936 resultados para generic exponential family duration modeling
Resumo:
Few studies have examined the effects of parental MS on children, and those that have suffered from numerous methodological weaknesses, some of which are addressed in this study. This study investigated the effects of parental MS on children by comparing youth of a parent with MS to youth who have no family member with a serious health condition on adjustment outcomes, caregiving, attachment and family functioning. A questionnaire survey methodology was used. Measures included youth somatisation, health, pro-social behaviour, behavioural-social difficulties, caregiving, attachment and family functioning. A total of 126 youth of a parent with MS were recruited from MS Societies in Australia and, were matched one-to-one with youth who had no family member with a health condition drawn from a large community sample. Comparisons showed that youth of a parent with MS did not differ on any of the outcomes except for peer relationship problems: adolescent youth of a parent with MS reported lower peer relationship problems than control adolescents. Overall, results did not support prior research findings suggesting adverse impacts of parental MS on youth.
Resumo:
This study responds to calls for research on work-family aspects in entrepreneurship research. Our study examined the role of work-family conflict and enhancement on small business owners’ (SBOs) wellbeing. We found work-family has negative direct effect on mental health, job and family satisfactions. Furthermore, we found that under high level of work-family conflict condition, SBOs who perceive a greater level of work-family enhancement would feel more satisfy with their life, job as well as family aspects. Interestingly, under high level of conflict, even SBOs perceive greater level of enhancement, it would not lessen the negative impact of the conflict on their mental health. These results suggest that once psychological health is harmed by work-family conflict, its negative consequences remain unchanged.
Resumo:
Many species of bat use ultrasonic frequency modulated (FM) pulses to measure the distance to objects by timing the emission and reception of each pulse. Echolocation is mainly used in flight. Since the flight speed of bats often exceeds 1% of the speed of sound,Doppler effects will lead to compression of the time between emission and reception as well as an elevation of the echo frequencies, resulting in a distortion of the perceived range. This paper describes the consequences of these Doppler effects on the ranging performance of bats using different pulse designs. The consequences of Doppler effects on ranging performance described in this paper assume bats to have a very accurate ranging resolution, which is feasible with a filterbank receiver. By modeling two receiver types, it was first established that the effects of Doppler compression are virtually independent of the receiver type. Then, used a cross-correlation model was used to investigate the effect of flight speed on Doppler tolerance and range–Doppler coupling separately. This paper further shows how pulse duration, bandwidth, function type, and harmonics influence Doppler tolerance and range–Doppler coupling. The influence of each signal parameter is illustrated using calls of several bat species. It is argued that range–Doppler coupling is a significant source of error in bat echolocation, and various strategies bats could employ to deal with this problem, including the use of range rate information are discussed.
Resumo:
Managerial changes to Australian universities have had considerable impact on employees. In this paper we consider some of these changes and apply a theory known as the democratic deficit to them. This theory was developed from the democratic critique of managerialism, as it has been applied in the public sector in countries with Westminster-type political systems. This deficit covers the weakening of accountability through politicisation, the denial of public values through the use of private sector performance practices, and the hollowing out of the state through the contracting out and privatisation of public goods and services, and the redefinition of citizens as customers and clients. We suggest that the increased power of managers, expansion of the audit culture, and the extensive use of contract employment seem to be weakening the democratic culture and role of universities in part by replacing accountability as responsibility with accountability as responsiveness.
Resumo:
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).