87 research outputs found
Heating Solution in the Family House in Třinec
Předmětem této bakalářské práce bylo stavebně konstrukční řešení rodinného domu se dvěma nadzemními podlažími společně s návrhem vytápění rodinného domu. Návrh stavebního řešení byl realizován s ohledem na tepelně technické řešení objektu, aby bylo dosaženo co nejnižších tepelných ztrát objektu, a tedy i nízkých nákladů na vytápění. Vytápění bylo realizováno formou podlahového vytápění a jako zdroj tepla bylo zvoleno tepelné čerpadlo. Dále bylo pro snížení nákladů energie pro ohřev teplé vody navržen solární systém ohřevu teplé vody. Byl navržen nízkoteplotní otopný teplovodní systém pro podlahové vytápění s nuceným oběhem vody.
Bakalářská práce se skládá ze 3 částí. První část je teoretické seznámení s principem fungování tepelného čerpadla. Druhá část je stavební a obsahuje průvodní a souhrnnou technickou zprávu a také výkresovou dokumentaci pro provádění stavby. Třetí část se zabývá prostředím staveb a obsahuje technickou zprávu, která obsahuje tepelně technické vyhodnocení objektu, návrh a výpočet vytápění, stanovení potřeby teplé vody a energetický štítek obálky budovy. Třetí část dále obsahuje výkresovou dokumentaci vytápění.The subject of this bachelor thesis was the structural design of family house with two floors together with the design of heating a family house. The design of the building solution was realized primarily with regard to the thermal technical assessment of the building in order to achieve the lowest heat losses of the building and thus the low operating costs of the family house. Heating was carried out in the form of underfloor heating and a heat pump was chosen as the heat source. Furthermore, a solar hot water heating system was designed to reduce energy costs for hot water heating. A low-temperature hot water heating system for underfloor heating with forced water circulation was designed.
The bachelor thesis consists of 3 parts. The first part is a theoretical introduction about the principle of functioning heat pumps. The second part focuses on construction and contains an accompanying and summary technical report, as well as drawing documentation for the construction. The third part deals with the environment of buildings and contains a technical report, which includes the building thermal technical assessment, design and calculation of heating, determination of hot water demand and the building envelope energy label. The third part also contains the heating drawing documentation.229 - Katedra prostředí staveb a TZBvelmi dobř
Location Tracking by Police: The Regulation of ‘Tireless and Absolute Surveillance’
Location information reveals people’s whereabouts, but can also tell much about their habits, preferences, and, ultimately, much of their private lives. Current surveillance technologies used in criminal investigation include many techniques to track someone’s movements; not all are equally intrusive. This raises the following questions: how do jurisdictions draw boundaries between lesser and more serious privacy intrusions? What factors play a role? How are geolocational privacy interests framed? In this Article, we answer these questions through a comparative analysis of location-tracking regulation in eight jurisdictions: Canada, Czechia, Germany, Italy, the Netherlands, Poland, the United Kingdom, and the United States.
We analyze the legal status of location tracking through human observation, GPS tracking, cell-phone tracking, IMSI catchers (Stingrays), silent SMS, automated license-plate recognition, and directional Wi-Fi tracking in these countries. This results in highly context-dependent and case-specific assessments, in which eight factors play a role: use of a technical device, place, intensity, duration, degree of suspicion, object of tracking, covertness, and active generation of data. At a deeper level of analysis, we identify different conceptualizations of privacy underlying these assessments: not only classic privacy frames, such as communications secrecy, protection of home and body, and informational privacy, but also two new privacy frames: freedom of movement in combination with anonymity, and the mosaic theory. Thus, we discern a tentative but unmistakable shift in how lawmakers and courts assess the intrusiveness of location tracking, particularly of people’s movements in public space.
Traditional privacy frames tend to downplay the seriousness of the privacy infringement enabled by location tracking, and our analysis demonstrates an increasing discomfort with this tendency, leading to the emergence of novel privacy frames (or theories) to regulate what might easily turn into what the Supreme Court of the United States has called “tireless and absolute surveillance.” We conclude that legal privacy frameworks developed in past centuries prove ill-suited for assessing the privacy-intrusiveness of contemporary location-tracking investigation methods, and that emerging, novel frameworks for understanding and protecting privacy may provide lawmakers and courts with the tools needed to address the challenge of preserving (geolocational) privacy in the twenty-first century
Location Tracking by Police: The Regulation of ‘Tireless and Absolute Surveillance’
Location information reveals people’s whereabouts, but can also tell much about their habits, preferences, and, ultimately, much of their private lives. Current surveillance technologies used in criminal investigation include many techniques to track someone’s movements; not all are equally intrusive. This raises the following questions: how do jurisdictions draw boundaries between lesser and more serious privacy intrusions? What factors play a role? How are geolocational privacy interests framed? In this Article, we answer these questions through a comparative analysis of location-tracking regulation in eight jurisdictions: Canada, Czechia, Germany, Italy, the Netherlands, Poland, the United Kingdom, and the United States.
We analyze the legal status of location tracking through human observation, GPS tracking, cell-phone tracking, IMSI catchers (Stingrays), silent SMS, automated license-plate recognition, and directional Wi-Fi tracking in these countries. This results in highly context-dependent and case-specific assessments, in which eight factors play a role: use of a technical device, place, intensity, duration, degree of suspicion, object of tracking, covertness, and active generation of data. At a deeper level of analysis, we identify different conceptualizations of privacy underlying these assessments: not only classic privacy frames, such as communications secrecy, protection of home and body, and informational privacy, but also two new privacy frames: freedom of movement in combination with anonymity, and the mosaic theory. Thus, we discern a tentative but unmistakable shift in how lawmakers and courts assess the intrusiveness of location tracking, particularly of people’s movements in public space.
Traditional privacy frames tend to downplay the seriousness of the privacy infringement enabled by location tracking, and our analysis demonstrates an increasing discomfort with this tendency, leading to the emergence of novel privacy frames (or theories) to regulate what might easily turn into what the Supreme Court of the United States has called “tireless and absolute surveillance.” We conclude that legal privacy frameworks developed in past centuries prove ill-suited for assessing the privacy-intrusiveness of contemporary location-tracking investigation methods, and that emerging, novel frameworks for understanding and protecting privacy may provide lawmakers and courts with the tools needed to address the challenge of preserving (geolocational) privacy in the twenty-first century
“My Computer Is My Castle”: New Privacy Frameworks to Regulate Police Hacking
Several countries have recently introduced laws allowing the police to hack into suspects’ computers. Legislators recognize that police hacking is highly intrusive to personal privacy but consider it justified by the increased use of encryption and mobile computing—both of which challenge traditional investigative methods. Police hacking also exemplifies a major challenge to the way legal systems deal with, and conceptualize, privacy. Existing conceptualizations of privacy and privacy rights do not always adequately address the types and degrees of intrusion into individuals’ private lives that police hacking powers enable.
Traditional privacy pillars such as the home and secrecy of communications do not always apply to computer-based police investigations in an era of mobile technologies and ubiquitous data. In this Article, we conduct a comparative legal analysis of criminal procedure rules in the United States, Germany, Italy, the Netherlands, and the United Kingdom to see which privacy frameworks lawmakers and courts apply when regulating police hacking. We show that while classic privacy frames of inviolability of the home and secrecy of communications remain adequate for some forms of police hacking (observation and interception), they fail to capture novel and fundamentally different ways in which the most intrusive forms of police hacking (covert online searches and remote surveillance) impact privacy in twenty-first-century society.
Our analysis shows the emergence of two new frameworks that have the potential to begin filling this void: 1) a container-based approach, focusing on the computer as protection-worthy in itself—or the “informatic home;” and 2) a content-based approach, focusing on the protection of data—or “informatic privacy.” Since both approaches have valuable benefits and potential drawbacks, we propose that a complementary application of the two might work best to capitalize on their advantages over traditional privacy frameworks to regulate police hacking
Influence of microstructure on the enhancement of soft magnetic character and the induced anisotropy of field annealed HITPERM-type alloys
Hitperm-type rapidly quenched ribbons were submitted to field annealing, both longitudinal field
(LF) and transversal field (TF) to the axis of the ribbon. LF annealing yields a reduction of
the magnetic anisotropy and results can be explained in the frame of random anisotropy model.
A coercivity of 3 A/m is obtained for Fe
39
Co
39
Nb
6
B
15
Cu
1
alloy. The addition of Cu to these
Nb-containing Hitperm-type alloys is a key factor to refine the microstructure in order to reach this
very low coercivity value. TF annealing produces samples with sheared hysteresis loops suitable
for sensor and high frequency applications
A Typology of Privacy
Despite the difficulty of capturing the nature and boundaries of privacy, it is important to conceptualize it. Some scholars develop unitary theories of privacy in the form of a unified conceptual core; others offer classifications of privacy that make meaningful distinctions between different types of privacy. We argue that the latter approach is underdeveloped and in need of improvement. In this paper, we propose a typology of privacy that is more systematic and comprehensive than any existing model. Our typology is developed, first, by a systematic analysis of constitutional protections of privacy in nine jurisdictions: the United States, Canada, the United Kingdom, the Netherlands, Germany, Italy, the Czech Republic, Poland, and Slovenia. This analysis yields a broad overview of the types of privacy that constitutional law seeks to protect. Second, we have studied literature from privacy scholars in the same nine jurisdictions, in order to identify the main dimensions along which privacy can be classified. Our analysis led us to structure types of privacy in a two-dimensional mode, consisting of eight basic types of privacy (bodily, intellectual, spatial, decisional, communicational, associational, proprietary, and behavioral privacy), with an overlay of a ninth type (informational privacy) that overlaps, but does not coincide, with the eight basic types. Because of the comprehensive and large-scale comparative nature of the analysis, this paper offers a fundamental contribution to the theoretical literature on privacy. Our typology can serve as an analytic and explanatory model that helps to understand what privacy is, why privacy cannot be reduced to informational privacy, how privacy relates to the right to privacy, and how the right to privacy varies, but also corresponds, across a broad range of countries
Variant recurrence confirms the existence of a FBXO31-related spastic-dystonic cerebral palsy syndrome
The role of genetics in the causation of cerebral palsy has become the focus of many studies aiming to unravel the heterogeneous etiology behind this frequent neurodevelopmental disorder. A recent paper reported two unrelated children with a clinical diagnosis of cerebral palsy, who carried the same de novo c.1000G \u3e A (p.Asp334Asn) variant in FBXO31, encoding a widely studied tumor suppressor not previously implicated in monogenic disease. We now identified a third individual with the recurrent FBXO31 de novo missense variant, featuring a spastic-dystonic phenotype. Our data confirm a link between variant FBXO31 and an autosomal dominant neurodevelopmental disorder characterized by prominent motor dysfunction
Predictors of outcome events and 6-year mortality after carotid endarterectomy and carotid stenting in patients with carotid artery stenosis
Aim. The aim of our study was to evaluate the results of CEA and CAS in patients with carotid artery stenosis, and their effect on long-term mortality and morbidity, as well as to identify predictors of long-term mortality in a single-centre observational study.Clinical rationale. While data on short-term morbidity and mortality after carotid endarterectomy (CEA) and carotid stenting (CAS) is robust, there is only a limited amount of literature on long-term mortality and its predictors five years-plus post these procedures.Material and methods. Consecutive patients with symptomatic and asymptomatic internal carotid artery stenosis treated with CEA or CAS in a single centre in eastern Slovakia between 2012 and 2014 were included. We recorded basic sociodemographic data, the presence of co-morbidities and periprocedural complications. Clinical and sonographic follow-up was performed three and 12 months after the procedures. Patient survival data and any stroke data was obtained at the end of a six-year follow-up.Results. We included 259 patients after CEA (mean age 67.4 ± 8.5, 64.5% men) and 321 after CAS (mean age 66.9 ± 8.4, 73.5% men). We did not identify a statistically significant difference in short-term or long-term mortality, survival times, or the presence of short-term or long-term complications between the CEA and CAS groups. Predictors of long-term mortality included age and diabetes mellitus in both cohorts. Repeated interventions were related to increased mortality only in the CAS cohort. Conclusions. The results of our study show that long-term mortality does not differ between CEA and CAS
Heart Rate Variability in evaluation of autonomic dysfunction in idiopathic REM-sleep behaviour disorder
Introduction. Nearly 80% of people diagnosed with idiopathic REM sleep behaviour disorder (iRBD) via video-polysomnography (v-PSG) are expected to be in the prodromal stage of an alpha-synucleinopathy. Signs of autonomic dysfunction can appear earlier than motor or cognitive alpha-synucleinopathy symptoms. Heart Rate Variability (HRV) can potentially be an objective measurement of autonomic dysfunction, and furthermore can be obtained directly from v-PSG.Objectives. The aim of this study was to evaluate dysautonomia in iRBD subjects using HRV obtained during different sleep stages and wakefulness from v-PSG.Material and methods. Subjects positively screened by an RBD screening questionnaire (RBD-SQ) underwent v-PSG todiagnose RBD. HRV obtained from v-PSG recordings was correlated to dysautonomia evaluated from a Non-Motor Symptoms Scale (NMSS) questionnaire. Optimal cut-off values of HRV parameters to predict dysautonomia were calculated using receiver operating characteristics (ROC) — area under the curve (AUC) analysis. The effect of confounder variables was predicted with binomial logistic regression and multiple regression analyses.Results. Out of 72 positively screened subjects, 29 subjects were diagnosed as iRBD (mean age 66 ± 7.7 years) by v-PSG. Eighty-three per cent of the iRBD subjects in our cohort were at the time of diagnosis classified as having possible or probable prodromal Parkinson’s Disease (pPD) compared to zero subjects being positively screened in the control group. The iRBD-positive subjects showed significant inverse correlations of NMSS score, particularly to log low-frequency (LF) component of HRV during wakefulness: r = –0.59 (p = 0.001). Based on ROC analysis and correlation between NMSS score, log LF during wakefulness (AUC 0.74, cut-off 4.69, sensitivity 91.7%, specificity 64.7%, p = 0.028) was considered as the most accurate predictor of dysautonomia in the iRBD group. Apnoea-hypopnoea index (AHI) negatively predicted dysautonomia in the iRBD group. None of the HRV components was able to predict the presence of iRBD in the full cohort. Age, gender, and PSG variables were significant confounders of HRV prediction.Conclusions. The presented study did not confirm the possibility of using HRV from v-PSG records of patients with iRBD to predict dysautonomia expressed by questionnaire methods. This is probably due to several confounding factors capableof influencing HRV in such a cohort
- …