3,648 research outputs found

    Rock Burst Mechanics: Insight from Physical and Mathematical Modelling

    Get PDF
    Rock burst processes in mines are studied by many groups active in the field of geomechanics. Physical and mathematical modelling can be used to better understand the phenomena and mechanisms involved in the bursts. In the present paper we describe both physical and mathematical models of a rock burst occurring in a gallery of a coal mine.For rock bursts (also called bumps) to occur, the rock has to possess certain particular rock burst properties leading to accumulation of energy and the potential to release this energy. Such materials may be brittle, or the rock burst may arise at the interfacial zones of two parts of the rock, which have principally different material properties (e.g. in the Poíbram uranium mines).The solution is based on experimental and mathematical modelling. These two methods have to allow the problem to be studied on the basis of three presumptions:· the solution must be time dependent,· the solution must allow the creation of cracks in the rock mass,· the solution must allow an extrusion of rock into an open space (bump effect).

    Stress Distribution in a Coal Seam before and after Bump Initiation

    Get PDF
    This paper deals with to the behaviour of open rock that occurs, for example, during longwall mining in coal mines, in deep tunnel, or shaft excavation.Longwall instability leads to extrusion of rock mass into an open space. This effect is mostly referred to as a bump, or a rock burst. For bumps to occur, the rock has to possess certain particular rock burst properties leading to accumulation of energy and the potential to release this energy. Such materials may be brittle, or the bumps may arise at the interfacial zones of two parts of the rock, that have principally different material properties.The solution is based on experimental and mathematical modelling. These two methods have to allow the problem to be studied on the basis of three presumptions: – the solution must be time dependent – the solution must allow the creation of crack in the rock mass – the solution must allow an extrusion of rock into an open space (bump effect

    The Next Frontier in Drone Law: Liability for Cybersecurity Negligence and Data Breaches for UAS Operators

    Get PDF
    While questions related to UAS operations and use in government surveillance have been discussed at length, the legal ramifications of cybersecurity negligence and data breaches for UAS operators have yet to be addressed. In Part I, this article seeks to explore those areas by discussing the UAS data chain. Vulnerabilities in this data chain specific to UAS and in general are explored, followed by an examination of the state of the law related to the collection, use, retention, and dissemination of data. Part I concludes with an overview of current voluntary “Best Practice” documents offering guidance for collecting and managing data. Part II of this article applies Article III standing requirements and third-party liability limitations to the cybersecurity negligence and data breach issues. Existing federal law does not address liability for cybersecurity negligence or data breaches in UAS operations. This, combined with current interpretations of Article III standing requirements and a lack of a required standard of care for UAS operators to protect against cyber attack by third parties, results in the lack of a legal remedy for people whose private data is captured by drone and later compromised in a cybersecurity breach. Thus, it appears UAS operators are effectively shielded from liability for data breaches beyond the UAS operation and in flight data collection

    Service Design: Thinking Holistically about Services & Technology

    Get PDF
    Presented at the 2018 LITA Library Technology Forum in Minneapolis, Minnesota.In Spring 2017, our library started to transform how it designs and implements its virtual and physical services iteratively through user and staff engagement and service design thinking. Service design is a user-focused technique that involves understanding and planning for user needs, service touchpoints, and employee and user workflows. This presentation will use a case study to illustrate how we integrated user needs, current and future library services, and technology in the redesign of a web application and the service offering. Attendees will learn the basics of how to create a service blueprint.http://deepblue.lib.umich.edu/bitstream/2027.42/146184/1/Thinking Holistically about Services & Technology - slides with notes.pdfhttp://deepblue.lib.umich.edu/bitstream/2027.42/146184/2/2018 LITA Forum Handout.pdfhttp://deepblue.lib.umich.edu/bitstream/2027.42/146184/3/Service Blueprint (Low Fidelity).pnghttp://deepblue.lib.umich.edu/bitstream/2027.42/146184/4/SALI-High Fidelity Service Blueprint Future State.pdfDescription of Thinking Holistically about Services & Technology - slides with notes.pdf : Slides and NotesDescription of 2018 LITA Forum Handout.pdf : Reading listDescription of Service Blueprint (Low Fidelity).png : Handout 1: preliminary service blueprint for discussionDescription of SALI-High Fidelity Service Blueprint Future State.pdf : Handout 2: Full Service Blueprin

    Customizing Discovery Interfaces: Understanding Users’ Behaviors and Providing Better Service

    Get PDF
    Presented at Electronic Resources & Libraries 2018 in Austin, Texas, on March 4, 2018.Customizing a library discovery layer using open-source software enables libraries to tailor services to its users, understand user behavior at user, department, and campus levels, and build integrations with library and campus services. Learn how and why a research library built a discovery interface to consolidate multiple interfaces into one.https://deepblue.lib.umich.edu/bitstream/2027.42/142719/1/Customizing Discovery Interfaces : Understanding Users’ Behaviors and Providing Better Service.pdfDescription of Customizing Discovery Interfaces : Understanding Users’ Behaviors and Providing Better Service.pdf : Presentation slides and note

    Own the User Experience: Provide Discovery for Your Users

    Get PDF
    Presented at LITA Forum 2017 in Denver, Colorado, on 10 November 2017.In the past several years, discovery systems have come a long way in enabling library staff to customize their user interfaces. However, there are still limitations to what a library can do to meet its particular user community’s needs. Fortunately, technology has advanced to a point where it’s becoming easier to use off-the-shelf, open source components to compliment your discovery index in order to create a highly configurable discovery environment. In this session, learn about how and why the University of Michigan Library chose to build a new discovery interface, the advantages and additional responsibilities of doing so, and considerations for your own discovery environment.https://deepblue.lib.umich.edu/bitstream/2027.42/139049/1/Own the User Experience: Provide Discovery for your Users.pdfDescription of Own the User Experience: Provide Discovery for your Users.pdf : Slide
    corecore