601 research outputs found
CONSEQUENCES OF NEPALESE YOUTH MIGRATION TO OVERSEAS FOR FOREIGN EMPLOYMENT
Nepal is an agricultural country, where migration is increasing for foreign employment. Majority of workers from Asia mostly from Nepal migrate to Middle East countries. Migrant workers working in these countries suffer from work related risk like accidents at workplace and mental sickness. Foreign migration has shifted the agricultural economy towards remittance economy. Lack of education and limited employment opportunities are the main reasons behind international labor migration. The issue of such migration needs to be addressed at the government level, to assist in managing and promoting safe migration in an effective way.Keywords: Foreign Employment, Health risks. Migratio
Multilepton Signatures of the Higgs Boson through its Production in Association with a Top-quark Pair
We consider the possible production of the Higgs Boson in association with a
top-quark pair and its subsequent decay into a tau-lepton pair or a W-boson
pair. This process can give rise to many signatures of the Higgs boson. These
signatures can have electrons, muons, tau jets, bottom jets and/or light
flavour jets. We analyze the viability of some of these signatures. We will
look at those signatures where the background is minimal. In particular, we
explore the viability of the signatures "isolated 4 electron/muon" and
"isolated 3 electron/muon + a jet" The jet can be due to a light flavour
quark/gluon, a bottom quark, or a tau lepton. Of all these signatures, we find
that "isolated 3 electron/muon + a tau jet", with an extra bottom jet, can be
an excellent signature of this mode of the Higgs boson production. We show that
this signature may be visible within a year, once the Large Hadron Collider
(LHC) restarts. Some of the other signatures would also be observable after the
LHC accumulates sufficient luminosity.Comment: 11 pages, 1 Figur
Distinguishing different classes of entanglement of three-qubit pure states
Employing the Pauli matrices, we have constructed a set of operators, which
can be used to distinguish six inequivalent classes of entanglement under SLOCC
(stochastic local operation and classical communication) for three-qubit pure
states. These operators have very simple structure and can be obtained from the
Mermin's operator with suitable choice of directions. Moreover these operators
may be implemented in an experiment to distinguish the types of entanglement
present in a state. We show that the measurement of only one operator is
sufficient to distinguish GHZ class from rest of the classes. It is also shown
that it is possible to detect and classify other classes by performing a small
number of measurements. We also show how to construct such observables in any
basis. We also consider a few mixed states to investigate the usefulness of our
operators. Furthermore, we consider the teleportation scheme of Lee et al.
(Phys. Rev. A 72, 024302 (2005)) and show that the partial tangles and hence
teleportation fidelity can be measured. We have also shown that these partial
tangles can also be used to classify genuinely entangled state, biseparable
state and separable state.Comment: 7 pages, 2 figures, comments welcom
Two-qubit mixed states and teleportation fidelity: Purity, concurrence, and beyond
To explore the properties of a two-qubit mixed state, we consider quantum
teleportation. The fidelity of a teleported state depends on the resource state
purity and entanglement, as characterized by concurrence. Concurrence and
purity are functions of state parameters. However, it turns out that a state
with larger purity and concurrence, may have comparatively smaller fidelity. By
computing teleportation fidelity, concurrence and purity for two-qubit
X-states, we show it explicitly. We further show that fidelity changes
monotonically with respect to functions of parameters - other than concurrence
and purity. A state with smaller concurrence and purity, but larger value of
one of these functions has larger fidelity. These functions, thus characterize
nonlocal classical and/or quantum properties of the state that are not captured
by purity and concurrence alone. In particular, concurrence is not enough to
characterize the entanglement properties of a two-qubit mixed state
Resource state structure for controlled quantum key distribution
Quantum entanglement plays a pivotal role in many communication protocols,
like secret sharing and quantum cryptography. We consider a scenario where more
than two parties are involved in a protocol and share a multipartite entangled
state. In particular, we considered the protocol of Controlled Quantum Key
Distribution (CoQKD), introduced in the Ref. Chin. Phys. Lett. 20, 183-185
(2003), where, two parties, Alice and Bob establish a key with the cooperation
of other parties. Other parties control/supervise whether Alice and Bob can
establish the key, its security and key rate. We discuss the case of three
parties in detail and find suitable resource states. We discuss the controlling
power of the third party, Charlie. We also examine the usefulness of the new
resource states for generating conference key and for cooperative
teleportation. We find that recently introduced Bell inequalities can be useful
to establish the security of the conference key. We also generalize the
scenario to more than three parties.Comment: 11 pages, 7 figures. Close to published versio
Codes on m-repeated solid burst errors
In coding theory, several kinds of errors due to the different behaviours of communication channels have been considered and accordingly error detecting and error correcting codes have been constructed. In general communication due to the long messages, the strings of same type of error may repeat in a vector itself. The concept of repeated bursts is introduced by Beraradi, Dass and Verma [4] which has opened a new area of study. They defined 2-repeated bursts and obtained results for detection and correction of such type of errors. The study was further extended to m-repeated bursts [3]. Solid burst errors are common in many communications. This paper considers a new similar kind of error which will be termed as ‘m-repeated solid burst error of length b’. A lower bound on the number of parity checks required for the existence of codes that detect such errors is obtained. Further, codes capable of detecting and simultaneously correcting such errors have also been dealt with.Publisher's Versio
Child Marriage: Its Causes and Worse Impacts in Indian society.
Child Marriage is a human rights violation. Now child marriage is a curse in the global society. Child marriage is a burning problem around the world including India. It is especially prevalent in India, where more than one third of child brides live. According to UNICEF, 47% of girls are married by 18 years of age & 18% are married by 15 years of age. Majority of girls who were married below 18 years are from poor & below poverty line families. These marriages are often performed without the consent of the girls involved in the marriage. Indian law has made child marriage illegal, but it is still widely practiced across the nation. The highest rates are seen particularly in the rural states in India. In most cases young girls get married off to older men, when they are still children. Child marriages must be viewed within a context of force & coercion, involving pressure & children’s lack of choice or capacity to give their full consent. Child marriage is common practice in India, Niger, Chad, Bangladesh, Pakistan, Guinea, Mali, Burkina Faso, Africa & Nepal, Where mostly girls are married below the age of 18. Child marriage is rooted in gender inequality, culture & tradition, poverty & insecurity. Child marriage has worse effect on the young girls, society and her children’s health. It has severe negative health consequences of girls are often not psychologically, physically & sexually mature. It is resulting in death, health problems, poverty, violence & lack of education
Codes correcting key errors
The objective of coding theory is to protect a message going through a noisy channel. The nature of errors that cause noisy channel depends on different factors. Accordingly codes are needed to develop to deal with different types of errors. Sharma and Gaur [6] introduced a new kind of error which is termed as ‘key error’. This paper presents lower and upper bounds on the number of parity-check digits required for linear codes capable of correcting such errors. An example of such a code is also provided.Publisher's Versio
- …