933 resultados para CPT VIOLATION
Resumo:
We have searched for sidereal variations in the rate of antineutrino interactions in the MINOS Near Detector. Using antineutrinos produced by the NuMI beam, we find no statistically significant sidereal modulation in the rate. When this result is placed in the context of the Standard Model Extension theory we are able to place upper limits on the coefficients defining the theory. These limits are used in combination with the results from an earlier analysis of MINOS neutrino data to further constrain the coefficients.
Resumo:
In this Letter, we apply the proper-time method to generate the Lorentz-violating Chern-Simons terms in the four-dimensional Yang-Mills and non-linearized gravity theories. It is shown that the coefficient of the induced Chern-Simons term is finite but regularization dependent. (C) 2008 Elsevier B.V. All rights reserved.
Resumo:
We show that under gravity the effective masses for neutrino and antineutrino are different which opens a possible window of neutrino-antineutrino oscillation even if the rest masses of the corresponding eigenstates are same. This is due to CPT violation and possible to demonstrate if the neutrino mass eigenstates are expressed as a combination of neutrino and antineutrino eigenstates, as of the neutral kaon system, with the plausible breaking of lepton number conservation. In early universe, in presence of various lepton number violating processes, this oscillation might lead to neutrino-antineutrino asymmetry which resulted baryogenesis from the B-L symmetry by electro-weak sphaleron processes. On the other hand, for Majorana neutrinos, this oscillation is expected to affect the inner edge of neutrino dominated accretion disks around a compact object by influencing the neutrino sphere which controls the accretion dynamics, and then the related type-II supernova evolution and the r-process nucleosynthesis.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.
Resumo:
Ship-breaking started as an industry in Bangladesh in the early 1970s. This industry is not technically organized, and the management is also primitive and unsound. Although specific information is not available, it is estimated that about 700 workers have been killed and, at the same time, a total of 10,000 workers have been injured in explosions at the ship-breaking yards over the last three decades. This process continues unabated in the absence of specific legislation for regulating ship-breaking industries in Bangladesh. Against this backdrop, this paper identifies the major issues relating to enforcement of labour rights in the ship-breaking yards of Bangladesh.
Resumo:
This article addresses the need of an implementation mechanism for the protection of refugees’ rights. However, it is contended that the principle forms part of Customary International Law, under which it is binding on all states irrespective of whether or not they are parties to the Convention Relating to the Status of Refugees 1951 or its Protocol 1967. Since last decade, U.S and its allies have been fighting to curve terrorism which has raised many issues such as human rights violation, deportation, expulsion, extradition, rendition and many more. Pakistan has played a very critical role in War against Terrorism, particularly in reference of war in Afghanistan. Particular concern of this article is the violation of refugees’ rights in Pakistan in 2008 and 2010. This article would highlight the legislation regarding non-expulsion of Afghan refugees from Pakistan to a territory where they have well founded fear of persecution. Article is divided into three parts, the first one deals with “Principle of Non-Refoulement”, the second one deals with “exceptions to the principle” whereas the last one discusses the violation of the very principle in Pakistan with reference to Afghan refugees.
Resumo:
The Standard Model of particle physics consists of the quantum electrodynamics (QED) and the weak and strong nuclear interactions. The QED is the basis for molecular properties, and thus it defines much of the world we see. The weak nuclear interaction is responsible for decays of nuclei, among other things, and in principle, it should also effects at the molecular scale. The strong nuclear interaction is hidden in interactions inside nuclei. From the high-energy and atomic experiments it is known that the weak interaction does not conserve parity. Consequently, the weak interaction and specifically the exchange of the Z^0 boson between a nucleon and an electron induces small energy shifts of different sign for mirror image molecules. This in turn will make the other enantiomer of a molecule energetically favorable than the other and also shifts the spectral lines of the mirror image pair of molecules into different directions creating a split. Parity violation (PV) in molecules, however, has not been observed. The topic of this thesis is how the weak interaction affects certain molecular magnetic properties, namely certain parameters of nuclear magnetic resonance (NMR) and electron spin resonance (ESR) spectroscopies. The thesis consists of numerical estimates of NMR and ESR spectral parameters and investigations of the effects of different aspects of quantum chemical computations to them. PV contributions to the NMR shielding and spin-spin coupling constants are investigated from the computational point of view. All the aspects of quantum chemical electronic structure computations are found to be very important, which makes accurate computations challenging. Effects of molecular geometry are also investigated using a model system of polysilyene chains. PV contribution to the NMR shielding constant is found to saturate after the chain reaches a certain length, but the effects of local geometry can be large. Rigorous vibrational averaging is also performed for a relatively small and rigid molecule. Vibrational corrections to the PV contribution are found to be only a couple of per cents. PV contributions to the ESR g-tensor are also evaluated using a series of molecules. Unfortunately, all the estimates are below the experimental limits, but PV in some of the heavier molecules comes close to the present day experimental resolution.
Resumo:
At an e gamma collider, a selectron (e) over tilde(L,R) may be produced in association with a (lightest) neutralino <(chi)over tilde>(0)(1). Decay of the selectron may be expected to yield a final state with an electron and another <(chi)over tilde>(0)(1). If R-parity is violated, these two neutralinos will decay, giving rise to distinctive signatures, which are identified and studied. (C) 1998 Published by Elsevier Science B.V.
Resumo:
Fuzzy multiobjective programming for a deterministic case involves maximizing the minimum goal satisfaction level among conflicting goals of different stakeholders using Max-min approach. Uncertainty due to randomness in a fuzzy multiobjective programming may be addressed by modifying the constraints using probabilistic inequality (e.g., Chebyshev’s inequality) or by addition of new constraints using statistical moments (e.g., skewness). Such modifications may result in the reduction of the optimal value of the system performance. In the present study, a methodology is developed to allow some violation in the newly added and modified constraints, and then minimizing the violation of those constraints with the objective of maximizing the minimum goal satisfaction level. Fuzzy goal programming is used to solve the multiobjective model. The proposed methodology is demonstrated with an application in the field of Waste Load Allocation (WLA) in a river system.