Search results

Filter

Filetype

Your search for "how to get to the dark web on phone 【Visit Sig8.com】9ZP42K8.qweG" yielded 57284 hits

Implementation and evaluation of a binary mixture model and three-dimensional FE-analysis of water saturated soil

A binary mixture model for soils has been formulated and analyzed. In the model one of the constituents is soil and the other constituent an incompressible liquid. The effects of water are included by formulating a mixture model is formulated as an extension of an existing non-associated elasto-plastic material model for granular materials. This paper is focused on the balance of momentum equation

Functions of word order and intonation in information structuring in Puyuma

This paper presents the first results of analyzing the functions of intonation and word order in Puyuma. Puyuma is an endangered Austronesian language spoken in Taiwan. As other languages of this branch, Puyuma is verb initial and displays variations in word order, so that VOS, SVO and VSO are attested. The aim of our study is to explain these word variations. We investigate the connection between

Tool support for usage-based reading

Software inspection is an efficient method to increase the quality of software products. The main purpose of software inspections is to detect faults. In order to provide support to reviewers and inspection moderators, computer support can be used. Some computer-aided software engineering (CASE) tools have been developed. However, no tool provides support for the reading method, usage-based readin

Automatic generation of application-specific systems based on a micro-programmed Java core

This paper describes a co-design based approach for automatic generation of application specific systems, suitable for FPGA-centric embedded applications. The approach augments a processor core with hardware accelerators extracted automatically from a high-level specification (Java) of the application, to obtain a custom system, optimised for the target application. We advocate herein the use of a

Matching the electroweak penguins Q(7) and Q(8)

We report on recent advances on the computation of the matrix elements of the electroweak penguins Q(7) and Q(8) which are relevant for the DeltaI = 3/2 contribution to epsilon'(K) in the chiral limit. The matching of scale and scheme dependences between Wilson coefficients and these matrix elements is done analytically at NLO in alpha(S).

Arithmetic reduction of adder leakage in nanoscale CMOS

in today’s technology generations, e.g. 90 and 65 nm, the static power consumption becomes a major contributor to the total power consumption. It is therefore important to consider all abstraction levels to reduce this power. This paper focuses on the arithmetic level and shows a methodology for a substantial reduction of the static power consumption. Both the dynamic and static power consumption

Controlling software applications via resource allocation within the Heartbeats framework

A formalism was recently introduced to instrument, monitor and control computer applications based on the rate of heartbeats they emit, thereby quantitatively signaling their progress toward goals. To date, the idea was however used essentially in an heuristic manner. This work first shows that a very simple dynamic heartbeat rate model can be devised, an that said model allows to address the corr

On stability of users equilibria in heterogeneous routing games

The asymptotic behaviour of deterministic logit dynamics in heterogeneous routing games is analyzed. It is proved that in directed multigraphs with parallel routes, and in series composition of such multigraphs, the dynamics admits a globally asymptotically stable fixed point. Moreover, the unique fixed point of the dynamics approaches the set of Wardrop equilibria, as the noise vanishes. The resu

Defect content estimation for two reviewers

Estimation of the defect content is important to enable quality control throughout the software development process. Capture-recapture methods and curve fitting methods have been suggested as tools to estimate the defect content after a review: The methods are highly reliant on the quality of the data. If the number of reviewers is fairly small, it becomes difficult or even impossible to get relia

Humanizing the Digital Age: A Right to Be Forgotten Online? An EU–U.S. Comparative Study of Tomorrow's Privacy in Light of the General Data Protection Regulation and Google Spain v. AEPD

Eftersom snabb teknisk utveckling och globalisering har förändrat sättet på vilket vi anförtror oss personuppgifter till webbplatser för sociala medier samt sökmotorer, har den Europeiska kommissionen föreslagit en ny dataskyddsförordning som kommer att förbättra skyddet för den personliga integriteteten på internet för medborgarna i EU. Då den med stor sannolikhet träder i kraft år 2016 kommer etRapid technological developments and globalisation have profoundly changed the way people entrust their personal data to social media websites and search engines. As a result, the European Commission has proposed a General Data Protection Regulation (GDPR), to enhance online privacy rights for the citizens of the European Union. As the GDPR will most likely enter into force in 2016, one of the maj

Competence Development in a VUCA World: How to Make Employees Better Equipped for Handling VUCA

Several researchers have approached the subject of VUCA and the challenges of operating in a VUCA world. However, previous research seldom addresses specifically how the work can be done or how these qualities and skills can be developed. The purpose of this study is to help professionals responsible for competence development in their work to enable employees to handle a VUCA world. Therefore, th

Kp lsmb21 171204

Kursguide - Course Syllabus • • • • Fastställande Kursplanen är fastställd av Ledningsgruppen för kandidatprogram i Logistics Service Management 2017-12-04 att gälla från och med 2018-01-01, vårterminen 2018. Allmänna uppgifter Kursen ingår inte i ett huvudområde. Den ingår i Kandidatprogrammet logistics service management och ges andra terminen. Undervisningsspråk: Svenska Moment på engelska kan

https://www.ses.lu.se/sites/ses.lu.se/files/kp_lsmb21_171204.pdf - 2026-05-19

Kp ksmb11 rev190320

Kursguide - Course Syllabus • • • Fastställande Kursplanen är fastställd av Styrelsen för institutionen för service management och tjänstevetenskap 2015-05-19 och senast reviderad 2019-03-20. Den reviderade kursplanen gäller från och med 2019-08-01, höstterminen 2019. Allmänna uppgifter Kursen ingår i kandidatprogrammet i service management och ges första terminen. Undervisningsspråk: Svenska Mome

https://www.ses.lu.se/sites/ses.lu.se/files/kp_ksmb11_rev190320.pdf - 2026-05-19

Kp lsma11 rev1901

Kursguide - Course Syllabus • • • Fastställande Kursplanen är fastställd av Ledningsgruppen för kandidatprogram i Logistics Service Management 2015-04-22 och senast reviderad 2019-01-26. Den reviderade kursplanen gäller från och med 2019-08-01, höstterminen 2019. Allmänna uppgifter Kursen ingår i kandidatprogrammet för Logistics service management och ges första terminen. Undervisningsspråk: Svens

https://www.ses.lu.se/sites/ses.lu.se/files/kp_lsma11_rev1901.pdf - 2026-05-19

Pushing the reading comprehension: a whole-classroom-based study on High school students in Sweden

Several studies have reported a declining reading rate in school-aged children. Thus, this thesis therefore aimed to evaluate how students in their last semester of high school (gymnasiet) would have their attentive behaviour affected when reading challenging texts, and with the allowance or the prohibition of the use of electronic devices in the classroom. The purpose of the study was to foster a

Overload control strategies in a multiprocessor system with distributed data

This paper addresses overload control issues for distributed control systems, i.e. multiprocessor systems, in telephone exchanges, signalling transfer points, service control points, home location registers, etc. Three different strategies for rejecting calls, due to severe overload conditions, are examined. The strategies differ in that they allow call rejection during different time epochs of th

Digital övervakning som processuellt tvångsmedel - förhållandet mellan hemlig dataavläsning och den personliga integriteten

Personlig integritet innehar ett skydd vilket är grundlagsstadgat. För att besvara frågan vad det egentligen är som skyddas söker jag i denna uppsats svar med hjälp av, dels filosofiska definitioner och dels juridiska definitioner. En entydig förklaring av begreppet personlig integritet finns inte. Den personliga integriteten är inte absolut. En inskränkning får bland annat ske för att tillgodosePersonal integrity has the benefit of enjoying protection regulated by the constitutional law. In order to answer the question, what is being protected, I look for the answers in this paper, using on one hand, philosophical definitions and on the other hand legal definitions. An unequivocal explanation of the concept of personal integrity does not exist. The Personal integrity is not absolute. A

Language Bias in Accident Investigation

This paper examined the language and content of the U.S. Forest Service's Serious Accident Investigation Guide (SAIG), which is used to investigate what the organization terms 'serious wildland fire accidents'. The purpose of research was to identify whether the language in the guide was objective, or if it biased the accident analysis process and conclusions of the accident report. Qu