LEADER 04598nam 2200673 a 450 001 9910452695003321 005 20200520144314.0 010 $a1-283-89942-6 010 $a0-8122-0773-4 024 7 $a10.9783/9780812207736 035 $a(CKB)2550000000707706 035 $a(OCoLC)806250108 035 $a(CaPaEBR)ebrary10642169 035 $a(SSID)ssj0000703732 035 $a(PQKBManifestationID)11432179 035 $a(PQKBTitleCode)TC0000703732 035 $a(PQKBWorkID)10691181 035 $a(PQKB)10242705 035 $a(MiAaPQ)EBC3441834 035 $a(MdBmJHUP)muse19145 035 $a(DE-B1597)449561 035 $a(OCoLC)979910444 035 $a(DE-B1597)9780812207736 035 $a(Au-PeEL)EBL3441834 035 $a(CaPaEBR)ebr10642169 035 $a(CaONFJC)MIL421192 035 $a(EXLCZ)992550000000707706 100 $a20120130d2012 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aForeign aid allocation, governance, and economic growth$b[electronic resource] /$fKamiljon T. Akramov 205 $a1st ed. 210 $aPhiladelphia $cUniversity of Pennsylvania Press$dc2012 215 $a1 online resource (183 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-8122-4465-6 320 $aIncludes bibliographical references and index. 327 $t Frontmatter -- $tContents -- $tFigures -- $tTables -- $tForeword -- $tAcknowledgments -- $tAcronyms and Abbreviations -- $t1 Introduction -- $t2 Overview of Previous Studies -- $t3 Data and Descriptive Analysis -- $t4 Aid Allocation -- $t5 Aid and Economic Growth -- $t6 Conclusion -- $tA Development Thinking and Foreign Aid -- $tB Lists of Donors and Aid Recipients -- $tC Definitions and Sources of Regression Variables -- $tD Descriptive Summary Statistics -- $tE General Characteristics of Political Rights Scores and Civil Liberties Scores -- $tF Governance and Rent Extraction-Efficiency Trade-off in Aid Allocation -- $tG Derivation of the Growth Equation Augmented with Human Capital -- $tReferences -- $tIndex -- $tAbout the Author 330 $aHow important is foreign aid in fostering economic growth in developing countries? Does it help recipient countries, hurt them, or have little effect either way? Foreign Aid Allocation, Governance, and Economic Growth investigates this issue by looking at foreign aid by sector rather than treating it as an aggregate amount. Aid can be allocated to a recipient's production sectors (such as agriculture, manufacturing, or mining), economic infrastructure (such as transport, storage, or communications networks or power generation facilities), or social sectors (such as education or healthcare). This book differentiates among various channels through which each of these three categories of foreign aid affects economic growth.The findings suggest that economic aid, including aid to production sectors and economic infrastructure, contributes to economic growth by increasing domestic investment. Aid to social sectors, however, does not appear to have a significant impact on human capital (measured by school enrollment) and economic growth. This study also assesses the degree to which the quality of democratic governance in a recipient country influences foreign aid's effectiveness and finds that democracy is no guarantee of aid effectiveness. In fact, economic aid to less democratic countries can lead to better economic growth, at least initially, provided the aid recipients secure property rights and allow capital accumulation. Although further research into the question is necessary, Foreign Aid Allocation, Governance, and Economic Growth suggests that aid targeted to increasing domestic investment might be an effective means of fostering economic growth in less developed countries. 606 $aEconomic assistance$zDeveloping countries$xEvaluation 606 $aEconomic development$xSocial aspects$zDeveloping countries 606 $aEconomic indicators$zDeveloping countries 607 $aDeveloping countries$xEconomic conditions 608 $aElectronic books. 615 0$aEconomic assistance$xEvaluation. 615 0$aEconomic development$xSocial aspects 615 0$aEconomic indicators 676 $a338.9109172/4 700 $aAkramov$b Kamil$0966069 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910452695003321 996 $aForeign aid allocation, governance, and economic growth$92453759 997 $aUNINA LEADER 01510nam 2200397 a 450 001 9910700858003321 005 20120529125355.0 035 $a(CKB)5470000002412436 035 $a(OCoLC)794443064 035 $a(EXLCZ)995470000002412436 100 $a20120529d2011 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aSuicides due to alcohol and/or drug overdose$b[electronic resource] $ea data brief from the National Violent Death Reporting System 210 1$a[Atlanta, Ga.] :$cNational Center for Injury Prevention and Control, Division of Violence Prevention,$d[2011?] 215 $a1 online resource (8 pages) $ccolor illustrations 300 $aTitle from title screen (viewed on May 29, 2012). 320 $aIncludes bibliographical references (page 8). 517 $aSuicides due to alcohol and/or drug overdose 606 $aSuicide victims$zUnited States$vStatistics 606 $aDrugs$xOverdose$zUnited States$vStatistics 606 $aAlcohol$xOverdose$zUnited States$vStatistics 608 $aStatistics.$2lcgft 615 0$aSuicide victims 615 0$aDrugs$xOverdose 615 0$aAlcohol$xOverdose 712 02$aNational Center for Injury Prevention and Control (U.S.).$bDivision of Violence Prevention. 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910700858003321 996 $aSuicides due to alcohol and$93207568 997 $aUNINA LEADER 07075nam 22008295 450 001 9910483386603321 005 20251226203357.0 010 $a3-540-48827-8 024 7 $a10.1007/11922841 035 $a(CKB)1000000000283814 035 $a(SSID)ssj0000317228 035 $a(PQKBManifestationID)11208006 035 $a(PQKBTitleCode)TC0000317228 035 $a(PQKBWorkID)10292649 035 $a(PQKB)10505901 035 $a(DE-He213)978-3-540-48827-9 035 $a(MiAaPQ)EBC3068610 035 $a(PPN)123139562 035 $a(EXLCZ)991000000000283814 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDigital Watermarking $e5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings /$fedited by Yun Qing Shi, Byeungwoo Jeon 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XII, 476 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4283 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-48825-1 320 $aIncludes bibliographical references and index. 327 $aWatermarking Is Not Cryptography -- Secure Quantization Index Modulation Watermark Detection -- Steganalysis in the Presence of Weak Cryptography and Encoding -- Category Attack for LSB Steganalysis of JPEG Images -- Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA) -- Multi Bit Plane Image Steganography -- Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features -- Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method -- A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes -- A Novel Multibit Watermarking Scheme Combining Spread Spectrum and Quantization -- Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes -- Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator -- A Robust Video Watermarking Scheme Via Temporal Segmentation and Middle Frequency Component Adaptive Modification -- Capacity Enhancement of Compressed Domain Watermarking Channel Using Duo-binary Coding -- Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition -- Intellectual Property Rights Management Using Combination Encryption in MPEG-4 -- Data Hiding in Film Grain -- Joint Screening Halftoning and Visual Cryptography for Image Protection -- Robust Audio Watermarking Based on Low-Order Zernike Moments -- Analysis of Optimal Search Interval for Estimation of Modified Quantization Step Size in Quantization-Based Audio Watermark Detection -- Universal JPEG Steganalysis in the Compressed Frequency Domain -- Attack on JPEG2000 Steganography Using LRCA -- A Low-Cost Attack on Branch-Based Software Watermarking Schemes -- Geometric InvariantDomain for Image Watermarking -- Desynchronization in Compression Process for Collusion Resilient Video Fingerprint -- Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets -- Analysis and Comparison of Typical Reversible Watermarking Methods -- A Reversible Watermarking Based on Histogram Shifting -- Towards Lower Bounds on Embedding Distortion in Information Hiding -- Improved Differential Energy Watermarking for Embedding Watermark -- A Colorization Based Animation Broadcast System with Traitor Tracing Capability -- Adaptive Video Watermarking Utilizing Video Characteristics in 3D-DCT Domain -- Scalable Protection and Access Control in Full Scalable Video Coding -- A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication -- Secure Watermark Embedding Through Partial Encryption -- A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform -- Error Resilient Image Authentication Using Feature Statistical and Spatial Properties. 330 $aWelcome to the proceedings of the Fifth International Workshop on Digital Watermarking (IWDW). Since the first IWDW held in Seoul, Korea in 2002, it has been a focal point for meeting in person and disseminating valuable scientific and technological developments in watermarking. IWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was ?Meet the Challenges in this Digital World!? As we all know, digital watermarking and its related technologies have emerged as the key ingredients of this digital world. We report on new developments and discuss how to best utilize the watermarking and its related new technologies to cope with many challenging issues in this digital world. This year, we accepted 34 papers out of 76 highly qualified submissions from 14 different countries. Each paper was reviewed by three reviewers. The acceptance ratio of 44% indicates IWDW?s continuing commitment to ensuring the quality of the workshop. In addition, we had three invited lectures and one panel discussion that shed invaluable insights to the watermarking community on new developments and future directions. The technical program featured such topics as steganography and steganalysis, data forensics, digital right management, secure watermarking, and their applications. The 34 accepted papers, three invited lectures, and the panel discussion covered both theoretical and practical issues that all of us can benefit from. Furthermore, 13 of the 34 papers were arranged in a poster session in order to facilitate more efficient and interactive information exchange. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4283 606 $aCryptography 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aMultimedia systems 606 $aAlgorithms 606 $aCryptology 606 $aOperating Systems 606 $aIT Operations 606 $aComputers and Society 606 $aMultimedia Information Systems 606 $aAlgorithms 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aOperating systems (Computers). 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 0$aMultimedia systems. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aOperating Systems. 615 24$aIT Operations. 615 24$aComputers and Society. 615 24$aMultimedia Information Systems. 615 24$aAlgorithms. 676 $a005.8 701 $aShi$b Yun Q$0600623 701 $aJeon$b Byeungwoo$01764070 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483386603321 996 $aDigital watermarking$94204811 997 $aUNINA