Bachelor thesis | Cultural Anthropology and Development Sociology (BSc)
open access
Een antropologische bespreking van de nationale strategieën voor de integratie van Roma van Nederland, Frankrijk, Roemenië en Bulgarije. Met gebruikmaking van de concepten integratie, burgerschap...Show moreEen antropologische bespreking van de nationale strategieën voor de integratie van Roma van Nederland, Frankrijk, Roemenië en Bulgarije. Met gebruikmaking van de concepten integratie, burgerschap en intraculturele diversiteit worden de beleidsdocumenten geanalyseerd.Show less
Bachelor thesis | Cultural Anthropology and Development Sociology (BSc)
open access
De overheden van Oezbekistan en Tadzjikistan maken veelvuldig gebruik van cultureel erfgoed bij het ontwikkelen van een nationale identiteit en het creëren van nationalisme onder de bevolking....Show moreDe overheden van Oezbekistan en Tadzjikistan maken veelvuldig gebruik van cultureel erfgoed bij het ontwikkelen van een nationale identiteit en het creëren van nationalisme onder de bevolking. Hierbij zijn met name verwijzingen naar mythische helden en een glorieus verleden van belang.Show less
This thesis is concerned with an object called ’arithmetic codex’ which has been introduced recently in [6], and generalizes a number of notions which have been used both in cryptography (in the...Show moreThis thesis is concerned with an object called ’arithmetic codex’ which has been introduced recently in [6], and generalizes a number of notions which have been used both in cryptography (in the areas of secret sharing and multiparty computation) and algebraic complexity theory. The field of secure multi-party computation is concerned with finding protocols that offer the possibility to compute a function in several variables by a number of parties. The extra requirement for these protocols is that all the players have an input for the function of which they do not want others to find out the value. A common example is that of two millionaires that want to determine who of them is the richest without having to reveal the value of their assets [14]. Secret sharing schemes were introduced by Shamir [12] and Blakley [4]. They later turned out to provide an important building block for many multiparty computation protocols, especially when we want to achieve information-theoretic security, i.e., security which holds regardless of the computational power of the adversary. The fundamental results in this area were given by Ben-Or, Goldwasser and Wigderson [3] and, independently, Chaum, Cr´epeau and Damgaard [8]. They both use Shamir’s secret sharing scheme in which certain multiplicative properties are essential. Cramer Damgaard and Maurer [9] captured these algebraic properties in the notion of multiplicative and strongly multiplicative secret sharing schemes. Both notions are encompassed by the concept of arithmetic codex. On the other hand, the codex also has use in the field of algebraic complexity theory, that analyses the amount of operations one needs to perform algebraic calculations. Namely, the notion of codex encompasses that of symmetric bilinear multiplication algorithm [5]. In this thesis, we first introduce the notion of codex and provide some basic theory. Then we study the conditions under which these objects exist by establishing several bounds on its parameters. We consider first a fruitful approach to finding bounds on some of the integer parameters, based on the relation of codices with coding theory. This approach however does not exploit the multiplicative nature of codices and so we turn to a strategy that depends on the algebra attached to a codex. We can compare the latter bounds with several results known in algebraic complexity. In particular, Fiduccia and Zalcstein and later Adler and Strassen established some results on the multiplicative complexity of algebras. These, in turn, imply as a special case bounds on certain codices. The results in this thesis allow to find alternative and comparatively simple proofs for the same codex bounds in some cases. Furthermore the arguments can be generalized to find bounds on codices which are not direct consequences of the results in [1] and [10].Show less
Multidisciplinary approaches provide more evidence for the identification and interpretation of patterns of human migration and can call for a reconsideration of the traditional migration model of...Show moreMultidisciplinary approaches provide more evidence for the identification and interpretation of patterns of human migration and can call for a reconsideration of the traditional migration model of the Caribbean.Show less