Introduction: Articular cartilage injuries constitute a predominant musculoskeletal disease in athletic populations. These lesions frequently precipitate the progressive degeneration, culminating in premature career termination and increased functional impairment. However, current treatment methods for cartilage injury are not entirely satisfactory, especially for large full-thickness cartilage defects. Presentation of case: A 13-year-old male adolescent with documented high-intensity athletic engagement (training >15 hours/week) presented a huge exercise-induced full-thickness cartilage defect (6 cm 2 ) over the sulcus of the trochlea. The patient underwent arthroscopic implantation of our laboratory-engineered type II collagen-chondroitin sulfate-hyaluronic acid (Col II-CS-HA) biomimetic matrix gel, a tri-component hydrogel designed to mimic native cartilage extracellular matrix composition. Serial evaluations over 12 months postoperatively demonstrated significant improvement in both structural regeneration (7 T MRI T2-mapping showing >95% defect filling with hyaline-like tissue) and functional recovery (IKDC score increased from 31 to 100), with no adverse events reported. Notably, the patient resumed pre-injury sports activities at 9-month follow-up. Discussion: Current treatment strategies for cartilage defects, including microfracture and autologous chondrocyte implantation, demonstrate limited long-term efficacy for large full-thickness cartilage defects (>2 cm 2 ). The avascular nature of articular cartilage limits its inherent regenerative capacity. Tissue engineering approaches have emerged as promising solutions by providing biomimetic scaffolds and recruiting endogenous chondroprogenitor cells for hyaline-like cartilage regeneration. Conclusion: The case we present demonstrates the effectiveness of this Col II-CS-HA cartilage biomimetic matrix gel, which is expected to become a new effective solution for huge cartilage defects in future clinical practice.
Jenny Pramuditha, Ni Ketut Puji Astiti Laksmi, Ida Bagus Gde Putra
Tenganan Dauh Tukad Village, which is one of the Bali Aga Villages, has a bhisama that contains a prohibition on selling land to parties outside the village. Tenganan Dauh Tukad Village is now faced with the onslaught of capitalists who offer tourism development through a cooperation system. This is a challenge for the indigenous people of Tenganan Dauh Tukad Village to maintain the existence of traditions that they have such as bhisama. This study aims to identify the form of struggles that occured to the reorientation of Bhisama in Tenganan Dauh Tukad Village, to describe the phenomena underlying the struggles that occured to the reorientation of Bhisama in Tenganan Dauh Tukad Village, and to interpret implications of the struggle that occurred to the reorientation of Bhisama in Tenganan Dauh Tukad Village. This research is a qualitative study, using data collection methods such as observation, interviews, and document analysis. The theories used in this paper are the theory of practice by Pierre Bordieu and theory of power/knowledge relations by Michael Foucoult. A deductive approach is employed in the data analysis. The findings reveal that the reorientation of bhisama is carried out by the village head, towards his community. Bhisama is a construct, undergoes deconstruction due to certain interests, from a socio-spiritual ideology to a socio-economic ideology. Using the theories of Bourdieu and Foucault, discipline is implemented in society, allowing the village head to successfully seize his territory, which is the ongoing tourism development in Tenganan Dauh Tukad Village. There are three form of struggles occurs to the reorientation of bhisama in Tenganan Dauh Tukad Village, first is different perception of the bhisama and different perception of capitalist that invest in the village, second is competition between investors, and third is competition of right and obligations among Tenganan Dauh Tukad comunities. There are two factors that influence the struggles of reorientation bhisama, such as internal factor and external factor. The internal factors are lack of communication, differences in interests, and economic disparities. While external factors are caused by the entry of cultural capitalization, technological developments, and globalization. The implications of the struggles to the reorientation of bhisama including implication to the socio-cultural, socio-economic, and environment. Keywords: the struggle, indigenous people, bhisama, cultural capitalization
Łukasz Kułacz, Adrian Kliks, Julius Ruseckas
et al.
In this short paper, we propose a technique for AI-based identification of modulation and coding schemes (MCS) in surrounding cellular signals. Based on the created MCS map, we evaluate the performance of indoor localization techniques.
Ryousei Takano, Kiyo Ishii, Toshiyuki Shimizu
et al.
We experimentally verify a fast control plane with 100 microseconds of configuration time that can support more than 1000 racks, leveraged by a software-defined network controller and an industrial real-time Ethernet standard EtherCAT.
Flavia Fionessa Falenda Shanzet, Ni Putu Indiani Sahaning Karna, Nadia Khairunnisa
et al.
ABSTRACT
 Kombucha is a beverage made from tea as its basic ingredient and fermented by active starter of microbial consortia. The flavor of this fermented beverage is determined by many factors, such as supplementation of the main raw ingredient with various fruits, sugar, and types of tea used as its main raw ingredient. The main objective of this research was to elucidate the effect of fruit supplementation (addition of Fuji apple and strawberry) on the organoleptic quality of the products, following incubation periods of 4, 8, and 12 days. A triplicate complete randomized factorial design (types of fruits combined with incubation period) was applied in the experiment. Organoleptic tests (include taste, aroma, and color of the products) were conducted by applying quisionere method involving 7 panelis. The results showed that types of fruits and incubation period significantly affected (p<0.05) the organoleptic quality of the kombucha products. Overall, combination of stroberry and incubation period of 4 days gave the best results (p<0.05) when compared to control (commercially sold kombucha) and other treatments, indicating that such product has potential to be widely commercialized.
 Keywords: Alcohol, fermented beverage, fermentation, kombucha, organic acids
 ABSTRAK
 Kombucha merupakan minuman hasil fermentasi yang terbuat dari bahan dasar teh setelah diinokulasi dengan mikroba starter. Cita rasa kombucha sangat ditentukan oleh penambahan suplemen, seperti gula, buah-buahan, dan jenis teh yang dipakai. Tujuan utama penelitian ini untuk mengelusidasi pengaruh penambahan jenis buah (buah apel dan buah strobery) dan lama waktu fermentasi (4, 8, dan 12 hari) terhadap kualitas organoleptik produk kombucha yang dihasilkan. Penelitian ini menggunakan rancangan acak lengkap factorial (jenis buah yang dikombinasi dengan lama fermentasi) dengan 3 kali ulangan untuk setiap kombinasi perlakuan. Uji organoleptik (rasa, warna, dan aroma) dilakukan dengan metoda kuesioner yang melibatkan 7 orang panelis. Hasil penelitian menunjukkan bahwa jenis buah dan lama fermentasi berpengaruh nyata terhadap tingkat kesukaan panelis pada produk kombucha. Secara keseluruhan, perlakuan kombinasi penambahan buah stroberi dan waktu fermentasi selama 4 hari memberikan hasil terbaik, dan berbeda nyata dengan kontrol maupun perlakuan lainnya. Hal ini mengindikasikan bahwa produk penelitian ini berpeluang untuk dipasarkan secara luas.
 Kata kunci: Alkohol, asam organik, fermentasi, kombucha, minuman terfermentasi
With the development of wireless communications and the increasing computing power of variety mobile devices, LBS (Location Based Service) technologies getting more and more attention as it can provide most flexibility and convenience in modern people' s life. For this survey, we will first give a comprehensive introduction about LBS, including definition, advantages, application, and potential privacy problem. Then, we will present more detailed discussion focusing on the location technologies which is an essential part in LBS framework.
Guilloteau Romain, Pradas David, Pelat Guillaume
et al.
VPN are a secured tunnel that help service providers to exchange data over non-secured networks. There is a large variety of VPN solutions that have variable deployment impacts on the target architecture as well as performance limitations or opportunities. This technical report compares Wireguard and OpenVPN for various SATCOM deployment scenarios and topologies.
We derive an analytic model of packet aggregation on the the downlink of an 802.11ac WLAN when packet arrivals are paced. The model is closed-form and so suitable for both analysis and design of next generation edge architectures that aim to achieve high rate and low delay. The model is validated against both simulations and experimental measurements and found to be remarkably accurate despite its simplicity.
Daniel Semrau, Shahzaib Durrani, Georgios Zervas
et al.
The relationship between topology and network throughput of arbitrarily-connected mesh networks is studied. Taking into account nonlinear channel properties, it is shown that throughput decreases logarithmically with physical network size with minor dependence on network ellipticity.
Private deployments of 4G and 5G networks in industrial environments are beneficial from various aspects. Private 4G/5G networks typically face the challenge of supporting heterogeneous industrial applications. This technology demonstration highlights the importance of network slicing in private 4G/5G networks. It shows that network slicing is crucial for performance guarantees in multi-service co-existence scenarios. With network slicing, our private 4G/5G network successfully supports closed-loop control, event-driven control and video streaming applications.
Christian Raffelsberger, Raheeb Muzaffar, Christian Bettstetter
We introduce a measurement tool for the performance evaluation of wireless communications with drones over cellular networks. The Android software records various LTE parameters, evaluates the TCP and UDP throughput, and tracks the GPS position. Example measurement results are presented.
Age of Information (AoI) is studied in two-user broadcast networks with feedback, and lower and upper bounds are derived on the expected weighted sum AoI of the users. In particular, a class of simple coding actions is considered and within this class, randomized and deterministic policies are devised. Explicit conditions are found for symmetric dependent channels under which coded randomized policies strictly outperform the corresponding uncoded policies. Similar behavior is numerically shown for deterministic policies.
Vladyslav Fedchenko, Giovanni Neglia, Bruno Ribeiro
We propose a caching policy that uses a feedforward neural network (FNN) to predict content popularity. Our scheme outperforms popular eviction policies like LRU or ARC, but also a new policy relying on the more complex recurrent neural networks. At the same time, replacing the FNN predictor with a naive linear estimator does not degrade caching performance significantly, questioning then the role of neural networks for these applications.
The paper presents a pragmatic and practical multilayer network planning approach based on a candidate lightpath auxiliary graph model. The paper discusses, how this approach can be applied to offline network planning as well as dynamic planning and provisioning of services.
Wenqin Shao, Jean-Louis Rougier, François Devienne
et al.
We show that it is common to lose some datapoints for mea-surements scheduled at regular interval on RIPE Atlas. Thetemporal correlation between missing measurements and con-nection events are analyzed, in the pursuit of understandingreasons behind such missings. To our surprise, a big part of measurements are lost while probes are connected.
El artículo presenta la llegada del nuevo milenio, un número cada vez mayor de empresarios se unieron a la aplicación del diseño sostenible que comenzó a replantearse en las empresas y el rol que juegan con el desarrollo del medio ambiente, el planeta y en la sociedad. Podemos decir que el diseño sostenible busca generar soluciones a través de servicios y estilos de vida, pero no exclusivamente a través de objetos. Con el fin de introducir una definición elaborada de diseño sostenible es necesario mencionar los sistemas sostenibles, que básicamente, se refieren a cualquier tipo de red o servicio social que puede existir y replicarse. Además de sistemas sostenibles hay otros principios dentro del diseño sostenible. Por último, cualquier tipo de resultado obtenido para satisfacer la necesidad debe ser sostenible a largo plazo entendiéndose como un proceso que permita una comunidad lograr un resultado a través de estrategias de diseño.
In this paper, we consider fair privacy in a shared network subject to traffic analysis attacks by an eavesdropper. We initiate the study of the joint trade-off between privacy, throughput and delay in such a shared network as a utility fairness problem and derive the proportional fair rate allocation for networks of flows subject to privacy constraints and delay deadlines.
This paper studies the rate of convergence of the power-of-two-choices, a celebrated randomized load balancing algorithm for many-server queueing systems, to its mean field limit. The convergence to the mean-field limit has been proved in the literature, but the rate of convergence remained to be an open problem. This paper establishes that the sequence of stationary distributions, indexed by $M,$ the number of servers in the system, converges in mean-square to its mean-field limit with rate $O\left(\frac{(\log M)^3 (\log\log M)^2}{M}\right).$
Ngoc-Khuyen Le, Anais Vergne, Philippe Martins
et al.
In this paper, we introduce a distributed algorithm to compute thě Cech complex. This algorithm is aimed at solving coverage problems in self organized wireless networks. Two applications based on the distributed computation of thě Cech complex are proposed. The first application detects coverage holes while the later one optimizes coverage of wireless networks.