766 research outputs found
Random qubit-states and how best to measure them
We consider the problem of measuring a single qubit, known to have been prepared in either a randomly selected pure state or a randomly selected real pure state. We seek the measurements that provide either the best estimate of the state prepared or maximise the accessible information. Surprisingly, any sensible measurement turns out to be optimal. We discuss the application of these ideas to multiple qubits and higher-dimensional systems
Security of coherent state quantum cryptography in the presence of Gaussian noise
We investigate the security against collective attacks of a continuous
variable quantum key distribution scheme in the asymptotic key limit for a
realistic setting. The quantum channel connecting the two honest parties is
assumed to be lossy and imposes Gaussian noise on the observed quadrature
distributions. Secret key rates are given for direct and reverse reconciliation
schemes including postselection in the collective attack scenario. The effect
of a non-ideal error correction and two-way communication in the classical
post-processing step is also taken into account.Comment: 12 pages, 5 figures updated version including two-way communication;
changed the definition of the excess noise to match the definition given
earlier (Phys. Rev. Lett. 92, 117901); submitted to PRA; presented at the 8th
International Conference on Quantum Communication, Measurement and Computing,
Tsukub
OBLIGATIONS OF CHILD WELFARE WORKERS TOWARDS FOSTER CARE YOUTH INVOLVED IN DOMESTIC MINOR SEX TRAFFICKING: EXPANDING BEYOND IMMEDIATE SAFETY TO INCLUDE OVERALL WELL-BEING
The task of protecting foster care youth involved in domestic minor sex trafficking (DMST) falls on Child welfare workers (CWWs). CWWs are accountable for shielding youth from the dangers associated with continued involvement in DMST. This is an extremely challenging task because these youth regularly refuse to participate in mental health and substance abuse treatment and often run away from safe placements, thwarting the CWWs’ attempts at rescue. When youth act in this self-defeating manner CWWs commonlly feel a strong responsibility to rescue the youth. After youths resist multiple attempts to extract them from DMST, CWWs are prone to conclude that they have only one option: to place these adolescent victims in locked residential treatment centers (RTCs) against their will. CWWs feel justified in this paternalistic approach because adolescents do not yet have full autonomy. Placing youth in locked RTCs meets the CWW’s obligation to protect youth from the immediate dangers of DMST. Subsequently, CWWs relax, assuming that the RTC will provide for the youth’s well-being.
Unfortunately, evidence suggests that youth remain at risk for sexual and physical violence even within the walls of RTCs. Moreover, providing personal security is not sufficient for the youth to achieve a state of well-being. RTC placement hinders the development of strong attachments with family, creates an environment where youth often feel disrespected, and fails to foster the development of autonomy. Autonomy development is of particular importance as one of the key psychological tasks of adolescence and a predictor of future well-being. I argue that before placing a youth in an RTC, CWWs should balance the youth’s need for short-term safety with other needs including attachment, respect, and the development of autonomy. Taking into consideration all of these aspects of well-being, CWWs will discover that there are times when it is ethically permissible to allow youth to stay in the community. And when youth are placed in locked RTCs, CWWs must advocate for everything that is owed to the youth to optimize well-being
Alcohol Perceptions and Behavior in a Residential Peer Social Network
Personalized normative feedback is a recommended component of alcohol interventions targeting college students. However, normative data are commonly collected through campus-based surveys, not through actual participant-referent relationships. In the present investigation, we examined how misperceptions of residence hall peers, both overall using a global question and those designated as important peers using person-specific questions, were related to students’ personal drinking behaviors. Participants were 108 students (88% freshman, 54% White, 51% female) residing in a single campus residence hall. Participants completed an online baseline survey in which they reported their own alcohol use and perceptions of peer alcohol use using both an individual peer network measure and a global peer perception measure of their residential peers. We employed network autocorrelation models, which account for the inherent correlation between observations, to test hypotheses. Overall, participants accurately perceived the drinking of nominated friends but overestimated the drinking of residential peers. Consistent with hypotheses, overestimating nominated friend and global residential peer drinking predicted higher personal drinking, although perception of nominated peers was a stronger predictor. Interaction analyses showed that the relationship between global misperception and participant self-reported drinking was significant for heavy drinkers, but not non-heavy drinkers. The current findings explicate how student perceptions of peer drinking within an established social network influence drinking behaviors, which may be used to enhance the effectiveness of normative feedback interventions
Number-phase entropic uncertainty relations and Wigner functions for solvable quantum systems with discrete spectra
In this letter, the number-phase entropic uncertainty relation and the
number-phase Wigner function of generalized coherent states associated to a few
solvable quantum systems with nondegenerate spectra are studied. We also
investigate time evolution of number-phase entropic uncertainty and Wigner
function of the considered physical systems with the help of temporally stable
Gazeau-Klauder coherent states.Comment: 10 pages, 9 figures; To appear in Phys Lett A 200
Experimental demonstration of quantum source coding
We report an experimental demonstration of Schumacher's quantum noiseless
coding theorem. Our experiment employs a sequence of single photons each of
which represents three qubits. We initially prepare each photon in one of a set
of 8 non-orthogonal codeword states corresponding to the value of a block of
three binary letters. We use quantum coding to compress this quantum data into
a two-qubit quantum channel and then uncompress the two-qubit channel to
restore the original data with a fidelity approaching the theoretical limit.Comment: 5 pages, 4 figure
Information literacy curriculum mapping in the health sciences
Instructional medical librarians are uniquely positioned in a context governed by multiple instructional frameworks emerging from librarianship and the professions with which they liaise. Yet very little literature exists on medical librarians’ use of curriculum mapping to align their instruction with these frameworks. This review illuminates the current state of curriculum mapping in medical librarianship.We searched five bibliographic databases for articles published between 2010 and August 2021 and centred on information literacy(IL)curriculum mapping within a health sciences university context. Studies were included based upon pre-determined inclusion and exclusion criteria. Data were extracted using an instrument developed primarily a priori, with some codes developed emergently in response to preliminary review of the data.We included 127 studies focused on curriculum mapping, of which only 24 included structures which might be considered “curriculum maps”. Across all 127 studies included, The Association of College & Research Libraries’ Information Literacy Competency Standards for Libraries for Higher Education was the most-used ILframework, though versions of evidence-based practice were used more often, with a great deal of diversity and incomplete reporting on how these frames informed instruction of discrete concepts and skills. Within the 24 articles containing figurative curriculum maps, the same diversity of concepts and incomplete reporting was present, with librarians mapping IL frameworks to classroom activities more often than learning outcomes or competencies.Development of curricular maps aligning discrete IL concepts and skills with different disciplinary contexts is needed to provide instructors with a modular structure they might implement in their own contexts. To further the identification of best practices, future research should examine existing curricular maps made by librarian
A Recipe for Success: localism and bounded rationality in lobbying for radiation therapy services in North West Tasmania
Objective: Describes where bounded rationality and localism are evident in the debate over the introduction of radiation therapy services in North West Tasmania and how this affected the delivery of the message fromeach side.
Design: Semi-structured interviews with stakeholders and patients/family over an eight month period in 2016 are contrasted with viewpoints identified via document analysis.Setting: North West Tasmania.
Main Outcome Measures: The mechanisms for policy change and the policy beliefs of each side are examined with the intention of understanding how bounded rationality and a sense of localism can combine to effectpolicy change.
Results: In the instance of radiation therapy services in North West Tasmania, a policy debate was originally waged between medical professionals and policy makers opposed to a local service on one side and a handful of policy actors advocating for a local service on the other. Those in favour of a local radiation therapy service harnessed a sense of localism to project the perception of widespread community support for the proposal and secured funding commitments during the 2010 Federal Election campaign.
Conclusions: There is evidence of bounded rationality from both the stakeholder and patient groups, as well as a strong sentiment of localism expressed by patients and community advocates. Through understanding this particular case, health service managers can determine how to better time and target messages to the general public and to policy makers during periods of proposed changes to health services
Optimum detection for extracting maximum information from symmetric qubit sets
We demonstrate a class of optimum detection strategies for extracting the
maximum information from sets of equiprobable real symmetric qubit states of a
single photon. These optimum strategies have been predicted by Sasaki et al.
[Phys. Rev. A{\bf 59}, 3325 (1999)]. The peculiar aspect is that the detections
with at least three outputs suffice for optimum extraction of information
regardless of the number of signal elements. The cases of ternary (or trine),
quinary, and septenary polarization signals are studied where a standard von
Neumann detection (a projection onto a binary orthogonal basis) fails to access
the maximum information. Our experiments demonstrate that it is possible with
present technologies to attain about 96% of the theoretical limit.Comment: 10 pages, 11 figures, to be submitted to Phys. Rev. A Converted to
REVTeX4 format, and a few other minor modifications according to the comments
from PRA referre
Continuous variable quantum cryptography
We propose a quantum cryptographic scheme in which small phase and amplitude
modulations of CW light beams carry the key information. The presence of EPR
type correlations provides the quantum protection.Comment: 8 pages, 3 figure
- …