The stability and productivity concerning a modification on the traditional room and pillar for a new selective technique at the Portuguese Panasqueira Mine have been described.The traditional room-and-pillar stoping ...The stability and productivity concerning a modification on the traditional room and pillar for a new selective technique at the Portuguese Panasqueira Mine have been described.The traditional room-and-pillar stoping uses 5.0-m wide rooms with 3.0 m×3.0 m pillars,while the selective room-and-pillar mining technique consists in stoping with rooms of 4.0 m wide and pillars of 4 m×4 m with a subsequent selective cutting of the quartz veins at the mid pillar of approximately 0.5 m high,to obtain a pillar section with an area of 3.0 m×3.0 m.The stability and productivity analyses indicate that the selective technique obtains smaller average pillar safety factor,more rock mass displacement,more extraction and selectivity ratios,and ore grade improvement,compared with the traditional technique.These results show that the selective technique is also more convenient.This proposed selective room-and-pillar mining technique is applicable to any sub-horizontal narrow quartz veins with wolfram,gold,etc.such as the famous La Rinconada gold mine in the Peruvian Andes.展开更多
Mining the data from the huge collection that are present in the database and uncovering the relationships between the item set are one of the key aspects of data mining technologies. Itinerary planning system with pe...Mining the data from the huge collection that are present in the database and uncovering the relationships between the item set are one of the key aspects of data mining technologies. Itinerary planning system with personalization in selecting the places to the users is one of the demanding features in most of the travel plan. In this work, the system is designed in such a way to provide the customized journey plan to the users and also the effective one to the back pack travelers. Here the Points of Interests are the places to visit in each destination for the number of days chosen by the travelers. In this system, the users are allowed to specify the desired POIs to visit for the selected destination and can make their customized travel plan effectively. This proposed system is designed to choose the customized places to visit and to plan travel for K-day itineraries. The most visited itineraries are saved and updated in the database. Association rules are used to find out the frequent places visited in each destination and to provide the reputed places to the users to plan the journey. Here the Weka tool is used to evaluate the performance of the algorithm and the rules that are generated for the given travel dataset. Data set is designed by considering several attributes that can take part during travel such as source, destination, travel cost, budget, etc. Statistical analysis is done to evaluate the performance of the proposed system and the list of features that are present in the system. During the analysis part, registered users, number of logins, frequent visits, and attributes are analyzed. Thus the system can be redefined further with the help of this statistical analysis. It is mostly used at the organization end to evaluate their performance and improve the features. Report is generated once the user has chosen their customized places to visit and all detailed description of journey is presented to the user. Report could be saved at the user end and they can use it for the future reference. Thus the goal of the system is to provide the customized travel with personalization in choosing POIs and to find the frequent places visited with desired amenities.展开更多
In today’s era, where mobile devices have become an integral part of our daily lives, ensuring the security of mobile applications has become increasingly crucial. Mobile penetration testing, a specialized subfield w...In today’s era, where mobile devices have become an integral part of our daily lives, ensuring the security of mobile applications has become increasingly crucial. Mobile penetration testing, a specialized subfield within the realm of cybersecurity, plays a vital role in safeguarding mobile ecosystems against the ever-evolving landscape of threats. The ubiquity of mobile devices has made them a prime target for cybercriminals, and the data and functionality accessed through mobile applications make them valuable assets to protect. Mobile penetration testing is designed to identify vulnerabilities, weaknesses, and potential exploits within mobile applications and the devices themselves. Unlike traditional penetration testing, which often focuses on network and server security, mobile penetration testing zeroes in on the unique challenges posed by mobile platforms. Mobile penetration testing, a specialized field within cybersecurity, is an essential tool in the Cybersecurity specialists’ toolkit to protect mobile ecosystems from emerging threats. This article introduces mobile penetration testing, emphasizing its significance, including comprehensive learning labs for Android and iOS platforms, and highlighting how it distinctly differs from traditional penetration testing methodologies.展开更多
基金supported by the Portuguese Science and Technology Foundation(FCT)
文摘The stability and productivity concerning a modification on the traditional room and pillar for a new selective technique at the Portuguese Panasqueira Mine have been described.The traditional room-and-pillar stoping uses 5.0-m wide rooms with 3.0 m×3.0 m pillars,while the selective room-and-pillar mining technique consists in stoping with rooms of 4.0 m wide and pillars of 4 m×4 m with a subsequent selective cutting of the quartz veins at the mid pillar of approximately 0.5 m high,to obtain a pillar section with an area of 3.0 m×3.0 m.The stability and productivity analyses indicate that the selective technique obtains smaller average pillar safety factor,more rock mass displacement,more extraction and selectivity ratios,and ore grade improvement,compared with the traditional technique.These results show that the selective technique is also more convenient.This proposed selective room-and-pillar mining technique is applicable to any sub-horizontal narrow quartz veins with wolfram,gold,etc.such as the famous La Rinconada gold mine in the Peruvian Andes.
文摘Mining the data from the huge collection that are present in the database and uncovering the relationships between the item set are one of the key aspects of data mining technologies. Itinerary planning system with personalization in selecting the places to the users is one of the demanding features in most of the travel plan. In this work, the system is designed in such a way to provide the customized journey plan to the users and also the effective one to the back pack travelers. Here the Points of Interests are the places to visit in each destination for the number of days chosen by the travelers. In this system, the users are allowed to specify the desired POIs to visit for the selected destination and can make their customized travel plan effectively. This proposed system is designed to choose the customized places to visit and to plan travel for K-day itineraries. The most visited itineraries are saved and updated in the database. Association rules are used to find out the frequent places visited in each destination and to provide the reputed places to the users to plan the journey. Here the Weka tool is used to evaluate the performance of the algorithm and the rules that are generated for the given travel dataset. Data set is designed by considering several attributes that can take part during travel such as source, destination, travel cost, budget, etc. Statistical analysis is done to evaluate the performance of the proposed system and the list of features that are present in the system. During the analysis part, registered users, number of logins, frequent visits, and attributes are analyzed. Thus the system can be redefined further with the help of this statistical analysis. It is mostly used at the organization end to evaluate their performance and improve the features. Report is generated once the user has chosen their customized places to visit and all detailed description of journey is presented to the user. Report could be saved at the user end and they can use it for the future reference. Thus the goal of the system is to provide the customized travel with personalization in choosing POIs and to find the frequent places visited with desired amenities.
文摘In today’s era, where mobile devices have become an integral part of our daily lives, ensuring the security of mobile applications has become increasingly crucial. Mobile penetration testing, a specialized subfield within the realm of cybersecurity, plays a vital role in safeguarding mobile ecosystems against the ever-evolving landscape of threats. The ubiquity of mobile devices has made them a prime target for cybercriminals, and the data and functionality accessed through mobile applications make them valuable assets to protect. Mobile penetration testing is designed to identify vulnerabilities, weaknesses, and potential exploits within mobile applications and the devices themselves. Unlike traditional penetration testing, which often focuses on network and server security, mobile penetration testing zeroes in on the unique challenges posed by mobile platforms. Mobile penetration testing, a specialized field within cybersecurity, is an essential tool in the Cybersecurity specialists’ toolkit to protect mobile ecosystems from emerging threats. This article introduces mobile penetration testing, emphasizing its significance, including comprehensive learning labs for Android and iOS platforms, and highlighting how it distinctly differs from traditional penetration testing methodologies.