Academic literature on the topic 'Exploitation of public data'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Exploitation of public data.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Exploitation of public data"

1

Pollak, Shaul, Matti Gralka, Yuya Sato, Julia Schwartzman, Lu Lu, and Otto X. Cordero. "Public good exploitation in natural bacterioplankton communities." Science Advances 7, no. 31 (July 2021): eabi4717. http://dx.doi.org/10.1126/sciadv.abi4717.

Full text
Abstract:
Bacteria often interact with their environment through extracellular molecules that increase access to limiting resources. These secretions can act as public goods, creating incentives for exploiters to invade and “steal” public goods away from producers. This phenomenon has been studied extensively in vitro, but little is known about the occurrence and impact of public good exploiters in the environment. Here, we develop a genomic approach to systematically identify bacteria that can exploit public goods produced during the degradation of polysaccharides. Focusing on chitin, a highly abundant marine biopolymer, we show that public good exploiters are active in natural chitin degrading microbial communities, invading early during colonization, and potentially hindering degradation. In contrast to in vitro studies, we find that exploiters and degraders belong to distant lineages, facilitating their coexistence. Our approach opens novel avenues to use the wealth of genomic data available to infer ecological roles and interactions among microbes.
APA, Harvard, Vancouver, ISO, and other styles
2

Pilo, Paola. "Improving Exploitation of Whole Genome Sequencing Data for Public Health, Forensic Microbiology and Biosafety." EBioMedicine 2, no. 11 (November 2015): 1566–67. http://dx.doi.org/10.1016/j.ebiom.2015.11.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pavlova, Kristina, Todor Stoilov, and Krasimira Stoilova. "Bi-Level Model for Public Rail Transportation under Incomplete Data." Cybernetics and Information Technologies 17, no. 3 (September 1, 2017): 75–91. http://dx.doi.org/10.1515/cait-2017-0031.

Full text
Abstract:
Abstract The increase of the utilization of public rail transportations is searched in directions for redistribution of the passenger travels between rail and bus transportation. The rail transport benefits by redistribution of the transportation flows on paths, predominantly supported by rails. The redistribution of the transportation is formalized by bi-level optimization problem. The upper level optimization estimates the maximal flow, which can be transported through a transportation network, supported both by bus and rail transports. The lower level optimization gives priority to the rail transport by decreasing the costs of flow distribution, using rail transport. This bi-level optimization problem was applied for the case of optimization of the rail exploitation in Bulgaria, defining priorities in transportation of the National transport scheme.
APA, Harvard, Vancouver, ISO, and other styles
4

Poveda, Sammia, Melinda Gill, Don Rodney Junio, Hannah Thinyane, and Vanessa Catan. "Should social enterprises complement or supplement public health provision?" Social Enterprise Journal 15, no. 4 (November 28, 2019): 495–518. http://dx.doi.org/10.1108/sej-12-2018-0083.

Full text
Abstract:
Purpose This paper aims to explore how stable employment, company culture and tailored health, digital and core skills training provided by a social enterprise (SE) in the Philippines affect survivors of exploitation. Research shows survivors experience adverse social conditions and physical and mental health outcomes caused by their exploitative experience. Stable, decent employment has been identified as critical to their recovery and reintegration. This paper discusses the SE’s impact on the employees’ physical, mental and social health and behaviour. Based on our findings, the authors discuss the contribution of SE in improving health outcomes and providing health services and conclude that SEs should not replace but complement public health government programmes. Design/methodology/approach This paper uses mixed methods, presenting data from a longitudinal survey (household income, mental health and social well-being) and a follow-up qualitative study, which uses in-depth interviews and participatory videos to explore survey findings. Findings The quantitative analysis demonstrates positive, but gradual, changes in sexual and reproductive health behaviour; personal empowerment; and trauma, anxiety and depressive symptoms. The qualitative findings show how improvements in executive functioning, self-regulation and self-esteem occur incrementally over time. As their self-efficacy improves, employees need to avoid being overly dependent on the SE, to support their autonomy; therefore, access to complementary public health services is fundamental. Originality/value This paper focusses, to the authors’ knowledge, on a unique SE, which hires survivors of exploitation, without losing their competitiveness in the market.
APA, Harvard, Vancouver, ISO, and other styles
5

Goens, Delphine. "The exploitation of Business Register data from a public sector information and data protection perspective: A case study." Computer Law & Security Review 26, no. 4 (July 2010): 398–405. http://dx.doi.org/10.1016/j.clsr.2010.05.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Loukis, Euripidis N., Manolis Maragoudakis, and Niki Kyriakou. "Artificial intelligence-based public sector data analytics for economic crisis policymaking." Transforming Government: People, Process and Policy 14, no. 4 (May 29, 2020): 639–62. http://dx.doi.org/10.1108/tg-11-2019-0113.

Full text
Abstract:
Purpose Public sector has started exploiting artificial intelligence (AI) techniques, however, mainly for operational but much less for tactical or level tasks. The purpose of this study is to exploit AI for the highest strategic-level task of government: to develop an AI-based public sector data analytics methodology for supporting policymaking for one of the most serious and large-scale challenges that governments repeatedly face, the economic crises that lead to economic recessions (though the proposed methodology is of much more general applicability). Design/methodology/approach A public sector data analytics methodology has been developed, which enables the exploitation of existing public and private sector data, through advanced processing of them using a big data-oriented AI technique, “all-relevant” feature selection, to identify characteristics of firms as well as their external environment that affect (positively or negatively) their resilience to economic crisis. Findings A first application of the proposed public sector data analytics methodology has been conducted, using Greek firms’ data concerning the economic crisis period 2009–2014, which has led to interesting conclusions and insights, revealing factors affecting the extent of sales revenue decrease in Greek firms during the above crisis period and providing a first validation of the methodology used in this study. Research limitations/implications This paper contributes to the advancement of two emerging highly important, for the society, but minimally researched, digital government research domains: public sector data analytics (and especially policy analytics) and government exploitation of AI. It exploits an AI feature selection algorithm, the Boruta “all-relevant” variables identification algorithm, which has been minimally exploited in the past for public sector data analytics, to support the design of public policies for addressing one of the most serious and large-scale economic challenges that governments repeatedly face: the economic crises. Practical implications The proposed methodology allows the identification of characteristics of firms as well as their external environment that affect positively or negatively their resilience to economic crisis. This enables a better understanding of the kinds of firms that are more strongly hit by the crisis, which is quite useful for the design of public policies for supporting them; and at the same time reveals firms’ practices, resources, capabilities, etc. that enhance their ability to cope with economic crisis, to design policies for promoting them through educational and support activities. Social implications This methodology can be very useful for the design of more effective public policies for reducing the negative impacts of economic crises on firms, and therefore mitigating their negative consequences for the society, such as unemployment, poverty and social exclusion. Originality/value This study develops a novel approach to the exploitation of public and private sector data, based on a minimally exploited, for such purposes, AI technique (“all-relevant” feature selection), to support the design of public policies for addressing one of the most threatening disruptions that modern economies and societies repeatedly face, the economic crises.
APA, Harvard, Vancouver, ISO, and other styles
7

Arenou, F., X. Luri, C. Babusiaux, C. Fabricius, A. Helmi, A. C. Robin, A. Vallenari, et al. "Gaia Data Release 1." Astronomy & Astrophysics 599 (February 27, 2017): A50. http://dx.doi.org/10.1051/0004-6361/201629895.

Full text
Abstract:
Context. Before the publication of the Gaia Catalogue, the contents of the first data release have undergone multiple dedicated validation tests. Aims. These tests aim to provide in-depth analysis of the Catalogue content in order to detect anomalies and individual problems in specific objects or in overall statistical properties, and either to filter them before the public release or to describe the different caveats on the release for an optimal exploitation of the data. Methods. Dedicated methods using either Gaia internal data, external catalogues, or models have been developed for the validation processes. They test normal stars as well as various populations such as open or globular clusters, double stars, variable stars, and quasars. Properties of coverage, accuracy, and precision of the data are provided by the numerous tests presented here and are jointly analysed to assess the data release content. Results. This independent validation confirms the quality of the published data, Gaia DR1 being the most precise all-sky astrometric and photometric catalogue to date. However, several limitations in terms of completeness, and astrometric or photometric quality are identified and described. Figures describing the relevant properties of the release are shown, and the testing activities carried out validating the user interfaces are also described. A particular emphasis is made on the statistical use of the data in scientific exploitation.
APA, Harvard, Vancouver, ISO, and other styles
8

Charalabidis, Yannis, and Euripidis Loukis. "Participative Public Policy Making Through Multiple Social Media Platforms Utilization." International Journal of Electronic Government Research 8, no. 3 (July 2012): 78–97. http://dx.doi.org/10.4018/jegr.2012070105.

Full text
Abstract:
Described is the research concerning the systematic, intensive and centralized web 2.0 social media exploitation by government agencies for widening and enhancing participative public policy making, which is conducted as part of the research project PADGETS (‘Policy Gadgets Mashing Underlying Group Knowledge in Web 2.0 Media’) partially funded by the European Commission. The proposed approach is based on a central system, which publishes various types of policy-related content (e.g., short text long text, images, video) and micro-applications in multiple social media simultaneously, and also collects from them and processes data on citizens’ interactions (e.g., views, comments, ratings, votes, etc.). Posing difficult research questions and challenges, both technical (analysis and exploitation of social media application programming interfaces (APIs), appropriate design of the central system architecture, processing and integrating the large amounts of collected citizens’ interaction data) and also non-technical (investigation of the value generated by this approach, preconditions for its effective application by government agencies), which are researched in the above project. Some first findings on them are presented and discussed.
APA, Harvard, Vancouver, ISO, and other styles
9

Bedini, Ivan, Feroz Farazi, David Leoni, Juan Pane, Ivan Tankoyeu, and Stefano Leucci. "Open Government Data: Fostering Innovation." JeDEM - eJournal of eDemocracy and Open Government 6, no. 1 (November 14, 2014): 69–79. http://dx.doi.org/10.29379/jedem.v6i1.329.

Full text
Abstract:
The provision of public information contributes to the enrichment and enhancement of the data produced by the government as part of its activities, and the transformation of heterogeneous data into information and knowledge. This process of opening changes the operational mode of public administrations, leveraging the data management, encouraging savings and especially in promoting the development of services in subsidiary and collaborative form between public and private entities. The demand for new services also promotes renewed entrepreneurship centred on responding to new social and territorial needs through new technologies. In this sense we speak of Open Data as an enabling infrastructure for the development of innovation and as an instrument to the development and diffusion of Innovation and Communications Technology (ICT) in the public system as well as creating space for innovation for businesses, particularly SMEs, based on the exploitation of information assets of the territory. The Open Data Trentino Project has initiated and fosters the process of opening of public information and develops as a natural consequence of this process of openness, the creation of innovative services for and with the citizens. In this paper we present how our project acts on long-chain, from raw data till reusable meaningful and scalable knowledge base that leads to the production of data reuse through the implementation of services that will enhance and transform the data into information capable of responding to specific questions efficiency and innovation.
APA, Harvard, Vancouver, ISO, and other styles
10

Cheung, Sarah. "Disambiguating the benefits and risks from public health data in the digital economy." Big Data & Society 7, no. 1 (January 2020): 205395172093392. http://dx.doi.org/10.1177/2053951720933924.

Full text
Abstract:
This article focuses on key roles that the ill-defined concept of ‘public benefit’ plays in accessing the public health data held by the UK’s National Health Service. Using the concept of the ‘trade-off fallacy’, this article argues that current data access and governance structures, based on particular construals of public benefit in the context of public health data, largely negate the possibility of effective control by individuals over future uses of personal health data. This generates a health data version of the trade-off fallacy that enables widespread involvement of commercial actors in personal data, despite public concerns over commercial involvement in, and potential exploitation of, public health data. The article suggests that, despite ostensibly robust regulatory and governance structures, this publicly held data is potentially subject to similar logics of accumulation as seen elsewhere in the digital economy, highlighting the inadequacies of current data regulatory frameworks in the digital era.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Exploitation of public data"

1

Thompson, Julie. "Evolution of multiple alignments : Towards efficient data exploitation and knowledge extraction in the post-genomique era." Université Louis Pasteur (Strasbourg) (1971-2008), 2006. https://publication-theses.unistra.fr/public/theses_doctorat/2006/MAALOUM_Julie_2006.pdf.

Full text
Abstract:
Grâce à la génomique et les technologies protéomiques, la bioinformatique est traversée par une véritable révolution ou l'approche réductioniste traditionnelle est remplacée par de nouvelles stratégies systémiques. Par conséquent, de nouveaux systèmes intégrés sont développés pour la gestion des données hétérogènes, la fouille de l’information et la mise en évidence des connaissances. Dans ce contexte, les alignements multiples de séquences fournissent un environnement idéal pour l'intégration fiable des informations liées à un génome ou un protéome. Durant cette thèse, trois développements ont été réalisés: (i) un banc d’essai pour l’évaluation objective des algorithmes d’alignement, (ii) une ontologie (MAO) des alignements de séquences et de structures, (iii) un système de gestion d’information (MACSIMS) qui exploite l’alignement multiple et l’organisation fournie par l’ontologie. MACSIMS a été utilisé dans plusieurs projets, incluant l'annotation de génomes complets, la caractérisation de cibles pour la protéomique structurale et la prédiction des effets fonctionnels de mutations impliquées dans des pathologies humaines. MACSIMS peut aussi être utilisé pour la mise à l'essai systématique d'hypothèses de recherche et cette approche a été validée dans le cadre d’une étude portant sur la prédiction des sites fonctionnels dans les protéines sur la base de différentes caractéristiques de séquence/structure. Les applications potentielles de MACSIMS touchent aussi bien aux aspects d’annotation automatique de protéines hypothétiques, qu’à des aspects plus structuraux tel que l’étude de motifs ou résidus spécifiques d’un repliement. A l’avenir, on peut penser que ces développements auront des implications dans les domaines aussi divers que le génie des protéines, la modélisation de voies biologiques, ou les stratégies de développement de médicaments
Genomics and proteomics technologies, together with the new systems biology strategies have led to a paradigm shift in bioinformatics. The traditional reductionist approach has been replaced by a more global, integrated view. In this context, new information management systems are now being introduced to collect, store and curate heterogeneous information in ways that will allow its efficient retrieval and exploitation. Multiple sequence alignments provide an ideal environment for the reliable integration of information from a complete genome to a gene and its related products. In the multiple alignment, patterns of conservation and divergence can be used to identify evolutionarily conserved features and important genetic events. In this thesis, three developments are described: (i) a new benchmark for the objective evaluation of multiple alignment algorithms, (ii) a multiple alignment ontology (MAO) for nucleic acid or protein sequences and structures, (iii) an information management system (MACSIMS) that exploits the multiple alignment and the organisation provided by the ontology. MACSIMS has been used in a variety of projects, including complete genome annotation, target characterisation for structural proteomics and the prediction of structural and functional effects of mutations involved in human pathologies. MACSIMS can also be used for the systematic testing of research hypotheses and the rationale is demonstrated by a study of the effectiveness of various sequence/structure characteristics for the prediction of functional sites in proteins. Other potential applications include such fields as the annotation of the numerous hypothetical proteins produced by the genome sequencing projects or the definition of characteristic motifs for specific protein folds. Hopefully, this will also have more wide-reaching consequences in areas such as protein engineering, metabolic modelling, or the development of new drug development strategies
APA, Harvard, Vancouver, ISO, and other styles
2

Kaplangil, Diren. "Les enjeux juridiques de l'Open Data : Les données publiques entre la patrimonialisation et dé-patrimonialisation." Thesis, Université Grenoble Alpes, 2022. http://www.theses.fr/2022GRALD001.

Full text
Abstract:
La thématique de la libération des contenus informationnels issus du secteur public prend une dimension nouvelle avec l’engagement de l’État dans sa politique d’open data. Devenant « ouvertes » au sens libre de droits, les données publiques aujourd’hui ne sont plus considérées comme moyen de l’action publique seul au service des relations démocratiques entretenues entre l’administration et ses administrés, mais apparaissent davantage comme « infrastructure informationnelle » autour de laquelle se dessine l’économie dite « numérique ». Cette transformation quant à l’appréhension des données suscite sans doute la question de leur nature juridique, encore loin d’être précise dans les textes réglementaires. Les aménagements apportés dans le cadre du régime de l’open data semblent les rapprocher des « communs de la connaissance » et laissent penser que ces ressources ne peuvent être privatisées au profit de certains. Pourtant, les pratiques qui interviennent en matière de leur valorisation révèlent la volonté du contrôle de leur exploitation par les institutions publiques qui les détiennent, ou leurs cessionnaires, dont les modèles d’exercice s’apparentent à des formes de propriétés exclusives.Le discours de l’ouverture ne révèle pas seule la question de la nature juridique des données. En effet, la démarche d’open data se situe au cœur de la politique de l’immatériel public de l’État qui cherche à protéger et valoriser toutes ses ressources d’une manière parfois qui contrarie avec les principes de l’ouverture. Notre travail de recherche s’attache donc à l’analyse de cette relation conflictuelle créée autour de la libération des données du secteur public qui embrasse différentes thématiques à la croisée des chemins du droit public et du droit privé, plus précisément des propriétés intellectuelles
The Legal Issues of Open Data: Public data between patrimonialisation and de-patrimonialisationSince the first commitment of the French Government in its open data policy, for a decade now, the issue of free circulation of public sector information takes a new dimension. Considered as « open » in the sense of « free of any restrictive rights », public data do not serve only the democratic goal of consolidating the rights of citizens in their relations with the public authorities, but rather provide an essential « information infrastructure » which constitutes the basis of today's emerging "digital" economy. However, this transformation in apprehension of public data inevitably raises the question of their legal status, which is still far from being clarified. Whereas some adjustments brought under the regime of open data make them legally closer to the legal status of « commons », some other monopolistic practices coming from the public institutions (in particular cultural establishments or their concessionaires) in exploiting the content of their information reveal another approach which is quite close to the form of exclusive property rights.Moreover, opening public data does not only raise the question of the legal nature of these information. Indeed, these information are at the heart of the French State's public policy relating to its intangible assets seeking to protect and exploit them in a way which sometimes may enter into conflict with the principles of open data. At the crossroads of public and private law, more specifically intellectual property law, our thesis is therefore focused on the analysis of this conflictual relationship emerged around the process of proactive release of public sector data online
APA, Harvard, Vancouver, ISO, and other styles
3

Rychlá, Jana. "Marketing bankovních služeb v České spořitelně, a.s." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2008. http://www.nusl.cz/ntk/nusl-221806.

Full text
Abstract:
This diploma work deals with marketing problems of bank services. The theory of marketing bank mix is described in it, creation of marketing campaign and control of relations with clients. The goal is a detection of an embarrassment of marketing methods and campaigns used in Česká spořitelna, then evaluation of this methods and finally making some concept how to solve this situation.
APA, Harvard, Vancouver, ISO, and other styles
4

Arvizo, Adrian E. Janowiak Vincent J. "Field level computer exploitation package." Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FArvizo.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Géraud, Rémi. "Advances in public-key cryptology and computer exploitation." Thesis, Paris Sciences et Lettres (ComUE), 2017. http://www.theses.fr/2017PSLEE057/document.

Full text
Abstract:
La sécurité de l’information repose sur la bonne interaction entre différents niveaux d’abstraction : les composants matériels, systèmes d’exploitation, algorithmes, et réseaux de communication. Cependant, protéger ces éléments a un coût ; ainsi de nombreux appareils sont laissés sans bonne couverture. Cette thèse s’intéresse à ces différents aspects, du point de vue de la sécurité et de la cryptographie. Nous décrivons ainsi de nouveaux algorithmes cryptographiques (tels que des raffinements du chiffrement de Naccache–Stern), de nouveaux protocoles (dont un algorithme d’identification distribuée à divulgation nulle de connaissance), des algorithmes améliorés (dont un nouveau code correcteur et un algorithme efficace de multiplication d’entiers),ainsi que plusieurs contributions à visée systémique relevant de la sécurité de l’information et à l’intrusion. En outre, plusieurs de ces contributions s’attachent à l’amélioration des performances des constructions existantes ou introduites dans cette thèse
Information security relies on the correct interaction of several abstraction layers: hardware, operating systems, algorithms, and networks. However, protecting each component of the technological stack has a cost; for this reason, many devices are left unprotected or under-protected. This thesis addresses several of these aspects, from a security and cryptography viewpoint. To that effect we introduce new cryptographic algorithms (such as extensions of the Naccache–Stern encryption scheme), new protocols (including a distributed zero-knowledge identification protocol), improved algorithms (including a new error-correcting code, and an efficient integer multiplication algorithm), as well as several contributions relevant to information security and network intrusion. Furthermore, several of these contributions address the performance of existing and newly-introduced constructions
APA, Harvard, Vancouver, ISO, and other styles
6

Procopio, Pietro. "Foreground implications in the scientific exploitation of CMB data." Paris 7, 2009. http://www.theses.fr/2009PA077252.

Full text
Abstract:
La première partie de mon travail de thèse se concentre sur la fonction de distribution des photons CMB. En particulier, je montre les implémentations et les phases actualisantes caractérisantes un code d'intégration numérique (KYPRIX) pour la solution de l'équation de Kompaneets dans le contexte cosmologique. Elles ont été aussi exécutées des implémentations physiques: l'introduction de la constante cosmologique dans les équations consacrées pour calculer l'évolution de l'Univers primordial; le choix des abondances chimiques primordiales de H et de He maintenant est possible; les fractions de ionisation pour les espèces impliquées ont été introduites dans les processus physiques; il a été créé une interface optionnelle qui relie KYPRSX avec les codes, comme RECFAST, pour calculer une histoire de recombinaison de la fraction de ionisation de H et de He. Pendant mon deuxième stage à APC j'ai exécuté plusieurs épreuves sur le Planck Sky Model. Les épreuves ont impliqué les deux dernières réalisations du modèle d'émission Galactique, les cartes de foregrounds Galactique tirées par les datus de WMAP et une carte propre de anisotropy du CMB. La dernière réalisation du PSM de la prédiction d'intensité totale des processus Galactiques a montré des résultats en harmonie avec les précédents pour presque toutes les fréquences évaluées, pendant que cela a besoin encore de quelques implémentations à 23 GHz, o l'émission de synchrotron et l'émission de free-free sont plus prominents. J'ai utilisé SM1CA et un autre filtre (le filtre de FFT) que j'ai développé, pour un retraitement de l'IRIS mapset. Les améliorations dramatiques obtenues sur les cartes d'IRIS sont clairement visibles juste par l'oeil
The first part of my thesis work focus on the CMB photon distribution function. I show the implementations and the updating phases characterizing a numerical integration code (KYPRIX) for the solution of the Kompaneets equation in cosmological context. Physical implementations were also performed: the introduction of the cosmological constant; the choice of the primordial chemical abundances of H and He is now possible; the ionization fractions for the species involved have been introduced; it was created an optional interface that links KYPRIX with codes, like RECFAST, in order to calculate a recombination history of the ionization fraction of H and He. Ail of the physical implementations contributed to perform more realistic simulation of the spectral distortion of the CMB. During my second stage at APC I performed several tests on the Planck Sky Model. The tests involved the latest two release of Galactic emission model, the Galactic foreground template derived by WMAP data and a clean CMB anisotropy map. The last release of the PSM total intensity prediction of the Galactic processes showed results consistent with the previous ones for almost ail the frequencies tested, while it still needs some tuning at 23 GHz, where synchrotron emission and free-free emission are more prominent. I started using SMICA (component separation techniques) during my first stage at APC, in 2007. 1 used SMICA, and another filter (FFT filter) I developed, for a reprocessing of the IRIS mapset. A FFT filter was developed for this purpose and I used the filter only on localized regions, not on the full-sky maps. The dramatic improvements obtained on the IRIS maps are clearly visible just by eye
APA, Harvard, Vancouver, ISO, and other styles
7

Elmi, Saïda. "An Advanced Skyline Approach for Imperfect Data Exploitation and Analysis." Thesis, Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2017. http://www.theses.fr/2017ESMA0011/document.

Full text
Abstract:
Ce travail de thèse porte sur un modèle de requête de préférence, appelée l'opérateur Skyline, pour l'exploitation de données imparfaites. L'imperfection de données peut être modélisée au moyen de la théorie de l'évidence. Ce type de données peut être géré dans des bases de données imparfaites appelées bases de données évidentielles. D'autre part, l'opérateur skyline est un outil puissant pour extraire les objets les plus intéressants dans une base de données.Dans le cadre de cette thèse, nous définissons une nouvelle sémantique de l'opérateur Skyline appropriée aux données imparfaites modélisées par la théorie de l'évidence. Nous introduisons par la suite la notion de points marginaux pour optimiser le calcul distribué du Skyline ainsi que la maintenance des objets Skyline en cas d'insertion ou de suppression d'objets dans la base de données.Nous modélisons aussi une fonction de score pour mesurer le degré de dominance de chaque objet skyline et définir le top-k Skyline. Une dernière contribution porte sur le raffinement de la requête Skyline pour obtenir les meilleurs objets skyline appelés objets Etoile ou Skyline stars
The main purpose of this thesis is to study an advanced database tool named the skyline operator in the context of imperfect data modeled by the evidence theory. In this thesis, we first address, on the one hand, the fundamental question of how to extend the dominance relationship to evidential data, and on the other hand, it provides some optimization techniques for improving the efficiency of the evidential skyline. We then introduce efficient approach for querying and processing the evidential skyline over multiple and distributed servers. ln addition, we propose efficient methods to maintain the skyline results in the evidential database context wben a set of objects is inserted or deleted. The idea is to incrementally compute the new skyline, without reconducting an initial operation from the scratch. In the second step, we introduce the top-k skyline query over imperfect data and we develop efficient algorithms its computation. Further more, since the evidential skyline size is often too large to be analyzed, we define the set SKY² to refine the evidential skyline and retrieve the best evidential skyline objects (or the stars). In addition, we develop suitable algorithms based on scalable techniques to efficiently compute the evidential SKY². Extensive experiments were conducted to show the efficiency and the effectiveness of our approaches
APA, Harvard, Vancouver, ISO, and other styles
8

Hayashi, Shogo. "Information Exploration and Exploitation for Machine Learning with Small Data." Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/263774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kurdej, Marek. "Exploitation of map data for the perception of intelligent vehicles." Thesis, Compiègne, 2015. http://www.theses.fr/2015COMP2174/document.

Full text
Abstract:
La plupart des logiciels contrôlant les véhicules intelligents traite de la compréhension de la scène. De nombreuses méthodes existent actuellement pour percevoir les obstacles de façon automatique. La majorité d’entre elles emploie ainsi les capteurs extéroceptifs comme des caméras ou des lidars. Cette thèse porte sur les domaines de la robotique et de la fusion d’information et s’intéresse aux systèmes d’information géographique. Nous étudions ainsi l’utilité d’ajouter des cartes numériques, qui cartographient le milieu urbain dans lequel évolue le véhicule, en tant que capteur virtuel améliorant les résultats de perception. Les cartes contiennent en effet une quantité phénoménale d’information sur l’environnement : sa géométrie, sa topologie ainsi que d’autres informations contextuelles. Dans nos travaux, nous avons extrait la géométrie des routes et des modèles de bâtiments afin de déduire le contexte et les caractéristiques de chaque objet détecté. Notre méthode se base sur une extension de grilles d’occupations : les grilles de perception crédibilistes. Elle permet de modéliser explicitement les incertitudes liées aux données de cartes et de capteurs. Elle présente également l’avantage de représenter de façon uniforme les données provenant de différentes sources : lidar, caméra ou cartes. Les cartes sont traitées de la même façon que les capteurs physiques. Cette démarche permet d’ajouter les informations géographiques sans pour autant leur donner trop d’importance, ce qui est essentiel en présence d’erreurs. Dans notre approche, le résultat de la fusion d’information contenu dans une grille de perception est utilisé pour prédire l’état de l’environnement à l’instant suivant. Le fait d’estimer les caractéristiques des éléments dynamiques ne satisfait donc plus l’hypothèse du monde statique. Par conséquent, il est nécessaire d’ajuster le niveau de certitude attribué à ces informations. Nous y parvenons en appliquant l’affaiblissement temporel. Étant donné que les méthodes existantes n’étaient pas adaptées à cette application, nous proposons une famille d’opérateurs d’affaiblissement prenant en compte le type d’information traitée. Les algorithmes étudiés ont été validés par des tests sur des données réelles. Nous avons donc développé des prototypes en Matlab et des logiciels en C++ basés sur la plate-forme Pacpus. Grâce à eux nous présentons les résultats des expériences effectués en conditions réelles
This thesis is situated in the domains of robotics and data fusion, and concerns geographic information systems. We study the utility of adding digital maps, which model the urban environment in which the vehicle evolves, as a virtual sensor improving the perception results. Indeed, the maps contain a phenomenal quantity of information about the environment : its geometry, topology and additional contextual information. In this work, we extract road surface geometry and building models in order to deduce the context and the characteristics of each detected object. Our method is based on an extension of occupancy grids : the evidential perception grids. It permits to model explicitly the uncertainty related to the map and sensor data. By this means, the approach presents also the advantage of representing homogeneously the data originating from various sources : lidar, camera or maps. The maps are handled on equal terms with the physical sensors. This approach allows us to add geographic information without imputing unduly importance to it, which is essential in presence of errors. In our approach, the information fusion result, stored in a perception grid, is used to predict the stateof environment on the next instant. The fact of estimating the characteristics of dynamic elements does not satisfy the hypothesis of static world. Therefore, it is necessary to adjust the level of certainty attributed to these pieces of information. We do so by applying the temporal discounting. Due to the fact that existing methods are not well suited for this application, we propose a family of discoun toperators that take into account the type of handled information. The studied algorithms have been validated through tests on real data. We have thus developed the prototypes in Matlab and the C++ software based on Pacpus framework. Thanks to them, we present the results of experiments performed in real conditions
APA, Harvard, Vancouver, ISO, and other styles
10

Jacobs, Thomas Richard. "Exploitation of thread- and data-parallelism in video coding algorithms." Thesis, Loughborough University, 2007. https://dspace.lboro.ac.uk/2134/34963.

Full text
Abstract:
MPEG-2, MPEG-4 and H.264 are currently the most popular video coding algorithms for consumer devices. The complexity and computational intensity of their respective encoding processes and the associated power consumption currently limits their full deployment in portable or cost-sensitive consumer devices. This thesis takes two approaches in addressing these performance issues. Firstly in the static partitioning of application's control-flow-graphs using thread-level parallelism to share the computational load between multiple processors in a System-on-Chip multiprocessor configuration. Secondly, two separate design methodologies, one founded in RTL and in the second SystemC, were applied in order to investigate dedicated vector architectures in the acceleration of video encoding through the exploitation of data-level parallel techniques. By implementing two vector datapaths, one from each methodology, a comparison of the two is made. The key contributions of the work are summarised below: (1) demonstration of the reduction in computational workload per processor by exploiting thread-level parallelism; (2) static partitioning of three state-of-the-art video encoders, namely MPEG-2, MPEG-4 and H.264, to permit their execution on a multi-processor environment; (3) design of a vector datapath to accelerate MPEG-4 video encoding by implementing data-level parallelism; (4) comparative study of the potential of the ESL language, SystemC, in the design methodology, in comparison with the RTL.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Exploitation of public data"

1

Chang, Chein-I., ed. Hyperspectral Data Exploitation. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2007. http://dx.doi.org/10.1002/0470124628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Akerkar, Rajendra, ed. Big Data in Emergency Management: Exploitation Techniques for Social and Mobile Data. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48099-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pužman, Josef, and Boris Kubín. Public Data Networks. London: Springer London, 1992. http://dx.doi.org/10.1007/978-1-4471-1737-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

GIS and public data. Clifton Park, N.Y: Thomson/Delmar Learning, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rabin, Jack. Public budgeting laboratory: Data sourcebook. 2nd ed. Athens, Ga: Carl Vinson Institute of Government, University of Georgia, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1949-, Hildreth W. Bartley, and Miller Gerald, eds. Public budgeting laboratory: Data sourcebook. 2nd ed. Athens, Ga: Carl Vinson Institute of Government, University of Georgia, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Jeffrey C., Edward A. Rubin, and Gary J. Cornwall. Data Science for Public Policy. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71352-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jarman, Holly, and Luis F. Luna-Reyes, eds. Private Data and Public Value. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-27823-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Eggensperger, Jim, and Natalie Redcross. Data-Driven Public Relations Research. 1 Edition. | New York : Routledge, 2019.: Routledge, 2018. http://dx.doi.org/10.4324/9781315196688.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schreuder, Hans T. Data estimation and prediction for natural resources public data. [Fort Collins, Colo.?]: U.S. Dept. of Agriculture, Forest Service, Rocky Mountain Research Station, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Exploitation of public data"

1

Walravens, Nils, Pieter Ballon, Mathias Van Compernolle, and Koen Borghys. "Data Ownership and Open Data: The Potential for Data-Driven Policy Making." In The Data Shake, 19–34. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63693-7_2.

Full text
Abstract:
AbstractAs part of the rhetoric surrounding the Smart City concept, cities are increasingly facing challenges related to data (management, governance, processing, storage, publishing etc.). The growing power acquired by the data market and the great relevance assigned to data ownership rather than to data-exploitation knowhow is affecting the development of a data culture and is slowing down the embedding of data-related expertise inside public administrations. Concurrently, policies call for more open data to foster service innovation and government transparency. What are the consequences of these phenomena when imagining the potential for policy making consequent to the growing data quantity and availability? Which strategic challenges and decisions do public authorities face in this regard? What are valuable approaches to arm public administrations in this “war on data”? The Smart Flanders program was initiated by the Flemish Government (Belgium) in 2017 to research and support cities with defining and implementing a common open data policy. As part of the program, a “maturity check” was performed, evaluating the cities on several quantitative and qualitative parameters. This exercise laid to bare some challenges in the field of open data and led to a checklist that cities can employ to begin tackling them, as well as a set of model clauses to be used in the procurement of new technologies.
APA, Harvard, Vancouver, ISO, and other styles
2

Pretzsch, Sebastian, Holger Drees, and Lutz Rittershaus. "Mobility Data Space." In Designing Data Spaces, 343–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_21.

Full text
Abstract:
AbstractTo successfully support decision-making or even automatically make decisions of their own, intelligent transport and mobility systems require large amounts of data. Although multitudes of mobility data are already being collected today, the comprehensive processing and exploitation of this data have often been impossible due to technical, legal, or economic reasons. With Mobility Data Space, an open data space is now being created which offers access to real-time traffic data and sensitive mobility data beyond their secure exchange and which links existing data platforms to each other. In the future, it will thus be possible to provide comprehensive mobility data on a national level.Based on a decentralized system architecture developed by the International Data Spaces Association e. V., the Mobility Data Space offers an ecosystem in which data providers can specify and control the conditions under which their data can be used by third parties. This approach creates data sovereignty as well as trust, and data users can be sure about data origin and quality. By integrating data from the public and private sector via regional and national platforms, the Mobility Data Space will become a digital distribution channel for data-driven business models, providing entirely new options of data acquisition, linking, and exploitation.Whether data provider, user, developer, or end user—the Mobility Data Space takes all acting parties into consideration and offers: Data sovereignty and security along the value chain Standardized access to data from both public and private sources Space for the emergence of new business models, distribution channels and services, as well as a larger selection of innovative mobility services and applications
APA, Harvard, Vancouver, ISO, and other styles
3

Rodrigo Duro, Francisco, Javier Garcia Blas, and Jesus Carretero. "I/O-Focused Cost Model for the Exploitation of Public Cloud Resources in Data-Intensive Workflows." In Algorithms and Architectures for Parallel Processing, 244–57. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49956-7_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schulze, Patrick. "Data Collection and Data Sample." In Balancing Exploitation and Exploration, 142–53. Wiesbaden: Gabler, 2009. http://dx.doi.org/10.1007/978-3-8349-8397-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abramowicz, Witold, Paweł Kalczyński, and Krzysztof Węcel. "Source Exploitation." In Filtering the Web to Feed Data Warehouses, 179–202. London: Springer London, 2002. http://dx.doi.org/10.1007/978-1-4471-0137-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Beavis, William D. "Architectures for Integration of Data and Applications." In Genome Exploitation, 31–47. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/0-387-24187-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Saikia, Anup. "Data and Methods." In Over-Exploitation of Forests, 25–28. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-01408-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schulze, Patrick. "Methodology of Data Analysis." In Balancing Exploitation and Exploration, 78–115. Wiesbaden: Gabler, 2009. http://dx.doi.org/10.1007/978-3-8349-8397-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Holzer, Marc, and Richard W. Schwester. "Existing Data, Big Data, and Analyzing Data." In Public Administration, 332–56. Third edition. | Abingdon, Oxon; New York, NY: Routledge, 2019. |: Routledge, 2019. http://dx.doi.org/10.4324/9780429507878-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

MARSH, TERRY, ROGER MOORE, HARRY DIXON, JAMIE HANNAFORD, ALAN GUSTARD, ANDY YOUNG, MELINDA LEWIS, COLIN NEAL, and GWYN REES. "Hydrological Data Acquisition and Exploitation." In Progress in Modern Hydrology: Past, Present and Future, 324–65. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781119074304.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Exploitation of public data"

1

Ioannidis, Charalabos, Sofia Soile, Athanassios Stamos, Dimitra Vassilaki, Evangelos Maltezos, and Styliani Verykokou. "Exploitation of satellite optical and SAR data for public work studies." In Third International Conference on Remote Sensing and Geoinformation of the Environment, edited by Diofantos G. Hadjimitsis, Kyriacos Themistocleous, Silas Michaelides, and Giorgos Papadavid. SPIE, 2015. http://dx.doi.org/10.1117/12.2193483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Matheus, Ricardo, and Marijn Janssen. "Exploitation and Exploration Strategies to Create Data Transparency in the Public Sector." In ICEGOV '15-16: 9th International Conference on Theory and Practice of Electronic Governance. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2910019.2910091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Paide, Karoline, Ingrid Pappel, Heiko Vainsalu, and Dirk Draheim. "On the Systematic Exploitation of the Estonian Data Exchange Layer X-Road for Strengthening Public-Private Partnerships." In ICEGOV '18: 11th International Conference on Theory and Practice of Electronic Governance. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3209415.3209441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Khan, Muhammad Hanif, Warda Yousaf, Bilal Sadaqat, Naila Javed, and Abdulrahman Olukade. "A Workflow for Shale Play Exploration and Exploitation." In Offshore Technology Conference Asia. OTC, 2022. http://dx.doi.org/10.4043/31504-ms.

Full text
Abstract:
Abstract This article aims to give an outline of an integrated geoscience approach that may apply in the initial identification of the shale play, address complex unconventional reservoirs, their associated challenges and finalise the pilot vertical wells to evaluate their potential. Shale exploration depends on the proven source rock within the basin, so the availability of the required data, well data and seismic data in public domain for initial study and basin screening is usually easy. The investigation may start after knowing the well developed proven source rock in the basin. An extensive study of structure, tectono-stratigraphy, source rock and reservoir characterization, thermal maturity models and exploration strategy is required by using the regional tectonic history, drilled wells with multiple penerations in source rock, open-hole logs, mud samples and cores of the source rock to get the answers to the critical questions on the attributes that influence shale plays. Once these attribute questions have been satisfactorily confirmed to be in the required range or with an analog, that data can be utilized to locate possible sweet spots to drill pilot vertical wells with the goal of acquiring extensive coring, open hole logging and formation pressure testing data to identify the best candidates for further horizontal well evaluation. This article highlights and demonstrates a possible step by step workflow for the selection of the shale play area, sweet spot and pilot vertical wells locations by using the schematic data maps, published material examples and building possible cut offs essential for exploration decision process.
APA, Harvard, Vancouver, ISO, and other styles
5

Gerni, Mine, Ömer Selçuk Emsen, Dilek Özdemir, and Özge Buzdağlı. "Determinants of Corruption and their Relationship to Growth." In International Conference on Eurasian Economies. Eurasian Economists Association, 2012. http://dx.doi.org/10.36880/c03.00406.

Full text
Abstract:
Corruption defined as the exploitation of the public institute for personal benefit has displayed itself in many societies in different ways throughout the history. Lack of information regarding presence and pervasiveness of corruption in central planning economies has been removed as a result of a transition to free market economies and the phenomenon of corruption has begun to be examined through diverse angles. Thus, in this study, the determinants of corruption were investigated and corruption-growth relationship was examined between 2002 and 2010. As for the parameters believed to determine corruption, openness of economy, size of the public, economic freedom, political stability, GDP per capita, urbanization growth rate, inflation, EBRD and HDI index regarding education and health were taken into consideration. Investigation of the relationship between the CPI (Corruption index) and the aforementioned variables and corruption-growth relationship were analyzed by means of panel data analysis.
APA, Harvard, Vancouver, ISO, and other styles
6

Perko, Jurica, Danijel Topic, and Damir Sljivac. "Exploitation of public lighting infrastructural possibilities." In 2016 International Conference on Smart Systems and Technologies (SST). IEEE, 2016. http://dx.doi.org/10.1109/sst.2016.7765632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xiaohan, Zeng, and Tu Yongqian. "The Game of Capital: Prosperity or Exploitation?" In 2021 International Conference on Public Relations and Social Sciences (ICPRSS 2021). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.211020.334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Habibi, Mohammad S. "Data exploitation using visual analytics." In 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012). IEEE, 2012. http://dx.doi.org/10.1109/isi.2012.6284299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zeng, Qi, Rakesh Jha, Shigang Chen, and Jih-Kwon Peir. "Data Locality Exploitation in Cache Compression." In 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2018. http://dx.doi.org/10.1109/padsw.2018.8644558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Natali, S., A. Beccati, S. D'Elia, M. G. Veratelli, P. Campalani, M. Folegani, and S. Mantovani. "Multitemporal data management and exploitation infrastructure." In 2011 6th International Workshop on the Analysis of Multi-temporal Remote Sensing Images (Multi-Temp). IEEE, 2011. http://dx.doi.org/10.1109/multi-temp.2011.6005087.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Exploitation of public data"

1

Kamath, C., D. Poland, S. Sengupta, and J. Futterman. Automated Image Data Exploitation Final Report. Office of Scientific and Technical Information (OSTI), January 2004. http://dx.doi.org/10.2172/15013923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Porter, Reid B., James P. Theiler, and Donald R. Hush. Interactive Machine Learning in Data Exploitation. Office of Scientific and Technical Information (OSTI), January 2013. http://dx.doi.org/10.2172/1060903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moreland, Ken, Dave Pugmire, and Jieyang Chen. The Exploitation of Data Reduction for Visualization. Office of Scientific and Technical Information (OSTI), August 2022. http://dx.doi.org/10.2172/1881112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

MacDonald, Stuart, Connor Rees, and Joost S. Remove, Impede, Disrupt, Redirect: Understanding & Combating Pro-Islamic State Use of File-Sharing Platforms. RESOLVE Network, April 2022. http://dx.doi.org/10.37805/ogrr2022.1.

Full text
Abstract:
In the face of content takedown and account suspensions on the biggest social media platforms, terrorist groups and their supporters have resorted to the use of file-sharing sites to ensure stable access to their propaganda. Amongst those to have employed this strategy are supporters of the so-called Islamic State (IS). Yet, while studies have repeatedly highlighted the key role that file-sharing platforms play in the dissemination of IS propaganda, there has been little investigation of the strategic considerations that may influence the choice of file-sharing sites from the many available. To address this, this report uses data gathered from 13 public IS Telegram channels over a 45-day period in July - September 2021 to assess three possible strategic considerations: the features offered by different file-sharing sites (such as data storage capacity, maximum upload size, and password file protection); a platform’s enforcement activity; and the ability to generate large banks of URLs quickly and conveniently. Based on these findings, the report proposes a four-pronged strategy to combat the exploitation of file-sharing sites by supporters of IS and other terrorist groups: remove terrorist content at the point of upload; impede the automated generation and dissemination of banks of URLs; disrupt the posting of these URLs on other platforms; and redirect users to other content and support services.
APA, Harvard, Vancouver, ISO, and other styles
5

Hodgkiss, W. S. Exploitation of Environmental Complexity in Shallow Water Acoustic Data Communications. Fort Belvoir, VA: Defense Technical Information Center, September 2006. http://dx.doi.org/10.21236/ada612631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hodgkiss, W. S. Exploitation of Environmental Complexity in Shallow Water Acoustic Data Communications. Fort Belvoir, VA: Defense Technical Information Center, September 2007. http://dx.doi.org/10.21236/ada541268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alföldi, T. Exploitation of Network Technologies for GeoSpatial Data Research and Commerce. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1999. http://dx.doi.org/10.4095/219366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cook, K., S. Nikolaev, and M. Huber. The Large Synoptic Survey Telescope and Foundations for Data Exploitation of Petabyte Data Sets. Office of Scientific and Technical Information (OSTI), February 2007. http://dx.doi.org/10.2172/902312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hanratty, Timothy, and John Richardson. A Visual Analytic for High-Dimensional Data Exploitation: The Heterogeneous Data-Reduction Proximity Tool. Fort Belvoir, VA: Defense Technical Information Center, July 2013. http://dx.doi.org/10.21236/ada591619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Balza, Lenin, Camilo De Los Rios, and Nathaly M. Rivera. Digging Deep: Resource Exploitation and Higher Education. Inter-American Development Bank, October 2022. http://dx.doi.org/10.18235/0004495.

Full text
Abstract:
Do resource-extraction booms crowd out postsecondary education? We explore this question by examining the higher education-related decisions of Chilean high school graduates during the 2000s commodities boom. We find mineral extraction increases a person's likelihood of enrolling in postsecondary technical education while reducing the likelihood of completing a four-year professional degree program. Importantly, effects are heterogeneous across economic backgrounds. The impact on college dropouts is primarily present among students that graduated from public high schools, which generally cater to low-income groups. Our findings show that natural resources may affect human capital accumulation differently across income groups in resource-rich economies.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography