760 resultados para VIOLATION


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ship-breaking started as an industry in Bangladesh in the early 1970s. This industry is not technically organized, and the management is also primitive and unsound. Although specific information is not available, it is estimated that about 700 workers have been killed and, at the same time, a total of 10,000 workers have been injured in explosions at the ship-breaking yards over the last three decades. This process continues unabated in the absence of specific legislation for regulating ship-breaking industries in Bangladesh. Against this backdrop, this paper identifies the major issues relating to enforcement of labour rights in the ship-breaking yards of Bangladesh.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article addresses the need of an implementation mechanism for the protection of refugees’ rights. However, it is contended that the principle forms part of Customary International Law, under which it is binding on all states irrespective of whether or not they are parties to the Convention Relating to the Status of Refugees 1951 or its Protocol 1967. Since last decade, U.S and its allies have been fighting to curve terrorism which has raised many issues such as human rights violation, deportation, expulsion, extradition, rendition and many more. Pakistan has played a very critical role in War against Terrorism, particularly in reference of war in Afghanistan. Particular concern of this article is the violation of refugees’ rights in Pakistan in 2008 and 2010. This article would highlight the legislation regarding non-expulsion of Afghan refugees from Pakistan to a territory where they have well founded fear of persecution. Article is divided into three parts, the first one deals with “Principle of Non-Refoulement”, the second one deals with “exceptions to the principle” whereas the last one discusses the violation of the very principle in Pakistan with reference to Afghan refugees.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Standard Model of particle physics consists of the quantum electrodynamics (QED) and the weak and strong nuclear interactions. The QED is the basis for molecular properties, and thus it defines much of the world we see. The weak nuclear interaction is responsible for decays of nuclei, among other things, and in principle, it should also effects at the molecular scale. The strong nuclear interaction is hidden in interactions inside nuclei. From the high-energy and atomic experiments it is known that the weak interaction does not conserve parity. Consequently, the weak interaction and specifically the exchange of the Z^0 boson between a nucleon and an electron induces small energy shifts of different sign for mirror image molecules. This in turn will make the other enantiomer of a molecule energetically favorable than the other and also shifts the spectral lines of the mirror image pair of molecules into different directions creating a split. Parity violation (PV) in molecules, however, has not been observed. The topic of this thesis is how the weak interaction affects certain molecular magnetic properties, namely certain parameters of nuclear magnetic resonance (NMR) and electron spin resonance (ESR) spectroscopies. The thesis consists of numerical estimates of NMR and ESR spectral parameters and investigations of the effects of different aspects of quantum chemical computations to them. PV contributions to the NMR shielding and spin-spin coupling constants are investigated from the computational point of view. All the aspects of quantum chemical electronic structure computations are found to be very important, which makes accurate computations challenging. Effects of molecular geometry are also investigated using a model system of polysilyene chains. PV contribution to the NMR shielding constant is found to saturate after the chain reaches a certain length, but the effects of local geometry can be large. Rigorous vibrational averaging is also performed for a relatively small and rigid molecule. Vibrational corrections to the PV contribution are found to be only a couple of per cents. PV contributions to the ESR g-tensor are also evaluated using a series of molecules. Unfortunately, all the estimates are below the experimental limits, but PV in some of the heavier molecules comes close to the present day experimental resolution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At an e gamma collider, a selectron (e) over tilde(L,R) may be produced in association with a (lightest) neutralino <(chi)over tilde>(0)(1). Decay of the selectron may be expected to yield a final state with an electron and another <(chi)over tilde>(0)(1). If R-parity is violated, these two neutralinos will decay, giving rise to distinctive signatures, which are identified and studied. (C) 1998 Published by Elsevier Science B.V.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fuzzy multiobjective programming for a deterministic case involves maximizing the minimum goal satisfaction level among conflicting goals of different stakeholders using Max-min approach. Uncertainty due to randomness in a fuzzy multiobjective programming may be addressed by modifying the constraints using probabilistic inequality (e.g., Chebyshev’s inequality) or by addition of new constraints using statistical moments (e.g., skewness). Such modifications may result in the reduction of the optimal value of the system performance. In the present study, a methodology is developed to allow some violation in the newly added and modified constraints, and then minimizing the violation of those constraints with the objective of maximizing the minimum goal satisfaction level. Fuzzy goal programming is used to solve the multiobjective model. The proposed methodology is demonstrated with an application in the field of Waste Load Allocation (WLA) in a river system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Lepton masses and mixing angles via localization of 5-dimensional fields in the bulk are revisited in the context of Randall-Sundrum models. The Higgs is assumed to be localized on the IR brane. Three cases for neutrino masses are considered: (a) The higher-dimensional neutrino mass operator (LH.LH), (b) Dirac masses, and (c) Type I seesaw with bulk Majorana mass terms. Neutrino masses and mixing as well as charged lepton masses are fit in the first two cases using chi(2) minimization for the bulk mass parameters, while varying the O(1) Yukawa couplings between 0.1 and 4. Lepton flavor violation is studied for all the three cases. It is shown that large negative bulk mass parameters are required for the right-handed fields to fit the data in the LH.LH case. This case is characterized by a very large Kaluza-Klein (KK) spectrum and relatively weak flavor-violating constraints at leading order. The zero modes for the charged singlets are composite in this case, and their corresponding effective 4-dimensional Yukawa couplings to the KK modes could be large. For the Dirac case, good fits can be obtained for the bulk mass parameters, c(i), lying between 0 and 1. However, most of the ``best-fit regions'' are ruled out from flavor-violating constraints. In the bulk Majorana terms case, we have solved the profile equations numerically. We give example points for inverted hierarchy and normal hierarchy of neutrino masses. Lepton flavor violating rates are large for these points. We then discuss various minimal flavor violation schemes for Dirac and bulk Majorana cases. In the Dirac case with minimal-flavor-violation hypothesis, it is possible to simultaneously fit leptonic masses and mixing angles and alleviate lepton flavor violating constraints for KK modes with masses of around 3 TeV. Similar examples are also provided in the Majorana case.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The program SuSeFLAV is introduced for computing supersymmetric mass spectra with flavour violation in various supersymmetric breaking scenarios with/without see-saw mechanism. A short user guide summarizing the compilation, executables and the input files is provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Lepton mass hierarchies and lepton flavour violation are revisited in the framework of Randall-Sundrum models. Models with Dirac-type as well as Majorana-type neutrinos are considered. The five-dimensional c-parameters are fit to the charged lepton and neutrino masses and mixings using chi(2) minimization. Leptonic flavour violation is shown to be large in these cases. Schemes of minimal flavour violation are considered for the cases of an effective LLHH operator and Dirac neutrinos and are shown to significantly reduce the limits from lepton flavour violation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report an experimental study of recently formulated entropic Leggett-Garg inequality (ELGI) by Usha Devi et al. Phys. Rev. A 87, 052103 (2013)]. This inequality places a bound on the statistical measurement outcomes of dynamical observables describing a macrorealistic system. Such a bound is not necessarily obeyed by quantum systems, and therefore provides an important way to distinguish quantumness from classical behavior. Here we study ELGI using a two-qubit nuclear magnetic resonance system. To perform the noninvasive measurements required for the ELGI study, we prepare the system qubit in a maximally mixed state as well as use the ``ideal negative result measurement'' procedure with the help of an ancilla qubit. The experimental results show a clear violation of ELGI by over four standard deviations. These results agree with the predictions of quantum theory. The violation of ELGI is attributed to the fact that certain joint probabilities are not legitimate in the quantum scenario, in the sense they do not reproduce all the marginal probabilities. Using a three-qubit system, we also demonstrate that three-time joint probabilities do not reproduce certain two-time marginal probabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In view of the recent measurement of the reactor mixing angle theta(13) and updated limit on BRd(mu -> e gamma) by the MEG experiment, we reexamine the charged lepton flavor violations in a framework of the supersymmetric type II seesaw mechanism. The supersymmetric type II seesaw predicts a strong correlation between BR(mu -> e gamma) and BR(tau -> mu gamma) mainly in terms of the neutrino mixing angles. We show that such a correlation can be determined accurately after the measurement of theta(13). We compute different factors that can affect this correlation and show that the minimal supergravity-like scenarios, in which slepton masses are taken to be universal at the high scale, predict 3.5 <= BR(tau -> mu gamma)/= BR(mu -> e gamma) <= 30 for normal hierarchical neutrino masses. Any experimental indication of deviation from this prediction would rule out the minimal models of the supersymmetric type II seesaw. We show that the current MEG limit puts severe constraints on the light sparticle spectrum in the minimal supergravity model if the seesaw scale lies within 10(13)-10(15) GeV. It is shown that these constraints can be relaxed and a relatively light sparticle spectrum can be obtained in a class of models in which the soft mass of a triplet scalar is taken to be nonuniversal at the high scale.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Frohlich, Morchio and Strocchi long ago proved that the Lorentz invariance is spontaneously broken in QED because of infrared effects. We develop a simple model where the consequences of this breakdown can be explicitly and easily calculated. For this purpose, the superselected U(1) charge group of QED is extended to a superselected ``Sky'' group containing direction-dependent gauge transformations at infinity. It is the analog of the Spi group of gravity. As Lorentz transformations do not commute with Sky, they are spontaneously broken. These Abelian considerations and model are extended to non-Abelian gauge symmetries. Basic issues regarding the observability of twisted non-Abelian gauge symmetries and of the asymptotic ADM symmetries of quantum gravity are raised.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We analyse the hVV (V = W, Z) vertex in a model independent way using Vh production. To that end, we consider possible corrections to the Standard Model Higgs Lagrangian, in the form of higher dimensional operators which parametrise the effects of new physics. In our analysis, we pay special attention to linear observables that can be used to probe CP violation in the same. By considering the associated production of a Higgs boson with a vector boson (W or Z), we use jet substructure methods to define angular observables which are sensitive to new physics effects, including an asymmetry which is linearly sensitive to the presence of CP odd effects. We demonstrate how to use these observables to place bounds on the presence of higher dimensional operators, and quantify these statements using a log likelihood analysis. Our approach allows one to probe separately the hZZ and hWW vertices, involving arbitrary combinations of BSM operators, at the Large Hadron Collider.