581 research outputs found

    Collaborative Indoor Mapping in a Spatial Data Management Context

    Get PDF
    The objective of this thesis was to research on collaborative geospatial data management, how to share, store and process data between different actors, of different natures and different purposes. This research work will serve as base for the implementation of a web-based collaborative map editing application for the company Nimble Devices Oy, and to be partly published as a free licensed software. The geospatial data is being stored as generic geometric objects in a PostgreSQL database. Every data processing will be represented as an ``Action`` object containing all the required informations to replicate the same data processing on any other actor of the whole system. The ``Action'' objects are transmitted to the database through an application programming interface on the server side, and will be transmitted to the other web clients with the Javascript library TogetherJS. This thesis will present background research and a literature review on the topics of geospatial data and indoor mapping. Then a specification and conception work will be done to suggest solutions for the previous problematic. The thesis then presents some technical validation and results of the project. And finally, a simple conclusion including the future works, and future possibilities related to this work

    Subverted expectations and social democratic austerity: How voters’ reactions to policies are conditional on the policy-implementing actor

    Get PDF
    It is well-established that voters care about policies when they go to the voting booth. However, we argue that voters' reaction to the policies are conditional on the actor implementing them. Voters have different expectations towards political parties regarding the policies they are expected to implement, and subverted expectations can have electoral consequences. This is particularly the case when they are related to issues central to the party's ideological agenda. We supply experimental evidence of this in the case of social-democratic austerity policies: Left-wing voters punish social democrats much more for implementing such policies than they punish a mainstream right party for the same actions. Our findings have important implications for several ongoing debates in the literature such as the demise of social democratic parties in the wake of the Great Recession, the interplay between parties and citizens, as well as the general effect of austerity on electoral outcomes.Subverted expectations and social democratic austerity: How voters’ reactions to policies are conditional on the policy-implementing actorpublishedVersio

    Summer Academy:for social media trainers in local regional governments and business

    Get PDF
    One of the work packages which Hanzehogeschool emphatically has a role, is Research and Training. In the Summer Academy teachers are trained by translating their knowledge back to their own schools. The Summer Academy is given on 27-30 May 2013, as part of "Opening Up". This project aims to find better service to citizens and businesses through the use of social media and open data. The opening-up project started in October 2011 and lasts three years. Hanze University Groningen is an important partner in the project

    Trust in political parties and ideological proximity voting in Europe: the role of trust in political parties as a heuristic mechanism

    Get PDF
    Previous studies have investigated to what extent voters can achieve proximity between their preferences and the positions of the party they vote for. Combining data from the European Social Survey and the Chapel Hill Expert Survey, we investigate whether trust in political parties increases ideological proximity voting. We argue that voters use their level of trust in parties as a heuristic mechanism. First, trust can increase proximity voting because citizens need to trust that political parties will take voters’ policy preferences into account when in government. Second, we examine whether low-trusting voters tend to cast a protest vote, and do not engage in ideological proximity voting. We test this assumption regarding three determinants of the vote choice: general left-right ideology views, preferences for income redistribution, and anti-immigrant sentiments. We find that ideological proximity voting is indeed moderated by trust: those who trust political parties are more likely to cast a vote based on their policy preferences, while those who distrust tend to vote for protest parties. Nevertheless, also among protest voters, trust is conducive for higher levels of proximity voting.publishedVersio

    Reabilitação de pacientes com amputação transfemoral unilateral: revisão da literatura

    Get PDF
    Projeto de Graduação apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Licenciado em FisioterapiaObjetivo: Analisar as diferentes técnicas de reabilitação de pacientes com amputação transfemoral unilateral (ATF). Metodologia: Pesquisa computorizada nas bases de dados PubMed. A estratégia de pesquisa seguiu o fluxograma PRISMA. Resultados: Nesta revisão foram incluídos 6 artigos envolvendo 82 pacientes de ambos os sexos, e com idades compreendidas entre 21 e 81 anos. Após a implementação de um treino de força dos abdutores constatou-se melhoria no desempenho funcional dos pacientes com ATF. Estes consideraram o encaixe quadrilátero como sendo o mais confortável e o preferido. O joelho protésico do tipo adaptativo foi o que obteve maiores ganhos de funcionalidade. Conclusão: A fisioterapia, assim como a escolha do material constituinte da prótese, parece representar um papel importante na reabilitação de pacientes com ATF unilateral.Objective: To analyze the different techniques of rehabilitation of patients with unilateral transfemoral amputation. Methodology: Computerized search in the PubMed databases. The research strategy followed the PRISMA flowchart. Results: In this review, 6 articles were included involving 82 patients of both sexes, and aged between 21 and 81 years. After the implementation of an abductors strength training, it was observed an improvement in the functional performance of patients with ATF. These considered the quadrilateral fitting to be the most comfortable and preferred. The adaptive type prosthetic knee was the one that obtained the greatest gains in functionality. Conclusion: Physiotherapy, as well as the choice of the constituent material of the prosthesis, seems to play an important role in the rehabilitation of patients with unilateral TFA.N/

    Resisting Key-Extraction and Code-Compression: a Secure Implementation of the HFE Signature Scheme in the White-Box Model

    Get PDF
    Cryptography is increasingly deployed in applications running on open devices in which the software is extremely vulnerable to attacks, since the attacker has complete control over the execution platform and the software implementation itself. This creates a challenge for cryptography: design implementations of cryptographic algorithms that are secure, not only in the black-box model, but also in this attack context that is referred to as the white-box adversary model. Moreover, emerging applications such as mobile payment, mobile contract signing or blockchain-based technologies have created a need for white-box implementations of public-key cryptography, and especially of signature algorithms. However, while many attempts were made to construct white-box implementations of block-ciphers, almost no white-box implementations have been published for what concerns asymmetric schemes. We present here a concrete white-box implementation of the well-known HFE signature algorithm for a specific set of internal polynomials. For a security level 2802^{80}, the public key size is approximately 62.5 MB and the white-box implementation of the signature algorithm has a size approximately 256 GB

    Detection of clusters of a rare disease over a large territory: performance of cluster detection methods

    Get PDF
    International audienceBackgroundFor many years, the detection of clusters has been of great public health interest. Several detection methods have been developed, the most famous of which is the circular scan method. The present study, which was conducted in the context of a rare disease distributed over a large territory (7675 cases registered over 17 years and located in 1895 units), aimed to evaluate the performance of several of the methods in realistic hot-spot cluster situations.MethodsAll the methods considered aim to identify the most likely cluster area, i.e. the zone that maximizes the likelihood ratio function, among a set of cluster candidates. The circular and elliptic scan methods were developed to detect regularly shaped clusters. Four other methods that focus on irregularly shaped clusters were also considered (the flexible scan method, the genetic algorithm method, and the double connected and maximum linkage spatial scan methods). The power of the methods was evaluated via Monte Carlo simulations under 27 alternative scenarios that corresponded to three cluster population sizes (20, 45 and 115 expected cases), three cluster shapes (linear, U-shaped and compact) and three relative risk values (1.5, 2.0 and 3.0).ResultsThree situations emerged from this power study. All the methods failed to detect the smallest clusters with a relative risk lower than 3.0. The power to detect the largest cluster with relative risk of 1.5 was markedly better for all methods, but, at most, half of the true cluster was captured. For other clusters, either large or with the highest relative risk, the standard elliptic scan method appeared to be the best method to detect linear clusters, while the flexible scan method localized the U-shaped clusters more precisely than other methods. Large compact clusters were detected well by all methods, with better results for the circular and elliptic scan methods.ConclusionsThe elliptic scan method and flexible scan method seemed the most able to detect clusters of a rare disease in a large territory. However, the probability of detecting small clusters with relative risk lower than 3.0 remained low with all the methods tested

    The antitumor activity of umbelliferone in human renal cell carcinoma via regulation of the p110γ catalytic subunit of PI3Kγ

    Get PDF
    Umbelliferone exhibits extensive pharmacological activity, including anti-immunomodulatory, anti-inflammatory and antigenotoxicity activities. However, its antitumor properties still remain unclear in human renal cell carcinoma (RCC) cells. Our results have revealed that treatment of human RCC cells (786-O, OS-RC-2, and ACHN) with umbelliferone reduced cell proliferation in a concentration-dependent manner and induced dose-dependent apoptotic events. In addition, cell cycle analysis determined that umbelliferone treatment induced cell cycle arrest in the G1 phase in a dose-dependent manner. Furthermore, western blotting analysis showed a dose-dependent decrease in Ki67, MCM2, Bcl-2, CDK2, CyclinE1, CDK4, and CyclinD1 and a dose-dependent increase in Bax in RCC cells cultured with umbelliferone. Similarly, umbelliferone exhibited a dose-dependent reduction of p110γ when using western blotting analyses. Taken together, these results provide an insight into the pharmacology regarding the potential application of umbelliferone, which contributes to cell death by decreasing p110γ protein expression

    Blending FHE-NTRU keys – The Excalibur Property

    Get PDF
    Can Bob give Alice his decryption secret and be convinced that she will not give it to someone else? This is achieved by a proxy re-encryption scheme where Alice does not have Bob’s secret but instead she can transform ciphertexts in order to decrypt them with her own key. In this article, we answer this question in a different perspective, relying on a property that can be found in the well-known modified NTRU encryption scheme. We show how parties can collaborate to one-way-glue their secret-keys together, giving Alice’s secret-key the additional ability to decrypt Bob’s ciphertexts. The main advantage is that the proto cols we propose can be plugged directly to the modified NTRU scheme with no post-key-generation space or time costs, nor any modification of ciphertexts. In addition, this property translates to the NTRU-based multikey homomorphic scheme, allowing to equip a hierarchic chain of users with automatic re-encryption of messages and supporting homomorphic operations of ciphertexts. To achieve this, we propose two-party computation protocols in cyclotomic polynomial rings. We base the security in presence of various types of adversaries on the RLWE and DSPR assumptions, and on two new problems in the modified NTRU ring
    corecore