Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Journal of Geophysical Research"
DOI: 10.1002/2017ja024467
Abstract: For the first time, space flight technology exists to detect, in situ, violation of magnetic field line conservation. The violation of magnetic line conservation on scales smaller than the system size is a necessary and…
read more here.
Keywords:
line conservation;
field;
particle cell;
violation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Journal of High Energy Physics"
DOI: 10.1007/jhep01(2022)098
Abstract: We propose a simple model of spontaneous lepton number violation with potentially large flavor violating decays, including the possibility that majoron emitting decays, such as μ → eJ , saturate the experimental bounds. In this…
read more here.
Keywords:
violation;
lepton number;
flavor;
spontaneous lepton ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of High Energy Physics"
DOI: 10.1007/jhep06(2019)055
Abstract: A bstractWe perform a global analysis of neutrino data in the framework of three massive neutrinos with non-standard neutrino interactions which affect their evolution in the matter background. We focus on the effect of NSI…
read more here.
Keywords:
leptonic violation;
non standard;
violation;
mass ordering ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Journal of High Energy Physics"
DOI: 10.1007/jhep06(2020)128
Abstract: We consider the magneto-transports of quantum matters doped with magnetic impurities near the quantum critical points(QCP). For this, we first find new black hole solution with hyper-scaling violation which is dual to such system. By…
read more here.
Keywords:
critical points;
quantum critical;
black holes;
transports quantum ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Journal of High Energy Physics"
DOI: 10.1007/jhep07(2021)158
Abstract: Abstract We demonstrate a new type of cancellation of contributions to the electron and neutron electric dipole moments (EDMs) that occurs in three Higgs doublet models (3HDMs) when CP violation appears in the charged Higgs…
read more here.
Keywords:
higgs doublet;
charged higgs;
three higgs;
violation ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Journal of High Energy Physics"
DOI: 10.1007/jhep07(2021)205
Abstract: Abstract In perturbative amplitudes in quantum field theory and string field theory, Cutkosky rule expresses the anti-hermitian part of a Feynman diagram in terms of sum over all its cut diagrams, and this in turn…
read more here.
Keywords:
theory;
instanton amplitudes;
instanton;
violation ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Journal of High Energy Physics"
DOI: 10.1007/jhep09(2018)059
Abstract: A bstractWe study popular scalar extensions of the Standard Model, namely the singlet extension, the 2-Higgs doublet model (2HDM) and its extension by a singlet scalar. We focus on the contributions of the added scalars…
read more here.
Keywords:
moment;
standard model;
violation;
singlet scalar ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Journal of High Energy Physics"
DOI: 10.1007/jhep12(2021)084
Abstract: Abstract Coherence violation is an interesting and counter-intuitive phenomenon in QCD. We discuss the circumstances under which violation occurs in observables sensitive to soft radiation and arrive at the conclusion that almost all such observables…
read more here.
Keywords:
coherence violation;
violation;
gluons generally;
coherence ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Soft Computing"
DOI: 10.1007/s00500-020-04835-6
Abstract: Over recent decades, several efficient constraint-handling methods have been proposed in the area of evolutionary computation, and the $$\varepsilon $$ ε constraint method is considered as a state-of-the-art method for both single and multiobjective optimization.…
read more here.
Keywords:
constraint handling;
violation;
constraint;
combined fitness ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "Journal of Business Ethics"
DOI: 10.1007/s10551-015-2714-1
Abstract: Abstract Individuals’ implicit theories that people’s character is fixed (entity theorist) versus malleable (incremental theorist) are associated with their holding beliefs that morality is primarily determined by fulfilling prescribed duties (duty-based morality) versus upholding basic…
read more here.
Keywords:
moral awareness;
duty;
implicit theories;
violation ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Journal of Business Ethics"
DOI: 10.1007/s10551-017-3553-z
Abstract: Recent scholarship in business ethics has revealed the importance of privacy expectations as they relate to implicit privacy norms and the business practices that may violate these expectations. Yet, it is unclear how and when…
read more here.
Keywords:
perceived privacy;
privacy expectations;
violation;
consent ... See more keywords