578 research outputs found

    CONSEQUENCES OF NEPALESE YOUTH MIGRATION TO OVERSEAS FOR FOREIGN EMPLOYMENT

    Get PDF
    Nepal is an agricultural country, where migration is increasing for foreign employment. Majority of workers from Asia mostly from Nepal migrate to Middle East countries. Migrant workers working in these countries suffer from work related risk like accidents at workplace and mental sickness. Foreign migration has shifted the agricultural economy towards remittance economy. Lack of education and limited employment opportunities are the main reasons behind international labor migration. The issue of such migration needs to be addressed at the government level, to assist in managing and promoting safe migration in an effective way.Keywords: Foreign Employment, Health risks. Migratio

    Multilepton Signatures of the Higgs Boson through its Production in Association with a Top-quark Pair

    Full text link
    We consider the possible production of the Higgs Boson in association with a top-quark pair and its subsequent decay into a tau-lepton pair or a W-boson pair. This process can give rise to many signatures of the Higgs boson. These signatures can have electrons, muons, tau jets, bottom jets and/or light flavour jets. We analyze the viability of some of these signatures. We will look at those signatures where the background is minimal. In particular, we explore the viability of the signatures "isolated 4 electron/muon" and "isolated 3 electron/muon + a jet" The jet can be due to a light flavour quark/gluon, a bottom quark, or a tau lepton. Of all these signatures, we find that "isolated 3 electron/muon + a tau jet", with an extra bottom jet, can be an excellent signature of this mode of the Higgs boson production. We show that this signature may be visible within a year, once the Large Hadron Collider (LHC) restarts. Some of the other signatures would also be observable after the LHC accumulates sufficient luminosity.Comment: 11 pages, 1 Figur

    Distinguishing different classes of entanglement of three-qubit pure states

    Full text link
    Employing the Pauli matrices, we have constructed a set of operators, which can be used to distinguish six inequivalent classes of entanglement under SLOCC (stochastic local operation and classical communication) for three-qubit pure states. These operators have very simple structure and can be obtained from the Mermin's operator with suitable choice of directions. Moreover these operators may be implemented in an experiment to distinguish the types of entanglement present in a state. We show that the measurement of only one operator is sufficient to distinguish GHZ class from rest of the classes. It is also shown that it is possible to detect and classify other classes by performing a small number of measurements. We also show how to construct such observables in any basis. We also consider a few mixed states to investigate the usefulness of our operators. Furthermore, we consider the teleportation scheme of Lee et al. (Phys. Rev. A 72, 024302 (2005)) and show that the partial tangles and hence teleportation fidelity can be measured. We have also shown that these partial tangles can also be used to classify genuinely entangled state, biseparable state and separable state.Comment: 7 pages, 2 figures, comments welcom

    Two-qubit mixed states and teleportation fidelity: Purity, concurrence, and beyond

    Full text link
    To explore the properties of a two-qubit mixed state, we consider quantum teleportation. The fidelity of a teleported state depends on the resource state purity and entanglement, as characterized by concurrence. Concurrence and purity are functions of state parameters. However, it turns out that a state with larger purity and concurrence, may have comparatively smaller fidelity. By computing teleportation fidelity, concurrence and purity for two-qubit X-states, we show it explicitly. We further show that fidelity changes monotonically with respect to functions of parameters - other than concurrence and purity. A state with smaller concurrence and purity, but larger value of one of these functions has larger fidelity. These functions, thus characterize nonlocal classical and/or quantum properties of the state that are not captured by purity and concurrence alone. In particular, concurrence is not enough to characterize the entanglement properties of a two-qubit mixed state

    Resource state structure for controlled quantum key distribution

    Full text link
    Quantum entanglement plays a pivotal role in many communication protocols, like secret sharing and quantum cryptography. We consider a scenario where more than two parties are involved in a protocol and share a multipartite entangled state. In particular, we considered the protocol of Controlled Quantum Key Distribution (CoQKD), introduced in the Ref. Chin. Phys. Lett. 20, 183-185 (2003), where, two parties, Alice and Bob establish a key with the cooperation of other parties. Other parties control/supervise whether Alice and Bob can establish the key, its security and key rate. We discuss the case of three parties in detail and find suitable resource states. We discuss the controlling power of the third party, Charlie. We also examine the usefulness of the new resource states for generating conference key and for cooperative teleportation. We find that recently introduced Bell inequalities can be useful to establish the security of the conference key. We also generalize the scenario to more than three parties.Comment: 11 pages, 7 figures. Close to published versio

    Codes on m-repeated solid burst errors

    Get PDF
    In coding theory, several kinds of errors due to the different behaviours of communication channels have been considered and accordingly error detecting and error correcting codes have been constructed. In general communication due to the long messages, the strings of same type of error may repeat in a vector itself. The concept of repeated bursts is introduced by Beraradi, Dass and Verma [4] which has opened a new area of study. They defined 2-repeated bursts and obtained results for detection and correction of such type of errors. The study was further extended to m-repeated bursts [3]. Solid burst errors are common in many communications. This paper considers a new similar kind of error which will be termed as ‘m-repeated solid burst error of length b’. A lower bound on the number of parity checks required for the existence of codes that detect such errors is obtained. Further, codes capable of detecting and simultaneously correcting such errors have also been dealt with.Publisher's Versio

    Child Marriage: Its Causes and Worse Impacts in Indian society.

    Get PDF
    Child Marriage is a human rights violation. Now child marriage is a curse in the global society. Child marriage is a burning problem around the world including India. It is especially prevalent in India, where more than one third of child brides live. According to UNICEF, 47% of girls are married by 18 years of age & 18% are married by 15 years of age. Majority of girls who were married below 18 years are from poor & below poverty line families. These marriages are often performed without the consent of the girls involved in the marriage. Indian law has made child marriage illegal, but it is still widely practiced across the nation. The highest rates are seen particularly in the rural states in India. In most cases young girls get married off to older men, when they are still children. Child marriages must be viewed within a context of force & coercion, involving pressure & children’s lack of choice or capacity to give their full consent. Child marriage is common practice in India, Niger, Chad, Bangladesh, Pakistan, Guinea, Mali, Burkina Faso, Africa & Nepal, Where mostly girls are married below the age of 18. Child marriage is rooted in gender inequality, culture & tradition, poverty & insecurity. Child marriage has worse effect on the young girls, society and her children’s health. It has severe negative health consequences of girls are often not psychologically, physically & sexually mature. It is resulting in death, health problems, poverty, violence & lack of education

    Codes correcting key errors

    Get PDF
    The objective of coding theory is to protect a message going through a noisy channel. The nature of errors that cause noisy channel depends on different factors. Accordingly codes are needed to develop to deal with different types of errors. Sharma and Gaur [6] introduced a new kind of error which is termed as ‘key error’. This paper presents lower and upper bounds on the number of parity-check digits required for linear codes capable of correcting such errors. An example of such a code is also provided.Publisher's Versio
    • …
    corecore