846 research outputs found

    The Application Of Local Indicators For Categorical Data (LICD) In The Spatial Analysis Of Economic Development

    Get PDF
    Firstly, we identify classes of regions presenting different economic development levels using taxonomic methods of multivariate data analysis. Secondly, we apply a join-count test to examine spatial dependencies between regions. It examines the tendency to form the spatial clusters. The global test indicates general spatial interactions between regions, while local tests give detailed results separately for each region. The global test detects spatial clustering of economically poor regions but is statistically insignificant as regards well-developed regions. Thus, the local tests are also applied. They indicate the occurrence of five spatial clusters and three outliers in Poland. There are three clusters of wealth. Their development is based on a diffusion impact of regional economic centres. The areas of eastern and north western Poland include clusters of poverty. The first one is impeded by the presense of three indiviual growth centres, while the second one is out of range of diffusion influence of bigger agglomerations

    Securing computation against continuous leakage

    Get PDF
    30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. ProceedingsWe present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded number of executions. Our method uses as a building block a semantically secure subsidiary bit encryption scheme with the following additional operations: key refreshing, oblivious generation of cipher texts, leakage resilience re-generation, and blinded homomorphic evaluation of one single complete gate (e.g. NAND). Furthermore, the security properties of the subsidiary encryption scheme should withstand bounded leakage incurred while performing each of the above operations. We show how to implement such a subsidiary encryption scheme under the DDH intractability assumption and the existence of a simple secure hardware component. The hardware component is independent of the encryption scheme secret key. The subsidiary encryption scheme resists leakage attacks where the leakage is computable in polynomial time and of length bounded by a constant fraction of the security parameter.Israel Science Foundation (710267)United States-Israel Binational Science Foundation (710613)National Science Foundation (U.S.) (6914349)Weizmann KAMAR Gran

    Predictable arguments of knowledge

    Get PDF
    We initiate a formal investigation on the power of predictability for argument of knowledge systems for NP. Specifically, we consider private-coin argument systems where the answer of the prover can be predicted, given the private randomness of the verifier; we call such protocols Predictable Arguments of Knowledge (PAoK). Our study encompasses a full characterization of PAoK, showing that such arguments can be made extremely laconic, with the prover sending a single bit, and assumed to have only one round (i.e., two messages) of communication without loss of generality. We additionally explore PAoK satisfying additional properties (including zero-knowledge and the possibility of re-using the same challenge across multiple executions with the prover), present several constructions of PAoK relying on different cryptographic tools, and discuss applications to cryptography

    Tracing a phase transition with fluctuations of the largest fragment size: Statistical multifragmentation models and the ALADIN S254 data

    Full text link
    A phase transition signature associated with cumulants of the largest fragment size distribution has been identified in statistical multifragmentation models and examined in analysis of the ALADIN S254 data on fragmentation of neutron-poor and neutron-rich projectiles. Characteristics of the transition point indicated by this signature are weakly dependent on the A/Z ratio of the fragmenting spectator source. In particular, chemical freeze-out temperatures are estimated within the range 5.9 to 6.5 MeV. The experimental results are well reproduced by the SMM model.Comment: 7 pages, 3 figures, Proceedings of the International Workshop on Multifragmentation and Related Topics (IWM2009), Catania, Italy, November 2009

    Factor structure of PTSD, and relation with gender in trauma survivors from India

    Get PDF
    Background: The factor structure of posttraumatic stress disorder (PTSD) has been extensively studied in Western countries. Some studies have assessed its factor structure in Asia (China, Sri Lanka, and Malaysia), but few have directly assessed the factor structure of PTSD in an Indian adult sample. Furthermore, in a largely patriarchal society in India with strong gender roles, it becomes imperative to assess the association between the factors of PTSD and gender. Objective: The purpose of the present study was to assess the factor structure of PTSD in an Indian sample of trauma survivors based on prevailing models of PTSD defined in the DSM-IV-TR (APA, 2000), and to assess the relation between PTSD factors and gender. Method: The sample comprised of 313 participants (55.9% female) from Jammu and Kashmir, India, who had experienced a natural disaster (N=200) or displacement due to cross-border firing (N=113). Results: Three existing PTSD models—two four-factor models (Emotional Numbing and Dysphoria), and a five-factor model (Dysphoric Arousal)—were tested using Confirmatory Factor Analysis with addition of gender as a covariate. The three competing models had similar fit indices although the Dysphoric Arousal model fit significantly better than Emotional Numbing and Dysphoria models. Gender differences were found across the factors of Re-experiencing and Anxious arousal. Conclusions: Findings indicate that the Dysphoric Arousal model of PTSD was the best model; albeit the fit indices of all models were fairly similar. Compared to males, females scored higher on factors of Re-experiencing and Anxious arousal. Gender differences found across two factors of PTSD are discussed in light of the social milieu in India

    On the Query Complexity of Constructing PRFs from Non-adaptive PRFs

    Get PDF
    This paper studies constructions of pseudorandom functions (PRFs) from non-adaptive PRFs (naPRFs), i.e., PRFs which are secure only against distinguishers issuing all of their queries at once. Berman and Haitner (Journal of Cryptology, \u2715) gave a one-call construction which, however, is not hardness preserving -- to obtain a secure PRF (against polynomial-time distinguishers), they need to rely on a naPRF secure against superpolynomial-time distinguishers; in contrast, all known hardness-preserving constructions require ω(1)\omega(1) calls. This leaves open the question of whether a stronger superpolynomial-time assumption is necessary for one-call (or constant-call) approaches. Here, we show that a large class of one-call constructions (which in particular includes the one of Berman and Haitner) cannot be proved to be a secure PRF under a black-box reduction to the (polynomial-time) naPRF security of the underlying function. Our result complements existing impossibility results (Myers, EUROCRYPT \u2704; Pietrzak, CRYPTO \u2705) ruling out natural specific approaches, such as parallel and sequential composition. Furthermore, we show that our techniques extend to rule out a natural class of constructions making parallel but arbitrary number of calls which in particular includes parallel composition and the two-call, cuckoo-hashing based construction of Berman et al.\ (Journal of Cryptology, \u2719)

    Tropical biogeomorphic seagrass landscapes for coastal protection:Persistence and wave attenuation during major storms events

    Get PDF
    The intensity of major storm events generated within the Atlantic Basin is projected to rise with the warming of the oceans, which is likely to exacerbate coastal erosion. Nature-based flood defence has been proposed as a sustainable and effective solution to protect coastlines. However, the ability of natural ecosystems to withstand major storms like tropical hurricanes has yet to be thoroughly tested. Seagrass meadows both stabilise sediment and attenuate waves, providing effective coastal protection services for sandy beaches. To examine the tolerance of Caribbean seagrass meadows to extreme storm events, and to investigate the extent of protection they deliver to beaches, we employed a combination of field surveys, biomechanical measurements and wave modelling simulations. Field surveys of sea- grass meadows before and after a direct hit by the category 5 Hurricane Irma documented that estab- lished seagrass meadows of Thalassia testudinum re- mained unaltered after the extreme storm event. The flexible leaves and thalli of seagrass and calci- fying macroalgae inhabiting the meadows were shown to sustain the wave forces that they are likely to experience during hurricanes. In addition, the seagrass canopy and the complex biogeomorphic landscape built by the seagrass meadows combine to significantly dissipate extreme wave forces, ensuring that erosion is minimised within sandy beach fore- shores. The persistence of the Caribbean seagrass meadows and their coastal protection services dur- ing extreme storm events ensures that a stable coastal ecosystem and beach foreshore is maintained in tropical regions
    corecore