Sökresultat

Filtyp

Din sökning på "fc 26 coins Buyfc26coins.com is EA Sports official for FC 26 coins The service is affordable and quick..qajn" gav 95970 sökträffar

A Recommender System for User-specific Vulnerability Scoring (full version)

With the inclusion of external software components in their software, vendors also need to identify and evaluate vulnerabilities in the components they use.A growing number of external components makes this process more time-consuming, as vendors need to evaluate the severity and applicability of published vulnerabilities.The CVSS score is used to rank the severity of a vulnerability, but in its s

Pregnancy outcome in women with gestational diabetes – A longitudinal study of changes in demography and treatment modalities

Introduction: Gestational diabetes is on the rise and demographics are changing in many countries due to increased migration. Simultaneously, the treatment of gestational diabetes in our clinic has shifted towards metformin with substantially less insulin treatment. The aim was to study the impact of these changes on metabolic control and pregnancy outcome by comparing women diagnosed with gestati

Digestion of triacylgycerols containing longchain polyenoic fatty acids in vitro by colipase dependent lipase and human milk bile salt stimulated lipase

To assess the role of human milk bile salt-stimulated lipase (BSSL) in the digestion of polyunsaturated ester bonds of triacylglycerols, hydrolysis of docosahexaenoic acid (22:6(n − 3)) ester bonds was compared to that of oleic acid (18:1(n − 9)) or arachidonic acid (20:4(n − 6)) esters. As model substrates, we used rat chylomicrons obtained after feeding human milk fat globules and radiolabeled f

Contributions to Preventive Measures in Cyber Security

Organizations and individuals maintain and use an ever increasing amount of computer systems, either deployed locally, or in the cloud.These systems often store and handle vast amounts of data, some of which is sensitive and should be kept private.Regardless of where the data is located, there is a need to prevent data from falling into the wrong hands.To this end, this dissertation presents contr

Software Defined Networking for Emergency Traffic Management in Smart Cities

Vehicle traffic management is becoming more complex due to increased traffic density in cities. Novel solutions are necessary for emergency vehicles, which despite growing congestion must be able to quickly reach their destination. Emergency vehicles are usually equipped with transmitters to control the traffic lights on their path and warn other vehicles with sirens. Transmitters are operated man

PAPR : Publicly Auditable Privacy Revocation for Anonymous Credentials

We study the notion of anonymous credentials with Publicly Auditable Privacy Revocation (PAPR). PAPR credentials simultaneously provide conditional user privacy and auditable privacy revocation. The first property implies that users keep their identity private when authenticating unless and until an appointed authority requests to revoke this privacy, retroactively. The second property enforces th

Energy-Optimal Data Aggregation and Dissemination for the Internet of Things

Established approaches to data aggregation in wirelesssensor networks (WSNs) do not cover the variety of new usecases developing with the advent of the Internet of Things. In particular,the current push towards fog computing, in which control,computation, and storage are moved to nodes close to the networkedge, induces a need to collect data at multiple sinks, ratherthan the single sink typically

Non-convex Rank/Sparsity Regularization and Local Minima

This paper considers the problem of recovering either a low rank matrix or a sparse vector from observations of linear combinations of the vector or matrix elements. Recent methods replace the non-convex regularization with ℓ1 or nuclear norm relaxations. It is well known that this approach recovers near optimal solutions if a so called restricted isometry property (RIP) holds. On the other hand i

A Non-convex Relaxation for Fixed-Rank Approximation

This paper considers the problem of finding a low rank matrix from observations of linear combinations of its elements. It is well known that if the problem fulfills a restricted isometry property (RIP), convex relaxations using the nuclear norm typically work well and come with theoretical performance guarantees. On the other hand these formulations suffer from a shrinking bias that can severely

Fast Laplace Transforms for the Exponential Radon Transform

The Fourier slice theorem for the standard Radon transform generalizes to a Laplace counterpart when considering the exponential Radon transform. We show how to use this fact in combination with algorithms for the unequally spaced fast Laplace transform to construct fast and accurate methods for computing both the forward exponential Radon transform and the corresponding back-projection operator.

Guarding the Guards: Accountable Authorities in VANETs

In this paper we present an approach to gaining increased anonymity from authorities within a VANET. Standardization organizations and researchers working on VANETs recognize privacy as highly important. However, most research focuses on privacy from other vehicles and external attackers, as opposed to privacy from system-administrating authorities. Our proposed solution forces authorities to reso

Inter-rater agreement of the Quality of Life-Alzheimer's Disease (QoL-AD) self-rating and proxy rating scale : Secondary analysis of RightTimePlaceCare data

Background: To assess the quality of life of people with dementia, measures are required for self-rating by the person with dementia, and for proxy rating by others. The Quality of Life in Alzheimer's Disease scale (QoL-AD) is available in two versions, QoL-AD-SR (self-rating) and QoL-AD-PR (proxy rating). The aim of our study was to analyse the inter-rater agreement between self- and proxy rating

Constructing Large Multilingual Proposition Databases

This thesis explores methods for generating proposition databases in a large-scale and multilingual setting. Our methods are centered on using semantic role labeling for extracting predicate-argument structures, and the subsequent transformation of such structures for knowledge base population and generation. By extending semantic role labeling with entity detection, we demonstrate how predicate-a

KOSHIK: A large-scale distributed computing framework for NLP

In this paper, we describe KOSHIK, an end-to-end framework to process the unstructured natural language content of multilingual documents. We used the Hadoop distributed computing infrastructure to build this framework as it enables KOSHIK to easily scale by adding inexpensive commodity hardware. We designed an annotation model that allows the processing algorithms to incrementally add layers of a

Combining Text Semantics and Image Geometry to Improve Scene Interpretation

Inthispaper,wedescribeanovelsystemthatidentifiesrelationsbetweentheobjectsextractedfromanimage. We started from the idea that in addition to the geometric and visual properties of the image objects, we could exploit lexical and semantic information from the text accompanying the image. As experimental set up, we gathered a corpus of images from Wikipedia as well as their associated articles. We ext

Using semantic role labeling to predict answer types

Most question answering systems feature a step to predict an expected answer type given a question. Li and Roth \cite{li2002learning} proposed an oft-cited taxonomy to the categorize the answer types as well as an annotated data set. While offering a framework compatible with supervised learning, this method builds on a fixed and rigid model that has to be updated when the question-answering domai

Mining semantics for culturomics: towards a knowledge-based approach

The massive amounts of text data made available through the Google Books digitization project have inspired a new field of big-data textual research. Named culturomics, this field has attracted the attention of a growing number of scholars over recent years. However, initial studies based on these data have been criticized for not referring to relevant work in linguistics and language technology.

Linking Entities Across Images and Text

This paper describes a set of methods to link entities across images and text. As a corpus, we used a data set of images, where each image is commented by a short caption and where the regions in the images are manually segmented and labeled with a category. We extracted the entity mentions from the captions and we computed a semantic similarity between the mentions and the region labels. We also

Brief admission by self-referral for adolescents who self-harm : discourses on involvement and responsibility among parents and other significant adults

BACKGROUND: Brief Admission by self-referral (BA) was implemented in 2018 in Swedish child and adolescent psychiatric (CAP) inpatient care. This intervention empowers adolescents to self-admit at their own request for brief periods to prevent self-harm and suicidal crisis. As BA enhances healthcare user autonomy, it is a timely intervention to consider with the emerging human rights discourse and