Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 24
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Parasitosis in horses may be uncontrolled and expose breeders and owners to serious financial losses or, possibly, to the loss of animals. Therefore, the prevention and monitoring of the development of parasitic diseases should play an important role in the breeding process. The aim of this study was to confirm the influence of factors such as age, breed, herd size, deworming program, and type of anthelmintics, on the prevalence and intensity of parasites (helminths) in domestic horses in Lower Silesia. The study was carried out between August and November of 2020. The samples of horse feces were collected from 50 different stables in the area of Lower Silesia, Poland. A total of 286 individuals from various breeds were examined. Detailed analysis revealed that the mean age of infected horses was significantly lower than in uninfected horses. The mean time since the last deworming procedure was almost twice as low in uninfected horses than in infected ones. Additionally, the deworming agent affects the prevalence of infection. The analysis was also performed for the same factors in reference to quantitative data. The mean EPG was four-fold higher in juvenile horses than in adults and three-fold higher when the horses were dewormed with the use of fenbendazole instead of ivermectin or ivermectin with praziquantel combined.
Go to article

Bibliography


  1. Francisco I, Arias M, Cortinas FJ, Francisco R, Mochales E, Dacal V, Suárez JL, Uriarte J, Morrondo P, Sánchez-Andrade R, Díez-Banos P, Paz-Silva A (2009) Intrinsic factors influencing the infection by helminth parasites in horses under an oceanic climate area (NW Spain). J Parasitol Res 2009: 616173.
  2. Gawor J (1995) The prevalence and abundance of internal parasites in working horses autopsied in Poland. Vet Parasitol 58: 99-108.
  3. Gawor J, Kornaś S, Kharchenko V, Nowosad B, Skalska M (2006) Intestinal parasites and health problems in horses in different breeding systems (in Polish). Med Weter 62: 331-334.
  4. Kaplan RM (2002) Anthelmintic resistance in nematodes of horses. Vet Res 33: 491-507.
  5. Kaplan RM, Nielsen MK (2010) An evidence-based approach to equine parasite control: it ain’t the 60s anymore. Equine Vet Educ 22: 306-316.
  6. Kaplan RM, Vidyashankar AN (2012) An inconvenient truth: global worming and anthelmintic resistance. Vet Parasitol 186: 70-78.
  7. Kornaś S, Nowosad B, Skalska M (2004) Intestinal parasite infections in horses from different types of environments (in Polish). Med Weter 60: 853-856.
  8. Kornaś S, Cabaret J, Skalska M, Nowosad B (2010). Horse infection with intestinal helminths in relation to age, sex, access to grass and farm system. Vet Parasitol 174: 285-291.
  9. Kuzmina T, Kornaś S, Basiaga M, Kharchenko V, Vyniarska A (2011) Biodiversity of strongylids (Nematoda: Strongylidae) communities in domestic horses from Poland and Ukraine. Helminthologia 48: 77-84.
  10. Kuzmina TA. Dzeverin I, Kharchenko VA (2016) Strongylids in domestic horses: Influence of horse age, breed and deworming programs on the strongyle parasite community. Vet Parasitol 227: 56-63.
  11. Kuzmina TA, Kharchenko VO (2008) Anthelmintic resistance in cyathostomins of brood horses in Ukraine and influence of anthelmintic treatments on strongylid community structure. Vet Parasitol 154: 277-288.
  12. Lichtenfels JR, Kharchenko VA, Dvojnos GM. (2008) Illustrated identification keys to strongylid parasites (Strongylidae: Nematoda) of horses, zebras and asses (Equidae). Vet Parasitol 156: 4-161.
  13. Love S, Murphy D, Mellor D (1999) Pathogenicity of cyathostome infection. Vet Parasitol 85: 113-121.
  14. Lyons ET, Tolliver SC, Drudge JH (1999) Historical perspective of cyathostomes: prevalence, treatment and control programs. Vet Parasitol 85: 97-112.
  15. Martin F, Svansson V, Eydal M, Oddsdóttir C, Ernback M, Persson I, Tydén E (2021) First report of resistance to ivermectin in Parascaris univalens in Iceland. J Parasitol 107: 16-22.
  16. Osterman Lind E, Hoglund J, Ljungstrom BL, Nilson O, Uggla A (1999) A field survey on the distribution of strongyle infections of horses in Sweden and factors affecting faecal egg counts. Equine Vet J 31: 68-72.
  17. Petney TN, Andrews RM (1998) Multiparasite communities in animals and humans: frequency: structure and pathogenic significance. Int J Parasitol 28: 377-393.
  18. Roepstorff A, Nansen P (1998) Epidemiology, diagnosis and control of helminth parasites of swine. FAO Animal health manual. Food and Agriculture Organization of the United Nations, Rome, p 161.
  19. Saeed K, Qadir Z, Ashraf K, Ahmad N (2010) Role of intrinsic and extrinsic epidemiological factors on strongylosis in horses. J Anim Plant Sci 20: 277-280.
  20. Sallé G, Kornaś S, Basiaga M (2018) Equine strongyle communities are constrained by horse sex and species dipersal-fecundity trade-off. Parasit Vectors 11: 279.
  21. Selzer PM, Epe C (2021) Antiparasitics in animal health: Quo Vadis? Trends Parasitol 37(1): 77-89.
  22. Slivinska K, Kharchenko V, Wroblewski Z, Gawor J, Kuzmina T (2016) Parasitological survey of Polish primitive horses (Equus caballus gmelini Ant.): influence of age, sex and management strategies on the parasite community. Helminthologia 53: 233-242.
  23. Studzińska MB, Demkowska-Kutrzepa M, Bogucki J, Roczeń-Karczmarz M, Tomczuk K (2017) Influence of horse management systems in south-western Poland on the prevalence and intensity of gastrointestinal parasites (in Polish). Med Weter 73: 721-725.
  24. Vadlejch J, Petrtýl M, Zaichenko I, Čadková Z, Jankovská I, Langrová I, Moravec M (2011) Which McMaster egg counting technique is the most reliable. Parasitol Res 109: 1387-1394.
  25. Zak A, Siwinska N, Slowikowska M, Borowicz H, Kubiak K, Hildebrand J, Popiolek M, Niedzwiedz A (2017) Searching for ivermectin resistance in a Strongylidae population of horses stabled in Poland. BMC Vet Res 13: 210.
  26. Zeileis A, Kleiber C, Jackman S (2008) Regression Models for Count Data in R. J Stat Soft 27: 1-25.
Go to article

Authors and Affiliations

W. Hildebrand
1
P. Zielińska
2
J. Hildebrand
3
G. Zaleśny
4

  1. Hirszfeld Institute of Immunology and Experimental Therapy, Polish Academy of Sciences, Rudolfa Weigla 12, 53-114 Wroclaw, Poland
  2. Department of Surgery, Faculty of Veterinary Medicine, Wroclaw University of Environmental and Life Sciences, Plac Grunwaldzki 51, 50-366 Wroclaw, Poland
  3. Department of Parasitology, Faculty of Biological Sciences, University of Wrocław, Przybyszewskiego 63, Wrocław, 51-148, Poland
  4. Department of Invertebrate Systematics and Ecology, Institute of Environmental Biology, Wroclaw University of Environmental and Life Sciences, Kożuchowska 5B, 51-631 Wroclaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

In this paper we propose right-angled Artin groups as a platform for secret sharing schemes based on the efficiency (linear time) of the word problem. Inspired by previous work of Grigoriev-Shpilrain in the context of graphs, we define two new problems: Subgroup Isomorphism Problem and Group Homomorphism Problem. Based on them, we also propose two new authentication schemes. For right-angled Artin groups, the Group Homomorphism and Graph Homomorphism problems are equivalent, and the later is known to be NP-complete. In the case of the Subgroup Isomorphism problem, we bring some results due to Bridson who shows there are right-angled Artin groups in which this problem is unsolvable.

Go to article

Authors and Affiliations

Ramón Flores
Delaram Kahrobaei
Download PDF Download RIS Download Bibtex

Abstract

We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed.
Go to article

Bibliography

[1] A. Boldyreva, ”Threshold signatures, multi-signatures and blind signatures based on the Gap Diffie-Hellman Group signature scheme”, LNCS, vol. 2567, pp. 31-44, 2003.
[2] D. Boneh, C. Gentry, H. Shacham, B. Lynn, ”Short signatures from the Weil pairing”, Journal of Cryptology, vol. 17, no. 4, pp. 297-319, 2004.
[3] D. Boneh, C. Gentry, H. Shacham, B. Lynn, ”Aggregate and verifiably encrypted signatures from bilinear pairing”, Proceedings of Eurocrypt 2003, LNCS 2656, pp. 416-432, 2003.
[4] Y. Desmedt, ”Society and group oriented cryptography”, Crypto 87, pp. 120-127, 1987.
[5] Y. Desmedt, Y. Frankel, ”Threshold cryptosystems”, LNCS, vol. 718, pp. 1-14, 1993.
[6] D. E. Kouicem, A. Bouabdallah, H. Lakhlef, ”Internet of things security: A top-down survey”, 2018
[7] W. Gao, G. Wang, X. Wang, Z. Yang, ”One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings”, Informatica, Vol. 20, No. 4, pp. 461-476, 2009.
[8] K. Itakura, K. Nakamura, ”A public key cryptosystem suitable for digital multisignatures”, NEC Research and Development, pp. 1-8, vol. 71, 1983.
[9] A. Joux, ”A one-round protocol for tripartite Diffie-Hellman”, Journal of Cryptology, vol. 17, no. 4, pp. 263-276, 2004.
[10] S. Kim, S. Park, D. Won, ”Proxy signatures, revisited”, LNCS, vol. 1334, pp. 223-232, 1997.
[11] A. Lysyanskaya, ”Unique signatures and verifiable random functions from the DH-DDH separation”, Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, pp. 597-612, 2002.
[12] M. Mambo, K. Usuda, E. Okamoto, ”Proxy signatures for delegating signing operation”, ACM Conference on Computer and Communications Security, pp. 48-57, 1996.
[13] A. Manzoor, M. Liyanagey, A. Braekenz, S. Kanherex, M. Ylianttila, ”Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing”, 2018.
[14] B.C. Neuman, ”Proxy-based authorization and accounting for distributed systems”, Proceedings of the 13th International Conference on Distributed Computing Systems, pp. 283-291, 1993.
[15] K.G. Paterson, ”ID-based signatures from pairings on elliptic curves”, Journals and Magazines, Electronics Letters, Volume: 38 Issue: 18, pp. 1025 - 1026, 2002.
[16] J. Pomykała and T Warchoł, ”Threshold signatures in dynamic groups”, Proceedings of Future Generation Communication and Networking, IEEE Computer Science, pp. 32-37, 2007.
[17] J. Pomykała, B. ´ Zrałek, ”A model of ID-based proxy signature scheme”, Proc. of 6-th Collecter Iberoamerica, pp. 1-8, 2008.
[18] A. Shamir, ”How to share a secret”, Communications of the ACM, 22:612-613, 1979.
[19] N. Suryadevara and S. Mukhopadhyay, ”Internet of things: A review and future perspective” Reliance, 2018.
[20] R. Taylor, D. Baron, and D. Schmidt, ”The world in 2025-predictions for the next ten years”, Microsystems, Packaging, Assembly and Circuits Technology Conference (IMPACT), 2015 10th International. IEEE, pp. 192–195, 2015.
[21] V. Varadharajan, P. Allen, S. Black, ”An analysis of the proxy problem in distributed systems”, Proc. IEEE Computer Society Symposium on Research in Security and Privacy, pp. 255-275, 1991.
[22] H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, and J. Kishigami, ”Blockchain contract: Securing a blockchain applied to smart contracts”, Consumer Electronics (ICCE), 2016 IEEE International Conference on. IEEE, pp. 467–468, 2016.
[23] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, ”An overview of blockchain technology: Architecture, consensus, and future trends”, Big Data (BigData Congress), 2017 IEEE International Congress IEEE, pp. 557–564, 2017.
Go to article

Authors and Affiliations

Jacek Pomykała
1
Henryk Kułakowski
1
Piotr Sapiecha
2
Błażej Grela
1

  1. Warsaw University of Technology, Poland
  2. National Institute of Telecommunications in Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The concept of a hybrid scheme with connection of SIDH and ECDH is nowadays very popular. In hardware implementations it is convenient to use a classical key exchange algorithm, which is based on the same finite field as SIDH. Most frequently used hybrid scheme is SIDH-ECDH. On the other hand, using the same field as in SIDH, one can construct schemes over Fpn, like Diffie-Hellman or XTR scheme, whose security is based on the discrete logarithm problem. In this paper, idea of such schemes will be presented. The security of schemes, which are based on the discrete logarithm problem over fields Fp; Fp2 ; Fp4 ; Fp6 and Fp8 , for primes p used in SIDH, will be analyzed. At the end, the propositions of practical applications of these schemes will be presented.

Go to article

Authors and Affiliations

Michał Wroński
Elżbieta Burek
Łukasz Dzierzkowski
Download PDF Download RIS Download Bibtex

Abstract

The successful application of a multi-clusteringbased neighborhood approach to recommender systems has led to increased recommendation accuracy and the elimination of divergence related to differences in clustering methods traditionally used. The Multi-Clustering Collaborative Filtering algorithm was developed to achieve this, as described in the author’s previous papers. However, utilizing multiple clusters poses challenges regarding memory consumption and scalability. Not all partitionings are equally advantageous, making selecting clusters for the recommender system’s input crucial without compromising recommendation accuracy. This article presents a solution for selecting clustering schemes based on internal indices evaluation. This method can be employed for preparing input data in collaborative filtering recommender systems. The study’s results confirm the positive impact of scheme selection on the overall recommendation performance, as it typically improves after the selection process. Furthermore, a smaller number of clustering schemes used as input for the recommender system enhances scalability and reduces memory consumption. The findings are compared with baseline recommenders’ outcomes to validate the effectiveness of the proposed approach.
Go to article

Authors and Affiliations

Urszula Kużelewska
1

  1. Faculty of Computer Science, Bialystok Uni-versity of Technology, Wiejska 45a, 15-351 Bialystok, Poland
Download PDF Download RIS Download Bibtex

Abstract

The article is devoted to research into the systematization of the structural and semantic types of partially phraseologized sentences. Partially phraseologized sentences have been ascertained to have their functional and communicative purpose in language and speech. The formal and semantic principles of the typology of partially phraseologized sentences have been determined. Structural typologies of partially phraseologized sentences are based on quantitative and morphological criteria. Analyzed have been the structural types of partly phraseologized sentences. Partially phraseologized sentences are formed by two‑, three‑, four‑, and five‑part phrase‑complexes. The semantic types of partially phraseologized sentences are based on the type of syntactic relations between their two parts, depending on which we can single out: 1) sentences with temporal relations; 2) sentences with relations of generalized condition; 3) sentences with explanatory relations; 4) sentences with applicative relations.
Go to article

Authors and Affiliations

Mariia Lychuk
1
ORCID: ORCID

  1. Kyiv, National University of Life and Environmental Sciences of Ukraine
Download PDF Download RIS Download Bibtex

Abstract

Assumptions of the major political and legal documents of the European Union, dedicated to energy efficiency and energy performance of buildings provide the Member States with relevant instruments supporting improvement of the ambient air qualityby dissemination of measures reducing energy demand and promotion of renewable energysources. Mainstreaming EU legislation into national regulations constitutes initial stage of the long term process of supporting implementation of energy efficiency measures. Experience in the improvement of energy performance of the residential buildings revealslimited efficiency of the measures implemented up to date, which results in significantair pollution of Polish cities. The national Action Plans had adopted a limited scope of recommendations included in the EU directives, hence the process meets significant challenges.The article describes adaptation of the relevant EU directives as well as the National Urban Policy in terms of the potential to effectively address faced challenges.

Go to article

Authors and Affiliations

Marcin Włodarski
Download PDF Download RIS Download Bibtex

Abstract

In early 2021, over 5 million European Union (EU) citizens had applied for settled status to secure their right to continue to live, work and study in the United Kingdom (UK) after the country’s withdrawal from the EU (Brexit). In 2018, the Home Office launched a Statement of Intent to implement an application process for EU citizens through its EU Settlement Scheme. In the period leading up to Brexit, the UK gov-ernment assured EU migrants that their existing rights under EU law would remain essentially un-changed and that applying for settled status would be smooth, transparent and simple. However, the application process has resulted in some long-term residents failing to obtain settled status, despite providing the required information. Based on qualitative in-depth interviews with 20 EU migrants living in two major metropolitan areas in Northern England, this article discusses the significant barriers which EU citizens face in the application process. This situation particularly affects the most vulnerable EU mi-grants with limited English-language skills and/or low literacy levels as well as those who are digitally excluded. The study contributes to the growing body of research on the consequences of Brexit for vulner-able EU migrants in the UK, focusing specifically on Central and Eastern European migrants.
Go to article

Authors and Affiliations

Sanna Elfving
1
ORCID: ORCID
Aleksandra Marcinkowska
1
ORCID: ORCID

  1. University of Bradford, the UK
Download PDF Download RIS Download Bibtex

Abstract

The objective of this study is to examine the implementation of a combined scheme involving payment environment services (PES) and non-payment environment services (non-PES) in the management of the Cidanau River Basin. This study used exploratory research to analyse the structure and mechanism of PES and non-PES schemes for the governance system. The Cidanau Watershed governance is a pioneer in sustainable integrated water resources management in Indonesia and has persisted until the present time. The governance of the Cidanau Watershed is dynamic, resilient, and evolving in response to various changes in social and ecological systems. A bridging organisation like the Cidanau Watershed Communication Forum (Ind.: Forum Komunikasi DAS Cidanau – FKDC) requires legal standing to be visible and gain the trust of the public, especially when implementing a PES approach like the Cidanau River Basin, where service buyers utilise non-direct payment mechanisms. The challenging aspect of developing a PES scheme is empowering knowledge regarding the importance of soil and water preservation among upstream communities, particularly in developing countries like Indonesia, where upstream communities are predominantly composed of low-income farmers whose livelihoods depend on nature. The non-PES scheme represents the government’s mandatory responsibility, whereas the PES scheme presents public participation in active collaboration through the FKDC as an ad hoc institution. A combination of the non-PES and PES scheme approach can serve as a model and reference for similar river basin governance frameworks. Further research is needed regarding social networks and institutional development of sustainable watershed governance in the Cidanau River Basin.
Go to article

Authors and Affiliations

Muh. S. Budiarto
1 3
ORCID: ORCID
Ida Widianingsih
2
ORCID: ORCID
Entang A. Muhtar
1
ORCID: ORCID
Raden A. Buchari
2
ORCID: ORCID
Herie Saksono
4
ORCID: ORCID

  1. Universitas Padjadjaran, Faculty of Social and Political Sciences, Jl. Bukit Dago Utara No. 25, 40135, Bandung, Indonesia
  2. Universitas Padjadjaran, Faculty of Social and Political Sciences, Center for Decentralisation and Participatory Development Research, Bandung, Indonesia
  3. Regional Development Planning Agency, Jl. Syeh Nawawi Al Banteni No. 1, 42171, Serang City, Indonesia
  4. National Research and Innovation Agency, Jakarta, Indonesia
Download PDF Download RIS Download Bibtex

Abstract

Multicarrier modulation (MCM) based schemes have been a major contributing factor in revolutionizing cellular networks due to their ability to overcome fading. One of the popular scheme orthogonal frequency division multiple access (OFDMA), having been part of 4G, is also adapted as part of 5G enhanced mobile broadband (eMBB). Though it has several advantages, spectral efficiency (SE) and peak to average power ratio (PAPR) have been two major concerns which have attracted lot of attention resulting in proposals of several other MCM schemes. But most of these studies have treated the two issues independently. This paper in particular studies the subcarrier filtering approach to improve the spectral efficiency of MCM scheme and its impact on the overall PAPR of such schemes. The analysis shows that the PAPR improvement is also achieved by such filters meant for spectral confinement and the simulation results validate the same provoking.
Go to article

Authors and Affiliations

Kiran V. Shanbhag
1
Dayakshini Sathish
2

  1. Dept. of ECE, Anjuman Institute of Technology and Management, Bhatkal and Visvesvaraya Technological University, India
  2. Dept. of ECE, St Joseph Engineering Collegee, Mangaluru and Visvesvaraya Technological University, India
Download PDF Download RIS Download Bibtex

Abstract

In this paper we present a family of transforms that map existentially unforgeable signature schemes to signature schemes being strongly unforgeable. In spite of rising security, the transforms let us make a signature on a union of messages at once. The number of elements in this union depends on the signing algorithm of a scheme being transformed. In addition to that we define an existentially unforgeable signature scheme based on pairings, which satisfies all assumptions of the first part and is able to be subjected to transformation.

Go to article

Authors and Affiliations

Mariusz Jurkiewicz
Download PDF Download RIS Download Bibtex

Abstract

The basic characteristics of debris flows in the Shiwei river basin are summarized through the field investigation on debris flows in the Shiwei river basin and analysis on formation conditions of debris flows from three aspects, i.e. geological environment, geological structure and neotectonic movement, as well as seismic action. Based on this, the stability of landslide in the Shiwei river basin is analyzed and calculated, and the stability coefficient of landslide is obtained. The debris flows in the Shiwei river basin will directly damage and threaten the county town, while other geological disasters such as landslide, collapse, slope sliding & collapse and potentially unstable slopes will indirectly damage and threaten the county town. The landslide form is clear, and the landslide stability calculation shows that the landslide body is generally stable – basically stable, but partially unstable – less stable. The “blocking + discharging” comprehensive control scheme is proposed according to the formation conditions and development characteristics of debris flows in the Shiwei river basin, and the study findings can be used as a reference for similar projects.
Go to article

Authors and Affiliations

Hanhui Wu
1
ORCID: ORCID

  1. Civil Engineering, School of Civil Engineering, Chongqing Chemical Industry Vocational College, 400020 Chongqing, China
Download PDF Download RIS Download Bibtex

Abstract

Due to space limitations during installation, reducing low-frequency noise has always been a challenging area. Sub-wavelength structures are typically favored in such scenarios for noise reduction. This paper explores the potential of micro-slit panels (MSP) for low-frequency sound absorption. To further optimize the panel thickness, coupled MSPs (CMSP) with a distance between two MSPs of less than 1 mm are proposed. Firstly, the low-frequency absorption performances of a single MSP based on two optimized schemes – the cavity-depth optimal scheme (COS) and the panel thickness optimal scheme (TOS) – are examined and compared with those of existing ultrathin metamaterials. The results demonstrate that MSP has significant potential for low frequency sound absorption, and COS allows for a smaller overall structural thickness but a larger panel thickness than TOS. Secondly, to reduce the panel thickness, the CMSP is developed and the theoretical model of its acoustic impedance is established and validated by experiments. Then, based on the theoretical model, the low-frequency absorption potential of CMSP is optimized using COS. The results show that both the overall thickness and the panel thickness of the CMSP absorber are reduced while maintaining better performance. Furthermore, the proposed absorber achieves a subwavelength scale since its total thickness can be as small as 0.138λ.
Go to article

Authors and Affiliations

Yujie Qian
1
Zhengyuan Gao
1
Jie Zhang
1

  1. College of Information Science and Engineering, Hohai University Changzhou, China
Download PDF Download RIS Download Bibtex

Abstract

The aim of this paper is to discuss selected formal and pragmatic aspects of the Austro-Hungarian military name policy in the last quarter of the 19th and in the early 20th century. In the introductory section the proprial status of the names of military units (which constitute a part of military chrematonymy) is discussed. An attempt is made to outline the location of these names on the classificatory map of chrematonomastics as well. A brief discussion of the historical and terminological background of the Austro-Hungarian military unit names follows. The most important concepts of the theory of name and naming policy are outlined. The presentation of the analysed onymic material covers unit names included in the officer lists (Schematismen) of the Austro-Hungarian forces as well as names present in the paper seals (Verschlussmarken). On the basis of the material, polymorphism of the discussed names is shown in the sense that obligatory and facultative elements of the names may appear in different ways and within various syntactic name models, depending on the context (including continuous text within which a name is used). Two main syntactic models of the discussed names are proposed. The orthographic and syntactic rules of unit numbering and the ways of embedding geographical names and names of patrons and honorary regiment owners (Inhaber) into unit names are outlined. The meaning and spelling of the expressions imperial-royal (k.k. = kaiserlich-königlich) and imperial and royal (k.u.k. = kaiserlich und königlich) are explained.

Go to article

Authors and Affiliations

Wojciech Włoskowicz
Download PDF Download RIS Download Bibtex

Abstract

Strip backfilling mining technology is of great significance for eliminating coal gangue, improving coal recovery rate, harmonizing the development between resources and environment in diggings. This paper firstly analyzed the roof control mechanism, the deformation and failure mechanism and characteristics of the filling body through theoretical analysis. Then, through numerical simulation combined with the geological conditions on site, a gangue strip filling scheme was designed for the 61303 working face of the 13th layer of the rear group coal of the Wennan Coal Mine in Shandong Province, and the filling scheme of filling 50 m and leaving 25 m was determined. Finally, an on-site engineering test was carried out on the 61303 working face. Through the analysis of the measured data of “three quantities” after the filling test, it can be seen that the test has achieved a good engineering application effect and verified the rationality of the filling scheme design. It solves the coal gangue problem, improves the resource recovery rate, and provides a reference for other similar mines.
Go to article

Bibliography

[1] E.H. Bai, W.B. Guo, Y. Tan, et al., Green coordination mining technology of “retaining and filling road filling method”. Journal of China Coal Society 43 (S1), 21-27 (2018).
[2] D .A. Landriault, R.E. Brown, D.B. Counter, Paste backfill study for deep mining at kidd creek. CIM Bulletin 93 (1036), 156-161 (2000).
[3] J.L. Xu, Q. You, W.B. Zhu, et al., Theoretical study on mining subsidence by strip filling. Journal of China Coal Society 02, 119-122 (2007).
[4] J. Palarski, The experimental and practical results of appling backfill. Innovations in Montreal, 33-37 (1989).
[5] J.L. Xu, W.B. Zhu, X.S. Li, et al., Study on partial filling mining technology for controlling coal mining subsidence. Journal of Mining and Safety Engineering (01), 6-11 (2006).
[6] Y .L. Tan, X.S. Liu, J.G. Ning, et al., In situ investigations on failure evolution of overlying strata induced by mining multiple coal seams [J]. Geotechnical Testing Journal 40 (2), 244-257 (2017).
[7] Y .C. Yin, T.B. Zhao, Y.B. Zhang, et al., An Innovative Method for Placement of Gangue Backfilling Material in Steep Underground Coal Mines [J]. Minerals 9, 107 (2019).
[8] G .C. Zhang, S.J. Liang, Y.L. Tan, et al., Numerical modeling for longwall pillar design: A case study from a typical longwall panel in China [J]. Journal of Geophysics and Engineering 15 (1), 121-134 (2018).
[9] J. Trckova, J. Sperl, Reduction of surface subsidence risk by fly ash exploitation as filling material in deep mining areas. Natural Hazards 53 (2), 251-258 (2010).
[10] J.R. Liu, W.P. Huang, Z.P. Guo, et al., Pumping cemented coal gangue strip filling system in goaf and its application. Coal Technology 35 (12), 16-18 (2016).
[11] W.Y. Guo, Y.L. Tan, F.H. Yu, et al., Mechanical behavior of rock-coal-rock specimens with different coal thicknesses [J]. Geomechanics and Engineering 15 (4), 1017-1027 (2018).
[12] X.S. Liu, Y.L. Tan, J.G. Ning, et al., Mechanical properties and damage constitutive model of coal in coal-rock combined body [J]. International Journal of Rock Mechanics and Mining Sciences 110, 140-150 (2018).
[13] K. Zhong, Research on filling mining technology and parameters of Fuyang Coal Mine. Xi’an University of Science and Technology (2018).
[14] W.P. Huang, C. Li, L.W. Zhang, et al., In situ identification of water-permeable fractured zone in overlying composite strata [J]. International Journal of Rock Mechanics and Mining Sciences 105, 85-97 (2018).
[15] Y .L. Tan, Q.H. Gu, J.G. Ning, et al., Uniaxial compression behavior of cement mortar and its damage-constitutive model based on energy theory [J]. Materials 12, 1309 (2019). DOI: https://doi.org/10.3390/ma12081309
[16] J. Wang, J.G. Ning, J.Q. Jiang, et al., Structural characteristics of strata overlying of a fully mechanized longwall face: a case study [J], Journal of the Southern African Institute of Mining and Metallurgy 118, 1195-1204 (2018).
[17] Q. Yao, Study on segmental filling of fully mechanized mining in steeply inclined coal seam and its rock stratum control. Hunan University of Science and Technology, (2017).
[18] W.P. Huang, Q. Yuan, Y.L. Tan, et al., An innovative support technology employing a concrete-filled steel tubular structure for a 1000-m-deep roadway in a high in situ stress field [J]. Tunnelling and Underground Space Technology 73, 26-36 (2018).
[19] J.G. Ning, J. Wang, J.Q. Jiang, et al., Estimation of crack initiation and propagation thresholds of confined brittle coal specimens based on energy dissipation theory [J]. Rock Mechanics and Rock Engineering 51, 119-134 (2018).
[20] J.W. Bai, R.T. Liu, Y.J. Jiang, et al., The deformation of surrounding rock and the regulation law of confined water in strip filling and displacement mining. Journal of Mining and Safety Engineering 35 (02), 35-42 (2018).
[21] X.K. Sun, W. Wang, Theoretical study on high-water materials filling and replacement mining pressure-bearing water strip coal pillars. Journal of China Coal Society 36 (06), 909-913 (2011).
[22] T.B. Zhao, W.Y. Guo, Y.L. Tan, Y.C. et al., Case studies of rock bursts under complicated geological conditions during multi-seam mining at a depth of 800m [J]. Rock Mechanics and Rock Engineering 51, 1539-1564 (2018).
[23] X.J. Deng, Research on the control mechanism of overlying strata movement in the thick-layered longwall roadway cementing filling in extra-thick coal seams. China University of Mining and Technology, (2017).
[24] B . Lu, X.G. Zhang, F. Li, et al., Technology and application of cement-filled mining with short-walled gangue. Journal of China Coal Society 42 (S1), 7-15 (2017).
[25] H. Wadi, S. Amziane, E. Toussaint, et al., Lateral load-carrying capacity of hemp concrete as a natural infill material in timber frame walls. Engineering Structures 180 (2019).
[26] Jiang Bang-you, Gu Shi-tan, Wang Lian-guo, et al., Strainburst process of marble in tunnel-excavation-induced stress path considering intermediate principal stress [J]. Journal of Central South University 26 (4), 984-999 (2019).
[27] W.P. Huang, W.B. Xing, S.J. Chen, et al., Experimental study on sedimentary rock’s dynamic characteristics under creep state using a new type of testing equipment [J]. Advances in Materials Science and Engineering (2017).
[28] G .Z. Lu, J.Q. Tang, Z.Q. Song, Analysis of the difference between the periodic step and the periodic step of the transfer rock beam. Chinese Journal of Geotechnical Engineering 32 (04), 538-54 1(2010).
[29] Z.P. Guo, W.P. Huang, Parameter optimization and stability analysis of sloping strip filling. Journal of China Coal Society 36 (02), 234-238 (2011).
[30] D .W. Yin, S.J. Chen, X.Q. Liu, et al., Effect of joint angle in coal on failure mechanical behavior of roof rock-coal combined body. Q. J. Eng. Geol. Hydroge. 51 (2), 202-209 (2018).
Go to article

Authors and Affiliations

Wenbin Xing
1
ORCID: ORCID
Wanpeng Huang
1
ORCID: ORCID
Fan Feng
1
ORCID: ORCID

  1. Shandong University of Science and Technology, China
Download PDF Download RIS Download Bibtex

Abstract

Commutation reactance is an important component in the voltage-source converter- based high-voltage direct current (VSC–HVDC) transmission system. Due to its connection to the converter, when there is a fault occurring on the valve-side bushing of a converter transformer, the nonlinearity operation of the converter complicates the characteristics of current flowing through commutation reactance, which may lead to maloperation of its overcurrent protection. It is of great significance to study the performance of commutation reactance overcurrent protection under this fault condition and propose corresponding improvement measures to ensure the safe and stable operation of AC and DC systems. In the VSC–HVDC system with the pseudo-bipolar structure of a three-phase two-level voltage source converter, the valve has six working periods in a power frequency cycle, and each period is divided into five working states. According to the difference between the fault phase and non-fault phase of the conductive bridge arms at the time of fault occurrence, these five working states are merged into two categories. On this basis, various faults of the valve-side bushing of a converter transformer are analyzed, and the conclusion is drawn that the asymmetric fault of valve-side bushing can lead to the maloperation of the commutation reactance overcurrent protection. Based on the characteristics that the current flowing through the commutation reactance after the asymmetric fault of the valve-side bushing contains decaying aperiodic components in addition to the fundamental frequency wave, a scheme to prevent the maloperation of commutation reactance overcurrent protection is proposed, which uses the unequal of two half cycle integral values with different starting points to realize the blocking of commutation reactance overcurrent protection, and it makes up the deficiency of existing protection in this aspect. Finally, this paper builds a VSC–HVDC system simulation model in the PSCAD/EMTDC platform to verify the effectiveness of the scheme.
Go to article

Authors and Affiliations

Yanxia Zhang
1
Guanghao Dong
1
ORCID: ORCID
Le Wei
1
Jinting Ma
1
Shanshan Du
1

  1. School of Electrical and Information Engineering, Tianjin University, No. 92 Weijin Road, Nankai District, Tianjin, China
Download PDF Download RIS Download Bibtex

Abstract

While working on the oeuvre of P.F. Strawson (1919–2006), and especially on his metaphysics, I had a unique opportunity to exchange ideas with this eminent exponent of Oxford philosophy. Those exchanges, of which some have been reflected in private correspondence and in a published reply to one of my papers, were focussed on various interpretative questions. Three threads of those discussions seem especially pertinent for grasping the gist of Strawson’s philosophy and its general orientation. The first one concerned the nature of philosophical analysis, or to be more precise, the connective model of it, favoured by Strawson, and its relationship with the idea of concept presupposition. The second thread had to do with the position taken by the Oxford philosopher in the realism debate on three levels: semantic, epistemological, and metaphysical. Strawson made every effort to take a realist stand in this debate and avoid antirealism in any of its forms; however, his realism is in many respects very moderate and not so distant from antirealism. Similarly moderate was his stand in the traditional debate about universals, constituting the topic of the third thread of the exchanges with Strawson. He claimed that universals exist, but at the same time emphasized that they are objects of pure thought alone and as such do not form a part of the spatiotemporal world in which we live. One cannot also say much about the relation of exemplification in virtue of which universals manifest themselves in the world as particular instances. Presentation and elaboration of these three threads has led to the conclusion that although Strawson was a deeply systematic thinker, he avoided wide-ranging and ambitious statements and radical views. In characteristically minimalist way he dispelled some questions, and the ultimate resolution of many crucial and fundamental issues were for him choice and taking a particular attitude or stance.

Go to article

Authors and Affiliations

Tadeusz Szubka
ORCID: ORCID
Download PDF Download RIS Download Bibtex

Abstract

For Peter F. Strawson, transcendental arguments were an important part of his philosophical method, referred to as a connective analysis. Both Strawson and his critical commentators have devoted a lot of effort to determining the nature, scope and purpose of those arguments. In this text, I intend, first of all, to reconstruct and characterize the basic elements of transcendental argumentation, specifying its general form, features and purpose. Secondly, I reconstruct some of the most representative examples of this argumentation. Thirdly, I refer to the basic objections against transcendental arguments formulated in the literature. Finally, I point to a few peculiarities in those arguments, commonly omitted by commentators and interpreters. The overall message of the paper is moderately positive: transcendental arguments are a legitimate way of reasoning in philosophy, and in particular, they constitute a comprehensible and well-founded part of Strawson’s connective analysis.

Go to article

Authors and Affiliations

Mariusz Grygianiec
Download PDF Download RIS Download Bibtex

Abstract

Over the past two decades, numerous research projects have concentrated on cognitive radio wireless sensor networks (CR-WSNs) and their benefits. To tackle the problem of energy and spectrum shortfall in CR-WSNs, this research proposes an underpinning decode-&-forward (DF) relaying technique. Using the suggested time-slot architecture (TSA), this technique harvests energy from a multi-antenna power beam (PB) and delivers source information to the target utilizing energy-constrained secondary source and relay nodes. The study considers three proposed relay selection schemes: enhanced hybrid partial relay selection (E-HPRS), conventional opportunistic relay selection (C-ORS), and leading opportunistic relay selection (L-ORS). We present evidence for the sustainability of the suggested methods by examining the outage probability (OP) and throughput (TPT) under multiple primary users (PUs). These systems leverage time switching (TS) receiver design to increase end-to-end performance while taking into account the maximum interference constraint and transceiver hardware inadequacies. In order to assess the efficacy of the proposed methods, we derive the exact and asymptotic closed-form equations for OP and TPT & develop an understanding to learn how they affect the overall performance all across the Rayleigh fading channel. The results show that OP of the L-ORS protocol is 16% better than C-ORS and 75% better than E-HPRS in terms of transmitting SNR. The OP of L-ORS is 30% better than C-ORS and 55% better than E-HPRS in terms of hardware inadequacies at the destination. The L-ORS technique outperforms C-ORS and E-HPRS in terms of TPT by 4% and 11%, respectively.
Go to article

Authors and Affiliations

Mushtaq Muhammad Umer
1 2
ORCID: ORCID
Hong Jiang
1
Qiuyun Zhang
1
ORCID: ORCID
Liu ManLu
1
ORCID: ORCID
Muhammad Owais
1
ORCID: ORCID

  1. School of Information Engineering, Southwest University of Science & Technology (SWUST) Mianyang, 621010, P.R. China
  2. Department of Software Engineering, Mirpur University of Science & Technology (MUST), Mirpur, Azad Jammu & Kashmir, Pakistan
Download PDF Download RIS Download Bibtex

Abstract

The paper presents the original concept of description and analysis of buildings (wall and floor structures), corresponding to the natural components of construction, quasi finite elements (QWSFS). This concept constitutes one of the component of the developed, interactive model of deep foundation buildings. The presented modelling method enables a significant reduction of the number of unknowns, which in the case of interaction building – subsoil, gives a possibility of including the factual geometry and building development stiffness into the FEM model. Therefore the true representation of static operation of the objects can be analysed. The paper gives basic assumptions to the construction of the QWSF-superelements as well as the results of numerical tests conducted. The potential of using the developed modelling concept in the analysis of the structural elements and deep foundation problems, in a three-dimensional system: subsoil – new building – potential neighbouring building development (at each stage of erection of investment, using a structural statics stage analysis) was presented.
Go to article

Authors and Affiliations

Czesław Miedziałowski
1
ORCID: ORCID
Leonas Ustinovichius
2
ORCID: ORCID

  1. Bialystok University of Technology, Faculty of Civil Engineering And Environmental Sciences, Wiejska 45E, 15-351 Bialystok
  2. Vilnius Gediminas Technical University, Civil Engineering Faculty, Vilnius, Lithuania
Download PDF Download RIS Download Bibtex

Abstract

Landslide is a common geological disaster which causes huge losses to people’s properties and national economic development. How to prevent and control landslides has become an important issue. This article introduces the geological and geographical environment of the landslide body, analyzes the basic characteristics of the landslide, calculates the landslide stability based on the ultimate equilibrium theory-based transfer coefficient method, discusses the development trend of the landslide and comes up with corresponding control schemes by taking the landslide body of Black Bovine Cave Copper Ore Mining & Beneficiation Project as example. It is found that the control scheme – “anti-slide pile + retraining wall + baffle + anchor cable” can be used to effectively prevent and control the geological disaster according to calculation. The study results can provide a reference for landslide body control.
Go to article

Authors and Affiliations

Hanhui Wu
1
ORCID: ORCID

  1. Civil Engineering, School of Civil Engineering, Chongqing Chemical Industry Vocational College, 400020 Chongqing, China
Download PDF Download RIS Download Bibtex

Abstract

This paper investigates the possibilities for developing a pole-changing winding with a pole ratio of 3:4 with improved electromagnetic properties. Such a winding can be used in two-speed induction motors for turbo mechanisms. The scheme of the new winding was obtained by using a discretely-specified spatial function method developed at the Tashkent State Technical University. A comparison of the parameters obtained for a similar winding received by the pole amplitude modulation method has been presented. Design of a new motor with a new winding is developed based on the standard induction motor. The paper presents results of laboratory tests, too.
Go to article

Authors and Affiliations

Makhsud Bobojanov
1
ORCID: ORCID

  1. Tashkent State Technical University, 2 University str., 100095, Uzbekistan
Download PDF Download RIS Download Bibtex

Abstract

In this paper we construct and consider a new group-based digital signature scheme with evolving secret key, which is built using a bilinear map. This map is an asymmetric pairing of Type 3, and although, for the reason of this paper, it is treated in a completely abstract fashion it ought to be viewed as being actually defined over E(Fqn)[p] × E(Fqnk )[p] → Fqnk [p]. The crucial element of the scheme is the key updater algorithm. With the adoption of pairings and binary trees where a number of leaves is the same as a number of time periods, we are assured that an updated secret key can not be used to recover any of its predecessors. This, in consequence, means that the scheme is forward-secure. To formally justify this assertion, we conduct analysis in fu-cma security model by reducing the security of the scheme to the computational hardness of solving the Weak ℓ-th Bilinear Diffie-Hellman Inversion problem type. We define this problem and explain why it can be treated as a source of security for cryptographic schemes. As for the reduction itself, in general case, it could be possible to make only in the random oracle model.
Go to article

Bibliography

[1] A. Anderson, Invited lecture, in Fourth Annual Conference on Computer and Communications Security, ACM, Am Psychiatric Assoc, 1997.
[2] M. Bellare and S. K. Miner, ”A Forward-Secure Digital Signature Scheme”, in Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference, 1999, pp. 431–449, doi: 10.1007/3-540-48405-128.
[3] D. Boneh and X. Boyen, ”Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles”, in Advances in Cryptology - EUROCRYPT 2004, C. Cachin and J.L. Camenisch, Eds. 2004, pp. 223- 238.
[4] D. Boneh, X. Boyen and E.-J. Goh, ”Hierarchical Identity Based Encryption with Constant Size Ciphertext”, Cryptology ePrint Archive, Report 2005/015. [Online]. Available: https://eprint.iacr.org/2005/015.pdf.
[5] X. Boyen, H. Shacham, E. Shen and B. Waters, ”Forward Secure Signatures with Untrusted Update”, in Proceedings of CCS 2006, W. Rebecca Ed. 2006, pp. 191–200.
[6] J. Buchmann, E. Dahmen and A. H¨ulsing, ”XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions”, in Post-Quantum Cryptography, B.-Y. Yang, Ed. 2011, pp. 117–129.
[7] J. Camenisch and M. Koprowski, ”Fine-grained Forward-secure Signature Schemes without Random Oracles”, Discrete Applied Mathematics, vol. 154, no. 2, pp. 175–188, Feb. 2006, doi: 10.1016/j.dam.2005.03.028.
[8] R. Canetti, S. Halevi, J. Katz, ”A Forward-Secure Public-Key Encryption Scheme”, in Advances in Cryptology - EUROCRYPT 2003, E. Biham, Ed. 2003, pp. 255–271.
[9] Y. Cui, E. Fujisaki, G. Hanaoka, H. Imai and R. Zhang, ”Formal Security Treatments for Signatures from Identity-Based Encryption”, in Provable Security, W. Susilo, J. K. Liu, Y. Mu, Eds. 2007, pp. 218–227.
[10] A. Fiat and A. Shamir, ”How to Prove Yourself: Practical Solutions to Identification and Signature Problems”, in Conference on the theory and application of cryptographic techniques, 1986, pp. 186–194.
[11] S. D. Galbraith, K. G. Paterson and N. P. Smart, ”Pairings for Cryptographers”, Discrete Applied Mathematics, vol. 156, no. 16, pp. 3113 - 3121, Sep. 2008, doi: 10.1016/j.dam.2007.12.010.
[12] S. Goldwasser S. Micali and R. L. Rivest, ”A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks”, SIAM Journal on Computing, vol. 17, no. 2, pp. 281–308, 1988, doi: 10.1137/0217017.
[13] S. Hohenberger and B.Waters, ”New Methods and Abstractions for RSA-Based Forward Secure Signatures”, in International Conference on Applied Cryptography and Network Security, M. Conti, J. Zhou, E. Casalicchio and Angelo Spognardi, Eds. 2020, pp. 292–312.
[14] G. Itkis, and L. Reyzin, ”Forward-secure Signatures with Optimal Signing and Verifying”, in Advances in Cryptology - CRYPTO ’01, 21st Annual International Cryptology Conference, J. Kilian, Ed. 2001, pp. 332–354.
[15] M. Jurkiewicz, ”Improving Security of Existentially Unforgeable Signature Schemes”, International Journal of Electronics and Telecommunications, vol. 66, no. 3, pp. 473–480, 2020, doi: 10.24425/ijet.2020.131901.
[16] H. Krawczyk, ”Simple Forward-secure Signatures from any Signature Scheme”, in Proceedings of the 7th ACM conference on Computer and Communications Security, P. Samarati, Ed. 2000, pp. 108–115, doi: 10.1145/352600.352617.
[17] S. Mitsunari, R. Sakai and M. Kasahara, ”A new traitor tracing”, IEICE transactions on fundamentals of electronics, communications and computer sciences, vol. 85, no. 2, pp. 481–484, Feb. 2002.
Go to article

Authors and Affiliations

Mariusz Jurkiewicz
1

  1. Faculty of Cybernetics, Military University of Technology, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The article considers Roman Ingarden’s fundamental questions in the context of the position called philosophical fundamentalism. It turns out that the defining feature of this position, i.e. the search for answers to the question about the conditions of validity of statements in the sphere of traditional branches of philosophy: ontology, epistemology, ethics and aesthetics, finds its counterpart in Ingarden’s ontological and epistemological assumptions in phenomenology. They guarantee the legitimacy of any other claims. Ingarden’s philosophical fundamentalism, considered here in relation to the work- ‑scheme, weakened with time, which seems to be evidenced by the author’s doubts as to the legitimacy of the existence of the sphere of ideal objects determining this work. It seems highly possible that this is Ingarden’s bow to culture, and to cultural and historical relativization of the unchanging sphere of ideal objects.
Go to article

Authors and Affiliations

Barbara Kotowa
1

  1. prof. em., Uniwersytet im. Adama Mickiewicza w Poznaniu, Wydział Filozoficzny, ul. Szamarzewskiego 89c, 60-568 Poznań

This page uses 'cookies'. Learn more