40 research outputs found

    State Children\u27s Health Insurance Program: Participation Decision and Labor Supply Effects

    Get PDF
    Our study estimates the crowd-out of private health insurance following SCHIP expansions for children. We use panel data from the 2001 panel of the Survey of Income and Program Participation (SIPP). We use multivariate regression models to the crowd-out of private health insurance. This difference-in-differences approach controls for other factors that affect both the control group and treatment group, and measures the extent of crowd-out private coverage in the treatment group relative to the control group. We find that nearly 26 percent of the transitions from private coverage into SCHIP coverage were made by children who would have had private coverage in the absence of the expansions. This paper provides evidence that the SCHIP expansions have overall displacement effect of 52.9 percent for private coverage for those children who had private coverage or were uninsured from the first interview in 2001. This dissertation provides empirical evidence on the impact of SCHIP on single mothers¡¯ working decisions using recent CPS (Current Population Survey) data during 1999-2005. The empirical work requires a measure of the change in eligibility requirements; we compute a measure suggested by Yelowitz (1995). The major findings of this paper are: first, SCHIP expansions are found to have a significant positive impact on hours-worked decision; second, most models yielded results that indicated that SCHIP expansions have a generally insignificant impact on the decision to work

    Effect of Soft Errors in Iterative Learning Control and Compensation using Cross-layer Approach

    Get PDF
    In this paper, we study the effects of radiation-induced soft errors in iterative learning control(ILC) and present the compensation techniques to make the ILC systems robust against soft errors. Soft errors are transient faults, which occur temporarily in memories where the energetic particles strike the sensitive region in the transistors mainly under abnormal conditions such as high radiation, high temperature, and high pressure. These soft errors can cause bit value changes without any notification to the controller, affect the stability of the system, and result in catastrophic consequences. First, we investigate and analyze the effects of soft errors in the ILC systems. Our analytical study shows that when a single soft error occurs in the output data from the ILC, the performance of the learning control is significantly degraded. Second, we propose novel learning methods by incorporating the existing techniques across the system abstraction levels in the ILC to compensate for soft-error-induced incorrect output. The occurrence of soft errors is estimated by using a monotonic convergence of the erroneous outputs in a cross-layer manner, and our proposed methods can significantly reduce these negative impacts on the system performance. Under the assumption of soft error occurrence, our analytic study has proved the convergence of the proposed methods in the ILC systems and our simulation results show the effectiveness of the proposed methods to efficiently reduce the impacts of soft-error-induced outputs in the ILC systems

    INVESTIGATION ON EFFECTS OF ENLARGED PIPE RUPTURE SIZE AND AIR PENETRATION TIMING IN REALSCALE EXPERIMENT OF SIPHON BREAKER

    Get PDF
    To ensure the safety of research reactors, the water level must be maintained above the required height. When a pipe ruptures, the siphon phenomenon causes continuous loss of coolant until the hydraulic head is removed. To protect the reactor core from this kind of accident, a siphon breaker has been suggested as a passive safety device. This study mainly focused on two variables: the size of the pipe rupture and the timing of air entrainment. In this study, the size of the pipe rupture was increased to the guillotine break case. There was a region in which a larger pipe rupture did not need a larger siphon breaker, and the water flow rate was related to the size of the pipe rupture and affected the residual water quantity. The timing of air entrainment was predicted to influence residual water level. However, the residual water level was not affected by the timing of air entrainment. The experimental cases, which showed the characteristic of partical sweep-out mode in the separation of siphon breaking phenomenon [2], showed almost same trend of physical properties.ungraded1111Ysciescopu

    Robust Face Recognition Against Soft-errors Using a Cross-layer Approach

    Get PDF
    Recently, soft-errors, temporary bit toggles in memory systems, have become increasingly important. Although soft-errors are not critical to the stability of recognition systems or multimedia systems, they can significantly degrade the system performance. Considering these facts, in this paper, we propose a novel method for robust face recognition against soft-errors using a cross layer approach. To attenuate the effect of soft-errors in the face recognition system, they are detected in the embedded system layer by using a parity bit checker and compensated in the application layer by using a mean face. We present the soft-error detection module for face recognition and the compensation module based on the mean face of the facial images. Simulation results show that the proposed system effectively compensates for the performance degradation due to soft errors and improves the performance by 2.11 % in case of the Yale database and by 10.43 % in case of the ORL database on average as compared to that with the soft-errors induced

    Marital disruption and the economic status of women in South Korea(한국 이혼여성의 가족해체 후 경제적 위험성과 생산성의 변화)

    No full text

    Integrated visual security management for optimal condition explorations in resource-constrained systems

    No full text
    Abstract As more and more mobile video applications contain important and private video data, various video encryption techniques have been proposed to protect them. Many of those applications typically utilize the standard video compression while running on mobile platforms which have limited amount of resources. Therefore, we need to consider not only the protection but also the compression and the energy in the mobile video applications. Accordingly, the selective video encryption which protects partial data within the standard video compression has been challenging thanks to format compliance and low computational complexity. However, various parameters of the video compression and the video encryption result in different amount of visual security, compression efficiency, and energy efficiency. Further, it is difficult to find the one solution to maximize all those performance indices at once since there exist tradeoff relationships among them. Therefore, based on the tradeoff relationships, design space exploration should be required to find the interesting parameter set under the given requirements. For the efficient design space exploration, we propose the BEVS (bitrate and energy-bound visual security) to examine each Joint Video Compression and Encryption scheme in terms of the visual security, the compression efficiency, and the energy efficiency. Utilizing the proposed BEVS in our experimental design space, we achieve up to 36.7% visual security improvement under the empirical budgets

    AN EXPERIMENTAL STUDY ON ENERGY CONSUMPTION OF VIDEO ENCRYPTION FOR MOBILE HANDHELD DEVICES ∗

    No full text
    Abstract Secure video communication on mobile handheld devices is challenging mainly due to (a) the significant computational needs of both video coding and encryption algorithms and (b) the limited battery capacity of handheld devices. In this paper, we evaluate several video encryption schemes from the perspective of energy consumption both analytically and experimentally. Specifically, we implement video encryption schemes on mobile handhelds to support a H.263 based secure video application, and extensively measure the energy consumption due to encoding and encryption for several classes of video clips. Contrary to popular belief, our experiments show that energy overhead of full video encryption is insignificant compared to the energy consumed for video encoding (between 2 % and 4 % of total energy cost) in most cases. 1
    corecore