6,905 research outputs found

    Integrating materials supply in strategic mine planning of underground coal mines

    Get PDF
    In July 2005 the Australian Coal Industry’s Research Program (ACARP) commissioned Gary Gibson to identify constraints that would prevent development production rates from achieving full capacity. A “TOP 5” constraint was “The logistics of supply transport distribution and handling of roof support consumables is an issue at older extensive mines immediately while the achievement of higher development rates will compound this issue at most mines.” Then in 2020, Walker, Harvey, Baafi, Kiridena, and Porter were commissioned by ACARP to investigate Australian best practice and progress made since Gibson’s 2005 report. This report was titled: - “Benchmarking study in underground coal mining logistics.” It found that even though logistics continue to be recognised as a critical constraint across many operations particularly at a tactical / day to day level, no strategic thought had been given to logistics in underground coal mines, rather it was always assumed that logistics could keep up with any future planned design and productivity. This subsequently meant that without estimating the impact of any logistical constraint in a life of mine plan, the risk of overvaluing a mining operation is high. This thesis attempts to rectify this shortfall and has developed a system to strategically identify logistics bottlenecks and the impacts that mine planning parameters might have on these at any point in time throughout a life of mine plan. By identifying any logistics constraints as early as possible, the best opportunity to rectify the problem at the least expense is realised. At the very worst if a logistics constraint was unsolvable then it could be understood, planned for, and reflected in the mine’s ongoing financial valuations. The system developed in this thesis, using a suite of unique algorithms, is designed to “bolt onto” existing mine plans in the XPAC mine scheduling software package, and identify at a strategic level the number of material delivery loads required to maintain planned productivity for a mining operation. Once an event was identified the system then drills down using FlexSim discrete event simulation to a tactical level to confirm the predicted impact and understand if a solution can be transferred back as a long-term solution. Most importantly the system developed in this thesis was designed to communicate to multiple non-technical stakeholders through simple graphical outputs if there is a risk to planned production levels due to a logistics constraint

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    The Adirondack Chronology

    Get PDF
    The Adirondack Chronology is intended to be a useful resource for researchers and others interested in the Adirondacks and Adirondack history.https://digitalworks.union.edu/arlpublications/1000/thumbnail.jp

    InEx: A Show About Inclusive Design

    Get PDF
    What does the term “inclusive design” mean to you? Broadly speaking, the colloquial definition of “inclusive design” is the intersection between “something that looks inclusive” and “something that looks like it was designed.” This stands in contrast to the more holistic approach which makes up the Inclusive Design program at OCAD University, whose program is focused from the start on seeking out and empowering marginalized, minoritized and historically underinvested communities through all phases of product design. The effect of this more superficial interpretation above taking hold is in shaping public perception. Embracing that superficiality by aligning the term to often fundamentally wrong-headed “design for” projects acts not only to further marginalize the purported users of these products, but to devalue the work of people trained in equity design, participatory action research and co-design, among other techniques and methodologies. Attention (and resources) flow to simple feel-good stories, at the expense of the more complex reality of inclusion and equity work in design roles: that they take time and effort, and don’t fit neatly in PR-friendly boxes. To address this gap in understanding, as well as the range of constituencies involved in defining, or at least narrowing down, the term “inclusive design,” I conducted a series of interviews with six professionals in fields exploring inclusion and equity in design. The resulting conversations showed an expansive set of lived experiences, personal insights into academia and industry, critique into the theory of its inclusive design and how it is claimed, and a look at where we go from here

    Hunting Wildlife in the Tropics and Subtropics

    Get PDF
    The hunting of wild animals for their meat has been a crucial activity in the evolution of humans. It continues to be an essential source of food and a generator of income for millions of Indigenous and rural communities worldwide. Conservationists rightly fear that excessive hunting of many animal species will cause their demise, as has already happened throughout the Anthropocene. Many species of large mammals and birds have been decimated or annihilated due to overhunting by humans. If such pressures continue, many other species will meet the same fate. Equally, if the use of wildlife resources is to continue by those who depend on it, sustainable practices must be implemented. These communities need to remain or become custodians of the wildlife resources within their lands, for their own well-being as well as for biodiversity in general. This title is also available via Open Access on Cambridge Core

    Industry 4.0: product digital twins for remanufacturing decision-making

    Get PDF
    Currently there is a desire to reduce natural resource consumption and expand circular business principles whilst Industry 4.0 (I4.0) is regarded as the evolutionary and potentially disruptive movement of technology, automation, digitalisation, and data manipulation into the industrial sector. The remanufacturing industry is recognised as being vital to the circular economy (CE) as it extends the in-use life of products, but its synergy with I4.0 has had little attention thus far. This thesis documents the first investigating into I4.0 in remanufacturing for a CE contributing a design and demonstration of a model that optimises remanufacturing planning using data from different instances in a product’s life cycle. The initial aim of this work was to identify the I4.0 technology that would enhance the stability in remanufacturing with a view to reducing resource consumption. As the project progressed it narrowed to focus on the development of a product digital twin (DT) model to support data-driven decision making for operations planning. The model’s architecture was derived using a bottom-up approach where requirements were extracted from the identified complications in production planning and control that differentiate remanufacturing from manufacturing. Simultaneously, the benefits of enabling visibility of an asset’s through-life health were obtained using a DT as the modus operandi. A product simulator and DT prototype was designed to use Internet of Things (IoT) components, a neural network for remaining life estimations and a search algorithm for operational planning optimisation. The DT was iteratively developed using case studies to validate and examine the real opportunities that exist in deploying a business model that harnesses, and commodifies, early life product data for end-of-life processing optimisation. Findings suggest that using intelligent programming networks and algorithms, a DT can enhance decision-making if it has visibility of the product and access to reliable remanufacturing process information, whilst existing IoT components provide rudimentary “smart” capabilities, but their integration is complex, and the durability of the systems over extended product life cycles needs to be further explored

    End(s) of the Harmonization in the European Union: Centrifuging or Engineering?

    Get PDF
    © 2021 Penn State University Press. All rights reserved. This work is licensed under Creative Commons Attribution CC-BY-NC-ND. https://creativecommons.org/licenses/by-nc-nd/4.0/The European Union (EU) harmonization has an evolving and dynamic nature. Different theoretical approaches (e.g., regulatory competition, coevolution, reflexive harmonization) are often echoed to delve into the EU harmonization. This article, going through these theories, endeavors to explain the harmonization discourse in the EU with a focus on the electronic communications sector. To understand the trajectory of the EU harmonization in this sector, two areas (“network access” and “spectrum regulation”) are selected as the subject-matter of the research. In conclusion, the legislative steps taken so far are found to restrict regulatory experimentation and innovation that this sector needs in the face of increasing challenges.Peer reviewedFinal Published versio
    • …
    corecore