Search results for: Polish criminal law
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 651

Search results for: Polish criminal law

231 Modeling Loads Applied to Main and Crank Bearings in the Compression-Ignition Two-Stroke Engine

Authors: Marcin Szlachetka, Mateusz Paszko, Grzegorz Baranski

Abstract:

This paper discusses the AVL EXCITE Designer simulation research into loads applied to main and crank bearings in the compression-ignition two-stroke engine. There was created a model of engine lubrication system which covers the part of this system related to particular nodes of a bearing system, i.e. a connection of main bearings in an engine block with a crankshaft, a connection of crank pins with a connecting rod. The analysis focused on the load given as a distribution of hydrodynamic oil film pressure corresponding different values of radial internal clearance. There was also studied the impact of gas force on minimal oil film thickness in main and crank bearings versus crankshaft rotational speed. Our model calculates oil film parameters, an oil film pressure distribution, an oil temperature change and dimensions of bearings as well as an oil temperature distribution on surfaces of bearing seats. Accordingly, it was possible to select, for example, a correct clearance for each of the node bearings. The research was performed for several values of engine crankshaft speed ranging from 800 RPM to 4000 RPM. Bearing oil pressure was changed according to engine speed ranging between 1 bar and 5 bar and an oil temperature of 90°C. The main bearing clearances made initially for the calculation and research were: 0.015 mm, 0.025 mm, 0.035 mm, 0.05 mm, 0.1 mm. The oil used for the research corresponded the SAE 5W-40 classification. The paper presents the selected research results referring to certain specific operating points and bearing radial internal clearances. Acknowledgement: This work has been realized in the cooperation with The Construction Office of WSK ‘PZL-KALISZ’ S.A. and is part of Grant Agreement No. POIR.01.02.00-00-0002/15 financed by the Polish National Centre for Research and Development.

Keywords: crank bearings, diesel engine, oil film, two-stroke engine

Procedia PDF Downloads 186
230 Harnessing Entrepreneurial Opportunities for National Security

Authors: Itiola Kehinde Adeniran

Abstract:

This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities.

Keywords: entrepreneurship, entrepreneurial opportunities, national security, unemployment

Procedia PDF Downloads 304
229 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 250
228 Retail of Organic Food in Poland

Authors: Joanna Smoluk-Sikorska, Władysława Łuczka

Abstract:

Organic farming is an important element of sustainable agriculture. It has been developing very dynamically in Poland, especially since Poland’s accession to the EU. Nevertheless, properly functioning organic market is a necessary condition justifying development of organic agriculture. Despite significant improvement, this market in Poland is still in the initial stage of growth. An important element of the market is distribution, especially retail, which offers specified product range to consumers. Therefore, there is a need to investigate retail outlets offering organic food in order to improve functioning of this part of the market. The inquiry research conducted in three types of outlets offering organic food, between 2011 and 2012 in the 8 largest Polish cities, shows that the majority of outlets offer cereals, processed fruit and vegetables as well as spices and the least shops – meat and sausages. The distributors mostly indicate unsatisfactory product range of suppliers as the reason for this situation. The main providers of the outlets are wholesalers, particularly in case of processed products, and in fresh products – organic farms. A very important distribution obstacle is dispersion of producers, which generates high transportation costs and what follows that, high price of organics. In the investigated shops, the most often used price calculation method is a cost method. The majority of the groceries and specialist shops apply margins between 21 and 40%. The margin in specialist outlets is the highest, in regard to the qualified service and advice. In turn, most retail networks declare the margin between 0 and 20%, which is consistent with low-price strategy applied in these shops. Some lacks in the product range of organics and in particular high prices cause that the demand volume is rather low. Therefore there is a need to support certain market actions, e.g. on-farm processing or promotion.

Keywords: organic food, retail, product range, supply sources

Procedia PDF Downloads 273
227 “Human Trafficking In Your Backyard: Know The Signs And How To Help”

Authors: Jessie Fazel, Kristen Smith

Abstract:

Human trafficking is a multi-billion-dollar criminal industry that affects 24.9 million people around the world. There are several different types of trafficking, the most common being sex trafficking, labor trafficking, and domestic servitude. Survival sex is common in the pediatric population, as they engage in sex for food, a place to sleep, or other basic needs. Statistics show that health care workers are at a unique advantage to help identify victims and get them the help they need, as 88% of trafficked victims encounter a health care worker while being trafficked. Unfortunately, victims don’t usually self-identify that they are being trafficked and the situations they face can vary dramatically. It is imperative to remember that traditional red flags are not always present in the pediatric population. Risk factors and red flags with their history and physical exam are one of the best indicators that health care providers need to be vigilant in looking at. There are numerous barriers for disclosure in the healthcare setting. Periods of time before and after disclosure are often emotionally difficult and could be dangerous for the victim. It is extremely important to have a plan in place for intervention if the victim does disclose trafficking. A trauma informed approach to medical and mental health interventions, that focus on safety, are vital in this population. This is happening where you live and you can make a difference in their lives.

Keywords: human trafficking, public health, emergency medicine, sexual health

Procedia PDF Downloads 12
226 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 341
225 Application of XRF and Other Principal Component Analysis for Counterfeited Gold Coin Characterization in Forensic Science

Authors: Somayeh Khanjani, Hamideh Abolghasemi, Hadi Shirzad, Samaneh Nabavi

Abstract:

At world market can be currently encountered a wide range of gemological objects that are incorrectly declared, treated, or it concerns completely different materials that try to copy precious objects more or less successfully. Counterfeiting of precious commodities is a problem faced by governments in most countries. Police have seized many counterfeit coins that looked like the real coins and because the feeling to the touch and the weight were very similar to those of real coins. Most people were fooled and believed that the counterfeit coins were real ones. These counterfeit coins may have been made by big criminal organizations. To elucidate the manufacturing process, not only the quantitative analysis of the coins but also the comparison of their morphological characteristics was necessary. Several modern techniques have been applied to prevent counterfeiting of coins. The objective of this study was to demonstrate the potential of X-ray Fluorescence (XRF) technique and the other analytical techniques for example SEM/EDX/WDX, FT-IR/ATR and Raman Spectroscopy. Using four elements (Cu, Ag, Au and Zn) and obtaining XRF for several samples, they could be discriminated. XRF technique and SEM/EDX/WDX are used for study of chemical composition. XRF analyzers provide a fast, accurate, nondestructive method to test the purity and chemistry of all precious metals. XRF is a very promising technique for rapid and non destructive counterfeit coins identification in forensic science.

Keywords: counterfeit coins, X-ray fluorescence, forensic, FT-IR

Procedia PDF Downloads 466
224 Research of Actuators of Common Rail Injection Systems with the Use of LabVIEW on a Specially Designed Test Bench

Authors: G. Baranski, A. Majczak, M. Wendeker

Abstract:

Currently, the most commonly used solution to provide fuel to the diesel engines is the Common Rail system. Compared to previous designs, as a due to relatively simple construction and electronic control systems, these systems allow achieving favourable engine operation parameters with particular emphasis on low emission of toxic compounds into the atmosphere. In this system, the amount of injected fuel dose is strictly dependent on the course of parameters of the electrical impulse sent by the power amplifier power supply system injector from the engine controller. The article presents the construction of a laboratory test bench to examine the course of the injection process and the expense in storage injection systems. The test bench enables testing of injection systems with electromagnetically controlled injectors with the use of scientific engineering tools. The developed system is based on LabView software and CompactRIO family controller using FPGA systems and a real time microcontroller. The results of experimental research on electromagnetic injectors of common rail system, controlled by a dedicated National Instruments card, confirm the effectiveness of the presented approach. The results of the research described in the article present the influence of basic parameters of the electric impulse opening the electromagnetic injector on the value of the injected fuel dose. Acknowledgement: This work has been realized in the cooperation with The Construction Office of WSK ‘PZL-KALISZ’ S.A.’ and is part of Grant Agreement No. POIR.01.02.00-00-0002/15 financed by the Polish National Centre for Research and Development.

Keywords: fuel injector, combustion engine, fuel pressure, compression ignition engine, power supply system, controller, LabVIEW

Procedia PDF Downloads 104
223 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 54
222 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 256
221 Resilience and Mindfulness as Individual Resources Building Communication Skills for Physicians

Authors: Malgorzata Sekulowicz, Krystyna Boron-Krupinska, Paulina Morga, Blazej Cieslik

Abstract:

Burnout is highly prevalent in health care employees, especially in physicians. It significantly reduces the efficiency of these employees, which can have negative consequences for both physicians and patients. Resilience and mindfulness enhancing positive emotions, leading to sustainable development and personal commitment, can have a significant impact on burnout. Therefore, the aim of this study was to determine the relationship between burnout symptoms and mindfulness and resilience among physicians. The authors conducted a cross-sectional survey study among seventy-four polish physicians. Participants filled out the following psychometric tools: the Maslach Burnout Inventory - Human Services Survey (MBI-HSS), Five Facet Mindfulness Questionnaire (FFMQ), Areas of Work-Life Survey (AWS), International Personality Item Pool (IPIP), the Resilience Assessment Scale (SPP-25) and the Mini-COPE Inventory. The relationship between burnout and resilience and mindfulness was assessed with path analysis. Analyzing the relationship between MBI-HSS components and mindfulness, a significant negative correlation of the FFMQ score with emotional exhaustion (-0.50, p < 0.05) and depersonalization (-0.43, p < 0.05) and a positive correlation with personal accomplishment (0.50, p < 0.05) was demonstrated. Analyzing resilience, a statistically significant relationship of SPP-25 with all tested components of MBI-HSS was demonstrated: emotional exhaustion (-0.54, p < 0.05), depersonalization (-0.31, p < 0.05) and personal accomplishment (0.35, p < 0.05). In the group of medical doctors, the higher the level of mindfulness and resilience, the lower the risk of burnout. Furthermore, the more frequently used active coping strategies (planning, acceptance), the lower the risk of burnout, while the use of passive, evasive strategies increases the risk of burnout. It may be worth considering implementing mindfulness intervention to effectively manage burnout symptoms in this group.

Keywords: burnout, medical doctors, mindfulness, physicians, resilience

Procedia PDF Downloads 85
220 The Legal Position of Criminal Prevention in the Metaverse World

Authors: Andi Intan Purnamasari, Supriyadi, Sulbadana, Aminuddin Kasim

Abstract:

Law functions as social control. Providing arrangements not only for legal certainty, but also in the scope of justice and expediency. The three values ​​achieved by law essentially function to bring comfort to each individual in carrying out daily activities. However, it is undeniable that global conditions have changed the orientation of people's lifestyles. Some people want to ensure their existence in the digital world which is popularly known as the metaverse. Some countries even project their city to be a metaverse city. The order of life is no longer limited to the real space, but also to the cyber world. Not infrequently, legal events that occur in the cyber world also force the law to position its position and even prevent crime in cyberspace. Through this research, conceptually it provides a view of the legal position in crime prevention in the Metaverse world. when the law acts to regulate the situation in the virtual world, of course some people will feel disturbed, this is due to the thought that the virtual world is a world in which an avatar can do things that cannot be done in the real world, or can be called a world without boundaries. Therefore, when the law is present to provide boundaries, of course the concept of the virtual world itself becomes no longer a cyber world that is not limited by space and time, it becomes a new order of life. approach, approach, approach, approach, and approach will certainly be the method used in this research.

Keywords: crime, cyber, metaverse, law

Procedia PDF Downloads 122
219 Special Plea That The Prosecutor Does Not Have Title To Prosecute

Authors: Wium de Villiers

Abstract:

Section 106(1)(h) of the South African Criminal Procedure Act 51 of 1977 provides that an accused may enter a special plea that the prosecutor does not have title to prosecute. In a seminal matter (S v Mousa 2021 2 SACR 378 (GJ)) regarding section 106(1)(h), certain interesting legal aspects emerged. The first aspect concerned the meaning of the term “prosecutor”. More specifically, the question arose whether the term included a prosecutor who was previously involved with the matter, as well as the relevant Deputy Director of Public Prosecutions (DDPP) who instituted the prosecution and oversaw the prosecution on behalf of the state. The meaning of the term “title”, and with regard to the conduct of the “prosecutor”, the term “abuse of process,” were also raised and decided. In the paper, the facts, and the arguments in, and the decisions of the court, are discussed critically. The author argue that the intended objection in section 106(1)(h) is not to cure the abuse inflicted by a previous prosecutor or by the DDPP. I point out that the term “title” includes a lack of authority, non-compliance with jurisdictional requirements or absence of locus standi. I also point out that an abuse of process takes place if the process is used for an improper, ulterior or collateral purpose. I also argue that the accused should, instead of relying on section 106(1)(h), have relied on the prior agreement and applied for a permanent stay of prosecution.

Keywords: special plea, prosecutor, title, abuse of process

Procedia PDF Downloads 31
218 Contextualizing Torture in Closed Institutions

Authors: Erinda Bllaca Ndroqi

Abstract:

The dilemma with which the monitoring professionals are facing in today’s reality is whether to accept that prisons all over the world constitute a place where not all rights are respected (ethical approach), or widen the scope of monitoring by prioritizing the special needs of people deprived of their liberties (human right approach), despite the context and the level of improved prison condition, staff profiling, more services oriented towards rehabilitation instead of punishment. Such dilemma becomes a concern if taking into consideration the fact that prisoners, due to their powerlessness and 'their lives at the hand of the state', are constantly under the threat of abuse of power and neglect, which in the Albanian case, has never been classified as torture. Scientific research in twenty-four (24) Albanian prisons shows that for some rights, prisoners belonging to 'vulnerable groups' such as mental illness, HIV positive status, sexual orientation, and terminal illness remain quite challenged and do not ensure that their basic rights are being met by the current criminal justice system (despite recommendations set forwards to prison authorities by the European Committee for the Prevention of Torture and Inhuman or Degrading Treatment or Punishment (CPT)). The research orients more discussion about policy and strategic recommendations that would need a thorough assessment of the impact of rehabilitation in special categories of prisoners, including recidivists.

Keywords: prisons, rehabilitation, torture, vulnerability

Procedia PDF Downloads 112
217 Killed by the ‘Subhuman’: Jane Longhurst’s Murder and the Construction of the ‘Extreme Pornography’ Problem in the British National Press

Authors: Dimitrios Akrivos, Alexandros K. Antoniou

Abstract:

This paper looks at the crucial role of the British news media in the construction of extreme pornography as a social problem, suggesting that this paved the way for the subsequent criminalization of such material through the introduction of the Criminal Justice and Immigration Act 2008. Focusing on the high-profile case of Graham Coutts, it examines the British national press’ reaction to Jane Longhurst’s murder through a qualitative content analysis of 251 relevant news articles. Specifically, the paper documents the key arguments expressed in the corresponding claims-making process. It considers the different ways in which the consequent ‘trial by media’ presented this exceptional case as the ‘tip of the iceberg’ and eventually translated into policy. The analysis sheds light on the attempts to ‘piggyback’ the issue of extreme pornography on child sexual abuse images as well as the textual and visual mechanisms used to establish an ‘us versus them’ dichotomy in the pertinent media discourse. Finally, the paper assesses the severity of the actual risk posed by extreme pornography, concluding that its criminalization should not merely be dismissed as the outcome of an institutionalized media panic.

Keywords: criminalization, extreme pornography, social problem, trial by media

Procedia PDF Downloads 217
216 Impact of Chimerism on Y-STR DNA Determination: Sex Mismatch Analysis

Authors: Anupuma Raina, Ajay P. Balayan, Prateek Pandya, Pankaj Shrivastava, Uma Kanga, Tulika Seth

Abstract:

DNA fingerprinting analysis aids in personal identification for forensic purposes and has always been a driving motivation for law enforcement agencies in almost all countries since its inception. The introduction of DNA markers (Y-STR) has allowed for greater precision and higher discriminatory power in forensic testing. A criminal/ person committing crime after bone marrow transplantation is a rare situation but not an impossible one. Keeping such a situation in mind, a study was carried out to find out the best biological sample to be used for personal identification, especially in forensic situation. We choose a female patient (recipient) and a male donor. The pre transplant sample (blood) and post transplant samples (blood, buccal swab, hair roots) were collected from the recipient (patient). The same were compared with the blood sample of the donor using DNA FP technique. Post transplant samples were collected at different interval of time (15, 30, 60, and 90 days). The study was carried out using Y-STR kit at 23 loci. The results determined discusses the phenomenon of chimerism and its impact on Y-STR. Hair sample was found the most suitable sample which had no donor DNA profiling up to 90 days.

Keywords: bone marrow transplantation, chimerism, DNA profiling, Y-STR

Procedia PDF Downloads 125
215 Opposed Piston Engine Crankshaft Strength Calculation Using Finite Element Method

Authors: Konrad Pietrykowski, Michał Gęca, Michał Bialy

Abstract:

The paper presents the results of the crankshaft strength simulation. The crankshaft was taken from the opposed piston engine. Calculations were made using finite element method (FEM) in Abaqus software. This program allows to perform strength tests of individual machine parts as well as their assemblies. The crankshaft that was used in the calculations will be used in the two-stroke aviation research aircraft engine. The assumptions for the calculations were obtained from the AVL Boost software, from one-dimensional engine cycle model and from the multibody model using the method developed in the MSC Adams software. The research engine will be equipped with 3 combustion chambers and two crankshafts. In order to shorten the calculation time, only one crankcase analysis was performed. The cut of the shaft has been selected with the greatest forces resulting from the engine operation. Calculations were made for two cases. For maximum piston force when maximum bending load occurs and for the maximum torque. Cast iron material was adopted. For this material, Poisson's number, density, and Young's modulus were determined. The computational grid contained of 1,977,473 Tet elements. This type of elements was chosen because of the complex design of the crankshaft. Results are presented in the form of stress distributions maps and displacements on the surface and inside the geometry of the shaft. The results show the places of tension stresses, however, no stresses are exceeded at any place. The shaft can thus be applied to the engine in its present form. Acknowledgement: This work has been realized in the cooperation with The Construction Office of WSK 'PZL-KALISZ’ S.A. and is part of Grant Agreement No. POIR.01.02.00-00-0002/15 financed by the Polish National Centre for Research and Development.

Keywords: aircraft diesel engine, crankshaft, finite element method, two-stroke engine

Procedia PDF Downloads 161
214 Solar-Assisted City Bus Electrical Installation: Opportunities and Impact on the Environment in Sydney

Authors: M. J. Geca, T. Tulwin, A. Majczak

Abstract:

On-board electricity consumption in the diesel city bus during operation is an important energy source. Electricity is generated by a combustion engine-driven alternator. Increased fuel consumption to generate on-board electricity in the bus has a negative impact on the emission of toxic components and carbon dioxide. At the same time, the bus roof surface allows placing a set of lightweight photovoltaic panels with power from 1 to 1.5 kW. The article presents an experimental study of electricity consumption of a city bus with diesel engine equipped with photovoltaic installation. The stream of electricity consumed by the bus and generated by a standard alternator and PV system was recorded. Base on the experimental research carried out in central Europe; the article analyses the impact of an additional source of electricity in the form of a photovoltaic installation on fuel consumption and emissions of toxic components of vehicles located in the latitude of Sydney. In Poland, the maximum global value of horizontal irradiation GHI is 1150 kWh/m², while for Sydney 1652 kWh/m². In addition, the profile of temperature and sunshine per year is different for these two different latitudes as presented in the article. Electricity generated directly from the sun powers the bus's electrical receivers. The photovoltaic system is able to replace 23% of annual electricity consumption, which at the same time will reduce 4% of fuel consumption and CO₂ reduction. Approximately 25% of the light is lost during vehicle traffic in Sydney latitude. The temperature losses of photovoltaic panels are comparable due to the cooling during vehicle motion. Acknowledgement: The project/research was financed in the framework of the project Lublin University of Technology - Regional Excellence Initiative, funded by the Polish Ministry of Science and Higher Education (contract no. 030/RID/2018/19).

Keywords: electric energy, photovoltaic system, fuel consumption, CO₂

Procedia PDF Downloads 91
213 The Use of Visual Drawing and Writing Techniques to Elicit Adult Perceptions of Sex Offenders

Authors: Sasha Goodwin

Abstract:

Public perceptions can play a crucial role in influencing criminal justice policy and legislation, particularly concerning sex offenders. Studies have found a proximate relationship between public perception and policy to manage the risks posed by sex offenders. A significant body of research on public perceptions about sex offenders primarily uses survey methods and standardised instruments such as the Community Attitude Towards Sex Offenders (CATSO) and Perceptions of Sex Offenders (PSO) scales and finds a mostly negative and punitive attitude informed by common misconceptions. A transformative methodology from the emerging sub-field of visual criminology is where the construction of offences and offenders are understood via novel ways of collecting and analysing data. This research paper examines the public perceptions of sex offenders through the utilization of a content analysis of drawings. The study aimed to disentangle the emotions, stereotypes, and myths embedded in public perceptions by analysing the graphic representations and specific characteristics depicted by participants. Preliminary findings highlight significant discrepancies between public perceptions and empirical profiles of sex offenders, shedding light on the misunderstandings surrounding this heterogeneous group. By employing visual data, this research contributes to a deeper understanding of the complex interplay between societal perceptions and the realities of sex offenders.

Keywords: emotions, figural drawings, public perception, sex offenders

Procedia PDF Downloads 40
212 Cluster Analysis of Retailers’ Benefits from Their Cooperation with Manufacturers: Business Models Perspective

Authors: M. K. Witek-Hajduk, T. M. Napiórkowski

Abstract:

A number of studies discussed the topic of benefits of retailers-manufacturers cooperation and coopetition. However, there are only few publications focused on the benefits of cooperation and coopetition between retailers and their suppliers of durable consumer goods; especially in the context of business model of cooperating partners. This paper aims to provide a clustering approach to segment retailers selling consumer durables according to the benefits they obtain from their cooperation with key manufacturers and differentiate the said retailers’ in term of the business models of cooperating partners. For the purpose of the study, a survey (with a CATI method) collected data on 603 consumer durables retailers present on the Polish market. Retailers are clustered both, with hierarchical and non-hierarchical methods. Five distinctive groups of consumer durables’ retailers are (based on the studied benefits) identified using the two-stage clustering approach. The clusters are then characterized with a set of exogenous variables, key of which are business models employed by the retailer and its partnering key manufacturer. The paper finds that the a combination of a medium sized retailer classified as an Integrator with a chiefly domestic capital and a manufacturer categorized as a Market Player will yield the highest benefits. On the other side of the spectrum is medium sized Distributor retailer with solely domestic capital – in this case, the business model of the cooperating manufactrer appears to be irreleveant. This paper is the one of the first empirical study using cluster analysis on primary data that defines the types of cooperation between consumer durables’ retailers and manufacturers – their key suppliers. The analysis integrates a perspective of both retailers’ and manufacturers’ business models and matches them with individual and joint benefits.

Keywords: benefits of cooperation, business model, cluster analysis, retailer-manufacturer cooperation

Procedia PDF Downloads 235
211 Generalization of Clustering Coefficient on Lattice Networks Applied to Criminal Networks

Authors: Christian H. Sanabria-Montaña, Rodrigo Huerta-Quintanilla

Abstract:

A lattice network is a special type of network in which all nodes have the same number of links, and its boundary conditions are periodic. The most basic lattice network is the ring, a one-dimensional network with periodic border conditions. In contrast, the Cartesian product of d rings forms a d-dimensional lattice network. An analytical expression currently exists for the clustering coefficient in this type of network, but the theoretical value is valid only up to certain connectivity value; in other words, the analytical expression is incomplete. Here we obtain analytically the clustering coefficient expression in d-dimensional lattice networks for any link density. Our analytical results show that the clustering coefficient for a lattice network with density of links that tend to 1, leads to the value of the clustering coefficient of a fully connected network. We developed a model on criminology in which the generalized clustering coefficient expression is applied. The model states that delinquents learn the know-how of crime business by sharing knowledge, directly or indirectly, with their friends of the gang. This generalization shed light on the network properties, which is important to develop new models in different fields where network structure plays an important role in the system dynamic, such as criminology, evolutionary game theory, econophysics, among others.

Keywords: clustering coefficient, criminology, generalized, regular network d-dimensional

Procedia PDF Downloads 382
210 Computational Fluid Dynamics Model of Various Types of Rocket Engine Nozzles

Authors: Konrad Pietrykowski, Michal Bialy, Pawel Karpinski, Radoslaw Maczka

Abstract:

The nozzle is an element of the rocket engine in which the conversion of the potential energy of gases generated during combustion into the kinetic energy of the gas stream takes place. The design parameters of the nozzle have a decisive influence on the ballistic characteristics of the engine. Designing a nozzle assembly is, therefore, one of the most responsible stages in developing a rocket engine design. The paper presents the results of the simulation of three types of rocket propulsion nozzles. Calculations were made using CFD (Computational Fluid Dynamics) in ANSYS Fluent software. The next types of nozzles differ in shape. The analysis was made of a conical nozzle, a bell type nozzle with a conical supersonic part and a bell type nozzle. Calculation results are presented in the form of pressure, velocity and kinetic energy distributions of turbulence in the longitudinal section. The courses of these values along the nozzles are also presented. The results show that the cone nozzle generates strong turbulence in the critical section. Which negatively affect the flow of the working medium. In the case of a bell nozzle, the transformation of the wall caused the elimination of flow disturbances in the critical section. This reduces the probability of waves forming before or after the trailing edge. The most sophisticated construction is the bell type nozzle. It allows you to maximize performance without adding extra weight. The bell type nozzle can be used as a starter and auxiliary engine nozzle due to its advantages. The project/research was financed in the framework of the project Lublin University of Technology-Regional Excellence Initiative, funded by the Polish Ministry of Science and Higher Education (contract no. 030/RID/2018/19).

Keywords: computational fluid dynamics, nozzle, rocket engine, supersonic flow

Procedia PDF Downloads 136
209 Gender Stereotypes in Reproductive Medicine with Regard to Parental Age

Authors: Monika Michałowska, Anna Alichniewicz

Abstract:

Detrimental outcomes of advanced maternal age on the chances of fertilization, pregnancy as well as mother and fetus health have been recognized for several decades. It seemed interesting to investigate whether there is a comparable awareness of the detrimental influence on the reproductive outcomes of late fatherhood, given that it has been already ten years since an intense and growing interest concerning later-age fatherhood commenced in medical research. To address that issue a two-step research was done. First, we performed a review of the subject literature to answer the following questions: 1) What age is defined as advanced?; 2) Is the same age defined as advanced in both genders?; 3) What terminology concerning age issues is used?; 4) Is the same age terminology used regarding both genders? The second part of our studies was devoted to the views of medical students. This part of our research comprised both quantitative and qualitative studies. Opinions of medical students in one of the Polish medical universities on several issues connected with assisted reproduction technology (ART) were gathered: 1) students’ attitude to in vitro fertilization (IVF) for women over 40 and for postmenopausal women; 2) students’ attitude to late fatherhood; 3) students’ reasoning given against acceptability of IVF procedure for all of these group of patients involved in an IVF procedure. Our analyses revealed that: First, there is no universal definition of the term ‘advanced age’; secondly, there is a general tendency to adopt different age limits depending on whether they refer to maternal or paternal age, but no justification is provided by the researchers explaining why they set different age limits for women and men; thirdly, the image of postponed fatherhood stands in stark contrast to postponed motherhood - while postponed fatherhood is frequently portrayed as a reasonable and conscious decision enabling a stable family environment for a child, the reasonableness of postponed motherhood is often questioned; finally, the bias regarding maternal versus paternal age is deeply embedded in medical students’ attitude to IVF for women over 40 and for postmenopausal women.

Keywords: gender stereotypes, reproductive medicine, maternal age, paternal age

Procedia PDF Downloads 246
208 Empowering Children through Co-creation: Writing a Book with and for Children about Their First Steps Towards Urban Independence

Authors: Beata Patuszynska

Abstract:

Children are largely absent from Polish social discourse, a fact which is mirrored in urban planning processes. Their absence creates a vicious circle – an unfriendly urban space discourages children from going outside on their own, meaning adults do not see a need to make spaces more friendly for a group, not present. The pandemic and lockdown, with their closed schools and temporary ban on unaccompanied minors on the streets, have only reinforced this. The project – co-writing with children a book concerning their first steps into urban independence - aims at empowering children, enabling them to find their voice when it comes to urban space. The foundation for the book was data collected during research and workshops with children from Warsaw primary schools, aged 7-10 - the age they begin independent travel in the city. The project was carried out with the participation and involvement of children at each creative step. Children were (1) models: the narrator is an 7-year-old boy getting ready for urban independence. He shares his experience as well as the experience of his school friends and his 10-year-old sister, who already travels on her own. Children were (2) teachers: the book is based on authentic children’s stories and experience, along with the author’s findings from research undertaken with children. The material was extended by observations and conclusions made during the pandemic. Children were (3) reviewers: a series of draft chapters from the book underwent review by children during workshops performed in a school. The process demonstrated that all children experience similar pleasures and worries when it comes to interaction with urban space. Furthermore, they also have similar needs that need satisfying. In my article, I will discuss; (1) the advantages of creating together with children; (2) my conclusions on how to work with children in participatory processes; (3) research results: perceptions of urban space by children age 7-10, when they begin their independent travel in the city; the barriers to and pleasures derived from independent urban travel; the influence of the pandemic on children’s feelings and their behaviour in urban spaces.

Keywords: children, urban space, co-creation, participation, human rights

Procedia PDF Downloads 81
207 Characterization of White Spot Lesion Using Focused Ion Beam - Scanning Electron Microscopy

Authors: Malihe Moeinin, Robert Hill, Ferranti Wong

Abstract:

Background: A white spot lesion (WSL) is defined as subsurface enamel porosity from carious demineralisation on the smooth surfaces of the tooth. It appears as a milky white opacity. Lesions shown an apparently intact surface layer, followed underneath by the more porous lesion body. The small pores within the body of the lesion act as diffusion pathway for both acids and minerals, so allowing the demineralisation of enamel to occur at the advancing front of the lesion. Objectives: The objective is to mapthe porosity and its size on WSL with Focused Ion Bean- Scanning Electron Microscopy (FIB-SEM) Method: The basic method used for FIB-SEM consisted of depositing a one micron thick layer of platinum over 25μmx 25μm of the interest region of enamel. Then, making a rough cut (25μmx 5μmx 20μm) with 3nA current and 30Kv was applied with the help of drift suppression (DS), using a standard “cross-sectional” cutting pattern, which ended at the front of the deposited platinum layer. Two adjacent areas (25μmx 5μmx 20μm) on the both sides of the platinum layer were milled under the same conditions. Subsequent, cleaning cross-sections were applied to polish the sub-surface edge of interest running perpendicular to the surface. The "slice and view" was carried out overnight for milling almost 700 slices with 2Kv and 4nA and taking backscattered (BS) images. Then, images were imported into imageJ and analysed. Results: The prism structure is clearly apparent on FIB-SEM slices of WSL with the dissolution of prism boundaries as well as internal porosity within the prism itself. Porosity scales roughly 100-400nm, which is comparable to the light wavelength (500nm). Conclusion: FIB-SEM is useful to characterize the porosity of WSL and it clearly shows the difference between WSL and normal enamel.

Keywords: white spot lesion, FIB-SEM, enamel porosity, porosity

Procedia PDF Downloads 69
206 Games behind Bars: A Longitudinal Study of Inmates Pro-Social Preferences

Authors: Mario A. Maggioni, Domenico Rossignoli, Simona Beretta, Sara Balestri

Abstract:

The paper presents the results of a Longitudinal Randomized Control Trial implemented in 2016 two State Prisons in California (USA). The subjects were randomly assigned to a 10-months program (GRIP, Guiding Rage Into Power) aiming at undoing the destructive behavioral patterns that lead to criminal actions by raising the individual’s 'mindfulness'. This study tests whether the participation to this program (treatment), based on strong relationships and mutual help, affects pro-social behavior of participants, in particular with reference to trust and inequality aversion. The research protocol entails the administration of two questionnaires including a set of behavioral situations ('games') - widely used in the relevant literature in the field - to 80 inmates, 42 treated (enrolled in the program) and 38 controls. The first questionnaire has been administered before treatment and randomization took place; the second questionnaire at the end of the program. The results of a Difference-in-Differences estimation procedure, show that trust significantly increases GRIP participants to compared to the control group. The result is robust to alternative estimation techniques and to the inclusion of a set of covariates to further control for idiosyncratic characteristics of the prisoners.

Keywords: behavioral economics, difference in differences, longitudinal study, pro-social preferences

Procedia PDF Downloads 364
205 Minors and Terrorism: A Discussion about the Recruitment and Resilience

Authors: Marta Maria Aguilar Carceles

Abstract:

This theoretical study argues how terrorism is rising around the world and which are the factors and situations that contribute to this process. Linked to aspects of human development, minors are one of the most vulnerable collectives to be engaged for this purpose. Its special weakness and lower possibility of self-defense makes them more likely to become victims as a result of a brainwashing process. Terrorism is an illicit way to achieve political and social changes and new technologies and available resources make it easier to spread. In this sense, throughout a theoretical revision of different recent and scientific articles, it is evaluated which risk factors can provoke its affiliation and later develop of antisocial and illicit behavior. An example of this group of factors could be the inter-generational continuity between parents and their children, as well as the sociodemographic aspects joined to cultural experiences (i.e. sense of dishonor, frustration, etc.). The assess of this kind of variables must be accompanied by the evaluation of protective factors, because the reasons through one person decides to join to terrorism are inherently idiosyncratic and we can only install mechanisms of prevention knowing those personal characteristics. To sum, both aspects underline the relevance of the internalizing and externalizing personal factors, each of them in one specific direction: a) to increase the possibility of being recruited or follow this type of criminal group by himself, and b) to be able of avoiding the effects and consequences of terrorism thanks to personal and resilient characteristics (resilience).

Keywords: criminality, minors, recruitment, resilience, terrorism

Procedia PDF Downloads 111
204 Antimicrobial Resistance Patterns of Campylobacter from Pig and Cattle Carcasses in Poland

Authors: Renata Szewczyk, Beata Lachtara, Kinga Wieczorek, Jacek Osek

Abstract:

Campylobacter is recognized as the main cause of bacterial gastrointestinal infections in Europe. A main source of the pathogen is poultry and poultry meat; however, other animals like pigs and cattle can also be reservoirs of the bacteria. Human Campylobacter infections are often self-limiting but in some cases, macrolide and fluoroquinolones have to be used. The aim of this study was to determine antimicrobial resistance patterns (AMR) of Campylobacter isolated from pig and cattle carcasses. Between July 2009 and December 2015, 735 swabs from pig (n = 457) and cattle (n = 278) carcasses were collected at Polish slaughterhouses. All samples were tested for the presence of Campylobacter by ISO 10272-1 and confirmed to species level using PCR. The antimicrobial susceptibility of Campylobacter isolates was determined by a microbroth dilution method with six antimicrobials: gentamicin (GEN), streptomycin (STR), erythromycin (ERY), nalidixic acid (NAL), ciprofloxacin (CIP) and tetracycline (TET). It was found that 167 of 735 samples (22.7%) were contaminated with Campylobacter. The vast majority of them were of pig origin (134; 80.2%), whereas for cattle carcasses Campylobacter was less prevalent (33; 19.8%). Among positive samples C. coli was predominant species (123; 73.7%) and it was isolated mainly from pig carcasses. The remaining isolates were identified as C. jejuni (44; 26.3%). Antimicrobial susceptibility indicated that 22 out of 167 Campylobacter (13.2%) were sensitive to all antimicrobials used. Fourteen of them were C. jejuni (63.6%; pig, n = 6; cattle, n = 8) and 8 was C. coli (36.4%; pig, n = 4; cattle, n = 4). Most of the Campylobacter isolates (145; 86.8%) were resistant to one or more antimicrobials (C. coli, n = 115; C. jejuni, n = 30). Comparing the AMR for Campylobacter species it was found that the most common pattern for C. jejuni was CIP-NAL-TET (9; 30.0%), whereas CIP-NAL-STR-TET was predominant among C. coli (47; 40.9%). Multiresistance, defined as resistance to three or more classes of antimicrobials, was found in 57 C. coli strains, mostly obtained from pig (52 isolates). On the other hand, only one C. jejuni strain, isolated from cattle, showed multiresistance with pattern CIP-NAL-STR-TET. Moreover, CIP-NAL-STR-TET was characteristic for most of multiresistant C. coli isolates (47; 82.5%). For the remaining C. coli the resistance patterns were CIP-ERY-NAL-TET (7 strains; 12.3%) and for one strain of each patterns: ERY-STR-TET, CIP-STR-TET, CIP-NAL-GEN-STR-TET. According to the present findings resistance to erythromycin was observed only in 11 C. coli (pig, n = 10; cattle, n = 1). In conclusion, the results of this study showed that pig carcasses may be a serious public health concern because of contamination with C. coli that might features multiresistance to antimicrobials.

Keywords: antimicrobial resistance, Campylobacter, carcasses, multi resistance

Procedia PDF Downloads 297
203 Influence of Magnetic Field on the Antibacterial Properties of Pine Oil

Authors: Dawid Sołoducha, Tomasz Borowski, Agata Markowska-Szczupak, Aneta Wesołowska, Marian Kordas, Rafał Rakoczy

Abstract:

Many studies report varied effects of the magnetic field in medicine, but applications are still missing. Also, essential oils (EOs) were historically used in healing therapies, food preservation and the cosmetic industry due to their wound healing and antioxidant properties and antimicrobial activity. Unfortunately, the chemical characterization of EOs activates its antibacterial action only at a fairly high concentration. They can cause skin reactions, e.g., irritation (irritant contact dermatitis) or allergic contact dermatitis; therefore, they should always be used with caution. However, the administration of EOs to achieve the desired antimicrobial activity and stability with long-term medical usage in low concentration is challenging. The aim of this work was to investigate the antimicrobial activity of commercial Pinus sylvestris L. essential oil from Polish company Avicenna-Oil® under Rotating Magnetic Field (RMF) at f = 1 – 50 Hz. The novel construction of the magnetically assisted self-constructed reactor (MAP) was applied for this study. The chemical composition of essential pine oil was determined by gas chromatography coupled with mass spectrometry (GC-MS). Model bacteria Escherichia coli K12 (ATCC 25922) was used. Different concentrations of pine oil was prepared: 100% 50%, 25%, 12.5% and 6.25%. The disc diffusion and MIC test were done. To examine the effect of essential pine oil and rotating magnetic field RMF on antibacterial performance agar plate method was used. Pine oil consist of α-pinene (28.58%), β-pinene (17.79%), δ-3-carene (14.17%) and limonene (11.58%). The present study indicates the exposition to the RMF, as compared to the unexposed controls causing an increase in the efficacy of antibacterial properties of pine oil. We have shown that the rotating magnetic fields (RMF) at a frequency, f, between 25 Hz to 50 Hz, increase the antimicrobial efficiency of oil at lower than 50% concentration. The new method can be applied in many fields e.g. aromatherapy, medicine as a component of dressing, or as food preservatives.

Keywords: rotating magnetic field, pine oil, antimicrobial activity, Escherichia coli

Procedia PDF Downloads 190
202 Characteristics Features and Action Mechanism of Some Country Made Pistols

Authors: Ajitesh Pal, Arpan Datta Roy, H. K. Pratihari

Abstract:

The different illegal firearms crudely made by skilled gunsmith from scrap materials are popularly known as country made firearms. Such firearms along with improvised ammunition are clandestinely marketed at the cheaper price without any license to the extremist group, criminal, poachers and firearm lovers. As per National Crime Records Bureau (NCRB), MHA, Govt of India about 80% firearm cases are committed by country made/improvised firearms. The ballistic division of the laboratory has examined a good number of cases. The analysis of firearm cases received for forensic examination revealed that 7.65mm calibre pistols mostly improvised firearm are commonly used in firearm related crime cases. In the present communication, physical parameters and other characteristics features of some 7.65mm calibre pistols have been discussed in detail. The detailed study on country made (CM) firearm will help to prepare a database related to type of material used, origin of the raw material and tools used for inscription. The study also includes to establish the chemistry of propellants & head stamp pattern. The database will be helpful to the firearm examiners, researchers, students pursuing study on forensic science as reference material.

Keywords: improvised pistol, stringent gun law, working mechanism, parameters, database

Procedia PDF Downloads 51