374 research outputs found

    Adenocarcinoma of the colon following ureterosigmoidostomy report of a new case with autopsy findings

    Get PDF

    What Protections Are Available to Graffiti Artists?

    Get PDF

    Analysis of floods using satellite images - case study of the 2007 torrential flood in the SelΕ‘ka valley

    Get PDF
    An application of data mining for the determination of flooded areas was published in the Journal Geodetski vestnik (no. 54/2010-4). This paper analyses the usefulness of these results for further analyses of hydraulic parameters. The velocity and discharges were computed for six locations. The study showed that the flooded areas determined by satellite images can be used for further analyses. Nevertheless, other layers have to be sufficiently precise, especially the digital terrain model (DTM). DTM 12.5 was used. The study showed that DTM 12.5 is not precise enough. The observed area is very rough and the hydraulic parameters (cross sectional area of flow, wetted perimeter, hydraulic radius, river-bottom slope, flow velocity, discharge) cannot be detected with sufficient precision. Consequently the calculated hydraulic radiuses, velocities and discharges are out of expectations. In the first part of the article, some basic information about remote sensing and its techniques is presented. Some practical examples of their usage (especially satellite images) for the observation of natural disasters are also given

    On quantum cryptography

    Get PDF
    In the late twentieth century, human race entered the era of information technology (IT). The IT industry, which deals with the production, processing, storage and transmission of information, has become an integral part of the global economic system, a completely independent and significant sector of the economy. The dependence of the modern society on information technologies is so great that omissions in information systems may lead to significant incidents. Telecommunications are the key information technology industry. However, information is very susceptible to various types of abuse during transmission. The units for data storage and processing can be physically protected from anyone wishing harm, but this does not hold true for the communication lines that span hundreds or thousands of kilometers and are virtually impossible to protect. Therefore, the problem of information protection in the field of telecommunications is highly significant. Cryptology, particularly cryptography, deals with this issue. Quantum cryptography is a relatively new field ensuring safe communication between the sender and the recipient using the laws of quantum physics. This paper seeks to address the principles of the quantum distribution of a key for information encryption and the fundamental problems arising from the execution.ΠšΡ€Π°Ρ˜Π΅ΠΌ двадСсСтог Π²Π΅ΠΊΠ° човСчанство je ΡƒΡˆΠ»ΠΎ Ρƒ Π΅Ρ€Ρƒ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½ΠΈΡ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΡ˜Π°. ИВ ΠΈΠ½Π΄ΡƒΡΡ‚Ρ€ΠΈΡ˜Π°, која сС Π±Π°Π²ΠΈ ΠΏΡ€ΠΎΠΈΠ·Π²ΠΎΠ΄ΡšΠΎΠΌ, ΠΎΠ±Ρ€Π°Π΄ΠΎΠΌ, ΡΠΊΠ»Π°Π΄ΠΈΡˆΡ‚Π΅ΡšΠ΅ΠΌ ΠΈ прСносом ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ˜Π°, постала јС саставни Π΄eΠΎ Π³Π»ΠΎΠ±Π°Π»Π½ΠΎΠ³ Скономског систСма, ΠΏΠΎΡ‚ΠΏΡƒΠ½ΠΎ нСзависан ΠΈ ΠΏΡ€ΠΈΠ»ΠΈΡ‡Π½ΠΎ Π·Π½Π°Ρ‡Π°Ρ˜Π°Π½ сСктор ΠΏΡ€ΠΈΠ²Ρ€eΠ΄Π΅. Зависност саврСмСног Π΄Ρ€ΡƒΡˆΡ‚Π²Π° ΠΎΠ΄ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½ΠΈΡ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΡ˜Π° јС Ρ‚ΠΎΠ»ΠΈΠΊΠΎ Π²Π΅Π»ΠΈΠΊΠ° Π΄Π° пропусти Ρƒ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½ΠΈΠΌ систСмима ΠΌΠΎΠ³Ρƒ довСсти Π΄ΠΎ Π·Π½Π°Ρ‡Π°Ρ˜Π½ΠΈΡ… ΠΈΠ½Ρ†ΠΈΠ΄Π΅Π½Π°Ρ‚Π°. Π’Π΅Π»Π΅ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜e су ΠΊΡ™ΡƒΡ‡Π½Π° ΠΈΠ½Π΄ΡƒΡΡ‚Ρ€ΠΈΡ˜Π° ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½ΠΈΡ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΡ˜Π°. ΠœΠ΅Ρ’ΡƒΡ‚ΠΈΠΌ, ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ˜Π΅ су Ρ‚ΠΎΠΊΠΎΠΌ транспорта Π²Π΅ΠΎΠΌΠ° осСтљивС Π½Π° Ρ€Π°Π·Π½Π΅ врстС Π·Π»ΠΎΡƒΠΏΠΎΡ‚Ρ€Π΅Π±Π°. ΠˆΠ΅Π΄ΠΈΠ½ΠΈΡ†Π΅ Π·Π° ΡΠΊΠ»Π°Π΄ΠΈΡˆΡ‚Π΅ΡšΠ΅ ΠΈ ΠΎΠ±Ρ€Π°Π΄Ρƒ ΠΏΠΎΠ΄Π°Ρ‚Π°ΠΊΠ° ΠΌΠΎΠ³Ρƒ Π±ΠΈΡ‚ΠΈ Ρ„ΠΈΠ·ΠΈΡ‡ΠΊΠΈ Π·Π°ΡˆΡ‚ΠΈΡ›Π΅Π½Π΅ ΠΎΠ΄ Π½Π΅Π΄ΠΎΠ±Ρ€ΠΎΠ½Π°ΠΌΠ΅Ρ€Π½ΠΈΡ…, ΡˆΡ‚ΠΎ сС Π½Π΅ ΠΌΠΎΠΆΠ΅ Ρ€Π΅Ρ›ΠΈ Π·Π° ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½Π΅ линијС којС сС ΠΏΡ€ΠΎΡ‚Π΅ΠΆΡƒ Π½Π° стотинС ΠΈΠ»ΠΈ Ρ…ΠΈΡ™Π°Π΄Π΅ ΠΊΠΈΠ»ΠΎΠΌΠ΅Ρ‚Π°Ρ€Π° ΠΈ којС јС Π³ΠΎΡ‚ΠΎΠ²ΠΎ Π½Π΅ΠΌΠΎΠ³ΡƒΡ›Π΅ Π·Π°ΡˆΡ‚ΠΈΡ‚ΠΈΡ‚ΠΈ. Π‘Ρ‚ΠΎΠ³Π° јС ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌ Π·Π°ΡˆΡ‚ΠΈΡ‚Π΅ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ˜Π° Ρƒ сфСри Ρ‚Π΅Π»Π΅ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜Π° Π²Π΅ΠΎΠΌΠ° Π·Π½Π°Ρ‡Π°Ρ˜Π°Π½. ΠšΡ€ΠΈΠΏΡ‚ΠΎΠ»ΠΎΠ³ΠΈΡ˜Π° ΠΊΠ°ΠΎ Π½Π°ΡƒΠΊΠ° ΠΈ посСбно њСн Π΄Π΅ΠΎ ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ³Ρ€Π°Ρ„ΠΈΡ˜Π° ΡƒΠΏΡ€Π°Π²ΠΎ сС Π±Π°Π²Π΅ ΠΎΠ²ΠΎΠΌ ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΠ°Ρ‚ΠΈΠΊΠΎΠΌ. ΠšΠ²Π°Π½Ρ‚Π½Π° ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ³Ρ€Π°Ρ„ΠΈΡ˜Π° јС Ρ€Π΅Π»Π°Ρ‚ΠΈΠ²Π½ΠΎ новија област која сС Π±Π°Π²ΠΈ ΠΎΠ±Π΅Π·Π±Π΅Ρ’Π΅ΡšΠ΅ΠΌ сигурнС ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜Π΅ ΠΈΠ·ΠΌΠ΅Ρ’Ρƒ ΠΏΠΎΡˆΠΈΡ™Π°ΠΎΡ†Π° ΠΈ ΠΏΡ€ΠΈΠΌΠ°ΠΎΡ†Π° ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ˜Π΅, користСћи Π·Π°ΠΊΠΎΠ½Π΅ ΠΊΠ²Π°Π½Ρ‚Π½Π΅ Ρ„ΠΈΠ·ΠΈΠΊΠ΅. Π¦ΠΈΡ™ Ρ€Π°Π΄Π° јС Π΄Π° сС ΡƒΠΏΠΎΠ·Π½Π°ΠΌΠΎ са ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΠΈΠΌΠ° ΠΊΠ²Π°Π½Ρ‚Π½Π΅ Π΄ΠΈΡΡ‚Ρ€ΠΈΠ±ΡƒΡ†ΠΈΡ˜Π΅ ΠΊΡ™ΡƒΡ‡Π° Π·Π° ΠΊΠΎΠ΄ΠΈΡ€Π°ΡšΠ΅ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ˜Π° ΠΈ основним ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΠΈΠΌΠ° који сС Ρ˜Π°Π²Ρ™Π°Ρ˜Ρƒ ΠΏΡ€ΠΈ њСговој Ρ€Π΅Π°Π»ΠΈΠ·Π°Ρ†ΠΈΡ˜ΠΈ

    Pathology of malignant breast tumors

    Get PDF
    Merfoloőka opredelitev tumorjev dojke po načelih moderne kirurőke patologije tumorja daje kliniku poleg osnovnih podatkov o naravi tumorja tudi pomembne prognostične informacije. Pri karcinomu dojke so med njimi na vrhu pomembnosti: stanje aksilarnih bezgavk (pozitivne ali negativne bezgavke), stopnja malignosti tumorja, velikost tumorja, verjetno tudi histoloőki tip. Z razvojem modernih tehnologij lahko tako patolog kot klinik uporabljata őe mnoge nove metode, s katerimi opredeljujeta tumor tudi biokemično in molekularno. Zaenkrat pa vse te nove opredelitve őe ne dosegajo prognostične veljave klasičnih morfoloőkih lastnosti. Prav zato pa mora patolog skrbno upoőtevati priporočila in pravila o obdelavi kirurőkega vzorca, da lahko opredeli vrsto morfoloőkih lastnosti, ki vsebujejo največ napovedno veljavnih podatkov. V članku govorim o osnovnih morfoloőkih metodah, o posameznih pomembnejőih tumorjih dojke ter o nekaterih novih biokemičnih in molekularnih metodah v diagnostiki raka dojke.The morphological classification of breast tumors, in accordance to principlesof modern surgical pathology, provides the clinician not only with the basic data on the nature of tumor but also with important prognostic information. In the carcinoma of the breast, such information are as follows: lymph node status (positive or negative lymph nodes), grade of malignancy, size of the tumor and probably its histological type. The development of new technologies enabled the pathologist as well as the clinician to use numerous new tools and methods to determine a number of biochemical and molecular characteristics of the tumor. At this moment, however, the latter do not achieve the prognostic relevance of classical morphological features. Therefore, the pathologist should carefully folow the recommendatios and guidelines for handling and reporting surgical specimens since only by such means all morphological features giving most important prognostic information will be identified. In the article, some basic morphological methods, several important breast tumors, and a few biochemical and molecular methods in the diagnostics of breast cancer are discussed

    On quantum cryptography

    Get PDF
    In the late twentieth century, human race entered the era ofinformation technology (IT). The IT industry, which deals with the production,processing, storage and transmission of information, has become an integralpart of the global economic system, a completely independent and significantsector of the economy. The dependence of the modern society on informationtechnologies is so great that omissions in information systems may lead tosignificant incidents. Telecommunications are the key information technologyindustry. However, information is very susceptible to various types of abuseduring transmission. The units for data storage and processing can bephysically protected from anyone wishing harm, but this does not hold truefor the communication lines that span hundreds or thousands of kilometersand are virtually impossible to protect. Therefore, the problem of informationprotection in the field of telecommunications is highly significant. Cryptology,particularly cryptography, deals with this issue. Quantum cryptography is arelatively new field ensuring safe communication between the sender and therecipient using the laws of quantum physics. This paper seeks to address theprinciples of the quantum distribution of a key for information encryption andthe fundamental problems arising from the execution.ΠšΡ€Π°Ρ˜Π΅ΠΌ двадСсСтог Π²Π΅ΠΊΠ° човСчанство je ΡƒΡˆΠ»ΠΎ Ρƒ Π΅Ρ€Ρƒ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½ΠΈΡ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΡ˜Π°. ИВ ΠΈΠ½Π΄ΡƒΡΡ‚Ρ€ΠΈΡ˜Π°, која сС Π±Π°Π²ΠΈ ΠΏΡ€ΠΎΠΈΠ·Π²ΠΎΠ΄ΡšΠΎΠΌ, ΠΎΠ±Ρ€Π°Π΄ΠΎΠΌ,ΡΠΊΠ»Π°Π΄ΠΈΡˆΡ‚Π΅ΡšΠ΅ΠΌ ΠΈ прСносом ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ˜Π°, постала јС саставни Π΄eΠΎ глобалногСкономског систСма, ΠΏΠΎΡ‚ΠΏΡƒΠ½ΠΎ нСзависан ΠΈ ΠΏΡ€ΠΈΠ»ΠΈΡ‡Π½ΠΎ Π·Π½Π°Ρ‡Π°Ρ˜Π°Π½ сСктор ΠΏΡ€ΠΈΠ²Ρ€eΠ΄Π΅. Зависност саврСмСног Π΄Ρ€ΡƒΡˆΡ‚Π²Π° ΠΎΠ΄ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½ΠΈΡ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΡ˜Π° јС Ρ‚ΠΎΠ»ΠΈΠΊΠΎΠ²Π΅Π»ΠΈΠΊΠ° Π΄Π° пропусти Ρƒ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½ΠΈΠΌ систСмима ΠΌΠΎΠ³Ρƒ довСсти Π΄ΠΎ Π·Π½Π°Ρ‡Π°Ρ˜Π½ΠΈΡ… ΠΈΠ½Ρ†ΠΈΠ΄Π΅Π½Π°Ρ‚Π°. Π’Π΅Π»Π΅ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜e су ΠΊΡ™ΡƒΡ‡Π½Π° ΠΈΠ½Π΄ΡƒΡΡ‚Ρ€ΠΈΡ˜Π° ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½ΠΈΡ…Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΡ˜Π°. ΠœΠ΅Ρ’ΡƒΡ‚ΠΈΠΌ, ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ˜Π΅ су Ρ‚ΠΎΠΊΠΎΠΌ транспорта Π²Π΅ΠΎΠΌΠ° осСтљивСна Ρ€Π°Π·Π½Π΅ врстС Π·Π»ΠΎΡƒΠΏΠΎΡ‚Ρ€Π΅Π±Π°. ΠˆΠ΅Π΄ΠΈΠ½ΠΈΡ†Π΅ Π·Π° ΡΠΊΠ»Π°Π΄ΠΈΡˆΡ‚Π΅ΡšΠ΅ ΠΈ ΠΎΠ±Ρ€Π°Π΄Ρƒ ΠΏΠΎΠ΄Π°Ρ‚Π°ΠΊΠ°ΠΌΠΎΠ³Ρƒ Π±ΠΈΡ‚ΠΈ Ρ„ΠΈΠ·ΠΈΡ‡ΠΊΠΈ Π·Π°ΡˆΡ‚ΠΈΡ›Π΅Π½Π΅ ΠΎΠ΄ Π½Π΅Π΄ΠΎΠ±Ρ€ΠΎΠ½Π°ΠΌΠ΅Ρ€Π½ΠΈΡ…, ΡˆΡ‚ΠΎ сС Π½Π΅ ΠΌΠΎΠΆΠ΅ Ρ€Π΅Ρ›ΠΈ Π·Π° ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½Π΅ линијС којС сС ΠΏΡ€ΠΎΡ‚Π΅ΠΆΡƒ Π½Π° стотинС ΠΈΠ»ΠΈ Ρ…ΠΈΡ™Π°Π΄Π΅ ΠΊΠΈΠ»ΠΎΠΌΠ΅Ρ‚Π°Ρ€Π° икојС јС Π³ΠΎΡ‚ΠΎΠ²ΠΎ Π½Π΅ΠΌΠΎΠ³ΡƒΡ›Π΅ Π·Π°ΡˆΡ‚ΠΈΡ‚ΠΈΡ‚ΠΈ. Π‘Ρ‚ΠΎΠ³Π° јС ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌ Π·Π°ΡˆΡ‚ΠΈΡ‚Π΅ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ˜Π°Ρƒ сфСри Ρ‚Π΅Π»Π΅ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜Π° Π²Π΅ΠΎΠΌΠ° Π·Π½Π°Ρ‡Π°Ρ˜Π°Π½. ΠšΡ€ΠΈΠΏΡ‚ΠΎΠ»ΠΎΠ³ΠΈΡ˜Π° ΠΊΠ°ΠΎ Π½Π°ΡƒΠΊΠ° ΠΈ посСбно њСн Π΄Π΅ΠΎ ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ³Ρ€Π°Ρ„ΠΈΡ˜Π° ΡƒΠΏΡ€Π°Π²ΠΎ сС Π±Π°Π²Π΅ ΠΎΠ²ΠΎΠΌ ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΠ°Ρ‚ΠΈΠΊΠΎΠΌ. ΠšΠ²Π°Π½Ρ‚Π½Π°ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ³Ρ€Π°Ρ„ΠΈΡ˜Π° јС Ρ€Π΅Π»Π°Ρ‚ΠΈΠ²Π½ΠΎ новија област која сС Π±Π°Π²ΠΈ ΠΎΠ±Π΅Π·Π±Π΅Ρ’Π΅ΡšΠ΅ΠΌ ΡΠΈΠ³ΡƒΡ€Π½Π΅ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜Π΅ ΠΈΠ·ΠΌΠ΅Ρ’Ρƒ ΠΏΠΎΡˆΠΈΡ™Π°ΠΎΡ†Π° ΠΈ ΠΏΡ€ΠΈΠΌΠ°ΠΎΡ†Π° ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ˜Π΅, користСћи Π·Π°ΠΊΠΎΠ½Π΅ ΠΊΠ²Π°Π½Ρ‚Π½Π΅ Ρ„ΠΈΠ·ΠΈΠΊΠ΅. Π¦ΠΈΡ™ Ρ€Π°Π΄Π° јС Π΄Π° сС ΡƒΠΏΠΎΠ·Π½Π°ΠΌΠΎ са ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΠΈΠΌΠ° ΠΊΠ²Π°Π½Ρ‚Π½Π΅Π΄ΠΈΡΡ‚Ρ€ΠΈΠ±ΡƒΡ†ΠΈΡ˜Π΅ ΠΊΡ™ΡƒΡ‡Π° Π·Π° ΠΊΠΎΠ΄ΠΈΡ€Π°ΡšΠ΅ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ˜Π° ΠΈ основним ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΠΈΠΌΠ° који сС Ρ˜Π°Π²Ρ™Π°Ρ˜Ρƒ ΠΏΡ€ΠΈ њСговој Ρ€Π΅Π°Π»ΠΈΠ·Π°Ρ†ΠΈΡ˜ΠΈ.Serbian version: [http://cer.ihtm.bg.ac.rs/handle/123456789/3472

    Comparison of 2D and 3D geotechnical analysis of reinforced concrete shafts for the mitigation of Ε mihel landslide

    Get PDF
    The thesis presents the rehabilitation of Ε mihel landslide. In the process reinforced concrete shafts\ud were used. The mitigation was based on the numerical finite element method analysis. In the first part\ud the landslide situation is presented along with field and laboratory tests. On the basis of SPT and\ud laboratory tests, mechanical properties of soils are determined and used in the numerical analysis. The\ud second part of the thesis presents the modelling and calculation of the landslide in 2D and 3D working\ud environment. The comparison of the results shows the advantages and disadvantages of 2D and 3D\ud analysis. The influence of the drainage on global stability and loading of the structure is also taken into\ud consideration. Internal forces calculated with the numerical analysis are used for dimensioning of steel\ud reinforcement in critical cross sections, which is the basis for drawing detailed reinforcement plans

    Acceptability of a Multifamily Housing Construction in the Ε½-S7 Zone in the Ε½iri Municipality

    Get PDF
    The present thesis discusses the problem of a multifamily housing construction. Though a common occurence in bigger cities, in smaller rural cities only just undergoing the transformation into cities proper, multi-dwelling buildings raise the question of their acceptability. For this very reason any land development necessitates a prior integral analysis of the area. The thesis is based upon an analysis of acceptability of a multifamily housing construction in the Ε½iri municipality. The analysis reposes on various factors, namely: spatial limitations, population density, the number of inhabitants and their age structure, and others. The author of the thesis provides solutions to the question of multifamily housing construction acceptability from the aspect of the local population's lifestyle as conditioned by the type of occupation, commute time, the share of immigrants from urban and rural areas, etc. On the basis of the obtained results two verifications were performed, viz. a verification of the construction of the Ε½-S7 zone with both, family and multifamily houses, and a verification of the construction in the aforementioned zone with multifamily houses exclusively

    Transient Numerical Simulation of Airflow Characteristics in the Mouth-Throat 3D Model

    Get PDF
    Air pollution is a public health problem that has a serious effect on human health, as it leads to increased morbidity and mortality. Each year, more than 3 million people die from air pollution, while many more have higher risks of stroke, heart attack, and lung diseases as a result of the pollution. The available epidemiological studies indicate that exposure to particulate matter in the air can have a toxic effect on the cardiovascular system, and increase the death risk from cardiovascular diseases such as ischemic heart disease and heart failure. In this study, we have reconstructed the upper respiratory tract model from the CT images in order to analyze airflow patterns during the inhalation part of the breathing cycle and to track NO2 particles inhaled through the mouth or nose. The numerical analysis has been performed using the computational fluid dynamics (CFD) method and the discrete particle method (DPM). The continuous phase flow was solved using the k-Ο‰ Shear Stress Transport model with low Reynolds number corrections
    • …
    corecore