670 research outputs found

    The Impact of the 2009 Federal Tobacco Excise Tax Increase on Youth Tobacco Use

    Get PDF
    Based on surveys of eighth-, tenth-, and twelfth-grade students, examines how the tobacco tax increase affected their use of cigarettes and other tobacco products. Considers contributing factors, such as the size of the tax hike, and policy implications

    The earnings of American Jewish men: human capital, denomination and religiosity

    Full text link
    This paper analyzes the determinants of the earnings of American Jewish men using the 2000/01 National Jewish Population Survey. Non-response to the question on earnings is analyzed. Earnings are related to conventional human capital variables, as well as Jewish-specific variables. Except for the size of place and region variables, the standard human capital variables have similar effects for Jews and the general population. Jewish day schooling as a youth enhances earnings. Earnings vary by denomination, with Conservative Jews earning the most. The effect on earnings of religiosity (measured by synagogue attendance) is not monotonic. Earnings are highest for those who attend only once a wee

    Semi-supervised multiscale dual-encoding method for faulty traffic data detection

    Full text link
    Inspired by the recent success of deep learning in multiscale information encoding, we introduce a variational autoencoder (VAE) based semi-supervised method for detection of faulty traffic data, which is cast as a classification problem. Continuous wavelet transform (CWT) is applied to the time series of traffic volume data to obtain rich features embodied in time-frequency representation, followed by a twin of VAE models to separately encode normal data and faulty data. The resulting multiscale dual encodings are concatenated and fed to an attention-based classifier, consisting of a self-attention module and a multilayer perceptron. For comparison, the proposed architecture is evaluated against five different encoding schemes, including (1) VAE with only normal data encoding, (2) VAE with only faulty data encoding, (3) VAE with both normal and faulty data encodings, but without attention module in the classifier, (4) siamese encoding, and (5) cross-vision transformer (CViT) encoding. The first four encoding schemes adopted the same convolutional neural network (CNN) architecture while the fifth encoding scheme follows the transformer architecture of CViT. Our experiments show that the proposed architecture with the dual encoding scheme, coupled with attention module, outperforms other encoding schemes and results in classification accuracy of 96.4%, precision of 95.5%, and recall of 97.7%.Comment: 16 pages, 8 figure

    Open Banking: Credit Market Competition When Borrowers Own the Data

    Get PDF
    Open banking facilitates data sharing consented to by customers who generate the data, with the regulatory goal of promoting competition between traditional banks and challenger fintech entrants. We study lending market competition when sharing banks’ customer transaction data enables better borrower screening. Open banking can make the entire financial industry better off yet leave all borrowers worse off, even if borrowers have the control of whether to share their banking data. We highlight the importance of the equilibrium credit quality inference from borrowers’ endogenous sign-up decisions. We also study extensions with fintech affinities and data sharing on borrower preferences

    Open Banking: Credit Market Competition When Borrowers Own the Data

    Get PDF
    Open banking facilitates data sharing consented by customers who generate the data, with a regulatory goal of promoting competition between traditional banks and challenger fintech entrants. We study lending market competition when sharing banks’ customer data enables better borrower screening or targeting by fintech lenders. Open banking could make the entire financial industry better off yet leave all borrowers worse off, even if borrowers could choose whether to share their data. We highlight the importance of equilibrium credit quality inference from borrowers’ endogenous sign-up decisions. When data sharing triggers privacy concerns by facilitating exploitative targeted loans, the equilibrium sign-up population can grow with the degree of privacy concerns

    COMS: Customer Oriented Migration Service

    Get PDF
    Virtual machine live migration has been studied for more than a decade, and this technique has been implemented in various commercial hypervisors. However, currently in the cloud environment, virtual machine migration is initiated by system administrators. Cloud customers have no say on this: They can not initiate a migration, and they do not even know whether or not their virtual machines have been migrated. In this paper, we propose the COMS framework, which is short for Customer Oriented Migration Service . COMS gives more control to cloud customers so that migration becomes a service option and customers are more aware of the migration process. We have implemented a suite of modules in our COMS framework. Our evaluation results show that these modules could either bring performance benefit to cloud customers, or mitigate security threats in the cloud environment

    The impacts of product characteristics and regulatory environment on smokers preferences for tobacco and alcohol: Evidence from a volumetric choice experiment.

    Get PDF
    OBJECTIVE: Concurrent use of alcohol and cigarettes is well-documented in the literature. However, it is unclear how e-cigarette regulations in a growing number of localities impact the use of tobacco and alcohol in the US. This study aims to evaluate the impacts of excise taxes, tobacco use restrictions in restaurants/bars, and availability of alcohol flavor in e-cigarettes on tobacco consumption, and their cross impacts on alcohol consumption. METHOD: A total of 181 US adult smokers who were using e-cigarettes and consuming alcohol participated in online volumetric choice experiments and reported on the quantity they would purchase among cigarettes, closed-system e-cigarettes, beer, and one other alcohol product (wine/liquor) under varying policy scenarios. RESULTS: Estimated own-price elasticities of demand for beer, liquor/wine, and cigarettes were -0.10, -0.11, and -0.16, respectively (p <  0.001). Higher beer (cross-price elasticity =  0.13) and liquor/wine prices (cross-price elasticity =  0.05) increased e-cigarette consumption (p <  0.05). If e-cigarettes were allowed in bars/restaurants, their consumption increased by 2.4 units (p <  0.001), and if cigarettes were allowed in bars/restaurants, e-cigarette consumption increased by 1.9 units (p <  0.01), relative to the mean consumption level. Greater reported weekly spending on alcohol and/or tobacco was associated with higher consumption of all products (p <  0.001). CONCLUSIONS: Higher taxes or prices may reduce the consumption of beer, liquor/wine, and cigarettes. E-cigarettes are economic substitutes for alcohol among smokers who are currently drinking and using e-cigarettes. Regulating tobacco indoor use will have an impact on e-cigarette consumption

    Security and Energy-aware Collaborative Task Offloading in D2D communication

    Get PDF
    Device-to-device (D2D) communication technique is used to establish direct links among mobile devices (MDs) to reduce communication delay and increase network capacity over the underlying wireless networks. Existing D2D schemes for task offloading focus on system throughput, energy consumption, and delay without considering data security. This paper proposes a Security and Energy-aware Collaborative Task Offloading for D2D communication (Sec2D). Specifically, we first build a novel security model, in terms of the number of CPU cores, CPU frequency, and data size, for measuring the security workload on heterogeneous MDs. Then, we formulate the collaborative task offloading problem that minimizes the time-average delay and energy consumption of MDs while ensuring data security. In order to meet this goal, the Lyapunov optimization framework is applied to implement online decision-making. Two solutions, greedy approach and optimal approach, with different time complexities, are proposed to deal with the generated mixed-integer linear programming (MILP) problem. The theoretical proofs demonstrate that Sec2D follows a [O(1∕V),O(V)] energy-delay tradeoff. Simulation results show that Sec2D can guarantee both data security and system stability in the collaborative D2D communication environment
    • …
    corecore