Objectives: Evaluating socio-demographic (age, gender, education status, family status etc.) traits of children and adolescents who commit this crime in detail, it is aimed in this study that reasons why children are pushed to crime can be found out and effective solution offers can be introduced to prevent criminal acts of these children.\nMethods: This study deals with cases retrospectively which came before Adana Court, 3 Numbered Heavy Penal Court after June 2007 and which are recorded in National Judiciary Informatics System. All cases which belong to 65 children who are under 18 and committed crime of sexual abuse and who came before 3 Numbered Heavy Penal Court; all these cases are within the scope of this study.\nResults: 65 children who are in this study and committed crime of child sexual abuse are all male, and their average age is 190,14±23,85 months. While 21 of children (32,3%) in our study were between the ages 12 and 15, 44 children (67,7%) were were between the ages 15 and 18. 15 children (23,1%) committed simple crime of sexual abuse, and 50 children (76,9%) committed crime of aggravated sexual abuse.\nConclusions: Children pushed to crime are inclined to have a longer crime career compared to ones who were involved in violence at an older age. As a result, risk factors related to family, school, society and children must be found out in order to prevent children from delinquency.
Logs provides crucial piece of information in any forensic investigation process. The logs in cloud environment are decentralized in nature. This work provides insight into analysis of cloud logs on the basis of classification. The analysis results in classifying the cloud users into authentic and malicious. The proposed approach predicts the cloud user behavior by novel approach of similarity method. The work assumes that when cloud resources are allotted to cloud customer it follows some path line that could be track to predict cloud user activities. Classification of cloud users into authentic and malicious initiates the cloud forensic process. The proposed framework can be incorporated in cloud architectures for providing forensic readiness process.
Backrounds: Nurses are responsible for making sure that patients take their medicine in a correct and safe way, and for monitoring, recording and reporting drug interactions and if necessary alerting the doctor to wrong drug prescriptions. Therefore, many national and international educational organizations have included psychopharmalogical education in the syllabuses of their degree-level nursing programs. It is reported that students and clinic nurses still have problems in administering drugs and monitoring their side effects.\nObjectives: This study had the aim of investigating the knowledge levels of nursing students entering their internships on Mental Health and Illnesses Nursing concerning the side effects of drugs used in psychiatry, and their skills in recognizing these side effects in the patients under their care and taking the necessary measures.\nDesign: Cross-sectional descriptive study\nMethods: The research was conducted with 103 nursing students enrolled in the academic year 2014-2015 who agreed to take part in the research. The researchers created a Descriptive Information Form and a Form Evaluating the Level of Knowledge of Drug Side Effects to collect data. Descriptive statistical methods were used to evaluate the data. In evaluating the nursing students’ knowledge levels, dependent/norm referenced evaluation was used, and students’ practice files were examined.\nResults: It was found that the level of knowledge of nursing students concerning the side effects of psychiatric drugs was medium, that less than half placed a nursing diagnosis of the side effects of drugs, and most nursing diagnoses were related to physiological needs.\nConclusions: It is recommended that new educational techniques need to be tried to make students’ knowledge of drugs permanent, that the results should be evaluated and incorporated into educational programs, that studies should be carried out of educational methods to increase nursing students’ knowledge of drugs.
Mobile ad hoc network is an infrastructure less dynamic network used in many applications, it has been targets of various attacks and makes security problems. This work aims to provide an enhanced level of security by using the prevention based and detection based approaches such as authentication and intrusion detection. The multi-model biometric technology is used for continuous authentication and intrusion detection in high security cluster based MANET. In this paper, an attempt has been made to combine continuous authentication and intrusion detection, formulate the problem as a partially observed markov decision process and it is used to optimally select a bio-sensor for continuous authentication at each time instance. In this proposed scheme, Dempster-Shafer theory is used for data fusion because more than one device needs to be chosen and their observation can be used to increase observation accuracy.
Purpose: Evaluating the daily life activities and death anxiety, which is one of the\npsychological problems that people can experience, is quite significant in terms of the quality\nof care to be given, the psychological well being of the people and the increase in quality of\nlife. The aim of this study was to analyse the death anxiety and daily life activities of the\nindividual who live in nursing home.\nMethods: Planned as descriptive and cross-sectional, this research was performed in a nursing\nhome in Izmir, which is in the Western part of Turkey. 150 people meeting the research\ninclusion criteria composed the sample. As data gathering tools, “Demographic Information\nForm”, “Templer Death Anxiety Scale (TDAS)” and “Daily Life Activities Form (DLAF)”\nwere used.\nResults: The mean TDAS score of the individuals was 5.44±1.05. The mean DLAF score was\n45.18±10.14. Among the daily life activities, using the toilet was the lowest one\n(X=7.48±2.62). Death anxiety showed a statistically significant difference in the the\nindividual who live in nursing home, when compared according to gender (t=2.81; p<.05).\nThere was no statistically significant relationship between the death anxiety levels and daily\nlife activities of the individual who live in nursing home (r=-.02, p>.05). Age was effecting\nfactor on the Daily life activities (p<.05) except self feding.\nConclusion: Consequently, the death anxiety levels of the individual who live in nursing home were not related to their daily life activities.
Since in roofed buildings the cover (roof) is of the primary elements in architecture, architects all over the world constantly sought for a method to cover the building space in the best and most efficient way. The geographical positioning of Iran caused architectures to devise various practical methods. Devising uneven roofs like pitched, arched roofs and half-spherical (domed) covering for buildings are considered to be the most important successes in Iranian architects. The method of building half-spherical domes on four arches was the innovation of Iranian architects. The evolutionary process of this method led to the creation of huge domes and coverings of vast spaces. Dome was a symbol of the sky and the extraterrestrial world and this architectural element in fire temples made domes a sacred symbol. After the emergence of Islam in Iran, domes were being used in sacred and religious places. This paper studies the process of change from half-spherical covers to sacred domes by using descriptive-analytic method and also with reference to Iranian architectural records.
Hidden Markov model (HMM) is a powerful mathematical tool for prediction and recognition but it is not easy to understand deeply its essential disciplines. Previously, I made a full tutorial on HMM in order to support researchers to comprehend HMM. However HMM goes beyond what such tutorial mentioned when observation may be signified by continuous value such as real number and real vector instead of discrete value. Note that state of HMM is always discrete event but continuous observation extends capacity of HMM for solving complex problems. Therefore, I do this research focusing on HMM in case that its observation conforms to a single probabilistic distribution. Moreover, mixture HMM in which observation is characterized by the mixture model of partial probability density functions is also mentioned. Mathematical proofs and practical techniques relevant to continuous observation HMM are main subjects of the research.
Abstract:\n\nObjectives: The aim of this study is to examine the prevalence and location of maxillary sinus septa and their relation to the occurrence of maxillary sinusitis. \n\nMaterials and methods: A total of 201 maxillary sinus computed tomography (CT) scans from 91 males and 110 females were examined by a trained radiologist. The presence of septa and their location and association with maxillary sinusitis were evaluated. Data was analyzed using SPSS software for data analysis. \n\nResults: The prevalence of maxillary sinus septa in this study was 42.3%. No statistically significant association was found between gender and age of patients and the presence or location of maxillary sinus septa (p>0.05). No significant differences were noted between the right and left sides. The absence of maxillary sinus septa was significantly associated with the presence of clinical and radiographic features of sinusitis (p<0.05).\n\nConclusions: Recognition of the presence and distribution of maxillary sinus septa is important in planning sinus surgeries and predicting the occurrence of sinusitis.
This paper discusses the speech acts of promise as the main way to express the corresponding speech intention in the political discourse. Besides, the classification of the promissive speech acts is given in the paper. The study is based on the idea that such a phenomenon as the intention of the speech producer to promise something to the speech recipient has many interdependent levels. These levels have their own ways to be expressed in the speech. Thus, the informative level of the promissive speech intention is represented by the infinitive phrases and object clauses of complex sentences; the communicative level of the promissive speech intention can be expressed with the help of the corresponding performative formula with some verb of promise; the persuasive level of the intention under study is shown through some intensifiers. Accordingly, the promissive speech acts can be divided into the acts of promise with three explicit components (absolutely complete promissive speech acts), the acts of promise with two explicit components (complete promissive speech acts), and the acts of promise with only one explicit component (incomplete promissive speech acts). As it can be seen from the analysis of the acts of promise which function within the political discourse, the speech acts of promise have various structures. We distinguish between the complex speech acts of promise, the infinitive speech acts of promise, and the conditional promissive speech acts. Besides, the speech acts of promise can be traditionally divided into the explicit promissive speech acts and the implicit ones. The examples are taken from the political texts as we consider promising to be the dominating intention of the political discourse.
Mathematics of Elliptic curve can be used to widen a choice of elliptic curve cryptographic techniques with key exchange, key agreement , encryption and digital signature. The core attraction of Elliptic curve cryptography as compared RSA method is that it offers equivalent security for a lesser key sizes ,throughout by reducing the processing operating cost that it offers same level security for a lesser key-size, thus reducing the processing overhead which results in more rapidly perform computations, less power consumption, as well as savings of memory and bandwidth. and also attracted the attention of researchers and developers appropriate to its geometric structure and uppermost security compared to other existing public key algorithms such as Elgamal, RSA and DSA .In this paper discusses accomplishment of elliptic curve arithmetic such point addition ,point subtraction ,point inversion and point multiplication and concise background of elliptic curve, key exchange and key generation over GF(2m) .This manuscript focuses on generalized implementation of EC point calculation such addition ,multiplication ,division and inversion for an arbitrary curve over GF(2m) and attempt to identify the tribulations in the generic software implementation of elliptic curve ,investigate techniques that can speed up the software implementation. Reduction algorithms accomplishment is carried out that allows hardware and software implementation.
This study sought to determine the effect of field trip instructional strategy on students’ achievement and interest in Social Studies in junior secondary schools in Nsukka Education Zone, Enugu State, Nigeria. It adopted a quasi-experimental, non- equivalent group design. Four research questions and four null hypotheses guided the study. A sample of 154 JSS2 students drawn from two purposively selected secondary schools in Nsukka Education zone, Enugu State Nigeria were used for the study. Social Studies Achievement Test (SOSAT) and Social Studies Interest Inventory (SOSII) were developed, validated and used as instruments for data collection. The instruments (SOSAT and SOSII) were trial-tested on research subjects other than the ones selected for the study. The psychometric properties of the instruments were determined using the Kudder-Richardson’s (K-R 20) and Cronbach Alpha Statistics which established reliability indices of 0.77 and 0.90 for the SOSAT and SOSII respectively. Mean, Standard Deviation were used to answer the research questions while Analysis of Covariance (ANCOVA) was used for testing the null hypothesis at 0.05 level of significance. The results indicated that students taught Social Studies with the field trip instructional strategy had better achievement than their counterparts taught with the lecture method. Similarly, students taught Social Studies using field trip instructional strategy had higher interest in social studies compared with those taught with the lecture method. Furthermore, with respect to the hypotheses there was a significant difference in the mean achievement and interest scores of students taught Social Studies in junior secondary schools using field trip instructional strategy than those taught using lecture method. Based on the findings of the study, the researchers recommended among other things that Social Studies teachers should be encouraged by the secondary school administration to adopt field trip instructional strategy in the teaching of some concepts in Social Studies. It was also further recommended that government and other relevant stakeholders should provide schools with facilities such as school buses, cameras, videos, funds among others deemed necessary for embarking on field trip studies. It was then concluded that field trip instructional strategy if adopted in teaching and learning Social Studies in junior secondary schools could enhance students’ achievement and interest in the subject.
Vulvo-vaginal hematoma after consensual sexual intercourse is relatively rare with few cases reported in the literature. Especially the posterior fornix was the frequent site of coital injury for parous women; on the other hand lower vaginal and introital injuries were caused by first acts of coitus. We reported a case of 30 year-old gravia 1, para 1 married woman who presented with discomfort during the intercourse (two hours before presentation), burning sensations and genital pain. On gynecologic examination, 18x8 cm hematoma extending from left labia majora to gluteus was seen. There was no laceration of perineum or vaginal bleeding. By performing 6 cm vertical single incision to left labia majora, drainage was achieved. Multiple small vessels which were still bleeding were cauterized. A traditional drain to prevent reaccumulation was placed, and then removed on postoperative day 3. During follow-up period there were no signs of reaccumulation, infection, or scar tissue formation. She was discharged from the hospital on the sixth postoperative day. Coital injuries demand careful evaluation to help correct diagnosis, timely management for successful outcome with minimal morbidity.
Objective: We aimed to evaluate the patients with primary amenorrhea complaint in terms of mullerian anomalies according to the MRG results.\nStudy design: We retrospectively analyzed the pubertal patients who applied to our hospital with primary amenorrhea complaint between the dates of January 2010 and September 2011. Physical examination, FSH, LH, Estradiol, dihydroepiandrosterone sulphate, prolactin, progesterone and total testosterone hormone levels, pelvic USG and MRG examinations were performed for the patients. Patients with suspected Mayer-Rokitansky-Kuester-Hauser Syndrome (MRKH), gonadal dysgenesis and hypo-hypergonadotropical hypogonadism were evaluated for additional anomalies.\nResults: Twenty-seven patients which applied to our hospital with the complaint of not menstruating were evaluated according to physical examination and monitoring results. Among all patients, hypogonadotrophic hypogonadism was detected in 6 patients, whereas hypergonadotrophic hypogonadism was detected in 7 patients. The patients were classified according to their MRI results and American Society of Reproductive Medicine Classification. Type 1 uterus anomaly was detected in 1 patient, whereas type 2, type 3, type 5 and type 6 uterine anomalies were detected in 1, 1, 1, 2 and 2 patients respectively. In 4 patients renal anomaly, in 2 patients hearing loss and in 1 patient visual disorder were detected. Since our hospital where we currently work is in the region where consanguineous marriage and genetic disorders are most common, chromosomal abnormality scanning was also performed for these patients.\nConclusion: The uterovaginal anomaly was considerably common in patients who applied with the primary amenorrhea complaint. Mullerian anomalies may also be together with the systemic anomalies and hormonal abnormalities and chromosomal abnormalities may accompany to them.
This paper recommend a new reprogramming framework to handle code image efficiently in multihop wireless sensor network & created reprogramming agent with assorted adapting schemes like control overhead reduction while advertisement & handshaking process , secured authentication & dissemination etc. A large number of resource-constrained computing nodes in the sensor networks work mutually on a single application & are frequently activated for extensive periods of time unattended. Changing application requirements after evolving analysis or environments change considerably needs reprogramming facility via wireless network in order to support over-the-air software updates in sensor, new functionalities or features and patch errors in the software after deployment etc. To be abbreviating, S2Torrent adheres to the design principles like optimization & integration of innovative capabilities into the Deluge[1,3] framework, robustness to spatially irregular or varying node density, time-varying, asymmetric RF links, dynamic network reprogramming to support heterogeneous WSNs, providing secured authentication and dissemination etc. Investigating the performance and efficiency of the proposed schemes & reprogramming framework , simulated the enhanced routing agent using network simulator, tested the problems and demonstrated how to incorporate the proposed solution with the new routing agent by analyzing related parameters.
INTRODUCTION\nBehaviors which violate right to life of a person are not only from one adult against another; it can happen from people regarded as child being under 18 to the adults or children.\nIn this study, deeds that are committed by people under 18, which are exposed to sanctions as murder under the heading of crimes against life in Turkish Penal Code have been evaluated. \nMATERIALS AND METHODS\nIn our study, files that are recorded in Adana Courthouse, National Judiciary Informatics System (UYAP) and that are sent to 3 Numbered High Criminal Court and on which have been decided after June 2007 have been investigated.\nRESULTS\nOut of 20 children who are sent to 3 Numbered High Criminal Court because of their murder crimes, 17 (85%) is male and 3 is female. It can be seen like that when murders committed by children are classified: 15 (70%) of them have willful murder crimes; 3 (15%) of other children have deliberate murders.\nDISCUSSION\nAdolescence period is personal (impulsiveness, taking snap decisions etc.) and domestic difficulties may cause the adolescent without internalized norms to “commit crime” which seems a rational solution at that time. \n\nAs a result of this study for prevention of juvenile delinquency these foundations must have coordination with hospitals, courts, law enforcers and educational establishments; in this way, they need to work actively.
Premature infants are exposed to numerous painful treatments in intensive care units due to the various reasons. Retinopathy of prematurity (ROP) is the most important of them. \nOur aim is to evaluate the effects of swaddle-sucrose, swaddle-breast milk which are the non-pharmacological applications and swaddle-distilled water as a control on the pain perception in premature infants in the control of pain originating during ROP examination. \nInvestigation was planned as a prospective, randomized controlled study. Data was collected from Newborn Intensive Care Unit of a university hospital from June to September 2013 in Istanbul. Data was obtained from 87 of premature infants less than 32 gestation weeks and 1500 g body weights. 0.2 mL of 24 % sucrose and breast milk was given orally to infants immediately before the application. PIPP scale was used in the pain evaluation. Data was evaluated by chi-square test-single-way variance analysis taking into account mean, standard deviation, frequency and percentage distributions. There was no statistically significant different in terms of mean scores of pain prior, during and after the application between groups. \nAs a conclusion; it was seen that painkiller effect of swaddle-sucrose used during ROP examination was statistically significant, there was no different in swaddle-breast milk, but both of them were more effective than swaddle-distilled water in the relief of infants following the application.
Among the several Meta heuristic optimization methods the Gravitational Search Algorithm (GSA) which is based on Newton’s laws of motion was proposed by E. Rashedi et al. in the year 2009. In this paper, it is proposed to apply this method to solve the optimal generation and dispatch of electrical power with multiple fuel options at a different power level. The results obtained by this method are compared with the results obtained by Particle Swarm Optimization (PSO) and conventional method of Lagrange multiplier. It has been shown that this method (GSA) is more efficient & simpler than PSO and Lagrange multiplier method. The computation time of PSO is more than GSA and Lagrange multiplier method is more complicated. For computation program is developed by using MATLAB software.
In this article, we will use the Jumarie’s fractional derivative and modified sub-equation method to calculate the Jacobi elliptic solutions for some nonlinear partial fractional differential equations in mathematical physics namely, the space-time fractional derivatives nonlinear coupled KdV equations, space-time fractional derivatives nonlinear of predator-prey system, Jacobi elliptic solutions for nonlinear fractional differential equations produce the hyperbolic solutions and trigonometric solutions when the modulus and respectively. The proposed method can be used to find some different types of the Jacobi elliptic solutions to nonlinear partial fractional differential equations in mathematical physics.