Academic literature on the topic 'Consent search'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Consent search.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Consent search"

1

McMullan, Sam. "Third Party Consent Searches Following the Search and Surveillance Act." Victoria University of Wellington Law Review 43, no. 3 (September 1, 2012): 447. http://dx.doi.org/10.26686/vuwlr.v43i3.5030.

Full text
Abstract:
Many New Zealanders live in shared living arrangements. The result of this is that reasonable expectations of privacy are becoming more limited. State officials may conduct a lawful search where a person consents to such a search if that person has the authority to consent. Where people live in shared living arrangements, several people may have authority to consent to a search of the same property. This article explores the extent of a third party's power to consent to property searches where more than one person has authority to consent to a search under the Search and Surveillance Act 2012. It argues that the question of reasonable expectations of privacy should not be assessed by reference to property rights. It also considers the concept of "apparent" authority which has arisen in New Zealand from the Court of Appeal's decision in R v Bradley as well as the concept of a present and objecting occupant which has arisen in the United States in the Supreme Court decision of Georgia v Randolph.
APA, Harvard, Vancouver, ISO, and other styles
2

An, Seong-Su. "Consent search and seizure." Korean Journal of Comparative Criminal Law 10, no. 1 (July 2008): 301–36. http://dx.doi.org/10.23894/kjccl.2008.10.1.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Gi Ho. "A study on consent search." Wonkwang University Legal Research Institute 40, no. 2 (June 30, 2024): 41–59. http://dx.doi.org/10.22397/wlri.2024.40.2.41.

Full text
Abstract:
Searches are compulsory actions carried out on certain places, objects, or persons to discover specific objects or persons. The Constitution stipulates due process and warrant principles for searches related to compulsory dispositions. The Criminal Procedure Act also stipulates due process and warrant principles to ensure that searches are conducted in accordance with legal procedures and methods, and it also provides for exceptions to the warrant requirement. There are no explicit provisions allowing for consent searches. However, they are commonly conducted in investigative practice because they are more procedurally simple and efficient than searches conducted with warrants. There is a risk of abuse of consent searches as a means of circumventing or avoiding the warrant principle. The question is whether consent searches are permissible in light of the due process provisions, warrant principles, and exceptions to the warrant principle in the Constitution and Criminal Procedure Act. Consent searches are considered permissible as a voluntary investigative method as long as voluntary consent is guaranteed. Even if consent searches are generally permissible, legal requirements must be strictly established to prevent abuse. A search based on consent is lawful if a person capable of consent gives voluntary consent and the search is conducted within the scope of that consent. Whether the investigative agency must inform the person of their right to refuse consent is a matter of debate. While the notification of the right to refuse consent is not an absolute standard for determining voluntariness, it is an important factor to consider. If consent is given after being informed of the right to refuse, it is more likely to be considered voluntary. In criminal proceedings, the issue arises of how to determine the legality of a consent search. The burden of proving the legality of a consent search lies with the prosecutor, and any disadvantage in cases where the truth is unknown must fall on the prosecutor. The legality of a consent search can be proven through free proof as a legal fact, but the degree of proof must be sufficient to exclude reasonable doubt. When the legality of a consent search is contested, the decision should be based on whether the legality has been clearly proven by objective circumstances.
APA, Harvard, Vancouver, ISO, and other styles
4

Zuk, Peter, and Gabriel Lázaro-Muñoz. "Treatment Search Fatigue and Informed Consent." AJOB Neuroscience 12, no. 1 (January 2, 2021): 77–79. http://dx.doi.org/10.1080/21507740.2020.1866115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kappeler, Victor E., and Joseph B. Vaughn. "The evolution of consent search law." American Journal of Criminal Justice 10, no. 2 (March 1986): 163–77. http://dx.doi.org/10.1007/bf02887468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wulach, James S. "Psychological Evaluation of the Consent to Search." Journal of Psychiatry & Law 18, no. 3-4 (September 1990): 319–28. http://dx.doi.org/10.1177/0093185390018003-404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lokshin, G. "Vietnam-China Relations: a Difficult Search for Consent." Problemy Dalnego Vostoka, no. 2 (April 2019): 126–35. http://dx.doi.org/10.31857/s013128120005187-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schellings, Ron, Alfons G. Kessels, Gerben ter Riet, J. André Knottnerus, and Ferd Sturmans. "Randomized consent designs in randomized controlled trials: Systematic literature search." Contemporary Clinical Trials 27, no. 4 (August 2006): 320–32. http://dx.doi.org/10.1016/j.cct.2005.11.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jafarbeiki, Sara, Amin Sakzad, Ron Steinfeld, Shabnam Kasra Kermanshahi, Chandra Thapa, and Yuki Kume. "ACE: A Consent-Embedded privacy-preserving search on genomic database." Heliyon 10, no. 8 (April 2024): e29399. http://dx.doi.org/10.1016/j.heliyon.2024.e29399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lepola, Pirkko, Allison Needham, Jo Mendum, Peter Sallabank, David Neubauer, and Saskia de Wildt. "Informed consent for paediatric clinical trials in Europe." Archives of Disease in Childhood 101, no. 11 (May 25, 2016): 1017–25. http://dx.doi.org/10.1136/archdischild-2015-310001.

Full text
Abstract:
ObjectivePaediatric clinical trials are often conducted as multinational trials. Informed consent or assent is part of the ethics committee approval for clinical trials. The consent requirements vary between countries due to national laws and regulations, which are not harmonised in Europe. These discrepancies can present challenges for paediatric clinical trials. The aim of this study was to assemble these consent and assent requirements across the European Economic Area. The collated national requirements have not been publicly available before, despite a real need for this data.MethodsNational consent and assent requirements for paediatric clinical trials were analysed and collated for 25 European Union Member States and 2 European Free Trade Association countries until the end of 2014. The data were retrieved from existing databases and through communication with the competent authorities and selected ethics committees. Results from a literature search for international or national guidelines, declarations and conventions and academic societies' publications served as comparison material.ResultsConsent and assent requirements are heterogeneous across these countries. We compiled our findings in ‘The Informed Consent and Assent Tool Kit’, a table including 27 national consent and assent requirements listed by individual country.ConclusionsWide variation in paediatric consents and assents presents challenges for multinational paediatric trials in Europe. The toolkit is available for all those involved in paediatric clinical trials and ethics committees, providing a new platform for proactive feedback on informed consent requirements, and may finally lead to a needed harmonisation process, including uniform standards accepted across Europe.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Consent search"

1

Gold, Rebecca M. "Perceptions of Search Consent Voluntariness as a Function of Race." Scholarship @ Claremont, 2015. http://scholarship.claremont.edu/scripps_theses/652.

Full text
Abstract:
The United States Constitution provides its citizens protection from unreasonable searches and seizures from government officials, including police officers, through the Fourth Amendment. This Amendment applies to searches that violate a reasonable expectation of privacy. However, the Fourth Amendment does not protect citizens when they consent to a search voluntarily. It is necessary to determine whether or not a search is voluntary by looking at a variety of factors. Although an infinite number of factors can be considered to make this determination, race of both the police officer and of the person being searched should be considered, due to societal factors and racial stereotypes leading to intimidation factors. Participants (N=575) read a vignette about a situation in which a bus passenger was asked to consent to a search. The races of the police officer and the passenger were manipulated in a vignette (White, Latino, Black). Participants then answered a series of questions about privacy expectations and consenting to the search. The results suggested that race of police officers and recipients of search requests affects how search requests perceive the search, indicating that voluntariness of consenting to a search may also have some basis in race.
APA, Harvard, Vancouver, ISO, and other styles
2

Howe, Julie E. "Voluntary Consent to Police Searches: A Result of the Foot-In-The-Door Technique." W&M ScholarWorks, 1993. https://scholarworks.wm.edu/etd/1539625845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guénolé, Nicolas. "Conseil adaptatif et accompagnement des demandeurs d'emploi." Phd thesis, Conservatoire national des arts et metiers - CNAM, 2013. http://tel.archives-ouvertes.fr/tel-01062786.

Full text
Abstract:
Nous orientons nos travaux vers l'analyse des effets d'une individualisation de l'accompagnement proposé auxdemandeurs d'emploi, en fonction de leurs problématiques vocationnelles. Il s'agit de considérerl'individualisation sous la forme d'un accompagnement adapté aux problématiques vocationnelles desindividus, en partant de l'idée que ceux-ci ne bénéficient pas tous au même niveau d'une prestation d'aide à larecherche d'emploi. Nous postulons ainsi qu'un accompagnement à la recherche d'emploi différenciépermettra de mieux prendre en considération les attentes et les besoins des bénéficiaires, et d'accroîtrel'efficacité de leurs démarches. Les actions proposées aux personnes seront en effet a priori plus pertinentes sielles sont mises en oeuvre en fonction de leurs problématiques personnelles et vocationnelles. Ainsi, nousavons travaillé dans une première partie de nos travaux de thèse à la présentation d'une typologie desproblématiques vocationnelles de demandeurs d'emploi. Un protocole évaluant le niveau de ressourcespsychologiques, de dépression, de soutien social, de sentiment d'efficacité personnelle, d'estime de soi,d'indécision et d'employabilité a été proposé à 323 participants. Les résultats obtenus mettent en évidence troiscatégories de problématiques vocationnelles, permettant d'engager une réflexion sur les modalités d'unaccompagnement différencié. Dans un second temps, nous avons étudié les attentes et les besoins desdemandeurs d'emploi en matière de dispositifs d'aide à l'insertion professionnelle. Adoptant un point de vuequalitatif, nous avons mis en évidence auprès d'un échantillon de 16 demandeurs d'emploi, leur répartition entrois axes distincts. Les dispositifs doivent ainsi permettre de retrouver rapidement un emploi, de maîtriser destechniques de recherche d'emploi, et de formaliser un projet professionnel pertinent vis-à-vis du marché del'emploi. Ces deux expérimentations nous ont permis, dans un dernier temps, d'étudier, à l'aide d'uneapproche "interaction caractéristique traitement", les effets d'un dispositif d'aide à la recherche d'emploidifférencié fondé sur la théorie du conseil adaptatif. Si cette étude montre les effets significatifs d'un dispositifd'insertion professionnelle vis-à-vis des problématiques vocationnelles des participants et de leur niveau dedynamisation, elle ne permet pas de mettre en évidence l'effet accru d'un conseil différencié. Les limites denos travaux, ainsi que leurs apports théoriques et pratiques sont discutés en conclusion, tout en ouvrant denouvelles perspectives de recherche.
APA, Harvard, Vancouver, ISO, and other styles
4

Panjwani, Hasnain. "Development of a torsion balance facility and a search for temporal variations in the Newtonian gravitational constant." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3758/.

Full text
Abstract:
The torsion balance is one of the key pieces of apparatus used in experimental searches for weak forces. In the search for an understanding of a Unified Theory, physicists have suggested a number of signatures that are detectable in laboratory measurements. This thesis describes the development of a new torsion balance facility, relocated from the BIPM (Bureau International des Poids et Mesures) [1], which has excellent environmental stability and benefits from a new compact interferometric readout for measuring angular motion which has been characterised and installed onto the torsion balance. The interferometer has sensitivities of 5 \( \times\) 10\( {-11}\) radians\(\char{cmti10}{0x2f}\)\(\sqrt{Hz}\) between 10\( {-1}\) Hz and 10 Hz, an angular range of over \(\pm\)1\( \circ\) and significantly reduces sensitivity to ground tilt. With the new facility the first experiment searching for temporal variations in the Newtonian gravitational constant has been undertaken with a null result for \( \delta\)\(\char{cmti10}{0x47}\)\(\char{cmti10}{0x2f}\)\(\char{cmti10}{0x47}\)\(_0\) for both sidereal and half sidereal signals at magnitudes greater than 5\( \times\)10\( {-6}\). These results have been used to set an upper limit on some of the parameters within the Standard Model Extension framework [2]. The thesis also reports on the design and manufacture of prototype test masses with a high electron-spin density of approximately 10\( {24}\) and negligible external magnetic field \( \leq\) 10\( {-4}\)\(\char{cmr10}{0x54}\). These test masses can be used within the facility to potentially make it sensitive enough to conduct future spin-coupling experiments.
APA, Harvard, Vancouver, ISO, and other styles
5

Poulet, Sarah. "Contextual Cueing : apprentissage des régularités spatiales de l’environnement au cours de la recherche visuelle et accès conscient aux connaissances." Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCC027.

Full text
Abstract:
Face à la surcharge informationnelle inhérente à la complexité du monde visuel, pour pallier la limitation de ses capacités de traitement et ajuster au mieux son comportement, l’être humain est capable d’apprendre et d’exploiter des régularités présentes dans son environnement visuel. S’il est complexe, le monde visuel n’en est effectivement pas moins hautement structuré et redondant, le contexte dans lequel s’inscrivent les objets constituant dès lors une source de prédictibilité profitable aux observateur·rice·s. Depuis une vingtaine d’années, le paradigme de Contextual Cueing (CC) offre un outil expérimental pour étudier, en laboratoire, comment il est ainsi possible d’apprendre des régularités spatiales existant dans la localisation relative de différents objets, pour faciliter les comportements de recherche visuelle. Le CC alimentant une littérature particulièrement abondante et prolifique, la première partie de cette thèse fait état de l’ensemble des travaux préexistants sur le paradigme. Au travers de cette revue de questions, sont principalement discutées la nature implicite du phénomène, la caractérisation des connaissances acquises et de leur effet facilitateur, ainsi que la transposabilité et la généralisation du CC spatial à d’autres régularités ou environnements. Dans une seconde partie, nous présentons trois études expérimentales menées à partir de ce paradigme. La première d’entre elles montre que dans des scènes naturelles, l’acquisition de connaissances implicites tend à précéder l’exploitation consciente des régularités classiquement attachée au CC dans ce type d’environnement. Dans des contextes artificiels et abstraits (i.e., configurations de lettres), si le CC ne paraît pas avant tout dépendre de la bonne mise en œuvre de processus explicites et conscients, notre deuxième étude rapporte que son intégrité est menacée au cours du vieillissement normal. Enfin, notre troisième étude explore les possibilités d’apprentissage en situation d’expositions très brèves aux régularités (i.e., 50ms), et suggère que ces dernières peuvent effectivement être extraites et exploitées alors même que les environnements de recherche ne sont pas (physiquement) disponibles suffisamment longtemps pour permettre à la recherche d’être complétée
While deeply complex, the visual world is highly structured and redundant. Through experience, human beings can thus learn regularities present in the visual world, and exploit them to deal with information overload and facilitate behaviors. For the past twenty years, the Contextual Cueing (CC) paradigm has provided an experimental tool to study, in the laboratory, how spatial regularities can be learned to expedite visual search. The first part of this dissertation reviews the existing literature related to this paradigm. It mainly discusses the implicit nature of CC, the characterization of the acquired knowledge and its facilitating effect, as well as the generalization of spatial CC to other regularities and environments. In a second part, three experimental studies using the CC paradigm are presented. The first one shows that, in natural scenes, the acquisition of implicit knowledge tends to precede the conscious exploitation of regularities that classically accompanies CC in this type of environment. In artificial scenes (i.e., letter configurations), even if CC does not seem to primarily depend on the proper implementation of explicit and conscious processes, our second study reports that its integrity is threatened during normal ageing. Finally, our third study investigates whether CC can emerge from very brief exposures of regularities (i.e., 50ms), and suggests that regularities can actually be extracted and exploited even though search displays are not (physically) available long enough to complete the search
APA, Harvard, Vancouver, ISO, and other styles
6

Marzioni, Maria Francesca. "Axion dark matter and two-neutrino double electron capture searches in the Large Underground Xenon experiment." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31054.

Full text
Abstract:
The hunt for Dark Matter plays a truly critical role in contemporary physics. At both the largest and smallest scales, deep questions are being raised about the fundamental nature of the universe - questions that confirmation and then characterisation of particle dark matter will provide many answers to. This thesis presents some of the world's most sensitive searches to date for certain types of axion dark matter, axion-like particles, and two-neutrino double electron capture. These have been conducted using the Large Underground Xenon (LUX) experiment. Evidence for dark matter and physics beyond the Standard Model of particle physics is described in Chapter 1, while Chapter 2 gives an overview of proposed candidates for particle dark matter. The various experimental approaches being used to detect particle dark matter are presented in Chapter 3. Direct detection with time projection chambers plays a major role in this thesis, with particular interest in the LUX detector, that is described in its components and operations. Chapter 4 presents LUX direct searches for weakly interacting massive particles. Although I have contributed to these analyses, they are included for completeness only, as they are not part of my central work. The LUX collaboration's searches for axion dark matter and axion-like particle have delivered world-leading results on the axion-electron coupling constant. These results, that I personally led and which have been published in Physics Review Letters, are presented in Chapter 5, along with sensitivity studies, also led by me, made for the future LUX-ZEPLIN experiment. Finally, a search for two-neutrino double electron capture of 124Xe, that I performed using LUX data to extract a limit on the half life of the process, is presented in Chapter 6. Although being allowed by the Standard Model, two-neutrino double electron capture shares the matrix element calculation framework with the neutrinoless channel of the same process, becoming of great interest in the scope of neutrino physics. Conclusions follow and close the thesis.
APA, Harvard, Vancouver, ISO, and other styles
7

Khalil, Sadia. "Measurement of the branching fraction of D+ meson going to muon+ neutrino and the pseudoscalar decay constant fD+ using the full psi'' sample and search for neutral D meson going to proton-electron and neutral D meson going to antiproton-positron." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2009. http://wwwlib.umi.com/cr/syr/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jin, Shendan. "Online computation beyond standard models." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS152.

Full text
Abstract:
Dans le cadre standard du calcul en ligne, l’entrée de l’algorithme n’est pas entièrement connue à l’avance, mais elle est révélée progressivement sous forme d’une séquence de requêtes. Chaque fois qu'une requête arrive, l'algorithme en ligne doit prendre des décisions irrévocables pour servir la demande, sans connaissance des requêtes futures. Dans le domaine des algorithmes en ligne, le cadre standard utilisé pour évaluer les performances des algorithmes en ligne est l’analyse compétitive. De manière informelle, le concept d’analyse compétitive consiste à comparer les performances d’un algorithme en ligne dans le pire des cas à une solution optimale hors ligne qui aurait pu être calculée si toutes les données étaient connues d’avance. Dans cette thèse, nous étudierons de nouvelles façons d'approcher les problèmes en ligne. Dans un premier temps, nous étudions le calcul en ligne dans le modèle avec ré-optimisation, dans lequel l'irrévocabilité des décisions en ligne est relâchée. Autrement dit, l'algorithme en ligne est autorisé à revenir en arrière et changer les décisions précédemment prises. Plus précisément, nous montrons comment identifier le compromis entre le nombre de ré-optimisation et les performances des algorithmes en ligne pour le problème de couplage maximale en ligne. De plus, nous étudions des mesures autres que l'analyse compétitive pour évaluer les performances des algorithmes en ligne. Nous observons que parfois, l'analyse compétitive ne peut pas distinguer les performances de différents algorithmes en raison de la nature la plus défavorable du ratio de compétitivité. Nous démontrons qu'une situation similaire se pose dans le problème de la recherche linéaire. Plus précisément, nous revisitons le problème de la recherche linéaire et introduisons une mesure, qui peut être appliquée comme un raffinement du ratio de compétitivité. Enfin, nous étudions le calcul en ligne dans le modèle avec des conseils, dans lequel l'algorithme reçoit en entrée non seulement une séquence de requêtes, mais aussi quelques conseils sur la séquence de requêtes. Plus précisément, nous étudions un modèle récent avec des conseils non fiables, dans lequel les conseils peuvent être fiables ou non. Supposons que dans ce dernier cas, les conseils peuvent être générés à partir d'une source malveillante. Nous montrons comment identifier une stratégie optimale de Pareto pour le problème online bidding dans le modèle de conseil non fiable
In the standard setting of online computation, the input is not entirely available from the beginning, but is revealed incrementally, piece by piece, as a sequence of requests. Whenever a request arrives, the online algorithm has to make immediately irrevocable decisions to serve the request, without knowledge on the future requests. Usually, the standard framework to evaluate the performance of online algorithms is competitive analysis, which compares the worst-case performance of an online algorithm to an offline optimal solution. In this thesis, we will study some new ways of looking at online problems. First, we study the online computation in the recourse model, in which the irrevocability on online decisions is relaxed. In other words, the online algorithm is allowed to go back and change previously made decisions. More precisely, we show how to identify the trade-off between the number of re-optimization and the performance of online algorithms for the online maximum matching problem. Moreover, we study measures other than competitive analysis for evaluating the performance of online algorithms. We observe that sometimes, competitive analysis cannot distinguish the performance of different algorithms due to the worst-case nature of the competitive ratio. We demonstrate that a similar situation arises in the linear search problem. More precisely, we revisit the linear search problem and introduce a measure, which can be applied as a refinement of the competitive ratio. Last, we study the online computation in the advice model, in which the algorithm receives as input not only a sequence of requests, but also some advice on the request sequence. Specifically, we study a recent model with untrusted advice, in which the advice can be either trusted or untrusted. Assume that in the latter case, the advice can be generated from a malicious source. We show how to identify a Pareto optimal strategy for the online bidding problem in the untrusted advice model
APA, Harvard, Vancouver, ISO, and other styles
9

Gervier, Pauline. "La limitation des droits fondamentaux constitutionnels par l’ordre public." Thesis, Bordeaux 4, 2013. http://www.theses.fr/2013BOR40058/document.

Full text
Abstract:
La dialectique de l’ordre public et des libertés sillonne la pensée juridique depuis le XVIIIème siècle. Généré par de nouvelles formes de délinquance et de criminalité, le renforcement des exigences de l’ordre public impose de s’interroger sur la limitation des droits fondamentaux constitutionnels. En dépit de la place névralgique qu’il occupe entre ordre public et libertés, le processus de limitation demeure indéterminé en droit français. Cette recherche, organisée autour de la détermination des limites aux droits garantis, de l’identification des « limites aux limites » aux droits fondamentaux, puis de la redéfinition des droits fondamentaux par les limites, permet de préciser ce mécanisme, mais aussi de cerner les restrictions apportées à l’exercice des droits et libertés. L’autolimitation du Conseil constitutionnel marque un infléchissement progressif de la protection des droits fondamentaux. Ce constat invite à réfléchir sur l’encadrement supra-législatif de la limitation des droits garantis, et conduit à se positionner en faveur de l’insertion d’une clause de limitation des droits fondamentaux dans la Constitution
The dialectics of public order and freedoms has been traveling throughout legal thought since the 18th century. Sparked by new forms of delinquency and criminality, the strengthening of public order requirements leads to questioning the limitation of fundamental constitutional rights. Despite its crucible place between public order and freedoms, the limitation process remains undetermined in French law. This research, which aims at determining the limitations to protected rights, identifying the limitations to those limitations themselves, and then redefining fundamental rights through those limitations, not only helps to specify this mechanism, but also to identify the restrictions brought to the enjoyment of rights and freedoms. The Conseil constitutionnel self-restraint reveals a gradual shift in the protection of fundamental rights. Acknowledging the former leads to considering a supra legislative framework to the limitations to protected rights, and advocating in favor of the constitutional entrenchment of such a clause
APA, Harvard, Vancouver, ISO, and other styles
10

李巧雯. "Consent search." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/jx7abq.

Full text
Abstract:
碩士
輔仁大學
法律學系碩士在職專班
104
This paper explores the practice of “consent searches”, searching without warrants when necessary for an investigation as an exception to the principle of legal reservation. While it violates the people’s constitutional right by nature, it is widely used in practice. For this reason, it is necessary to study the possible approaches to control the legality of searching without warrants, such as a threshold to initiate, and the limits for, such searches. Since “consent search” is a form of search, this paper discusses the threshold to initiate, and the scope of, searches with and without warrants in Chapter 2. Chapter 3 explores the theoretical bases for consent searches (consent given by those affected or by third persons), and discusses whether “consent” may be the basis for a search, which is a compulsory measure that interferes and violates the people’s constitutional right. Chapter 4 analyzes the elements of consent searches: subject, party, capacity, obligation of disclosure upon refusal to searches, voluntariness, rescinding, display of credentials and display of consent on record. This Chapter also provides, on the basis of Chapter 3, solutions to problems in determining whether a party has the capacity to give consent, or resolving conflicts between parties. Further, this Chapter reviews the practices of Taiwan and the U.S. on the voluntariness of consent, which is difficult to determine for searches. Finally, this paper studies Taiwan’s current legal framework and practices, and concludes that because of Taiwan’s unique practical approach, consent searches have become a shortcoming in Taiwan’s human rights protection regime. Therefore, this paper deems that the necessity of consent searches, which only serve the convenience of investigations while violating the people’s constitutional right, should be subject to skepticism.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Consent search"

1

Decker, Scott H. Reducing gun violence: The St. Louis consent-to-search program. Washington, DC (810 Seventh St., N.W., Washington 20531): U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Decker, Scott H. Reducing gun violence: The St. Louis Consent-to-Search Program. [Washington, D.C.]: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Decker, Scott H. Reducing gun violence: The St. Louis Consent-to-Search Program. [Washington, D.C.]: U.S. Department of Justice, Office of Justice Programs, National Institute of Justice, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Olson, Theodore B. The senate confirmation process: Advise and consent, or search and destroy? Washington, D.C: National Legal Center for the Public Interest, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Europe, Council of, ed. Council of Europe Convention on Laundering, Search, Seizure and Confiscation of the Proceeds from Crime and on the Financing of Terrorism =: Convention du Conseil de l'Europe relative au blanchiment, au dépistage, `a la saisie et `a la confiscation des produits du crime et au financement du terrorisme. Strasbourg: Council of Europe Publishing, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Search & Research, Lectures and Papers Vol 22 : The Murder of the Jews and Popular Consent: German Society during the Nazi Dictatorship. Yad Vashem Publications, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Crépon, Marc. Murderous Consent. Translated by Michael Loriaux and Jacob Levi. Fordham University Press, 2019. http://dx.doi.org/10.5422/fordham/9780823283750.001.0001.

Full text
Abstract:
This book details our implication in violence we do not directly inflict but in which we are structurally complicit: famines, civil wars, political repression in far-away places, and war, as it's classically understood. It insists on a bond between ethics and politics and attributes violence to our treatment of the two as separate spheres. We repeatedly resist the call to responsibility, as expressed by the appeal—by peoples across the world—for the care and attention that their vulnerability enjoins. But the book argues that this resistance is not ineluctable, and it searches for ways that enable us to mitigate it, through rebellion, kindness, irony, critique, and shame. In the process, it engages with a range of writers, from Camus, Sartre, and Freud, to Stefan Zweig and Karl Kraus, to Kenzaburō Ōe, Emmanuel Levinas and Judith Butler. The resulting exchange between philosophy and literature enables the book to delineate the contours of a possible/impossible ethicosmopolitics—an ethicosmopolitics to come. Pushing against the limits of liberal rationalism, the book calls for a more radical understanding of interpersonal responsibility. Not just a work of philosophy but an engagement with life as it's lived, the book works to redefine our global obligations, articulating anew what humanitarianism demands and what an ethically grounded political resistance might mean.
APA, Harvard, Vancouver, ISO, and other styles
8

Eileen, Denza. Inviolability of the Mission Premises. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198703969.003.0020.

Full text
Abstract:
This chapter looks into Article 22 of the Vienna Convention on Diplomatic Relations which deals with the inviolability of the diplomatic mission premises. The Article expresses that along with the premises of mission being inviolable, the agents of the receiving State may not enter them, except with the consent of the head of the mission. Under the Article, the receiving is under a special duty to take all appropriate measures to protect the premises of the mission and to prevent any disturbance of the peace of the mission or impairment of its dignity. Lastly, the Article states that the premises of the mission, their furnishings, and other property thereon and the means of transport of the mission shall be immune from search, requisition, attachment, or execution. The chapter stresses the legal concept of inviolability given to the premises of the diplomatic mission.
APA, Harvard, Vancouver, ISO, and other styles
9

Cutter, Mary Ann G. Thinking Through Breast Cancer. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190637033.001.0001.

Full text
Abstract:
Anyone who has been diagnosed with breast cancer or is acquainted with someone who has been diagnosed with breast cancer knows that cancer raises a host of questions concerning its nature, how we know it, and how we treat it. Such questions frame the difficult decisions that patients must make about their treatment, care, and mortality. Thinking Though Breast Cancer: A Philosophical Exploration of Diagnosis, Treatment, and Survival is a philosophical investigation of the second leading cause of cancer death among women. It is a study of how breast cancer is described, explained, evaluated, and socialized in medicine. Further, it is an investigation of the ethical implications of understanding breast cancer. These include the extent to which informed consent is secured, patient harms are minimized, patient benefits are maximized, and access to appropriate breast cancer care is made possible. The inquiry draws on clinical information as well as philosophical advice and provides suggestions about how to navigate the complex and, at times, uncertain terrain of breast cancer knowledge and care. In this way, the book is not simply an academic overview of what we know about breast cancer. It is a personal search for guidance about managing the complex, confusing, and scary terrain of breast cancer diagnosis, prognosis, and treatment.
APA, Harvard, Vancouver, ISO, and other styles
10

Møller, Ann Merete. Evidence-based medicine in anaesthesia. Edited by Jonathan G. Hardman. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780199642045.003.0029.

Full text
Abstract:
Evidence-based medicine (EBM) is defined as ‘The judicious use of the best current evidence in making decisions about the care of individual patients’. Evidence-based medicine (EBM) is meant to integrate clinical expertise with the best available research evidence and patient values. The purpose of EBM is to assist clinicians in making the best decisions. Practising EBM includes asking an answerable, well-defined clinical question, searching for information, critically appraising information retrieved, extracting data, synthesizing data, and making conclusions about the overall effect. The clinical question includes information of the following elements: the population, the intervention, and the clinically relevant outcomes in focus. The clinical question is a tool to make the focus of the question clearer, and an aid to build the following search strategy. A comprehensive and reproducible literature search is essential for conducting a high-quality and up-to-date search. The search should include all relevant clinical databases. Papers retrieved after the search must be critically appraised and evaluated for the risk of bias. Evidence-based methods are used in the production of systematic reviews, and the development of clinical guidelines. Whether a meta-analysis should be performed depends on the quality and nature of the extracted data. Practising EBM may be challenged by a lack of well-performed trials, various types of bias (including publication bias), and heterogeneity between existing trials. Several tools have been constructed to help the process; examples are the CONSORT statement, the PRISMA statement, and the AGREE instrument.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Consent search"

1

Waites, Matthew. "Sexual Liberationism and the Search for New Sexual Knowledge." In The Age of Consent, 119–57. London: Palgrave Macmillan UK, 2005. http://dx.doi.org/10.1057/9780230505933_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bisht, Renuka. "The Search for a Happy Ending." In Desire and Consent in Representations of Adolescent Sexuality with Adults, 169–84. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003283768-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

MacLean, Charles E., and James A. Densley. "Court-Approved Police Deception in Obtaining Consent to Search." In Police, Prosecutors, Courts, and the Constitution, 41–49. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-39082-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vito, Anthony G., and George E. Higgins. "Understanding the role of race, gender and age in request to consent search drivers." In Over-Policing Black Bodies, 43–63. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003379652-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Signorelli, Walter P. "Consent Searches." In Criminal Law, Procedure, and Evidence, 165–78. 2nd ed. New York: Routledge, 2023. http://dx.doi.org/10.4324/9781003415091-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

del Carmen, Rolando V., and Jeffery T. Walker. "Searches with Consent." In Briefs of Leading Cases in Law Enforcement, 117–30. Tenth edition. | Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2019. http://dx.doi.org/10.4324/9780429053139-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kagehiro, Dorothy K., and Ralph B. Taylor. "Exploring the Fourth Amendment: Searches Based on Consent." In Handbook of Psychology and Law, 21–36. New York, NY: Springer New York, 1992. http://dx.doi.org/10.1007/978-1-4757-4038-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Murphy, Erin. "Conceptions of consent, family and jurisdiction in forensic genetic genealogical searches." In Law, Practice and Politics of Forensic DNA Profiling, 217–33. London: Routledge, 2022. http://dx.doi.org/10.4324/9780429322358-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jackson Kimball, Derek F., Leanne D. Duffy, and David J. E. Marsh. "Ultralight Bosonic Dark Matter Theory." In The Search for Ultralight Bosonic Dark Matter, 31–72. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95852-7_2.

Full text
Abstract:
AbstractThe basic theoretical concepts motivating the hypothesis that dark matter may consist of ultralight spin-0 or spin-1 bosons are explored. The origin of bosons with masses ≪ 1 eV from spontaneous and explicit symmetry breaking is illustrated with examples. The origins and characteristics of nongravitational couplings or “portals” between ultralight bosons and Standard Model particles and fields are considered, with particular attention paid to the cases of the axion-photon and axion-fermion interactions. Theoretical motivations for the existence of ultralight bosons, besides as an explanation of dark matter, are examined, with particular focus on the Peccei-Quinn solution to the strong CP problem (resulting in the QCD axion) and a dynamical solution to the hierarchy problem (the “relaxion” hypothesis, based on a particular axion-Higgs coupling in the early universe). Mechanisms for non-thermal production of ultralight bosonic dark matter are examined.
APA, Harvard, Vancouver, ISO, and other styles
10

Gupte, Akshay, Melanie Siebenhofer, and Angelika Wiegele. "Computing the Edge Expansion of a Graph Using Semidefinite Programming." In Lecture Notes in Computer Science, 111–24. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-60924-4_9.

Full text
Abstract:
AbstractComputing the edge expansion of a graph is a famously hard combinatorial problem for which there have been many approximation studies. We present two versions of an exact algorithm using semidefinite programming (SDP) to compute this constant for any graph. The SDP relaxation is used to first reduce the search space considerably. One version applies then an SDP-based branch-and-bound algorithm, along with heuristic search. The other version transforms the problem into an instance of a max-cut problem and solves this using a state-of-the-art solver. Numerical results demonstrate that we clearly outperform mixed-integer quadratic solvers as well as another SDP-based algorithm from the literature.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Consent search"

1

Jung, Eun Sun, Luis Fernando Gomes Carreira, Vinicius Finisguerra Vianna, Taina Ribeiro Azevedo, and Rubens José Gagliardi. "General knowledge of stroke in Aparecida city: reports from an academic expedition." In XIV Congresso Paulista de Neurologia. Zeppelini Editorial e Comunicação, 2023. http://dx.doi.org/10.5327/1516-3180.141s1.452.

Full text
Abstract:
Introduction: Stroke is the second main cause of death and the leading cause of disability in Brazil. The incapacity to recognize the disease and its underlying risk factors can compromise its prevention and delay the search for a health professional. Objectives: To analyze the general knowledge regarding recognizing and preventing stroke in a low-income community in Brazil. Methods: This is a cross-sectional study conducted in the city of Aparecida in January 2023. Patients attending a program organized by students of “Faculdade de Ciências Médicas da Santa Casa de São Paulo” called “Programa de Expedições Científicas Assistenciais” were interviewed. The questions verified the understanding of stroke, the risk factors, and the capacity to recognize, prevent and manage it. An ethics committee previously approved this research, and a consent form was acquired. Patients younger than 18 years old or that did not sign the consent were excluded. Results: From a total of 260 participants, 34.6% were men; the average age of 53,8 years; most had an incomplete lower secondary school (31.5%) level of education and self-declared as white (56.9%). Among the interviewees, 42.3% conceptualized stroke or the popular term “derrame”, and 61.2% could not define either; 85.4% recognized at least one symptom, mostly paresthesia (26.8%). The most noted strategies for prevention were physical activities (33.8%), healthy eating (31.2%), and controlling blood pressure (21.9%). When witnessing a stroke, 54.6% would call the emergency service, and 0.76% would time the beginning of symptoms. In addition, 74.3% had an acquaintance who suffered from a stroke. Conclusion: Most of the interviewees had little knowledge about stroke, which can lead to higher rates of preventable morbidity and mortality. Therefore, it is necessary to reinforce mechanisms for recognizing, preventing, and managing the disease.
APA, Harvard, Vancouver, ISO, and other styles
2

Киреева, Виктория, Viktoriya Kireeva, Ю. Усольцев, Yu Usolcev, Ж. Капустенская, Zh Kapustenskaya, Е. Кожевникова, et al. "Intermediate results 2016 of a search study of translational diagnostic methods Mitochondrial dysfunction in patients with chronic myocardial ischemia and/or head Brain." In Topical issues of translational medicine: a collection of articles dedicated to the 5th anniversary of the day The creation of a department for biomedical research and technology of the Irkutsk Scientific Center Siberian Branch of RAS. Москва: INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/conferencearticle_58be81ec94893.

Full text
Abstract:
Purpose of the study. To rate prognostic properties of changes in mitochondrial DNA concentration in the blood plasma of patients with chronic cerebral ischemia and ischemic heart disease in relation to the disease and the effectiveness of the therapy. Materials and methods. The study involved patients suffering from coronary heart disease (CHD) and chronic cerebral ischemia (CCI) with stable and unstable atherosclerotic plaques, who have signed informed consent to the data processing within the framework of scientific research. The patients were admitted to the hospital for examination and treatment of CHD and CCI in Cardiology and Neurology Unit of the Hospital of ISC SB RAS. The subjects underwent laboratory and instrumental examination and analysis of the level of free circulating serum mitochondrial DNA by real-time PCR (copies/ml). The examination results considered as satisfactory were compared with the mtDNA levels before and after the treatment. Results. The average value of the mtDNA levels before and after the treatment in patients of neurological and cardiological profile were significantly different: 1 093 686 copies/ml vs 418 046 copies/ml, respectively (p = 0.02). Unlike women, men mtDNA levels statistically significantly (p = 0.03) decreased after the treatment. We revealed statistically significant differences in mtDNA level indicators before and after the treatment, depending on the definition of the series (p = 0.0010) for rank test Kruskal – Wallis test. The results of the proposed research will help to identify prognostic factors of destabilization of cell damage and plaques in endothelial dysfunction, atherosclerosis and its complications, to conduct clinical test of the method for predicting and diagnostics of cellular damage in chronic ischemia on a background of atherosclerosis.
APA, Harvard, Vancouver, ISO, and other styles
3

Savade, Latika C., and Suraj Chavan. "A technique to search log records using system of linear equations." In 2012 CSI Sixth International Conference on Software Engineering (CONSEG). IEEE, 2012. http://dx.doi.org/10.1109/conseg.2012.6349471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Private Web Search with Constant Round Efficiency." In 1st International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005225602050212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bonte, Charlotte, and Ilia Iliashenko. "Homomorphic String Search with Constant Multiplicative Depth." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3411495.3421361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hu, Qi, and Yangqiu Song. "User Consented Federated Recommender System Against Personalized Attribute Inference Attack." In WSDM '24: The 17th ACM International Conference on Web Search and Data Mining. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3616855.3635830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nagy, Allen L., and Robert R. Sanchez. "Color differences required for parallel visual search." In OSA Annual Meeting. Washington, D.C.: Optica Publishing Group, 1988. http://dx.doi.org/10.1364/oam.1988.mh5.

Full text
Abstract:
In previous experiments we have found that the time required to find a target disk among equalluminance distractors depended on the chromaticity difference between target and distractors. When the chromaticity difference was a small search time increased with the number of distractor items in the display indicating a serial search. When the chromaticity difference was large, the search time was approximately constant regardless of the number of distractors in the display indicating a parallel search. In the experiments to be described here we examined the effects of luminance differences on search times. Search times were measured as a function of luminance difference and number of distractors for targets and distractors of the same chromaticity. When the luminance difference was small, the search time increased with the number of distractors indicating a serial search. When the luminance difference was large, search times were approximately constant suggesting parallel search. Results for targets that differ from distractors in both chromaticity and luminance are also discussed. The chromaticity and luminance differences required for parallel search are many times threshold. The parallel search as a criterion for defining large color differences is discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Niu, Li, Xiong Liu, Youyi Wang, Amit K. Gupta, and Jianyang Zhai. "Induction machine rotor time constant identification using bisection search method." In TENCON 2016 - 2016 IEEE Region 10 Conference. IEEE, 2016. http://dx.doi.org/10.1109/tencon.2016.7848738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Limin Xiang, Kai Cheng, and K. Ushijiam. "Encoding a Binary Search Tree in Constant Time on BSR." In Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05). IEEE, 2005. http://dx.doi.org/10.1109/pdcat.2005.133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tisdale, John, and J. Karl Hedrick. "A UAV Trajectory Planning Algorithm for Simultaneous Search and Track." In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-81100.

Full text
Abstract:
This paper considers trajectories for an unmanned aerial vehicle (UAV) that must search an area while tracking a target. The UAV has a constrained turn rate and a constant velocity; it is assumed that there are certain areas of interest that have a higher search value than others. An algorithm is presented that seeks to maximize the value of the area searched while still maintaining the track. The problem is discretized in both time and the control; the motion of the UAV is constrained to the reachability graph, a subset of the forward reachable set. At each revisit, the target path is estimated for the next revisit. A heuristic method is used to determine the best UAV path, because the target path is not known a priori. Feasible paths are found by examining the terminating vertices of the reachability graph. A cooperative implementation, for a team of UAVs patrolling the same region, is developed. Simulation indicates the feasibility of the method for a real-time implementation. Trajectories for example scenarios are presented and discussed.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Consent search"

1

Stephens, Jaime, Thomas McLaren, Caitlyn Gillespie, and Claire Stuyck. Landbird monitoring: 2022 results from Crater Lake National Park, Lassen Volcanic National Park, Oregon Caves National Monument and Preserve, and Whiskeytown National Recreation Area. National Park Service, 2024. http://dx.doi.org/10.36967/2303313.

Full text
Abstract:
In 2022, the Klamath Inventory and Monitoring Network (KLMN) of the National Park Service implemented the 14th year of a long-term landbird monitoring protocol. Klamath Bird Observatory, in partnership with the KLMN, developed the protocol and completed this 14-year effort. Multiple standard avian sampling methods were implemented, including variable circular plot point counts, area search surveys, mist netting, species checklists, and habitat surveys. In 2022, a fifth year of point counts was completed, along with corresponding species checklists and habitat surveys, at 35 locations within Crater Lake National Park, 4 locations within Oregon Caves National Monument and Preserve, 24 locations within Lassen Volcanic National Park, and 30 locations within Whiskeytown National Recreation Area. Unlike in previous years, 4 rather than 2 national park units were monitored. This change in survey effort was made to compensate for surveys that were missed during 2020 when no monitoring was conducted due to the emergence of the COVID-19 pandemic. The operation of an ongoing constant effort monitoring station, which included mist netting, point counts, area searches, species checklists, and habitat surveys, continued at Oregon Caves National Monument and Preserve during the breeding and fall migration seasons. Relative abundance (birds/station), as measured by point count and area search methods, was calculated for all survey sites combined within each park. Total captures, by season, were calculated using constant effort mist netting data. Species of conservation importance were among the most abundant species at each park. Results are presented along with conservation status of individual species based on Partners in Flight state and continental plans and Oregon and California Wildlife Conservation Strategies. This 14th year of implementation of the KLMN landbird monitoring program continued to lay the groundwork for improved understanding of landbird status and long-term trends in each park. When analyzed in the framework of the Klamath Bird Monitoring Network, the contribution of KLMN parks to bird conservation in this region will help inform landbird conservation in the West.
APA, Harvard, Vancouver, ISO, and other styles
2

Sentcоv, Valentin, Andrei Reutov, and Vyacheslav Kuzmin. Electronic training manual "Acute poisoning with psychotropic substances". SIB-Expertise, January 2024. http://dx.doi.org/10.12731/er0777.29012024.

Full text
Abstract:
The significant variety of properties and wide distribution of opiates and opioids in the modern pharmaceutical industry entail not only positive, but also negative consequences in people's lives. The constant search for new drugs entails the emergence of new substances with psychotropic effects. The widespread use of vinegar essence in the food industry, nitrogen oxides in agriculture, and the frequent appearance of carbon disulfide in everyday life create an increased risk to public health. Positional compression syndrome very often accompanies poisoning with psychotropic substances, which leads to a high risk of disability for victims or even death. This electronic educational resourse consists of seven theoretical educational modules: opioid poisoning, acute psychostimulant poisoning, vinegar essence poisoning, acute carbon monoxide poisoning, acute nitrogen oxide poisoning, acute hydrogen sulfide and carbon disulfide poisoning, positional compression syndrome. The theoretical block of modules is presented by presentations, the text of lectures with illustrations. Control classes in the form of test control accompany each theoretical module. After studying all modules, the student passes the final test control. Mastering the electronic educational resourse will ensure a high level of readiness to provide specialized toxicological care by doctors of various specialties.
APA, Harvard, Vancouver, ISO, and other styles
3

Kerber, Steve, and Robin Zevotek. Fire Service Summary Report: Study of Residential Attic Fire Mitigation Tactics and Exterior Fire Spread Hazards on Firefighter Safety. UL Firefighter Safety Research Institute, November 2014. http://dx.doi.org/10.54206/102376/pxtq2256.

Full text
Abstract:
Attic fires pose many hazards for the fire service. When a fire occurs in an attic, it is common it goes unnoticed/reported until smoke or flames are visible from the outside of the structure. Because they take longer to detect, attic fires are more dangerous for firefighters and residents. In a fire situation, the attic ventilation system, which is designed to reduce moisture accumulation by drawing fresh air low from the eaves and exhausting moisture laden warm air near the peak, create an optimal fire growth and spread situation by supplying oxygen to the fire and exhausting hot gases. An estimated 10,000 residential attic fires are reported to U.S. fire departments each year and cause an estimated 30 civilian deaths, 125 civilian injuries and $477 million in property loss. The location of the attic creates several difficulties for the fire service. Firefighters must decide whether to fight the fire from inside the structure, from the outside or a combination of the two. This the decision is complicated by the constant hazard of ceiling collapse, which has the potential to rapidly deteriorate conditions in the living spaces. A piece of gypsum board may fall or be pulled from the ceiling making the relatively clear and cool conditions in the living space change very quickly endangering firefighters executing a search and rescue operation as part of their life safety mission. Further complicating the decision are the hazards associated with roof structure collapse, creating deadly conditions for firefighters operating on and under the roof. Structural collapse accounted for 180 firefighter deaths between 1979 and 2002 of which one-third occurred in residential structures . Many of these incidents involved a roof falling on firefighters or firefighters falling through the roof during firefighting operations on attic fires. The purpose of this study is to increase firefighter safety by providing the fire service with scientific knowledge on the dynamics of attic and exterior fires and the influence of coordinated fire mitigation tactics from full-scale fire testing in realistic residential structures.
APA, Harvard, Vancouver, ISO, and other styles
4

Kerber, Steve, and Robin Zevotek. Study of Residential Attic Fire Mitigation Tactics and Exterior Fire Spread Hazards on Firefighter Safety Released. UL Firefighter Safety Research Institute, November 2014. http://dx.doi.org/10.54206/102376/lihb1439.

Full text
Abstract:
Attic fires pose many hazards for the fire service. When a fire occurs in an attic, it is common it goes unnoticed/reported until smoke or flames are visible from the outside of the structure. Because they take longer to detect, attic fires are more dangerous for firefighters and residents. In a fire situation, the attic ventilation system, which is designed to reduce moisture accumulation by drawing fresh air low from the eaves and exhausting moisture laden warm air near the peak, create an optimal fire growth and spread situation by supplying oxygen to the fire and exhausting hot gases. An estimated 10,000 residential attic fires are reported to U.S. fire departments each year and cause an estimated 30 civilian deaths, 125 civilian injuries and $477 million in property loss. The location of the attic creates several difficulties for the fire service. Firefighters must decide whether to fight the fire from inside the structure, from the outside or a combination of the two. This the decision is complicated by the constant hazard of ceiling collapse, which has the potential to rapidly deteriorate conditions in the living spaces. A piece of gypsum board may fall or be pulled from the ceiling making the relatively clear and cool conditions in the living space change very quickly endangering firefighters executing a search and rescue operation as part of their life safety mission. Further complicating the decision are the hazards associated with roof structure collapse, creating deadly conditions for firefighters operating on and under the roof. Structural collapse accounted for 180 firefighter deaths between 1979 and 2002 of which one-third occurred in residential structures . Many of these incidents involved a roof falling on firefighters or firefighters falling through the roof during firefighting operations on attic fires. The purpose of this study is to increase firefighter safety by providing the fire service with scientific knowledge on the dynamics of attic and exterior fires and the influence of coordinated fire mitigation tactics from full-scale fire testing in realistic residential structures.
APA, Harvard, Vancouver, ISO, and other styles
5

Cantor, Amy G., Rebecca M. Jungbauer, Andrea C. Skelly, Erica L. Hart, Katherine Jorda, Cynthia Davis-O'Reilly, Aaron B. Caughey, and Ellen L. Tilden. Respectful Maternity Care: Dissemination and Implementation of Perinatal Safety Culture To Improve Equitable Maternal Healthcare Delivery and Outcomes. Agency for Healthcare Research and Quality (AHRQ), January 2024. http://dx.doi.org/10.23970/ahrqepccer269.

Full text
Abstract:
Objective. To summarize current research defining and measuring respectful maternity care (RMC) and evaluate the effectiveness of RMC and implementation strategies to improve health outcomes, particularly for populations at risk for health disparities. Data sources. Ovid MEDLINE®, Embase®, and Cochrane CENTRAL from inception to November 2022 and SocINDEX to July 2023; manual review of reference lists and responses to a Federal Register Notice. Review methods. Dual review of eligible abstracts and full-text articles using predefined criteria. Data abstraction and quality assessment dual reviewed using established methods. Systematic evaluation of psychometric studies of RMC tools using adapted criteria. Meta-analysis not conducted due to heterogeneity of studies and limited data. Results. Searches identified 4,043 unique records. Thirty-seven studies were included across all questions, including the Contextual Question (CQ). Twenty-four validation studies (3 observational studies, 21 cross-sectional studies) evaluated 12 tools for measuring RMC. One randomized controlled trial (RCT) evaluated RMC effectiveness. There were no effectiveness trials from settings relevant to clinical practice in the United States and no studies evaluating effectiveness of RMC implementation. For the CQ, 12 studies defined 12 RMC frameworks. Two types of frameworks defined RMC: (1) Disrespect and Abuse (D&A) and (2) Rights-Based. Components of D&A frameworks served as indicators for recognizing mistreatment during childbirth, while Rights-Based frameworks incorporated aspects of reproductive justice, human rights, and anti-racism. Overlapping themes from RMC frameworks included: freedom from abuse, consent, privacy, dignity, communication, safety, and justice. Tools that measured RMC performed well based on psychometric measures, but no single tool stood out as the best measure of RMC. The intrapartum version of the Mother’s Autonomy in Decision-Making (MADM), Mothers On Respect index (MORi), and the Childbirth Options, Information, and Person-Centered Explanation (CHOICES) index for measuring RMC demonstrated good overall validity based on analysis of psychometric properties and were applicable to U.S. populations. The Revised Childbirth Experience Questionnaire (CEQ-2) demonstrated good overall validity for measuring childbirth experiences and included RMC components. One fair-quality RCT from Iran demonstrated lower rates of postpartum depression at 6-8 weeks for those who received RMC compared with controls (20% [11/55] vs. 50% [27/54], p=0.001), measured by the Edinburgh Postpartum Depression Scale. No studies evaluated any other health outcomes or measured the effectiveness of RMC implementation strategies. Conclusions. RMC frameworks with overlapping components, themes, and definitions were well described in the literature, but consensus around one operational definition is needed. Validated tools to measure RMC performed well based on psychometric measures but have been subject to limited evaluation. A reliable metric informed by a standard definition could lead to further evaluation and implementation in U.S. settings. Evidence is currently lacking on the effectiveness of strategies to implement RMC to improve any maternal or infant health outcome.
APA, Harvard, Vancouver, ISO, and other styles
6

Galili, Naftali, Roger P. Rohrbach, Itzhak Shmulevich, Yoram Fuchs, and Giora Zauberman. Non-Destructive Quality Sensing of High-Value Agricultural Commodities Through Response Analysis. United States Department of Agriculture, October 1994. http://dx.doi.org/10.32747/1994.7570549.bard.

Full text
Abstract:
The objectives of this project were to develop nondestructive methods for detection of internal properties and firmness of fruits and vegetables. One method was based on a soft piezoelectric film transducer developed in the Technion, for analysis of fruit response to low-energy excitation. The second method was a dot-matrix piezoelectric transducer of North Carolina State University, developed for contact-pressure analysis of fruit during impact. Two research teams, one in Israel and the other in North Carolina, coordinated their research effort according to the specific objectives of the project, to develop and apply the two complementary methods for quality control of agricultural commodities. In Israel: An improved firmness testing system was developed and tested with tropical fruits. The new system included an instrumented fruit-bed of three flexible piezoelectric sensors and miniature electromagnetic hammers, which served as fruit support and low-energy excitation device, respectively. Resonant frequencies were detected for determination of firmness index. Two new acoustic parameters were developed for evaluation of fruit firmness and maturity: a dumping-ratio and a centeroid of the frequency response. Experiments were performed with avocado and mango fruits. The internal damping ratio, which may indicate fruit ripeness, increased monotonically with time, while resonant frequencies and firmness indices decreased with time. Fruit samples were tested daily by destructive penetration test. A fairy high correlation was found in tropical fruits between the penetration force and the new acoustic parameters; a lower correlation was found between this parameter and the conventional firmness index. Improved table-top firmness testing units, Firmalon, with data-logging system and on-line data analysis capacity have been built. The new device was used for the full-scale experiments in the next two years, ahead of the original program and BARD timetable. Close cooperation was initiated with local industry for development of both off-line and on-line sorting and quality control of more agricultural commodities. Firmalon units were produced and operated in major packaging houses in Israel, Belgium and Washington State, on mango and avocado, apples, pears, tomatoes, melons and some other fruits, to gain field experience with the new method. The accumulated experimental data from all these activities is still analyzed, to improve firmness sorting criteria and shelf-life predicting curves for the different fruits. The test program in commercial CA storage facilities in Washington State included seven apple varieties: Fuji, Braeburn, Gala, Granny Smith, Jonagold, Red Delicious, Golden Delicious, and D'Anjou pear variety. FI master-curves could be developed for the Braeburn, Gala, Granny Smith and Jonagold apples. These fruits showed a steady ripening process during the test period. Yet, more work should be conducted to reduce scattering of the data and to determine the confidence limits of the method. Nearly constant FI in Red Delicious and the fluctuations of FI in the Fuji apples should be re-examined. Three sets of experiment were performed with Flandria tomatoes. Despite the complex structure of the tomatoes, the acoustic method could be used for firmness evaluation and to follow the ripening evolution with time. Close agreement was achieved between the auction expert evaluation and that of the nondestructive acoustic test, where firmness index of 4.0 and more indicated grade-A tomatoes. More work is performed to refine the sorting algorithm and to develop a general ripening scale for automatic grading of tomatoes for the fresh fruit market. Galia melons were tested in Israel, in simulated export conditions. It was concluded that the Firmalon is capable of detecting the ripening of melons nondestructively, and sorted out the defective fruits from the export shipment. The cooperation with local industry resulted in development of automatic on-line prototype of the acoustic sensor, that may be incorporated with the export quality control system for melons. More interesting is the development of the remote firmness sensing method for sealed CA cool-rooms, where most of the full-year fruit yield in stored for off-season consumption. Hundreds of ripening monitor systems have been installed in major fruit storage facilities, and being evaluated now by the consumers. If successful, the new method may cause a major change in long-term fruit storage technology. More uses of the acoustic test method have been considered, for monitoring fruit maturity and harvest time, testing fruit samples or each individual fruit when entering the storage facilities, packaging house and auction, and in the supermarket. This approach may result in a full line of equipment for nondestructive quality control of fruits and vegetables, from the orchard or the greenhouse, through the entire sorting, grading and storage process, up to the consumer table. The developed technology offers a tool to determine the maturity of the fruits nondestructively by monitoring their acoustic response to mechanical impulse on the tree. A special device was built and preliminary tested in mango fruit. More development is needed to develop a portable, hand operated sensing method for this purpose. In North Carolina: Analysis method based on an Auto-Regressive (AR) model was developed for detecting the first resonance of fruit from their response to mechanical impulse. The algorithm included a routine that detects the first resonant frequency from as many sensors as possible. Experiments on Red Delicious apples were performed and their firmness was determined. The AR method allowed the detection of the first resonance. The method could be fast enough to be utilized in a real time sorting machine. Yet, further study is needed to look for improvement of the search algorithm of the methods. An impact contact-pressure measurement system and Neural Network (NN) identification method were developed to investigate the relationships between surface pressure distributions on selected fruits and their respective internal textural qualities. A piezoelectric dot-matrix pressure transducer was developed for the purpose of acquiring time-sampled pressure profiles during impact. The acquired data was transferred into a personal computer and accurate visualization of animated data were presented. Preliminary test with 10 apples has been performed. Measurement were made by the contact-pressure transducer in two different positions. Complementary measurements were made on the same apples by using the Firmalon and Magness Taylor (MT) testers. Three-layer neural network was designed. 2/3 of the contact-pressure data were used as training input data and corresponding MT data as training target data. The remaining data were used as NN checking data. Six samples randomly chosen from the ten measured samples and their corresponding Firmalon values were used as the NN training and target data, respectively. The remaining four samples' data were input to the NN. The NN results consistent with the Firmness Tester values. So, if more training data would be obtained, the output should be more accurate. In addition, the Firmness Tester values do not consistent with MT firmness tester values. The NN method developed in this study appears to be a useful tool to emulate the MT Firmness test results without destroying the apple samples. To get more accurate estimation of MT firmness a much larger training data set is required. When the larger sensitive area of the pressure sensor being developed in this project becomes available, the entire contact 'shape' will provide additional information and the neural network results would be more accurate. It has been shown that the impact information can be utilized in the determination of internal quality factors of fruit. Until now,
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography