130 research outputs found

    Counselor in Training Perceived Ability to Learn Curriculum Standards and the Moderating Effect of Mindset on Learning

    Get PDF
    Counselor educators strive to identify learner variables to improve counselor in training (CIT) learning during challenging tasks that align with the curriculum standards of the Council for the Accreditation of Counseling and Educational Related Programs (CACREP). Implicit mindset (IM), either incremental or entity, is robustly associated with enhanced learning outcomes over time for challenging tasks. The purpose of this research was to describe CIT perceived challenge in learning CACREP curriculum standards and to analyze the moderating effect of IM on CIT learning. This research (1) described CIT perceived ability to learn CACREP curriculum standards (PALCCS), (2) examined the moderating effect of IM on the relationship between CIT PALCCS and both CIT GPA and CIT Counselor Preparation Comprehensive Examination (CPCE) scores and (3) examined the moderating role of IM on the relationship between CIT completed credit hours and CIT PALCCS. In this convenience sample from an online CACREP-accredited master’s in counseling program, CITs agreed they could learn the CACREP curriculum standards. Contrary to hypotheses, CIT IM negatively correlated with graduate GPA, CPCE score, and CIT PALCCS. CIT completed credit hours negatively correlated with CIT PALCCS. CIT IM did not moderate the relationship between CIT PALCCS and CIT GPA. CIT IM did not moderate the relationship between CIT completed credit hours and CIT PALCCS. CIT IM moderated the relationship between CIT PALCCS and CIT CPCE scores. Specifically, CIT CPCE scores increased as CIT PALCCS increased at a lower ICM level; however, CPCE scores tended to decrease as CIT PALCCS increased at higher ICM levels. Implications for future research and counselor education pedagogy are discussed

    Practical quantum key distribution over a 48-km optical fiber network

    Full text link
    The secure distribution of the secret random bit sequences known as "key" material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg's uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. Here we report the most recent results of our optical fiber experiment in which we have performed quantum key distribution over a 48-km optical fiber network at Los Alamos using photon interference states with the B92 and BB84 quantum key distribution protocols.Comment: 13 pages, 7 figures, .pdf format submitted to Journal of Modern Optic

    Distribution and Movements of Moose (Alces alces) in Relation to the Trans-Alaska Oil Pipeline

    Get PDF
    During late winter 1982 and 1983, the distribution and movements of moose adjacent to the Trans-Alaska near Big Delta, Alaska, were examined. Within a 15 km wide corridor centered on the pipeline, moose distribution was independent of the distance from the pipeline. Of 175 moose trails examined, most (94%) crossed the pipeline successfully upon entering the right-of-way regardless of pipe mode or pipe height above ground. Pipe heights above 1.5 m were adequate for moose passage, but greater heights up to 2.7 m were preferred. Sections of pipe that were buried or that were specially elevated to facilitate moose passage did not receive preferential use. Moose moved in a meandering fashion whether they were crossing the pipeline or moving within habitats in distant areas. The results of this study supported the hypothesis that the distribution and local movements of moose were not significantly affected by the pipeline.Key words: moose (Alces alces), movements, pipeline, crossing success, habitat use, effects of developmentMots clés: orignal (Alces alces), déplacements, pipeline, succès de traverse, utilisation de l'habitat, effets du développemen

    Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack

    Get PDF
    Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can be implemented via polarization of the signals, or equivalent signals. It turns out that the most powerful tool at the disposition of an eavesdropper is the photon-number splitting attack. We show that this attack can be extended in the relevant parameter regime such as to preserve the Poissonian photon number distribution of the combination of the signal source and the lossy channel.Comment: 4 page

    Experimental demonstration of four-party quantum secret sharing

    Get PDF
    Secret sharing is a multiparty cryptographic task in which some secret information is splitted into several pieces which are distributed among the participants such that only an authorized set of participants can reconstruct the original secret. Similar to quantum key distribution, in quantum secret sharing, the secrecy of the shared information relies not on computational assumptions, but on laws of quantum physics. Here, we present an experimental demonstration of four-party quantum secret sharing via the resource of four-photon entanglement

    Determining Cross-Cultural Mentorship Readiness in Counselor Education and Supervision Programs

    Get PDF
    Abstract: Counselor Education and Supervision (CES) faculty are challenged to include cross-cultural mentorship within CES programs. Successfully implementing cross-cultural mentoring in CES programs requires assessing institutional and CES program readiness and identifying successful strategies. This article outlines a proposed framework to evaluate requisites for cross-cultural mentorship across levels of institutions of higher education and provides strategies to help CES faculty successfully engage and sustain cross-cultural mentorship. What is the public significance of this article? Society and educational programs continue to grow in cultural, racial, and ethnic diversity. As a result, counselor education programs and the systems within which they function will need to adapt to meet the needs of a diverse population of professional counselors, students, and counselor educators. This article enriches the ongoing dialogue on competent cross-cultural mentorship within counselor education programs across various system levels

    Decoherence-full subsystems and the cryptographic power of a private shared reference frame

    Get PDF
    We show that private shared reference frames can be used to perform private quantum and private classical communication over a public quantum channel. Such frames constitute a novel type of private shared correlation (distinct from private classical keys or shared entanglement) useful for cryptography. We present optimally efficient schemes for private quantum and classical communication given a finite number of qubits transmitted over an insecure channel and given a private shared Cartesian frame and/or a private shared reference ordering of the qubits. We show that in this context, it is useful to introduce the concept of a decoherence-full subsystem, wherein every state is mapped to the completely mixed state under the action of the decoherence.Comment: 13 pages, published versio

    Quantum authentication with unitary coding sets

    Get PDF
    A general class of authentication schemes for arbitrary quantum messages is proposed. The class is based on the use of sets of unitary quantum operations in both transmission and reception, and on appending a quantum tag to the quantum message used in transmission. The previous secret between partners required for any authentication is a classical key. We obtain the minimal requirements on the unitary operations that lead to a probability of failure of the scheme less than one. This failure may be caused by someone performing a unitary operation on the message in the channel between the communicating partners, or by a potential forger impersonating the transmitter.Comment: RevTeX4, 10 page

    Upper bound on the secret key rate distillable from effective quantum correlations with imperfect detectors

    Full text link
    We provide a simple method to obtain an upper bound on the secret key rate that is particularly suited to analyze practical realizations of quantum key distribution protocols with imperfect devices. We consider the so-called trusted device scenario where Eve cannot modify the actual detection devices employed by Alice and Bob. The upper bound obtained is based on the available measurements results, but it includes the effect of the noise and losses present in the detectors of the legitimate users.Comment: 9 pages, 1 figure; suppress sifting effect in the figure, final versio
    corecore