149 resultados para sex allocation
Resumo:
Our earliest version of the Thomas Rymer story is the medieval romance Thomas off Ersseldoune (c.1430). There is a four hundred year lacuna before the ballad “Thomas Rymer”, our next surviving version, is recorded in the early 1800s. In the intervening time the narrative changed very little but the dynamic of the piece, radically. The romance transformed into the highly subversive ballad, “Thomas Rymer”. Central to this transformation is the reconceptualization of the romance's heroine. Referred to simply as the “lufly lady” and caught between her husband, the fay King, and a mere mortal, Thomas, she becomes in the ballad the powerful Queen of the Fairies. The ballad is structured around a series of revelations in which the enigmatic Queen assumes the roles of Eve and Mary, and finally Christ Himself. I will explore the implications of this extraordinary ballad. Moreover, I suggest that it is Queen Elizabeth herself who, ironically, enables the heroine's transformation. “Ironically” because it appears that it was Elizabeth's own restrictions, designed to suppress heretical, seditious or radical literature, which forced Thomas off Ersseldoune (and many other romances which employed religious imagery or figures) out of the written domain and into the oral tradition. And yet, it is Elizabeth who, in creating the image of herself as a female prince, as the Faerie Queen, inspires a new literary vocabulary designed to describe female executive power, without which it would have been impossible to imagine a figure such as the ballad's Queen of the Fairies.
Resumo:
A wireless relay network with one source, one relay and one destination is considered, where nodes communicate via N orthogonal channels. We develop optimal power allocation strategies at both the source and relay for maximizing the overall source-destination capacity under individual power constraints at the source and relay. Some properties of the optimal solution are studied. © 2012 IEEE.
Resumo:
'Grooming' has been termed 'a ubiquitous feature of the sexual abuse of children' (Thornton, 2003: 144). Despite the prominence of the term in contemporary discourses on sexual offending against children, it is a term that is insufficiently understood in the psychological, sociological, criminological or legal literature. Most recently, the term has been used in two primary offending contexts - on-line grooming and abuse by strangers, and institutional grooming and abuse by those in positions of trust. This article argues, however, that grooming and its role in child sexual abuse is a multi-faceted phenomenon and much more complex than has been highlighted previously. While there are a number of typologies of grooming, this article concentrates on those which may be most relevant for treatment and management contexts - 'peer-to-peer grooming' and 'institutional grooming.' Drawing on extensive fieldwork with professionals who work in the fields of child protection or victim support, and sex offender assessment, treatment or management across the United Kingdom and the Republic of Ireland, the aim of this article is two-fold: (i) to deconstruct the term grooming and examine its actual role in the onset of sexual offending against children; and (ii) to draw out the implications of these complexities for policy and practice, chiefly in terms of treatment and prevention.
Resumo:
Fixed and wireless networks are increasingly converging towards common connectivity with IP-based core networks. Providing effective end-to-end resource and QoS management in such complex heterogeneous converged network scenarios requires unified, adaptive and scalable solutions to integrate and co-ordinate diverse QoS mechanisms of different access technologies with IP-based QoS. Policy-Based Network Management (PBNM) is one approach that could be employed to address this challenge. Hence, a policy-based framework for end-to-end QoS management in converged networks, CNQF (Converged Networks QoS Management Framework) has been proposed within our project. In this paper, the CNQF architecture, a Java implementation of its prototype and experimental validation of key elements are discussed. We then present a fuzzy-based CNQF resource management approach and study the performance of our implementation with real traffic flows on an experimental testbed. The results demonstrate the efficacy of our resource-adaptive approach for practical PBNM systems
Resumo:
The response of arsenate and non-tolerant Holcus lanatus L. phenotypes, where tolerance is achieved through suppression of high affinity phosphate/arsenate root uptake, was investigated under different growth regimes to investigate why there is a polymorphism in tolerance found in populations growing on uncontaminated soil. Tolerant plants screened from an arsenic uncontaminated population differed, when grown on the soil from the populations origin, from non-tolerants, in their biomass allocation under phosphate fertilization: non-tolerants put more resources into tiller production and down regulated investment in root production under phosphate fertilization while tolerants tillered less effectively and did not alter resource allocation to shoot biomass under phosphate fertilization. The two phenotypes also differed in their shoot mineral status having higher concentrations of copper, cadmium, lead and manganese, but phosphorus status differed little, suggesting tight homeostasis. The polymorphism was also widely present (40%) in other wild grass species suggesting an important ecological role for this gene that can be screened through plant root response to arsenate.
Resumo:
Chromosome 5q21-33 has been implicated in harboring risk genes for schizophrenia. In this paper, we report evidence that multiple single nucleotide polymorphisms in and around interleukin 3 (IL3) are associated with the disease in the Irish Study of High-Density Schizophrenia Families (ISHDSF), the Irish Case-Control Study of Schizophrenia (ICCSS) and the Irish Trio Study of Schizophrenia (ITRIO). The associations are sex-specific and depend on the family history (FH) of schizophrenia. In all three samples, rs31400 shows female-specific and FH-dependent associations (P=0.0062, 0.0647 and 0.0284 for the ISHDSF, ICCSS and ITRIO, respectively). Several markers have similar associations in one or two of the three samples. In haplotype analyses, identical risk and protective haplotypes are identified in the ISHDSF and ITRIO samples in several multimarker combinations. For ICCSS, the same haplotypes are implicated; however, the risk haplotypes observed in the family samples become protective. Several significant markers, rs440970, rs31400 and rs2069803, are located in and around known estrogen response elements, promoter and enhancer of the IL3 gene. They may explain the sex-specific associations and be functional for the expression of IL3 gene.
Resumo:
This article introduces a resource allocation solution capable of handling mixed media applications within the constraints of a 60 GHz wireless network. The challenges of multimedia wireless transmission include high bandwidth requirements, delay intolerance and wireless channel availability. A new Channel Time Allocation Particle Swarm Optimization (CTA-PSO) is proposed to solve the network utility maximization (NUM) resource allocation problem. CTA-PSO optimizes the time allocated to each device in the network in order to maximize the Quality of Service (QoS) experienced by each user. CTA-PSO introduces network-linked swarm size, an increased diversity function and a learning method based on the personal best, Pbest, results of the swarm. These additional developments to the PSO produce improved convergence speed with respect to Adaptive PSO while maintaining the QoS improvement of the NUM. Specifically, CTA-PSO supports applications described by both convex and non-convex utility functions. The multimedia resource allocation solution presented in this article provides a practical solution for real-time wireless networks.