374 research outputs found
Analysis of floods using satellite images - case study of the 2007 torrential flood in the SelΕ‘ka valley
An application of data mining for the determination of flooded areas was published in the Journal Geodetski vestnik (no. 54/2010-4). This paper analyses the usefulness of these results for further analyses of hydraulic parameters. The velocity and discharges were computed for six locations. The study showed that the flooded areas determined by satellite images can be used for further analyses. Nevertheless, other layers have to be sufficiently precise, especially the digital terrain model (DTM). DTM 12.5 was used. The study showed that DTM 12.5 is not precise enough. The observed area is very rough and the hydraulic parameters (cross sectional area of flow, wetted perimeter, hydraulic radius, river-bottom slope, flow velocity, discharge) cannot be detected with sufficient precision. Consequently the calculated hydraulic radiuses, velocities and discharges are out of expectations. In the first part of the article, some basic information about remote sensing and its techniques is presented. Some practical examples of their usage (especially satellite images) for the observation of natural disasters are also given
On quantum cryptography
In the late twentieth century, human race entered the era of
information technology (IT). The IT industry, which deals with the production,
processing, storage and transmission of information, has become an integral
part of the global economic system, a completely independent and significant
sector of the economy. The dependence of the modern society on information
technologies is so great that omissions in information systems may lead to
significant incidents. Telecommunications are the key information technology
industry. However, information is very susceptible to various types of abuse
during transmission. The units for data storage and processing can be
physically protected from anyone wishing harm, but this does not hold true
for the communication lines that span hundreds or thousands of kilometers
and are virtually impossible to protect. Therefore, the problem of information
protection in the field of telecommunications is highly significant. Cryptology,
particularly cryptography, deals with this issue. Quantum cryptography is a
relatively new field ensuring safe communication between the sender and the
recipient using the laws of quantum physics. This paper seeks to address the
principles of the quantum distribution of a key for information encryption and
the fundamental problems arising from the execution.ΠΡΠ°ΡΠ΅ΠΌ Π΄Π²Π°Π΄Π΅ΡΠ΅ΡΠΎΠ³ Π²Π΅ΠΊΠ° ΡΠΎΠ²Π΅ΡΠ°Π½ΡΡΠ²ΠΎ je ΡΡΠ»ΠΎ Ρ Π΅ΡΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ°. ΠΠ’ ΠΈΠ½Π΄ΡΡΡΡΠΈΡΠ°, ΠΊΠΎΡΠ° ΡΠ΅ Π±Π°Π²ΠΈ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΡΠΎΠΌ, ΠΎΠ±ΡΠ°Π΄ΠΎΠΌ,
ΡΠΊΠ»Π°Π΄ΠΈΡΡΠ΅ΡΠ΅ΠΌ ΠΈ ΠΏΡΠ΅Π½ΠΎΡΠΎΠΌ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ°, ΠΏΠΎΡΡΠ°Π»Π° ΡΠ΅ ΡΠ°ΡΡΠ°Π²Π½ΠΈ Π΄eΠΎ Π³Π»ΠΎΠ±Π°Π»Π½ΠΎΠ³
Π΅ΠΊΠΎΠ½ΠΎΠΌΡΠΊΠΎΠ³ ΡΠΈΡΡΠ΅ΠΌΠ°, ΠΏΠΎΡΠΏΡΠ½ΠΎ Π½Π΅Π·Π°Π²ΠΈΡΠ°Π½ ΠΈ ΠΏΡΠΈΠ»ΠΈΡΠ½ΠΎ Π·Π½Π°ΡΠ°ΡΠ°Π½ ΡΠ΅ΠΊΡΠΎΡ ΠΏΡΠΈΠ²ΡeΠ΄Π΅. ΠΠ°Π²ΠΈΡΠ½ΠΎΡΡ ΡΠ°Π²ΡΠ΅ΠΌΠ΅Π½ΠΎΠ³ Π΄ΡΡΡΡΠ²Π° ΠΎΠ΄ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ° ΡΠ΅ ΡΠΎΠ»ΠΈΠΊΠΎ
Π²Π΅Π»ΠΈΠΊΠ° Π΄Π° ΠΏΡΠΎΠΏΡΡΡΠΈ Ρ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΠΌ ΡΠΈΡΡΠ΅ΠΌΠΈΠΌΠ° ΠΌΠΎΠ³Ρ Π΄ΠΎΠ²Π΅ΡΡΠΈ Π΄ΠΎ Π·Π½Π°ΡΠ°ΡΠ½ΠΈΡ
ΠΈΠ½ΡΠΈΠ΄Π΅Π½Π°ΡΠ°. Π’Π΅Π»Π΅ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΡe ΡΡ ΠΊΡΡΡΠ½Π° ΠΈΠ½Π΄ΡΡΡΡΠΈΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ°. ΠΠ΅ΡΡΡΠΈΠΌ, ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ΅ ΡΡ ΡΠΎΠΊΠΎΠΌ ΡΡΠ°Π½ΡΠΏΠΎΡΡΠ° Π²Π΅ΠΎΠΌΠ° ΠΎΡΠ΅ΡΡΠΈΠ²Π΅
Π½Π° ΡΠ°Π·Π½Π΅ Π²ΡΡΡΠ΅ Π·Π»ΠΎΡΠΏΠΎΡΡΠ΅Π±Π°. ΠΠ΅Π΄ΠΈΠ½ΠΈΡΠ΅ Π·Π° ΡΠΊΠ»Π°Π΄ΠΈΡΡΠ΅ΡΠ΅ ΠΈ ΠΎΠ±ΡΠ°Π΄Ρ ΠΏΠΎΠ΄Π°ΡΠ°ΠΊΠ°
ΠΌΠΎΠ³Ρ Π±ΠΈΡΠΈ ΡΠΈΠ·ΠΈΡΠΊΠΈ Π·Π°ΡΡΠΈΡΠ΅Π½Π΅ ΠΎΠ΄ Π½Π΅Π΄ΠΎΠ±ΡΠΎΠ½Π°ΠΌΠ΅ΡΠ½ΠΈΡ
, ΡΡΠΎ ΡΠ΅ Π½Π΅ ΠΌΠΎΠΆΠ΅ ΡΠ΅ΡΠΈ Π·Π° ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΎΠ½Π΅ Π»ΠΈΠ½ΠΈΡΠ΅ ΠΊΠΎΡΠ΅ ΡΠ΅ ΠΏΡΠΎΡΠ΅ΠΆΡ Π½Π° ΡΡΠΎΡΠΈΠ½Π΅ ΠΈΠ»ΠΈ Ρ
ΠΈΡΠ°Π΄Π΅ ΠΊΠΈΠ»ΠΎΠΌΠ΅ΡΠ°ΡΠ° ΠΈ
ΠΊΠΎΡΠ΅ ΡΠ΅ Π³ΠΎΡΠΎΠ²ΠΎ Π½Π΅ΠΌΠΎΠ³ΡΡΠ΅ Π·Π°ΡΡΠΈΡΠΈΡΠΈ. Π‘ΡΠΎΠ³Π° ΡΠ΅ ΠΏΡΠΎΠ±Π»Π΅ΠΌ Π·Π°ΡΡΠΈΡΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ°
Ρ ΡΡΠ΅ΡΠΈ ΡΠ΅Π»Π΅ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΡΠ° Π²Π΅ΠΎΠΌΠ° Π·Π½Π°ΡΠ°ΡΠ°Π½. ΠΡΠΈΠΏΡΠΎΠ»ΠΎΠ³ΠΈΡΠ° ΠΊΠ°ΠΎ Π½Π°ΡΠΊΠ° ΠΈ ΠΏΠΎΡΠ΅Π±Π½ΠΎ ΡΠ΅Π½ Π΄Π΅ΠΎ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ° ΡΠΏΡΠ°Π²ΠΎ ΡΠ΅ Π±Π°Π²Π΅ ΠΎΠ²ΠΎΠΌ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ°ΡΠΈΠΊΠΎΠΌ. ΠΠ²Π°Π½ΡΠ½Π°
ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ° ΡΠ΅ ΡΠ΅Π»Π°ΡΠΈΠ²Π½ΠΎ Π½ΠΎΠ²ΠΈΡΠ° ΠΎΠ±Π»Π°ΡΡ ΠΊΠΎΡΠ° ΡΠ΅ Π±Π°Π²ΠΈ ΠΎΠ±Π΅Π·Π±Π΅ΡΠ΅ΡΠ΅ΠΌ ΡΠΈΠ³ΡΡΠ½Π΅
ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΡΠ΅ ΠΈΠ·ΠΌΠ΅ΡΡ ΠΏΠΎΡΠΈΡΠ°ΠΎΡΠ° ΠΈ ΠΏΡΠΈΠΌΠ°ΠΎΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ΅, ΠΊΠΎΡΠΈΡΡΠ΅ΡΠΈ Π·Π°ΠΊΠΎΠ½Π΅ ΠΊΠ²Π°Π½ΡΠ½Π΅ ΡΠΈΠ·ΠΈΠΊΠ΅. Π¦ΠΈΡ ΡΠ°Π΄Π° ΡΠ΅ Π΄Π° ΡΠ΅ ΡΠΏΠΎΠ·Π½Π°ΠΌΠΎ ΡΠ° ΠΏΡΠΈΠ½ΡΠΈΠΏΠΈΠΌΠ° ΠΊΠ²Π°Π½ΡΠ½Π΅
Π΄ΠΈΡΡΡΠΈΠ±ΡΡΠΈΡΠ΅ ΠΊΡΡΡΠ° Π·Π° ΠΊΠΎΠ΄ΠΈΡΠ°ΡΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ° ΠΈ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΠΌ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠΈΠΌΠ° ΠΊΠΎΡΠΈ ΡΠ΅ ΡΠ°Π²ΡΠ°ΡΡ ΠΏΡΠΈ ΡΠ΅Π³ΠΎΠ²ΠΎΡ ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΡΠΈ
Pathology of malignant breast tumors
MerfoloΕ‘ka opredelitev tumorjev dojke po naΔelih moderne kirurΕ‘ke patologije tumorja daje kliniku poleg osnovnih podatkov o naravi tumorja tudi pomembne prognostiΔne informacije. Pri karcinomu dojke so med njimi na vrhu pomembnosti: stanje aksilarnih bezgavk (pozitivne ali negativne bezgavke), stopnja malignosti tumorja, velikost tumorja, verjetno tudi histoloΕ‘ki tip. Z razvojem modernih tehnologij lahko tako patolog kot klinik uporabljata Ε‘e mnoge nove metode, s katerimi opredeljujeta tumor tudi biokemiΔno in molekularno. Zaenkrat pa vse te nove opredelitve Ε‘e ne dosegajo prognostiΔne veljave klasiΔnih morfoloΕ‘kih lastnosti. Prav zato pa mora patolog skrbno upoΕ‘tevati priporoΔila in pravila o obdelavi kirurΕ‘kega vzorca, da lahko opredeli vrsto morfoloΕ‘kih lastnosti, ki vsebujejo najveΔ napovedno veljavnih podatkov. V Δlanku govorim o osnovnih morfoloΕ‘kih metodah, o posameznih pomembnejΕ‘ih tumorjih dojke ter o nekaterih novih biokemiΔnih in molekularnih metodah v diagnostiki raka dojke.The morphological classification of breast tumors, in accordance to principlesof modern surgical pathology, provides the clinician not only with the basic data on the nature of tumor but also with important prognostic information. In the carcinoma of the breast, such information are as follows: lymph node status (positive or negative lymph nodes), grade of malignancy, size of the tumor and probably its histological type. The development of new technologies enabled the pathologist as well as the clinician to use numerous new tools and methods to determine a number of biochemical and molecular characteristics of the tumor. At this moment, however, the latter do not achieve the prognostic relevance of classical morphological features. Therefore, the pathologist should carefully folow the recommendatios and guidelines for handling and reporting surgical specimens since only by such means all morphological features giving most important prognostic information will be identified. In the article, some basic morphological methods, several important breast tumors, and a few biochemical and molecular methods in the diagnostics of breast cancer are discussed
On quantum cryptography
In the late twentieth century, human race entered the era ofinformation technology (IT). The IT industry, which deals with the production,processing, storage and transmission of information, has become an integralpart of the global economic system, a completely independent and significantsector of the economy. The dependence of the modern society on informationtechnologies is so great that omissions in information systems may lead tosignificant incidents. Telecommunications are the key information technologyindustry. However, information is very susceptible to various types of abuseduring transmission. The units for data storage and processing can bephysically protected from anyone wishing harm, but this does not hold truefor the communication lines that span hundreds or thousands of kilometersand are virtually impossible to protect. Therefore, the problem of informationprotection in the field of telecommunications is highly significant. Cryptology,particularly cryptography, deals with this issue. Quantum cryptography is arelatively new field ensuring safe communication between the sender and therecipient using the laws of quantum physics. This paper seeks to address theprinciples of the quantum distribution of a key for information encryption andthe fundamental problems arising from the execution.ΠΡΠ°ΡΠ΅ΠΌ Π΄Π²Π°Π΄Π΅ΡΠ΅ΡΠΎΠ³ Π²Π΅ΠΊΠ° ΡΠΎΠ²Π΅ΡΠ°Π½ΡΡΠ²ΠΎ je ΡΡΠ»ΠΎ Ρ Π΅ΡΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ°. ΠΠ’ ΠΈΠ½Π΄ΡΡΡΡΠΈΡΠ°, ΠΊΠΎΡΠ° ΡΠ΅ Π±Π°Π²ΠΈ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΡΠΎΠΌ, ΠΎΠ±ΡΠ°Π΄ΠΎΠΌ,ΡΠΊΠ»Π°Π΄ΠΈΡΡΠ΅ΡΠ΅ΠΌ ΠΈ ΠΏΡΠ΅Π½ΠΎΡΠΎΠΌ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ°, ΠΏΠΎΡΡΠ°Π»Π° ΡΠ΅ ΡΠ°ΡΡΠ°Π²Π½ΠΈ Π΄eΠΎ Π³Π»ΠΎΠ±Π°Π»Π½ΠΎΠ³Π΅ΠΊΠΎΠ½ΠΎΠΌΡΠΊΠΎΠ³ ΡΠΈΡΡΠ΅ΠΌΠ°, ΠΏΠΎΡΠΏΡΠ½ΠΎ Π½Π΅Π·Π°Π²ΠΈΡΠ°Π½ ΠΈ ΠΏΡΠΈΠ»ΠΈΡΠ½ΠΎ Π·Π½Π°ΡΠ°ΡΠ°Π½ ΡΠ΅ΠΊΡΠΎΡ ΠΏΡΠΈΠ²ΡeΠ΄Π΅. ΠΠ°Π²ΠΈΡΠ½ΠΎΡΡ ΡΠ°Π²ΡΠ΅ΠΌΠ΅Π½ΠΎΠ³ Π΄ΡΡΡΡΠ²Π° ΠΎΠ΄ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ° ΡΠ΅ ΡΠΎΠ»ΠΈΠΊΠΎΠ²Π΅Π»ΠΈΠΊΠ° Π΄Π° ΠΏΡΠΎΠΏΡΡΡΠΈ Ρ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΠΌ ΡΠΈΡΡΠ΅ΠΌΠΈΠΌΠ° ΠΌΠΎΠ³Ρ Π΄ΠΎΠ²Π΅ΡΡΠΈ Π΄ΠΎ Π·Π½Π°ΡΠ°ΡΠ½ΠΈΡ
ΠΈΠ½ΡΠΈΠ΄Π΅Π½Π°ΡΠ°. Π’Π΅Π»Π΅ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΡe ΡΡ ΠΊΡΡΡΠ½Π° ΠΈΠ½Π΄ΡΡΡΡΠΈΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ°. ΠΠ΅ΡΡΡΠΈΠΌ, ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ΅ ΡΡ ΡΠΎΠΊΠΎΠΌ ΡΡΠ°Π½ΡΠΏΠΎΡΡΠ° Π²Π΅ΠΎΠΌΠ° ΠΎΡΠ΅ΡΡΠΈΠ²Π΅Π½Π° ΡΠ°Π·Π½Π΅ Π²ΡΡΡΠ΅ Π·Π»ΠΎΡΠΏΠΎΡΡΠ΅Π±Π°. ΠΠ΅Π΄ΠΈΠ½ΠΈΡΠ΅ Π·Π° ΡΠΊΠ»Π°Π΄ΠΈΡΡΠ΅ΡΠ΅ ΠΈ ΠΎΠ±ΡΠ°Π΄Ρ ΠΏΠΎΠ΄Π°ΡΠ°ΠΊΠ°ΠΌΠΎΠ³Ρ Π±ΠΈΡΠΈ ΡΠΈΠ·ΠΈΡΠΊΠΈ Π·Π°ΡΡΠΈΡΠ΅Π½Π΅ ΠΎΠ΄ Π½Π΅Π΄ΠΎΠ±ΡΠΎΠ½Π°ΠΌΠ΅ΡΠ½ΠΈΡ
, ΡΡΠΎ ΡΠ΅ Π½Π΅ ΠΌΠΎΠΆΠ΅ ΡΠ΅ΡΠΈ Π·Π° ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΎΠ½Π΅ Π»ΠΈΠ½ΠΈΡΠ΅ ΠΊΠΎΡΠ΅ ΡΠ΅ ΠΏΡΠΎΡΠ΅ΠΆΡ Π½Π° ΡΡΠΎΡΠΈΠ½Π΅ ΠΈΠ»ΠΈ Ρ
ΠΈΡΠ°Π΄Π΅ ΠΊΠΈΠ»ΠΎΠΌΠ΅ΡΠ°ΡΠ° ΠΈΠΊΠΎΡΠ΅ ΡΠ΅ Π³ΠΎΡΠΎΠ²ΠΎ Π½Π΅ΠΌΠΎΠ³ΡΡΠ΅ Π·Π°ΡΡΠΈΡΠΈΡΠΈ. Π‘ΡΠΎΠ³Π° ΡΠ΅ ΠΏΡΠΎΠ±Π»Π΅ΠΌ Π·Π°ΡΡΠΈΡΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ°Ρ ΡΡΠ΅ΡΠΈ ΡΠ΅Π»Π΅ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΡΠ° Π²Π΅ΠΎΠΌΠ° Π·Π½Π°ΡΠ°ΡΠ°Π½. ΠΡΠΈΠΏΡΠΎΠ»ΠΎΠ³ΠΈΡΠ° ΠΊΠ°ΠΎ Π½Π°ΡΠΊΠ° ΠΈ ΠΏΠΎΡΠ΅Π±Π½ΠΎ ΡΠ΅Π½ Π΄Π΅ΠΎ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ° ΡΠΏΡΠ°Π²ΠΎ ΡΠ΅ Π±Π°Π²Π΅ ΠΎΠ²ΠΎΠΌ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ°ΡΠΈΠΊΠΎΠΌ. ΠΠ²Π°Π½ΡΠ½Π°ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ° ΡΠ΅ ΡΠ΅Π»Π°ΡΠΈΠ²Π½ΠΎ Π½ΠΎΠ²ΠΈΡΠ° ΠΎΠ±Π»Π°ΡΡ ΠΊΠΎΡΠ° ΡΠ΅ Π±Π°Π²ΠΈ ΠΎΠ±Π΅Π·Π±Π΅ΡΠ΅ΡΠ΅ΠΌ ΡΠΈΠ³ΡΡΠ½Π΅ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΡΠ΅ ΠΈΠ·ΠΌΠ΅ΡΡ ΠΏΠΎΡΠΈΡΠ°ΠΎΡΠ° ΠΈ ΠΏΡΠΈΠΌΠ°ΠΎΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ΅, ΠΊΠΎΡΠΈΡΡΠ΅ΡΠΈ Π·Π°ΠΊΠΎΠ½Π΅ ΠΊΠ²Π°Π½ΡΠ½Π΅ ΡΠΈΠ·ΠΈΠΊΠ΅. Π¦ΠΈΡ ΡΠ°Π΄Π° ΡΠ΅ Π΄Π° ΡΠ΅ ΡΠΏΠΎΠ·Π½Π°ΠΌΠΎ ΡΠ° ΠΏΡΠΈΠ½ΡΠΈΠΏΠΈΠΌΠ° ΠΊΠ²Π°Π½ΡΠ½Π΅Π΄ΠΈΡΡΡΠΈΠ±ΡΡΠΈΡΠ΅ ΠΊΡΡΡΠ° Π·Π° ΠΊΠΎΠ΄ΠΈΡΠ°ΡΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ° ΠΈ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΠΌ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠΈΠΌΠ° ΠΊΠΎΡΠΈ ΡΠ΅ ΡΠ°Π²ΡΠ°ΡΡ ΠΏΡΠΈ ΡΠ΅Π³ΠΎΠ²ΠΎΡ ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΡΠΈ.Serbian version: [http://cer.ihtm.bg.ac.rs/handle/123456789/3472
Comparison of 2D and 3D geotechnical analysis of reinforced concrete shafts for the mitigation of Ε mihel landslide
The thesis presents the rehabilitation of Ε mihel landslide. In the process reinforced concrete shafts\ud
were used. The mitigation was based on the numerical finite element method analysis. In the first part\ud
the landslide situation is presented along with field and laboratory tests. On the basis of SPT and\ud
laboratory tests, mechanical properties of soils are determined and used in the numerical analysis. The\ud
second part of the thesis presents the modelling and calculation of the landslide in 2D and 3D working\ud
environment. The comparison of the results shows the advantages and disadvantages of 2D and 3D\ud
analysis. The influence of the drainage on global stability and loading of the structure is also taken into\ud
consideration. Internal forces calculated with the numerical analysis are used for dimensioning of steel\ud
reinforcement in critical cross sections, which is the basis for drawing detailed reinforcement plans
Acceptability of a Multifamily Housing Construction in the Ε½-S7 Zone in the Ε½iri Municipality
The present thesis discusses the problem of a multifamily housing construction. Though a common occurence in bigger cities, in smaller rural cities only just undergoing the transformation into cities proper, multi-dwelling buildings raise the question of their acceptability. For this very reason any land development necessitates a prior integral analysis of the area. The thesis is based upon an analysis of acceptability of a multifamily housing construction in the Ε½iri municipality. The analysis reposes on various factors, namely: spatial limitations, population density, the number of inhabitants and their age structure, and others. The author of the thesis provides solutions to the question of multifamily housing construction acceptability from the aspect of the local population's lifestyle as conditioned by the type of occupation, commute time, the share of immigrants from urban and rural areas, etc. On the basis of the obtained results two verifications were performed, viz. a verification of the construction of the Ε½-S7 zone with both, family and multifamily houses, and a verification of the construction in the aforementioned zone with multifamily houses exclusively
Transient Numerical Simulation of Airflow Characteristics in the Mouth-Throat 3D Model
Air pollution is a public health problem that has a serious effect on human health, as it leads to increased morbidity and mortality. Each year, more than 3 million people die from air pollution, while many more have higher risks of stroke, heart attack, and lung diseases as a result of the pollution. The available epidemiological studies indicate that exposure to particulate matter in the air can have a toxic effect on the cardiovascular system, and increase the death risk from cardiovascular diseases such as ischemic heart disease and heart failure. In this study, we have reconstructed the upper respiratory tract model from the CT images in order to analyze airflow patterns during the inhalation part of the breathing cycle and to track NO2 particles inhaled through the mouth or nose. The numerical analysis has been performed using the computational fluid dynamics (CFD) method and the discrete particle method (DPM). The continuous phase flow was solved using the k-Ο Shear Stress Transport model with low Reynolds number corrections
- β¦