135,997 research outputs found
Aspects of energy requirements for rock drilling
Development of laboratory rock breakage techniques to relate energy and surface area produced by slow compression, drop hammer and stamp mill.
A detailed study of laboratory rotary-percussive
drilling in a wide range of rocks under different
conditions, with the collection of drill cuttings and
measurement of the drill parameters. The correlation
of drill parameters with rock indices by energy concepts
and the developed empirical formula.
Field rotary-percussive drilling studies and
collection of drill cuttings on the basis of laboratory
analysis
3D-printing techniques in a medical setting : a systematic literature review
Background: Three-dimensional (3D) printing has numerous applications and has gained much interest in the medical world. The constantly improving quality of 3D-printing applications has contributed to their increased use on patients. This paper summarizes the literature on surgical 3D-printing applications used on patients, with a focus on reported clinical and economic outcomes.
Methods: Three major literature databases were screened for case series (more than three cases described in the same study) and trials of surgical applications of 3D printing in humans.
Results: 227 surgical papers were analyzed and summarized using an evidence table. The papers described the use of 3D printing for surgical guides, anatomical models, and custom implants. 3D printing is used in multiple surgical domains, such as orthopedics, maxillofacial surgery, cranial surgery, and spinal surgery. In general, the advantages of 3D-printed parts are said to include reduced surgical time, improved medical outcome, and decreased radiation exposure. The costs of printing and additional scans generally increase the overall cost of the procedure.
Conclusion: 3D printing is well integrated in surgical practice and research. Applications vary from anatomical models mainly intended for surgical planning to surgical guides and implants. Our research suggests that there are several advantages to 3D- printed applications, but that further research is needed to determine whether the increased intervention costs can be balanced with the observable advantages of this new technology. There is a need for a formal cost-effectiveness analysis
Courseware in academic library user education: a literature review from the GAELS Joint Electronic Library project
The use of courseware for information skills teaching in academic libraries has been growing for a number of years. The GAELS project was required to create a set of learning materials to support Joint Electronic Library activity at Glasgow and Strathclyde Universities and conducted a literature review of the subject. This review discovered a range of factors common to successful library courseware implementations, such as the need for practitioners to feel a sense of ownership of the medium, a need for courseware customization to local information environments, and an emphasis on training packages for large bodies of undergraduates. However, we also noted underdeveloped aspects worthy of further attention, such as treatment of pedagogic issues in library CAL implementations and use of hypertextual learning materials for more advanced information skills training. We suggest ways of improving library teaching practice and further areas of research
Courseware in academic library user education: A literature review from the GAELS Joint Electronic Library Project
The use of courseware for information skills teaching in academic libraries has been growing for a number of years. In order to create effective courseware packages to support joint electronic library activity at Glasgow and Strathclyde Universities, the GAELS project conducted a literature review of the subject. This review discovered a range of factors common to successful library courseware implementations, such as the need for practitioners to feel a sense of ownership of the medium, a need for courseware customization to local information environments, and an emphasis on training packages for large bodies of undergraduates. However, we also noted underdeveloped aspects worthy of further attention, such as treatment of pedagogic issues in library computer‐aided learning (CAL) implementations and use of hypertextual learning materials for more advanced information skills training. We describe how these findings shaped the packages produced by the project and suggest ways forward for similar types of implementation
High risk exotic species with respect to shellfish transports from the Oosterschelde to the Wadden Sea
This study presents the results of a literature review on 11 exotic marine species that are present in the Oosterschelde and could potentially be introduced into the Wadden Sea with shellfish transfers. Ten of the species result from a previous risk study, where they were identified as the species posing the highest risk. The Japanese oyster drill, that was recently observed in the Oosterschelde was also included in this study. The species discussed in the present study are: colonial tunicates Didemnum sp and Botrylloides violaceus the American oyster drill (Urosalpinx cinerea) and the Japanese oysterdrill (Ocinebrellus inornatus), the copepods Myticola orientalis and M. ostreae, the colonial bryozoan Smittoidea prolifica, Marteilia refringens and the macroalgae Gracilaria vermiculophylla, Polysiphonia senticulosa and Undaria pinnatifida. Four of these species (Gracilaria vermiculophylla, Undaria pinnatifida, Didemnum vexillum and Botrylloides violaceus) have recently been observed in the Wadden Sea. Some of these species are known pest species and could have an impact on the Wadden Sea ecosystem and/or the shellfish culture. The information that is collected in this study can be used to get a more realistic estimation of the risks compared to the risk assessment study of 2008 which was based on a worst-case approach. Moreover, the results can be used in the development of mitigating measures to reduce the risks of introducing these exotic species with the shellfish transfer from the Oosterschelde to the Wadden Sea
Using an Audience Response System Smartphone App to Improve Resident Education in the Pediatric Intensive Care Unit.
In the Pediatric Intensive Care Unit (PICU), most teaching occurs during bedside rounds, but technology now provides new opportunities to enhance education. Specifically, smartphone apps allow rapid communication between instructor and student. We hypothesized that using an audience response system (ARS) app can identify resident knowledge gaps, guide teaching, and enhance education in the PICU. Third-year pediatric residents rotating through the PICU participated in ARS-based education or received traditional teaching. Before rounds, experimental subjects completed an ARS quiz using the Socrative app. Concomitantly, the fellow leading rounds predicted quiz performance. Then, discussion points based on the incorrect answers were used to guide instruction. Scores on the pre-rotation test were similar between groups. On the post-rotation examination, ARS participants did not increase their scores more than controls. The fellow's prediction of performance was poor. Residents felt that the method enhanced their education whereas fellows reported that it improved their teaching efficiency. Although there was no measurable increase in knowledge using the ARS app, it may still be a useful tool to rapidly assess learners and help instructors provide learner-centered education
Short guide to lunar sample information
Data pertaining to the collection, processing, and study of lunar samples, and the ways to gain access to that data are described. Data pertaining to the samples includes not only the normally published literature but also NASA and USGS interagency documents, sample processing information, and photography taken from lunar orbit, on the lunar surface, and of samples in the Lunar Receiving Laboratory
A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes
Insider threats are perhaps the most serious challenges that nuclear security systems face. All of the cases of theft of nuclear materials where the circumstances of the theft are known were perpetrated either by insiders or with the help of insiders; given that the other cases involve bulk material stolen covertly without anyone being aware the material was missing, there is every reason to believe that they were perpetrated by insiders as well. Similarly, disgruntled workers from inside nuclear facilities have perpetrated many of the known incidents of nuclear sabotage. The most recent example of which we are aware is the apparent insider sabotage of a diesel generator at the San Onofre nuclear plant in the United States in 2012; the most spectacular was an incident three decades ago in which an insider placed explosives directly on the steel pressure vessel head of a nuclear reactor and then detonated them.While many such incidents, including the two just mentioned, appear to have been intended to send a message to management, not to spread radioactivity, they highlight the immense dangers that could arise from insiders with more malevolent intent. As it turns out, insiders perpetrate a large fraction of thefts from heavily guarded non-nuclear facilities as well. Yet organizations often find it difficult to understandand protect against insider threats. Why is this the case?Part of the answer is that there are deep organizational and cognitive biases that lead managers to downplay the threats insiders pose to their nuclear facilities and operations. But another part of the answer is that those managing nuclear security often have limited information about incidents that have happened in other countries or in other industries, and the lessons that might be learned from them.The IAEA and the World Institute for Nuclear Security (WINS) produce"best practices" guides as a way of disseminating ideas and procedures that have been identified as leading to improved security. Both have produced guides on protecting against insider threats.5 But sometimes mistakes are even moreinstructive than successes.Here, we are presenting a kind of "worst practices" guide of serious mistakes made in the past regarding insider threats. While each situation is unique, and serious insider problems are relatively rare, the incidents we describe reflect issues that exist in many contexts and that every nuclear security manager should consider. Common organizational practices -- such as prioritizing production over security, failure to share information across subunits, inadequate rules or inappropriate waiving of rules, exaggerated faith in group loyalty, and excessive focus on external threats -- can be seen in many past failures to protect against insider threats
The Brookings Urban Markets Initiative: Using information to drive change
Urban residents are more likely than their suburban counterparts to be underserved by retail services. The implications for urban residents and urban communities are far reaching. Recent research has shown that the costs of the basics—such as food, clothing, and even insurance—are often higher for low- to moderate-income residents. Appropriate access to goods and retail services must be a part of any agenda to create healthy communities. This article outlines the role of information as a critical part of the framework for urban retail success benefiting residents, communities, and the private sector.
- …
