5,650 research outputs found

    Super Quantum Discord with Weak Measurements

    Full text link
    Weak measurements cause small change to quantum states, thereby opening up the possibility of new ways of manipulating and controlling quantum systems. We ask, can weak measurements reveal more quantum correlation in a composite quantum state? We prove that the weak measurement induced quantum discord, called as the "super quantum discord", is always larger than the quantum discord captured by the strong measurement. Moreover, we prove the monotonicity of the super quantum discord as a function of the measurement strength. We find that unlike the normal quantum discord, for pure entangled states, the super quantum discord can exceed the quantum entanglement. Our result shows that the notion of quantum correlation is not only observer dependent but also depends on how weakly one perturbs the composite system.Comment: Latex, 5 pages, 2 Figs, Monotonicity of the super discord with the measurement strength is included. Application to the entropic uncertainty relation will be reported separatel

    An Overview of Image Steganography: Survey and Analysis

    Get PDF
    Steganography is the specialty of concealing information in cover medium and the cover medium could be pictures, sound or video record. Any critical information could be covered up inside a computerized transporter picture. Steganography gives preferred administrations over cryptography. Reason is that cryptography conceals the substance of the message yet not the presence of the message. So nobody separated from the approved sender and beneficiary will know about the presence of the mystery information. Steganographic messages are frequently first encoded by some conventional means and afterward a cover picture is adjusted somehow to contain the scrambled message. The recognition of steganographically encoded bundles is called steganalysis

    LEGAL PROTECTION OF ENDANGERED LANGUAGES IN INDIA WITH REFERENCE TO MEGHALAYA

    Get PDF
    As for as India is concerned many Indian languages have become threatened and even endangered because of globalization. In India, English is thriving and is used widely by the young generation, and this is one of the reasons leading to the extinction of native or regional languages. Today Hindi is also expanding and because of this many regional languages will become extinct. In the State of Meghalaya there are three basic tribes known as Khasi, Garo and Jayantia. They speak either Khasi, or Garo, but their dialects differ. Even the Khasis who are living in East Khasi Hills, especially in Shillong have different dialects as compared to the other Khasis. These languages are used by many but they do not have their own scripts. That is why these languages were not placed in the Eighth Schedule of the Constitution of India. A speaker of any language which is not in the Eighth Schedule, cannot be awarded the Jnanpith Award and furthermore their languages cannot be the medium of the UPSC. Article 29 of the Constitution of India mandates that no discrimination would be done on the ground of religion, race,, caste or language and Article 30 mandates that all minorities, whether based on religion or language, shall have the right to establish and administer educational institutions of their choice. In addition, the Legislature of a State may by law adopt any of the languages to use in the state. Article 350 B of the Constitution says that there shall be a Special Officer for linguistic minorities and he/she has to be appointed by the President. It shall be the duty of this Officer to investigate all matters relating to the safeguards provided for linguistic minorities under the Constitution and report to the President upon those matters. Protection of the regional languages has been provided in the Constitution and it is the duty of the educational institutions to provide basic education to the children in their own vernacular languages should they want to be educated in their vernacular language

    Digital Image Steganography: Study of Current Methods

    Get PDF
    Steganography plans to shroud data in such a path in this way, to the point that data may just achieve its proposed goal. It can be performed utilizing any sort of transporter media, for example, picture, ontent, sound, video etc.The strategies like cryptography and watermarking are drilled since times alongwith steganography for security purposes. Pictures are generally broadly utilized for steganographic reason as it comprises of something beyond excess data and can be effortlessly sent through the correspondence channel when contrasted with other media and the variety in luminance of hued vectors at higher recurrence closures of the visual range can't be identified by the human visual system. The individual who is straightforwardly not included with the mystery material will more often than not discover it as normal picture, letter or information. Steganography is not new. For instance it has been by and by since 500~400BC and it is realized that messages that were specifically cut on tablets were covered with wax, later bringing about the message to be imperceptible underneath the wax surface. Messages were painted on shaved head of slaves and when hair was completely developed, slaves were sent away to convey the message. Along with conventional media steganography is extremely famous in computerized media. Because of the properties like huge limit, imperceptibility and power it contrasts from cryptography and watermarking. A steganographic framework for the most part comprises of cover medium, mystery message, calculation for covering up and a correspondence channel
    • …
    corecore