11 research outputs found

    How the three arches of the foot intercorrelate

    Get PDF
    Background: The foot is composed of medial, lateral and transverse arches which, particularly the medial arch, provide it with the ability to function both as a flexible and rigid structure for proper locomotion. Arches of the foot, as well as their effect on lower extremity function, have been studied. However, quantitative data on the relationship between these arches still remain scanty. The purpose of this study was, therefore, to examine how the three arches of the foot intercorrelate. Materials and methods: Seventy-six participants (58 males, 18 females) were recruited to participate in the study. Bilateral weight-bearing lateral radiographs of the right foot were taken from each participant. Navicular heights (NH), medial cuneiform height (MCH), calcaneal inclination angle (CIA) and calcaneal-first metatarsal angle (C1MA) were measured to represent the medial arch. The lateral arch was represented by cuboid height (CH) and calcaneal-fifth metatarsal angle (C5MA) whereas; MCH and CH represented the transverse arch. Mean difference of variables between males and females was compared using independent t-test while the correlation between the variables was determined using Pearson correlation. Results: All the variables were not significantly related to gender. Significant moderate to excellent linear correlations were observed between the variables. CIA showed the strongest correlation with C1MA (r = –0.90) and C5MA (r = –0.84) whereas, CH had the least correlation with other variables. Conclusions: The moderate to excellent correlations between the variables indicate that deformation or elevation of the medial arch may consequently result in similar movements of the lateral and transverse arches and vice versa

    J Interpers Violence

    Get PDF
    Homicide-suicide incidents involving child victims can have a detrimental impact on survivors of the violence, family members and friends of the decedents, and other community members, but the rare occurrence of these acts makes using quantitative data to examine their associated antecedents challenging. Therefore, using qualitative data from the 2003-2011 National Violent Death Reporting System, we examined 175 cases of homicide-suicide involving child victims in an effort to better understand the complex situational factors of these events. Our findings indicate that 98% of homicide-suicides with child victims are perpetrated by adults (mostly parents) and propelled by the perpetrators' intimate partner problems, mental health problems, and criminal/legal problems. These events are often premeditated, and plans for the violence are sometimes disclosed prior to its occurrence. Findings provide support for several theoretical perspectives, and implications for prevention are discussed.CC999999/Intramural CDC HHS/United States2019-02-01T00:00:00Z26385898PMC4795978vault:1634

    Design, Fabrication and Experimental Study of Solar Parabolic Dish Concentrator for Remote Area Application

    Get PDF
    The sustainability of our ecosystem is under threat due to the frequent use of fossil fuel for cooking purpose in the rural communities. Therefore, efforts are being made to replace our existing cooking fuel with renewable energy source. The design fabrication and testing of a solar parabolic dish concentrator for application in remote areas is presented in this paper. The solar concentrator was design and fabricated with low cost available material and skills that can be operate and easily repaired by the users and can be track manually to follow the movement of the sun. The performance test carried out reveals that the concentrator can attain a very high temperature of 180oc for frying oil on a clear sunny day and boiling water of 100oc. The study also reveals that the concentrator can be used for cooking and drying purpose

    Urban eco-greenergy (TM) hybrid wind-solar photovoltaic energy system and its applications

    Get PDF
    This paper introduces the Eco-Greenergy (TM) hybrid wind-solar photovoltaic energy generation system and its applications. The system is an integration of the novel omni-direction-guide-vane (ODGV) with a vertical axis wind turbine (VAWT). The ODGV is designed to surround the VAWT for wind power augmentation by creating a venturi effect to increase the on-coming wind speed before it interacts with the turbine blades. In wind tunnel tests, the ODGV improves the power output of the VAWT by 3.48 times compared with a bare VAWT at its peak torque. Furthermore, the rotor rotational speed of the wind turbine increased by 182 at 6 m/s of wind speed. A solar PV panel can be mounted on the top surface of the ODGV for solar energy generation. Estimation on wind-solar energy output shows that the system can generate a total of 572.8 kWh of energy per year By comparison, the ODGV increases the annual wind energy output by 438. The green energy generated from the hybrid system can be used to power LED lights or other appliances (e.g., CCTV camera)

    A Survey

    No full text
    The current vision of the Internet of Things (IoT) is to ensure that everything from everywhere is connected to the Internet at all times using Internet Protocol (IP). This idea has the potential of making homes, cities, electric grids, among others, safer, more efficient, and easier to manage. Nevertheless, a number of obstacles still remain to fully realize the IoT vision, with security and privacy among the most critical. Ensuring security and privacy in the IoT is particularly complicated, especially for the resource-constrained devices due to finite energy supply and low computing power. These factors are typically at odds with most of the existing security protocols and schemes proposed for the IoT because of the intensive computational nature of the cryptographic algorithms involved. This paper performs an extensive comparison of previous surveys on the subject, and shows its novelty with respect to the previous work. It describes 9 application domains and presents, in detail, security requirements, system models, threat models along with protocols and technologies for those 9 application areas. The survey also performs an exhaustive examination of some existing mechanisms and approaches proposed in the literature for ensuring security and privacy of IoT devices. Finally, it outlines some open research issues associated with IoT security.info:eu-repo/semantics/publishedVersio

    Security Challenges of the Internet of Things

    No full text
    The Internet of Things (IoT) is an environment in which ordinary and complex consumer products, buildings, bridges, animals or even people, etc. are embedded with sensors, equipped with a variety of communication technologies and given unique identifiers that can enable them connect to the Internet. This allows them to talk to each other, collect data and transfer data over the Internet. IoT has the potential to enhance the way we do things by increasing productivity and efficiency. It also has the prospects of delivering significant business benefits. Nonetheless, implementing secure communication in the IoT and integrating security mechanisms into some of its devices have been a major impediment to its progress, resulting in many privacy concerns. Although IoT is a hybrid network of the Internet, many security solutions for the Internet cannot be directly used on the resource-constrained devices of the IoT, hence the need for new security solutions. In this chapter, we discuss the security challenges of the IoT. First, we discuss some basic concepts of security and security requirements in the context of IoT. We then consider fundamental security issues in the IoT and thereafter highlight the security issues that need immediate attention.info:eu-repo/semantics/publishedVersio
    corecore