Spelling suggestions: "subject:"nonidentical"" "subject:"notidentical""
1 |
Totožnost skutku / Identical facts of crimeSýkorová, Dáša January 2013 (has links)
The purpose of my thesis is to describe and analyze the subject of the identical facts of crime. The reason for my research is the close relation of this subject to the practical decision-making by the courts in particular. The thesis is composed of three main chapters, each of them dealing with different aspects of the identical facts of crime. Chapter One focuses on the introduction to the legal regulation of the identical facts of crime in Czech legislation. By reference of several cases it presents the general principles accompanying the courts'consideration of the identical facts of crime. Chapter Two concentrates on the international context of the identical facts of crime. It is subdivided in two parts. Part One looks at the EU-regulation and the decision-making by the Court of Justice of the EU and subsequently, part Two illustrates the approach of the European Court of Human Rights to the interpretation of the Article 7 Protocol Nr. 4 to the European Convention of Human Rights. Chapter Three examines the problems resulting from the incorrect translation of the term "offence" used in Article 4 Protocol 7 to the European Convention of Human Rights into Czech language. Furthermore it focuses on the key decision of the Supreme Court in 2004, which adjusted the interpretation of the above...
|
2 |
Assessing the Effects of Bio-identical Hormone Replacement Therapy Using the Menopause Rating ScaleBehabadi, Shaghayegh January 2006 (has links)
Class of 2006 Abstract / Objectives: To determine the effect of compounded bio-identical hormone replacement therapy (BHRT) on menopause-related quality of life through comparing the results of the Menopause Rating Scale (MRS) before beginning BHRT and seven weeks into BHRT.
Methods: This study used a one group pre-test/post-test design, also known as pre-experimental. Twenty-one patients participating in a BHRT consultation with the pharmacist at Reed’s Compounding Pharmacy completed an MRS at the time of consultation before beginning BHRT. Seven weeks into treatment with BHRT, patients were mailed a second MRS that they were asked to complete and return to the pharmacy.
Results: The average age of the 21 study participants was 54.9±6.3 years. There was a statistically significant reduction in symptom severity for the total MRS and each of the three subscales after seven weeks of treatment with compounded BHRT (p<0.001). Additionally, there were statistically significant reductions in symptom severity related to hot flushes and sweating, sleep problems, depressive mood, irritability, and anxiety (p<0.001). Conclusions: Compounded BHRT is effective in improving menopause-related quality of life in women suffering from menopausal symptoms.
|
3 |
Assessing the Effects of Bio-identical Hormone Replacement Therapy Using the Menopause Rating ScaleBojesen, Christine K. January 2008 (has links)
Class of 2008 Abstract / Objectives: The purpose of this study was to assess the effects of using compounded Bio-identical Hormone Replacement Therapy (BHRT) in menopausal women, by employing the MRS.
Methods: This study used a one group pre-test/ post-test. Included were 25 menopausal women, whom at initial BHRT consultation at Reed’s Compounding Pharmacy filled out a baseline menopausal rating scale (MRS). Eleven weeks into therapy, patients were asked to participate in this study and if interest was expressed, they were asked to fill out another MRS for comparison.
Results: There was a statistically significant decrease in overall MRS scores and in each of the 3 subscales (psychological, somatic and urogenital) (p</= 0.001). Additionally, when evaluating each MRS item individually, there were statistically significant decreases in all symptoms of menopause except for heart discomfort. Most improvements were seen in hot flushes/sweating, sleep and sexual problems (p<0.001).
Conclusions: Patients using BHRT improved overall physically and mentally, which would be depicted by improved scores on the MRS.
|
4 |
Formulation space search for two-dimensional packing problemsLopez Soto, Claudia Orquidea January 2013 (has links)
The two-dimension packing problem is concerned with the arrangement of items without overlaps inside a container. In particular we have considered the case when the items are circular objects, some of the general examples that can be found in the industry are related with packing, storing and transportation of circular objects. Although there are several approaches we want to investigate the use of formulation space search. Formulation space search is a fairly recent method that provides an easy way to escape from local optima for non-linear problems allowing to achieve better results. Despite the fact that it has been implemented to solve the packing problem with identical circles, we present an improved implementation of the formulation space search that gives better results for the case of identical and non-identical circles, also considering that they are packed inside different shaped containers, for which we provide the needed modifications for an appropriate implementation. The containers considered are: the unit circle, the unit square, two rectangles with different dimension (length 5, width 1 and length 10 width 1), a right-isosceles triangle, a semicircle and a right-circular quadrant. Results from the tests conducted shown several improvements over the best previously known for the case of identical circles inside three different containers: a right-isosceles triangle, a semicircle and a circular quadrant. In order to extend the scope of the formulation space search approach we used it to solve mixed-integer non-linear problems, in particular those with zero-one variables. Our findings suggest that our implementation provides a competitive way to solve these kind of problems.
|
5 |
Developing an efficient scheduling template of a chemotherapy treatment unit: simulation and optimization approachAhmed, Zubair 11 1900 (has links)
This study is undertaken to improve the performance of a Chemotherapy Treatment Unit by increasing the throughput of the clinic and reducing the average patients’ waiting time. In order to achieve this objective, a simulation model of this system is built and several scenarios that target matching the arrival pattern of the patients and resources availability are designed and evaluated. After performing detailed analysis, one scenario proves to provide the best system’s performance. The best scenario determines a rational arrival pattern of the patient matching with the nurses’ availability and can serve 22.5% more patients daily. Although the simulation study shows the way to serve more patients daily, it does not explain how to sequence them properly to minimize the average patients’ waiting time. Therefore, an efficient scheduling algorithm was developed to build a scheduling template that minimizes the total flow time of the system.
|
6 |
Developing an efficient scheduling template of a chemotherapy treatment unit: simulation and optimization approachAhmed, Zubair 11 1900 (has links)
This study is undertaken to improve the performance of a Chemotherapy Treatment Unit by increasing the throughput of the clinic and reducing the average patients’ waiting time. In order to achieve this objective, a simulation model of this system is built and several scenarios that target matching the arrival pattern of the patients and resources availability are designed and evaluated. After performing detailed analysis, one scenario proves to provide the best system’s performance. The best scenario determines a rational arrival pattern of the patient matching with the nurses’ availability and can serve 22.5% more patients daily. Although the simulation study shows the way to serve more patients daily, it does not explain how to sequence them properly to minimize the average patients’ waiting time. Therefore, an efficient scheduling algorithm was developed to build a scheduling template that minimizes the total flow time of the system.
|
7 |
A Comparison of the Differences in the Response of Identical Twins to Rorschach's TestMcCarty, Wilbur D. 08 1900 (has links)
The purpose of this study was to determine, by use of the Rorschach, any differences in the personality structures of two groups of identical twin subjects.
|
8 |
A Picture is Worth a Thousand Words : A Study of the Visual Representation of Syrian Refugees in Dagens Nyheter and Svenska Dagbladet / En bild säger mer än tusen ord : En studie av den visuella representationen av syriska flyktingar i Dagens Nyheter och Svenska DagbladetNasrollahi, Shabnam January 2016 (has links)
The purpose of this research paper is to examine how Syrian refugees are visually represented in two of the largest newspapers in Sweden: Dagens Nyheter (Today’s news) and Svenska Dagbladet (The Swedish daily paper). Their choice of images on the Syrian refugee crisis will be analysed, to see what sort of message they send by using those specific images. The reason for this study is because previous studies have implied that the media has an important role in crafting national perceptions of refugees. Therefore, it is intriguing to analyse the images the newspapers published during the fall of 2015 to see how Syrian refugees were represented during that most active and chaotic period in Sweden and if the visual representation of Syrian refugees can influence cultures of hostility in Sweden. The study has been linked with previous studies research of visual representations of refugees (us and them, identifiable victim effect) and the severe consequences it can lead to (dehumanization, moral panic) if used improperly, and three main theories that will be the foundation to custom and analyse the images (agenda setting, framing and representation theory). These were all applied and used when operating the method (quantitative content analysis) to collect information and data and also later when analysing and discussing the results. The result of the study showed that the newspapers images did not only focus on negative aspects of events and stories surrounding Syrian refugees. Dagens Nyheter and Svenska Dagbladet did not publish many negative images, but after the results, it is discovered that they are following that specific path on some aspects and that can be the start of a pattern that will be used more often in the future. While it is established that hostile and unwelcoming attitudes in the West have risen, the question remains how far its been developed in Sweden and how long it will be until the Swedish media promotes it as well. Key words: Syrian Refugee Crisis, Visual representation, Framing, Agenda setting and Stereotypes
|
9 |
The role of transfer-appropriate processing in the effectiveness of decision-support graphicsStiso, Michael E. 15 November 2004 (has links)
The current project is an examination of the effectiveness of decision-support graphics in a simulated real-world task, and of the role those graphics should play in training. It is also an attempt to apply a theoretical account of memory performance-transfer-appropriate processing-to naturalistic decision making. The task in question is a low-fidelity air traffic control simulation. In some conditions, that task includes decision-support graphics designed to explicitly represent elements of the task that normally must be mentally represented-namely, trajectory and relative altitude. The assumption is that those graphics will encourage a type of processing different from that used in their absence. If so, then according to the theory of transfer-appropriate processing (TAP), the best performance should occur in conditions in which the graphics are present either during both training and testing, or else not at all. For other conditions, the inconsistent presence or absence of the graphics should lead to mismatches in the type of processing used during training and testing, thus hurting performance. A sample of 205 undergraduate students were randomly assigned to four experimental and two control groups. The results showed that the support graphics provided immediate performance benefits, regardless of their presence during training. However, presenting them during training had an apparent overshadowing effect, in that removing them during testing significantly hurt performance. Finally, although no support was found for TAP, some support was found for the similar but more general theory of identical elements.
|
10 |
Palmprint Identification Based on Generalization of IrisCodeKong, Adams 22 January 2007 (has links)
The development of accurate and reliable security systems is a matter of wide interest, and in this context biometrics is seen as a highly effective automatic mechanism for personal identification. Among biometric technologies, IrisCode developed by Daugman in 1993 is regarded as a highly accurate approach, being able to support real-time personal identification of large databases. Since 1993, on the top of IrisCode, different coding methods have been proposed for iris and fingerprint identification. In this research, I extend and generalize IrisCode for real-time secure palmprint identification.
PalmCode, the first coding method for palmprint identification developed by me in 2002, directly applied IrisCode to extract phase information of palmprints as features. However, I observe that the PalmCodes from the different palms are similar, having many 45o streaks. Such structural similarities in the PalmCodes of different palms would reduce the individuality of PalmCodes and the performance of palmprint identification systems. To reduce the correlation between PalmCodes, in this thesis, I employ multiple elliptical Gabor filters with different orientations to compute different PalmCodes and merge them to produce a single feature, called Fusion Code. Experimental results demonstrate that Fusion Code performs better than PalmCode. Based on the results of Fusion Code, I further identify that the orientation fields of palmprints are powerful features. Consequently, Competitive Code, which uses real parts of six Gabor filters to estimate the orientation fields, is developed. To embed the properties of IrisCode, such as high speed matching, in Competitive Code, a novel coding scheme and a bitwise angular distance are proposed. Experimental results demonstrate that Competitive Code is much more effective than other palmprint algorithms.
Although many coding methods have been developed based on IrisCode for iris and palmprint identification, we lack a detailed analysis of IrisCode. One of the aims of this research is to provide such analysis as a way of better understanding IrisCode, extending the coarse phase representation to a precise phase representation, and uncovering the relationship between IrisCode and other coding methods. This analysis demonstrates that IrisCode is a clustering process with four prototypes; the locus of a Gabor function is a two-dimensional ellipse with respect to a phase parameter and the bitwise hamming distance can be regarded as a bitwise angular distance. In this analysis, I also point out that the theoretical evidence of the imposter binomial distribution of IrisCode is incomplete. I use this analysis to develop a precise phase representation which can enhance iris recognition accuracy and to relate IrisCode and other coding methods. By making use of this analysis, principal component analysis and simulated annealing, near optimal filters for palmprint identification are sought. The near optimal filters perform better than Competitive Code in term of d’ index.
Identical twins having the closest genetics-based relationship are expected to have maximum similarity in their biometrics. Classifying identical twins is a challenging problem for some automatic biometric systems. Palmprint has been studied for personal identification for many years. However, genetically identical palmprints have not been studied. I systemically examine Competitive Code on genetically identical palmprints for automatic personal identification and to uncover the genetically related palmprint features. The experimental results show that the three principal lines and some portions of weak lines are genetically related features but our palms still contain rich genetically unrelated features for classifying identical twins.
As biometric systems are vulnerable to replay, database and brute-force attacks, such potential attacks must be analyzed before they are massively deployed in security systems. I propose projected multinomial distribution for studying the probability of successfully using brute-force attacks to break into a palmprint system based on Competitive Code. The proposed model indicates that it is computationally infeasible to break into the palmprint system using brute-force attacks. In addition to brute-force attacks, I address the other three security issues: template re-issuances, also called cancellable biometrics, replay attacks, and database attacks. A random orientation filter bank (ROFB) is used to generate cancellable Competitive Codes for templates re-issuances. Secret messages are hidden in templates to prevent replay and database attacks. This technique can be regarded as template watermarking. A series of analyses is provided to evaluate the security levels of the measures.
|
Page generated in 0.0666 seconds