scholarly journals Geocoding Freeform Placenames: An Example of Deciphering the Czech National Immigration Database

2021 ◽  
Vol 10 (5) ◽  
pp. 335
Author(s):  
Jan Šimbera ◽  
Dušan Drbohlav ◽  
Přemysl Štych

The growth of international migration and its societal and political impacts bring a greater need for accurate data to measure, understand and control migration flows. However, in the Czech immigration database, the birthplaces of immigrants are only kept in freeform text fields, a substantial obstacle to their further processing due to numerous errors in transcription and spelling. This study overcomes this obstacle by deploying a custom geocoding engine based on GeoNames, tailored transcription rules and fuzzy matching in order to achieve good accuracy even for noisy data while not depending on third-party services, resulting in lower costs than the comparable approaches. The results are presented on a subnational level for the immigrants coming to Czechia from the USA, Ukraine, Moldova and Vietnam, revealing important spatial patterns that are invisible on the national level.

Author(s):  
Vladyslav Kulibaba ◽  
Vsevolod Bobukh

The paper presents the state of development of cryptocurrencies such as ACS and PIC at the international and national levels. The state of standardization of cryptocurrencies of ASS and PIK at the international competition NIST of the USA, the requirements put forward to candidates on 2 and 3 rounds of competition are considered. The state of standardization of crypto transformations of this type at the national level in Ukraine is considered, and a brief description of the national standard ASSH DSTU 8961: 2019, based on algebraic lattices, is given. The methodology and results of achieving the national standard DSTU 8961:2019 against attacks by third-party channels in terms of the dependence of the time of direct and reverse transformation (encapsulation and decapsulation of the key) on the number of units in the private key.


2009 ◽  
Vol 18 (8) ◽  
pp. 921 ◽  
Author(s):  
Filipe X. Catry ◽  
Francisco C. Rego ◽  
Fernando L. Bação ◽  
Francisco Moreira

Portugal has the highest density of wildfire ignitions among southern European countries. The ability to predict the spatial patterns of ignitions constitutes an important tool for managers, helping to improve the effectiveness of fire prevention, detection and firefighting resources allocation. In this study, we analyzed 127 490 ignitions that occurred in Portugal during a 5-year period. We used logistic regression models to predict the likelihood of ignition occurrence, using a set of potentially explanatory variables, and produced an ignition risk map for the Portuguese mainland. Results show that population density, human accessibility, land cover and elevation are important determinants of spatial distribution of fire ignitions. In this paper, we demonstrate that it is possible to predict the spatial patterns of ignitions at the national level with good accuracy and using a small number of easily obtainable variables, which can be useful in decision-making for wildfire management.


Screening ◽  
2019 ◽  
pp. 177-228
Author(s):  
Angela E. Raffle ◽  
Anne Mackie ◽  
J. A. Muir Gray

This chapter shows how resources, values, beliefs, and commercial factors all influence screening policy, and gives clear insight into some of the ethical dilemmas involved. Case histories include celebrity selling of HPV testing, the USA ‘Mammography Wars’ incident, the Cartwright Inquiry into events at National Women’s Hospital in Auckland in the 1960s and genetic testing. The chapter strongly emphasises the value of following robust and explicit processes when making screening policy, and argues that this is best done at national level. The reasons why screening policy-making can be difficult are explored in detail, and clear lessons are drawn from the case examples. The chapter addresses the technical aspects of using evidence, and also explains the power of the cultural belief that all screening must automatically be a good thing and of commercial, professional and institutional interests, often enacted through invisible lobbying using ‘third party’ techniques. The ethical conflicts inherent within screening are described and explored.


2020 ◽  
Author(s):  
Reham AlTamime ◽  
Vincent Marmion ◽  
Wendy Hall

BACKGROUND Mobile apps and IoT-enabled smartphones technologies facilitate collecting, sharing, and inferring from a vast amount of data about individuals’ location, health conditions, mobility status, and other factors. The use of such technology highlights the importance of understanding individuals’ privacy concerns to design applications that integrate their privacy expectations and requirements. OBJECTIVE This paper explores, assesses, and predicts individuals’ privacy concerns in relation to collecting and disclosing data on mobile health apps. METHODS We designed a questionnaire to identify participants’ privacy concerns pertaining to a set of 432 mobile apps’ data collection and sharing scenarios. Participants were presented with 27 scenarios that varied across three categorical factors: (1) type of data collected (e.g. health, demographic, behavioral, and location); (2) data sharing (e.g., whether it is shared, and for what purpose); and, (3) retention rate (e.g., forever, until the purpose is satisfied, unspecified, week, or year). RESULTS Our findings show that type of data, data sharing, and retention rate are all factors that affect individuals’ privacy concerns. However, specific factors such as collecting and disclosing health data to a third-party tracker play a larger role than other factors in triggering privacy concerns. CONCLUSIONS Our findings suggest that it is possible to predict privacy concerns based on these three factors. We propose design approaches that can improve users’ awareness and control of their data on mobile applications


1994 ◽  
Vol 21 (1) ◽  
pp. 189-213
Author(s):  
Michael P. Schoderbek

This paper examines the early accounting practices that were used to administer the United States' national land system. These practices are of significance because they provide insights on early governmental accounting and they facilitated an orderly settlement of the western territories. The analysis focuses on the record-keeping and control practices that were developed to meet the provisions of the Land Act of 1800 and to account for land office transactions. These accounting procedures were extracted from the correspondence between the Department of the Treasury and the various land officers.


2020 ◽  
Vol 7 (3) ◽  
pp. 205316802095678
Author(s):  
Melissa M. Lee ◽  
Lauren Prather

International law enforcement is an understudied but indispensable factor for maintaining the international order. We study the effectiveness of elite justifications in building coalitions supporting the enforcement of violations of the law against territorial seizures. Using survey experiments fielded in the USA and Australia, we find that the effectiveness of two common justifications for enforcement—the illegality of a country’s actions, and the consequences of those actions for international order—increase support for enforcement and do so independently of two key public values: ideology and interpersonal norm enforcement. These results imply elites can build a broad coalition of support by using multiple justifications. Our results, however, highlight the tepidness of public support, suggesting limits to elite rhetoric. This study contributes to the scholarship on international law by showing how the public, typically considered a mechanism for generating compliance within states, can impede or facilitate third-party enforcement of the law between states.


2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
M Jelenc ◽  
T Albreht

Abstract Background Policy initiatives, proposals and projects often end up proposing solutions and/or measures that are eventually either not or only partially implemented or they are lacking a system, which would consistently evaluate their implementation and/or impact. Good solutions are often not visible enough to the broader professional community and it is important to identify certain outstanding challenges in cancer control and policy. Driven by the need to better use the outputs from projects on cancer policy, European Commission was trying to address two challenges - one was in solving the problems with the implementation and use of the solutions that have already been proposed and the other one in identifying the outstanding challenges in cancer policy. Results We have decided to follow the structure to develop a series of recommendations and examples of good practices at the national level by selected areas. These would be streamlined into a roadmap to support policymakers at the national and EU level in formulating their cancer policies. Three pairs of targeted recommendations have been identified: Cancer prevention, including health promotion, implementation of the European Code Against Cancer and the reshaping and extension of cancer registriesGenomics and immunotherapy in cancerChallenges in cancer care and governance of cancer control Conclusions Multinational collaboration can bring about important consensual solutions, which build on the existing good practices in the countries. This can be combined well with the existing work on specific areas, carried out both internationally and nationally. Consensus building on jointly defined challenges represents a task that appears to be resolved rather pragmatically. Key message It is important that advance in cancer care and control are quickly analysed and that policymakers receive up-to-date recommendations to improve their policies on cancer control.


2021 ◽  
Vol 6 (1) ◽  
Author(s):  
Diego F. Leal ◽  
Nicolas L. Harder

AbstractEvidence from 184 countries over the span of 25 years is gathered and analyzed to understand North–North, South–South, and North–South international migration flows. Conceptually, the analysis borrows from network theory and Migration Systems Theory (MST) to develop a model to characterize the structure and evolution of international migration flows. Methodologically, the Stochastic Actor-oriented Model of network dynamics is used to jointly model the three types of flows under analysis. Results show that endogenous network effects at the monadic, dyadic, and triadic levels of analysis are relevant to understand the emergence and evolution of migration flows. The findings also show that a core set of non-network covariates, suggested by MST as key drivers of migration flows, does not always explain migration dynamics in the systems under analysis in a consistent fashion; thus, suggesting the existence of important levels of heterogeneity inherent to these three types of flows. Finally, evidence related to the role of political instability and countries’ care deficits is also discussed as part of the analysis. Overall, the results highlight the importance of analyzing flows across the globe beyond typically studied migratory corridors (e.g., North–South flows) or regions (e.g., Europe).


2008 ◽  
Vol 392-394 ◽  
pp. 121-124 ◽  
Author(s):  
Hong Yun Wang ◽  
G.F. Guo ◽  
Y.X. Li ◽  
Xi Lin Zhu

In this paper, a system was introduced, which bases on Flame Cutter NC System and software platform of LabVIEW which the USA NI company developed. Composing of NC machine, partition of modules and assignments, functions confirming, data processing of machining and control, structure of software by the numbers and realization method of two CPUs. The system makes use of multitasking of LabVIEW to make the programmer realize easily the task, which is difficulty to acquire in in tradition programme. It is a kind of comparatively convenient and swift thinking to realize system interface and multitasking by the platform of LabVIEW.


Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3515
Author(s):  
Sung-Ho Sim ◽  
Yoon-Su Jeong

As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.


Sign in / Sign up

Export Citation Format

Share Document