1,209 research outputs found

    Measurement Errors in Recall Food Expenditure Data

    Get PDF
    Household expenditure data is an important input into the study of consumption and savings behaviour and of living standards and inequality. Because it is collected in many surveys, food expenditure data has formed the basis of much work in these areas. Recently, there has been considerable interest in properties of different ways of collecting expenditure information. It has also been suggested that measurement error in expenditure data seriously affects empirical work based on such data. The Canadian Food Expenditure Survey asks respondents to first estimate their household's food expenditures and then record food expenditures in a diary for two weeks. This unique experiment allows us to compare recall and diary based expenditure data collected from the same individuals. Under the assumption that the diary measures are "true" food consumption, this allows us to observe errors in measures of recall food consumption directly, and to study the properties of those errors. Under this assumption, measurement errors in recall food consumption data appear to be substantial, and they do not have many of the properties of classical measurement error. In particular, they are neither uncorrelated with true consumption nor conditionally homoscedastic. In addition, they are not well approximated by either a normal or log normal distribution. We also show evidence that diary measures are themselves imperfect, suffering for example, from "diary exhaustion". This suggests alternative interpretations for the differences between recall and diary consumption measures. Finally, we compare estimates of income and household size elasticities of per capita food consumption based on the two kinds of expenditure data and, in contrast to some previous work, find little difference between the two.expenditure, consumption, surveys

    Measurement Errors in Recall Food Expenditure Data

    Get PDF
    Household expenditure data is an important input into the study of consumption and savings behaviour and of living standards and inequality. Because it is collected in many surveys, food expenditure data has formed the basis of much work in these areas. Recently, there has been considerable interest in properties of different ways of collecting expenditure information. It has also been suggested that measurement error in expenditure data seriously affects empirical work based on such data. The Canadian Food Expenditure Survey asks respondents to first estimate their household's food expenditures and then record food expenditures in a diary for two weeks. This unique experiment allows us to compare recall and diary based expenditure data collected from the same individuals. Under the assumption that the diary measures are "true" food consumption, this allows us to observe errors in measures of recall food consumption directly, and to study the properties of those errors. Under this assumption, measurement errors in recall food consumption data appear to be substantial, and they do not have many of the properties of classical measurement error. In particular, they are neither uncorrelated with true consumption nor conditionally homoscedastic. In addition, they are not well approximated by either a normal or log normal distribution. We also show evidence that diary measures are themselves imperfect, suffering for example, from "diary exhaustion". This suggests alternative interpretations for the differences between recall and diary consumption measures. Finally, we compare estimates of income and household size elasticities of per capita food consumption based on the two kinds of expenditure data and, in contrast to some previous work, find little difference between the two.expenditure, consumption, surveys

    CroLSSim: Cross‐language software similarity detector using hybrid approach of LSA‐based AST‐MDrep features and CNN‐LSTM model

    Get PDF
    Software similarity in different programming codes is a rapidly evolving field because of its numerous applications in software development, software cloning, software plagiarism, and software forensics. Currently, software researchers and developers search cross-language open-source repositories for similar applications for a variety of reasons, such as reusing programming code, analyzing different implementations, and looking for a better application. However, it is a challenging task because each programming language has a unique syntax and semantic structure. In this paper, a novel tool called Cross-Language Software Similarity (CroLSSim) is designed to detect similar software applications written in different programming codes. First, the Abstract Syntax Tree (AST) features are collected from different programming codes. These are high-quality features that can show the abstract view of each program. Then, Methods Description (MDrep) in combination with AST is used to examine the relationship among different method calls. Second, the Term Frequency Inverse Document Frequency approach is used to retrieve the local and global weights from AST-MDrep features. Third, the Latent Semantic Analysis-based features extraction and selection method is proposed to extract the semantic anchors in reduced dimensional space. Fourth, the Convolution Neural Network (CNN)-based features extraction method is proposed to mine the deep features. Finally, a hybrid deep learning model of CNN-Long-Short-Term Memory is designed to detect semantically similar software applications from these latent variables. The data set contains approximately 9.5K Java, 8.8K C#, and 7.4K C++ software applications obtained from GitHub. The proposed approach outperforms as compared with the state-of-the-art methods

    Are three flavors special?

    Get PDF
    It has become clearer recently that the regular pattern of three flavor nonets describing the low spin meson multiplets seems to require some modification for the case of the spin 0 scalar mesons. One picture which has had some success, treats the scalars in a chiral Lagrangian framework and considers them to populate two nonets. These are, in turn, taken to result from the mixing of two "bare" nonets, one of which is of quark- antiquark type and the other of two quark- two antiquark type. Here we show that such a mixing is, before chiral symmetry breaking terms are included, only possible for three flavors. In other cases, the two types of structure can not have the same chiral symmetry transformation property. Specifically, our criterion would lead one to believe that scalar and pseudoscalar states containing charm would not have "four quark" admixtures. This work is of potential interest for constructing chiral Lagrangians based on exact chiral symmetry which is then broken by well known specific terms. It may also be of interest in studying some kinds of technicolor theories

    Chiral Nonet Mixing in pi pi Scattering

    Get PDF
    Pion pion scattering is studied in a generalized linear sigma model which contains two scalar nonets (one of quark-antiquark type and the other of diquark-antidiquark type) and two corresponding pseudoscalar nonets. An interesting feature concerns the mixing of the four isosinglet scalar mesons which yield poles in the scattering amplitude. Some realism is introduced by enforcing exact unitarity via the K-matrix method. It is shown that a reasonable agreement with experimental data is obtained up to about 1 GeV. The poles in the unitarized scattering amplitude are studied in some detail. The lowest pole clearly represents the sigma meson (or f0(600)) with a mass and decay width around 500 MeV. The second pole invites comparison with the f0(980) which has a mass around 1 GeV and decay width around 100 MeV. The third and fourth poles, resemble some of the isosinglet state in the complicated 1-2 GeV region. Some comparison is made to the situation in the usual SU(3) linear sigma model with a single scalar nonet

    Electrical transport and optical studies of ferromagnetic Cobalt doped ZnO nanoparticles exhibiting a metal-insulator transition

    Full text link
    The observed correlation of oxygen vacancies and room temperature ferromagnetic ordering in Co doped ZnO1-o nanoparticles reported earlier (Naeem et al Nanotechnology 17, 2675-2680) has been further explored by transport and optical measurements. In these particles room temperature ferromagnetic ordering had been observed to occur only after annealing in forming gas. In the current work the optical properties have been studied by diffuse reflection spectroscopy in the UV-Vis region and the band gap of the Co doped compositions has been found to decrease with Co addition. Reflections minima are observed at the energies characteristic of Co+2 d-d (tethrahedral symmetry) crystal field transitions, further establishing the presence of Co in substitutional sites. Electrical transport measurements on palletized samples of the nanoparticles show that the effect of a forming gas is to strongly decrease the resistivity with increasing Co concentration. For the air annealed and non-ferromagnetic samples the variation in the resistivity as a function of Co content are opposite to those observed in the particles prepared in forming gas. The ferromagnetic samples exhibit an apparent change from insulator to metal with increasing temperatures for T>380K and this change becomes more pronounced with increasing Co content. The magnetic and resistive behaviors are correlated by considering the model by Calderon et al [M. J. Calderon and S. D. Sarma, Annals of Physics 2007 (Accepted doi: 10.1016/j.aop.2007.01.010] where the ferromagnetism changes from being mediated by polarons in the low temperature insulating region to being mediated by the carriers released from the weakly bound states in the higher temperature metallic region.Comment: 7 pages, 6 figure

    A global mental health fund for serious mental illness in low-income and middle-income countries.

    Get PDF
    Serious Mental Illnesses (SMI) are psychiatric disorders (excluding developmental and substance use disorders) that result in considerable functional impairment. These conditions receive little or no funding in most Low and Middle Income (LAMI) countries. The huge gap in resources for SMI can only be met by a global fund to provide the treatment of SMI in LAMI countries. The Global Fund to fight AIDS established more than two decades ago, not only provided enormous funding but most importantly, generated the hope that the condition could be treated. We argue that SMI stand today where HIV-AIDS was a couple of decades ago. The cost effective interventions for these disorders are available. For example, it is estimated that that an extra 11 Naira or I$ 0.27 per capita would need to be invested each year to increase the present treatment coverage for schizophrenia of 20% to a level of 70% in Nigeria. The treatment package should include free access to essential medicines to treat psychotic disorders and a component of appropriate evidence based psychosocial intervention, which have been evaluated in number of studies in these countries. It is ethical and public health imperative that a Global Fund to provide the basic treatment for those suffering from SMI is established and the seed money for the proposed fund should be provided by rapidly developing LAMI countries such as India and South Africa

    Cyber-threat detection system using a hybrid approach of transfer learning and multi-model image representation

    Get PDF
    Currently, Android apps are easily targeted by malicious network traffic because of their constant network access. These threats have the potential to steal vital information and disrupt the commerce, social system, and banking markets. In this paper, we present a malware detection system based on word2vec-based transfer learning and multi-model image representation. The proposed method combines the textual and texture features of network traffic to leverage the advantages of both types. Initially, the transfer learning method is used to extract trained vocab from network traffic. Then, the malware-to-image algorithm visualizes network bytes for visual analysis of data traffic. Next, the texture features are extracted from malware images using a combination of scale-invariant feature transforms (SIFTs) and oriented fast and rotated brief transforms (ORBs). Moreover, a convolutional neural network (CNN) is designed to extract deep features from a set of trained vocab and texture features. Finally, an ensemble model is designed to classify and detect malware based on the combination of textual and texture features. The proposed method is tested using two standard datasets, CIC-AAGM2017 and CICMalDroid 2020, which comprise a total of 10.2K malware and 3.2K benign samples. Furthermore, an explainable AI experiment is performed to interpret the proposed approach
    corecore