoon, Judee K.; Blair, J. Pete; Strom, Renee E.
2008-01-01
In potentially deceptive situations, people rely on mental shortcuts to help process information. These heuristic judgments are often biased and result in inaccurate assessments of sender veracity. Four such biases--truth bias, visual bias, demeanor bias, and expectancy violation bias--were examined in a judgment experiment that varied nonverbal…
Testing nonlocal realism with entangled coherent states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Paternostro, Mauro; Jeong, Hyunseok
2010-03-15
We investigate the violation of nonlocal realism using entangled coherent states (ECSs) under nonlinear operations and homodyne measurements. We address recently proposed Leggett-type inequalities, including a class of optimized incompatibility inequalities proposed by Branciard et al. [Nature Phys. 4, 681 (2008)], and thoroughly assess the effects of detection inefficiency.
77 FR 34066 - Notice of Lodging of Consent Decree Under the Clean Air Act
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... Organic Chemical Manufacturing Industry and Organic Hazardous Air Pollutants for Equipment Leaks). The... Defendants to implement an Enhanced Leak Detection and Repair Program to mitigate any potential excess emissions resulting from past CAA violations; implement controls on an API oil/water separator as additional...
27 CFR 555.186 - Seizure or forfeiture.
Code of Federal Regulations, 2013 CFR
2013-04-01
... EXPLOSIVES, DEPARTMENT OF JUSTICE EXPLOSIVES COMMERCE IN EXPLOSIVES Marking of Plastic Explosives § 555.186 Seizure or forfeiture. Any plastic explosive that does not contain a detection agent in violation of 18 U... of this chapter for regulations on summary destruction of plastic explosives that do not contain a...
27 CFR 555.186 - Seizure or forfeiture.
Code of Federal Regulations, 2014 CFR
2014-04-01
... EXPLOSIVES, DEPARTMENT OF JUSTICE EXPLOSIVES COMMERCE IN EXPLOSIVES Marking of Plastic Explosives § 555.186 Seizure or forfeiture. Any plastic explosive that does not contain a detection agent in violation of 18 U... of this chapter for regulations on summary destruction of plastic explosives that do not contain a...
27 CFR 555.186 - Seizure or forfeiture.
Code of Federal Regulations, 2012 CFR
2012-04-01
... EXPLOSIVES, DEPARTMENT OF JUSTICE EXPLOSIVES COMMERCE IN EXPLOSIVES Marking of Plastic Explosives § 555.186 Seizure or forfeiture. Any plastic explosive that does not contain a detection agent in violation of 18 U... of this chapter for regulations on summary destruction of plastic explosives that do not contain a...
27 CFR 555.186 - Seizure or forfeiture.
Code of Federal Regulations, 2011 CFR
2011-04-01
... EXPLOSIVES, DEPARTMENT OF JUSTICE EXPLOSIVES COMMERCE IN EXPLOSIVES Marking of Plastic Explosives § 555.186 Seizure or forfeiture. Any plastic explosive that does not contain a detection agent in violation of 18 U... of this chapter for regulations on summary destruction of plastic explosives that do not contain a...
27 CFR 555.186 - Seizure or forfeiture.
Code of Federal Regulations, 2010 CFR
2010-04-01
... EXPLOSIVES, DEPARTMENT OF JUSTICE EXPLOSIVES COMMERCE IN EXPLOSIVES Marking of Plastic Explosives § 555.186 Seizure or forfeiture. Any plastic explosive that does not contain a detection agent in violation of 18 U... of this chapter for regulations on summary destruction of plastic explosives that do not contain a...
Time management situation assessment (TMSA)
NASA Technical Reports Server (NTRS)
Richardson, Michael B.; Ricci, Mark J.
1992-01-01
TMSA is a concept prototype developed to support NASA Test Directors (NTDs) in schedule execution monitoring during the later stages of a Shuttle countdown. The program detects qualitative and quantitative constraint violations in near real-time. The next version will support incremental rescheduling and reason over a substantially larger number of scheduled events.
75 FR 20883 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-21
... Revenue Laws. Abstract: The regulations relate to rewards for information that results in the detection and punishment of violations of the Internal Revenue Laws. Respondents: Private sector: Businesses or... review and clearance under the Paperwork Reduction Act of 1995, Public Law 104-13 on or after the date of...
van Elk, Michiel; Bousardt, Roel; Bekkering, Harold; van Schie, Hein T.
2012-01-01
Detecting errors in other’s actions is of pivotal importance for joint action, competitive behavior and observational learning. Although many studies have focused on the neural mechanisms involved in detecting low-level errors, relatively little is known about error-detection in everyday situations. The present study aimed to identify the functional and neural mechanisms whereby we understand the correctness of other’s actions involving well-known objects (e.g. pouring coffee in a cup). Participants observed action sequences in which the correctness of the object grasped and the grip applied to a pair of objects were independently manipulated. Observation of object violations (e.g. grasping the empty cup instead of the coffee pot) resulted in a stronger P3-effect than observation of grip errors (e.g. grasping the coffee pot at the upper part instead of the handle), likely reflecting a reorienting response, directing attention to the relevant location. Following the P3-effect, a parietal slow wave positivity was observed that persisted for grip-errors, likely reflecting the detection of an incorrect hand-object interaction. These findings provide new insight in the functional significance of the neurophysiological markers associated with the observation of incorrect actions and suggest that the P3-effect and the subsequent parietal slow wave positivity may reflect the detection of errors at different levels in the action hierarchy. Thereby this study elucidates the cognitive processes that support the detection of action violations in the selection of objects and grips. PMID:22606261
Automatic Recognition of Road Signs
NASA Astrophysics Data System (ADS)
Inoue, Yasuo; Kohashi, Yuuichirou; Ishikawa, Naoto; Nakajima, Masato
2002-11-01
The increase in traffic accidents is becoming a serious social problem with the recent rapid traffic increase. In many cases, the driver"s carelessness is the primary factor of traffic accidents, and the driver assistance system is demanded for supporting driver"s safety. In this research, we propose the new method of automatic detection and recognition of road signs by image processing. The purpose of this research is to prevent accidents caused by driver"s carelessness, and call attention to a driver when the driver violates traffic a regulation. In this research, high accuracy and the efficient sign detecting method are realized by removing unnecessary information except for a road sign from an image, and detect a road sign using shape features. At first, the color information that is not used in road signs is removed from an image. Next, edges except for circular and triangle ones are removed to choose sign shape. In the recognition process, normalized cross correlation operation is carried out to the two-dimensional differentiation pattern of a sign, and the accurate and efficient method for detecting the road sign is realized. Moreover, the real-time operation in a software base was realized by holding down calculation cost, maintaining highly precise sign detection and recognition. Specifically, it becomes specifically possible to process by 0.1 sec(s)/frame using a general-purpose PC (CPU: Pentium4 1.7GHz). As a result of in-vehicle experimentation, our system could process on real time and has confirmed that detection and recognition of a sign could be performed correctly.
Murty, Vishnu P; Adcock, R Alison
2014-08-01
Learning how to obtain rewards requires learning about their contexts and likely causes. How do long-term memory mechanisms balance the need to represent potential determinants of reward outcomes with the computational burden of an over-inclusive memory? One solution would be to enhance memory for salient events that occur during reward anticipation, because all such events are potential determinants of reward. We tested whether reward motivation enhances encoding of salient events like expectancy violations. During functional magnetic resonance imaging, participants performed a reaction-time task in which goal-irrelevant expectancy violations were encountered during states of high- or low-reward motivation. Motivation amplified hippocampal activation to and declarative memory for expectancy violations. Connectivity of the ventral tegmental area (VTA) with medial prefrontal, ventrolateral prefrontal, and visual cortices preceded and predicted this increase in hippocampal sensitivity. These findings elucidate a novel mechanism whereby reward motivation can enhance hippocampus-dependent memory: anticipatory VTA-cortical-hippocampal interactions. Further, the findings integrate literatures on dopaminergic neuromodulation of prefrontal function and hippocampus-dependent memory. We conclude that during reward motivation, VTA modulation induces distributed neural changes that amplify hippocampal signals and records of expectancy violations to improve predictions-a potentially unique contribution of the hippocampus to reward learning. © The Author 2013. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
Randles, Daniel; Inzlicht, Michael; Proulx, Travis; Tullett, Alexa M; Heine, Steven J
2015-05-01
Cognitive dissonance theory shares much in common with other perspectives that address anomalies, uncertainty, and general expectancy violations. This has led some theorists to argue that these theories represent overlapping psychological processes. If responding to dissonance and uncertainty occurs through a common psychological process, one should expect that the behavioral outcomes of feeling uncertain would also apply to feelings of dissonance, and vice versa. One specific prediction from the meaning maintenance model would be that cognitive dissonance, like other expectancy violations, should lead to the affirmation of unrelated beliefs, or the abstraction of unrelated schemas when the dissonant event cannot be easily accommodated. This article presents 4 studies (N = 1124) demonstrating that the classic induced-compliance dissonance paradigm can lead not only to a change of attitudes (dissonance reduction), but also to (a) an increased reported belief in God (Study 2), (b) a desire to punish norm-violators (Study 1 and 3), (c) a motivation to detect patterns amid noise (Study 3), and (d) polarizing support of public policies among those already biased toward a particular side (Study 4). These results are congruent with theories that propose content-general fluid compensation following the experience of anomaly, a finding not predicted by dissonance theory. The results suggest that dissonance reduction behaviors may share psychological processes described by other theories addressing violations of expectations. (c) 2015 APA, all rights reserved).
Brain signatures of early lexical and morphological learning of a new language.
Havas, Viktória; Laine, Matti; Rodríguez Fornells, Antoni
2017-07-01
Morphology is an important part of language processing but little is known about how adult second language learners acquire morphological rules. Using a word-picture associative learning task, we have previously shown that a brief exposure to novel words with embedded morphological structure (suffix for natural gender) is enough for language learners to acquire the hidden morphological rule. Here we used this paradigm to study the brain signatures of early morphological learning in a novel language in adults. Behavioural measures indicated successful lexical (word stem) and morphological (gender suffix) learning. A day after the learning phase, event-related brain potentials registered during a recognition memory task revealed enhanced N400 and P600 components for stem and suffix violations, respectively. An additional effect observed with combined suffix and stem violations was an enhancement of an early N2 component, most probably related to conflict-detection processes. Successful morphological learning was also evident in the ERP responses to the subsequent rule-generalization task with new stems, where violation of the morphological rule was associated with an early (250-400ms) and late positivity (750-900ms). Overall, these findings tend to converge with lexical and morphosyntactic violation effects observed in L1 processing, suggesting that even after a short exposure, adult language learners can acquire both novel words and novel morphological rules. Copyright © 2017 Elsevier Ltd. All rights reserved.
Detecting Payload Attacks on Programmable Logic Controllers (PLCs)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan
Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS). Providing hardware peripherals and firmware support for control programs (i.e., a PLC’s “payload”) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attacker with access to PLC development software (e.g., by compromising an engineering workstation) can modify the payload program and cause severe physical damages to the ICS. To protect critical ICS infrastructure, we propose to model runtime behaviors of legitimate PLC payload program and use runtime behavior monitoring in PLC firmware to detect payload attacks. By monitoring themore » I/O access patterns, network access patterns, as well as payload program timing characteristics, our proposed firmware-level detection mechanism can detect abnormal runtime behaviors of malicious PLC payload. Using our proof-of-concept implementation, we evaluate the memory and execution time overhead of implementing our proposed method and find that it is feasible to incorporate our method into existing PLC firmware. In addition, our evaluation results show that a wide variety of payload attacks can be effectively detected by our proposed approach. The proposed firmware-level payload attack detection scheme complements existing bumpin- the-wire solutions (e.g., external temporal-logic-based model checkers) in that it can detect payload attacks that violate realtime requirements of ICS operations and does not require any additional apparatus.« less
50 CFR 27.72 - Audio equipment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... NATIONAL WILDLIFE REFUGE SYSTEM PROHIBITED ACTS Disturbing Violations: Filming, Photography, and Light and..., recording and playback devices, loudspeakers, television sets, public address systems and musical...
50 CFR 27.72 - Audio equipment.
Code of Federal Regulations, 2013 CFR
2013-10-01
... NATIONAL WILDLIFE REFUGE SYSTEM PROHIBITED ACTS Disturbing Violations: Filming, Photography, and Light and..., recording and playback devices, loudspeakers, television sets, public address systems and musical...
Electromagnet Design for an Experimental Search for CP Violation in Positronium Decay
NASA Astrophysics Data System (ADS)
Petersburg, Ryan; Henning, Reyco; Bartram, Chelsea
2015-04-01
The 3-photon decay of spin-aligned triplet positronium could be used to search for a charge conjugation and parity (CP) symmetry violation. This CP violation would manifest as a nonzero angular correlation (S-> .k1 -->) (S-> .k1 --> ×k2 -->) between the three decay photons' momentum vectors (|k1 --> | > |k2 --> | > |k3 --> |) and the triplet positronium spin (S->). Current limits on this correlation are at the ~10-3 level; therefore, we propose an experiment to improve this limit. In our experiment, the positronium is spin-polarized by a uniform magnetic field from a conventional electromagnet, and the photons are detected by a segmented NaI gamma detector array with large angular acceptance. This talk discusses the design of this unique electromagnet, which requires good field uniformity for the positronium source and a novel yoke design to minimize fringe field effects for the NaI array's PMTs. This project was supported by the Gillian T. Cell Senior Thesis Research Award in the College of Arts & Sciences, administered by Honors Carolina.
Salisbury, Dean F
2011-01-01
Deviations from repetitive auditory stimuli evoke a mismatch negativity (MMN). Counter-intuitively, omissions of repetitive stimuli do not. Violations of patterns reflecting complex rules also evoke MMN. To detect a MMN to missing stimuli, we developed an auditory gestalt task using one stimulus. Groups of 6 pips (50 msec duration, 330 msec stimulus onset asynchrony (SOA), 400 trials), were presented with an inter-trial interval (ITI) of 750 msec while subjects (n=16) watched a silent video. Occasional deviant groups had missing 4th or 6th tones (50 trials each). Missing stimuli evoked a MMN (p<.05). The missing 4th (−0.8 uV, p <.01) and the missing 6th stimuli (−1.1 uV, p <.05) were more negative than standard 6th stimuli (0.3 uV). MMN can be elicited by a missing stimulus at long SOAs by violation of a gestalt grouping rule. Homogenous stimulus streams appear to differ in the relative weighting of omissions than strongly patterned streams. PMID:22221004
Time reversal invariance - a test in free neutron decay
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lising, Laura Jean
1999-01-01
Time reversal invariance violation plays only a small role in the Standard Model, and the existence of a T-violating effect above the predicted level would be an indication of new physics. A sensitive probe of this symmetry in the weak interaction is the measurement of the T-violating ''D''-correlation in the decay of free neutrons. The triple-correlation Dσ n∙p e x p v involves three kinematic variables, the neutron spin, electron momentu, and neutrino (or proton) momentum, and changes sign under time reversal. This experiment detects the decay products of a polarized cold neutron beam with an octagonal array of scintillationmore » and solid-state detectors. Data from first run at NIST's Cold Neutron Research Facility give a D-coefficient of -0.1 ± 1.3(stat.) ± 0.7(syst) x 10 -3 This measurement has the greatest bearing on extensions to the Standard model that incorporate leptoquarks, although exotic fermion and lift-right symmetric models also allow a D as large as the present limit.« less
A Deterrence Approach to Regulate Nurses' Compliance with Electronic Medical Records Privacy Policy.
Kuo, Kuang-Ming; Talley, Paul C; Hung, Ming-Chien; Chen, Yen-Liang
2017-11-03
Hospitals have become increasingly aware that electronic medical records (EMR) may bring about tangible/intangible benefits to managing institutions, including reduced medical errors, improved quality-of-care, curtailed costs, and allowed access to patient information by healthcare professionals regardless of limitations. However, increased dependence on EMR has led to a corresponding increase in the influence of EMR breaches. Such incursions, which have been significantly facilitated by the introduction of mobile devices for accessing EMR, may induce tangible/intangible damage to both hospitals and concerned individuals. The purpose of this study was to explore factors which may tend to inhibit nurses' intentions to violate privacy policy concerning EMR based upon the deterrence theory perspective. Utilizing survey methodology, 262 responses were analyzed via structural equation modeling. Results revealed that punishment certainty, detection certainty, and subjective norm would most certainly and significantly reduce nurses' intentions to violate established EMR privacy policy. With these findings, recommendations for health administrators in planning and designing effective strategies which may potentially inhibit nurses from violating EMR privacy policy are discussed.
Faithful test of nonlocal realism with entangled coherent states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Chang-Woo; Jeong, Hyunseok; Paternostro, Mauro
2011-02-15
We investigate the violation of Leggett's inequality for nonlocal realism using entangled coherent states and various types of local measurements. We prove mathematically the relation between the violation of the Clauser-Horne-Shimony-Holt form of Bell's inequality and Leggett's one when tested by the same resources. For Leggett inequalities, we generalize the nonlocal realistic bound to systems in Hilbert spaces larger than bidimensional ones and introduce an optimization technique that allows one to achieve larger degrees of violation by adjusting the local measurement settings. Our work describes the steps that should be performed to produce a self-consistent generalization of Leggett's original argumentsmore » to continuous-variable states.« less
Komives, A; Sint, A K; Bowers, M; Snow, M
2005-01-01
A measurement of the parity-violating gamma asymmetry in n-D capture would yield information on N-N parity violation independent of the n-p system. Since cold neutrons will depolarize in a liquid deuterium target in which the scattering cross section is much larger than the absorption cross section, it will be necessary to quantify the loss of polarization before capture. One way to do this is to use the large circular polarization of the gamma from n-D capture and analyze the circular polarization of the gamma in a gamma polarimeter. We describe the design of this polarimeter.
Computational estimation of parity violation effects in a metal-organic framework containing DABCO
NASA Astrophysics Data System (ADS)
Mirzaeva, Irina V.; Kozlova, Svetlana G.
2017-11-01
It was previously suggested that a metal-organic framework [Zn2(C8H4O4)2·C6H12N2] could be a possible candidate for observation of parity violation effects related to tunneling of C6H12N2 (DABCO) fragment between chiral twisted states. We have performed relativistic four-component and two-component calculations of parity violating energy (PVE) term for twisted isomers of isolated DABCO molecule and [Zn2DABCO]4+ cation. We also discuss the nature of PVE in these systems with the help of analysis of individual atomic contributions to PVE and visualization of electron chirality density.
Sleegers, Willem W. A.; Proulx, Travis
2015-01-01
People maintain systems of beliefs that provide them with a sense of belongingness, control, identity, and meaning, more generally. Recent research shows that when these beliefs are threatened a syndrome of negatively valenced arousal is evoked that motivates people to seek comfort in their ideologies or other personally valued beliefs. In this paper we will provide an overview of this process and discuss areas for future research. Beginning with the neural foundations of meaning violations, we review findings that show the anterior cingulate cortex is responsible for detecting inconsistencies, and importantly, that this is experienced as aversive. Next, we evaluate the evidential support for a psychophysiological arousal response as measured by cardiography and skin conductance. We discuss how current theorizing proposes that subsequent behavioral approach ameliorates the negative arousal and serves as an effective, well-adapted coping response, but we also aim to further integrate this process in the existing threat-compensation literature. Finally, we speculate on whether approach motivation is likely to result when one feels capable of handling the threat, thereby incorporating the biopsychosocial model that distinguishes between challenge and threat into the motivational threat-response literature. We believe the current literature on threat and meaning has much to offer and we aim to provide new incentives for further development. PMID:25620950
Fondevila, Sabela; Martín-Loeches, Manuel; Jiménez-Ortega, Laura; Casado, Pilar; Sel, Alejandra; Fernández-Hernández, Anabel; Sommer, Werner
2012-01-01
Religious beliefs are both catchy and durable: they exhibit a high degree of adherence to our cognitive system, given their success of transmission and spreading throughout history. A prominent explanation for religion's cultural success comes from the "MCI hypothesis," according to which religious beliefs are both easy to recall and desirable to transmit because they are minimally counterintuitive (MCI). This hypothesis has been empirically tested at concept and narrative levels by recall measures. However, the neural correlates of MCI concepts remain poorly understood. We used the N400 component of the event-related brain potential as a measure of counterintuitiveness of violations comparing religious and non-religious sentences, both counterintuitive, when presented in isolation. Around 80% in either condition were core-knowledge violations. We found smaller N400 amplitudes for religious as compared to non-religious counterintuitive ideas, suggesting that religious ideas are less semantically anomalous. Moreover, behavioral measures revealed that religious ideas are not readily detected as unacceptable. Finally, systematic analyses of our materials, according to conceptual features proposed in cognitive models of religion, did not reveal any outstanding variable significantly contributing to these differences. Refinements of cognitive models of religion should elucidate which combination of factors renders an anomaly less counterintuitive and thus more suitable for recall and transmission.
Tal, Alon; Aharon, Yaara; Yuhas-Peled, Hadar
2010-04-01
Most environmental enforcement programs have separate criminal and administrative procedures for addressing violations. Pitting "criminal"versus"administrative" enforcement as mutually exclusive alternatives constitutes a "false dilemma". Clearly, the government response should be influenced by the severity of pollution and the specific circumstances of the polluter. Yet, policy makers seeking to improve environmental compliance need to have a clearer picture about the merits of each approach and their relative effectiveness. This research empirically assesses the effectiveness of criminal versus administrative enforcement activities in Israel. After considering the philosophical implications associated with each regulatory approach, the results of a year-long study are presented. A series of performance indicators are utilized, with particular weight on compliance status in the field, to assess the condition of environmental violations several years subsequent to completion of enforcement activities. The state of 100 violations of air, water and hazardous materials laws that had been addressed through the criminal process were matched with results of comparable violations, against which administrative actions were taken. Results suggest that while criminal enforcement is a longer process, compliance following these actions was significantly greater than in administrative enforcement cases. The findings also underline the significance of a systematic follow-up system for tracking violations after enforcement actions are complete. Finally, the study confirms the benefits of targeted assistance to improve compliance among violators of environmental standards.
On the flavor structure of natural composite Higgs models & top flavor violation
NASA Astrophysics Data System (ADS)
Azatov, Aleksandr; Panico, Giuliano; Perez, Gilad; Soreq, Yotam
2014-12-01
We explore the up flavor structure of composite pseudo Nambu-Goldstone-boson Higgs models, where we focus on the flavor anarchic minimal SO(5) case. We identify the different sources of flavor violation in this framework and emphasise the differences from the anarchic Randall-Sundrum scenario. In particular, the fact that the flavor symmetry does not commute with the symmetries that stabilize the Higgs potential may constrain the flavor structure of the theory. In addition, we consider the interplay between the fine tuning of the model and flavor violation. We find that generically the tuning of this class of models is worsen in the anarchic case due to the contributions from the additional fermion resonances. We show that, even in the presence of custodial symmetry, large top flavor violating rate are naturally expected. In particular, t → cZ branching ratio of order of 10-5 is generic for this class of models. Thus, this framework can be tested in the next run of the LHC as well as in other future colliders. We also find that the top flavor violation is weakly correlated with the increase amount of fine tuning. Finally, other related flavor violation effects, such as t → ch and in the D system, are found to be too small to be observed by the current and near future colliders.
Search for the permanent electric dipole moment of 129Xe
NASA Astrophysics Data System (ADS)
Sachdeva, Natasha; Chupp, Timothy; Gong, Fei; Babcock, Earl; Salhi, Zahir; Burghoff, Martin; Fan, Isaac; Killian, Wolfgang; Knappe-Grüneberg, Silvia; Schabel, Allard; Seifert, Frank; Trahms, Lutz; Voigt, Jens; Degenkolb, Skyler; Fierlinger, Peter; Krägeloh, Eva; Lins, Tobias; Marino, Michael; Meinel, Jonas; Niessen, Benjamin; Stuiber, Stefan; Terrano, William; Kuchler, Florian; Singh, Jaideep
2017-09-01
CP-violation in Beyond-the-Standard-Model physics, necessary to explain the baryon asymmetry, gives rise to permanent electric dipole moments (EDMs). EDM measurements of the neutron, electron, paramagnetic and diamagnetic atoms constrain CP-violating parameters. The current limit for the 129Xe EDM is 6 ×10-27 e . cm (95 % CL). The HeXeEDM experiment at FRM-II (Munich Research Reactor) and BMSR-2 (Berlin Magnetically Shielded Room) uses a stable magnetic field in a magnetically shielded room and 3He comagnetometer with potential to improve the limit by two orders of magnitude. Polarized 3He and 129Xe free precession is detected with SQUID magnetometers in the presence of applied electric and magnetic fields. Conclusions from recent measurements will be presented.
20 CFR 658.426 - Complaints against USES.
Code of Federal Regulations, 2010 CFR
2010-04-01
... PROVISIONS GOVERNING THE JOB SERVICE SYSTEM Job Service Complaint System Federal Js Complaint System § 658... USES has violated JS regulations should be mailed to the Assistant Secretary for Employment and...
Carpenter, Robert O; Spooner, John; Arbogast, Patrick G; Tarpley, John L; Griffin, Marie R; Lomis, Kimberly D
2006-01-01
The Accreditation Council for Graduate Medical Education (ACGME) implemented requirements regarding allowable duty hours for resident training in the United States in July 2003. In a previous pilot study at Vanderbilt University Medical Center, a significant number of residents reported violation of requirements. In addition, almost half of those individuals admitted under-reporting their hours worked. The authors' goal was to further delineate the type and frequency of violations and under-reporting. A survey tool was designed to assess specific types of violations as well as factors that influence the number of hours residents worked and reported. Approval was obtained from the Vanderbilt Institutional Review Board and Office of Graduate Medical Education before enrollment of subjects. The program directors of Pediatrics, Internal Medicine, Medicine-Pediatrics, and General Surgery supported the participation of their residents. A voluntary anonymous survey of these residents was conducted 1 year after the pilot study. Of 263 eligible residents, 175 were surveyed. Of 175 residents, 125 (71%) residents responded. Eighty-five percent of residents reported violation of duty-hour requirements within the preceding 3 months. Residents reported violation of specific requirements as follows: 1 day off in 7, 28%; 80-hour weekly average, 65%; and "24+6" consecutive hours, 85%. Residents were asked to estimate the number of hours by which they exceeded requirements. Hours over the 80-hour weekly requirement were reported as follows: 1 hour, 12%; 2 hours, 15%; 3 hours, 21%; 4 hours, 5%; 5 hours, 14%; and 6 or more hours, 33%. Hours over the "24+6" requirement were reported as follows: 1 hour, 30%; 2 hours, 42%; 3 hours, 18%; 4 hours, 7%; 5 hours, 1%; and 6 or more hours, 2%. Forty-eight percent of respondents admitted under-reporting violations to their program director. Eighty-five percent of residents reported at least 1 violation, and 48% admitted under-reporting violations. These results support the previous findings of 80% and 49%, respectively. Of the various requirements, the "24+6" rule was most frequently violated. Of those in violation of the "24+6" requirement, the majority (90%) exceeded limits by no more than 3 hours. Of those in violation of the 80-hour weekly average requirement, the majority (57%) exceeded limits by no more than 5 hours. Per the ACGME website, "an RRC may grant exceptions for up to 10% of the 80-hour limit, to individual programs based on a sound educational rationale." Although the overall percent of residents reporting violation remains high, the number of excess hours worked is small relative to established standards (within 10%). The authors propose that systems adaptations could be developed to improve compliance. Special attention is warranted to investigate the activities of residents in the post-call period.
A new measurement of electron transverse polarization in polarized nuclear β-decay
NASA Astrophysics Data System (ADS)
Kawamura, H.; Akiyama, T.; Hata, M.; Hirayama, Y.; Ikeda, M.; Ikeda, Y.; Ishii, T.; Kameda, D.; Mitsuoka, S.; Miyatake, H.; Nagae, D.; Nakaya, Y.; Ninomiya, K.; Nitta, M.; Ogawa, N.; Onishi, J.; Seitaibashi, E.; Tanaka, S.; Tanuma, R.; Totsuka, Y.; Toyoda, T.; Watanabe, Y. X.; Murata, J.
2017-03-01
The Mott polarimetry for T-violation (MTV) experiment tests time-reversal symmetry in polarized nuclear β-decay by measuring an electron’s transverse polarization as a form of angular asymmetry in Mott scattering using a thin metal foil. A Mott scattering analyzer system developed using a tracking detector to measure scattering angles offers better event selectivity than conventional counter experiments. In this paper, we describe a pilot experiment conducted at KEK-TRIAC using a prototype system with a polarized 8Li beam. The experiment confirmed the sound performance of our Mott analyzer system to measure T-violating triple correlation (R correlation), and therefore recommends its use in higher-precision experiments at the TRIUMF-ISAC.
Zetterqvist, Anna V.; Mulinari, Shai
2013-01-01
Background The alleged efficacy of pharmaceutical industry self-regulation has been used to repudiate increased government oversight over promotional activity. European politicians and industry have cited Sweden as an excellent example of self-regulation based on an ethical code. This paper considers antidepressant advertising in Sweden to uncover the strengths and weaknesses of self-regulation. Methodology We analyzed all antidepressant advertisements in the Swedish Medical Journal, 1994–2003. The regulation of these advertisements was analyzed using case reports from self-regulatory bodies. The authors independently reviewed this material to investigate: (1) extent of violative advertising; (2) pattern of code breaches; (3) rate at which the system reacted to violative advertising; (4) prevalence of and oversight over claims regarding antidepressant efficacy and disease causality, and (5) costs for manufactures associated with violative advertising. Principal Findings Self-regulatory bodies identified numerous code breaches. Nonetheless, they failed to protect doctors from unreliable information on antidepressants, since as many as 247 of 722 (34%) advertisements breached the industry code. Self-regulatory bodies repeatedly failed to challenge inflated claims of antidepressant efficacy, lending evidence of lax oversight. On average, 15 weeks elapsed between printing and censure of a wrongful claim, and in 25% of cases 47 weeks or more elapsed. Industry paid roughly €108000 in fines for violative advertising, adding an estimated additional average cost of 11% to each purchased violative advertisement, or amounting to as little as 0.009% of total antidepressant sales of around €1.2 billion. Conclusions Lax oversight, combined with lags in the system and low fines for violations, may explain the Swedish system’s failure to pressure companies into providing reliable antidepressants information. If these shortcomings prove to be consistent across self-regulatory settings, and if appropriate measures are not taken to amend shortcomings, many countries may want to reconsider the current balance between self-regulation, and legislative control with government oversight. PMID:23650519
Guidelines on What Constitutes Plagiarism and Electronic Tools to Detect it.
Luksanapruksa, Panya; Millhouse, Paul W
2016-04-01
Plagiarism is a serious ethical problem among scientific publications. There are various definitions of plagiarism, and the major categories include unintentional (unsuitable paraphrasing or improper citations) and intentional. Intentional plagiarism includes mosaic plagiarism, plagiarism of ideas, plagiarism of text, and self-plagiarism. There are many Web sites and software packages that claim to detect plagiarism effectively. A violation of plagiarism laws can lead to serious consequences including author banning, loss of professional reputation, termination of a position, and even legal action.
Analysis of soft-decision FEC on non-AWGN channels.
Cho, Junho; Xie, Chongjin; Winzer, Peter J
2012-03-26
Soft-decision forward error correction (SD-FEC) schemes are typically designed for additive white Gaussian noise (AWGN) channels. In a fiber-optic communication system, noise may be neither circularly symmetric nor Gaussian, thus violating an important assumption underlying SD-FEC design. This paper quantifies the impact of non-AWGN noise on SD-FEC performance for such optical channels. We use a conditionally bivariate Gaussian noise model (CBGN) to analyze the impact of correlations among the signal's two quadrature components, and assess the effect of CBGN on SD-FEC performance using the density evolution of low-density parity-check (LDPC) codes. On a CBGN channel generating severely elliptic noise clouds, it is shown that more than 3 dB of coding gain are attainable by utilizing correlation information. Our analyses also give insights into potential improvements of the detection performance for fiber-optic transmission systems assisted by SD-FEC.
Modelling `Life' against `heat death'
NASA Astrophysics Data System (ADS)
Zak, Michail
2018-01-01
This work is inspired by the discovery of a new class of dynamical system described by ordinary differential equations coupled with their Liouville equation. These systems called self-controlled since the role of actuators is played by the probability produced by the Liouville equation. Following the Madelung equation that belongs to this class, non-Newtonian properties such as randomness, entanglement and probability interference typical for quantum systems have been described. Special attention was paid to the capability to violate the second law of thermodynamics, which makes these systems neither Newtonian, nor quantum. It has been shown that self-controlled dynamical systems can be linked to mathematical models of living systems. The discovery of isolated dynamical systems that can decrease entropy in violation of the second law of thermodynamics, and resemblances of these systems to livings suggests that `Life' can slow down the `heat death' of the Universe and that can be associated with the Purpose of Life.
ERIC Educational Resources Information Center
Wulfeck, Beverly; Bates, Elizabeth; Krupa-Kwiatkowski, Magda; Saltzman, Danna
2004-01-01
Grammaticality judgments and processing times associated with violation detection were examined in typically developing children, children with focal brain lesions (FL) acquired early in life, and children with specific language impairment (SLI). Grammatical sensitivity in the FL group, while below typically developing children, was above levels…
Performance of DIMTEST-and NOHARM-Based Statistics for Testing Unidimensionality
ERIC Educational Resources Information Center
Finch, Holmes; Habing, Brian
2007-01-01
This Monte Carlo study compares the ability of the parametric bootstrap version of DIMTEST with three goodness-of-fit tests calculated from a fitted NOHARM model to detect violations of the assumption of unidimensionality in testing data. The effectiveness of the procedures was evaluated for different numbers of items, numbers of examinees,…
28 CFR 0.29j - Law enforcement authority.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Law enforcement authority. 0.29j Section...-Office of the Inspector General § 0.29j Law enforcement authority. Subject to guidelines promulgated by...) Detect and assist in the prosecution of crimes in violation of the laws of the United States and to...
10 CFR 60.11 - Deliberate misconduct.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Deliberate misconduct. 60.11 Section 60.11 Energy NUCLEAR... Provisions § 60.11 Deliberate misconduct. (a) Any licensee, applicant for a license, employee of a licensee... misconduct that causes or would have caused, if not detected, a licensee or applicant to be in violation of...
10 CFR 60.11 - Deliberate misconduct.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Deliberate misconduct. 60.11 Section 60.11 Energy NUCLEAR... Provisions § 60.11 Deliberate misconduct. (a) Any licensee, applicant for a license, employee of a licensee... misconduct that causes or would have caused, if not detected, a licensee or applicant to be in violation of...
10 CFR 60.11 - Deliberate misconduct.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Deliberate misconduct. 60.11 Section 60.11 Energy NUCLEAR... Provisions § 60.11 Deliberate misconduct. (a) Any licensee, applicant for a license, employee of a licensee... misconduct that causes or would have caused, if not detected, a licensee or applicant to be in violation of...
10 CFR 60.11 - Deliberate misconduct.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Deliberate misconduct. 60.11 Section 60.11 Energy NUCLEAR... Provisions § 60.11 Deliberate misconduct. (a) Any licensee, applicant for a license, employee of a licensee... misconduct that causes or would have caused, if not detected, a licensee or applicant to be in violation of...
ERIC Educational Resources Information Center
Houlihan, Michael; Stelmack, Robert M.
2012-01-01
The relation between mental ability and the ability to detect violations of an abstract, third-order conjunction rule was examined using event-related potential measures, specifically mismatch negativity (MMN). The primary objective was to determine whether the extraction of invariant relations based on abstract conjunctions between two…
40 CFR 141.202 - Tier 1 Public Notice-Form, manner, and frequency of notice.
Code of Federal Regulations, 2012 CFR
2012-07-01
...) Detection of E. coli, enterococci, or coliphage in source water samples as specified in § 141.402(a) and... (CONTINUED) WATER PROGRAMS (CONTINUED) NATIONAL PRIMARY DRINKING WATER REGULATIONS Public Notification of Drinking Water Violations § 141.202 Tier 1 Public Notice—Form, manner, and frequency of notice. (a) Which...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-15
... Building, 1111 Constitution Avenue NW., Washington, DC 20224. Due to building security procedures, visitors must enter at the Constitution Avenue entrance. In addition, all visitors must present photo..., 1111 Constitution Avenue NW., Washington, DC 20224 or sent electronically via the Federal eRulemaking...
Detection of Irregular Verb Violations by Children with and without SLI.
ERIC Educational Resources Information Center
Redmond, Sean M.; Rice, Mabel L.
2001-01-01
Fifty-seven children (ages 5-8) with and without specific language impairment (SLI) participated in judgment and elicitation tasks designed to evaluate their understanding of irregular verb forms. Differences between SLI and control children were observed in their productions and relative levels of sensitivity to infinitive errors in finite…
Wang, Su-hua; Baillargeon, Renée
2009-01-01
As they observe or produce events, infants identify variables that help them predict outcomes in each category of events. How do infants identify a new variable? An explanation-based learning (EBL) account suggests three essential steps: (1) observing contrastive outcomes relevant to the variable; (2) discovering the conditions associated with these outcomes; and (3) generating an explanation for the condition-outcome regularity discovered. In Experiments 1–3, 9-month-old infants watched events designed to “teach” them the variable height in covering events. After watching these events, designed in accord with the EBL account, the infants detected a height violation in a covering event, three months earlier than they ordinarily would have. In Experiments 4–6, the “teaching” events were modified to remove one of the EBL steps, and the infants no longer detected the height violation. The present findings thus support the EBL account and help specify the processes by which infants acquire their physical knowledge. PMID:18177635
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sekatski, Pavel; Sanguinetti, Bruno; Pomarico, Enrico
By amplifying photonic qubits it is possible to produce states that contain enough photons to be seen with the human eye, potentially bringing quantum effects to macroscopic scales [P. Sekatski, N. Brunner, C. Branciard, N. Gisin, and C. Simon, Phys. Rev. Lett. 103, 113601 (2009)]. In this paper we theoretically study quantum states obtained by amplifying one side of an entangled photon pair with different types of optical cloning machines for photonic qubits. We propose a detection scheme that involves lossy threshold detectors (such as the human eye) on the amplified side and conventional photon detectors on the other side.more » We show that correlations obtained with such coarse-grained measurements prove the entanglement of the initial photon pair and do not prove the entanglement of the amplified state. We emphasize the importance of the detection loophole in Bell violation experiments by giving a simple preparation technique for separable states that violate a Bell inequality without closing this loophole. Finally, we analyze the genuine entanglement of the amplified states and its robustness to losses before, during, and after amplification.« less
High Energy Astrophysics Tests of Lorentz Invariance and Quantum Gravity Models
NASA Technical Reports Server (NTRS)
Stecker, Floyd W.
2012-01-01
High energy astrophysics observations provide the best possibilities to detect a very small violation of Lorentz invariance such as may be related to the structure of space-time near the Planck scale of approx.10(exp -35) m. I will discuss the possible signatures of Lorentz invariance violation (LIV) that can be manifested by observing of the spectra, polarization, and timing of gamma-rays from active galactic nuclei and gamma-ray bursts. Other sensitive tests are provided by observations of the spectra of ultrahigh energy cosmic rays and neutrinos. Using the latest data from the Pierre Auger Observatory one can already derive an upper limit of 4.5 x 10(exp -23) on the fraction of LIV at a Lorentz factor of approx. 2 x 10(exp 11). This result has fundamental implications for quantum gravity models. I will also discuss the possibilities of using more sensitive space-based detection techniques to improve searches for LIV in the future. I will also discuss how the LIV formalism casts doubt on the OPERA superluminal neutrino claim.
Cloning entangled photons to scales one can see
NASA Astrophysics Data System (ADS)
Sekatski, Pavel; Sanguinetti, Bruno; Pomarico, Enrico; Gisin, Nicolas; Simon, Christoph
2010-11-01
By amplifying photonic qubits it is possible to produce states that contain enough photons to be seen with the human eye, potentially bringing quantum effects to macroscopic scales [P. Sekatski, N. Brunner, C. Branciard, N. Gisin, and C. Simon, Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.103.113601 103, 113601 (2009)]. In this paper we theoretically study quantum states obtained by amplifying one side of an entangled photon pair with different types of optical cloning machines for photonic qubits. We propose a detection scheme that involves lossy threshold detectors (such as the human eye) on the amplified side and conventional photon detectors on the other side. We show that correlations obtained with such coarse-grained measurements prove the entanglement of the initial photon pair and do not prove the entanglement of the amplified state. We emphasize the importance of the detection loophole in Bell violation experiments by giving a simple preparation technique for separable states that violate a Bell inequality without closing this loophole. Finally, we analyze the genuine entanglement of the amplified states and its robustness to losses before, during, and after amplification.
Demonstration of a Sensitive Method to Measure Nuclear-Spin-Dependent Parity Violation
NASA Astrophysics Data System (ADS)
Altuntaş, Emine; Ammon, Jeffrey; Cahn, Sidney B.; DeMille, David
2018-04-01
Nuclear-spin-dependent parity violation (NSD-PV) effects in atoms and molecules arise from Z0 boson exchange between electrons and the nucleus, and from the magnetic interaction between electrons and the parity-violating nuclear anapole moment. We demonstrate measurements of NSD-PV that use an enhancement of the effect in diatomic molecules, here using the test system 138Ba 19. Our sensitivity surpasses that of any previous atomic parity violation measurement. We show that systematic errors can be suppressed to at least the level of the present statistical sensitivity. We measure the matrix element W of the NSD-PV interaction with total uncertainty δ W /(2 π )<0.7 Hz , for each of two configurations where W must have different signs. This sensitivity would be sufficient to measure NSD-PV effects of the size anticipated across a wide range of nuclei including 137Ba in 137BaF, where |W |/(2 π )≈5 Hz is expected.
Logging concessions enable illegal logging crisis in the Peruvian Amazon.
Finer, Matt; Jenkins, Clinton N; Sky, Melissa A Blue; Pine, Justin
2014-04-17
The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.
Models & Searches of CPT Violation: a personal, very partial, list
NASA Astrophysics Data System (ADS)
Mavromatos, Nick E.
2018-01-01
In this talk, first I motivate theoretically, and then I review the phenomenology of, some models entailing CPT Violation (CPTV). The latter is argued to be responsible for the observed matter-antimatter asymmetry in the Cosmos, and may owe its origin to either Lorentz-violating background geometries, whose effects are strong in early epochs of the Universe but very weak today, being temperature dependent in general, or to an ill-defined CPT generator in some quantum gravity models entailing decoherence of quantum matter as a result of quantum degrees of freedom in the gravity sector that are inaccessible to the low-energy observers. In particular, for the latter category of CPTV, I argue that entangled states of neutral mesons (Kaons or B-systems), of central relevance to KLOE-2 experiment, can provide smoking-gun sensitive tests or even falsify some of these models. If CPT is ill-defined one may also encounter violations of the spin-statistics theorem, with possible consequences for the Pauli Exclusion Principle, which I only briefly touch upon.
Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon
Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin
2014-01-01
The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US–Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms. PMID:24743552
Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon
NASA Astrophysics Data System (ADS)
Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin
2014-04-01
The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.
Bell violation using entangled photons without the fair-sampling assumption.
Giustina, Marissa; Mech, Alexandra; Ramelow, Sven; Wittmann, Bernhard; Kofler, Johannes; Beyer, Jörn; Lita, Adriana; Calkins, Brice; Gerrits, Thomas; Nam, Sae Woo; Ursin, Rupert; Zeilinger, Anton
2013-05-09
The violation of a Bell inequality is an experimental observation that forces the abandonment of a local realistic viewpoint--namely, one in which physical properties are (probabilistically) defined before and independently of measurement, and in which no physical influence can propagate faster than the speed of light. All such experimental violations require additional assumptions depending on their specific construction, making them vulnerable to so-called loopholes. Here we use entangled photons to violate a Bell inequality while closing the fair-sampling loophole, that is, without assuming that the sample of measured photons accurately represents the entire ensemble. To do this, we use the Eberhard form of Bell's inequality, which is not vulnerable to the fair-sampling assumption and which allows a lower collection efficiency than other forms. Technical improvements of the photon source and high-efficiency transition-edge sensors were crucial for achieving a sufficiently high collection efficiency. Our experiment makes the photon the first physical system for which each of the main loopholes has been closed, albeit in different experiments.
Accounting for seasonal patterns in syndromic surveillance data for outbreak detection.
Burr, Tom; Graves, Todd; Klamann, Richard; Michalak, Sarah; Picard, Richard; Hengartner, Nicolas
2006-12-04
Syndromic surveillance (SS) can potentially contribute to outbreak detection capability by providing timely, novel data sources. One SS challenge is that some syndrome counts vary with season in a manner that is not identical from year to year. Our goal is to evaluate the impact of inconsistent seasonal effects on performance assessments (false and true positive rates) in the context of detecting anomalous counts in data that exhibit seasonal variation. To evaluate the impact of inconsistent seasonal effects, we injected synthetic outbreaks into real data and into data simulated from each of two models fit to the same real data. Using real respiratory syndrome counts collected in an emergency department from 2/1/94-5/31/03, we varied the length of training data from one to eight years, applied a sequential test to the forecast errors arising from each of eight forecasting methods, and evaluated their detection probabilities (DP) on the basis of 1000 injected synthetic outbreaks. We did the same for each of two corresponding simulated data sets. The less realistic, nonhierarchical model's simulated data set assumed that "one season fits all," meaning that each year's seasonal peak has the same onset, duration, and magnitude. The more realistic simulated data set used a hierarchical model to capture violation of the "one season fits all" assumption. This experiment demonstrated optimistic bias in DP estimates for some of the methods when data simulated from the nonhierarchical model was used for DP estimation, thus suggesting that at least for some real data sets and methods, it is not adequate to assume that "one season fits all." For the data we analyze, the "one season fits all " assumption is violated, and DP performance claims based on simulated data that assume "one season fits all," for the forecast methods considered, except for moving average methods, tend to be optimistic. Moving average methods based on relatively short amounts of training data are competitive on all three data sets, but are particularly competitive on the real data and on data from the hierarchical model, which are the two data sets that violate the "one season fits all" assumption.
A false start in the race against doping in sport: concerns with cycling's biological passport.
Hailey, Nicholas
2011-11-01
Professional cycling has suffered from a number of doping scandals. The sport's governing bodies have responded by implementing an aggressive new antidoping program known as the biological passport. Cycling's biological passport marks a departure from traditional antidoping efforts, which have focused on directly detecting prohibited substances in a cyclist's system. Instead, the biological passport tracks biological variables in a cyclist's blood and urine over time, monitoring for fluctuations that are thought to indirectly reveal the effects of doping. Although this method of indirect detection is promising, it also raises serious legal and scientific concerns. Since its introduction, the cycling community has debated the reliability of indirect biological-passport evidence and the clarity, consistency, and transparency of its use in proving doping violations. Such uncertainty undermines the legitimacy of finding cyclists guilty of doping based on this indirect evidence alone. Antidoping authorities should address these important concerns before continuing to pursue doping sanctions against cyclists solely on the basis of their biological passports.