450 research outputs found

    Analiza nosača konzervatora energetskog transformatora

    Get PDF
    U ovom radu provedena je analiza nosača konzervatora energetskog transformatora s ciljem optimiranja postojećeg nosača tvrtke Končar – Energetski transformatori d.d.. Optimiranje je potrebno iz razloga što za postojeći nosač nije provedena analiza, stoga se smatra da je postojeće rješenje predimenzionirano. Prilikom proračuna primjenom nauke o čvrstoći analizirani su i optimirani slijedeći segmenti nosača konzervatora: vijčani spoj nosač – kotao, zavari i naprezanje zavara, te nosivost nosača. Nadalje primjenom metode konačnih elemenata pronađena su kritična mjesta i optimirano je rješenje istih. Nakon toga je izrađen 3D model optimiranog nosača konzervatora, te je izrađena tehnička dokumentacija sa svim detaljima potrebnim za konstruiranje istog

    Narcissistic traits and executive functions

    Get PDF
    Several personality disorders have been associated with cognitive impairment, including executive functions like working memory. Yet, it is unclear whether subclinical expression in non-clinical persons is associated with cognitive functioning. Recent studies indicate that non-clinical subjects might, in fact, perform better with increasing moderate to mild expressions of narcissistic features. We tested working memory performance in a cohort of n =70 psychiatrically and neurologically healthy subjects using Wechsler Adult Intelligence Scale (WAIS/WIE) subtests Arithmetic, Digit Span and Letter-Number Sequencing, and assessed narcissistic features using three different inventories: the widely used Narcissistic Personality Inventory (NPI), as well as two clinically used measures of narcissistic traits and states, respectively, derived from schema-focused therapy, i.e., the Young Schema Questionnaire (YSQ) entitlement/grandiosity subscale and the Schema Mode Inventory (SMI) self-aggrandizer subscale. In accordance with our hypothesis, we found nominally significant positive correlations of WIE Arithmetic performance with NPI total score (Spearman’s rho=0.208; p =0.043) and SMI self-aggrandizer scale (Spearman’s rho=0.231; p =0.027), but findings did not survive false discovery rate (FDR) adjustment for multiple comparisons (p FDR =0.189 and p FDR =0.243, respectively). While our findings add to recent studies on cognitive performance in subclinical narcissism, they fail to demonstrate an association of cognitive performance with narcissistic traits across multiple working memory tests, indicating the need for additional study, including complementary executive functions in larger cohorts and ranges of phenotype expression

    PRE-CRIME KОNCЕPТ ZАKОNА О SPRЕČАVАNјU NАSILjА U PОRОDICI - ОBАVЕZЕ DRŽАVЕ I RIZICI PО PОVRЕDU LjUDSKIH PRАVА

    Get PDF
    Lawmaker correctly identified domestic violence as a generator of numerous violations of human rights and gravely problem of our society by accepting responsibility and the obligations of the state in the private sphere. However, we can ask whether the pre-crime concept, for which lawmaker decided, is good enough, for two reasons: the inherent defects of the concept and high risk of human rights violations. Pre-crime concept is in deep contradiction with the foundations of the criminal law, which necessarily produces the implications on generally accepted understanding of justice. On the other hand, there are risks of application.56 However, pre-crime concept is nothing else but state clame for „more state“.57 Limits of state power in the fled of prevention, lie in the democratic principles of the society58. In the absence of proportionality, as one of preventive justice limits,59 Law on Domestic Violence Prevention is more like risk management document, than legal act of a democratic society. By protecting one right, Law completely neglect all other rights, abstracting from the fact that rights do not exist in vacuo, but are always in mutual interdependence.Pitаnjа nаsilја u pоrоdici su par exellance pitаnjа lјudskih prаvа. Vrеmеnоm sе mеnjаlо rаzumеvаnjе nаsilја u pоrоdici – оnо је kао fеnоmеn sfеrе privаtnоg pоstаlо fеnоmеn sfеrе јаvnоg sа јаsnоm dihоtоmnоm “privаtnо/јаvnоm” prirоdоm.2 Таkоđе, prоmеnilа sе i ulоgа držаvе u svеtlu zаštitе lјudskih prаvа – оd nеgаtivnih оbаvеzа kа pоzitivnim оbаvеzаmа; оd vеrtikаlnе оdgоvоrnоsti kа hоrizоntаlnој оdgоvоrnоsti; оd rеаgоvаnjа nа kršеnjе prаvа (ex post) kа rеаgоvаnju rаdi sprеčаvаnjа kršеnjа prаvа (ex ante). U kоnktеkstu tih prоmеnа nаsilје u pоrоdici pоstаје pravno-pоlitičkо pitаnjе sа nаglаskоm nа prеvеnciјu. Моžе sе pоstаviti pitаnjе dа li mоdеl prеvеnciјe, prihvаćеn u Zаkоnu о sprеčаvаnju nаsilја u pоrоdici u vidu „pre-crime“ kоncеptа, zаdоvоlјаvа stаndаrdе mеđunаrоdnоg prаvа lјudskih prаvа i dа li pоstоје rizici zа pоvrеdu lјudskih prаvа nаrоčitо u dеlu kојi sе tičе „mоgućеg učiоnоcа krivičnоg dеlа“ i njеgоvоg „dоvоđеnjа“ u pоliciјsku stаnicu, a nа оsnоvu prоcеnе о pоstојаnju “nеpоsrеdnе оpаsnоsti оd nаsilја u pоrоdici“

    Stratigraphy and lithology of the loess deposits in eastern Srem, Serbia

    Get PDF
    Eolian loess sediments in the eastern Srem area, the youngest Pleistocene deposits, occur either as a loess plateau, or as a slope-type of loess, formed on the slopes of the Fruška Gora mountain. Lithological, sedimentological, and mineralogical characteristics of these sediments, which were studied from several common clay deposits and boreholes, demonstrated differences between them and the underlying pre-loess sediments, and supported the stratigraphic division of the Quaternary sediments

    National report: Croatia

    Get PDF
    The chapter reports the findings of the analysis of 2019 European Parliament election campaign in Croatia

    Development and Validation of Users' Information Security Awareness Questionnaire (UISAQ)

    Get PDF
    Dosadašnja su istraživanja pokazala kako je čovjek najslabija karika u sigurnosnom sustavu te kako ne postoji pouzdan način mjerenja rizičnosti čovjekova ponašanja u vidu narušavanja sigurnosti informacijskog sustava. Cilj je istraživanja bio razviti valjan i pouzdan instrument koji će mjeriti utjecaj korisnika na sigurnost informacijskog sustava. U tu je svrhu kreiran Upitnik znanja i rizičnog ponašanja korisnika informacijskog sustava (UZPK ; Velki i Šolić, 2014 ; prema Velki, Šolić i Očević, 2014). Istraživanje je provedeno u tri vala prikupljanja podataka. Prvi se uzorak sastojao od 135 studenata druge godine preddiplomskog studija na kojem je provjerena konstruktna valjanost, pouzdanost i osjetljivost pojedinih subskala te odabrane odgovarajuće čestice. Drugi se uzorak sastojao od 211 studenata i zaposlenika, a na njemu su provjerene metrijske karakteristike poboljšanog instrumenta te je dobivena konačna verzija UZPK (k=33), koja se dijeli na dvije skale: Skala rizičnog ponašanja računalnih korisnika (k=17) [sastoji se od tri supskale: Supskala uobičajenih rizičnih ponašanja korisnika računala (k=6), Supskala održavanja osobnih računalnih sustava (k=6) i Supskala posuđivanja pristupnih podataka (k=5)] te Skala znanja o informacijskoj sigurnosti (k=16) (također se sastoji od tri supskale: Supskala stupnja sigurnosti računalne komunikacije (k=5), Supskala uvjerenja o sigurnosti računalnih podataka (k=5) i Supskala važnosti pravilne pohrane računalnih podataka (k=6). Treći se uzorak sastajao od 152 zaposlenika i na njemu je validiran UZPK. Dobivena je dobra konstruktna valjanost, sve skale i supskale imaju zadovoljavajuće metrijske karakteristike (pouzdanost i osjetljivost) te je dobivena i dobra kriterijska valjanost. Može se zaključiti kako Upitnik predstavlja valjan i pouzdan mjerni instrument, zadovoljavajućih psihometrijskih karakteristika

    Experimental Evaluation of Desktop Operating Systems Networking Performance

    Get PDF
    The rapid advancement of network, communication and Internet technology resulted with always-on, always-connected, device-independent and remote online working, business, education and entertainment environment. Consequently, users are searching for solutions and technologies that enable fast and reliable wide area network connection and the typical solution is through using personal computers connected with ethernet cable to network equipment and infrastructure that supports gigabit ethernet connection. Besides the complex network infrastructure that can influence performance, the bottleneck can also be caused by insufficient hardware, operating system and software resources on clients’ machines. Therefore, in this paper a networking performance evaluation of three globally most common and most used versions of Windows operating systems; namely Windows 7TM, Windows 8.1TM and Windows 10TM, on two identical computer systems, is conducted. Networking performance measurements are performed with three different benchmarks: namely iPerf, D-ITG and NetStress. Performance evaluation results showed that a newer versions of an operating system bring certain networking performance improvements but by sacrificing other performances

    Uticaj gustine useva na prinos i kvalitet korena sorata šećerne repe gajenih na zaraženom i nezaraženom zemljištu rizomanijom

    Get PDF
    During a two-year period (1996-1997) we conducted studies on the effects of crop density on root yield and quality of sugar beet cultivars, susceptible and tolerant to rhizomania, grown on the soil infested and uninfested by this pathogen. The results obtained are of importance for both agricultural science and practice. The highest difference in sugar beet studied characteristics was achieved between infested and uninfested soil, between tolerant and susceptible cultivars, and the lowest between crop densities. On the soil infested by rhizomania, on average, root yield was lower by 22.84 t/ha, sugar content by 2.49%, crystal sugar yield by 4.64 t/ha per cultivar and crop density. Tolerant cultivar KWS rama produced higher root and sugar yields on both infested and uninfested soil. However, susceptible cultivars Al omona and Delta, grown on uninfested soil, had higher sugar content in sugar beet root by 0.53%. Increased crop density resulted in higher root and sugar yields, however, considerably higher in the tolerant cultivar and on soil infested by rhizomania.U dvogodišnjem periodu (1996-1997) vršena su istraživanja uticaja gustine useva na prinos i kvalitet korena sorata šećerne repe, osetljivih i tolerantnih na rizomaniju, gajenih na zemljištu zaraženom i nezaraženom rizomanijom. Ogledi su izvedeni u Sremskoj Mitrovici na zemljištu tipa karbonatni černozem. U ovim istraživanjima su proučavana tri faktora i to: (A) sorta (Al omona i Delta - osetljive na rizomaniju i KWS rama tolerantna na ovu bolest); (B) zemljište (zaraženo i nezaraženo rizomanijom) i (C) gustina useva (60, 80 i 100 hiljada biljaka po hektaru). U istraživanjima su postignuti sledeći važniji rezultati: Najveći uticaj na prinos korena, sadržaj šećera i prinos kristalnog šećera ispoljilo je zemljište, odnosno prisustvo u njemu patogena rizomanije. Na ovakvom zemljištu prinos korena, osetljivih sorata (Al omona i Delta), bio je manji za 30,94 t/ha; sadržaj šećera u korenu za 3,31% a prinos kristalnog šećera za 6,07 t/ha. Tolerantna sorta KWS rama postigla je veći prinos korena i šećera kako na zaraženom tako i nezaraženom zemljištu. Međutim, osetljive sorte Al omona i Delta imale su za 0.53% veći sadržaj šećera u korenu repe gajene na nezaraženom zemljištu. Sa povećanjem gustine useva povećan je prinos i korena i šećera, ali znatno vise kod tolerantne sorte kao i na zemljištu zaraženom rizomanijom

    EVROPSKI STANDARDI U OBLASTI PRAVOSUĐA

    Get PDF
    Article intends to address question if there are European standards in the area of judiciary, mechanism of their development and influence on national judicial systems. Subsection is dedicated to topics that are covered by European standards, as well as to indicators used to evaluate achievements of standards. This issue is especially important in the process of European integration of Republic of Serbia and monitoring of progress to achieve. Article analyses standards of independence, impartiality and integrity, as well as standard of efficiency.Autorke u radu nastoje da odgovore na pitanje da li postoje evropski standardi u oblasti pravosuđa, mehanizam njihovag nastanka i uticaja na nacionalne pravosudne sisteme. Poseban deo posvećen je temama koje obuhvataju navedeni standardi, kao i indikatorima na osnovu kojih se procenjuje ostvarenost standarda. Ovo pitanje posebno dobija na značaju u procesu evropskih integracija Republike Srbije i praćenja ostvarenosti napretka u usaglašavanju sa evropskim standardima. U radu su posebno analizirani standardi nezavisnosti, nepristrasnosti i integriteta, kao i standardi efkasnosti

    Decision support based on the risk assessment of information systems and Bayesian learning

    Get PDF
    Procjena rizika je tema kojom se bave kompanije iz širokog spektra djelatnosti i na temelju iste donose važne odluke za buduće poslovanje. Vrlo je važno strateški se opredijeliti i odabrati ključne odluke i unutar sustava upravljanja informacijskim sustavima. Različiti rizici koji proizlaze iz prijetnji i ranjivosti računalne opreme, osoblja koje je zaduženo za upravljanje tom opremom i sustavima za koje je informacijska tehnologija podrška, ugrožavaju temeljni cilj informacijskih sustava, da rade efektivno i efikasno. Procjena rizika informacijskih sustava temelji se na identificiranju prijetnji i ranjivosti, te određivanju vjerojatnosti njihovih ostvarenja, a time i vjerojatnost ostvarenja rizika. U trenutku kada je vjerojatnost događaja opisanog indikatorima koji ga mogu prouzročiti poznata, može se raspravljati i o matematičkim modelima pomoću kojih je moguće izračunati vjerojatnost događaja u budućnosti. Ako je pored procjena, poznata i statistička analiza u obliku zapisa stvarnih događaja, tada je statistički model moguće razviti u ozbiljan alat za podršku odlučivanju prilikom upravljanja informacijskim sustavima. U radu je prikazan model koji objedinjuje procjenu rizika informacijskih sustava i Bayesovu teoriju odlučivanja.Risk protection has long been one of the main tasks of companies in a wide scope of business. From extensive range of risks the cyber-risks highlight as one of the most important. Cyber-risks are generated from hackers, malicious software, disgruntled employees, competitors, and many other sources both internal and external. Internal and external attacks on corporate assets and rapidly growing technology forced corporate management to conduct more appropriate awareness of the information security risks to information assets. The information security risk assessment, when performed correctly, can give corporate managers the information they need in order to understand and control the risks to their assets. The risks are in much more detail analysed in economic sectors, but in recent years there is increasing of risk assessment practice in the world of information technology. The model presented in this paper integrates the management and analysis of information risks and decision-making theory and thus creates a framework for the integrated management information system based on the technological risk assessment and Bayesian learning. The paper shows simulation and two case study scenarios in which is presented a potentially wide range of usage
    corecore