8,445 research outputs found

    Dole bludgers or economic victims? : an examination of factors associated with lay explanations for unemployment : a thesis presented in partial fulfilment of the requirements for the degree of Master of Arts in Psychology at Massey University

    Get PDF
    Societal reactions to unemployment are linked, in part, to how the cause of unemployment is perceived. This study investigated the underlying structure, and determinants of lay explanations for unemployment in four socio-economic groups; namely student, retired, employed, and unemployed groups. The study examined which types of explanations were rated most important, and the extent to which demographic and personality factors were associated with the types of explanations endorsed. Results showed that overall, societal factors were rated most important, followed by individualistic, then fatalistic factors. Significant effects were found for group membership where individualistic factors were rated less important by the unemployed, societal factors were rated less important by students and the retired, while fatalistic factors were rated less important by the employed. Significant effects were found for education, religious activity, vote, and length of unemployment. The Protestant work ethic, conservatism, and belief in a 'just world' were related to individualistic explanations for unemployment. Findings were discussed with reference to the increase in unemployment, the influence of the media, and to developing public policy, and programmes in relation to unemployment

    Byzantine Modification Detection in Multicast Networks With Random Network Coding

    Get PDF
    An information-theoretic approach for detecting Byzantine or adversarial modifications in networks employing random linear network coding is described. Each exogenous source packet is augmented with a flexible number of hash symbols that are obtained as a polynomial function of the data symbols. This approach depends only on the adversary not knowing the random coding coefficients of all other packets received by the sink nodes when designing its adversarial packets. We show how the detection probability varies with the overhead (ratio of hash to data symbols), coding field size, and the amount of information unknown to the adversary about the random code

    Byzantine modification detection in multicast networks using randomized network coding

    Get PDF
    Distributed randomized network coding, a robust approach to multicasting in distributed network settings, can be extended to provide Byzantine modification detection without the use of cryptographic functions is presented in this paper

    A cross-sectional study of predatory publishing emails received by career development grant awardees

    Get PDF
    OBJECTIVE: To investigate the scope of academic spam emails (ASEs) among career development grant awardees and the factors associated with the amount of time spent addressing them. DESIGN: A cross-sectional survey of career development grant investigators via an anonymous online survey was conducted. In addition to demographic and professional information, we asked investigators to report the number of ASEs received each day, how they determined whether these emails were spam and time they spent per day addressing them. We used bivariate analysis to assess factors associated with the amount of time spent on ASEs. SETTING: An online survey sent via email on three separate occasions between November and December 2016. PARTICIPANTS: All National Institutes of Health career development awardees funded in the 2015 fiscal year. MAIN OUTCOME MEASURES: Factors associated with the amount of time spent addressing ASEs. RESULTS: A total of 3492 surveys were emailed, of which 206 (5.9%) were returned as undeliverable and 96 (2.7%) reported an out-of-office message; our overall response rate was 22.3% (n=733). All respondents reported receiving ASEs, with the majority (54.4%) receiving between 1 and 10 per day and spending between 1 and 10 min each day evaluating them. The amount of time respondents reported spending on ASEs was associated with the number of peer-reviewed journal articles authored (p<0.001), a history of publishing in open access format (p<0.01), the total number of ASEs received (p<0.001) and a feeling of having missed opportunities due to ignoring these emails (p=0.04). CONCLUSIONS: ASEs are a common distraction for career development grantees that may impact faculty productivity. There is an urgent need to mitigate this growing problem

    The benefits of coding over routing in a randomized setting

    Get PDF
    A novel randomized network coding approach for robust, distributed transmission and compression of information in networks is presented, and its advantages over routing-based approaches is demonstrated

    Assessing the influence of the rhizosphere on soil hydraulic properties using X-ray Computed Tomography and numerical modelling

    No full text
    Understanding the dynamics of water distribution in soil is crucial for enhancing our knowledge of managing soil and water resources. The application of X-ray Computed Tomography (CT) to the plant and soil sciences is now well established. However, few studies have utilised the technique for visualising water in soil pore spaces. Here we utilise this method to visualise the water in soil in situ and in three-dimensions at successive reductive matric potentials in bulk and rhizosphere soil. The measurements are combined with numerical modelling to determine the unsaturated hydraulic conductivity, providing a complete picture of the hydraulic properties of the soil. The technique was performed on soil cores that were sampled adjacent to established roots (rhizosphere soil) and from soil that had not been influenced by roots (bulk soil). A water release curve was obtained for the different soil types using measurements of their pore geometries derived from CT imaging and verified using conventional methods e.g. pressure plates. The water, soil and air phases from the images were segmented and quantified using image analysis. The water release characteristics obtained for the contrasting soils showed clear differences in hydraulic properties between rhizosphere and bulk soil, especially in clay soil. The data suggests that soils influenced by roots (rhizosphere soil) are less porous due to increased aggregation when compared to bulk soil. The information and insights obtained on the hydraulic properties of rhizosphere and bulk soil will enhance our understanding of rhizosphere biophysics and improve current water uptake models

    Suspect screening of maternal serum to identify new environmental chemical biomonitoring targets using liquid chromatography-quadrupole time-of-flight mass spectrometry.

    Get PDF
    The use and advantages of high-resolution mass spectrometry (MS) as a discovery tool for environmental chemical monitoring has been demonstrated for environmental samples but not for biological samples. We developed a method using liquid chromatography-quadrupole time-of-flight MS (LC-QTOF/MS) for discovery of previously unmeasured environmental chemicals in human serum. Using non-targeted data acquisition (full scan MS analysis) we were able to screen for environmental organic acids (EOAs) in 20 serum samples from second trimester pregnant women. We define EOAs as environmental organic compounds with at least one dissociable proton which are utilized in commerce. EOAs include environmental phenols, phthalate metabolites, perfluorinated compounds, phenolic metabolites of polybrominated diphenyl ethers and polychlorinated biphenyls, and acidic pesticides and/or predicted acidic pesticide metabolites. Our validated method used solid phase extraction, reversed-phase chromatography in a C18 column with gradient elution, electrospray ionization in negative polarity and automated tandem MS (MS/MS) data acquisition to maximize true positive rates. We identified "suspect EOAs" using Agilent MassHunter Qualitative Analysis software, to match chemical formulas generated from each sample run with molecular formulas in our unique database of 693 EOAs assembled from multiple environmental literature sources. We found potential matches for 282 (41%) of the EOAs in our database. Sixty-five of these suspect EOAs were detected in at least 75% of the samples; only 19 of these compounds are currently biomonitored in National Health and Nutrition Examination Survey. We confirmed two of three suspect EOAs by LC-QTOF/MS using a targeted method developed through LC-MS/MS, reporting the first confirmation of benzophenone-1 and bisphenol S in pregnant women's sera. Our suspect screening workflow provides an approach to comprehensively scan environmental chemical exposures in humans. This can provide a better source of exposure information to help improve exposure and risk evaluation of industrial chemicals

    Minimum-cost multicast over coded packet networks

    Get PDF
    We consider the problem of establishing minimum-cost multicast connections over coded packet networks, i.e., packet networks where the contents of outgoing packets are arbitrary, causal functions of the contents of received packets. We consider both wireline and wireless packet networks as well as both static multicast (where membership of the multicast group remains constant for the duration of the connection) and dynamic multicast (where membership of the multicast group changes in time, with nodes joining and leaving the group). For static multicast, we reduce the problem to a polynomial-time solvable optimization problem, and we present decentralized algorithms for solving it. These algorithms, when coupled with existing decentralized schemes for constructing network codes, yield a fully decentralized approach for achieving minimum-cost multicast. By contrast, establishing minimum-cost static multicast connections over routed packet networks is a very difficult problem even using centralized computation, except in the special cases of unicast and broadcast connections. For dynamic multicast, we reduce the problem to a dynamic programming problem and apply the theory of dynamic programming to suggest how it may be solved
    corecore