402 research outputs found

    Local and territorial determinants in the realization of public–private–partnerships: an empirical analysis for Italian provinces

    Get PDF
    ABSTRACT Relational networks and intangible factors are crucial elements for the competitiveness of a territory. Public–Private–Partnerships (PPPs), in particular, allow for the provision of goods and services that favour the exploitation of complementarities between public and private resources. They aim at promoting an increase in the overall efficiency of investment projects through a complex mechanism that distributes risk and revenues among stakeholders. This paper examines the local and territorial determinants of PPPs through an econometric analysis based upon Italian municipal data, grouped at the provincial level. Using a tobit model, we analyse the relationship between the realization of successful PPP initiatives and different sets of factors, including less analysed local and territorial determinants. We stress the role of the local management of infrastructure assets, the administrative efficiency of local authorities and the diffusion of previous local development initiatives. Local management and territorial context factors explain most of the occurrence of successful PPP initiatives in the pre-crisis period while usual determinants (infrastructure endowment and financial distress) display a weaker effect

    Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis

    Get PDF
    In this paper we present a new method for searching duplicated areas in a digital image. The goal is to detect if an image has been tampered by a copy-move process. Our method works within a convenient domain. The image to be analyzed is decomposed in its bit-plane representation. Then, for each bitplane, block of bits are encoded with an ASCII code, and a sequence of strings is analyzed rather than the original bit-plane. The sequence is lexicographically sorted and similar groups of bits are extracted as candidate areas, and passed to the following plane to be processed. Output of the last planes indicates if, and where, the image has been altered

    Fiscal federalism, regional public investment and spatial interaction processes: the case of Italy

    Full text link
    The aim of this paper is to examine interregional interactions in public expenditure (for NUTS I and NUTS II level regions) using a new database on Italian Regional Public Accounts (RPA) over the period 1996-2007. Intergovernmental interactions are particularly important for assessing the impact of the reform towards fiscal federalism which is currently under way in Italy. As pointed out by Salmon (1987,2002), a more decentralized system implies that governments situated at the same level in a multi-level governmental system compete each other as well as with those located along the hierarchy. Competitive behavior is also a key element in many recent models of local government behavior (Brueckner, 1997, 2000) and is now the focus of a growing empirical literature based on strategic interaction in local policy decisions analyzed through the estimation of a reaction function (Millimet, 2002; Revelli, 2003). The paper provides empirical evidence on complementary/competitive relationships in terms of capital public expenditure using the approach originally developed by Dendrinos and Sonis (1988, 1990). This model has been applied to income variables in several papers (Hewings et al. 1996, Magalhaes et al.1999, Dall'erba et al., 2003) but the use of policy variables has not been explored yet. By investigating the occurrence of competitive versus complementary interactions in regional public expenditure, the paper suggests that the definition of a fiscal federalism scheme should take into account adequately both direct and indirect effects

    Scale detection via keypoint density maps in regular or near-regular textures

    Get PDF
    In this paper we propose a new method to detect the global scale of images with regular, near regular, or homogenous textures. We define texture ‘‘scale’’ as the size of the basic elements (texels or textons) that most frequently occur into the image. We study the distribution of the interest points into the image, at different scale, by using our Keypoint Density Maps (KDMs) tool. A ‘‘mode’’ vector is built computing the most frequent values (modes) of the KDMs, at different scales. We observed that the mode vector is quasi linear with the scale. The mode vector is properly subsampled, depending on the scale of observation, and compared with a linear model. Texture scale is estimated as the one which minimizes an error function between the related subsampled vector and the linear model. Results, compared with a state of the art method, are very encouraging

    Copy-Move Forgery Detection by Matching Triangles of Keypoints

    Get PDF
    Copy-move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to find similar ones, or point-based approaches, in which relevant keypoints are extracted and matched to each other to find similar areas. In this paper, we present a very novel hybrid approach, which compares triangles rather than blocks, or single points. Interest points are extracted from the image, and objects are modeled as a set of connected triangles built onto these points. Triangles are matched according to their shapes (inner angles), their content (color information), and the local feature vectors extracted onto the vertices of the triangles. Our methods are designed to be robust to geometric transformations. Results are compared with a state-of-the-art block matching method and a point-based method. Furthermore, our data set is available for use by academic researchers

    Detecting Multiple Copies in Tampered Images

    Get PDF
    Copy-move forgeries are parts of the image that are duplicated elsewhere into the same image, often after being modified by geometrical transformations. In this paper we present a method to detect these image alterations, using a SIFT-based approach. First we describe a state of the art SIFT-point matching method, which inspired our algorithm, then we compare it with our SIFT-based approach, which consists of three parts: keypoint clustering, cluster matching, and texture analysis. The goal is to find copies of the same object, i.e. clusters of points, rather than points that match. Cluster matching proves to give better results than single point matching, since it returns a complete and coherent comparison between copied objects. At last, textures of matching areas are analyzed and compared to validate results and to eliminate false positives

    Copy-move Forgery Detection via Texture Description

    Get PDF
    Copy-move forgery is one of the most common type of tampering in digital images. Copy-moves are parts of the image that are copied and pasted onto another part of the same image. Detection methods in general use block-matching methods, which first divide the image into overlapping blocks and then extract features from each block, assuming similar blocks will yield similar features. In this paper we present a block-based approach which exploits texture as feature to be extracted from blocks. Our goal is to study if texture is well suited for the specific application, and to compare performance of several texture descriptors. Tests have been made on both uncompressed and JPEG compressed images

    Saliency Based Image Cropping

    Get PDF
    Image cropping is a technique that is used to select the most relevant areas of an image and discarding the useless parts. Handmade selection, especially in case of large photo collections, is a time consuming task. Automatic image cropping techniques may help users, suggesting to them which part of the image is the most relevant, according to specific criteria. In this paper we suppose that the most visually salient areas of a photo are also the most relevant ones to the users. We compare three different saliency detection methods within an automatic image cropping system, to study the effectiveness of the related saliency maps for this task. We furthermore extended one of the three methods (our previous work), which is based on the extraction of keypoints from the image. Tests have been conducted onto an online available dataset, made of 5000 images which have been manually labeled by 9 users
    • …
    corecore