Sökresultat

Filtyp

Din sökning på "*" gav 532049 sökträffar

Analysis of Age of Information threshold violations

We study a scenario where a monitor is interested in the freshest possible update from a remote sensor. The monitor also seeks to minimize the number of updates that exceed a certain freshness threshold, beyond which, the information is deemed to be too old. Previous work has presented results for First Come First Served (FCFS) systems. However, it has been shown that Last Come First Served (LCFS)We study a scenario where a monitor is interested in the freshest possible update from a remote sensor. The monitor also seeks to minimize the number of updates that exceed a certain freshness threshold, beyond which, the information is deemed to be too old. Previous work has presented results for First Come First Served (FCFS) systems. However, it has been shown that Last Come First Served (LCFS)

Fermentation of quinoa, canihua and amaranth to degrade phytate and improve mineral bioavailability

Plant-based diets are the main source of nutrients for vegetarians worldwide and for low-income inhabitants of developing countries, such as in rural areas of Bolivia. These diets may contain high levels of mineral inhibitors such as phytate that impairs mineral absorption in the human gut. Low intake of minerals in combination with mineral inhibitors is a critical factor leading to mineral defici

Reliability, timeliness and load reduction at the edge for cloud gaming

In this paper we study reliability, timeliness and load reduction in an hybrid Mobile Edge Computing (MEC)/Cloud game streaming infrastructure. In our scenario, a user plays a game streamed by the producer to their handheld device – or User Equipment (UE). The UE communicates user actions to the edge/cloud via the mobile communication infrastructure; the object is to retrieve the latest game statuIn this paper we study reliability, timeliness and load reduction in an hybrid Mobile Edge Computing (MEC)/Cloud game streaming infrastructure. In our scenario, a user plays a game streamed by the producer to their handheld device -- or User Equipment (UE). The UE communicates user actions to the edge/cloud via the mobile communication infrastructure; the object is to retrieve the latest game stat

It's Part of Me, Not All of Me : Young Women's Experiences of Receiving a Diagnosis Related to Diverse Sex Development

Study Objective: To understand young women's experiences of receiving a diagnosis related to diverse sex development.Design: A qualitative narrative analysis of interviews.Setting: Karolinska University Hospital.Participants: Nine women (aged 20-26 years) with complete androgen insensitivity syndrome, XY or XX gonadal dysgenesis.Interventions: Semistructured interviews.Main Outcome Measures: A nar

From knowing nothing to knowing what, how and now : Parents' experiences of caring for their children with Congenital Adrenal Hyperplasia.

Objective This study investigates various kinds of knowing that European parents use when caring for their children with congenital adrenal hyperplasia (CAH). Methods Semi-structured qualitative interviews with 20 parents of 22 children with CAH. Results Parents emphasized the importance of knowing what CAH is and what support their child needs, but also knowing how to cope and make sense of the n

Moving intersex/DSD rights and care forward : Lay understandings of common dilemmas

When sex characteristics develop in ways that do not conform to binary models, dilemmas arise regarding how to understand the situation and what terminology to use to describe it. While current medical nomenclature suggests that it should be understood as a disorder of sex development (DSD) prompting medical responses, many describe intersex as a human variation in sexed embodiment that should be

Hbtq+ och psykologi i en historisk tillbakablick

De individer, identiteter, uttryck och samlevnadsformer som idag kan sammanfogas under akronymen hbtq+ har genom historien betraktas på många olika vis. Psykologin har varit central för hur hbtq+ har förståtts, definierats och behandlats. I detta kapitel betraktas hbtq+historien därför med psykologiska glasögon.

Non-Standard Responses in Time-Domain Induced Polarization Measurements

Today, negative induced polarization (IP) time-domain responses and responses with non-standard shapes are generally considered as measurement errors and removed in data processing before inversion. However, synthetic and field measurements show that these responses are in fact physically possible and that a simple theoretical explanation of the basic mechanism for their origin can be found by mea

Field-Scale Quality Control of Lime-Cement Pillar in Conductive Clay Using Electrical Resistivity Tomography

Ground improvement with lime-cement pillars is becoming increasingly common in the Nordic countries for exploitation of areas with poor stability. However, there is no non-destructive method for quality control of the ground improvement. Significant changes in the electrical properties after mixing of the binders make electrical resistivity tomography (ERT) a potential method. In connection with l

Subdividing the Holocene Series/Epoch : formalization of stages/ages and subseries/subepochs, and designation of GSSPs and auxiliary stratotypes

The Holocene, which currently spans ~11 700 years, is the shortest series/epoch within the geological time scale (GTS), yet it contains a rich archive of evidence in stratigraphical contexts that are frequently continuous and often preserved at high levels of resolution. On 14 June 2018, the Executive Committee of the International Union of Geological Sciences formally ratified a proposal to subdi

Land-use planning for sustainable urban development in africa : A spatial and multi-objective optimization approach

Land-use planning, which requires finding a balance among different conflicting social, economic and environment factors, is a complex task needed everywhere, including Africa. One example is the city of Zanzibar in Tanzania, which is under special consideration for land-use revision. From one side, the city has high potentials for tourist industry and at the other side there are major challenges

A case of right coronary artery occlusion, caused by blunt chest trauma and treated with acute coronary artery bypass surgery

A 37-year-old man sustained occlusion of the right coronary artery after a bicycle accident with blunt chest trauma over the left scapula. Acute coronary angiography was performed because of chest pain and ST-segment elevation. Despite surgically successful acute revascularization the patient developed a transmural inferior wall infarction. Coronary artery occlusion after blunt chest trauma is rar

Designing a global mechanism for intergovernmental biodiversity financing

The Convention on Biological Diversity and the Nagoya Protocol display a broad international consensus for biodiversity conservation and equitable benefit sharing. Yet, the Aichi biodiversity targets show a lack of progress and thus indicate a need for additional action such as enhanced and better targeted financial resource mobilization. To date, no global financial burden-sharing instrument has

On the Bride’s Side? Victims of Domestic Violence and their Residence Rights under EU and Council of Europe Law

Migrant women victims of domestic violence might face a stark choice between leaving an abusive relationship and tolerating the abuses so that they can preserve their residence rights in the host country. EU law suffers from some major limitations in addressing this situation. In view of the EU ratification of the Council of Europe Convention on Preventing and Combating Violence against Women (the

Sharing of vulnerability information among companies - a survey of Swedish companies

Software products are rarely developed from scratch and vulnerabilities in such products might reside in parts that are either open source software or provided by another organization. Hence, the total cybersecurity of a product often depends on cooperation, explicit or implicit, between several organizations.We study the attitudes and practices of companies in software ecosystems towards sharing Software products are rarely developed from scratch and vulnerabilities in such products might reside in parts that are either open source software or provided by another organization. Hence, the total cybersecurity of a product often depends on cooperation, explicit or implicit, between several organizations.We study the attitudes and practices of companies in software ecosystems towards sharing