2,136 research outputs found
Glass Ceiling or Sticky Floor? Examining the Gender Pay Gap across the Wage Distribution in Urban China, 1987-2004
Using 1987, 1996, and 2004 data, we show that the gender pay gap in the Chinese urban labor market has increased across the wage distribution, and the increase was greater at the lower quantiles. We interpret this as evidence of the “sticky floor” effect.We use the reweighting and recentered influence function projection method proposed by Firpo, Fortin, Lemieux (2005) to decompose gender pay differentials across the wage distribution. We find that the gender differences in the return to labor market characteristics, also known as the “discrimination effect” or “unexplained gender pay gap”, contribute most to the increase in the overall gender pay gap. The Firpo, Fortin, and Lemieux method allows us to further decompose the gender pay gap into the contribution of each individual variable. We find that the “sticky floor” effect may be associated with a particularly low paid group of female production workers with relatively less education working in non-state owned enterprises.glass ceiling; sticky floor; gender pay gap; wage distribution; Influence Function
Decomposition of Changes in Earnings Inequality in China: A Distributional Approach
Using the nationwide household data, this study examines the changes in the Chinese urban income distributions from 1987 to 1996 and from 1996 to 2004, and investigates the causes of these changes. The Oaxaca-Blinder decomposition method is applied to decomposing the mean earnings increases, and the Firpo-Fortin-Lemieux method based upon a recentered influence function is used to decompose the changes in the income distribution and the inequality measures such as the variance and the 10-90 ratio. The decomposition results show that the wage structure effects such as the widened gender pay gap, the increasing return to college education, and the widened gap in the return to different industries, ownership, and regions, have contributed to most of the overall increases in income inequality. During the different time periods, 1987-1996 and 1996-2004, the impacts of these factors vary at the different points (e.g. the lower half or upper half) of distribution.Earnings inequality; Unconditional Quantile Regressions; Earnings distribution; Decomposition
Optimal universal programmable detectors for unambiguous discrimination
We discuss the problem of designing unambiguous programmable discriminators
for any n unknown quantum states in an m-dimensional Hilbert space. The
discriminator is a fixed measurement that has two kinds of input registers: the
program registers and the data register. The quantum state in the data register
is what users want to identify, which is confirmed to be among the n states in
program registers. The task of the discriminator is to tell the users which
state stored in the program registers is equivalent to that in the data
register. First, we give a necessary and sufficient condition for judging an
unambiguous programmable discriminator. Then, if , we present an optimal
unambiguous programmable discriminator for them, in the sense of maximizing the
worst-case probability of success. Finally, we propose a universal unambiguous
programmable discriminator for arbitrary n quantum states.Comment: 7 page
Quark to -hyperon spin transfers in the current-fragmentation region
We perform a study on the struck quark to the -hyperon fragmentation
processes by taking into account the anti-quark fragmentations and intermediate
decays from other hyperons. We concentrate on how the longitudinally polarized
quark fragments to the longitudinally polarized , how unpolarized
quark and anti-quark fragment to the unpolarized , and how quark and
anti-quark fragment to the through the intermediate decay processes.
We calculate the effective fragmentation functions in the light-cone SU(6)
quark-spectator-diquark model via the Gribov-Lipatov relation, with the
Melosh-Wigner rotation effect also included. The calculated results are in
reasonable agreement with the HERMES semi-inclusive experimental data and
the OPAL and ALEPH annihilation experimental data.Comment: 14 latex pages, 8 figures. Final version for publication in PL
Recommended from our members
Measuring Electric Charge and Molecular Coverage on Electrode Surface from Transient Induced Molecular Electronic Signal (TIMES).
Charge density and molecular coverage on the surface of electrode play major roles in the science and technology of surface chemistry and biochemical sensing. However, there has been no easy and direct method to characterize these quantities. By extending the method of Transient Induced Molecular Electronic Signal (TIMES) which we have used to measure molecular interactions, we are able to quantify the amount of charge in the double layers at the solution/electrode interface for different buffer strengths, buffer types, and pH values. Most uniquely, such capabilities can be applied to study surface coverage of immobilized molecules. As an example, we have measured the surface coverage for thiol-modified single-strand deoxyribonucleic acid (ssDNA) as anchored probe and 6-Mercapto-1-hexanol (MCH) as blocking agent on the platinum surface. Through these experiments, we demonstrate that TIMES offers a simple and accurate method to quantify surface charge and coverage of molecules on a metal surface, as an enabling tool for studies of surface properties and surface functionalization for biochemical sensing and reactions
Security proof of differential phase shift quantum key distribution in the noiseless case
Differential phase shift quantum key distribution systems have a high
potential for achieving high speed key generation. However, its unconditional
security proof is still missing, even though it has been proposed for many
years. Here, we prove its security against collective attacks with a weak
coherent light source in the noiseless case (i.e. no bit error). The only
assumptions are that quantum theory is correct, the devices are perfect and
trusted and the key size is infinite. Our proof works on threshold detectors.
We compute the lower bound of the secret key generation rate using the
information-theoretical security proof method. Our final result shows that the
lower bound of the secret key generation rate per pulse is linearly
proportional to the channel transmission probability if Bob's detection counts
obey the binomial distribution.Comment: Published version, 13 pages, 4 figures, minor changes, references
added, acknowledgement adde
- …