Dissertations / Theses on the topic 'Exploitation of public data'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Exploitation of public data.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Thompson, Julie. "Evolution of multiple alignments : Towards efficient data exploitation and knowledge extraction in the post-genomique era." Université Louis Pasteur (Strasbourg) (1971-2008), 2006. https://publication-theses.unistra.fr/public/theses_doctorat/2006/MAALOUM_Julie_2006.pdf.
Full textGenomics and proteomics technologies, together with the new systems biology strategies have led to a paradigm shift in bioinformatics. The traditional reductionist approach has been replaced by a more global, integrated view. In this context, new information management systems are now being introduced to collect, store and curate heterogeneous information in ways that will allow its efficient retrieval and exploitation. Multiple sequence alignments provide an ideal environment for the reliable integration of information from a complete genome to a gene and its related products. In the multiple alignment, patterns of conservation and divergence can be used to identify evolutionarily conserved features and important genetic events. In this thesis, three developments are described: (i) a new benchmark for the objective evaluation of multiple alignment algorithms, (ii) a multiple alignment ontology (MAO) for nucleic acid or protein sequences and structures, (iii) an information management system (MACSIMS) that exploits the multiple alignment and the organisation provided by the ontology. MACSIMS has been used in a variety of projects, including complete genome annotation, target characterisation for structural proteomics and the prediction of structural and functional effects of mutations involved in human pathologies. MACSIMS can also be used for the systematic testing of research hypotheses and the rationale is demonstrated by a study of the effectiveness of various sequence/structure characteristics for the prediction of functional sites in proteins. Other potential applications include such fields as the annotation of the numerous hypothetical proteins produced by the genome sequencing projects or the definition of characteristic motifs for specific protein folds. Hopefully, this will also have more wide-reaching consequences in areas such as protein engineering, metabolic modelling, or the development of new drug development strategies
Kaplangil, Diren. "Les enjeux juridiques de l'Open Data : Les données publiques entre la patrimonialisation et dé-patrimonialisation." Thesis, Université Grenoble Alpes, 2022. http://www.theses.fr/2022GRALD001.
Full textThe Legal Issues of Open Data: Public data between patrimonialisation and de-patrimonialisationSince the first commitment of the French Government in its open data policy, for a decade now, the issue of free circulation of public sector information takes a new dimension. Considered as « open » in the sense of « free of any restrictive rights », public data do not serve only the democratic goal of consolidating the rights of citizens in their relations with the public authorities, but rather provide an essential « information infrastructure » which constitutes the basis of today's emerging "digital" economy. However, this transformation in apprehension of public data inevitably raises the question of their legal status, which is still far from being clarified. Whereas some adjustments brought under the regime of open data make them legally closer to the legal status of « commons », some other monopolistic practices coming from the public institutions (in particular cultural establishments or their concessionaires) in exploiting the content of their information reveal another approach which is quite close to the form of exclusive property rights.Moreover, opening public data does not only raise the question of the legal nature of these information. Indeed, these information are at the heart of the French State's public policy relating to its intangible assets seeking to protect and exploit them in a way which sometimes may enter into conflict with the principles of open data. At the crossroads of public and private law, more specifically intellectual property law, our thesis is therefore focused on the analysis of this conflictual relationship emerged around the process of proactive release of public sector data online
Rychlá, Jana. "Marketing bankovních služeb v České spořitelně, a.s." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2008. http://www.nusl.cz/ntk/nusl-221806.
Full textArvizo, Adrian E. Janowiak Vincent J. "Field level computer exploitation package." Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FArvizo.pdf.
Full textGéraud, Rémi. "Advances in public-key cryptology and computer exploitation." Thesis, Paris Sciences et Lettres (ComUE), 2017. http://www.theses.fr/2017PSLEE057/document.
Full textInformation security relies on the correct interaction of several abstraction layers: hardware, operating systems, algorithms, and networks. However, protecting each component of the technological stack has a cost; for this reason, many devices are left unprotected or under-protected. This thesis addresses several of these aspects, from a security and cryptography viewpoint. To that effect we introduce new cryptographic algorithms (such as extensions of the Naccache–Stern encryption scheme), new protocols (including a distributed zero-knowledge identification protocol), improved algorithms (including a new error-correcting code, and an efficient integer multiplication algorithm), as well as several contributions relevant to information security and network intrusion. Furthermore, several of these contributions address the performance of existing and newly-introduced constructions
Procopio, Pietro. "Foreground implications in the scientific exploitation of CMB data." Paris 7, 2009. http://www.theses.fr/2009PA077252.
Full textThe first part of my thesis work focus on the CMB photon distribution function. I show the implementations and the updating phases characterizing a numerical integration code (KYPRIX) for the solution of the Kompaneets equation in cosmological context. Physical implementations were also performed: the introduction of the cosmological constant; the choice of the primordial chemical abundances of H and He is now possible; the ionization fractions for the species involved have been introduced; it was created an optional interface that links KYPRIX with codes, like RECFAST, in order to calculate a recombination history of the ionization fraction of H and He. Ail of the physical implementations contributed to perform more realistic simulation of the spectral distortion of the CMB. During my second stage at APC I performed several tests on the Planck Sky Model. The tests involved the latest two release of Galactic emission model, the Galactic foreground template derived by WMAP data and a clean CMB anisotropy map. The last release of the PSM total intensity prediction of the Galactic processes showed results consistent with the previous ones for almost ail the frequencies tested, while it still needs some tuning at 23 GHz, where synchrotron emission and free-free emission are more prominent. I started using SMICA (component separation techniques) during my first stage at APC, in 2007. 1 used SMICA, and another filter (FFT filter) I developed, for a reprocessing of the IRIS mapset. A FFT filter was developed for this purpose and I used the filter only on localized regions, not on the full-sky maps. The dramatic improvements obtained on the IRIS maps are clearly visible just by eye
Elmi, Saïda. "An Advanced Skyline Approach for Imperfect Data Exploitation and Analysis." Thesis, Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2017. http://www.theses.fr/2017ESMA0011/document.
Full textThe main purpose of this thesis is to study an advanced database tool named the skyline operator in the context of imperfect data modeled by the evidence theory. In this thesis, we first address, on the one hand, the fundamental question of how to extend the dominance relationship to evidential data, and on the other hand, it provides some optimization techniques for improving the efficiency of the evidential skyline. We then introduce efficient approach for querying and processing the evidential skyline over multiple and distributed servers. ln addition, we propose efficient methods to maintain the skyline results in the evidential database context wben a set of objects is inserted or deleted. The idea is to incrementally compute the new skyline, without reconducting an initial operation from the scratch. In the second step, we introduce the top-k skyline query over imperfect data and we develop efficient algorithms its computation. Further more, since the evidential skyline size is often too large to be analyzed, we define the set SKY² to refine the evidential skyline and retrieve the best evidential skyline objects (or the stars). In addition, we develop suitable algorithms based on scalable techniques to efficiently compute the evidential SKY². Extensive experiments were conducted to show the efficiency and the effectiveness of our approaches
Hayashi, Shogo. "Information Exploration and Exploitation for Machine Learning with Small Data." Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/263774.
Full textKurdej, Marek. "Exploitation of map data for the perception of intelligent vehicles." Thesis, Compiègne, 2015. http://www.theses.fr/2015COMP2174/document.
Full textThis thesis is situated in the domains of robotics and data fusion, and concerns geographic information systems. We study the utility of adding digital maps, which model the urban environment in which the vehicle evolves, as a virtual sensor improving the perception results. Indeed, the maps contain a phenomenal quantity of information about the environment : its geometry, topology and additional contextual information. In this work, we extract road surface geometry and building models in order to deduce the context and the characteristics of each detected object. Our method is based on an extension of occupancy grids : the evidential perception grids. It permits to model explicitly the uncertainty related to the map and sensor data. By this means, the approach presents also the advantage of representing homogeneously the data originating from various sources : lidar, camera or maps. The maps are handled on equal terms with the physical sensors. This approach allows us to add geographic information without imputing unduly importance to it, which is essential in presence of errors. In our approach, the information fusion result, stored in a perception grid, is used to predict the stateof environment on the next instant. The fact of estimating the characteristics of dynamic elements does not satisfy the hypothesis of static world. Therefore, it is necessary to adjust the level of certainty attributed to these pieces of information. We do so by applying the temporal discounting. Due to the fact that existing methods are not well suited for this application, we propose a family of discoun toperators that take into account the type of handled information. The studied algorithms have been validated through tests on real data. We have thus developed the prototypes in Matlab and the C++ software based on Pacpus framework. Thanks to them, we present the results of experiments performed in real conditions
Jacobs, Thomas Richard. "Exploitation of thread- and data-parallelism in video coding algorithms." Thesis, Loughborough University, 2007. https://dspace.lboro.ac.uk/2134/34963.
Full textRamljak, Dusan. "Data Driven High Performance Data Access." Diss., Temple University Libraries, 2018. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/530207.
Full textPh.D.
Low-latency, high throughput mechanisms to retrieve data become increasingly crucial as the cyber and cyber-physical systems pour out increasing amounts of data that often must be analyzed in an online manner. Generally, as the data volume increases, the marginal utility of an ``average'' data item tends to decline, which requires greater effort in identifying the most valuable data items and making them available with minimal overhead. We believe that data analytics driven mechanisms have a big role to play in solving this needle-in-the-haystack problem. We rely on the claim that efficient pattern discovery and description, coupled with the observed predictability of complex patterns within many applications offers significant potential to enable many I/O optimizations. Our research covers exploitation of storage hierarchy for data driven caching and tiering, reduction of distance between data and computations, removing redundancy in data, using sparse representations of data, the impact of data access mechanisms on resilience, energy consumption, storage usage, and the enablement of new classes of data driven applications. For caching and prefetching, we offer a powerful model that separates the process of access prediction from the data retrieval mechanism. Predictions are made on a data entity basis and used the notions of ``context'' and its aspects such as ``belief'' to uncover and leverage future data needs. This approach allows truly opportunistic utilization of predictive information. We elaborate on which aspects of the context we are using in areas other than caching and prefetching different situations and why it is appropriate in the specified situation. We present in more details the methods we have developed, BeliefCache for data driven caching and prefetching and AVSC for pattern mining based compression of data. In BeliefCache, using a belief, an aspect of context representing an estimate of the probability that the storage element will be needed, we developed modular framework BeliefCache, to make unified informed decisions about that element or a group. For the workloads we examined we were able to capture complex non-sequential access patterns better than a state-of-the-art framework for optimizing cloud storage gateways. Moreover, our framework is also able to adjust to variations in the workload faster. It also does not require a static workload to be effective since modular framework allows for discovering and adapting to the changes in the workload. In AVSC, using an aspect of context to gauge the similarity of the events, we perform our compression by keeping relevant events intact and approximating other events. We do that in two stages. We first generate a summarization of the data, then approximately match the remaining events with the existing patterns if possible, or add the patterns to the summary otherwise. We show gains over the plain lossless compression for a specified amount of accuracy for purposes of identifying the state of the system and a clear tradeoff in between the compressibility and fidelity. In other mentioned research areas we present challenges and opportunities with the hope that will spur researchers to further examine those issues in the space of rapidly emerging data intensive applications. We also discuss the ideas how our research in other domains could be applied in our attempts to provide high performance data access.
Temple University--Theses
Lee, Kenneth Sydney. "Characterization and Exploitation of GPU Memory Systems." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/34215.
Full textMaster of Science
Fragkou, Aikaterini. "Greek Primary Educators' Perceptions of Strategies for Mitigating Cyber Child Exploitation." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5335.
Full textDe, Vettor Pierre. "A Resource-Oriented Architecture for Integration and Exploitation of Linked Data." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE1176/document.
Full textIn this thesis, we focus on data integration of raw data coming from heterogeneous and multi-origin data sources on the Web. The global objective is to provide a generic and adaptive architecture able to analyze and combine this heterogeneous, informal, and sometimes meaningless data into a coherent smart data set. We define smart data as significant, semantically explicit data, ready to be used to fulfill the stakeholders' objective. This work is motivated by a live scenario from the French {\em Audience Labs} company. In this report, we propose new models and techniques to adapt the combination and integration process to the diversity of data sources. We focus on transparency and dynamicity in data source management, scalability and responsivity according to the number of data sources, adaptability to data source characteristics, and finally consistency of produced data (coherent data, without errors and duplicates). In order to address these challenges, we first propose a meta-models in order to represent the variety of data source characteristics, related to access (URI, authentication) extraction (request format), or physical characteristics (volume, latency). By relying on this coherent formalization of data sources, we define different data access strategies in order to adapt access and processing to data source capabilities. With help form these models and strategies, we propose a distributed resource oriented software architecture, where each component is freely accessible through REST via its URI. The orchestration of the different tasks of the integration process can be done in an optimized way, regarding data source and data characteristics. This data allows us to generate an adapted workflow, where tasks are prioritized amongst other in order to fasten the process, and by limiting the quantity of data transfered. In order to improve the data quality of our approach, we then focus on the data uncertainty that could appear in a Web context, and propose a model to represent uncertainty in a Web context. We introduce the concept of Web resource, based on a probabilistic model where each resource can have different possible representations, each with a probability. This approach will be the basis of a new architecture optimization allowing to take uncertainty into account during our combination process
Debuse, J. C. W. "Exploitation of modern heuristic techniques within a commercial data mining environment." Thesis, University of East Anglia, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.389330.
Full textSmith, Ashley Nicole. "End-to-End Classification Process for the Exploitation of Vibrometry Data." Wright State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=wright1421104791.
Full textMcGuinness, Christopher. "Characterizing Remote Sensing Data Compression Distortion for Improved Automated Exploitation Performance." University of Dayton / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1524844209730534.
Full textPonchateau, Cyrille. "Conception et exploitation d'une base de modèles : application aux data sciences." Thesis, Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2018. http://www.theses.fr/2018ESMA0005/document.
Full textIt is common practice in experimental science to use time series to represent experimental results, that usually come as a list of values in chronological order (indexed by time) and generally obtained via sensors connected to the studied physical system. Those series are analyzed to obtain a mathematical model that allow to describe the data and thus to understand and explain the behavio rof the studied system. Nowadays, storage and analyses technologies for time series are numerous and mature, but the storage and management technologies for mathematical models and their linking to experimental numerical data are both scarce and recent. Still, mathematical models have an essential role to play in the interpretation and validation of experimental results. Consequently, an adapted storage system would ease the management and re-usability of mathematical models. This work aims at developing a models database to manage mathematical models and provide a “query by data” system, to help retrieve/identify a model from an experimental time series. In this work, I will describe the conception (from the modeling of the system, to its software architecture) of the models database and its extensions to allow the “query by data”. Then, I will describe the prototype of models database,that I implemented and the results obtained by tests performed on the latter
Axetun, Magnus. "Securing hospitals from exploitation of hardware ports." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-143259.
Full textPeloton, Julien. "Data analysis and scientific exploitation of the CMB B-modes experiment, POLARBEAR." Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCC154.
Full textOver the last two decades cosmology has been transformed from a data-starved to a data-driven, high precision science. N This transformation happened thanks to improved observational techniques, allowing to collect progressively bigger and more powerful data sets. Studies of the Cosmic Microwave Background (CMB) anisotropies have played, and continue on doing so, a particularly important and impactful role in this process. The huge data sets produced by recent CMB experiments pose new challenges for the field due to their volumes and complexity. Its successful resolution requires combining mathematical, statistical and computational methods aIl of which form a keystone of the modern CMB data analysis. In this thesis, I describe data analysis of the first data set produced by one of the most advanced, current CMB experiments, POLARBEAR and the major results it produced. The POLARBEAR experiment is a leading CMB B-mode polarization experiment aiming at detection and characterization of the so-called B-mode signature of the CMB polarization. This is one of the most exciting topics in the current CMB research, which only just has started yielding new insights onto cosmology in part thanks to the results discussed hereafter. In this thesis I describe first the modern cosmological model, focusing on the physics of the CMB, and in particular its polarization properties, and providing an overview of the past experiments and results. Subsequently, I present the POLARBEAR instrument, data analysis of its first year data set and the scientific results drawn from it, emphasizing my major contributions to the overall effort. In the last chapter, and in the context of the next generation CMB B-mode experiments, I present a more systematic study of the impact of the presence of the so-called E-to-B leakage on the performance forecasts of CMB B-modes experiments, by comparing several methods including the pure pseudospectrum method and the minimum variance quadratic estimator. In particular, I detail how the minimum variance quadratic estimator in the case of azimuthally symmetric patches can be used to estimate efficiently parameters, and I present an efficient implementation based on existing parallel algorithms for computing Spherical Harmonic Transforms
Coble, Keith. "Drowning in Data, Starving for Knowledge OMEGA Data Environment." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605343.
Full textThe quantity T&E data has grown in step with the increase in computing power and digital storage. T&E data management and exploitation technologies have not kept pace with this exponential growth. New approaches to the challenges posed by this data explosion must provide for continued growth while providing seamless integration with the existing body of work. Object Oriented Data Management provides the framework to handle the continued rapid growth in computer speed and the amount of data gathered and legacy integration. The OMEGA Data Environment is one of the first commercially available examples of this emerging class of OODM applications.
Welte, Anthony. "Spatio-temporal data fusion for intelligent vehicle localization." Thesis, Compiègne, 2020. http://bibliotheque.utc.fr/EXPLOITATION/doc/IFD/2020COMP2572.
Full textLocalization is an essential basic capability for vehicles to be able to navigate autonomously on the road. This can be achieved through already available sensors and new technologies (Iidars, smart cameras). These sensors combined with highly accurate maps result in greater accuracy. In this work, the benefits of storing and reusing information in memory (in data buffers) are explored. Localization systems need to perform a high-frequency estimation, map matching, calibration and error detection. A framework composed of several processing layers is proposed and studied. A main filtering layer estimates the vehicle pose while other layers address the more complex problems. High-frequency state estimation relies on proprioceptive measurements combined with GNSS observations. Calibration is essential to obtain an accurate pose. By keeping state estimates and observations in a buffer, the observation models of these sensors can be calibrated. This is achieved using smoothed estimates in place of a ground truth. Lidars and smart cameras provide measurements that can be used for localization but raise matching issues with map features. In this work, the matching problem is addressed on a spatio-temporal window, resulting in a more detailed pictur of the environment. The state buffer is adjusted using the observations and all possible matches. Although using mapped features for localization enables to reach greater accuracy, this is only true if the map can be trusted. An approach using the post smoothing residuals has been developed to detect changes and either mitigate or reject the affected features
Skeppstedt, David. "Identification and Exploitation of Vulnerabilities in a Large-Scale ITSystem." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-261423.
Full textI detta examensarbete har ett storskaligt IT-system säkerhetsgranskats. Metoden som har används är penetrationstest och hotmodellering. Resultatet är en tillförlitlig överbelastningsattack som utnyttjar två av de fem sårbarheter som har upptäckts. Attacken utnyttjar ett fel i auktoriseringsflöde och en buffertöverfyllning. Konsekvenser av attacken och sårbarheterna diskuteras. Slutsatsen är att resultatet kommer att bidra till att IT-systemet blir säkrare men om fler sårbarheter hade hittats så skulle attacken kunnat ha bättre verkan på målet.
Garnaud, Eve. "Dépendances fonctionnelles : extraction et exploitation." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2013. http://tel.archives-ouvertes.fr/tel-00951619.
Full textLassalle, Guillaume. "Exploitation of hyperspectral data for assessing vegetation health under exposure to petroleum hydrocarbons." Thesis, Toulouse, ISAE, 2019. http://www.theses.fr/2019ESAE0030.
Full textOil exploration and contamination monitoring remain limited in regions covered by vegetation. Natural seepages and oil leakages due to facility failures are often masked by the foliage, making ineffective the current technologies used for detecting crude oil and petroleum products. However, the exposure of vegetation to oil affects its health and, consequently, its optical properties in the [400:2500] nm domain. This suggest being able to detect seepages and leakages indirectly, by analyzing vegetation health through its spectral reflectance. Based on this assumption, this thesis evaluates the potential of airborne hyperspectral imagery with high spatial resolution for detecting and quantifying oil contamination in vegetated regions. To achieve this, a three-step multiscale approach was adopted. The first step aimed at developing a method for detecting and characterizing the contamination under controlled conditions, by exploiting the optical properties of Rubus fruticosus L. The proposed method combines 14 vegetation indices in classification and allows detecting various oil contaminants accurately, from leaf to canopy scale. Its use under natural conditions was validated on a contaminated mud pit colonized by the same species. During the second step, a method for quantifying total petroleum hydrocarbons, based on inverting the PROSPECT model, was developed. The method exploits the pigment content of leaves, estimated from their spectral signature, for predicting the level of hydrocarbon contamination in soils accurately. The last step of the approach demonstrated the robustness of the two methods using airborne imagery. They proved performing for detecting and quantifying mud pit contamination. Another method of quantification, based on multiple regression, was proposed. At the end of this thesis, the three methods proposed were validated for use both on the field, at leaf and canopy scales, and on airborne hyperspectral images with high spatial resolution. Their performances depend however on the species, the season and the level of soil contamination. A similar approach was conducted under tropical conditions, allowing the development of a method for quantifying the contamination adapted to this context. In a perspective of operational use, an important effort is still required for extending the scope of the methods to other contexts and for anticipating their use on satellite- and drone-embedded hyperspectral sensors. Finally, the contribution of active remote sensing (radar and LiDAR) should be considered in further research, in order to overcome some of the limits specific to passive optical remote sensing
Bouali, Tarek. "Platform for efficient and secure data collection and exploitation in intelligent vehicular networks." Thesis, Dijon, 2016. http://www.theses.fr/2016DIJOS003/document.
Full textNowadays, automotive area is witnessing a tremendous evolution due to the increasing growth in communication technologies, environmental sensing & perception aptitudes, and storage & processing capacities that we can find in recent vehicles. Indeed, a car is being a kind of intelligent mobile agent able to perceive its environment, sense and process data using on-board systems and interact with other vehicles or existing infrastructure. These advancements stimulate the development of several kinds of applications to enhance driving safety and efficiency and make traveling more comfortable. However, developing such advanced applications relies heavily on the quality of the data and therefore can be realized only with the help of a secure data collection and efficient data treatment and analysis. Data collection in a vehicular network has been always a real challenge due to the specific characteristics of these highly dynamic networks (frequent changing topology, vehicles speed and frequent fragmentation), which lead to opportunistic and non long lasting communications. Security, remains another weak aspect in these wireless networks since they are by nature vulnerable to various kinds of attacks aiming to falsify collected data and affect their integrity. Furthermore, collected data are not understandable by themselves and could not be interpreted and understood if directly shown to a driver or sent to other nodes in the network. They should be treated and analyzed to extract meaningful features and information to develop reliable applications. In addition, developed applications always have different requirements regarding quality of service (QoS). Several research investigations and projects have been conducted to overcome the aforementioned challenges. However, they still did not meet perfection and suffer from some weaknesses. For this reason, we focus our efforts during this thesis to develop a platform for a secure and efficient data collection and exploitation to provide vehicular network users with efficient applications to ease their travel with protected and available connectivity. Therefore, we first propose a solution to deploy an optimized number of data harvesters to collect data from an urban area. Then, we propose a new secure intersection based routing protocol to relay data to a destination in a secure manner based on a monitoring architecture able to detect and evict malicious vehicles. This protocol is after that enhanced with a new intrusion detection and prevention mechanism to decrease the vulnerability window and detect attackers before they persist their attacks using Kalman filter. In a second part of this thesis, we concentrate on the exploitation of collected data by developing an application able to calculate the most economic itinerary in a refined manner for drivers and fleet management companies. This solution is based on several information that may affect fuel consumption, which are provided by vehicles and other sources in Internet accessible via specific APIs, and targets to economize money and time. Finally, a spatio-temporal mechanism allowing to choose the best available communication medium is developed. This latter is based on fuzzy logic to assess a smooth and seamless handover, and considers collected information from the network, users and applications to preserve high quality of service
Masson, Romain. "La valorisation des biens publics." Thesis, Paris 10, 2018. http://www.theses.fr/2018PA100094.
Full textThis research aims to identify and define the concept of valorization applied to public properties based on its double foundation, the right to property and the proper use of public funds. This concept is based on two components, exploitation and disposal, which highlight the multiple forms of valorization : economic, social, environmental. These valorisation events renew the analysis in order to better understand the stake of the reform of the law of the public properties, the way in which the valorization has influenced this right and the evolutions to come. Thus, the approximation of state regimes has made it possible to soften and modernize valorization tools and the legal principles governing the public domain. This rapprochement should lead to a unification of jurisdiction for the benefit of the administrative judge. In addition, under the impetus of the valorization, new obligations are imposed on the public owners : competition of the public occupations, inventory of the properties, valorization of the future
Arnaud, Bérenger. "Exploitation et partage de données hétérogènes et dynamiques." Thesis, Montpellier 2, 2013. http://www.theses.fr/2013MON20025/document.
Full textIn the context of numeric data, the software development costs entail a number of cost factors. In contrast, adapting generic tools has its own set of costs, requiring developer's integration and final user's adaptation. The aim of our approach is to consider the different points of interaction with the data to improve the exploitation of data, whether provided or generated from collaboration.The definitions and problems related to data are dependent upon the domain from which the data come and the treatment that have been applied to them. In this work we have opted for a holistic approach where we consider the range of angles. The result is a summary of the emergent concepts and domain equivalences.The first contribution consists of improving collaborative document mark-up. Two improvements are proposed by out tool – Coviz –. 1) Resource tagging which is unique to each user, who organises their own labels according to their personal poly-hierarchy. Each user may take into consideration other users approaches through sharing of tags. The system supplies additional context through a harvesting of documents in open archives. 2) The tool applies the concept of facets to the interface and then combines them to provide a search by keyword or characteristic selection. This point is shared by all users and the actions of an individual user impact the whole group.The major contribution, which is confidential, is a framework christened DIP for Data Interaction and Presentation. Its goal is to increase the freedom of expression of the user over the interaction and access to data. It reduces the hardware and software constrains by adding a new access point between the user and the raw data as well as generic pivots. From a final point of view the user gains in expression of filtering, in sharing, in state persistence of the navigator, in automation of day-to-day tasks, etc.DIP has been stress tested under real-life conditions of users and limited resources with the software KeePlace. Acknowledgement is given to KeePlace who initiated this thesis
Fraley, Hannah E. "School Nurses' Awareness and Attitudes Towards Commercial Sexual Exploitation of Children| A Mixed Methods Study." Thesis, University of Massachusetts Boston, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10264694.
Full textHuman trafficking is a global problem and a multi-billion dollar industry. Most victims are women and girls and more than half are children. In the United States, many at risk youth continue to attend school with school nurses on the frontlines. Using the Peace and Power Conceptual Model, a mixed methods study was conducted to explore their awareness, attitudes, and role perceptions in prevention of commercial sexual exploitation of children (CSEC). Two factors related to increased awareness, and positive attitudes and role perceptions to prevent of CSEC included prior exposure to working with vulnerable students, and prior education about CSEC. Two factors that inhibited identification of CSEC included an uncertainty in identifying CSEC, and a lack of collaboration with colleagues in schools. Four sub-themes were identified; ‘exposure/knowledge, ‘collaboration’, ‘role boundaries’, and ‘creating respite space’. Future research should target the multidisciplinary school team. Simultaneous policy efforts should focus on improving practice conditions for school nurses to support their role in identification and intervention to prevent CSEC among at risk youth.
Marshall, Dana T. "The exploitation of image construction data and temporal/image coherence in ray traced animation /." Full text (PDF) from UMI/Dissertation Abstracts International, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3008386.
Full textYeremenko, Roman, and Valeri Badakh. "Public access data in aerospace industry." Thesis, ORT Publishing, 2019. http://er.nau.edu.ua:8080/handle/NAU/40228.
Full textThorisson, Gudmundur A. "Database federation, resource interoperability and digital identity, for management and exploitation of contemporary biological data." Thesis, University of Leicester, 2011. http://hdl.handle.net/2381/8951.
Full textSilva, Ardemiro de Barros. "Remotely sensed, geophysical and geochemical data as aids to mineral exploitation in Bahia State, Brazil." Thesis, Open University, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.304255.
Full textBrooks, Emma, and n/a. "Selectivity versus availability: patterns of prehistoric fish and shellfish exploitation at Triangle Flat, western Golden Bay." University of Otago. Department of Anthropology, 2002. http://adt.otago.ac.nz./public/adt-NZDU20070508.145145.
Full textLloyd, Sarah W. "Social workers' understandings of child sexual exploitation and sexually exploited girls." Thesis, University of Huddersfield, 2016. http://eprints.hud.ac.uk/id/eprint/34502/.
Full textOcran, Emmanuel. "The faint low-frequency radio universe in continuum: exploitation of the pre-SKA deepest survey." Doctoral thesis, Faculty of Science, 2020. http://hdl.handle.net/11427/32898.
Full textGuenneau, Flavien. "Relaxation magnétique nucléaire de systèmes couplés et exploitation des données unidimensionnelles au moyen d'un logiciel convivial (RMNYW)." Nancy 1, 1999. http://docnum.univ-lorraine.fr/public/SCD_T_1999_0093_GUENNEAU.pdf.
Full textLouis, Ruwaid, and David Yu. "A study of the exploration/exploitation trade-off in reinforcement learning : Applied to autonomous driving." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254938.
Full textEtt globalt initiativ startades för att reducera antalet trafikolyckor innan år 2030. Autonoma fordon är ett forskningsområde som bidrar till det globala initiativet. I denna rapport undersöks avvägningen mellan utforskning och utnyttjande inom förstärkningsinlärande för beslutsfattande processen inom autonoma fordon. Tillvägagångssättet bestod av att modellera problemet som Markov Beslutsprocess som löstes med hjälp av Q-learning. Beslutsfattande processen tillvaratog en utnyttjande inställning. Scenario bestod av olika typer av korsningar, och de programmerades med hjälp av SUMO. Autonoma fordonet kontrollerades med hjälp av TraCI. Målet var att diskutera avvägningen från två perspektiv tid och säkerhet, mät i antalet kollisioner bl.a inom forskningsområdet autonoma fordon. Resultat visade att utforskning uppmanade autonoma fordonet att passera scenarion under kortare tid. Detta ledde till ökade antal kollisioner och därmed minskad säkerhet. Å andra sidan, ökad utnyttjande föredrog inbromsning vilket resulterade i ökad antalet lyckade passeringar. Detta leder till ökad säkerhet men ökar också passeringstiden och mängden trafik. Slutsatsen var att man ska föredra utnyttjande av tidigare erfarenheter när man tillämpar förstärkningsinlärande på beslutsfattandeprocessen inom autonoma fordon. Slutsatsen befattades därför att säkerhet har högst prioritet inom autonoma fordon och det globala initiativet.
Kroe, Elaine, and S. Department of Education National Center for Education Statistics U. "Data File, Public Use: Public Libraries Survey: Fiscal Year 2001 (Revised)." U. S. Department of Education, NCES 2003â 398, 2003. http://hdl.handle.net/10150/105908.
Full textMistretta, Anna E. "Risk Factors for Financial Exploitation among an Urban Adult Population in the United States." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/iph_theses/124.
Full textBeck, Dominic. "Challenges in CMB Lensing Data Analysis and Scientific Exploitation of Current and Future CMB Polarization Experiments." Thesis, Université de Paris (2019-....), 2019. https://wo.app.u-paris.fr/cgi-bin/WebObjects/TheseWeb.woa/wa/show?t=3973&f=25502.
Full textNext-generation cosmic microwave background (CMB) measurements will further establish the field of cosmology as a high-precision science and continue opening new frontiers of fundamental physics. Cosmic-variance limited measurements not only of the CMB temperature but also its polarization down to arcminute scales will allow for precise measurements of our cosmological model, which is sensitive to the elusive physics of dark matter, dark energy and neutrinos. Furthermore, a large-scale measurement of B-mode CMB polarization permits a determination of the power of primordial gravitational waves, generated by processes potentially happening in the very early universe at energies close to the scale of the Grand Unified Theory. Entering a new sensitivity regime entails the necessity to improve our physical understanding and analysis methods of astronomical and instrumental systematics.This thesis presents within this context several analyses of potential astronomical and instrumental systematics, primarily focusing on CMB measurements related to weak gravitational lensing. The latter distorts the path of the primary CMB's photons, such that the statistical properties of the measured signal deviate from the primary signal and, hence, has to be accounted for. This thesis describes the underlying physics, analysis methods and applications to current data sets of the POLARBEAR CMB experiment in the context of CMB lensing science.This thesis shows that future high-precision measurements of CMB lensing have to account for the high complexity of this effect, primarily caused by multiple deflections within an evolving, non-linear large-scale structure distribution. Furthermore, the impact of higher-order correlations introduced by galactic foregrounds and CMB lensing when jointly analyzing CMB data sets on both large and small scales is investigated, showing the need for small-scale multi-frequency observations and foreground removal techniques to obtain an unbiased estimate of the tensor-to-scalar ratio
Ba, Mouhamadou Lamine. "Exploitation de la structure des données incertaines." Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0013.
Full textThis thesis addresses some fundamental problems inherent to the need of uncertainty handling in multi-source Web applications with structured information, namely uncertain version control in Web-scale collaborative editing platforms, integration of uncertain Web sources under constraints, and truth finding over structured Web sources. Its major contributions are: uncertainty management in version control of treestructured data using a probabilistic XML model; initial steps towards a probabilistic XML data integration system for uncertain and dependent Web sources; precision measures for location data and; exploration algorithms for an optimal partitioning of the input attribute set during a truth finding process over conflicting Web sources
Clevenger, Mark Allen. "Data encryption using RSA public-key cryptosystem." Virtual Press, 1996. http://liblink.bsu.edu/uhtbin/catkey/1014844.
Full textDepartment of Computer Science
Craig, Heather (Heather Hult). "Interactive data narrative : designing for public engagement." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/97993.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 97-101).
Interactive data narrative, or the crafting of interactive online stories based upon new or existing data, has grown dramatically over the last several years. Data is increasingly available through such mechanisms as embedded sensor networks, remote sensing, and mobile data collection platforms. The affordances of mobile computing and increasing internet access enable widespread-and often citizen-powered-data collection initiatives. This proliferation of data raises the challenge of translating data into compelling and actionable stories. New data collection and online storytelling strategies foster a mode of communication that can reveal complexities, time-based shifts, and arcane patterns with regard to newly available geolocated data. This thesis investigates interactive storytelling as a mode of communicating data and analyzes trends and opportunities for future innovation. Surveying the field and analyzing specific projects lays the foundation for a design intervention for adding a narrative layer to geolocated, citizen-collected data.
by Heather Craig.
S.M.
Yun, Catherine (Catherine T. ). "Splinter : practical private queries on public data." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/113458.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 39-43).
Every day, millions of people rely on third party services like Google Maps to navigate from A to B. With existing technology, each query provides Google and their affiliates with a track record of where they've been and where they're going. In this thesis, I design, engineer, and implement a solution that offers absolute privacy when making routing queries, through the application of the Function Secret Sharing (FSS) cryptographic primitive. I worked on a library in Golang that applied an optimized FSS protocol, and exposed an API to generate and evaluate different kinds of queries. I then built a system with servers that handle queries to the database, and clients that generate queries. I used DIMACS maps data and the Transit Node Routing (TNR) algorithm to obtain graph data hosted by the servers. Finally, I evaluated the performance of my system for practicality, and compared it to existing private map routing systems.
by Catherine Yun.
M. Eng.
He, Yurong. "Data sharing across research and public communities." Thesis, University of Maryland, College Park, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10242315.
Full textFor several decades, the intensifying trend of researchers to believe that sharing research data is “good” has overshadowed the belief that sharing data is “bad.” However, sharing data is difficult even though an impressive effort has been made to solve data sharing issues within the research community, but relatively little is known about data sharing beyond the research community. This dissertation aims to address this gap by investigating how data are shared effectively across research and public communities.
The practices of sharing data with both researchers and non-professionals in two comparative case studies, Encyclopedia of Life and CyberSEES, were examined by triangulating multiple qualitative data sources (i.e., artifacts, documentation, participant observation, and interviews). The two cases represent the creation of biodiversity data, the beginning of the data sharing process in a home repository, and the end of the data sharing process in an aggregator repository. Three research questions are asked in each case:
• Who are the data providers?
• Who are the data sharing mediators?
• What are the data sharing processes?
The findings reveal the data sharing contexts and processes across research and public communities. Data sharing contexts are reflected by the cross-level data providers and human mediators rooted in different groups, whereas data sharing processes are reflected by the dynamic and sustainable collaborative efforts made by different levels of human mediators with the support of technology mediators.
This dissertation provides theoretical and practical contributions. Its findings refine and develop a new data sharing framework of knowledge infrastructure for different-level data sharing across different communities. Both human and technology infrastructure are made visible in the framework. The findings also provide insight for data sharing practitioners (i.e., data providers, data mediators, data managers, and data contributors) and information system developers and designers to better conduct and support open and sustainable data sharing across research and public communities.
Kosaraju, Aravinda. "Attrition in cases involving crimes of child sexual exploitation in England." Thesis, University of Kent, 2017. https://kar.kent.ac.uk/66828/.
Full textAdu-Prah, Samuel. "GEOGRAPHIC DATA MINING AND GEOVISUALIZATION FOR UNDERSTANDING ENVIRONMENTAL AND PUBLIC HEALTH DATA." OpenSIUC, 2013. https://opensiuc.lib.siu.edu/dissertations/657.
Full textBringer, Joy Deanne. "Sexual exploitation : swimming coaches' perceptions and the development of role conflict and role ambiguity." Thesis, University of Gloucestershire, 2002. http://eprints.glos.ac.uk/3038/.
Full textSalazar, Niño Elvis. "The Mining Concession and the Right of Exploitation Seeking a Balance between the Public and the Private." Derecho & Sociedad, 2015. http://repositorio.pucp.edu.pe/index/handle/123456789/118164.
Full textEl autor presenta un panorama normativo y político de la concesión minera y el desgaste institucional que ha sufrido. Asimismo, expone los sistemas de dominio minero y el que nuestro país ha acogido con acierto: el Sistema Dominalista. Por último, analiza la concesión minera y el derecho de aprovechamiento, planteado de acuerdo a la Constitución y Ley General de Minería, explicando los cambios normativos necesarios a fin de fortalecerlo como título habilitante fundamental para el desarrollo de las actividades mineras del país.