879 research outputs found
The Application Of Local Indicators For Categorical Data (LICD) In The Spatial Analysis Of Economic Development
Firstly, we identify classes of regions presenting different economic development levels using taxonomic methods of multivariate data analysis. Secondly, we apply a join-count test to examine spatial dependencies between regions. It examines the tendency to form the spatial clusters. The global test indicates general spatial interactions between regions, while local tests give detailed results separately for each region. The global test detects spatial clustering of economically poor regions but is statistically insignificant as regards well-developed regions. Thus, the local tests are also applied. They indicate the occurrence of five spatial clusters and three outliers in Poland. There are three clusters of wealth. Their development is based on a diffusion impact of regional economic centres. The areas of eastern and north western Poland include clusters of poverty. The first one is impeded by the presense of three indiviual growth centres, while the second one is out of range of diffusion influence of bigger agglomerations
Recommended from our members
Purpose in Life and Conscientiousness Protect Against the Development of Suicidal Ideation in U.S. Military Veterans With PTSD and MDD: Results From the National Health and Resilience in Veterans Study.
Background:Although several studies have examined risk factors for suicidal ideation among veterans, little is known about risk and protective factors for suicidal ideation in high-risk veteran samples. Thus, this study examined a broad range of risk and protective factors associated with the development of suicidal ideation in a high-risk sample of U.S. veterans who screened positive for current posttraumatic stress disorder (PTSD) and/or major depressive disorder (MDD). Methods:Data were analyzed from the National Health and Resilience in Veterans Study, a nationally representative, prospective cohort study of U.S. veterans. Veterans completed self-report measures to screen for PTSD and MDD and to assess for risk and protective factors. The sample included 222 veterans with PTSD and/or MDD who did not endorse suicidal ideation at baseline and completed at least one assessment over a seven-year follow-up period. A multivariable binary logistic regression analysis was conducted to examine baseline factors associated with incident suicidal ideation. Results:Nearly one in three (27.1%) of veterans with PTSD and/or MDD developed suicidal ideation over the seven-year follow-up period. Non-Caucasian race and lower scores on measures of purpose in life, conscientiousness, and frequency of religious service attendance were independently associated with incident suicidal ideation. Lower purpose in life (52.3%) and conscientiousness (33.2%) explained the vast majority of variance in incident suicidal ideation. Conclusion:Nearly 30% of veterans with PTSD and/or MDD who did not endorse suicidal ideation at baseline developed suicidal ideation over a seven-year period. Prevention and treatment efforts designed to bolster purpose in life and conscientiousness may help mitigate risk for suicidal ideation in this high-risk population
Securing computation against continuous leakage
30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. ProceedingsWe present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded number of executions. Our method uses as a building block a semantically secure subsidiary bit encryption scheme with the following additional operations: key refreshing, oblivious generation of cipher texts, leakage resilience re-generation, and blinded homomorphic evaluation of one single complete gate (e.g. NAND). Furthermore, the security properties of the subsidiary encryption scheme should withstand bounded leakage incurred while performing each of the above operations.
We show how to implement such a subsidiary encryption scheme under the DDH intractability assumption and the existence of a simple secure hardware component. The hardware component is independent of the encryption scheme secret key. The subsidiary encryption scheme resists leakage attacks where the leakage is computable in polynomial time and of length bounded by a constant fraction of the security parameter.Israel Science Foundation (710267)United States-Israel Binational Science Foundation (710613)National Science Foundation (U.S.) (6914349)Weizmann KAMAR Gran
Predictable arguments of knowledge
We initiate a formal investigation on the power of predictability for argument of knowledge systems for NP. Specifically, we consider private-coin argument systems where the answer of the prover can be predicted, given the private randomness of the verifier; we call such protocols Predictable Arguments of Knowledge (PAoK).
Our study encompasses a full characterization of PAoK, showing that such arguments can be made extremely laconic, with the prover sending a single bit, and assumed to have only one round (i.e., two messages) of communication without loss of generality.
We additionally explore PAoK satisfying additional properties (including zero-knowledge and the possibility of re-using the same challenge across multiple executions with the prover), present several constructions of PAoK relying on different cryptographic tools, and discuss applications to cryptography
Tracing a phase transition with fluctuations of the largest fragment size: Statistical multifragmentation models and the ALADIN S254 data
A phase transition signature associated with cumulants of the largest
fragment size distribution has been identified in statistical
multifragmentation models and examined in analysis of the ALADIN S254 data on
fragmentation of neutron-poor and neutron-rich projectiles. Characteristics of
the transition point indicated by this signature are weakly dependent on the
A/Z ratio of the fragmenting spectator source. In particular, chemical
freeze-out temperatures are estimated within the range 5.9 to 6.5 MeV. The
experimental results are well reproduced by the SMM model.Comment: 7 pages, 3 figures, Proceedings of the International Workshop on
Multifragmentation and Related Topics (IWM2009), Catania, Italy, November
2009
Factor structure of PTSD, and relation with gender in trauma survivors from India
Background: The factor structure of posttraumatic stress disorder (PTSD) has been extensively studied in Western countries. Some studies have assessed its factor structure in Asia (China, Sri Lanka, and Malaysia), but few have directly assessed the factor structure of PTSD in an Indian adult sample. Furthermore, in a largely patriarchal society in India with strong gender roles, it becomes imperative to assess the association between the factors of PTSD and gender. Objective: The purpose of the present study was to assess the factor structure of PTSD in an Indian sample of trauma survivors based on prevailing models of PTSD defined in the DSM-IV-TR (APA, 2000), and to assess the relation between PTSD factors and gender. Method: The sample comprised of 313 participants (55.9% female) from Jammu and Kashmir, India, who had experienced a natural disaster (N=200) or displacement due to cross-border firing (N=113). Results: Three existing PTSD models—two four-factor models (Emotional Numbing and Dysphoria), and a five-factor model (Dysphoric Arousal)—were tested using Confirmatory Factor Analysis with addition of gender as a covariate. The three competing models had similar fit indices although the Dysphoric Arousal model fit significantly better than Emotional Numbing and Dysphoria models. Gender differences were found across the factors of Re-experiencing and Anxious arousal. Conclusions: Findings indicate that the Dysphoric Arousal model of PTSD was the best model; albeit the fit indices of all models were fairly similar. Compared to males, females scored higher on factors of Re-experiencing and Anxious arousal. Gender differences found across two factors of PTSD are discussed in light of the social milieu in India
On the Query Complexity of Constructing PRFs from Non-adaptive PRFs
This paper studies constructions of pseudorandom functions (PRFs) from non-adaptive PRFs (naPRFs), i.e., PRFs which are secure only against distinguishers issuing all of their queries at once.
Berman and Haitner (Journal of Cryptology, \u2715) gave a one-call construction which, however, is not hardness preserving -- to obtain a secure PRF (against polynomial-time distinguishers), they need to rely on a naPRF secure against superpolynomial-time distinguishers; in contrast, all known hardness-preserving constructions require calls. This leaves open the question of whether a stronger superpolynomial-time assumption is necessary for one-call (or constant-call) approaches. Here, we show that a large class of one-call constructions (which in particular includes the one of Berman and Haitner) cannot be proved to be a secure PRF under a black-box reduction to the (polynomial-time) naPRF security of the underlying function.
Our result complements existing impossibility results (Myers, EUROCRYPT \u2704; Pietrzak, CRYPTO \u2705) ruling out natural specific approaches, such as parallel and sequential composition. Furthermore, we show that our techniques extend to rule out a natural class of constructions making parallel but arbitrary number of calls which in particular includes parallel composition and the two-call, cuckoo-hashing based construction of Berman et al.\ (Journal of Cryptology, \u2719)
Tropical biogeomorphic seagrass landscapes for coastal protection:Persistence and wave attenuation during major storms events
The intensity of major storm events generated within the Atlantic Basin is projected to rise with the warming of the oceans, which is likely to exacerbate coastal erosion. Nature-based flood defence has been proposed as a sustainable and effective solution to protect coastlines. However, the ability of natural ecosystems to withstand major storms like tropical hurricanes has yet to be thoroughly tested. Seagrass meadows both stabilise sediment and attenuate waves, providing effective coastal protection services for sandy beaches. To examine the tolerance of Caribbean seagrass meadows to extreme storm events, and to investigate the extent of protection they deliver to beaches, we employed a combination of field surveys, biomechanical measurements and wave modelling simulations. Field surveys of sea- grass meadows before and after a direct hit by the category 5 Hurricane Irma documented that estab- lished seagrass meadows of Thalassia testudinum re- mained unaltered after the extreme storm event. The flexible leaves and thalli of seagrass and calci- fying macroalgae inhabiting the meadows were shown to sustain the wave forces that they are likely to experience during hurricanes. In addition, the seagrass canopy and the complex biogeomorphic landscape built by the seagrass meadows combine to significantly dissipate extreme wave forces, ensuring that erosion is minimised within sandy beach fore- shores. The persistence of the Caribbean seagrass meadows and their coastal protection services dur- ing extreme storm events ensures that a stable coastal ecosystem and beach foreshore is maintained in tropical regions
- …