Search results for: Polish criminal procedure
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2857

Search results for: Polish criminal procedure

2107 Method for Assessing Potential in Distribution Logistics

Authors: B. Groß, P. Fronia, P. Nyhuis

Abstract:

In addition to the production, which is already frequently optimized, improving the distribution logistics also opens up tremendous potential for increasing an enterprise’s competitiveness. Here too though, numerous interactions need to be taken into account, enterprises thus need to be able to identify and weigh between different potentials for economically efficient optimizations. In order to be able to assess potentials, enterprises require a suitable method. This paper first briefly presents the need for this research before introducing the procedure that will be used to develop an appropriate method that not only considers interactions but is also quickly and easily implemented.

Keywords: distribution logistics, evaluation of potential, methods, model

Procedia PDF Downloads 499
2106 Magnetohemodynamic of Blood Flow Having Impact of Radiative Flux Due to Infrared Magnetic Hyperthermia: Spectral Relaxation Approach

Authors: Ebenezer O. Ige, Funmilayo H. Oyelami, Joshua Olutayo-Irheren, Joseph T. Okunlola

Abstract:

Hyperthermia therapy is an adjuvant procedure during which perfused body tissues is subjected to elevated range of temperature in bid to achieve improved drug potency and efficacy of cancer treatment. While a selected class of hyperthermia techniques is shouldered on the thermal radiations derived from single-sourced electro-radiation measures, there are deliberations on conjugating dual radiation field sources in an attempt to improve the delivery of therapy procedure. This paper numerically explores the thermal effectiveness of combined infrared hyperemia having nanoparticle recirculation in the vicinity of imposed magnetic field on subcutaneous strata of a model lesion as ablation scheme. An elaborate Spectral relaxation method (SRM) was formulated to handle equation of coupled momentum and thermal equilibrium in the blood-perfused tissue domain of a spongy fibrous tissue. Thermal diffusion regimes in the presence of external magnetic field imposition were described leveraging on the renowned Roseland diffusion approximation to delineate the impact of radiative flux within the computational domain. The contribution of tissue sponginess was examined using mechanics of pore-scale porosity over a selected of clinical informed scenarios. Our observations showed for a substantial depth of spongy lesion, magnetic field architecture constitute the control regimes of hemodynamics in the blood-tissue interface while facilitating thermal transport across the depth of the model lesion. This parameter-indicator could be utilized to control the dispensing of hyperthermia treatment in intravenous perfused tissue.

Keywords: spectra relaxation scheme, thermal equilibrium, Roseland diffusion approximation, hyperthermia therapy

Procedia PDF Downloads 119
2105 Face Recognition Using Eigen Faces Algorithm

Authors: Shweta Pinjarkar, Shrutika Yawale, Mayuri Patil, Reshma Adagale

Abstract:

Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this, demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application. Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this , demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application.

Keywords: face detection, face recognition, eigen faces, algorithm

Procedia PDF Downloads 361
2104 Bilateral Thalamic Hypodense Lesions in Computing Tomography

Authors: Angelis P. Barlampas

Abstract:

Purpose of Learning Objective: This case depicts the need for cooperation between the emergency department and the radiologist to achieve the best diagnostic result for the patient. The clinical picture must correlate well with the radiology report and when it does not, this is not necessarily someone’s fault. Careful interpretation and good knowledge of the limitations, advantages and disadvantages of each imaging procedure are essential for the final diagnostic goal. Methods or Background: A patient was brought to the emergency department by their relatives. He was suddenly confused and his mental status was altered. He hadn't any history of mental illness and was otherwise healthy. A computing tomography scan without contrast was done, but it was unremarkable. Because of high clinical suspicion of probable neurologic disease, he was admitted to the hospital. Results or Findings: Another T was done after 48 hours. It showed a hypodense region in both thalamic areas. Taking into account that the first CT was normal, but the initial clinical picture of the patient was alerting of something wrong, the repetitive CT exam is highly suggestive of a probable diagnosis of bilateral thalamic infractions. Differential diagnosis: Primary bilateral thalamic glioma, Wernicke encephalopathy, osmotic myelinolysis, Fabry disease, Wilson disease, Leigh disease, West Nile encephalitis, Greutzfeldt Jacob disease, top of the basilar syndrome, deep venous thrombosis, mild to moderate cerebral hypotension, posterior reversible encephalopathy syndrome, Neurofibromatosis type 1. Conclusion: As is the case of limitations for any imaging procedure, the same applies to CT. The acute ischemic attack can not depict on CT. A period of 24 to 48 hours has to elapse before any abnormality can be seen. So, despite the fact that there are no obvious findings of an ischemic episode, like paresis or imiparesis, one must be careful not to attribute the patient’s clinical signs to other conditions, such as toxic effects, metabolic disorders, psychiatric symptoms, etc. Further investigation with MRI or at least a repeated CT must be done.

Keywords: CNS, CT, thalamus, emergency department

Procedia PDF Downloads 123
2103 Current Epizootic Situation of Q Fever in Polish Cattle

Authors: Monika Szymańska-Czerwińska, Agnieszka Jodełko, Krzysztof Niemczuk

Abstract:

Q fever (coxiellosis) is an infectious disease of animals and humans causes by C. burnetii and widely distributed throughout the world. Cattle and small ruminants are commonly known as shedders of C. burnetii. The aims of this study were the evaluation of seroprevalence and shedding of C. burnetii in cattle. Genotypes of the pathogen present in the tested specimens were also identified using MLVA (Multiple Locus Variable-Number Tandem Repeat Analysis) and MST (multispacer sequence typing) methods. Sampling was conducted in different regions of Poland in 2018-2021. In total, 2180 bovine serum samples from 801 cattle herds were tested by ELISA (enzyme-linked immunosorbent assay). 489 specimens from 157 cattle herds such as: individual milk samples (n=407), bulk tank milk (n=58), vaginal swabs (n=20), placenta (n=3) and feces (n=1) were subjected to C. burnetii specific qPCR. The qPCR (IS1111 transposon-like repetitive region) was performed using Adiavet COX RealTime PCR kit. Genotypic characterization of the strains was conducted utilizing MLVA and MST methods. MLVA was performed using 6 variable loci. The overall herd-level seroprevalence of C. burnetii infection was 36.74% (801/2180). Shedders were detected in 29.3% (46/157) cattle herds in all tested regions. ST 61 sequence type was identified in 10 out of 18 genotyped strains. Interestingly one strain represents sequence type which has never been recorded previously. MLVA method identified three previously known genotypes: most common was J but also I and BE were recognized. Moreover, a one genotype has never been described previously. Seroprevalence and shedding of C. burnetii in cattle is common and strains are genetically diverse.

Keywords: Coxiella burnetii, cattle, MST, MLVA, Q fever

Procedia PDF Downloads 86
2102 A Historical Overview of the General Implementation of the European Union Market Abuse Directive in the United Kingdom before the Brexit and Its Future Implications

Authors: Howard Chitimira

Abstract:

The European Union (EU) was probably the first body to establish multinational anti-market abuse laws aimed at enhancing the detection and curbing of cross-border market abuse activities in its member states. Put differently, the EU Insider Dealing Directive was adopted in 1989 and was the first law that harmonised the insider trading ban among the EU member states. Thereafter, the European Union Directive on Insider Dealing and Market Manipulation (EU Market Abuse Directive) was adopted in a bid to improve and effectively discourage all the forms of market abuse in the EU’s securities and financial markets. However, the EU Market Abuse Directive had its own gaps and flaws. In light of this, the Market Abuse Regulation and the Criminal Sanctions for Market Abuse Directive were enacted to repeal and replace the EU Market Abuse Directive in 2016. The article examines the adequacy of the EU Market Abuse Directive and its implementation in the United Kingdom (UK) prior to the British exit (Brexit). This is done to investigate the possible implications of the Brexit referendum outcome of 23 June 2016 on the future regulation of market abuse in the UK.

Keywords: market abuse, insider trading, market manipulation, European Union, United Kingdom

Procedia PDF Downloads 252
2101 Tracing Digital Traces of Phatic Communion in #Mooc

Authors: Judith Enriquez-Gibson

Abstract:

This paper meddles with the notion of phatic communion introduced 90 years ago by Malinowski, who was a Polish-born British anthropologist. It explores the phatic in Twitter within the contents of tweets related to moocs (massive online open courses) as a topic or trend. It is not about moocs though. It is about practices that could easily be hidden or neglected if we let big or massive topics take the lead or if we simply follow the computational or secret codes behind Twitter itself and third party software analytics. It draws from media and cultural studies. Though at first it appears data-driven as I submitted data collection and analytics into the hands of a third party software, Twitonomy, the aim is to follow how phatic communion might be practised in a social media site, such as Twitter. Lurking becomes its research method to analyse mooc-related tweets. A total of 3,000 tweets were collected on 11 October 2013 (UK timezone). The emphasis of lurking is to engage with Twitter as a system of connectivity. One interesting finding is that a click is in fact a phatic practice. A click breaks the silence. A click in one of the mooc website is actually a tweet. A tweet was posted on behalf of a user who simply chose to click without formulating the text and perhaps without knowing that it contains #mooc. Surely, this mechanism is not about reciprocity. To break the silence, users did not use words. They just clicked the ‘tweet button’ on a mooc website. A click performs and maintains connectivity – and Twitter as the medium in attendance in our everyday, available when needed to be of service. In conclusion, the phatic culture of breaking silence in Twitter does not have to submit to the power of code and analytics. It is a matter of human code.

Keywords: click, Twitter, phatic communion, social media data, mooc

Procedia PDF Downloads 414
2100 Aliens in Space: Reflections on an Applied Theatre Project in a Medium Secure Hospital

Authors: Ashley Barnes

Abstract:

This paper will consider the ways in which varied notions of Space played a central role in a 12-week drama project with patients in a Medium Secure Hospital in the UK. In the project, the patients devised and performed a series of sketches, inspired by Science Fiction films, which echoed their own experience of alienation. During the project, the familiar and rigorously regulated Activity Room became a site of imagination, adventure and laughter; transforming the atmosphere of the hospital and allowing the patients to be transported to another space entirely. A space that was as much in their heads as in the physical domain. It will be argued that, although work created in an institution such as a Medium Secure Hospital is infused with hegemonic associations and meanings, the starting point for such work should be to seek an empty space in which the participants can allow their imaginations to be released. This work sits within a range of contexts and will be consciously interdisciplinary. It will draw from Human Geography and Criminology, as well as Performance and Applied Theatre Literature. It is hoped that this paper will build upon the literature that relates to the very particular environment of Secure Hospitals and to provide a starting point for further practical exploration.

Keywords: criminal justice, mental health, science fiction films, space and place

Procedia PDF Downloads 223
2099 The Big Five Personality Traits and Environmental Factors as Predictors of the Antisocial Behaviours among Juveniles

Authors: Karol Konaszewski

Abstract:

Background: The article is an analysis of the results of the studies conducted among juveniles (boys and girls) in the case of whom the family court applied the educational means of placing them in the youth educational centers. The aim of the study was to find out the correlations between antisocial behaviors, personality traits and the environmental determinants (support factors and risk factors) among juveniles (boys and girls). Methods: The total of 481 juveniles staying in youth educational centers participated in the study. Applied research tools: The Antisocial Behaviors Scale by L. Pytka, NEO-FFI by P. T. Costa and R. R. McCrae was used to diagnose personality traits included in a popular five-factor model (it has been adapted into Polish by B. Zawadzki, J. Strelau, P. Szczepaniak, and M. Śliwińska) and a questionnaire concerning support factors and risk factors was constructed to measure environmental determinants. The data was analysed in a regression model. Findings: The analysis model showed that the significant predictors of antisocial behaviors were neuroticism, extraversion, conscientiousness and negative relations at school. In girls group, the significant predictors of antisocial behaviors were neuroticism, conscientiousness, family support and negative relations at school, while in boys group the significant predictors of antisocial behaviors were neuroticism, extraversion and negative relations at family. Discussion: The results of this study have important implications. They allow for a better understanding of the factors that contribute to antisocial behaviors among juveniles. Future interventions could be based on the creation of personality traits, strengthening of support factors and correction of risk factors.

Keywords: antisocial behaviours, juveniles, personality, youth

Procedia PDF Downloads 261
2098 Organic Carbon Pools Fractionation of Lacustrine Sediment with a Stepwise Chemical Procedure

Authors: Xiaoqing Liu, Kurt Friese, Karsten Rinke

Abstract:

Lacustrine sediment archives rich paleoenvironmental information in lake and surrounding environment. Additionally, modern sediment is used as an effective medium for the monitoring of lake. Organic carbon in sediment is a heterogeneous mixture with varying turnover times and qualities which result from the different biogeochemical processes in the deposition of organic material. Therefore, the isolation of different carbon pools is important for the research of lacustrine condition in the lake. However, the numeric available fractionation procedures can hardly yield homogeneous carbon pools on terms of stability and age. In this work, a multi-step fractionation protocol that treated sediment with hot water, HCl, H2O2 and Na2S2O8 in sequence was adopted, the treated sediment from each step were analyzed for the isotopic and structural compositions with Isotope Ratio Mass Spectrometer coupled with element analyzer (IRMS-EA) and Solid-state 13C Nuclear Magnetic Resonance (NMR), respectively. The sequential extractions with hot-water, HCl, and H2O2 yielded a more homogeneous and C3 plant-originating OC fraction, which was characterized with an atomic C/N ratio shift from 12.0 to 20.8, and 13C and 15N isotopic signatures were 0.9‰ and 1.9‰ more depleted than the original bulk sediment, respectively. Additionally, the H2O2- resistant residue was dominated with stable components, such as the lignins, waxes, cutans, tannins, steroids and aliphatic proteins and complex carbohydrates. 6M HCl in the acid hydrolysis step was much more effective than 1M HCl to isolate a sedimentary OC fraction with higher degree of homogeneity. Owing to the extremely high removal rate of organic matter, the step of a Na2S2O8 oxidation is only suggested if the isolation of the most refractory OC pool is mandatory. We conclude that this multi-step chemical fractionation procedure is effective to isolate more homogeneous OC pools in terms of stability and functional structure, and it can be used as a promising method for OC pools fractionation of sediment or soil in future lake research.

Keywords: 13C-CPMAS-NMR, 13C signature, lake sediment, OC fractionation

Procedia PDF Downloads 299
2097 Comparison of the Indocyanine Green Dye Method versus the Combined Method of Indigo Carmine Blue Dye with Indocyanine Green Fluorescence Imaging for Sentinel Lymph Node Biopsy in Breast Conservative Therapy for Early Breast Cancer

Authors: Nobuyuki Takemoto, Ai Koyanagi, Masanori Yasuda, Hiroshi Yamamoto

Abstract:

Background: Fluorescence imaging (FI) is one of the methods to identify sentinel lymph nodes (SLNs). However, the procedure is technically complicated and requires procedural skills, as SLN biopsy must be conducted in dim light conditions. As an improved version of this method, we introduced a combined method (Combined mixed dye and fluorescence; CMF) consisting of indigo carmine blue dye and FI. The direct visualization of SLNs under shadowless surgical light conditions is facilitated by the addition of the blue dye. We compared the SLN detection rates of CMF with that of the indocyanine green (ICG) dye method (ICG-D). Methods: A total of 202 patients with stage ≤ IIA breast cancer who underwent breast conservative therapy with separate incision from January 2004 to February 2017 were reviewed. Details of the two methods are as follows: (1) ICG-D: 2ml of ICG (10mg) was used and the green-stained SLNs were resected via a 3-4cm axillary incision; (2) CMF: A combination of 1ml of ICG (5mg) and 1-3ml of indigo carmine (4-12mg) was used. Using Photodynamic Eye (PDE), a 1.5-2 cm incision was made near the point of disappearance of the fluorescence and SLNs with intermediate color of blue and green were resected. Results: There were 92 ICG-D and 110 CMF cases. CMF resulted in a significantly higher detection rate than ICG-D (96.4% vs. 83.7%; p=0.003). This difference was particularly notable in those aged ≥ 60 years (98.3% vs. 74.3%) and individuals with BMI ≥ 25kg/m2 (90.3% vs. 58.3%). Conclusion: CMF is an effective method to identify SLNs which is safe, efficient, and cost-effective. Furthermore, radiation exposure can be avoided, and it can be performed in institutes without nuclear medicine facilities. CMF achieves a high SLN identification rate, and most of this procedure is feasible under shadowless surgical light conditions. CMF can reliably perform SLN biopsy even in those aged ≥ 60 years and individuals with BMI ≥ 25 kg/m2.

Keywords: sentinel lymph node biopsy, identification rate, indocyanine green (ICG), indigocarmine, fluorescence

Procedia PDF Downloads 172
2096 Optimizing Pavement Construction Procedures in the Southern Desert of Libya

Authors: Khlifa El Atrash, Gabriel Assaf

Abstract:

Libya uses a volumetric analysis in designing asphalt mixtures, which can also be upgraded in hot, arid weather. However, in order to be effective, it should include many important aspects which are materials, environment, and method of construction. However, the quality of some roads was below a satisfactory level. This paper examines the factors that contribute to low quality of road performance in Libya. To evaluate these factors, a questionnaire survey and a laboratory comparative study were performed for a few mixes under-represented of temperature and traffic load. In laboratory, rutting test conducted on two different asphalt mixture, these mixes included, an asphalt concrete mix using local aggregate and asphalt binder B(60/70) at the optimum Marshall asphalt content, another mixes designed using Superpave design procedure with the same materials and performance asphalt binder grade PG (70-10). In the survey, the questionnaire was distributed to 55 engineers and specialists in this field. The interview was conducted to a few others, and the factors that were leading to poor performance of asphalt roads were listed as; 1) Owner Experience and technical staff 2) Asphalt characteristics 3) Updating and development of Asphalt Mix Design methods 4) Lack of data collection by authorization Agency 5) Construction and compaction process 6) Mentoring and controlling mixing procedure. Considering and improving these factors will play an important role to improve the pavement performances, longer service life, and lower maintenance costs. This research summarized some recommendations for making asphalt mixtures used in hot, dry areas. Such asphalt mixtures should use asphalt binder which is less affected by pavement temperature change and traffic load. The properties of the mixture, such as durability, deformation, air voids, and performance, largely depend on the type of materials, environment, and mixing method. These properties, in turn, affect the pavement performance.

Keywords: volumetric analysis, pavement performances, hot climate, traffic load, pavement temperature, asphalt mixture, environment, design and construction

Procedia PDF Downloads 274
2095 Working with Children and Young People as a much Neglected Area of Education within the Social Studies Curriculum in Poland

Authors: Marta Czechowska-Bieluga

Abstract:

Social work education in Poland focuses mostly on developing competencies that address the needs of individuals and families affected by a variety of life's problems. As a result of the ageing of the Polish population, much attention is equally devoted to adults, including the elderly. However, social work with children and young people is the area of education which should be given more consideration. Social work students are mostly trained to cater to the needs of families and the competencies aimed to respond to the needs of children and young people do not receive enough attention and are only offered as elective classes. This paper strives to review the social work programmes offered by the selected higher education institutions in Poland in terms of social work training aimed at helping children and young people to address their life problems. The analysis conducted in this study indicates that university education for social work focuses on training professionals who will provide assistance only to adults. Due to changes in the social and political situation, including, in particular, changes in social policy implemented for the needy, it is necessary to extend this area of education to include the specificity of the support for children and young people; especially, in the light of the appearance of new support professions within the area of social work. For example, family assistants, whose task is to support parents in performing their roles as guardians and educators, also assist children. Therefore, it becomes necessary to equip social work professionals with competencies which include issues related to the quality of life of underage people living in families. Social work curricula should be extended to include the issues of child and young person development and the patterns governing this phase of life.

Keywords: social work education, social work programmes, social worker, university

Procedia PDF Downloads 291
2094 Correlations in the Ising Kagome Lattice

Authors: Antonio Aguilar Aguilar, Eliezer Braun Guitler

Abstract:

Using a previously developed procedure and with the aid of algebraic software, a two-dimensional generalized Ising model with a 4×2 unitary cell (UC), we obtain a Kagome Lattice with twelve different spin-spin values of interaction, in order to determine the partition function per spin L(T). From the partition function we can study the magnetic behavior of the system. Because of the competition phenomenon between spins, a very complex behavior among them in a variety of magnetic states can be observed.

Keywords: correlations, Ising, Kagome, exact functions

Procedia PDF Downloads 370
2093 Long-Term Results of Coronary Bifurcation Stenting with Drug Eluting Stents

Authors: Piotr Muzyk, Beata Morawiec, Mariusz Opara, Andrzej Tomasik, Brygida Przywara-Chowaniec, Wojciech Jachec, Ewa Nowalany-Kozielska, Damian Kawecki

Abstract:

Background: Coronary bifurcation is one of the most complex lesion in patients with coronary ar-tery disease. Provisional T-stenting is currently one of the recommended techniques. The aim was to assess optimal methods of treatment in the era of drug-eluting stents (DES). Methods: The regis-try consisted of data from 1916 patients treated with coronary percutaneous interventions (PCI) using either first- or second-generation DES. Patients with bifurcation lesion entered the analysis. Major adverse cardiac and cardiovascular events (MACCE) were assessed at one year of follow-up and comprised of death, acute myocardial infarction (AMI), repeated PCI (re-PCI) of target ves-sel and stroke. Results: Of 1916 registry patients, 204 patients (11%) were diagnosed with bifurcation lesion >50% and entered the analysis. The most commonly used technique was provi-sional T-stenting (141 patients, 69%). Optimization with kissing-balloons technique was performed in 45 patients (22%). In 59 patients (29%) second-generation DES was implanted, while in 112 pa-tients (55%), first-generation DES was used. In 33 patients (16%) both types of DES were used. The procedure success rate (TIMI 3 flow) was achieved in 98% of patients. In one-year follow-up, there were 39 MACCE (19%) (9 deaths, 17 AMI, 16 re-PCI and 5 strokes). Provisional T-stenting resulted in similar rate of MACCE to other techniques (16% vs. 5%, p=0.27) and similar occurrence of re-PCI (6% vs. 2%, p=0.78). The results of post-PCI kissing-balloon technique gave equal out-comes with 3% vs. 16% of MACCE in patients in whom no optimization technique was used (p=0.39). The type of implanted DES (second- vs. first-generation) had no influence on MACCE (4% vs 14%, respectively, p=0.12) and re-PCI (1.7% vs. 51% patients, respectively, p=0.28). Con-clusions: The treatment of bifurcation lesions with PCI represent high-risk procedures with high rate of MACCE. Stenting technique, optimization of PCI and the generation of implanted stent should be personalized for each case to balance risk of the procedure. In this setting, the operator experience might be the factor of better outcome, which should be further investigated.

Keywords: coronary bifurcation, drug eluting stents, long-term follow-up, percutaneous coronary interventions

Procedia PDF Downloads 204
2092 A Dual Spark Ignition Timing Influence for the High Power Aircraft Radial Engine Using a CFD Transient Modeling

Authors: Tytus Tulwin, Ksenia Siadkowska, Rafał Sochaczewski

Abstract:

A high power radial reciprocating engine is characterized by a large displacement volume of a combustion chamber. Choosing the right moment for ignition is important for a high performance or high reliability and ignition certainty. This work shows methods of simulating ignition process and its impact on engine parameters. For given conditions a flame speed is limited when a deflagration combustion takes place. Therefore, a larger length scale of the combustion chamber compared to a standard size automotive engine makes combustion take longer time to propagate. In order to speed up the mixture burn-up time the second spark is introduced. The transient Computational Fluid Dynamics model capable of simulating multicycle engine processes was developed. The CFD model consists of ECFM-3Z combustion and species transport models. A relative ignition timing difference for the both spark sources is constant. The temperature distribution on engine walls was calculated in the separate conjugate heat transfer simulation. The in-cylinder pressure validation was performed for take-off power flight conditions. The influence of ignition timing on parameters like in-cylinder temperature or rate of heat release was analyzed. The most advantageous spark timing for the highest power output was chosen. The conditions around the spark plug locations for the pre-ignition period were analyzed. This work has been financed by the Polish National Centre for Research and Development, INNOLOT, under Grant Agreement No. INNOLOT/I/1/NCBR/2013.

Keywords: CFD, combustion, ignition, simulation, timing

Procedia PDF Downloads 296
2091 Harnessing Entrepreneurial Opportunities for National Security

Authors: Itiola Kehinde Adeniran

Abstract:

This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities.

Keywords: entrepreneurship, entrepreneurial opportunities, national security, unemployment

Procedia PDF Downloads 330
2090 Case Report and Discussion of Natural History of Bouveret Syndrome

Authors: Parul Garg

Abstract:

Bouveret Syndrome is a rare presentation described as Gastric Outlet Obstruction secondary to Gallstone Ileus. Here we describe the 3-year progression of disease from cholelithiasis to gallstone ileus with relevant imaging findings. The patient was treated under an Upper Gastrointestinal Surgery service with surgical intervention in the form of a laparoscopic assisted procedure with midline laparotomy. She recovered well and was discharged 1 week post operatively. No complications occurred.

Keywords: Cholelithiasis, Bouveret syndrome, Gallstone Ileus, gastric outlet obstruction

Procedia PDF Downloads 122
2089 Modeling Loads Applied to Main and Crank Bearings in the Compression-Ignition Two-Stroke Engine

Authors: Marcin Szlachetka, Mateusz Paszko, Grzegorz Baranski

Abstract:

This paper discusses the AVL EXCITE Designer simulation research into loads applied to main and crank bearings in the compression-ignition two-stroke engine. There was created a model of engine lubrication system which covers the part of this system related to particular nodes of a bearing system, i.e. a connection of main bearings in an engine block with a crankshaft, a connection of crank pins with a connecting rod. The analysis focused on the load given as a distribution of hydrodynamic oil film pressure corresponding different values of radial internal clearance. There was also studied the impact of gas force on minimal oil film thickness in main and crank bearings versus crankshaft rotational speed. Our model calculates oil film parameters, an oil film pressure distribution, an oil temperature change and dimensions of bearings as well as an oil temperature distribution on surfaces of bearing seats. Accordingly, it was possible to select, for example, a correct clearance for each of the node bearings. The research was performed for several values of engine crankshaft speed ranging from 800 RPM to 4000 RPM. Bearing oil pressure was changed according to engine speed ranging between 1 bar and 5 bar and an oil temperature of 90°C. The main bearing clearances made initially for the calculation and research were: 0.015 mm, 0.025 mm, 0.035 mm, 0.05 mm, 0.1 mm. The oil used for the research corresponded the SAE 5W-40 classification. The paper presents the selected research results referring to certain specific operating points and bearing radial internal clearances. Acknowledgement: This work has been realized in the cooperation with The Construction Office of WSK ‘PZL-KALISZ’ S.A. and is part of Grant Agreement No. POIR.01.02.00-00-0002/15 financed by the Polish National Centre for Research and Development.

Keywords: crank bearings, diesel engine, oil film, two-stroke engine

Procedia PDF Downloads 215
2088 Pupil Size: A Measure of Identification Memory in Target Present Lineups

Authors: Camilla Elphick, Graham Hole, Samuel Hutton, Graham Pike

Abstract:

Pupil size has been found to change irrespective of luminosity, suggesting that it can be used to make inferences about cognitive processes, such as cognitive load. To see whether identifying a target requires a different cognitive load to rejecting distractors, the effect of viewing a target (compared with viewing distractors) on pupil size was investigated using a sequential video lineup procedure with two lineup sessions. Forty one participants were chosen randomly via the university. Pupil sizes were recorded when viewing pre target distractors and post target distractors and compared to pupil size when viewing the target. Overall, pupil size was significantly larger when viewing the target compared with viewing distractors. In the first session, pupil size changes were significantly different between participants who identified the target (Hits) and those who did not. Specifically, the pupil size of Hits reduced significantly after viewing the target (by 26%), suggesting that cognitive load reduced following identification. The pupil sizes of Misses (who made no identification) and False Alarms (who misidentified a distractor) did not reduce, suggesting that the cognitive load remained high in participants who failed to make the correct identification. In the second session, pupil sizes were smaller overall, suggesting that cognitive load was smaller in this session, and there was no significant difference between Hits, Misses and False Alarms. Furthermore, while the frequency of Hits increased, so did False Alarms. These two findings suggest that the benefits of including a second session remain uncertain, as the second session neither provided greater accuracy nor a reliable way to measure it. It is concluded that pupil size is a measure of face recognition strength in the first session of a target present lineup procedure. However, it is still not known whether cognitive load is an adequate explanation for this, or whether cognitive engagement might describe the effect more appropriately. If cognitive load and cognitive engagement can be teased apart with further investigation, this would have positive implications for understanding eyewitness identification. Nevertheless, this research has the potential to provide a tool for improving the reliability of lineup procedures.

Keywords: cognitive load, eyewitness identification, face recognition, pupillometry

Procedia PDF Downloads 405
2087 Genetically Modified Organisms

Authors: Mudrika Singhal

Abstract:

The research paper is basically about how the genetically modified organisms evolved and their significance in today’s world. It also highlights about the various pros and cons of the genetically modified organisms and the progress of India in this field. A genetically modified organism is the one whose genetic material has been altered using genetic engineering techniques. They have a wide range of uses such as transgenic plants, genetically modified mammals such as mouse and also in insects and aquatic life. Their use is rooted back to the time around 12,000 B.C. when humans domesticated plants and animals. At that humans used genetically modified organisms produced by the procedure of selective breeding and not by genetic engineering techniques. Selective breeding is the procedure in which selective traits are bred in plants and animals and then are domesticated. Domestication of wild plants into a suitable cultigen is a well known example of this technique. GMOs have uses in varied fields ranging from biological and medical research, production of pharmaceutical drugs to agricultural fields. The first organisms to be genetically modified were the microbes because of their simpler genetics. At present the genetically modified protein insulin is used to treat diabetes. In the case of plants transgenic plants, genetically modified crops and cisgenic plants are the examples of genetic modification. In the case of mammals, transgenic animals such as mice, rats etc. serve various purposes such as researching human diseases, improvement in animal health etc. Now coming upon the pros and cons related to the genetically modified organisms, pros include crops with higher yield, less growth time and more predictable in comparison to traditional breeding. Cons include that they are dangerous to mammals such as rats, these products contain protein which would trigger allergic reactions. In India presently, group of GMOs include GM microorganisms, transgenic crops and animals. There are varied applications in the field of healthcare and agriculture. In the nutshell, the research paper is about the progress in the field of genetic modification, taking along the effects in today’s world.

Keywords: applications, mammals, transgenic, engineering and technology

Procedia PDF Downloads 598
2086 Effects of Umbilical Cord Clamping on Puppies Neonatal Vitality

Authors: Maria L. G. Lourenço, Keylla H. N. P. Pereira, Viviane Y. Hibaru, Fabiana F. Souza, Joao C. P. Ferreira, Simone B. Chiacchio, Luiz H. A. Machado

Abstract:

In veterinary medicine, the standard procedure during a caesarian section is clamping the umbilical cord immediately after birth. In human neonates, when the umbilical cord is kept intact after birth, blood continues to flow from the cord to the newborn, but this procedure may prove to be difficult in dogs due to the shorter umbilical cord and the number of newborns in the litter. However, a possible detachment of the placenta while keeping the umbilical cord intact may make the residual blood to flow to the neonate. This study compared the effects on neonatal vitality between clamping and no clamping the umbilical cord of dogs born through cesarean section, assessing them through Apgar and reflex scores. Fifty puppies delivered from 16 bitches were randomly allocated to receive clamping of the umbilical cord immediately (n=25) or to not receive the clamping until breathing (n=25). The neonates were assessed during the first five min of life and once again 10 min after the first assessment. The differences observed between the two moments were significant (p < 0.01) for both the Apgar and reflex scores. The differences observed between the groups (clamped vs. not clamped) were not significant for the Apgar score in the 1st moment (p=0.1), but the 2nd moment was significantly (p < 0.01) in the group not clamped, as well as significant (p < 0.05) for the reflex score in the 1st moment and 2nd moment (p < 0.05), revealing higher neonatal vitality in the not clamped group. The differences observed between the moments (1st vs. 2nd) of each group as significant (p < 0.01), revealing higher neonatal vitality in the 2nd moments. In the no clamping group, after removing the neonates together with the umbilical cord and the placenta, we observed that the umbilical cords were full of blood at the time of birth and later became whitish and collapsed, demonstrating the blood transfer. The results suggest that keeping the umbilical cord intact for at least three minutes after the onset breathing is not detrimental and may contribute to increase neonate vitality in puppies delivered by cesarean section.

Keywords: puppy vitality, newborn dog, cesarean section, Apgar score

Procedia PDF Downloads 153
2085 Rapid Algorithm for GPS Signal Acquisition

Authors: Fabricio Costa Silva, Samuel Xavier de Souza

Abstract:

A Global Positioning System (GPS) receiver is responsible to determine position, velocity and timing information by using satellite information. To get this information are necessary to combine an incoming and a locally generated signal. The procedure called acquisition need to found two information, the frequency and phase of the incoming signal. This is very time consuming, so there are several techniques to reduces the computational complexity, but each of then put projects issues in conflict. I this papers we present a method that can reduce the computational complexity by reducing the search space and paralleling the search.

Keywords: GPS, acquisition, complexity, parallelism

Procedia PDF Downloads 539
2084 The Benefits of a Totally Autologous Breast Reconstruction Technique Using Extended Latissimus Dorsi Flap with Lipo-Modelling: A Seven Years United Kingdom Tertiary Breast Unit Results

Authors: Wisam Ismail, Brendan Wooler, Penelope McManus

Abstract:

Introduction: The public perception of implants has been damaged in the wake of recent negative publicity and increasingly we are finding patients wanting to avoid them. Planned lipo-modelling to enhance the volume of a Latissimus dorsi flap is a viable alternative to silicone implants and maintains a Totally Autologous Technique (TAT). Here we demonstrate that when compared to an Implant Assisted Technique (IAT), a TAT offers patients many benefits that offset the requirement of more operations initially, with reduced short and long term complications, reduced symmetrisation surgery and reduced revision rates. Methods. Data was collected prospectively over 7 years. The minimum follows up was 3 years. The technique was generally standardized in the hand of one surgeon. All flaps were extended LD flaps (ELD). Lipo-modelling was performed using standard techniques. Outcome measures were unplanned secondary procedures, complication rates, and contralateral symmetrisation surgery rates. Key Results Were: Lower complication rates in the TAT group (18.5% vs. 33.3%), despite higher radiotherapy rates (TAT=49%, IAT=36.8%), TAT was associated with lower subsequent symmetrisation rates (30.6% vs. 50.9%), IAT had a relative risk of 3.1 for subsequent unplanned procedure, Autologous patients required an average of 1.76 sessions of lipo-modelling, Conclusions: Using lipo-modelling to enable totally autologous LD reconstruction offers significant advantages over an implant assisted technique. We have shown a lower subsequent unplanned procedure rate, lower revision surgery, and less contralateral symmetrisation surgery. We anticipate that a TAT will be supported by patient satisfaction surveys and long-term patient-reported cosmetic outcome data and intended to study this.

Keywords: breast, Latissimus dorsi, lipomodelling, reconstruction

Procedia PDF Downloads 336
2083 A Generalized Weighted Loss for Support Vextor Classification and Multilayer Perceptron

Authors: Filippo Portera

Abstract:

Usually standard algorithms employ a loss where each error is the mere absolute difference between the true value and the prediction, in case of a regression task. In the present, we present several error weighting schemes that are a generalization of the consolidated routine. We study both a binary classification model for Support Vextor Classification and a regression net for Multylayer Perceptron. Results proves that the error is never worse than the standard procedure and several times it is better.

Keywords: loss, binary-classification, MLP, weights, regression

Procedia PDF Downloads 97
2082 The Effect of Primary Treatment on Histopathological Patterns and Choice of Neck Dissection in Regional Failure of Nasopharyngeal Carcinoma Patients

Authors: Ralene Sim, Stefan Mueller, N. Gopalakrishna Iyer, Ngian Chye Tan, Khee Chee Soo, R. Shetty Mahalakshmi, Hiang Khoon Tan

Abstract:

Background: Regional failure in nasopharyngeal carcinoma (NPC) is managed by salvage treatment in the form of neck dissection. Radical neck dissection (RND) is preferred over modified radical neck dissection (MRND) since it is traditionally believed to offer better long-term disease control. However, with the advent of more advanced imaging modalities like high-resolution Magnetic Resonance Imaging, Computed Tomography, and Positron Emission Tomography-CT scans, earlier detection is achieved. Additionally, concurrent chemotherapy also contributes to reduced tumour burden. Hence, there may be a lesser need for an RND and a greater role for MRND. With this retrospective study, the primary aim is to ascertain whether MRND, as opposed to RND, has similar outcomes and hence, whether there would be more grounds to offer a less aggressive procedure to achieve lower patient morbidity. Methods: This is a retrospective study of 66 NPC patients treated at Singapore General Hospital between 1994 to 2016 for histologically proven regional recurrence, of which 41 patients underwent RND and 25 who underwent MRND, based on surgeon preference. The type of ND performed, primary treatment mode, adjuvant treatment, and pattern of recurrence were reviewed. Overall survival (OS) was calculated using Kaplan-Meier estimate and compared. Results: Overall, the disease parameters such as nodal involvement and extranodal extension were comparable between the two groups. Comparing MRND and RND, the median (IQR) OS is 1.76 (0.58 to 3.49) and 2.41 (0.78 to 4.11) respectively. However, the p-value found is 0.5301 and hence not statistically significant. Conclusion: RND is more aggressive and has been associated with greater morbidity. Hence, with similar outcomes, MRND could be an alternative salvage procedure for regional failure in selected NPC patients, allowing similar salvage rates with lesser mortality and morbidity.

Keywords: nasopharyngeal carcinoma, neck dissection, modified neck dissection, radical neck dissection

Procedia PDF Downloads 171
2081 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 279
2080 An Efficient and Green Procedure for the Synthesis of Highly Substituted Polyhydronaphthalene Derivatives via a One-Pot, Multi-Component Reaction in Aqueous Media

Authors: Adeleh Moshtaghi Zonouz, Issa Eskandari

Abstract:

A simple, efficient, and green one-pot, four-component synthesis of highly substituted polyhydronaphthalenes in aqueous media is described. The method has such advantages as short reaction times, high yields, mild reaction conditions, operational simplicity and environmentally benign.

Keywords: polyhydronaphthalene, 2, 6-dicyanoanilines, multi-component reaction, aqueous media

Procedia PDF Downloads 378
2079 Optimal Energy Management System for Electrical Vehicles to Further Extend the Range

Authors: M. R. Rouhi, S. Shafiei, A. Taghavipour, H. Adibi-Asl, A. Doosthoseini

Abstract:

This research targets at alleviating the problem of range anxiety associated with the battery electric vehicles (BEVs) by considering mechanical and control aspects of the powertrain. In this way, all the energy consuming components and their effect on reducing the range of the BEV and battery life index are identified. On the other hand, an appropriate control strategy is designed to guarantee the performance of the BEV and the extended electric range which is evaluated by an extensive simulation procedure and a real-world driving schedule.

Keywords: battery, electric vehicles, ultra-capacitor, model predictive control

Procedia PDF Downloads 259
2078 Human Trafficking in Your Backyard: Know the Signs and How to Help

Authors: Jessie Fazel, Kristen Smith

Abstract:

Human trafficking is a multi-billion-dollar criminal industry that affects 24.9 million people around the world. There are several different types of trafficking, the most common being sex trafficking, labor trafficking, and domestic servitude. Survival sex is common in the pediatric population, as they engage in sex for food, a place to sleep, or other basic needs. Statistics show that health care workers are at a unique advantage to help identify victims and get them the help they need, as 88% of trafficked victims encounter a health care worker while being trafficked. Unfortunately, victims don’t usually self-identify that they are being trafficked and the situations they face can vary dramatically. It is imperative to remember that traditional red flags are not always present in the pediatric population. Risk factors and red flags with their history and physical exam are one of the best indicators that health care providers need to be vigilant in looking at. There are numerous barriers for disclosure in the healthcare setting. Periods of time before and after disclosure are often emotionally difficult and could be dangerous for the victim. It is extremely important to have a plan in place for intervention if the victim does disclose trafficking. A trauma informed approach to medical and mental health interventions, that focus on safety, are vital in this population. This is happening where you live and you can make a difference in their lives.

Keywords: human trafficking, public health, emergency medicine, sexual health

Procedia PDF Downloads 35